Blame SPECS/fwupd.spec

6c691a
%global glib2_version 2.45.8
7ca70f
%global libxmlb_version 0.1.3
6c691a
%global libgusb_version 0.2.11
b1169d
%global libcurl_version 7.61.0
6c691a
%global systemd_version 231
6c691a
%global json_glib_version 1.1.1
33b53c
%global fwupdplugin_version 5
6c691a
b1169d
# although we ship a few tiny python files these are utilities that 99.99%
b1169d
# of users do not need -- use this to avoid dragging python onto CoreOS
b1169d
%global __requires_exclude ^%{python3}$
b1169d
b1169d
# PPC64 is too slow to complete the tests under 3 minutes...
b1169d
%ifnarch ppc64le
6c691a
%global enable_tests 1
b1169d
%endif
b1169d
6c691a
%global enable_dummy 1
6c27b5
%global __meson_wrap_mode default
6c691a
6c691a
# fwupd.efi is only available on these arches
6c691a
%ifarch x86_64 aarch64
6c691a
%global have_uefi 1
6c691a
%endif
6c691a
b1169d
%ifarch i686 x86_64
b1169d
%global have_msr 1
6c691a
%endif
6c691a
6c691a
# libsmbios is only available on x86
6c691a
%ifarch x86_64
6c691a
%global have_dell 1
6c691a
%endif
6c691a
7ca70f
# only available recently
6c27b5
%if 0%{?fedora} >= 34 || 0%{?rhel} >= 9
7ca70f
%global have_modem_manager 1
7ca70f
%endif
7ca70f
6c691a
Summary:   Firmware update daemon
6c691a
Name:      fwupd
33b53c
Version:   1.7.4
33b53c
Release:   2%{?dist}
6c691a
License:   LGPLv2+
7ca70f
URL:       https://github.com/fwupd/fwupd
6c691a
Source0:   http://people.freedesktop.org/~hughsient/releases/%{name}-%{version}.tar.xz
6c27b5
Source1:   http://people.freedesktop.org/~hughsient/releases/libjcat-0.1.8.tar.xz
6c27b5
Source2:   http://people.freedesktop.org/~hughsient/releases/fwupd-efi-1.1.tar.xz
b1169d
b1169d
Source10:  http://people.redhat.com/rhughes/dbx/DBXUpdate-20100307-x64.cab
b1169d
Source11:  http://people.redhat.com/rhughes/dbx/DBXUpdate-20140413-x64.cab
b1169d
Source12:  http://people.redhat.com/rhughes/dbx/DBXUpdate-20160809-x64.cab
b1169d
Source13:  http://people.redhat.com/rhughes/dbx/DBXUpdate-20200729-aa64.cab
b1169d
Source14:  http://people.redhat.com/rhughes/dbx/DBXUpdate-20200729-ia32.cab
b1169d
Source15:  http://people.redhat.com/rhughes/dbx/DBXUpdate-20200729-x64.cab
024871
024871
# these are numbered high just to keep them wildly away from colliding with
024871
# the real package sources, in order to reduce churn.
33b53c
Source300:   redhatsecurebootca3.cer
33b53c
Source301:   redhatsecureboot301.cer
33b53c
Source500:   redhatsecurebootca5.cer
33b53c
Source503:   redhatsecureboot503.cer
003958
024871
BuildRequires: efi-srpm-macros
6c691a
BuildRequires: gettext
6c691a
BuildRequires: glib2-devel >= %{glib2_version}
7ca70f
BuildRequires: libxmlb-devel >= %{libxmlb_version}
6c691a
BuildRequires: libgcab1-devel
6c691a
BuildRequires: libgudev1-devel
6c691a
BuildRequires: libgusb-devel >= %{libgusb_version}
b1169d
BuildRequires: libcurl-devel >= %{libcurl_version}
6c691a
BuildRequires: polkit-devel >= 0.103
6c691a
BuildRequires: sqlite-devel
6c691a
BuildRequires: gpgme-devel
6c691a
BuildRequires: systemd >= %{systemd_version}
b1169d
BuildRequires: systemd-devel
6c691a
BuildRequires: libarchive-devel
6c691a
BuildRequires: gobject-introspection-devel
6c691a
BuildRequires: gcab
6c691a
%ifarch %{valgrind_arches}
6c691a
BuildRequires: valgrind
6c691a
BuildRequires: valgrind-devel
6c691a
%endif
6c691a
BuildRequires: gtk-doc
6c691a
BuildRequires: gnutls-devel
6c691a
BuildRequires: gnutls-utils
6c691a
BuildRequires: meson
6c691a
BuildRequires: help2man
6c691a
BuildRequires: json-glib-devel >= %{json_glib_version}
6c691a
BuildRequires: vala
6c691a
BuildRequires: bash-completion
7ca70f
BuildRequires: git-core
6c691a
7ca70f
%if 0%{?have_modem_manager}
7ca70f
BuildRequires: ModemManager-glib-devel >= 1.10.0
7ca70f
BuildRequires: libqmi-devel >= 1.22.0
6c27b5
BuildRequires: libmbim-devel
7ca70f
%endif
6c691a
6c691a
%if 0%{?have_uefi}
6c691a
BuildRequires: efivar-devel >= 33
6c27b5
BuildRequires: python3 python3-cairo python3-gobject
6c691a
BuildRequires: pango-devel
6c691a
BuildRequires: cairo-devel cairo-gobject-devel
6c691a
BuildRequires: freetype
6c691a
BuildRequires: fontconfig
6c691a
BuildRequires: google-noto-sans-cjk-ttc-fonts
6c691a
BuildRequires: gnu-efi-devel
6c691a
BuildRequires: pesign
6c691a
%endif
6c691a
6c691a
%if 0%{?have_dell}
6c691a
BuildRequires: efivar-devel >= 33
6c691a
BuildRequires: libsmbios-devel >= 2.3.0
6c691a
%endif
6c691a
6c691a
Requires(post): systemd
6c691a
Requires(preun): systemd
6c691a
Requires(postun): systemd
6c691a
6c691a
Requires: glib2%{?_isa} >= %{glib2_version}
7ca70f
Requires: libxmlb%{?_isa} >= %{libxmlb_version}
6c691a
Requires: libgusb%{?_isa} >= %{libgusb_version}
6c691a
Requires: bubblewrap
7ca70f
Requires: shared-mime-info
6c691a
6c691a
Obsoletes: fwupd-sign < 0.1.6
6c691a
Obsoletes: libebitdo < 0.7.5-3
6c691a
Obsoletes: libdfu < 1.0.0
6c691a
Obsoletes: fwupd-labels < 1.1.0-1
b1169d
b1169d
Obsoletes: dbxtool < 9
b1169d
Provides: dbxtool
b1169d
6c27b5
%if 0%{?rhel} > 7
6c27b5
Obsoletes: fwupdate < 13
6c27b5
Obsoletes: fwupdate-efi < 13
6c27b5
6c27b5
Provides: fwupdate
6c27b5
Provides: fwupdate-efi
6c27b5
%endif
6c27b5
b1169d
# optional, but a really good idea
b1169d
Recommends: udisks2
6c691a
6c691a
%description
6c691a
fwupd is a daemon to allow session software to update device firmware.
6c691a
6c691a
%package devel
6c691a
Summary: Development package for %{name}
6c691a
Requires: %{name}%{?_isa} = %{version}-%{release}
6c691a
Obsoletes: libebitdo-devel < 0.7.5-3
6c691a
Obsoletes: libdfu-devel < 1.0.0
6c691a
6c691a
%description devel
6c691a
Files for development with %{name}.
