Activity log for bug #1425151

Date Who What changed Old value New value Message
2015-02-24 16:00:20 Jamie Strandboge bug added bug
2015-02-24 16:01:01 Jamie Strandboge click-apparmor (Ubuntu): status New In Progress
2015-02-24 16:01:12 Jamie Strandboge click-apparmor (Ubuntu): importance Undecided High
2015-02-24 16:01:15 Jamie Strandboge click-apparmor (Ubuntu): assignee Jamie Strandboge (jdstrand)
2015-02-24 16:02:47 Jamie Strandboge branch linked lp:~jdstrand/click-apparmor/click-apparmor.hw-access
2015-02-25 22:42:58 Jamie Strandboge description In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added and all pass. TODO: click-apparmor test plan. In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added and all pass. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: TODO - internal testsuite: PASS - autopkgtest: TODO - manual testing on snappy to verify it implements the feature
2015-02-25 22:45:34 Jamie Strandboge description In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added and all pass. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: TODO - internal testsuite: PASS - autopkgtest: TODO - manual testing on snappy to verify it implements the feature In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added and all pass. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: INPROGRESS - internal testsuite: PASS - autopkgtest: PASS - manual testing on snappy to verify it implements the feature: PASS
2015-02-25 22:51:42 Jamie Strandboge description In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added and all pass. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: INPROGRESS - internal testsuite: PASS - autopkgtest: PASS - manual testing on snappy to verify it implements the feature: PASS In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: INPROGRESS - internal testsuite: PASS - autopkgtest: PASS - manual testing on snappy to verify it implements the feature: PASS
2015-02-25 23:20:28 Jamie Strandboge description In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: INPROGRESS - internal testsuite: PASS - autopkgtest: PASS - manual testing on snappy to verify it implements the feature: PASS In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: INPROGRESS - internal testsuite: PASS - autopkgtest: PASS - manual testing on snappy to verify it implements the feature: PASS The click-apparmor test plan covers Touch. These changes are not used by anything on the touch images.
2015-02-26 14:29:20 Jamie Strandboge description In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: INPROGRESS - internal testsuite: PASS - autopkgtest: PASS - manual testing on snappy to verify it implements the feature: PASS The click-apparmor test plan covers Touch. These changes are not used by anything on the touch images. In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: PASS - internal testsuite: PASS - autopkgtest: PASS - manual testing on snappy to verify it implements the feature: PASS The click-apparmor test plan covers Touch. These changes are not used by anything on the touch images.
2015-02-26 14:31:01 Jamie Strandboge description In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: PASS - internal testsuite: PASS - autopkgtest: PASS - manual testing on snappy to verify it implements the feature: PASS The click-apparmor test plan covers Touch. These changes are not used by anything on the touch images. In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added. Packages are available in https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: PASS - internal testsuite: PASS - autopkgtest: PASS - manual testing on snappy to verify it implements the feature: PASS The click-apparmor test plan covers Touch. These changes are not used by anything on the touch images.
2015-02-26 14:31:13 Jamie Strandboge description In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added. Packages are available in https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: PASS - internal testsuite: PASS - autopkgtest: PASS - manual testing on snappy to verify it implements the feature: PASS The click-apparmor test plan covers Touch. These changes are not used by anything on the touch images. In order to support hardware access as described in this thread: https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html we need a mechanism to extend the security json. Last cycle, we implemented overrides using a .override file. For additional accesses we will do something similar, but with a .additional file. The branch to implement this adds many tests and maintains 100% test coverage (python coverage). autopkgtests are also added. Packages and build logs are available in https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages. Testing: - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: PASS - internal testsuite: PASS - autopkgtest: PASS - manual testing on snappy to verify it implements the feature: PASS The click-apparmor test plan covers Touch. These changes are not used by anything on the touch images.
2015-02-26 14:31:46 Jamie Strandboge summary [FFe] implement mechanism for adding access to security policy [FFe] implement mechanism for additional access to security policy for snappy
2015-02-26 14:31:55 Jamie Strandboge bug added subscriber Ubuntu Release Team
2015-02-26 14:32:36 Jamie Strandboge click-apparmor (Ubuntu): status In Progress Confirmed
2015-02-26 15:10:54 Scott Kitterman click-apparmor (Ubuntu): status Confirmed Triaged
2015-02-26 17:28:39 Launchpad Janitor branch linked lp:ubuntu/vivid-proposed/click-apparmor
2015-02-26 17:52:47 Launchpad Janitor click-apparmor (Ubuntu): status Triaged Fix Released