options += [
"--ro-bind", context.config.secure_boot_certificate, workdir(context.config.secure_boot_certificate), # noqa: E501
] # fmt: skip
- if context.config.secure_boot_key_source.type == KeySourceType.engine:
+ if context.config.secure_boot_key_source.type != KeySourceType.file:
cmd += ["--private-key-source", str(context.config.secure_boot_key_source)]
options += ["--bind", "/run", "/run"]
if context.config.secure_boot_key.exists():
`SignExpectedPcr=` is also used. When `SecureBootKeySource=` is specified,
the input type depends on the source.
-`SecureBootKeySource=`, `--secure-boot-key-source=`
-: Source of `SecureBootKey=`, to support OpenSSL engines. E.g.:
- `--secure-boot-key-source=engine:pkcs11`
-
`SecureBootCertificate=`, `--secure-boot-certificate=`
: Path to the X.509 file containing the certificate for the signed
UEFI kernel image, if `SecureBoot=` is used.
partition is added with systemd-repart. When `VerityKeySource=` is specified, the input type depends on
the source.
-`VerityKeySource=`, `--verity-key-source=`
-: Source of `VerityKey=`, to support OpenSSL engines. E.g.:
- `--verity-key-source=engine:pkcs11`
-
`VerityCertificate=`, `--verity-certificate=`
: Path to the X.509 file containing the certificate for signing the verity signature, if a verity signature
partition is added with systemd-repart.
When `SignExpectedPcrKeySource=` is specified, the input type depends on
the source.
-`SignExpectedPcrKeySource=`, `--sign-expected-key-source=`
-: Source of `VerityKey=`, to support OpenSSL engines. E.g.:
- `--verity-key-source=engine:pkcs11`
-
`SignExpectedPcrCertificate=`, `--sign-expected-pcr-certificate=`
: Path to the X.509 file containing the certificate for signing the expected PCR signatures.
+`SecureBootKeySource=`, `--secure-boot-key-source=`, `VerityKeySource=`, `--verity-key-source=`, `SignExpectedPcrKeySource=`, `--sign-expected-key-source=`
+: The source of the corresponding private key `SecureBootKey=`, to support OpenSSL engines and providers,
+ e.g. `--secure-boot-key-source=engine:pkcs11` or `--secure-boot-key-source=provider:pkcs11`. Note that
+ providers are currently only supported for the verity key.
+
`Passphrase=`, `--passphrase`
: Specify the path to a file containing the passphrase to use for LUKS
encryption. It should contain the passphrase literally, and not end in