6c691a
6c691a
%package tests
6c691a
Summary: Data files for installed tests
33b53c
Requires: %{name}%{?_isa} = %{version}-%{release}
6c691a
6c691a
%description tests
6c691a
Data files for installed tests.
6c691a
6c691a
%prep
7ca70f
%setup -q
7ca70f
7ca70f
mkdir -p subprojects/libjcat
024871
tar xfvs %{SOURCE1} -C subprojects/libjcat --strip-components=1
6c691a
6c27b5
mkdir -p subprojects/fwupd-efi
6c27b5
tar xfvs %{SOURCE2} -C subprojects/fwupd-efi --strip-components=1
6c27b5
6c691a
sed -ri '1s=^#!/usr/bin/(env )?python3=#!%{__python3}=' \
7ca70f
        contrib/ci/*.py \
7ca70f
        contrib/firmware_packager/*.py \
7ca70f
        contrib/*.py \
7ca70f
        contrib/standalone-installer/assets/*.py \
7ca70f
        contrib/standalone-installer/*.py \
7ca70f
        libfwupdplugin/*.py \
7ca70f
        plugins/dfu/contrib/*.py \
6004d8
        plugins/uefi-capsule/make-images.py \
7ca70f
        po/test-deps
6c691a
6c691a
%build
6c691a
6c691a
# allow rh-signing-tools package for RHEL-8
6c691a
export RHEL_ALLOW_PYTHON2_FOR_BUILD=1
6c691a
6c691a
%meson \
6c27b5
    -Ddocs=gtkdoc \
6c27b5
    -Dlvfs=disabled \
024871
    -Defi_os_dir=%{efi_vendor} \
7ca70f
    -Dlibjcat:gtkdoc=false \
7ca70f
    -Dlibjcat:introspection=false \
7ca70f
    -Dlibjcat:tests=false \
6c691a
%if 0%{?enable_tests}
6c691a
    -Dtests=true \
6c691a
%else
6c691a
    -Dtests=false \
6c691a
%endif
6c691a
%if 0%{?enable_dummy}
6c691a
    -Dplugin_dummy=true \
6c691a
%else
6c691a
    -Dplugin_dummy=false \
6c691a
%endif
7ca70f
    -Dplugin_flashrom=false \
b1169d
%if 0%{?have_msr}
b1169d
    -Dplugin_msr=true \
6c691a
%else
b1169d
    -Dplugin_msr=false \
6c691a
%endif
b1169d
    -Dplugin_thunderbolt=true \
6c691a
%if 0%{?have_uefi}
b1169d
    -Dplugin_uefi_capsule=true \
b1169d
    -Dplugin_uefi_pk=false \
6c27b5
%ifarch x86_64
6c27b5
    -Dfwupd-efi:efi_sbat_distro_id="rhel" \
6c27b5
    -Dfwupd-efi:efi_sbat_distro_summary="Red Hat Enterprise Linux" \
6c27b5
    -Dfwupd-efi:efi_sbat_distro_pkgname="%{name}" \
6c27b5
    -Dfwupd-efi:efi_sbat_distro_version="%{version}" \
6c27b5
    -Dfwupd-efi:efi_sbat_distro_url="mail:secalert@redhat.com" \
6c27b5
    -Dfwupd-efi:efi-libdir="/usr/lib64" \
6c27b5
%endif
6004d8
    -Dplugin_tpm=false \
6c691a
%else
b1169d
    -Dplugin_uefi_capsule=false \
b1169d
    -Dplugin_uefi_pk=false \
6004d8
    -Dplugin_tpm=false \
6c691a
%endif
6c691a
%if 0%{?have_dell}
6c691a
    -Dplugin_dell=true \
6004d8
    -Dplugin_synaptics_mst=true \
6c691a
%else
6c691a
    -Dplugin_dell=false \
6004d8
    -Dplugin_synaptics_mst=false \
6c691a
%endif
7ca70f
%if 0%{?have_modem_manager}
7ca70f
    -Dplugin_modem_manager=true \
7ca70f
%else
7ca70f
    -Dplugin_modem_manager=false \
7ca70f
%endif
33b53c
    -Dplugin_logitech_bulkcontroller=false \
6004d8
    -Dman=true \
6004d8
    -Dbluez=false \
33b53c
    -Dplugin_cfu=false \
33b53c
    -Dplugin_mtd=false \
33b53c
    -Dplugin_powerd=false \
33b53c
    -Dplugin_uf2=false \
6004d8
    -Dsupported_build=true
6c691a
6c691a
%meson_build
6c691a
6c691a
%if 0%{?enable_tests}
6c691a
%check
6c691a
%meson_test
6c691a
%endif
6c691a
6c691a
%install
6c691a
%meson_install
6c691a
b1169d
# on RHEL the LVFS is disabled by default
b1169d
mkdir -p %{buildroot}/%{_datadir}/dbxtool
b1169d
install %{SOURCE10} %{SOURCE11} %{SOURCE12} %{SOURCE13} %{SOURCE14} %{SOURCE15} %{buildroot}/%{_datadir}/dbxtool
b1169d
6c691a
# sign fwupd.efi loader
6c691a
%ifarch x86_64
6c691a
%global efiarch x64
6c691a
%global fwup_efi_fn $RPM_BUILD_ROOT%{_libexecdir}/fwupd/efi/fwupd%{efiarch}.efi
33b53c
%pesign -s -i %{fwup_efi_fn} -o %{fwup_efi_fn}.tmp -a %{SOURCE300} -c %{SOURCE301} -n redhatsecureboot301
33b53c
%pesign -s -i %{fwup_efi_fn}.tmp -o %{fwup_efi_fn}.signed -a %{SOURCE500} -c %{SOURCE503} -n redhatsecureboot503
024871
rm -fv %{fwup_efi_fn}.tmp
6c691a
%endif
6c691a
6c691a
mkdir -p --mode=0700 $RPM_BUILD_ROOT%{_localstatedir}/lib/fwupd/gnupg
6c691a
7ca70f
# workaround for https://bugzilla.redhat.com/show_bug.cgi?id=1757948
7ca70f
mkdir -p $RPM_BUILD_ROOT%{_localstatedir}/cache/fwupd
7ca70f
6c691a
%find_lang %{name}
6c691a
6c691a
%post
6c691a
%systemd_post fwupd.service
6c691a
b1169d
# change vendor-installed remotes to use the default keyring type
003958
for fn in /etc/fwupd/remotes.d/*.conf; do
003958
    if grep -q "Keyring=gpg" "$fn"; then
003958
        sed -i 's/Keyring=gpg/#Keyring=pkcs/g' "$fn";
003958
    fi
b1169d
done
b1169d
6c691a
%preun
6c691a
%systemd_preun fwupd.service
6c691a
6c691a
%postun
6c691a
%systemd_postun_with_restart fwupd.service
6c691a
%systemd_postun_with_restart pesign.service
6c691a
6c691a
%files -f %{name}.lang
7ca70f
%doc README.md AUTHORS
6c691a
%license COPYING
6c691a
%config(noreplace)%{_sysconfdir}/fwupd/daemon.conf
6c691a
%if 0%{?have_uefi}
b1169d
%config(noreplace)%{_sysconfdir}/fwupd/uefi_capsule.conf
6c691a
%endif
6c691a
%config(noreplace)%{_sysconfdir}/fwupd/redfish.conf
7ca70f
%config(noreplace)%{_sysconfdir}/fwupd/thunderbolt.conf
6c691a
%dir %{_libexecdir}/fwupd
6c691a
%{_libexecdir}/fwupd/fwupd
b1169d
%ifarch i686 x86_64
b1169d
%{_libexecdir}/fwupd/fwupd-detect-cet
b1169d
%endif
7ca70f
%{_libexecdir}/fwupd/fwupdoffline
6c691a
%if 0%{?have_uefi}
6c691a
%{_libexecdir}/fwupd/efi/*.efi
6c27b5
%ifarch x86_64
6c691a
%{_libexecdir}/fwupd/efi/*.efi.signed
6c27b5
%endif
7ca70f
%{_bindir}/fwupdate
6c691a
%endif
6c691a
%{_bindir}/dfu-tool
b1169d
%if 0%{?have_uefi}
b1169d
%{_bindir}/dbxtool
b1169d
%endif
6c691a
%{_bindir}/fwupdmgr
7ca70f
%{_bindir}/fwupdtool
7ca70f
%{_bindir}/fwupdagent
7ca70f
%{_bindir}/jcat-tool
6c691a
%dir %{_sysconfdir}/fwupd
6c691a
%dir %{_sysconfdir}/fwupd/remotes.d
7ca70f
%if 0%{?have_dell}
7ca70f
%config(noreplace)%{_sysconfdir}/fwupd/remotes.d/dell-esrt.conf
7ca70f
%endif
6c691a
%config(noreplace)%{_sysconfdir}/fwupd/remotes.d/lvfs.conf
6c691a
%config(noreplace)%{_sysconfdir}/fwupd/remotes.d/lvfs-testing.conf
6c691a
%config(noreplace)%{_sysconfdir}/fwupd/remotes.d/vendor.conf
7ca70f
