mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2025-02-08 12:41:29 +00:00
Explicitly track static declared vs dynamically generated security labels
This commit is contained in:
parent
e4818895c1
commit
61796bdb4b
@ -1,3 +1,11 @@
|
|||||||
|
Tue Mar 3 16:43:13 GMT 2009 Daniel P. Berrange <berrange@redhat.com>
|
||||||
|
|
||||||
|
Explicitly track static declared vs dynamically generated
|
||||||
|
security labels for VMs
|
||||||
|
* src/domain_conf.c, src/domain_conf.h: Add type='static|dynamic'
|
||||||
|
for <seclabel> to determine whether to auto-generate labels
|
||||||
|
* src/qemu_driver.c: Only generate security labels for type=dynamic
|
||||||
|
|
||||||
Tue Mar 3 14:58:13 GMT 2009 Daniel P. Berrange <berrange@redhat.com>
|
Tue Mar 3 14:58:13 GMT 2009 Daniel P. Berrange <berrange@redhat.com>
|
||||||
|
|
||||||
Misc sVirt bug fixes
|
Misc sVirt bug fixes
|
||||||
|
@ -168,6 +168,10 @@ VIR_ENUM_IMPL(virDomainState, VIR_DOMAIN_CRASHED+1,
|
|||||||
"shutoff",
|
"shutoff",
|
||||||
"crashed")
|
"crashed")
|
||||||
|
|
||||||
|
VIR_ENUM_IMPL(virDomainSeclabel, VIR_DOMAIN_SECLABEL_LAST,
|
||||||
|
"dynamic",
|
||||||
|
"static")
|
||||||
|
|
||||||
#define virDomainReportError(conn, code, fmt...) \
|
#define virDomainReportError(conn, code, fmt...) \
|
||||||
virReportErrorHelper(conn, VIR_FROM_DOMAIN, code, __FILE__, \
|
virReportErrorHelper(conn, VIR_FROM_DOMAIN, code, __FILE__, \
|
||||||
__FUNCTION__, __LINE__, fmt)
|
__FUNCTION__, __LINE__, fmt)
|
||||||
@ -1847,24 +1851,49 @@ static int virDomainLifecycleParseXML(virConnectPtr conn,
|
|||||||
static int
|
static int
|
||||||
virSecurityLabelDefParseXML(virConnectPtr conn,
|
virSecurityLabelDefParseXML(virConnectPtr conn,
|
||||||
const virDomainDefPtr def,
|
const virDomainDefPtr def,
|
||||||
xmlXPathContextPtr ctxt)
|
xmlXPathContextPtr ctxt,
|
||||||
|
int flags)
|
||||||
{
|
{
|
||||||
char *p;
|
char *p;
|
||||||
|
|
||||||
if (virXPathNode(conn, "./seclabel", ctxt) == NULL)
|
if (virXPathNode(conn, "./seclabel", ctxt) == NULL)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
p = virXPathStringLimit(conn, "string(./seclabel/label[1])",
|
p = virXPathStringLimit(conn, "string(./seclabel/@type)",
|
||||||
VIR_SECURITY_LABEL_BUFLEN-1, ctxt);
|
VIR_SECURITY_LABEL_BUFLEN-1, ctxt);
|
||||||
if (p == NULL)
|
if (p == NULL)
|
||||||
goto error;
|
goto error;
|
||||||
def->seclabel.label = p;
|
if ((def->seclabel.type = virDomainSeclabelTypeFromString(p)) < 0)
|
||||||
|
|
||||||
p = virXPathStringLimit(conn, "string(./seclabel/@model)",
|
|
||||||
VIR_SECURITY_MODEL_BUFLEN-1, ctxt);
|
|
||||||
if (p == NULL)
|
|
||||||
goto error;
|
goto error;
|
||||||
def->seclabel.model = p;
|
VIR_FREE(p);
|
||||||
|
|
||||||
|
/* Only parse details, if using static labels, or
|
||||||
|
* if the 'live' VM XML is requested
|
||||||
|
*/
|
||||||
|
if (def->seclabel.type == VIR_DOMAIN_SECLABEL_STATIC ||
|
||||||
|
!(flags & VIR_DOMAIN_XML_INACTIVE)) {
|
||||||
|
p = virXPathStringLimit(conn, "string(./seclabel/@model)",
|
||||||
|
VIR_SECURITY_MODEL_BUFLEN-1, ctxt);
