You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Overengineered for no good reason, especially since upstream Xen
recommends downstreams to use the latest stable branch anyway (instead
of the pinned release revision)
Signed-off-by: Fernando Rodrigues <[email protected]>
+optionalStringwithFlask"\n* `xsm-flask`: The [FLASK Xen Security Module](https://wiki.xenproject.org/wiki/Xen_Security_Modules_:_XSM-FLASK). The `xenpolicy-${version}` file is available on the `boot` output of this package."
434
339
+optionalStringwithSeaBIOS"\n* `seabios`: Support for the SeaBIOS boot firmware on HVM domains."
435
340
+optionalStringwithOVMF"\n* `ovmf`: Support for the OVMF UEFI boot firmware on HVM domains."
436
-
+optionalStringwithIPXE"\n* `ipxe`: Support for the iPXE boot firmware on HVM domains."
437
-
# Finally, we write a notice explaining which vulnerabilities this Xen is NOT vulnerable to.
438
-
# This will hopefully give users the peace of mind that their Xen is secure, without needing
439
-
# to search the source code for the XSA patches.
440
-
+optionalString(writeAdvisoryDescription!=[])(
441
-
"\n\nThis Xen Project Hypervisor (${version}) has been patched against the following known security vulnerabilities:\n"
0 commit comments