[11:21] cyphermox, ack, thanks. let me continue that. [11:28] WARNING: The following packages cannot be authenticated! [11:28] * xnox is confused why make -C d-i update doesn't work for me =( [11:33] bootstrap archive lying around somewhere? [11:33] since it'll be grabbing stuff from the system apt config [11:35] ah [11:41] * xnox enables -updates & -security pockets.... cause this desktop used to run devel, but now is running wily and kind of needs those..... [14:29] are http://people.canonical.com/~ubuntu-archive/livefs-build-logs/?C=M;O=D meant to be updated? [14:30] xnox: no, that's only an archive of logs from before building in LP [14:30] ack. [15:26] xnox: if it helps I already had it build in a PPA... [15:28] https://launchpad.net/~mathieu-tl/+archive/ubuntu/installer-dev/+sourcepub/5755722/+listing-archive-extra [15:28] it also requires mokutil though, for which the MIR might have just been acked [21:09] Hi all, can someone point out where I should be looking to figure out how autopartitioning works? I'm trying to figure out if/when ubiquity decides to create a separate /boot partition. [21:15] cyphermox: so the intention is that if secure boot is enabled then only load signed kernel is what's causing this change? [21:16] samson-uo: you want to look at the partman-auto package [21:16] has there been any discussion about ways to extend the trust onto third party modules that are in archive at least? building them on launchpad with new kernel or something similar? [21:16] superm1: for my ubiquity branch? [21:16] yeah [21:18] so, yeah, only when booted in UEFI *and* when secure boot is enabled [21:20] so with that combination it won't be possible to say install an aftermarket NVIDIA kernel module [21:22] well, yes [21:22] that's why there is a prompt for a password to disable secureboot [21:22] with it, you'd be back to the current state of things [21:23] you can't programatically turn off secure boot though, that will require going into the BIOS to change the setting [21:23] ah, shim does have some logic for this [21:23] for turning off secure boot? [21:23] not quite disabling secure boot in the BIOS, but not failing validation [21:23] oh.... [21:23] it's cheating gotcha :) [21:23] yeah [21:24] by the time you're in shim, it's not the BIOS itself doing validation but shim doing it for us [21:25] right. if you're breaking the trust relationship at the shim level why not instead generate a machine specific key for third party modules and sign the kernel modules with that key during build? [21:25] that is one possibility for the future yes [21:25] you still need to hook up importing the machine key, kind of similarly to disabling validation in shim [21:26] yeah i guess it's a very similar end result