2 * QEMU access control list file authorization driver
4 * Copyright (c) 2018 Red Hat, Inc.
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
21 #include "qemu/osdep.h"
22 #include "authz/listfile.h"
23 #include "authz/trace.h"
24 #include "qemu/error-report.h"
25 #include "qemu/main-loop.h"
26 #include "qemu/sockets.h"
27 #include "qemu/filemonitor.h"
28 #include "qom/object_interfaces.h"
29 #include "qapi/qapi-visit-authz.h"
30 #include "qapi/qmp/qjson.h"
31 #include "qapi/qmp/qobject.h"
32 #include "qapi/qmp/qerror.h"
33 #include "qapi/qobject-input-visitor.h"
37 qauthz_list_file_is_allowed(QAuthZ *authz,
41 QAuthZListFile *fauthz = QAUTHZ_LIST_FILE(authz);
43 return qauthz_is_allowed(fauthz->list, identity, errp);
51 qauthz_list_file_load(QAuthZListFile *fauthz, Error **errp)
54 gchar *content = NULL;
61 trace_qauthz_list_file_load(fauthz, fauthz->filename);
62 if (!g_file_get_contents(fauthz->filename, &content, &len, &err)) {
63 error_setg(errp, "Unable to read '%s': %s",
64 fauthz->filename, err->message);
68 obj = qobject_from_json(content, errp);
73 pdict = qobject_to(QDict, obj);
75 error_setg(errp, QERR_INVALID_PARAMETER_TYPE, "obj", "dict");
79 v = qobject_input_visitor_new(obj);
81 ret = (QAuthZ *)user_creatable_add_type(TYPE_QAUTHZ_LIST,
82 NULL, pdict, v, errp);
96 qauthz_list_file_event(int64_t wd G_GNUC_UNUSED,
97 QFileMonitorEvent ev G_GNUC_UNUSED,
98 const char *name G_GNUC_UNUSED,
101 QAuthZListFile *fauthz = opaque;
104 if (ev != QFILE_MONITOR_EVENT_MODIFIED &&
105 ev != QFILE_MONITOR_EVENT_CREATED) {
109 object_unref(OBJECT(fauthz->list));
110 fauthz->list = qauthz_list_file_load(fauthz, &err);
111 trace_qauthz_list_file_refresh(fauthz,
112 fauthz->filename, fauthz->list ? 1 : 0);
114 error_report_err(err);
119 qauthz_list_file_complete(UserCreatable *uc, Error **errp)
121 QAuthZListFile *fauthz = QAUTHZ_LIST_FILE(uc);
122 gchar *dir = NULL, *file = NULL;
124 fauthz->list = qauthz_list_file_load(fauthz, errp);
126 if (!fauthz->refresh) {
130 fauthz->file_monitor = qemu_file_monitor_new(errp);
131 if (!fauthz->file_monitor) {
135 dir = g_path_get_dirname(fauthz->filename);
136 if (g_str_equal(dir, ".")) {
137 error_setg(errp, "Filename must be an absolute path");
140 file = g_path_get_basename(fauthz->filename);
141 if (g_str_equal(file, ".")) {
142 error_setg(errp, "Path has no trailing filename component");
146 fauthz->file_watch = qemu_file_monitor_add_watch(
147 fauthz->file_monitor, dir, file,
148 qauthz_list_file_event, fauthz, errp);
149 if (fauthz->file_watch < 0) {
160 qauthz_list_file_prop_set_filename(Object *obj,
162 Error **errp G_GNUC_UNUSED)
164 QAuthZListFile *fauthz = QAUTHZ_LIST_FILE(obj);
166 g_free(fauthz->filename);
167 fauthz->filename = g_strdup(value);
172 qauthz_list_file_prop_get_filename(Object *obj,
173 Error **errp G_GNUC_UNUSED)
175 QAuthZListFile *fauthz = QAUTHZ_LIST_FILE(obj);
177 return g_strdup(fauthz->filename);
182 qauthz_list_file_prop_set_refresh(Object *obj,
184 Error **errp G_GNUC_UNUSED)
186 QAuthZListFile *fauthz = QAUTHZ_LIST_FILE(obj);
188 fauthz->refresh = value;
193 qauthz_list_file_prop_get_refresh(Object *obj,
194 Error **errp G_GNUC_UNUSED)
196 QAuthZListFile *fauthz = QAUTHZ_LIST_FILE(obj);
198 return fauthz->refresh;
203 qauthz_list_file_finalize(Object *obj)
205 QAuthZListFile *fauthz = QAUTHZ_LIST_FILE(obj);
207 object_unref(OBJECT(fauthz->list));
208 g_free(fauthz->filename);
209 qemu_file_monitor_free(fauthz->file_monitor);
214 qauthz_list_file_class_init(ObjectClass *oc, void *data)
216 UserCreatableClass *ucc = USER_CREATABLE_CLASS(oc);
217 QAuthZClass *authz = QAUTHZ_CLASS(oc);
219 ucc->complete = qauthz_list_file_complete;
221 object_class_property_add_str(oc, "filename",
222 qauthz_list_file_prop_get_filename,
223 qauthz_list_file_prop_set_filename,
225 object_class_property_add_bool(oc, "refresh",
226 qauthz_list_file_prop_get_refresh,
227 qauthz_list_file_prop_set_refresh,
230 authz->is_allowed = qauthz_list_file_is_allowed;
235 qauthz_list_file_init(Object *obj)
237 QAuthZListFile *authz = QAUTHZ_LIST_FILE(obj);
239 authz->file_watch = -1;
240 #ifdef CONFIG_INOTIFY1
241 authz->refresh = TRUE;
246 QAuthZListFile *qauthz_list_file_new(const char *id,
247 const char *filename,
251 return QAUTHZ_LIST_FILE(
252 object_new_with_props(TYPE_QAUTHZ_LIST_FILE,
253 object_get_objects_root(),
255 "filename", filename,
256 "refresh", refresh ? "yes" : "no",
261 static const TypeInfo qauthz_list_file_info = {
262 .parent = TYPE_QAUTHZ,
263 .name = TYPE_QAUTHZ_LIST_FILE,
264 .instance_init = qauthz_list_file_init,
265 .instance_size = sizeof(QAuthZListFile),
266 .instance_finalize = qauthz_list_file_finalize,
267 .class_size = sizeof(QAuthZListFileClass),
268 .class_init = qauthz_list_file_class_init,
269 .interfaces = (InterfaceInfo[]) {
270 { TYPE_USER_CREATABLE },
277 qauthz_list_file_register_types(void)
279 type_register_static(&qauthz_list_file_info);
283 type_init(qauthz_list_file_register_types);