[pve-devel] [PATCH qemu-server] fix #1811: allow VM.Config.HWType to add serial socket

David Limbeck d.limbeck at proxmox.com
Fri Nov 30 11:07:16 CET 2018


allow serial sockets to be added if VM.Config.HWType permission is
satisfied but deny serial devices for anyone other than root
(raise_perm_exc). this allows PVEVMAdmins to add serial consoles.

Signed-off-by: David Limbeck <d.limbeck at proxmox.com>
---
 PVE/API2/Qemu.pm | 11 +++++++++++
 1 file changed, 11 insertions(+)

diff --git a/PVE/API2/Qemu.pm b/PVE/API2/Qemu.pm
index c82e2fa..8ae4da2 100644
--- a/PVE/API2/Qemu.pm
+++ b/PVE/API2/Qemu.pm
@@ -310,6 +310,7 @@ my $check_vm_modify_config_perm = sub {
 	next if PVE::QemuServer::is_valid_drivename($opt);
 	next if $opt eq 'cdrom';
 	next if $opt =~ m/^unused\d+$/;
+	next if $opt =~ m/^serial[0-3]$/;
 
 	if ($cpuoptions->{$opt} || $opt =~ m/^numa\d+$/) {
 	    $rpcenv->check_vm_perm($authuser, $vmid, $pool, ['VM.Config.CPU']);
@@ -1108,6 +1109,16 @@ my $update_vm_api  = sub {
 
     &$check_vm_modify_config_perm($rpcenv, $authuser, $vmid, undef, [keys %$param]);
 
+    foreach my $opt (keys %$param) {
+	if ($opt =~ m/serial[0-3]/) {
+	    if ($param->{$opt} eq 'socket') {
+		$rpcenv->check_vm_perm($authuser, $vmid, undef, ['VM.Config.HWType']);
+	    } else {
+		raise_perm_exc('user root at pam required for serial devices') if ($authuser ne 'root at pam');
+	    }
+	}
+    }
+
     &$check_storage_access($rpcenv, $authuser, $storecfg, $vmid, $param);
 
     my $updatefn =  sub {
-- 
2.11.0





More information about the pve-devel mailing list