get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2224862/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2224862,
    "url": "http://patchwork.ozlabs.org/api/patches/2224862/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-1-1420c48f78fa@gmail.com/",
    "project": {
        "id": 27,
        "url": "http://patchwork.ozlabs.org/api/projects/27/?format=api",
        "name": "Buildroot development",
        "link_name": "buildroot",
        "list_id": "buildroot.buildroot.org",
        "list_email": "buildroot@buildroot.org",
        "web_url": "",
        "scm_url": "",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-1-1420c48f78fa@gmail.com>",
    "list_archive_url": null,
    "date": "2026-04-19T00:20:51",
    "name": "[v2,1/2] boot/efibootguard: new boot package",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "51a73f81bd20644bfcf2330880ed493b7fe708b9",
    "submitter": {
        "id": 80843,
        "url": "http://patchwork.ozlabs.org/api/people/80843/?format=api",
        "name": "Christopher Obbard",
        "email": "obbardc@gmail.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-1-1420c48f78fa@gmail.com/mbox/",
    "series": [
        {
            "id": 500478,
            "url": "http://patchwork.ozlabs.org/api/series/500478/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=500478",
            "date": "2026-04-19T00:20:50",
            "name": "Add efibootguard bootloader package & example recipe",
            "version": 2,
            "mbox": "http://patchwork.ozlabs.org/series/500478/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2224862/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2224862/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<buildroot-bounces@buildroot.org>",
        "X-Original-To": [
            "incoming-buildroot@patchwork.ozlabs.org",
            "buildroot@buildroot.org"
        ],
        "Delivered-To": [
            "patchwork-incoming-buildroot@legolas.ozlabs.org",
            "buildroot@buildroot.org"
        ],
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=cJLhHJuJ;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::138; helo=smtp1.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"
        ],
        "Received": [
            "from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fyq6W34mvz1yHk\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Sun, 19 Apr 2026 10:21:23 +1000 (AEST)",
            "from localhost (localhost [127.0.0.1])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id C727981521;\n\tSun, 19 Apr 2026 00:21:20 +0000 (UTC)",
            "from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id 05LwOcp9IYU0; Sun, 19 Apr 2026 00:21:20 +0000 (UTC)",
            "from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id D30968153D;\n\tSun, 19 Apr 2026 00:21:19 +0000 (UTC)",
