595703b86e
Signed-off-by: Peter Jones <pjones@redhat.com>
371 lines
12 KiB
RPMSpec
371 lines
12 KiB
RPMSpec
%global debug_package %{nil}
|
|
|
|
%global efidir %(eval echo $(grep ^ID= /etc/os-release | sed -e 's/^ID=//' -e 's/rhel/redhat/'))
|
|
|
|
# this is literally to make vim's \c not put a brace at the end.
|
|
%global _dist %{expand:%{?_module_build:%%{?dist}}}
|
|
%global dist %{expand:%%{_dist}}
|
|
|
|
Name: shim
|
|
Version: 15
|
|
Release: 4%{?dist}
|
|
Summary: First-stage UEFI bootloader
|
|
License: BSD
|
|
URL: http://github.com/rhboot/shim/
|
|
|
|
# Shim is only required on platforms implementing the UEFI secure boot
|
|
# protocol. The only one of those we currently wish to support is 64-bit x86.
|
|
# Adding further platforms will require adding appropriate relocation code.
|
|
ExclusiveArch: x86_64 aarch64
|
|
|
|
# keep these two lists of sources synched up arch-wise. That is 0 and 10
|
|
# match, 1 and 11 match, ...
|
|
Source0: BOOTX64.CSV
|
|
Source1: BOOTAA64.CSV
|
|
Source2: BOOTIA32.CSV
|
|
|
|
Source10: shimaa64.efi
|
|
Source11: shimia32.efi
|
|
Source12: shimx64.efi
|
|
#Source13: shimx64-signed.efi
|
|
|
|
%global shimverx64 15-1.fc28
|
|
%global shimveria32 15-1.fc28
|
|
%global shimveraa64 15-1.fc28
|
|
|
|
%ifarch x86_64
|
|
BuildRequires: shim-unsigned-x64 = %{shimverx64}
|
|
BuildRequires: shim-unsigned-ia32 = %{shimveria32}
|
|
%global shimdirx64 %{_datadir}/shim/%{shimverx64}/x64
|
|
%global shimdiria32 %{_datadir}/shim/%{shimveria32}/ia32
|
|
%endif
|
|
%ifarch aarch64
|
|
BuildRequires: shim-unsigned-aarch64 = %{shimveraa64}
|
|
%global shimdiraa64 %{_datadir}/shim/%{shimveraa64}/aa64
|
|
%endif
|
|
BuildRequires: pesign >= 0.112-20.fc27
|
|
BuildRequires: efi-srpm-macros efi-filesystem
|
|
|
|
%description
|
|
Initial UEFI bootloader that handles chaining to a trusted full bootloader
|
|
under secure boot environments. This package contains the version signed by
|
|
the UEFI signing service.
|
|
|
|
%define define_pkg(a:p:) \
|
|
%{expand:%%package -n shim-%{-a*}} \
|
|
Summary: First-stage UEFI bootloader \
|
|
Requires: mokutil >= 1:0.2.0-1 \
|
|
Requires: efi-filesystem \
|
|
Provides: shim-signed-%{-a*} = %{version}-%{release} \
|
|
Requires: dbxtool >= 0.6-3 \
|
|
%{expand:%%if 0%%{-p*} \
|
|
Provides: shim = %{version}-%{release} \
|
|
Provides: shim-signed = %{version}-%{release} \
|
|
Obsoletes: shim-signed < %{version}-%{release} \
|
|
Obsoletes: shim < %{version}-%{release} \
|
|
%%endif} \
|
|
# Shim uses OpenSSL, but cannot use the system copy as the UEFI ABI \
|
|
# is not compatible with SysV (there's no red zone under UEFI) and \
|
|
# there isn't a POSIX-style C library. \
|
|
# BuildRequires: OpenSSL \
|
|
Provides: bundled(openssl) = 1.0.2j \
|
|
\
|
|
%{expand:%%description -n shim-%{-a*}} \
|
|
Initial UEFI bootloader that handles chaining to a trusted full \
|
|
bootloader under secure boot environments. This package contains the \
|
|
version signed by the UEFI signing service. \
|
|
%{nil}
|
|
|
|
%ifarch x86_64
|
|
%define_pkg -a x64 -p 1
|
|
%define_pkg -a ia32
|
|
%endif
|
|
%ifarch aarch64
|
|
%define_pkg -a aa64 -p 1
|
|
%endif
|
|
|
|
%prep
|
|
cd %{_builddir}
|
|
rm -rf shim-%{version}
|
|
mkdir shim-%{version}
|
|
|
|
%build
|
|
%define vendor_token_str %{expand:%%{nil}%%{?vendor_token_name:-t "%{vendor_token_name}"}}
|
|
%define vendor_cert_str %{expand:%%{!?vendor_cert_nickname:-c "Red Hat Test Certificate"}%%{?vendor_cert_nickname:-c "%%{vendor_cert_nickname}"}}
|
|
|
|
# -a <efiarch>
|
|
# -i <input>
|
|
%define hash(a:i:d:) \
|
|
pesign -i %{-i*} -h -P > shim.hash \
|
|
read file0 hash0 < shim.hash \
|
|
read file1 hash1 < %{-d*}/shim%{-a*}.hash \
|
|
if ! [ "$hash0" = "$hash1" ]; then \
|
|
echo Invalid signature\! > /dev/stderr \
|
|
echo $hash0 vs $hash1 \
|
|
exit 1 \
|
|
fi \
|
|
%{nil}
|
|
|
|
# -i <input>
|
|
# -o <output>
|
|
%define sign(i:o:) \
|
|
%{expand:%%pesign -s -i %{-i*} -o %{-o*}} \
|
|
%{nil}
|
|
|
|
# -b <binary prefix>
|
|
# -a <efiarch>
|
|
# -i <input>
|
|
%define distrosign(b:a:d:) \
|
|
cp -av %{-d*}/%{-b*}%{-a*}.efi %{-b*}%{-a*}-unsigned.efi \
|
|
%{expand:%%sign -i %{-b*}%{-a*}-unsigned.efi -o %{-b*}%{-a*}-signed.efi}\
|
|
%{nil}
|
|
|
|
# -a <efiarch>
|
|
# -A <EFIARCH>
|
|
# -b <yes|no> # signed by this builder?
|
|
# -c <yes|no> # signed by UEFI CA?
|
|
# -i <shimARCH.efi>
|
|
%define define_build(a:A:b:c:i:d:) \
|
|
#if [ "%%{-c*}" = "yes" ]; then \
|
|
# %%{expand:%%%%hash -i %%{-i*} -a %%{-a*} -d %%{-d*}} \
|
|
#fi \
|
|
cp %{-i*} shim%{-a*}.efi \
|
|
if [ "%{-b*}" = "yes" ]; then \
|
|
%{expand:%%distrosign -b shim -a %{-a*} -d %{-d*}} \
|
|
mv shim%{-a*}-signed.efi shim%{-a*}-%{efidir}.efi \
|
|
fi \
|
|
if [ "%{-c*}" = "no" ]; then \
|
|
cp shim%{-a*}-%{efidir}.efi shim%{-a*}.efi \
|
|
fi \
|
|
%{expand:%%distrosign -b mm -a %{-a*} -d %{-d*}} \
|
|
mv mm%{-a*}-signed.efi mm%{-a*}.efi \
|
|
%{expand:%%distrosign -b fb -a %{-a*} -d %{-d*}} \
|
|
mv fb%{-a*}-signed.efi fb%{-a*}.efi \
|
|
rm -vf \\\
|
|
mm%{-a*}-unsigned.efi \\\
|
|
fb%{-a*}-unsigned.efi \\\
|
|
shim%{-a*}-unsigned.efi \
|
|
%{nil}
|
|
|
|
cd shim-%{version}
|
|
%ifarch aarch64
|
|
%define_build -a aa64 -A AA64 -i %{SOURCE10} -b yes -c no -d %{shimdiraa64}
|
|
%endif
|
|
%ifarch x86_64
|
|
%define_build -a ia32 -A IA32 -i %{SOURCE11} -b yes -c yes -d %{shimdiria32}
|
|
%define_build -a x64 -A X64 -i %{SOURCE12} -b yes -c yes -d %{shimdirx64}
|
|
%endif
|
|
|
|
%install
|
|
# -a <efiarch>
|
|
# -A <EFIARCH>
|
|
# -b <BOOTCSV>
|
|
%define do_install(a:A:b:) \
|
|
install -m 0700 shim%{-a*}.efi \\\
|
|
$RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/shim%{-a*}.efi \
