Skip to content

Commit fe87b7e

Browse files
vittyvkptalbert
authored andcommitted
redhat: revert to using redhatsecureboot504 for RHEL UKI
JIRA: https://issues.redhat.com/browse/RHEL-122230 Upstream Status: RHEL only Azure CVM instances use Full Disk Encryption with the volume key sealed to PCR7, updating the certificate requires additional action. Restore the status quo for now. Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com>
1 parent a1c3831 commit fe87b7e

File tree

3 files changed

+11
-2
lines changed

3 files changed

+11
-2
lines changed

redhat/Makefile

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -644,6 +644,7 @@ sources-rh: $(TARBALL) generate-testpatch-tmp setup-source dist-configs-check
644644
README.rst \
645645
kernel-local \
646646
dracut-virt.conf \
647+
keys/redhatsecureboot504.cer \
647648
$(SOURCES)/
648649
@cat $$(ls -1 $(PACKAGE_NAME).changelog-* | sort -t '.' -k 3 -n -r) \
649650
> $(SOURCES)/kernel.changelog

redhat/kernel.spec.template

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -902,6 +902,9 @@ Source150: dracut-virt.conf
902902
Source151: uki_create_addons.py
903903
Source152: uki_addons.json
904904

905+
# Temporary use redhatsecureboot504 for x86 UKI, see RHEL-122230
906+
Source153: redhatsecureboot504.cer
907+
905908
Source200: check-kabi
906909

907910
Source201: Module.kabi_aarch64
@@ -2417,10 +2420,12 @@ BuildKernel() {
24172420

24182421
%if 0%{?centos}
24192422
UKI_secureboot_name=centossecureboot204
2423+
UKI_secureboot_cert=%{_datadir}/pki/sb-certs/secureboot-uki-virt-%{_arch}.cer
24202424
%else
2421-
UKI_secureboot_name=redhatsecureboot804
2425+
# RHEL only builds UKI for x86
2426+
UKI_secureboot_name=redhatsecureboot504
2427+
UKI_secureboot_cert=%{SOURCE153}
24222428
%endif
2423-
UKI_secureboot_cert=%{_datadir}/pki/sb-certs/secureboot-uki-virt-%{_arch}.cer
24242429

24252430
%pesign -s -i $KernelUnifiedImage -o $KernelUnifiedImage.signed -a %{secureboot_ca_0} -c $UKI_secureboot_cert -n $UKI_secureboot_name
24262431
if [ ! -s $KernelUnifiedImage.signed ]; then
@@ -2435,6 +2440,9 @@ BuildKernel() {
24352440
mv $addon.signed $addon
24362441
done
24372442

2443+
mkdir -p $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer
2444+
cp -a $UKI_secureboot_cert $RPM_BUILD_ROOT%{_datadir}/doc/kernel-keys/$KernelVer/secureboot-uki-%{_arch}.cer
2445+
24382446
# signkernel
24392447
%endif
24402448

964 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)