The package rpms/shim.git has added or updated architecture specific content in its
spec file (ExclusiveArch/ExcludeArch or %ifarch/%ifnarch) in commit(s):
https://src.fedoraproject.org/cgit/rpms/shim.git/commit/?id=a0656a4af3f4f...
https://src.fedoraproject.org/cgit/rpms/shim.git/commit/?id=60deacd6eaf6b....
Change:
+%ifarch aarch64
-ExclusiveArch: x86_64
Thanks.
Full change:
============
commit a0656a4af3f4f4ab3459bce725bb285b53dcd667
Author: Peter Jones <pjones(a)redhat.com>
Date: Wed Feb 28 11:35:01 2018 -0500
Move the shim-signed package from f29 here.
Signed-off-by: Peter Jones <pjones(a)redhat.com>
diff --git a/.gitignore b/.gitignore
new file mode 100644
index 0000000..7de9e4c
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1,6 @@
+shim*.efi
+*.rpm
+*/
+.build*.log
+*~
+.*.sw?
diff --git a/BOOTAA64.CSV b/BOOTAA64.CSV
new file mode 100644
index 0000000..e69de29
diff --git a/BOOTIA32.CSV b/BOOTIA32.CSV
new file mode 100644
index 0000000..e69de29
diff --git a/BOOTX64.CSV b/BOOTX64.CSV
new file mode 100644
index 0000000..e69de29
diff --git a/shim-signed.spec b/shim-signed.spec
new file mode 100644
index 0000000..d43d307
--- /dev/null
+++ b/shim-signed.spec
@@ -0,0 +1,336 @@
+%global debug_package %{nil}
+
+%global efidir %(eval echo $(grep ^ID= /etc/os-release | sed -e 's/^ID=//' -e
's/rhel/redhat/'))
+
+# this is literally to make vim's \c not put a brace at the end.
+%global _dist %{expand:%{?_module_build:%%{?dist}}}
+%global dist %{expand:%%{_dist}}
+
+Name: shim-signed
+Version: 13
+Release: 1%{dist}
+Summary: First-stage UEFI bootloader
+License: BSD
+URL:
http://github.com/rhboot/shim/
+
+# Shim is only required on platforms implementing the UEFI secure boot
+# protocol. The only one of those we currently wish to support is 64-bit x86.
+# Adding further platforms will require adding appropriate relocation code.
+ExclusiveArch: x86_64 aarch64
+
+# keep these two lists of sources synched up arch-wise. That is 0 and 10
+# match, 1 and 11 match, ...
+Source0: BOOTX64.CSV
+Source1: BOOTAA64.CSV
+Source2: BOOTIA32.CSV
+
+Source10: shimaa64.efi
+Source11: shimia32.efi
+Source12: shimx64.efi
+
+%global shimverx64 13-3.fc27
+%global shimveria32 13-3.fc27
+%global shimveraa64 13-3.fc27
+
+%ifarch x86_64
+BuildRequires: shim-unsigned-x64 = %{shimverx64}
+BuildRequires: shim-unsigned-ia32 = %{shimveria32}
+%global shimdirx64 %{_datadir}/shim/%{shimverx64}/x64
+%global shimdiria32 %{_datadir}/shim/%{shimveria32}/ia32
+%endif
+%ifarch aarch64
+BuildRequires: shim-unsigned-aarch64 = %{shimveraa64}
+%global shimdiraa64 %{_datadir}/shim/%{shimveraa64}/aa64
+%endif
+BuildRequires: pesign >= 0.112-20.fc27
+
+%description
+Initial UEFI bootloader that handles chaining to a trusted full bootloader
+under secure boot environments. This package contains the version signed by
+the UEFI signing service.
+
+%define define_pkg(a:p:) \
+%{expand:%%package -n shim-%{-a*}} \
+Summary: First-stage UEFI bootloader \
+Requires: mokutil >= 1:0.2.0-1 \
+Provides: shim-signed-%{-a*} = %{version}-%{release} \
+Requires: dbxtool >= 0.6-3 \
+%{expand:%%if 0%%{-p*} \
+Provides: shim = %{version}-%{release} \
+Provides: shim-signed = %{version}-%{release} \
+Obsoletes: shim-signed < %{version}-%{release} \
+Obsoletes: shim < %{version}-%{release} \
+%%endif} \
+# Shim uses OpenSSL, but cannot use the system copy as the UEFI ABI \
+# is not compatible with SysV (there's no red zone under UEFI) and \
+# there isn't a POSIX-style C library. \
+# BuildRequires: OpenSSL \
+Provides: bundled(openssl) = 1.0.2j \
+ \
+%{expand:%%description -n shim-%{-a*}} \
+Initial UEFI bootloader that handles chaining to a trusted full \
+bootloader under secure boot environments. This package contains the \
+version signed by the UEFI signing service. \
+%{nil}
+
+%ifarch x86_64
+%define_pkg -a x64 -p 1
+%define_pkg -a ia32
+%endif
+%ifarch aarch64
+%define_pkg -a aa64 -p 1
+%endif
+
+%prep
+cd %{_builddir}
+rm -rf shim-signed-%{version}
+mkdir shim-signed-%{version}
+
+%build
+%define vendor_token_str %{expand:%%{nil}%%{?vendor_token_name:-t
"%{vendor_token_name}"}}
+%define vendor_cert_str %{expand:%%{!?vendor_cert_nickname:-c "Red Hat Test
Certificate"}%%{?vendor_cert_nickname:-c "%%{vendor_cert_nickname}"}}
+
+# -a <efiarch>
+# -i <input>
+%define hash(a:i:d:) \
+ pesign -i %{-i*} -h -P > shim.hash \
+ read file0 hash0 < shim.hash \
+ read file1 hash1 < %{-d*}/shim%{-a*}.hash \
+ if ! [ "$hash0" = "$hash1" ]; then \
+ echo Invalid signature\! > /dev/stderr \
+ echo $hash0 vs $hash1 \
+ exit 1 \
+ fi \
+ %{nil}
+
+# -i <input>
+# -o <output>
+%define sign(i:o:) \
+ %{expand:%%pesign -s -i %{-i*} -o %{-o*}} \
+ %{nil}
+
+# -b <binary prefix>
+# -a <efiarch>
+# -i <input>
+%define distrosign(b:a:d:) \
+ cp -av %{-d*}/%{-b*}%{-a*}.efi %{-b*}%{-a*}-unsigned.efi \
+ %{expand:%%sign -i %{-b*}%{-a*}-unsigned.efi -o %{-b*}%{-a*}-signed.efi}\
+ %{nil}
+
+# -a <efiarch>
+# -A <EFIARCH>
+# -b <yes|no> # signed by this builder?
+# -c <yes|no> # signed by UEFI CA?
+# -i <shimARCH.efi>
+%define define_build(a:A:b:c:i:d:) \
+if [ "%{-c*}" = "yes" ]; then \
+ %{expand:%%hash -i %{-i*} -a %{-a*} -d %{-d*}} \
+fi \
+cp %{-i*} shim%{-a*}.efi \
+if [ "%{-b*}" = "yes" ]; then \
+ %{expand:%%distrosign -b shim -a %{-a*} -d %{-d*}} \
+ mv shim%{-a*}-signed.efi shim%{-a*}-%{efidir}.efi \
+fi \
+if [ "%{-c*}" = "yes" ]; then \
+ cp shim%{-a*}-%{efidir}.efi shim%{-a*}.efi \
+fi \
+%{expand:%%distrosign -b mm -a %{-a*} -d %{-d*}} \
+mv mm%{-a*}-signed.efi mm%{-a*}.efi \
+%{expand:%%distrosign -b fb -a %{-a*} -d %{-d*}} \
+mv fb%{-a*}-signed.efi fb%{-a*}.efi \
+rm -vf \\\
+ mm%{-a*}-unsigned.efi \\\
+ fb%{-a*}-unsigned.efi \\\
+ shim%{-a*}-unsigned.efi \
+%{nil}
+
