/srv/irclogs.ubuntu.com/2015/12/08/#ubuntu-installer.txt

xnoxcyphermox, ack, thanks. let me continue that.11:21
xnoxWARNING: The following packages cannot be authenticated!11:28
* xnox is confused why make -C d-i update doesn't work for me =(11:28
cjwatsonbootstrap archive lying around somewhere?11:33
cjwatsonsince it'll be grabbing stuff from the system apt config11:33
xnoxah11:35
* xnox enables -updates & -security pockets.... cause this desktop used to run devel, but now is running wily and kind of needs those.....11:41
xnoxare http://people.canonical.com/~ubuntu-archive/livefs-build-logs/?C=M;O=D meant to be updated?14:29
cjwatsonxnox: no, that's only an archive of logs from before building in LP14:30
xnoxack.14:30
cyphermoxxnox: if it helps I already had it build in a PPA...15:26
cyphermoxhttps://launchpad.net/~mathieu-tl/+archive/ubuntu/installer-dev/+sourcepub/5755722/+listing-archive-extra15:28
cyphermoxit also requires mokutil though, for which the MIR might have just been acked15:28
samson-uoHi all, can someone point out where I should be looking to figure out how autopartitioning works? I'm trying to figure out if/when ubiquity decides to create a separate /boot partition.21:09
superm1cyphermox: so the intention is that if secure boot is enabled then only load signed kernel is what's causing this change?21:15
cyphermoxsamson-uo: you want to look at the partman-auto package21:16
superm1has there been any discussion about ways to extend the trust onto third party modules that are in archive at least?  building them on launchpad with new kernel or something similar?21:16
cyphermoxsuperm1: for my ubiquity branch?21:16
superm1yeah21:16
cyphermoxso, yeah, only when booted in UEFI *and* when secure boot is enabled21:18
superm1so with that combination it won't be possible to say install an aftermarket NVIDIA kernel module21:20
cyphermoxwell, yes21:22
cyphermoxthat's why there is a prompt for a password to disable secureboot21:22
cyphermoxwith it, you'd be back to the current state of things21:22
superm1you can't programatically turn off secure boot though, that will require going into the BIOS to change the setting21:23
cyphermoxah, shim does have some logic for this21:23
superm1for turning off secure boot?21:23
cyphermoxnot quite disabling secure boot in the BIOS, but not failing validation21:23
superm1oh....21:23
superm1it's cheating gotcha :)21:23
cyphermoxyeah21:23
cyphermoxby the time you're in shim, it's not the BIOS itself doing validation but shim doing it for us21:24
superm1right.  if you're breaking the trust relationship at the shim level why not instead generate a machine specific key for third party modules and sign the kernel modules with that key during build?21:25
cyphermoxthat is one possibility for the future yes21:25
cyphermoxyou still need to hook up importing the machine key, kind of similarly to disabling validation in shim21:25
superm1yeah i guess it's a very similar end result21:26

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!