-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for secure boot #110
Comments
It turned out to be pretty easy to do this with sbupdate; it takes care of generating the EFI Unified Kernel Image, with firmware included, and then signing it using This sbupdate.conf takes initrd images in /boot made with mkinitcpio as well as booster for both linux and linux-zen kernels, and puts everything in /efi:
|
These are great news @j0057. I like the way this EFI generation decoupled from initramfs generation. Does Are there any |
I think pacman hooks are run alphabetically, so There is foxboron/sbctl which is already in |
Has |
Ok, perhaps it is simpler to just drop grub here.. |
I'm against this in favor letting external tools do it instead as currently, For instance, we could just have a shell script similar to |
unified kernel image is considered second class citizen in sbctl.
imho it'd be useful if booster could create a unified image,
then one can use sbctl or similar to sign it.
|
Add a way to generate booster-based unified images that get signed with a key. Such final images could be used for machines configured with secure boot.
For the reference here is secure boot implementation from mkinitcpio project:
archlinux/mkinitcpio@f40bb42
The text was updated successfully, but these errors were encountered: