From nobody Sun Feb 8 21:33:45 2026
Delivered-To: importer@patchew.org
Received-SPF: pass (zoho.com: domain of redhat.com designates 209.132.183.28
as permitted sender) client-ip=209.132.183.28;
envelope-from=libvir-list-bounces@redhat.com; helo=mx1.redhat.com;
Authentication-Results: mx.zohomail.com;
spf=pass (zoho.com: domain of redhat.com designates 209.132.183.28 as
permitted sender) smtp.mailfrom=libvir-list-bounces@redhat.com
Return-Path:
Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by
mx.zohomail.com
with SMTPS id 1506528819443819.1339772085239;
Wed, 27 Sep 2017 09:13:39 -0700 (PDT)
Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com
[10.5.11.12])
(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))
(No client certificate requested)
by mx1.redhat.com (Postfix) with ESMTPS id 318A4C0BFD02;
Wed, 27 Sep 2017 16:13:38 +0000 (UTC)
Received: from colo-mx.corp.redhat.com
(colo-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.20])
by smtp.corp.redhat.com (Postfix) with ESMTPS id EC2175F6E8;
Wed, 27 Sep 2017 16:13:37 +0000 (UTC)
Received: from lists01.pubmisc.prod.ext.phx2.redhat.com
(lists01.pubmisc.prod.ext.phx2.redhat.com [10.5.19.33])
by colo-mx.corp.redhat.com (Postfix) with ESMTP id A7D7F1855946;
Wed, 27 Sep 2017 16:13:37 +0000 (UTC)
Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com
[10.5.11.16])
by lists01.pubmisc.prod.ext.phx2.redhat.com (8.13.8/8.13.8) with ESMTP
id v8RFk1Bk018607 for ;
Wed, 27 Sep 2017 11:46:01 -0400
Received: by smtp.corp.redhat.com (Postfix)
id D0B8281EE9; Wed, 27 Sep 2017 15:46:01 +0000 (UTC)
Received: from localhost.localdomain.com (ovpn-117-1.phx2.redhat.com
[10.3.117.1])
by smtp.corp.redhat.com (Postfix) with ESMTP id 873B781EC0;
Wed, 27 Sep 2017 15:46:01 +0000 (UTC)
DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 318A4C0BFD02
Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com;
dmarc=none (p=none dis=none) header.from=redhat.com
Authentication-Results: ext-mx07.extmail.prod.ext.phx2.redhat.com;
spf=fail smtp.mailfrom=libvir-list-bounces@redhat.com
From: John Ferlan
To: libvir-list@redhat.com
Date: Wed, 27 Sep 2017 11:45:53 -0400
Message-Id: <20170927154555.27156-4-jferlan@redhat.com>
In-Reply-To: <20170927154555.27156-1-jferlan@redhat.com>
References: <20170927154555.27156-1-jferlan@redhat.com>
X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16
X-loop: libvir-list@redhat.com
Cc: ashmit602@gmail.com
Subject: [libvirt] [PATCH v10 3/5] util: Add TLS attributes to
virStorageSource
X-BeenThere: libvir-list@redhat.com
X-Mailman-Version: 2.1.12
Precedence: junk
List-Id: Development discussions about the libvirt library & tools
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable
Sender: libvir-list-bounces@redhat.com
Errors-To: libvir-list-bounces@redhat.com
X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12
X-Greylist: Sender IP whitelisted,
not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]);
Wed, 27 Sep 2017 16:13:38 +0000 (UTC)
X-ZohoMail: RSF_0 Z_629925259 SPT_0
Content-Type: text/plain; charset="utf-8"
From: Ashish Mittal
Add an optional virTristateBool haveTLS to virStorageSource to
manage whether a storage source will be using TLS.
Sample XML for a VxHS disk:
Additionally add a tlsFromConfig boolean to control whether the TLS
setting was due to domain configuration or qemu.conf global setting
in order to decide whether to Format the haveTLS setting for either
a live or saved domain configuration file.
Update the qemuxml2xmltest in order to add a test to show the proper
parsing.
Also update the docs to describe the tls attribute.
Signed-off-by: Ashish Mittal
Signed-off-by: John Ferlan
---
docs/formatdomain.html.in | 17 +++++-
docs/schemas/domaincommon.rng | 5 ++
src/conf/domain_conf.c | 64 ++++++++++++++++++=
----
src/conf/domain_conf.h | 3 +-
src/conf/snapshot_conf.c | 7 ++-
src/util/virstoragefile.c | 2 +
src/util/virstoragefile.h | 7 +++
...emuxml2argv-disk-drive-network-tlsx509-vxhs.xml | 32 +++++++++++
...uxml2xmlout-disk-drive-network-tlsx509-vxhs.xml | 34 ++++++++++++
tests/qemuxml2xmltest.c | 1 +
10 files changed, 154 insertions(+), 18 deletions(-)
create mode 100644 tests/qemuxml2argvdata/qemuxml2argv-disk-drive-network-=
tlsx509-vxhs.xml
create mode 100644 tests/qemuxml2xmloutdata/qemuxml2xmlout-disk-drive-netw=
ork-tlsx509-vxhs.xml
diff --git a/docs/formatdomain.html.in b/docs/formatdomain.html.in
index bfca7ed3a..3e10213b5 100644
--- a/docs/formatdomain.html.in
+++ b/docs/formatdomain.html.in
@@ -2531,10 +2531,21 @@
specified, the default LUN is zero.
=20
-
- For "vxhs" (since 3.8.0), the
+
For "vxhs" (since 3.8.0), the
name is the UUID of the volume, assigned by the
- HyperScale server.
+ HyperScale server. Additionally, an optional attribute
+ tls (QEMU only) can be used to control whether a
+ VxHS block device would utilize a hypervisor configured TLS
+ X.509 certificate environment in order to encrypt the data
+ channel. For the QEMU hypervisor, usage of a TLS environment=
can
+ also be globally controlled on the host by the
+ vxhs_tls and vxhs_tls_x509_cert_dir or
+ default_tls_x509_cert_dir settings in the file
+ /etc/libvirt/qemu.conf. If vxhs_tls is enabled,
+ then unless the domain tls attribute is set to =
"no",
+ libvirt will use the host configured TLS environment. If the
+ tls attribute is set to "yes", then regardless =
of
+ the qemu.conf setting, TLS authentication will be attempted.
Since 0.8.7
diff --git a/docs/schemas/domaincommon.rng b/docs/schemas/domaincommon.rng
index 76852abb3..bac371ea3 100644
--- a/docs/schemas/domaincommon.rng
+++ b/docs/schemas/domaincommon.rng
@@ -1644,6 +1644,11 @@
+
+
+
+
+
diff --git a/src/conf/domain_conf.c b/src/conf/domain_conf.c
index fd6d3120f..87192eb2d 100644
--- a/src/conf/domain_conf.c
+++ b/src/conf/domain_conf.c
@@ -8109,11 +8109,15 @@ virDomainDiskSourcePoolDefParse(xmlNodePtr node,
int
virDomainDiskSourceParse(xmlNodePtr node,
xmlXPathContextPtr ctxt,
- virStorageSourcePtr src)
+ virStorageSourcePtr src,
+ unsigned int flags)
{
int ret =3D -1;
char *protocol =3D NULL;
xmlNodePtr saveNode =3D ctxt->node;
+ char *haveTLS =3D NULL;
+ char *tlsCfg =3D NULL;
+ int tlsCfgVal;
=20
ctxt->node =3D node;
=20
@@ -8147,6 +8151,30 @@ virDomainDiskSourceParse(xmlNodePtr node,
goto cleanup;
}
=20
+ /* Check tls=3Dyes|no domain setting for the block device
+ * At present only VxHS. Other block devices may be added later */
+ if (src->protocol =3D=3D VIR_STORAGE_NET_PROTOCOL_VXHS &&
+ (haveTLS =3D virXMLPropString(node, "tls"))) {
+ if ((src->haveTLS =3D
+ virTristateBoolTypeFromString(haveTLS)) <=3D 0) {
+ virReportError(VIR_ERR_XML_ERROR,
+ _("unknown disk source 'tls' setting '%s'"),
+ haveTLS);
+ goto cleanup;
+ }
+ }
+
+ if ((flags & VIR_DOMAIN_DEF_PARSE_STATUS) &&
+ (tlsCfg =3D virXMLPropString(node, "tlsFromConfig"))) {
+ if (virStrToLong_i(tlsCfg, NULL, 10, &tlsCfgVal) < 0) {
+ virReportError(VIR_ERR_XML_ERROR,
+ _("Invalid tlsFromConfig value: %s"),
+ tlsCfg);
+ goto cleanup;
+ }
+ src->tlsFromConfig =3D !!tlsCfgVal;
+ }
+
/* for historical reasons the volume name for gluster volume is st=
ored
* as a part of the path. This is hard to work with when dealing w=
ith
* relative names. Split out the volume into a separate variable */
@@ -8202,6 +8230,8 @@ virDomainDiskSourceParse(xmlNodePtr node,
=20
cleanup:
VIR_FREE(protocol);
+ VIR_FREE(haveTLS);
+ VIR_FREE(tlsCfg);
ctxt->node =3D saveNode;
return ret;
}
@@ -8209,7 +8239,8 @@ virDomainDiskSourceParse(xmlNodePtr node,
=20
static int
virDomainDiskBackingStoreParse(xmlXPathContextPtr ctxt,
- virStorageSourcePtr src)
+ virStorageSourcePtr src,
+ unsigned int flags)
{
virStorageSourcePtr backingStore =3D NULL;
xmlNodePtr save_ctxt =3D ctxt->node;
@@ -8258,8 +8289,8 @@ virDomainDiskBackingStoreParse(xmlXPathContextPtr ctx=
t,
goto cleanup;
}
=20
- if (virDomainDiskSourceParse(source, ctxt, backingStore) < 0 ||
- virDomainDiskBackingStoreParse(ctxt, backingStore) < 0)
+ if (virDomainDiskSourceParse(source, ctxt, backingStore, flags) < 0 ||
+ virDomainDiskBackingStoreParse(ctxt, backingStore, flags) < 0)
goto cleanup;
=20
src->backingStore =3D backingStore;
@@ -8360,7 +8391,8 @@ virDomainDiskDefIotuneParse(virDomainDiskDefPtr def,
static int
virDomainDiskDefMirrorParse(virDomainDiskDefPtr def,
xmlNodePtr cur,
- xmlXPathContextPtr ctxt)
+ xmlXPathContextPtr ctxt,
+ unsigned int flags)
{
xmlNodePtr mirrorNode;
char *mirrorFormat =3D NULL;
@@ -8398,7 +8430,7 @@ virDomainDiskDefMirrorParse(virDomainDiskDefPtr def,
goto cleanup;
}
=20
- if (virDomainDiskSourceParse(mirrorNode, ctxt, def->mirror) < 0)
+ if (virDomainDiskSourceParse(mirrorNode, ctxt, def->mirror, flags)=
< 0)
goto cleanup;
} else {
/* For back-compat reasons, we handle a file name
@@ -8815,7 +8847,7 @@ virDomainDiskDefParseXML(virDomainXMLOptionPtr xmlopt,
if (!source && virXMLNodeNameEqual(cur, "source")) {
sourceNode =3D cur;
=20
- if (virDomainDiskSourceParse(cur, ctxt, def->src) < 0)
+ if (virDomainDiskSourceParse(cur, ctxt, def->src, flags) < 0)
goto error;
=20
source =3D true;
@@ -8871,7 +8903,7 @@ virDomainDiskDefParseXML(virDomainXMLOptionPtr xmlopt,
} else if (!def->mirror &&
virXMLNodeNameEqual(cur, "mirror") &&
!(flags & VIR_DOMAIN_DEF_PARSE_INACTIVE)) {
- if (virDomainDiskDefMirrorParse(def, cur, ctxt) < 0)
+ if (virDomainDiskDefMirrorParse(def, cur, ctxt, flags) < 0)
goto error;
} else if (!authdef &&
virXMLNodeNameEqual(cur, "auth")) {
