[libvirt] [PATCH v3] Added new attribute mount_security to filesystem element

Daniel P. Berrange berrange at redhat.com
Thu Oct 14 08:35:02 UTC 2010


On Thu, Oct 14, 2010 at 11:00:24AM +0530, Harsh Bora wrote:
> On 10/13/2010 09:22 PM, Matthias Bolte wrote:
> >2010/10/11 Harsh Prateek Bora<harsh at linux.vnet.ibm.com>:
> >>This patch introduces new attribute to filesystem element
> >>to support customizable security for mount type.
> >>Valid mount_security are: passthrough and mapped.
> >>
> >>Usage:
> >>        <filesystem type='mount' mount_security='passthrough'>
> >>        <source dir='/export/to/guest'/>
> >>        <target dir='mount_tag'/>
> >>        </filesystem>
> >>
> >>Here is the detailed explanation on these security models:
> >>
> >>Security model: mapped
> >>----------------------
> >>
> >>Fileserver intercepts and maps all the file object create requests.
> >>Files on the fileserver will be created with Fileserver's user credentials
> >>and the
> >>client-user's credentials are stored in extended attributes.
> >>During getattr() server extracts the client-user's credentials from 
> >>extended
> >>attributes and sends to the client.
> >>
> >>This adds a great deal of security in the cloud environments where the
> >>guest's(client) user space is kept completely isolated from host's user
> >>space.
> >>
> >>
> >>Security model : passthrough
> >>----------------------------
> >>
> >>In this security model, Fileserver passes down all requests to the
> >>underlying filesystem. File system objects on the fileserver will be 
> >>created
> >>with client-user's credentials. This is done by setting setuid()/setgid()
> >>during creation or chmod/chown after file creation. At the end of create
> >>protocol
> >>request, files on the fileserver will be owned by cleint-user's uid/gid.
> >>This model mimic's current NFSv3 level of security.
> >>
> >>Note: This patch is based on Daniel's patch to support 9pfs.
> >>It shall be applied after applying Daniel's patch to support 9pfs.
> >>
> >>v3:
> >>- QEMU cmdline still uses security_model, changes done by mistake 
> >>reverted.
> >>
> >>Signed-off-by: Harsh Prateek Bora<harsh at linux.vnet.ibm.com>
> >>---
> >>  docs/schemas/domain.rng |    6 ++++++
> >>  src/conf/domain_conf.c  |   29 +++++++++++++++++++++++++++--
> >>  src/conf/domain_conf.h  |   10 ++++++++++
> >>  src/qemu/qemu_conf.c    |    9 +++++++--
> >>  4 files changed, 50 insertions(+), 4 deletions(-)
> >>
> >
> >This patch lacks documentation about the new domain XML attributes in
> >docs/formatdomain.html.in.
> >
> Hi Matthias,
> I wanted to put the documentation for the new attributes in the 
> formatdomain.html.in, however, found that we are actually missing the 
> documentation for the <filesystem> element itself there.
> I discussed about the same with DV and he suggested to put the 
> documentation text in the patch itself, so that once the documentation 
> for <filesystem> element is in place, this text can be added to it for 
> the new attributes.

Yep, don't worry about the docs, i'll write up full docs for the entire
<filesystem> element.

Regards,
Daniel
-- 
|: Red Hat, Engineering, London    -o-   http://people.redhat.com/berrange/ :|
|: http://libvirt.org -o- http://virt-manager.org -o- http://deltacloud.org :|
|: http://autobuild.org        -o-         http://search.cpan.org/~danberr/ :|
|: GnuPG: 7D3B9505  -o-   F3C9 553F A1DA 4AC2 5648 23C1 B3DF F742 7D3B 9505 :|




More information about the libvir-list mailing list