%config(noreplace)%{_sysconfdir}/fwupd/remotes.d/vendor-directory.conf
6c691a
%config(noreplace)%{_sysconfdir}/pki/fwupd
6c691a
%{_sysconfdir}/pki/fwupd-metadata
b1169d
%if 0%{?have_msr}
b1169d
/usr/lib/modules-load.d/fwupd-msr.conf
b1169d
%endif
6c27b5
/usr/lib/modules-load.d/fwupd-redfish.conf
7ca70f
%{_datadir}/dbus-1/system.d/org.freedesktop.fwupd.conf
6c691a
%{_datadir}/bash-completion/completions/fwupdmgr
6c691a
%{_datadir}/bash-completion/completions/fwupdtool
7ca70f
%{_datadir}/bash-completion/completions/fwupdagent
7ca70f
%{_datadir}/fish/vendor_completions.d/fwupdmgr.fish
6c691a
%{_datadir}/fwupd/metainfo/org.freedesktop.fwupd*.metainfo.xml
7ca70f
%if 0%{?have_dell}
7ca70f
%{_datadir}/fwupd/remotes.d/dell-esrt/metadata.xml
7ca70f
%endif
6c691a
%{_datadir}/fwupd/remotes.d/vendor/firmware/README.md
6c691a
%{_datadir}/dbus-1/interfaces/org.freedesktop.fwupd.xml
6c691a
%{_datadir}/polkit-1/actions/org.freedesktop.fwupd.policy
6c691a
%{_datadir}/polkit-1/rules.d/org.freedesktop.fwupd.rules
6c691a
%{_datadir}/dbus-1/system-services/org.freedesktop.fwupd.service
b1169d
%dir %{_datadir}/dbxtool
b1169d
%{_datadir}/dbxtool/DBXUpdate-20100307-x64.cab
b1169d
%{_datadir}/dbxtool/DBXUpdate-20140413-x64.cab
b1169d
%{_datadir}/dbxtool/DBXUpdate-20160809-x64.cab
b1169d
%{_datadir}/dbxtool/DBXUpdate-20200729-aa64.cab
b1169d
%{_datadir}/dbxtool/DBXUpdate-20200729-ia32.cab
b1169d
%{_datadir}/dbxtool/DBXUpdate-20200729-x64.cab
b1169d
%{_mandir}/man1/fwupdtool.1*
b1169d
%{_mandir}/man1/fwupdagent.1*
b1169d
%{_mandir}/man1/dfu-tool.1*
7ca70f
%if 0%{?have_uefi}
b1169d
%{_mandir}/man1/dbxtool.*
7ca70f
%endif
b1169d
%{_mandir}/man1/fwupdmgr.1*
b1169d
%if 0%{?have_uefi}
b1169d
%{_mandir}/man1/fwupdate.1*
b1169d
%endif
b1169d
%{_mandir}/man1/jcat-tool.1*
6c691a
%{_datadir}/metainfo/org.freedesktop.fwupd.metainfo.xml
7ca70f
%{_datadir}/icons/hicolor/scalable/apps/org.freedesktop.fwupd.svg
7ca70f
%{_datadir}/fwupd/firmware_packager.py
7ca70f
%{_datadir}/fwupd/simple_client.py
7ca70f
%{_datadir}/fwupd/add_capsule_header.py
7ca70f
%{_datadir}/fwupd/install_dell_bios_exe.py
6c691a
%{_unitdir}/fwupd-offline-update.service
6c691a
%{_unitdir}/fwupd.service
7ca70f
%{_unitdir}/fwupd-refresh.service
7ca70f
%{_unitdir}/fwupd-refresh.timer
7ca70f
%{_presetdir}/fwupd-refresh.preset
6c691a
%{_unitdir}/system-update.target.wants/
6c691a
%dir %{_localstatedir}/lib/fwupd
7ca70f
%dir %{_localstatedir}/cache/fwupd
6c691a
%dir %{_datadir}/fwupd/quirks.d
6c691a
%{_datadir}/fwupd/quirks.d/*.quirk
6c27b5
%{_datadir}/doc/fwupd/builder/README.md
6c27b5
%if 0%{?have_uefi}
6c27b5
%{_sysconfdir}/grub.d/35_fwupd
6c27b5
%endif
6c27b5
%{_libdir}/libfwupd.so.2*
6c27b5
%{_libdir}/libfwupdplugin.so.%{fwupdplugin_version}*
7ca70f
%{_libdir}/libjcat.so.*
6c691a
%{_libdir}/girepository-1.0/Fwupd-2.0.typelib
7ca70f
%{_libdir}/girepository-1.0/FwupdPlugin-1.0.typelib
6c691a
/usr/lib/udev/rules.d/*.rules
7ca70f
/usr/lib/systemd/system-shutdown/fwupd.shutdown
6c27b5
%dir %{_libdir}/fwupd-plugins-%{fwupdplugin_version}
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_acpi_dmar.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_acpi_facp.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_acpi_phat.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_amt.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_analogix.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_ata.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_bcm57xx.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_ccgx.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_colorhug.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_cros_ec.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_cpu.so
6c691a
%if 0%{?have_dell}
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_dell.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_dell_esrt.so
6c27b5
%endif
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_dell_dock.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_dfu.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_dfu_csr.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_ebitdo.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_elantp.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_elanfp.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_emmc.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_ep963x.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_fastboot.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_fresco_pd.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_hailuck.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_iommu.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_jabra.so
6c27b5
%if 0%{?have_uefi}
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_lenovo_thinklmi.so
6c27b5
%endif
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_linux_lockdown.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_linux_sleep.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_linux_swap.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_linux_tainted.so
b1169d
%if 0%{?have_msr}
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_msr.so
6c27b5
%endif
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_nitrokey.so
33b53c
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_nordic_hid.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_nvme.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_optionrom.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_parade_lspcon.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_pci_bcr.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_pci_mei.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_pixart_rf.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_realtek_mst.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_redfish.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_rts54hid.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_rts54hub.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_steelseries.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_superio.so
