From: "Daniel P. Berrangé" <berrange@redhat.com>
To: qemu-devel@nongnu.org
Cc: "Dr. David Alan Gilbert" <dgilbert@redhat.com>,
"Daniel P. Berrangé" <berrange@redhat.com>,
"Markus Armbruster" <armbru@redhat.com>,
"Eric Blake" <eblake@redhat.com>,
"Andreas Färber" <afaerber@suse.de>,
"Marc-André Lureau" <marcandre.lureau@redhat.com>,
"Gerd Hoffmann" <kraxel@redhat.com>,
"Philippe Mathieu-Daudé" <philmd@redhat.com>,
"Michael Roth" <mdroth@linux.vnet.ibm.com>
Subject: [Qemu-devel] [PULL 00/11] Merge authz core patches
Date: Mon, 25 Feb 2019 12:31:00 +0000 [thread overview]
Message-ID: <20190225123111.30363-1-berrange@redhat.com> (raw)
The following changes since commit 8eb29f1bf5a974dc4c11d2d1f5e7c7f7a62be116:
Merge remote-tracking branch 'remotes/awilliam/tags/vfio-updates-20190221.0' into staging (2019-02-22 15:48:04 +0000)
are available in the Git repository at:
https://github.com/berrange/qemu tags/authz-core-pull-request
for you to fetch changes up to cfde05c6c0db7d3122a5491d50f62f7910ab8abb:
authz: delete existing ACL implementation (2019-02-25 12:28:25 +0000)
----------------------------------------------------------------
Add a standard authorization framework
The current network services now support encryption via TLS and in some
cases support authentication via SASL. In cases where SASL is not
available, x509 client certificates can be used as a crude authorization
scheme, but using a sub-CA and controlling who you give certs to. In
general this is not very flexible though, so this series introduces a
new standard authorization framework.
It comes with four initial authorization mechanisms
- Simple - an exact username match. This is useful when there is
exactly one user that is known to connect. For example when live
migrating from one QEMU to another with TLS, libvirt would use
the simple scheme to whitelist the TLS cert of the source QEMU.
- List - an full access control list, with optional regex matching.
This is more flexible and is used to provide 100% backcompat with
the existing HMP ACL commands. The caveat is that we can't create
these via the CLI -object arg yet.
- ListFile - the same as List, but with the rules stored in JSON
format in an external file. This avoids the -object limitation
while also allowing the admin to change list entries on the file.
QEMU uses inotify to notice these changes and auto-reload the
file contents. This is likely a good default choice for most
network services, if the "simple" mechanism isn't sufficient.
- PAM - delegate the username lookup to a PAM module, which opens
the door to many options including things like SQL/LDAP lookups.
----------------------------------------------------------------
Daniel P. Berrangé (11):
util: add helper APIs for dealing with inotify in portable manner
qom: don't require user creatable objects to be registered
hw/usb: don't set IN_ISDIR for inotify watch in MTP driver
hw/usb: fix const-ness for string params in MTP driver
hw/usb: switch MTP to use new inotify APIs
authz: add QAuthZ object as an authorization base class
authz: add QAuthZSimple object type for easy whitelist auth checks
authz: add QAuthZList object type for an access control list
authz: add QAuthZListFile object type for a file access control list
authz: add QAuthZPAM object type for authorizing using PAM
authz: delete existing ACL implementation
MAINTAINERS | 15 +
Makefile | 10 +-
Makefile.objs | 8 +-
Makefile.target | 2 +
authz/Makefile.objs | 7 +
authz/base.c | 82 ++++
authz/list.c | 271 +++++++++++++
authz/listfile.c | 283 ++++++++++++++
authz/pamacct.c | 148 +++++++
authz/simple.c | 115 ++++++
authz/trace-events | 18 +
configure | 54 ++-
crypto/tlssession.c | 35 +-
crypto/trace-events | 2 +-
hw/usb/dev-mtp.c | 281 ++++++--------
hw/usb/trace-events | 2 +-
include/authz/base.h | 112 ++++++
include/authz/list.h | 106 +++++
include/authz/listfile.h | 111 ++++++
include/authz/pamacct.h | 100 +++++
include/authz/simple.h | 84 ++++
include/qemu/acl.h | 66 ----
include/qemu/filemonitor.h | 128 ++++++
monitor.c | 179 ++++++---
qapi/Makefile.objs | 2 +-
qapi/authz.json | 58 +++
qapi/qapi-schema.json | 1 +
qemu-options.hx | 105 +++++
qom/object.c | 12 +-
qom/object_interfaces.c | 16 +-
tests/Makefile.include | 16 +-
tests/test-authz-list.c | 159 ++++++++
tests/test-authz-listfile.c | 195 ++++++++++
tests/test-authz-pam.c | 124 ++++++
tests/test-authz-simple.c | 50 +++
tests/test-crypto-tlssession.c | 15 +-
tests/test-io-channel-tls.c | 16 +-
tests/test-util-filemonitor.c | 685 +++++++++++++++++++++++++++++++++
ui/vnc-auth-sasl.c | 23 +-
ui/vnc-auth-sasl.h | 5 +-
ui/vnc-auth-vencrypt.c | 2 +-
ui/vnc-ws.c | 2 +-
ui/vnc.c | 37 +-
ui/vnc.h | 4 +-
util/Makefile.objs | 4 +-
util/acl.c | 179 ---------
util/filemonitor-inotify.c | 339 ++++++++++++++++
util/filemonitor-stub.c | 59 +++
util/trace-events | 9 +
49 files changed, 3773 insertions(+), 563 deletions(-)
create mode 100644 authz/Makefile.objs
create mode 100644 authz/base.c
create mode 100644 authz/list.c
create mode 100644 authz/listfile.c
create mode 100644 authz/pamacct.c
create mode 100644 authz/simple.c
create mode 100644 authz/trace-events
create mode 100644 include/authz/base.h
create mode 100644 include/authz/list.h
create mode 100644 include/authz/listfile.h
create mode 100644 include/authz/pamacct.h
create mode 100644 include/authz/simple.h
delete mode 100644 include/qemu/acl.h
create mode 100644 include/qemu/filemonitor.h
create mode 100644 qapi/authz.json
create mode 100644 tests/test-authz-list.c
create mode 100644 tests/test-authz-listfile.c
create mode 100644 tests/test-authz-pam.c
create mode 100644 tests/test-authz-simple.c
create mode 100644 tests/test-util-filemonitor.c
delete mode 100644 util/acl.c
create mode 100644 util/filemonitor-inotify.c
create mode 100644 util/filemonitor-stub.c
--
2.20.1
next reply other threads:[~2019-02-25 12:31 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-02-25 12:31 Daniel P. Berrangé [this message]
2019-02-25 12:31 ` [Qemu-devel] [PULL 01/11] util: add helper APIs for dealing with inotify in portable manner Daniel P. Berrangé
2019-02-25 12:31 ` [Qemu-devel] [PULL 02/11] qom: don't require user creatable objects to be registered Daniel P. Berrangé
2019-02-25 12:31 ` [Qemu-devel] [PULL 03/11] hw/usb: don't set IN_ISDIR for inotify watch in MTP driver Daniel P. Berrangé
2019-02-25 12:31 ` [Qemu-devel] [PULL 04/11] hw/usb: fix const-ness for string params " Daniel P. Berrangé
2019-02-25 12:31 ` [Qemu-devel] [PULL 05/11] hw/usb: switch MTP to use new inotify APIs Daniel P. Berrangé
2019-02-25 12:31 ` [Qemu-devel] [PULL 06/11] authz: add QAuthZ object as an authorization base class Daniel P. Berrangé
2019-02-25 12:31 ` [Qemu-devel] [PULL 07/11] authz: add QAuthZSimple object type for easy whitelist auth checks Daniel P. Berrangé
2019-02-25 12:31 ` [Qemu-devel] [PULL 08/11] authz: add QAuthZList object type for an access control list Daniel P. Berrangé
2019-02-25 14:36 ` Eric Blake
2019-02-26 6:04 ` Markus Armbruster
2019-02-26 15:29 ` Daniel P. Berrangé
2019-02-25 12:31 ` [Qemu-devel] [PULL 09/11] authz: add QAuthZListFile object type for a file " Daniel P. Berrangé
2019-02-25 12:31 ` [Qemu-devel] [PULL 10/11] authz: add QAuthZPAM object type for authorizing using PAM Daniel P. Berrangé
2019-02-25 12:31 ` [Qemu-devel] [PULL 11/11] authz: delete existing ACL implementation Daniel P. Berrangé
2019-02-26 19:04 ` [Qemu-devel] [PULL 00/11] Merge authz core patches Peter Maydell
2019-02-26 19:07 ` Philippe Mathieu-Daudé
2019-02-26 19:09 ` Peter Maydell
2019-02-27 11:12 ` Daniel P. Berrangé
2019-02-27 9:31 ` Daniel P. Berrangé
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190225123111.30363-1-berrange@redhat.com \
--to=berrange@redhat.com \
--cc=afaerber@suse.de \
--cc=armbru@redhat.com \
--cc=dgilbert@redhat.com \
--cc=eblake@redhat.com \
--cc=kraxel@redhat.com \
--cc=marcandre.lureau@redhat.com \
--cc=mdroth@linux.vnet.ibm.com \
--cc=philmd@redhat.com \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.