- Use AlmaLinux cert
This commit is contained in:
parent
57c6f8ff54
commit
38ebbccc35
BIN
SOURCES/almalinuxsecurebootca0.cer
Normal file
BIN
SOURCES/almalinuxsecurebootca0.cer
Normal file
Binary file not shown.
@ -1,3 +1,7 @@
|
|||||||
|
%global efi_vendor almalinux
|
||||||
|
%global efidir almalinux
|
||||||
|
%global efi_esp_dir /boot/efi/EFI/%{efidir}
|
||||||
|
|
||||||
%global glib2_version 2.45.8
|
%global glib2_version 2.45.8
|
||||||
%global libxmlb_version 0.1.3
|
%global libxmlb_version 0.1.3
|
||||||
%global libgusb_version 0.2.11
|
%global libgusb_version 0.2.11
|
||||||
@ -40,7 +44,7 @@
|
|||||||
Summary: Firmware update daemon
|
Summary: Firmware update daemon
|
||||||
Name: fwupd
|
Name: fwupd
|
||||||
Version: 1.7.8
|
Version: 1.7.8
|
||||||
Release: 1%{?dist}.alma
|
Release: 1%{?dist}.alma.1
|
||||||
License: LGPLv2+
|
License: LGPLv2+
|
||||||
URL: https://github.com/fwupd/fwupd
|
URL: https://github.com/fwupd/fwupd
|
||||||
Source0: http://people.freedesktop.org/~hughsient/releases/%{name}-%{version}.tar.xz
|
Source0: http://people.freedesktop.org/~hughsient/releases/%{name}-%{version}.tar.xz
|
||||||
@ -56,7 +60,7 @@ Source15: http://people.redhat.com/rhughes/dbx/DBXUpdate-20200729-x64.cab
|
|||||||
|
|
||||||
# these are numbered high just to keep them wildly away from colliding with
|
# these are numbered high just to keep them wildly away from colliding with
|
||||||
# the real package sources, in order to reduce churn.
|
# the real package sources, in order to reduce churn.
|
||||||
Source300: clsecureboot001.cer
|
Source300: almalinuxsecurebootca0.cer
|
||||||
|
|
||||||
BuildRequires: efi-srpm-macros
|
BuildRequires: efi-srpm-macros
|
||||||
BuildRequires: gettext
|
BuildRequires: gettext
|
||||||
@ -265,7 +269,6 @@ install %{SOURCE10} %{SOURCE11} %{SOURCE12} %{SOURCE13} %{SOURCE14} %{SOURCE15}
|
|||||||
%global efiarch x64
|
%global efiarch x64
|
||||||
%global fwup_efi_fn $RPM_BUILD_ROOT%{_libexecdir}/fwupd/efi/fwupd%{efiarch}.efi
|
%global fwup_efi_fn $RPM_BUILD_ROOT%{_libexecdir}/fwupd/efi/fwupd%{efiarch}.efi
|
||||||
%pesign -s -i %{fwup_efi_fn} -o %{fwup_efi_fn}.signed -a %{SOURCE300} -c %{SOURCE301} -n clsecureboot001
|
%pesign -s -i %{fwup_efi_fn} -o %{fwup_efi_fn}.signed -a %{SOURCE300} -c %{SOURCE301} -n clsecureboot001
|
||||||
rm -fv %{fwup_efi_fn}.tmp
|
|
||||||
%endif
|
%endif
|
||||||
|
|
||||||
mkdir -p --mode=0700 $RPM_BUILD_ROOT%{_localstatedir}/lib/fwupd/gnupg
|
mkdir -p --mode=0700 $RPM_BUILD_ROOT%{_localstatedir}/lib/fwupd/gnupg
|
||||||
@ -487,6 +490,9 @@ done
|
|||||||
%if 0%{?have_uefi}
|
%if 0%{?have_uefi}
|
||||||
%{_datadir}/fwupd/uefi-capsule-ux.tar.xz
|
%{_datadir}/fwupd/uefi-capsule-ux.tar.xz
|
||||||
%endif
|
%endif
|
||||||
|
%if 0%{?have_modem_manager}
|
||||||
|
%{_libdir}/fwupd-plugins-3/libfu_plugin_modem_manager.so
|
||||||
|
%endif
|
||||||
|
|
||||||
%files devel
|
%files devel
|
||||||
%{_datadir}/gir-1.0/Fwupd-2.0.gir
|
%{_datadir}/gir-1.0/Fwupd-2.0.gir
|
||||||
@ -522,12 +528,16 @@ done
|
|||||||
%endif
|
%endif
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
* Wed Sep 28 2022 Andrew Lukoshko <alukoshko@almalinux.org> - 1.7.8-1.alma
|
* Mon Feb 27 2023 Eduard Abdullin <eabdullin@almalinux.org> - 1.7.8-1.alma.1
|
||||||
|
- Use AlmaLinux cert
|
||||||
|
|
||||||
|
* Tue Nov 08 2022 Andrew Lukoshko <alukoshko@almalinux.org> - 1.7.8-1.alma
|
||||||
- AlmaLinux changes
|
- AlmaLinux changes
|
||||||
|
|
||||||
* Wed Jun 15 2022 Richard Hughes <richard@hughsie.com> 1.7.8-1
|
* Wed Jun 15 2022 Richard Hughes <richard@hughsie.com> 1.7.8-1
|
||||||
- New upstream release
|
- New upstream release
|
||||||
- Resolves: rhbz#2095668
|
- Resolves: rhbz#2095668
|
||||||
|
|
||||||
* Thu Jan 13 2022 Richard Hughes <richard@hughsie.com> 1.7.4-1
|
* Thu Jan 13 2022 Richard Hughes <richard@hughsie.com> 1.7.4-1
|
||||||
- Include support for Lenovo TBT4 Docking stations
|
- Include support for Lenovo TBT4 Docking stations
|
||||||
- Do not cause systemd-modules-load failures
|
- Do not cause systemd-modules-load failures
|
||||||
@ -655,7 +665,7 @@ done
|
|||||||
* Wed Aug 29 2018 Richard Hughes <richard@hughsie.com> 1.1.1-5
|
* Wed Aug 29 2018 Richard Hughes <richard@hughsie.com> 1.1.1-5
|
||||||
- Include the certificates for secure boot signing
|
- Include the certificates for secure boot signing
|
||||||
|
|
||||||
* Tue Aug 23 2018 Richard Hughes <richard@hughsie.com> 1.1.1-4
|
* Thu Aug 23 2018 Richard Hughes <richard@hughsie.com> 1.1.1-4
|
||||||
- Rebuild to get the EFI executable signed with the Red Hat key
|
- Rebuild to get the EFI executable signed with the Red Hat key
|
||||||
|
|
||||||
* Thu Aug 23 2018 Richard Hughes <richard@hughsie.com> 1.1.1-3
|
* Thu Aug 23 2018 Richard Hughes <richard@hughsie.com> 1.1.1-3
|
||||||
|
Loading…
Reference in New Issue
Block a user