Thanks for carrying this forward, Francis. Even if we are blocked on the emulator, it's good to know of the doors that become open once we have it in place.
I'm sure it's realised by everyone, but it's important to note that while having the emulator makes this problem tractable, there would be further work needed to ensure that the emulated phones were sufficiently isolated from the rest of the environment, and that control cannot leak back up through the communication channel with the emulator. Out of my own curiosity, how confident of the security model are we in the current arrangement of using a Canonistack Upstream Merger for these? -- Mailing list: https://launchpad.net/~canonical-ci-engineering Post to : [email protected] Unsubscribe : https://launchpad.net/~canonical-ci-engineering More help : https://help.launchpad.net/ListHelp

