403Webshell
Server IP : 80.87.202.40  /  Your IP : 216.73.216.169
Web Server : Apache
System : Linux rospirotorg.ru 5.14.0-539.el9.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Dec 5 22:26:13 UTC 2024 x86_64
User : bitrix ( 600)
PHP Version : 8.2.27
Disable Function : NONE
MySQL : OFF |  cURL : ON |  WGET : ON |  Perl : ON |  Python : OFF |  Sudo : ON |  Pkexec : ON
Directory :  /lib/python3.11/site-packages/ansible/module_utils/common/__pycache__/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /lib/python3.11/site-packages/ansible/module_utils/common/__pycache__/respawn.cpython-311.pyc
�

���c��^�ddlmZmZmZeZddlZddlZddlZddl	m
Z
mZd�Zd�Z
d�Zd�ZdS)�)�absolute_import�division�print_functionN)�to_bytes�	to_nativec�B�ttjdd��S)N�__main__�
_respawned)�hasattr�sys�modules���H/usr/lib/python3.11/site-packages/ansible/module_utils/common/respawn.py�
has_respawnedrs���3�;�z�*�L�9�9�9rc�L�t��rtd���t��}tj��\}}tj|t
|����tj|��tj	|dg|���}tj|��dS)a�
    Respawn the currently-running Ansible Python module under the specified Python interpreter.

    Ansible modules that require libraries that are typically available only under well-known interpreters
    (eg, ``yum``, ``apt``, ``dnf``) can use bespoke logic to determine the libraries they need are not
    available, then call `respawn_module` to re-execute the current module under a different interpreter
    and exit the current process when the new subprocess has completed. The respawned process inherits only
    stdout/stderr from the current process.

    Only a single respawn is allowed. ``respawn_module`` will fail on nested respawns. Modules are encouraged
    to call `has_respawned()` to defensively guide behavior before calling ``respawn_module``, and to ensure
    that the target interpreter exists, as ``respawn_module`` will not fail gracefully.

    :arg interpreter_path: path to a Python interpreter to respawn the current module
    z!module has already been respawnedz--)�stdinN)r�	Exception�_create_payload�os�pipe�writer�close�
subprocess�callr�exit)�interpreter_path�payload�
stdin_read�stdin_write�rcs     r�respawn_moduler"s���"���=��;�<�<�<����G� �g�i�i��J���H�[�(�7�+�+�,�,�,��H�[����	��*�D�1��	D�	D�	D�B��H�R�L�L�L�L�Lrc���|D]g}tj�|��s�"	tj|dd�|��g��}|dkr|cS�X#t$rY�dwxYwdS)aG
    Probes a supplied list of Python interpreters, returning the first one capable of
    importing the named module. This is useful when attempting to locate a "system
    Python" where OS-packaged utility modules are located.

    :arg interpreter_paths: iterable of paths to Python interpreters. The paths will be probed
    in order, and the first path that exists and can successfully import the named module will
    be returned (or ``None`` if probing fails for all supplied paths).
    :arg module_name: fully-qualified Python module name to probe for (eg, ``selinux``)
    z-cz
import {0}rN)r�path�existsrr�formatr)�interpreter_paths�module_namerr!s    r�probe_interpreters_for_moduler)/s���.�����w�~�~�.�/�/�	��	���"2�D�,�:M�:M�k�:Z�:Z�![�\�\�B��Q�w�w�'�'�'�'����	�	�	��H�	�����4s�1A�
A(�'A(c��ddlm}t|d��}|std���tjdj}tjdj}d}|�||t|�����}|S)Nr)�basic�
_ANSIBLE_ARGSzVunable to access ansible.module_utils.basic._ANSIBLE_ARGS (not launched by AnsiballZ?)r	a�
import runpy
import sys

module_fqn = '{module_fqn}'
modlib_path = '{modlib_path}'
smuggled_args = b"""{smuggled_args}""".strip()


if __name__ == '__main__':
    sys.path.insert(0, modlib_path)

    from ansible.module_utils import basic
    basic._ANSIBLE_ARGS = smuggled_args

    runpy.run_module(module_fqn, init_globals=dict(_respawned=True), run_name='__main__', alter_sys=True)
    )�
module_fqn�modlib_path�
smuggled_args)
�ansible.module_utilsr+�getattrrrr
�_module_fqn�_modlib_pathr&r)r+r/r-r.�respawn_code_template�respawn_codes      rrrGs���*�*�*�*�*�*��E�?�3�3�M��r��p�q�q�q���Z�(�4�J��+�j�)�6�K���$)�/�/�:�S^�nw�yF�oG�oG�/�H�H�L��r)�
__future__rrr�type�
__metaclass__rrr�+ansible.module_utils.common.text.convertersrrrr"r)rrrr�<module>r:s���C�B�B�B�B�B�B�B�B�B��
�	�	�	�	�����
�
�
�
�K�K�K�K�K�K�K�K�:�:�:����:���0����r

Youez - 2016 - github.com/yon3zu
LinuXploit