commit:     9e44e430b7bf879f821301b93fa5006e9d625097
Author:     Matthias Maier <tamiko <AT> gentoo <DOT> org>
AuthorDate: Tue Jan  4 00:01:49 2022 +0000
Commit:     Matthias Maier <tamiko <AT> gentoo <DOT> org>
CommitDate: Tue Jan  4 00:02:11 2022 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=9e44e430

sys-firmware/edk2-ovmf: workaround: do not install broken qemu config

As a temporary workaround do not install

  /usr/share/qemu/firmware/40-edk2-ovmf-x64-sb-enrolled.json

We are currently not shipping the necessary OVMF_VARS.secboot.fd file

Bug: https://bugs.gentoo.org/830006
Package-Manager: Portage-3.0.30, Repoman-3.0.3
RepoMan-Options: --force
Signed-off-by: Matthias Maier <tamiko <AT> gentoo.org>

 sys-firmware/edk2-ovmf/edk2-ovmf-202105-r2.ebuild | 177 ++++++++++++++++++++++
 1 file changed, 177 insertions(+)

diff --git a/sys-firmware/edk2-ovmf/edk2-ovmf-202105-r2.ebuild 
b/sys-firmware/edk2-ovmf/edk2-ovmf-202105-r2.ebuild
new file mode 100644
index 000000000000..238999b462bb
--- /dev/null
+++ b/sys-firmware/edk2-ovmf/edk2-ovmf-202105-r2.ebuild
@@ -0,0 +1,177 @@
+# Copyright 1999-2022 Gentoo Authors
+# Distributed under the terms of the GNU General Public License v2
+
+EAPI=7
+
+PYTHON_REQ_USE="sqlite"
+PYTHON_COMPAT=( python3_{8,9,10} )
+
+inherit python-any-r1 readme.gentoo-r1
+
+DESCRIPTION="UEFI firmware for 64-bit x86 virtual machines"
+HOMEPAGE="https://github.com/tianocore/edk2";
+
+BUNDLED_OPENSSL_SUBMODULE_SHA="e2e09d9fba1187f8d6aafaa34d4172f56f1ffb72"
+BUNDLED_BROTLI_SUBMODULE_SHA="666c3280cc11dc433c303d79a83d4ffbdd12cc8d"
+
+# TODO: talk with tamiko about unbundling (mva)
+
+# TODO: the binary 202105 package currently lacks the preseeded
+#       OVMF_VARS.secboot.fd file (that we typically get from fedora)
+
+SRC_URI="
+       !binary? (
+               
https://github.com/tianocore/edk2/archive/edk2-stable${PV}.tar.gz -> ${P}.tar.gz
+               
https://github.com/openssl/openssl/archive/${BUNDLED_OPENSSL_SUBMODULE_SHA}.tar.gz
 -> openssl-${BUNDLED_OPENSSL_SUBMODULE_SHA}.tar.gz
+               
https://github.com/google/brotli/archive/${BUNDLED_BROTLI_SUBMODULE_SHA}.tar.gz 
-> brotli-${BUNDLED_BROTLI_SUBMODULE_SHA}.tar.gz
+       )
+       binary? ( https://dev.gentoo.org/~tamiko/distfiles/${P}-r1-bin.tar.xz )
+       https://dev.gentoo.org/~tamiko/distfiles/${P}-qemu-firmware.tar.xz
+"
+
+LICENSE="BSD-2 MIT"
+SLOT="0"
+KEYWORDS="amd64 arm64 ~ppc ppc64 x86"
+
+IUSE="+binary"
+REQUIRED_USE+="
+       !amd64? ( binary )
+"
+
+NON_BINARY_DEPEND="
+       app-emulation/qemu
+       >=dev-lang/nasm-2.0.7
+       >=sys-power/iasl-20160729
+       ${PYTHON_DEPS}
+"
+
+DEPEND+="
+       !binary? (
+               amd64? (
+                       ${NON_BINARY_DEPEND}
+               )
+       )"
+RDEPEND=""
+
+PATCHES=(
+       "${FILESDIR}/${PN}-202105-werror.patch"
+)
+
+S="${WORKDIR}/edk2-edk2-stable${PV}"
+
+DISABLE_AUTOFORMATTING=true
+DOC_CONTENTS="This package contains the tianocore edk2 UEFI firmware for 
64-bit x86
+virtual machines. The firmware is located under
+       /usr/share/edk2-ovmf/OVMF_CODE.fd
+       /usr/share/edk2-ovmf/OVMF_VARS.fd
+       /usr/share/edk2-ovmf/OVMF_CODE.secboot.fd
+
+If USE=binary is enabled, we also install an OVMF variables file (coming from
+fedora) that contains secureboot default keys
+
+       /usr/share/edk2-ovmf/OVMF_VARS.secboot.fd
+
+If you have compiled this package by hand, you need to either populate all
+necessary EFI variables by hand by booting
+       /usr/share/edk2-ovmf/UefiShell.(iso|img)
