Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package dracut-pcr-signature for 
openSUSE:Factory checked in at 2026-05-08 16:42:05
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/dracut-pcr-signature (Old)
 and      /work/SRC/openSUSE:Factory/.dracut-pcr-signature.new.1966 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "dracut-pcr-signature"

Fri May  8 16:42:05 2026 rev:17 rq:1351269 version:0.7+0

Changes:
--------
--- 
/work/SRC/openSUSE:Factory/dracut-pcr-signature/dracut-pcr-signature.changes    
    2025-11-07 18:16:49.021219828 +0100
+++ 
/work/SRC/openSUSE:Factory/.dracut-pcr-signature.new.1966/dracut-pcr-signature.changes
      2026-05-08 16:42:12.261283851 +0200
@@ -1,0 +2,6 @@
+Wed May 06 12:30:45 UTC 2026 - Alberto Planas Dominguez <[email protected]>
+
+- Update to version 0.7+0:
+  * Boot the ESP in /sysefi during initrd
+
+-------------------------------------------------------------------

Old:
----
  dracut-pcr-signature-0.6+4.tar.xz

New:
----
  dracut-pcr-signature-0.7+0.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ dracut-pcr-signature.spec ++++++
--- /var/tmp/diff_new_pack.5oirUQ/_old  2026-05-08 16:42:12.945312197 +0200
+++ /var/tmp/diff_new_pack.5oirUQ/_new  2026-05-08 16:42:12.949312363 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package dracut-pcr-signature
 #
-# Copyright (c) 2025 SUSE LLC and contributors
+# Copyright (c) 2026 SUSE LLC and contributors
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,7 +17,7 @@
 
 
 Name:           dracut-pcr-signature
-Version:        0.6+4
+Version:        0.7+0
 Release:        0
 Summary:        Dracut module to import PCR signatures
 License:        GPL-2.0-or-later
@@ -41,7 +41,7 @@
 
 %install
 mkdir -p %{buildroot}%{_prefix}/lib/dracut/modules.d/50pcr-signature
-for i in module-setup.sh boot-efi-generator.sh pcr-signature.sh 
pcr-signature.service; do
+for i in module-setup.sh sysefi-generator.sh pcr-signature.sh 
pcr-signature.service; do
     cp "$i" %{buildroot}%{_prefix}/lib/dracut/modules.d/50pcr-signature
 done
 

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.5oirUQ/_old  2026-05-08 16:42:13.001314517 +0200
+++ /var/tmp/diff_new_pack.5oirUQ/_new  2026-05-08 16:42:13.005314684 +0200
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/aplanas/dracut-pcr-signature.git</param>
-              <param 
name="changesrevision">4f876bc60fcd2e7acefbdd717ad544919410f65f</param></service></servicedata>
+              <param 
name="changesrevision">d0e5ec8bdcaf64331e6e5b55415fe91420b04913</param></service></servicedata>
 (No newline at EOF)
 

++++++ dracut-pcr-signature-0.6+4.tar.xz -> dracut-pcr-signature-0.7+0.tar.xz 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/boot-efi-generator.sh 
new/dracut-pcr-signature-0.7+0/boot-efi-generator.sh
--- old/dracut-pcr-signature-0.6+4/boot-efi-generator.sh        2025-11-06 
13:50:57.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/boot-efi-generator.sh        1970-01-01 
01:00:00.000000000 +0100
@@ -1,31 +0,0 @@
-#!/bin/bash
-set -euo pipefail
-
-# For a generator, the first parameter `normal-dir` is not optional
-[ -n "$1" ] || { echo "Missing normal-dir parameter"; exit 1; }
-
-# If GRUB2 is used, bli.mod needs to be loaded
-EFIVAR="/sys/firmware/efi/efivars/LoaderDevicePartUUID-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f"
-
-[ -e "$EFIVAR" ] || exit 0
-
-# Read the value of the EFI variable, that contains a header and ends
-# with '\0' and make it lowercase
-ESP_UUID="$(dd "if=$EFIVAR" bs=2 skip=2 conv=lcase status=none | tr -d '\0')"
-DEV="/dev/disk/by-partuuid/${ESP_UUID}"
-
-cat > "$1/boot-efi.mount" <<EOF
-# Automatically generated by pcr-signature-generator
-
-[Unit]
-Description=ESP (/boot/efi)
-Conflicts=initrd-switch-root.target
-Before=initrd-switch-root.target
-DefaultDependencies=false
-
-[Mount]
-What=$DEV
-Where=/boot/efi
-Type=vfat
-Options=utf8
-EOF
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/dracut-pcr-signature.spec 
new/dracut-pcr-signature-0.7+0/dracut-pcr-signature.spec
--- old/dracut-pcr-signature-0.6+4/dracut-pcr-signature.spec    2025-11-06 
13:50:57.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/dracut-pcr-signature.spec    2026-05-06 
14:26:40.000000000 +0200
@@ -41,7 +41,7 @@
 
