You cannot select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Joshua Dye e4adf254bd committing changes in /etc made by "apt install snapd"
Packages with configuration changes:
+snapd 2.49-1+rpi1+deb11u1 armhf

Package changes:
+snapd 2.49-1+rpi1+deb11u1 armhf
+squashfs-tools 1:4.4-2+deb11u2 armhf
2 years ago
..
README Initial recommit 2 years ago
lsb_release Initial recommit 2 years ago
nvidia_modprobe Initial recommit 2 years ago
usr.bin.man Initial recommit 2 years ago
usr.lib.libreoffice.program.oosplash Initial recommit 2 years ago
usr.lib.libreoffice.program.senddoc Initial recommit 2 years ago
usr.lib.libreoffice.program.soffice.bin Initial recommit 2 years ago
usr.lib.libreoffice.program.xpdfimport Initial recommit 2 years ago
usr.lib.snapd.snap-confine.real committing changes in /etc made by "apt install snapd" 2 years ago
usr.sbin.chronyd committing changes in /etc made by "apt install chrony" 2 years ago
usr.sbin.cups-browsed Initial recommit 2 years ago
usr.sbin.cupsd Initial recommit 2 years ago
usr.sbin.named Initial recommit 2 years ago

README

# This directory is intended to contain profile additions and overrides for
# inclusion by distributed profiles to aid in packaging AppArmor for
# distributions.
#
# The shipped profiles in /etc/apparmor.d can still be modified by an
# administrator and people should modify the shipped profile when making
# large policy changes, rather than trying to make those adjustments here.
#
# For simple access additions or the occasional deny override, adjusting them
# here can prevent the package manager of the distribution from interfering
# with local modifications. As always, new policy should be reviewed to ensure
# it is appropriate for your site.
#
# For example, if the shipped /etc/apparmor.d/usr.sbin.smbd profile has:
#   #include <local/usr.sbin.smbd>
#
# then an administrator can adjust /etc/apparmor.d/local/usr.sbin.smbd to
# contain any additional paths to be allowed, such as:
#
#   /var/exports/** lrwk,
#
# Keep in mind that 'deny' rules are evaluated after allow rules, so you won't
# be able to allow access to files that are explicitly denied by the shipped
# profile using this mechanism.