On Tue, Apr 19, 2022 at 11:40:49AM -0500, Jonathon Jongsma wrote:
Well, As far as I can tell, there is no valid XML for exercising
http auth. The schema for http(s) sources does not include any
<auth> element [1]. And the schema for the <auth> element [2]
requires a <secret> element with a required 'type' attribute, and
the only choices for 'type' are 'ceph' or 'iscsi', neither of
which
apply to http authentication.
So it looks to me like http auth was never supported, rather than a
regression. It also seems that it would require some additional
schema changes to support this.
[1]
https://gitlab.com/libvirt/libvirt/-/blob/136b821f183deb0b58c571211f69179...
[
2]https://gitlab.com/libvirt/libvirt/-/blob/136b821f183deb0b58c571211f691...
As noted in my other reply, simple http auth is not practically very
useful for the kinds of sources we want to access, so if libvirt never
supported it I wouldn't bother adding that complexity now.
>>3. blockdev-create
...
nbdkit support for creating SSH remote files is upstream now:
https://gitlab.com/nbdkit/nbdkit/-/commit/0793f30b1071753532362b2ebf9cb81...
And now I notice that we do not actually have support for
'ssh'
network disks in our xml schema either [3]. The
VIR_STORAGE_NET_PROTOCOL_SSH enum value was originally added with a
comment that it allows using the ssh protocol in backing chains.
I've also seen some commits indicating that some of the support for
ssh disk sources may be related to libguestfs usage in some way.
cc'ing Rich and Peter in case they can add any historical context
here.
[3]
https://gitlab.com/libvirt/libvirt/-/blob/136b821f183deb0b58c571211f69179...
Peter will remember this better, but IIRC the history was that
virt-v2v used ssh protocol in backing files when accessing
certain disks, ie:
- qemu-img create -b ssh:blah overlay.qcow2
- use libvirt to open overlay.qcow2
Originally libvirt didn't care about this detail, but later libvirt
was changed so that it validated the backing chain. Peter added
support for ssh in the backing chain.
Now actual support for protocol='ssh' (as in, the main drive, not only
in the backing chain), while not currently documented, seems to be
sort of working. libguestfs will try to create a protocol='ssh' drive
through libvirt if you ask it:
$ guestfish --format=raw -a ssh://foo/var/tmp/newdisk run
libguestfs: error: could not create appliance through libvirt.
...
Original error from libvirt: internal error: qemu unexpectedly closed the monitor:
2022-04-19T17:19:47.096384Z qemu-kvm: -blockdev
{"driver":"ssh","path":"/var/tmp/newdisk","server":{"host":"foo","port":"22"},"node-name":"libvirt-2-storage","cache":{"direct":false,"no-flush":false},"auto-read-only":true,"discard":"unmap"}:
failed to authenticate using publickey authentication and the identities held by your
ssh-agent [code=1 int1=-1]
If you add -vx to the guestfish command you can see the libvirt XML
fragment that was used:
<disk device="disk" type="network">
<source protocol="ssh" name="/var/tmp/newdisk">
<host name="foo"/>
</source>
<target dev="sda" bus="scsi"/>
<driver name="qemu" type="raw"
cache="writeback"/>
<address type="drive" controller="0" bus="0"
target="0" unit="0"/>
</disk>
which looks plausible. I don't understand why it doesn't work,
because I've got my agent set up correctly. I wonder if it's not
passing SSH_AUTH_SOCK through to session virtqemud?
Rich.
--
Richard Jones, Virtualization Group, Red Hat
http://people.redhat.com/~rjones
Read my programming and virtualization blog:
http://rwmj.wordpress.com
libguestfs lets you edit virtual machines. Supports shell scripting,
bindings from many languages.
http://libguestfs.org