%define GITDATE 20210527 %define GITCOMMIT e1999b264f1f %define TOOLCHAIN GCC5 %define OPENSSL_VER 1.1.1g %global softfloat_version 20180726-gitb64af41 %define qosb_testing 0 %ifarch x86_64 %define qosb_testing 1 %endif %define qemu_binary /usr/bin/qemu-system-x86_64 %if 0%{?fedora:1} %define cross 1 %endif %ifarch %{ix86} x86_64 %if 0%{?fedora:1} %define build_ovmf_ia32 1 %endif %ifarch x86_64 %define build_ovmf_x64 1 %endif %endif %ifarch aarch64 %define build_aavmf_aarch64 1 %endif %ifarch %{arm} %define build_aavmf_arm 1 %endif %if 0%{?cross:1} %define build_ovmf_x64 1 %define build_ovmf_ia32 1 %define build_aavmf_aarch64 1 %define build_aavmf_arm 1 %endif Name: edk2 Version: %{GITDATE}git%{GITCOMMIT} Release: 1%{?dist} Summary: UEFI firmware for 64-bit virtual machines License: BSD-2-Clause-Patent and OpenSSL and MIT URL: http://www.tianocore.org # The source tarball is created using following commands: # COMMIT=e1999b264f1f # git archive --format=tar --prefix=edk2-$COMMIT/ $COMMIT \ # | xz -9ev >/tmp/edk2-$COMMIT.tar.xz Source0: edk2-%{GITCOMMIT}.tar.xz Source1: ovmf-whitepaper-c770f8c.txt Source2: openssl-rhel-bdd048e929dcfcf2f046d74e812e0e3d5fc58504.tar.xz Source3: ovmf-vars-generator Source4: LICENSE.qosb Source5: RedHatSecureBootPkKek1.pem # Fedora specific sources Source50: softfloat-%{softfloat_version}.tar.xz Source51: build-iso.sh Source52: 40-edk2-ovmf-x64-sb-enrolled.json Source53: 50-edk2-ovmf-x64-sb.json Source54: 60-edk2-ovmf-x64.json Source55: 40-edk2-ovmf-ia32-sb-enrolled.json Source56: 50-edk2-ovmf-ia32-sb.json Source57: 60-edk2-ovmf-ia32.json Source58: 70-edk2-aarch64-verbose.json Source59: 70-edk2-arm-verbose.json # non-upstream patches Patch0008: 0008-BaseTools-do-not-build-BrotliCompress-RH-only.patch Patch0009: 0009-MdeModulePkg-remove-package-private-Brotli-include-p.patch Patch0010: 0010-advertise-OpenSSL-on-TianoCore-splash-screen-boot-lo.patch Patch0011: 0011-OvmfPkg-increase-max-debug-message-length-to-512-RHE.patch Patch0012: 0012-MdeModulePkg-TerminalDxe-add-other-text-resolutions-.patch Patch0013: 0013-MdeModulePkg-TerminalDxe-set-xterm-resolution-on-mod.patch Patch0014: 0014-OvmfPkg-take-PcdResizeXterm-from-the-QEMU-command-li.patch Patch0015: 0015-ArmVirtPkg-take-PcdResizeXterm-from-the-QEMU-command.patch Patch0016: 0016-OvmfPkg-allow-exclusion-of-the-shell-from-the-firmwa.patch Patch0017: 0017-ArmPlatformPkg-introduce-fixed-PCD-for-early-hello-m.patch Patch0018: 0018-ArmPlatformPkg-PrePeiCore-write-early-hello-message-.patch Patch0019: 0019-ArmVirtPkg-set-early-hello-message-RH-only.patch Patch0020: 0020-OvmfPkg-enable-DEBUG_VERBOSE-RHEL-only.patch Patch0021: 0021-OvmfPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuVide.patch Patch0022: 0022-ArmVirtPkg-silence-DEBUG_VERBOSE-0x00400000-in-QemuR.patch Patch0023: 0023-OvmfPkg-QemuRamfbDxe-Do-not-report-DXE-failure-on-Aa.patch Patch0024: 0024-OvmfPkg-silence-EFI_D_VERBOSE-0x00400000-in-NvmExpre.patch Patch0025: 0025-CryptoPkg-OpensslLib-list-RHEL8-specific-OpenSSL-fil.patch Patch0026: 0026-OvmfPkg-QemuKernelLoaderFsDxe-suppress-error-on-no-k.patch Patch0027: 0027-SecurityPkg-Tcg2Dxe-suppress-error-on-no-swtpm-in-si.patch %if 0%{?cross:1} %endif %if 0%{?fedora:1} # # actual firmware builds support cross-compiling. edk2-tools # in theory should build everywhere without much trouble, but # in practice the edk2 build system barfs on archs it doesn't know # (such as ppc), so lets limit things to the known-good ones. # ExclusiveArch: %{ix86} x86_64 %{arm} aarch64 %else ExclusiveArch: x86_64 aarch64 %endif BuildRequires: gcc gcc-c++ git BuildRequires: python3 python3-devel BuildRequires: libuuid-devel %if 0%{?cross:1} BuildRequires: gcc-aarch64-linux-gnu BuildRequires: gcc-arm-linux-gnu BuildRequires: gcc-x86_64-linux-gnu %endif BuildRequires: iasl BuildRequires: nasm BuildRequires: qemu-img BuildRequires: xorriso BuildRequires: bc BuildRequires: sed BuildRequires: perl BuildRequires: findutils # These are for QOSB BuildRequires: python3-requests BuildRequires: qemu-system-x86 BuildRequires: make %if %{qosb_testing} # For verifying SB enablement in the above variable store template, we need a # guest kernel that prints "Secure boot enabled". BuildRequires: kernel-core >= 4.18.0-161 BuildRequires: rpmdevtools %endif %description EDK II is a development code base for creating UEFI drivers, applications and firmware images. %package tools Summary: EFI Development Kit II Tools %description tools This package provides tools that are needed to build EFI executables and ROMs using the GNU tools. %package tools-python Summary: EFI Development Kit II Tools Requires: python3 BuildArch: noarch %description tools-python This package provides tools that are needed to build EFI executables and ROMs using the GNU tools. You do not need to install this package; you probably want to install edk2-tools only. %package tools-doc Summary: Documentation for EFI Development Kit II Tools BuildArch: noarch %description tools-doc This package documents the tools that are needed to build EFI executables and ROMs using the GNU tools. %package qosb Summary: Tool to enroll secureboot Requires: python3 Buildarch: noarch %description qosb This package contains QOSB (QEMU OVMF Secure Boot), which can enroll OVMF variable files to enforce Secure Boot. %if 0%{?build_ovmf_x64:1} %package ovmf Summary: Open Virtual Machine Firmware # OVMF includes the Secure Boot and IPv6 features; it has a builtin OpenSSL # library. License: BSD-2-Clause-Patent and OpenSSL Provides: bundled(openssl) Provides: OVMF = %{version}-%{release} Obsoletes: OVMF < %{version}-%{release} BuildArch: noarch %description ovmf EFI Development Kit II Open Virtual Machine Firmware (x64) %endif %if 0%{?build_ovmf_ia32:1} %package ovmf-ia32 Summary: Open Virtual Machine Firmware # OVMF includes the Secure Boot and IPv6 features; it has a builtin OpenSSL # library. License: BSD-2-Clause-Patent and OpenSSL Provides: bundled(openssl) BuildArch: noarch %description ovmf-ia32 EFI Development Kit II Open Virtual Machine Firmware (ia32) %endif %if 0%{?build_aavmf_aarch64:1} %package aarch64 Summary: AARCH64 Virtual Machine Firmware Provides: AAVMF = %{version}-%{release} Obsoletes: AAVMF < %{version}-%{release} BuildArch: noarch # No Secure Boot for AAVMF yet, but we include OpenSSL for the IPv6/HTTP boot stack. License: BSD-2-Clause-Patent and OpenSSL Provides: bundled(openssl) %description aarch64 EFI Development Kit II AARCH64 UEFI Firmware %endif %if 0%{?build_aavmf_arm:1} %package arm Summary: ARM Virtual Machine Firmware BuildArch: noarch # No Secure Boot for ARMv7, but we include OpenSSL for the IPv6/HTTP boot stack. License: BSD-2-Clause-Patent and OpenSSL %description arm EFI Development Kit II ARMv7 UEFI Firmware %endif %prep # We needs some special git config options that %%autosetup won't give us. # We init the git dir ourselves, then tell %%autosetup not to blow it away. %setup -q -n edk2-%{GITCOMMIT} git init -q git config core.whitespace cr-at-eol git config am.keepcr true # -T is passed to %%setup to not re-extract the archive # -D is passed to %%setup to not delete the existing archive dir %autosetup -T -D -n edk2-%{GITCOMMIT} -S git_am cp -a -- %{SOURCE1} %{SOURCE3} . # extract openssl into place tar -C CryptoPkg/Library/OpensslLib -a -f %{SOURCE2} -x # extract softfloat into place tar -xf %{SOURCE50} --strip-components=1 --directory ArmPkg/Library/ArmSoftFloatLib/berkeley-softfloat-3/ # Format the Red Hat-issued certificate that is to be enrolled as both Platform # Key and first Key Exchange Key, as an SMBIOS OEM String. This means stripping # the PEM header and footer, and prepending the textual representation of the # GUID that identifies this particular OEM String to "EnrollDefaultKeys.efi", # plus the separator ":". For details, see # comments 2, 7, 14. sed \ -e 's/^-----BEGIN CERTIFICATE-----$/4e32566d-8e9e-4f52-81d3-5bb9715f9727:/' \ -e '/^-----END CERTIFICATE-----$/d' \ %{SOURCE5} \ > PkKek1.oemstr cp -a -- %{SOURCE4} . %build export PYTHON_COMMAND=%{__python3} source ./edksetup.sh # compiler CC_FLAGS="-t GCC5" # parallel builds JOBS="%{?_smp_mflags}" JOBS="${JOBS#-j}" if test "$JOBS" != ""; then CC_FLAGS="${CC_FLAGS} -n $JOBS" fi # common features CC_FLAGS="$CC_FLAGS --cmd-len=65536 -b DEBUG --hash" CC_FLAGS="$CC_FLAGS -D NETWORK_IP6_ENABLE" CC_FLAGS="$CC_FLAGS -D NETWORK_TLS_ENABLE" CC_FLAGS="$CC_FLAGS -D NETWORK_HTTP_BOOT_ENABLE" CC_FLAGS="$CC_FLAGS -D TPM_ENABLE" # ovmf features OVMF_FLAGS="${CC_FLAGS}" OVMF_FLAGS="${OVMF_FLAGS} -D FD_SIZE_2MB" # ovmf + secure boot features OVMF_SB_FLAGS="${OVMF_FLAGS}" OVMF_SB_FLAGS="${OVMF_SB_FLAGS} -D SECURE_BOOT_ENABLE" OVMF_SB_FLAGS="${OVMF_SB_FLAGS} -D SMM_REQUIRE" OVMF_SB_FLAGS="${OVMF_SB_FLAGS} -D EXCLUDE_SHELL_FROM_FD" # arm firmware features ARM_FLAGS="${CC_FLAGS}" unset MAKEFLAGS %make_build -C BaseTools \ EXTRA_OPTFLAGS="%{optflags}" \ EXTRA_LDFLAGS="%{__global_ldflags}" sed -i -e 's/-Werror//' Conf/tools_def.txt %if 0%{?cross:1} export GCC5_IA32_PREFIX="x86_64-linux-gnu-" export GCC5_X64_PREFIX="x86_64-linux-gnu-" export GCC5_AARCH64_PREFIX="aarch64-linux-gnu-" export GCC5_ARM_PREFIX="arm-linux-gnu-" %endif # build ovmf (x64) %if 0%{?build_ovmf_x64:1} mkdir -p ovmf build ${OVMF_FLAGS} -a X64 -p OvmfPkg/OvmfPkgX64.dsc cp Build/OvmfX64/*/FV/OVMF_*.fd ovmf/ rm -rf Build/OvmfX64 # build ovmf (x64) with secure boot build ${OVMF_SB_FLAGS} -a IA32 -a X64 -p OvmfPkg/OvmfPkgIa32X64.dsc cp Build/Ovmf3264/*/FV/OVMF_CODE.fd ovmf/OVMF_CODE.secboot.fd # build ovmf (x64) shell iso with EnrollDefaultKeys cp Build/Ovmf3264/*/X64/Shell.efi ovmf/ cp Build/Ovmf3264/*/X64/EnrollDefaultKeys.efi ovmf sh %{_sourcedir}/build-iso.sh ovmf/ # Enroll the default certificates in a separate variable store template. %{__python3} ovmf-vars-generator --verbose --verbose \ --qemu-binary %{qemu_binary} \ --ovmf-binary ovmf/OVMF_CODE.secboot.fd \ --ovmf-template-vars ovmf/OVMF_VARS.fd \ --uefi-shell-iso ovmf/UefiShell.iso \ --oem-string "$(< PkKek1.oemstr)" \ --skip-testing \ ovmf/OVMF_VARS.secboot.fd %endif # build ovmf-ia32 %if 0%{?build_ovmf_ia32:1} mkdir -p ovmf-ia32 build ${OVMF_FLAGS} -a IA32 -p OvmfPkg/OvmfPkgIa32.dsc cp Build/OvmfIa32/*/FV/OVMF_CODE*.fd ovmf-ia32/ # cp VARS files from from ovmf/, which are all we need cp ovmf/OVMF_VARS*.fd ovmf-ia32/ rm -rf Build/OvmfIa32 # build ovmf-ia32 with secure boot build ${OVMF_SB_FLAGS} -a IA32 -p OvmfPkg/OvmfPkgIa32.dsc cp Build/OvmfIa32/*/FV/OVMF_CODE.fd ovmf-ia32/OVMF_CODE.secboot.fd # build ovmf-ia32 shell iso with EnrollDefaultKeys cp Build/OvmfIa32/*/IA32/Shell.efi ovmf-ia32/Shell.efi cp Build/OvmfIa32/*/IA32/EnrollDefaultKeys.efi ovmf-ia32/EnrollDefaultKeys.efi sh %{_sourcedir}/build-iso.sh ovmf-ia32/ %endif # build aarch64 firmware %if 0%{?build_aavmf_aarch64:1} mkdir -p aarch64 build $ARM_FLAGS -a AARCH64 -p ArmVirtPkg/ArmVirtQemu.dsc cp Build/ArmVirtQemu-AARCH64/DEBUG_*/FV/*.fd aarch64 dd of="aarch64/QEMU_EFI-pflash.raw" if="/dev/zero" bs=1M count=64 dd of="aarch64/QEMU_EFI-pflash.raw" if="aarch64/QEMU_EFI.fd" conv=notrunc dd of="aarch64/vars-template-pflash.raw" if="/dev/zero" bs=1M count=64 %endif # build ARMv7 firmware %if 0%{?build_aavmf_arm:1} mkdir -p arm build $ARM_FLAGS -a ARM -p ArmVirtPkg/ArmVirtQemu.dsc cp Build/ArmVirtQemu-ARM/DEBUG_*/FV/*.fd arm dd of="arm/QEMU_EFI-pflash.raw" if="/dev/zero" bs=1M count=64 dd of="arm/QEMU_EFI-pflash.raw" if="arm/QEMU_EFI.fd" conv=notrunc dd of="arm/vars-template-pflash.raw" if="/dev/zero" bs=1M count=64 %endif %check %if %{qosb_testing} # Of the installed host kernels, boot the one with the highest Version-Release # under OVMF, and check if it prints "Secure boot enabled". KERNEL_PKG=$(rpm -q kernel-core | rpmdev-sort | tail -n 1) KERNEL_IMG=$(rpm -q -l $KERNEL_PKG | egrep '^/lib/modules/[^/]+/vmlinuz$') %{__python3} ovmf-vars-generator --verbose --verbose \ --qemu-binary %{qemu_binary} \ --ovmf-binary ovmf/OVMF_CODE.secboot.fd \ --ovmf-template-vars ovmf/OVMF_VARS.fd \ --uefi-shell-iso ovmf/UefiShell.iso \ --kernel-path $KERNEL_IMG \ --skip-enrollment \ --no-download \ ovmf/OVMF_VARS.secboot.fd # endif qosb_testing %endif %install cp CryptoPkg/Library/OpensslLib/openssl/LICENSE LICENSE.openssl mkdir -p %{buildroot}%{_bindir} \ %{buildroot}%{_datadir}/%{name}/Conf \ %{buildroot}%{_datadir}/%{name}/Scripts install BaseTools/Source/C/bin/* \ %{buildroot}%{_bindir} install BaseTools/BinWrappers/PosixLike/LzmaF86Compress \ %{buildroot}%{_bindir} install BaseTools/BuildEnv \ %{buildroot}%{_datadir}/%{name} install BaseTools/Conf/*.template \ %{buildroot}%{_datadir}/%{name}/Conf install BaseTools/Scripts/GccBase.lds \ %{buildroot}%{_datadir}/%{name}/Scripts cp -R BaseTools/Source/Python %{buildroot}%{_datadir}/%{name}/Python for i in build BPDG Ecc GenDepex GenFds GenPatchPcdTable PatchPcdValue TargetTool Trim UPT; do echo '#!/bin/sh export PYTHONPATH=%{_datadir}/%{name}/Python exec python3 '%{_datadir}/%{name}/Python/$i/$i.py' "$@"' > %{buildroot}%{_bindir}/$i chmod +x %{buildroot}%{_bindir}/$i done # For distro-provided firmware packages, the specification # (https://git.qemu.org/?p=qemu.git;a=blob;f=docs/interop/firmware.json) # says the JSON "descriptor files" to be searched in this directory: # `/usr/share/firmware/`. Create it. mkdir -p %{buildroot}/%{_datadir}/qemu/firmware mkdir -p %{buildroot}/usr/share/%{name} %if 0%{?build_ovmf_x64:1} cp -a ovmf %{buildroot}/usr/share/%{name} # Libvirt hardcodes this directory name mkdir %{buildroot}/usr/share/OVMF ln -sf ../%{name}/ovmf/OVMF_CODE.fd %{buildroot}/usr/share/OVMF ln -sf ../%{name}/ovmf/OVMF_CODE.secboot.fd %{buildroot}/usr/share/OVMF ln -sf ../%{name}/ovmf/OVMF_VARS.fd %{buildroot}/usr/share/OVMF ln -sf ../%{name}/ovmf/OVMF_VARS.secboot.fd %{buildroot}/usr/share/OVMF ln -sf ../%{name}/ovmf/UefiShell.iso %{buildroot}/usr/share/OVMF for f in %{_sourcedir}/*edk2-ovmf-x64*.json; do install -pm 644 $f %{buildroot}/%{_datadir}/qemu/firmware done %endif %if 0%{?build_ovmf_ia32:1} cp -a ovmf-ia32 %{buildroot}/usr/share/%{name} for f in %{_sourcedir}/*edk2-ovmf-ia32*.json; do install -pm 644 $f %{buildroot}/%{_datadir}/qemu/firmware done %endif %if 0%{?build_aavmf_aarch64:1} cp -a aarch64 %{buildroot}/usr/share/%{name} # Libvirt hardcodes this directory name mkdir %{buildroot}/usr/share/AAVMF ln -sf ../%{name}/aarch64/QEMU_EFI-pflash.raw %{buildroot}/usr/share/AAVMF/AAVMF_CODE.fd ln -sf ../%{name}/aarch64/vars-template-pflash.raw %{buildroot}/usr/share/AAVMF/AAVMF_VARS.fd for f in %{_sourcedir}/*edk2-aarch64*.json; do install -pm 644 $f %{buildroot}/%{_datadir}/qemu/firmware done %endif %if 0%{?build_aavmf_arm:1} cp -a arm %{buildroot}/usr/share/%{name} ln -sf ../%{name}/arm/QEMU_EFI-pflash.raw %{buildroot}/usr/share/AAVMF/AAVMF32_CODE.fd for f in %{_sourcedir}/*edk2-arm*.json; do install -pm 644 $f %{buildroot}/%{_datadir}/qemu/firmware done %endif %if 0%{?py_byte_compile:1} # https://docs.fedoraproject.org/en-US/packaging-guidelines/Python_Appendix/#manual-bytecompilation %py_byte_compile %{python3} %{buildroot}%{_datadir}/edk2/Python %endif install -p ovmf-vars-generator %{buildroot}%{_bindir} %files tools %license License.txt %license LICENSE.openssl %{_bindir}/DevicePath %{_bindir}/EfiRom %{_bindir}/GenCrc32 %{_bindir}/GenFfs %{_bindir}/GenFv %{_bindir}/GenFw %{_bindir}/GenSec %{_bindir}/LzmaCompress %{_bindir}/LzmaF86Compress %{_bindir}/TianoCompress %{_bindir}/VfrCompile %{_bindir}/VolInfo %dir %{_datadir}/%{name} %{_datadir}/%{name}/BuildEnv %{_datadir}/%{name}/Conf %{_datadir}/%{name}/Scripts %files tools-python %{_bindir}/build %{_bindir}/BPDG %{_bindir}/Ecc %{_bindir}/GenDepex %{_bindir}/GenFds %{_bindir}/GenPatchPcdTable %{_bindir}/PatchPcdValue %{_bindir}/TargetTool %{_bindir}/Trim %{_bindir}/UPT %dir %{_datadir}/%{name} %{_datadir}/%{name}/Python %files tools-doc %doc BaseTools/UserManuals/*.rtf %files qosb %license LICENSE.qosb %{_bindir}/ovmf-vars-generator %if 0%{?build_ovmf_x64:1} %files ovmf %license OvmfPkg/License.txt %license LICENSE.openssl %doc OvmfPkg/README %doc ovmf-whitepaper-c770f8c.txt %dir /usr/share/%{name} %dir /usr/share/%{name}/ovmf %dir /usr/share/qemu/firmware /usr/share/%{name}/ovmf/OVMF*.fd /usr/share/%{name}/ovmf/*.efi /usr/share/%{name}/ovmf/*.iso /usr/share/qemu/firmware/*edk2-ovmf-x64*.json /usr/share/OVMF %endif %if 0%{?build_ovmf_ia32:1} %files ovmf-ia32 %license OvmfPkg/License.txt %license LICENSE.openssl %doc OvmfPkg/README %doc ovmf-whitepaper-c770f8c.txt %dir /usr/share/%{name} %dir /usr/share/%{name}/ovmf-ia32 %dir /usr/share/qemu/firmware /usr/share/%{name}/ovmf-ia32/OVMF*.fd /usr/share/%{name}/ovmf-ia32/*.efi /usr/share/%{name}/ovmf-ia32/*.iso /usr/share/qemu/firmware/*edk2-ovmf-ia32*.json %endif %if 0%{?build_aavmf_aarch64:1} %files aarch64 %license OvmfPkg/License.txt %license LICENSE.openssl %dir /usr/share/%{name} %dir /usr/share/%{name}/aarch64 %dir /usr/share/qemu/firmware /usr/share/%{name}/aarch64/QEMU*.fd /usr/share/%{name}/aarch64/*.raw /usr/share/qemu/firmware/*edk2-aarch64*.json /usr/share/AAVMF/AAVMF_* %endif %if 0%{?build_aavmf_arm:1} %files arm %license OvmfPkg/License.txt %license LICENSE.openssl %dir /usr/share/%{name} %dir /usr/share/%{name}/arm %dir /usr/share/qemu/firmware /usr/share/%{name}/arm/QEMU*.fd /usr/share/%{name}/arm/*.raw /usr/share/qemu/firmware/*edk2-arm*.json /usr/share/AAVMF/AAVMF32_* %endif %changelog * Mon Jun 14 2021 Jiri Kucera - 20200801stable-5 - Replace genisoimage with xorriso * Tue Jan 26 2021 Fedora Release Engineering - 20200801stable-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild * Thu Dec 03 2020 Cole Robinson - 20200801stable-3 - Really fix TPM breakage (bz 1897367) * Tue Nov 24 2020 Cole Robinson - 20200801stable-2 - Fix openssl usage, unbreak TPM (bz 1897367) * Wed Sep 16 2020 Cole Robinson - 20200801stable-1 - Update to edk2 stable 202008 * Sat Sep 12 2020 Peter Robinson - 20200201stable-6 - Tweaks for aarch64/ARMv7 builds - Minor cleanups * Tue Aug 04 2020 Cole Robinson - 20200201stable-5 - Fix build failures on rawhide * Sat Aug 01 2020 Fedora Release Engineering - 20200201stable-4 - Second attempt - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild * Mon Jul 27 2020 Fedora Release Engineering - 20200201stable-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild * Mon Jul 13 2020 Tom Stellard - 20200201stable-2 - Use make macros - https://fedoraproject.org/wiki/Changes/UseMakeBuildInstallMacro * Mon Apr 13 2020 Cole Robinson - 20200201stable-1 - Update to stable-202002 * Tue Jan 28 2020 Fedora Release Engineering - 20190501stable-5 - Rebuilt for https://fedoraproject.org/wiki/Fedora_32_Mass_Rebuild * Fri Sep 06 2019 Patrick Uiterwijk - 20190501stable-4 - Updated HTTP_BOOT option to new upstream value * Wed Jul 24 2019 Fedora Release Engineering - 20190501stable-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_31_Mass_Rebuild * Mon Jul 15 2019 Cole Robinson - 20190501stable-2 - License is now BSD-2-Clause-Patent - Re-enable secureboot enrollment - Use qemu-ovmf-secureboot from git * Thu Jul 11 2019 Cole Robinson - 20190501stable-1 - Update to stable-201905 - Update to openssl-1.1.1b - Ship VARS file for ovmf-ia32 (bug 1688596) - Ship Fedora-variant JSON "firmware descriptor files" - Resolves rhbz#1728652 * Mon Mar 18 2019 Cole Robinson - 20190308stable-1 - Use YYYYMMDD versioning to fix upgrade path * Fri Mar 15 2019 Cole Robinson - 201903stable-1 - Update to stable-201903 - Update to openssl-1.1.0j - Move to python3 deps * Thu Jan 31 2019 Fedora Release Engineering - 20180815gitcb5f4f45ce-6 - Rebuilt for https://fedoraproject.org/wiki/Fedora_30_Mass_Rebuild * Wed Nov 14 2018 Patrick Uiterwijk - 20180815gitcb5f4f45ce-5 - Add -qosb dependency on python3 * Fri Nov 9 2018 Paolo Bonzini - 20180815gitcb5f4f45ce-4 - Fix network boot via grub (bz 1648476) * Wed Sep 12 2018 Paolo Bonzini - 20180815gitcb5f4f45ce-3 - Explicitly compile the scripts using py_byte_compile * Fri Aug 31 2018 Cole Robinson - 20180815gitcb5f4f45ce-2 - Fix passing through RPM build flags (bz 1540244) * Tue Aug 21 2018 Cole Robinson - 20180815gitcb5f4f45ce-1 - Update to edk2 git cb5f4f45ce, edk2-stable201808 - Update to qemu-ovmf-secureboot-1.1.3 - Enable TPM2 support * Mon Jul 23 2018 Paolo Bonzini - 20180529gitee3198e672e2-5 - Fixes for AMD SEV on OVMF_CODE.fd - Add Provides for bundled OpenSSL * Wed Jul 18 2018 Paolo Bonzini - 20180529gitee3198e672e2-4 - Enable IPv6 * Thu Jul 12 2018 Fedora Release Engineering - 20180529gitee3198e672e2-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild * Wed Jun 20 2018 Paolo Bonzini - 20180529gitee3198e672e2-2 - Backport two bug fixes from RHEL: connect again virtio-rng devices, and connect consoles unconditionally in OVMF (ARM firmware already did it) * Tue May 29 2018 Paolo Bonzini - 20180529gitee3198e672e2-1 - Rebase to ee3198e672e2 * Tue May 01 2018 Cole Robinson - 20171011git92d07e4-7 - Bump release for new build * Fri Mar 30 2018 Patrick Uiterwijk - 20171011git92d07e4-6 - Add qemu-ovmf-secureboot (qosb) - Generate pre-enrolled Secure Boot OVMF VARS files * Wed Mar 07 2018 Paolo Bonzini - 20171011git92d07e4-5 - Fix GCC 8 compilation - Replace dosfstools and mtools with qemu-img vvfat * Wed Feb 07 2018 Fedora Release Engineering - 20171011git92d07e4-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild * Fri Jan 19 2018 Paolo Bonzini - 20170209git296153c5-3 - Add OpenSSL patches from Fedora - Enable TLS_MODE * Fri Nov 17 2017 Paolo Bonzini - 20170209git296153c5-2 - Backport patches 19-21 from RHEL - Add patches 22-24 to fix SEV slowness - Add fedora conditionals * Tue Nov 14 2017 Paolo Bonzini - 20171011git92d07e4-1 - Import source and patches from RHEL version - Update OpenSSL to 1.1.0e - Refresh 0099-Tweak-the-tools_def-to-support-cross-compiling.patch * Mon Nov 13 2017 Paolo Bonzini - 20170209git296153c5-6 - Allow non-cross builds - Install /usr/share/OVMF and /usr/share/AAVMF * Wed Aug 02 2017 Fedora Release Engineering - 20170209git296153c5-5 - Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild * Wed Jul 26 2017 Fedora Release Engineering - 20170209git296153c5-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild * Wed Mar 15 2017 Cole Robinson - 20170209git296153c5-3 - Ship ovmf-ia32 package (bz 1424722) * Thu Feb 16 2017 Cole Robinson - 20170209git296153c5-2 - Update EnrollDefaultKeys patch (bz #1398743) * Mon Feb 13 2017 Paolo Bonzini - 20170209git296153c5-1 - Rebase to git master - New patch 0010 fixes failure to build from source. * Fri Feb 10 2017 Fedora Release Engineering - 20161105git3b25ca8-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_26_Mass_Rebuild * Sun Nov 06 2016 Cole Robinson - 20161105git3b25ca8-1 - Rebase to git master * Fri Sep 9 2016 Tom Callaway - 20160418gita8c39ba-5 - replace legally problematic openssl source with "hobbled" tarball * Thu Jul 21 2016 Gerd Hoffmann - 20160418gita8c39ba-4 - Also build for armv7. * Tue Jul 19 2016 Gerd Hoffmann 20160418gita8c39ba-3 - Update EnrollDefaultKeys patch. * Fri Jul 8 2016 Paolo Bonzini - 20160418gita8c39ba-2 - Distribute edk2-ovmf on aarch64 * Sat May 21 2016 Cole Robinson - 20160418gita8c39ba-1 - Distribute edk2-aarch64 on x86 (bz #1338027) * Mon Apr 18 2016 Gerd Hoffmann 20160418gita8c39ba-0 - Update to latest git. - Add firmware builds (FatPkg is free now). * Mon Feb 15 2016 Cole Robinson 20151127svn18975-3 - Fix FTBFS gcc warning (bz 1307439) * Wed Feb 03 2016 Fedora Release Engineering - 20151127svn18975-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild * Fri Nov 27 2015 Paolo Bonzini - 20151127svn18975-1 - Rebase to 20151127svn18975-1 - Linker script renamed to GccBase.lds * Wed Jun 17 2015 Fedora Release Engineering - 20150519svn17469-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild * Tue May 19 2015 Paolo Bonzini - 20150519svn17469-1 - Rebase to 20150519svn17469-1 - edk2-remove-tree-check.patch now upstream * Sat May 02 2015 Kalev Lember - 20140724svn2670-6 - Rebuilt for GCC 5 C++11 ABI change * Sat Aug 16 2014 Fedora Release Engineering - 20140724svn2670-5 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_22_Mass_Rebuild * Thu Jul 24 2014 Paolo Bonzini - 20140724svn2670-1 - Rebase to 20140724svn2670-1 * Tue Jun 24 2014 Paolo Bonzini - 20140624svn2649-1 - Use standalone .tar.xz from buildtools repo * Tue Jun 24 2014 Paolo Bonzini - 20140328svn15376-4 - Install BuildTools/BaseEnv * Mon Jun 23 2014 Paolo Bonzini - 20140328svn15376-3 - Rebase to get GCC48 configuration - Package EDK_TOOLS_PATH as /usr/share/edk2 - Package "build" and LzmaF86Compress too, as well as the new tools Ecc and TianoCompress. * Sat Jun 07 2014 Fedora Release Engineering - 20131114svn14844-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild * Thu Nov 14 2013 Paolo Bonzini - 20131114svn14844-1 - Upgrade to r14844. - Remove upstreamed parts of patch 1. * Fri Nov 8 2013 Paolo Bonzini - 20130515svn14365-7 - Make BaseTools compile on ARM. * Fri Aug 30 2013 Paolo Bonzini - 20130515svn14365-6 - Revert previous change; firmware packages should be noarch, and building BaseTools twice is simply wrong. * Mon Aug 19 2013 Kay Sievers - 20130515svn14365-5 - Add sub-package with EFI shell * Sat Aug 03 2013 Fedora Release Engineering - 20130515svn14365-4 - Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild * Thu May 23 2013 Dan HorĂ¡k 20130515svn14365-3 - set ExclusiveArch * Thu May 16 2013 Paolo Bonzini 20130515svn14365-2 - Fix edk2-tools-python Requires * Wed May 15 2013 Paolo Bonzini 20130515svn14365-1 - Split edk2-tools-doc and edk2-tools-python - Fix Python BuildRequires - Remove FatBinPkg at package creation time. - Use fully versioned dependency. - Add comment on how to generate the sources. * Thu May 2 2013 Paolo Bonzini 20130502.g732d199-1 - Create.