mbox series

[isar-cip-core,0/9] Enable early Debian trixie support, drop sid

Message ID cover.1730977077.git.jan.kiszka@siemens.com (mailing list archive)
Headers show
Series Enable early Debian trixie support, drop sid | expand

Message

Jan Kiszka Nov. 7, 2024, 10:57 a.m. UTC
The next Debian release is still some time into the future, probably around
mid of next year again, but it turned out that - at least for our RISC-V
testing - it already provides a viable target. However, quite a bit more
changes were need than the so far circulating first attempts.

This series now seems to work fine for all our architectures and with full
feature set. It specifically allows us to switch from snapshot-based sid to
latest trixie with our riscv64 build. If that may break again in the future
we could still freeze the package set once more until trixie is finally
released.

These are technical changes, no official commitments yet on the CIP support
strategy for this not-yet-released Debian version.

Jan

Jan Kiszka (9):
  Provide recipe to rebuild gnu-efi 3.0.18 for fixing armhf bug
  swupdate: Control self-building via boolean var
  swupdate-signer: Ensure compatibility also with latest openssl 3.3
  u-boot: Use efisebdb with trixie for generating the UEFI key database
  initramfs-crypt-hook: Make dependencies release-specific and add
    trixie support
  read-only-rootfs: Do not install tmp-fs with trixie anymore
  efibootguard: Use prebuilt python-shtab from trixie onward
  Add Debian trixie
  Replace sid with trixie

 .gitlab-ci.yml                                |  6 +-
 Kconfig                                       |  7 +-
 classes/delta-update.bbclass                  |  4 +-
 classes/read-only-rootfs.bbclass              |  5 +-
 conf/distro/cip-core-sid.conf                 | 20 ----
 conf/distro/cip-core-trixie.conf              | 16 ++++
 doc/README.swupdate.md                        | 16 ++--
 kas-cip.yml                                   |  2 +-
 kas/opt/sid.yml                               | 15 ---
 kas/opt/trixie.yml                            | 15 +++
 .../efibootguard/efibootguard_0.18-1+cip.bb   |  7 +-
 recipes-bsp/u-boot/files/rules.tmpl           |  8 +-
 recipes-bsp/u-boot/u-boot-common-2024.01.inc  |  5 +-
 recipes-core/images/swupdate.inc              | 10 +-
 .../0001-ARM32-Split-headers-and-code.patch   | 93 +++++++++++++++++++
 recipes-devtools/gnu-efi/gnu-efi_latest.bb    | 25 +++++
 .../secure-boot-secrets/files/sid             |  1 +
 .../{sid => trixie}/PkKek-1-snakeoil.key      |  0
 .../{sid => trixie}/PkKek-1-snakeoil.pem      |  0
 .../swupdate-certificates/files/trixie        |  1 +
 .../swupdate-signer/files/sign-swu-cms        |  9 +-
 ...ook_0.3.bb => initramfs-crypt-hook_0.4.bb} | 10 +-
 start-qemu.sh                                 |  6 +-
 23 files changed, 206 insertions(+), 75 deletions(-)
 delete mode 100644 conf/distro/cip-core-sid.conf
 create mode 100644 conf/distro/cip-core-trixie.conf
 delete mode 100644 kas/opt/sid.yml
 create mode 100644 kas/opt/trixie.yml
 create mode 100644 recipes-devtools/gnu-efi/files/0001-ARM32-Split-headers-and-code.patch
 create mode 100644 recipes-devtools/gnu-efi/gnu-efi_latest.bb
 create mode 120000 recipes-devtools/secure-boot-secrets/files/sid
 rename recipes-devtools/secure-boot-secrets/files/{sid => trixie}/PkKek-1-snakeoil.key (100%)
 rename recipes-devtools/secure-boot-secrets/files/{sid => trixie}/PkKek-1-snakeoil.pem (100%)
 create mode 120000 recipes-devtools/swupdate-certificates/files/trixie
 rename recipes-initramfs/initramfs-crypt-hook/{initramfs-crypt-hook_0.3.bb => initramfs-crypt-hook_0.4.bb} (89%)