[Bug 1620159] Re: [MIR] snapd-glib

2016-11-02 Thread Matthias Klose
Override component to main snapd-glib 1.2-0ubuntu2 in zesty: universe/libs -> main gir1.2-snapd-1 1.2-0ubuntu2 in zesty amd64: universe/libs/optional/100% -> main gir1.2-snapd-1 1.2-0ubuntu2 in zesty arm64: universe/libs/optional/100% -> main gir1.2-snapd-1 1.2-0ubuntu2 in zesty armhf: universe/lib

[Bug 1620159] Re: [MIR] snapd-glib

2016-10-12 Thread Seth Arnold
Thanks Robert; if you've got login privs on the gnome bugzilla please consider adding a comment to let them know they'd have a consumer for Unix socket HTTP if they implemented it. (It seems like a funny thing to miss, we're surely not the first nor the last to want this.) Thanks -- You received

[Bug 1620159] Re: [MIR] snapd-glib

2016-10-12 Thread Robert Ancell
SnapdAuthData fixes in revisions 148-149. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1620159 Title: [MIR] snapd-glib To manage notifications about this bug go to: https://bugs.launchpad.net/ubun

[Bug 1620159] Re: [MIR] snapd-glib

2016-10-12 Thread Robert Ancell
SnapdAuthData should always contain a valid Macaroon and discharges. It's created in three possible ways: - On the result of a v2/login request - On the result of a D-Bus call to snapd-login-service - By the user In normal operation it shouldn't be possible to have an invalid SnapdAuthData, but I

[Bug 1620159] Re: [MIR] snapd-glib

2016-10-12 Thread Michael Terry
** Changed in: snapd-glib (Ubuntu) Status: Triaged => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1620159 Title: [MIR] snapd-glib To manage notifications about this bug go to

[Bug 1620159] Re: [MIR] snapd-glib

2016-10-11 Thread Seth Arnold
I reviewed snapd-glib version 0.14-0ubuntu1 as checked into yakkety. This shouldn't be considered a full security audit; in fact, it was entirely too hasty due to external time pressures. Most calls appeared to check for error returns. I found a few instances that didn't: - send_request() doesn't

[Bug 1620159] Re: [MIR] snapd-glib

2016-09-06 Thread Robert Ancell
** Description changed: [Availability] In Universe. [Rationale] - Required to get non-root snapd working in gnome-software (bug 1616943) and for further gnome-software improvements. Also expected to be used by other project to access snapd. + Required to get non-root snapd working in gn

[Bug 1620159] Re: [MIR] snapd-glib

2016-09-06 Thread Michael Terry
Fine from a packaging POV. But with a root daemon, even a tiny proxy one, it should still have a security check. ** Changed in: snapd-glib (Ubuntu) Assignee: (unassigned) => Ubuntu Security Team (ubuntu-security) -- You received this bug notification because you are a member of Ubuntu Bugs