Calling snapctl with snapd 2.17/2.18 causes AppArmor denials in dmesg because of access to /run/snapd.socket
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Snappy |
Triaged
|
High
|
Unassigned |
Bug Description
Calling snapctl from the configure hook from within a snap causes the following denials
[ 6639.038089] audit: type=1400 audit(148119609
[ 6639.038177] audit: type=1400 audit(148119609
[ 6639.038706] audit: type=1400 audit(148119609
[ 6639.040053] audit: type=1400 audit(148119609
The hook itself is correctly executed and can retrieve the configuration items via snapctl.
This is because in client/client.go we use os.OpenFile( dirs.SnpadSocke t) and on EACCESS we re-try with dirs.SnapSocket. This of course causes some spam in dmesg.