Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package shim for openSUSE:Factory checked in 
at 2021-05-02 18:35:23
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/shim (Old)
 and      /work/SRC/openSUSE:Factory/.shim.new.1947 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "shim"

Sun May  2 18:35:23 2021 rev:94 rq:888995 version:15.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/shim/shim.changes        2021-04-10 
15:26:29.766316259 +0200
+++ /work/SRC/openSUSE:Factory/.shim.new.1947/shim.changes      2021-05-02 
18:35:40.793059319 +0200
@@ -1,0 +2,8 @@
+Wed Apr 28 09:28:30 UTC 2021 - Gary Ching-Pang Lin <g...@suse.com>
+
+- Split the keys in vendor-dbx.bin to vendor-dbx-sles and
+  vendor-dbx-opensuse for shim-sles and shim-opensuse to reduce
+  the size of MokListXRT (bsc#1185261) 
+  + Also update generate-vendor-dbx.sh in dbx-cert.tar.xz
+
+-------------------------------------------------------------------

New:
----
  vendor-dbx-opensuse.bin
  vendor-dbx-sles.bin

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ shim.spec ++++++
--- /var/tmp/diff_new_pack.ytlyp9/_old  2021-05-02 18:35:41.493056336 +0200
+++ /var/tmp/diff_new_pack.ytlyp9/_new  2021-05-02 18:35:41.497056319 +0200
@@ -60,8 +60,10 @@
 Source12:       signature-opensuse.aarch64.asc
 Source13:       signature-sles.aarch64.asc
 Source50:       dbx-cert.tar.xz
-# vendor-dbx.bin is generated by generate-vendor-dbx.sh in dbx-cert.tar.xz
+# vendor-dbx*.bin are generated by generate-vendor-dbx.sh in dbx-cert.tar.xz
 Source51:       vendor-dbx.bin
+Source52:       vendor-dbx-sles.bin
+Source53:       vendor-dbx-opensuse.bin
 Source99:       SIGNATURE_UPDATE.txt
 # PATCH-FIX-SUSE shim-arch-independent-names.patch g...@suse.com -- Use the 
Arch-independent names
 Patch1:         shim-arch-independent-names.patch
@@ -111,7 +113,6 @@
 %description -n shim-debugsource
 The source code of UEFI shim loader
 
-
 %prep
 %setup -q
 %patch1 -p1
@@ -165,6 +166,7 @@
     if test "$suffix" = "opensuse"; then
        cert=%{SOURCE2}
        verify='openSUSE Secure Boot CA1'
+       vendor_dbx=%{SOURCE53}
 %ifarch x86_64
        signature=%{SOURCE1}
 %else
@@ -176,6 +178,7 @@
     elif test "$suffix" = "sles"; then
        cert=%{SOURCE4}
        verify='SUSE Linux Enterprise Secure Boot CA1'
+       vendor_dbx=%{SOURCE52}
 %ifarch x86_64
        signature=%{SOURCE11}
 %else
@@ -187,6 +190,7 @@
     elif test "$suffix" = "devel"; then
        cert=%{_sourcedir}/_projectcert.crt
        verify=`openssl x509 -in "$cert" -noout -email`
+       vendor_dbx=%{SOURCE51}
        signature=''
        test -e "$cert" || continue
     else
@@ -198,7 +202,7 @@
     make RELEASE=0 SHIMSTEM=shim \
          VENDOR_CERT_FILE=shim-$suffix.der ENABLE_HTTPBOOT=1 \
          DEFAULT_LOADER="\\\\\\\\grub.efi" \
-         VENDOR_DBX_FILE=%{SOURCE51} \
+         VENDOR_DBX_FILE=$vendor_dbx \
          shim.efi.debug shim.efi
     #
     # assert correct certificate embedded


++++++ dbx-cert.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/dbx-cert/generate-vendor-dbx.sh 
new/dbx-cert/generate-vendor-dbx.sh
--- old/dbx-cert/generate-vendor-dbx.sh 2020-07-10 09:18:35.508195647 +0200
+++ new/dbx-cert/generate-vendor-dbx.sh 2021-04-28 11:21:35.387363178 +0200
@@ -3,16 +3,20 @@
 # This script goes through all .crt files in this directory and stores
 # them in EFI signature database format.
 
-OUTPUT=vendor-dbx.bin
+FLAVORS="openSUSE SLES"
 
-mkdir tmp
+for flavor in ${FLAVORS}; do
+       OUTPUT=vendor-dbx-$(echo ${flavor} | tr '[:upper:]' '[:lower:]').bin
 
-for cert in *.crt
-do
-       BASENAME=`basename $cert .crt`
-       openssl x509 -in $cert -outform der -out tmp/${BASENAME}.der
-       efisiglist -a -c tmp/${BASENAME}.der -o tmp/${BASENAME}.bin
-done
+       mkdir tmp
+
+       for cert in ${flavor}-*.crt
+       do
+               BASENAME=`basename $cert .crt`
+               openssl x509 -in $cert -outform der -out tmp/${BASENAME}.der
+               efisiglist -a -c tmp/${BASENAME}.der -o tmp/${BASENAME}.bin
+       done
 
-cat tmp/*bin > $OUTPUT
-rm -rf tmp
+       cat tmp/*bin > $OUTPUT
+       rm -rf tmp
+done

Reply via email to