{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":685649229,"defaultBranch":"kirkstone-6.x.y","name":"meta-toradex-security","ownerLogin":"rborn-tx","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2023-08-31T17:39:01.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/93716395?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1727461785.0","currentOid":""},"activityList":{"items":[{"before":null,"after":"2c5ff367dc53d4ac43cd29e90583ef4e0e94dad8","ref":"refs/heads/warning-to-stderr-kirkstone","pushedAt":"2024-09-27T18:29:45.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"u-boot: send hardening warning messages to stderr\n\nSend most of the hardening warning/error messages to U-Boot's stderr to\nincrease the chances they are seen.\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot: send hardening warning messages to stderr"}},{"before":null,"after":"5f026b31b571b9eaf208ad76a9eec79bacf3d0b4","ref":"refs/heads/warning-to-stderr-scarthgap","pushedAt":"2024-09-27T16:51:39.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"u-boot: send hardening warning messages to stderr\n\nSend most of the hardening warning/error messages to U-Boot's stderr to\nincrease the chances they are seen.\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot: send hardening warning messages to stderr"}},{"before":"bb8c471253f2e7980c799612554990944b543984","after":null,"ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-20T17:50:31.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"}},{"before":"cf940b7d8962485e27bc225abf74f85096cece66","after":null,"ref":"refs/heads/TOR-3558-hardening-on-bsp-images-kirkstone","pushedAt":"2024-09-20T17:50:27.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"}},{"before":"aaa1b055b624927d8721a0e94253b5226c301e08","after":"bb8c471253f2e7980c799612554990944b543984","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-19T19:20:01.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"79291d3654fd6f5ad888f6fe08fbf0b8f6b99d88","after":"cf940b7d8962485e27bc225abf74f85096cece66","ref":"refs/heads/TOR-3558-hardening-on-bsp-images-kirkstone","pushedAt":"2024-09-18T18:55:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"751143f9aaa4ad2eba7e2457cf2333890335a798","after":"aaa1b055b624927d8721a0e94253b5226c301e08","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-18T02:41:33.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"e138fd63c865b9e6151c35778df94bff1b7994cf","after":"79291d3654fd6f5ad888f6fe08fbf0b8f6b99d88","ref":"refs/heads/TOR-3558-hardening-on-bsp-images-kirkstone","pushedAt":"2024-09-18T02:41:27.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"07963d52e79adfe57344a0f72c8e82f102dc5b3e","after":"e138fd63c865b9e6151c35778df94bff1b7994cf","ref":"refs/heads/TOR-3558-hardening-on-bsp-images-kirkstone","pushedAt":"2024-09-18T01:55:42.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"a6e8de0ba75428c813204285696128b0fce378fe","after":"07963d52e79adfe57344a0f72c8e82f102dc5b3e","ref":"refs/heads/TOR-3558-hardening-on-bsp-images-kirkstone","pushedAt":"2024-09-18T01:43:36.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"0498608062a4f06d54834dcbfb3f4f1d5cad56d2","after":"751143f9aaa4ad2eba7e2457cf2333890335a798","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-18T01:43:30.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"0e54caa8ed33af84beaad8f798b1bcbabbc0255a","after":"a6e8de0ba75428c813204285696128b0fce378fe","ref":"refs/heads/TOR-3558-hardening-on-bsp-images-kirkstone","pushedAt":"2024-09-18T01:37:42.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"5f1add665d83421dd32e3cf76c9efcca2e5b3244","after":"0498608062a4f06d54834dcbfb3f4f1d5cad56d2","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T23:19:56.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":null,"after":"0e54caa8ed33af84beaad8f798b1bcbabbc0255a","ref":"refs/heads/TOR-3558-hardening-on-bsp-images-kirkstone","pushedAt":"2024-09-17T22:46:37.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"e9a865bb4c3421198607c138206790fe75cc862f","after":"5f1add665d83421dd32e3cf76c9efcca2e5b3244","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T20:00:02.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"111bd4f73fb336f6cf513cec417aeec4ebb7ce25","after":"e9a865bb4c3421198607c138206790fe75cc862f","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T19:53:55.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"85fac7480754ea56099bd2f60115ce759a170505","after":"111bd4f73fb336f6cf513cec417aeec4ebb7ce25","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T19:44:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"9f73abe42208b1277f9dbb4e7f156d9c8d7d1a66","after":"85fac7480754ea56099bd2f60115ce759a170505","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T19:42:09.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"README-secure-boot: update documentation\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"README-secure-boot: update documentation"}},{"before":"059cbc8291ace98b70556ead0bba4a7d5e5e7fcb","after":"9f73abe42208b1277f9dbb4e7f156d9c8d7d1a66","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T15:46:50.