[00:30] PR snapcraft#3738 closed: extensions/desktop: preload bindtextdomain from snap first if it exists [00:40] PR snapcraft#3744 closed: cli: enable craft-store logging [05:38] PR snapd#11804 opened: interfaces/modem-manager: Only generate DBus plug policy on Core [05:50] amurray: hi! When you have some time, can you go over https://github.com/snapcore/snapd/pulls/mardy and have a look at the PRs which need security review (just not that one in Draft mode)? [05:53] morning [06:23] mborzecki: hi! [06:27] mardy: sure - sorry for the delay in getting to some of these - I've not had a lot of bandwidth to devote to snapd reviews lately - is there any which are higher priority than others? [06:31] amurray: not really, but https://github.com/snapcore/snapd/pull/11786 and https://github.com/snapcore/snapd/pull/11686 already have approvals, so they could be merged (and incidentally they are also the simplest ones to review :-) ) [06:31] PR #11786: cmd/snap-confine: mount support cleanups [06:31] PR #11686: interfaces/udev: refactor handling of udevadm triggers for input [06:32] yep I am just looking at 11686 now - will do 11786 after - cheers [06:34] amurray: thanks!! [06:35] mborzecki: I'm fighting with cgroup file permissions (see https://github.com/snapcore/snapd/runs/6492169759?check_suite_focus=true). I got half of the permissions fixed, but there are a few files that are left [06:35] mborzecki: like notify_on_release; it does not look like we are creating it [06:36] (at least, "git grep" does not find anything) [06:36] mardy: no, it's something that's part of the cgroups (filesystem) [06:37] mardy: hm you probably weren't root when the device cgroup was created, remember that we create it ourselves rather than through systemd [06:37] mborzecki: now the question is, if the parent directory is 0700, and is owned by root, maybe we can agree to not care about the permissions of the leaf files? [06:38] mardy: oh, so you're saying that the directory is owned by root already, but the pseudo files aren't? [06:39] mborzecki: not exactly, I'm working on it. So, I have this: https://github.com/snapcore/snapd/pull/11803 [06:39] PR #11803: cmd/snap-confine: remove setuid calls from cgroup init code [06:39] mborzecki: I now fixed the permissions on the parent directory [06:39] (still unpushed) [06:40] but the leaf files created by systemd/kernel are still owned by root. (we are still setuid, in that branch -- just not setgid) [06:44] mardy: was the fix just a chown(, 0, 0)? [07:05] morning [07:11] Hello , May i know, where i can find instruction to compile/install snapd locally from source ? Sorry for this basic question .. I am using Ubuntu 20.04 .. Thank you in advance [07:14] nitin: https://github.com/snapcore/snapd/blob/master/HACKING.md [07:19] pstolowski: Noted and Thank you [07:20] yw [07:29] PR snapd#11787 closed: portal-info: Add CommonID Field [07:59] PR snapd#11805 opened: release: 2.56 [08:29] mborzecki: for the parent directory and for the files we create, yes. But those "automatic" files still have the wrong group permissions [08:35] mardy: heh, yeah that's what you get by messing with cgroups directly instead of though systemd 😕 can you temporarily switch uid/gid when creating that directory in the hierarchy? [09:14] PR snapd#11784 closed: secboot: support for changing encryption keys via keymgr [09:29] PR snapd#11686 closed: interfaces/udev: refactor handling of udevadm triggers for input [09:30] mborzecki: I could, but then it won't work once we switch to a cap-only process [09:31] mborzecki: here's the latest version: it's working, but notice the spread test change: https://github.com/snapcore/snapd/pull/11803 [09:31] PR #11803: cmd/snap-confine: remove setuid calls from cgroup init code [09:34] PR snapd#11800 closed: cmd/snap-fde-keymgr: best effort idempotency of add-recovery-key [09:56] PR snapcraft#3745 opened: Fix/core20 ros plugin build failure should stop snapcraft [10:39] PR snapd#11806 opened: tests: import spread shellcheck changes [11:43] mardy: if we have cap_data_override it should still be fine [13:25] PR snapd#11805 closed: release: 2.56 [13:30] PR snapd#11807 opened: snapcraft.yaml: bump stable branch to release/2.56 [14:05] PR snapd#11806 closed: tests: import spread shellcheck changes