From patchwork Wed Feb 21 18:05:29 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Michael Adler X-Patchwork-Id: 1902298 X-Patchwork-Delegate: sbabic@denx.de Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=googlegroups.com header.i=@googlegroups.com header.a=rsa-sha256 header.s=20230601 header.b=XJwblTs4; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=googlegroups.com (client-ip=2a00:1450:4864:20::23b; helo=mail-lj1-x23b.google.com; envelope-from=swupdate+bncbclp7i7wwmhrbgpx3cxamgqeainda7a@googlegroups.com; receiver=patchwork.ozlabs.org) Received: from mail-lj1-x23b.google.com (mail-lj1-x23b.google.com [IPv6:2a00:1450:4864:20::23b]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4Tg43668K3z23d5 for ; Thu, 22 Feb 2024 05:06:25 +1100 (AEDT) Received: by mail-lj1-x23b.google.com with SMTP id 38308e7fff4ca-2d22ff0aad9sf36976761fa.2 for ; Wed, 21 Feb 2024 10:06:25 -0800 (PST) ARC-Seal: i=3; a=rsa-sha256; t=1708538778; cv=pass; d=google.com; s=arc-20160816; b=XoUpbzmYjaKCKvRhPXUeurGUGsZ2K/bXFor0Ab7MWiFDw1YFmIgtvKFJy7vl8u6ice wbBpa7RSvrfMkGgDlWTWiyh6EiMfx+W1LhjttQ0MEH7vx7l6aFUPLphoTcFmQCzIohGu 2u76Aeukn5kdtMASFsdonWUmFoTA0GLpthEmb/OV2JRqjyKaDEiz+M6YK5CtVDlxhHh3 2nmLTZ0VeAch/xHCMYYyqDXncO2FRFhv2hQqlfyKCQinrdywtehjwv81BNFvuoag5cI7 fHxyapPM4WIKPVjFyqIK5Tdz53l3iIqNnUXL489VGEhnngjIY5jaWN9rV1I8QJSPjAZg HjsQ== ARC-Message-Signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:reply-to:mime-version :content-transfer-encoding:message-id:date:subject:cc:to:from :dkim-signature; bh=2nW/pwH6I7c6aZbwB3TstrMAz2Da6SX9vDpyrXMj6VU=; fh=7PbqACBZIi7URyYJVhs61CGPelnlkkR+TPzvOQOojSo=; b=kedEJzLvJ2aVsx6uIUzt+yGe1mf3wSmvmFkxBjoqJqsxHpm2MhctdvzKrQ+yB0FSy4 jhiq+FBGpjq2beaJBMLObAuP4XIkeKtSdhX/cTM487zQrwuW7deRB58oo2UXZoEWIog2 QnmNSjDmlCi4PYhmASZ4AcoTPtZDnguSvSCSxVtnFgujk3vnRViGdyj0QQP/eALZDglN 5LtICvUYcLiz6Mhqh+LJ7HDS1ekIzRvZhOwZsRwcEkvXvwq/J+45BNDh+6aErvHIR6R/ OKH/3RErsQa28875Cj5SVaBxWnaHFk2199Wa2uPTpYVDsNK5AiC4gSHwCgd3IXbEV2ra HIyg==; darn=patchwork.ozlabs.org ARC-Authentication-Results: i=3; gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=selector2 header.b=ZaiWFnT2; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of michael.adler@siemens.com designates 2a01:111:f400:fe1e::60d as permitted sender) smtp.mailfrom=michael.adler@siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlegroups.com; s=20230601; t=1708538778; x=1709143578; darn=patchwork.ozlabs.org; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:reply-to :x-original-authentication-results:x-original-sender:mime-version :content-transfer-encoding:message-id:date:subject:cc:to:from:from :to:cc:subject:date:message-id:reply-to; bh=2nW/pwH6I7c6aZbwB3TstrMAz2Da6SX9vDpyrXMj6VU=; b=XJwblTs4Kh+xnwna3kjt31zpjUnfoQEak0eriWe/mSV9JhiU9RrncNIPtVoowFqcR3 Bed9JCMV8a70nPJE/PH/3KmEG/oFdxIOexSWmbtnZwkTpfmQyPp/+f9ogbmwtQH3B60O dC1OI+95nTqSOFZL87MVUe2lTMyHAQoEmVk0FxGi+9WBYr6JqyM0OA/vAOV7i7HmPlgm h/+p1OiEEy5n9FrHYREGkozh0EB9TEVwGHfaEfQz2HBwFB7s6pLzIq4fdng//MvsD63D 3ClpvrV0j0NO3Gb6cYZHxEWXZEccMAUt+T0B7PM6qbkbGQ2IR2ER4kKL5xLQmSoGeIOl YSQA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1708538778; x=1709143578; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :x-spam-checked-in-group:list-id:mailing-list:precedence:reply-to :x-original-authentication-results:x-original-sender:mime-version :content-transfer-encoding:message-id:date:subject:cc:to:from :x-beenthere:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=2nW/pwH6I7c6aZbwB3TstrMAz2Da6SX9vDpyrXMj6VU=; b=bWMSwfr7haKkcRE78gHLpcIcqh6GKWAWPnbrEBlPQ5umC4B8SlN8t5FEXHG3tkRDK1 u1qZCSWCHJJbikoRxtjF6lwxWXafbRIipoHhVNoldTM6xAyUN7tNewo+6Ygw99323TwL n7vCu6/WintXTgCtstbbPqP5w6SqvTbmZjBGK5DH34/aXs88LUvmvxeiv0WigmrCekGZ J/4xs6b/ROTQl7fYHd6LpVOP8qjJaHHx273ZVNV0Fd+Cki5LQR9ewdqKGTJfoh6O/IzP 7WRS4gZ8TPNO7RxUHYFKASHRYGSBoLK2kPsA4cg1E7zRy0/MjVqF/pVAepXt+GWyLjvb RHMw== X-Forwarded-Encrypted: i=3; AJvYcCVeuPwxkDIlqpLZpab8r/g2kFMdBxlr1Qtvsy0Gd05bJEGPYVpW31Cp1kYsWPeU2JSGVZBL/h0F40Bg5HpVh29GecpXp+QegVaSgIBQDQ== X-Gm-Message-State: AOJu0YxRaN1X6MmimfFZzxB2+qJbWpZoR9NpIxgXYFgAUzHkYHxLGkLa DSu3aClpalN78/ZDcARg0WAwIKJED/l+okqM3cmEiEiCuNrkP0XS X-Google-Smtp-Source: AGHT+IHOrJ/YibW+6TvVd5UEogoCakpu7zDfTdRiRwf39zVCUxPj62ZW2I2VxNTE8QxzSk3hSxA3pQ== X-Received: by 2002:a2e:a716:0:b0:2d2:413a:4063 with SMTP id s22-20020a2ea716000000b002d2413a4063mr5083319lje.43.1708538777946; Wed, 21 Feb 2024 10:06:17 -0800 (PST) X-BeenThere: swupdate@googlegroups.com Received: by 2002:a2e:a4c5:0:b0:2d2:4480:de0a with SMTP id p5-20020a2ea4c5000000b002d24480de0als360997ljm.1.-pod-prod-04-eu; Wed, 21 Feb 2024 10:06:15 -0800 (PST) X-Received: by 2002:a05:651c:1043:b0:2d2:329f:7a7e with SMTP id x3-20020a05651c104300b002d2329f7a7emr8138975ljm.6.1708538775471; Wed, 21 Feb 2024 10:06:15 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708538775; cv=pass; d=google.com; s=arc-20160816; b=ZC5/o3U4zdHYKRVroXPA+8jgU8sInPKtjz2cfTWKuvtDWIVmLz6GN3AcjwJR0WXVq0 wlg9hmeCWV5QdVa4WiK12v9E+Zw3Z5osKp3K6UBTmg/zuBkLdoEnedn7t7MWLv2F80/p pIkr8+0jeNxF6ta4wmUhy26bbhMhNVqdN9XeI20tHiziiNiC46Xw13JWevJ/kxwuaVl+ ZP1pIHapMBW2zS2H1g95X/ZrT5XcC+JEB+gyTV5okpW+05vS8Tp9+ll/YMbs7bD+OHp2 Ajoamv4jvJKY+Sc801ca3/uztYL1uiat1P0wUSzm/H9YKgBpsFEfgiWGKhgH9u8sz1l1 j6Dw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:content-transfer-encoding:message-id:date:subject:cc :to:from:dkim-signature; bh=iG1TiFkDVSca+Fki4rwWp00VD6ynM3aCjuCEv0tMz9U=; fh=GrQWgLgt0quleRr6oESwL+HHFhFuQlBITu5P+WzyrJ0=; b=Byw5wq13K1EJo6VZeKXZcWN4cqZU9zemy+uHWQH2MmfPB0dtaP3RxvrFGaFT0fVE2r Y7XHJlpP03mHIguSjZtTAnHtp3CPYLtIks8toLVgoNspUgEkz976f0Uy54Fv/P+4YxJd 8EewJnJ9iXUKGBENah8vogsnhQEYgunIpw7JodGDivh6XRIko+zoDW/j6xKWiJ8AcIJN Wgy35hh9vwYQAXhdwsl6EVORND1KHJ1Rgbt49YOmzG2MQcmrU/4sdYL4mZ2bjEONVMpE Y0OCKw7EKnQhCszS8veo2D/aB7ee7h7LjuiK71SlMHWVuTnDt4q44N2v5VU/IfKPzn+4 2Gjw==; dara=google.com ARC-Authentication-Results: i=2; gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=selector2 header.b=ZaiWFnT2; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of michael.adler@siemens.com designates 2a01:111:f400:fe1e::60d as permitted sender) smtp.mailfrom=michael.adler@siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on060d.outbound.protection.outlook.com. [2a01:111:f400:fe1e::60d]) by gmr-mx.google.com with ESMTPS id l13-20020a05600c4f0d00b004126ebe1087si55292wmq.1.2024.02.21.10.06.15 for (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Wed, 21 Feb 2024 10:06:15 -0800 (PST) Received-SPF: pass (google.com: domain of michael.adler@siemens.com designates 2a01:111:f400:fe1e::60d as permitted sender) client-ip=2a01:111:f400:fe1e::60d; ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ILpRV0tOiVxtny1bboe2ChrtP5DnxA37AUavKrsuxDYBeHkq2eo1tugixFkJPaj09uPlX7gIOXOsGzCfT3OsuywNDZdvCdcNr1rmH3FvuIl7LDs1pIXrW6wad1ySHhsJ3/FZ97MKUM580P3cLONUkppE56/khj39yeJxGlTFTUzw4QgQYglI0BjdYYXm65NjONLqEyIkWcuIAofcDQSkK4mqClRW+AA09Y2mntrdx5HpsidEls4QTQ23bWiXyZcAwLMSBd5eqPvyE3guS2bWPWj5c6vwwJTYmHIZqLjIHpuEpMch8vE+9Bm0JGWSeypdzFSDRjVmlZZdu7cmpZQHrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=iG1TiFkDVSca+Fki4rwWp00VD6ynM3aCjuCEv0tMz9U=; b=GxG5bLZ29gpxpGDiUo26wqx3M5J8R9uqM5mCbkUEtYm+HRZhCaNTacSwdYWfFqAOIWJHAvbfSKTX7vNuespsnFoY5K5K/2dFacmXPQ5I9f97TfGtMPCqXqE/4TVTw2moLhh83CDqzzsa3ZKQmKGrID42ztXU7Vm3zYRZqjLbHdghh3UNV7Njs0q7Mt9uFFtH4fbFN5MEkYNSuQW6FJnjYl+wPbqruPIeP6vOXQqdguCmh2OMDcQL9UErNSmBEv7I2iFKiU1wQ6QX8sAKSynmplc+zGa5IcicL/sOSoVJ9IGDbqx/fQPNLeJKrf096RjyvcyT4nr8mhvBr4DM773K2A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=siemens.com; dmarc=pass action=none header.from=siemens.com; dkim=pass header.d=siemens.com; arc=none Received: from PAXPR10MB4734.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:102:12e::15) by AS8PR10MB6271.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:20b:560::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7316.22; Wed, 21 Feb 2024 18:06:13 +0000 Received: from PAXPR10MB4734.EURPRD10.PROD.OUTLOOK.COM ([fe80::7720:2de0:b5f0:63aa]) by PAXPR10MB4734.EURPRD10.PROD.OUTLOOK.COM ([fe80::7720:2de0:b5f0:63aa%7]) with mapi id 15.20.7292.033; Wed, 21 Feb 2024 18:06:13 +0000 X-Patchwork-Original-From: "'Michael Adler' via swupdate" From: Michael Adler To: swupdate@googlegroups.com Cc: Christian Storm , Michael Adler Subject: [swupdate] [PATCH 1/3] suricatta/lua: Update specification Date: Wed, 21 Feb 2024 19:05:29 +0100 Message-ID: <20240221180540.37058-1-michael.adler@siemens.com> X-Mailer: git-send-email 2.43.0 X-ClientProxiedBy: FR3P281CA0179.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:a0::16) To PAXPR10MB4734.EURPRD10.PROD.OUTLOOK.COM (2603:10a6:102:12e::15) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: PAXPR10MB4734:EE_|AS8PR10MB6271:EE_ X-MS-Office365-Filtering-Correlation-Id: 1a490c8e-742d-4b0a-1d7c-08dc3307ca95 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PAXPR10MB4734.EURPRD10.PROD.OUTLOOK.COM;PTR:;CAT:NONE;SFS:(13230031);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?q?ytKVlyU+44uKdiZNWRdpAHVbVz6w?= =?utf-8?q?nxWy6ex5sdMUrcl1UJq9pBYNj8Rju9cH/hHrDgCoP3XIl9lUPVH7BPugN5CS8xaBY?= =?utf-8?q?miSRqEVCRPyq8kWNKALBV7mJ5e+2L3zgDkWbWiwx4SomBlTDxwl7zHFRjD/T+1g0v?= =?utf-8?q?wwAYJgd4rivwxtY4pzKs5Kc2yuf7xrw0tWuIG4ac2JBbVxL+fd7dc+VwxvJBNttNZ?= =?utf-8?q?2payxGw7AQOhIpivqwhRwUww3riWXrV7IOfs/kWIb9cGHCyXiz1m0gAlryG8NY7gp?= =?utf-8?q?5FZ3jjECkDnwMmtthe0/N2bxSWRovYcwU29vgYDkzok0z2KsM6frzaH4RBYYTkiu+?= =?utf-8?q?zLD6X7JSPAKguNdmlcgrevb7nHG9x82pObxif7FK8OkQPqKI/vQzdf6DMOI+dMmpH?= =?utf-8?q?uRKuOQJsID/0fLl7J5VholaC1cqJkqi5jI0Y+5I+RZHekQ9hMJZSoh7lJlk9XskxH?