mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2025-01-21 20:15:17 +00:00
Rename APIs for fetching UNIX socket credentials
To avoid a namespace clash with forthcoming identity APIs, rename the virNet*GetLocalIdentity() APIs to have the form virNet*GetUNIXIdentity() * daemon/remote.c, src/libvirt_private.syms: Update for renamed APIs * src/rpc/virnetserverclient.c, src/rpc/virnetserverclient.h, src/rpc/virnetsocket.c, src/rpc/virnetsocket.h: s/LocalIdentity/UNIXIdentity/
This commit is contained in:
parent
1fff03ef9b
commit
2f9dc36d49
@ -2038,7 +2038,7 @@ remoteDispatchAuthList(virNetServerPtr server ATTRIBUTE_UNUSED,
|
||||
* some piece of polkit isn't present/running
|
||||
*/
|
||||
if (auth == VIR_NET_SERVER_SERVICE_AUTH_POLKIT) {
|
||||
if (virNetServerClientGetLocalIdentity(client, &callerUid, &callerGid, &callerPid) < 0) {
|
||||
if (virNetServerClientGetUNIXIdentity(client, &callerUid, &callerGid, &callerPid) < 0) {
|
||||
/* Don't do anything on error - it'll be validated at next
|
||||
* phase of auth anyway */
|
||||
virResetLastError();
|
||||
@ -2494,7 +2494,7 @@ remoteDispatchAuthPolkit(virNetServerPtr server ATTRIBUTE_UNUSED,
|
||||
goto authfail;
|
||||
}
|
||||
|
||||
if (virNetServerClientGetLocalIdentity(client, &callerUid, &callerGid, &callerPid) < 0) {
|
||||
if (virNetServerClientGetUNIXIdentity(client, &callerUid, &callerGid, &callerPid) < 0) {
|
||||
goto authfail;
|
||||
}
|
||||
|
||||
@ -2592,7 +2592,7 @@ remoteDispatchAuthPolkit(virNetServerPtr server,
|
||||
goto authfail;
|
||||
}
|
||||
|
||||
if (virNetServerClientGetLocalIdentity(client, &callerUid, &callerGid, &callerPid) < 0) {
|
||||
if (virNetServerClientGetUNIXIdentity(client, &callerUid, &callerGid, &callerPid) < 0) {
|
||||
VIR_ERROR(_("cannot get peer socket identity"));
|
||||
goto authfail;
|
||||
}
|
||||
|
@ -1291,10 +1291,10 @@ virNetServerClientDelayedClose;
|
||||
virNetServerClientFree;
|
||||
virNetServerClientGetAuth;
|
||||
virNetServerClientGetFD;
|
||||
virNetServerClientGetLocalIdentity;
|
||||
virNetServerClientGetPrivateData;
|
||||
virNetServerClientGetReadonly;
|
||||
virNetServerClientGetTLSKeySize;
|
||||
virNetServerClientGetUNIXIdentity;
|
||||
virNetServerClientHasTLSSession;
|
||||
virNetServerClientImmediateClose;
|
||||
virNetServerClientIsSecure;
|
||||
|
@ -447,13 +447,13 @@ int virNetServerClientGetFD(virNetServerClientPtr client)
|
||||
return fd;
|
||||
}
|
||||
|
||||
int virNetServerClientGetLocalIdentity(virNetServerClientPtr client,
|
||||
uid_t *uid, gid_t *gid, pid_t *pid)
|
||||
int virNetServerClientGetUNIXIdentity(virNetServerClientPtr client,
|
||||
uid_t *uid, gid_t *gid, pid_t *pid)
|
||||
{
|
||||
int ret = -1;
|
||||
virNetServerClientLock(client);
|
||||
if (client->sock)
|
||||
ret = virNetSocketGetLocalIdentity(client->sock, uid, gid, pid);
|
||||
ret = virNetSocketGetUNIXIdentity(client->sock, uid, gid, pid);
|
||||
virNetServerClientUnlock(client);
|
||||
return ret;
|
||||
}
|
||||
|
@ -70,8 +70,8 @@ int virNetServerClientSetIdentity(virNetServerClientPtr client,
|
||||
const char *identity);
|
||||
const char *virNetServerClientGetIdentity(virNetServerClientPtr client);
|
||||
|
||||
int virNetServerClientGetLocalIdentity(virNetServerClientPtr client,
|
||||
uid_t *uid, gid_t *gid, pid_t *pid);
|
||||
int virNetServerClientGetUNIXIdentity(virNetServerClientPtr client,
|
||||
uid_t *uid, gid_t *gid, pid_t *pid);
|
||||
|
||||
void virNetServerClientRef(virNetServerClientPtr client);
|
||||
|
||||
|
@ -824,10 +824,10 @@ int virNetSocketGetPort(virNetSocketPtr sock)
|
||||
|
||||
|
||||
#ifdef SO_PEERCRED
|
||||
int virNetSocketGetLocalIdentity(virNetSocketPtr sock,
|
||||
uid_t *uid,
|
||||
gid_t *gid,
|
||||
pid_t *pid)
|
||||
int virNetSocketGetUNIXIdentity(virNetSocketPtr sock,
|
||||
uid_t *uid,
|
||||
gid_t *gid,
|
||||
pid_t *pid)
|
||||
{
|
||||
struct ucred cr;
|
||||
socklen_t cr_len = sizeof (cr);
|
||||
@ -848,10 +848,10 @@ int virNetSocketGetLocalIdentity(virNetSocketPtr sock,
|
||||
return 0;
|
||||
}
|
||||
#else
|
||||
int virNetSocketGetLocalIdentity(virNetSocketPtr sock ATTRIBUTE_UNUSED,
|
||||
uid_t *uid ATTRIBUTE_UNUSED,
|
||||
gid_t *gid ATTRIBUTE_UNUSED,
|
||||
pid_t *pid ATTRIBUTE_UNUSED)
|
||||
int virNetSocketGetUNIXIdentity(virNetSocketPtr sock ATTRIBUTE_UNUSED,
|
||||
uid_t *uid ATTRIBUTE_UNUSED,
|
||||
gid_t *gid ATTRIBUTE_UNUSED,
|
||||
pid_t *pid ATTRIBUTE_UNUSED)
|
||||
{
|
||||
/* XXX Many more OS support UNIX socket credentials we could port to. See dbus ....*/
|
||||
virReportSystemError(ENOSYS, "%s",
|
||||
|
@ -86,10 +86,10 @@ bool virNetSocketHasPassFD(virNetSocketPtr sock);
|
||||
|
||||
int virNetSocketGetPort(virNetSocketPtr sock);
|
||||
|
||||
int virNetSocketGetLocalIdentity(virNetSocketPtr sock,
|
||||
uid_t *uid,
|
||||
gid_t *gid,
|
||||
pid_t *pid);
|
||||
int virNetSocketGetUNIXIdentity(virNetSocketPtr sock,
|
||||
uid_t *uid,
|
||||
gid_t *gid,
|
||||
pid_t *pid);
|
||||
|
||||
int virNetSocketSetBlocking(virNetSocketPtr sock,
|
||||
bool blocking);
|
||||
|
Loading…
x
Reference in New Issue
Block a user