            "from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n by lists1.osuosl.org (Postfix) with ESMTP id 40E0D259\n for <buildroot@buildroot.org>; Sun, 19 Apr 2026 00:21:17 +0000 (UTC)",
            "from localhost (localhost [127.0.0.1])\n by smtp3.osuosl.org (Postfix) with ESMTP id 26C9B60EEE\n for <buildroot@buildroot.org>; Sun, 19 Apr 2026 00:21:17 +0000 (UTC)",
            "from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id D2QnhE3VloN1 for <buildroot@buildroot.org>;\n Sun, 19 Apr 2026 00:21:16 +0000 (UTC)",
            "from mail-wm1-x333.google.com (mail-wm1-x333.google.com\n [IPv6:2a00:1450:4864:20::333])\n by smtp3.osuosl.org (Postfix) with ESMTPS id D4301608C5\n for <buildroot@buildroot.org>; Sun, 19 Apr 2026 00:21:15 +0000 (UTC)",
            "by mail-wm1-x333.google.com with SMTP id\n 5b1f17b1804b1-4887ca8e529so13639995e9.0\n for <buildroot@buildroot.org>; Sat, 18 Apr 2026 17:21:15 -0700 (PDT)",
            "from localhost (host86-170-11-80.range86-170.btcentralplus.com.\n [86.170.11.80]) by smtp.gmail.com with ESMTPSA id\n 5b1f17b1804b1-488fc1070bfsm161989485e9.7.2026.04.18.17.21.12\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Sat, 18 Apr 2026 17:21:12 -0700 (PDT)"
        ],
        "X-Virus-Scanned": [
            "amavis at osuosl.org",
            "amavis at osuosl.org"
        ],
        "X-Comment": "SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ",
        "DKIM-Filter": [
            "OpenDKIM Filter v2.11.0 smtp1.osuosl.org D30968153D",
            "OpenDKIM Filter v2.11.0 smtp3.osuosl.org D4301608C5"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1776558079;\n\tbh=64aOIxSJ7+/mjnuTSpAyEscBNu5Z24hppJEW5hXEU6k=;\n\th=From:Date:References:In-Reply-To:To:Subject:List-Id:\n\t List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe:\n\t Cc:From;\n\tb=cJLhHJuJCEwatgVlJL+y2gadAE9Z34vEQnO+v+j1M5q+4EWvU0ND4ijLzzhcAnXJ+\n\t FKA59V/RSI7TcZoS7eq5TU1Sso+cKtaX6LD3nnOqU7cYhF3DJ/buqTWBFNoIUhny82\n\t oecOes763/x7uJwF6sZ1s+kb3c6g/jXJQ2c60YlTVE++X3yCicG6/lr3LoZY/vUK34\n\t NJqyOEHxT896LabGTUW95vh8NtR57KlI2M6X0dfmouE90xC9OYggYuY+LQPTeY3zfC\n\t Xxi0XRoylb4wBagblPWtbGj+hDWaIW1vRlRki11qGPUfemRSLEPEFl5XvCI2wlQOol\n\t 2Ra/4hrhEk92g==",
        "Received-SPF": "Pass (mailfrom) identity=mailfrom;\n client-ip=2a00:1450:4864:20::333; helo=mail-wm1-x333.google.com;\n envelope-from=obbardc@gmail.com; receiver=<UNKNOWN>",
        "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp3.osuosl.org D4301608C5",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1776558073; x=1777162873;\n h=cc:to:in-reply-to:references:message-id:content-transfer-encoding\n :mime-version:subject:date:from:x-gm-gg:x-gm-message-state:from:to\n :cc:subject:date:message-id:reply-to;\n bh=NBikY3UNRgajw4soLf0atIq/1MhIRTBNYWOLhIcnrK4=;\n b=U5Zur76Y2aTc7XqKVaXU7dWpXLxY66BzCOfH1NqRAW0EeLAPgTW9VbwwoQwa+1ghRj\n 6ntQ23MsfEBw1lxGfnDPlXvqgobcdLq+IuzIgLXcJsRqqvRjCMJOBNiyq53DBKCIiily\n l8g0Y7Ir3uiD1LpF6fU2kPj3fyG6ti52BXynMj8zDbIXHtNShjZfVNFOh5J9jN1A1WOi\n 1J13+mssqnsWLV0fWXyRZMtg1YyPgj7aWtKI3ZHf/dJvliIdOXtOo6PqB9UAO1biJDaW\n 7nRflvRktqPH+2HPCdjvvkZRMbX0bw2ImF38ADmUxo8eDMe362N5gr2aLB0NDgKoDSrx\n dm7Q==",
