mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-11-03 20:01:16 +00:00
ecfc4094d8
The storage driver was wired up to support creating raw volumes in LUKS format, but was never adapted to support LUKS-in-qcow2. This is trivial as it merely requires the encryption properties to be prefixed with the "encrypt." prefix, and "encrypt.format=luks" when creating the volume. Reviewed-by: Michal Privoznik <mprivozn@redhat.com> Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
19 lines
711 B
Plaintext
19 lines
711 B
Plaintext
qemu-img \
|
|
create \
|
|
-f qcow2 \
|
|
--object secret,id=OtherDemoLuks.img_encrypt0,file=/path/to/secretFile \
|
|
-o encrypt.format=luks,encrypt.key-secret=OtherDemoLuks.img_encrypt0,\
|
|
compat=0.10 /var/lib/libvirt/images/OtherDemoLuks.img 5242880K
|
|
qemu-img \
|
|
convert \
|
|
--image-opts \
|
|
-n \
|
|
--target-image-opts \
|
|
--object secret,id=OtherDemoLuks.img_encrypt0,file=/path/to/secretFile \
|
|
--object secret,id=OtherDemoLuksConvert.img_encrypt0,\
|
|
file=/path/to/inputSecretFile driver=qcow2,\
|
|
file.filename=/var/lib/libvirt/images/OtherDemoLuksConvert.img,\
|
|
encrypt.key-secret=OtherDemoLuksConvert.img_encrypt0 driver=qcow2,\
|
|
file.filename=/var/lib/libvirt/images/OtherDemoLuks.img,\
|
|
encrypt.key-secret=OtherDemoLuks.img_encrypt0
|