diff --git a/.gitignore b/.gitignore index c1d0e1b..09cd0c4 100644 --- a/.gitignore +++ b/.gitignore @@ -1,2 +1,2 @@ -SOURCES/guestfs-tools-1.46.1.tar.gz +SOURCES/guestfs-tools-1.48.2.tar.gz SOURCES/libguestfs.keyring diff --git a/.guestfs-tools.metadata b/.guestfs-tools.metadata index 578f68a..00d3fe3 100644 --- a/.guestfs-tools.metadata +++ b/.guestfs-tools.metadata @@ -1,2 +1,2 @@ -a34069426419e2c5cabf951f5282cb57a7ba788d SOURCES/guestfs-tools-1.46.1.tar.gz +a4082a350bc8d303ebe31780964e2d72a81378c3 SOURCES/guestfs-tools-1.48.2.tar.gz 1bbc40f501a7fef9eef2a39b701a71aee2fea7c4 SOURCES/libguestfs.keyring diff --git a/SOURCES/0001-sysprep-remove-lvm2-s-default-system.devices-file.patch b/SOURCES/0001-sysprep-remove-lvm2-s-default-system.devices-file.patch new file mode 100644 index 0000000..8b2500d --- /dev/null +++ b/SOURCES/0001-sysprep-remove-lvm2-s-default-system.devices-file.patch @@ -0,0 +1,100 @@ +From 37c002682a9e5b87d5793f1567c4ddfb8ca72d11 Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Sun, 10 Apr 2022 13:38:34 +0200 +Subject: [PATCH] sysprep: remove lvm2's default "system.devices" file + +(Background: lvm2 commit 83fe6e720f42, "device usage based on devices +file", 2021-02-23; first released in v2_03_12.) + +"lvm pvscan" may be -- and in RHEL9, will soon be -- restricted to those +block devices whose WWIDs are listed in "/etc/lvm/devices/system.devices". +This is a problem when cloning a VM, as cloning may change the WWIDs of +the domain's disk devices, and then physical volumes underlying the guest +filesystems may not be found. Example: +. + +Add the "lvm-system-devices" operation for removing this file, so that +"lvm pvscan" investigate all block devices for PVs. + +(Note that this operation is independent from "lvm-uuids". The libguestfs +appliance creates a pristine LVM_SYSTEM_DIR in "appliance/init" (see +libguestfs commit dd162d2cd56a), thus, when "lvm-uuids" calls "g#pvs" and +"g#vgs", those APIs can never be affected by an +"$LVM_SYSTEM_DIR/devices/system.devices" file.) + +Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2072493 +Signed-off-by: Laszlo Ersek +Message-Id: <20220410113834.6258-1-lersek@redhat.com> +Reviewed-by: Richard W.M. Jones +(cherry picked from commit 4fe8a03cd2d3e4570f4298245bb184ccdc4da0cd) +--- + sysprep/Makefile.am | 1 + + .../sysprep_operation_lvm_system_devices.ml | 44 +++++++++++++++++++ + 2 files changed, 45 insertions(+) + create mode 100644 sysprep/sysprep_operation_lvm_system_devices.ml + +diff --git a/sysprep/Makefile.am b/sysprep/Makefile.am +index 0e3afc8a0..7d5e8aadf 100644 +--- a/sysprep/Makefile.am ++++ b/sysprep/Makefile.am +@@ -46,6 +46,7 @@ operations = \ + ipa_client \ + kerberos_data \ + kerberos_hostkeytab \ ++ lvm_system_devices \ + lvm_uuids \ + logfiles \ + machine_id \ +diff --git a/sysprep/sysprep_operation_lvm_system_devices.ml b/sysprep/sysprep_operation_lvm_system_devices.ml +new file mode 100644 +index 000000000..b41fa5dbc +--- /dev/null ++++ b/sysprep/sysprep_operation_lvm_system_devices.ml +@@ -0,0 +1,44 @@ ++(* virt-sysprep ++ * Copyright (C) 2012-2022 Red Hat Inc. ++ * ++ * This program is free software; you can redistribute it and/or modify ++ * it under the terms of the GNU General Public License as published by ++ * the Free Software Foundation; either version 2 of the License, or ++ * (at your option) any later version. ++ * ++ * This program is distributed in the hope that it will be useful, ++ * but WITHOUT ANY WARRANTY; without even the implied warranty of ++ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ++ * GNU General Public License for more details. ++ * ++ * You should have received a copy of the GNU General Public License along ++ * with this program; if not, write to the Free Software Foundation, Inc., ++ * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. ++ *) ++ ++open Sysprep_operation ++open Common_gettext.Gettext ++ ++module G = Guestfs ++ ++let system_devices_file = "/etc/lvm/devices/system.devices" ++ ++let rec lvm_system_devices_perform g root side_effects = ++ let typ = g#inspect_get_type root in ++ if typ = "linux" then g#rm_f system_devices_file ++ ++let op = { ++ defaults with ++ name = "lvm-system-devices"; ++ enabled_by_default = true; ++ heading = s_"Remove LVM2 system.devices file"; ++ pod_description = ++ Some (s_"On Linux guests, LVM2's scanning for physical volumes (PVs) may \ ++ be restricted to those block devices whose WWIDs are listed in \ ++ C<" ^ system_devices_file ^ ">. When cloning VMs, WWIDs may \ ++ change, breaking C. Remove \ ++ C<" ^ system_devices_file ^ ">."); ++ perform_on_filesystems = Some lvm_system_devices_perform; ++} ++ ++let () = register_operation op +-- +2.31.1 + diff --git a/SOURCES/0001-win-reg-Fix-output-of-virt-win-reg-version.patch b/SOURCES/0001-win-reg-Fix-output-of-virt-win-reg-version.patch deleted file mode 100644 index 9910422..0000000 --- a/SOURCES/0001-win-reg-Fix-output-of-virt-win-reg-version.patch +++ /dev/null @@ -1,191 +0,0 @@ -From 83de85e717ad525423b0eabe153b48ff8af90bd1 Mon Sep 17 00:00:00 2001 -From: "Richard W.M. Jones" -Date: Mon, 17 May 2021 15:18:04 +0100 -Subject: [PATCH] win-reg: Fix output of virt-win-reg --version - -Before we split libguestfs and guestfs-tools the version of programs -was exactly the same as the version of libguestfs. This was -convenient for virt-win-reg where it is difficult to encode the -version into the script, because virt-win-reg could simply use the -version from Sys::Guestfs (ie. libguestfs). However after the split -this no longer applies, so we must do the difficult thing. - -After this change virt-win-reg will print both the version of -guestfs-tools and the version of libguestfs, eg: - - $ virt-win-reg --version - virt-win-reg 1.47.1 - libguestfs 1.45.5fedora=35,release=1.fc35,libvirt - -Reported-by: Yongkui Guo -Fixes: commit 4354a3126152a2748cc9097cba139b3908ccc342 -Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1961160 -(cherry picked from commit 9e9eeeaf4c4b478eca82bf0d4c3e680a624d6d91) ---- - .gitignore | 1 + - configure.ac | 2 ++ - po-docs/podfiles | 2 +- - po/POTFILES-pl | 2 +- - po/guestfs-tools.pot | 18 +++++++++--------- - win-reg/Makefile.am | 6 ------ - win-reg/{virt-win-reg => virt-win-reg.in} | 5 +++-- - 7 files changed, 17 insertions(+), 19 deletions(-) - rename win-reg/{virt-win-reg => virt-win-reg.in} (99%) - -diff --git a/.gitignore b/.gitignore -index 006042a8..6bc509fa 100644 ---- a/.gitignore -+++ b/.gitignore -@@ -163,3 +163,4 @@ Makefile.in - /test-data/phony-guests/windows-software - /test-data/phony-guests/windows-system - /website/*.html -+/win-reg/virt-win-reg -diff --git a/configure.ac b/configure.ac -index 56cfef57..ef412670 100644 ---- a/configure.ac -+++ b/configure.ac -@@ -99,6 +99,8 @@ AC_CONFIG_FILES([podwrapper.pl], - [chmod +x,-w podwrapper.pl]) - AC_CONFIG_FILES([run], - [chmod +x,-w run]) -+AC_CONFIG_FILES([win-reg/virt-win-reg], -+ [chmod +x,-w win-reg/virt-win-reg]) - - AC_CONFIG_FILES([Makefile - align/Makefile -diff --git a/po-docs/podfiles b/po-docs/podfiles -index d7ef1389..6b0c481f 100644 ---- a/po-docs/podfiles -+++ b/po-docs/podfiles -@@ -26,4 +26,4 @@ sparsify/virt-sparsify.pod - sysprep/sysprep-extra-options.pod - sysprep/sysprep-operations.pod - sysprep/virt-sysprep.pod --win-reg/virt-win-reg -+win-reg/virt-win-reg.in -diff --git a/po/POTFILES-pl b/po/POTFILES-pl -index 47d30fc8..c6520cea 100644 ---- a/po/POTFILES-pl -+++ b/po/POTFILES-pl -@@ -1 +1 @@ --win-reg/virt-win-reg -+win-reg/virt-win-reg.in -diff --git a/po/guestfs-tools.pot b/po/guestfs-tools.pot -index a3be1b95..d7e9a3a7 100644 ---- a/po/guestfs-tools.pot -+++ b/po/guestfs-tools.pot -@@ -9,7 +9,7 @@ msgstr "" - "Project-Id-Version: guestfs-tools 1.46.1\n" - "Report-Msgid-Bugs-To: https://bugzilla.redhat.com/enter_bug.cgi?" - "component=libguestfs&product=Virtualization+Tools\n" --"POT-Creation-Date: 2021-05-08 08:57+0100\n" -+"POT-Creation-Date: 2021-05-17 15:25+0100\n" - "PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" - "Last-Translator: FULL NAME \n" - "Language-Team: LANGUAGE \n" -@@ -4213,11 +4213,11 @@ msgstr "" - msgid "%s: subprocess failed\n" - msgstr "" - --#: win-reg/virt-win-reg:260 -+#: win-reg/virt-win-reg.in:261 - msgid "no libvirt domain name or disk image given\n" - msgstr "" - --#: win-reg/virt-win-reg:316 -+#: win-reg/virt-win-reg.in:317 - #, perl-brace-format - msgid "" - "{prog}: No operating system could be detected inside this disk image.\n" -@@ -4230,33 +4230,33 @@ msgid "" - "information about the disk image as possible.\n" - msgstr "" - --#: win-reg/virt-win-reg:320 -+#: win-reg/virt-win-reg.in:321 - #, perl-brace-format - msgid "{prog}: multiboot operating systems are not supported.\n" - msgstr "" - --#: win-reg/virt-win-reg:342 -+#: win-reg/virt-win-reg.in:343 - msgid "" - "expecting 1 or 2 more parameters, subkey path and optionally the value to " - "export\n" - msgstr "" - --#: win-reg/virt-win-reg:502 -+#: win-reg/virt-win-reg.in:503 - #, perl-brace-format - msgid "virt-win-reg: {p}: cannot find user directory\n" - msgstr "" - --#: win-reg/virt-win-reg:507 -+#: win-reg/virt-win-reg.in:508 - #, perl-brace-format - msgid "virt-win-reg: {p}: not a supported Windows Registry path\n" - msgstr "" - --#: win-reg/virt-win-reg:580 -+#: win-reg/virt-win-reg.in:581 - #, perl-brace-format - msgid "virt-win-reg: {p}: could not download registry file: {err}\n" - msgstr "" - --#: win-reg/virt-win-reg:597 -+#: win-reg/virt-win-reg.in:598 - #, perl-brace-format - msgid "virt-win-reg: {p}: could not upload registry file: {err}\n" - msgstr "" -diff --git a/win-reg/Makefile.am b/win-reg/Makefile.am -index 22a22db4..61ec066a 100644 ---- a/win-reg/Makefile.am -+++ b/win-reg/Makefile.am -@@ -17,8 +17,6 @@ - - include $(top_srcdir)/subdir-rules.mk - --EXTRA_DIST = virt-win-reg -- - bin_SCRIPTS = virt-win-reg - - # Manual pages and HTML files for the website. -@@ -36,7 +34,3 @@ stamp-virt-win-reg.pod: virt-win-reg - --warning custom \ - $< - touch $@ -- --all-local: -- for f in virt-win-reg; do echo win-reg/$$f; done \ -- > $(top_srcdir)/po/POTFILES-pl -diff --git a/win-reg/virt-win-reg b/win-reg/virt-win-reg.in -similarity index 99% -rename from win-reg/virt-win-reg -rename to win-reg/virt-win-reg.in -index 1a936c5d..6d9d0a28 100755 ---- a/win-reg/virt-win-reg -+++ b/win-reg/virt-win-reg.in -@@ -1,6 +1,6 @@ - #!/usr/bin/env perl - # virt-win-reg --# Copyright (C) 2010 Red Hat Inc. -+# Copyright (C) 2010-2021 Red Hat Inc. - # - # This program is free software; you can redistribute it and/or modify - # it under the terms of the GNU General Public License as published by -@@ -234,9 +234,10 @@ my %opts = ("help|?" => \$help, - GetOptions (%opts) or pod2usage (2); - pod2usage (1) if $help; - if ($version) { -+ print "virt-win-reg @PACKAGE_VERSION@\n"; - my $g = Sys::Guestfs->new (); - my %h = $g->version (); -- print "virt-win-reg $h{major}.$h{minor}.$h{release}$h{extra}\n"; -+ print "libguestfs $h{major}.$h{minor}.$h{release}$h{extra}\n"; - exit - } - --- -2.31.1 - diff --git a/SOURCES/0002-adopt-inversion-of-SELinux-relabeling-in-virt-custom.patch b/SOURCES/0002-adopt-inversion-of-SELinux-relabeling-in-virt-custom.patch new file mode 100644 index 0000000..5485754 --- /dev/null +++ b/SOURCES/0002-adopt-inversion-of-SELinux-relabeling-in-virt-custom.patch @@ -0,0 +1,347 @@ +From 5792f2e95bcddf476f2fe37e0bc4d97bd881d8fa Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Tue, 10 May 2022 12:50:46 +0200 +Subject: [PATCH] adopt inversion of SELinux relabeling in virt-customize + +Remove "--selinux-relabel" options. + +Do not add any "--no-selinux-relabel" options; rely on the internal check +for SELinux support instead ("is_selinux_guest" in +"common/mlcustomize/SELinux_relabel.ml"). + +"--no-selinux-relabel" becomes a real option for virt-sysprep now. +(Again?) + +Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1554735 +Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2075718 +Signed-off-by: Laszlo Ersek +Message-Id: <20220510105046.15167-1-lersek@redhat.com> +Acked-by: Richard W.M. Jones +[lersek@redhat.com: incorporate common submodule update] +(cherry picked from commit 19de3d1c8d4efb53565dbffe532d41ee9d25a832) +--- + builder/templates/make-template.ml | 8 +------- + builder/virt-builder.pod | 20 ++++---------------- + common | 2 +- + customize/customize_run.ml | 2 +- + customize/test-settings.sh | 3 --- + sysprep/main.ml | 2 -- + sysprep/test-virt-sysprep-docs.sh | 2 +- + 7 files changed, 8 insertions(+), 31 deletions(-) + +diff --git a/builder/templates/make-template.ml b/builder/templates/make-template.ml +index 6786fec19..b40789284 100755 +--- a/builder/templates/make-template.ml ++++ b/builder/templates/make-template.ml +@@ -256,8 +256,7 @@ let rec main () = + printf "Sysprepping ...