        "X-Gm-Message-State": "AOJu0YyGDgbXZ6FokwEowApR/npcghyZgnVPePo8fShXHwB+Xy5TH+em\n C5EJGKi6+K9f59Uf9u9Bz0I7iE/6UIlhrLgPalKqUV8S4qP/8l4HfLub",
        "X-Gm-Gg": "AeBDietvFtiRG/6bCfb6GduZkYOg4YtJWW2W9UmEdPMHXTFg207e0bvkwfepj51u4zw\n p+r/pNgsJK9z30uTDDXUhVcIhSk6kHeGRQ2v52qXEevdKXHuCd3czACMdg3f+JX5+4qdURLAJ0i\n rDY+5+4eJJoP15spXPOt607vj/sSyg7gW5Pv/C8j+gmeZz0PNQJ4fJ5zpTj/T1btkYV0lJexoFr\n fAZbE0jvfDjmqp/6j0fq7N1eZUwPfVpTLq1zvA5PWTG9BhP0S6Ljx+Z7h7fec625lfpiq1j//6r\n lR87RlwkRQQiu239un0Fb9s+OOMhEua9yow1jBiF5aYQ6l9t2/2C57cq+SiBK9Py+fRcvnWaETq\n yF6WNiwTJa8yvu6jKVkei0awhJ/tJODJ7BR95Y0qFu9t/DK9HNshjvleN7g9AM0v5kmGrLC+Y/o\n FVL6rGH5AUrlRpFuhFM5WXM3V4KfaFquFcmtzSTz89E6f7ET2tLG3psXIBPEPYurIYBwcv348/a\n 3xPEc1d+cTlsEM0ognwDwlZes6+zgEnncHT/Om3h5tXJE3BMSlf4bLiZz9m6Qt5P/EEQlus4g+d\n R6kLBshkwi67VyYM5rirBIvkp/IWmrqSFd3ec1IrfmwrBTjPH03VTZbeNRWTzz/YNT7ZQ7Pnmpc\n Ht/5a",
        "X-Received": "by 2002:a05:600c:c0d8:b0:485:fbd2:f72 with SMTP id\n 5b1f17b1804b1-488fb8838abmr79793145e9.1.1776558073385;\n Sat, 18 Apr 2026 17:21:13 -0700 (PDT)",
        "From": "Christopher Obbard <obbardc@gmail.com>",
        "Date": "Sun, 19 Apr 2026 01:20:51 +0100",
        "MIME-Version": "1.0",
        "Message-Id": "\n <20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-1-1420c48f78fa@gmail.com>",
        "References": "\n <20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-0-1420c48f78fa@gmail.com>",
        "In-Reply-To": "\n <20260419-wip-obbardc-boot-efibootguard-initial-pkg-v2-0-1420c48f78fa@gmail.com>",
        "To": "buildroot@buildroot.org",
        "X-Mailer": "b4 0.14.3",
        "X-Developer-Signature": "v=1; a=openpgp-sha256; l=6207; i=obbardc@gmail.com;\n h=from:subject:message-id; bh=eJXF5bXoJL0OBz2ivUUstngkHA3TLtIzHBz3FGZWK6g=;\n b=owEBbQKS/ZANAwAKAWNNxPBocEb4AcsmYgBp5B/21A0UoIHDxqHyIpvRaqw6EjHHk27EB0R15\n Cg/0U+FSTGJAjMEAAEKAB0WIQTxi9yLbCX5CqI9UXRjTcTwaHBG+AUCaeQf9gAKCRBjTcTwaHBG\n +JVLD/407o1pvCidqV6CjOIHcLHXHShRAjH4sc5O6QL+ll0nJaF84V3AFcfAicHbPzUvHcCf47H\n Yq1xxgJ8Q9a7OtpiI684WrS908fCLkjes7lHdI8Cu61GyMKTbLAmg21i6N68Q6MxzfcXTOKY6K+\n UWcze8HNB8Dbee14J9xGSFdESwzCj/K+rm1mKzdFtu7DT9oOLI89MQmTkR9E1tmEvS6eZbFXeki\n /UISkyEG3Y39GxgKAX3cO/o7cHlwKMQZS6oQOVrCJj61XzjrbYvSPtvkXM2Tiwt2oA/tYRXyrHT\n KB8fkdryxLXRQrVx2GA5JU15+B943xlrSWjHBrjJ4qw18O3Ik9RR/SGwFdYrS6ETG0MgfhDNUTy\n 8uTYFVfCcZmJBaL0LVxUGFUi3ZcOOxDes3oHuuf6Wa+pURg6PrlorUu0BEEIjvK1heeX+aqdv82\n /lGS8whedEbwHFs/qpU4pDE5WdSQqJWCt3aTxIdGm03ch8D3pSJadM9oHekcwv0CDc/DUThsJ0x\n taLcY5N3KoqfFegc6sbVbJ/H4pcKQZnJmeW+ZYI4ZK8SJkKDnUiO2eCLWeWkBhdS6+NRkLhEpLQ\n 9v53AKdOqxrRWuRplJQbbnnXwtXqeFv6UnDxAnRGEo541WHa8fVvPMrp7Y5+m8jifRNzuALe50q\n 2xckz5dRRYTdQcQ==",
