403Webshell
Server IP : 192.64.112.168  /  Your IP : 18.117.100.130
Web Server : Apache
System : Linux nc-ph-2300-85.bluforrest.com 4.18.0-513.9.1.el8_9.x86_64 #1 SMP Sat Dec 2 05:23:44 EST 2023 x86_64
User : expressoneac ( 1128)
PHP Version : 8.0.30
Disable Function : exec,passthru,shell_exec,system
MySQL : OFF  |  cURL : ON  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /lib/python3.6/site-packages/sos/report/plugins/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /lib/python3.6/site-packages/sos/report/plugins/aap_receptor.py
# Copyright (c) 2024 Rudnei Bertol Jr <rudnei@redhat.com>

# This file is part of the sos project: https://github.com/sosreport/sos
#
# This copyrighted material is made available to anyone wishing to use,
# modify, copy, or redistribute it subject to the terms and conditions of
# version 2 of the GNU General Public License.
#
# See the LICENSE file in the source distribution for further information.

import glob
from sos.report.plugins import Plugin, RedHatPlugin


class AAPreceptorPlugin(Plugin, RedHatPlugin):
    short_desc = 'AAP receptor plugin'
    plugin_name = 'aap_receptor'
    profiles = ('sysmgmt', 'ansible')
    packages = ('receptor', 'receptorctl')
    services = ('receptor',)

    def setup(self):
        self.add_copy_spec([
            "/etc/receptor",
            "/tmp/receptor/*/status",
            "/var/lib/receptor",
        ])

        if self.get_option("all_logs"):
            self.add_copy_spec([
                "/var/log/receptor"
            ])
        else:
            self.add_copy_spec([
                "/var/log/receptor/*.log"
            ])

        self.add_forbidden_path([
            "/etc/receptor/tls",
            "/etc/receptor/*key.pem"
        ])

        self.add_dir_listing([
            "/etc/receptor",
            "/var/run/receptor",
            "/var/run/awx-receptor"
        ])

        for s in glob.glob('/var/run/*receptor/*.sock'):
            self.add_cmd_output(f"receptorctl --socket {s} status",
                                suggest_filename="receptorctl_status")
            self.add_cmd_output(f"receptorctl --socket {s} status --json",
                                suggest_filename="receptorctl_status.json")
            self.add_cmd_output(f"receptorctl --socket {s} work list",
                                suggest_filename="receptorctl_work_list.json")
            break

# vim: set et ts=4 sw=4 :

Youez - 2016 - github.com/yon3zu
LinuXploit