[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
lib
/
python3.6
/
site-packages
/
firewall
/
core
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 __pycache__
SET
[ DEL ]
📁 io
SET
[ DEL ]
📄 __init__.py
0 B
SET
[ EDIT ]
|
[ DEL ]
📄 base.py
2,102 B
SET
[ EDIT ]
|
[ DEL ]
📄 ebtables.py
9,390 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw.py
50,405 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_config.py
48,408 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_direct.py
22,518 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_helper.py
1,833 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_icmptype.py
2,485 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_ifcfg.py
2,562 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_ipset.py
9,674 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_nm.py
7,186 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_policies.py
2,803 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_policy.py
87,613 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_service.py
1,639 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_transaction.py
6,310 B
SET
[ EDIT ]
|
[ DEL ]
📄 fw_zone.py
45,689 B
SET
[ EDIT ]
|
[ DEL ]
📄 helper.py
804 B
SET
[ EDIT ]
|
[ DEL ]
📄 icmp.py
3,101 B
SET
[ EDIT ]
|
[ DEL ]
📄 ipXtables.py
61,878 B
SET
[ EDIT ]
|
[ DEL ]
📄 ipset.py
12,913 B
SET
[ EDIT ]
|
[ DEL ]
📄 logger.py
31,038 B
SET
[ EDIT ]
|
[ DEL ]
📄 modules.py
3,822 B
SET
[ EDIT ]
|
[ DEL ]
📄 nftables.py
101,143 B
SET
[ EDIT ]
|
[ DEL ]
📄 prog.py
1,510 B
SET
[ EDIT ]
|
[ DEL ]
📄 rich.py
33,848 B
SET
[ EDIT ]
|
[ DEL ]
📄 watcher.py
3,228 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: fw_policies.py
# -*- coding: utf-8 -*- # # Copyright (C) 2011-2016 Red Hat, Inc. # # Authors: # Thomas Woerner <twoerner@redhat.com> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; either version 2 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. # __all__ = [ "FirewallPolicies" ] from firewall import config from firewall.core.logger import log from firewall.core.io.lockdown_whitelist import LockdownWhitelist from firewall import errors from firewall.errors import FirewallError class FirewallPolicies(object): def __init__(self): self._lockdown = False self.lockdown_whitelist = LockdownWhitelist(config.LOCKDOWN_WHITELIST) def __repr__(self): return '%s(%r, %r)' % (self.__class__, self._lockdown, self.lockdown_whitelist) def cleanup(self): self._lockdown = False self.lockdown_whitelist.cleanup() # lockdown def access_check(self, key, value): if key == "context": log.debug2('Doing access check for context "%s"' % value) if self.lockdown_whitelist.match_context(value): log.debug3('context matches.') return True elif key == "uid": log.debug2('Doing access check for uid %d' % value) if self.lockdown_whitelist.match_uid(value): log.debug3('uid matches.') return True elif key == "user": log.debug2('Doing access check for user "%s"' % value) if self.lockdown_whitelist.match_user(value): log.debug3('user matches.') return True elif key == "command": log.debug2('Doing access check for command "%s"' % value) if self.lockdown_whitelist.match_command(value): log.debug3('command matches.') return True return False def enable_lockdown(self): if self._lockdown: raise FirewallError(errors.ALREADY_ENABLED, "enable_lockdown()") self._lockdown = True def disable_lockdown(self): if not self._lockdown: raise FirewallError(errors.NOT_ENABLED, "disable_lockdown()") self._lockdown = False def query_lockdown(self): return self._lockdown