From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 26DBB15807B for ; Thu, 10 Oct 2024 16:33:26 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 06F512BC088; Thu, 10 Oct 2024 16:33:25 +0000 (UTC) Received: from smtp.gentoo.org (smtp.gentoo.org [IPv6:2001:470:ea4a:1:5054:ff:fec7:86e4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id E25222BC088 for ; Thu, 10 Oct 2024 16:33:24 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id 0D0873430DD for ; Thu, 10 Oct 2024 16:33:24 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id 6F1B22191 for ; Thu, 10 Oct 2024 16:33:22 +0000 (UTC) From: "James Le Cuirot" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "James Le Cuirot" Message-ID: <1728577772.21806a819cc79eb9f19415f7b5ed29393c2a3f43.chewi@gentoo> Subject: [gentoo-commits] repo/gentoo:master commit in: sys-firmware/edk2/ X-VCS-Repository: repo/gentoo X-VCS-Files: sys-firmware/edk2/edk2-202202.ebuild sys-firmware/edk2/edk2-202405.ebuild X-VCS-Directories: sys-firmware/edk2/ X-VCS-Committer: chewi X-VCS-Committer-Name: James Le Cuirot X-VCS-Revision: 21806a819cc79eb9f19415f7b5ed29393c2a3f43 X-VCS-Branch: master Date: Thu, 10 Oct 2024 16:33:22 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: fb94e6cf-7586-41e9-aacf-d2e7bab15898 X-Archives-Hash: 10e11f664e378805cf0e12cb628c7b44 commit: 21806a819cc79eb9f19415f7b5ed29393c2a3f43 Author: James Le Cuirot gentoo org> AuthorDate: Wed Sep 25 15:17:24 2024 +0000 Commit: James Le Cuirot gentoo org> CommitDate: Thu Oct 10 16:29:32 2024 +0000 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=21806a81 sys-firmware/edk2: Drop obsolete reference to USE=binary and update URL I don't think using UefiShell.img actually works any more, but the new version bump will automatically create OVMF_VARS.secboot.fd for you. Closes: https://bugs.gentoo.org/926630 Signed-off-by: James Le Cuirot gentoo.org> sys-firmware/edk2/edk2-202202.ebuild | 13 ++++--------- sys-firmware/edk2/edk2-202405.ebuild | 13 ++++--------- 2 files changed, 8 insertions(+), 18 deletions(-) diff --git a/sys-firmware/edk2/edk2-202202.ebuild b/sys-firmware/edk2/edk2-202202.ebuild index 2baca0ed771a..9adf4e411eeb 100644 --- a/sys-firmware/edk2/edk2-202202.ebuild +++ b/sys-firmware/edk2/edk2-202202.ebuild @@ -49,16 +49,11 @@ virtual machines. The firmware is located under /usr/share/edk2-ovmf/OVMF_VARS.fd /usr/share/edk2-ovmf/OVMF_CODE.secboot.fd -If USE=binary is enabled, we also install an OVMF variables file (coming from -fedora) that contains secureboot default keys - - /usr/share/edk2-ovmf/OVMF_VARS.secboot.fd - -If you have compiled this package by hand, you need to either populate all -necessary EFI variables by hand by booting - /usr/share/edk2-ovmf/UefiShell.(iso|img) +To use Secure Boot, you need to either populate the necessary EFI +variables by booting: + /usr/share/edk2-ovmf/UefiShell.img or creating OVMF_VARS.secboot.fd by hand: - https://github.com/puiterwijk/qemu-ovmf-secureboot + https://github.com/rhuefi/qemu-ovmf-secureboot The firmware does not support csm (due to no free csm implementation available). If you need a firmware with csm support you have to download diff --git a/sys-firmware/edk2/edk2-202405.ebuild b/sys-firmware/edk2/edk2-202405.ebuild index aca5700f3df5..cfd276ee0215 100644 --- a/sys-firmware/edk2/edk2-202405.ebuild +++ b/sys-firmware/edk2/edk2-202405.ebuild @@ -44,16 +44,11 @@ virtual machines. The firmware is located under /usr/share/edk2-ovmf/OVMF_VARS.fd /usr/share/edk2-ovmf/OVMF_CODE.secboot.fd -If USE=binary is enabled, we also install an OVMF variables file (coming from -fedora) that contains secureboot default keys - - /usr/share/edk2-ovmf/OVMF_VARS.secboot.fd - -If you have compiled this package by hand, you need to either populate all -necessary EFI variables by hand by booting - /usr/share/edk2-ovmf/UefiShell.(iso|img) +To use Secure Boot, you need to either populate the necessary EFI +variables by booting: + /usr/share/edk2-ovmf/UefiShell.img or creating OVMF_VARS.secboot.fd by hand: - https://github.com/puiterwijk/qemu-ovmf-secureboot + https://github.com/rhuefi/qemu-ovmf-secureboot The firmware does not support csm (due to no free csm implementation available). If you need a firmware with csm support you have to download