consider better handling for .pyc files

Bug #1496895 reported by Jamie Strandboge
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
snapd
Triaged
Low
Unassigned

Bug Description

Python snaps are trying to manipulate .pyc files in the system and read-only install directories and the security policy has (or will very soon) explicit deny rules:

deny /usr/lib/python3*/{,**/}__pycache__/ w,
deny /usr/lib/python3*/{,**/}__pycache__/**.pyc.[0-9]* w,
deny @{CLICK_DIR}/@{APP_PKGNAME}/**.pyc w,

this violates the snappy FHS. For now, this is ok-- the security policy is blocking the access without logging and the apps will run fine. However, the .pyc files are not being utilized so perhaps there is a way that the .pyc files could be written out in SNAP_APP_DATA_PATH somewhere instead of the readonly areas?

Changed in ubuntu-core-security (Ubuntu):
status: New → In Progress
importance: Undecided → High
assignee: nobody → Jamie Strandboge (jdstrand)
no longer affects: ubuntu-core-security (Ubuntu)
Michael Vogt (mvo)
Changed in snappy:
status: New → Triaged
importance: Undecided → Low
Michael Vogt (mvo)
affects: snappy → snapd
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.