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot-harden: make amendments to the boot script\n\nConditionally apply amendments to the boot script to make it suitable to\nuse with the hardening feature. Those amendments are applicable to\nToradex BSP images and should be disabled by users having custom boot\nscripts, for example. The main modification to the boot script is the\nremoval of a block involving the \"setexpr\" U-Boot command which we do\nnot want to be part of the whitelist.\n\nThe amendments are applied only when TDX_AMEND_BOOT_SCRIPT is set to \"1\"\nand the default value of this variable is the same value of\nTDX_UBOOT_HARDENING_ENABLE such that when the hardening is disabled, no\namendments are applied by default.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot-harden: make amendments to the boot script"}},{"before":"8fd4739be431184fd04d5a4382fcd45203c1d504","after":"059cbc8291ace98b70556ead0bba4a7d5e5e7fcb","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T15:29:41.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot-harden: make amendments to the boot script\n\nConditionally apply amendments to the boot script to make it suitable to\nuse with the hardening feature. Those amendments are applicable to\nToradex BSP images and should be disabled by users having custom boot\nscripts, for example. The main modification to the boot script is the\nremoval of a block involving the \"setexpr\" U-Boot command which we do\nnot want to be part of the whitelist.\n\nThe amendments are applied only when TDX_AMEND_BOOT_SCRIPT is set to \"1\"\nand the default value of this variable is the same value of\nTDX_UBOOT_HARDENING_ENABLE such that when the hardening is disabled, no\namendments are applied by default.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot-harden: make amendments to the boot script"}},{"before":"34ac24124249b53df2ea2e245dda99c2b35331e9","after":"8fd4739be431184fd04d5a4382fcd45203c1d504","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T15:11:30.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot-harden: make amendments to the boot script\n\nConditionally apply amendments to the boot script to make it suitable to\nuse with the hardening feature. Those amendments are applicable to\nToradex BSP images and should be disabled by users having custom boot\nscripts, for example. The main modification to the boot script is the\nremoval of a block involving the \"setexpr\" U-Boot command which we do\nnot want to be part of the whitelist.\n\nThe amendments are applied only when DISTRO_BOOT_AMEND_CONSOLE_ARGUMENT\nis set to \"1\"; the default value of this variable is the same value of\nTDX_UBOOT_HARDENING_ENABLE such that when the hardening is disabled, no\namendments are applied by default.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot-harden: make amendments to the boot script"}},{"before":"0d6998e44d3d6931356ff9c74a9f91b63238dfde","after":"34ac24124249b53df2ea2e245dda99c2b35331e9","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T02:16:39.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot-harden: make amendments to the boot script\n\nConditionally apply amendments to the boot script to make it suitable to\nuse with the hardening feature. Those amendments are applicable to\nToradex BSP images and should be disabled by users having custom boot\nscripts, for example. The main modification to the boot script is the\nremoval of a block involving the \"setexpr\" U-Boot command which we do\nnot want to be part of the whitelist.\n\nThe amendments are applied only when DISTRO_BOOT_AMEND_CONSOLE_ARGUMENT\nis set to \"1\"; the default value of this variable is the same value of\nTDX_UBOOT_HARDENING_ENABLE such that when the hardening is disabled, no\namendments are applied by default.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot-harden: make amendments to the boot script"}},{"before":"0b74f8883f169d22e45f115bb7b7a23982c2ad9a","after":"0d6998e44d3d6931356ff9c74a9f91b63238dfde","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T02:11:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot-harden: make amendments to the boot script\n\nConditionally apply amendments to the boot script to make it suitable to\nuse with the hardening feature. Those amendments are applicable to\nToradex BSP images and should be disabled by users having custom boot\nscripts, for example. The main modification to the boot script is the\nremoval of a block involving the \"setexpr\" U-Boot command which we do\nnot want to be part of the whitelist.\n\nThe amendments are applied only when DISTRO_BOOT_AMEND_CONSOLE_ARGUMENT\nis set to \"1\"; the default value of this variable is the same value of\nTDX_UBOOT_HARDENING_ENABLE such that when the hardening is disabled, no\namendments are applied by default.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot-harden: make amendments to the boot script"}},{"before":"0864fe15d4585953ffa2ee670eb241324bde156d","after":"0b74f8883f169d22e45f115bb7b7a23982c2ad9a","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T02:08:52.