I think, you misunderstand the implications. This is about how GRUB gets access to the kernel image. For that it needs some filesystem support to access /boot. Since Secure Boot has a hard requirement for an additional vFAT partition anyway, by being part of UEFI, I don’t see how requiring a somewhat traditional separate /boot would add any meaningful inconvenience.
Heck, I’ll go as far as saying that even ext4 is too complex for the purposes of /boot; ext2 will do just fine. Journaling (ext3+) is rather pointless when it comes to /boot. And I don’t see any other requirements calling for ext4.
And, while I’m at it, why not use said vFAT partition and drop all the other filesystems? We cannot get rid of the EFI partition, so let’s embrace it and get rid of code complexity in the process? I mean, it doesn’t get any simpler than vFAT, I guess, which is probably the reason for it being required for UEFI boot; EFI vendors are cheap skates that way. The only thing that probably needs some attention at installation time is the size of the EFI partition. Or just use vFAT for /boot as well. I know that dpkg refuses to install to non-native filesystems, that don’t support all the bells and whistles, but I don’t see that as too hard to change or work around; e.g. just have the install action target some tmpfs, to placate dpkg and then some postinst action moves the relevant files to the vFAT partition.
Also, initrd images should be validated unconditionally, which is still not the case, IIUC. I find that rather puzzling as it leaves a glaring whole in the chain of trust, especially with full disk encryption, since a malicious initrd could just grab the passphrase and run with it. Yes, there is some protection against such tampering, but it requires hardware support for detection, e.g. (some) Thinkpads have bottom cover removal triggers, which can at least make such a change not go unnoticed. But what about other devices that lack that kind of integration?
That’s somewhat oxymoronic. More choices make things harder, actually. It used to be that pretty much any more advanced setup required a separate /boot. Then GRUB2 came along, got smarter and people got used to that, nothing more. It could be dead simple to install and run Linux, if the canononical way - see what I did there?
- of installing just became: /boot on dedicated partition, period; no options, only ext2 or maybe even vFAT (see above). Or just reuse the already present, and mandatory, EFI partition, possibly resizing it in the installer. That’s much simpler, as in less code and also less user-facing complexity of having to make the right choice. I think the so-called refugees will be thankful for that alone; not having to read this, that and the other How-To. With Secure Boot, which this topic is about, there is no way around partitioning, so what’s one more, when it’s well-defined, or one “merged” vFAT EFI/boot partition?