+cd shim-signed-%{version}
+%ifarch aarch64
+%define_build -a aa64 -A AA64 -i %{SOURCE10} -b yes -c no -d %{shimdiraa64}
+%endif
+%ifarch x86_64
+%define_build -a ia32 -A IA32 -i %{SOURCE11} -b yes -c yes -d %{shimdiria32}
+%define_build -a x64 -A X64 -i %{SOURCE12} -b yes -c yes -d %{shimdirx64}
+%endif
+
+%install
+# -a <efiarch>
+# -A <EFIARCH>
+# -b <BOOTCSV>
+%define do_install(a:A:b:) \
+install -m 0700 shim%{-a*}.efi \\\
+ $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/shim%{-a*}.efi \
+install -m 0700 shim%{-a*}-%{efidir}.efi \\\
+ $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/shim%{-a*}-%{efidir}.efi \
+install -m 0700 mm%{-a*}.efi \\\
+ $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/mm%{-a*}.efi \
+install -m 0700 %{-b*} \\\
+ $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/BOOT%{-A*}.CSV \
+install -m 0700 shim%{-a*}.efi \\\
+ $RPM_BUILD_ROOT/boot/efi/EFI/BOOT/BOOT%{-A*}.EFI \
+install -m 0700 fb%{-a*}.efi \\\
+ $RPM_BUILD_ROOT/boot/efi/EFI/BOOT/fb%{-a*}.efi \
+%nil
+
+rm -rf $RPM_BUILD_ROOT
+cd shim-signed-%{version}
+install -D -d -m 0755 $RPM_BUILD_ROOT/boot/
+install -D -d -m 0700 $RPM_BUILD_ROOT/boot/efi/
+install -D -d -m 0700 $RPM_BUILD_ROOT/boot/efi/EFI/
+install -D -d -m 0700 $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/
+install -D -d -m 0700 $RPM_BUILD_ROOT/boot/efi/EFI/BOOT/
+
+%ifarch x86_64
+%do_install -a x64 -A X64 -b %{SOURCE0}
+%do_install -a ia32 -A IA32 -b %{SOURCE2}
+install -m 0700 %{SOURCE2} $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/BOOT.CSV
+install -m 0700 $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/mmx64.efi
$RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/MokManager.efi
+install -m 0700 $RPM_BUILD_ROOT/boot/efi/EFI/BOOT/fbx64.efi
$RPM_BUILD_ROOT/boot/efi/EFI/BOOT/fallback.efi
+install -m 0700 %{SOURCE12} $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/shim.efi
+%endif
+%ifarch aarch64
+%do_install -a aa64 -A AA64 -b %{SOURCE1}
+install -m 0700 %{SOURCE10} $RPM_BUILD_ROOT/boot/efi/EFI/%{efidir}/shim.efi
+%endif
+
+# -a <efiarch>
+# -A <EFIARCH>
+%define define_files(a:A:) \
+%{expand:%%files -n shim-%{-a*}} \
+%dir /boot/efi \
+%dir /boot/efi/EFI \
+%dir /boot/efi/EFI/BOOT \
+%dir /boot/efi/EFI/%{efidir} \
+/boot/efi/EFI/%{efidir}/*%{-a*}*.efi \
+/boot/efi/EFI/%{efidir}/BOOT%{-A*}.CSV \
+/boot/efi/EFI/BOOT/*%{-a*}.efi \
+/boot/efi/EFI/BOOT/*%{-A*}.EFI \
+%{nil}
+
+%ifarch x86_64
+%define_files -a x64 -A X64
+/boot/efi/EFI/%{efidir}/BOOT.CSV
+/boot/efi/EFI/%{efidir}/MokManager.efi
+/boot/efi/EFI/%{efidir}/shim.efi
+/boot/efi/EFI/BOOT/fallback.efi
+
+%define_files -a ia32 -A IA32
+%endif
+%ifarch aarch64
+%define_files -a aa64 -A AA64
+/boot/efi/EFI/%{efidir}/shim.efi
+%endif
+
+%changelog
+* Wed Nov 01 2017 Peter Jones <pjones(a)redhat.com> - 13-1
+- Now with the actual signed 64-bit build of shim 13 for x64 as well.
+- Make everything under /boot/efi be mode 0700, since that's what FAT will
+ show anyway, so that rpm -V is correct.
+ Resolves: rhbz#1508516
+
+* Tue Oct 24 2017 Peter Jones <pjones(a)redhat.com> - 13-0.8
+- Now with signed 32-bit x86 build.
+ Related: rhbz#1474861
+
+* Wed Oct 04 2017 Peter Jones <pjones(a)redhat.com> - 13-0.7
+- Make /boot/efi/EFI/fedora/shim.efi still exist on aarch64 as well.
+ Resolves: rhbz#1497854
+
+* Tue Sep 19 2017 Peter Jones <pjones(a)redhat.com> - 13-0.6
+- Fix binary format issue on Aarch64
+ Resolves: rhbz#1489604
+
+* Tue Sep 05 2017 Peter Jones <pjones(a)redhat.com> - 13-0.5
+- Make /boot/efi/EFI/fedora/shim.efi still exist on x86_64, since some
+ machines have boot entries that point to it.
+
+* Tue Aug 29 2017 Peter Jones <pjones(a)redhat.com> - 13-0.4
+- Make our provides not get silently ignore by rpmbuild...
+
+* Fri Aug 25 2017 Peter Jones <pjones(a)redhat.com> - 13-0.3
+- x64: use the new fbx64.efi and mm64.efi as fallback.efi and MokManager.efi
+- Provide: "shim" in x64 and aa64 builds
+
+* Thu Aug 24 2017 Peter Jones <pjones(a)redhat.com> - 13-0.2
+- Obsolete old shim builds.
+
+* Tue Aug 22 2017 Peter Jones <pjones(a)redhat.com> - 13-0.1
+- Initial (partially unsigned) build for multi-arch support on x64/ia32.
+
+* Thu Mar 23 2017 Petr Šabata <contyk(a)redhat.com> - 0.8-9
+- Re-enable dist tag for module builds
+
+* Tue Feb 17 2015 Peter Jones <pjones(a)redhat.com> - 0.8-8
+- Don't dual-sign shim-%%{efidir}.efi either.
+ Resolves: rhbz#1184765
+
+* Tue Feb 17 2015 Peter Jones <pjones(a)redhat.com> - 0.8-8
+- Require dbxtool
+
+* Wed Dec 17 2014 Peter Jones <pjones(a)redhat.com> - 0.8-7
+- Wrong -signed changes got built for aarch64 last time, for dumb reasons.
+ Related: rhbz#1170289
+
+* Fri Dec 05 2014 Peter Jones <pjones(a)redhat.com> - 0.8-6
+- Rebuild once more so we can use a different -unsigned version on different
+ arches (because we can't tag a newer build into aarch64 without an x86
+ update to match.)
+ Related: rhbz#1170289
+
+* Wed Dec 03 2014 Peter Jones <pjones(a)redhat.com> - 0.8-5
+- Rebuild for aarch64 path fixes
+ Related: rhbz#1170289
+
+* Thu Oct 30 2014 Peter Jones <pjones(a)redhat.com> - 0.8-2
+- Remove the dist tag so people don't complain about what it says.
+
+* Fri Oct 24 2014 Peter Jones <pjones(a)redhat.com> - 0.8-1
+- Update to shim 0.8
+ rhbz#1148230
+ rhbz#1148231
+ rhbz#1148232
+- Handle building on aarch64 as well
+
+* Fri Jul 18 2014 Peter Jones <pjones(a)redhat.com> - 0.7-2
+- Don't do multi-signing; too many machines screw up verification.
