File: //usr/share/setroubleshoot/plugins/__pycache__/automount_exec_config.cpython-36.pyc
3
nm�a�
� @ sD d dl Z e jddd�Zej Zd dlT d dlmZ G dd� de�ZdS ) � Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc @ sD e Zd Zed�Zed�Zed�ZdZdZdZ dZ
dd � Zd
d� ZdS )
�pluginzj
SELinux is preventing the $SOURCE_PATH from executing potentially mislabeled files $TARGET_PATH.
a�
SELinux has denied the $SOURCE_PATH from executing potentially
mislabeled files $TARGET_PATH. Automounter can be setup to execute
configuration files. If $TARGET_PATH is an automount executable
configuration file it needs to have a file label of bin_t.
If automounter is trying to execute something that it is not supposed to, this could indicate an intrusion attempt.
a,
If you want to change the file context of $TARGET_PATH so that the automounter can execute it you can execute "chcon -t bin_t $TARGET_PATH". If you want this to survive a relabel, you need to permanently change the file context: execute "semanage fcontext -a -t bin_t '$FIX_TARGET_PATH'".
ze/usr/sbin/semanage fcontext -a -t bin_t '$FIX_TARGET_PATH';/usr/sbin/restorecon -v '$FIX_TARGET_PATH'z8If you want to allow automounter to execute $TARGET_PATHz3Change the file context of '$TARGET_PATH' to bin_t.z�# chcon -t bin_t '$FIX_TARGET_PATH'
If you want this to survive a relabel, execute
# semanage fcontext -a -t bin_t '$FIX_TARGET_PATH';restorecon -v '$FIX_TARGET_PATH'
c C s t j| t� d| _td�| _d S )NTzChange file context.)r �__init__�__name__Zfixable�_Zbutton_text)�self� r �:/usr/share/setroubleshoot/plugins/automount_exec_config.pyr 6 s zplugin.__init__c C s2 |j dg�r.|jddg�r.|jdg�r.| j� S d S )NZautomount_tZexecuteZexecute_no_trans�file)Zmatches_source_typesZall_accesses_are_inZ
has_tclass_inZreport)r Zavcr r r
�analyze; s
zplugin.analyzeN)
r �
__module__�__qualname__r ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ then_textZdo_textr r r r r r
r s r )�gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r r r r
�<module> s