- GRAYBYTE UNDETECTABLE CODES -

403Webshell
Server IP : 184.154.167.98  /  Your IP : 3.21.46.13
Web Server : Apache
System : Linux pink.dnsnetservice.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64
User : puertode ( 1767)
PHP Version : 8.2.26
Disable Function : NONE
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /usr/share/setroubleshoot/plugins/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /usr/share/setroubleshoot/plugins/__pycache__/cvs_data.cpython-36.pyc
3

nm�aV
�@sDddlZejddd�ZejZddlTddlmZGdd�de�ZdS)	�Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc@sLeZdZed�Zed�Zed�Zed�Zed�ZdZ	dZ
dd	�Zd
d�ZdS)
�pluginzS
    SELinux is preventing cvs ($SOURCE_PATH) "$ACCESS" access to $TARGET_PATH
    a
    SELinux denied cvs access to $TARGET_PATH.
    If this is a CVS repository it needs to have a file context label of
    cvs_data_t. If you did not intend to use $TARGET_PATH as a CVS repository
    it could indicate either a bug or it could signal an intrusion attempt.
    a

    You can alter the file context by executing chcon -R -t cvs_data_t '$TARGET_PATH'
    You must also change the default file context files on the system in order to preserve them even on a full relabel.  "semanage fcontext -a -t cvs_data_t '$FIX_TARGET_PATH'"

    z8If $TARGET_BASE_PATH should be shared via the cvs daemonz2You need to change the label on $TARGET_BASE_PATH'zZ# semanage fcontext -a -t cvs_data_t '$FIX_TARGET_PATH'
# restorecon -v '$FIX_TARGET_PATH'zj/usr/sbin/semanage fcontext -a -t cvs_data_t '$FIX_TARGET_PATH';/usr/sbin/restorecon -v '$FIX_TARGET_PATH'cCs&tj|t�d|_td�|_d|_dS)NTzChange labelZgreen)r�__init__�__name__Zfixable�_Zbutton_text�level)�self�r
�-/usr/share/setroubleshoot/plugins/cvs_data.pyr3s
zplugin.__init__cCsD|jdg�r<|j|j|j�r<|jddg�r<|j�r<|j�SdSdS)NZcvs_t�file�dir)Zmatches_source_typesZall_accesses_are_inZcreate_file_permsZcreate_dir_permsZ
has_tclass_inZpath_is_not_standard_directoryZreport)r	Zavcr
r
r�analyze9szplugin.analyzeN)
r�
__module__�__qualname__rZsummaryZproblem_descriptionZfix_descriptionZif_textZ	then_textZdo_textZfix_cmdrrr
r
r
rrsr)�gettextZtranslationrZsetroubleshoot.utilZsetroubleshoot.Pluginrrr
r
r
r�<module>s


Youez - 2016 - github.com/yon3zu
LinuXploit