"--secureboot-certificate", workdir(context.config.secure_boot_certificate),
] # fmt: skip
opt += [
- "--ro-bind", context.config.secure_boot_certificate, workdir(context.config.secure_boot_certificate), # noqa
+ "--ro-bind", context.config.secure_boot_certificate, workdir(context.config.secure_boot_certificate), # noqa: E501
] # fmt: skip
if context.config.secure_boot_key_source.type == KeySourceType.engine:
cmd += ["--signing-engine", context.config.secure_boot_key_source.source]
cmd += [
"--signtool", "pesign",
"--secureboot-certificate-dir", workdir(context.workspace / "pesign"),
- "--secureboot-certificate-name", certificate_common_name(context, context.config.secure_boot_certificate), # noqa
+ "--secureboot-certificate-name", certificate_common_name(context, context.config.secure_boot_certificate), # noqa: E501
] # fmt: skip
opt += ["--ro-bind", context.workspace / "pesign", workdir(context.workspace / "pesign")]
"--pcr-public-key", workdir(context.config.sign_expected_pcr_certificate),
] # fmt: skip
options += [
- "--ro-bind", context.config.sign_expected_pcr_certificate, workdir(context.config.sign_expected_pcr_certificate), # noqa
+ "--ro-bind", context.config.sign_expected_pcr_certificate, workdir(context.config.sign_expected_pcr_certificate), # noqa: E501
"--bind-try", "/run/pcscd", "/run/pcscd",
] # fmt: skip
if context.config.sign_expected_pcr_key.exists():
arguments += ["--pcr-private-key", workdir(context.config.sign_expected_pcr_key)]
options += [
- "--ro-bind", context.config.sign_expected_pcr_key, workdir(context.config.sign_expected_pcr_key), # noqa
+ "--ro-bind", context.config.sign_expected_pcr_key, workdir(context.config.sign_expected_pcr_key), # noqa: E501
] # fmt: skip
else:
arguments += ["--pcr-private-key", context.config.sign_expected_pcr_key]
linux /{kimg.relative_to(context.root / "boot")} {" ".join(cmdline)}
initrd {" ".join(os.fspath(Path("/") / i.relative_to(context.root / "boot")) for i in initrds)}
}}
- """ # noqa
+ """ # noqa: E501
)
)
"--incremental", str(config.incremental),
*([f"--package={package}" for package in config.tools_tree_packages]),
"--output", f"{config.tools_tree_distribution}-tools",
- *(["--source-date-epoch", str(config.source_date_epoch)] if config.source_date_epoch is not None else []), # noqa
+ *(["--source-date-epoch", str(config.source_date_epoch)] if config.source_date_epoch is not None else []), # noqa: E501
*([f"--environment={k}='{v}'" for k, v in config.environment.items()]),
*([f"--extra-search-path={p}" for p in config.extra_search_paths]),
*(["--proxy-url", config.proxy_url] if config.proxy_url else []),
"--dir", "/work/out",
"--ro-bind", script, "/work/clean",
"--ro-bind", json, "/work/config.json",
- *(["--bind", str(o), "/work/out"] if (o := config.output_dir_or_cwd()).exists() else []), # noqa
+ *(["--bind", str(o), "/work/out"] if (o := config.output_dir_or_cwd()).exists() else []), # noqa: E501
*sources,
],
),
binary="openssl",
options=[
"--ro-bind", context.config.secure_boot_key, workdir(context.config.secure_boot_key),
- "--ro-bind", context.config.secure_boot_certificate, workdir(context.config.secure_boot_certificate), # noqa
+ "--ro-bind", context.config.secure_boot_certificate, workdir(context.config.secure_boot_certificate), # noqa: E501
],
),
) # fmt: skip
sandbox=context.sandbox(
binary="pk12util",
options=[
- "--ro-bind", context.workspace / "secure-boot.p12", workdir(context.workspace / "secure-boot.p12"), # noqa
+ "--ro-bind", context.workspace / "secure-boot.p12", workdir(context.workspace / "secure-boot.p12"), # noqa: E501
"--ro-bind", context.workspace / "pesign", workdir(context.workspace / "pesign"),
],
),
"--output", workdir(output),
] # fmt: skip
options: list[PathString] = [
- "--ro-bind", context.config.secure_boot_certificate, workdir(context.config.secure_boot_certificate), # noqa
+ "--ro-bind", context.config.secure_boot_certificate, workdir(context.config.secure_boot_certificate), # noqa: E501
"--ro-bind", input, workdir(input),
"--bind", output.parent, workdir(output.parent),
] # fmt: skip
binary="sbsiglist",
options=[
"--bind", context.workspace, workdir(context.workspace),
- "--ro-bind", context.workspace / "mkosi.der", workdir(context.workspace / "mkosi.der"), # noqa
+ "--ro-bind", context.workspace / "mkosi.der", workdir(context.workspace / "mkosi.der"), # noqa: E501
]
),
) # fmt: skip
"--ro-bind",
context.config.secure_boot_certificate,
workdir(context.config.secure_boot_certificate),
- "--ro-bind", context.workspace / "mkosi.esl", workdir(context.workspace / "mkosi.esl"), # noqa
+ "--ro-bind", context.workspace / "mkosi.esl", workdir(context.workspace / "mkosi.esl"), # noqa: E501
"--bind", keys, workdir(keys),
] # fmt: skip
if context.config.secure_boot_key_source.type == KeySourceType.engine:
if context.config.secure_boot_key.exists():
cmd += ["--key", workdir(context.config.secure_boot_key)]
options += [
- "--ro-bind", context.config.secure_boot_key, workdir(context.config.secure_boot_key), # noqa
+ "--ro-bind", context.config.secure_boot_key, workdir(context.config.secure_boot_key), # noqa: E501
] # fmt: skip
else:
cmd += ["--key", context.config.secure_boot_key]
"dpkg-query",
"--admindir=/buildroot/var/lib/dpkg",
"--show",
- "--showformat", r"${Package}\t${source:Package}\t${Version}\t${Architecture}\t${Installed-Size}\t${db-fsys:Last-Modified}\n", # noqa
+ "--showformat", r"${Package}\t${source:Package}\t${Version}\t${Architecture}\t${Installed-Size}\t${db-fsys:Last-Modified}\n", # noqa: E501
],
stdout=subprocess.PIPE,
sandbox=self.context.sandbox(
if config.output_format in (OutputFormat.disk, OutputFormat.esp):
direct = fname.stat().st_size % resource.getpagesize() == 0
ephemeral = config.ephemeral
- cache = f"cache.writeback=on,cache.direct={yes_no(direct)},cache.no-flush={yes_no(ephemeral)},aio=io_uring" # noqa
+ cache = f"cache.writeback=on,cache.direct={yes_no(direct)},cache.no-flush={yes_no(ephemeral)},aio=io_uring" # noqa: E501
cmdline += [
"-drive", f"if=none,id=mkosi,file={fname},format=raw,discard=on,{cache}",
"-device", f"scsi-{'cd' if config.qemu_cdrom else 'hd'},drive=mkosi,bootindex=1",