Sh3ll
OdayForums


Server : Apache
System : Linux 145.162.205.92.host.secureserver.net 5.14.0-611.45.1.el9_7.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Apr 1 05:56:53 EDT 2026 x86_64
User : tradze ( 1001)
PHP Version : 8.1.34
Disable Function : NONE
Directory :  /usr/share/setroubleshoot/plugins/__pycache__/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/setroubleshoot/plugins/__pycache__/sshd_root.cpython-39.pyc
a

�Z`T�@s\ddlZejddd�ZejZddlTddlmZddlZddlTddlZGdd�de�Z	dS)	�Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc@s@eZdZed�Zed�Zed�Zed�ZdZdd�Z	dd	�Z
d
S)�pluginzN
    SELinux is preventing $SOURCE_PATH "$ACCESS" access to $TARGET_PATH.
    z�
    SELinux denied access requested by $SOURCE. $TARGET_PATH may
    be mislabeled. sshd is allowed to read content in /root/.ssh directory if it
    is labeled correctly.
    z�
    You can restore the default system context to this file by executing the
    restorecon command.
    # restorecon -R /root/.ssh
    zyou must fix the labels.z/sbin/restorecon -Rv /root/.sshcCs&t�|t�d|_d|_td�|_dS)NZyellowTzRestore Context)r�__init__�__name__�levelZfixable�_Zbutton_text)�self�r
�./usr/share/setroubleshoot/plugins/sshd_root.pyr3szplugin.__init__cCsH|�dg�rD|�dg�rD|jdkrD|�|j�rD|�ddg�rD|��SdS)NZsshd_tZadmin_home_tz
/root/.ssh�file�dir)Zmatches_source_typesZmatches_target_typesZtpathZall_accesses_are_inZread_file_permsZ
has_tclass_inZreport)r	Zavcr
r
r�analyze9s
��
��zplugin.analyzeN)r�
__module__�__qualname__rZsummaryZproblem_descriptionZfix_descriptionZ	then_textZdo_textrrr
r
r
rrsr)
�gettextZtranslationrZsetroubleshoot.utilZsetroubleshoot.Pluginr�os�statZselinuxrr
r
r
r�<module>s

ZeroDay Forums Mini