1 Make sure you have provided the following information:
3 - [ ] link to your code branch cloned from rhboot/shim-review in the form user/repo@tag
4 - [ ] completed README.md file with the necessary information
5 - [ ] shim.efi to be signed
6 - [ ] public portion of your certificate embedded in shim (the file passed to VENDOR_CERT_FILE)
7 - [ ] any extra patches to shim via your own git tree or as files
8 - [ ] any extra patches to grub via your own git tree or as files
12 ###### What organization or people are asking to have this signed:
15 ###### What product or service is this for:
18 ###### What is the origin and full version number of your shim?
21 ###### What's the justification that this really does need to be signed for the whole world to be able to boot it:
24 ###### How do you manage and protect the keys used in your SHIM?
27 ###### Do you use EV certificates as embedded certificates in the SHIM?
30 ###### What is the origin and full version number of your bootloader (GRUB or other)?
33 ###### If your SHIM launchers any other components, please provide further details on what is launched
36 ###### How do the launched components prevent execution of unauthenticated code?
39 ###### Does your SHIM load any loaders that support loading unsigned kernels (e.g. GRUB)?
42 ###### What kernel are you using? Which patches does it includes to enforce Secure Boot?
45 ###### What changes were made since your SHIM was last signed?
48 ###### What is the hash of your final SHIM binary?