Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Snapcraft Summit summary – day 1

Alan Pope

on 1 February 2018

This article was last updated 4 years ago.


The first day of the Snapcraft Summit in Seattle kicked off with a simple round of introductions and each participant voicing their plans for the week. People from Microsoft, Skype, Slack, Electron and CircleCI joined the snap advocacy and Snapcraft teams to crank through their tasks.

Snapcraft community superstar Dan Llwellyn started his day working with various participants to create and improve their snaps. They uncovered a missing feature in path handling of classic snaps in Snapcraft. Kyle Fazzari and Sergio Schvezov, of Canonical, worked to debug, and then started on a fix for Snapcraft. They should have it ready for testing tomorrow.

The ‘snapcraft in docker’ story has been discussed in detail after being raised by CI vendors and developers who’ve experienced issues building in Docker containers. Kyle has worked to improve the experience for developers who use Docker, and will be rewriting some of our tutorials through the week as a result.

Sergio worked with the some of the developers to understand the requirements for supporting multiple runtimes, and improve our documentation for guiding developers that need this functionality.

The design team received useful feedback on a prototype of the next version of the snapcraft.io website from developers from several of these companies.

James Henstridge led some investigations into locale issues in snaps which have been a pain point for users of desktop snaps for some time. The underlying issue is now well known, and James has kicked off forum thread to discuss creative solutions.

ubuntu logo

What’s the risk of unsolved vulnerabilities in Docker images?

Recent surveys found that many popular containers had known vulnerabilities. Container images provenance is critical for a secure software supply chain in production. Benefit from Canonical’s security expertise with the LTS Docker images portfolio, a curated set of application images, free of vulnerabilities, with a 24/7 commitment.

Integrate with hardened LTS images ›

Newsletter signup

Get the latest Ubuntu news and updates in your inbox.

By submitting this form, I confirm that I have read and agree to Canonical's Privacy Policy.

Related posts

We wish you RISC-V holidays!

There are three types of computer users: the end user, the system administrator, and the involuntary system administrator. As it happens, everyone has found...

Snapcraft 8.0 and the respectable end of core18

‘E’s not pinin’! ‘E’s passed on! This base is no more! He has ceased to be! ‘E’s expired and gone to meet ‘is maker! ‘E’s a stiff! Bereft of life, ‘e rests in...

Optimise your ROS snap – Part 6

Welcome to Part 6 of our “Optimise your ROS snap” blog series. Make sure to check Part 5. This sixth and final part will  summarise every optimisation that we...