qubes.vm – Different Virtual Machine types

Qubes is composed of several virtual machines that are interconnected in several ways. From now on they will be called „domains”, as they may not actually be true virtual machines – we plan to support LXC containers for example. Because of Xen-only legacy of Qubes code, it is custom to refer to them in long/plural as domains and in short/singular as vm.

Domain object

There are couple of programming objects that refer to domain. The main is the instance of qubes.vm.QubesVM. This is the main „porcelain” object, which carries other objects and supplies convenience methods like qubes.vm.qubesvm.QubesVM.start(). This class is actually divided in two, the qubes.vm.qubesvm.QubesVM cares about Qubes-specific actions, that are more or less directly related to security model. It is intended to be easily auditable by non-expert programmers (ie. we don’t use Python’s magic there). The second class is its parent, qubes.vm.BaseVM, which is concerned about technicalities like XML serialising/deserialising. It is of less concern to threat model auditors, but still relevant to overall security of the Qubes OS. It is written for programmers by programmers.

The second object is the XML node that refers to the domain. It can be accessed as Qubes.vm.BaseVM.xml attribute of the domain object. The third one is Qubes.vm.qubesvm.QubesVM.libvirt_domain object for directly interacting with libvirt. Those objects are intended to be used from core and/or plugins, but not directly by user or from qvm-tools. They are however public, so there are no restrictions.

Domain classes

There are several different types of VM, because not every Qubes domain is equal – some of them perform specific functions, like NetVM; others have different life cycle, like DisposableVM. For that, different domains have different Python classes. They are all defined in this package, generally one class per module, but some modules contain private globals that serve this particular class.

Package contents

Main public classes

class qubes.vm.BaseVM(app, xml, features=None, devices=None, tags=None, **kwargs)[source]

Bases: qubes.PropertyHolder

Base class for all VMs

Parameters:
  • app (qubes.Qubes) – Qubes application context
  • xml (lxml.etree._Element or None) – xml node from which to deserialise

This class is responsible for serializing and deserialising machines and provides basic framework. It contains no management logic. For that, see qubes.vm.qubesvm.QubesVM.

create_config_file()[source]

Create libvirt’s XML domain config file

init_log()[source]

Initialise logger for this domain.

start_qdb_watch(loop=None)[source]

Start watching QubesDB

Calling this method in appropriate time is responsibility of child class.

watch_qdb_path(path)[source]

Add a QubesDB path to be watched.

Each change to the path will cause domain-qdb-change:path event to be fired. You can call this method for example in response to domain-init and domain-load events.

app = None

mother qubes.Qubes object

devices = None

DeviceManager object keeping devices that are attached to this domain

features = None

dictionary of features of this qube

klass

Domain class name

label

Colourful label assigned to VM. This is where the colour of the padlock is set.

log = None

logger instance for logging messages related to this VM

name

User-specified name of the domain.

qid

Internal, persistent identificator of particular domain. Note this is different from Xen domid.

storage = None

storage manager

tags = None

user-specified tags

uuid

UUID from libvirt.

volumes = None

storage volumes

Helper classes and functions