-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
shim-15.8 for opsi #360
Comments
Updated the tag to be reviewed. |
Please, update the issue, so it reflects the current shim 15.8. |
Hi @aronowski the issue is updated as you requested. |
Thank you. Although the GitHub issue title still mentions 15.7 - I'd update it to prevent a reviewer from accidentally closing it. |
Done, thanks for the quick hint |
Reviewing. The application looks alright apart from only one error I managed to spot: the checksum provided in the current README doesn't match the one the current binary has. Notes: There is No NX support, as the kernel 6.6 is not considered NX-ready. - OK |
THank you for your first view on our issue @aronowski We just updated the README.md with the proper hash. This ssems to have been forgotten when updating the issue to 15.8. The tag links is also updated to reflect this change. |
Awesome! |
Hi! Mostly looks great, I just have couple of questions for you. Review of Shim 15.8 for opsi: opsi-shim-x86_64-20240215OK
Issues / queries
|
Thanks for your review so far. About your issues/queries As for the grub, when the issue was opened initially we were using grub2-2.12-rc1. Internally we have already switched the grub2 buildprocess to use grub2-12. Right now we use vanilla grub2-2.12 but we are going to add patches from the official SUSE patchset in the near future, but we will first look deeper in what we need Regards |
Thanks for the quick response!
Hmmm. So you have an embedded CA cert in your shim, then you're using
OK, cool. :-) |
The hardware token contains multiple certificates. Our EV certificate and our Secure Boot certificate/keys. The EV certificate itself was used to initially sign the testfile for Microsoft when joining the Microsoft Developers Program for the UEFI submissions and is NOT used to sign Kernel or Grub2 images. The Secure Boot keys are used to sign our Kernel and Grub2 images. Those Secure Boot keys match the embedded CA Cert in our shim submission. |
Thanks for explaining, that's much clearer now. |
I think you're all good here! |
Confirm the following are included in your repo, checking each box:
not used
no extra patches used
What is the link to your tag in a repo cloned from rhboot/shim-review?
https://github.com/opsi-org/shim-review/tree/opsi-shim-x86_64-20240215
What is the SHA256 hash of your final SHIM binary?
141cd6016ba62586059e2ab453d2d07a2e1b97516b7838dace3da71bdcdd58c5
What is the link to your previous shim review request (if any, otherwise N/A)?
#310
#245
#29
The text was updated successfully, but these errors were encountered: