[Bug 1630040] Re: [SRU] update to 1.0.42

2016-10-07 Thread Jamie Strandboge
** Description changed:

  This is a collective tracking bug for snap-confine SRU to version 1.0.42
  as released in yakkety.
  
  [Impact]
  
  The release includes multiple changes. For details see all the bugs on
  the following milestones:
  
+ https://launchpad.net/snap-confine/trunk/1.0.43
  https://launchpad.net/snap-confine/trunk/1.0.42
  https://launchpad.net/snap-confine/trunk/1.0.41
  https://launchpad.net/snap-confine/trunk/1.0.40
  https://launchpad.net/snap-confine/trunk/1.0.39
  
  Because of the way SRUs were handled before many of those bugs are
  currently fixed in xenial (they were added as patches to the .38 version
  that is released there now.
  
  Most of the bugs there have SRU meta-data (except for milestone .42).
  Please consult individual bugs for detailed impact assessment. Overall
  the impact is major as some new features are included but they were
  tested in yakkety as well as in the extensive snap testing machinery
  (both snapd and snap-confine include multiple spread tests)
  
  [Test Case]
  
  Likewise test cases are attached to individual bugs. Please make note of
  the fact that test case are always designed to run as root (this is not
  stated explicitly in other places).
  
  [Regression Potential]
  
  See impact. This was tested heavily in spread but there might be edge
  cases we've missed. The most important change is the introduction of
  namespace sharing for the mount namespace. This is described in depth
  here:
  
  https://bugs.launchpad.net/snappy/+bug/1611444
  
  [Other Info]
  
  Snap-confine is a part of snapd which is under special exception to
  allow new features in SRUs.
  
  For more details please see https://wiki.ubuntu.com/SnapdUpdates

** Summary changed:

- [SRU] update to 1.0.42
+ [SRU] update to 1.0.43

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1630040

Title:
  [SRU] update to 1.0.43

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snap-confine/+bug/1630040/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1630040] Re: [SRU] update to 1.0.42

2016-10-04 Thread Andy Whitcroft
Hello Jamie, or anyone else affected,

Accepted snap-confine into xenial-proposed. The package will build now
and be available at https://launchpad.net/ubuntu/+source/snap-
confine/1.0.42-0ubuntu3~16.04.1 in a few hours, and then in the
-proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed.  Your feedback will aid us getting this update
out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, and change the tag
from verification-needed to verification-done. If it does not fix the
bug for you, please add a comment stating that, and change the tag to
verification-failed.  In either case, details of your testing will help
us make a better decision.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance!

** Changed in: snap-confine (Ubuntu Xenial)
   Status: In Progress => Fix Committed

** Tags added: verification-needed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1630040

Title:
  [SRU] update to 1.0.42

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snap-confine/+bug/1630040/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1630040] Re: [SRU] update to 1.0.42

2016-10-04 Thread Zygmunt Krynicki
** Description changed:

- TODO:
+ This is a collective tracking bug for snap-confine SRU to version 1.0.42
+ as released in yakkety.
  
  [Impact]
  
-  * An explanation of the effects of the bug on users and
+ The release includes multiple changes. For details see all the bugs on
+ the following milestones:
  
-  * justification for backporting the fix to the stable release.
+ https://launchpad.net/snap-confine/trunk/1.0.42
+ https://launchpad.net/snap-confine/trunk/1.0.41
+ https://launchpad.net/snap-confine/trunk/1.0.40
+ https://launchpad.net/snap-confine/trunk/1.0.39
  
-  * In addition, it is helpful, but not required, to include an
-explanation of how the upload fixes this bug.
+ Because of the way SRUs were handled before many of those bugs are
+ currently fixed in xenial (they were added as patches to the .38 version
+ that is released there now.
+ 
+ Most of the bugs there have SRU meta-data (except for milestone .42).
+ Please consult individual bugs for detailed impact assessment. Overall
+ the impact is major as some new features are included but they were
+ tested in yakkety as well as in the extensive snap testing machinery
+ (both snapd and snap-confine include multiple spread tests)
  
  [Test Case]
  
-  * detailed instructions how to reproduce the bug
- 
-  * these should allow someone who is not familiar with the affected
-package to reproduce the bug and verify that the updated package fixes
-the problem.
+ Likewise test cases are attached to individual bugs. Please make note of
+ the fact that test case are always designed to run as root (this is not
+ stated explicitly in other places).
  
