%PDF- %PDF-
Mini Shell

Mini Shell

Direktori : /lib/python3/dist-packages/ufw/__pycache__/
Upload File :
Create Path :
Current File : //lib/python3/dist-packages/ufw/__pycache__/backend.cpython-312.pyc

�

#fdk���dZddlZddlZddlZddlZddlZddlZddlZddlm	Z	m
Z
mZmZddl
mZmZddlZGd�d�Zy)z&backend.py: interface for ufw backends�N)�error�warn�debug�	_findpath)�UFWError�UFWRulec���eZdZdZ		d!d�Zd�Zd�Zd�Zd"d�Zd�Z	d	�Z
d
�Zd�Zd�Z
d
�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Zd�Z d �Z!y)#�
UFWBackendzInterface for backendsNc�J�d|_||_||_g|_g|_ttjj|�}tjj|d�tjj|d�tjj|d�d�|_|�|jj|�ddddd	d
�|_tjj|_|j!�|j#�|j%�tj&j)|jd�|_tjjtjj,d�|_tjjtjj,d
�|_tjjtjj,d�|_tjjtjj,d�|_	tj6j9|j.�|_d|_!y#t<$rt?d�}tA|��wxYw)Nzdefault/ufwzufw/ufw.confzufw/applications.d)�defaults�conf�appsr�d��i,i�)�off�low�medium�high�fullr�iptablesziptables-restore�	ip6tableszip6tables-restorez#Couldn't determine iptables version)"r�name�dryrun�rules�rules6r�ufw�common�
config_dir�os�path�join�files�update�	loglevels�	do_checks�
_do_checks�
_get_defaults�_read_rules�applications�get_profiles�profiles�iptables_dirr�iptables_restorer�ip6tables_restore�util�get_iptables_version�iptables_version�OSError�_r�caps)�selfrr�extra_files�rootdir�datadir�p�err_msgs        �-/usr/lib/python3/dist-packages/ufw/backend.py�__init__zUFWBackend.__init__ s�����
���	������
�����c�j�j�+�+�W�5��"$�'�'�,�,�q�-�"@� �g�g�l�l�1�n�=� �g�g�l�l�1�.B�C�F��
��"��J�J���k�*�!"�!$�$'�"%�"%�	(������-�-����������������(�(�5�5�d�j�j��6H�I��
������S�Z�Z�%<�%<�j�I��
� "�����S�Z�Z�-D�-D�-?�!A��������c�j�j�&=�&=�{�K���!#�����c�j�j�.E�.E�.A�"C���	$�$'�H�H�$A�$A�$�-�-�$P�D�!���	���	$��=�>�G��7�#�#�	$�s�.J� J"c�>�|j�yi|_i|jd<d|jdd<d|jdd<|jr�tj�dk(r�|js�	t
jj|j�}d	|vrd
|vrd|jdd<nd|jdd<|j�rX	t
jj|j�}d	|vrd
|vrd|jdd<yd|jdd<yyyyy#t$r5}d|z}|j�rt|�t|�Yd}~yd}~wwxYw#t$r}td|z�Yd}~��d}~wwxYw)zgInitialize the capabilities database. This needs to be called
           before accessing the database.N�limitT�4F�6rzinitcaps
%sz
recent-setz
recent-update)r4r%r�getuidrrr/�get_netfilter_capabilitiesrr2�
is_enabledrr�use_ipv6r)r5�nf_caps�e�msgs    r;�initcapszUFWBackend.initcapsLs���
�9�9� ����	���	�	�'��#'��	�	�'��3��"'��	�	�'��3���>�>�b�i�i�k�Q�.�t�{�{�
��(�(�=�=�d�m�m�L���w�&�?�g�+E�*.��	�	�'�"�3�'�*/��	�	�'�"�3�'��}�}��.�!�h�h�A�A�$�.�.�Q�G� �7�*��'�/I�.2�D�I�I�g�&�s�+�.3�D�I�I�g�&�s�+��%8C�.�>���
�$�q�(���?�?�$��#�J��S�	���
��"�.��.�1�,�-�-��.�s0�8)D:�)E;�:	E8�+E3�3E8�;	F�F�Fc�F�d|jvr|jddk(ryy)z!Is firewall configured as enabled�enabled�yesTF)r�r5s r;rCzUFWBackend.is_enabledxs%����
�
�%��=�=��#�u�,���c��d|jvr2|jddk(r tjjd�ryy)z"Is firewall configured to use IPv6�ipv6rKz/proc/sys/net/ipv6TF)rrr �existsrLs r;rDzUFWBackend.use_ipv6s6���T�]�]�"��=�=�� �E�)�
�7�7�>�>�.�/��rMc���d|zdz}d}|j|dk(rd}n|j|dk(rd}nd}|r�|dk(r�d	}td
�}tjj	ddg�\}}|d
k7rt|��d|vrd}|j
�r^tjj	ddg�\}}|d
k(rd|vrd}tjj	ddg�\}}|d
k(rd|vrd}|sd}|S)z.Get default policy for specified primary chain�default_�_policy��accept�allow�reject�deny�forwardFzproblem running sysctl�sysctlznet.ipv4.ip_forwardr�1Tz net.ipv6.conf.default.forwardingznet.ipv6.conf.all.forwarding�disabled)rr3rr/�cmdrrD)	r5�primary�
check_forward�policy�rstrrJr:�rc�outs	         r;�_get_default_policyzUFWBackend._get_default_policy�s���g�%�	�1�����=�=�� �H�,��D�
�]�]�6�
"�h�
.��D��D��W�	�1��G��0�1�G������h�0E�%F�G�I�R���Q�w��w�'�'��c�z����}�}���H�H�L�L�(�4V�)W�X�	��S���7�s�c�z�"�G��H�H�L�L�(�4R�)S�T�	��S���7�s�c�z�"�G��!���rMc�	�|jstd�}t|�ytj�tj
�k7rtd�}t
|��tj�tj�k7rtd�}t
|��tj�}|dk7rtd�}t
|��i}i}i}g}tjj|jd�s'td�|jdz}t|�n�tjd	�}tj|jd�D]P}	|j|	�r�|j!tjj#|jd|	���Rt%|jj'��tjj)t*j,d�gz|zD�]
}
|
j/d
�stj0��d
|
��}
	t3d|
z�|
|jdk(r-tjj|jd�s�|	tj4|
�}|t4j6}d
}
d}d}	t=j>|j@�d|
k(s%t=j>|j@�d|k(rd}|j@dk7rD|sB|
|vr>td�tE|�|
tE|j@�d�z}t|�d||
<|t4jFzr"|
|vrtd�|
z}t|�d||
<|t4jHzr1|
|vr-|jJdk7rtd�|
z}t|�d||
<|
d
k(r���|
}tjjM|
�}
|
st9tNjPd|z�����|jD]]}|dk7s�	tjjS|j|�r�6td�||j|d�z}t
|��y#t8$rtd�|
z}t
|��t:$r�wxYw#tB$rY���wxYw)a8Perform basic security checks:
        is setuid or setgid (for non-Linux systems)
        checks that script is owned by root
        checks that every component in absolute path are owned by root
        warn if script is group writable
        warn if part of script path is group writable

        Doing this at the beginning causes a race condition with later
        operations that don't do these checks.  However, if the user running
        this script is root, then need to be root to exploit the race
        condition (and you are hosed anyway...)
