??????????????
Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 173

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 174

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 175

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 176

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 177

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 178
ó àUdac@`sïddlmZmZmZeZidd6dgd6dd6ZdZd Zd Z dd l Z dd l m Z m Z dd lmZd Zydd lZeZWn#ek rÅe jƒZeZnXd Zydd lZeZWn#ek re jƒZeZnXerfejjdejdejdejdej dej!dej"dej#dej$ƒne%ddddddddddddddddƒZ&ed„Z'd„Z(d d!„Z)d d"„Z*d#„Z+e,d$krëe+ƒnd S(%i(tabsolute_importtdivisiontprint_functions1.1tmetadata_versiontpreviewtstatust communityt supported_bysþ --- module: sefcontext short_description: Manages SELinux file context mapping definitions description: - Manages SELinux file context mapping definitions. - Similar to the C(semanage fcontext) command. version_added: '2.2' options: target: description: - Target path (expression). type: str required: yes aliases: [ path ] ftype: description: - The file type that should have SELinux contexts applied. - "The following file type options are available:" - C(a) for all files, - C(b) for block devices, - C(c) for character devices, - C(d) for directories, - C(f) for regular files, - C(l) for symbolic links, - C(p) for named pipes, - C(s) for socket files. type: str choices: [ a, b, c, d, f, l, p, s ] default: a setype: description: - SELinux type for the specified target. type: str required: yes seuser: description: - SELinux user for the specified target. type: str selevel: description: - SELinux range for the specified target. type: str aliases: [ serange ] state: description: - Whether the SELinux file context must be C(absent) or C(present). type: str choices: [ absent, present ] default: present reload: description: - Reload SELinux policy after commit. - Note that this does not apply SELinux file contexts to existing files. type: bool default: yes ignore_selinux_state: description: - Useful for scenarios (chrooted environment) that you can't get the real SELinux state. type: bool default: no version_added: '2.8' notes: - The changes are persistent across reboots. - The M(sefcontext) module does not modify existing files to the new SELinux context(s), so it is advisable to first create the SELinux file contexts before creating files, or run C(restorecon) manually for the existing files that require the new SELinux file contexts. - Not applying SELinux fcontexts to existing files is a deliberate decision as it would be unclear what reported changes would entail to, and there's no guarantee that applying SELinux fcontext does not pick up other unrelated prior changes. requirements: - libselinux-python - policycoreutils-python author: - Dag Wieers (@dagwieers) sÿ - name: Allow apache to modify files in /srv/git_repos sefcontext: target: '/srv/git_repos(/.*)?' setype: httpd_git_rw_content_t state: present - name: Apply new SELinux file context to filesystem command: restorecon -irv /srv/git_repos s # Default return values N(t AnsibleModuletmissing_required_lib(t to_nativetatbtctdtftltptss all filess block devicescharacter devicet directorys regular files symbolic links named pipes socket filecC`s|tkrtStjƒS(N(tTruetselinuxtis_selinux_enabled(tignore_selinux_state((sE/usr/lib/python2.7/site-packages/ansible/modules/system/sefcontext.pytget_runtime_status›scC`sA|t|f}|jƒ}y ||SWntk r<dSXdS(s` Get the SELinux file context mapping definition from policy. Return None if it does not exist. N(toption_to_file_type_strtget_alltKeyErrortNone(t sefcontextttargettftypetrecordtrecords((sE/usr/lib/python2.7/site-packages/ansible/modules/system/sefcontext.pytsemanage_fcontext_existsŸs    tc  C`s:t} d} yªtj|ƒ} | j|ƒt| ||ƒ} | r*| \} }}}|dkrj| }n|dkr|}n||ks£|| ks£||krµ|jsÈ| j|||||ƒnt} |j r'| d7} | d||| |||f7} | d||||||f7} q'qµn‹|dkr?d}n|dkrTd}n|jsy| j |||||ƒnt} |j rµ| d7} | d|||d||f7} nWn9t k rñ}|j d d |j jt|ƒfƒnX|j r| rtd | ƒ|d R?R*R@RRARBRCRDRERF((sE/usr/lib/python2.7/site-packages/ansible/modules/system/sefcontext.pytsemanage_fcontext_deleteßs&    :*c C`s@tdtdtdddtƒdtdddtd d gƒd tdddd d tjƒƒdtdddtƒdtddƒdtddd dgƒdtddddd ddgƒdtdddtƒƒdtƒ}ts|jdtdƒdt ƒnt s(|jdtdƒdt ƒn|j d}t |ƒsT|jddƒn|j d}|j d }|j d}|j d}|j d}|j d}|j d}td|d |d|d|ƒ} |dkrþt|| ||||||ƒn>|dkr#t|| |||ƒn|jddj|ƒƒdS(Nt argument_specRttypetbooltdefaultRtstrtrequiredtaliasestpathRR tchoicesR=R+tselevelR,tstatetpresenttabsenttreloadtsupports_check_modeR'slibselinux-pythont exceptionspolicycoreutils-pythons!SELinux is disabled on this host.s&Invalid value of argument "state": {0}(RR9R-RRtkeyst HAVE_SELINUXR6R tSELINUX_IMP_ERRt HAVE_SEOBJECTtSEOBJECT_IMP_ERRtparamsRRGRItformat( R;RRRR=R+R,RTR>R<((sE/usr/lib/python2.7/site-packages/ansible/modules/system/sefcontext.pytmainþs>!!          ! " t__main__(-t __future__RRRRKt __metaclass__tANSIBLE_METADATAt DOCUMENTATIONtEXAMPLEStRETURNt tracebacktansible.module_utils.basicRR tansible.module_utils._textR RR\RRR[t ImportErrort format_excR-R^R.R]t file_typestupdatetSEMANAGE_FCONTEXT_ALLtSEMANAGE_FCONTEXT_BLOCKtSEMANAGE_FCONTEXT_CHARtSEMANAGE_FCONTEXT_DIRtSEMANAGE_FCONTEXT_REGtSEMANAGE_FCONTEXT_LINKtSEMANAGE_FCONTEXT_PIPEtSEMANAGE_FCONTEXT_SOCKR9RRR"RGRIRaR8(((sE/usr/lib/python2.7/site-packages/ansible/modules/system/sefcontext.pytsd   O                        4  +