        "X-Developer-Key": "i=obbardc@gmail.com; a=openpgp;\n fpr=F18BDC8B6C25F90AA23D5174634DC4F0687046F8",
        "X-Mailman-Original-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=gmail.com; s=20251104; t=1776558073; x=1777162873; darn=buildroot.org;\n h=cc:to:in-reply-to:references:message-id:content-transfer-encoding\n :mime-version:subject:date:from:from:to:cc:subject:date:message-id\n :reply-to;\n bh=NBikY3UNRgajw4soLf0atIq/1MhIRTBNYWOLhIcnrK4=;\n b=s+hrmhVRuUdcqCKZxyorHFlK7X5bWmCouHVc2G9fgXdqmDuU5xopxmCcTnEMuGRnqX\n NxrnAWObyOtIz1SCVzudIfq9wcop6uj5jfWDvYNnkevz5mxbiUk7Oh2/9rwK+7QEC9mX\n wS3O6bxllMoCcJj0XDUhcyzcpfYvA9tGBbN4aJTMBtM8GQ1ZiFPSoLYrP9oxgRnrpVfB\n 5fFuoDVNOrNKMj7NvnaoK93Tnu28zvyIKvFZ8UP6sGGjl5IqR5dNGykLBuFyMqD9TZo4\n zAoVVT45MCEoABYmYlfF8NmDim4S0lgPxbe2ryLNJL4s/76oEaQFEosAULRoVkRT7Xon\n QOoQ==",
        "X-Mailman-Original-Authentication-Results": [
            "smtp3.osuosl.org;\n dmarc=pass (p=none dis=none)\n header.from=gmail.com",
            "smtp3.osuosl.org;\n dkim=pass (2048-bit key,\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20251104 header.b=s+hrmhVR"
        ],
        "Subject": "[Buildroot] [PATCH v2 1/2] boot/efibootguard: new boot package",
        "X-BeenThere": "buildroot@buildroot.org",
        "X-Mailman-Version": "2.1.30",
        "Precedence": "list",
        "List-Id": "Discussion and development of buildroot <buildroot.buildroot.org>",
        "List-Unsubscribe": "<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.buildroot.org/pipermail/buildroot/>",
        "List-Post": "<mailto:buildroot@buildroot.org>",
        "List-Help": "<mailto:buildroot-request@buildroot.org?subject=help>",
        "List-Subscribe": "<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>",
        "Cc": "James Hilliard <james.hilliard1@gmail.com>,\n Christopher Obbard <obbardc@gmail.com>, efibootguard-dev@googlegroups.com,\n Thomas Petazzoni <thomas.petazzoni@bootlin.com>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Errors-To": "buildroot-bounces@buildroot.org",
        "Sender": "\"buildroot\" <buildroot-bounces@buildroot.org>"
    },
    "content": "This patch adds a new boot package to Buildroot for building the\nefibootguard bootloader from the https://github.com/siemens/efibootguard\nrepository.\n\nefibootguard can be chainloaded as an EFI application or used as a\nstandalone bootloader and can be useful when building A/B systems.\n\nAdd a recipe to build the EFI bootloader application, user-space\ntooling & host tooling (both of which are used to manage efibootguard\nconfiguration).\n\nefibootguard supports multiple architectures, but for now only build\nthe EFI bootloader for x86_64.\n\nSigned-off-by: Christopher Obbard <obbardc@gmail.com>\n---\n DEVELOPERS                          |  3 ++\n boot/Config.in                      |  2 ++\n boot/efibootguard/Config.in         | 37 +++++++++++++++++++++++\n boot/efibootguard/Config.in.host    |  8 +++++\n boot/efibootguard/efibootguard.hash |  3 ++\n boot/efibootguard/efibootguard.mk   | 60 +++++++++++++++++++++++++++++++++++++\n 6 files changed, 113 insertions(+)",
    "diff": "diff --git a/DEVELOPERS b/DEVELOPERS\nindex 9e983ae113..f64a5d6370 100644\n--- a/DEVELOPERS\n+++ b/DEVELOPERS\n@@ -697,6 +697,9 @@ F:\tpackage/perl-sys-mmap/\n F:\tpackage/perl-time-parsedate/\n F:\tpackage/perl-x10/\n \n+N:\tChristopher Obbard <obbardc@gmail.com>\n+F:\tboot/efibootguard/\n+\n N:\tClayton Shotwell <clayton.shotwell@collins.com>\n F:\tpackage/audit/\n F:\tpackage/checkpolicy/\ndiff --git a/boot/Config.in b/boot/Config.in\nindex d73d221431..8e6dc7a5cc 100644\n--- a/boot/Config.in\n+++ b/boot/Config.in\n@@ -15,6 +15,8 @@ source \"boot/barebox/Config.in\"\n source \"boot/binaries-marvell/Config.in\"\n source \"boot/boot-wrapper-aarch64/Config.in\"\n source \"boot/edk2/Config.in\"\n+source \"boot/efibootguard/Config.in\"\n+source \"boot/efibootguard/Config.in.host\"\n source \"boot/grub2/Config.in\"\n source \"boot/mv-ddr-marvell/Config.in\"\n source \"boot/mxs-bootlets/Config.in\"\ndiff --git a/boot/efibootguard/Config.in b/boot/efibootguard/Config.in\nnew file mode 100644\nindex 0000000000..47fd478e8b\n--- /dev/null\n+++ b/boot/efibootguard/Config.in\n@@ -0,0 +1,37 @@\n+config BR2_TARGET_EFIBOOTGUARD_ARCH_SUPPORTS\n+\tbool\n+\tdefault y if BR2_x86_64\n+\tdepends on BR2_USE_MMU\n+\n+config BR2_TARGET_EFIBOOTGUARD\n+\tbool \"efibootguard\"\n+\tdepends on BR2_TARGET_EFIBOOTGUARD_ARCH_SUPPORTS\n+\tdepends on BR2_USE_WCHAR\n+\tselect BR2_PACKAGE_GNU_EFI\n+\tselect BR2_PACKAGE_PCIUTILS if BR2_TARGET_EFIBOOTGUARD_INSTALL_TOOLS\n+\thelp\n+\t  EFI Boot Guard is a UEFI bootloader intended for robust\n+\t  A/B style updates. It arms a hardware watchdog before\n+\t  handing over control to the OS and supports a fail-safe\n+\t  boot mechanism to roll back if a boot attempt fails.\n+\n+\t  https://github.com/siemens/efibootguard\n+\n+if BR2_TARGET_EFIBOOTGUARD\n+\n+config BR2_TARGET_EFIBOOTGUARD_X86_64\n+\tbool \"x86-64\"\n+\tdepends on BR2_x86_64\n+\thelp\n+\t  Select this option if the platform you're targeting has a\n+\t  64 bits EFI BIOS.\n+\n+config BR2_TARGET_EFIBOOTGUARD_INSTALL_TOOLS\n+\tbool \"install tools\"\n+\thelp\n+\t  Install the efibootguard user-space tools (e.g.\n+\t  bg_printenv and bg_setenv) on the target. These tools\n+\t  allow reading and updating efibootguard's configuration\n+\t  in user-space.