Script 'mail_helper' called by obssrc
Hello community,
here is the log from the commit of package dracut-pcr-signature for
openSUSE:Factory checked in at 2026-05-08 16:42:05
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/dracut-pcr-signature (Old)
and /work/SRC/openSUSE:Factory/.dracut-pcr-signature.new.1966 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "dracut-pcr-signature"
Fri May 8 16:42:05 2026 rev:17 rq:1351269 version:0.7+0
Changes:
--------
---
/work/SRC/openSUSE:Factory/dracut-pcr-signature/dracut-pcr-signature.changes
2025-11-07 18:16:49.021219828 +0100
+++
/work/SRC/openSUSE:Factory/.dracut-pcr-signature.new.1966/dracut-pcr-signature.changes
2026-05-08 16:42:12.261283851 +0200
@@ -1,0 +2,6 @@
+Wed May 06 12:30:45 UTC 2026 - Alberto Planas Dominguez <[email protected]>
+
+- Update to version 0.7+0:
+ * Boot the ESP in /sysefi during initrd
+
+-------------------------------------------------------------------
Old:
----
dracut-pcr-signature-0.6+4.tar.xz
New:
----
dracut-pcr-signature-0.7+0.tar.xz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ dracut-pcr-signature.spec ++++++
--- /var/tmp/diff_new_pack.5oirUQ/_old 2026-05-08 16:42:12.945312197 +0200
+++ /var/tmp/diff_new_pack.5oirUQ/_new 2026-05-08 16:42:12.949312363 +0200
@@ -1,7 +1,7 @@
#
# spec file for package dracut-pcr-signature
#
-# Copyright (c) 2025 SUSE LLC and contributors
+# Copyright (c) 2026 SUSE LLC and contributors
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
Name: dracut-pcr-signature
-Version: 0.6+4
+Version: 0.7+0
Release: 0
Summary: Dracut module to import PCR signatures
License: GPL-2.0-or-later
@@ -41,7 +41,7 @@
%install
mkdir -p %{buildroot}%{_prefix}/lib/dracut/modules.d/50pcr-signature
-for i in module-setup.sh boot-efi-generator.sh pcr-signature.sh
pcr-signature.service; do
+for i in module-setup.sh sysefi-generator.sh pcr-signature.sh
pcr-signature.service; do
cp "$i" %{buildroot}%{_prefix}/lib/dracut/modules.d/50pcr-signature
done
++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.5oirUQ/_old 2026-05-08 16:42:13.001314517 +0200
+++ /var/tmp/diff_new_pack.5oirUQ/_new 2026-05-08 16:42:13.005314684 +0200
@@ -1,6 +1,6 @@
<servicedata>
<service name="tar_scm">
<param
name="url">https://github.com/aplanas/dracut-pcr-signature.git</param>
- <param
name="changesrevision">4f876bc60fcd2e7acefbdd717ad544919410f65f</param></service></servicedata>
+ <param
name="changesrevision">d0e5ec8bdcaf64331e6e5b55415fe91420b04913</param></service></servicedata>
(No newline at EOF)
++++++ dracut-pcr-signature-0.6+4.tar.xz -> dracut-pcr-signature-0.7+0.tar.xz
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/boot-efi-generator.sh
new/dracut-pcr-signature-0.7+0/boot-efi-generator.sh
--- old/dracut-pcr-signature-0.6+4/boot-efi-generator.sh 2025-11-06
13:50:57.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/boot-efi-generator.sh 1970-01-01
01:00:00.000000000 +0100
@@ -1,31 +0,0 @@
-#!/bin/bash
-set -euo pipefail
-
-# For a generator, the first parameter `normal-dir` is not optional
-[ -n "$1" ] || { echo "Missing normal-dir parameter"; exit 1; }
-
-# If GRUB2 is used, bli.mod needs to be loaded
-EFIVAR="/sys/firmware/efi/efivars/LoaderDevicePartUUID-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f"
-
-[ -e "$EFIVAR" ] || exit 0
-
-# Read the value of the EFI variable, that contains a header and ends
-# with '\0' and make it lowercase
-ESP_UUID="$(dd "if=$EFIVAR" bs=2 skip=2 conv=lcase status=none | tr -d '\0')"
-DEV="/dev/disk/by-partuuid/${ESP_UUID}"
-
-cat > "$1/boot-efi.mount" <<EOF
-# Automatically generated by pcr-signature-generator
-
-[Unit]
-Description=ESP (/boot/efi)
-Conflicts=initrd-switch-root.target
-Before=initrd-switch-root.target
-DefaultDependencies=false
-
-[Mount]
-What=$DEV
-Where=/boot/efi
-Type=vfat
-Options=utf8
-EOF
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/dracut-pcr-signature.spec
new/dracut-pcr-signature-0.7+0/dracut-pcr-signature.spec
--- old/dracut-pcr-signature-0.6+4/dracut-pcr-signature.spec 2025-11-06
13:50:57.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/dracut-pcr-signature.spec 2026-05-06
14:26:40.000000000 +0200
@@ -41,7 +41,7 @@
%install
mkdir -p %{buildroot}%{_prefix}/lib/dracut/modules.d/50pcr-signature
-for i in module-setup.sh boot-efi-generator.sh pcr-signature.sh
pcr-signature.service; do
+for i in module-setup.sh sysefi-generator.sh pcr-signature.sh
pcr-signature.service; do
cp "$i" %{buildroot}%{_prefix}/lib/dracut/modules.d/50pcr-signature
done
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/module-setup.sh
new/dracut-pcr-signature-0.7+0/module-setup.sh
--- old/dracut-pcr-signature-0.6+4/module-setup.sh 2025-11-06
13:50:57.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/module-setup.sh 2026-05-06
