The chromium snap's generated apparmor profile does include
<abstractions/ssl_certs>, which allows read access to /etc/ssl/certs/
and /usr/local/share/ca-certificates/, among other paths¹.

So the problem is not confinement per se, but the fact that the core
snap shadows these directories.

I wonder if using the system-files interface² would be a valid use case
to expose these certificates in a read-only fashion.


¹ see /etc/apparmor.d/abstractions/ssl_certs for reference
² https://snapcraft.io/docs/system-files-interface

** Changed in: chromium-browser (Ubuntu)
       Status: New => Confirmed

** Changed in: chromium-browser (Ubuntu)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1901586

Title:
  [snap] CA Certificates from /usr/local/share/ca-certificates are not
  used

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1901586/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to