1 /* 2 * QEMU migration TLS support 3 * 4 * Copyright (c) 2015 Red Hat, Inc. 5 * 6 * This library is free software; you can redistribute it and/or 7 * modify it under the terms of the GNU Lesser General Public 8 * License as published by the Free Software Foundation; either 9 * version 2.1 of the License, or (at your option) any later version. 10 * 11 * This library is distributed in the hope that it will be useful, 12 * but WITHOUT ANY WARRANTY; without even the implied warranty of 13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 14 * Lesser General Public License for more details. 15 * 16 * You should have received a copy of the GNU Lesser General Public 17 * License along with this library; if not, see <http://www.gnu.org/licenses/>. 18 * 19 */ 20 21 #include "qemu/osdep.h" 22 #include "channel.h" 23 #include "migration.h" 24 #include "tls.h" 25 #include "crypto/tlscreds.h" 26 #include "qemu/error-report.h" 27 #include "qapi/error.h" 28 #include "trace.h" 29 30 static QCryptoTLSCreds * 31 migration_tls_get_creds(MigrationState *s, 32 QCryptoTLSCredsEndpoint endpoint, 33 Error **errp) 34 { 35 Object *creds; 36 QCryptoTLSCreds *ret; 37 38 creds = object_resolve_path_component( 39 object_get_objects_root(), s->parameters.tls_creds); 40 if (!creds) { 41 error_setg(errp, "No TLS credentials with id '%s'", 42 s->parameters.tls_creds); 43 return NULL; 44 } 45 ret = (QCryptoTLSCreds *)object_dynamic_cast( 46 creds, TYPE_QCRYPTO_TLS_CREDS); 47 if (!ret) { 48 error_setg(errp, "Object with id '%s' is not TLS credentials", 49 s->parameters.tls_creds); 50 return NULL; 51 } 52 if (!qcrypto_tls_creds_check_endpoint(ret, endpoint, errp)) { 53 return NULL; 54 } 55 56 return ret; 57 } 58 59 60 static void migration_tls_incoming_handshake(QIOTask *task, 61 gpointer opaque) 62 { 63 QIOChannel *ioc = QIO_CHANNEL(qio_task_get_source(task)); 64 Error *err = NULL; 65 66 if (qio_task_propagate_error(task, &err)) { 67 trace_migration_tls_incoming_handshake_error(error_get_pretty(err)); 68 error_report_err(err); 69 } else { 70 trace_migration_tls_incoming_handshake_complete(); 71 migration_channel_process_incoming(ioc); 72 } 73 object_unref(OBJECT(ioc)); 74 } 75 76 void migration_tls_channel_process_incoming(MigrationState *s, 77 QIOChannel *ioc, 78 Error **errp) 79 { 80 QCryptoTLSCreds *creds; 81 QIOChannelTLS *tioc; 82 83 creds = migration_tls_get_creds( 84 s, QCRYPTO_TLS_CREDS_ENDPOINT_SERVER, errp); 85 if (!creds) { 86 return; 87 } 88 89 tioc = qio_channel_tls_new_server( 90 ioc, creds, 91 s->parameters.tls_authz, 92 errp); 93 if (!tioc) { 94 return; 95 } 96 97 trace_migration_tls_incoming_handshake_start(); 98 qio_channel_set_name(QIO_CHANNEL(tioc), "migration-tls-incoming"); 99 qio_channel_tls_handshake(tioc, 100 migration_tls_incoming_handshake, 101 NULL, 102 NULL, 103 NULL); 104 } 105 106 107 static void migration_tls_outgoing_handshake(QIOTask *task, 108 gpointer opaque) 109 { 110 MigrationState *s = opaque; 111 QIOChannel *ioc = QIO_CHANNEL(qio_task_get_source(task)); 112 Error *err = NULL; 113 114 if (qio_task_propagate_error(task, &err)) { 115 trace_migration_tls_outgoing_handshake_error(error_get_pretty(err)); 116 } else { 117 trace_migration_tls_outgoing_handshake_complete(); 118 } 119 migration_channel_connect(s, ioc, NULL, err); 120 object_unref(OBJECT(ioc)); 121 } 122 123 QIOChannelTLS *migration_tls_client_create(MigrationState *s, 124 QIOChannel *ioc, 125 const char *hostname, 126 Error **errp) 127 { 128 QCryptoTLSCreds *creds; 129 QIOChannelTLS *tioc; 130 131 creds = migration_tls_get_creds( 132 s, QCRYPTO_TLS_CREDS_ENDPOINT_CLIENT, errp); 133 if (!creds) { 134 return NULL; 135 } 136 137 if (s->parameters.tls_hostname && *s->parameters.tls_hostname) { 138 hostname = s->parameters.tls_hostname; 139 } 140 141 tioc = qio_channel_tls_new_client( 142 ioc, creds, hostname, errp); 143 144 return tioc; 145 } 146 147 void migration_tls_channel_connect(MigrationState *s, 148 QIOChannel *ioc, 149 const char *hostname, 150 Error **errp) 151 { 152 QIOChannelTLS *tioc; 153 154 tioc = migration_tls_client_create(s, ioc, hostname, errp); 155 if (!tioc) { 156 return; 157 } 158 159 /* Save hostname into MigrationState for handshake */ 160 s->hostname = g_strdup(hostname); 161 trace_migration_tls_outgoing_handshake_start(hostname); 162 qio_channel_set_name(QIO_CHANNEL(tioc), "migration-tls-outgoing"); 163 qio_channel_tls_handshake(tioc, 164 migration_tls_outgoing_handshake, 165 s, 166 NULL, 167 NULL); 168 } 169 170 bool migrate_channel_requires_tls_upgrade(QIOChannel *ioc) 171 { 172 if (!migrate_use_tls()) { 173 return false; 174 } 175 176 return !object_dynamic_cast(OBJECT(ioc), TYPE_QIO_CHANNEL_TLS); 177 } 178