X-Git-Url: https://git.proxmox.com/?p=pve-access-control.git;a=blobdiff_plain;f=PVE%2FRPCEnvironment.pm;h=7532e9eca0245dd76f11d75dcd3c9c85081c840f;hp=14e6849cc411ec43f14b557e0be728532a053a2f;hb=3030a17643d9f303d1d1820e972f9ed9ce74fdd2;hpb=4fb3cc5841d7b7ba08d108182b19882b23a58fa3 diff --git a/PVE/RPCEnvironment.pm b/PVE/RPCEnvironment.pm index 14e6849..7532e9e 100644 --- a/PVE/RPCEnvironment.pm +++ b/PVE/RPCEnvironment.pm @@ -14,6 +14,7 @@ use PVE::INotify; use PVE::Cluster; use PVE::ProcFSTools; use PVE::AccessControl; +use Cwd 'abs_path'; use CGI; # we use this singleton class to pass RPC related environment values @@ -282,6 +283,31 @@ sub check_vm_perm { return $self->check_full($user, "/vms/$vmid", $privs, $any, $noerr); }; +sub check_volume_access { + my ($self, $user, $storecfg, $vmid, $volid) = @_; + + # test if we have read access to volid + + my $path; + my ($sid, $volname) = PVE::Storage::parse_volume_id($volid, 1); + if ($sid) { + my ($ownervm, $vtype); + ($path, $ownervm, $vtype) = PVE::Storage::path($storecfg, $volid); + if ($vtype eq 'iso' || $vtype eq 'vztmpl') { + # we simply allow access + } elsif (!$ownervm || ($ownervm != $vmid)) { + # allow if we are Datastore administrator + $self->check($user, "/storage/$sid", ['Datastore.Allocate']); + } + } else { + die "Only root can pass arbitrary filesystem paths." + if $user ne 'root@pam'; + + $path = abs_path($volid); + } + return $path; +} + sub is_group_member { my ($self, $group, $user) = @_; @@ -397,12 +423,12 @@ sub exec_api2_perm_check { } return 1; } elsif ($test eq 'userid-param') { - my ($userid, undef, $realm) = verify_username($param->{userid}); - return if !$self->check_user_exist($userid, $noerr); + my ($userid, undef, $realm) = PVE::AccessControl::verify_username($param->{userid}); my ($t, $subtest) = @$check; die "missing parameters" if !$subtest; if ($subtest eq 'self') { - return 1 if $username eq 'userid'; + return 0 if !$self->check_user_exist($userid, $noerr); + return 1 if $username eq $userid; return 0 if $noerr; raise_perm_exc(); } elsif ($subtest eq 'Realm.AllocateUser') { @@ -794,14 +820,14 @@ sub check_worker { # STDOUT,STDERR are redirected to the filename returned by upid_decode # NOTE: we simulate running in foreground if ($self->{type} eq 'cli') sub fork_worker { - my ($self, $dtype, $id, $user, $function) = @_; + my ($self, $dtype, $id, $user, $function, $background) = @_; $dtype = 'unknown' if !defined ($dtype); $id = '' if !defined ($id); $user = 'root@pve' if !defined ($user); - my $sync = $self->{type} eq 'cli' ? 1 : 0; + my $sync = ($self->{type} eq 'cli' && !$background) ? 1 : 0; local $SIG{INT} = local $SIG{QUIT} =