docs: Add to gdbstub documentation the PhyMemMode
[qemu.git] / include / authz / pamacct.h
blobf3a7ef10118e994206a11e22d4ff85e6e505987b
1 /*
2 * QEMU PAM authorization driver
4 * Copyright (c) 2018 Red Hat, Inc.
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
21 #ifndef QAUTHZ_PAMACCT_H
22 #define QAUTHZ_PAMACCT_H
24 #include "authz/base.h"
27 #define TYPE_QAUTHZ_PAM "authz-pam"
29 #define QAUTHZ_PAM_CLASS(klass) \
30 OBJECT_CLASS_CHECK(QAuthZPAMClass, (klass), \
31 TYPE_QAUTHZ_PAM)
32 #define QAUTHZ_PAM_GET_CLASS(obj) \
33 OBJECT_GET_CLASS(QAuthZPAMClass, (obj), \
34 TYPE_QAUTHZ_PAM)
35 #define QAUTHZ_PAM(obj) \
36 OBJECT_CHECK(QAuthZPAM, (obj), \
37 TYPE_QAUTHZ_PAM)
39 typedef struct QAuthZPAM QAuthZPAM;
40 typedef struct QAuthZPAMClass QAuthZPAMClass;
43 /**
44 * QAuthZPAM:
46 * This authorization driver provides a PAM mechanism
47 * for granting access by matching user names against a
48 * list of globs. Each match rule has an associated policy
49 * and a catch all policy applies if no rule matches
51 * To create an instance of this class via QMP:
53 * {
54 * "execute": "object-add",
55 * "arguments": {
56 * "qom-type": "authz-pam",
57 * "id": "authz0",
58 * "parameters": {
59 * "service": "qemu-vnc-tls"
60 * }
61 * }
62 * }
64 * The driver only uses the PAM "account" verification
65 * subsystem. The above config would require a config
66 * file /etc/pam.d/qemu-vnc-tls. For a simple file
67 * lookup it would contain
69 * account requisite pam_listfile.so item=user sense=allow \
70 * file=/etc/qemu/vnc.allow
72 * The external file would then contain a list of usernames.
73 * If x509 cert was being used as the username, a suitable
74 * entry would match the distinguish name:
76 * CN=laptop.berrange.com,O=Berrange Home,L=London,ST=London,C=GB
78 * On the command line it can be created using
80 * -object authz-pam,id=authz0,service=qemu-vnc-tls
83 struct QAuthZPAM {
84 QAuthZ parent_obj;
86 char *service;
90 struct QAuthZPAMClass {
91 QAuthZClass parent_class;
95 QAuthZPAM *qauthz_pam_new(const char *id,
96 const char *service,
97 Error **errp);
99 #endif /* QAUTHZ_PAMACCT_H */