@@ -9126,7 +9158,7 @@ virDomainDiskDefParseXML(virDomainXMLOptionPtr xmlopt,
product =3D NULL;
=20
if (!(flags & VIR_DOMAIN_DEF_PARSE_DISK_SOURCE)) {
- if (virDomainDiskBackingStoreParse(ctxt, def->src) < 0)
+ if (virDomainDiskBackingStoreParse(ctxt, def->src, flags) < 0)
goto error;
}
=20
@@ -21673,7 +21705,8 @@ virDomainSourceDefFormatSeclabel(virBufferPtr buf,
static int
virDomainDiskSourceFormatNetwork(virBufferPtr attrBuf,
virBufferPtr childBuf,
- virStorageSourcePtr src)
+ virStorageSourcePtr src,
+ unsigned int flags)
{
size_t n;
char *path =3D NULL;
@@ -21690,6 +21723,14 @@ virDomainDiskSourceFormatNetwork(virBufferPtr attr=
Buf,
=20
VIR_FREE(path);
=20
+ if (src->haveTLS !=3D VIR_TRISTATE_BOOL_ABSENT &&
+ !(flags & VIR_DOMAIN_DEF_FORMAT_MIGRATABLE &&
+ src->tlsFromConfig))
+ virBufferAsprintf(attrBuf, " tls=3D'%s'",
+ virTristateBoolTypeToString(src->haveTLS));
+ if (flags & VIR_DOMAIN_DEF_FORMAT_STATUS)
+ virBufferAsprintf(attrBuf, " tlsFromConfig=3D'%d'", src->tlsFromCo=
nfig);
+
for (n =3D 0; n < src->nhosts; n++) {
virBufferAddLit(childBuf, "hosts[n].name=
);
@@ -21754,7 +21795,8 @@ virDomainDiskSourceFormatInternal(virBufferPtr buf,
break;
=20
case VIR_STORAGE_TYPE_NETWORK:
- if (virDomainDiskSourceFormatNetwork(&attrBuf, &childBuf, src)=
< 0)
+ if (virDomainDiskSourceFormatNetwork(&attrBuf, &childBuf,
+ src, flags) < 0)
goto error;
break;
=20
diff --git a/src/conf/domain_conf.h b/src/conf/domain_conf.h
index e11ae5247..05a035a16 100644
--- a/src/conf/domain_conf.h
+++ b/src/conf/domain_conf.h
@@ -2995,7 +2995,8 @@ virDomainDiskDefPtr
virDomainDiskRemoveByName(virDomainDefPtr def, const char *name);
int virDomainDiskSourceParse(xmlNodePtr node,
xmlXPathContextPtr ctxt,
- virStorageSourcePtr src);
+ virStorageSourcePtr src,
+ unsigned int flags);
=20
int virDomainNetFindIdx(virDomainDefPtr def, virDomainNetDefPtr net);
virDomainNetDefPtr virDomainNetFind(virDomainDefPtr def, const char *devic=
e);
diff --git a/src/conf/snapshot_conf.c b/src/conf/snapshot_conf.c
index 07706e0b2..f0e852c92 100644
--- a/src/conf/snapshot_conf.c
+++ b/src/conf/snapshot_conf.c
@@ -109,7 +109,8 @@ void virDomainSnapshotDefFree(virDomainSnapshotDefPtr d=
ef)
static int
virDomainSnapshotDiskDefParseXML(xmlNodePtr node,
xmlXPathContextPtr ctxt,
- virDomainSnapshotDiskDefPtr def)
+ virDomainSnapshotDiskDefPtr def,
+ unsigned int flags)
{
int ret =3D -1;
char *snapshot =3D NULL;
@@ -154,7 +155,7 @@ virDomainSnapshotDiskDefParseXML(xmlNodePtr node,
}
=20
if ((cur =3D virXPathNode("./source", ctxt)) &&
- virDomainDiskSourceParse(cur, ctxt, def->src) < 0)
+ virDomainDiskSourceParse(cur, ctxt, def->src, flags) < 0)
goto cleanup;
=20
if ((driver =3D virXPathString("string(./driver/@type)", ctxt))) {
@@ -348,7 +349,7 @@ virDomainSnapshotDefParse(xmlXPathContextPtr ctxt,
def->ndisks =3D n;
for (i =3D 0; i < def->ndisks; i++) {
if (virDomainSnapshotDiskDefParseXML(nodes[i], ctxt,
- &def->disks[i]) < 0)
