All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
- rename project to
solo1-cli
- rename CLI to
solo1
- keep
solo
name for library - have old
solo-python
on PyPI depend onsolo1
- fix build @innir
- UDP simulator is back @stevenwdv
- bump flit versions
- leave the patch-only versioning
- pin argument for make-credential @HeroicKatora
- Replace old python-fido2 internal method used with fix from @enrikb
- Fix some typos in last release @enrikb
- Upgraded to new 0.9.1 fido2 library
- Removed use of serial_number if it's not present in upstream fido2 library
- Removed use of UDP communication
- bumped isort version to >=5.0.0 and changed Makefile accordingly, see Upgrading isort to 5.0.0
- pin fido2 dep to 0.8 series @uli-heller
- improve programming robustness @enrikb
- prompt for PIN in
solo key verify
, if needed @enrikb
- fix bungled reference to
STABLE_VERSION
file
- credential management commands @rgerganov
- static password vendor command @rgerganov
- sign-file vendor command @rgerganov
- typo @lolaum
- use
main
as main branch
- Add command to disable bootloader-access / updates on Solo devices
- Improve admin/root/udev warning for Linux and Windows
- Add ping command
- Fix Timeout
- Fix fallout of move to fido2 0.8
- Update to use python-fido2 v0.8
- Add fingerprints for checking more Solo model certificates (Tap, Somu, Solo)
- Attestation key marker in mergehex operation
solo key set-pin
andchange-pin
commands.
- When signing, signatures were incorrectly annotated with
2.3.0
version. updated to2.5.3
.
- remove
--hacker
and--secure
options when auto-updating. - pull
firmware-*.json
instead of choosing between hacker and secure
- option to specify attestation certificate with attestation key
- mergehex operation adds in attestation certificate
- mergehex operation adds in lock status with
--lock
flag
- attestation key requires associate attestation cert
- sign operation adds 2 signatures for 2 different versions of solo bootloader
- solo version attempts to uses HID version command to additionally see lock status of key.
solo.hmac_secret.make_credential
method- separate
solo key make-credential
CLI target
- remove credential generation from
solo.hmac_secret.simple_secret
- demand
credential_id
insolo key challenge-response
- challenge-response via
hmac-secret
- implement passing PIN to
solo key verify
- update fido2 to 0.7.0
- adjust to and pin fido2 0.6.0 dependency (@conorpp)
- only warn if run as sudo
- solo client improvements
- experimental interface to feed kernel entropy from key:
sudo ALLOW_ROOT= /path/to/solo key rng feedkernel
- enforce
solo
command does not run as root
solo key probe
interface
- fixes to set options bytes to leave DFU mode
- Exit properly on boot to bootloader failure
--alpha
flag forupdate
- Fix bootloader-version command (@Thor77)
- Reboot to bootloader in
program
if necessary
- yes flag for
update
- Typo
- Monkey-patch to communicate via UDP with software key
- Flag
--udp
to use it for certainsolo key
commands
- Serial number support
- Initial feedback from solokeys/solo1#113
- Enforce passing exactly one of
--hacker|--secure
insolo key update
- Bugfix in
solo.dfu
- Minor improvements
- Fix broken
solo program dfu
command - Remove
solotool
script installation - Add Python version classifiers
- Implement
solo key update [--hacker]
- Forgot to add some files in last release
- Add client/dfu find_all methods
- Add
solo ls
command
- More implementation of
solo program aux
(mode changes) - Implement
solo program bootloader
. - More comments
- Implements part of
solo program dfu
andsolo program aux
- Adds Conor's change allowing to pass in raw devices to DFU+SoloClient
- Unwrap genkey from CLI to operations
- Everything moved out of solotool, except programming chunk
- Start redo of CLI using click
- Bugfixes related to refactor
- Start to split out commands, helpers and client
- Initial import of
solotool.py
script from solo