a èZ`’ ã@s<ddlZejdddZejZddlmZGdd„deƒZdS)éNzsetroubleshoot-pluginsT)Zfallback)ÚPluginc@sLeZdZedƒZedƒZedƒZdd„ZedƒZedƒZ dd „Z d d „Z d S) Úpluginz4SELinux is preventing $SOURCE_PATH "$ACCESS" access.a1 SELinux denied access requested by $SOURCE. It is not expected that this access is required by $SOURCE and this access may signal an intrusion attempt. It is also possible that the specific version or configuration of the application is causing it to require additional access. z¹ You can generate a local policy module to allow this access - see FAQ Please file a bug report. cCsP|ddvrtdƒS|ddvr(tdƒSt|ƒdkrH|ddvrHtd ƒStd ƒS) Né)ZprocessZprocess2ztIf you believe that $SOURCE_BASE_PATH should be allowed $ACCESS access on processes labeled $TARGET_TYPE by default.)Z capabilityZ capability2zTIf you believe that $SOURCE_BASE_PATH should have the $ACCESS capability by default.éé)z(null)ZUnknownzxIf you believe that $SOURCE_BASE_PATH should be allowed $ACCESS access on $TARGET_CLASS labeled $TARGET_TYPE by default.zyIf you believe that $SOURCE_BASE_PATH should be allowed $ACCESS access on the $TARGET_BASE_PATH $TARGET_CLASS by default.)Ú_Úlen)ÚselfÚavcÚargs©r ú-/usr/share/setroubleshoot/plugins/catchall.pyÚ get_if_text0s  zplugin.get_if_textz]You should report this as a bug. You can generate a local policy module to allow this access.zŽAllow this access for now by executing: # ausearch -c '$SOURCE' --raw | audit2allow -M my-$MODULE_NAME # semodule -X 300 -i my-$MODULE_NAME.ppcCs t |t¡| d¡d|_dS)NrT)rÚ__init__Ú__name__Z set_priorityZ report_bug)r r r r r>s  zplugin.__init__cCs:|jr|jd|jd}n |jd}| d|j|jf¡S)Nz on Ú.r)ZtpathÚsummaryZreportZtclass)r r rr r r ÚanalyzeCs zplugin.analyzeN) rÚ __module__Ú __qualname__rrZproblem_descriptionZfix_descriptionrZ then_textZdo_textrrr r r r rs  r)ÚgettextZ translationrZsetroubleshoot.Pluginrrr r r r Ús