Commit Graph

2860 Commits

Author SHA1 Message Date
Richard Hughes
bd0a50b24e Merge pull request #18 from jku/build-fix
build: gusb is required even without colorhug
2015-06-30 18:17:06 +01:00
Jussi Kukkonen
ebfbad71e3 build: gusb is required even without colorhug
Fix build failure when building with --disable-colorhug.
2015-06-30 19:45:31 +03:00
Richard Hughes
174211b979 Provide a way to dump the option ROM using the command line
This allows someone to do:

$ find /sys/devices -name rom -exec sudo fwupdmgr dump-rom {} \;

...and get a nice summary of the option roms installed.
2015-06-30 15:40:46 +01:00
Richard Hughes
ac32a2a232 trivial: Fix a crash if the rom filename is invalid 2015-06-30 15:36:36 +01:00
Richard Hughes
ffd5fdf7f2 Get the version number out from Intel VBIOS too 2015-06-30 15:12:28 +01:00
Richard Hughes
4b41e737b1 Make the ROM parsing more robust and add self tests
This code can now parse 99.6% of all the user-submitted firmwares from the
http://www.techpowerup.com/vgabios/ database.
2015-06-30 14:00:31 +01:00
Richard Hughes
0453eb31e4 Merge pull request #17 from yaneti/patch-1
Revert "man/Makefile.am: Add --sgml to docbook2man invocation"
2015-06-29 12:54:01 +01:00
Richard Hughes
a043c2e376 Add a 'verify' command that verifies the cryptographic hash of device firmware
Goes some way towards fixing https://github.com/hughsie/fwupd/issues/15
2015-06-29 12:53:01 +01:00
Richard Hughes
a1e5d86d20 Extract the version string from the ROM in PCI devices 2015-06-29 12:53:01 +01:00
Richard Hughes
ebb58a3495 Add a Udev firmware provider
This allows us to support showing firmware updates for VIA USB hubs
2015-06-29 12:53:01 +01:00
Yanko Kaneti
bc5ef52550 Revert "man/Makefile.am: Add --sgml to docbook2man invocation"
This reverts commit b4143665fe.

docbook-utils' docbook2man doesn't have a --sgml flag
and is arguably a more modern utility compared to docbook2man
from docbook2X
2015-06-29 14:48:20 +03:00
Richard Hughes
a5f06a895d Merge pull request #16 from yaneti/patch-1
Fix fwupd-offline-update.service
2015-06-29 11:50:40 +01:00
Yanko Kaneti
afa912bf67 Fix fwupd-offline-update.service
data/fwupd-offiline-update.service is not in AC_CONFIG_FILES so make sure to substitute bindir
2015-06-29 13:47:49 +03:00
Richard Hughes
ffd2c8b328 trivial: Update the README
We now have LVFS as an option :)
2015-06-25 16:40:39 +01:00
Richard Hughes
ae0efdc5a7 Provide a way for clients to add new firmware metadata to the system cache
This is only possible if the metadata has been signed by a key that we trust.
2015-06-25 09:59:53 +01:00
Richard Hughes
595f59c8e5 Merge pull request #12 from vathpela/master
Make statements about storing private keys stronger.
2015-06-04 15:41:12 +01:00
Peter Jones
dfc21a3005 Make statements about storing private keys stronger.
In particular, say that keys should always be on HSMs.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-06-04 10:11:26 -04:00
Richard Hughes
6d7983bdfa trivial: Do not used munged release tags 2015-06-03 17:23:57 +01:00
Richard Hughes
fda0d2afb8 Merge pull request #11 from jjardon/jjardon/man-fix
man/Makefile.am: Add --sgml to docbook2man invocation
2015-06-02 15:44:11 +01:00
Javier Jardón
b4143665fe man/Makefile.am: Add --sgml to docbook2man invocation
This fixes this error:
fwupdmgr.sgml:1: parser error : StartTag: invalid element name
<!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN" [
 ^
fwupdmgr.sgml:1: parser error : Extra content at the end of the document
<!doctype refentry PUBLIC "-//OASIS//DTD DocBook V4.1//EN" [
 ^
unable to parse fwupdmgr.sgml

