[isar-cip-core][PATCH 0/5] Read-only rootfs for non-secure swupdate / cleanups / fixes


Jan Kiszka
 

Unifies secure and non-secure swupdate variants further by using a
read-only rootfs in both cases. See patchs for more details.

Applies on top of "SWUpdate & EFI Boot Guard refactorings".

Jan

Jan Kiszka (5):
squashfs-img: Cosmetic cleanups
verity-img: Inherit the source image type class directly
swupdate: Make rootfs read-only also in non-secure setup
Restrict OVMF to qemu-amd64 machine
wic: Drop redundant / misleading --ondisk sda parameters

classes/secure-wic-swu-img.bbclass | 9 +-----
classes/squashfs-img.bbclass | 12 ++++----
classes/verity-img.bbclass | 10 +++++--
classes/wic-swu-img.bbclass | 23 ++++++++++++++
kas/opt/ebg-secure-boot-snakeoil.yml | 7 ++---
kas/opt/efibootguard.yml | 12 ++++----
kas/opt/swupdate.yml | 2 +-
recipes-core/images/read-only.inc | 30 -------------------
wic/ebg-signed-bootloader.inc | 2 +-
wic/ebg-sysparts.inc | 6 ++--
wic/qemu-amd64-efibootguard-secureboot.wks.in | 12 ++++----
wic/qemu-amd64-efibootguard.wks | 6 ----
wic/qemu-amd64-efibootguard.wks.in | 1 +
wic/simatic-ipc227e-efibootguard.wks | 7 -----
wic/simatic-ipc227e-efibootguard.wks.in | 1 +
wic/simatic-ipc227e.wks | 4 +--
wic/swupdate-partition.inc | 2 --
wic/x86-efibootguard.wks.in | 13 ++++++++
18 files changed, 74 insertions(+), 85 deletions(-)
delete mode 100644 recipes-core/images/read-only.inc
delete mode 100644 wic/qemu-amd64-efibootguard.wks
create mode 120000 wic/qemu-amd64-efibootguard.wks.in
delete mode 100644 wic/simatic-ipc227e-efibootguard.wks
create mode 120000 wic/simatic-ipc227e-efibootguard.wks.in
delete mode 100644 wic/swupdate-partition.inc
create mode 100644 wic/x86-efibootguard.wks.in

--
2.34.1

Join {cip-dev@lists.cip-project.org to automatically receive all group messages.