1. 13 May, 2023 1 commit
  2. 02 May, 2023 1 commit
  3. 30 Apr, 2023 4 commits
    • Roland Clobus's avatar
      UEFI-secure: Don't attempt to load unsigned modules · 7b36f5b0
      Roland Clobus authored
      The part_*.mod modules are not inside the signed .efi-file, so they must
      not be 'insmod'ed in secure boot mode.
      7b36f5b0
    • Roland Clobus's avatar
      UEFI-secure: Use the signed font · 2944c465
      Roland Clobus authored
      In secure boot mode, only the unifont.pf2 is inside the signed
      .efi-file. To make secure and non-secure boot identical, use only the
      unifont.
      2944c465
    • Roland Clobus's avatar
      Update splash image · 809346bc
      Roland Clobus authored
      The font size was reduced to fully capture the long live-build version.
      Exported without Inkscape information.
      Manually adjusted the coordinates to use integers instead of fractional
      coordinates (for sharper conversion to png).
      809346bc
    • Roland Clobus's avatar
      Share the splash screen from isolinux in grub · 7690fb20
      Roland Clobus authored
      This adds the version information on the grub splash screen and offers
      the image at 800x600 instead of 640x480, which looks less unsharp.
      7690fb20
  4. 25 Mar, 2023 1 commit
  5. 19 Mar, 2023 2 commits
  6. 14 Mar, 2023 2 commits
  7. 11 Mar, 2023 1 commit
  8. 05 Mar, 2023 1 commit
  9. 04 Mar, 2023 2 commits
  10. 01 Mar, 2023 1 commit
  11. 22 Feb, 2023 1 commit
  12. 31 Jan, 2023 7 commits
  13. 28 Jan, 2023 2 commits
  14. 05 Jan, 2023 1 commit
    • snip's avatar
      Use same naming scheme for archive keys in chroot and binary stages · 58f7a9e3
      snip authored
      Commit 8403487d introduced in the chroot stage a naming scheme for local
      archive keys which distinguishes between ASCII-armored keys and binary
      ones, and then adds the appropriate extension (either `.asc` or `.gpg`,
      respectively) when copying them to `/etc/apt/trusted.gpg.d`.
      
      However, this change was not applied to the binary stage: ASCII-armored
      and binary keys are still both copied with the `.asc` extension, which
      introduces a discrepancy between the two stages. This, in turn,
      may prevent using the same `.list` file for both stages, as entries
      such as
      
          deb [signed-by=/etc/apt/trusted.gpg.d/my-repository.key.asc] ...
      
      will fail in the chroot stage if `config/archives/my-repository.key`
      is in binary format (as it will be copied with the `.gpg` extension),
      while entries such as
      
          deb [signed-by=/etc/apt/trusted.gpg.d/my-repository.key.gpg] ...
      
      will fail in the binary stage (as the key will this time be copied
      with the `.asc` extension).
      58f7a9e3
  15. 02 Jan, 2023 1 commit
    • Ryan Finnie's avatar
      Memtest GRUB fixes · 5e01a0c0
      Ryan Finnie authored
      Previous commits to support Memtest86+ 6.00+ split the files into
      "memtest" (backwards compatible / new BIOS name) and "memtest.efi"
      (new EFI name).  However, the 6.00 non-EFI binaries are now
      32/64-bit, and will not work with GRUB's linux16 boot when using GRUB
      for BIOS boot.
      
      - Legacy Memtest86+ pre-6.00 will continue to be "memtest", linux16
        (continue to support builds on current Debian stable bullseye)
      - Change 6.00+ filename to "memtest.bin"
      - GRUB memtest.cfg contains logic for legacy / new bios / new EFI
      - Change EFI boot from "chainloader" to "linux", which allows for
        passing command line options to Memtest86+
      - syslinux @MEMTEST@ will conditionally be memtest.bin or memtest
      - @MEMTEST_BIN@ will conditionally be memtest.bin or memtest, but is
        completely legacy at this point (all internal code paths now check
        for @MEMTEST_DIR@/memtest or @MEMTEST_DIR@/memtest.bin)
      
      Getting complicated, but this logic can be simplified again once we
      no longer need to support current Debian stable.
      5e01a0c0
  16. 14 Nov, 2022 2 commits
  17. 01 Nov, 2022 1 commit
    • Ryan Finnie's avatar
      memtest: Support arch-specific and EFI memtest86+ 6.00 · 1d6f6dd1
      Ryan Finnie authored
      - BIOS: Final filename doesn't change (memtest), but now uses a
        64-bit version on amd64.
      - EFI: Now included as memtest.efi; 32-bit on i386, 64-bit on amd64.
        As it's GRUB-only, we can test for the existence of memtest.efi
        (6.00+ only) in GRUB itself.
      - Add @MEMTEST_DIR@ to facilitate directory-based testing in GRUB.
      
      This expands upon the previous MVP commit
      15e78a3e .
      1d6f6dd1
  18. 31 Oct, 2022 2 commits
    • Ryan Finnie's avatar
      Fix build with memtest86+ 6.00 · 15e78a3e
      Ryan Finnie authored and Luca Boccassi's avatar Luca Boccassi committed
      memtest86+ 6.00-1 (in testing as of this date) adds and changes its
      available binaries:
      
        - /boot/memtest86+x32.bin
        - /boot/memtest86+x32.efi
        - /boot/memtest86+x64.bin
        - /boot/memtest86+x64.efi
      
      Future live-build functionality would ideally incorporate these new
      binaries (x64 for amd64 builds, efi for grub-efi), but in the meantime,
      this is an MVP update which supports either old memtest86.bin or new
      memtest86+x32.bin.
      15e78a3e
    • Luca Boccassi's avatar
      salsa-ci: drop aptly pages publishing, errors out · a8884af9
      Luca Boccassi authored
      "jobs:pages config key may not be used with 'rules': except"
      a8884af9
  19. 23 Aug, 2022 1 commit
  20. 10 Aug, 2022 2 commits
  21. 24 Jul, 2022 1 commit
    • Roland Clobus's avatar
      Build from deb.debian.org · fe9b32e7
      Roland Clobus authored
      For reproducibly building live-images, it turns out that the initial
      build does not necessarily have to use a snapshot server.
      Within a time slot of 6 hours (the interval between synchronisations of
      the Debian archive) the reproducibility of a live image can be checked
      by running the rebuild.sh script twice. The resulting ISO files should
      be identical.
      fe9b32e7
  22. 28 Jun, 2022 1 commit
  23. 10 Jun, 2022 1 commit
  24. 06 Jun, 2022 1 commit