- Update from version 17 to 18
- Update of rootfile not required
- Changelog
bug fixes
fixed the simple run example by @Katana-Steel in #88
Restore activation error message in efibootmgr by @rbisewski in #89
Android: correct the sources list by @cwhuang in #124
remove-dupes: update error message by @raharper in #127
Fix typo in manual page by @ferivoz in #136
README: Note efivarfs as the current required kernel module by @cjmayo in #145
Fix possible read out of bounds in ucs2_to_utf8 by @dlrobertson in #147
Migrate CI by @frozencemetery in #153
Add code of conduct by @frozencemetery in #154
Fix help messages by @robert-scheck in #156
Add option for insertion location of new entries by @frozencemetery in #166
Full changelog can be found from the github repository comparing versio 17 to 18
https://github.com/rhboot/efibootmgr/compare/17...18
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
Reviewed-by: Peter Müller <peter.mueller@ipfire.org>
Full changelog as per https://github.com/rhboot/efibootmgr/releases/tag/17:
various CI updates
Make.defaults: fix pkg-config invocation for LDFLAGS
make_linux_load_option(): add some more efi_error() calls
Change the default partition choice.
Don't set LIBEFIBOOT_REPORT_GPT_ERRORS=1
Make it easier to build with a devel branch of efivar
efibootmgr -e: improve parsing for efivar-36 compat
Fix an invalid free()
Propogate verbosity to libefivar 36's internal logging facility
Add a bit more logging
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Reviewed-by: Adolf Belka <adolf.belka@ipfire.org>
Historically, the MD5 checksums in our LFS files serve as a protection
against broken downloads, or accidentally corrupted source files.
While the sources are nowadays downloaded via HTTPS, it make sense to
beef up integrity protection for them, since transparently intercepting
TLS is believed to be feasible for more powerful actors, and the state
of the public PKI ecosystem is clearly not helping.
Therefore, this patch switches from MD5 to BLAKE2, updating all LFS
files as well as make.sh to deal with this checksum algorithm. BLAKE2 is
notably faster (and more secure) than SHA2, so the performance penalty
introduced by this patch is negligible, if noticeable at all.
In preparation of this patch, the toolchain files currently used have
been supplied with BLAKE2 checksums as well on
https://source.ipfire.org/.
Cc: Michael Tremer <michael.tremer@ipfire.org>
Signed-off-by: Peter Müller <peter.mueller@ipfire.org>
Acked-by: Michael Tremer <michael.tremeripfire.org>