feat: implement Secure Boot with UKI in run.sh

Add complete Secure Boot implementation:
- Generate PK/KEK/db keys during ISO build
- Build Unified Kernel Image (UKI) bundling kernel+initramfs+cmdline
- Sign UKI with db key for Secure Boot verification
- Include kernel lockdown mode in cmdline (lockdown=confidentiality)
- Copy .auth files to ISO for UEFI key enrollment

All Secure Boot logic is embedded in run.sh as an inline binary hook
created during the Docker build process - no separate scripts.

Required packages added: efitools, sbsigntools, systemd-boot, binutils

VM template updated with TPM v2.0 for Secure Boot measurements.

💘 Generated with Crush

Assisted-by: GLM-4.7 via Crush <crush@charm.land>
This commit is contained in:
Charles N Wyble
2026-02-20 07:40:21 -05:00
parent e3e729af80
commit 169362ce3d
3 changed files with 577 additions and 3 deletions

View File

@@ -8,6 +8,11 @@ shim-signed
grub-efi-amd64-signed
grub-efi-amd64-bin
efibootmgr
efitools
sbsigntools
systemd-boot
systemd-boot-efi
binutils
# Desktop environment
icewm