no element found at line 1, column 0, byte 0 at /usr/lib/perl5/vendor_perl/XML/Parser.pm line 187.
Makefile:612: recipe for target 'fwupdmgr.1' failed
2015-06-02 15:26:40 +01:00
Richard Hughes
c678dfc789 trivial: post release version bump 2015-05-28 09:47:59 +01:00
Richard Hughes
9519149a87 Release fwupd 0.1.3 2015-05-28 09:47:02 +01:00
Richard Hughes
f0d6c86df2 trivial: Print the command message even for internal error 2015-05-21 13:42:10 +01:00
Richard Hughes
d7dba98e68 Move boolean properties on the device to a set of flags
This is much less boilerplate and allows us to expand in the future.
2015-05-05 16:02:20 +01:00
Richard Hughes
c89c1b0e9b Support OpenHardware devices using the fwupd vendor extensions
We won't be able to update these devices ourself, but we can detect if there
are updates available.
2015-05-05 15:22:00 +01:00
Richard Hughes
7504191ee9 Merge pull request #9 from vanillajonathan/patch-3
More markup
2015-05-05 09:38:20 +01:00
Jonathan
ce2868c64d More markup 2015-05-05 00:38:46 +02:00
Richard Hughes
8da7323bbc Merge pull request #8 from vanillajonathan/patch-3
Added syntax highlighting
2015-05-04 16:34:20 +01:00
Jonathan
13b06c2537 Added syntax highlighting 2015-05-04 15:39:39 +02:00
Richard Hughes
3b0be1b8bb Get the firmware version from the device descriptors
Not claiming the interface means we can avoid blocking other applications just
to get the current firmware version.

See https://blogs.gnome.org/hughsie/2015/04/29/updating-openhardware-firmware-2/
for more details about what is required from firmware.
2015-04-29 16:37:49 +01:00
Richard Hughes
274818a11e trivial: Actually install the systemd service files 2015-04-27 11:10:03 +01:00
Richard Hughes
d8a02bfeeb Run the offline actions using systemd when required 2015-04-25 17:14:20 +01:00
Richard Hughes
046db72555 Add an UNKNOWN status so we can return meaningful enum values 2015-04-24 12:33:16 +01:00
Richard Hughes
fd4688408d Coldplug the devices before acquiring the well known name
This prevents getting no added devices when 'fwupdmgr get-devices' autostarts
the fwupd process.
2015-04-22 16:44:10 +01:00
Richard Hughes
7cdbb17777 trivial: Use fwupdate-devel in the example spec file 2015-04-22 16:43:06 +01:00
Richard Hughes
8a3fd8d3bd trivial: post release version bump 2015-04-22 15:22:03 +01:00
Richard Hughes
2f2bee85bc Release fwupd 0.1.2 2015-04-22 15:21:02 +01:00
Richard Hughes
cff0b5db9c trivial: We actually want vendors to generate metadata 2015-04-22 14:43:23 +01:00
Richard Hughes
adb7a5e29b Extract the .cat file alongside the firmware 2015-04-16 12:02:37 +01:00
Richard Hughes
a0b4644aef Merge pull request #7 from derekstavis/patch-1
Small grammar fix
2015-04-15 07:59:13 +01:00
Derek Willian Stavis
5f92a87b38 Small grammar fix
... to __be__ recognized ...
2015-04-14 17:56:50 -03:00
Richard Hughes
070574fdf1 Add some guidelines for vendors to README 2015-04-14 18:33:12 +01:00
Richard Hughes
c3441c80c5 trivial: Fix typo in configure
Resolves: https://github.com/hughsie/fwupd/issues/6
2015-04-14 17:33:32 +01:00
Richard Hughes
63bbbf544f Only allow signed firmware to be upgraded without a password
This does not affect UEFI capsule updates as the signing is checked by the
machine itself. We don't know anything about the trust level at all because
NIST SP800-147 pretty much says we're not allowed to.

For BIOS or ColorHug updates however we really do need to request authentication
before downgrading or installing non-signed code.

At the moment only the Hughski Limited key is trusted for firmware, although I
hope in the future we can also include Red Hat, Microsoft, Intel, AMD and other
hardware vendors in that list too.

Fixes: https://github.com/hughsie/fwupd/issues/5
2015-04-14 16:19:39 +01:00
Richard Hughes
d8fa049693 Show the firmware trust status when doing GetDetails() 2015-04-14 15:57:08 +01:00
Richard Hughes
8a08f9d8f3 Verify firmware if a detached signature is present 2015-04-14 15:41:44 +01:00
Richard Hughes
683b0e0def Decompress any firmware signatures in the .cab file 2015-04-14 15:08:24 +01:00
Richard Hughes
36a889034c Add helper code to validate public key signatures
We'll use this in the future for checking device firmware.
2015-04-14 13:53:19 +01:00
Richard Hughes
8ccb1af4fe trivial: Use the ALS firmware with signed payload 2015-04-14 13:44:35 +01:00
Richard Hughes
dc23de64f5 trivial: Update translations 2015-04-12 19:46:53 +01:00