 %install
 mkdir -p %{buildroot}%{_prefix}/lib/dracut/modules.d/50pcr-signature
-for i in module-setup.sh boot-efi-generator.sh pcr-signature.sh 
pcr-signature.service; do
+for i in module-setup.sh sysefi-generator.sh pcr-signature.sh 
pcr-signature.service; do
     cp "$i" %{buildroot}%{_prefix}/lib/dracut/modules.d/50pcr-signature
 done
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/module-setup.sh 
new/dracut-pcr-signature-0.7+0/module-setup.sh
--- old/dracut-pcr-signature-0.6+4/module-setup.sh      2025-11-06 
13:50:57.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/module-setup.sh      2026-05-06 
14:26:40.000000000 +0200
@@ -26,7 +26,7 @@
     # (cryptsetup.target).  The solution is to use a generator, that
     # will after/requires from dev-disk-by-partuuid-XXX, where XXX
     # comes from LoaderDevicePartUUID efivar.
-    inst_script "$moddir/boot-efi-generator.sh" 
/usr/lib/systemd/system-generators/boot-efi-generator
+    inst_script "$moddir/sysefi-generator.sh" 
/usr/lib/systemd/system-generators/sysefi-generator
     inst_simple "$moddir/pcr-signature.service" 
"$systemdsystemunitdir/pcr-signature.service"
     $SYSTEMCTL -q --root "$initdir" enable pcr-signature.service
 }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/pcr-signature.service 
new/dracut-pcr-signature-0.7+0/pcr-signature.service
--- old/dracut-pcr-signature-0.6+4/pcr-signature.service        2025-11-06 
13:50:57.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/pcr-signature.service        2026-05-06 
14:26:40.000000000 +0200
@@ -5,7 +5,8 @@
 Wants=cryptsetup-pre.target
 Before=cryptsetup-pre.target
 
-RequiresMountsFor=/boot/efi
+Wants=sysefi.mount
+After=sysefi.mount
 
 [Service]
 Type=oneshot
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/pcr-signature.sh 
new/dracut-pcr-signature-0.7+0/pcr-signature.sh
--- old/dracut-pcr-signature-0.6+4/pcr-signature.sh     2025-11-06 
13:50:57.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/pcr-signature.sh     2026-05-06 
14:26:40.000000000 +0200
@@ -13,7 +13,7 @@
 name="${NAME% *}"
 name="${name,,}"
 
-for location in "/boot/efi/EFI/systemd" "/boot/efi/EFI/$name"; do
+for location in "/sysefi/EFI/systemd" "/sysefi/EFI/$name"; do
     if [ -e "${location}/pcrlock.json" ]; then
        mkdir -p /run/systemd
        cp "${location}/pcrlock.json" /run/systemd
@@ -26,9 +26,9 @@
     fi
 done
 
-for location in "/boot/efi/EFI/systemd" "/boot/efi/EFI/$name"; do
+for location in "/sysefi/EFI/systemd" "/sysefi/EFI/$name"; do
     if [ -e "${location}/measure-pcr-prediction" ]; then
-       # This directory should be already present, and contain the
+       # This directory should be already present, and contains the
        # public key
        mkdir -p /var/lib/sdbootutil
        cp "${location}/measure-pcr-prediction" /var/lib/sdbootutil
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/dracut-pcr-signature-0.6+4/sysefi-generator.sh 
new/dracut-pcr-signature-0.7+0/sysefi-generator.sh
--- old/dracut-pcr-signature-0.6+4/sysefi-generator.sh  1970-01-01 
01:00:00.000000000 +0100
+++ new/dracut-pcr-signature-0.7+0/sysefi-generator.sh  2026-05-06 
14:26:40.000000000 +0200
@@ -0,0 +1,35 @@
+#!/bin/bash
+set -euo pipefail
+
+# For a generator, the first parameter `normal-dir` is not optional
+[ -n "$1" ] || { echo "Missing normal-dir parameter"; exit 1; }
+
+# If GRUB2 is used, bli.mod needs to be loaded
+EFIVAR="/sys/firmware/efi/efivars/LoaderDevicePartUUID-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f"
+
+if [ -e "$EFIVAR" ]; then
+    # Read the value of the EFI variable, that contains a header and
+    # ends with '\0' and make it lowercase
+    ESP_UUID="$(dd "if=$EFIVAR" bs=2 skip=2 conv=lcase status=none | tr -d 
'\0')"
+    DEV="/dev/disk/by-partuuid/${ESP_UUID}"
+elif [ -e /dev/disk/by-designator/esp ]; then
+    DEV="/dev/disk/by-designator/esp"
+else
+    exit 0
+fi
+
+cat > "$1/sysefi.mount" <<EOF
+# Automatically generated by pcr-signature-generator
+
+[Unit]
+Description=ESP (/sysefi)
+Conflicts=initrd-switch-root.target
+Before=initrd-switch-root.target
+DefaultDependencies=false
+
+[Mount]
+What=$DEV
+Where=/sysefi
+Type=vfat
+Options=utf8
+EOF

Reply via email to