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot-harden: make amendments to the boot script\n\nConditionally apply amendments to the boot script to make it suitable to\nuse with the hardening feature. Those amendments are applicable to\nToradex BSP images and should be disabled by users having custom boot\nscripts, for example. The main modification to the boot script is the\nremoval of a block involving the \"setexpr\" U-Boot command which we do\nnot want to be part of the whitelist.\n\nThe amendments are applied only when DISTRO_BOOT_AMEND_CONSOLE_ARGUMENT\nis set to \"1\"; the default value of this variable is the same value of\nTDX_UBOOT_HARDENING_ENABLE such that when the hardening is disabled, no\namendments are applied by default.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot-harden: make amendments to the boot script"}},{"before":"5d6a4871956c5f8223f6cec11b684d326c10b993","after":"0864fe15d4585953ffa2ee670eb241324bde156d","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T02:04:21.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"more amendments","shortMessageHtmlLink":"more amendments"}},{"before":"314afe2f6a3abbe0feebda67e0835621d9ae84ab","after":"5d6a4871956c5f8223f6cec11b684d326c10b993","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-17T01:14:38.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"more amendments","shortMessageHtmlLink":"more amendments"}},{"before":"bc3fde55e7774ed571ba556c592bcf273e0f1d15","after":"314afe2f6a3abbe0feebda67e0835621d9ae84ab","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-14T03:17:47.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot-harden: make amendments to the boot script\n\nConditionally apply amendments to the boot script to make it suitable to\nuse with the hardening feature. Those amendments are applicable to\nToradex BSP images and should be disabled by users having custom boot\nscripts, for example. The main modification to the boot script is the\nremoval of a block involving the \"setexpr\" U-Boot command which we do\nnot want to be part of the whitelist.\n\nThe amendments are applied only when DISTRO_BOOT_AMEND_CONSOLE_ARGUMENT\nis set to \"1\"; the default value of this variable is the same value of\nTDX_UBOOT_HARDENING_ENABLE such that when the hardening is disabled, no\namendments are applied by default.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot-harden: make amendments to the boot script"}},{"before":"2dc082066663b40f7ffb0ba683b8067ecec9eb1d","after":"bc3fde55e7774ed571ba556c592bcf273e0f1d15","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-13T23:32:03.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot-harden: make amendments to the boot script\n\nConditionally apply amendments to the boot script to make it suitable to\nuse with the hardening feature. Those amendments are applicable to\nToradex BSP images and should be disabled by users having custom boot\nscripts, for example. The main modification to the boot script is the\nremoval of a block involving the \"setexpr\" U-Boot command which we do\nnot want to be part of the whitelist.\n\nThe amendments are applied only when DISTRO_BOOT_AMEND_CONSOLE_ARGUMENT\nis set to \"1\"; the default value of this variable is the same value of\nTDX_UBOOT_HARDENING_ENABLE such that when the hardening is disabled, no\namendments are applied by default.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot-harden: make amendments to the boot script"}},{"before":"160d48abbbc4f2e8189ab45b5f957f6c5160c1b9","after":"2dc082066663b40f7ffb0ba683b8067ecec9eb1d","ref":"refs/heads/TOR-3558-hardening-on-bsp-images","pushedAt":"2024-09-13T22:24:42.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"u-boot-distro-boot-harden: make amendments to the boot script\n\nConditionally apply amendments to the boot script to make it suitable to\nuse with the hardening feature. Those amendments are applicable to\nToradex BSP images and should be disabled by users having custom boot\nscripts, for example. The main modification to the boot script is the\nremoval of a block involving the \"setexpr\" U-Boot command which we do\nnot want to be part of the whitelist.\n\nThe amendments are applied only when DISTRO_BOOT_AMEND_CONSOLE_ARGUMENT\nis set to \"1\"; the default value of this variable is the same value of\nTDX_UBOOT_HARDENING_ENABLE such that when the hardening is disabled, no\namendments are applied by default.\n\nRelated-to: TOR-3558\n\nSigned-off-by: Rogerio Guerra Borin ","shortMessageHtmlLink":"u-boot-distro-boot-harden: make amendments to the boot script"}},{"before":null,"after":"d01487b0820940f1d39c3093b8891a53d7a52884","ref":"refs/heads/main","pushedAt":"2024-09-11T18:16:02.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"rborn-tx","name":"Rogerio Guerra Borin","path":"/rborn-tx","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/93716395?s=80&v=4"},"commit":{"message":"Merge pull request #53 from rborn-tx/TOR-3539-add-signing-imx8m\n\nAdd support for HAB and kernel FIT image signing when BINMAN is in use (i.MX8M)","shortMessageHtmlLink":"Merge pull request toradex#53 from rborn-tx/TOR-3539-add-signing-imx8m"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0yN1QxODoyOTo0NS4wMDAwMDBazwAAAATC6cFm","endCursor":"Y3Vyc29yOnYyOpK7MjAyNC0wOS0xMVQxODoxNjowMi4wMDAwMDBazwAAAASziBV_"}},"title":"Activity ยท rborn-tx/meta-toradex-security"}