-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Fri, 21 Nov 2025 11:54:27 +0000
Source: snapd
Architecture: source
Version: 2.72-1
Distribution: unstable
Urgency: medium
Maintainer: Michael Hudson-Doyle <[email protected]>
Changed-By: Zygmunt Krynicki <[email protected]>
Changes:
 snapd (2.72-1) unstable; urgency=medium
 .
   [ Ernest Lotter ]
   * New upstream release, LP: #2124239
     - FDE: support replacing TPM protected keys at runtime via the
       /v2/system-volumes endpoint
     - FDE: support secboot preinstall check fix actions for 25.10+
       hybrid installs via the /v2/system/{label} endpoint
     - FDE: tweak polkit message to remove jargon
     - FDE: ensure proper sealing with kernel command line defaults
     - FDE: provide generic reseal function
     - FDE: support using OPTEE for protecting keys, as an alternative to
       existing fde-setup hooks (Ubuntu Core only)
     - Confdb: 'snapctl get --view' supports passing default values
     - Confdb: content sub-rules in confdb-schemas inherit their parent
       rule's "access"
     - Confdb: make confdb error kinds used in API more generic
     - Confdb: fully support lists and indexed paths (including unset)
     - Prompting: add notice backend for prompting types (unused for now)
     - Prompting: include request cgroup in prompt
     - Prompting: handle unsupported xattrs
     - Prompting: add permission mapping for the camera interface
     - Notices: read notices from state without state lock
     - Notices: add methods to get notice fields and create, reoccur, and
       deepcopy notice
     - Notices: add notice manager to coordinate separate notice backends
     - Notices: support draining notices from state when notice backend
       registered as producer of a particular notice type
     - Notices: query notice manager from daemon instead of querying
       state for notices directly
     - Packaging: Ubuntu | ignore .git directory
     - Packaging: FIPS | bump deb Go FIPS to 1.23
     - Packaging: snap | bump FIPS toolchain to 1.23
     - Packaging: debian | sync most upstream changes
     - Packaging: debian-sid | depends on libcap2-bin for postint
     - Packaging: Fedora | drop fakeroot
     - Packaging: snap | modify snapd.mk to pass build tags when running
       unit tests
     - Packaging: snap | modify snapd.mk to pass nooptee build tag
     - Packaging: modify Makefile.am to fix snap-confine install profile
       with 'make hack'
     - Packaging: modify Makefile.am to fix out-of-tree use of 'make
       hack'
     - LP: #2122054 Snap installation: skip snap icon download when
       running in a cloud or using a proxy store
     - Snap installation: add timeout to http client when downloading
       snap icon
     - Snap installation: use http(s) proxy for icon downloads
     - LP: #2117558 snap-confine: fix error message with /root/snap not
       accessible
     - snap-confine: fix non-suid limitation by switching to root:root to
       operate v1 freezer
     - core-initrd: do not use writable-paths when not available
     - core-initrd: remove debian folder
     - LP: #1916244 Interfaces: gpio-chardev | re-enable the gpio-chardev
       interface now with the more robust gpio-aggregator configfs kernel
       interface
     - Interfaces: gpio-chardev | exclusive snap connections, raise a
       conflict when both gpio-chardev and gpio are connected
     - Interfaces: gpio-chardev | fix gpio-aggregator module load order
     - Interfaces: ros-snapd-support | grant access to /v2/changes
     - Interfaces: uda-driver-libs, egl-driver-libs, gbm-driver-libs,
       opengl-driver-libs, opengles-driver-libs | new interfaces to
       support nvidia driver components
     - Interfaces: microstack-support | allow DPDK (hugepage related
       permissions)
     - Interfaces: system-observe | allow reading additional files in
       /proc, needed by node-exporter
     - Interfaces: u2f | add Cano Key, Thesis FIDO2 BioFP+ Security Key
       and Kensington VeriMark DT Fingerprint Key to device list
     - Interfaces: snap-interfaces-requests-control | allow shell API
       control
     - Interfaces: fwupd | allow access to Intel CVS sysfs
     - Interfaces: hardware-observe | allow read access to Kernel
       Samepage Merging (KSM)
     - Interfaces: xilinx-dma | support Multi Queue DMA (QDMA) IP
     - Interfaces: spi | relax sysfs permission rules to allow access to
       SPI device node attributes
     - Interfaces: content | introduce compatibility label
     - LP: #2121238 Interfaces: do not expose Kerberos tickets for
       classic snaps
     - Interfaces: ssh-public-keys | allow ro access to public host keys
       with ssh-key
     - Interfaces: Modify AppArmor template to allow listing systemd
       credentials and invoking systemd-creds
     - Interfaces: modify AppArmor template with workarounds for Go 1.35
       cgroup aware GOMAXPROCS
     - Interfaces: modify seccomp template to allow landlock_*
     - Prevent snap hooks from running while relevant snaps are unlinked
     - Make refreshes wait before unlinking snaps if running hooks can be
       affected
     - Fix systemd unit generation by moving "WantedBy=" from section
       "unit" to "install"
     - Add opt-in logging support for snap-update-ns
     - Unhide 'snap help' sign and export-key under Development category
     - LP: #2117121 Cleanly support socket activation for classic snap
     - Add architecture to 'snap version' output
     - Add 'snap debug api' option to disable authentication through
       auth.json
     - Show grade in notes for 'snap info --verbose'
     - Fix preseeding failure due to scan-disk issue on RPi
     - Support 'snap debug api' queries to user session agents
     - LP: #2112626 Improve progress reporting for snap install/refresh
     - Drop legacy BAMF_DESKTOP_FILE_HINT in desktop files
     - Fix /v2/apps error for root user when user services are present
     - LP: #2114704 Extend output to indicate when snap data snapshot was
       created during remove
     - Improve how we handle emmc volumes
     - Improve handling of system-user extra assertions
Checksums-Sha1:
 ed2c7fd621a5f950406214bf675aac754f780ff3 3443 snapd_2.72-1.dsc
 8fb028369a43c83b055aee3cd1099ad033e1e27b 8473088 snapd_2.72.orig.tar.xz
 0f687bb9f0e5ca44bd44dafd2d852b2591dcbe92 151224 snapd_2.72-1.debian.tar.xz
 1c667eec4ce3abfda01cbe97a522b02ea88294f3 12490 snapd_2.72-1_source.buildinfo
Checksums-Sha256:
 1a898b3e469ee3b9095e50c0e7dafd803c0a0d1736391c17ce6b1efea2134960 3443 
snapd_2.72-1.dsc
 47589a5b5638a5b1a8ef280e640dead5abe1c39ad1fc5836b17124ef7698b094 8473088 
snapd_2.72.orig.tar.xz
 5e7a0656bba9bff3a796a49987f0f3ad08d57203de1920460e0e403854d7dd47 151224 
snapd_2.72-1.debian.tar.xz
 a6b3ed6df62aa6da754122e4286cc03ed2f0980a72fb03e3b7025e90b8ce71e5 12490 
snapd_2.72-1_source.buildinfo
Files:
 1ff83f829b0f4416b03d6090ad8fd190 3443 devel optional snapd_2.72-1.dsc
 567c770a9843d81b15a4feeaed4f714e 8473088 devel optional snapd_2.72.orig.tar.xz
 6bc611626c5e96a6ece1280eabcb11e1 151224 devel optional 
snapd_2.72-1.debian.tar.xz
 125c654979f2e25deff48d7f0d30e66c 12490 devel optional 
snapd_2.72-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=WBuA
-----END PGP SIGNATURE-----

Attachment: pgpLps_BFBi09.pgp
Description: PGP signature

Reply via email to