19 Commits

Author SHA1 Message Date
Stéphane Graber
b665e2a7e8 Fix IncusOS spelling
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2025-11-04 19:08:22 -05:00
Mathias Gibbens
ff61ab99ee scripts: Robustify SecureBoot certificate injection script
Loop-mounting the raw image to inject our own SecureBoot certificates is failing
in CI runs more often than I'd like to see. So, switch to using mtools to
directly manipulate the ESP partition since it's formatted as vfat.

Signed-off-by: Mathias Gibbens <mathias.gibbens@futurfusion.io>
2025-10-21 17:09:10 -06:00
Stéphane Graber
512a900d07 convert-img-to-iso: Fix bad GUID
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2025-08-18 21:12:53 -04:00
Stéphane Graber
0e3c7104b2 convert-img-to-iso: Add aarch64 support
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2025-08-15 01:39:05 -04:00
Stéphane Graber
46b358f584 scripts: Inject der version of the keys
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2025-07-14 12:09:14 -04:00
Mathias Gibbens
247182a3a5 scripts: Add helper script to inject custom Secure Boot key defaults
mkosi doesn't seem to have a nice hook we can use, so we rely on this
script to mount the final install image and inject/replace the auto-
enroll Secure Boot keys with the ones we want.

Signed-off-by: Mathias Gibbens <mathias.gibbens@futurfusion.io>
2025-06-21 13:25:42 -06:00
Mathias Gibbens
81b167151e scripts/test: Add scripts to generate test Secure Boot keys
These scripts generate a full mock-up CA certificate hierarchy similar
to the production certs used when publishing IncusOS. A total of four
Secure Boot signing keys are created, with the first two used to
populate an initial db of trusted certificates. The third is prepared
as an update to db, while the fourth is prepared as an update to dbx.

The resulting keys generated with these scripts are for TEST purposes
only -- don't let them anywhere near a production system.

Signed-off-by: Mathias Gibbens <mathias.gibbens@futurfusion.io>
2025-06-21 08:40:14 -06:00
Mathias Gibbens
40d79df47f Add licenses check
Signed-off-by: Mathias Gibbens <mathias.gibbens@futurfusion.io>
2025-06-19 15:07:53 -06:00
Mathias Gibbens
f3a76872a8 Update spawn-image script to use flasher tool
Signed-off-by: Mathias Gibbens <mathias.gibbens@futurfusion.io>
2025-06-05 13:09:22 -06:00
Stéphane Graber
cd272bbef0 scripts: Hardcode partition GUIDs
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2025-05-22 16:56:45 -04:00
Stéphane Graber
0d3493a2af scripts: Fix spawn-image
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2025-05-07 00:01:36 -04:00
Mathias Gibbens
200e8b840c Improve creation of .iso boot image
Rather than running a duplicate build, add a small script that will copy
each partition from the raw image with 512 byte sectors to a new iso
image with 2048 byte sectors. The resulting iso can then be booted as a
CDROM.

Signed-off-by: Mathias Gibbens <mathias.gibbens@futurfusion.io>
2025-05-02 14:53:37 -06:00
Mathias Gibbens
3d2d059fc3 Don't need to truncate install images anymore
Signed-off-by: Mathias Gibbens <mathias.gibbens@futurfusion.io>
2025-05-01 16:10:25 -06:00
Stéphane Graber
4930034258 spawn-image: Don't use tmpfs
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2025-04-11 22:03:37 -04:00
Stéphane Graber
6b7910a0fc scripts: Remove debugging
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2025-04-08 20:04:11 -04:00
Stéphane Graber
3cd921bea0 scripts: Update for install logic
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2025-04-08 18:02:21 -04:00
Stéphane Graber
a0335be5bf scripts: Update for incus-osd
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2025-03-13 14:51:32 -04:00
Stéphane Graber
b0ddc94c52 scripts/update-image: Update for variable filenames
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2024-12-13 23:17:27 -05:00
Stéphane Graber
8cf96c93e3 scripts: Add scripts to consume the Github builds
Signed-off-by: Stéphane Graber <stgraber@stgraber.org>
2024-12-06 22:19:16 -05:00