On Wed, Oct 26, 2022 at 03:47:12PM +0300, Dov Murik wrote:
On 19/10/2022 13:17, berrange at
redhat.com (Daniel P. Berrangé) wrote:
> It is possible to build OVMF for SEV with an embedded Grub that can
> fetch LUKS disk secrets. This adds support for injecting secrets in
> the required format.
>
> Signed-off-by: Daniel P. Berrang? <berrange at redhat.com>
> ---
> docs/manpages/virt-qemu-sev-validate.rst | 66 ++++++++++
> tools/virt-qemu-sev-validate | 156 +++++++++++++++++++++--
> 2 files changed, 213 insertions(+), 9 deletions(-)
>
> diff --git a/docs/manpages/virt-qemu-sev-validate.rst
b/docs/manpages/virt-qemu-sev-validate.rst
> index fcc13d68c8..7542bea9aa 100644
> --- a/docs/manpages/virt-qemu-sev-validate.rst
> +++ b/docs/manpages/virt-qemu-sev-validate.rst
> @@ -187,6 +187,29 @@ understand any configuration mistakes that have been made. If
the
> will be skipped. The result is that the validation will likely be reported as
> failed.
>
> +Secret injection options
> +------------------------
> +
> +These options provide a way to inject a secret if validation of the
> +launch measurement passes.
> +
> +``--disk-password PATH``
> +
> +Path to a file containing the password to use to unlock the LUKS container
> +for the guest disk.
Maybe add an option to add custom secret entries:
--add-secret-entry GUID:PATH
?
Yeah, I was just thinking the same. I'll respin with --disk-password
removed, and instead allow
--inject GUID:PATH
--inject NAME:PATH
where 'NAME' can refer to any well known GUIDs, so most fo the time in
the common case people can do:
--inject luks-key:/some/path
instead of
--inject IMPOSSIBLE-TO-RMEMBER-UUID:/some/poath
and of course allow --inject multiple times too.
With regards,
Daniel
--
|:
https://berrange.com -o-
https://www.flickr.com/photos/dberrange :|
|:
https://libvirt.org -o-
https://fstop138.berrange.com :|
|:
https://entangle-photo.org -o-
https://www.instagram.com/dberrange :|