From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mx.groups.io with SMTP id smtpd.web11.3155.1684367809597397300 for ; Wed, 17 May 2023 16:56:52 -0700 Authentication-Results: mx.groups.io; dkim=fail reason="unable to parse pub key" header.i=@intel.com header.s=intel header.b=Kv7HJ9lf; spf=pass (domain: intel.com, ip: 192.55.52.151, mailfrom: subash.lakkimsetti@intel.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1684367811; x=1715903811; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=MkRPyvuQR3AOJrk9le/+XAUOPLvo+Q4D0HrJd/uwRmQ=; b=Kv7HJ9lfznUfkG/GoJaYBRl4fu/+PEUVho2oTaGNZFpiIqHeUGqkis4d BpLMsCMXXmCeaR4gcgKOi9p1JFLWbB4vVboRJPvTCHVLN7QANZSpI9aAp 1h20zX8Psnt4obiNd8g5wSZFW2BCemgG6GCaz8Xmb+rhVcgyBxJQSpyUv QOsdA/0b+jG3cX+YaHBWXGeClpUn19DsXU+hc/2Ldw3vF77yt0gQqQwrN ko/zcTHi+bbJnTWDNooZzW4y8wOiZvpSecpikTDUwbk96AJvXBVXb4gbo XW8w3MEvytYt8szem4oc8Fn+GhyycxUuQDEdk1DIPGNuS6CI8wYzFteH2 A==; X-IronPort-AV: E=McAfee;i="6600,9927,10713"; a="332276051" X-IronPort-AV: E=Sophos;i="5.99,283,1677571200"; d="scan'208";a="332276051" Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 May 2023 16:56:45 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10713"; a="876208972" X-IronPort-AV: E=Sophos;i="5.99,283,1677571200"; d="scan'208";a="876208972" Received: from slakkim-mobl.amr.corp.intel.com ([10.212.56.110]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 May 2023 16:56:44 -0700 From: "Subash Lakkimsetti" To: devel@edk2.groups.io Cc: Subash Lakkimsetti , Guo Dong , Ray Ni , Sean Rhodes , James Lu , Gua Guo Subject: [PATCH v2 6/6] UefiPayloadPkg: Add secure boot definitions to ci build Date: Wed, 17 May 2023 16:55:34 -0700 Message-Id: <616b0485c41d2199d991a36a9cf92b25672a1bb1.1684367408.git.subash.lakkimsetti@intel.com> X-Mailer: git-send-email 2.39.1.windows.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable From: Subash Lakkimsetti Define the build flags for secure boot and measure boot for ci builds Cc: Guo Dong Cc: Ray Ni Cc: Sean Rhodes Cc: James Lu Cc: Gua Guo Signed-off-by: Subash Lakkimsetti --- UefiPayloadPkg/UefiPayloadPkg.ci.yaml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/UefiPayloadPkg/UefiPayloadPkg.ci.yaml b/UefiPayloadPkg/UefiPay= loadPkg.ci.yaml index 278f271c36..e594ea6c20 100644 --- a/UefiPayloadPkg/UefiPayloadPkg.ci.yaml +++ b/UefiPayloadPkg/UefiPayloadPkg.ci.yaml @@ -92,5 +92,7 @@ "BLD_*_EMU_VARIABLE_ENABLE": "FALSE",=0D "BLD_*_DISABLE_RESET_SYSTEM": "TRUE",=0D "BLD_*_SERIAL_DRIVER_ENABLE": "FALSE",=0D + "BLD_*_SECURE_BOOT_ENABLE": "TRUE",=0D + "BLD_*_MEASURED_BOOT_ENABLE": "TRUE",=0D }=0D }=0D --=20 2.39.1.windows.1