storage_encryption_conf.c 8.0 KB
Newer Older
1
/*
2
 * storage_encryption_conf.c: volume encryption information
3
 *
4
 * Copyright (C) 2009-2010 Red Hat, Inc.
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
 *
 * This library is free software; you can redistribute it and/or
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
 * This library is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
 * License along with this library; if not, write to the Free Software
 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307  USA
 *
 * Red Hat Author: Miloslav Trmač <mitr@redhat.com>
 */

#include <config.h>

25 26 27
#include <fcntl.h>
#include <unistd.h>

28 29 30 31 32 33 34 35 36
#include "internal.h"

#include "buf.h"
#include "memory.h"
#include "storage_conf.h"
#include "storage_encryption_conf.h"
#include "util.h"
#include "xml.h"
#include "virterror_internal.h"
37
#include "uuid.h"
38
#include "files.h"
39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71

#define VIR_FROM_THIS VIR_FROM_STORAGE

VIR_ENUM_IMPL(virStorageEncryptionSecretType,
              VIR_STORAGE_ENCRYPTION_SECRET_TYPE_LAST, "passphrase")

VIR_ENUM_IMPL(virStorageEncryptionFormat,
              VIR_STORAGE_ENCRYPTION_FORMAT_LAST,
              "default", "qcow")

static void
virStorageEncryptionSecretFree(virStorageEncryptionSecretPtr secret)
{
    if (!secret)
        return;
    VIR_FREE(secret);
}

void
virStorageEncryptionFree(virStorageEncryptionPtr enc)
{
    size_t i;

    if (!enc)
        return;

    for (i = 0; i < enc->nsecrets; i++)
        virStorageEncryptionSecretFree(enc->secrets[i]);
    VIR_FREE(enc->secrets);
    VIR_FREE(enc);
}

static virStorageEncryptionSecretPtr
72
virStorageEncryptionSecretParse(xmlXPathContextPtr ctxt,
73 74 75 76 77 78
                                xmlNodePtr node)
{
    xmlNodePtr old_node;
    virStorageEncryptionSecretPtr ret;
    char *type_str;
    int type;
79
    char *uuidstr = NULL;
80 81

    if (VIR_ALLOC(ret) < 0) {
82
        virReportOOMError();
83 84 85 86 87 88
        return NULL;
    }

    old_node = ctxt->node;
    ctxt->node = node;

89
    type_str = virXPathString("string(./@type)", ctxt);
90
    if (type_str == NULL) {
91
        virStorageReportError(VIR_ERR_XML_ERROR, "%s",
92 93 94 95 96
                              _("unknown volume encryption secret type"));
        goto cleanup;
    }
    type = virStorageEncryptionSecretTypeTypeFromString(type_str);
    if (type < 0) {
97
        virStorageReportError(VIR_ERR_XML_ERROR,
98 99 100 101 102 103 104 105
                              _("unknown volume encryption secret type %s"),
                              type_str);
        VIR_FREE(type_str);
        goto cleanup;
    }
    VIR_FREE(type_str);
    ret->type = type;

106
    uuidstr = virXPathString("string(./@uuid)", ctxt);
107 108
    if (uuidstr) {
        if (virUUIDParse(uuidstr, ret->uuid) < 0) {
109
            virStorageReportError(VIR_ERR_XML_ERROR,
110 111 112 113
                                  _("malformed volume encryption uuid '%s'"),
                                  uuidstr);
            goto cleanup;
        }
114
        VIR_FREE(uuidstr);
115
    } else {
116
        virStorageReportError(VIR_ERR_XML_ERROR, "%s",
117 118 119
                              _("missing volume encryption uuid"));
        goto cleanup;
    }
120 121 122 123 124
    ctxt->node = old_node;
    return ret;

  cleanup:
    virStorageEncryptionSecretFree(ret);
125
    VIR_FREE(uuidstr);
126 127 128 129 130
    ctxt->node = old_node;
    return NULL;
}

static virStorageEncryptionPtr
131
virStorageEncryptionParseXML(xmlXPathContextPtr ctxt)
132 133 134 135 136 137 138
{
    xmlNodePtr *nodes = NULL;
    virStorageEncryptionPtr ret;
    char *format_str;
    int format, i, n;

    if (VIR_ALLOC(ret) < 0) {
139
        virReportOOMError();
140 141 142
        return NULL;
    }

143
    format_str = virXPathString("string(./@format)", ctxt);
144
    if (format_str == NULL) {
145
        virStorageReportError(VIR_ERR_XML_ERROR, "%s",
146 147 148 149 150
                              _("unknown volume encryption format"));
        goto cleanup;
    }
    format = virStorageEncryptionFormatTypeFromString(format_str);
    if (format < 0) {
151
        virStorageReportError(VIR_ERR_XML_ERROR,
152 153 154 155 156 157 158 159
                              _("unknown volume encryption format type %s"),
                              format_str);
        VIR_FREE(format_str);
        goto cleanup;
    }
    VIR_FREE(format_str);
    ret->format = format;