= =?utf-8?q?C8hmN8q4egQ8e+yMb47bcIXy8/uSGmDraZxydqLcrtZkmEW8xJxJNBhbgwbqX1Xo9?= =?utf-8?q?G8+tffI4XkE7Ryd45IPGHMuxeus8wHo1FlDbHW+WhLjmBFUEU3LMtbfbNvPeqbuL3?= =?utf-8?q?Eel1mM//OuequfMwA1xchuRf0B2Ho923Arn7waqBQyEyD6J2IcntAecpS6PMnS3Wh?= =?utf-8?q?KowU5jUI7wqc8mDXk3x6iIi6ijnGkXGq6NzG1HyDZvNwBv0WdgUO1R0uQP2QZ/l3d?= =?utf-8?q?VX8my0osj9Kaiwh353BZywriyZ/FG+3f0mIH4qt2RT87TQFbNoI/GuC04U3UjmL4L?= =?utf-8?q?pUT5hCaIyM/kylhHaNhPqwcaVYleL2oobeXbOe0ipXv5z33PcTmnB9PGUeWNpN1SL?= =?utf-8?q?EkmHNPyrH3LlqwJDdzx7tps9R7M9dlGU5D/jXDjZu9uIDv9R9y4wtSgIC9T8a9bsP?= =?utf-8?q?yFl1yZ/wiOB23HzEX9N2WZd6e147L1PFMUQ6Gjh8KJHKPqrSzCXNyxH+LxxFCg/NV?= =?utf-8?q?ATySxnqoXHRsG7HsEK7IS+ZLRYomxPIHnMcknbzwpmVqXtzmdGGDka4OjOmMFqeOH?= =?utf-8?q?FbtUZVdOr6vATk2oLMHAkf0V+YaNpfg4JYwgjmIbOi0/mkUZrVwwyXljoJmFn/MpU?= =?utf-8?q?2XtSGtRaznH6n7jaR9rA5f87/ryqM/IfCQb3HspPFw2tr2YW3WyaVDYgcapwsOeb3?= =?utf-8?q?mAgmvX7/NWuwULeZnixtHPebQlW4UBWcp0AlIBHiyk1jI558+dKCBsUewkoLtzkvg?= =?utf-8?q?BPS/niepMM1dC7/IFYgRhy80TPPNveFxODUxmvEFyvckYtmg0L2VeaunPTnY+TKnf?= =?utf-8?q?2f8bkIz+igetmb/Ea8Jr8rUR6NDZC3FQ+HsP5G7JG2EiIE566YtSGLStC3+qhf9bl?= =?utf-8?q?58osihHbEtCizLAVksAlh+bACgwC1YF6qwNobvgN/+RpDSjtyDSUZDNW7ymMV67y7?= =?utf-8?q?luLD/f9QlFyDuF8FmNut/o3U7PshjyHrhfbYy3EuNoQagtNmxqkAF4VNfWKrzx/VC?= =?utf-8?q?GZZ9ecFY+M1wDibK4Agbu10Vkzg3mBAldpWWRxC5SycnN5as0B1YjxlhLSrorOv6I?= =?utf-8?q?Zv8L9Di3CD5bxBNgRpXLBMtvaN01xb6kLQ=3D=3D?= X-OriginatorOrg: siemens.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1a490c8e-742d-4b0a-1d7c-08dc3307ca95 X-MS-Exchange-CrossTenant-AuthSource: PAXPR10MB4734.EURPRD10.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Feb 2024 18:06:13.7557 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 38ae3bcd-9579-4fd4-adda-b42e1495d55a X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: KqJB9tsnGvfbXmBPf9LbbAF4HJEuM23KfbzOovD3Mtbg2a2cIaRb/nij4QVKPgHYrMg1je1iBxM++AwQ3mUnTFqDRCEbGL9nFFea9qET+nQ= X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR10MB6271 X-Original-Sender: Michael.Adler@siemens.com X-Original-Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@siemens.com header.s=selector2 header.b=ZaiWFnT2; arc=pass (i=1 spf=pass spfdomain=siemens.com dkim=pass dkdomain=siemens.com dmarc=pass fromdomain=siemens.com); spf=pass (google.com: domain of michael.adler@siemens.com designates 2a01:111:f400:fe1e::60d as permitted sender) smtp.mailfrom=michael.adler@siemens.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=siemens.com X-Original-From: Michael Adler Reply-To: Michael Adler Precedence: list Mailing-list: list swupdate@googlegroups.com; contact swupdate+owners@googlegroups.com List-ID: X-Spam-Checked-In-Group: swupdate@googlegroups.com X-Google-Group-Id: 605343134186 List-Post: , List-Help: , List-Archive: , List-Unsubscribe: , From: Christian Storm LuaLS recently implemented stricter inference checks. Adapt the Suricatta Lua Module Interface Specification. Signed-off-by: Christian Storm Signed-off-by: Michael Adler --- suricatta/suricatta.lua | 70 ++++++++++++++++++++--------------------- 1 file changed, 35 insertions(+), 35 deletions(-) diff --git a/suricatta/suricatta.lua