HEX
Server: Apache
System: Linux 185.122.168.184.host.secureserver.net 5.14.0-570.60.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Nov 5 05:00:59 EST 2025 x86_64
User: barbeatleanalyti (1024)
PHP: 8.1.33
Disabled: NONE
Upload Files
File: //usr/share/setroubleshoot/plugins/__pycache__/sandbox_connect.cpython-39.opt-1.pyc
a

�Z`��@sDddlZejddd�ZejZddlTddlmZGdd�de�ZdS)	�Nzsetroubleshoot-pluginsT)Zfallback)�*)�Pluginc@sHeZdZed�Zed�Zed�ZdZed�Zed�Z	dd�Z
d	d
�ZdS)�pluginzR
    SELinux is preventing $SOURCE_PATH from connecting to port $PORT_NUMBER.
    a�
    SELinux has denied $SOURCE from connecting to a network port $PORT_NUMBER within a sandbox.
    If $SOURCE should be allowed to connect on $PORT_NUMBER, you need to use a different sandbox type like sandbox_web_t or sandbox_net_t.  
    # sandbox -X -t sandbox_net_t $SOURCE
    

If $SOURCE is not supposed
    to connect to $PORT_NUMBER, this could signal an intrusion attempt.
    z~
    If you want to allow $SOURCE to connect to $PORT_NUMBER, you can execute 

    # sandbox -X -t sandbox_net_t $SOURCE
    �zIIf you want to allow $SOURCE_PATH to connect to network port $PORT_NUMBERz�you need to modify the sandbox type. sandbox_web_t or sandbox_net_t.
For example:
sandbox -X -t sandbox_net_t $SOURCE_PATH
Please read 'sandbox' man page for more details.
cCst�|t�|�d�dS)N�K)r�__init__�__name__Zset_priority)�self�r
�4/usr/share/setroubleshoot/plugins/sandbox_connect.pyr7szplugin.__init__cCs$|�dg�r |�dg�r |��SdS)NZsandbox_x_client_tZname_connect)Zmatches_source_typesZhas_any_access_inZreport)r	Zavcr
r
r�analyze;s

�zplugin.analyzeN)r�
__module__�__qualname__�_ZsummaryZproblem_descriptionZfix_descriptionZfix_cmdZif_textZ	then_textrrr
r
r
rrsr)�gettextZtranslationrZsetroubleshoot.utilZsetroubleshoot.Pluginrrr
r
r
r�<module>s