After a week of being sick and not doing much, I’m showing the results of a day-or-so of hacking:
That one little URL for the user to click on is the result of a rule engine being added to the LVFS. Of course, firmware updates shouldn’t ever fail, but in the real world they do, because distros don’t create
/boot/efi correctly (cough, Arch Linux) or just because some people are running old versions of
efivar, a broken git snapshot of
libfwupdate or because a vendor firmware updater doesn’t work with secure boot turned on (urgh). Of all the failures logged on the LVFS, 95% fall into about 3 or 4 different failure causes, and if we know hundreds of people are hitting an issue we already understand we can provide them with some help.
So, how does this work? If you’re a user you don’t see any of this, you just download the metadata and firmware semi-automatically and get on with your life. If you’re a blessed hardware vendor on the LVFS (i.e. you can QA the updates into the stable branch) you can also create and view the rules for firmware owned by just your vendor group:
This new functionality will be deployed to the LVFS during the next downtime window. Comments welcome.
Source From: fedoraplanet.org.
Original article title: Richard Hughes: fwupd now tells you about known issues.
This full article can be read at: Richard Hughes: fwupd now tells you about known issues.