)]}'
{
  "commit": "64dd01225f64d6745a008d91fba3fcac2f1920bd",
  "tree": "6d1bb9a194c763284a8d2655853b212ade295cd7",
  "parents": [
    "499b1814a76303b332c49dd5efb2c84e30b973ba"
  ],
  "author": {
    "name": "Jakub Czapiga",
    "email": "jacz@semihalf.com",
    "time": "Mon Jul 04 12:34:28 2022 +0200"
  },
  "committer": {
    "name": "Chromeos LUCI",
    "email": "chromeos-scoped@luci-project-accounts.iam.gserviceaccount.com",
    "time": "Fri Jul 22 07:46:32 2022 +0000"
  },
  "message": "futility: Add --keyset option to sign command for BIOS and kernel\n\nThis patch adds --keyset option for sign command for BIOS_IMAGE,\nRAW_FIRMWARE, RAW_KERNEL and KERN_PREAMBLE file types. The default value\nof this option is \u0027/usr/share/vboot/devkeys\u0027. It allows futility to load\npublic and private keys, and keyblocks from under this path, when they\nwere not provided manually using their respective options.\n\nFiles loaded by default for BIOS_IMAGE and RAW_FIRMWARE:\n- ${keysetdir}/firmware_data_key.vbprivk\n- ${keysetdir}/firmware.keyblock\n- ${keysetdir}/kernel_subkey.vbpubk\n\nFiles loaded by default for RAW_KERNEL:\n- ${keysetdir}/kernel_data_key.vbprivk\n- ${keysetdir}/kernel.keyblock\n\nFile loaded by default for KERN_PREAMBLE:\n- ${keysetdir}/kernel_data_key.vbprivk\n\nBUG\u003dnone\nBRANCH\u003dnone\nTEST\u003dmake runfutiltests\n\nSigned-off-by: Jakub Czapiga \u003cjacz@semihalf.com\u003e\nChange-Id: Ic4026d501d88e0de7d2c6f52c7494c639d08bd15\nReviewed-on: https://chromium-review.googlesource.com/c/chromiumos/platform/vboot_reference/+/3740601\nAuto-Submit: Jakub Czapiga \u003cczapiga@google.com\u003e\nReviewed-by: Julius Werner \u003cjwerner@chromium.org\u003e\nCommit-Queue: Julius Werner \u003cjwerner@chromium.org\u003e\nTested-by: Jakub Czapiga \u003cczapiga@google.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "b35712a39e09d1f54ef4c9a18ce017d19925735f",
      "old_mode": 33188,
      "old_path": "futility/cmd_sign.c",
      "new_id": "2f9a01797afab5c502cc0a266f8c323835b5cd95",
      "new_mode": 33188,
      "new_path": "futility/cmd_sign.c"
    },
    {
      "type": "modify",
      "old_id": "da839586db22b89fc670489abb7f037466e9a43e",
      "old_mode": 33188,
      "old_path": "futility/futility_options.h",
      "new_id": "32f240a52171b0432eec2501c51c9aca01d06408",
      "new_mode": 33188,
      "new_path": "futility/futility_options.h"
    },
    {
      "type": "modify",
      "old_id": "c373803fcdd4d3a933a32b37dc729a848e93b5b6",
      "old_mode": 33261,
      "old_path": "tests/futility/test_sign_firmware.sh",
      "new_id": "fe8462c822f90ddc3b1eafce98239a47f20f1ceb",
      "new_mode": 33261,
      "new_path": "tests/futility/test_sign_firmware.sh"
    },
    {
      "type": "modify",
      "old_id": "6ab2083b9234235c622fd11f708e2fdda3cc5f65",
      "old_mode": 33261,
      "old_path": "tests/futility/test_sign_fw_main.sh",
      "new_id": "e22f9072f7d5d822fbc61fe6160ec1e2c291de74",
      "new_mode": 33261,
      "new_path": "tests/futility/test_sign_fw_main.sh"
    },
    {
      "type": "modify",
      "old_id": "61b1c5aacead6bfa79f4f8dcb2c88750af5bbdf9",
      "old_mode": 33261,
      "old_path": "tests/futility/test_sign_kernel.sh",
      "new_id": "bba1164ffcad810d5d7c06dbec28063c1a52eb98",
      "new_mode": 33261,
      "new_path": "tests/futility/test_sign_kernel.sh"
    }
  ]
}
