Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP7:GA
libvirt.11701
e56ff8bc-prefer-camelCase-launchSecurity.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File e56ff8bc-prefer-camelCase-launchSecurity.patch of Package libvirt.11701
commit e56ff8bc72be884213c27036d0623fab6a7b28ec Author: Ján Tomko <jtomko@redhat.com> Date: Tue Jun 12 13:50:25 2018 +0200 conf: prefer camelCase for launchSecurity Adjust the documentation, parser and tests to change: launch-security -> launchSecurity reduced-phys-bits -> reducedPhysBits dh-cert -> dhCert Also fix the headline in formatdomain.html to be more generic, and some leftover closing elements in the documentation. Signed-off-by: Ján Tomko <jtomko@redhat.com> Reviewed-by: Brijesh Singh <brijesh.singh@amd.com> Tested-by: Brijesh Singh <brijesh.singh@amd.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com> Index: libvirt-4.0.0/docs/formatdomain.html.in =================================================================== --- libvirt-4.0.0.orig/docs/formatdomain.html.in +++ libvirt-4.0.0/docs/formatdomain.html.in @@ -8092,12 +8092,12 @@ qemu-kvm -net nic,model=? /dev/null <p>Note: DEA/TDEA is synonymous with DES/TDES.</p> - <h3><a id="sev">Secure Encrypted Virtualization (SEV)</a></h3> + <h3><a id="sev">Launch Security</a></h3> <p> - The contents of the <code><launch-security type='sev'></code> element + The contents of the <code><launchSecurity type='sev'></code> element is used to provide the guest owners input used for creating an encrypted - VM using the AMD SEV feature. + VM using the AMD SEV feature (Secure Encrypted Virtualization). SEV is an extension to the AMD-V architecture which supports running encrypted virtual machine (VMs) under the control of KVM. Encrypted @@ -8114,13 +8114,13 @@ qemu-kvm -net nic,model=? /dev/null <pre> <domain> ... - <launch-security type='sev'> + <launchSecurity type='sev'> <policy> 0x0001 </policy> <cbitpos> 47 </cbitpos> - <reduced-phys-bits> 1 </reduced-phys-bits> + <reducedPhysBits> 1 </reducedPhysBits> + <dhCert> RBBBSDDD=FDDCCCDDDG </dhCert> <session> AAACCCDD=FFFCCCDSDS </session> - <dh-cert> RBBBSDDD=FDDCCCDDDG </dh> - </sev> + </launchSecurity> ... </domain> </pre> @@ -8132,8 +8132,8 @@ qemu-kvm -net nic,model=? /dev/null hypervisor dependent and can be obtained through the <code>sev</code> element from the domain capabilities. </dd> - <dt><code>reduced-phys-bits</code></dt> - <dd>The required <code>reduced-phys-bits</code> element provides the physical + <dt><code>reducedPhysBits</code></dt> + <dd>The required <code>reducedPhysBits</code> element provides the physical address bit reducation. Similar to <code>cbitpos</code> the value of <code> reduced-phys-bit</code> is hypervisor dependent and can be obtained through the <code>sev</code> element from the domain capabilities. @@ -8192,8 +8192,8 @@ qemu-kvm -net nic,model=? /dev/null </table> </dd> - <dt><code>dh-cert</code></dt> - <dd>The optional <code>dh-cert</code> element provides the guest owners + <dt><code>dhCert</code></dt> + <dd>The optional <code>dhCert</code> element provides the guest owners base64 encoded Diffie-Hellman (DH) key. The key is used to negotiate a master secret key between the SEV firmware and guest owner. This master secret key is then used to establish a trusted channel between SEV Index: libvirt-4.0.0/docs/schemas/domaincommon.rng =================================================================== --- libvirt-4.0.0.orig/docs/schemas/domaincommon.rng +++ libvirt-4.0.0/docs/schemas/domaincommon.rng @@ -78,7 +78,7 @@ <ref name='keywrap'/> </optional> <optional> - <ref name='launch-security'/> + <ref name='launchSecurity'/> </optional> </interleave> </element> @@ -439,8 +439,8 @@ </element> </define> - <define name="launch-security"> - <element name="launch-security"> + <define name="launchSecurity"> + <element name="launchSecurity"> <attribute name="type"> <value>sev</value> </attribute> @@ -448,7 +448,7 @@ <element name="cbitpos"> <data type='unsignedInt'/> </element> - <element name="reduced-phys-bits"> + <element name="reducedPhysBits"> <data type='unsignedInt'/> </element> <element name="policy"> @@ -460,7 +460,7 @@ </element> </optional> <optional> - <element name="dh-cert"> + <element name="dhCert"> <data type="string"/> </element> </optional> Index: libvirt-4.0.0/src/conf/domain_conf.c =================================================================== --- libvirt-4.0.0.orig/src/conf/domain_conf.c +++ libvirt-4.0.0/src/conf/domain_conf.c @@ -15445,7 +15445,7 @@ virDomainSEVDefParseXML(xmlNodePtr sevNo if (!(type = virXMLPropString(sevNode, "type"))) { virReportError(VIR_ERR_XML_ERROR, "%s", - _("missing launch-security type")); + _("missing launch security type")); goto error; } @@ -15457,33 +15457,33 @@ virDomainSEVDefParseXML(xmlNodePtr sevNo case VIR_DOMAIN_LAUNCH_SECURITY_LAST: default: virReportError(VIR_ERR_XML_ERROR, - _("unsupported launch-security type '%s'"), + _("unsupported launch security type '%s'"), type); goto error; } if (virXPathUInt("string(./cbitpos)", ctxt, &def->cbitpos) < 0) { virReportError(VIR_ERR_XML_ERROR, "%s", - _("failed to get launch-security cbitpos")); + _("failed to get launch security cbitpos")); goto error; } - if (virXPathUInt("string(./reduced-phys-bits)", ctxt, + if (virXPathUInt("string(./reducedPhysBits)", ctxt, &def->reduced_phys_bits) < 0) { virReportError(VIR_ERR_XML_ERROR, "%s", - _("failed to get launch-security reduced-phys-bits")); + _("failed to get launch security reduced-phys-bits")); goto error; } if (virXPathULongHex("string(./policy)", ctxt, &policy) < 0) { virReportError(VIR_ERR_XML_ERROR, "%s", - _("failed to get launch-security policy")); + _("failed to get launch security policy")); goto error; } def->policy = policy; - if ((tmp = virXPathString("string(./dh-cert)", ctxt))) { + if ((tmp = virXPathString("string(./dhCert)", ctxt))) { if (VIR_STRDUP(def->dh_cert, tmp) < 0) goto error; @@ -19982,7 +19982,7 @@ virDomainDefParseXML(xmlDocPtr xml, VIR_FREE(nodes); /* Check for SEV feature */ - if ((node = virXPathNode("./launch-security", ctxt)) != NULL) { + if ((node = virXPathNode("./launchSecurity", ctxt)) != NULL) { def->sev = virDomainSEVDefParseXML(node, ctxt); if (!def->sev) goto error; @@ -25836,22 +25836,22 @@ virDomainSEVDefFormat(virBufferPtr buf, if (!sev) return; - virBufferAsprintf(buf, "<launch-security type='%s'>\n", + virBufferAsprintf(buf, "<launchSecurity type='%s'>\n", virDomainLaunchSecurityTypeToString(sev->sectype)); virBufferAdjustIndent(buf, 2); virBufferAsprintf(buf, "<cbitpos>%d</cbitpos>\n", sev->cbitpos); - virBufferAsprintf(buf, "<reduced-phys-bits>%d</reduced-phys-bits>\n", + virBufferAsprintf(buf, "<reducedPhysBits>%d</reducedPhysBits>\n", sev->reduced_phys_bits); virBufferAsprintf(buf, "<policy>0x%04x</policy>\n", sev->policy); if (sev->dh_cert) - virBufferEscapeString(buf, "<dh-cert>%s</dh-cert>\n", sev->dh_cert); + virBufferEscapeString(buf, "<dhCert>%s</dhCert>\n", sev->dh_cert); if (sev->session) virBufferEscapeString(buf, "<session>%s</session>\n", sev->session); virBufferAdjustIndent(buf, -2); - virBufferAddLit(buf, "</launch-security>\n"); + virBufferAddLit(buf, "</launchSecurity>\n"); } Index: libvirt-4.0.0/tests/genericxml2xmlindata/launch-security-sev.xml =================================================================== --- libvirt-4.0.0.orig/tests/genericxml2xmlindata/launch-security-sev.xml +++ libvirt-4.0.0/tests/genericxml2xmlindata/launch-security-sev.xml @@ -14,11 +14,11 @@ <on_crash>destroy</on_crash> <devices> </devices> - <launch-security type='sev'> + <launchSecurity type='sev'> <cbitpos>47</cbitpos> - <reduced-phys-bits>1</reduced-phys-bits> + <reducedPhysBits>1</reducedPhysBits> <policy>0x0001</policy> - <dh-cert>AQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAA</dh-cert> + <dhCert>AQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAA</dhCert> <session>IHAVENOIDEABUTJUSTPROVIDINGASTRING</session> - </launch-security> + </launchSecurity> </domain> Index: libvirt-4.0.0/tests/qemuxml2argvdata/launch-security-sev.xml =================================================================== --- libvirt-4.0.0.orig/tests/qemuxml2argvdata/launch-security-sev.xml +++ libvirt-4.0.0/tests/qemuxml2argvdata/launch-security-sev.xml @@ -27,11 +27,11 @@ <input type='keyboard' bus='ps2'/> <memballoon model='none'/> </devices> - <launch-security type='sev'> + <launchSecurity type='sev'> <cbitpos>47</cbitpos> - <reduced-phys-bits>1</reduced-phys-bits> + <reducedPhysBits>1</reducedPhysBits> <policy>0x0001</policy> - <dh-cert>AQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAA</dh-cert> + <dhCert>AQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAAAQAAAAAOAAA</dhCert> <session>IHAVENOIDEABUTJUSTPROVIDINGASTRING</session> - </launch-security> + </launchSecurity> </domain>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor