Re: [RFC] Design executing commands from within domains

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Aug 08, 2016 at 05:00:38PM +0200, Michal Privoznik wrote:
> Dear list,
> 
> while wiring qemu-ga into libvirt I've noticed that it has ability to
> spawn commands inside guest. I haven't paid much attention to it then as
> implementing libvirt <-> qemu-ga communication was more important. But
> lately couple of requests on the list showed up where ability to spawn
> various commands inside guests would be much appreciated (e.g. when
> fetching some stats that HV can't know or has no support for yet -
> free/df/..).
> 
> When it comes to spawning commands we distinguish two modes: sync and
> async. I think we should stick to this on the public API level too. Yet
> better, we can have async APIs and the sync API would just be a wrapper
> around async then.
> 
> One picture instead of thousand words:
> 
> /* obtain conn and dom somehow */
> const char argv[] = {"argv1", "argv2", "argv3", ...}
> size_t argc = ARRAY_CARDINALITY(argv);
> unsigned int flags = 0;
> 
> virDomainCommandPtr cmd = virDomainCommandNew("/path/to/binary", argv,
> argc, flags);
> /* Should we care about env too? */
> 
> virStreamPtr st = virSreamNew(conn, VIR_STREAM_NONBLOCK);
> 
> virDomainCommandRun(dom, cmd, st, VIR_COMMAND_STRING_IO);
> 
> virStreamEventAddCallback(st, VIR_STREAM_EVENT_READABLE,
> domainCommandCallback, ...);
> 
> /* ... */
> 
> virDomainCommandJoin(dom, cmd);
> 
> virStreamEventRemoveCallback(con->st)
> 
> virDomainCommandFree(cmd);
> 
> 
> 
> While qemu-ga can handle input for a binary its executing, this must be
> put right into JSON when constructing the qemu-ga command. It's not
> common that by that time users know the input they want to enter. So I
> have to figure out something.
> 
> Opinions?

I never really liked the qemu guest agent ability to run arbitrary commands.
It is basically re-inventing the shell but with really awful features. eg the
having to provide all the input  upfront, not having any  way to stream large
stdout/stderr data back to the host.

Further, from a security POV it is really bad practice to have this feature
in QEMU guest agent, as it makes it impossible to provide any kind of sane
security confinment for the GA. IIRC, default Fedora SELinux policy will not
even permit the exec command to be to used. Most of the QEMU GA commands have
very tight scope so are easily confined, but 'exec' by its very nature wants
todo anything. From that POV, a general purpose exec facility is really better
suited to a separate command.

Also from an API modelling POV, exposing the guest agent exec in libvirt
is pretty much giving up on any sense of API design. It'll just discourage
anyone from ever writing any further special case guest agent commands
with formal APIs.

IOW, I don't think we should ever expose the qemu guest agent exec command
via libvirt APIs.

If people want a general purpose exec facility, they can trivially write
a much better exec feature via a separate virtio-serial channel (or via
the new virtio-vsock), and stil access that over libvirt by using the
virDomainOpenChannel to connect to the host side of the channel if needed

Regards,
Daniel
-- 
|: http://berrange.com      -o-    http://www.flickr.com/photos/dberrange/ :|
|: http://libvirt.org              -o-             http://virt-manager.org :|
|: http://autobuild.org       -o-         http://search.cpan.org/~danberr/ :|
|: http://entangle-photo.org       -o-       http://live.gnome.org/gtk-vnc :|

--
libvir-list mailing list
libvir-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/libvir-list



[Index of Archives]     [Virt Tools]     [Libvirt Users]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Fedora Tools]