6c691a
%if 0%{?have_dell}
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_synaptics_mst.so
6c691a
%endif
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_synaptics_cape.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_synaptics_cxaudio.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_synaptics_prometheus.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_synaptics_rmi.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_system76_launch.so
6c691a
%if 0%{?enable_dummy}
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_test.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_invalid.so
6c691a
%endif
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_thelio_io.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_thunderbolt.so
6c691a
%if 0%{?have_uefi}
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_bios.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_uefi_capsule.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_uefi_dbx.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_uefi_recovery.so
6c27b5
%endif
33b53c
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_usi_dock.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_logind.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_logitech_hidpp.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_upower.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_vli.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_wacom_raw.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_wacom_usb.so
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_goodixmoc.so
6c691a
%ghost %{_localstatedir}/lib/fwupd/gnupg
6004d8
b1169d
%if 0%{?have_modem_manager}
6c27b5
%{_libdir}/fwupd-plugins-%{fwupdplugin_version}/libfu_plugin_modem_manager.so
b1169d
%endif
6004d8
%if 0%{?have_uefi}
6004d8
%{_datadir}/fwupd/uefi-capsule-ux.tar.xz
6004d8
%endif
6c691a
6c691a
%files devel
6c691a
%{_datadir}/gir-1.0/Fwupd-2.0.gir
7ca70f
%{_datadir}/gir-1.0/FwupdPlugin-1.0.gir
7ca70f
%{_datadir}/gtk-doc/html/fwupd
6c691a
%{_datadir}/vala/vapi
6c691a
%{_includedir}/fwupd-1
7ca70f
%{_includedir}/libjcat-1
6c691a
%{_libdir}/libfwupd*.so
7ca70f
%{_libdir}/libjcat.so
6c691a
%{_libdir}/pkgconfig/fwupd.pc
7ca70f
%{_libdir}/pkgconfig/fwupdplugin.pc
6c27b5
%if 0%{?have_uefi}
6c27b5
%{_libdir}/pkgconfig/fwupd-efi.pc
6c27b5
%endif
7ca70f
%{_libdir}/pkgconfig/jcat.pc
6c691a
6c691a
%files tests
7ca70f
%if 0%{?enable_tests}
6c691a
%dir %{_datadir}/installed-tests/fwupd
6c27b5
%{_datadir}/installed-tests/fwupd/tests/*
7ca70f
%{_datadir}/installed-tests/fwupd/fwupd-tests.xml
6c691a
%{_datadir}/installed-tests/fwupd/*.test
6c691a
%{_datadir}/installed-tests/fwupd/*.cab
6c691a
%{_datadir}/installed-tests/fwupd/*.sh
33b53c
%if 0%{?have_uefi}
33b53c
%{_datadir}/installed-tests/fwupd/efi
33b53c
%endif
6c27b5
%{_datadir}/fwupd/device-tests/*.json
b1169d
%{_libexecdir}/installed-tests/fwupd/*
7ca70f
%dir %{_sysconfdir}/fwupd/remotes.d
7ca70f
%config(noreplace)%{_sysconfdir}/fwupd/remotes.d/fwupd-tests.conf
7ca70f
%endif
6c691a
6c691a
%changelog
33b53c
* Thu Mar 31 2022 Richard Hughes <richard@hughsie.com> 1.7.4-2
33b53c
- Rebuild to work around gating failures
33b53c
- Resolves: rhbz#2037294
33b53c
33b53c
* Thu Jan 13 2022 Richard Hughes <richard@hughsie.com> 1.7.4-1
33b53c
- Include support for Lenovo TBT4 Docking stations
33b53c
- Do not cause systemd-modules-load failures
33b53c
- Resolves: rhbz#2038258
33b53c
- Resolves: rhbz#2037294
33b53c
33b53c
* Thu Dec 09 2021 Richard Hughes <richard@hughsie.com> 1.7.1-2
33b53c
- Disable the Logitech bulkcontroller plugin to avoid adding a dep to protobuf-c
33b53c
  which lives in AppStream, not BaseOS.
33b53c
- Resolves: rhbz#2029333
33b53c
6c27b5
* Mon Nov 01 2021 Richard Hughes <richard@hughsie.com> 1.7.1-1
6c27b5
- New upstream release
6c27b5
- Backport upstream changes
6c27b5
- Include support for Dell TBT4 Docking stations
6c27b5
- Resolves: rhbz#1969472
6c27b5
- Resolves: rhbz#1976408
6c27b5
6004d8
* Tue Apr 13 2021 Richard Hughes <richard@hughsie.com> 1.5.9-3
6004d8
- Rebase to include the SBAT metadata section to allow fixing BootHole
6004d8
- Resolves: rhbz#1933012
6004d8
- Resolves: rhbz#1932953
6004d8
- Resolves: rhbz#1932909
6004d8
- Resolves: rhbz#1932882
6004d8
- Resolves: rhbz#1932579
6004d8
- Resolves: rhbz#1932553
6004d8
- Resolves: rhbz#1932423
6004d8
003958
* Wed Feb 10 2021 Richard Hughes <richard@hughsie.com> 1.5.5-3
003958
- Backport a fix from upstream to fix a crash in the Goodix MOC plugin.
003958
- Resolves: #1927091
003958
003958
* Tue Feb 09 2021 Richard Hughes <richard@hughsie.com> 1.5.5-2
003958
- Do not invalidate all remote timestamps during package install to fix rpm -V.
003958
- Backport some important high priority fixes from upstream.
003958
- Resolves: #1926382
003958
b1169d
* Mon Jan 11 2021 Richard Hughes <richard@hughsie.com> 1.5.5-1
b1169d
- Rebase package to include support for latest OEM hardware and to
b1169d
  support deploying UEFI SecureBoot dbx updates.
b1169d
- Resolves: #1870811
b1169d
b1169d
* Wed Dec 16 2020 Richard Hughes <richard@hughsie.com> 1.5.4-1
b1169d
- Rebase package to include support for latest OEM hardware and to
b1169d
  support deploying UEFI SecureBoot dbx updates.
b1169d
- Resolves: #1870811
b1169d
024871
* Fri Jul 24 2020 Peter Jones <pjones@redhat.com> - 1.4.2-4
024871
- Add signing with redhatsecureboot503 cert
024871
  Related: CVE-2020-10713
024871
024871
* Thu Jul 23 2020 Richard Hughes <richard@hughsie.com> 1.4.2-3
024871
- Obsolete the now-dead fwupdate package to prevent file conflicts
024871
- Resolves: #1859202
024871
92fc95
* Fri Jun 05 2020 Richard Hughes <richard@hughsie.com> 1.4.2-2
92fc95
- Security fix for CVE-2020-10759
92fc95
- Resolves: #1844324
92fc95
92fc95
* Mon May 18 2020 Richard Hughes <richard@hughsie.com> 1.4.2-1
92fc95
- New upstream release
92fc95
- Backport a patch to fix the synaptics fingerprint reader update.
