This overrides the auto detection of ukify and always signs the kernel bevore embedding it in the uki (even if the kernel is already signed).
Rationale: When building Fedora 37 images, the Fedora provided kernel is signed with an expired key (id
2574709492).
I would like to add an additional signature with my own signing key to enable kexec and other features that require a correctly signed kernel image.
Co-authored-by: Otto Bittner <cobittner@posteo.net>
cmd += [
"--secureboot-private-key", state.config.secure_boot_key,
"--secureboot-certificate", state.config.secure_boot_certificate,
+ "--sign-kernel",
]
sign_expected_pcr = (state.config.sign_expected_pcr == ConfigFeature.enabled or