I tried testing setting selinux to permissive, and it didn’t resolve this unfortunately. Any idea on how to resolve this?
Jul 21 18:22:28 openondemanddev setroubleshoot[3582]: SELinux is preventing /usr/bin/sudo from create access on the file /(null).#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that sudo should be allowed create access on the (null) file by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'sudo' --raw | audit2allow -M my-sudo#012# semodule -X 300 -i my-sudo.pp#012
Jul 21 18:22:28 openondemanddev setroubleshoot[3582]: SELinux is preventing /usr/bin/sudo from 'read, write, open' accesses on the file /run/sudo/ts/apache. For complete SELinux messages run: sealert -l 5d97e663-f3d8-4480-a3b7-1324e9e5d464
Jul 21 18:22:28 openondemanddev setroubleshoot[3582]: SELinux is preventing /usr/bin/sudo from 'read, write, open' accesses on the file /run/sudo/ts/apache.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that sudo should be allowed read write open access on the apache file by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'sudo' --raw | audit2allow -M my-sudo#012# semodule -X 300 -i my-sudo.pp#012
Jul 21 18:22:28 openondemanddev setroubleshoot[3582]: SELinux is preventing /usr/bin/sudo from lock access on the file /run/sudo/ts/apache. For complete SELinux messages run: sealert -l 9fb66a26-2472-4345-988f-9d1a4af61e51
Jul 21 18:22:28 openondemanddev setroubleshoot[3582]: SELinux is preventing /usr/bin/sudo from lock access on the file /run/sudo/ts/apache.#012#012***** Plugin catchall (100. confidence) suggests **************************#012#012If you believe that sudo should be allowed lock access on the apache file by default.#012Then you should report this as a bug.#012You can generate a local policy module to allow this access.#012Do#012allow this access for now by executing:#012# ausearch -c 'sudo' --raw | audit2allow -M my-sudo#012# semodule -X 300 -i my-sudo.pp#012
Jul 21 18:22:38 openondemanddev systemd[1]: dbus-:1.1-org.fedoraproject.SetroubleshootPrivileged@4.service: Deactivated successfully.
Jul 21 18:22:39 openondemanddev systemd[1]: setroubleshootd.service: Deactivated successfully.