  [Regression Potential]
  
-  * discussion of how regressions are most likely to manifest as a result
- of this change.
+ See impact. This was tested heavily in spread but there might be edge
+ cases we've missed. The most important change is the introduction of
+ namespace sharing for the mount namespace. This is described in depth
+ here:
  
-  * It is assumed that any SRU candidate patch is well-tested before
-upload and has a low overall risk of regression, but it's important
-to make the effort to think about what ''could'' happen in the
-event of a regression.
- 
-  * This both shows the SRU team that the risks have been considered,
-and provides guidance to testers in regression-testing the SRU.
+ https://bugs.launchpad.net/snappy/+bug/1611444
  
  [Other Info]
-  
-  * Anything else you think is useful to include
-  * Anticipate questions from users, SRU, +1 maintenance, security teams and 
the Technical Board
-  * and address these questions in advance
+ 
+ Snap-confine is a part of snapd which is under special exception to
+ allow new features in SRUs. Please see individual bugs for details.

** Description changed:

  This is a collective tracking bug for snap-confine SRU to version 1.0.42
  as released in yakkety.
  
  [Impact]
  
  The release includes multiple changes. For details see all the bugs on
  the following milestones:
  
  https://launchpad.net/snap-confine/trunk/1.0.42
  https://launchpad.net/snap-confine/trunk/1.0.41
  https://launchpad.net/snap-confine/trunk/1.0.40
  https://launchpad.net/snap-confine/trunk/1.0.39
  
  Because of the way SRUs were handled before many of those bugs are
  currently fixed in xenial (they were added as patches to the .38 version
  that is released there now.
  
  Most of the bugs there have SRU meta-data (except for milestone .42).
  Please consult individual bugs for detailed impact assessment. Overall
  the impact is major as some new features are included but they were
  tested in yakkety as well as in the extensive snap testing machinery
  (both snapd and snap-confine include multiple spread tests)
  
  [Test Case]
  
  Likewise test cases are attached to individual bugs. Please make note of
  the fact that test case are always designed to run as root (this is not
  stated explicitly in other places).
  
  [Regression Potential]
  
  See impact. This was tested heavily in spread but there might be edge
  cases we've missed. The most important change is the introduction of
  namespace sharing for the mount namespace. This is described in depth
  here:
  
  https://bugs.launchpad.net/snappy/+bug/1611444
  
  [Other Info]
  
  Snap-confine is a part of snapd which is under special exception to
- allow new features in SRUs. Please see individual bugs for details.
+ allow new features in SRUs.
+ 
+ For more details please see https://wiki.ubuntu.com/SnapdUpdates

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1630040

Title:
  [SRU] update to 1.0.42

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snap-confine/+bug/1630040/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1630040] Re: [SRU] update to 1.0.42

2016-10-03 Thread Jamie Strandboge
** Description changed:

- TODO...
+ TODO:
+ 
+ [Impact]
+ 
+  * An explanation of the effects of the bug on users and
+ 
+  * justification for backporting the fix to the stable release.
+ 
+  * In addition, it is helpful, but not required, to include an
+explanation of how the upload fixes this bug.
+ 
+ [Test Case]
+ 
+  * detailed instructions how to reproduce the bug
+ 
+  * these should allow someone who is not familiar with the affected
+package to reproduce the bug and verify that the updated package fixes
+the problem.
+ 
+ [Regression Potential]
+ 
+  * discussion of how regressions are most likely to manifest as a result
+ of this change.
+ 
+  * It is assumed that any SRU candidate patch is well-tested before
+upload and has a low overall risk of regression, but it's important
+to make the effort to think about what ''could'' happen in the
+event of a regression.
+ 
+  * This both shows the SRU team that the risks have been considered,
+and provides guidance to testers in regression-testing the SRU.
+ 
+ [Other Info]
+  
+  * Anything else you think is useful to include
+  * Anticipate questions from users, SRU, +1 maintenance, security teams and 
the Technical Board
+  * and address these questions in advance

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1630040

Title:
  [SRU] update to 1.0.42

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snap-confine/+bug/1630040/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs