Ñò £Tc@sPddkZddkZddklZlZd„Zed„Zd„ZdS(iÿÿÿÿN(t OLD_SE_CONFIGt SE_CONFIGcCsd}tiitƒotiitƒo t}n1tiitƒotiitƒo t}nyt|dƒ}WndSXg}xä|iƒD]Ö}|pPn|i ƒ}t |ƒdjp|ddjoq—n|i dƒ}t |ƒdjoq—n|di ƒ}|di ƒ}|djo|i d|ƒq—|d jo|i d |ƒq—q—W|i ƒ|S( Ntriit#t=itSELINUXs --selinux=%st SELINUXTYPEs--selinuxtype=%s(tNonetostpathtexistsRtisfileRtopent xreadlineststriptlentsplittappendtclose(tfilenametfdtargvtlinetptkeytvalue((s//usr/share/system-config-firewall/fw_selinux.pytreads8& &   $   cCs×yt|dƒ}WntSX|idƒ|idƒ|idƒ|idƒ|idƒ|id|iƒ|idƒ|id ƒ|id ƒ|io|id |iƒn|id ƒ|iƒtS( Ntws9# This file controls the state of SELinux on the system. s/# SELINUX= can take one of these three values: s3# enforcing - SELinux security policy is enforced. s=# permissive - SELinux prints warnings instead of enforcing. s(# disabled - SELinux is fully disabled. s SELINUX=%s s;# SELINUXTYPE= type of policy in use. Possible values are: s:# targeted - Only targeted network daemons are protected. s$# strict - Full SELinux protection. sSELINUXTYPE=%s s#SELINUXTYPE= (R tFalsetwritetselinuxt selinuxtypeRtTrue(tconfRR((s//usr/share/system-config-firewall/fw_selinux.pyR7s$           cCs.d}|djo d}ntid|ƒS(Nit enforcingis/usr/sbin/setenforce %d(Rtsystem(Rtval((s//usr/share/system-config-firewall/fw_selinux.pyt setenforceLs  (Rtos.patht fw_configRRRRR%(((s//usr/share/system-config-firewall/fw_selinux.pyts