1. 22 12月, 2015 12 次提交
  2. 19 12月, 2015 10 次提交
    • P
      Merge remote-tracking branch 'remotes/ehabkost/tags/numa-pull-request' into staging · c595b218
      Peter Maydell 提交于
      NUMA queue, 2015-12-18
      
      # gpg: Signature made Fri 18 Dec 2015 17:53:48 GMT using RSA key ID 984DC5A6
      # gpg: Good signature from "Eduardo Habkost <ehabkost@redhat.com>"
      
      * remotes/ehabkost/tags/numa-pull-request:
        numa: Clean up query-memdev error handling
      Signed-off-by: NPeter Maydell <peter.maydell@linaro.org>
      c595b218
    • M
      numa: Clean up query-memdev error handling · 2f6f826e
      Markus Armbruster 提交于
      qmp_query_memdev() has two error paths:
      
      * When object_get_objects_root() returns null.  It never does, so
        simply drop the useless error handling.
      
      * When query_memdev() fails.  It leaks err then.  But any failure
        there is actually a programming error.  Switch it to &error_abort,
        and drop the useless error handling.
      
      Messed up in commit 76b5d850 "qmp: add query-memdev".
      Signed-off-by: NMarkus Armbruster <armbru@redhat.com>
      Reviewed-by: NEduardo Habkost <ehabkost@redhat.com>
      Signed-off-by: NEduardo Habkost <ehabkost@redhat.com>
      2f6f826e
    • P
      Merge remote-tracking branch... · c6880845
      Peter Maydell 提交于
      Merge remote-tracking branch 'remotes/berrange/tags/pull-qcrypto-secrets-base-2015-12-18-1' into staging
      
      Merge QCryptoSecret object support
      
      # gpg: Signature made Fri 18 Dec 2015 16:51:21 GMT using RSA key ID 15104FDF
      # gpg: Good signature from "Daniel P. Berrange <dan@berrange.com>"
      # gpg:                 aka "Daniel P. Berrange <berrange@redhat.com>"
      
      * remotes/berrange/tags/pull-qcrypto-secrets-base-2015-12-18-1:
        crypto: add support for loading encrypted x509 keys
        crypto: add QCryptoSecret object class for password/key handling
        qga: convert to use error checked base64 decode
        qemu-char: convert to use error checked base64 decode
        util: add base64 decoding function
      Signed-off-by: NPeter Maydell <peter.maydell@linaro.org>
      c6880845
    • P
      Merge remote-tracking branch 'remotes/kevin/tags/for-upstream' into staging · de532ff1
      Peter Maydell 提交于
      Block layer patches
      
      # gpg: Signature made Fri 18 Dec 2015 13:41:03 GMT using RSA key ID C88F2FD6
      # gpg: Good signature from "Kevin Wolf <kwolf@redhat.com>"
      
      * remotes/kevin/tags/for-upstream: (48 commits)
        block/qapi: allow best-effort query
        qemu-img: abort when full_backing_filename not present
        block/qapi: explicitly warn if !has_full_backing_filename
        block/qapi: always report full_backing_filename
        block/qapi: do not redundantly print "actual path"
        qemu-iotests: s390x: fix test 068
        qemu-iotests: s390x: fix test 051
        qemu-iotests: refine common.config
        block: fix bdrv_ioctl called from coroutine
        block: use drained section around bdrv_snapshot_delete
        iotests: Update comments for bdrv_swap() in 094
        block: Remove prototype of bdrv_swap from header
        raw-posix: Make aio=native option binding
        qcow2: insert assert into qcow2_get_specific_info()
        iotests: Extend test 112 for qemu-img amend
        qcow2: Point to amend function in check
        qcow2: Invoke refcount order amendment function
        qcow2: Add function for refcount order amendment
        qcow2: Use intermediate helper CB for amend
        qcow2: Split upgrade/downgrade paths for amend
        ...
      Signed-off-by: NPeter Maydell <peter.maydell@linaro.org>
      de532ff1
    • D
      crypto: add support for loading encrypted x509 keys · 1d7b5b4a
      Daniel P. Berrange 提交于
      Make use of the QCryptoSecret object to support loading of
      encrypted x509 keys. The optional 'passwordid' parameter
      to the tls-creds-x509 object type, provides the ID of a
      secret object instance that holds the decryption password
      for the PEM file.
      
       # printf "123456" > mypasswd.txt
       # $QEMU \
          -object secret,id=sec0,filename=mypasswd.txt \
          -object tls-creds-x509,passwordid=sec0,id=creds0,\
                  dir=/home/berrange/.pki/qemu,endpoint=server \
          -vnc :1,tls-creds=creds0
      
      This requires QEMU to be linked to GNUTLS >= 3.1.11. If
      GNUTLS is too old an error will be reported if an attempt
      is made to pass a decryption password.
      Reviewed-by: NEric Blake <eblake@redhat.com>
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      1d7b5b4a
    • D
      crypto: add QCryptoSecret object class for password/key handling · ac1d8878
      Daniel P. Berrange 提交于
      Introduce a new QCryptoSecret object class which will be used
      for providing passwords and keys to other objects which need
      sensitive credentials.
      
      The new object can provide secret values directly as properties,
      or indirectly via a file. The latter includes support for file
      descriptor passing syntax on UNIX platforms. Ordinarily passing
      secret values directly as properties is insecure, since they
      are visible in process listings, or in log files showing the
      CLI args / QMP commands. It is possible to use AES-256-CBC to
      encrypt the secret values though, in which case all that is
      visible is the ciphertext.  For ad hoc developer testing though,
      it is fine to provide the secrets directly without encryption
      so this is not explicitly forbidden.
      
      The anticipated scenario is that libvirtd will create a random
      master key per QEMU instance (eg /var/run/libvirt/qemu/$VMNAME.key)
      and will use that key to encrypt all passwords it provides to
      QEMU via '-object secret,....'.  This avoids the need for libvirt
      (or other mgmt apps) to worry about file descriptor passing.
      
      It also makes life easier for people who are scripting the
      management of QEMU, for whom FD passing is significantly more
      complex.
      
      Providing data inline (insecure, only for ad hoc dev testing)
      
        $QEMU -object secret,id=sec0,data=letmein
      
      Providing data indirectly in raw format
      
        printf "letmein" > mypasswd.txt
        $QEMU -object secret,id=sec0,file=mypasswd.txt
      
      Providing data indirectly in base64 format
      
        $QEMU -object secret,id=sec0,file=mykey.b64,format=base64
      
      Providing data with encryption
      
        $QEMU -object secret,id=master0,file=mykey.b64,format=base64 \
              -object secret,id=sec0,data=[base64 ciphertext],\
      	           keyid=master0,iv=[base64 IV],format=base64
      
      Note that 'format' here refers to the format of the ciphertext
      data. The decrypted data must always be in raw byte format.
      
      More examples are shown in the updated docs.
      Reviewed-by: NEric Blake <eblake@redhat.com>
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      ac1d8878
    • D
      qga: convert to use error checked base64 decode · 920639ca
      Daniel P. Berrange 提交于
      Switch from using g_base64_decode over to qbase64_decode
      in order to get error checking of the base64 input data.
      Reviewed-by: NEric Blake <eblake@redhat.com>
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      920639ca
    • D
      qemu-char: convert to use error checked base64 decode · e9cf2fe0
      Daniel P. Berrange 提交于
      Switch from using g_base64_decode over to qbase64_decode
      in order to get error checking of the base64 input data.
      Reviewed-by: NEric Blake <eblake@redhat.com>
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      e9cf2fe0
    • D
      util: add base64 decoding function · 89bc0b6c
      Daniel P. Berrange 提交于
      The standard glib provided g_base64_decode doesn't provide any
      kind of sensible error checking on its input. Add a QEMU custom
      wrapper qbase64_decode which can be used with untrustworthy
      input that can contain invalid base64 characters, embedded
      NUL characters, or not be NUL terminated at all.
      Reviewed-by: NEric Blake <eblake@redhat.com>
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      89bc0b6c
    • P
      Merge remote-tracking branch 'remotes/berrange/tags/pull-io-channel-vnc-2015-12-18-1' into staging · b06f904f
      Peter Maydell 提交于
      Merge VNC conversion to I/O channels
      
      # gpg: Signature made Fri 18 Dec 2015 15:44:30 GMT using RSA key ID 15104FDF
      # gpg: Good signature from "Daniel P. Berrange <dan@berrange.com>"
      # gpg:                 aka "Daniel P. Berrange <berrange@redhat.com>"
      
      * remotes/berrange/tags/pull-io-channel-vnc-2015-12-18-1:
        ui: convert VNC server to use QIOChannelWebsock
        ui: convert VNC server to use QIOChannelTLS
        ui: convert VNC server to use QIOChannelSocket
      Signed-off-by: NPeter Maydell <peter.maydell@linaro.org>
      b06f904f
  3. 18 12月, 2015 18 次提交