if args.output is None:
args.output = value
elif key == "Force":
- if args.force is None:
+ if not args.force:
args.force = parse_boolean(value)
elif key == "Bootable":
if args.bootable is None:
if args.kernel_commandline is None:
args.kernel_commandline = value
elif key == "SecureBoot":
- if args.secure_boot is None:
+ if not args.secure_boot:
args.secure_boot = parse_boolean(value)
elif key == "SecureBootKey":
if args.secure_boot_key is None:
if args.secure_boot_certificate is None:
args.secure_boot_certificate = value
elif key == "ReadOnly":
- if args.read_only is None:
+ if not args.read_only:
args.read_only = parse_boolean(value)
elif key == "Encrypt":
if args.encrypt is None:
raise ValueError("Invalid encryption setting: "+ value)
args.encrypt = value
elif key == "Verity":
- if args.verity is None:
+ if not args.verity:
args.verity = parse_boolean(value)
elif key == "Compress":
- if args.compress is None:
+ if not args.compress:
args.compress = parse_boolean(value)
elif key == "XZ":
- if args.xz is None:
+ if not args.xz:
args.xz = parse_boolean(value)
elif key is None:
return True
else:
args.packages.extend(list_value)
elif key == "WithDocs":
- if args.with_docs is None:
+ if not args.with_docs:
args.with_docs = parse_boolean(value)
elif key == "Cache":
if args.cache_path is None:
return False
elif section == "Validation":
if key == "CheckSum":
- if args.checksum is None:
+ if not args.checksum:
args.checksum = parse_boolean(value)
elif key == "Sign":
- if args.sign is None:
+ if not args.sign:
args.sign = parse_boolean(value)
elif key == "Key":
if args.key is None: