Comment 30 for bug 1891810

Revision history for this message
Alex Murray (alexmurray) wrote :

Tested for libseccomp as follows:

cat <<EOF | sudo tee /etc/apt/sources.list.d/ubuntu-$(lsb_release -cs)-proposed.list
# Enable Ubuntu proposed archive
deb http://archive.ubuntu.com/ubuntu/ $(lsb_release -cs)-proposed restricted main multiverse universe
EOF
cat <<EOF | sudo tee /etc/apt/preferences.d/proposed-updates
# Configure apt to allow selective installs of packages from proposed
Package: *
Pin: release a=$(lsb_release -cs)-proposed
Pin-Priority: 400
EOF
sudo apt update
sudo apt install seccomp/$(lsb_release -cs)-proposed libseccomp2/$(lsb_release -cs)-proposed
[ $(scmp_sys_resolver openat2) = 437 ] && echo passed || echo FAIL

Passed for each xenial, bionic, focal and groovy.

I have also done extensive regression testing of this libseccomp update via both the various autopkgtests of dependant packages and through the QRT test script https://git.launchpad.net/qa-regression-testing/tree/scripts/test-libseccomp.py which exercises various packages and their use of libseccomp under this update.