92fc95
- Resolves: #1775277
92fc95
7ca70f
* Mon Apr 27 2020 Richard Hughes <richard@hughsie.com> 1.4.1-1
7ca70f
- New upstream release
7ca70f
- Resolves: #1775277
7ca70f
6c691a
* Wed Feb 19 2020 Richard Hughes <richard@hughsie.com> 1.1.4-6
6c691a
- Rebuild to get the EFI executable signed with the Red Hat key
6c691a
- Resolves: #1713033
6c691a
6c691a
* Thu Feb 13 2020 Richard Hughes <richard@hughsie.com> 1.1.4-5
6c691a
- Backport a patch to specify the EFI os name
6c691a
- Resolves: #1713033
6c691a
6c691a
* Fri Nov 29 2019 Richard Hughes <richard@hughsie.com> 1.1.4-4
6c691a
- Rebuild to get the EFI executable signed with the Red Hat key
6c691a
- Resolves: #1680154
6c691a
6c691a
* Fri Nov 29 2019 Richard Hughes <richard@hughsie.com> 1.1.4-3
6c691a
- Disable wacomhid by default as probing the device stops the tablet working
6c691a
- Resolves: #1680154
6c691a
6c691a
* Mon Nov 25 2019 Richard Hughes <richard@hughsie.com> 1.1.4-2
6c691a
- Do not require python3 in the base package
6c691a
- Resolves: #1724593
6c691a
6c691a
* Wed Nov 07 2018 Richard Hughes <richard@hughsie.com> 1.1.4-1
6c691a
- New upstream release
6c691a
- Use HTTPS_PROXY if set
6c691a
- Make the dell-dock plugin more robust in several ways
6c691a
- Adjust EVB board handling
6c691a
- Resolves: #1647557
6c691a
6c691a
* Fri Oct 12 2018 Richard Hughes <richard@hughsie.com> 1.1.3-1
6c691a
- New upstream release
6c691a
- Adds support for an upcoming Dell USB-C dock
6c691a
- Don't use an obsolete font when building the UEFI images
6c691a
- Resolves: #1607842
6c691a
6c691a
* Wed Oct 10 2018 Richard Hughes <richard@hughsie.com> 1.1.1-11
6c691a
- Rebuild to get the EFI executable signed with the Red Hat key
6c691a
- Related: #1614424
6c691a
6c691a
* Fri Sep 28 2018 Brendan Reilly <breilly@redhat.com> 1.1.1-10
6c691a
- Rebuild
6c691a
- Related: #1614424
6c691a
6c691a
* Thu Sep 20 2018 Brendan Reilly <breilly@redhat.com> 1.1.1-9
6c691a
- Rebuild
6c691a
- Related: #1614424
6c691a
6c691a
* Tue Sep 18 2018 Tomas Mlcoch <tmlcoch@hughsie.com> 1.1.1-8
6c691a
- Rebuild
6c691a
- Related: #1614424
6c691a
6c691a
* Tue Sep 04 2018 Richard Hughes <richard@hughsie.com> 1.1.1-7
6c691a
- Rebuild to get the EFI executable signed with the Red Hat key
6c691a
- Related: #1614424
6c691a
6c691a
* Fri Aug 31 2018 Richard Hughes <richard@hughsie.com> 1.1.1-6
6c691a
- Include the certificates for secure boot signing
6c691a
6c691a
* Wed Aug 29 2018 Richard Hughes <richard@hughsie.com> 1.1.1-5
6c691a
- Include the certificates for secure boot signing
6c691a
6c691a
* Tue Aug 23 2018 Richard Hughes <richard@hughsie.com> 1.1.1-4
6c691a
- Rebuild to get the EFI executable signed with the Red Hat key
6c691a
6c691a
* Thu Aug 23 2018 Richard Hughes <richard@hughsie.com> 1.1.1-3
6c691a
- Rebuild to get the EFI executable signed with the Red Hat key
6c691a
6c691a
* Mon Aug 20 2018 Richard Hughes <richard@hughsie.com> 1.1.1-2
6c691a
- Rebuild to get the EFI executable signed with the Red Hat key
6c691a
6c691a
* Mon Aug 13 2018 Richard Hughes <richard@hughsie.com> 1.1.1-1
6c691a
- New upstream release
6c691a
- Add support for the Synaptics Panamera hardware
6c691a
- Add validation for Alpine and Titan Ridge
6c691a
- Allow flashing unifying devices in recovery mode
6c691a
- Allow running synapticsmst on non-Dell hardware
6c691a
- Check the ESP for sanity at at startup
6c691a
- Do not hold hidraw devices open forever
6c691a
- Fix a potential segfault in smbios data parsing
6c691a
- Fix encoding the GUID into the capsule EFI variable
6c691a
- Fix various bugs when reading the thunderbolt version number
6c691a
- Improve the Redfish plugin to actually work with real hardware
6c691a
- Reboot synapticsmst devices at the end of flash cycle
6c691a
- Show the correct title when updating devices
6c691a
6c691a
* Fri Aug  3 2018 Florian Weimer <fweimer@redhat.com> - 1.1.0-3
6c691a
- Honor %%{valgrind_arches}
6c691a
6c691a
* Thu Jul 12 2018 Richard Hughes <richard@hughsie.com> 1.1.0-2
6c691a
- Rebuild to get the EFI executable signed with the Red Hat key
6c691a
6c691a
* Wed Jul 11 2018 Richard Hughes <richard@hughsie.com> 1.1.0-1
6c691a
- New upstream release
6c691a
- Add a initial Redfish support
6c691a
- Allow devices to assign a plugin from the quirk subsystem
6c691a
- Detect the EFI system partition location at runtime
6c691a
- Do not use 8bitdo bootloader commands after a successful flash
6c691a
- Fix a potential buffer overflow when applying a DFU patch
6c691a
- Fix downgrading older releases to devices
6c691a
- Fix flashing devices that require a manual replug
6c691a
- Fix unifying failure to detach when using a slow host controller
6c691a
- Merge fwupdate functionality into fwupd
6c691a
- Support more Wacom tablets
6c691a
6c691a
* Wed Jun 20 2018 Tomas Orsava <torsava@redhat.com> - 1.0.6-2
6c691a
- Switch hardcoded python3 shebangs into the %%{__python3} macro
6c691a
- Add missing BuildRequires on python3-devel so that %%{__python3} macro is
6c691a
  defined
6c691a
6c691a
* Mon Mar 12 2018 Richard Hughes <richard@hughsie.com> 1.0.6-1
6c691a
- New upstream release
6c691a
- Add bash completion for fwupdmgr
6c691a
- Add support for newest Thunderbolt chips
6c691a
- Allow devices to use the runtime version when in bootloader mode
6c691a
- Allow overriding ESP mount point via conf file
6c691a
- Correct handling of unknown Thunderbolt devices
6c691a
- Correctly detect new remotes that are manually copied
6c691a
- Delete any old fwupdate capsules and efivars when launching fwupd
6c691a
- Fix a crash related to when passing device to downgrade in CLI
6c691a
- Fix Unifying signature writing and parsing for Texas bootloader
6c691a
- Generate Vala bindings
6c691a
6c691a
* Fri Feb 23 2018 Richard Hughes <richard@hughsie.com> 1.0.5-2
6c691a
- Use the new CDN for metadata.
