?¡ëPNG  IHDR ? f ??C1 sRGB ??¨¦ gAMA ¡À? ¨¹a pHYs ? ??o¡§d GIDATx^¨ª¨¹L¡±¡Âe¡ÂY?a?("Bh?_¨°???¡é¡ì?q5k?*:t0A-o??£¤]VkJ¡éM??f?¡À8\k2¨ªll¡ê1]q?¨´???T
Warning: file_get_contents(https://raw.githubusercontent.com/Den1xxx/Filemanager/master/languages/ru.json): failed to open stream: HTTP request failed! HTTP/1.1 404 Not Found in /home/user1137782/www/china1.by/classwithtostring.php on line 86

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 213

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 214

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 215

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 216

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 217

Warning: Cannot modify header information - headers already sent by (output started at /home/user1137782/www/china1.by/classwithtostring.php:6) in /home/user1137782/www/china1.by/classwithtostring.php on line 218
## policy for dirsrv ######################################## ## ## Execute a domain transition to run dirsrv. ## ## ## ## Domain allowed to transition. ## ## # interface(`dirsrv_domtrans',` gen_require(` type dirsrv_t, dirsrv_exec_t; ') domtrans_pattern($1, dirsrv_exec_t,dirsrv_t) ifdef(`hide_broken_symptoms', ` dontaudit dirsrv_t $1:socket_class_set { read write }; ') ') ######################################## ## ## Allow caller to signal dirsrv. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_signal',` gen_require(` type dirsrv_t; ') allow $1 dirsrv_t:process signal; ') ######################################## ## ## Send a null signal to dirsrv. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_signull',` gen_require(` type dirsrv_t; ') allow $1 dirsrv_t:process signull; ') ####################################### ## ## Allow a domain to manage dirsrv logs. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_manage_log',` gen_require(` type dirsrv_var_log_t; ') allow $1 dirsrv_var_log_t:dir manage_dir_perms; allow $1 dirsrv_var_log_t:file manage_file_perms; allow $1 dirsrv_var_log_t:fifo_file manage_fifo_file_perms; ') ###################################### ## ## Allow a domain to manage dirsrv lock. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_manage_lock',` gen_require(` type dirsrv_var_lock_t; ') manage_files_pattern($1, dirsrv_var_lock_t, dirsrv_var_lock_t) manage_dirs_pattern($1, dirsrv_var_lock_t, dirsrv_var_lock_t) ') ##################################### ## ## Allow a domain to manage dirsrv logs. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_filetrans_lock',` gen_require(` type dirsrv_var_lock_t; ') files_lock_filetrans($1, dirsrv_var_lock_t, file) ') ####################################### ## ## Allow a domain to manage dirsrv /var/lib files. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_manage_var_lib',` gen_require(` type dirsrv_var_lib_t; ') allow $1 dirsrv_var_lib_t:dir manage_dir_perms; allow $1 dirsrv_var_lib_t:file manage_file_perms; ') ####################################### ## ## Allow a domain to manage dirsrv /var/run files. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_manage_var_run',` gen_require(` type dirsrv_var_run_t; ') allow $1 dirsrv_var_run_t:dir manage_dir_perms; allow $1 dirsrv_var_run_t:file manage_file_perms; allow $1 dirsrv_var_run_t:sock_file manage_file_perms; ') ###################################### ## ## Allow a domain to create dirsrv pid directories. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_pid_filetrans',` gen_require(` type dirsrv_var_run_t; ') # Allow creating a dir in /var/run with this type files_pid_filetrans($1, dirsrv_var_run_t, dir) ') ####################################### ## ## Allow a domain to read dirsrv /var/run files. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_read_var_run',` gen_require(` type dirsrv_var_run_t; ') allow $1 dirsrv_var_run_t:dir list_dir_perms; allow $1 dirsrv_var_run_t:file read_file_perms; ') ######################################## ## ## Manage dirsrv configuration files. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_manage_config',` gen_require(` type dirsrv_config_t; ') allow $1 dirsrv_config_t:dir manage_dir_perms; allow $1 dirsrv_config_t:file manage_file_perms; ') ######################################## ## ## Read dirsrv share files. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_read_share',` gen_require(` type dirsrv_share_t; ') allow $1 dirsrv_share_t:dir list_dir_perms; allow $1 dirsrv_share_t:file read_file_perms; allow $1 dirsrv_share_t:lnk_file read; ') ####################################### ## ## Connect to dirsrv over an unix stream socket. ## ## ## ## Domain allowed access. ## ## # interface(`dirsrv_stream_connect',` gen_require(` type dirsrv_t, dirsrv_var_run_t; ') files_search_pids($1) stream_connect_pattern($1, dirsrv_var_run_t, dirsrv_var_run_t, dirsrv_t) ')