Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package fwupd for openSUSE:Factory checked 
in at 2025-01-12 11:10:06
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/fwupd (Old)
 and      /work/SRC/openSUSE:Factory/.fwupd.new.1881 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "fwupd"

Sun Jan 12 11:10:06 2025 rev:88 rq:1236122 version:1.9.27

Changes:
--------
--- /work/SRC/openSUSE:Factory/fwupd/fwupd.changes      2024-10-16 
23:39:02.473684341 +0200
+++ /work/SRC/openSUSE:Factory/.fwupd.new.1881/fwupd.changes    2025-01-12 
11:10:31.873484107 +0100
@@ -1,0 +2,46 @@
+Thu Jan  9 06:38:36 UTC 2025 - Gary Ching-Pang Lin <[email protected]>
+
+- Update fwupd-bsc1130056-change-shim-path.patch to correct the
+  path for shim.efi
+
+-------------------------------------------------------------------
+Mon Dec 23 11:53:48 UTC 2024 - Callum Farmer <[email protected]>
+
+- Correct efi_fw_update arch list:
+  * Remove ppc64le and s390x - these aren't supported
+  * Add armv6hl/armv7hl and riscv64 - support recently added
+
+-------------------------------------------------------------------
+Sat Dec 21 11:01:39 UTC 2024 - [email protected]
+
+- Update to version 1.9.27:
+  + This release fixes the following bugs:
+    - Add a power quirk for Framework systems
+    - Allow cros-ec repair the device after flush failure
+    - Check the VLI USB3 firmware size before erasing
+    - Disallow DBX updates on the Samsung Galaxy Book2 360
+    - Do not show 'Device has been removed' as a dock error
+    - Do not use a CMSE11 function when using CSME18
+    - Fix an unlikely memory leak when using ModemManger Sahara devices
+    - Fix a tiny memory leak in algoltek-usb when checking status
+    - Mark UEFI dbx updates as affecting full disk encryption
+    - Parse FDTs with missing END tokens
+    - Rename the dell-k2 plugin to dell-kestrel and rework the update flow
+  + This release adds support for the following hardware:
+    - Google GID8 Headset
+    - Parade PS188
+    - Primax Ryder Mouse
+    
+- Update to version 1.9.26:
+  + This release fixes the following bugs:
+    - Add HSI tests for Arrow and Meteor Lake CSME
+    - Allow UEFI capsule config values to be set with fwupdmgr modify-config
+    - Check for the logitech-bulkcontroller response packet length correctly
+    - Fix using ID_LIKE for fallback when ESP isn't mounted
+    - Fix various Coverity-reported overflowed constants
+    - Only compare the first 10 characters of the AMD GPU part number
+  + This release adds support for the following hardware:
+    - Jabra PanaCast
+    - Some Lenovo Legion HID devices
+
+-------------------------------------------------------------------

Old:
----
  fwupd-1.9.25.obscpio

New:
----
  fwupd-1.9.27.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ fwupd.spec ++++++
--- /var/tmp/diff_new_pack.7tHK3U/_old  2025-01-12 11:10:34.125576780 +0100
+++ /var/tmp/diff_new_pack.7tHK3U/_new  2025-01-12 11:10:34.141577438 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package fwupd
 #
-# Copyright (c) 2024 SUSE LLC
+# Copyright (c) 2025 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -16,7 +16,7 @@
 #
 
 
-%ifarch %{ix86} x86_64 aarch64 riscv64 s390x ppc64le
+%ifarch %{ix86} x86_64 %{arm} aarch64 riscv64
 %bcond_without efi_fw_update
 %else
 %bcond_with efi_fw_update
@@ -40,7 +40,7 @@
 %define docs 0
 
 Name:           fwupd
-Version:        1.9.25
+Version:        1.9.27
 Release:        0
 Summary:        Device firmware updater daemon
 License:        GPL-2.0-or-later AND LGPL-2.1-or-later
@@ -137,7 +137,9 @@
 Requires:       udisks2
 %endif
 %endif
-Requires:       (fwupd-efi if shim)
+%if %{with efi_fw_update}
+Requires:       fwupd-efi
+%endif
 
 %description
 fwupd is a daemon to allows session software to update device firmware on

++++++ _service ++++++
--- /var/tmp/diff_new_pack.7tHK3U/_old  2025-01-12 11:10:34.329585175 +0100
+++ /var/tmp/diff_new_pack.7tHK3U/_new  2025-01-12 11:10:34.333585339 +0100
@@ -4,7 +4,7 @@
     <param name="url">https://github.com/fwupd/fwupd.git</param>
     <param name="scm">git</param>
     <param name="versionformat">@PARENT_TAG@+@TAG_OFFSET@</param>
-    <param name="revision">1.9.25</param>
+    <param name="revision">1.9.27</param>
     <param name="versionrewrite-pattern">(.*)\+0</param>
     <param name="versionrewrite-replacement">\1</param>
   </service>

