← Back to team overview

touch-packages team mailing list archive

[Bug 1425151] Re: [FFe] implement mechanism for additional access to security policy for snappy

 

This bug was fixed in the package click-apparmor - 0.3.3

---------------
click-apparmor (0.3.3) vivid; urgency=medium

  * implement policy additions for abstractions, policy_groups, read_path
    and write_path and adjust autopkgtests (LP: #1425151)
 -- Jamie Strandboge <jamie@xxxxxxxxxx>   Wed, 25 Feb 2015 16:38:49 -0600

** Changed in: click-apparmor (Ubuntu)
       Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to click-apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1425151

Title:
  [FFe] implement mechanism for additional access to security policy for
  snappy

Status in click-apparmor package in Ubuntu:
  Fix Released

Bug description:
  In order to support hardware access as described in this thread:
  https://lists.ubuntu.com/archives/snappy-devel/2015-January/000134.html

  we need a mechanism to extend the security json. Last cycle, we
  implemented overrides using a .override file. For additional accesses
  we will do something similar, but with a .additional file.

  The branch to implement this adds many tests and maintains 100% test
  coverage (python coverage). autopkgtests are also added. Packages and
  build logs are available in https://launchpad.net/~ubuntu-security-
  proposed/+archive/ubuntu/ppa/+packages.

  Testing:
  - https://wiki.ubuntu.com/Process/Merges/TestPlans/ClickAppArmor: PASS
  - internal testsuite: PASS
  - autopkgtest: PASS
  - manual testing on snappy to verify it implements the feature: PASS

  The click-apparmor test plan covers Touch. These changes are not used
  by anything on the touch images.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/click-apparmor/+bug/1425151/+subscriptions


References