auto-enroll: use safe auto enrollment rather than YOLO enrollment #229
No reviewers
Labels
No labels
bug
dependency
documentation
duplicate
enhancement
good first issue
help wanted
invalid
question
review-next
security
stub
tool
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: raito/lanzaboote#229
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "systemd-sb-enroll"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This uses the systemd semantics for automatic enrollment at boot time.
For now, it is very simple, in the future, we can better use this option to push the proper auth files with names or have Type #1 entries for enrollment. :)
This PR relies on unreleased commits in nixpkgs for the testing framework to detect properly for EFI resets as for some reason this makes the whole thing hangs otherwise…In other news, your wish has been granted @blitz !
Depends on QMP API being upstreamed.
The approach looks good to me!
Note to myself: finish merging the stuff inside of nixpkgs for the QMP.
I remeber that you explained to me in person why this is needed, but I think I forgot. Wouldn't this solution be just as bad/good as our current solution?
How do you set
secure-boot-enroll
this to force? Is this an efi variable?Documented, it's in the configuration file.
PTAL @nikstur @blitz.
ffs:
it doesn't enroll on aarch64.
and now I assume that events for aarch64 VMs are fried...
OK, I was holding my own code wrong.
Ah yes,
nit: You could elaborate here a bit, so people know why this wrinkle exists and when it may go away.
Looks good to me!
@RaitoBezarius It looks like the tests need some love. Feel free to merge after fixing them.
Pull request closed