This bug was fixed in the package apparmor-easyprof-ubuntu - 1.0.32 --------------- apparmor-easyprof-ubuntu (1.0.32) saucy; urgency=low * accounts: - needs lock ('k') access to .config/libaccounts-glib/accounts.db and read access to .config/libaccounts-glib/accounts.db*. - read access to /usr/share/accounts/** - deny write to .config/libaccounts-glib/accounts.db* (LP: #1220552) * refine audio policy group: - remove /tmp/ accesses now that TMPDIR is set by the sandbox - allow access to only the native socket (ie, disallow dbus-socket (only needed by pacmd), access to pid and the cli debugging socket) (LP: #1211380) - remove 'w' access to /{,var/}run/user/*/pulse/ - this should already exist when click apps run - remove /dev/binder, no longer needed now that we use audio HAL and pulseaudio - silence the denial for creating ~/.gstreamer-0.10/ if it doesn't exist * camera: - add rw for /dev/ashmem. This will go away when camera moves to HAL - rw /run/shm/hybris_shm_data - add read on /android/system/media/audio/ui/camera_click.ogg * connectivity: - add policy as used by QML's QtSystemInfo and also Qt's QHostAddress, QNetworkInterface - add commented out rules for ofono (LP: 1226844) * finalize content_exchange policy for the content-hub. We now have two different policy groups: content_exchange for requesting/importing data and content_exchange_source for providing/exporting data * microphone: - remove /dev/binder, no longer needed now that we use audio HAL and pulseaudio - add gstreamer and pulseaudio accesses and silence ALSA denials (we force pulseaudio). Eventually we should consolidate these and the ones in audio into a separate abstraction. * networking - explicitly deny access to NetworkManager. This technically should be needed at all, but depending on how apps connect, the lowlevel libraries get NM involved. Do the same for ofono - add access to the download manager (LP: #1227860) * video: add gstreamer accesses. Eventually we should consolidate these and the ones in audio into a gstreamer abstraction * add the following new reserved policy groups (reserved because they need integration with trust-store to be used by untrusted apps): - calendar - to access /org/gnome/evolution/dataserver/SourceManager, /org/gnome/evolution/dataserver/CalendarFactory and /org/gnome/evolution/dataserver/Calendar/** - contacts - to access com.canonical.pim and org.freedesktop.Telepathy. Note, org.freedesktop.Telepathy will go away when LP: 1227818 is fixed - history - to access com.canonical.HistoryService * remove unused policy groups. This would normally constitute a new minor version, but no one is using these yet. When there is an API to use for this sort of thing, we can reintroduce them - read_connectivity_details - bluetooth (no supported Qt5 API for these per the SDK team) - nfc (no supported Qt5 API for these per the SDK team) * ubuntu* templates: - remove workaround HUD rule for DBus access to hud/applications/* now that the HUD is fixed. - allow connecting to dbus-daemon system daemon (org.freedesktop.DBus) for Hello, GetNameOwner, NameHasOwner, AddMatch and RemoveMatch which are all currently used when connecting to the network depending on the application API used. Allow the accesses to silence the denials: they are harmless and allows us to add more allow rules for other policy groups for system bus APIs down the line (as opposed to if we explicitly denied the accesses to org.freedesktop.DBus). - add more Nexus 7 accesses * ubuntu-sdk template: - remove workaround access for /tmp/*.sci now that TMPDIR is set (LP: #1197047) - remove workaround access for /var/tmp/etilqs_* now that TMPDIR is set (LP: #1197049) - add support for HTC vision thanks to Florian Will (LP: #1214975) * ubuntu-webapp template: use only application specific directories rather then the global webbrowser-app one (LP: #1226085) * debian/rules: enable tests during build * debian/control: Build-Depends on python3-minimal (for tests) * apparmor-easyprof-ubuntu.postinst: run aa-clickhook -f if it is available -- Jamie Strandboge