New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Need to integrate firmware capsule updates #77
Comments
|
fwupd is definitely something we are interested in getting integrated into cbm. We need to do uefi var management in cbm anyway so next boot like things should definitely be in scope. Do you see fwupd providing a library interface so that cbm can use it and then fwupd having a cli interface as well? I imagine most of the discussion will be around how fwupd will operate. Ideally cbm would consume it in fairly straightforward manor as there shouldn't be too many fancy things other than detect if new firmware is available (and cbm then switching the next boot). Does that seem about right? |
|
@ikeydoherty, do you mean setting EFI Just to call your attention to #75 which contains an API for EFI var manipulation ( |
|
@busykai yeah this stuff depends on your efi var stuff I reckon :) |
|
Hi everyone, has there been any progress on this issue since October? |
|
It would be really nice seeing this included |
|
I just read that Lenovo has joined the LVFS (https://phoronix.com/scan.php?page=news_item&px=Lenovo-LVFS-Support). Now I can easily update the firmware of my 2018 ThinkPad. But as I use Solus, I need to wait for this to be resolved. So it would be great if you guys could integrate this :) |
|
Any news on getting this integrated? It would be such a great feature for a lot of people and it would be a safe and smart integration of it compared to many other ones in the Linux universe. Can barely wait until we get this integrated |
|
Any updates on getting this integrated? @bryteise how much work would need to be done on this issue to implement LVFS? Thank you! |
|
@alecbcs At this point because fwupdate is available I'm mostly in favor of closing this issue as I don't think integrating fwupd with CBM is the way to go. |
|
@bryteise From what I understand fwupdate queues the updates on the |
|
@alecbcs Yes, fwupd is the user space integration that manages the overall update process and contains fwupdate. fwupd doesn't really do well with mounting /boot itself but the systemd service for fwupd could be modified to have it mount the /boot partition as part of it running. |
|
@bryteise Okay interesting! If all that needed, is to mount the /boot partition before running fwupd, maybe we could consider having the package manager mount the /boot partition before calling |
|
fwupd really wants to run as an active service that is constantly looking for updates but it isn't super friendly still in my opinion so I would be more likely to advise the system administer to do control its running and what it is trying to update. |
|
I agree we don't want cbm overlapping with fwupd. I would close this issue. |
In Solus we're trying to ensure all aspects of the users system is up to date, to that extent we:
However we currently DO NOT have firmware updates. clr-boot-manager is the obvious integration
point in the deployment chain, and should be able to manage
fwupdor similar to enable the deploymentof FW capsule updates for our UEFI users.
It also makes sense to integrate the points here as CBM is responsible for boot items, and could easily change the "NextBoot" to ensure we reboot to the firmware update screen.
..Discuss? :)
The text was updated successfully, but these errors were encountered: