After a week of being sick and not doing much, I’m showing the results of a day-or-so of hacking:
So, most of that being familiar to anyone that’s followed my previous blog posts. But wait, what’s that about a known issue?
That one little URL for the user to click on is the result of a rule engine being added to the LVFS. Of course, firmware updates shouldn’t ever fail, but in the real world they do, because distros don’t create /boot/efi
correctly (cough, Arch Linux) or just because some people are running old versions of efivar
, a broken git snapshot of libfwupdate
or because a vendor firmware updater doesn’t work with secure boot turned on (urgh). Of all the failures logged on the LVFS, 95% fall into about 3 or 4 different failure causes, and if we know hundreds of people are hitting an issue we already understand we can provide them with some help.
So, how does this work? If you’re a user you don’t see any of this, you just download the metadata and firmware semi-automatically and get on with your life. If you’re a blessed hardware vendor on the LVFS (i.e. you can QA the updates into the stable branch) you can also create and view the rules for firmware owned by just your vendor group:
This new functionality will be deployed to the LVFS during the next downtime window. Comments welcome.