{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":10648939,"defaultBranch":"main","name":"efibootmgr","ownerLogin":"rhboot","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2013-06-12T18:20:20.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/29258823?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1662982308.481308","currentOid":""},"activityList":{"items":[{"before":"1a4a912849f100c9024088df8a1cad3fb1379f23","after":"0a85e9baaac8a34e4a0bb9c23dfcc9c4f759e061","ref":"refs/heads/main","pushedAt":"2024-03-15T20:48:15.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"Move the internal headers into src\n\nThey're never going to be installed, and moving them here makes adding a\ntest-suite (and porting to meson) easier.\n\nSigned-off-by: Richard Hughes ","shortMessageHtmlLink":"Move the internal headers into src"}},{"before":"e616023ec335b409056aea6c2b8805d82bd9668a","after":"1a4a912849f100c9024088df8a1cad3fb1379f23","ref":"refs/heads/main","pushedAt":"2024-03-15T20:33:30.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"efibootmgr: add support for listing cryptographic signature types.\n\nSince UEFI 2.2, firmware has provided a list of supported signature\ntypes for Secure Boot binaries in a global variable named\n\"SignatureSupport\".\n\nThis patch adds a new command line flag to efibootmgr,\n\"--list-signature-types\" (\"-s\") which collects that information from the\nfirmware and displays it to the user, either by symbolic name if\nlibefivar knows about that signature type or by GUID if it does not.\n\nOn the system in front of me, that looks something like this:\n\nrandom:efibootmgr/signaturesupport$ ./src/efibootmgr -s\nx509_sha256\nx509_sha384\nx509_sha512\nsha256\nx509_cert\nrsa2048\nrsa2048_sha256\nrsa2048_sha1\nexternal_management\nrandom:efibootmgr/signaturesupport$ ./src/efibootmgr -s -v\nx509_sha256 3bd2a492-96c0-4079-b420-fcf98ef103ed\nx509_sha384 7076876e-80c2-4ee6-aad2-28b349a6865b\nx509_sha512 446dbf63-2502-4cda-bcfa-2465d2b0fe9d\nsha256 c1c41626-504c-4092-aca9-41f936934328\nx509_cert a5c059a1-94e4-4aa7-87b5-ab155c2bf072\nrsa2048 3c5766e8-269c-4e34-aa14-ed776e85b3b6\nrsa2048_sha256 e2b36190-879b-4a3d-ad8d-f2e7bba32784\nrsa2048_sha1 67f8444f-8743-48f1-a328-1eaab8736080\nexternal_management 452e8ced-dfff-4b8c-ae01-5118862e682c\nrandom:efibootmgr/signaturesupport$\n\nSigned-off-by: Peter Jones ","shortMessageHtmlLink":"efibootmgr: add support for listing cryptographic signature types."}},{"before":"9cbf722a5f6eed9916ebedc7d0da12fa95a296e9","after":"e616023ec335b409056aea6c2b8805d82bd9668a","ref":"refs/heads/main","pushedAt":"2024-03-15T20:25:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"Revert \"Implement --uri option for use with --ifname\"\n\nThis reverts commit 5ce076c88670eeb63dea80fcaec60e79f0e57ac6.\n\nThis was pulled in prematurely; the support code isn't merged in efivar yet.\n\nSigned-off-by: Peter Jones ","shortMessageHtmlLink":"Revert \"Implement --uri option for use with --ifname\""}},{"before":"0ca99d442e9d0a49d3ec373413d781ca392b57bc","after":"9cbf722a5f6eed9916ebedc7d0da12fa95a296e9","ref":"refs/heads/main","pushedAt":"2024-02-19T15:43:52.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"Use #pragma once in header files\n\nAll compilers have supported this for at least the 5 years, some like gcc and\nclang much longer.\n\nSigned-off-by: Richard Hughes ","shortMessageHtmlLink":"Use #pragma once in header files"}},{"before":"af5b168d1ca205d9fee20142cf9d0d47962a2a0b","after":"0ca99d442e9d0a49d3ec373413d781ca392b57bc","ref":"refs/heads/main","pushedAt":"2024-01-23T15:02:35.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"efibootmgr: delete_bootnext is just a boolean, not an entry id\n\nWhen deleting bootnext, there's nothing to validate (other than\nthe variable existing, in which case del will fail as expected).\n\nThis appears to be a copy/paste error when adding the delete-bootnext\noption from the [create] bootnext option.\n\nSigned-off-by: Dima Zavin ","shortMessageHtmlLink":"efibootmgr: delete_bootnext is just a boolean, not an entry id"}},{"before":"015f95cc37d7e7774792a31aa6bbafb12842784a","after":"af5b168d1ca205d9fee20142cf9d0d47962a2a0b","ref":"refs/heads/main","pushedAt":"2024-01-23T14:50:39.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"Fix the incorrect long parameter in help messages\n\n- fix the incorrect long parameter of --device\n\nSigned-off-by: Qiumiao Zhang ","shortMessageHtmlLink":"Fix the incorrect long parameter in help messages"}},{"before":"5ce076c88670eeb63dea80fcaec60e79f0e57ac6","after":"015f95cc37d7e7774792a31aa6bbafb12842784a","ref":"refs/heads/main","pushedAt":"2024-01-23T14:49:58.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"Remove the --write-signature support\n\nAccording to https://github.com/rhboot/efibootmgr/issues/101, the\n--write-signature option does nothing. This change removes the option.\n\nSigned-off-by: Kamil Aronowski ","shortMessageHtmlLink":"Remove the --write-signature support"}},{"before":"4a8d9c69050bd01a0be66695fea3b35b72f5a425","after":"5ce076c88670eeb63dea80fcaec60e79f0e57ac6","ref":"refs/heads/main","pushedAt":"2024-01-23T14:48:10.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"vathpela","name":"Peter Jones","path":"/vathpela","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1063106?s=80&v=4"},"commit":{"message":"Implement --uri option for use with --ifname\n\nNew --uri option enables to specify a URI when creating a network boot\nentry, e.g.\n\n # efibootmgr -L NetBoot -i enp7s0 --uri http://foobar/grubx64.efi\n\nThis requires support in libefiboot, which is provided by version 39 of\nefivar.\n\nSigned-off-by: Renaud Métrich ","shortMessageHtmlLink":"Implement --uri option for use with --ifname"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEFwx9GAA","startCursor":null,"endCursor":null}},"title":"Activity · rhboot/efibootmgr"}