HEX
Server: Apache
System: Linux dinesh8189 5.15.98-grsec-sharedvalley-2.lc.el8.x86_64 #1 SMP Thu Mar 9 09:07:30 -03 2023 x86_64
User: cgmgerenciamento1 (814285)
PHP: 8.1.26
Disabled: apache_child_terminate,dl,escapeshellarg,escapeshellcmd,exec,link,mail,openlog,passthru,pcntl_alarm,pcntl_exec,pcntl_fork,pcntl_get_last_error,pcntl_getpriority,pcntl_setpriority,pcntl_signal,pcntl_signal_dispatch,pcntl_sigprocmask,pcntl_sigtimedwait,pcntl_sigwaitinfo,pcntl_strerror,pcntl_wait,pcntl_waitpid,pcntl_wexitstatus,pcntl_wifexited,pcntl_wifsignaled,pcntl_wifstopped,pcntl_wstopsig,pcntl_wtermsig,php_check_syntax,php_strip_whitespace,popen,proc_close,proc_open,shell_exec,symlink,system
Upload Files
File: //usr/share/setroubleshoot/plugins/__pycache__/sandbox_connect.cpython-36.pyc
3

m��a��@sDddlZejddd�ZejZddlTddlmZGdd�de�ZdS)	�Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc@sHeZdZed�Zed�Zed�ZdZed�Zed�Z	dd�Z
d	d
�ZdS)�pluginzR
    SELinux is preventing $SOURCE_PATH from connecting to port $PORT_NUMBER.
    a�
    SELinux has denied $SOURCE from connecting to a network port $PORT_NUMBER within a sandbox.
    If $SOURCE should be allowed to connect on $PORT_NUMBER, you need to use a different sandbox type like sandbox_web_t or sandbox_net_t.  
    # sandbox -X -t sandbox_net_t $SOURCE
    

If $SOURCE is not supposed
    to connect to $PORT_NUMBER, this could signal an intrusion attempt.
    z~
    If you want to allow $SOURCE to connect to $PORT_NUMBER, you can execute 

    # sandbox -X -t sandbox_net_t $SOURCE
    �zIIf you want to allow $SOURCE_PATH to connect to network port $PORT_NUMBERz�you need to modify the sandbox type. sandbox_web_t or sandbox_net_t.
For example:
sandbox -X -t sandbox_net_t $SOURCE_PATH
Please read 'sandbox' man page for more details.
cCstj|t�|jd�dS)N�K)r�__init__�__name__Zset_priority)�self�r
�4/usr/share/setroubleshoot/plugins/sandbox_connect.pyr7szplugin.__init__cCs$|jdg�r |jdg�r |j�SdS)NZsandbox_x_client_tZname_connect)Zmatches_source_typesZhas_any_access_inZreport)r	Zavcr
r
r�analyze;szplugin.analyzeN)r�
__module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ	then_textrrr
r
r
rrsr)�gettextZtranslationrZsetroubleshoot.utilZsetroubleshoot.Pluginrrr
r
r
r�<module>s