04 May 2022 12:06:29 UTC
- Distribution: Sys-Virt
- Source (raw)
- Browse (raw)
- How to Contribute
- Clone repository
- Issues (1)
- KwaliteeBus factor: 1
- License: gpl_1
- Perl: v5.16.0
- Activity24 month
- Download (165.1KB)
- MetaCPAN Explorer
- Subscribe to distribution
- This version
- Latest version
- SEE ALSO
Sys::Virt::Secret - Represent & manage a libvirt secret
Sys::Virt::Secretmodule represents a secret managed by the virtual machine monitor.
- my $uuid = $sec->get_uuid()
Returns a 16 byte long string containing the raw globally unique identifier (UUID) for the secret.
- my $uuid = $sec->get_uuid_string()
Returns a printable string representation of the raw UUID, in the format 'XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX'.
- my $type = $sec->get_usage_type()
Returns the usage type of this secret. The usage type determines the format of the unique identifier for this secret.
- my $id = $sec->get_usage_id()
Returns the identifier of the object with which the secret is to be used. For secrets with a usage type of volume, the identifier is the fully qualfied path.
- my $xml = $sec->get_xml_description()
Returns an XML document containing a complete description of the secret's configuration
Remove the configuration associated with a secret previously defined with the
define_secretmethod in Sys::Virt.
- $bytes = $sec->get_value()
Returns the raw bytes for the value of this secret, or undef if there is no value stored with the secret.
Sets the value for the secret to be
This section documents constants that are used with various APIs described above
The following constants refer to the different usage types
The constant for secrets which are not assigned for use with a particular object
The constant for secrets which are to be used for storage volume encryption. The usage ID for secrets will refer to the fully qualified volume path.
The constant for secrets which are to be used for authenticating to CEPH storage volumes. The usage ID for secrets will refer to the server name.
The constant for secrets which are to be used for authenticating to iSCSI storage volumes. The usage ID for secrets will refer to the server name.
The constant for secrets which are to be used for authenticating for the TLS environment. The usage ID for the secret can be any name. The UUID for the secret will be used by the hypervisor to fetch the secret value.
The constant for secrets which are to be used for encrypting virtual TPM state. The usage ID for the secret will refer to the TPM path. The UUID for the secret will be used by the hypervisor to fetch the secret value.
The following constants are used to filter object lists
Include any secrets marked as ephemeral
Include any secrets not marked as ephemeral
Include any secrets marked as private
Include any secrets not marked as private
The following constants can be used to control the behaviour of secret define operations
Secret lifecycle events
Secret value change events
The following constants allow secret lifecycle change events to be interpreted. The events contain both a state change, and a reason though the reason is currently unused.
Indicates that a persistent configuration has been defined for the secret.
The persistent configuration has gone away
Daniel P. Berrange <firstname.lastname@example.org>
Copyright (C) 2006-2009 Red Hat Copyright (C) 2006-2007 Daniel P. Berrange
This program is free software; you can redistribute it and/or modify it under the terms of either the GNU General Public License as published by the Free Software Foundation (either version 2 of the License, or at your option any later version), or, the Artistic License, as specified in the Perl README file.