[ubuntu/bionic-proposed] shim-signed 1.34 (Accepted)
Mathieu Trudel-Lapierre
cyphermox at ubuntu.com
Thu Apr 19 18:32:49 UTC 2018
shim-signed (1.34) bionic; urgency=medium
* update-secureboot-policy: (LP: #1748983)
- Factor out validate_password() and clear_passwords() for reuse.
- Add --new-key option to generate a self-signed MOK.
- Add --enroll-key option to allow enrolling a new MOK in shim.
- Drop --enable and --disable options; users should call mokutil directly
instead.
* debian/shim-signed.postinst:
- When triggered, explicitly try to enroll the available MOK.
* debian/shim-signed.install, openssl.cnf: Install some default configuration
for creating our self-signed key.
* debian/shim-signed.dirs: make sure we have a directory where to put a MOK.
* debian/templates: update templates for update-secureboot-policy changes.
* debian/control: add versioned Breaks: for dkms.
Date: Wed, 18 Apr 2018 22:35:46 -0400
Changed-By: Mathieu Trudel-Lapierre <cyphermox at ubuntu.com>
Maintainer: Steve Langasek <steve.langasek at ubuntu.com>
https://launchpad.net/ubuntu/+source/shim-signed/1.34
-------------- next part --------------
Format: 1.8
Date: Wed, 18 Apr 2018 22:35:46 -0400
Source: shim-signed
Binary: shim-signed
Architecture: source
Version: 1.34
Distribution: bionic
Urgency: medium
Maintainer: Steve Langasek <steve.langasek at ubuntu.com>
Changed-By: Mathieu Trudel-Lapierre <cyphermox at ubuntu.com>
Description:
shim-signed - Secure Boot chain-loading bootloader (Microsoft-signed binary)
Launchpad-Bugs-Fixed: 1748983
Changes:
shim-signed (1.34) bionic; urgency=medium
.
* update-secureboot-policy: (LP: #1748983)
- Factor out validate_password() and clear_passwords() for reuse.
- Add --new-key option to generate a self-signed MOK.
- Add --enroll-key option to allow enrolling a new MOK in shim.
- Drop --enable and --disable options; users should call mokutil directly
instead.
* debian/shim-signed.postinst:
- When triggered, explicitly try to enroll the available MOK.
* debian/shim-signed.install, openssl.cnf: Install some default configuration
for creating our self-signed key.
* debian/shim-signed.dirs: make sure we have a directory where to put a MOK.
* debian/templates: update templates for update-secureboot-policy changes.
* debian/control: add versioned Breaks: for dkms.
Checksums-Sha1:
eabef71f432f4b764df27b1c47dc2de4ce26413a 1623 shim-signed_1.34.dsc
0ff5ddfe50703f61a1b0a840a23c2b192c0e3579 320416 shim-signed_1.34.tar.xz
c00011a8ed4672127413b9e4fd962a1c2dd05ddb 6025 shim-signed_1.34_source.buildinfo
Checksums-Sha256:
2e0fcad54383dfff64bbd79f97e00396ff3863ed0b5307a3bd708f1ee254b48e 1623 shim-signed_1.34.dsc
75f9afa61ede9d4ec80641b85ba7ea66896d1bd0eca9fe955b47cfc36d3bb625 320416 shim-signed_1.34.tar.xz
7f4681f92ee3fab7ac576bb7ae3d088f6791e834fb60cd34dc6bdc4d1f9dc860 6025 shim-signed_1.34_source.buildinfo
Files:
2fa7688ab5bad628941fbab49c26db79 1623 utils optional shim-signed_1.34.dsc
fc562289625bab564f1a21eaa1371a21 320416 utils optional shim-signed_1.34.tar.xz
6ef27c18118d9f8d3b0fc1f4417f38b2 6025 utils optional shim-signed_1.34_source.buildinfo
More information about the Bionic-changes
mailing list