Skip to content

Commit 48b11db

Browse files
author
CKI KWF Bot
committed
Merge: redhat: use the same cert as UKI's to sign addons
MR: https://gitlab.com/redhat/centos-stream/src/kernel/centos-stream-9/-/merge_requests/7520 JIRA: https://issues.redhat.com/browse/RHEL-124089 Addons' cert should be the same as UKI's. Otherwise it breaks full disk encryption of Azure CVM by changing PCR7 where volume key is sealed. Signed-off-by: Li Tian <litian@redhat.com> Approved-by: Emanuele Giuseppe Esposito <eesposit@redhat.com> Approved-by: Vitaly Kuznetsov <vkuznets@redhat.com> Approved-by: Jan Stancek <jstancek@redhat.com> Approved-by: CKI KWF Bot <cki-ci-bot+kwf-gitlab-com@redhat.com> Merged-by: CKI GitLab Kmaint Pipeline Bot <26919896-cki-kmaint-pipeline-bot@users.noreply.gitlab.com>
2 parents 1155eb6 + 3f94fb3 commit 48b11db

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

redhat/kernel.spec.template

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2436,7 +2436,7 @@ BuildKernel() {
24362436
mv $KernelUnifiedImage.signed $KernelUnifiedImage
24372437

24382438
for addon in "$KernelAddonsDirOut"/*; do
2439-
%pesign -s -i $addon -o $addon.signed -a %{secureboot_ca_0} -c %{secureboot_key_0} -n %{pesign_name_0}
2439+
%pesign -s -i $addon -o $addon.signed -a %{secureboot_ca_0} -c $UKI_secureboot_cert -n $UKI_secureboot_name
24402440
rm -f $addon
24412441
mv $addon.signed $addon
24422442
done

0 commit comments

Comments
 (0)