Displaying 1 result from an estimated 1 matches for "ined_u".
Did you mean:
fined_u
2013 Mar 19
3
Puppet modifying directories by executing shell script as non-root user results in kernel-level insufficient privilege complaints
...ar/log/messages on the the puppet
agent has several lines printed similar to the following:
kernel: type=1400 audit(1363697390.681:566): avc: denied { read write }
for pid=14834 comm="postgres" path="/tmp/puppet20130319-14620-1wpyixh-0"
dev=dm-0 ino=1702615 scontext=unconf
ined_u:system_r:postgresql_t:s0
tcontext=unconfined_u:object_r:initrc_tmp_t:s0 tclass=file
Basically, the messages are complaining that user postgres, via the
execution of initdb PostrgreSQL command, cannot write files to data, the
destined PGDATA directory, which has proper permissions as shown above...