#!/bin/bash # prep release for upload to production container function error_check() { if [ $? -eq 1 ] then echo "Error encountered... failing..." exit 1 fi } # make ipxe directory to store ipxe disks mkdir -p build/ipxe # pull down upstream iPXE git clone --depth 1 https://github.com/ipxe/ipxe.git ipxe_build # copy iPXE config overrides into source tree cp ipxe/local/* ipxe_build/src/config/local/ # copy certs into source tree cp script/*.crt ipxe_build/src/ # build iPXE disks cd ipxe_build/src # get current iPXE hash IPXE_HASH=`git log -n 1 --pretty=format:"%H"` # generate generic iPXE disks make bin/ipxe.dsk bin/ipxe.iso bin/ipxe.lkrn bin/ipxe.usb bin/ipxe.kpxe bin/undionly.kpxe mv bin/ipxe.dsk ../../build/ipxe/generic-ipxe.dsk mv bin/ipxe.iso ../../build/ipxe/generic-ipxe.iso mv bin/ipxe.lkrn ../../build/ipxe/generic-ipxe.lkrn mv bin/ipxe.usb ../../build/ipxe/generic-ipxe.usb mv bin/ipxe.kpxe ../../build/ipxe/generic-ipxe.kpxe mv bin/undionly.kpxe ../../build/ipxe/generic-undionly.kpxe # generate netboot.xyz iPXE disks make bin/ipxe.dsk bin/ipxe.iso bin/ipxe.lkrn bin/ipxe.usb bin/ipxe.kpxe bin/undionly.kpxe \ EMBED=../../ipxe/disks/netboot.xyz TRUST=ca-ipxe-org.crt,ca-netboot-xyz.crt error_check mv bin/ipxe.dsk ../../build/ipxe/netboot.xyz.dsk mv bin/ipxe.iso ../../build/ipxe/netboot.xyz.iso mv bin/ipxe.lkrn ../../build/ipxe/netboot.xyz.lkrn mv bin/ipxe.usb ../../build/ipxe/netboot.xyz.usb mv bin/ipxe.kpxe ../../build/ipxe/netboot.xyz.kpxe mv bin/undionly.kpxe ../../build/ipxe/netboot.xyz-undionly.kpxe # generate netboot.xyz-packet iPXE disk make bin/undionly.kpxe \ EMBED=../../ipxe/disks/netboot.xyz-packet TRUST=ca-ipxe-org.crt,ca-netboot-xyz.crt error_check mv bin/undionly.kpxe ../../build/ipxe/netboot.xyz-packet.kpxe # generate netboot.xyz iPXE disk for Google Compute Engine make bin/ipxe.usb CONFIG=cloud EMBED=../../ipxe/disks/netboot.xyz-gce \ TRUST=ca-ipxe-org.crt,ca-netboot-xyz.crt error_check cp -f bin/ipxe.usb disk.raw tar Sczvf netboot.xyz-gce.tar.gz disk.raw mv netboot.xyz-gce.tar.gz ../../build/ipxe/netboot.xyz-gce.tar.gz # generate EFI iPXE disks cp config/local/general.h.efi config/local/general.h make clean make bin-x86_64-efi/ipxe.efi \ EMBED=../../ipxe/disks/netboot.xyz TRUST=ca-ipxe-org.crt,ca-netboot-xyz.crt mkdir -p efi_tmp/EFI/BOOT/ cp bin-x86_64-efi/ipxe.efi efi_tmp/EFI/BOOT/bootx64.efi genisoimage -o ipxe.eiso efi_tmp error_check mv bin-x86_64-efi/ipxe.efi ../../build/ipxe/netboot.xyz.efi mv ipxe.eiso ../../build/ipxe/netboot.xyz-efi.iso # return to root cd ../.. # generate header for sha256-checksums file cd build/ CURRENT_TIME=`date` cat > netboot.xyz-sha256-checksums.txt <> ../netboot.xyz-sha256-checksums.txt done cat ../netboot.xyz-sha256-checksums.txt mv ../netboot.xyz-sha256-checksums.txt . cd ../.. # generate signatures for netboot.xyz source files mkdir sigs for src_file in `ls src` do openssl cms -sign -binary -noattr -in src/$src_file \ -signer script/codesign.crt -inkey script/codesign.key -certfile script/ca-netboot-xyz.crt -outform DER \ -out sigs/$src_file.sig echo Generated signature for $src_file... done mv sigs src/ # delete index.html so that we don't overwrite existing content type rm src/index.html # copy iPXE src code into build directory cp -R src/* build/ # generate mkdocs mkdocs build