Testing secureboot with CKI kernels
The Hardware Enablement team wants to check secure boot in MR; the kernel must be signed to achieve that.
The unofficial certificate that signs the kernel can be introduced in the SUTs to test secure boot, so signing the kernel with the official certificate certificate is mandatory.
On the other hand, there is no label for secure boot in any owners.yaml
, so we can't identify specified secure boot merge requests.