Commit Graph

28777 Commits

Author SHA1 Message Date
James Le Cuirot
101efbff39
Temporarily undo AKV signing while we complete the shim review
We don't want to be blocked from doing releases in the meantime. Revert
this commit when ready.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-13 12:19:24 +00:00
James Le Cuirot
2853c77c66
ci-automation: Allow the arm64 tests to run on qemu_uefi_secure
Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-13 12:19:23 +00:00
James Le Cuirot
d8a8704f92
Refactor SB signing code and sign official builds with Azure Key Vault
Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-13 12:19:22 +00:00
James Le Cuirot
0eb1d4a287
grub_install.sh: Remove redundant BOARD_GRUB logic
We always use the board's GRUB now.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-13 12:19:21 +00:00
James Le Cuirot
e3c524c91d
app-crypt/p11-kit: Use unstable 0.25.5 because we need --provider option
Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-13 12:19:20 +00:00
James Le Cuirot
13516911f1
app-crypt/p11-kit: Sync and move from coreos-overlay to portage-stable
The cross issues that were previously addressed by our fork are no
longer an issue since p11-kit migrated to Meson.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-13 12:19:19 +00:00
James Le Cuirot
7b0a1ae4f9
coreos-devel/sdk-depends: Add azure-keyvault-pkcs11 and p11-kit
p11-kit is a dependency of azure-keyvault-pkcs11, but we will also use
it directly to fetch the certificate from Azure Key Vault.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-13 12:19:18 +00:00
Sayan Chowdhury
2d73ea8fa1
profiles: Add the azure-keyvault-pkcs11 to accept_keywords
Signed-off-by: Sayan Chowdhury <schowdhury@microsoft.com>
2024-11-13 12:19:17 +00:00
Sayan Chowdhury
987a3e675f
app-crypt/azure-keyvault-pkcs11: Add new package
It hasn't been added to Gentoo yet.
2024-11-13 12:19:16 +00:00
Sayan Chowdhury
8ebf73f6aa
dev-cpp/azure-identity: Add from Gentoo
It's from Gentoo commit 82ec02943f7f0ddaa87f623cee138608571a3978.
2024-11-13 12:19:14 +00:00
Sayan Chowdhury
ecb2ee89a1
dev-cpp/azure-security-keyvault-keys: Add from Gentoo
It's from Gentoo commit 768b3c1959debce15854362ff7db176cda76c055.
2024-11-13 12:19:13 +00:00
Sayan Chowdhury
b8609dc2a0
dev-cpp/azure-security-keyvault-certificates: Add from Gentoo
It's from Gentoo commit 69e4044b72d971f5603df77793db86c40e582e2e.
2024-11-13 12:19:12 +00:00
Sayan Chowdhury
8dc736d755
dev-cpp/azure-core: Add from Gentoo
It's from Gentoo commit d286faf494dcb60f81f0de921fa623d952962fc1.
2024-11-13 12:19:11 +00:00
Sayan Chowdhury
a15ff23bdb
shim, shim-signed: Move the packages from SDK to BOARD packages
Signed-off-by: Sayan Chowdhury <schowdhury@microsoft.com>
2024-11-13 12:19:10 +00:00
James Le Cuirot
b401cee2a9
sys-boot/shim-signed: Add shim-signed package to place signed binaries
Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-13 12:19:09 +00:00
Sayan Chowdhury
761bc04a19
sys-boot/shim: Append the suffix to the shim binary
Signed-off-by: Sayan Chowdhury <schowdhury@microsoft.com>
2024-11-13 12:19:08 +00:00
Sayan Chowdhury
02c0bdaa28
sys-boot/shim: Include @@VERSION@@ in SBAT for version
Signed-off-by: Sayan Chowdhury <schowdhury@microsoft.com>
2024-11-13 12:19:07 +00:00
Sayan Chowdhury
eef935e596
sys-boot/shim: Add the SBAT data to shim binary
Signed-off-by: Sayan Chowdhury <schowdhury@microsoft.com>
2024-11-13 12:19:06 +00:00
Sayan Chowdhury
b8f290bae4
sys-boot/shim: Add a use flag to use a DER files for shim builds
Signed-off-by: Sayan Chowdhury <schowdhury@microsoft.com>
2024-11-13 12:18:44 +00:00
James Le Cuirot
d18a373cb7
Merge pull request #2442 from flatcar/chewi/root-deps
Drop --root-deps and --root-deps=rdeps emerge options
2024-11-13 09:19:23 +00:00
Flatcar Buildbot
6cb21a37e1
sys-apps/portage: Sync with Gentoo
It's from Gentoo commit ba2693dfc0f0f5535e6371c4e4d19806109537c9.
2024-11-12 22:08:27 +00:00
James Le Cuirot
ac9c3753b3
Drop --root-deps option from board emerge wrappers
This option used to install build dependencies to ROOT instead of /.
This never made much sense, so the option was rendered ineffective from
EAPI 7. The number of ebuilds with older EAPIs has since dwindled to
nothing.

