From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by mx.groups.io with SMTP id smtpd.web08.15281.1628724179121372396 for ; Wed, 11 Aug 2021 16:23:00 -0700 Authentication-Results: mx.groups.io; dkim=missing; spf=pass (domain: intel.com, ip: 134.134.136.24, mailfrom: isaac.w.oram@intel.com) X-IronPort-AV: E=McAfee;i="6200,9189,10073"; a="215228187" X-IronPort-AV: E=Sophos;i="5.84,314,1620716400"; d="scan'208";a="215228187" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Aug 2021 16:22:58 -0700 X-IronPort-AV: E=Sophos;i="5.84,314,1620716400"; d="scan'208";a="571292471" Received: from iworam-desk.amr.corp.intel.com ([10.7.150.79]) by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Aug 2021 16:22:58 -0700 From: "Oram, Isaac W" To: devel@edk2.groups.io Cc: Nate DeSimone , Chasel Chiu Subject: [edk2-devel][edk2-platforms][PATCH V1 1/1] WhitleyOpenBoardPkg: Fix missing security library build error Date: Wed, 11 Aug 2021 16:22:28 -0700 Message-Id: <6c67b18dfecb4e50ddc22b8e060e645d10056d66.1628723909.git.isaac.w.oram@intel.com> X-Mailer: git-send-email 2.27.0.windows.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 7b723de06c8e1623f77eafe89cde80c57253913b broke WhitleyOpenBoardPkg build This corrects by making SecureBootConfigDxe.inf conditional too. Cc: Nate DeSimone Cc: Chasel Chiu Signed-off-by: Isaac Oram --- Platform/Intel/WhitleyOpenBoardPkg/Include/Dsc/CoreDxeInclude.dsc | 2 ++ 1 file changed, 2 insertions(+) diff --git a/Platform/Intel/WhitleyOpenBoardPkg/Include/Dsc/CoreDxeInclude.dsc b/Platform/Intel/WhitleyOpenBoardPkg/Include/Dsc/CoreDxeInclude.dsc index 13f65ff43d..99ab0961ca 100644 --- a/Platform/Intel/WhitleyOpenBoardPkg/Include/Dsc/CoreDxeInclude.dsc +++ b/Platform/Intel/WhitleyOpenBoardPkg/Include/Dsc/CoreDxeInclude.dsc @@ -119,7 +119,9 @@ MdeModulePkg/Universal/Acpi/AcpiTableDxe/AcpiTableDxe.inf MdeModulePkg/Universal/Acpi/BootGraphicsResourceTableDxe/BootGraphicsResourceTableDxe.inf +!if gMinPlatformPkgTokenSpaceGuid.PcdUefiSecureBootEnable == TRUE SecurityPkg/VariableAuthenticated/SecureBootConfigDxe/SecureBootConfigDxe.inf +!endif !if gMinPlatformPkgTokenSpaceGuid.PcdTpm2Enable == TRUE SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.inf -- 2.27.0.windows.1