dbfdg 3 nmŠa’ ã@s<ddlZejdddZejZddlmZGdd„deƒZdS)éNzsetroubleshoot-pluginsT)Zfallback)ÚPluginc@sLeZdZedƒZedƒZedƒZdd„ZedƒZedƒZ dd „Z d d „Z d S) Úpluginz4SELinux is preventing $SOURCE_PATH "$ACCESS" access.a1 SELinux denied access requested by $SOURCE. It is not expected that this access is required by $SOURCE and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. z¹ You can generate a local policy module to allow this access - see FAQ Please file a bug report. cCsP|ddkrtdƒS|ddkr(tdƒSt|ƒdkrH|d dkrHtd ƒStd ƒS)NéÚprocessÚprocess2ztIf you believe that $SOURCE_BASE_PATH should be allowed $ACCESS access on processes labeled $TARGET_TYPE by default.Ú capabilityÚ capability2zTIf you believe that $SOURCE_BASE_PATH should have the $ACCESS capability by default.ééú(null)ÚUnknownzxIf you believe that $SOURCE_BASE_PATH should be allowed $ACCESS access on $TARGET_CLASS labeled $TARGET_TYPE by default.zyIf you believe that $SOURCE_BASE_PATH should be allowed $ACCESS access on the $TARGET_BASE_PATH $TARGET_CLASS by default.)rr)rr)r r )Ú_Úlen)ÚselfÚavcÚargs©rú-/usr/share/setroubleshoot/plugins/catchall.pyÚ get_if_text0s  zplugin.get_if_textz]You should report this as a bug. You can generate a local policy module to allow this access.zŽAllow this access for now by executing: # ausearch -c '$SOURCE' --raw | audit2allow -M my-$MODULE_NAME # semodule -X 300 -i my-$MODULE_NAME.ppcCs tj|tƒ|jdƒd|_dS)NrT)rÚ__init__Ú__name__Z set_priorityZ report_bug)rrrrr>s  zplugin.__init__cCs:|jr|jd|jd}n |jd}|jd|j|jfƒS)Nz on Ú.r)ZtpathÚsummaryZreportZtclass)rrrrrrÚanalyzeCs zplugin.analyzeN) rÚ __module__Ú __qualname__r rZproblem_descriptionZfix_descriptionrZ then_textZdo_textrrrrrrrs r)ÚgettextZ translationr Zsetroubleshoot.PluginrrrrrrÚs