|
||||||
|
if (p == NULL)
|
||||||
|
goto error;
|
||||||
|
def->seclabel.model = p;
|
||||||
|
|
||||||
|
p = virXPathStringLimit(conn, "string(./seclabel/label[1])",
|
||||||
|
VIR_SECURITY_LABEL_BUFLEN-1, ctxt);
|
||||||
|
if (p == NULL)
|
||||||
|
goto error;
|
||||||
|
def->seclabel.label = p;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Only parse imagelabel, if requested live XML for dynamic label */
|
||||||
|
if (def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC &&
|
||||||
|
!(flags & VIR_DOMAIN_XML_INACTIVE)) {
|
||||||
|
p = virXPathStringLimit(conn, "string(./seclabel/imagelabel[1])",
|
||||||
|
VIR_SECURITY_LABEL_BUFLEN-1, ctxt);
|
||||||
|
if (p == NULL)
|
||||||
|
goto error;
|
||||||
|
def->seclabel.imagelabel = p;
|
||||||
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
@ -2458,7 +2487,7 @@ static virDomainDefPtr virDomainDefParseXML(virConnectPtr conn,
|
|||||||
VIR_FREE(nodes);
|
VIR_FREE(nodes);
|
||||||
|
|
||||||
/* analysis of security label */
|
/* analysis of security label */
|
||||||
if (virSecurityLabelDefParseXML(conn, def, ctxt) == -1)
|
if (virSecurityLabelDefParseXML(conn, def, ctxt, flags) == -1)
|
||||||
goto error;
|
goto error;
|
||||||
|
|
||||||
return def;
|
return def;
|
||||||
@ -3480,9 +3509,25 @@ char *virDomainDefFormat(virConnectPtr conn,
|
|||||||
virBufferAddLit(&buf, " </devices>\n");
|
virBufferAddLit(&buf, " </devices>\n");
|
||||||
|
|
||||||
if (def->seclabel.model) {
|
if (def->seclabel.model) {
|
||||||
virBufferEscapeString(&buf, " <seclabel model='%s'>\n", def->seclabel.model);
|
const char *sectype = virDomainSeclabelTypeToString(def->seclabel.type);
|
||||||
virBufferEscapeString(&buf, " <label>%s</label>\n", def->seclabel.label);
|
if (!sectype)
|
||||||
virBufferAddLit(&buf, " </seclabel>\n");
|
goto cleanup;
|
||||||
|
if (!def->seclabel.label ||
|
||||||
|
(def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC &&
|
||||||
|
(flags & VIR_DOMAIN_XML_INACTIVE))) {
|
||||||
|
virBufferVSprintf(&buf, " <seclabel type='%s' model='%s'/>\n",
|
||||||
|
sectype, def->seclabel.model);
|
||||||
|
} else {
|
||||||
|
virBufferVSprintf(&buf, " <seclabel type='%s' model='%s'>\n",
|
||||||
|
sectype, def->seclabel.model);
|
||||||
|
virBufferEscapeString(&buf, " <label>%s</label>\n",
|
||||||
|
def->seclabel.label);
|
||||||
|
if (def->seclabel.imagelabel &&
|
||||||
|
def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC)
|
||||||
|
virBufferEscapeString(&buf, " <imagelabel>%s</imagelabel>\n",
|
||||||
|
def->seclabel.imagelabel);
|
||||||
|
virBufferAddLit(&buf, " </seclabel>\n");
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
virBufferAddLit(&buf, "</domain>\n");
|
virBufferAddLit(&buf, "</domain>\n");
|
||||||
|
@ -410,6 +410,13 @@ struct _virDomainOSDef {
|
|||||||
char *bootloaderArgs;
|
char *bootloaderArgs;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
enum virDomainSeclabelType {
|
||||||
|
VIR_DOMAIN_SECLABEL_DYNAMIC,
|
||||||
|
VIR_DOMAIN_SECLABEL_STATIC,
|
||||||
|
|
||||||
|
VIR_DOMAIN_SECLABEL_LAST,
|
||||||
