diff options
-rw-r--r-- | meta-integrity/README.md | 7 | ||||
-rw-r--r-- | meta-integrity/classes/ima-evm-rootfs.bbclass | 5 |
2 files changed, 1 insertions, 11 deletions
diff --git a/meta-integrity/README.md b/meta-integrity/README.md index c333a9f..75dadd4 100644 --- a/meta-integrity/README.md +++ b/meta-integrity/README.md | |||
@@ -153,12 +153,7 @@ ima-evm-rootfs.bbclass: | |||
153 | IMA_EVM_KEY_DIR = "<full path>" | 153 | IMA_EVM_KEY_DIR = "<full path>" |
154 | IMA_EVM_PRIVKEY = "<some other path/privkey_ima.pem>" | 154 | IMA_EVM_PRIVKEY = "<some other path/privkey_ima.pem>" |
155 | 155 | ||
156 | By default, the entire file system gets signed. When using a policy which | 156 | By default, the entire file system gets signed. |
157 | does not require that, the set of files to be labelled can be chosen | ||
158 | by overriding the default "find" expression, for example like this: | ||
159 | |||
160 | IMA_EVM_ROOTFS_FILES = "usr sbin bin lib -type f" | ||
161 | |||
162 | 157 | ||
163 | 2. Usage | 158 | 2. Usage |
164 | ======== | 159 | ======== |
diff --git a/meta-integrity/classes/ima-evm-rootfs.bbclass b/meta-integrity/classes/ima-evm-rootfs.bbclass index 7b73373..bc07d58 100644 --- a/meta-integrity/classes/ima-evm-rootfs.bbclass +++ b/meta-integrity/classes/ima-evm-rootfs.bbclass | |||
@@ -19,11 +19,6 @@ IMA_EVM_X509 ?= "${IMA_EVM_KEY_DIR}/x509_ima.der" | |||
19 | # ima-local-ca.x509 is what ima-gen-local-ca.sh creates. | 19 | # ima-local-ca.x509 is what ima-gen-local-ca.sh creates. |
20 | IMA_EVM_ROOT_CA ?= "${IMA_EVM_KEY_DIR}/ima-local-ca.pem" | 20 | IMA_EVM_ROOT_CA ?= "${IMA_EVM_KEY_DIR}/ima-local-ca.pem" |
21 | 21 | ||
22 | # Sign all regular files by default. | ||
23 | IMA_EVM_ROOTFS_SIGNED ?= ". -type f" | ||
24 | # Hash nothing by default. | ||
25 | IMA_EVM_ROOTFS_HASHED ?= ". -depth 0 -false" | ||
26 | |||
27 | # Mount these file systems (identified via their mount point) with | 22 | # Mount these file systems (identified via their mount point) with |
28 | # the iversion flags (needed by IMA when allowing writing). | 23 | # the iversion flags (needed by IMA when allowing writing). |
29 | IMA_EVM_ROOTFS_IVERSION ?= "" | 24 | IMA_EVM_ROOTFS_IVERSION ?= "" |