        zChecks disabledTz%ERROR: this script should not be SUIDz%ERROR: this script should not be SGIDrz&You need to be root to run this scriptrz'%s' does not existz^\.�/z	Checking zCouldn't stat '%s'�clickpkg�	snappypkgFz4uid is %(uid)s but '%(path)s' is owned by %(st_uid)s)�uidr �st_uidz%s is world writable!z%s is group writable!zCould not find parent for '%s'z&'%(f)s' file '%(name)s' does not exist)�frN)*r%r3rrrA�geteuidr�getgid�getegidr �isdirr"�re�compile�listdir�search�appendr!�list�values�abspath�sys�argv�
startswith�getcwdr�stat�ST_MODEr2�	Exception�pwd�getpwuidrj�KeyError�str�S_IWOTH�S_IWGRP�st_gid�dirname�errno�ENOENT�isfile)r5r:ri�warned_world_write�warned_group_write�warned_ownerr+�warn_msg�pat�profiler �statinfo�mode�
click_user�	snap_user�is_unpack_user�	last_pathrks                  r;r&zUFWBackend._do_checks�s+���~�~��)�*�G���M���9�9�;�"�*�*�,�&��?�@�G��7�#�#�
�9�9�;�"�*�*�,�&��?�@�G��7�#�#��i�i�k���!�8��@�A�G��7�#�#� ���������w�w�}�}�T�Z�Z��/�0��.�/�4�:�:�f�3E�F�H���N��*�*�V�$�C��:�:�d�j�j��&8�9�
O���z�z�'�*��O�O�B�G�G�L�L����F�1C�W�$M�N�
O�����*�*�,�-��'�'�/�/�#�(�(�1�+�.�0�1���9	/�D��?�?�3�'�"$�)�)�+�t�4����k�D�(�)��4�:�:�f�-�-�!�w�w�}�}�T�Z�Z��-?�@���!�w�w�t�}�H�#�D�L�L�1�D�(�
�'�	�!&����|�|�H�O�O�4�Q�7�:�E��L�L����9�!�<�	�I�)-���?�?�a�'���L�0� �".� /�:=�c�(�7;�9<�X�_�_�9M�3O� P�H���N�)-�L��&��$�,�,�&�4�7I�+I� �!8�9�T�B�H���N�/3�&�t�,��$�,�,�&�4�7I�+I� ���1�,� �!8�9�T�B�H���N�/3�&�t�,��3�;�� �	��w�w���t�,���!�%�,�,�"B�#,�#.�/�/�e�9	/�v���	(�A��F�{�2�7�7�>�>�$�*�*�Q�-�#@��D�E�"#�T�Z�Z��]�;�=���w�'�'�		(��[�,�� 4�5��>�G�"�7�+�+� ����� ����s�(R	�:AR8�	,R5�8	S�Sc��i|_|jd|jdfD]�}	tjj	|�}tjd�}|D]x}|j|�s�tjd|j��}|dj�jd�|j|dj�<�z|j���gd	�}d
D]^}d|z|jvrt
d|z�}t|��|jd|z}	|	|vs�Dt
d
|	|d�z�}t|��y#t
$rt
d�|z}t|��wxYw)z#Get all settings from defaults filerr
zCouldn't open '%s' for readingz^\w+="?\w+"?�=��"'r)rU�droprW)�input�outputrYzdefault_%s_policyzMissing policy for '%s'z+Invalid policy '%(policy)s' for '%(chain)s')r`�chainN)rr"rr/�open_file_readr~r3rrprqrs�split�strip�lower�close)
r5rk�origr:r��line�tmp�policies�cr9s
          r;r'zUFWBackend._get_defaultssr����
��*�*�Z�(�$�*�*�V�*<�=�	�A�
(��x�x�.�.�q�1���*�*�_�-�C��
P���:�:�d�#��(�(�4�����6�C�47��F�L�L�N�4H�4H��4O�D�M�M�#�a�&�,�,�.�1�
P�

�J�J�L�	�0��1�	(�A�"�a�(��
�
�=��5��;�<���w�'�'��
�
�1�Q�7�8�A��� ��I�()�A�6�8�9���w�'�'�	(���
(��<�=��C���w�'�'�
(�s�E�#E8c�L�tjd|�std�}t|��t	j
|tj�std|z�}t|��tjj|�}|d}d}tjd|zdz�}|dD]_}	|j|	�r,tjj||dz|zd	z�d
}�@tjj||	��a|s)tjj||dz|zd	z�	tjj|�|j�j!d�|j"|j�<y#t$r�wxYw)
zSets option in defaults filez^[\w_]+$zInvalid optionz'%s' is not writabler�F�^r�r��
Tr�N)rp�matchr3rr�access�W_OKrr/�
open_filesrqrs�
write_to_file�close_filesr~r�r�r)
r5�fn�opt�valuer:�fns�fd�foundr�r�s
          r;�set_defaultzUFWBackend.set_default:sa���x�x��S�)��(�)�G��7�#�#��y�y��R�W�W�%��.�"�5�6�G��7�#�#��h�h�!�!�"�%��
��Z�����j�j����c�)�*����K�	1�D��z�z�$�����&�&�r�3��9�u�+<�t�+C�D������&�&�r�4�0�	1���H�H�"�"�2�s�S�y�5�'8�4�'?�@�	��H�H� � ��%�
&+�[�[�]�%8�%8��%?��
�
�c�i�i�k�"��	�	��	�s�>F�F#c��|js�|dk(r!|j|jddd�n�|dk(r!|j|jddd�ne|dk(r!|j|jddd�n?|d	k(r!|j|jddd
�ntd�|z}t	|��td�|z}|S)
z+Sets default application policy of firewallrVr�DEFAULT_APPLICATION_POLICYz"ACCEPT"rXz"DROP"rWz"REJECT"�skipz"SKIP"zUnsupported policy '%s'z*Default application policy changed to '%s')rr�r"r3r)r5r`r:ras    r;�set_default_application_policyz)UFWBackend.set_default_application_policy^s����{�{��� �� � ����J�!7�(D�(4�6��6�!�� � ����J�!7�(D�(2�4��8�#�� � ����J�!7�(D�(4�6��6�!�� � ����J�!7�(D�(2�4��5�6�&�A���w�'�'��=�>�&�I���rMc�N�g}t|jj��}|j|v�r=|j|v�r.t
jj|j|j�}t
jj|j|j�}|D�]�}|j�}d|_	|jdd�t
jj|�\}}	|j|	�|j|d�|j|_	|j|jk(rpd|_t
jj|�\}}	|j|	�|j|d�|j|_|j|���|D]�}
|j�}d|_t
jj|
�\}}	|j|	�|j|d�|j dk(r|j|j �|j|_|j|�������n�|j|vr�t
jj|j|j�D]�}|j�}d|_t
jj|�\}}	|j|	�|j|d�|j|_|j|���n�|j|vr�t
jj|j|j�D]�}|j�}d|_	t
jj|�\}}	|j|	�|j|d�|j|_	|j|���t#|�dkrt%d�}
t'|
��|S)z4Return a list of UFWRules based on the template rulerT�any�src�dstr�z&No rules found for application profile)rur+�keys�dport�sportrr)�	get_ports�dup_rule�dapp�set_portr/�parse_port_proto�set_protocol�sapprt�protocol�lenr3r)r5�templater�
profile_names�dports�sports�ir��port�proto�j�ruler9r:s              r;�get_app_rules_from_templatez&UFWBackend.get_app_rules_from_templateys9�����T�]�]�/�/�1�2�
��>�>�]�*�x�~�~��/N��%�%�/�/��
�
�h�n�n�0M�N�F��%�%�/�/��
�
�h�n�n�0M�N�F�� 
+���'�'�)��������U�E�*� #��� 9� 9�!� <�
��u�� � ��'����T�5�)�#�=�=����>�>�X�^�^�3� "�C�H�$'�H�H�$=�$=�a�$@�M�T�5��$�$�U�+��L�L��u�-�'�}�}�C�H��L�L��%�#�+��"�|�|�~��$&��	�(+���(A�(A�!�(D�
��u��)�)�%�0��
�
�d�E�2��=�=�E�1� �-�-�c�l�l�;�$,�M�M��	����T�*�+�+ 
+�B�^�^�}�
,��%�%�/�/��
�
�h�n�n�0M�N�
#���(�(�*����	� #��� 9� 9�!� <�
��u��!�!�%�(��
�
�d�E�*�$�M�M��	����T�"�
#��^�^�}�
,��%�%�/�/��
�
�h�n�n�0M�N�
#���(�(�*����	� #��� 9� 9�!� <�
��u��!�!�%�(��
�
�d�E�*�$�M�M��	����T�"�
#��u�:��>��@�A�G��7�#�#��rMc��g}g}d}d}d}|j|jzD�];}|j|k(s|j|k(r�|j	�}||k(r�8|j�}	|	j
d�|	jdk7r|	j|	jd�|	jdk7r|	j|	jd�|j|	�}
|
D]A}|j�|jr|j|��1|j|��C|}d}��|jr|j|���+|j|���>|rF||_||_|td�|zz
}	|jd�|jd�||fS||fS#t$rtd�}t|��wxYw)	z�Update rule for profile in place. Returns result string and bool
           on whether or not the profile is used in the current ruleset.