6c691a
6c691a
* Wed Feb 14 2018 Richard Hughes <richard@hughsie.com> 1.0.5-1
6c691a
- New upstream release
6c691a
- Be more careful deleting and modifying device history
6c691a
- Fix crasher with MST flashing
6c691a
- Fix DFU detach with newer releases of libusb
6c691a
- Offer to reboot when processing an offline update
6c691a
- Show the user a URL when they report a known problem
6c691a
- Stop matching 8bitdo DS4 controller VID/PID
6c691a
- Support split cabinet archives as produced by Windows Update
6c691a
6c691a
* Wed Feb 07 2018 Fedora Release Engineering <releng@fedoraproject.org> - 1.0.4-2
6c691a
- Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild
6c691a
6c691a
* Thu Jan 25 2018 Richard Hughes <richard@hughsie.com> 1.0.4-1
6c691a
- New upstream release
6c691a
- Add a device name for locked UEFI devices
6c691a
- Add D-Bus methods to get and modify the history information
6c691a
- Allow the user to share firmware update success or failure
6c691a
- Ask the user to refresh metadata when it is very old
6c691a
- Never add two devices to the daemon with the same ID
6c691a
- Rescan supported flags when refreshing metadata
6c691a
- Store firmware update success and failure to a local database
6c691a
6c691a
* Fri Jan 12 2018 Richard Hughes <richard@hughsie.com> 1.0.3-2
6c691a
- Backport a patch that fixes applying firmware updates using gnome-software.
6c691a
6c691a
* Tue Jan 09 2018 Richard Hughes <richard@hughsie.com> 1.0.3-1
6c691a
- New upstream release
6c691a
- Add a new plugin to add support for CSR "Driverless DFU"
6c691a
- Add initial SF30/SN30 Pro support
6c691a
- Block owned Dell TPM updates
6c691a
- Choose the correct component from provides matches using requirements
6c691a
- Do not try to parse huge compressed archive files
6c691a
- Handle Thunderbolt "native" mode
6c691a
- Use the new functionality in libgcab >= 1.0 to avoid writing temp files
6c691a
6c691a
* Tue Nov 28 2017 Richard Hughes <richard@hughsie.com> 1.0.2-1
6c691a
- New upstream release
6c691a
- Add a plugin for the Nitrokey Storage device
6c691a
- Add quirk for AT32UC3B1256 as used in the RubberDucky
6c691a
- Add support for the original AVR DFU protocol
6c691a
- Allow different plugins to claim the same device
6c691a
- Disable the dell plugin if libsmbios fails
6c691a
- Fix critical warning when more than one remote fails to load
6c691a
- Ignore useless Thunderbolt device types
6c691a
- Set environment variables to allow easy per-plugin debugging
6c691a
- Show a nicer error message if the requirement fails
6c691a
- Sort the output of GetUpgrades correctly
6c691a
- Use a SHA1 hash for the internal DeviceID
6c691a
6c691a
* Thu Nov 09 2017 Kalev Lember <klember@redhat.com> 1.0.1-3
6c691a
- Rebuild against libappstream-glib 0.7.4
6c691a
6c691a
* Thu Nov 09 2017 Kalev Lember <klember@redhat.com> 1.0.1-2
6c691a
- Fix libdfu obsoletes versions
6c691a
6c691a
* Thu Nov 09 2017 Richard Hughes <richard@hughsie.com> 1.0.1-1
6c691a
- New upstream release
6c691a
- Add support for HWID requirements
6c691a
- Add support for programming various AVR32 and XMEGA parts using DFU
6c691a
- Add the various DFU quirks for the Jabra Speak devices
6c691a
- Catch invalid Dell dock component requests
6c691a
- Correctly output Intel HEX files with > 16bit offset addresses
6c691a
- Do not try to verify the element write if upload is unsupported
6c691a
- Fix a double-unref when updating any 8Bitdo device
6c691a
- Fix uploading large firmware files over DFU
6c691a
- Format the BCD USB revision numbers correctly
6c691a
- Guess the DFU transfer size if it is not specified
6c691a
- Include the reset timeout as wValue to fix some DFU bootloaders
6c691a
- Move the database of supported devices out into runtime loaded files
6c691a
- Support devices with truncated DFU interface data
6c691a
- Use the correct wDetachTimeOut when writing DFU firmware
6c691a
- Verify devices with legacy VIDs are actually 8Bitdo controllers
6c691a
6c691a
* Mon Oct 09 2017 Richard Hughes <richard@hughsie.com> 1.0.0-1
6c691a
- New upstream release
6c691a
- This release breaks API and ABI to remove deprecated symbols
6c691a
- libdfu is now not installed as a shared library
6c691a
- Add FuDeviceLocker to simplify device open/close lifecycles
6c691a
- Add functionality to blacklist Dell HW with problems
6c691a
- Disable the fallback USB plugin
6c691a
- Do not fail to load the daemon if cached metadata is invalid
6c691a
- Do not use system-specific infomation for UEFI PCI devices
6c691a
- Fix various printing issues with the progressbar
6c691a
- Never fallback to an offline update from client code
6c691a
- Only set the Dell coldplug delay when we know we need it
6c691a
- Parse the SMBIOS v2 and v3 DMI tables directly
6c691a
- Support uploading the UEFI firmware splash image
6c691a
- Use the intel-wmi-thunderbolt kernel module to force power
6c691a
6c691a
* Fri Sep 01 2017 Richard Hughes <richard@hughsie.com> 0.9.7-1
6c691a
- New upstream release
6c691a
- Add a FirmwareBaseURI parameter to the remote config
6c691a
- Add a firmware builder that uses bubblewrap
6c691a
- Add a python script to create fwupd compatible cab files from .exe files
6c691a
- Add a thunderbolt plugin for new kernel interface
6c691a
- Fix an incomplete cipher when using XTEA on data not in 4 byte chunks
6c691a
- Show a bouncing progress bar if the percentage remains at zero
6c691a
- Use the new bootloader PIDs for Unifying pico receivers
6c691a
6c691a
* Fri Sep 01 2017 Kalev Lember <klember@redhat.com> 0.9.6-2
6c691a
- Disable i686 UEFI support now that fwupdate is no longer available there
6c691a
- Enable aarch64 UEFI support now that all the deps are available there
6c691a
6c691a
* Thu Aug 03 2017 Richard Hughes <richard@hughsie.com> 0.9.6-1
6c691a
- New upstream release
6c691a
- Add --version option to fwupdmgr
6c691a
- Display all errors recorded by efi_error tracing
6c691a
- Don't log a warning when an unknown unifying report is parsed
6c691a
- Fix a hang on 32 bit machines
6c691a
- Make sure the unifying percentage completion goes from 0% to 100%
6c691a
- Support embedded devices with local firmware metadata
6c691a
- Use new GUsb functionality to fix flashing Unifying devices
6c691a
6c691a