160
    n = virXPathNodeSet("./secret", ctxt, &nodes);
161 162 163 164
    if (n < 0){
        goto cleanup;
    }
    if (n != 0 && VIR_ALLOC_N(ret->secrets, n) < 0) {
165
        virReportOOMError();
166 167 168 169
        goto cleanup;
    }
    ret->nsecrets = n;
    for (i = 0; i < n; i++) {
170
        ret->secrets[i] = virStorageEncryptionSecretParse(ctxt, nodes[i]);
171 172 173 174 175 176 177 178 179 180 181 182 183 184
        if (ret->secrets[i] == NULL)
            goto cleanup;
    }
    VIR_FREE(nodes);

    return ret;

  cleanup:
    VIR_FREE(nodes);
    virStorageEncryptionFree(ret);
    return NULL;
}

virStorageEncryptionPtr
185
virStorageEncryptionParseNode(xmlDocPtr xml, xmlNodePtr root)
186 187 188 189 190
{
    xmlXPathContextPtr ctxt = NULL;
    virStorageEncryptionPtr enc = NULL;

    if (STRNEQ((const char *) root->name, "encryption")) {
191
        virStorageReportError(VIR_ERR_XML_ERROR,
192 193 194 195 196 197 198
                              "%s", _("unknown root element for volume "
                                      "encryption information"));
        goto cleanup;
    }

    ctxt = xmlXPathNewContext(xml);
    if (ctxt == NULL) {
199
        virReportOOMError();
200 201 202 203
        goto cleanup;
    }

    ctxt->node = root;
204
    enc = virStorageEncryptionParseXML(ctxt);
205 206 207 208 209

  cleanup:
    xmlXPathFreeContext(ctxt);
    return enc;
}
210

211 212

static int
213
virStorageEncryptionSecretFormat(virBufferPtr buf,
214
                                 virStorageEncryptionSecretPtr secret,
215
                                 int indent)
216 217
{
    const char *type;
218
    char uuidstr[VIR_UUID_STRING_BUFLEN];
219 220 221

    type = virStorageEncryptionSecretTypeTypeToString(secret->type);
    if (!type) {
222
        virStorageReportError(VIR_ERR_INTERNAL_ERROR, "%s",
223 224 225 226
                              _("unexpected volume encryption secret type"));
        return -1;
    }

227
    virUUIDFormat(secret->uuid, uuidstr);
228
    virBufferAsprintf(buf, "%*s<secret type='%s' uuid='%s'/>\n",
229
                      indent, "", type, uuidstr);
230 231 232 233
    return 0;
}

int
234
virStorageEncryptionFormat(virBufferPtr buf,
235
                           virStorageEncryptionPtr enc,
236
                           int indent)
237 238 239 240 241 242
{
    const char *format;
    size_t i;

    format = virStorageEncryptionFormatTypeToString(enc->format);
    if (!format) {
243
        virStorageReportError(VIR_ERR_INTERNAL_ERROR,
244 245 246
                              "%s", _("unexpected encryption format"));
        return -1;
    }
247
    virBufferAsprintf(buf, "%*s<encryption format='%s'>\n",
248
                      indent, "", format);
249 250

    for (i = 0; i < enc->nsecrets; i++) {
251 252
        if (virStorageEncryptionSecretFormat(buf, enc->secrets[i],
                                             indent + 2) < 0)
253 254 255
            return -1;
    }

256
    virBufferAsprintf(buf, "%*s</encryption>\n", indent, "");
257 258 259

    return 0;
}
260 261

int
262
virStorageGenerateQcowPassphrase(unsigned char *dest)
263 264 265 266 267 268 269 270 271
{
    int fd;
    size_t i;

    /* A qcow passphrase is up to 16 bytes, with any data following a NUL
       ignored.  Prohibit control and non-ASCII characters to avoid possible
       unpleasant surprises with the qemu monitor input mechanism. */
    fd = open("/dev/urandom", O_RDONLY);
    if (fd < 0) {
272
        virStorageReportError(VIR_ERR_INTERNAL_ERROR, "%s",
273 274 275 276 277 278 279 280 281 282
                              _("Cannot open /dev/urandom"));
        return -1;
    }
    i = 0;
    while (i < VIR_STORAGE_QCOW_PASSPHRASE_SIZE) {
        ssize_t r;

        while ((r = read(fd, dest + i, 1)) == -1 && errno == EINTR)
            ;
        if (r <= 0) {
283
            virStorageReportError(VIR_ERR_INTERNAL_ERROR, "%s",
284
                                  _("Cannot read from /dev/urandom"));
285
            VIR_FORCE_CLOSE(fd);
286 287 288 289 290
            return -1;
        }
        if (dest[i] >= 0x20 && dest[i] <= 0x7E)
            i++; /* Got an acceptable character */
    }
291
    VIR_FORCE_CLOSE(fd);
292 293
    return 0;
}