Problem / Justification
TrueNAS Community and Enterprise both rely heavily on modern security features such as encrypted datasets, TPM‑based unlocking, secure boot, and external key‑interchange systems. Despite this, the platform still lacks a consistent, OS‑native method for updating the firmware of the hardware it depends on.
Today, NICs, HBAs, NVMe drives, expanders, TPMs, and system firmware all require different vendor‑specific tools — many of which only run on Windows or require bootable ISOs. This leaves users without a safe, unified, or auditable way to keep critical firmware current.
With TrueNAS Connect now providing multi‑appliance visibility, the absence of firmware lifecycle management is becoming more noticeable. fwupd already supports many of these device classes (including TPM firmware) and uses signed metadata that aligns with TrueNAS’s existing trust and security model. Integrating it would close a long‑standing gap and bring firmware into the same lifecycle as software updates, encryption, and key‑management.
Impact
A unified firmware‑update mechanism would:
-
reduce uncertainty for Community users
-
give Enterprise deployments a predictable, auditable way to maintain security‑critical components
-
strengthen the overall trust chain by ensuring TPM firmware updates follow the same signed‑metadata model used for secure boot and dataset encryption
-
allow TrueNAS Connect to display firmware status across appliances, highlight drift, and support update policies
-
provide Plus and Business tiers with policy controls such as maintenance windows, staged rollouts, and HA‑aware sequencing
Involvement with fwupd/LVFS or the Linux Foundation would also help ensure long‑term sustainability and give iXsystems influence over standards that TrueNAS increasingly depends on.
The main drawback is the engineering effort required to integrate fwupd safely with ZFS and HA workflows — but the long‑term benefits outweigh the cost.
User Story
A user managing several TrueNAS appliances logs into TrueNAS Connect and sees a clear list of firmware versions for each system: NICs, HBAs, NVMe drives, TPM, and system firmware. One appliance shows outdated TPM firmware with a security fix available.
The user opens the appliance view, reviews the fwupd‑provided details, and schedules the update for the next maintenance window. In a Plus or Business tier, the user applies a policy so that firmware and software updates only occur during defined hours and roll out to one node at a time.
The update runs with the usual TrueNAS safeguards — pools exported, HA node idle — and the TPM firmware is updated using signed metadata. The appliance reports back to Connect, and the fleet view shows all systems back in compliance.
Proposed Implementation
1. Integrate fwupd as a system service within TrueNAS SCALE
-
Package fwupd as part of the base OS, running in a restricted, non‑networked mode.
-
Expose only the necessary device‑update functionality, with iX‑controlled configuration.
-
Disable unsupported or risky plugins by default to ensure predictable behaviour.
2. Add a TrueNAS middleware layer for safe orchestration
-
Middlewared would act as the gatekeeper, validating update metadata, device compatibility, and system state.
-
Updates would only proceed when pools are exported, HA nodes are idle, and no critical tasks are running.
-
Middleware would log all firmware actions for auditability.
3. Extend the Web UI with a dedicated Firmware Management page
-
Show detected devices, current firmware versions, and available updates.
-
Provide per‑device update controls and a unified “Check for Updates” action.
-
Include warnings, rollback notes (where supported), and links to vendor advisories.
4. Integrate with TrueNAS Connect for fleet‑level visibility
-
Connect would collect firmware inventory from each appliance.
-
Drift detection would highlight systems with outdated or mismatched firmware.
-
Policies could define maintenance windows, staged rollouts, and HA‑aware sequencing for Plus/Business tiers.
5. Use LVFS as the trusted upstream source
-
TrueNAS would rely on LVFS’s signed metadata, which aligns with the platform’s existing trust model.
-
iXsystems could optionally maintain a curated mirror or whitelist to ensure only approved updates are offered.
-
For devices not yet supported by LVFS, iX could work with vendors to onboard them.
6. Provide a safe fallback path for unsupported hardware
-
For devices without fwupd support, TrueNAS could offer guidance or vendor‑specific instructions.
-
Over time, iX could help expand fwupd plugin support for common TrueNAS hardware.