<feed xmlns='http://www.w3.org/2005/Atom'>
<title>openslx-ng/ipxe.git/contrib, branch openslx</title>
<subtitle>Fork of ipxe; additional commands and features</subtitle>
<id>https://git.openslx.org/openslx-ng/ipxe.git/atom/contrib?h=openslx</id>
<link rel='self' href='https://git.openslx.org/openslx-ng/ipxe.git/atom/contrib?h=openslx'/>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/'/>
<updated>2025-10-20T11:58:03+00:00</updated>
<entry>
<title>[cloud] Remove AWS public image access block only if not already unblocked</title>
<updated>2025-10-20T11:58:03+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-10-20T11:56:34+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=416a2143aff7f16ea14229d3a2b173b7161c1d9a'/>
<id>urn:sha1:416a2143aff7f16ea14229d3a2b173b7161c1d9a</id>
<content type='text'>
Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[cloud] Remove AWS public image access block automatically if needed</title>
<updated>2025-10-17T13:22:21+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-10-17T13:21:06+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=ba1846a0d3f90e399d30a22b600a25d9c966b3b3'/>
<id>urn:sha1:ba1846a0d3f90e399d30a22b600a25d9c966b3b3</id>
<content type='text'>
Making images public is blocked by default in new AWS regions.  Remove
this block automatically whenever creating a public image.

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[crypto] Switch to using python-asn1crypto instead of python-asn1</title>
<updated>2025-04-11T11:40:22+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-04-11T11:36:45+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=96dfaa7e7ac40fa068172ea39b70609af2212fb1'/>
<id>urn:sha1:96dfaa7e7ac40fa068172ea39b70609af2212fb1</id>
<content type='text'>
Version 3.0.0 of python-asn1 has a serious defect that causes it to
generate invalid DER.

Fix by switching to the asn1crypto module, which also allows for
simpler code to be used.

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[crypto] Update cmsdetach to work with python-asn1 version 3.0.0</title>
<updated>2025-03-17T11:48:06+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-03-17T11:39:41+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=42a29d56812fdf1a434f9093eaefa5634c1beb2e'/>
<id>urn:sha1:42a29d56812fdf1a434f9093eaefa5634c1beb2e</id>
<content type='text'>
The python-asn1 documentation indicates that end of file may be
detected either by obtaining a True value from .eof() or by obtaining
a None value from .peek(), but does not mention any way to detect the
end of a constructed tag (rather than the end of the overall file).
We currently use .eof() to detect the end of a constructed tag, based
on the observed behaviour of the library.

The behaviour of .eof() changed between versions 2.8.0 and 3.0.0, such
that .eof() no longer returns True at the end of a constructed tag.

Switch to testing for a None value returned from .peek() to determine
when we have reached the end of a constructed tag, since this works on
both newer and older versions.

Continue to treat .eof() as a necessary but not sufficient condition
for reaching the overall end of file, to maintain compatibility with
older versions.

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[contrib] Update bochsrc.txt to work with current versions</title>
<updated>2025-03-14T12:46:02+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2025-03-14T12:46:02+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=d1133956d10779369ee1077d05a83c4aa3d70f1f'/>
<id>urn:sha1:d1133956d10779369ee1077d05a83c4aa3d70f1f</id>
<content type='text'>
Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[cloud] Add ability to delete old AMI images</title>
<updated>2024-09-09T14:02:27+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2024-09-09T14:00:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=a1830ff43c5f8ee2957eb537f24670265ebd233b'/>
<id>urn:sha1:a1830ff43c5f8ee2957eb537f24670265ebd233b</id>
<content type='text'>
Add the "--retain &lt;N&gt;" option to limit the number of retained old AMI
images (within the same family, architecture, and public visibility).

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[cloud] Add family and architecture tags to AWS snapshots and images</title>
<updated>2024-09-06T14:09:12+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2024-09-06T14:09:12+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=49f9e036fffa33671a3ad16ab5fc0644a057218c'/>
<id>urn:sha1:49f9e036fffa33671a3ad16ab5fc0644a057218c</id>
<content type='text'>
Allow for easier identification of images and snapshots created by the
aws-import script by adding tags for image family (e.g. "iPXE") and
architecture (e.g. "x86_64") to both.

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[crypto] Add cmsdetach script for detaching encrypted data from CMS messages</title>
<updated>2024-08-28T15:17:14+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2024-08-28T15:09:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=748cab7745186ec6c770fb4d47b0e8c9f213e6df'/>
<id>urn:sha1:748cab7745186ec6c770fb4d47b0e8c9f213e6df</id>
<content type='text'>
The openssl toolchain does not currently seem to support creating CMS
envelopedData or authEnvelopedData messages with detached encrypted
data.

Add a standalone tool "cmsdetach" that can be used to detach the
encrypted data from a CMS message.  For example:

  openssl cms -encrypt -binary -aes-256-gcm -recip client.crt \
              -in bootfile -outform DER -out bootfile.cms

  cmsdetach bootfile.cms --data bootfile.dat --envelope bootfile.env

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[contrib] Remove obsolete rom-o-matic code</title>
<updated>2024-08-20T09:22:18+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2024-08-20T09:11:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=ab5743efc57e84a45754d8ca9a188b7178cefebd'/>
<id>urn:sha1:ab5743efc57e84a45754d8ca9a188b7178cefebd</id>
<content type='text'>
The rom-o-matic code does not form part of the iPXE codebase, has not
been maintained for over a decade, and does not appear to still be in
use anywhere in the world.

It does, however, result in a large number of false positive security
vulnerability reports from some low quality automated code analysis
tools such as Fortify SCA.

Remove this unused and obsolete code to reduce the burden of
responding to these false positives.

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
<entry>
<title>[cloud] Add utility to read INT13CON partition in Google Compute Engine</title>
<updated>2024-07-30T15:11:28+00:00</updated>
<author>
<name>Michael Brown</name>
</author>
<published>2024-07-30T14:40:11+00:00</published>
<link rel='alternate' type='text/html' href='https://git.openslx.org/openslx-ng/ipxe.git/commit/?id=0dc8933f6769e375a645ed4e9053855191cf8170'/>
<id>urn:sha1:0dc8933f6769e375a645ed4e9053855191cf8170</id>
<content type='text'>
Following the example of aws-int13con, add a utility that can be used
to read the INT13 console log from a used iPXE boot disk in Google
Compute Engine.

There seems to be no easy way to directly read the contents of either
a disk image or a snapshot in Google Cloud.  Work around this
limitation by creating a snapshot and attaching this snapshot as a
data disk to a temporary Linux instance, which is then used to echo
the INT13 console log to the serial port.

Signed-off-by: Michael Brown &lt;mcb30@ipxe.org&gt;
</content>
</entry>
</feed>
