Activity log for bug #1597842

Date Who What changed Old value New value Message
2016-06-30 16:36:31 Zygmunt Krynicki bug added bug
2016-06-30 16:36:39 Zygmunt Krynicki bug task added snappy
2016-06-30 16:39:29 Zygmunt Krynicki tags snapd-interfaces
2016-07-01 15:13:57 Evan bug added subscriber Evan Dandrea
2016-07-15 12:00:07 Zygmunt Krynicki snap-confine: status New Confirmed
2016-07-15 12:00:15 Zygmunt Krynicki snappy: status New Confirmed
2016-07-15 12:00:18 Zygmunt Krynicki snappy: importance Undecided Wishlist
2016-07-15 12:00:20 Zygmunt Krynicki snap-confine: importance Undecided Wishlist
2016-08-01 16:02:16 Jamie Strandboge snap-confine: assignee Jamie Strandboge (jdstrand)
2016-08-01 16:02:18 Jamie Strandboge snappy: assignee Jamie Strandboge (jdstrand)
2016-08-03 17:30:00 Jamie Strandboge snappy: assignee Jamie Strandboge (jdstrand)
2016-08-03 17:30:03 Jamie Strandboge snappy: importance Wishlist Undecided
2016-08-03 17:30:08 Jamie Strandboge snappy: status Confirmed Invalid
2016-08-03 17:31:07 Jamie Strandboge snap-confine: status Confirmed In Progress
2016-08-03 17:31:12 Jamie Strandboge snap-confine: importance Wishlist Medium
2016-08-03 17:31:18 Jamie Strandboge snap-confine: importance Medium High
2016-08-08 13:36:29 Jamie Strandboge snap-confine: status In Progress Fix Committed
2016-08-22 09:46:30 Zygmunt Krynicki snap-confine: milestone 1.0.40
2016-08-22 11:42:04 Zygmunt Krynicki snap-confine: status Fix Committed Fix Released
2016-09-06 12:57:17 Martin Pitt bug task added snap-confine (Ubuntu)
2016-09-06 12:57:29 Martin Pitt nominated for series Ubuntu Xenial
2016-09-06 12:57:29 Martin Pitt bug task added snap-confine (Ubuntu Xenial)
2016-09-06 12:58:06 Martin Pitt snap-confine (Ubuntu): status New Fix Released
2016-09-06 12:58:08 Martin Pitt snap-confine (Ubuntu Xenial): status New Fix Committed
2016-09-06 12:58:10 Martin Pitt bug added subscriber Ubuntu Stable Release Updates Team
2016-09-06 12:58:14 Martin Pitt bug added subscriber SRU Verification
2016-09-06 12:58:19 Martin Pitt tags snapd-interfaces snapd-interfaces verification-needed
2016-09-20 10:32:13 Zygmunt Krynicki description This issue is a fork of https://bugs.launchpad.net/snap-confine/+bug/1584394 The reported there required access to /usr/src having the sources for the kernel headers. I think this is something that could be handled by a dedicated interface or perhaps directly with the new content-sharing interface. We would have to be careful on how this works but on classic we could expose /usr/src this way. [Impact] Snaps (even in running in devmode) cannot access the /usr/src directory. This bug is fixed by adding /usr/src to a list of directories that are bind mounted and thus visible to snaps in their execution environment. For more information about the execution environment, please see this article http://www.zygoon.pl/2016/08/snap-execution-environment.html [Test Case] The test case can be found here: https://github.com/snapcore/snap-confine/blob/master/spread-tests/regression/lp-1597842/task.yaml The test case is ran automatically for each pull request and for each final release. It can be reproduced manually by executing the shell commands listed in the prepare/execute/restore phases manually. The commands there assume that snapd and snap-confine are installed. No other additional setup is necessary. [Regression Potential] * Regression potential is minimal as the fix simply adds another directory to a list of directories that needs to be bind mounted. * The fix was tested on Ubuntu via spread and on several other distributions successfully. [Other Info] * This bug is a part of a major SRU that brings snap-confine in Ubuntu 16.04 in line with the current upstream release 1.0.41. * This bug was included in an earlier SRU and is now fixed in Ubuntu. I am updating the template here to ensure that the process is fully documented from 1.0.38 all the way up to the current upstream release 1.0.41. * snap-confine is technically an integral part of snapd which has an SRU exception and is allowed to introduce new features and take advantage of accelerated procedure. For more information see https://wiki.ubuntu.com/SnapdUpdates == # Pre-SRU bug description follows # == This issue is a fork of https://bugs.launchpad.net/snap-confine/+bug/1584394 The reported there required access to /usr/src having the sources for the kernel headers. I think this is something that could be handled by a dedicated interface or perhaps directly with the new content-sharing interface. We would have to be careful on how this works but on classic we could expose /usr/src this way.