\n+\n+endif # BR2_TARGET_EFIBOOTGUARD\ndiff --git a/boot/efibootguard/Config.in.host b/boot/efibootguard/Config.in.host\nnew file mode 100644\nindex 0000000000..845c14c079\n--- /dev/null\n+++ b/boot/efibootguard/Config.in.host\n@@ -0,0 +1,8 @@\n+config BR2_TARGET_HOST_EFIBOOTGUARD\n+\tbool \"host efibootguard\"\n+\thelp\n+\t  Build efibootguard companion tools for the host. These\n+\t  can be used during image creation to inspect and\n+\t  modify the efibootguard configuration data.\n+\n+\t  https://github.com/siemens/efibootguard\ndiff --git a/boot/efibootguard/efibootguard.hash b/boot/efibootguard/efibootguard.hash\nnew file mode 100644\nindex 0000000000..6f5a5cf25c\n--- /dev/null\n+++ b/boot/efibootguard/efibootguard.hash\n@@ -0,0 +1,3 @@\n+# Locally calculated\n+sha256  6c68c541311dcc8c2be0042f7887acc2a24d2ac68a88d426380fdbda9f476ae8  efibootguard-0.22.tar.gz\n+sha256  8177f97513213526df2cf6184d8ff986c675afb514d4e68a404010521b880643  COPYING\ndiff --git a/boot/efibootguard/efibootguard.mk b/boot/efibootguard/efibootguard.mk\nnew file mode 100644\nindex 0000000000..c40cef13ac\n--- /dev/null\n+++ b/boot/efibootguard/efibootguard.mk\n@@ -0,0 +1,60 @@\n+################################################################################\n+#\n+# efibootguard\n+#\n+################################################################################\n+\n+EFIBOOTGUARD_VERSION = 0.22\n+EFIBOOTGUARD_SITE = $(call github,siemens,efibootguard,refs/tags/v$(EFIBOOTGUARD_VERSION))\n+EFIBOOTGUARD_LICENSE = GPL-2.0-only\n+EFIBOOTGUARD_LICENSE_FILES = COPYING\n+\n+EFIBOOTGUARD_DEPENDENCIES = \\\n+\tgnu-efi \\\n+\thost-autoconf-archive\n+\n+ifeq ($(BR2_TARGET_EFIBOOTGUARD_INSTALL_TOOLS),y)\n+EFIBOOTGUARD_DEPENDENCIES += pciutils\n+EFIBOOTGUARD_INSTALL_TARGET = YES\n+else\n+EFIBOOTGUARD_INSTALL_TARGET = NO\n+endif\n+\n+EFIBOOTGUARD_INSTALL_IMAGES = YES\n+\n+EFIBOOTGUARD_AUTORECONF = YES\n+\n+EFIBOOTGUARD_AUTORECONF_OPTS = \\\n+\t-I $(HOST_DIR)/share/autoconf-archive\n+\n+EFIBOOTGUARD_CONF_OPTS = \\\n+\t--with-gnuefi-sys-dir=$(STAGING_DIR) \\\n+\t--with-gnuefi-include-dir=$(STAGING_DIR)/usr/include/efi \\\n+\t--with-gnuefi-lib-dir=$(STAGING_DIR)/usr/lib \\\n+\t--disable-completion \\\n+\t--disable-tests\n+\n+# TODO: Perhaps take inspiration from Debian patch https://salsa.debian.org/debian/efibootguard/-/blob/master/debian/patches/always-override-stack-protector-variables-in-EFI-bui.patch?ref_type=heads\n+EFIBOOTGUARD_CONF_ENV = \\\n+\tLDFLAGS=\"$(LDFLAGS) -no-pie\"\n+\n+define EFIBOOTGUARD_INSTALL_IMAGES_CMDS\n+\t$(INSTALL) -d $(BINARIES_DIR)/efibootguard\n+\t$(INSTALL) -m 0644 $(@D)/efibootguardx64.efi $(BINARIES_DIR)/efibootguard/\n+endef\n+\n+HOST_EFIBOOTGUARD_DEPENDENCIES = \\\n+\thost-autoconf-archive\n+\n+HOST_EFIBOOTGUARD_AUTORECONF = YES\n+\n+HOST_EFIBOOTGUARD_AUTORECONF_OPTS = \\\n+\t-I $(HOST_DIR)/share/autoconf-archive\n+\n+HOST_EFIBOOTGUARD_CONF_OPTS = \\\n+\t--disable-bootloader \\\n+\t--disable-completion \\\n+\t--disable-tests\n+\n+$(eval $(autotools-package))\n+$(eval $(host-autotools-package))\n",
    "prefixes": [
        "v2",
        "1/2"
    ]
}