b/suricatta/suricatta.lua index 6a4fa131..303e8639 100644 --- a/suricatta/suricatta.lua +++ b/suricatta/suricatta.lua @@ -77,11 +77,6 @@ suricatta.bootloader = { GRUB = "grub", UBOOT = "uboot", }, - - --- Operations on the currently set bootloader's environment. - -- - --- @class suricatta.bootloader.env - env = {} } --- Get currently set bootloader's name. @@ -95,6 +90,11 @@ suricatta.bootloader.get = function() end --- @return boolean # True if `name` is currently set bootloader, false otherwise suricatta.bootloader.is = function(name) end +--- Operations on the currently set bootloader's environment. +-- +--- @class suricatta.bootloader.env +suricatta.bootloader.env = {} + --- Get value of a bootloader environment variable. -- --- @param variable string Name of the bootloader environment variable to get value for @@ -222,33 +222,33 @@ suricatta.channel = { --- Channel options as in `include/channel_curl.h`. -- --- @class suricatta.channel.options - --- @field url string `CURLOPT_URL` - URL for this transfer - --- @field cached_file string Resume download from cached file at path - --- @field auth string `CURLOPT_USERPWD` - user name and password to use in authentication - --- @field request_body string Data to send to server for `PUT` and `POST` - --- @field iface string `CURLOPT_INTERFACE` - source interface for outgoing traffic - --- @field dry_run boolean `swupdate_request`'s dry_run field as in `include/network_ipc.h` - --- @field cafile string `CURLOPT_CAINFO` - path to Certificate Authority (CA) bundle - --- @field sslkey string `CURLOPT_SSLKEY` - private key file for TLS and SSL client cert - --- @field sslcert string `CURLOPT_SSLCERT` - SSL client certificate - --- @field ciphers string `CURLOPT_SSL_CIPHER_LIST` - ciphers to use for TLS - --- @field proxy string `CURLOPT_PROXY` - proxy to use - --- @field info string `swupdate_request`'s info field as in `include/network_ipc.h` - --- @field auth_token string String appended to Header - --- @field content_type string `Content-Type:` and `Accept:` appended to Header - --- @field retry_sleep number Time to wait prior to retry and resume a download - --- @field method suricatta.channel.method Channel transfer method to use - --- @field retries number Maximal download attempt count - --- @field low_speed_timeout number `CURLOPT_LOW_SPEED_TIME` - low speed limit time period - --- @field connection_timeout number `CURLOPT_CONNECTTIMEOUT` - timeout for the connect phase - --- @field format suricatta.channel.content Content type passed over the channel - --- @field debug boolean Set channel debug logging - --- @field usessl boolean Enable SSL hash sum calculation - --- @field strictssl boolean `CURLOPT_SSL_VERIFYHOST` + `CURLOPT_SSL_VERIFYPEER` - --- @field nocheckanswer boolean Whether the reply is interpreted/logged and tried to be parsed - --- @field nofollow boolean `CURLOPT_FOLLOWLOCATION` - follow HTTP 3xx redirects - --- @field max_download_speed string `CURLOPT_MAX_RECV_SPEED_LARGE` - rate limit data download speed - --- @field headers_to_send table Header to send + --- @field url string | nil `CURLOPT_URL` - URL for this transfer + --- @field cached_file string | nil Resume download from cached file at path + --- @field auth string | nil `CURLOPT_USERPWD` - user name and password to use in authentication + --- @field request_body string | nil Data to send to server for `PUT` and `POST` + --- @field iface string | nil `CURLOPT_INTERFACE` - source interface for outgoing traffic + --- @field dry_run boolean | nil `swupdate_request`'s dry_run field as in `include/network_ipc.h` + --- @field cafile string | nil `CURLOPT_CAINFO` - path to Certificate Authority (CA) bundle + --- @field sslkey string | nil `CURLOPT_SSLKEY` - private key file for TLS and SSL client cert + --- @field sslcert string | nil `CURLOPT_SSLCERT` - SSL client certificate + --- @field ciphers string | nil `CURLOPT_SSL_CIPHER_LIST` - ciphers to use for TLS + --- @field proxy string | nil `CURLOPT_PROXY` - proxy to use + --- @field info string | nil `swupdate_request`'s info field as in `include/network_ipc.h` + --- @field auth_token string | nil String appended to Header + --- @field content_type string | nil `Content-Type:` and `Accept:` appended to Header + --- @field retry_sleep number | nil Time to wait prior to retry and resume a download + --- @field method suricatta.channel.method | nil Channel transfer method to use + --- @field retries number | nil Maximal download attempt count + --- @field low_speed_timeout number | nil `CURLOPT_LOW_SPEED_TIME` - low speed limit time period + --- @field connection_timeout number | nil `CURLOPT_CONNECTTIMEOUT` - timeout for the connect phase + --- @field format suricatta.channel.content | nil Content type passed over the channel + --- @field debug boolean | nil Set channel debug logging + --- @field usessl boolean | nil Enable SSL hash sum calculation + --- @field strictssl boolean | nil `CURLOPT_SSL_VERIFYHOST` + `CURLOPT_SSL_VERIFYPEER` + --- @field nocheckanswer boolean | nil Whether the reply is interpreted/logged and tried to be parsed + --- @field nofollow boolean | nil `CURLOPT_FOLLOWLOCATION` - follow HTTP 3xx redirects + --- @field max_download_speed string | nil `CURLOPT_MAX_RECV_SPEED_LARGE` - rate limit data download speed + --- @field headers_to_send table | nil Header to send options = {}, --- Open a new channel. @@ -267,9 +267,9 @@ suricatta.channel = { -- and specific options to the download / installation operation, e.g., `drain_messages`. -- --- @class suricatta.operation_channel ---- @field channel suricatta.open_channel Channel table as returned by `suricatta.channel.open()` ---- @field drain_messages? boolean Whether to flush all progress messages or only those while in-flight operation (default) ---- @field ∈? suricatta.channel.options Channel options to override for this operation +--- @field channel suricatta.open_channel Channel table as returned by `suricatta.channel.open()` +--- @field drain_messages boolean | nil Whether to flush all progress messages or only those while in-flight operation (default) +--- @field ∈ suricatta.channel.options | nil Channel options to override for this operation --- Install an update artifact from remote server or local file. --