|
};
|
||||||
|
|
||||||
/* Security configuration for domain */
|
/* Security configuration for domain */
|
||||||
typedef struct _virSecurityLabelDef virSecurityLabelDef;
|
typedef struct _virSecurityLabelDef virSecurityLabelDef;
|
||||||
typedef virSecurityLabelDef *virSecurityLabelDefPtr;
|
typedef virSecurityLabelDef *virSecurityLabelDefPtr;
|
||||||
@ -417,6 +424,7 @@ struct _virSecurityLabelDef {
|
|||||||
char *model; /* name of security model */
|
char *model; /* name of security model */
|
||||||
char *label; /* security label string */
|
char *label; /* security label string */
|
||||||
char *imagelabel; /* security image label string */
|
char *imagelabel; /* security image label string */
|
||||||
|
int type;
|
||||||
};
|
};
|
||||||
|
|
||||||
#define VIR_DOMAIN_CPUMASK_LEN 1024
|
#define VIR_DOMAIN_CPUMASK_LEN 1024
|
||||||
@ -650,5 +658,6 @@ VIR_ENUM_DECL(virDomainInputBus)
|
|||||||
VIR_ENUM_DECL(virDomainGraphics)
|
VIR_ENUM_DECL(virDomainGraphics)
|
||||||
/* from libvirt.h */
|
/* from libvirt.h */
|
||||||
VIR_ENUM_DECL(virDomainState)
|
VIR_ENUM_DECL(virDomainState)
|
||||||
|
VIR_ENUM_DECL(virDomainSeclabel)
|
||||||
|
|
||||||
#endif /* __DOMAIN_CONF_H */
|
#endif /* __DOMAIN_CONF_H */
|
||||||
|
@ -1314,9 +1314,9 @@ static int qemudStartVMDaemon(virConnectPtr conn,
|
|||||||
hookData.vm = vm;
|
hookData.vm = vm;
|
||||||
hookData.driver = driver;
|
hookData.driver = driver;
|
||||||
|
|
||||||
/* If you are using a SecurityDriver and there was no security label in
|
/* If you are using a SecurityDriver with dynamic labelling,
|
||||||
database, then generate a security label for isolation */
|
then generate a security label for isolation */
|
||||||
if (vm->def->seclabel.label == NULL &&
|
if (vm->def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC &&
|
||||||
driver->securityDriver &&
|
driver->securityDriver &&
|
||||||
driver->securityDriver->domainGenSecurityLabel &&
|
driver->securityDriver->domainGenSecurityLabel &&
|
||||||
driver->securityDriver->domainGenSecurityLabel(conn, vm) < 0)
|
driver->securityDriver->domainGenSecurityLabel(conn, vm) < 0)
|
||||||
@ -1525,6 +1525,13 @@ static void qemudShutdownVMDaemon(virConnectPtr conn ATTRIBUTE_UNUSED,
|
|||||||
if (driver->securityDriver)
|
if (driver->securityDriver)
|
||||||
driver->securityDriver->domainRestoreSecurityLabel(conn, vm);
|
driver->securityDriver->domainRestoreSecurityLabel(conn, vm);
|
||||||
|
|
||||||
|
/* Clear out dynamically assigned labels */
|
||||||
|
if (vm->def->seclabel.type == VIR_DOMAIN_SECLABEL_DYNAMIC) {
|
||||||
|
VIR_FREE(vm->def->seclabel.model);
|
||||||
|
VIR_FREE(vm->def->seclabel.label);
|
||||||
|
VIR_FREE(vm->def->seclabel.imagelabel);
|
||||||
|
}
|
||||||
|
|
||||||
if (qemudRemoveDomainStatus(conn, driver, vm) < 0) {
|
if (qemudRemoveDomainStatus(conn, driver, vm) < 0) {
|
||||||
VIR_WARN(_("Failed to remove domain status for %s"),
|
VIR_WARN(_("Failed to remove domain status for %s"),
|
||||||
vm->def->name);
|
vm->def->name);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user