The snapd roadmap

This article is more than 7 year s old.


This article originally appeared at snapcraft forums

released

 snapd 2.27 (topic1)

snapd 2.28

 Improved configuration get output (topic)
 Internal xdg-open implementation (topic3)
 Refresh hook support (topic)
 Lazy registrations on classic (topic3)
 Service control on snap command (start/stop/etc) (topic3)

Schedule

beta Sep 4th
candidate Sep 25th
stable Oct 2nd

snapd 2.29

 Service control on snapctl (start/stop/etc) (topic5)
 Polkit-based authorizations (topic4)
 Fix classic flag on reverts (topic1)

Schedule

beta Oct 2nd
candidate Oct 23rd
stable Oct 30th

upcoming

 Base snaps (topic5)
 Layouts (curstom mount points) (topic2)
 Epochs (stepped upgrades) (topic1)
 Repairs (emergency fixes) (topic1)
 Command-not-found support (topic?)
 Interface hooks (topic1)
 Monthly refresh scheduling (topic2)
 Timer services (topic1)
 Desktop theme support (topic3)
 Snapshots (topic)
 Multi-user/group support (topic1)
 Fix snapd restart on reverts (topic)
 Support devmode refreshes (topic)
 Interface for locking screen (topic)
 Support for wayland sockets (topic)
 Service survival across refreshes (topic)
 Interfaces in classic snaps (topic)

(other upcoming3 topics)

backlog

 Install snap multiple times
 Health checks
 Entitlements

Talk to us today

Interested in running Ubuntu in your organisation?

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

What is CMMC compliance?

CMMC version 2.0 came into effect on December 26, 2023, and is designed to ensure adherence to rigorous cybersecurity policies and practices within the public...

What if your container images were security-maintained at the source?

Software supply chain security has become a top concern for developers, DevOps engineers, and IT leaders. High-profile breaches and dependency compromises...

Apport local information disclosure vulnerability fixes available

Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to leak core dumps...