|
|
install -m 0700 shim%{-a*}-%{efidir}.efi \\\
|
|
$RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/shim%{-a*}-%{efidir}.efi \
|
|
install -m 0700 mm%{-a*}.efi \\\
|
|
$RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/mm%{-a*}.efi \
|
|
install -m 0700 %{-b*} \\\
|
|
$RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/BOOT%{-A*}.CSV \
|
|
install -m 0700 shim%{-a*}.efi \\\
|
|
$RPM_BUILD_ROOT/boot/efi/EFI/BOOT/BOOT%{-A*}.EFI \
|
|
install -m 0700 fb%{-a*}.efi \\\
|
|
$RPM_BUILD_ROOT/boot/efi/EFI/BOOT/fb%{-a*}.efi \
|
|
%nil
|
|
|
|
rm -rf $RPM_BUILD_ROOT
|
|
cd shim-%{version}
|
|
install -D -d -m 0755 $RPM_BUILD_ROOT/boot/
|
|
install -D -d -m 0700 $RPM_BUILD_ROOT/boot/efi/
|
|
install -D -d -m 0700 $RPM_BUILD_ROOT/boot/efi/EFI/
|
|
install -D -d -m 0700 $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/
|
|
install -D -d -m 0700 $RPM_BUILD_ROOT/boot/efi/EFI/BOOT/
|
|
|
|
%ifarch x86_64
|
|
%do_install -a x64 -A X64 -b %{SOURCE0}
|
|
%do_install -a ia32 -A IA32 -b %{SOURCE2}
|
|
install -m 0700 %{SOURCE2} $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/BOOT.CSV
|
|
install -m 0700 $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/mmx64.efi $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/MokManager.efi
|
|
install -m 0700 $RPM_BUILD_ROOT/boot/efi/EFI/BOOT/fbx64.efi $RPM_BUILD_ROOT/boot/efi/EFI/BOOT/fallback.efi
|
|
install -m 0700 %{SOURCE12} $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/shim.efi
|
|
#install -m 0700 %%{SOURCE13} $RPM_BUILD_ROOT/boot/efi/EFI/%%{efidir}/shim.efi
|
|
#install -m 0700 %%{SOURCE13} $RPM_BUILD_ROOT/boot/efi/EFI/%%{efidir}/shimx64.efi
|
|
#install -m 0700 %%{SOURCE13} $RPM_BUILD_ROOT/boot/efi/EFI/BOOT/BOOTX64.EFI
|
|
%endif
|
|
%ifarch aarch64
|
|
%do_install -a aa64 -A AA64 -b %{SOURCE1}
|
|
install -m 0700 %{SOURCE10} $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/shim.efi
|
|
%endif
|
|
|
|
# -a <efiarch>
|
|
# -A <EFIARCH>
|
|
%define define_files(a:A:) \
|
|
%{expand:%%files -n shim-%{-a*}} \
|
|
/boot/efi/EFI/%{efidir}/*%{-a*}*.efi \
|
|
/boot/efi/EFI/%{efidir}/BOOT%{-A*}.CSV \
|
|
/boot/efi/EFI/BOOT/*%{-a*}.efi \
|
|
/boot/efi/EFI/BOOT/*%{-A*}.EFI \
|
|
%{nil}
|
|
|
|
%ifarch x86_64
|
|
%define_files -a x64 -A X64
|
|
/boot/efi/EFI/%{efidir}/BOOT.CSV
|
|
/boot/efi/EFI/%{efidir}/MokManager.efi
|
|
/boot/efi/EFI/%{efidir}/shim.efi
|
|
/boot/efi/EFI/BOOT/fallback.efi
|
|
|
|
%define_files -a ia32 -A IA32
|
|
%endif
|
|
%ifarch aarch64
|
|
%define_files -a aa64 -A AA64
|
|
/boot/efi/EFI/%{efidir}/shim.efi
|
|
%endif
|
|
|
|
%changelog
|
|
* Fri May 04 2018 Peter Jones <pjones@redhat.com> - 15-4
|
|
- Fix directory permissions to be 0700 on FAT filesystems
|
|
|
|
* Mon Apr 30 2018 Peter Jones <pjones@redhat.com> - 15-3
|
|
- Pick a release value that'll be higher than what's in F28.
|
|
|
|
* Mon Apr 30 2018 Peter Jones <pjones@redhat.com> - 15-1
|
|
- Fix BOOT*.CSV and update release to -1
|
|
|
|
* Tue Apr 24 2018 Peter Jones <pjones@redhat.com> - 15-0.1
|
|
- Update to shim 15.
|
|
- more reproduceable build
|
|
- better checking for bad linker output
|
|
- flicker-free console if there's no error output
|
|
- improved http boot support
|
|
- better protocol re-installation
|
|
- dhcp proxy support
|
|
- tpm measurement even when verification is disabled
|
|
- more reproducable builds
|
|
- measurement of everything verified through shim_verify()
|
|
- coverity and scan-build checker make targets
|
|
- misc cleanups
|
|
|
|
* Tue Mar 06 2018 Peter Jones <pjones@redhat.com> - 13-5
|
|
- Back off to the thing we had in 13-0.8 until I get new signatures.
|
|
|
|
* Wed Feb 28 2018 Peter Jones <pjones@redhat.com> - 13-4
|
|
- Fix an inverted test that crept in in the signing macro. (Woops.)
|
|
|
|
* Wed Feb 28 2018 Peter Jones <pjones@redhat.com> - 13-2
|
|
- Pivot the shim-signed package to be here.
|
|
|
|
* Wed Nov 01 2017 Peter Jones <pjones@redhat.com> - 13-1
|
|
- Now with the actual signed 64-bit build of shim 13 for x64 as well.
|
|
- Make everything under /boot/efi be mode 0700, since that's what FAT will
|
|
show anyway, so that rpm -V is correct.
|
|
Resolves: rhbz#1508516
|
|
|
|
* Tue Oct 24 2017 Peter Jones <pjones@redhat.com> - 13-0.8
|
|
- Now with signed 32-bit x86 build.
|
|
Related: rhbz#1474861
|
|
|
|
* Wed Oct 04 2017 Peter Jones <pjones@redhat.com> - 13-0.7
|
|
- Make /boot/efi/EFI/fedora/shim.efi still exist on aarch64 as well.
|
|
Resolves: rhbz#1497854
|
|
|
|
* Tue Sep 19 2017 Peter Jones <pjones@redhat.com> - 13-0.6
|
|
- Fix binary format issue on Aarch64
|
|
Resolves: rhbz#1489604
|
|
|
|
* Tue Sep 05 2017 Peter Jones <pjones@redhat.com> - 13-0.5
|
|
- Make /boot/efi/EFI/fedora/shim.efi still exist on x86_64, since some
|
|
machines have boot entries that point to it.
|
|
|
|
* Tue Aug 29 2017 Peter Jones <pjones@redhat.com> - 13-0.4
|
|
- Make our provides not get silently ignore by rpmbuild...
|
|
|
|
* Fri Aug 25 2017 Peter Jones <pjones@redhat.com> - 13-0.3
|
|
- x64: use the new fbx64.efi and mm64.efi as fallback.efi and MokManager.efi
|
|
- Provide: "shim" in x64 and aa64 builds
|
|
|
|
* Thu Aug 24 2017 Peter Jones <pjones@redhat.com> - 13-0.2
|
|
- Obsolete old shim builds.
|
|
|
|
* Tue Aug 22 2017 Peter Jones <pjones@redhat.com> - 13-0.1
|
|
- Initial (partially unsigned) build for multi-arch support on x64/ia32.
|
|
|
|
* Thu Mar 23 2017 Petr Šabata <contyk@redhat.com> - 0.8-9
|
|
- Re-enable dist tag for module builds
|
|
|
|
* Tue Feb 17 2015 Peter Jones <pjones@redhat.com> - 0.8-8
|
|
- Don't dual-sign shim-%%{efidir}.efi either.
|
|
Resolves: rhbz#1184765
|
|
|
|
* Tue Feb 17 2015 Peter Jones <pjones@redhat.com> - 0.8-8
|
|
- Require dbxtool
|
|
|
|
* Wed Dec 17 2014 Peter Jones <pjones@redhat.com> - 0.8-7
|
|
- Wrong -signed changes got built for aarch64 last time, for dumb reasons.
|
|
Related: rhbz#1170289
|
|
|
|
* Fri Dec 05 2014 Peter Jones <pjones@redhat.com> - 0.8-6
|
|
- Rebuild once more so we can use a different -unsigned version on different
|
|
arches (because we can't tag a newer build into aarch64 without an x86
|
|
update to match.)
|
|
Related: rhbz#1170289
|
|
|
|
* Wed Dec 03 2014 Peter Jones <pjones@redhat.com> - 0.8-5
|
|
- Rebuild for aarch64 path fixes
|
|
Related: rhbz#1170289
|
|
|
|
* Thu Oct 30 2014 Peter Jones <pjones@redhat.com> - 0.8-2
|
|
- Remove the dist tag so people don't complain about what it says.
|
|
|
|
* Fri Oct 24 2014 Peter Jones <pjones@redhat.com> - 0.8-1
|
|
- Update to shim 0.8
|
|
rhbz#1148230
|
|
rhbz#1148231
|
|
rhbz#1148232
|
|
- Handle building on aarch64 as well
|
|
|
|
* Fri Jul 18 2014 Peter Jones <pjones@redhat.com> - 0.7-2
|
|
- Don't do multi-signing; too many machines screw up verification.
|
|
Resolves: rhbz#1049749
|
|
|
|
* Wed Nov 13 2013 Peter Jones <pjones@redhat.com> - 0.7-1
|
|
- Update to shim 0.7
|
|
Resolves: rhbz#1023767
|
|
|
|
* Thu Oct 24 2013 Peter Jones <pjones@redhat.com> - 0.5-1
|
|
- Update to shim 0.5
|
|
|
|
* Thu Jun 20 2013 Peter Jones <pjones@redhat.com> - 0.4-1
|
|
- Provide a fallback for uninitialized Boot#### and BootOrder
|
|
Resolves: rhbz#963359
|
|
- Move all signing from shim-unsigned to here
|
|
- properly compare our generated hash from shim-unsigned with the hash of
|
|
the signed binary (as opposed to doing it manually)
|
|
|
|
* Fri May 31 2013 Peter Jones <pjones@redhat.com> - 0.2-4.4
|
|
- Re-sign to get alignments that match the new specification.
|
|
Resolves: rhbz#963361
|
|
|
|
* Thu Feb 14 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.2-4.3
|
|
- Rebuilt for https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
|
|
|
|
* Wed Jan 02 2013 Peter Jones <pjones@redhat.com> - 0.2-3.3
|
|
- Add obsoletes and provides for earlier shim-signed packages, to cover
|
|
the package update cases where previous versions were installed.
|
|
Related: rhbz#888026
|
|
|
|
* Mon Dec 17 2012 Peter Jones <pjones@redhat.com> - 0.2-3.2
|
|
- Make the shim-unsigned dep be on the subpackage.
|
|
|
|
* Sun Dec 16 2012 Peter Jones <pjones@redhat.com> - 0.2-3.1
|
|
- Rebuild to provide "shim" package directly instead of just as a Provides:
|
|
|
|
* Sat Dec 15 2012 Peter Jones <pjones@redhat.com> - 0.2-3
|
|
- Also provide shim-fedora.efi, signed only by the fedora signer.
|
|
- Fix the fedora signature on the result to actually be correct.
|
|
- Update for shim-unsigned 0.2-3
|
|
|
|
* Mon Dec 03 2012 Peter Jones <pjones@redhat.com> - 0.2-2
|
|
- Initial build
|