++++++ fwupd-1.9.25.obscpio -> fwupd-1.9.27.obscpio ++++++
/work/SRC/openSUSE:Factory/fwupd/fwupd-1.9.25.obscpio 
/work/SRC/openSUSE:Factory/.fwupd.new.1881/fwupd-1.9.27.obscpio differ: char 
48, line 1

++++++ fwupd-bsc1130056-change-shim-path.patch ++++++
--- /var/tmp/diff_new_pack.7tHK3U/_old  2025-01-12 11:10:34.353586162 +0100
+++ /var/tmp/diff_new_pack.7tHK3U/_new  2025-01-12 11:10:34.357586327 +0100
@@ -1,14 +1,13 @@
-diff --git a/plugins/uefi-capsule/fu-uefi-bootmgr.c 
b/plugins/uefi-capsule/fu-uefi-bootmgr.c
-index 9d9e30f..daa9b2c 100644
---- a/plugins/uefi-capsule/fu-uefi-bootmgr.c
-+++ b/plugins/uefi-capsule/fu-uefi-bootmgr.c
-@@ -408,7 +408,8 @@ fu_uefi_bootmgr_bootnext(FuVolume *esp,
+Index: fwupd-1.9.27/plugins/uefi-capsule/fu-uefi-bootmgr.c
+===================================================================
+--- fwupd-1.9.27.orig/plugins/uefi-capsule/fu-uefi-bootmgr.c
++++ fwupd-1.9.27/plugins/uefi-capsule/fu-uefi-bootmgr.c
+@@ -409,7 +409,7 @@ fu_uefi_bootmgr_bootnext(FuVolume *esp,
        /* test if we should use shim */
        secure_boot = fu_efivar_secure_boot_enabled(NULL);
        if (secure_boot) {
--              shim_app = fu_uefi_get_esp_app_path("shim", error);
-+              shim_app = g_strdup_printf ("%s/shim.efi",
-+                                          fu_uefi_get_esp_path_for_os());
+-              shim_app = fu_uefi_get_esp_app_path(esp_path, "shim", error);
++              shim_app = g_strdup_printf ("%s/shim.efi", 
fu_uefi_get_esp_path_for_os(esp_path));
                if (shim_app == NULL)
                        return FALSE;
  

++++++ fwupd-jscSLE-11766-close-efidir-leap-gap.patch ++++++
--- /var/tmp/diff_new_pack.7tHK3U/_old  2025-01-12 11:10:34.389587644 +0100
+++ /var/tmp/diff_new_pack.7tHK3U/_new  2025-01-12 11:10:34.421588960 +0100
@@ -2,12 +2,16 @@
 ===================================================================
 --- fwupd-1.9.14.orig/plugins/uefi-capsule/fu-uefi-common.c
 +++ fwupd-1.9.14/plugins/uefi-capsule/fu-uefi-common.c
-@@ -235,9 +235,13 @@ fu_uefi_get_esp_path_for_os(void)
-       g_autofree gchar *esp_path = NULL;
+@@ -251,6 +251,7 @@
+       g_autofree gchar *full_systemd_path = NULL;
        g_autoptr(GError) error_local = NULL;
-       g_autoptr(GHashTable) os_release = fwupd_get_os_release(&error_local);
+       g_autoptr(GHashTable) os_release = NULL;
 +      g_auto(GStrv) split = NULL;
-       /* try to lookup /etc/os-release ID key */
+ 
+       /* distro (or user) is using systemd-boot */
+       systemd_path = g_build_filename("EFI", "systemd", NULL);
+@@ -262,6 +263,9 @@
+       os_release = fwupd_get_os_release(&error_local);
        if (os_release != NULL) {
                os_release_id = g_hash_table_lookup(os_release, "ID");
 +              /* Overide os_release_id for SLE and openSUSE */

++++++ fwupd.obsinfo ++++++
--- /var/tmp/diff_new_pack.7tHK3U/_old  2025-01-12 11:10:34.553594392 +0100
+++ /var/tmp/diff_new_pack.7tHK3U/_new  2025-01-12 11:10:34.577595380 +0100
@@ -1,5 +1,5 @@
 name: fwupd
-version: 1.9.25
-mtime: 1727252754
-commit: 27221283d513ec79526db0dbc741402b1628753f
+version: 1.9.27
+mtime: 1733407200
+commit: 3c5d0fe54f991cf4316eb1b9ee463fb8ef6441c8
 

Reply via email to