\n%!"; + let cmd = + sprintf "virt-sysprep --quiet -a %s%s" +- (quote tmpout) +- (if is_selinux_os os then " --selinux-relabel" else "") in ++ (quote tmpout) in + if Sys.command cmd <> 0 then exit 1 + ); + +@@ -480,11 +479,6 @@ and can_sysprep_os = function + | Debian _ | Ubuntu _ -> true + | FreeBSD _ | Windows _ -> false + +-and is_selinux_os = function +- | RHEL _ | Alma _ | CentOS _ | CentOSStream _ | Fedora _ -> true +- | Debian _ | Ubuntu _ +- | FreeBSD _ | Windows _ -> false +- + and needs_uefi os arch = + match os, arch with + | Fedora _, Armv7 +diff --git a/builder/virt-builder.pod b/builder/virt-builder.pod +index f7dd6cdad..aeb505296 100644 +--- a/builder/virt-builder.pod ++++ b/builder/virt-builder.pod +@@ -131,12 +131,6 @@ To update the installed packages to the latest version: + + virt-builder debian-7 --update + +-For guests which use SELinux, like Fedora and Red Hat Enterprise +-Linux, you may need to do SELinux relabelling after installing or +-updating packages (see L below): +- +- virt-builder fedora-27 --update --selinux-relabel +- + =head2 Customizing the installation + + There are many options that let you customize the installation. These +@@ -972,7 +966,7 @@ command line. + + =item * + +-SELinux relabelling is done (I<--selinux-relabel>). ++SELinux relabelling is done unless disabled with I<--no-selinux-relabel>. + + =back + +@@ -1072,8 +1066,7 @@ A typical virt-builder command would be: + --install puppet \ + --append-line '/etc/puppet/puppet.conf:[agent]' \ + --append-line '/etc/puppet/puppet.conf:server = puppetmaster.example.com/' \ +- --run-command 'systemctl enable puppet' \ +- --selinux-relabel ++ --run-command 'systemctl enable puppet' + + The precise instructions vary according to the Linux distro. For + further information see: +@@ -1753,14 +1746,14 @@ two possible strategies it can use to ensure correct labelling: + + =over 4 + +-=item Using I<--selinux-relabel> ++=item Automatic relabeling + + This runs L just before finalizing the guest, which sets + SELinux labels correctly in the disk image. + + This is the recommended method. + +-=item I<--touch> F ++=item Using I<--no-selinux-relabel> I<--touch> F + + Guest templates may already contain a file called F or + you may touch it. +@@ -1771,11 +1764,6 @@ them, which is normal and harmless. + + =back + +-Please note that if your guest uses SELinux, and you are doing operations +-on it which might create new files or change existing ones, you are +-recommended to use I<--selinux-relabel>. This will help in making sure +-that files have the right SELinux labels. +- + =head1 MACHINE READABLE OUTPUT + + The I<--machine-readable> option can be used to make the output more +Submodule common 0a231b3e6..48527b876: +diff --git a/common/mlcustomize/customize-options.pod b/common/mlcustomize/customize-options.pod +index 71b545d..a83c80a 100644 +--- a/common/mlcustomize/customize-options.pod ++++ b/common/mlcustomize/customize-options.pod +@@ -206,6 +206,19 @@ the image was built, use this option. + + See also: L. + ++=item B<--no-selinux-relabel> ++ ++Do not attempt to correct the SELinux labels of files in the guest. ++ ++In such guests that support SELinux, customization automatically ++relabels files so that they have the correct SELinux label. (The ++relabeling is performed immediately, but if the operation fails, ++customization will instead touch F on the image to ++schedule a relabel operation for the next time the image boots.) This ++option disables the automatic relabeling. ++ ++The option is a no-op for guests that do not support SELinux. ++ + =item B<--password> USER:SELECTOR + + Set the password for C. (Note this option does I +@@ -297,16 +310,6 @@ It cannot delete directories, only regular files. + + =back + +-=item B<--selinux-relabel> +- +-Relabel files in the guest so that they have the correct SELinux label. +- +-This will attempt to relabel files immediately, but if the operation fails +-this will instead touch F on the image to schedule a +-relabel operation for the next time the image boots. +- +-You should only use this option for guests which support SELinux. +- + =item B<--sm-attach> SELECTOR + + Attach to a pool using C. +diff --git a/common/mlcustomize/customize-synopsis.pod b/common/mlcustomize/customize-synopsis.pod +index 5f18540..2520853 100644 +--- a/common/mlcustomize/customize-synopsis.pod ++++ b/common/mlcustomize/customize-synopsis.pod +@@ -12,5 +12,5 @@ + [--truncate-recursive PATH] [--timezone TIMEZONE] [--touch FILE] + [--uninstall PKG,PKG..] [--update] [--upload FILE:DEST] + [--write FILE:CONTENT] [--no-logfile] +- [--password-crypto md5|sha256|sha512] [--selinux-relabel] ++ [--password-crypto md5|sha256|sha512] [--no-selinux-relabel] + [--sm-credentials SELECTOR] +diff --git a/common/mlcustomize/customize_cmdline.ml b/common/mlcustomize/customize_cmdline.ml +index 9326baa..5d404e8 100644 +--- a/common/mlcustomize/customize_cmdline.ml ++++ b/common/mlcustomize/customize_cmdline.ml +@@ -109,8 +109,8 @@ and flags = { + (* --no-logfile *) + password_crypto : Password.password_crypto option; + (* --password-crypto md5|sha256|sha512 *) +- selinux_relabel : bool; +- (* --selinux-relabel *) ++ no_selinux_relabel : bool; ++ (* --no-selinux-relabel *) + sm_credentials : Subscription_manager.sm_credentials option; + (* --sm-credentials SELECTOR *) + } +@@ -121,7 +121,7 @@ let rec argspec () = + let ops = ref [] in + let scrub_logfile = ref false in + let password_crypto = ref None in +- let selinux_relabel = ref false in ++ let no_selinux_relabel = ref false in + let sm_credentials = ref None in + + let rec get_ops () = { +@@ -131,7 +131,7 @@ let rec argspec () = + and get_flags () = { + scrub_logfile = !scrub_logfile; + password_crypto = !password_crypto; +- selinux_relabel = !selinux_relabel; ++ no_selinux_relabel = !no_selinux_relabel; + sm_credentials = !sm_credentials; + } + in +@@ -459,11 +459,11 @@ let rec argspec () = + ), + Some "md5|sha256|sha512", "When the virt tools change or set a password in the guest, this\noption sets the password encryption of that password to\nC, C or C.\n\nC and C require glibc E 2.7 (check crypt(3) inside\nthe guest).\n\nC will work with relatively old Linux guests (eg. RHEL 3), but\nis not secure against modern attacks.\n\nThe default is C unless libguestfs detects an old guest that\ndidn't have support for SHA-512, in which case it will use C.\nYou can override libguestfs by specifying this option.\n\nNote this does not change the default password encryption used\nby the guest when you create new user accounts inside the guest.\nIf you want to do that, then you should use the I<--edit> option\nto modify C (Fedora, RHEL) or\nC (Debian, Ubuntu)."; + ( +- [ L"selinux-relabel" ], +- Getopt.Set selinux_relabel, +- s_"Relabel files with correct SELinux labels" ++ [ L"no-selinux-relabel" ], ++ Getopt.Set no_selinux_relabel, ++ s_"Do not relabel files with correct SELinux labels" + ), +- None, "Relabel files in the guest so that they have the correct SELinux label.\n\nThis will attempt to relabel files immediately, but if the operation fails\nthis will instead touch F on the image to schedule a\nrelabel operation for the next time the image boots.\n\nYou should only use this option for guests which support SELinux."; ++ None, "Do not attempt to correct the SELinux labels of files in the guest.\n\nIn such guests that support SELinux, customization automatically\nrelabels files so that they have the correct SELinux label. (The\nrelabeling is performed immediately, but if the operation fails,\ncustomization will instead touch F on the image to\nschedule a relabel operation for the next time the image boots.) This\noption disables the automatic relabeling.\n\nThe option is a no-op for guests that do not support SELinux."; + ( + [ L"sm-credentials" ], + Getopt.String ( +diff --git a/common/mlcustomize/customize_cmdline.mli b/common/mlcustomize/customize_cmdline.mli +index 14eda49..7ee882a 100644 +--- a/common/mlcustomize/customize_cmdline.mli ++++ b/common/mlcustomize/customize_cmdline.mli +@@ -101,8 +101,8 @@ and flags = { + (* --no-logfile *) + password_crypto : Password.password_crypto option; + (* --password-crypto md5|sha256|sha512 *) +- selinux_relabel : bool; +- (* --selinux-relabel *) ++ no_selinux_relabel : bool; ++ (* --no-selinux-relabel *) + sm_credentials : Subscription_manager.sm_credentials option; + (* --sm-credentials SELECTOR *) + } +diff --git a/common/mlcustomize/test-firstboot.sh b/common/mlcustomize/test-firstboot.sh +index b906997..24c67f3 100755 +--- a/common/mlcustomize/test-firstboot.sh ++++ b/common/mlcustomize/test-firstboot.sh +@@ -61,9 +61,6 @@ case "$guestname" in + extra[${#extra[*]}]='/etc/inittab: + s,^#([1-9].*respawn.*/sbin/getty.*),$1,' + ;; +- fedora*|rhel*|centos*) +- extra[${#extra[*]}]='--selinux-relabel' +- ;; + *) + ;; + esac +diff --git a/common/mlcustomize/test-selinuxrelabel.sh b/common/mlcustomize/test-selinuxrelabel.sh +index 86278c6..caf7521 100755 +--- a/common/mlcustomize/test-selinuxrelabel.sh ++++ b/common/mlcustomize/test-selinuxrelabel.sh +@@ -41,13 +41,12 @@ virt-builder "$guestname" --quiet -o "$disk" + # Test #1: relabel with the default configuration works. + rm -f "$disk_overlay" + guestfish -- disk-create "$disk_overlay" qcow2 -1 backingfile:"$disk" +-virt-customize -a "$disk" --selinux-relabel ++virt-customize -a "$disk" + + # Test #2: relabel with no SELINUXTYPE in the configuration. + rm -f "$disk_overlay" + guestfish -- disk-create "$disk_overlay" qcow2 -1 backingfile:"$disk" + virt-customize -a "$disk" \ +- --edit /etc/selinux/config:"s,^SELINUXTYPE=,#&,g" \ +- --selinux-relabel ++ --edit /etc/selinux/config:"s,^SELINUXTYPE=,#&,g" + + rm "$disk" "$disk_overlay" +diff --git a/common/options/uri.c b/common/options/uri.c +index 6b696fc..84d393c 100644 +--- a/common/options/uri.c ++++ b/common/options/uri.c +@@ -135,7 +135,7 @@ parse (const char *arg, char **path_ret, char **protocol_ret, + socket = query_get (uri, "socket"); + + if (uri->server && STRNEQ (uri->server, "") && socket) { +- fprintf (stderr, _("%s: %s: cannot both a server name and a socket query parameter\n"), ++ fprintf (stderr, _("%s: %s: cannot have both a server name and a socket query parameter\n"), + getprogname (), arg); + return -1; + } +@@ -347,6 +347,7 @@ make_server (xmlURIPtr uri, const char *socket, char ***ret) + *ret = malloc (sizeof (char *) * 2); + if (*ret == NULL) { + perror ("malloc"); ++ free (server); + return -1; + } + (*ret)[0] = server; +diff --git a/customize/customize_run.ml b/customize/customize_run.ml +index f2ee20413..99b5fe14d 100644 +--- a/customize/customize_run.ml ++++ b/customize/customize_run.ml +@@ -415,7 +415,7 @@ let run (g : G.guestfs) root (ops : ops) = + warning (f_"passwords could not be set for this type of guest") + ); + +- if ops.flags.selinux_relabel then ( ++ if not ops.flags.no_selinux_relabel then ( + message (f_"SELinux relabelling"); + SELinux_relabel.relabel g + ); +diff --git a/customize/test-settings.sh b/customize/test-settings.sh +index ed4c90f2e..e8b492dd1 100755 +--- a/customize/test-settings.sh ++++ b/customize/test-settings.sh +@@ -61,9 +61,6 @@ case "$guestname" in + extra[${#extra[*]}]='/etc/inittab: + s,^#([1-9].*respawn.*/sbin/getty.*),$1,' + ;; +- fedora*|rhel*|centos*) +- extra[${#extra[*]}]='--selinux-relabel' +- ;; + *) + ;; + esac +diff --git a/sysprep/main.ml b/sysprep/main.ml +index 087d1a17f..b760618ad 100644 +--- a/sysprep/main.ml ++++ b/sysprep/main.ml +@@ -132,8 +132,6 @@ let main () = + [ L"mount-options" ], Getopt.Set_string (s_"opts", mount_opts), s_"Set mount options (eg /:noatime;/var:rw,noatime)"; + [ L"network" ], Getopt.Set network, s_"Enable appliance network"; + [ L"no-network" ], Getopt.Clear network, s_"Disable appliance network (default)"; +- [ L"no-selinux-relabel" ], Getopt.Unit (fun () -> ()), +- s_"Compatibility option, does nothing"; + [ L"operation"; L"operations" ], Getopt.String (s_"operations", set_operations), s_"Enable/disable specific operations"; + ] in + let args = basic_args @ Sysprep_operation.extra_args () in +diff --git a/sysprep/test-virt-sysprep-docs.sh b/sysprep/test-virt-sysprep-docs.sh +index 51500b5e9..9d0298d68 100755 +--- a/sysprep/test-virt-sysprep-docs.sh ++++ b/sysprep/test-virt-sysprep-docs.sh +@@ -25,4 +25,4 @@ $top_srcdir/podcheck.pl "$srcdir/virt-sysprep.pod" virt-sysprep \ + --path $top_srcdir/common/options \ + --insert sysprep-extra-options.pod:__EXTRA_OPTIONS__ \ + --insert sysprep-operations.pod:__OPERATIONS__ \ +- --ignore=--dryrun,--dump-pod,--dump-pod-options,--no-selinux-relabel ++ --ignore=--dryrun,--dump-pod,--dump-pod-options +-- +2.31.1 + diff --git a/SOURCES/0002-m4-guestfs-ocaml.m4-Fix-deprecated-warning-format.patch b/SOURCES/0002-m4-guestfs-ocaml.m4-Fix-deprecated-warning-format.patch deleted file mode 100644 index df01d43..0000000 --- a/SOURCES/0002-m4-guestfs-ocaml.m4-Fix-deprecated-warning-format.patch +++ /dev/null @@ -1,32 +0,0 @@ -From 662e12ba1a2c2f06151b0f06814e6da0025cff2d Mon Sep 17 00:00:00 2001 -From: "Richard W.M. Jones" -Date: Tue, 5 Oct 2021 20:51:19 +0100 -Subject: [PATCH] m4/guestfs-ocaml.m4: Fix deprecated warning format - -In OCaml 4.13: - -Alert ocaml_deprecated_cli: Setting a warning with a sequence of lowercase or uppercase letters, -like 'CDEFLMPSUVYZX', is deprecated. -Use the equivalent signed form: +C+D+E+F+L+M+P+S+U+V+Y+Z+X+52-3. - -(cherry picked from commit fa4f59e1d99c08d7e0bae2a7cb54f254a6506d67) ---- - m4/guestfs-ocaml.m4 | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/m4/guestfs-ocaml.m4 b/m4/guestfs-ocaml.m4 -index f5ac7eff..d2b3804a 100644 ---- a/m4/guestfs-ocaml.m4 -+++ b/m4/guestfs-ocaml.m4 -@@ -166,7 +166,7 @@ EOF - ]) - - dnl Flags we want to pass to every OCaml compiler call. --OCAML_WARN_ERROR="-warn-error CDEFLMPSUVYZX+52-3" -+OCAML_WARN_ERROR="-warn-error +C+D+E+F+L+M+P+S+U+V+Y+Z+X+52-3" - AC_SUBST([OCAML_WARN_ERROR]) - OCAML_FLAGS="-g -annot $safe_string_option" - AC_SUBST([OCAML_FLAGS]) --- -2.31.1 - diff --git a/SOURCES/0003-customize-Suppress-OCaml-warning.patch b/SOURCES/0003-customize-Suppress-OCaml-warning.patch deleted file mode 100644 index 3335206..0000000 --- a/SOURCES/0003-customize-Suppress-OCaml-warning.patch +++ /dev/null @@ -1,33 +0,0 @@ -From 89617fbe8867254b8c5a77c7fd28ab7746338751 Mon Sep 17 00:00:00 2001 -From: "Richard W.M. Jones" -Date: Tue, 5 Oct 2021 20:53:25 +0100 -Subject: [PATCH] customize: Suppress OCaml warning - -In OCaml 4.13: - -File "perl_edit.ml", line 30, characters 2-13: -30 | c_edit_file (verbose ()) g (Guestfs.c_pointer g) file expr - ^^^^^^^^^^^ -Error (warning 6 [labels-omitted]): label verbose was omitted in the application of this function. - -(cherry picked from commit a4930f5fad82e5358d565b8cf3610970e9646259) ---- - m4/guestfs-ocaml.m4 | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/m4/guestfs-ocaml.m4 b/m4/guestfs-ocaml.m4 -index d2b3804a..8a23877c 100644 ---- a/m4/guestfs-ocaml.m4 -+++ b/m4/guestfs-ocaml.m4 -@@ -166,7 +166,7 @@ EOF - ]) - - dnl Flags we want to pass to every OCaml compiler call. --OCAML_WARN_ERROR="-warn-error +C+D+E+F+L+M+P+S+U+V+Y+Z+X+52-3" -+OCAML_WARN_ERROR="-warn-error +C+D+E+F+L+M+P+S+U+V+Y+Z+X+52-3-6" - AC_SUBST([OCAML_WARN_ERROR]) - OCAML_FLAGS="-g -annot $safe_string_option" - AC_SUBST([OCAML_FLAGS]) --- -2.31.1 - diff --git a/SOURCES/0003-update-common-submodule.patch b/SOURCES/0003-update-common-submodule.patch new file mode 100644 index 0000000..0584686 --- /dev/null +++ b/SOURCES/0003-update-common-submodule.patch @@ -0,0 +1,101 @@ +From 10e2f3fc7eef6da4d741f7617e80d028257d9884 Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Wed, 25 May 2022 13:06:01 +0200 +Subject: [PATCH] update common submodule + +Shortlog for 48527b8768d7..f8de5508fe75: + +Laszlo Ersek (1): + mlcustomize: refresh generated files + +Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2089748 +Signed-off-by: Laszlo Ersek +(cherry picked from commit 273de755dfe7eb0f1e81dc62463c125e8bed0cff) +--- + common | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +Submodule common 48527b876..f8de5508f: +diff --git a/common/mlcustomize/customize-options.pod b/common/mlcustomize/customize-options.pod +index a83c80a..8aafacd 100644 +--- a/common/mlcustomize/customize-options.pod ++++ b/common/mlcustomize/customize-options.pod +@@ -310,6 +310,10 @@ It cannot delete directories, only regular files. + + =back + ++=item B<--selinux-relabel> ++ ++This is a compatibility option that does nothing. ++ + =item B<--sm-attach> SELECTOR + + Attach to a pool using C. +diff --git a/common/mlcustomize/customize-synopsis.pod b/common/mlcustomize/customize-synopsis.pod +index 2520853..9e2c4b2 100644 +--- a/common/mlcustomize/customize-synopsis.pod ++++ b/common/mlcustomize/customize-synopsis.pod +@@ -13,4 +13,4 @@ + [--uninstall PKG,PKG..] [--update] [--upload FILE:DEST] + [--write FILE:CONTENT] [--no-logfile] + [--password-crypto md5|sha256|sha512] [--no-selinux-relabel] +- [--sm-credentials SELECTOR] ++ [--selinux-relabel] [--sm-credentials SELECTOR] +diff --git a/common/mlcustomize/customize_cmdline.ml b/common/mlcustomize/customize_cmdline.ml +index 5d404e8..a17bed4 100644 +--- a/common/mlcustomize/customize_cmdline.ml ++++ b/common/mlcustomize/customize_cmdline.ml +@@ -111,6 +111,8 @@ and flags = { + (* --password-crypto md5|sha256|sha512 *) + no_selinux_relabel : bool; + (* --no-selinux-relabel *) ++ selinux_relabel_ignored : bool; ++ (* --selinux-relabel *) + sm_credentials : Subscription_manager.sm_credentials option; + (* --sm-credentials SELECTOR *) + } +@@ -122,6 +124,7 @@ let rec argspec () = + let scrub_logfile = ref false in + let password_crypto = ref None in + let no_selinux_relabel = ref false in ++ let selinux_relabel_ignored = ref false in + let sm_credentials = ref None in + + let rec get_ops () = { +@@ -132,6 +135,7 @@ let rec argspec () = + scrub_logfile = !scrub_logfile; + password_crypto = !password_crypto; + no_selinux_relabel = !no_selinux_relabel; ++ selinux_relabel_ignored = !selinux_relabel_ignored; + sm_credentials = !sm_credentials; + } + in +@@ -464,6 +468,12 @@ let rec argspec () = + s_"Do not relabel files with correct SELinux labels" + ), + None, "Do not attempt to correct the SELinux labels of files in the guest.\n\nIn such guests that support SELinux, customization automatically\nrelabels files so that they have the correct SELinux label. (The\nrelabeling is performed immediately, but if the operation fails,\ncustomization will instead touch F on the image to\nschedule a relabel operation for the next time the image boots.) This\noption disables the automatic relabeling.\n\nThe option is a no-op for guests that do not support SELinux."; ++ ( ++ [ L"selinux-relabel" ], ++ Getopt.Set selinux_relabel_ignored, ++ s_"Compatibility option doing nothing" ++ ), ++ None, "This is a compatibility option that does nothing."; + ( + [ L"sm-credentials" ], + Getopt.String ( +diff --git a/common/mlcustomize/customize_cmdline.mli b/common/mlcustomize/customize_cmdline.mli +index 7ee882a..7d14e78 100644 +--- a/common/mlcustomize/customize_cmdline.mli ++++ b/common/mlcustomize/customize_cmdline.mli +@@ -103,6 +103,8 @@ and flags = { + (* --password-crypto md5|sha256|sha512 *) + no_selinux_relabel : bool; + (* --no-selinux-relabel *) ++ selinux_relabel_ignored : bool; ++ (* --selinux-relabel *) + sm_credentials : Subscription_manager.sm_credentials option; + (* --sm-credentials SELECTOR *) + } +-- +2.31.1 + diff --git a/SOURCES/0004-RHEL-Reject-use-of-libguestfs-winsupport-features-ex.patch b/SOURCES/0004-RHEL-Reject-use-of-libguestfs-winsupport-features-ex.patch new file mode 100644 index 0000000..b9e3716 --- /dev/null +++ b/SOURCES/0004-RHEL-Reject-use-of-libguestfs-winsupport-features-ex.patch @@ -0,0 +1,27 @@ +From bbdc10642eff480246271f98180733f732c306b3 Mon Sep 17 00:00:00 2001 +From: "Richard W.M. Jones" +Date: Tue, 7 Jul 2015 09:28:03 -0400 +Subject: [PATCH] RHEL: Reject use of libguestfs-winsupport features except for + virt-* tools (RHBZ#1240276). + +Fix the tests: it doesn't let us use guestfish for arbitrary Windows +edits. +--- + test-data/phony-guests/make-windows-img.sh | 1 + + 1 file changed, 1 insertion(+) + +diff --git a/test-data/phony-guests/make-windows-img.sh b/test-data/phony-guests/make-windows-img.sh +index 30908a918..73cf5144e 100755 +--- a/test-data/phony-guests/make-windows-img.sh ++++ b/test-data/phony-guests/make-windows-img.sh +@@ -37,6 +37,7 @@ fi + + # Create a disk image. + guestfish < -Date: Wed, 13 Oct 2021 18:30:42 +0200 -Subject: [PATCH] virt-inspector.rng: recognize "kalilinux" and "msdos" distros - -As of libguestfs @ e597fc5317e0, the "string_of_distro" function -[daemon/inspect_types.ml] may output "kalilinux" and "msdos" beyond what -"virt-inspector.rng" currently accepts. Add these distro identifiers to -"virt-inspector.rng" now. - -Signed-off-by: Laszlo Ersek -Message-Id: <20211013163043.21837-2-lersek@redhat.com> -Acked-by: Richard W.M. Jones -(cherry picked from commit aefdf0dcd4954b822e6a098f7258899f1b6a72b7) ---- - inspector/virt-inspector.rng | 2 ++ - 1 file changed, 2 insertions(+) - -diff --git a/inspector/virt-inspector.rng b/inspector/virt-inspector.rng -index 7807e4d7..0a81538e 100644 ---- a/inspector/virt-inspector.rng -+++ b/inspector/virt-inspector.rng -@@ -87,10 +87,12 @@ - freedos - frugalware - gentoo -+ kalilinux - linuxmint - mageia - mandriva - meego -+ msdos - neokylin - netbsd - openbsd --- -2.31.1 - diff --git a/SOURCES/0005-customize-rebase-to-the-common-mlcustomize-Guest_pac.patch b/SOURCES/0005-customize-rebase-to-the-common-mlcustomize-Guest_pac.patch new file mode 100644 index 0000000..f194d3d --- /dev/null +++ b/SOURCES/0005-customize-rebase-to-the-common-mlcustomize-Guest_pac.patch @@ -0,0 +1,378 @@ +From 2014844107fc356e945fb637ef9179bc29656864 Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Mon, 6 Jun 2022 16:20:42 +0200 +Subject: [PATCH] customize: rebase to the common/mlcustomize/Guest_packages + interface + +Replace the "guest_install_command", "guest_update_command" and +"guest_uninstall_command" helper functions with the corresponding +functions from libguestfs-common, interface mlcustomize/Guest_packages. + +Add a wrapper function for (a) dealing with the exceptions uniformly +(keeping the original behavior of virt-customize), (b) centralizing the +[g#inspect_get_package_management root] call. Regarding (b), the wrapper +function fills in the last argument [package_management] of the +Guest_packages functions; thus, pass partially applied functions to the +wrapper at the original call sites. + +Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2028764 +Signed-off-by: Laszlo Ersek +Message-Id: <20220606142042.16680-1-lersek@redhat.com> +Reviewed-by: Richard W.M. Jones +(cherry picked from commit 7eb1ecf467e86374d72b23994d435139e302bca5) +--- + common | 2 +- + customize/customize_run.ml | 106 ++++--------------------------------- + 2 files changed, 10 insertions(+), 98 deletions(-) + +Submodule common f8de5508f..9e990f3e4: +diff --git a/common/mlcustomize/Makefile.am b/common/mlcustomize/Makefile.am +index cd7d897..4e26064 100644 +--- a/common/mlcustomize/Makefile.am ++++ b/common/mlcustomize/Makefile.am +@@ -38,10 +38,12 @@ generator_built = \ + + SOURCES_MLI = \ + firstboot.mli \ ++ guest_packages.mli \ + SELinux_relabel.mli + + SOURCES_ML = \ + firstboot.ml \ ++ guest_packages.ml \ + SELinux_relabel.ml + + if HAVE_OCAML +diff --git a/common/mlcustomize/guest_packages.ml b/common/mlcustomize/guest_packages.ml +new file mode 100644 +index 0000000..4c3c34e +--- /dev/null ++++ b/common/mlcustomize/guest_packages.ml +@@ -0,0 +1,132 @@ ++(* virt-customize ++ * Copyright (C) 2012-2021 Red Hat Inc. ++ * ++ * This program is free software; you can redistribute it and/or modify ++ * it under the terms of the GNU General Public License as published by ++ * the Free Software Foundation; either version 2 of the License, or ++ * (at your option) any later version. ++ * ++ * This program is distributed in the hope that it will be useful, ++ * but WITHOUT ANY WARRANTY; without even the implied warranty of ++ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ++ * GNU General Public License for more details. ++ * ++ * You should have received a copy of the GNU General Public License along ++ * with this program; if not, write to the Free Software Foundation, Inc., ++ * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. ++ *) ++ ++open Printf ++ ++open Common_gettext.Gettext ++open Std_utils ++ ++exception Unknown_package_manager of string ++exception Unimplemented_package_manager of string ++ ++(* Windows has package_management == "unknown". *) ++let error_unknown_package_manager flag = ++ let msg = sprintf (f_"cannot use ‘%s’ because no package manager has been \ ++ detected for this guest OS.\n\nIf this guest OS is a \ ++ common one with ordinary package management then this \ ++ may have been caused by a failure of libguestfs \ ++ inspection.\n\nFor OSes such as Windows that lack \ ++ package management, this is not possible. Try using \ ++ one of the ‘--firstboot*’ flags instead (described in \ ++ the virt-customize(1) manual).") flag in ++ raise (Unknown_package_manager msg) ++ ++let error_unimplemented_package_manager flag pm = ++ let msg = sprintf (f_"sorry, ‘%s’ with the ‘%s’ package manager has not \ ++ been implemented yet.\n\nYou can work around this by \ ++ using one of the ‘--run*’ or ‘--firstboot*’ options \ ++ instead (described in the virt-customize(1) manual).") ++ flag pm in ++ raise (Unimplemented_package_manager msg) ++ ++(* http://distrowatch.com/dwres.php?resource=package-management *) ++let install_command packages package_management = ++ let quoted_args = String.concat " " (List.map quote packages) in ++ match package_management with ++ | "apk" -> ++ sprintf " ++ apk update ++ apk add %s ++ " quoted_args ++ | "apt" -> ++ (* http://unix.stackexchange.com/questions/22820 *) ++ sprintf " ++ export DEBIAN_FRONTEND=noninteractive ++ apt_opts='-q -y -o Dpkg::Options::=--force-confnew' ++ apt-get $apt_opts update ++ apt-get $apt_opts install %s ++ " quoted_args ++ | "dnf" -> ++ sprintf "dnf%s -y install %s" ++ (if verbose () then " --verbose" else "") ++ quoted_args ++ | "pisi" -> sprintf "pisi it %s" quoted_args ++ | "pacman" -> sprintf "pacman -S --noconfirm %s" quoted_args ++ | "urpmi" -> sprintf "urpmi %s" quoted_args ++ | "xbps" -> sprintf "xbps-install -Sy %s" quoted_args ++ | "yum" -> sprintf "yum -y install %s" quoted_args ++ | "zypper" -> sprintf "zypper -n in -l %s" quoted_args ++ ++ | "unknown" -> ++ error_unknown_package_manager (s_"--install") ++ | pm -> ++ error_unimplemented_package_manager (s_"--install") pm ++ ++let update_command package_management = ++ match package_management with ++ | "apk" -> ++ " ++ apk update ++ apk upgrade ++ " ++ | "apt" -> ++ (* http://unix.stackexchange.com/questions/22820 *) ++ " ++ export DEBIAN_FRONTEND=noninteractive ++ apt_opts='-q -y -o Dpkg::Options::=--force-confnew' ++ apt-get $apt_opts update ++ apt-get $apt_opts upgrade ++ " ++ | "dnf" -> ++ sprintf "dnf%s -y --best upgrade" ++ (if verbose () then " --verbose" else "") ++ | "pisi" -> "pisi upgrade" ++ | "pacman" -> "pacman -Su" ++ | "urpmi" -> "urpmi --auto-select" ++ | "xbps" -> "xbps-install -Suy" ++ | "yum" -> "yum -y update" ++ | "zypper" -> "zypper -n update -l" ++ ++ | "unknown" -> ++ error_unknown_package_manager (s_"--update") ++ | pm -> ++ error_unimplemented_package_manager (s_"--update") pm ++ ++let uninstall_command packages package_management = ++ let quoted_args = String.concat " " (List.map quote packages) in ++ match package_management with ++ | "apk" -> sprintf "apk del %s" quoted_args ++ | "apt" -> ++ (* http://unix.stackexchange.com/questions/22820 *) ++ sprintf " ++ export DEBIAN_FRONTEND=noninteractive ++ apt_opts='-q -y -o Dpkg::Options::=--force-confnew' ++ apt-get $apt_opts remove %s ++ " quoted_args ++ | "dnf" -> sprintf "dnf -y remove %s" quoted_args ++ | "pisi" -> sprintf "pisi rm %s" quoted_args ++ | "pacman" -> sprintf "pacman -R %s" quoted_args ++ | "urpmi" -> sprintf "urpme %s" quoted_args ++ | "xbps" -> sprintf "xbps-remove -Sy %s" quoted_args ++ | "yum" -> sprintf "yum -y remove %s" quoted_args ++ | "zypper" -> sprintf "zypper -n rm %s" quoted_args ++ ++ | "unknown" -> ++ error_unknown_package_manager (s_"--uninstall") ++ | pm -> ++ error_unimplemented_package_manager (s_"--uninstall") pm +diff --git a/common/mlcustomize/guest_packages.mli b/common/mlcustomize/guest_packages.mli +new file mode 100644 +index 0000000..7504a6a +--- /dev/null ++++ b/common/mlcustomize/guest_packages.mli +@@ -0,0 +1,44 @@ ++(* virt-customize ++ * Copyright (C) 2012-2021 Red Hat Inc. ++ * ++ * This program is free software; you can redistribute it and/or modify ++ * it under the terms of the GNU General Public License as published by ++ * the Free Software Foundation; either version 2 of the License, or ++ * (at your option) any later version. ++ * ++ * This program is distributed in the hope that it will be useful, ++ * but WITHOUT ANY WARRANTY; without even the implied warranty of ++ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the ++ * GNU General Public License for more details. ++ * ++ * You should have received a copy of the GNU General Public License along ++ * with this program; if not, write to the Free Software Foundation, Inc., ++ * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. ++ *) ++ ++exception Unknown_package_manager of string ++exception Unimplemented_package_manager of string ++(** For all three functions below, [package_management] determines the package ++ management system in use by the guest; commonly it should be filled in from ++ [Guestfs.inspect_get_package_management], or the equivalent guestfs object ++ method. ++ ++ If [package_management] is unknown or unimplemented, the functions raise ++ [Unknown_package_manager "error message"] or [Unimplemented_package_manager ++ "error message"], correspondingly. *) ++ ++val install_command : string list -> string -> string ++(** [install_command packages package_management] produces a properly quoted ++ shell command string suitable for execution in the guest (directly or via a ++ Firstboot script) for installing the OS packages listed in [packages]. *) ++ ++val update_command : string -> string ++(** [update_command package_management] produces a properly quoted shell command ++ string suitable for execution in the guest (directly or via a Firstboot ++ script) for updating the OS packages that are currently installed in the ++ guest. *) ++ ++val uninstall_command : string list -> string -> string ++(** [uninstall_command packages package_management] produces a properly quoted ++ shell command string suitable for execution in the guest (directly or via a ++ Firstboot script) for uninstalling the OS packages listed in [packages]. *) +diff --git a/customize/customize_run.ml b/customize/customize_run.ml +index 99b5fe14d..bb2ba2a03 100644 +--- a/customize/customize_run.ml ++++ b/customize/customize_run.ml +@@ -67,99 +67,11 @@ let run (g : G.guestfs) root (ops : ops) = + error (f_"%s: command exited with an error") display + in + +- (* http://distrowatch.com/dwres.php?resource=package-management *) +- let rec guest_install_command packages = +- let quoted_args = String.concat " " (List.map quote packages) in +- match g#inspect_get_package_management root with +- | "apk" -> +- sprintf " +- apk update +- apk add %s +- " quoted_args +- | "apt" -> +- (* http://unix.stackexchange.com/questions/22820 *) +- sprintf " +- export DEBIAN_FRONTEND=noninteractive +- apt_opts='-q -y -o Dpkg::Options::=--force-confnew' +- apt-get $apt_opts update +- apt-get $apt_opts install %s +- " quoted_args +- | "dnf" -> +- sprintf "dnf%s -y install %s" +- (if verbose () then " --verbose" else "") +- quoted_args +- | "pisi" -> sprintf "pisi it %s" quoted_args +- | "pacman" -> sprintf "pacman -S --noconfirm %s" quoted_args +- | "urpmi" -> sprintf "urpmi %s" quoted_args +- | "xbps" -> sprintf "xbps-install -Sy %s" quoted_args +- | "yum" -> sprintf "yum -y install %s" quoted_args +- | "zypper" -> sprintf "zypper -n in -l %s" quoted_args +- +- | "unknown" -> +- error_unknown_package_manager (s_"--install") +- | pm -> +- error_unimplemented_package_manager (s_"--install") pm +- +- and guest_update_command () = +- match g#inspect_get_package_management root with +- | "apk" -> +- " +- apk update +- apk upgrade +- " +- | "apt" -> +- (* http://unix.stackexchange.com/questions/22820 *) +- " +- export DEBIAN_FRONTEND=noninteractive +- apt_opts='-q -y -o Dpkg::Options::=--force-confnew' +- apt-get $apt_opts update +- apt-get $apt_opts upgrade +- " +- | "dnf" -> +- sprintf "dnf%s -y --best upgrade" +- (if verbose () then " --verbose" else "") +- | "pisi" -> "pisi upgrade" +- | "pacman" -> "pacman -Su" +- | "urpmi" -> "urpmi --auto-select" +- | "xbps" -> "xbps-install -Suy" +- | "yum" -> "yum -y update" +- | "zypper" -> "zypper -n update -l" +- +- | "unknown" -> +- error_unknown_package_manager (s_"--update") +- | pm -> +- error_unimplemented_package_manager (s_"--update") pm +- +- and guest_uninstall_command packages = +- let quoted_args = String.concat " " (List.map quote packages) in +- match g#inspect_get_package_management root with +- | "apk" -> sprintf "apk del %s" quoted_args +- | "apt" -> +- (* http://unix.stackexchange.com/questions/22820 *) +- sprintf " +- export DEBIAN_FRONTEND=noninteractive +- apt_opts='-q -y -o Dpkg::Options::=--force-confnew' +- apt-get $apt_opts remove %s +- " quoted_args +- | "dnf" -> sprintf "dnf -y remove %s" quoted_args +- | "pisi" -> sprintf "pisi rm %s" quoted_args +- | "pacman" -> sprintf "pacman -R %s" quoted_args +- | "urpmi" -> sprintf "urpme %s" quoted_args +- | "xbps" -> sprintf "xbps-remove -Sy %s" quoted_args +- | "yum" -> sprintf "yum -y remove %s" quoted_args +- | "zypper" -> sprintf "zypper -n rm %s" quoted_args +- +- | "unknown" -> +- error_unknown_package_manager (s_"--uninstall") +- | pm -> +- error_unimplemented_package_manager (s_"--uninstall") pm +- +- (* Windows has package_management == "unknown". *) +- and error_unknown_package_manager flag = +- error (f_"cannot use ‘%s’ because no package manager has been detected for this guest OS.\n\nIf this guest OS is a common one with ordinary package management then this may have been caused by a failure of libguestfs inspection.\n\nFor OSes such as Windows that lack package management, this is not possible. Try using one of the ‘--firstboot*’ flags instead (described in the manual).") flag +- +- and error_unimplemented_package_manager flag pm = +- error (f_"sorry, ‘%s’ with the ‘%s’ package manager has not been implemented yet.\n\nYou can work around this by using one of the ‘--run*’ or ‘--firstboot*’ options instead (described in the manual).") flag pm ++ let guest_pkgs_command f = ++ try f (g#inspect_get_package_management root) with ++ | Guest_packages.Unknown_package_manager msg ++ | Guest_packages.Unimplemented_package_manager msg -> ++ error "%s" msg + in + + (* Set the random seed. *) +@@ -255,7 +167,7 @@ let run (g : G.guestfs) root (ops : ops) = + | `FirstbootPackages pkgs -> + message (f_"Installing firstboot packages: %s") + (String.concat " " pkgs); +- let cmd = guest_install_command pkgs in ++ let cmd = guest_pkgs_command (Guest_packages.install_command pkgs) in + let name = String.concat " " ("install" :: pkgs) in + Firstboot.add_firstboot_script g root name cmd + +@@ -271,7 +183,7 @@ let run (g : G.guestfs) root (ops : ops) = + + | `InstallPackages pkgs -> + message (f_"Installing packages: %s") (String.concat " " pkgs); +- let cmd = guest_install_command pkgs in ++ let cmd = guest_pkgs_command (Guest_packages.install_command pkgs) in + do_run ~display:cmd ~warn_failed_no_network:true cmd + + | `Link (target, links) -> +@@ -365,12 +277,12 @@ let run (g : G.guestfs) root (ops : ops) = + + | `UninstallPackages pkgs -> + message (f_"Uninstalling packages: %s") (String.concat " " pkgs); +- let cmd = guest_uninstall_command pkgs in ++ let cmd = guest_pkgs_command (Guest_packages.uninstall_command pkgs) in + do_run ~display:cmd cmd + + | `Update -> + message (f_"Updating packages"); +- let cmd = guest_update_command () in ++ let cmd = guest_pkgs_command Guest_packages.update_command in + do_run ~display:cmd ~warn_failed_no_network:true cmd + + | `Upload (path, dest) -> +-- +2.31.1 + diff --git a/SOURCES/0005-virt-inspector.rng-Add-support-for-Kylin-RHBZ-199539.patch b/SOURCES/0005-virt-inspector.rng-Add-support-for-Kylin-RHBZ-199539.patch deleted file mode 100644 index 017e9d9..0000000 --- a/SOURCES/0005-virt-inspector.rng-Add-support-for-Kylin-RHBZ-199539.patch +++ /dev/null @@ -1,29 +0,0 @@ -From 8dad474829a8f6874c01a6d85749d8fd66d192ae Mon Sep 17 00:00:00 2001 -From: Laszlo Ersek -Date: Wed, 13 Oct 2021 18:30:43 +0200 -Subject: [PATCH] virt-inspector.rng: Add support for Kylin (RHBZ#1995391). - -Similar-to: b8bc491ff59cc1cc24a1935be99cee0c5edfb5be -Signed-off-by: Laszlo Ersek -Message-Id: <20211013163043.21837-3-lersek@redhat.com> -Acked-by: Richard W.M. Jones -(cherry picked from commit f041a5e24d8c5850daf7ad8f8e1a284e0445266b) ---- - inspector/virt-inspector.rng | 1 + - 1 file changed, 1 insertion(+) - -diff --git a/inspector/virt-inspector.rng b/inspector/virt-inspector.rng -index 0a81538e..5b460b36 100644 ---- a/inspector/virt-inspector.rng -+++ b/inspector/virt-inspector.rng -@@ -88,6 +88,7 @@ - frugalware - gentoo - kalilinux -+ kylin - linuxmint - mageia - mandriva --- -2.31.1 - diff --git a/SOURCES/0006-sysprep-remove-system-local-NetworkManager-connectio.patch b/SOURCES/0006-sysprep-remove-system-local-NetworkManager-connectio.patch deleted file mode 100644 index 187f906..0000000 --- a/SOURCES/0006-sysprep-remove-system-local-NetworkManager-connectio.patch +++ /dev/null @@ -1,96 +0,0 @@ -From 6f8c270b3fb7b5b3109d2553fef38f128b6137ac Mon Sep 17 00:00:00 2001 -From: Laszlo Ersek -Date: Thu, 2 Dec 2021 14:10:06 +0100 -Subject: [PATCH] sysprep: remove system-local NetworkManager connection - profiles (keyfiles) - -Add a simple (default) operation to remove - - /etc/NetworkManager/system-connections/*.nmconnection - -which arguably carry stale information after the initial creation of the -system disk image. - -Note: no side effect callback is invoked. Before commit 576f1541a20c -("sysprep: Use customize module for customizing the guest after -sysprepping.", 2014-03-25), the "delete" operation had been native to -virt-sysprep ("sysprep/sysprep_operation_delete.ml"), and it didn't invoke -side effects. In said commit, "delete" was delegated to virt-customize, -and that was when "side_effects#created_file" was introduced (most likely) -as a catch-all. (We still have the "XXX Did we?" comment today.) - -Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1980922 -Signed-off-by: Laszlo Ersek -Message-Id: <20211202131006.12774-1-lersek@redhat.com> -Acked-by: Richard W.M. Jones -(cherry picked from commit 903819ecf480bcefec108bdbd7e9bdec1b3b5a49) ---- - sysprep/Makefile.am | 1 + - sysprep/sysprep_operation_net_nmconn.ml | 43 +++++++++++++++++++++++++ - 2 files changed, 44 insertions(+) - create mode 100644 sysprep/sysprep_operation_net_nmconn.ml - -diff --git a/sysprep/Makefile.am b/sysprep/Makefile.am -index d32ab20e..561a71ae 100644 ---- a/sysprep/Makefile.am -+++ b/sysprep/Makefile.am -@@ -52,6 +52,7 @@ operations = \ - mail_spool \ - net_hostname \ - net_hwaddr \ -+ net_nmconn \ - pacct_log \ - package_manager_cache \ - pam_data \ -diff --git a/sysprep/sysprep_operation_net_nmconn.ml b/sysprep/sysprep_operation_net_nmconn.ml -new file mode 100644 -index 00000000..2d8667f1 ---- /dev/null -+++ b/sysprep/sysprep_operation_net_nmconn.ml -@@ -0,0 +1,43 @@ -+(* virt-sysprep -+ * Copyright (C) 2012-2021 Red Hat Inc. -+ * -+ * This program is free software; you can redistribute it and/or modify -+ * it under the terms of the GNU General Public License as published by -+ * the Free Software Foundation; either version 2 of the License, or -+ * (at your option) any later version. -+ * -+ * This program is distributed in the hope that it will be useful, -+ * but WITHOUT ANY WARRANTY; without even the implied warranty of -+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -+ * GNU General Public License for more details. -+ * -+ * You should have received a copy of the GNU General Public License along -+ * with this program; if not, write to the Free Software Foundation, Inc., -+ * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. -+ *) -+ -+open Common_gettext.Gettext -+open Sysprep_operation -+ -+let glob = "/etc/NetworkManager/system-connections/*.nmconnection" -+ -+let net_nmconn_perform (g : Guestfs.guestfs) root side_effects = -+ let typ = g#inspect_get_type root in -+ let distro = g#inspect_get_distro root in -+ match typ, distro with -+ | "linux", ("fedora"|"rhel"|"centos"|"scientificlinux"|"oraclelinux"| -+ "redhat-based") -> Array.iter g#rm_f (g#glob_expand glob) -+ | _ -> () -+ -+let op = { -+ defaults with -+ name = "net-nmconn"; -+ enabled_by_default = true; -+ heading = s_"Remove system-local NetworkManager connection profiles \ -+ (keyfiles)"; -+ pod_description = Some (s_"On Fedora and Red Hat Enterprise Linux, remove \ -+ the C<" ^ glob ^ "> files."); -+ perform_on_filesystems = Some net_nmconn_perform; -+} -+ -+let () = register_operation op --- -2.31.1 - diff --git a/SOURCES/0006-update-common-submodule-for-CVE-2022-2211-fix.patch b/SOURCES/0006-update-common-submodule-for-CVE-2022-2211-fix.patch new file mode 100644 index 0000000..6418600 --- /dev/null +++ b/SOURCES/0006-update-common-submodule-for-CVE-2022-2211-fix.patch @@ -0,0 +1,53 @@ +From 493060f2ee3d5c1c8d6192bbfd307e0b720f6c11 Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Wed, 29 Jun 2022 15:38:46 +0200 +Subject: [PATCH] update common submodule for CVE-2022-2211 fix + +$ git shortlog 9e990f3e4530..35467027f657 + +Laszlo Ersek (1): + options: fix buffer overflow in get_keys() [CVE-2022-2211] + +Signed-off-by: Laszlo Ersek +(cherry picked from commit b2e7de29b413d531c9540eb46878170e357f4b62) +--- + common | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +Submodule common 9e990f3e4..35467027f: +diff --git a/common/options/keys.c b/common/options/keys.c +index 798315c..d27a712 100644 +--- a/common/options/keys.c ++++ b/common/options/keys.c +@@ -128,17 +128,23 @@ read_first_line_from_file (const char *filename) + char ** + get_keys (struct key_store *ks, const char *device, const char *uuid) + { +- size_t i, j, len; ++ size_t i, j, nmemb; + char **r; + char *s; + + /* We know the returned list must have at least one element and not + * more than ks->nr_keys. + */ +- len = 1; +- if (ks) +- len = MIN (1, ks->nr_keys); +- r = calloc (len+1, sizeof (char *)); ++ nmemb = 1; ++ if (ks && ks->nr_keys > nmemb) ++ nmemb = ks->nr_keys; ++ ++ /* make room for the terminating NULL */ ++ if (nmemb == (size_t)-1) ++ error (EXIT_FAILURE, 0, _("size_t overflow")); ++ nmemb++; ++ ++ r = calloc (nmemb, sizeof (char *)); + if (r == NULL) + error (EXIT_FAILURE, errno, "calloc"); + +-- +2.31.1 + diff --git a/SOURCES/0007-cat-log-ls-tail-diff-edit-insp.-set-networking-for-k.patch b/SOURCES/0007-cat-log-ls-tail-diff-edit-insp.-set-networking-for-k.patch new file mode 100644 index 0000000..f491e91 --- /dev/null +++ b/SOURCES/0007-cat-log-ls-tail-diff-edit-insp.-set-networking-for-k.patch @@ -0,0 +1,695 @@ +From d95394da96af41b03c9347721a177a4ad9b7f1b0 Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Fri, 1 Jul 2022 15:20:39 +0200 +Subject: [PATCH] cat, log, ls, tail, diff, edit, insp.: set networking for + "--key ID:clevis" + +Call the C-language helper key_store_requires_network() in those C +utilities that understand "OPTION_key". + +(Short log for libguestfs-common commit range 35467027f657..af6cb55bc58a: + +Laszlo Ersek (12): + options: fix UUID comparison logic bug in get_keys() + mltools/tools_utils: remove unused function "key_store_to_cli" + mltools/tools_utils: allow multiple "--key" options for OCaml tools too + options: replace NULL-termination with number-of-elements in get_keys() + options: wrap each passphrase from get_keys() into a struct + options: add back-end for LUKS decryption with Clevis+Tang + options: introduce selector type "key_clevis" + options: generalize "--key" selector parsing for C-language utilities + mltools/tools_utils-c: handle internal type error with abort() + mltools/tools_utils: generalize "--key" selector parsing for OCaml utils + options, mltools/tools_utils: parse "--key ID:clevis" options + options, mltools/tools_utils: add helper for network dependency +). + +Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1809453 +Signed-off-by: Laszlo Ersek +Message-Id: <20220628115702.5584-2-lersek@redhat.com> +Reviewed-by: Richard W.M. Jones +(cherry picked from commit 14bf833e21cd89f1273e09f4952999b8da86b6ff) +--- + cat/cat.c | 3 +++ + cat/log.c | 3 +++ + cat/ls.c | 3 +++ + cat/tail.c | 3 +++ + common | 2 +- + diff/diff.c | 8 ++++++++ + edit/edit.c | 3 +++ + inspector/inspector.c | 3 +++ + 8 files changed, 27 insertions(+), 1 deletion(-) + +diff --git a/cat/cat.c b/cat/cat.c +index 5b51b7df8..ea2021140 100644 +--- a/cat/cat.c ++++ b/cat/cat.c +@@ -250,6 +250,9 @@ main (int argc, char *argv[]) + /* Add drives, inspect and mount. */ + add_drives (drvs); + ++ if (key_store_requires_network (ks) && guestfs_set_network (g, 1) == -1) ++ exit (EXIT_FAILURE); ++ + if (guestfs_launch (g) == -1) + exit (EXIT_FAILURE); + +diff --git a/cat/log.c b/cat/log.c +index df7e2be92..0fe486c05 100644 +--- a/cat/log.c ++++ b/cat/log.c +@@ -224,6 +224,9 @@ main (int argc, char *argv[]) + */ + add_drives (drvs); + ++ if (key_store_requires_network (ks) && guestfs_set_network (g, 1) == -1) ++ exit (EXIT_FAILURE); ++ + if (guestfs_launch (g) == -1) + exit (EXIT_FAILURE); + +diff --git a/cat/ls.c b/cat/ls.c +index e062823b8..1b8e87225 100644 +--- a/cat/ls.c ++++ b/cat/ls.c +@@ -374,6 +374,9 @@ main (int argc, char *argv[]) + /* Add drives, inspect and mount. */ + add_drives (drvs); + ++ if (key_store_requires_network (ks) && guestfs_set_network (g, 1) == -1) ++ exit (EXIT_FAILURE); ++ + if (guestfs_launch (g) == -1) + exit (EXIT_FAILURE); + +diff --git a/cat/tail.c b/cat/tail.c +index 1cf1d6e0e..2a06e0ebd 100644 +--- a/cat/tail.c ++++ b/cat/tail.c +@@ -296,6 +296,9 @@ do_tail (int argc, char *argv[], /* list of files in the guest */ + /* Add drives, inspect and mount. */ + add_drives (drvs); + ++ if (key_store_requires_network (ks) && guestfs_set_network (g, 1) == -1) ++ exit (EXIT_FAILURE); ++ + if (guestfs_launch (g) == -1) + return -1; + +Submodule common 35467027f..af6cb55bc: +diff --git a/common/mltools/tools_utils-c.c b/common/mltools/tools_utils-c.c +index 0814667..4ff42e5 100644 +--- a/common/mltools/tools_utils-c.c ++++ b/common/mltools/tools_utils-c.c +@@ -62,24 +62,31 @@ guestfs_int_mllib_inspect_decrypt (value gv, value gpv, value keysv) + caml_raise_out_of_memory (); + + v = Field (elemv, 1); +- switch (Tag_val (v)) { +- case 0: /* KeyString of string */ +- key.type = key_string; +- key.string.s = strdup (String_val (Field (v, 0))); +- if (!key.string.s) +- caml_raise_out_of_memory (); +- break; +- case 1: /* KeyFileName of string */ +- key.type = key_file; +- key.file.name = strdup (String_val (Field (v, 0))); +- if (!key.file.name) +- caml_raise_out_of_memory (); +- break; +- default: +- error (EXIT_FAILURE, 0, +- "internal error: unhandled Tag_val (v) = %d", +- Tag_val (v)); +- } ++ if (Is_block (v)) ++ switch (Tag_val (v)) { ++ case 0: /* KeyString of string */ ++ key.type = key_string; ++ key.string.s = strdup (String_val (Field (v, 0))); ++ if (!key.string.s) ++ caml_raise_out_of_memory (); ++ break; ++ case 1: /* KeyFileName of string */ ++ key.type = key_file; ++ key.file.name = strdup (String_val (Field (v, 0))); ++ if (!key.file.name) ++ caml_raise_out_of_memory (); ++ break; ++ default: ++ abort (); ++ } ++ else ++ switch (Int_val (v)) { ++ case 0: /* KeyClevis */ ++ key.type = key_clevis; ++ break; ++ default: ++ abort (); ++ } + + ks = key_store_import_key (ks, &key); + +diff --git a/common/mltools/tools_utils.ml b/common/mltools/tools_utils.ml +index 695fda7..562bfad 100644 +--- a/common/mltools/tools_utils.ml ++++ b/common/mltools/tools_utils.ml +@@ -29,11 +29,12 @@ open Getopt.OptionName + let prog = ref prog + + type key_store = { +- keys : (string, key_store_key) Hashtbl.t; ++ keys : (string * key_store_key) list ref; + } + and key_store_key = + | KeyString of string + | KeyFileName of string ++ | KeyClevis + + external c_inspect_decrypt : Guestfs.t -> int64 -> (string * key_store_key) list -> unit = "guestfs_int_mllib_inspect_decrypt" + external c_set_echo_keys : unit -> unit = "guestfs_int_mllib_set_echo_keys" [@@noalloc] +@@ -376,7 +377,7 @@ let create_standard_options argspec ?anon_fun ?(key_opts = false) + ) + in + let ks = { +- keys = Hashtbl.create 13; ++ keys = ref []; + } in + let argspec = ref argspec in + let add_argspec = List.push_back argspec in +@@ -392,14 +393,28 @@ let create_standard_options argspec ?anon_fun ?(key_opts = false) + + if key_opts then ( + let parse_key_selector arg = +- let parts = String.nsplit ~max:3 ":" arg in ++ let parts = String.nsplit ":" arg in + match parts with ++ | [] -> ++ error (f_"selector '%s': missing ID") arg ++ | [ _ ] -> ++ error (f_"selector '%s': missing TYPE") arg ++ | [ _; "key" ] ++ | _ :: "key" :: _ :: _ :: _ -> ++ error (f_"selector '%s': missing KEY_STRING, or too many fields") arg + | [ device; "key"; key ] -> +- Hashtbl.replace ks.keys device (KeyString key) ++ List.push_back ks.keys (device, KeyString key) ++ | [ _; "file" ] ++ | _ :: "file" :: _ :: _ :: _ -> ++ error (f_"selector '%s': missing FILENAME, or too many fields") arg + | [ device; "file"; file ] -> +- Hashtbl.replace ks.keys device (KeyFileName file) ++ List.push_back ks.keys (device, KeyFileName file) ++ | _ :: "clevis" :: _ :: _ -> ++ error (f_"selector '%s': too many fields") arg ++ | [ device; "clevis" ] -> ++ List.push_back ks.keys (device, KeyClevis) + | _ -> +- error (f_"invalid selector string for --key: %s") arg ++ error (f_"selector '%s': invalid TYPE") arg + in + + add_argspec ([ L"echo-keys" ], Getopt.Unit c_set_echo_keys, s_"Don’t turn off echo for passphrases"); +@@ -420,16 +435,6 @@ let create_standard_options argspec ?anon_fun ?(key_opts = false) + let getopt = Getopt.create argspec ?anon_fun usage_msg in + { getopt; ks; debug_gc } + +-let key_store_to_cli { keys } = +- Hashtbl.fold ( +- fun k v acc -> +- let arg = +- match v with +- | KeyString s -> sprintf "%s:key:%s" k s +- | KeyFileName f -> sprintf "%s:file:%s" k f in +- "--key" :: arg :: acc +- ) keys [] +- + (* Run an external command, slurp up the output as a list of lines. *) + let external_command ?(echo_cmd = true) cmd = + if echo_cmd then +@@ -691,21 +696,19 @@ let is_btrfs_subvolume g fs = + if g#last_errno () = Guestfs.Errno.errno_EINVAL then false + else raise exn + ++let key_store_requires_network ks = ++ List.exists (function ++ | _, KeyClevis -> true ++ | _ -> false) !