version 1.12, 2021/10/17 20:29:01 |
version 1.16, 2021/10/18 00:18:02 |
|
|
VERSION="${VNAME%.*}${VNAME#*.}" |
VERSION="${VNAME%.*}${VNAME#*.}" |
FWDIR="$VNAME" |
FWDIR="$VNAME" |
|
|
|
# TODO: We need the firmware for the system we just installed |
|
# not the one we booted from. For example: |
|
# * booting from a snapshot bsd.rd that thinks it is the 7.0 release |
|
# will install the firmware from the 7.0 directory instead of |
|
# from the snapshots dir. |
|
# If they're using sysupgrade, then the installer kernel will be correct. |
|
# If we're doing this in the installer we can check what they picked |
|
# for downloading sets and use that value. |
|
# Otherwise, the fw_update after first boot will fix it up for us. |
|
|
HTTP_FWDIR=$FWDIR |
HTTP_FWDIR=$FWDIR |
set -- $(scan_dmesg "/^OpenBSD $VNAME\([^ ]*\).*$/s//\1/p") |
set -- $(scan_dmesg "/^OpenBSD $VNAME\([^ ]*\).*$/s//\1/p") |
[[ $1 == -!(stable) ]] && HTTP_FWDIR=snapshots |
[[ $1 == -!(stable) ]] && HTTP_FWDIR=snapshots |
|
|
PATTERNS="file:${0%/*}/firmware_patterns" |
PATTERNS="file:${0%/*}/firmware_patterns" |
|
|
fw_update() { |
fw_update() { |
local _tmpsrc _f _remove _r |
local _tmpsrc _f _r _remove _i _installed |
local _src=$FWURL _t=Get _cfile="/tmp/SHA256" _srclocal=false |
local _src=$FWURL _t=Get _cfile="/tmp/SHA256" _srclocal=false |
local _drivers=$( |
local _d _drivers=$( |
last='' |
last='' |
ftp -D "Detecting" -Vmo- $PATTERNS | |
ftp -D "Detecting" -Vmo- $PATTERNS | |
while read d m; do |
while read _d _m; do |
grep=grep |
grep=grep |
[ "$last" = "$d" ] && continue |
[ "$last" = "$_d" ] && continue |
[ "$m" ] || m="^$d[0-9][0-9]* at " |
[ "$_m" ] || _m="^$_d[0-9][0-9]* at " |
[ "$m" = "${m#^}" ] && grep=fgrep |
[ "$_m" = "${_m#^}" ] && grep=fgrep |
$grep -q "$m" /var/run/dmesg.boot || continue |
$grep -q "$_m" /var/run/dmesg.boot || continue |
echo $d |
echo $_d |
last=$d |
last=$_d |
done |
done |
) |
) |
|
|
|
|
[[ ! -d $_tmpsrc ]] && |
[[ ! -d $_tmpsrc ]] && |
_issue="Cannot create prefetch area" && fail |
_issue="Cannot create prefetch area" && fail |
|
|
|
# Cleanup from previous runs. |
|
rm -f $_cfile $_cfile.sig |
|
|
! $_unpriv ftp -D "$_t" -Vmo - "$_src/SHA256.sig" >"$_cfile.sig" && |
! $_unpriv ftp -D "$_t" -Vmo - "$_src/SHA256.sig" >"$_cfile.sig" && |
_issue="Cannot fetch SHA256.sig" && fail |
_issue="Cannot fetch SHA256.sig" && fail |
|
|
|
|
signify -Vep $FWPUB_KEY -x "$_cfile.sig" -m "$_cfile" && |
signify -Vep $FWPUB_KEY -x "$_cfile.sig" -m "$_cfile" && |
_issue="Signature check of SHA256.sig failed" && fail |
_issue="Signature check of SHA256.sig failed" && fail |
|
|
for d in $_drivers; do |
for _d in $_drivers; do |
_f=$( sed -n "s/.*(\($d-firmware-.*\.tgz\)).*/\1/p" "$_cfile" ) |
_f=$( sed -n "s/.*(\($_d-firmware-.*\.tgz\)).*/\1/p" "$_cfile" ) |
installed=$( installed_firmware "$d" ) |
_installed=$( installed_firmware "$_d" ) |
|
|
for i in $installed; do |
for _i in $_installed; do |
if [ "$_f" = "$i.tgz" ]; then |
if [ "$_f" = "$_i.tgz" ]; then |
echo "Firmware for $d already installed ($installed)" |
echo "Firmware for $_d already installed ($_installed)" |
continue 2 |
continue 2 |
fi |
fi |
done |
done |
|
|
|
|
while read c g; do |
while read c g; do |
case $c in |
case $c in |
@cwd) cwd=$g |
@cwd) cwd="${DESTDIR}/$g" |
;; |
;; |
@*) continue |
@*) continue |
;; |
;; |
|
|
# TODO: Add some details about the install to +CONTENTS like pkg_add |
# TODO: Add some details about the install to +CONTENTS like pkg_add |
# TODO: Or, maybe we save the firmware someplace and make pkg_add reinstall |
# TODO: Or, maybe we save the firmware someplace and make pkg_add reinstall |
echo "Installing $_f" |
echo "Installing $_f" |
tar -zxphf "$_tmpsrc/$_f" -C /etc "firmware/*" |
tar -zxphf "$_tmpsrc/$_f" -C "${DESTDIR}/etc" "firmware/*" |
mkdir -p ${PKGDIR}/${_f%.tgz}/ |
mkdir -p ${PKGDIR}/${_f%.tgz}/ |
tar -zxphf "$_tmpsrc/$_f" -C "${PKGDIR}/${_f%.tgz}" "+*" |
tar -zxphf "$_tmpsrc/$_f" -C "${PKGDIR}/${_f%.tgz}" "+*" |
ed -s "${PKGDIR}/${_f%.tgz}/+CONTENTS" <<EOL |
ed -s "${PKGDIR}/${_f%.tgz}/+CONTENTS" <<EOL |