14:26:40.000000000 +0200
@@ -26,7 +26,7 @@
# (cryptsetup.target). The solution is to use a generator, that
# will after/requires from dev-disk-by-partuuid-XXX, where XXX
# comes from LoaderDevicePartUUID efivar.
- inst_script "$moddir/boot-efi-generator.sh"
/usr/lib/systemd/system-generators/boot-efi-generator
+ inst_script "$moddir/sysefi-generator.sh"
/usr/lib/systemd/system-generators/sysefi-generator
inst_simple "$moddir/pcr-signature.service"
"$systemdsystemunitdir/pcr-signature.service"
$SYSTEMCTL -q --root "$initdir" enable pcr-signature.service
}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/pcr-signature.service
new/dracut-pcr-signature-0.7+0/pcr-signature.service
--- old/dracut-pcr-signature-0.6+4/pcr-signature.service 2025-11-06
13:50:57.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/pcr-signature.service 2026-05-06
14:26:40.000000000 +0200
@@ -5,7 +5,8 @@
Wants=cryptsetup-pre.target
Before=cryptsetup-pre.target
-RequiresMountsFor=/boot/efi
+Wants=sysefi.mount
+After=sysefi.mount
[Service]
Type=oneshot
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/pcr-signature.sh
new/dracut-pcr-signature-0.7+0/pcr-signature.sh
--- old/dracut-pcr-signature-0.6+4/pcr-signature.sh 2025-11-06
13:50:57.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/pcr-signature.sh 2026-05-06
14:26:40.000000000 +0200
@@ -13,7 +13,7 @@
name="${NAME% *}"
name="${name,,}"
-for location in "/boot/efi/EFI/systemd" "/boot/efi/EFI/$name"; do
+for location in "/sysefi/EFI/systemd" "/sysefi/EFI/$name"; do
if [ -e "${location}/pcrlock.json" ]; then
mkdir -p /run/systemd
cp "${location}/pcrlock.json" /run/systemd
@@ -26,9 +26,9 @@
fi
done
-for location in "/boot/efi/EFI/systemd" "/boot/efi/EFI/$name"; do
+for location in "/sysefi/EFI/systemd" "/sysefi/EFI/$name"; do
if [ -e "${location}/measure-pcr-prediction" ]; then
- # This directory should be already present, and contain the
+ # This directory should be already present, and contains the
# public key
mkdir -p /var/lib/sdbootutil
cp "${location}/measure-pcr-prediction" /var/lib/sdbootutil
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/sysefi-generator.sh
new/dracut-pcr-signature-0.7+0/sysefi-generator.sh
--- old/dracut-pcr-signature-0.6+4/sysefi-generator.sh 1970-01-01
01:00:00.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/sysefi-generator.sh 2026-05-06
14:26:40.000000000 +0200
@@ -0,0 +1,35 @@
+#!/bin/bash
+set -euo pipefail
+
+# For a generator, the first parameter `normal-dir` is not optional
+[ -n "$1" ] || { echo "Missing normal-dir parameter"; exit 1; }
+
+# If GRUB2 is used, bli.mod needs to be loaded
+EFIVAR="/sys/firmware/efi/efivars/LoaderDevicePartUUID-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f"
+
+if [ -e "$EFIVAR" ]; then
+ # Read the value of the EFI variable, that contains a header and
+ # ends with '\0' and make it lowercase
+ ESP_UUID="$(dd "if=$EFIVAR" bs=2 skip=2 conv=lcase status=none | tr -d
'\0')"
+ DEV="/dev/disk/by-partuuid/${ESP_UUID}"
+elif [ -e /dev/disk/by-designator/esp ]; then
+ DEV="/dev/disk/by-designator/esp"
+else
+ exit 0
+fi
+
+cat > "$1/sysefi.mount" <<EOF
+# Automatically generated by pcr-signature-generator
+
+[Unit]
+Description=ESP (/sysefi)
+Conflicts=initrd-switch-root.target
+Before=initrd-switch-root.target
+DefaultDependencies=false
+
+[Mount]
+What=$DEV
+Where=/sysefi
+Type=vfat
+Options=utf8
+EOF