[ubuntu/bionic-proposed] shim-signed 1.34 (Accepted)

Mathieu Trudel-Lapierre cyphermox at ubuntu.com
Thu Apr 19 18:32:49 UTC 2018


shim-signed (1.34) bionic; urgency=medium

  * update-secureboot-policy: (LP: #1748983)
    - Factor out validate_password() and clear_passwords() for reuse.
    - Add --new-key option to generate a self-signed MOK.
    - Add --enroll-key option to allow enrolling a new MOK in shim.
    - Drop --enable and --disable options; users should call mokutil directly
      instead.
  * debian/shim-signed.postinst:
    - When triggered, explicitly try to enroll the available MOK.
  * debian/shim-signed.install, openssl.cnf: Install some default configuration
    for creating our self-signed key.
  * debian/shim-signed.dirs: make sure we have a directory where to put a MOK.
  * debian/templates: update templates for update-secureboot-policy changes.
  * debian/control: add versioned Breaks: for dkms.

Date: Wed, 18 Apr 2018 22:35:46 -0400
Changed-By: Mathieu Trudel-Lapierre <cyphermox at ubuntu.com>
Maintainer: Steve Langasek <steve.langasek at ubuntu.com>
https://launchpad.net/ubuntu/+source/shim-signed/1.34
-------------- next part --------------
Format: 1.8
Date: Wed, 18 Apr 2018 22:35:46 -0400
Source: shim-signed
Binary: shim-signed
Architecture: source
Version: 1.34
Distribution: bionic
Urgency: medium
Maintainer: Steve Langasek <steve.langasek at ubuntu.com>
Changed-By: Mathieu Trudel-Lapierre <cyphermox at ubuntu.com>
Description:
 shim-signed - Secure Boot chain-loading bootloader (Microsoft-signed binary)
Launchpad-Bugs-Fixed: 1748983
Changes:
 shim-signed (1.34) bionic; urgency=medium
 .
   * update-secureboot-policy: (LP: #1748983)
     - Factor out validate_password() and clear_passwords() for reuse.
     - Add --new-key option to generate a self-signed MOK.
     - Add --enroll-key option to allow enrolling a new MOK in shim.
     - Drop --enable and --disable options; users should call mokutil directly
       instead.
   * debian/shim-signed.postinst:
     - When triggered, explicitly try to enroll the available MOK.
   * debian/shim-signed.install, openssl.cnf: Install some default configuration
     for creating our self-signed key.
   * debian/shim-signed.dirs: make sure we have a directory where to put a MOK.
   * debian/templates: update templates for update-secureboot-policy changes.
   * debian/control: add versioned Breaks: for dkms.
Checksums-Sha1:
 eabef71f432f4b764df27b1c47dc2de4ce26413a 1623 shim-signed_1.34.dsc
 0ff5ddfe50703f61a1b0a840a23c2b192c0e3579 320416 shim-signed_1.34.tar.xz
 c00011a8ed4672127413b9e4fd962a1c2dd05ddb 6025 shim-signed_1.34_source.buildinfo
Checksums-Sha256:
 2e0fcad54383dfff64bbd79f97e00396ff3863ed0b5307a3bd708f1ee254b48e 1623 shim-signed_1.34.dsc
 75f9afa61ede9d4ec80641b85ba7ea66896d1bd0eca9fe955b47cfc36d3bb625 320416 shim-signed_1.34.tar.xz
 7f4681f92ee3fab7ac576bb7ae3d088f6791e834fb60cd34dc6bdc4d1f9dc860 6025 shim-signed_1.34_source.buildinfo
Files:
 2fa7688ab5bad628941fbab49c26db79 1623 utils optional shim-signed_1.34.dsc
 fc562289625bab564f1a21eaa1371a21 320416 utils optional shim-signed_1.34.tar.xz
 6ef27c18118d9f8d3b0fc1f4417f38b2 6025 utils optional shim-signed_1.34_source.buildinfo


More information about the Bionic-changes mailing list