Project

General

Profile

Actions

action #164183

closed

[Micro] [ Staging] Allow enrolling a test kernel in SecureBoot

Added by fcrozat 9 days ago. Updated 2 days ago.

Status:
Resolved
Priority:
High
Assignee:
Category:
-
Target version:
-
Start date:
2024-07-18
Due date:
% Done:

0%

Estimated time:
Difficulty:

Description

Due to change in IBS, packages built in Staging project are no longer built with SUSE key. This causes breakage when using SecureBoot since grub & kernel are no longer signed with SUSE key, shim is refusing to load them.

Workaround 1 (already implemented): boot with Secure Boot disabled. This prevents testing Secure Boot feature and features which relies on SecureBoot working (Full Disk Encryption with TPM).

Workaround 2: enroll key used to sign kernel/grub2 into Secure Book MOK keyring:

  • we need to make this key available on EFI boot partition and when we get "Verification failed: Security Violation" from shim:
  • press enter twice to access enrolling
  • Enroll key from disk
  • choose the key on EFI partition
  • accept the enrollment
  • reboot the system

Another option would be to do the setup from above, power down the system, save the NVRAM / EFI variable partition, which will have the proper key enrolled and use this nvram setup directly to bypass the "security violation" prompt.

This should only be used for staging.


Related issues 1 (1 open0 closed)

Related to openQA Tests - action #164150: [SLFO] Stagings: official SUSE keys aren't used anymoreNewjlausuch2024-07-18

Actions
Actions

Also available in: Atom PDF