diff options
author | Lans Zhang <jia.zhang@windriver.com> | 2017-07-12 11:22:40 +0800 |
---|---|---|
committer | Lans Zhang <jia.zhang@windriver.com> | 2017-07-12 11:22:40 +0800 |
commit | 676968891fb91d858736399418e40c3b049f8cbf (patch) | |
tree | bd72ee55d68f0fd0a0fa59d709b62e3a5ad522b2 | |
parent | 77d7993c43cc25f9d4eda0ae638bf3a643a5e756 (diff) | |
download | meta-secure-core-676968891fb91d858736399418e40c3b049f8cbf.tar.gz |
Fix the occurrence of checking the existence of signing keys
packagegroups are not the end consumers of using user-key-store.
Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
9 files changed, 8 insertions, 10 deletions
diff --git a/meta-efi-secure-boot/recipes-base/packagegroups/packagegroup-efi-secure-boot.bb b/meta-efi-secure-boot/recipes-base/packagegroups/packagegroup-efi-secure-boot.bb index dd40e6e..ab0281c 100644 --- a/meta-efi-secure-boot/recipes-base/packagegroups/packagegroup-efi-secure-boot.bb +++ b/meta-efi-secure-boot/recipes-base/packagegroups/packagegroup-efi-secure-boot.bb | |||
@@ -9,11 +9,6 @@ S = "${WORKDIR}" | |||
9 | 9 | ||
10 | ALLOW_EMPTY_${PN} = "1" | 10 | ALLOW_EMPTY_${PN} = "1" |
11 | 11 | ||
12 | # Check and deploy keys to ${DEPLOY_DIR_IMAGE} | ||
13 | inherit user-key-store | ||
14 | |||
15 | do_install[postfuncs] += "check_deploy_keys" | ||
16 | |||
17 | pkgs = "\ | 12 | pkgs = "\ |
18 | grub-efi \ | 13 | grub-efi \ |
19 | efitools \ | 14 | efitools \ |
diff --git a/meta-efi-secure-boot/recipes-bsp/efitools/efitools_git.bb b/meta-efi-secure-boot/recipes-bsp/efitools/efitools_git.bb index 3970757..ea02811 100644 --- a/meta-efi-secure-boot/recipes-bsp/efitools/efitools_git.bb +++ b/meta-efi-secure-boot/recipes-bsp/efitools/efitools_git.bb | |||
@@ -69,6 +69,7 @@ python do_prepare_signing_keys() { | |||
69 | os.utime(d.expand('${S}/DBX.esl'), (time_stamp, time_stamp)) | 69 | os.utime(d.expand('${S}/DBX.esl'), (time_stamp, time_stamp)) |
70 | } | 70 | } |
71 | addtask prepare_signing_keys after do_configure before do_compile | 71 | addtask prepare_signing_keys after do_configure before do_compile |
72 | do_prepare_signing_keys[prefuncs] += "check_deploy_keys" | ||
72 | 73 | ||
73 | do_install_append() { | 74 | do_install_append() { |
74 | install -d ${D}${EFI_BOOT_PATH} | 75 | install -d ${D}${EFI_BOOT_PATH} |
diff --git a/meta-efi-secure-boot/recipes-bsp/grub/grub-efi_2.02.bbappend b/meta-efi-secure-boot/recipes-bsp/grub/grub-efi_2.02.bbappend index 70ed828..4ff5e63 100644 --- a/meta-efi-secure-boot/recipes-bsp/grub/grub-efi_2.02.bbappend +++ b/meta-efi-secure-boot/recipes-bsp/grub/grub-efi_2.02.bbappend | |||
@@ -126,6 +126,7 @@ fakeroot python do_sign_class-target() { | |||
126 | fakeroot python do_sign() { | 126 | fakeroot python do_sign() { |
127 | } | 127 | } |
128 | addtask sign after do_install before do_deploy do_package | 128 | addtask sign after do_install before do_deploy do_package |
129 | do_sign[prefuncs] += "check_deploy_keys" | ||
129 | 130 | ||
130 | # Override the do_deploy() in oe-core. | 131 | # Override the do_deploy() in oe-core. |
131 | do_deploy_class-target() { | 132 | do_deploy_class-target() { |
diff --git a/meta-efi-secure-boot/recipes-bsp/seloader/seloader_git.bb b/meta-efi-secure-boot/recipes-bsp/seloader/seloader_git.bb index 9324cf8..211bc65 100644 --- a/meta-efi-secure-boot/recipes-bsp/seloader/seloader_git.bb +++ b/meta-efi-secure-boot/recipes-bsp/seloader/seloader_git.bb | |||
@@ -58,6 +58,7 @@ python do_sign() { | |||
58 | d.expand('${B}/Bin/Pkcs7VerifyDxe.efi.signed'), d) | 58 | d.expand('${B}/Bin/Pkcs7VerifyDxe.efi.signed'), d) |
59 | } | 59 | } |
60 | addtask sign after do_compile before do_install | 60 | addtask sign after do_compile before do_install |
61 | do_sign[prefuncs] += "check_deploy_keys" | ||
61 | 62 | ||
62 | do_install() { | 63 | do_install() { |
63 | install -d ${D}${EFI_TARGET} | 64 | install -d ${D}${EFI_TARGET} |
diff --git a/meta-efi-secure-boot/recipes-bsp/shim/shim_git.bb b/meta-efi-secure-boot/recipes-bsp/shim/shim_git.bb index d371bd4..4863843 100644 --- a/meta-efi-secure-boot/recipes-bsp/shim/shim_git.bb +++ b/meta-efi-secure-boot/recipes-bsp/shim/shim_git.bb | |||
@@ -94,6 +94,7 @@ python do_prepare_signing_keys() { | |||
94 | shutil.copyfile(d.expand('${EV_CERT}'), d.expand('${S}/shim.pem')) | 94 | shutil.copyfile(d.expand('${EV_CERT}'), d.expand('${S}/shim.pem')) |
95 | } | 95 | } |
96 | addtask prepare_signing_keys after do_configure before do_compile | 96 | addtask prepare_signing_keys after do_configure before do_compile |
97 | do_prepare_signing_keys[prefuncs] += "check_deploy_keys" | ||
97 | 98 | ||
98 | python do_sign() { | 99 | python do_sign() { |
99 | # The pre-signed shim binary will override the one built from the | 100 | # The pre-signed shim binary will override the one built from the |
diff --git a/meta-efi-secure-boot/recipes-kernel/linux/kernel-initramfs.bbappend b/meta-efi-secure-boot/recipes-kernel/linux/kernel-initramfs.bbappend index b68f201..7a82aa7 100644 --- a/meta-efi-secure-boot/recipes-kernel/linux/kernel-initramfs.bbappend +++ b/meta-efi-secure-boot/recipes-kernel/linux/kernel-initramfs.bbappend | |||
@@ -17,6 +17,7 @@ fakeroot python do_sign() { | |||
17 | uks_sel_sign(initramfs, d) | 17 | uks_sel_sign(initramfs, d) |
18 | } | 18 | } |
19 | addtask sign after do_install before do_deploy do_package | 19 | addtask sign after do_install before do_deploy do_package |
20 | do_sign[prefuncs] += "check_deploy_keys" | ||
20 | 21 | ||
21 | do_deploy() { | 22 | do_deploy() { |
22 | initramfs="" | 23 | initramfs="" |
diff --git a/meta-efi-secure-boot/recipes-kernel/linux/linux-yocto-efi-secure-boot.inc b/meta-efi-secure-boot/recipes-kernel/linux/linux-yocto-efi-secure-boot.inc index 2f4b338..62e869d 100644 --- a/meta-efi-secure-boot/recipes-kernel/linux/linux-yocto-efi-secure-boot.inc +++ b/meta-efi-secure-boot/recipes-kernel/linux/linux-yocto-efi-secure-boot.inc | |||
@@ -37,6 +37,7 @@ fakeroot python do_sign() { | |||
37 | # Make sure the kernel image has been signed before kernel_do_deploy() | 37 | # Make sure the kernel image has been signed before kernel_do_deploy() |
38 | # which prepares the kernel image for creating usb/iso. | 38 | # which prepares the kernel image for creating usb/iso. |
39 | addtask sign after do_install before do_package do_populate_sysroot do_deploy | 39 | addtask sign after do_install before do_package do_populate_sysroot do_deploy |
40 | do_sign[prefuncs] += "check_deploy_keys" | ||
40 | 41 | ||
41 | fakeroot python do_sign_bundled_kernel() { | 42 | fakeroot python do_sign_bundled_kernel() { |
42 | import re | 43 | import re |
diff --git a/meta-integrity/recipes-base/packagegroups/packagegroup-ima.inc b/meta-integrity/recipes-base/packagegroups/packagegroup-ima.inc index cc87dba..e39875b 100644 --- a/meta-integrity/recipes-base/packagegroups/packagegroup-ima.inc +++ b/meta-integrity/recipes-base/packagegroups/packagegroup-ima.inc | |||
@@ -7,11 +7,6 @@ S = "${WORKDIR}" | |||
7 | 7 | ||
8 | ALLOW_EMPTY_${PN} = "1" | 8 | ALLOW_EMPTY_${PN} = "1" |
9 | 9 | ||
10 | # Check and deploy keys to ${DEPLOY_DIR_IMAGE} | ||
11 | inherit user-key-store | ||
12 | |||
13 | do_install[postfuncs] += "check_deploy_keys" | ||
14 | |||
15 | RDEPENDS_${PN} = "\ | 10 | RDEPENDS_${PN} = "\ |
16 | ima-evm-utils \ | 11 | ima-evm-utils \ |
17 | " | 12 | " |
diff --git a/meta-signing-key/recipes-support/key-store/key-store_0.1.bb b/meta-signing-key/recipes-support/key-store/key-store_0.1.bb index 7402219..472cef5 100644 --- a/meta-signing-key/recipes-support/key-store/key-store_0.1.bb +++ b/meta-signing-key/recipes-support/key-store/key-store_0.1.bb | |||
@@ -82,6 +82,8 @@ do_install() { | |||
82 | fi | 82 | fi |
83 | } | 83 | } |
84 | 84 | ||
85 | do_install[prefuncs] += "check_deploy_keys" | ||
86 | |||
85 | SYSROOT_PREPROCESS_FUNCS += "key_store_sysroot_preprocess" | 87 | SYSROOT_PREPROCESS_FUNCS += "key_store_sysroot_preprocess" |
86 | 88 | ||
87 | key_store_sysroot_preprocess() { | 89 | key_store_sysroot_preprocess() { |