+ Resolves: rhbz#1049749
+
+* Wed Nov 13 2013 Peter Jones <pjones(a)redhat.com> - 0.7-1
+- Update to shim 0.7
+ Resolves: rhbz#1023767
+
+* Thu Oct 24 2013 Peter Jones <pjones(a)redhat.com> - 0.5-1
+- Update to shim 0.5
+
+* Thu Jun 20 2013 Peter Jones <pjones(a)redhat.com> - 0.4-1
+- Provide a fallback for uninitialized Boot#### and BootOrder
+ Resolves: rhbz#963359
+- Move all signing from shim-unsigned to here
+- properly compare our generated hash from shim-unsigned with the hash of
+ the signed binary (as opposed to doing it manually)
+
+* Fri May 31 2013 Peter Jones <pjones(a)redhat.com> - 0.2-4.4
+- Re-sign to get alignments that match the new specification.
+ Resolves: rhbz#963361
+
+* Thu Feb 14 2013 Fedora Release Engineering <rel-eng(a)lists.fedoraproject.org> -
0.2-4.3
+- Rebuilt for
https://fedoraproject.org/wiki/Fedora_19_Mass_Rebuild
+
+* Wed Jan 02 2013 Peter Jones <pjones(a)redhat.com> - 0.2-3.3
+- Add obsoletes and provides for earlier shim-signed packages, to cover
+ the package update cases where previous versions were installed.
+ Related: rhbz#888026
+
+* Mon Dec 17 2012 Peter Jones <pjones(a)redhat.com> - 0.2-3.2
+- Make the shim-unsigned dep be on the subpackage.
+
+* Sun Dec 16 2012 Peter Jones <pjones(a)redhat.com> - 0.2-3.1
+- Rebuild to provide "shim" package directly instead of just as a Provides:
+
+* Sat Dec 15 2012 Peter Jones <pjones(a)redhat.com> - 0.2-3
+- Also provide shim-fedora.efi, signed only by the fedora signer.
+- Fix the fedora signature on the result to actually be correct.
+- Update for shim-unsigned 0.2-3
+
+* Mon Dec 03 2012 Peter Jones <pjones(a)redhat.com> - 0.2-2
+- Initial build
diff --git a/sources b/sources
new file mode 100644
index 0000000..9e135b5
--- /dev/null
+++ b/sources
@@ -0,0 +1,3 @@
+SHA512 (shimaa64.efi) =
779893923f9707bb20476bf9dfd9a613e72efad4f6cd7fd569f1a46cf5565b210d62b5c78e8ef5b8eb40ba673561fd74dd3195d82f72492348a3e31f859bf3b5
+SHA512 (shimia32.efi) =
9f9d491c690faf70f0420f8a154d7a3b98e6d71b4da16d2e61f724694f7e55235aafec0233917f4907f1da1bc9598fa36e040666b94d2942e1fbbdfdd3a30826
+SHA512 (shimx64.efi) =
50e53ec4b17b4ddf0b7b0341c1de9a14027c2de940cd36218ba727b8742be03f793480bb7b330a897127c0691532262a2a0eb5022270ac323e6d2e07201a6191
commit 60deacd6eaf6b79735163b66afc3eb5aaa99d2e1
Author: Peter Jones <pjones(a)redhat.com>
Date: Wed Feb 28 11:34:24 2018 -0500
Boil the sea.
Signed-off-by: Peter Jones <pjones(a)redhat.com>
diff --git a/.gitignore b/.gitignore
deleted file mode 100644
index 0b3bfd0..0000000
--- a/.gitignore
+++ /dev/null
@@ -1,4 +0,0 @@
-*.tar.*
-clog
-*.rpm
-/rhtest.cer
diff --git a/dbx.esl b/dbx.esl
deleted file mode 100644
index 2ea555c..0000000
Binary files a/dbx.esl and /dev/null differ
diff --git a/fedora-ca.cer b/fedora-ca.cer
deleted file mode 100644
index b81707b..0000000
Binary files a/fedora-ca.cer and /dev/null differ
diff --git a/shim.spec b/shim.spec
deleted file mode 100644
index e8b29e1..0000000
--- a/shim.spec
+++ /dev/null
@@ -1,151 +0,0 @@
-Name: shim
-Version: 0.9
-Release: 1%{?dist}
-Summary: First-stage UEFI bootloader
-
-License: BSD
-URL:
https://github.com/rhinstaller/shim
-Source0:
https://github.com/rhinstaller/shim/releases/download/%{version}/shim-%{v...
