Control: retitle -1 unblock: shim-signed/1.33 Hey folks,
We've just got the new signed binaries back from Microsoft this morning, so I've now updated to use them and just uploaded shim-unsigned 1.33. Summary of changes since 1.30: * Build against new signed binaries corresponding to 15+1533136590.3beb971-7 * Update Build-Depends and Depends to match. Closes: #928107 * Drop the hard-coded version in Built-Using; pick up the version of shim we're using properly. * Display the sha256sums of the binaries as we check them * Add Breaks/Replaces to shim-signed-common for update-secureboot-policy etc. Closes: #929673 * update-secureboot-policy: fix error if /var/lib/dkms does not exist. Closes: #923718 * Separate the helper scripts into a new shim-signed-common package, apart from the actual signed shim binaries so that we can sensibly support co-installability using Multi-Arch. Closes: #928486 * Add/update translations: + Italian (Closes: #915993, thanks to Beatrice Torracca) + Swedish (Closes: #921410, thanks to Matrin Bagge) + Russian (Closes: #922229, thanks to Lev Lamberov) + Dutch (Closes: #917580, #926664, thanks to Frans Spiesschaert) * Remove doc link used to quieten old lintian versions The main fixes are for #928486 (which is blocking some users building multi-arch live media), but I've also rolled in a trivial fix for #923718 (cosmetic) and a bunch of translation updates (filtered out here). #929673 showed I made a daft mistake with the 1.31 upload. :-( This package fixes our one outstanding RC bug in version 1.30 (#928107), which was impossible to fix until now. debdiff attached. unblock shim-signed/1.33 -- Steve McIntyre, Cambridge, UK. st...@einval.com We don't need no education. We don't need no thought control.
diff -Nru shim-signed-1.30/Makefile shim-signed-1.33/Makefile --- shim-signed-1.30/Makefile 2019-04-19 15:18:30.000000000 +0100 +++ shim-signed-1.33/Makefile 2019-06-09 17:16:05.000000000 +0100 @@ -9,6 +9,7 @@ cp /usr/lib/shim/shim$(EFI_ARCH).efi build/shim$(EFI_ARCH).efi.signed sbattach --attach build/detached-sig build/shim$(EFI_ARCH).efi.signed cmp shim$(EFI_ARCH).efi.signed build/shim$(EFI_ARCH).efi.signed + sha256sum shim$(EFI_ARCH).efi.signed build/shim$(EFI_ARCH).efi.signed clean: rm -rf build diff -Nru shim-signed-1.30/debian/changelog shim-signed-1.33/debian/changelog --- shim-signed-1.30/debian/changelog 2019-04-23 00:01:10.000000000 +0100 +++ shim-signed-1.33/debian/changelog 2019-06-09 17:32:54.000000000 +0100 @@ -1,3 +1,38 @@ +shim-signed (1.33) unstable; urgency=medium + + * Build against new signed binaries corresponding to + 15+1533136590.3beb971-7 + * Update Build-Depends and Depends to match. Closes: #928107 + * Drop the hard-coded version in Built-Using; pick up the version of + shim we're using properly. + * Display the sha256sums of the binaries as we check them + + -- Steve McIntyre <93...@debian.org> Sun, 09 Jun 2019 17:32:54 +0100 + +shim-signed (1.32) unstable; urgency=medium + + * Add Breaks/Replaces to shim-signed-common for + update-secureboot-policy etc. Closes: #929673 + + -- Steve McIntyre <93...@debian.org> Tue, 28 May 2019 14:23:54 +0100 + +shim-signed (1.31) unstable; urgency=medium + + * update-secureboot-policy: fix error if /var/lib/dkms does not + exist. Closes: #923718 + * Separate the helper scripts into a new shim-signed-common package, + apart from the actual signed shim binaries so that we can + sensibly support co-installability using Multi-Arch. + Closes: #928486 + * Add/update translations: + + Italian (Closes: #915993, thanks to Beatrice Torracca) + + Swedish (Closes: #921410, thanks to Matrin Bagge) + + Russian (Closes: #922229, thanks to Lev Lamberov) + + Dutch (Closes: #917580, #926664, thanks to Frans Spiesschaert) + * Remove doc link used to quieten old lintian versions + + -- Steve McIntyre <93...@debian.org> Mon, 27 May 2019 23:02:10 +0100 + shim-signed (1.30) unstable; urgency=medium * Force the built-using version to be 15+1533136590.3beb971-6. That diff -Nru shim-signed-1.30/debian/control shim-signed-1.33/debian/control --- shim-signed-1.30/debian/control 2019-04-22 23:59:15.000000000 +0100 +++ shim-signed-1.33/debian/control 2019-06-09 16:50:25.000000000 +0100 @@ -4,10 +4,7 @@ Maintainer: Debian EFI Team <debian-...@lists.debian.org> Uploaders: Steve McIntyre <93...@debian.org>, Steve Langasek <vor...@debian.org> Build-Depends: debhelper (>= 9), -# Need shim-unsigned version 15+1533136590.3beb971-5 so we can check the -# signature on the right version of shim. Version -6 saw arm64 toolchain -# changes that changed the binary. Ugh. :-( - shim-unsigned (= 15+1533136590.3beb971-5), + shim-unsigned (= 15+1533136590.3beb971-7), # sbsigntool before 0.9.2-2 had a horrid bug with checksum calculation # which broke our build sbsigntool (>= 0.9.2-2), @@ -18,17 +15,17 @@ Package: shim-signed Architecture: amd64 i386 arm64 +Multi-Arch: same Depends: ${misc:Depends}, grub-efi-amd64-bin [amd64], - shim-helpers-amd64-signed (>= 1+15+1533136590.3beb971+5) [amd64], + shim-helpers-amd64-signed (>= 1+15+1533136590.3beb971+7) [amd64], grub-efi-ia32-bin [i386], - shim-helpers-i386-signed (>= 1+15+1533136590.3beb971+5) [i386], + shim-helpers-i386-signed (>= 1+15+1533136590.3beb971+7) [i386], grub-efi-arm64-bin [arm64], - shim-helpers-arm64-signed (>= 1+15+1533136590.3beb971+5) [arm64], - grub2-common (>= 2.02+dfsg1-16), - mokutil + shim-helpers-arm64-signed (>= 1+15+1533136590.3beb971+7) [arm64], + grub2-common (>= 2.02+dfsg1-16) Recommends: secureboot-db -Built-Using: shim (= 15+1533136590.3beb971-6) +Built-Using: shim (= ${shim:Version}) Description: Secure Boot chain-loading bootloader (Microsoft-signed binary) This package provides a minimalist boot loader which allows verifying signatures of other UEFI binaries against either the Secure Boot DB/DBX or @@ -38,3 +35,19 @@ . This package contains the version of the bootloader binary signed by the Microsoft UEFI CA. + +Package: shim-signed-common +Multi-Arch: foreign +Architecture: all +Depends: ${misc:Depends}, mokutil +Replaces: shim-signed (<< 1.32+15+1533136590.3beb971-5) +Breaks: shim-signed (<< 1.32+15+1533136590.3beb971-5) +Description: Secure Boot chain-loading bootloader (common helper scripts) + This package provides a minimalist boot loader which allows verifying + signatures of other UEFI binaries against either the Secure Boot DB/DBX or + against a built-in signature database. Its purpose is to allow a small, + infrequently-changing binary to be signed by the UEFI CA, while allowing + an OS distributor to revision their main bootloader independently of the CA. + . + This package contains common helper scripts for all versions of the + shim-signed package. diff -Nru shim-signed-1.30/debian/lintian-overrides shim-signed-1.33/debian/lintian-overrides --- shim-signed-1.30/debian/lintian-overrides 2019-04-22 22:53:12.000000000 +0100 +++ shim-signed-1.33/debian/lintian-overrides 1970-01-01 01:00:00.000000000 +0100 @@ -1 +0,0 @@ -shim-signed: debconf-is-not-a-registry usr/sbin/update-secureboot-policy diff -Nru shim-signed-1.30/debian/po/POTFILES.in shim-signed-1.33/debian/po/POTFILES.in --- shim-signed-1.30/debian/po/POTFILES.in 2019-03-06 21:15:15.000000000 +0000 +++ shim-signed-1.33/debian/po/POTFILES.in 2019-05-27 22:56:41.000000000 +0100 @@ -1 +1 @@ -[type: gettext/rfc822deb] templates +[type: gettext/rfc822deb] shim-signed-common.templates diff -Nru shim-signed-1.30/debian/rules shim-signed-1.33/debian/rules --- shim-signed-1.30/debian/rules 2019-04-19 15:28:53.000000000 +0100 +++ shim-signed-1.33/debian/rules 2019-05-27 23:21:01.000000000 +0100 @@ -18,13 +18,17 @@ %: dh $@ -docdir := debian/shim-signed/usr/share/doc/shim-signed +docdir := debian/shim-signed-common/usr/share/doc/shim-signed-common override_dh_installchangelogs: - dh_installchangelogs - # Quieten lintian, which otherwise gets confused by our odd version - # number. - ln $(docdir)/changelog $(docdir)/changelog.Debian + dh_installchangelogs -p shim-signed-common + +override_dh_installdocs: + dh_installdocs -p shim-signed-common + dh_installdocs --remaining-packages --link-doc=shim-signed-common + +override_dh_installdebconf: + dh_installdebconf -p shim-signed-common override_dh_gencontrol: dh_gencontrol -- -v$(VERSION)+$(SHIM_VERSION) \ diff -Nru shim-signed-1.30/debian/shim-signed-common.install shim-signed-1.33/debian/shim-signed-common.install --- shim-signed-1.30/debian/shim-signed-common.install 1970-01-01 01:00:00.000000000 +0100 +++ shim-signed-1.33/debian/shim-signed-common.install 2019-05-25 03:15:26.000000000 +0100 @@ -0,0 +1,2 @@ +debian/source_shim-signed.py /usr/share/apport/package-hooks/ +update-secureboot-policy /usr/sbin/ diff -Nru shim-signed-1.30/debian/shim-signed-common.links shim-signed-1.33/debian/shim-signed-common.links --- shim-signed-1.30/debian/shim-signed-common.links 1970-01-01 01:00:00.000000000 +0100 +++ shim-signed-1.33/debian/shim-signed-common.links 2019-03-06 21:15:15.000000000 +0000 @@ -0,0 +1 @@ +usr/share/apport/package-hooks/source_shim-signed.py usr/share/apport/package-hooks/source_shim.py diff -Nru shim-signed-1.30/debian/shim-signed-common.lintian-overrides shim-signed-1.33/debian/shim-signed-common.lintian-overrides --- shim-signed-1.30/debian/shim-signed-common.lintian-overrides 1970-01-01 01:00:00.000000000 +0100 +++ shim-signed-1.33/debian/shim-signed-common.lintian-overrides 2019-05-25 03:29:42.000000000 +0100 @@ -0,0 +1 @@ +shim-signed-common: debconf-is-not-a-registry usr/sbin/update-secureboot-policy diff -Nru shim-signed-1.30/debian/shim-signed-common.postinst shim-signed-1.33/debian/shim-signed-common.postinst --- shim-signed-1.30/debian/shim-signed-common.postinst 1970-01-01 01:00:00.000000000 +0100 +++ shim-signed-1.33/debian/shim-signed-common.postinst 2019-04-22 17:52:51.000000000 +0100 @@ -0,0 +1,59 @@ +#! /bin/sh +set -e + +# Must load the confmodule for our template to be installed correctly. +. /usr/share/debconf/confmodule + +ARCH=$(dpkg --print-architecture) +case ${ARCH} in + amd64) + GRUB_EFI_TARGET="x86_64-efi";; + i386) + GRUB_EFI_TARGET="i386-efi";; + arm64) + GRUB_EFI_TARGET="arm64-efi";; + *) + echo "Unsupported dpkg architecture ${ARCH} in $0. ABORT" + exit 1 + ;; +esac + +config_item () +{ + if [ -f /etc/default/grub ]; then + . /etc/default/grub || return + for x in /etc/default/grub.d/*.cfg; do + if [ -e "$x" ]; then + . "$x" + fi + done + fi + eval echo "\$$1" +} + +case $1 in + triggered) + SHIM_NOTRIGGER=y update-secureboot-policy + ;; + configure) + bootloader_id="$(config_item GRUB_DISTRIBUTOR | tr A-Z a-z | \ + cut -d' ' -f1)" + case $bootloader_id in + kubuntu) bootloader_id=ubuntu ;; + esac + if [ "$bootloader_id" ] && [ -d "/boot/efi/EFI/$bootloader_id" ] \ + && which grub-install >/dev/null 2>&1 + then + grub-install --target=${GRUB_EFI_TARGET} + if dpkg --compare-versions "$2" lt-nl "1.22~"; then + rm -f /boot/efi/EFI/ubuntu/MokManager.efi + fi + fi + + SHIM_NOTRIGGER=y update-secureboot-policy + ;; +esac + +#DEBHELPER# + +exit 0 diff -Nru shim-signed-1.30/debian/shim-signed-common.templates shim-signed-1.33/debian/shim-signed-common.templates --- shim-signed-1.30/debian/shim-signed-common.templates 1970-01-01 01:00:00.000000000 +0100 +++ shim-signed-1.33/debian/shim-signed-common.templates 2019-03-06 21:15:15.000000000 +0000 @@ -0,0 +1,62 @@ +Template: shim/title/secureboot +Type: text +_Description: Configuring UEFI Secure Boot + +Template: shim/error/bad_secureboot_key +Type: error +_Description: Invalid password + The Secure Boot key you've entered is not valid. The password used must be + between 8 and 16 characters. + +Template: shim/disable_secureboot +Type: boolean +Default: true +_Description: Disable UEFI Secure Boot? + If Secure Boot remains enabled on your system, your system may still boot but + any hardware that requires third-party drivers to work correctly may not be + usable. + +Template: shim/enable_secureboot +Type: boolean +Default: false +_Description: Enable UEFI Secure Boot? + If Secure Boot is enabled on your system, your system may still boot but + any hardware that requires third-party drivers to work correctly may not be + usable. + +Template: shim/secureboot_explanation +Type: note +_Description: Your system has UEFI Secure Boot enabled + UEFI Secure Boot is not compatible with the use of third-party drivers. + . + The system will assist you in toggling UEFI Secure Boot. To ensure that this + change is being made by you as an authorized user, and not by an attacker, + you must choose a password now and then use the same password after reboot + to confirm the change. + . + If you choose to proceed but do not confirm the password upon reboot, the + Secure Boot configuration will not be changed, and the machine will continue + booting as before. + . + If Secure Boot remains enabled on your system, your system may still boot but + any hardware that requires third-party drivers to work correctly may not be + usable. + +Template: shim/secureboot_key +Type: password +_Description: UEFI Secure Boot password: + Please enter a password for configuring UEFI Secure Boot. + . + This password will be used after a reboot to confirm authorization for a + change to Secure Boot state. + +Template: shim/secureboot_key_again +Type: password +_Description: Re-enter password to verify: + Please enter the same password again to verify that you have typed it + correctly. + +Template: shim/error/secureboot_key_mismatch +Type: error +_Description: Password input error + The two passwords you entered were not the same. Please try again. diff -Nru shim-signed-1.30/debian/shim-signed.install shim-signed-1.33/debian/shim-signed.install --- shim-signed-1.30/debian/shim-signed.install 2019-04-22 18:08:11.000000000 +0100 +++ shim-signed-1.33/debian/shim-signed.install 2019-05-25 03:15:14.000000000 +0100 @@ -1,3 +1 @@ build/shim*.efi.signed /usr/lib/shim -debian/source_shim-signed.py /usr/share/apport/package-hooks/ -update-secureboot-policy /usr/sbin/ diff -Nru shim-signed-1.30/debian/shim-signed.links shim-signed-1.33/debian/shim-signed.links --- shim-signed-1.30/debian/shim-signed.links 2019-03-06 21:15:15.000000000 +0000 +++ shim-signed-1.33/debian/shim-signed.links 1970-01-01 01:00:00.000000000 +0100 @@ -1 +0,0 @@ -usr/share/apport/package-hooks/source_shim-signed.py usr/share/apport/package-hooks/source_shim.py diff -Nru shim-signed-1.30/debian/shim-signed.postinst shim-signed-1.33/debian/shim-signed.postinst --- shim-signed-1.30/debian/shim-signed.postinst 2019-04-22 17:52:51.000000000 +0100 +++ shim-signed-1.33/debian/shim-signed.postinst 1970-01-01 01:00:00.000000000 +0100 @@ -1,59 +0,0 @@ -#! /bin/sh -set -e - -# Must load the confmodule for our template to be installed correctly. -. /usr/share/debconf/confmodule - -ARCH=$(dpkg --print-architecture) -case ${ARCH} in - amd64) - GRUB_EFI_TARGET="x86_64-efi";; - i386) - GRUB_EFI_TARGET="i386-efi";; - arm64) - GRUB_EFI_TARGET="arm64-efi";; - *) - echo "Unsupported dpkg architecture ${ARCH} in $0. ABORT" - exit 1 - ;; -esac - -config_item () -{ - if [ -f /etc/default/grub ]; then - . /etc/default/grub || return - for x in /etc/default/grub.d/*.cfg; do - if [ -e "$x" ]; then - . "$x" - fi - done - fi - eval echo "\$$1" -} - -case $1 in - triggered) - SHIM_NOTRIGGER=y update-secureboot-policy - ;; - configure) - bootloader_id="$(config_item GRUB_DISTRIBUTOR | tr A-Z a-z | \ - cut -d' ' -f1)" - case $bootloader_id in - kubuntu) bootloader_id=ubuntu ;; - esac - if [ "$bootloader_id" ] && [ -d "/boot/efi/EFI/$bootloader_id" ] \ - && which grub-install >/dev/null 2>&1 - then - grub-install --target=${GRUB_EFI_TARGET} - if dpkg --compare-versions "$2" lt-nl "1.22~"; then - rm -f /boot/efi/EFI/ubuntu/MokManager.efi - fi - fi - - SHIM_NOTRIGGER=y update-secureboot-policy - ;; -esac - -#DEBHELPER# - -exit 0 diff -Nru shim-signed-1.30/debian/templates shim-signed-1.33/debian/templates --- shim-signed-1.30/debian/templates 2019-03-06 21:15:15.000000000 +0000 +++ shim-signed-1.33/debian/templates 1970-01-01 01:00:00.000000000 +0100 @@ -1,62 +0,0 @@ -Template: shim/title/secureboot -Type: text -_Description: Configuring UEFI Secure Boot - -Template: shim/error/bad_secureboot_key -Type: error -_Description: Invalid password - The Secure Boot key you've entered is not valid. The password used must be - between 8 and 16 characters. - -Template: shim/disable_secureboot -Type: boolean -Default: true -_Description: Disable UEFI Secure Boot? - If Secure Boot remains enabled on your system, your system may still boot but - any hardware that requires third-party drivers to work correctly may not be - usable. - -Template: shim/enable_secureboot -Type: boolean -Default: false -_Description: Enable UEFI Secure Boot? - If Secure Boot is enabled on your system, your system may still boot but - any hardware that requires third-party drivers to work correctly may not be - usable. - -Template: shim/secureboot_explanation -Type: note -_Description: Your system has UEFI Secure Boot enabled - UEFI Secure Boot is not compatible with the use of third-party drivers. - . - The system will assist you in toggling UEFI Secure Boot. To ensure that this - change is being made by you as an authorized user, and not by an attacker, - you must choose a password now and then use the same password after reboot - to confirm the change. - . - If you choose to proceed but do not confirm the password upon reboot, the - Secure Boot configuration will not be changed, and the machine will continue - booting as before. - . - If Secure Boot remains enabled on your system, your system may still boot but - any hardware that requires third-party drivers to work correctly may not be - usable. - -Template: shim/secureboot_key -Type: password -_Description: UEFI Secure Boot password: - Please enter a password for configuring UEFI Secure Boot. - . - This password will be used after a reboot to confirm authorization for a - change to Secure Boot state. - -Template: shim/secureboot_key_again -Type: password -_Description: Re-enter password to verify: - Please enter the same password again to verify that you have typed it - correctly. - -Template: shim/error/secureboot_key_mismatch -Type: error -_Description: Password input error - The two passwords you entered were not the same. Please try again. Binary files /tmp/gVpIQ5rzCl/shim-signed-1.30/shimaa64.efi.signed and /tmp/SXHcRWNCX6/shim-signed-1.33/shimaa64.efi.signed differ Binary files /tmp/gVpIQ5rzCl/shim-signed-1.30/shimia32.efi.signed and /tmp/SXHcRWNCX6/shim-signed-1.33/shimia32.efi.signed differ Binary files /tmp/gVpIQ5rzCl/shim-signed-1.30/shimx64.efi.signed and /tmp/SXHcRWNCX6/shim-signed-1.33/shimx64.efi.signed differ diff -Nru shim-signed-1.30/update-secureboot-policy shim-signed-1.33/update-secureboot-policy --- shim-signed-1.30/update-secureboot-policy 2019-03-06 21:15:15.000000000 +0000 +++ shim-signed-1.33/update-secureboot-policy 2019-05-25 02:26:08.000000000 +0100 @@ -142,8 +142,9 @@ exit 0 fi -if [ `find /var/lib/dkms -type d -print | wc -l ` -gt 1 ]; then - setup_mok_validation $enable_secureboot +if [ -d /var/lib/dkms ] && + [ `find /var/lib/dkms -type d -print | wc -l ` -gt 1 ]; then + setup_mok_validation $enable_secureboot else echo "No DKMS packages installed: not changing Secure Boot validation state." fi
signature.asc
Description: PGP signature