(ks.keys) ++ + let inspect_decrypt g ks = +- (* Turn the keys in the key_store into a simpler struct, so it is possible +- * to read it using the C API. +- *) +- let keys_as_list = Hashtbl.fold ( +- fun k v acc -> +- (k, v) :: acc +- ) ks.keys [] in + (* Note we pass original 'g' even though it is not used by the + * callee. This is so that 'g' is kept as a root on the stack, and + * so cannot be garbage collected while we are in the c_inspect_decrypt + * function. + *) + c_inspect_decrypt g#ocaml_handle (Guestfs.c_pointer g#ocaml_handle) +- keys_as_list ++ !(ks.keys) + + let with_timeout op timeout ?(sleep = 2) fn = + let start_t = Unix.gettimeofday () in +diff --git a/common/mltools/tools_utils.mli b/common/mltools/tools_utils.mli +index 5018300..ec900e6 100644 +--- a/common/mltools/tools_utils.mli ++++ b/common/mltools/tools_utils.mli +@@ -103,14 +103,6 @@ val create_standard_options : Getopt.speclist -> ?anon_fun:Getopt.anon_fun -> ?k + + Returns a new {!cmdline_options} structure. *) + +-val key_store_to_cli : key_store -> string list +-(** Convert a {!key_store} object back to a list of command line +- options, essentially undoing the effect of Getopt parsing. +- This is used in virt-v2v to pass the keystore to helpers. +- It is not particularly secure, especially if you use the +- [:key:] selector, although not any less secure than passing +- them via the command line in the first place. *) +- + val external_command : ?echo_cmd:bool -> string -> string list + (** Run an external command, slurp up the output as a list of lines. + +@@ -204,6 +196,10 @@ val inspect_mount_root_ro : Guestfs.guestfs -> string -> unit + val is_btrfs_subvolume : Guestfs.guestfs -> string -> bool + (** Checks if a filesystem is a btrfs subvolume. *) + ++val key_store_requires_network : key_store -> bool ++(** [key_store_requires_network ks] returns [true] iff [ks] contains at least ++ one "ID:clevis" selector. *) ++ + val inspect_decrypt : Guestfs.guestfs -> key_store -> unit + (** Simple implementation of decryption: look for any encrypted + partitions and decrypt them, then rescan for VGs. *) +diff --git a/common/options/decrypt.c b/common/options/decrypt.c +index 1cd7b62..97c8b88 100644 +--- a/common/options/decrypt.c ++++ b/common/options/decrypt.c +@@ -124,10 +124,10 @@ decrypt_mountables (guestfs_h *g, const char * const *mountables, + while ((mountable = *mnt_scan++) != NULL) { + CLEANUP_FREE char *type = NULL; + CLEANUP_FREE char *uuid = NULL; +- CLEANUP_FREE_STRING_LIST char **keys = NULL; ++ struct matching_key *keys; ++ size_t nr_matches; + CLEANUP_FREE char *mapname = NULL; +- const char * const *key_scan; +- const char *key; ++ size_t scan; + + type = guestfs_vfs_type (g, mountable); + if (type == NULL) +@@ -144,33 +144,45 @@ decrypt_mountables (guestfs_h *g, const char * const *mountables, + /* Grab the keys that we should try with this device, based on device name, + * or UUID (if any). + */ +- keys = get_keys (ks, mountable, uuid); +- assert (keys[0] != NULL); ++ keys = get_keys (ks, mountable, uuid, &nr_matches); ++ assert (nr_matches > 0); + + /* Generate a node name for the plaintext (decrypted) device node. */ + if (uuid == NULL || asprintf (&mapname, "luks-%s", uuid) == -1) + mapname = make_mapname (mountable); + + /* Try each key in turn. */ +- key_scan = (const char * const *)keys; +- while ((key = *key_scan++) != NULL) { ++ for (scan = 0; scan < nr_matches; ++scan) { ++ struct matching_key *key = keys + scan; + int r; + + guestfs_push_error_handler (g, NULL, NULL); +- r = guestfs_cryptsetup_open (g, mountable, key, mapname, -1); ++ assert (key->clevis == (key->passphrase == NULL)); ++ if (key->clevis) ++#ifdef GUESTFS_HAVE_CLEVIS_LUKS_UNLOCK ++ r = guestfs_clevis_luks_unlock (g, mountable, mapname); ++#else ++ error (EXIT_FAILURE, 0, ++ _("'clevis_luks_unlock', needed for decrypting %s, is " ++ "unavailable in this libguestfs version"), mountable); ++#endif ++ else ++ r = guestfs_cryptsetup_open (g, mountable, key->passphrase, mapname, ++ -1); + guestfs_pop_error_handler (g); + + if (r == 0) + break; + } + +- if (key == NULL) ++ if (scan == nr_matches) + error (EXIT_FAILURE, 0, + _("could not find key to open LUKS encrypted %s.\n\n" + "Try using --key on the command line.\n\n" + "Original error: %s (%d)"), + mountable, guestfs_last_error (g), guestfs_last_errno (g)); + ++ free_keys (keys, nr_matches); + decrypted_some = true; + } + +diff --git a/common/options/key-option.pod b/common/options/key-option.pod +index 90a3b15..6bc04df 100644 +--- a/common/options/key-option.pod ++++ b/common/options/key-option.pod +@@ -14,4 +14,13 @@ Use the specified C as passphrase. + + Read the passphrase from F. + ++=item B<--key> C:clevis ++ ++Attempt passphrase-less unlocking for C with Clevis, over the ++network. Please refer to L for more ++information on network-bound disk encryption (NBDE). ++ ++Note that if any such option is present on the command line, QEMU user ++networking will be automatically enabled for the libguestfs appliance. ++ + =back +diff --git a/common/options/keys.c b/common/options/keys.c +index d27a712..d987ae5 100644 +--- a/common/options/keys.c ++++ b/common/options/keys.c +@@ -125,11 +125,12 @@ read_first_line_from_file (const char *filename) + * keystore. There may be multiple. If none are read from the + * keystore, ask the user. + */ +-char ** +-get_keys (struct key_store *ks, const char *device, const char *uuid) ++struct matching_key * ++get_keys (struct key_store *ks, const char *device, const char *uuid, ++ size_t *nr_matches) + { +- size_t i, j, nmemb; +- char **r; ++ size_t i, nmemb; ++ struct matching_key *r, *match; + char *s; + + /* We know the returned list must have at least one element and not +@@ -139,22 +140,20 @@ get_keys (struct key_store *ks, const char *device, const char *uuid) + if (ks && ks->nr_keys > nmemb) + nmemb = ks->nr_keys; + +- /* make room for the terminating NULL */ +- if (nmemb == (size_t)-1) ++ if (nmemb > (size_t)-1 / sizeof *r) + error (EXIT_FAILURE, 0, _("size_t overflow")); +- nmemb++; + +- r = calloc (nmemb, sizeof (char *)); ++ r = malloc (nmemb * sizeof *r); + if (r == NULL) +- error (EXIT_FAILURE, errno, "calloc"); ++ error (EXIT_FAILURE, errno, "malloc"); + +- j = 0; ++ match = r; + + if (ks) { + for (i = 0; i < ks->nr_keys; ++i) { + struct key_store_key *key = &ks->keys[i]; + +- if (STRNEQ (key->id, device) && (uuid && STRNEQ (key->id, uuid))) ++ if (STRNEQ (key->id, device) && (!uuid || STRNEQ (key->id, uuid))) + continue; + + switch (key->type) { +@@ -162,68 +161,101 @@ get_keys (struct key_store *ks, const char *device, const char *uuid) + s = strdup (key->string.s); + if (!s) + error (EXIT_FAILURE, errno, "strdup"); +- r[j++] = s; ++ match->clevis = false; ++ match->passphrase = s; ++ ++match; + break; + case key_file: + s = read_first_line_from_file (key->file.name); +- r[j++] = s; ++ match->clevis = false; ++ match->passphrase = s; ++ ++match; ++ break; ++ case key_clevis: ++ match->clevis = true; ++ match->passphrase = NULL; ++ ++match; + break; + } + } + } + +- if (j == 0) { ++ if (match == r) { + /* Key not found in the key store, ask the user for it. */ + s = read_key (device); + if (!s) + error (EXIT_FAILURE, 0, _("could not read key from user")); +- r[0] = s; ++ match->clevis = false; ++ match->passphrase = s; ++ ++match; + } + ++ *nr_matches = (size_t)(match - r); + return r; + } + ++void ++free_keys (struct matching_key *keys, size_t nr_matches) ++{ ++ size_t i; ++ ++ for (i = 0; i < nr_matches; ++i) { ++ struct matching_key *key = keys + i; ++ ++ assert (key->clevis == (key->passphrase == NULL)); ++ if (!key->clevis) ++ free (key->passphrase); ++ } ++ free (keys); ++} ++ + struct key_store * + key_store_add_from_selector (struct key_store *ks, const char *selector) + { +- CLEANUP_FREE_STRING_LIST char **fields = +- guestfs_int_split_string (':', selector); ++ CLEANUP_FREE_STRING_LIST char **fields = NULL; ++ size_t field_count; + struct key_store_key key; + ++ fields = guestfs_int_split_string (':', selector); + if (!fields) + error (EXIT_FAILURE, errno, "guestfs_int_split_string"); ++ field_count = guestfs_int_count_strings (fields); + +- if (guestfs_int_count_strings (fields) != 3) { +- invalid_selector: +- error (EXIT_FAILURE, 0, "invalid selector for --key: %s", selector); +- } +- +- /* 1: device */ ++ /* field#0: ID */ ++ if (field_count < 1) ++ error (EXIT_FAILURE, 0, _("selector '%s': missing ID"), selector); + key.id = strdup (fields[0]); + if (!key.id) + error (EXIT_FAILURE, errno, "strdup"); + +- /* 2: key type */ +- if (STREQ (fields[1], "key")) ++ /* field#1...: TYPE, and TYPE-specific properties */ ++ if (field_count < 2) ++ error (EXIT_FAILURE, 0, _("selector '%s': missing TYPE"), selector); ++ ++ if (STREQ (fields[1], "key")) { + key.type = key_string; +- else if (STREQ (fields[1], "file")) +- key.type = key_file; +- else +- goto invalid_selector; +- +- /* 3: actual key */ +- switch (key.type) { +- case key_string: ++ if (field_count != 3) ++ error (EXIT_FAILURE, 0, ++ _("selector '%s': missing KEY_STRING, or too many fields"), ++ selector); + key.string.s = strdup (fields[2]); + if (!key.string.s) + error (EXIT_FAILURE, errno, "strdup"); +- break; +- case key_file: ++ } else if (STREQ (fields[1], "file")) { ++ key.type = key_file; ++ if (field_count != 3) ++ error (EXIT_FAILURE, 0, ++ _("selector '%s': missing FILENAME, or too many fields"), ++ selector); + key.file.name = strdup (fields[2]); + if (!key.file.name) + error (EXIT_FAILURE, errno, "strdup"); +- break; +- } ++ } else if (STREQ (fields[1], "clevis")) { ++ key.type = key_clevis; ++ if (field_count != 2) ++ error (EXIT_FAILURE, 0, _("selector '%s': too many fields"), selector); ++ } else ++ error (EXIT_FAILURE, 0, _("selector '%s': invalid TYPE"), selector); + + return key_store_import_key (ks, &key); + } +@@ -252,6 +284,21 @@ key_store_import_key (struct key_store *ks, const struct key_store_key *key) + return ks; + } + ++bool ++key_store_requires_network (const struct key_store *ks) ++{ ++ size_t i; ++ ++ if (ks == NULL) ++ return false; ++ ++ for (i = 0; i < ks->nr_keys; ++i) ++ if (ks->keys[i].type == key_clevis) ++ return true; ++ ++ return false; ++} ++ + void + free_key_store (struct key_store *ks) + { +@@ -270,6 +317,9 @@ free_key_store (struct key_store *ks) + case key_file: + free (key->file.name); + break; ++ case key_clevis: ++ /* nothing */ ++ break; + } + free (key->id); + } +diff --git a/common/options/options.h b/common/options/options.h +index 80df91a..60d5d80 100644 +--- a/common/options/options.h ++++ b/common/options/options.h +@@ -115,6 +115,7 @@ struct key_store_key { + enum { + key_string, /* key specified as string */ + key_file, /* key stored in a file */ ++ key_clevis, /* key reconstructed with Clevis+Tang */ + } type; + union { + struct { +@@ -134,6 +135,19 @@ struct key_store { + size_t nr_keys; + }; + ++/* A key matching a particular ID (pathname of the libguestfs device node that ++ * stands for the encrypted block device, or LUKS UUID). ++ */ ++struct matching_key { ++ /* True iff the passphrase should be reconstructed using Clevis, talking to ++ * Tang servers over the network. ++ */ ++ bool clevis; ++ ++ /* Explicit passphrase, otherwise. */ ++ char *passphrase; ++}; ++ + /* in config.c */ + extern void parse_config (void); + +@@ -151,9 +165,12 @@ extern void print_inspect_prompt (void); + + /* in key.c */ + extern char *read_key (const char *param); +-extern char **get_keys (struct key_store *ks, const char *device, const char *uuid); ++extern struct matching_key *get_keys (struct key_store *ks, const char *device, ++ const char *uuid, size_t *nr_matches); ++extern void free_keys (struct matching_key *keys, size_t nr_matches); + extern struct key_store *key_store_add_from_selector (struct key_store *ks, const char *selector); + extern struct key_store *key_store_import_key (struct key_store *ks, const struct key_store_key *key); ++extern bool key_store_requires_network (const struct key_store *ks); + extern void free_key_store (struct key_store *ks); + + /* in options.c */ +diff --git a/diff/diff.c b/diff/diff.c +index 6aae88e6a..c73129c82 100644 +--- a/diff/diff.c ++++ b/diff/diff.c +@@ -209,6 +209,7 @@ main (int argc, char *argv[]) + int option_index; + struct tree *tree1, *tree2; + struct key_store *ks = NULL; ++ bool network; + + g = guestfs_create (); + if (g == NULL) +@@ -378,6 +379,10 @@ main (int argc, char *argv[]) + /* Mount up first guest. */ + add_drives (drvs); + ++ network = key_store_requires_network (ks); ++ if (guestfs_set_network (g, network) == -1) ++ exit (EXIT_FAILURE); ++ + if (guestfs_launch (g) == -1) + exit (EXIT_FAILURE); + +@@ -389,6 +394,9 @@ main (int argc, char *argv[]) + /* Mount up second guest. */ + add_drives_handle (g2, drvs2, 0); + ++ if (guestfs_set_network (g2, network) == -1) ++ exit (EXIT_FAILURE); ++ + if (guestfs_launch (g2) == -1) + exit (EXIT_FAILURE); + +diff --git a/edit/edit.c b/edit/edit.c +index 7f06bce7f..90c6b85d5 100644 +--- a/edit/edit.c ++++ b/edit/edit.c +@@ -274,6 +274,9 @@ main (int argc, char *argv[]) + /* Add drives. */ + add_drives (drvs); + ++ if (key_store_requires_network (ks) && guestfs_set_network (g, 1) == -1) ++ exit (EXIT_FAILURE); ++ + if (guestfs_launch (g) == -1) + exit (EXIT_FAILURE); + +diff --git a/inspector/inspector.c b/inspector/inspector.c +index 25ee40f3f..2702e3310 100644 +--- a/inspector/inspector.c ++++ b/inspector/inspector.c +@@ -294,6 +294,9 @@ main (int argc, char *argv[]) + */ + add_drives (drvs); + ++ if (key_store_requires_network (ks) && guestfs_set_network (g, 1) == -1) ++ exit (EXIT_FAILURE); ++ + if (guestfs_launch (g) == -1) + exit (EXIT_FAILURE); + +-- +2.31.1 + diff --git a/SOURCES/0008-get-kernel-sparsify-set-networking-for-key-ID-clevis.patch b/SOURCES/0008-get-kernel-sparsify-set-networking-for-key-ID-clevis.patch new file mode 100644 index 0000000..ea12a81 --- /dev/null +++ b/SOURCES/0008-get-kernel-sparsify-set-networking-for-key-ID-clevis.patch @@ -0,0 +1,59 @@ +From 77a10b30f6f6fdb1648b12f68147e6a894526802 Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Tue, 28 Jun 2022 13:57:00 +0200 +Subject: [PATCH] get-kernel, sparsify: set networking for "--key ID:clevis" + +Call the OCaml-language helper "key_store_requires_network" in those OCaml +utilities that pass "~key_opts:true" to "create_standard_options", and do +not have any code related to networking yet. + +Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1809453 +Signed-off-by: Laszlo Ersek +Message-Id: <20220628115702.5584-3-lersek@redhat.com> +Reviewed-by: Richard W.M. Jones +(cherry picked from commit 4f66f0892e6fd75d10dcfa2f9e94b3e32bdb906e) +--- + get-kernel/get_kernel.ml | 1 + + sparsify/copying.ml | 1 + + sparsify/in_place.ml | 1 + + 3 files changed, 3 insertions(+) + +diff --git a/get-kernel/get_kernel.ml b/get-kernel/get_kernel.ml +index e485cf495..9c2aa17c2 100644 +--- a/get-kernel/get_kernel.ml ++++ b/get-kernel/get_kernel.ml +@@ -176,6 +176,7 @@ let main () = + (* Connect to libguestfs. *) + let g = open_guestfs () in + add g; ++ g#set_network (key_store_requires_network ks); + g#launch (); + + (* Decrypt the disks. *) +diff --git a/sparsify/copying.ml b/sparsify/copying.ml +index 39d06c94c..21a603d63 100644 +--- a/sparsify/copying.ml ++++ b/sparsify/copying.ml +@@ -187,6 +187,7 @@ You can ignore this warning or change it to a hard failure using the + let machine_readable = machine_readable () <> None in + Progress.set_up_progress_bar ~machine_readable g + ); ++ g#set_network (key_store_requires_network ks); + g#launch (); + + g in +diff --git a/sparsify/in_place.ml b/sparsify/in_place.ml +index 00f0e0564..0eec63e6f 100644 +--- a/sparsify/in_place.ml ++++ b/sparsify/in_place.ml +@@ -58,6 +58,7 @@ let run disk format ignores zeroes ks = + let machine_readable = machine_readable () <> None in + Progress.set_up_progress_bar ~machine_readable g + ); ++ g#set_network (key_store_requires_network ks); + g#launch (); + + (* If discard is not supported in the appliance, we must return exit +-- +2.31.1 + diff --git a/SOURCES/0009-customize-add-reminder-about-key-ID-clevis.patch b/SOURCES/0009-customize-add-reminder-about-key-ID-clevis.patch new file mode 100644 index 0000000..7cf9730 --- /dev/null +++ b/SOURCES/0009-customize-add-reminder-about-key-ID-clevis.patch @@ -0,0 +1,47 @@ +From fe59e93b27e3bc17b5cc0874e103330e0000b210 Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Tue, 28 Jun 2022 13:57:01 +0200 +Subject: [PATCH] customize: add reminder about "--key ID:clevis" + +virt-customize already enables appliance networking by default; +conversely, if the user passes "--no-network", we shouldn't override that +for the sake of "--key ID:clevis". Add comments about clevis to the code. + +Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1809453 +Signed-off-by: Laszlo Ersek +Message-Id: <20220628115702.5584-4-lersek@redhat.com> +Reviewed-by: Richard W.M. Jones +(cherry picked from commit e52aea48cbcea3f3b538db0573b58517cbc33da0) +--- + customize/customize_main.ml | 7 +++++++ + 1 file changed, 7 insertions(+) + +diff --git a/customize/customize_main.ml b/customize/customize_main.ml +index 8a022342f..32b7eebdd 100644 +--- a/customize/customize_main.ml ++++ b/customize/customize_main.ml +@@ -52,7 +52,11 @@ let main () = + let libvirturi = ref "" in + let memsize = ref None in + let set_memsize arg = memsize := Some arg in ++ ++ (* Note that [--key ID:clevis] depends on this default. See more below, near ++ * [g#set_network network]. *) + let network = ref true in ++ + let smp = ref None in + let set_smp arg = smp := Some arg in + +@@ -159,6 +163,9 @@ read the man page virt-customize(1). + let g = open_guestfs () in + Option.may g#set_memsize memsize; + Option.may g#set_smp smp; ++ (* [--no-network] from the command line takes precedence over the automatic ++ * network enablement for [--key ID:clevis], so here we intentionally don't check ++ * [key_store_requires_network opthandle.ks]. *) + g#set_network network; + + (* Add disks. *) +-- +2.31.1 + diff --git a/SOURCES/0010-sysprep-set-networking-for-key-ID-clevis.patch b/SOURCES/0010-sysprep-set-networking-for-key-ID-clevis.patch new file mode 100644 index 0000000..9815ab2 --- /dev/null +++ b/SOURCES/0010-sysprep-set-networking-for-key-ID-clevis.patch @@ -0,0 +1,67 @@ +From c2917c9a7f0c23b94d30af2a5a14e67c46e38242 Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Tue, 28 Jun 2022 13:57:02 +0200 +Subject: [PATCH] sysprep: set networking for "--key ID:clevis" + +Similarly to virt-customize, virt-sysprep has prior "--network" and +"--no-network" options. Unlike virt-customize though, virt-sysprep +defaults to disabling the appliance network. Therefore we can't tell +whether the network is disabled "by default" or because the user requested +it. + +That's a problem: "--key ID:clevis" is supposed to override the former, +but not the latter. Add a separate option for tracking "--no-network", and +only if "--no-network" is absent, permit "--network" or "--key ID:clevis" +to turn on the network. + +Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1809453 +Signed-off-by: Laszlo Ersek +Message-Id: <20220628115702.5584-5-lersek@redhat.com> +Reviewed-by: Richard W.M. Jones +(cherry picked from commit 1cce13223e9321d1ef333d6ae356c24203990a4a) +--- + sysprep/main.ml | 7 +++++-- + 1 file changed, 5 insertions(+), 2 deletions(-) + +diff --git a/sysprep/main.ml b/sysprep/main.ml +index b760618ad..1f722dfb0 100644 +--- a/sysprep/main.ml ++++ b/sysprep/main.ml +@@ -44,6 +44,7 @@ let main () = + let libvirturi = ref "" in + let mount_opts = ref "" in + let network = ref false in ++ let no_network = ref false in + let operations = ref None in + + let format = ref "auto" in +@@ -131,7 +132,7 @@ let main () = + [ L"list-operations" ], Getopt.Unit list_operations, s_"List supported operations"; + [ L"mount-options" ], Getopt.Set_string (s_"opts", mount_opts), s_"Set mount options (eg /:noatime;/var:rw,noatime)"; + [ L"network" ], Getopt.Set network, s_"Enable appliance network"; +- [ L"no-network" ], Getopt.Clear network, s_"Disable appliance network (default)"; ++ [ L"no-network" ], Getopt.Set no_network, s_"Disable appliance network (default)"; + [ L"operation"; L"operations" ], Getopt.String (s_"operations", set_operations), s_"Enable/disable specific operations"; + ] in + let args = basic_args @ Sysprep_operation.extra_args () in +@@ -188,6 +189,7 @@ read the man page virt-sysprep(1). + (* Dereference the rest of the args. *) + let dryrun = !dryrun in + let network = !network in ++ let no_network = !no_network in + let operations = !operations in + + (* At this point we know which operations are enabled. So call the +@@ -208,7 +210,8 @@ read the man page virt-sysprep(1). + + (* Connect to libguestfs. *) + let g = open_guestfs () in +- g#set_network network; ++ g#set_network (not no_network && ++ (network || key_store_requires_network opthandle.ks)); + add g dryrun; + g#launch (); + +-- +2.31.1 + diff --git a/SOURCES/0011-sysprep-make-an-effort-to-cope-with-LUKS-on-LVM.patch b/SOURCES/0011-sysprep-make-an-effort-to-cope-with-LUKS-on-LVM.patch new file mode 100644 index 0000000..1756e29 --- /dev/null +++ b/SOURCES/0011-sysprep-make-an-effort-to-cope-with-LUKS-on-LVM.patch @@ -0,0 +1,87 @@ +From d15d829d20c1a0d21da584257c4634517d4271d1 Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Thu, 14 Jul 2022 12:40:04 +0200 +Subject: [PATCH] sysprep: make an effort to cope with LUKS-on-LVM + +If the guest disk uses the LUKS-on-LVM scheme, then sysprep has a problem: + +- the "fs-uuids" blockdev operation depends on the decrypted LUKS devices + being open, + +- the "lvm-uuids" blockdev operation depends on the same devices being + closed. + +Attempt to deal with this in "lvm-uuids". + +Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2106286 +Signed-off-by: Laszlo Ersek +Message-Id: <20220714104005.8334-2-lersek@redhat.com> +Reviewed-by: Richard W.M. Jones +(cherry picked from commit 361a447bcb7aef399abad8075ee41197c4071f71) +--- + sysprep/sysprep_operation_lvm_uuids.ml | 42 +++++++++++++++++++++++++- + 1 file changed, 41 insertions(+), 1 deletion(-) + +diff --git a/sysprep/sysprep_operation_lvm_uuids.ml b/sysprep/sysprep_operation_lvm_uuids.ml +index c67b21487..5fc623039 100644 +--- a/sysprep/sysprep_operation_lvm_uuids.ml ++++ b/sysprep/sysprep_operation_lvm_uuids.ml +@@ -30,7 +30,46 @@ let rec lvm_uuids_perform g root side_effects = + try g#available [|"lvm2"|]; true with G.Error _ -> false in + if has_lvm2_feature then ( + let has_pvs, has_vgs = g#pvs () <> [||], g#vgs () <> [||] in +- if has_pvs || has_vgs then g#vg_activate_all false; ++ if has_pvs || has_vgs then ( ++ try g#vg_activate_all false ++ with G.Error _ as exn -> ++ (* If the "luks" feature is not available, re-raise the exception. *) ++ (try g#available [|"luks"|] with G.Error _ -> raise exn); ++ ++ (* Assume VG deactivation failed due to the guest using the ++ * FS-on-LUKS-on-LVM scheme. ++ * ++ * By now, we have unmounted filesystems, but the decrypted LUKS ++ * devices still keep the LVs open. Therefore, attempt closing all ++ * decrypted LUKS devices that were opened by inspection (i.e., device ++ * nodes with pathnames like "/dev/mapper/luks-"). Closing the ++ * decrypted LUKS devices should remove the references from their ++ * underlying LVs, and then VG deactivation should succeed too. ++ * ++ * Note that closing the decrypted LUKS devices prevents the ++ * blockdev-level manipulation of those filesystems that reside on ++ * said decrypted LUKS devices, such as the "fs-uuids" operation. But ++ * that should be OK, as we order the present operation after all ++ * other block device ops. ++ * ++ * In case the guest uses the FS-on-LVM-on-LUKS scheme, then the ++ * original VG deactivation must have failed for a different reason. ++ * (As we have unmounted filesystems earlier, and LUKS is below, not ++ * on top of, LVM.) The LUKS-closing attempts below will fail then, ++ * due to LVM keeping the decrypted LUKS devices open. This failure is ++ * harmless and can be considered a no-op. The final, retried VG ++ * deactivation should reproduce the original failure. ++ *) ++ let luks_re = PCRE.compile ("^/dev/mapper/luks" ^ ++ "-[[:xdigit:]]{8}" ^ ++ "(?:-[[:xdigit:]]{4}){3}" ^ ++ "-[[:xdigit:]]{12}$") ++ and dmdevs = Array.to_list (g#list_dm_devices ()) in ++ let plaintext_devs = List.filter (PCRE.matches luks_re) dmdevs in ++ List.iter (fun dev -> try g#cryptsetup_close dev with _ -> ()) ++ plaintext_devs; ++ g#vg_activate_all false ++ ); + if has_pvs then g#pvchange_uuid_all (); + if has_vgs then g#vgchange_uuid_all (); + if has_pvs || has_vgs then g#vg_activate_all true +@@ -39,6 +78,7 @@ let rec lvm_uuids_perform g root side_effects = + + let op = { + defaults with ++ order = 99; (* Run it after other block device ops. *) + name = "lvm-uuids"; + enabled_by_default = true; + heading = s_"Change LVM2 PV and VG UUIDs"; +-- +2.31.1 + diff --git a/SOURCES/0012-sysprep-advise-against-cloning-VMs-with-internal-ful.patch b/SOURCES/0012-sysprep-advise-against-cloning-VMs-with-internal-ful.patch new file mode 100644 index 0000000..549bdcf --- /dev/null +++ b/SOURCES/0012-sysprep-advise-against-cloning-VMs-with-internal-ful.patch @@ -0,0 +1,39 @@ +From 0b92347337e9201140ed2daf77a934c731de6630 Mon Sep 17 00:00:00 2001 +From: Laszlo Ersek +Date: Thu, 14 Jul 2022 12:40:05 +0200 +Subject: [PATCH] sysprep: advise against cloning VMs with internal full disk + encryption + +This is relevant for sysprep because