        rTFr�r�r�TzRules updated for profile '%s'z!Couldn't update application rules)rrr�r��
get_app_tupler�r�r�r��	normalize�v6rtr3�_write_rulesr~r)
r5r��
updated_rules�updated_rules6�
last_tuplera�updated_profile�r�tuplr��
new_app_rules�new_rr:s
             r;�update_app_rulezUFWBackend.update_app_rule�s����
����
��������d�k�k�)�"	,�A��v�v�� �A�F�F�g�$5����(���:�%�� !�z�z�|�H��)�)�%�0��}�}��*� �)�)�(�-�-��?��}�}��*� �)�)�(�-�-��?�$(�$D�$D�*2�%4�M�"/�8�����)� �8�8�*�1�1�%�8�)�0�0��7�8�"&�J�&*�O��4�4�"�)�)�!�,�!�(�(��+�E"	,�H�&�D�J�(�D�K��A�6�7�7�C�C�D�
(��!�!�%�(��!�!�$�'�
�o�&�&��o�&�&��	�
(��?�@���w�'�'�
(�s�"F/�/ Gc�l�||jvr|Sd}d}t|jj��D]+}|j�|j�k(s�%|}|dz
}�-d||fz}t	|�|dk(r|S|dkDrtd�|z}t
|��td�|z}t
|��)z2Find the application profile name for profile_namerTrr�z'%d' matches for '%s'z>Found multiple matches for '%s'. Please use exact profile namez&Could not find a profile matching '%s')r+rur�r�rr3r)r5�profile_namer��matches�n�	debug_msgr:s       r;�find_application_namez UFWBackend.find_application_name�s����4�=�=�(��������d�m�m�(�(�*�+�	�A��w�w�y�L�.�.�0�0����1���	�
,�w��.E�E�	�
�i���a�<��L�
�q�[��X�Y�%�'�G�
�w����@�A�%�'�G��w��rMc��|r"|t|j�kDr
t��|s"|t|j�kDr
t��|dkr
t��g}|r
|j}n|j}i}d}t	|�D]L\}}||k\rnBd}|j
dk7s|jdk7s�.|j�}||vr|dz
}�Hd||<�Ng}|rA|j}|j|dz
|zj�}	|	jd�n@|j}|j|dz
|zj�}	|	jd�d}
|D]$}tj||	�dk(r|
cS|
dz
}
�&y)a.Return the absolute position in the other list of the rule with the
           user position of the given list. For example, find_other_position(4,
           True) will return the absolute position of the rule in the ipv4 list
           matching the user specified '4' rule in the ipv6 list.
        r�rrTTF)r�r�
ValueErrorr�	enumerater�r�r�r��set_v6rr�)r5�positionr�r�	app_rules�tuple_offsetr�r�r��
match_rule�counts           r;�find_other_positionzUFWBackend.find_other_positions����(�S����-�-��,���h��T�Z�Z��0��,���a�<��,����
��K�K�E��J�J�E��	����e�$�
	+�D�A�q��H�}���D��v�v��|�q�v�v��|����(���9�$� �A�%�L�&*�I�d�O�
	+���
��J�J�E����X��\�L�%@�A�J�J�L�J����e�$��K�K�E����H�q�L�<�$?�@�I�I�K�J����d�#����	�A��}�}�Q�
�+�q�0����Q�J�E�	�
rMc�J�d}td�}d|jvs2|jdt|jj	��vrd}|td�z
}||fS|j|jd}|dk(r	|dz
}||fS|d|jdzz
}||fS)z"Gets current log level of firewallrz	Logging: �loglevel����unknownrzon (%s))r3rrur$r�)r5�levelras   r;�get_loglevelzUFWBackend.get_loglevelOs�������~���T�]�]�*��=�=��$�D����1D�1D�1F�,G�G��E��A�i�L� �D��t�}���N�N�4�=�=��#<�=�E���z���
���t�}���	�T�]�]�:�%>�?�?���t�}�rMc��|t|jj��dgzvrtd�|z}t	|��|}|dk(r2d|j
vs|j
ddk(rd}n|j
d}|j
|jdd|�|j|�|dk(rtd�Std	�S)
zSets log level of firewall�onzInvalid log level '%s'r�rrr
�LOGLEVELzLogging disabledzLogging enabled)	rur$r�r3rrr�r"�update_logging)r5r�r:�	new_levels    r;�set_loglevelzUFWBackend.set_loglevel_s�����T�^�^�0�0�2�3�t�f�<�<��0�1�U�;�G��7�#�#��	��D�=�����.��}�}�Z�(�E�1�!�	� �M�M�*�5�	�������F�+�Z��C����I�&�����'�(�(��&�'�'rMc�D�|j�|j�zS)zReturn list of all rules)�get_rules_ipv4�get_rules_ipv6rLs r;�	get_ruleszUFWBackend.get_rulesus���"�"�$�t�':�':�'<�<�<rMc��|jS)zReturn list of IPv4 rules)rrLs r;rzUFWBackend.get_rules_ipv4ys���z�z�rMc��|jS)zReturn list of IPv6 rules)rrLs r;rzUFWBackend.get_rules_ipv6}s���{�{�rMc���g}|r
