-
Notifications
You must be signed in to change notification settings - Fork 541
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
shim: add docs/comments for the package, including details on how to …
…manually test
- Loading branch information
1 parent
453c017
commit 0607934
Showing
2 changed files
with
51 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,30 @@ | ||
|
||
Any changes to the shim-unsigned package, or this package, may require | ||
manual testing of the resulting EFI binaries. This describes the | ||
manual process to perform the testing. | ||
|
||
Since the shim binary is externally signed, while the fb/mm binaries | ||
are signed (only) by our production pipelines, testing new versions | ||
will require manually signing the shim and mm/fb binaries with | ||
separate keys, and the public part of the key used to sign mm/fb | ||
binaries must be embedded into the shim during the shim-unsigned | ||
build. | ||
|
||
The first option for signing the mm/fb EFI binaries, if the dev has | ||
access to our production pipelines, is to simply use the pipelines to | ||
sign the mm/fb binaries using the Azure Linux signing key. This option | ||
does not require any new public key to be added into the shim during | ||
shim-unsigned build, since it already contains the Azure Linux signing | ||
(public) key. However, since signing mm/fb with the Azure Linux | ||
signing key makes the mm/fb binaries usable on actual production | ||
systems, so using the signing key for development work is *highly* | ||
discouraged. Generally this should only be done with an updated shim | ||
package after all other testing is complete, *only* to validate that | ||
the shim will still correctly load the mm/fb binaries using the Azure | ||
Linux signing key. | ||
|
||
The second option, which should be used during normal shim | ||
development, is to generate a local signing key and embed the public | ||
portion inside the shim. | ||
|
||
1) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters