File: key-option.pod

package info (click to toggle)
guestfs-tools 1.52.3-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 69,236 kB
  • sloc: ansic: 15,698; ml: 15,621; sh: 7,396; xml: 5,478; makefile: 3,601; perl: 1,535; lex: 135; yacc: 128; python: 80
file content (41 lines) | stat: -rw-r--r-- 1,013 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
=item B<--key> SELECTOR

Specify a key for LUKS, to automatically open a LUKS device when using
the inspection.

=over 4

=item B<--key> NAMEB<:key:>KEY_STRING

=item B<--key> UUIDB<:key:>KEY_STRING

=item B<--key> B<all:key:>KEY_STRING

C<NAME> is the libguestfs device name (eg. C</dev/sda1>).  C<UUID> is
the device UUID.  C<all> means try the key against any encrypted
device.

Use the specified C<KEY_STRING> as passphrase.

=item B<--key> NAMEB<:file:>FILENAME

=item B<--key> UUIDB<:file:>FILENAME

=item B<--key> B<all:file:>FILENAME

Read the passphrase from F<FILENAME>.

=item B<--key> NAMEB<:clevis>

=item B<--key> UUIDB<:clevis>

=item B<--key> B<all:clevis>

Attempt passphrase-less unlocking for the device with Clevis, over the
network.  Please refer to L<guestfs(3)/ENCRYPTED DISKS> for more
information on network-bound disk encryption (NBDE).

Note that if any such option is present on the command line, QEMU user
networking will be automatically enabled for the libguestfs appliance.

=back