In my case, a docker-based firmware build process produces a update
package (owned by root, for some reason), which I upload to a target via
a web-interface.

Sure, I can change the owner of the files but still, this used to work
and it doesn't now.

Let me turn the question around. What is the use-case for prohibiting
access to files in the user's home directory, which are readable by the
user based on good old Unix filesystem permissions? Devising a
completely parallel access policy based on arbitrary and invisible rules
seems utterly stupid to me.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1900429

Title:
  [snap] Unable to access files owned by another user

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1900429/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to