* Wed Aug 02 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.9.5-3
6c691a
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Binutils_Mass_Rebuild
6c691a
6c691a
* Wed Jul 26 2017 Fedora Release Engineering <releng@fedoraproject.org> - 0.9.5-2
6c691a
- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild
6c691a
6c691a
* Tue Jul 04 2017 Richard Hughes <richard@hughsie.com> 0.9.5-1
6c691a
- New upstream release
6c691a
- Add a plugin to get the version of the AMT ME interface
6c691a
- Allow flashing Unifying devices in bootloader modes
6c691a
- Filter by Unifying SwId when making HID++2.0 requests
6c691a
- Fix downgrades when version_lowest is set
6c691a
- Fix the self tests when running on PPC64 big endian
6c691a
- Use the UFY DeviceID prefix for Unifying devices
6c691a
6c691a
* Thu Jun 15 2017 Richard Hughes <richard@hughsie.com> 0.9.4-1
6c691a
- New upstream release
6c691a
- Add installed tests that use the daemon
6c691a
- Add the ability to restrict firmware to specific vendors
6c691a
- Compile with newer versions of meson
6c691a
- Fix a common crash when refreshing metadata
6c691a
- Generate a images for status messages during system firmware update
6c691a
- Show progress download when refreshing metadata
6c691a
- Use the correct type signature in the D-Bus introspection file
6c691a
6c691a
* Wed Jun 07 2017 Richard Hughes <richard@hughsie.com> 0.9.3-1
6c691a
- New upstream release
6c691a
- Add a 'downgrade' command to fwupdmgr
6c691a
- Add a 'get-releases' command to fwupdmgr
6c691a
- Add support for Microsoft HardwareIDs
6c691a
- Allow downloading metadata from more than just the LVFS
6c691a
- Allow multiple checksums on devices and releases
6c691a
- Correctly open Unifying devices with original factory firmware
6c691a
- Do not expect a Unifying reply when issuing a REBOOT command
6c691a
- Do not re-download firmware that exists in the cache
6c691a
- Fix a problem when testing for a Dell system
6c691a
- Fix flashing new firmware to 8bitdo controllers
6c691a
6c691a
* Tue May 23 2017 Richard Hughes <richard@hughsie.com> 0.9.2-2
6c691a
- Backport several fixes for updating Unifying devices
6c691a
6c691a
* Mon May 22 2017 Richard Hughes <richard@hughsie.com> 0.9.2-1
6c691a
- New upstream release
6c691a
- Add support for Unifying DFU features
6c691a
- Do not spew a critial warning when parsing an invalid URI
6c691a
- Ensure steelseries device is closed if it returns an invalid packet
6c691a
- Ignore spaces in the Unifying version prefix
6c691a
6c691a
* Thu Apr 20 2017 Richard Hughes <richard@hughsie.com> 0.8.2-1
6c691a
- New upstream release
6c691a
- Add a config option to allow runtime disabling plugins by name
6c691a
- Add DFU quirk for OpenPICC and SIMtrace
6c691a
- Create directories in /var/cache as required
6c691a
- Fix the Requires lines in the dfu pkg-config file
6c691a
- Only try to mkdir the localstatedir if we have the right permissions
6c691a
- Support proxy servers in fwupdmgr
6c691a
6c691a
* Thu Mar 23 2017 Bastien Nocera <bnocera@redhat.com> - 0.8.1-2
6c691a
+ fwupd-0.8.1-2
6c691a
- Release claimed devices on error, fixes unusable input devices
6c691a
6c691a
* Mon Feb 27 2017 Richard Hughes <richard@hughsie.com> 0.8.1-1
6c691a
- New upstream release
6c691a
- Adjust systemd confinement restrictions
6c691a
- Don't initialize libsmbios on unsupported systems
6c691a
- Fix a crash when enumerating devices
6c691a
6c691a
* Wed Feb 08 2017 Richard Hughes <richard@hughsie.com> 0.8.0-1
6c691a
- New upstream release
6c691a
- Add support for Intel Thunderbolt devices
6c691a
- Add support for Logitech Unifying devices
6c691a
- Add support for Synaptics MST cascades hubs
6c691a
- Add support for the Altus-Metrum ChaosKey device
6c691a
- Always close USB devices before error returns
6c691a
- Return the pending UEFI update when not on AC power
6c691a
- Use a heuristic for the start address if the firmware has no DfuSe footer
6c691a
- Use more restrictive settings when running under systemd
6c691a
6c691a
* Sat Dec 10 2016 Igor Gnatenko <i.gnatenko.brain@gmail.com> - 0.7.5-2
6c691a
- Rebuild for gpgme 1.18
6c691a
6c691a
* Wed Oct 19 2016 Richard Hughes <richard@hughsie.com> 0.7.5-1
6c691a
- New upstream release
6c691a
- Add quirks for HydraBus as it does not have a DFU runtime
6c691a
- Don't create the UEFI dummy device if the unlock will happen on next boot
6c691a
- Fix an assert when unlocking the dummy ESRT device
6c691a
- Fix writing firmware to devices using the ST reference bootloader
6c691a
- Match the Dell TB16 device
6c691a
6c691a
* Mon Sep 19 2016 Richard Hughes <richard@hughsie.com> 0.7.4-1
6c691a
- New upstream release
6c691a
- Add a fallback for older appstream-glib releases
6c691a
- Allow the argument to 'dfu-tool set-release' be major.minor
6c691a
- Fix a possible crash when uploading firmware files using libdfu
6c691a
- Fix libfwupd self tests when a host-provided fwupd is not available
6c691a
- Load the Altos USB descriptor from ELF files
6c691a
- Show the human-readable version in the 'dfu-tool dump' output
6c691a
- Support writing the IHEX symbol table
6c691a
- Write the ELF files with the correct section type
6c691a
6c691a
* Mon Aug 29 2016 Kalev Lember <klember@redhat.com> 0.7.3-2
6c691a
- Fix an unexpanded macro in the spec file
6c691a
- Tighten libebitdo-devel requires with the _isa macro
6c691a
- Add ldconfig scripts for libdfu and libebitdo subpackages
6c691a
6c691a
* Mon Aug 29 2016 Richard Hughes <richard@hughsie.com> 0.7.3-1
6c691a
- New upstream release
6c691a
- Add Dell TPM and TB15/WD15 support via new Dell provider
6c691a
- Add initial ELF reading and writing support to libdfu
6c691a
- Add support for installing multiple devices from a CAB file
6c691a
- Allow providers to export percentage completion
6c691a
- Don't fail while checking versions or locked state
6c691a
- Show a progress notification when installing firmware
6c691a
- Show the vendor flashing instructions when installing
6c691a
- Use a private gnupg key store
6c691a
- Use the correct firmware when installing a composite device
6c691a
6c691a
* Fri Aug 19 2016 Peter Jones <pjones@redhat.com> - 0.7.2-6
6c691a
- Rebuild to get libfwup.so.1 as our fwupdate dep.  This should make this the
6c691a
  last time we need to rebuild for this.
