Ñò
£Tc @ sP d d k Z d d k Z d d k l Z l Z d „ Z e d „ Z d „ Z d S( iÿÿÿÿN( t
OLD_SE_CONFIGt SE_CONFIGc C s d } t i i t ƒ o t i i t ƒ o
t } n1 t i i t ƒ o t i i t ƒ o
t } n y t | d ƒ } Wn d SXg } xä | i ƒ D]Ö } | p Pn | i ƒ } t
| ƒ d j p | d d j o q— n | i d ƒ } t
| ƒ d j o q— n | d i ƒ } | d i ƒ } | d j o | i d | ƒ q— | d j o | i d
| ƒ q— q— W| i
ƒ | S( Nt ri i t #t =i t SELINUXs --selinux=%st SELINUXTYPEs --selinuxtype=%s( t Nonet ost patht existsR t isfileR t opent
xreadlinest stript lent splitt appendt close( t filenamet fdt argvt linet pt keyt value( ( s/ /usr/share/system-config-firewall/fw_selinux.pyt read s8 &
&
$
c C s× y t | d ƒ } Wn t SX| i d ƒ | i d ƒ | i d ƒ | i d ƒ | i d ƒ | i d | i ƒ | i d ƒ | i d ƒ | i d
ƒ | i o | i d | i ƒ n | i d ƒ | i ƒ t S(
Nt ws9 # This file controls the state of SELinux on the system.
s/ # SELINUX= can take one of these three values:
s3 # enforcing - SELinux security policy is enforced.
s= # permissive - SELinux prints warnings instead of enforcing.
s( # disabled - SELinux is fully disabled.
s SELINUX=%s
s; # SELINUXTYPE= type of policy in use. Possible values are:
s: # targeted - Only targeted network daemons are protected.
s$ # strict - Full SELinux protection.
s SELINUXTYPE=%s
s #SELINUXTYPE=
( R t Falset writet selinuxt selinuxtypeR t True( t confR R ( ( s/ /usr/share/system-config-firewall/fw_selinux.pyR 7 s$
c C s. d } | d j o
d } n t i d | ƒ S( Ni t enforcingi s /usr/sbin/setenforce %d( R t system( R t val( ( s/ /usr/share/system-config-firewall/fw_selinux.pyt
setenforceL s
( R t os.patht fw_configR R R R R% ( ( ( s/ /usr/share/system-config-firewall/fw_selinux.pyt