File: //usr/share/setroubleshoot/plugins/__pycache__/sandbox_connect.cpython-36.pyc
3
nm�a� � @ sD d dl Z e jddd�Zej Zd dlT d dlmZ G dd� de�ZdS ) � Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc @ sH e Zd Zed�Zed�Zed�ZdZed�Zed�Z dd� Z
d d
� ZdS )�pluginzR
SELinux is preventing $SOURCE_PATH from connecting to port $PORT_NUMBER.
a�
SELinux has denied $SOURCE from connecting to a network port $PORT_NUMBER within a sandbox.
If $SOURCE should be allowed to connect on $PORT_NUMBER, you need to use a different sandbox type like sandbox_web_t or sandbox_net_t.
# sandbox -X -t sandbox_net_t $SOURCE
If $SOURCE is not supposed
to connect to $PORT_NUMBER, this could signal an intrusion attempt.
z~
If you want to allow $SOURCE to connect to $PORT_NUMBER, you can execute
# sandbox -X -t sandbox_net_t $SOURCE
� zIIf you want to allow $SOURCE_PATH to connect to network port $PORT_NUMBERz�you need to modify the sandbox type. sandbox_web_t or sandbox_net_t.
For example:
sandbox -X -t sandbox_net_t $SOURCE_PATH
Please read 'sandbox' man page for more details.
c C s t j| t� | jd� d S )N�K )r �__init__�__name__Zset_priority)�self� r
�4/usr/share/setroubleshoot/plugins/sandbox_connect.pyr 7 s zplugin.__init__c C s$ |j dg�r |jdg�r | j� S d S )NZsandbox_x_client_tZname_connect)Zmatches_source_typesZhas_any_access_inZreport)r Zavcr
r
r �analyze; s zplugin.analyzeN)r �
__module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ then_textr r r
r
r
r r s r )�gettextZtranslationr Zsetroubleshoot.utilZsetroubleshoot.Pluginr r r
r
r
r �<module> s