I'm trying to understand if this[1] is something I can account for
*properly* in the package's SELinux policy or if this is a case where the
end user really needs to modify their own.

type=AVC msg=audit(1626675276.055:38476): avc:  denied  { read } for
 pid=2143832 comm="fail2ban-server" name="nextcloud_data" dev="dm-4"
ino=4199669 scontext=system_u:system_r:fail2ban_t:s0
tcontext=system_u:object_r:httpd_sys_rw_content_t:s0 tclass=lnk_file
permissive=0

Thanks,
Richard

[1] https://bugzilla.redhat.com/show_bug.cgi?id=1983564
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam on the list, report it: 
https://pagure.io/fedora-infrastructure

Reply via email to