+or creating OVMF_VARS.secboot.fd by hand:
+       https://github.com/puiterwijk/qemu-ovmf-secureboot
+
+The firmware does not support csm (due to no free csm implementation
+available). If you need a firmware with csm support you have to download
+one for yourself. Firmware blobs are commonly labeled
+       OVMF{,_CODE,_VARS}-with-csm.fd
+
+In order to use the firmware you can run qemu the following way
+
+       $ qemu-system-x86_64 \
+               -drive 
file=/usr/share/edk2-ovmf/OVMF.fd,if=pflash,format=raw,unit=0,readonly=on \
+               ..."
+
+pkg_setup() {
+       [[ ${PV} != "999999" ]] && use binary || python-any-r1_pkg_setup
+}
+
+src_prepare() {
+       if use binary; then
+               eapply_user
+       else
+               # Bundled submodules
+               cp -rl "${WORKDIR}/openssl-${BUNDLED_OPENSSL_SUBMODULE_SHA}"/* 
"CryptoPkg/Library/OpensslLib/openssl/"
+               cp -rl "${WORKDIR}/brotli-${BUNDLED_BROTLI_SUBMODULE_SHA}"/* 
"BaseTools/Source/C/BrotliCompress/brotli/"
+               cp -rl "${WORKDIR}/brotli-${BUNDLED_BROTLI_SUBMODULE_SHA}"/* 
"MdeModulePkg/Library/BrotliCustomDecompressLib/brotli/"
+
+               sed -i -r \
+                       -e "/function SetupPython3/,/\}/{s,\\\$\(whereis 
python3\),${EPYTHON},g}" \
+                       "${S}"/edksetup.sh || die "Fixing for correct Python3 
support failed"
+
+               default
+       fi
+}
+
+src_compile() {
+       TARGET_ARCH=X64
+       TARGET_NAME=RELEASE
+       TARGET_TOOLS=GCC49
+
+       BUILD_FLAGS="-D TLS_ENABLE \
+               -D HTTP_BOOT_ENABLE \
+               -D NETWORK_IP6_ENABLE \
+               -D TPM_ENABLE \
+               -D TPM2_ENABLE -D TPM2_CONFIG_ENABLE \
+               -D FD_SIZE_2MB"
+
+       SECUREBOOT_BUILD_FLAGS="${BUILD_FLAGS} \
+               -D SECURE_BOOT_ENABLE \
+               -D SMM_REQUIRE \
+               -D EXCLUDE_SHELL_FROM_FD"
+
+       [[ ${PV} != "999999" ]] && use binary && return
+
+       emake ARCH=${TARGET_ARCH} -C BaseTools
+
+       . ./edksetup.sh
+
+       # Build all EFI firmware blobs:
+
+       mkdir -p ovmf
+
+       ./OvmfPkg/build.sh \
+               -a "${TARGET_ARCH}" -b "${TARGET_NAME}" -t "${TARGET_TOOLS}" \
+               ${BUILD_FLAGS} || die "OvmfPkg/build.sh failed"
+
+       cp Build/OvmfX64/*/FV/OVMF_*.fd ovmf/
+       rm -rf Build/OvmfX64
+
+       ./OvmfPkg/build.sh \
+               -a "${TARGET_ARCH}" -b "${TARGET_NAME}" -t "${TARGET_TOOLS}" \
+               ${SECUREBOOT_BUILD_FLAGS} || die "OvmfPkg/build.sh failed"
+
+       cp Build/OvmfX64/*/FV/OVMF_CODE.fd ovmf/OVMF_CODE.secboot.fd || die "cp 
failed"
+       cp Build/OvmfX64/*/X64/Shell.efi ovmf/ || die "cp failed"
+       cp Build/OvmfX64/*/X64/EnrollDefaultKeys.efi ovmf || die "cp failed"
+
+       # Build a convenience UefiShell.img:
+
+       mkdir -p iso_image/efi/boot || die "mkdir failed"
+       cp ovmf/Shell.efi iso_image/efi/boot/bootx64.efi || die "cp failed"
+       cp ovmf/EnrollDefaultKeys.efi iso_image || die "cp failed"
+       qemu-img convert --image-opts \
+               
driver=vvfat,floppy=on,fat-type=12,label=UEFI_SHELL,dir=iso_image \
+               ovmf/UefiShell.img || die "qemu-img failed"
+}
+
+src_install() {
+       insinto /usr/share/${PN}
+       doins ovmf/*
+
+       insinto /usr/share/qemu/firmware
+       doins qemu/*
+       rm "${ED}"/usr/share/qemu/firmware/40-edk2-ovmf-x64-sb-enrolled.json || 
die "rm failed"
+
+       readme.gentoo_create_doc
+}
+
+pkg_postinst() {
+       readme.gentoo_print_elog
+}

Reply via email to