Imported 23.10.47 from mantic-release pocket.

No reason for CPC update specified.
This commit is contained in:
CloudBuilder 2023-09-27 13:51:09 +00:00
parent 6d7b91dd6c
commit 125ac748b0
3 changed files with 31 additions and 5 deletions

17
debian/changelog vendored
View File

@ -1,3 +1,20 @@
livecd-rootfs (23.10.47) mantic; urgency=medium
[ Phil Roche ]
* fix: Ensure that grub/shim package installs do not install recommends for
minimized ubuntu-cpc image builds (LP: #2037075)
-- Steve Langasek <steve.langasek@ubuntu.com> Tue, 26 Sep 2023 15:04:09 -0700
livecd-rootfs (23.10.46) UNRELEASED; urgency=medium
[ Simon Poirier ]
* Fix use of variable declared in conditional branch and used in parent
scope in snap_validate_seed. This would affect binary for images without
kernel and using "set -u". (LP: #2037338)
-- Michael Hudson-Doyle <michael.hudson@ubuntu.com> Tue, 26 Sep 2023 15:11:07 +1300
livecd-rootfs (23.10.45) mantic; urgency=medium livecd-rootfs (23.10.45) mantic; urgency=medium
* budgie: Configure universe & multiverse sources (LP: #2036966) * budgie: Configure universe & multiverse sources (LP: #2036966)

View File

@ -767,9 +767,10 @@ snap_preseed() {
snap_validate_seed() { snap_validate_seed() {
local CHROOT_ROOT=$1 local CHROOT_ROOT=$1
local kern_major_min=undefined
if [ -e ${CHROOT_ROOT}/boot/vmlinuz ]; then if [ -e ${CHROOT_ROOT}/boot/vmlinuz ]; then
local kern_major_min=$(readlink --canonicalize --no-newline ${CHROOT_ROOT}/boot/vmlinuz | grep --extended-regexp --only-matching --max-count 1 '[0-9]+\.[0-9]+') kern_major_min=$(readlink --canonicalize --no-newline ${CHROOT_ROOT}/boot/vmlinuz | grep --extended-regexp --only-matching --max-count 1 '[0-9]+\.[0-9]+')
if [ -d /usr/share/livecd-rootfs/live-build/apparmor/${kern_major_min} ]; then if [ -d /usr/share/livecd-rootfs/live-build/apparmor/${kern_major_min} ]; then
# if an Ubuntu version has different kernel apparmor features between LTS and HWE kernels # if an Ubuntu version has different kernel apparmor features between LTS and HWE kernels
# a snap pre-seeding issue can occur, where the incorrect apparmor features are reported # a snap pre-seeding issue can occur, where the incorrect apparmor features are reported

View File

@ -106,25 +106,33 @@ install_grub() {
chroot mountpoint apt-get -y update chroot mountpoint apt-get -y update
package_install_recommends_option=""
# minimized cloud image policy, introduced in version 23.10.16, is to not install recommends for any package
# installs during build. This is to keep the image as small as possible. This also extends to
# the grub related packages.
if [ "${SUBPROJECT:-}" = minimized ]; then
package_install_recommends_option="--no-install-recommends"
fi
# UEFI GRUB modules are meant to be used equally by Secure Boot and # UEFI GRUB modules are meant to be used equally by Secure Boot and
# non-Secure Boot systems. If you need an extra module not already # non-Secure Boot systems. If you need an extra module not already
# provided or run into "Secure Boot policy forbids loading X" problems, # provided or run into "Secure Boot policy forbids loading X" problems,
# please file a bug against grub2 to include the affected module. # please file a bug against grub2 to include the affected module.
case $ARCH in case $ARCH in
arm64) arm64)
chroot mountpoint apt-get -qqy install --no-install-recommends shim-signed grub-efi-arm64-signed chroot mountpoint apt-get -qqy install ${package_install_recommends_option} shim-signed grub-efi-arm64-signed
efi_target=arm64-efi efi_target=arm64-efi
;; ;;
armhf) armhf)
chroot mountpoint apt-get -qqy install --no-install-recommends grub-efi-arm grub-efi-arm-bin chroot mountpoint apt-get -qqy install ${package_install_recommends_option} grub-efi-arm grub-efi-arm-bin
efi_target=arm-efi efi_target=arm-efi
;; ;;
amd64) amd64)
chroot mountpoint apt-get install -qqy grub-pc shim-signed chroot mountpoint apt-get install -qqy ${package_install_recommends_option} grub-pc shim-signed
efi_target=x86_64-efi efi_target=x86_64-efi
;; ;;
riscv64) riscv64)
chroot mountpoint apt-get install -qqy u-boot-menu grub-efi-riscv64 chroot mountpoint apt-get install -qqy ${package_install_recommends_option} u-boot-menu grub-efi-riscv64
efi_target=riscv64-efi efi_target=riscv64-efi
chroot mountpoint u-boot-update chroot mountpoint u-boot-update