|j}n|j}d}i}|D]O}d}|jdk7s|jdk7r(|j	�}||vrtd|z��Fd||<|dz
}�Q|S)z/Return number of ufw rules (not iptables rules)rrT�Skipping found tuple '%s'Tr�)rrr�r�r�r)r5r�rr�r�r�r�s       r;�get_rules_countzUFWBackend.get_rules_count�s�����
��K�K�E��J�J�E����	��
	�A��D��v�v��|�q�v�v��|����(���9�$��5��>�?��&*�I�d�O��Q�J�E�
	��rMc��|j�}d}i}|D]a}d}|jdk7s|jdk7r(|j�}||vrt	d|z��Fd||<|t|�k(r|cS|dz
}�cy)z:Return rule specified by number seen via "status numbered"r�rTrTN)rr�r�r�r�int)r5�numrr�r�r�r�s       r;�get_rule_by_numberzUFWBackend.get_rule_by_number�s������ �����	��	�A��D��v�v��|�q�v�v��|����(���9�$��5��>�?��&*�I�d�O���C�� ����Q�J�E�	�rMc��g}d}|j�D]/}|dz
}|j|�}|dks�|j|��1|S)zmSee if there is a matching rule in the existing ruleset. Note this
           does not group rules by tuples.rr�)r�fuzzy_dst_matchrt)r5r��matchedr�r��rets      r;�get_matchingzUFWBackend.get_matching�sW���������!�	&�A��Q�J�E��&�&�q�)�C��Q�w����u�%�		&��rMc��td��)z*Set default policy for specified directionz/UFWBackend.set_default_policy: need to override�r)r5r`�	directions   r;�set_default_policyzUFWBackend.set_default_policy�s���H�I�IrMc��td��)zGet status of running firewallz,UFWBackend.get_running_raw: need to overrider)r5�
rules_types  r;�get_running_rawzUFWBackend.get_running_raw�s���E�F�FrMc��td��)zGet managed rulesz'UFWBackend.get_status: need to overrider)r5�verbose�
show_counts   r;�
get_statuszUFWBackend.get_status�s���@�A�ArMc��td��)zUpdate firewall with rulez%UFWBackend.set_rule: need to overrider)r5r��allow_reloads   r;�set_rulezUFWBackend.set_rule�s���>�?�?rMc��td��)zStart the firewallz+UFWBackend.start_firewall: need to overriderrLs r;�start_firewallzUFWBackend.start_firewall�����D�E�ErMc��td��)zStop the firewallz*UFWBackend.stop_firewall: need to overriderrLs r;�
stop_firewallzUFWBackend.stop_firewall�s���C�D�DrMc��td��)z%Get a list if rules based on templatez6UFWBackend.get_app_rules_from_system: need to overrider)r5r�r�s   r;�get_app_rules_from_systemz$UFWBackend.get_app_rules_from_system�s���"�#�	#rMc��td��)z#Update loglevel of running firewallz+UFWBackend.update_logging: need to overrider)r5r�s  r;r�zUFWBackend.update_logging�r"rMc��td��)zReset the firewallz"UFWBackend.reset: need to overriderrLs r;�resetzUFWBackend.reset�s���;�<�<rM)NNN)r�F)"�__name__�
__module__�__qualname__�__doc__r<rHrCrDrdr&r'r�r�r�r�r�r�r�r�rrrrrrrrrrr!r$r&r�r)�rMr;r
r
s��� �15�'+�*�X*4�X��#�Ln(�`(�:"@�H�6B�H<'�| �0:�x� (�,=����0�,�J�G�B�@�F�E�#�
F�=rMr
)r-r�rrrpr|rx�ufw.utilrrrrr�
ufw.commonrr�ufw.applicationsr
r.rMr;�<module>r2s7��,�"
�	�
�	��
��2�2�(��B=�B=rM

Zerion Mini Shell 1.0