?¡ëPNG
IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À?¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found
in /home/user1137782/www/china1.by/classwithtostring.php on line 86
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217
Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
## policy for dirsrv
########################################
##
## Execute a domain transition to run dirsrv.
##
##
##
## Domain allowed to transition.
##
##
#
interface(`dirsrv_domtrans',`
gen_require(`
type dirsrv_t, dirsrv_exec_t;
')
domtrans_pattern($1, dirsrv_exec_t,dirsrv_t)
ifdef(`hide_broken_symptoms', `
dontaudit dirsrv_t $1:socket_class_set { read write };
')
')
########################################
##
## Allow caller to signal dirsrv.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_signal',`
gen_require(`
type dirsrv_t;
')
allow $1 dirsrv_t:process signal;
')
########################################
##
## Send a null signal to dirsrv.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_signull',`
gen_require(`
type dirsrv_t;
')
allow $1 dirsrv_t:process signull;
')
#######################################
##
## Allow a domain to manage dirsrv logs.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_manage_log',`
gen_require(`
type dirsrv_var_log_t;
')
allow $1 dirsrv_var_log_t:dir manage_dir_perms;
allow $1 dirsrv_var_log_t:file manage_file_perms;
allow $1 dirsrv_var_log_t:fifo_file manage_fifo_file_perms;
')
######################################
##
## Allow a domain to manage dirsrv lock.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_manage_lock',`
gen_require(`
type dirsrv_var_lock_t;
')
manage_files_pattern($1, dirsrv_var_lock_t, dirsrv_var_lock_t)
manage_dirs_pattern($1, dirsrv_var_lock_t, dirsrv_var_lock_t)
')
#####################################
##
## Allow a domain to manage dirsrv logs.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_filetrans_lock',`
gen_require(`
type dirsrv_var_lock_t;
')
files_lock_filetrans($1, dirsrv_var_lock_t, file)
')
#######################################
##
## Allow a domain to manage dirsrv /var/lib files.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_manage_var_lib',`
gen_require(`
type dirsrv_var_lib_t;
')
allow $1 dirsrv_var_lib_t:dir manage_dir_perms;
allow $1 dirsrv_var_lib_t:file manage_file_perms;
')
#######################################
##
## Allow a domain to manage dirsrv /var/run files.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_manage_var_run',`
gen_require(`
type dirsrv_var_run_t;
')
allow $1 dirsrv_var_run_t:dir manage_dir_perms;
allow $1 dirsrv_var_run_t:file manage_file_perms;
allow $1 dirsrv_var_run_t:sock_file manage_file_perms;
')
######################################
##
## Allow a domain to create dirsrv pid directories.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_pid_filetrans',`
gen_require(`
type dirsrv_var_run_t;
')
# Allow creating a dir in /var/run with this type
files_pid_filetrans($1, dirsrv_var_run_t, dir)
')
#######################################
##
## Allow a domain to read dirsrv /var/run files.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_read_var_run',`
gen_require(`
type dirsrv_var_run_t;
')
allow $1 dirsrv_var_run_t:dir list_dir_perms;
allow $1 dirsrv_var_run_t:file read_file_perms;
')
########################################
##
## Manage dirsrv configuration files.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_manage_config',`
gen_require(`
type dirsrv_config_t;
')
allow $1 dirsrv_config_t:dir manage_dir_perms;
allow $1 dirsrv_config_t:file manage_file_perms;
')
########################################
##
## Read dirsrv share files.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_read_share',`
gen_require(`
type dirsrv_share_t;
')
allow $1 dirsrv_share_t:dir list_dir_perms;
allow $1 dirsrv_share_t:file read_file_perms;
allow $1 dirsrv_share_t:lnk_file read;
')
#######################################
##
## Connect to dirsrv over an unix stream socket.
##
##
##
## Domain allowed access.
##
##
#
interface(`dirsrv_stream_connect',`
gen_require(`
type dirsrv_t, dirsrv_var_run_t;
')
files_search_pids($1)
stream_connect_pattern($1, dirsrv_var_run_t, dirsrv_var_run_t, dirsrv_t)
')