we recommend sysprep for facilitating +cloning. + +Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=2106286 +Signed-off-by: Laszlo Ersek +Message-Id: <20220714104005.8334-3-lersek@redhat.com> +Reviewed-by: Richard W.M. Jones +(cherry picked from commit b49ee909f5d1a0d7b5c668335b9098ca8ff85bfd) +--- + sysprep/virt-sysprep.pod | 7 +++++++ + 1 file changed, 7 insertions(+) + +diff --git a/sysprep/virt-sysprep.pod b/sysprep/virt-sysprep.pod +index deeb5341e..232b9f24b 100644 +--- a/sysprep/virt-sysprep.pod ++++ b/sysprep/virt-sysprep.pod +@@ -519,6 +519,13 @@ Either or both options can be used multiple times on the command line. + + =head1 SECURITY + ++Virtual machines that employ full disk encryption I should not be considered for cloning and distribution, as it ++provides multiple parties with the same internal volume key, enabling ++any one such party to decrypt all the other clones. Refer to the L for ++details. ++ + Although virt-sysprep removes some sensitive information from the + guest, it does not pretend to remove all of it. You should examine + the L above and the guest afterwards. +-- +2.31.1 + diff --git a/SOURCES/0013-builder-dib-Replace-On_exit.rmdir-with-On_exit.rm_rf.patch b/SOURCES/0013-builder-dib-Replace-On_exit.rmdir-with-On_exit.rm_rf.patch new file mode 100644 index 0000000..f207a2e --- /dev/null +++ b/SOURCES/0013-builder-dib-Replace-On_exit.rmdir-with-On_exit.rm_rf.patch @@ -0,0 +1,144 @@ +From 3576da023fb42ceaea80b81aebad345de606a332 Mon Sep 17 00:00:00 2001 +From: "Richard W.M. Jones" +Date: Fri, 15 Jul 2022 08:55:53 +0100 +Subject: [PATCH] builder, dib: Replace On_exit.rmdir with On_exit.rm_rf + +Update common submodule. + +(cherry picked from commit f5baf83e464c276d3dae6f8e878b8f47fe0d43d9) +--- + builder/builder.ml | 2 +- + builder/index_parser_tests.ml | 2 +- + builder/repository_main.ml | 2 +- + common | 2 +- + dib/dib.ml | 2 +- + 5 files changed, 5 insertions(+), 5 deletions(-) + +diff --git a/builder/builder.ml b/builder/builder.ml +index 2c9c83085..e34aae6c7 100644 +--- a/builder/builder.ml ++++ b/builder/builder.ml +@@ -182,7 +182,7 @@ let main () = + * create. + *) + let tmpdir = Mkdtemp.temp_dir "virt-builder." in +- On_exit.rmdir tmpdir; ++ On_exit.rm_rf tmpdir; + + (* Download the sources. *) + let downloader = Downloader.create ~curl:cmdline.curl ~cache ~tmpdir in +diff --git a/builder/index_parser_tests.ml b/builder/index_parser_tests.ml +index 39983faba..5262a1607 100644 +--- a/builder/index_parser_tests.ml ++++ b/builder/index_parser_tests.ml +@@ -28,7 +28,7 @@ open Tools_utils + + let tmpdir = + let tmpdir = Mkdtemp.temp_dir "guestfs-tests." in +- On_exit.rmdir tmpdir; ++ On_exit.rm_rf tmpdir; + tmpdir + + let dummy_sigchecker = Sigchecker.create ~gpg:"gpg" +diff --git a/builder/repository_main.ml b/builder/repository_main.ml +index c5b656310..c24729c4c 100644 +--- a/builder/repository_main.ml ++++ b/builder/repository_main.ml +@@ -420,7 +420,7 @@ let main () = + (* Create a temporary folder to work in *) + let tmpdir = Mkdtemp.temp_dir ~base_dir:cmdline.repo + "virt-builder-repository." in +- On_exit.rmdir tmpdir; ++ On_exit.rm_rf tmpdir; + + let tmprepo = tmpdir // "repo" in + mkdir_p tmprepo 0o700; +Submodule common af6cb55bc..fd964c1ba: +diff --git a/common/mlcustomize/guest_packages.ml b/common/mlcustomize/guest_packages.ml +index 4c3c34e..7c29a2a 100644 +--- a/common/mlcustomize/guest_packages.ml ++++ b/common/mlcustomize/guest_packages.ml +@@ -73,9 +73,9 @@ let install_command packages package_management = + | "zypper" -> sprintf "zypper -n in -l %s" quoted_args + + | "unknown" -> +- error_unknown_package_manager (s_"--install") ++ error_unknown_package_manager "--install" + | pm -> +- error_unimplemented_package_manager (s_"--install") pm ++ error_unimplemented_package_manager "--install" pm + + let update_command package_management = + match package_management with +@@ -103,9 +103,9 @@ let update_command package_management = + | "zypper" -> "zypper -n update -l" + + | "unknown" -> +- error_unknown_package_manager (s_"--update") ++ error_unknown_package_manager "--update" + | pm -> +- error_unimplemented_package_manager (s_"--update") pm ++ error_unimplemented_package_manager "--update" pm + + let uninstall_command packages package_management = + let quoted_args = String.concat " " (List.map quote packages) in +@@ -127,6 +127,6 @@ let uninstall_command packages package_management = + | "zypper" -> sprintf "zypper -n rm %s" quoted_args + + | "unknown" -> +- error_unknown_package_manager (s_"--uninstall") ++ error_unknown_package_manager "--uninstall" + | pm -> +- error_unimplemented_package_manager (s_"--uninstall") pm ++ error_unimplemented_package_manager "--uninstall" pm +diff --git a/common/mltools/on_exit.ml b/common/mltools/on_exit.ml +index 53ccb68..cae12e7 100644 +--- a/common/mltools/on_exit.ml ++++ b/common/mltools/on_exit.ml +@@ -52,7 +52,7 @@ let do_actions () = + List.iter (do_action (fun file -> Unix.unlink file)) !files; + List.iter (do_action ( + fun dir -> +- let cmd = sprintf "rm -rf %s" (Filename.quote dir) in ++ let cmd = sprintf "rm -rf -- %s" (Filename.quote dir) in + ignore (Tools_utils.shell_command cmd) + ) + ) !rmdirs; +@@ -102,7 +102,7 @@ let unlink filename = + register (); + List.push_front filename files + +-let rmdir dir = ++let rm_rf dir = + register (); + List.push_front dir rmdirs + +diff --git a/common/mltools/on_exit.mli b/common/mltools/on_exit.mli +index a02e3db..9bcf104 100644 +--- a/common/mltools/on_exit.mli ++++ b/common/mltools/on_exit.mli +@@ -47,7 +47,7 @@ val f : (unit -> unit) -> unit + val unlink : string -> unit + (** Unlink a single temporary file on exit. *) + +-val rmdir : string -> unit ++val rm_rf : string -> unit + (** Recursively remove a temporary directory on exit (using [rm -rf]). *) + + val kill : ?signal:int -> int -> unit +diff --git a/dib/dib.ml b/dib/dib.ml +index f5ce604c8..a4ba36040 100644 +--- a/dib/dib.ml ++++ b/dib/dib.ml +@@ -550,7 +550,7 @@ let main () = + let image_basename_d = image_basename ^ ".d" in + + let tmpdir = Mkdtemp.temp_dir "dib." in +- On_exit.rmdir tmpdir; ++ On_exit.rm_rf tmpdir; + let auxtmpdir = tmpdir // "in_target.aux" in + do_mkdir auxtmpdir; + let hookstmpdir = auxtmpdir // "hooks" in +-- +2.31.1 + diff --git a/SOURCES/copy-patches.sh b/SOURCES/copy-patches.sh index 03de548..ade6db3 100755 --- a/SOURCES/copy-patches.sh +++ b/SOURCES/copy-patches.sh @@ -7,7 +7,7 @@ set -e # ./copy-patches.sh project=guestfs-tools -rhel_version=9.0 +rhel_version=9.1 # Check we're in the right directory. if [ ! -f $project.spec ]; then diff --git a/SOURCES/guestfs-tools-1.46.1.tar.gz.sig b/SOURCES/guestfs-tools-1.46.1.tar.gz.sig deleted file mode 100644 index 5f9b475..0000000 --- a/SOURCES/guestfs-tools-1.46.1.tar.gz.sig +++ /dev/null @@ -1,17 +0,0 @@ ------BEGIN PGP SIGNATURE----- - -iQJFBAABCAAvFiEE93dPsa0HSn6Mh2fqkXOPc+G3aKAFAmCWR4QRHHJpY2hAYW5u -ZXhpYS5vcmcACgkQkXOPc+G3aKB9Qg/5AYHa5Jges5uviaps3aDahEWZjKHdkHOR -ttZ3LGxqUeY8qxwaoLpGfTpFVmTI8VQj6mQES3IeSPOpBYVPeACz7j3GCvhedsv7 -naKVIl3RO1koG8IvPUc3H9P3iaNwp9w/8I8qUinbz2++xhP3tideeomz5js0taud -beEry79TvkxRtGRDz50YD3KOv4kVDWS46WN+tms2XJOSTX7SdZavK6VMmX+zt8aT -8oFL6kbGKyk9bswoBLSnbrholBS6l09UbIbfhKr+xvqBgUGvbm2wqTNR7I3T2rPj -19MPW1o/jrjRjPW7j3H73piHP/nD8S8M1Y+yEUycIZh1FEn4EDbVsiVGSbOxWZwP -SKn0+sfuLnoINzT/PyrRKHqoP9U3kUKeanPXk1jZerCF1aBqYL/8a1fExy5Ha4LW -JVq9P9KrWzQ5hfb5Emp+5dR2quroPfBQcRCJP8PC/5Nc0PN/JCngDfPQNScyH4lR -PI51zDIo/E9OHqoAzrOws+Jir4AaZabERO2JDBaibtbZlbOqISOdf05SYaHFfm0u -Tf2PFdDCd9tN1rfcv4zP5EB5Ty/APPkIa0nlhyk0QZPkx23PLF60iuyl4UOZxL5r -IQRadagD17iaYQ9dm+V61YOuYDSr2luRh4FnyPOVJUeeCjbivz/e0f3dmRVlZzpo -s8mtYmo7vUM= -=qllH ------END PGP SIGNATURE----- diff --git a/SOURCES/guestfs-tools-1.48.2.tar.gz.sig b/SOURCES/guestfs-tools-1.48.2.tar.gz.sig new file mode 100644 index 0000000..fe1a11d --- /dev/null +++ b/SOURCES/guestfs-tools-1.48.2.tar.gz.sig @@ -0,0 +1,17 @@ +-----BEGIN PGP SIGNATURE----- + +iQJFBAABCAAvFiEE93dPsa0HSn6Mh2fqkXOPc+G3aKAFAmKPVz0RHHJpY2hAYW5u +ZXhpYS5vcmcACgkQkXOPc+G3aKBYYxAAm31U2XKvJ164dv92ezjUbQL4D4A+nWh1 +WGmDmiTFq9IWT8W9U7xw7qT7kzqky+gQBUCGHDQSYiEcdsIlaR7WqdNBfRUHi5lu +mrZSMjCfMWaEwTvjtcZrJBmIIP/b/AHfXo/Nxg79MFmSPocfl7RBNpf6HQ7ZnRHW +w5P94fJQtOf6Bi9MHc7cwJ/wh7gslOT70puO85igBFbpBUedjINNudl0r7fYUz5I +zVxVQuFDYI0+d/UhIBa1ULVTCzlyGn9Rg+9B/B0b2XUZwxXOePusPJ/uK1OUkgue +fEtzTzEbl2x90w28+2mbXTyHJWJCKcO36/jII8H8ekF2uREwxgA8qzN6AC4sBwM1 +o2RiK5LMgqTlPsUP/5lrtAKp9RlXJ76WFnZzt/nSyCTwY+xApbmCQFYWJAaFzAso +TAazoyG31AUBhJzBNCoyAsfkb82Lh4++sev8oG8A0qeEvxktFh0tGzfnesFrahfW +VwbNbDUFEtTam+8rC667K7/v1FwCfC24BFmq8GZyyE/kmOwRN1jHq9FPYV/0sFLv +khkEdR7BWCOGjRS9sP8kN7ApWLHv9gthu9ZtGNA8ms7Gk//WfzMRrhCAWAWyI1kG +CG8DuXw63mDpbvY52TBbzD3mKZ30AN8tB4U+j9+PaxwIi0JXqtjJL2ggExCtZMDG +W1p4vqAvtB0= +=bW2f +-----END PGP SIGNATURE----- diff --git a/SPECS/guestfs-tools.spec b/SPECS/guestfs-tools.spec index 22e9879..69fa57c 100644 --- a/SPECS/guestfs-tools.spec +++ b/SPECS/guestfs-tools.spec @@ -18,15 +18,15 @@ %global patches_touch_autotools 1 # The source directory. -%global source_directory 1.46-stable +%global source_directory 1.48-stable # Filter perl provides. %{?perl_default_filter} Summary: Tools to access and modify virtual machine disk images Name: guestfs-tools -Version: 1.46.1 -Release: 6%{?dist} +Version: 1.48.2 +Release: 5%{?dist} License: GPLv2+ # Build only for architectures that have a kernel @@ -52,19 +52,22 @@ Source2: libguestfs.keyring Source3: copy-patches.sh # Patches are maintained in the following repository: -# https://github.com/rwmjones/guestfs-tools/commits/rhel-9.0.0 +# https://github.com/rwmjones/guestfs-tools/commits/rhel-9.1 -# Fix virt-win-reg --version (RHBZ#1961160) -Patch0001: 0001-win-reg-Fix-output-of-virt-win-reg-version.patch - -# Fix detection of Kylin Desktop (RHBZ#2025950) -Patch0002: 0002-m4-guestfs-ocaml.m4-Fix-deprecated-warning-format.patch -Patch0003: 0003-customize-Suppress-OCaml-warning.patch -Patch0004: 0004-virt-inspector.rng-recognize-kalilinux-and-msdos-dis.patch -Patch0005: 0005-virt-inspector.rng-Add-support-for-Kylin-RHBZ-199539.patch - -# Clean up NetworkManager connection files (RHBZ#1980922) -Patch0006: 0006-sysprep-remove-system-local-NetworkManager-connectio.patch +# Patches. +Patch0001: 0001-sysprep-remove-lvm2-s-default-system.devices-file.patch +Patch0002: 0002-adopt-inversion-of-SELinux-relabeling-in-virt-custom.patch +Patch0003: 0003-update-common-submodule.patch +Patch0004: 0004-RHEL-Reject-use-of-libguestfs-winsupport-features-ex.patch +Patch0005: 0005-customize-rebase-to-the-common-mlcustomize-Guest_pac.patch +Patch0006: 0006-update-common-submodule-for-CVE-2022-2211-fix.patch +Patch0007: 0007-cat-log-ls-tail-diff-edit-insp.-set-networking-for-k.patch +Patch0008: 0008-get-kernel-sparsify-set-networking-for-key-ID-clevis.patch +Patch0009: 0009-customize-add-reminder-about-key-ID-clevis.patch +Patch0010: 0010-sysprep-set-networking-for-key-ID-clevis.patch +Patch0011: 0011-sysprep-make-an-effort-to-cope-with-LUKS-on-LVM.patch +Patch0012: 0012-sysprep-advise-against-cloning-VMs-with-internal-ful.patch +Patch0013: 0013-builder-dib-Replace-On_exit.rmdir-with-On_exit.rm_rf.patch %if 0%{patches_touch_autotools} BuildRequires: autoconf, automake, libtool, gettext-devel @@ -73,7 +76,7 @@ BuildRequires: autoconf, automake, libtool, gettext-devel # Basic build requirements. BuildRequires: gcc, gcc-c++ BuildRequires: make -BuildRequires: libguestfs-devel >= 1.45.3-1 +BuildRequires: libguestfs-devel >= 1:1.48.3-4 BuildRequires: libguestfs-xfs BuildRequires: perl(Pod::Simple) BuildRequires: perl(Pod::Man) @@ -116,6 +119,9 @@ BuildRequires: perl-generators BuildRequires: gnupg2 %endif +# Version containing guestfs_clevis_luks_unlock +Requires: libguestfs%{?_isa} >= 1:1.48.3-4 + # For virt-builder: Requires: curl Requires: gnupg2 @@ -378,6 +384,7 @@ end %{_bindir}/virt-sparsify %{_bindir}/virt-sysprep %{_bindir}/virt-tail +%{_mandir}/man1/guestfs-tools-release-notes-1*.1* %{_mandir}/man1/virt-alignment-scan.1* %{_mandir}/man1/virt-builder-repository.1* %{_mandir}/man1/virt-builder.1* @@ -431,6 +438,21 @@ end %changelog +* Fri Jul 15 2022 Richard W.M. Jones - 1.48.2-5 +- Rebase to guestfs-tools 1.48.2 + resolves: rhbz#2059286 +- Default to --selinux-relabel in various tools + resolves: rhbz#2075718, rhbz#2089748 +- Add lvm system.devices cleanup operation to virt-sysprep + resolves: rhbz#2072493 +- Refactor virt-customize --install, --update options in common submodule +- Add support for Clevis & Tang + resolves: rhbz#1809453 +- Fix CVE-2022-2211 Denial of Service in --key parameter + resolves: rhbz#2102721 +- Fix virt-sysprep and LUKS-on-LVM guests + resolves: rhbz#2106286 + * Sat Dec 04 2021 Richard W.M. Jones - 1.46.1-6 - Clean up NetworkManager connection files - Add the copy-patches.sh script from virt-v2v