6c691a
6c691a
* Wed Aug 17 2016 Peter Jones <pjones@redhat.com> - 0.7.2-5
6c691a
- rebuild against new efivar and fwupdate
6c691a
6c691a
* Fri Aug 12 2016 Adam Williamson <awilliam@redhat.com> - 0.7.2-4
6c691a
- rebuild against new efivar and fwupdate
6c691a
6c691a
* Thu Aug 11 2016 Richard Hughes <richard@hughsie.com> 0.7.2-3
6c691a
- Use the new CDN for firmware metadata
6c691a
6c691a
* Thu Jul 14 2016 Kalev Lember <klember@redhat.com> - 0.7.2-2
6c691a
- Tighten subpackage dependencies
6c691a
6c691a
* Mon Jun 13 2016 Richard Hughes <richard@hughsie.com> 0.7.2-1
6c691a
- New upstream release
6c691a
- Allow devices to have multiple assigned GUIDs
6c691a
- Allow metainfo files to match only specific revisions of devices
6c691a
- Only claim the DFU interface when required
6c691a
- Only return updatable devices from GetDevices()
6c691a
- Show the DFU protocol version in 'dfu-tool list'
6c691a
6c691a
* Fri May 13 2016 Richard Hughes <richard@hughsie.com> 0.7.1-1
6c691a
- New upstream release
6c691a
- Add device-added, device-removed and device-changed signals
6c691a
- Add for a new device field "Flashes Left"
6c691a
- Fix a critical warning when restarting the daemon
6c691a
- Fix BE issues when reading and writing DFU files
6c691a
- Make the device display name nicer
6c691a
- Match the AppStream metadata after a device has been added
6c691a
- Return all update descriptions newer than the installed version
6c691a
- Set the device description when parsing local firmware files
6c691a
6c691a
* Fri Apr 01 2016 Richard Hughes <richard@hughsie.com> 0.7.0-1
6c691a
- New upstream release
6c691a
- Add Alienware to the version quirk table
6c691a
- Add a version plugin for SteelSeries hardware
6c691a
- Do not return updates that require AC when on battery
6c691a
- Return the device flags when getting firmware details
6c691a
6c691a
* Mon Mar 14 2016 Richard Hughes <richard@hughsie.com> 0.6.3-1
6c691a
- New upstream release
6c691a
- Add an unlock method for devices
6c691a
- Add ESRT enable method into UEFI provider
6c691a
- Correct the BCD version number for DFU 1.1
6c691a
- Ignore the DFU runtime on the DW1820A
6c691a
- Only read PCI OptionROM firmware when devices are manually unlocked
6c691a
- Require AC power before scheduling some types of firmware update
6c691a
6c691a
* Fri Feb 12 2016 Richard Hughes <richard@hughsie.com> 0.6.2-1
6c691a
- New upstream release
6c691a
- Add 'Created' and 'Modified' properties on managed devices
6c691a
- Fix get-results for UEFI provider
6c691a
- Support vendor-specific UEFI version encodings
6c691a
6c691a
* Wed Feb 03 2016 Fedora Release Engineering <releng@fedoraproject.org> - 0.6.1-2
6c691a
- Rebuilt for https://fedoraproject.org/wiki/Fedora_24_Mass_Rebuild
6c691a
6c691a
* Tue Jan 19 2016 Richard Hughes <richard@hughsie.com> 0.6.1-1
6c691a
- New upstream release
6c691a
- Do not misdetect different ColorHug devices
6c691a
- Only dump the profiling data when run with --verbose
6c691a
6c691a
* Mon Dec 07 2015 Richard Hughes <richard@hughsie.com> 0.6.0-1
6c691a
- New upstream release
6c691a
- Add support for automatically updating USB DFU-capable devices
6c691a
- Emit the changed signal after doing an update
6c691a
- Export the AppStream ID when returning device results
6c691a
- Use the same device identification string format as Microsoft
6c691a
6c691a
* Wed Nov 18 2015 Richard Hughes <richard@hughsie.com> 0.5.4-1
6c691a
- New upstream release
6c691a
- Use API available in fwupdate 0.5 to avoid writing temp files
6c691a
- Fix compile error against fwupdate 0.5 due to API bump
6c691a
6c691a
* Thu Nov 05 2015 Richard Hughes <richard@hughsie.com> 0.5.3-1
6c691a
- New upstream release
6c691a
- Avoid seeking when reading the file magic during refresh
6c691a
- Do not assume that the compressed XML data will be NUL terminated
6c691a
- Use the correct user agent string for fwupdmgr
6c691a
6c691a
* Wed Oct 28 2015 Richard Hughes <richard@hughsie.com> 0.5.2-1
6c691a
- New upstream release
6c691a
- Add the update description to the GetDetails results
6c691a
- Clear the in-memory firmware store only after parsing a valid XML file
6c691a
- Ensure D-Bus remote errors are registered at fwupdmgr startup
6c691a
- Fix verify-update to produce components with the correct provide values
6c691a
- Show the dotted-decimal representation of the UEFI version number
6c691a
- Support cabinet archives files with more than one firmware
6c691a
6c691a
* Mon Sep 21 2015 Richard Hughes <richard@hughsie.com> 0.5.1-1
6c691a
- Update to 0.5.1 to fix a bug in the offline updater
6c691a
6c691a
* Tue Sep 15 2015 Richard Hughes <richard@hughsie.com> 0.5.0-1
6c691a
- New upstream release
6c691a
- Do not reboot if racing with the PackageKit offline update mechanism
6c691a
6c691a
* Thu Sep 10 2015 Richard Hughes <richard@hughsie.com> 0.1.6-3
6c691a
- Do not merge the existing firmware metadata with the submitted files
6c691a
6c691a
* Thu Sep 10 2015 Kalev Lember <klember@redhat.com> 0.1.6-2
6c691a
- Own system-update.target.wants directory
6c691a
- Make fwupd-sign obsoletes versioned
6c691a
6c691a
* Thu Sep 10 2015 Richard Hughes <richard@hughsie.com> 0.1.6-1
6c691a
- New upstream release
6c691a
- Add application metadata when getting the updates list
6c691a
- Remove fwsignd, we have the LVFS now
6c691a
6c691a
* Fri Aug 21 2015 Kalev Lember <klember@redhat.com> 0.1.5-3
6c691a
- Disable fwupd offline update service
6c691a
6c691a
* Wed Aug 19 2015 Richard Hughes <richard@hughsie.com> 0.1.5-2
6c691a
- Use the non-beta download URL prefix
6c691a
6c691a
* Wed Aug 12 2015 Richard Hughes <richard@hughsie.com> 0.1.5-1
6c691a
- New upstream release
6c691a
- Add a Raspberry Pi firmware provider
6c691a
- Fix validation of written firmware
6c691a
- Make parsing the option ROM runtime optional
6c691a
- Use the AppStream 0.9 firmware specification by default
6c691a
6c691a
* Sat Jul 25 2015 Richard Hughes <richard@hughsie.com> 0.1.4-1
6c691a
- New upstream release
6c691a
- Actually parse the complete PCI option ROM
6c691a
- Add a 'fwupdmgr update' command to update all devices to latest versions
6c691a
- Add a simple signing server that operates on .cab files
6c691a
- Add a 'verify' command that verifies the cryptographic hash of device firmware
6c691a
6c691a
* Wed Jun 17 2015 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 0.1.3-3
6c691a
- Rebuilt for https://fedoraproject.org/wiki/Fedora_23_Mass_Rebuild
6c691a
6c691a
* Wed Jun 03 2015 Richard Hughes <richard@hughsie.com> 0.1.3-2
6c691a
- Compile with libfwupdate for UEFI firmware support.
6c691a
6c691a
* Thu May 28 2015 Richard Hughes <richard@hughsie.com> 0.1.3-1
6c691a
- New upstream release
6c691a
- Coldplug the devices before acquiring the well known name
6c691a
- Run the offline actions using systemd when required
6c691a
- Support OpenHardware devices using the fwupd vendor extensions
6c691a
6c691a
* Wed Apr 22 2015 Richard Hughes <richard@hughsie.com> 0.1.2-1
6c691a
- New upstream release
6c691a
- Only allow signed firmware to be upgraded without a password
6c691a
6c691a
* Mon Mar 23 2015 Richard Hughes <richard@hughsie.com> 0.1.1-1
6c691a
- New upstream release
6c691a
- Add a 'get-updates' command to fwupdmgr
6c691a
- Add and document the offline-update lifecycle
6c691a
- Create a libfwupd shared library
6c691a
- Create runtime directories if they do not exist
6c691a
- Do not crash when there are no devices to return
6c691a
6c691a
* Mon Mar 16 2015 Richard Hughes <richard@hughsie.com> 0.1.0-1
6c691a
- First release