-Source1: fedora-ca.cer
-
-# currently here's what's in our dbx:
-# grub2-efi-2.00-11.fc18.x86_64:
-# grubx64.efi 6ac839881e73504047c06a1aac0c4763408ecb3642783c8acf77a2d393ea5cd7
-# gcdx64.efi 065cd63bab696ad2f4732af9634d66f2c0d48f8a3134b8808750d378550be151
-# grub2-efi-2.00-11.fc19.x86_64:
-# grubx64.efi 49ece9a10a9403b32c8e0c892fd9afe24a974323c96f2cc3dd63608754bf9b45
-# gcdx64.efi 99fcaa957786c155a92b40be9c981c4e4685b8c62b408cb0f6cb2df9c30b9978
-# woops.
-Source2: dbx.esl
-Source3: rhtest.cer
-
-BuildRequires: git openssl-devel openssl
-BuildRequires: pesign >= 0.106-1
-BuildRequires: gnu-efi >= 3.0.3-3
-BuildRequires: gnu-efi-devel >= 3.0.3-3
-
-# Shim uses OpenSSL, but cannot use the system copy as the UEFI ABI is not
-# compatible with SysV (there's no red zone under UEFI) and there isn't a
-# POSIX-style C library.
-# BuildRequires: OpenSSL
-Provides: bundled(openssl) = 0.9.8zb
-
-# Shim is only required on platforms implementing the UEFI secure boot
-# protocol. The only one of those we currently wish to support is 64-bit x86.
-# Adding further platforms will require adding appropriate relocation code.
-ExclusiveArch: x86_64
-
-%global efiarch x64
-
-# Figure out the right file path to use
-%if 0%{?rhel}
-%global efidir redhat
-%endif
-%if 0%{?fedora}
-%global efidir fedora
-%endif
-
-%description
-Initial UEFI bootloader that handles chaining to a trusted full bootloader
-under secure boot environments.
-
-%package -n shim-unsigned
-Summary: First-stage UEFI bootloader (unsigned data)
-
-%description -n shim-unsigned
-Initial UEFI bootloader that handles chaining to a trusted full bootloader
-under secure boot environments.
-
-%prep
-%setup -q
-git init
-git config user.email "%{name}-owner(a)fedoraproject.org"
-git config user.name "Fedora Ninjas"
-git add .
-git commit -a -q -m "%{version} baseline."
-git am --ignore-whitespace %{patches} </dev/null
-git config --unset user.email
-git config --unset user.name
-
-%build
-MAKEFLAGS=""
-if [ -f "%{SOURCE3}" ]; then
- MAKEFLAGS="VENDOR_CERT_FILE=%{SOURCE3} VENDOR_DBX_FILE=%{SOURCE2}"
-fi
-MAKEFLAGS="$MAKEFLAGS RELEASE=%{release}"
-make 'DEFAULT_LOADER=\\\\grub%{efiarch}.efi' ${MAKEFLAGS} shim.efi MokManager.efi
fallback.efi
-
-%install
-rm -rf $RPM_BUILD_ROOT
-pesign -h -P -i shim.efi -h > shim.hash
-install -D -d -m 0755 $RPM_BUILD_ROOT%{_datadir}/shim/
-install -m 0644 shim.efi $RPM_BUILD_ROOT%{_datadir}/shim/shim.efi
-install -m 0644 shim.hash $RPM_BUILD_ROOT%{_datadir}/shim/shim.hash
-install -m 0644 fallback.efi $RPM_BUILD_ROOT%{_datadir}/shim/fallback.efi
-install -m 0644 MokManager.efi $RPM_BUILD_ROOT%{_datadir}/shim/MokManager.efi
-# now install our .debug files...
-install -D -d -m 0755 $RPM_BUILD_ROOT/usr/lib/debug/%{_datadir}/shim/
-install -m 0644 shim.efi.debug
$RPM_BUILD_ROOT/usr/lib/debug/%{_datadir}/shim/shim.efi.debug
-install -m 0644 fallback.efi.debug
$RPM_BUILD_ROOT/usr/lib/debug/%{_datadir}/shim/fallback.efi.debug
-install -m 0644 MokManager.efi.debug
$RPM_BUILD_ROOT/usr/lib/debug/%{_datadir}/shim/MokManager.efi.debug
-
-%files -n shim-unsigned
-%doc
-%dir %{_datadir}/shim
-%{_datadir}/shim/*
-
-%changelog
-* Fri Apr 28 2017 Petr Šabata <contyk(a)redhat.com> - 0.9-1
-- Updating to 0.9 to enable building with gcc7
-- Mostly mirroring the key shim-unsigned-aarch64 0.9 changes
-
-* Wed Dec 03 2014 Peter Jones <pjones(a)redhat.com> - 0.8-2
-- Fix bootloader path and whitelist certificates on ARM Aarch64.
- Resolves: rhbz#1170289
-
-* Tue Oct 14 2014 Peter Jones <pjones(a)redhat.com> - 0.8-1
-- Update to 0.8
- Related: rhbz#1148230
- Related: rhbz#1148231
- Related: rhbz#1148232
-
-* Wed Nov 06 2013 Peter Jones <pjones(a)redhat.com> - 0.7-1
-- Fix logic to handle SetupMode efi variable.
-
-* Thu Oct 31 2013 Peter Jones <pjones(a)redhat.com> - 0.6-1
-- Fix a FreePool(NULL) call on machines too old for SB
-
-* Fri Oct 04 2013 Peter Jones <pjones(a)redhat.com> - 0.5-1
-- Update to 0.5
-
-* Tue Jun 11 2013 Peter Jones <pjones(a)redhat.com> - 0.4-1
-- Update to 0.4
-
-* Fri Jun 07 2013 Peter Jones <pjones(a)redhat.com> - 0.3-2
-- Require gnu-efi-3.0q for now.
-- Don't allow mmx or sse during compilation.
-- Re-organize this so all real signing happens in shim-signed instead.
-- Split out mokutil
-
-* Wed Dec 12 2012 Peter Jones <pjones(a)redhat.com> - 0.2-3
-- Fix mokutil's idea of signature sizes.
-
-* Wed Nov 28 2012 Matthew Garrett <mjg59(a)srcf.ucam.org> - 0.2-2
-- Fix secure_mode() always returning true
-
-* Mon Nov 26 2012 Matthew Garrett <mjg59(a)srcf.ucam.org> - 0.2-1
-- Update shim
-- Include mokutil
-- Add debuginfo package since mokutil is a userspace executable
-
-* Mon Oct 22 2012 Peter Jones <pjones(a)redhat.com> - 0.1-4
-- Produce an unsigned shim
-
-* Tue Aug 14 2012 Peter Jones <pjones(a)redhat.com> - 0.1-3
-- Update how embedded cert and signing work.
-
-* Mon Aug 13 2012 Josh Boyer <jwboyer(a)redhat.com> - 0.1-2
-- Add patch to fix image size calculation
-
-* Mon Aug 13 2012 Matthew Garrett <mjg(a)redhat.com> - 0.1-1
-- initial release
diff --git a/sources b/sources
deleted file mode 100644
index 86c6569..0000000
--- a/sources
+++ /dev/null
@@ -1,2 +0,0 @@
-SHA512 (shim-0.9.tar.bz2) =
780f3eb3bfae366f25591eb5c46f7853614c03d79f88f0890f5e1bd614f2a9e859b355faa333894a16c048f50cbe9dc65ebe414e8fe07ce0657edec42836be0c
-SHA512 (rhtest.cer) =
33d20ec3540e75aca39d92971b65c7d0b6e35fde85dda2426f097fa4a8506d95693201de13e231fa06afce3bc0e05faf05976a7481ed3db1b9795b8fc045d468