2016-09-27 14:03:29 Zygmunt Krynicki description [Impact] Snaps (even in running in devmode) cannot access the /usr/src directory. This bug is fixed by adding /usr/src to a list of directories that are bind mounted and thus visible to snaps in their execution environment. For more information about the execution environment, please see this article http://www.zygoon.pl/2016/08/snap-execution-environment.html [Test Case] The test case can be found here: https://github.com/snapcore/snap-confine/blob/master/spread-tests/regression/lp-1597842/task.yaml The test case is ran automatically for each pull request and for each final release. It can be reproduced manually by executing the shell commands listed in the prepare/execute/restore phases manually. The commands there assume that snapd and snap-confine are installed. No other additional setup is necessary. [Regression Potential] * Regression potential is minimal as the fix simply adds another directory to a list of directories that needs to be bind mounted. * The fix was tested on Ubuntu via spread and on several other distributions successfully. [Other Info] * This bug is a part of a major SRU that brings snap-confine in Ubuntu 16.04 in line with the current upstream release 1.0.41. * This bug was included in an earlier SRU and is now fixed in Ubuntu. I am updating the template here to ensure that the process is fully documented from 1.0.38 all the way up to the current upstream release 1.0.41. * snap-confine is technically an integral part of snapd which has an SRU exception and is allowed to introduce new features and take advantage of accelerated procedure. For more information see https://wiki.ubuntu.com/SnapdUpdates == # Pre-SRU bug description follows # == This issue is a fork of https://bugs.launchpad.net/snap-confine/+bug/1584394 The reported there required access to /usr/src having the sources for the kernel headers. I think this is something that could be handled by a dedicated interface or perhaps directly with the new content-sharing interface. We would have to be careful on how this works but on classic we could expose /usr/src this way. [Impact] Snaps (even in running in devmode) cannot access the /usr/src directory. This bug is fixed by adding /usr/src to a list of directories that are bind mounted and thus visible to snaps in their execution environment. For more information about the execution environment, please see this article http://www.zygoon.pl/2016/08/snap-execution-environment.html [Test Case] The test case can be found here: https://github.com/snapcore/snap-confine/blob/master/spread-tests/regression/lp-1597842/task.yaml The test case is ran automatically for each pull request and for each final release. It can be reproduced manually by executing the shell commands listed in the prepare/execute/restore phases manually. The commands there assume that snapd and snap-confine are installed. No other additional setup is necessary. [Regression Potential]  * Regression potential is minimal as the fix simply adds another directory to a list of directories that needs to be bind mounted. * The fix was tested on Ubuntu via spread and on several other distributions successfully. [Other Info] * This bug is a part of a major SRU that brings snap-confine in Ubuntu 16.04 in line with the current upstream release 1.0.41. * snap-confine is technically an integral part of snapd which has an SRU exception and is allowed to introduce new features and take advantage of accelerated procedure. For more information see https://wiki.ubuntu.com/SnapdUpdates == # Pre-SRU bug description follows # == This issue is a fork of https://bugs.launchpad.net/snap-confine/+bug/1584394 The reported there required access to /usr/src having the sources for the kernel headers. I think this is something that could be handled by a dedicated interface or perhaps directly with the new content-sharing interface. We would have to be careful on how this works but on classic we could expose /usr/src this way.
2016-09-27 15:03:32 Zygmunt Krynicki tags snapd-interfaces verification-needed snapd-interfaces verification-done
2016-09-27 15:43:34 Launchpad Janitor snap-confine (Ubuntu Xenial): status Fix Committed Fix Released
2016-09-27 15:43:53 Andy Whitcroft removed subscriber Ubuntu Stable Release Updates Team