A recent Portage change has made this option now install build
dependencies to ROOT as well as / because this can actually be useful
and doesn't cause breakage.

However, it does make us more prone to cyclic dependencies when
initially populating the board roots. There is no reason for us to use
this option though because its main purpose is to ensure the target
environment has everything it needs to rebuild itself. Given that the
option didn't do anything recently, we evidently don't even require this
for the developer container.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-12 22:08:26 +00:00
James Le Cuirot
a76d1b3f1b
Drop all instances of ineffective --root-deps=rdeps option
This option became ineffective with EAPI 7 and all trace of older EAPIs
has now gone.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-12 22:08:21 +00:00
flatcar-ci
9085e02c75 New version: main-4152.0.0-nightly-20241112-2100 2024-11-12 21:00:29 +00:00
James Le Cuirot
00968ba291
Merge pull request #2434 from flatcar/chewi/new-firmware
Switch from raw to QCOW2 and 2MB to 4MB firmware, adjust firmware variables creation
2024-11-12 12:35:17 +00:00
James Le Cuirot
010afcd35d
sys-boot/mokutil: Install on arm64 now that it supports Secure Boot
Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-12 12:02:01 +00:00
James Le Cuirot
5125317506
coreos-base/coreos-sb-keys: Drop unnecessary PK and KEK certificates
These are only needed when you are going to ship DB updates to existing
systems, which we are not going to do. Our EFI variables are only for
testing. End users are expected to use EFI variables provided by their
hosts or hardware vendors. We presumably provided these before because
some PK and KEK does need to be provided, but we can now use the
Microsoft and Red Hat ones provided via Gentoo's edk2 package.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-12 12:02:00 +00:00
James Le Cuirot
c0b58cf56b
Reuse Secure Boot EFI variables image prepared by Gentoo
Rather than starting with a blank image, reuse the image that already
has the Microsoft certificates and the latest DBX revocation list
applied. Gentoo also applies the Red Hat certificates, which we don't
need, but this is okay.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-12 12:01:59 +00:00
James Le Cuirot
e50fe0a7e4
sys-firmware/edk2-aarch64: Drop in favour of edk2-bin
edk2-bin now supports multiple platforms, including QEMU on arm64, so we
no longer need to use Fedora's build. Note that the Secure Boot
implementation is currently insecure as it lacks SMM, which is needed to
protect the EFI variable store.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-12 12:01:58 +00:00
James Le Cuirot
d1ba9b19fb
Switch from raw (.fd) EDK2 firmware images to QCOW2, plus 4MB on amd64
The new arm64 firmware supporting Secure Boot (see next commit) is in
QCOW2 format only, avoiding the extra space taken up by the 64MB
padding. Supporting both raw and QCOW2 images would be messy, so switch
entirely to QCOW2.

Only the 4MB images are in QCOW2 format on amd64, so also switch away
from the 2MB images. 4MB images are now the default for most
distributions as they are needed to apply certain Windows updates.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-12 11:59:40 +00:00
James Le Cuirot
d67c395456
ci-automation: Include --qemu-ovmf-vars in qemu_update test for arm64
Kola's logic for choosing BIOS vs EFI isn't too smart, and not
specifying --qemu-ovmf-vars leads to it passing -bios to QEMU. This
doesn't make sense for arm64, but it did work anyway with the old
firmware in raw format. The new firmware in QCOW2 format doesn't work
this way.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-12 11:59:22 +00:00
Mathieu Tortuyaux
c80760c999
Merge pull request #1783 from flatcar/kai/proxmox-support
OEM: Provide Proxmox images
2024-11-12 12:52:31 +01:00
Mathieu Tortuyaux
c1cd33684b
coreos-base/afterburn: fix instance boots
Without configdrive the instance is failing to boot - this patch is
currently under review on PR#1128 (coreos/afterburn)

Signed-off-by: Mathieu Tortuyaux <mtortuyaux@microsoft.com>
2024-11-12 12:51:36 +01:00
Mathieu Tortuyaux
6e674b26d3
oem: provide proxmox images
Co-authored-by: Kai Lüke <pothos@users.noreply.github.com>
Signed-off-by: Mathieu Tortuyaux <mtortuyaux@microsoft.com>
2024-11-12 12:51:36 +01:00
flatcar-ci
f708975b80 New version: main-4151.0.0-nightly-20241111-2100 2024-11-11 21:00:29 +00:00
Dongsu Park
abd28069d6
Merge pull request #2438 from flatcar/linux-6.6.60-main
Upgrade Linux Kernel for main from 6.6.59 to 6.6.60
2024-11-11 16:38:42 +01:00
Flatcar Buildbot
087d5e8bf4 sys-kernel/coreos-sources: Update from 6.6.59 to 6.6.60 2024-11-09 07:04:43 +00:00
flatcar-ci
024fbd7981 New version: main-4148.0.0-nightly-20241108-2100 2024-11-09 02:17:58 +00:00
flatcar-ci
610c7c7197 New version: main-4148.0.0-nightly-20241108-2100-INTERMEDIATE 2024-11-08 21:00:27 +00:00
James Le Cuirot
2bce0a69b9
Merge pull request #2431 from flatcar/chewi/grub-redhat-patches
sys-boot/grub: Apply Red Hat's large patch set (and drop Gentoo's)
2024-11-08 11:58:42 +00:00
Mathieu Tortuyaux
c6d69ef8aa
Merge pull request #2432 from flatcar/go-1.22.9-main
Upgrade Go from 1.22.8 to 1.22.9
2024-11-08 09:22:26 +01:00
Flatcar Buildbot
bf7d649c8e
dev-lang/go: Update from 1.22.8 to 1.22.9 2024-11-08 09:21:47 +01:00
flatcar-ci
5efd7a3bf4 New version: main-4147.0.0-nightly-20241107-2100 2024-11-07 21:00:28 +00:00
James Le Cuirot
e0109ef1c6
sys-boot/grub: Fix fallback mechanism broken by Red Hat's patches
This fix has been submitted to Red Hat. It will hopefully be merged
soon.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-07 14:26:05 +00:00
James Le Cuirot
fb3c9cff98
sys-boot/grub: Apply Red Hat's large patch set (and drop Gentoo's)
We initially thought we would need Red Hat's patch set. Then it looked
like we wouldn't because the TPM Event Log appeared to work without it.
We later discovered that on amd64, it only works with Secure Boot
disabled. The patch set also fixes Secure Boot on arm64, which would
have otherwise needed a couple of patches from Canonical.

We have to drop Gentoo's patches because they conflict, but they don't
affect Flatcar anyway.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-07 14:26:04 +00:00
James Le Cuirot
2fcff863dc
Merge pull request #2430 from flatcar/chewi/virt-firmware
app-crypt/efitools: Drop in favour of app-emulation/virt-firmware
2024-11-07 11:43:45 +00:00
flatcar-ci
97af4e5eb9 New version: main-4146.0.0-nightly-20241106-2100 2024-11-06 21:00:29 +00:00
Mathieu Tortuyaux
f6f07e22ca
Merge pull request #2429 from flatcar/tormath1/nvidia
x11-drivers/nvidia: update to 535.216.01
2024-11-06 19:59:36 +01:00
James Le Cuirot
bcd203ebcb
app-crypt/efitools: Drop in favour of app-emulation/virt-firmware
virt-fw-vars handles X.509 conversion and QCOW2 conversion transparently
and can update all the variables in a single invocation.

Bonus: Asking it to list the variables doesn't cause a segfault due to
the feature not really being implemented. :D

The 00000000-0000-0000-0000-000000000000 owner GUID is what flash-var
used to set, as we didn't specify the -g argument. We don't need to set
a meaningful value as this file is only for testing.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-06 12:04:18 +00:00
James Le Cuirot
86ebb70552
app-emulation/virt-firmware: Import from Gentoo to replace efitools
Unfortunately, it pulls in a number of dependencies.

Signed-off-by: James Le Cuirot <jlecuirot@microsoft.com>
2024-11-06 11:58:23 +00:00