+ &def->disks[i], flags) < =
0)
goto cleanup;
}
VIR_FREE(nodes);
diff --git a/src/util/virstoragefile.c b/src/util/virstoragefile.c
index 484a5c806..c0b9bcd8d 100644
--- a/src/util/virstoragefile.c
+++ b/src/util/virstoragefile.c
@@ -2040,6 +2040,8 @@ virStorageSourceCopy(const virStorageSource *src,
ret->physical =3D src->physical;
ret->readonly =3D src->readonly;
ret->shared =3D src->shared;
+ ret->haveTLS =3D src->haveTLS;
+ ret->tlsFromConfig =3D src->tlsFromConfig;
=20
/* storage driver metadata are not copied */
ret->drv =3D NULL;
diff --git a/src/util/virstoragefile.h b/src/util/virstoragefile.h
index f7e897f25..4817090fc 100644
--- a/src/util/virstoragefile.h
+++ b/src/util/virstoragefile.h
@@ -281,6 +281,13 @@ struct _virStorageSource {
/* metadata that allows identifying given storage source */
char *nodeformat; /* name of the format handler object */
char *nodestorage; /* name of the storage object */
+
+ /* An optional setting to enable usage of TLS for the storage source */
+ int haveTLS; /* enum virTristateBool */
+
+ /* Indication whether the haveTLS value was altered due to qemu.conf
+ * setting when haveTLS is missing from the domain config file */
+ bool tlsFromConfig;
};
=20
=20
diff --git a/tests/qemuxml2argvdata/qemuxml2argv-disk-drive-network-tlsx509=
-vxhs.xml b/tests/qemuxml2argvdata/qemuxml2argv-disk-drive-network-tlsx509-=
vxhs.xml
new file mode 100644
index 000000000..61b5e2e79
--- /dev/null
+++ b/tests/qemuxml2argvdata/qemuxml2argv-disk-drive-network-tlsx509-vxhs.x=
ml
@@ -0,0 +1,32 @@
+
+ QEMUGuest1
+ c7a5fdbd-edaf-9455-926a-d65c16db1809
+ 219136
+ 219136
+ 1
+
+ hvm
+
+
+
+ destroy
+ restart
+ destroy
+
+ /usr/bin/qemu-system-x86_64
+
+
+
+
+
+
+ eb90327c-8302-4725-9e1b-4e85ed4dc251
+
+
+
+
+
+
+
+
+
diff --git a/tests/qemuxml2xmloutdata/qemuxml2xmlout-disk-drive-network-tls=
x509-vxhs.xml b/tests/qemuxml2xmloutdata/qemuxml2xmlout-disk-drive-network-=
tlsx509-vxhs.xml
new file mode 100644
index 000000000..16f0883e0
--- /dev/null
+++ b/tests/qemuxml2xmloutdata/qemuxml2xmlout-disk-drive-network-tlsx509-vx=
hs.xml
@@ -0,0 +1,34 @@
+
+ QEMUGuest1
+ c7a5fdbd-edaf-9455-926a-d65c16db1809
+ 219136
+ 219136
+ 1
+
+ hvm
+
+
+
+ destroy
+ restart
+ destroy
+
+ /usr/bin/qemu-system-x86_64
+
+
+
+
+
+
+ eb90327c-8302-4725-9e1b-4e85ed4dc251
+
+
+
+
+
+
+
+
+
+
+
diff --git a/tests/qemuxml2xmltest.c b/tests/qemuxml2xmltest.c
index 4b2fbd990..2dba3607c 100644
--- a/tests/qemuxml2xmltest.c
+++ b/tests/qemuxml2xmltest.c
@@ -475,6 +475,7 @@ mymain(void)
DO_TEST("disk-drive-network-rbd-ceph-env", NONE);
DO_TEST("disk-drive-network-sheepdog", NONE);
DO_TEST("disk-drive-network-vxhs", NONE);
+ DO_TEST("disk-drive-network-tlsx509-vxhs", NONE);
DO_TEST("disk-scsi-device",
QEMU_CAPS_NODEFCONFIG, QEMU_CAPS_SCSI_LSI);
DO_TEST("disk-scsi-vscsi", NONE);
--=20
2.13.5
--
libvir-list mailing list
libvir-list@redhat.com
https://www.redhat.com/mailman/listinfo/libvir-list