Issue #15049 has been updated by John Florian.
James, I'm not sure. I find ruby only marginally easier to read than perl, so
I wasn't sure what value is being returned by the function selinux_mount_point.
I wasn't able to determine (in a reasonable amount of time) if
**f.grep(/selinuxfs/)** means to include those slashes as part of a path or if
they merely delineate a regex. Likewise, trying to use Google to learn what
**#{foo}** does or any of the other operations identified purely via symbols is
a PITA.
I apologize for my rant, but I wish knowing ruby wasn't required for using
puppet. Anyway, I can tell you this you much, which hopefully is helpful:
<pre>
$ grep selinuxfs /proc/self/mountinfo
23 16 0:13 / /sys/fs/selinux rw,relatime - selinuxfs selinuxfs rw
$ cat /proc/self/attr/current
unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023$
</pre>
----------------------------------------
Bug #15049: selinux fact returns wrong value
https://projects.puppetlabs.com/issues/15049#change-65136
Author: John Florian
Status: Needs More Information
Priority: Normal
Assignee:
Category: library
Target version:
Keywords:
Branch:
Affected Facter version: 1.6.6
On a fresh Fedora 17 host:
<pre>
$ sestatus
SELinux status: enabled
SELinuxfs mount: /sys/fs/selinux
SELinux root directory: /etc/selinux
Loaded policy name: targeted
Current mode: enforcing
Mode from config file: enforcing
Policy MLS status: enabled
Policy deny_unknown status: allowed
Max kernel policy version: 26
$ facter selinux
false
$ rpm -q puppet facter ruby
puppet-2.7.13-1.fc17.noarch
facter-1.6.6-1.fc17.x86_64
ruby-1.9.3.194-11.fc17.x86_64
</pre>
--
You have received this notification because you have either subscribed to it,
or are involved in it.
To change your notification preferences, please click here:
http://projects.puppetlabs.com/my/account
--
You received this message because you are subscribed to the Google Groups
"Puppet Bugs" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to
[email protected].
For more options, visit this group at
http://groups.google.com/group/puppet-bugs?hl=en.