? 404

[ Shin Bypassed ]




Upload:

Command:

landifun@3.145.74.86: ~ $
#!/usr/bin/python3 -s
# -*- coding: utf-8 -*-
#
# Copyright (C) 2009-2016 Red Hat, Inc.
#
# Authors:
# Thomas Woerner <twoerner@redhat.com>
# Jiri Popelka <jpopelka@redhat.com>
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.
#

from gi.repository import GObject
import sys
sys.modules['gobject'] = GObject

import argparse
import os

from firewall.client import FirewallClientIPSetSettings, \
    FirewallClientZoneSettings, FirewallClientServiceSettings, \
    FirewallClientIcmpTypeSettings, FirewallClientHelperSettings, \
    FirewallClientPolicySettings
from firewall.errors import FirewallError
from firewall import config
from firewall.core.fw import Firewall
from firewall.functions import joinArgs, splitArgs, getPortRange
from firewall.core.io.functions import check_on_disk_config
from firewall.core.io.zone import zone_reader
from firewall.core.io.policy import policy_reader
from firewall.core.io.service import service_reader
from firewall.core.io.ipset import ipset_reader
from firewall.core.io.icmptype import icmptype_reader
from firewall.core.io.helper import helper_reader
from firewall.command import FirewallCommand

# check for root user
def assert_root():
    if os.getuid() != 0:
        sys.stderr.write("You need to be root to run %s.\n" % sys.argv[0])
        sys.exit(-1)

SYSTEM_CONFIG_FIREWALL = config.SYSCONFIGDIR + '/system-config-firewall'

def __usage():
    sys.stdout.write("""
Usage: firewall-offline-cmd [OPTIONS...]

If no options are given, configuration from '%s' will be migrated.

General Options
  -h, --help           Prints a short help text and exits
  -V, --version        Print the version string of firewalld
  -q, --quiet          Do not print status messages
      --system-config  Path to firewalld system configuration
      --default-config Path to firewalld default configuration
      --check-config   Check system and default configuration
      --reset-to-defaults
                       Reset configuration to firewalld's default configuration

Lokkit Compatibility Options
  --migrate-system-config-firewall=<file>
                        Import configuration data from the given configuration
                        file.
  --enabled             Enable firewall (default)
  --disabled            Disable firewall
  --addmodule=<module>  Ignored option, was used to enable an iptables module
  --removemodule=<module>
                        Ignored option, was used to disable an iptables module
  -s <service>, --service=<service>
                        Enable a service in the default zone (example: ssh)
  --remove-service=<service>
                        Disable a service in the default zone (example: ssh)
  -p <port>[-<port>]:<protocol>, --port=<port>[-<port>]:<protocol>
                        Enable a port in the default zone (example: ssh:tcp)
  -t <interface>, --trust=<interface>
                        Bind an interface to the trusted zone
  -m <interface>, --masq=<interface>
                        Enables masquerading in the default zone, interface
                        argument is ignored. This is IPv4 only.
  --custom-rules=[<type>:][<table>:]<filename>
                        Ignored option. Was used to add custom rules to the
                        firewall (Example:
                        ipv4:filter:%s/ipv4_filter_addon)
  --forward-port=if=<interface>:port=<port>:proto=<protocol>[:toport=<destination port>][:toaddr=<destination address>]
                        Forward the port with protocol for the interface to
                        either another local destination port (no destination
                        address given) or to an other destination address with
                        an optional destination port. This will be added to
                        the default zone. This is IPv4 only.
  --block-icmp=<icmp type>
                        Block this ICMP type in the default zone. The default
                        is to accept all ICMP types.

Log Denied Options
  --get-log-denied     Print the log denied value
  --set-log-denied=<value>
                       Set log denied value

Automatic Helpers Options
  --get-automatic-helpers
                       Print the automatic helpers value
  --set-automatic-helpers=<value>
                       Set automatic helpers value

Zone Options
  --get-default-zone   Print default zone for connections and interfaces
  --set-default-zone=<zone>
                       Set default zone
  --get-zones          Print predefined zones
  --get-services       Print predefined services
  --get-icmptypes      Print predefined icmptypes
  --get-zone-of-interface=<interface>
                       Print name of the zone the interface is bound to
  --get-zone-of-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
                       Print name of the zone the source is bound to
  --list-all-zones     List everything added for or enabled in all zones
  --new-zone=<zone>    Add a new empty zone
  --new-zone-from-file=<filename> [--name=<zone>]
                       Add a new zone from file with optional name override [P only]
  --delete-zone=<zone> Delete an existing zone
  --load-zone-defaults=<zone>
                       Load zone default settings
  --zone=<zone>        Use this zone to set or query options, else default zone
                       Usable for options marked with [Z]
  --info-zone=<zone>   Print information about a zone
  --path-zone=<zone>   Print file path of a zone

Policy Options
  --get-policies       Print predefined policies
  --list-all-policies  List everything added for or enabled in all policies
  --new-policy=<policy>
                       Add a new empty policy
  --new-policy-from-file=<filename> [--name=<policy>]
                       Add a new policy from file with optional name override [P only]
  --delete-policy=<policy>
                       Delete an existing policy
  --load-policy-defaults=<policy>
                       Load policy default settings
  --policy=<policy>    Use this policy to set or query options
                       Usable for options marked with [O]
  --info-policy=<policy>
                       Print information about a policy
  --path-policy=<policy>
                       Print file path of a policy

IPSet Options
  --new-ipset=<ipset> --type=<ipset type> [--option=<key>[=<value>]]..
                       Add a new empty ipset
  --new-ipset-from-file=<filename> [--name=<ipset>]
                       Add a new ipset from file with optional name override [P only]
  --delete-ipset=<ipset>
                       Delete an existing ipset
  --load-ipset-defaults=<ipset>
                       Load ipset default settings
  --info-ipset=<ipset> Print information about an ipset
  --path-ipset=<ipset> Print file path of an ipset
  --get-ipsets         Print predefined ipsets
  --ipset=<ipset> --set-description=<description>
                       Set new description to ipset
  --ipset=<ipset> --get-description
                       Print description for ipset
  --ipset=<ipset> --set-short=<description>
                       Set new short description to ipset
  --ipset=<ipset> --get-short
                       Print short description for ipset
  --ipset=<ipset> --add-entry=<entry>
                       Add a new entry to an ipset
  --ipset=<ipset> --remove-entry=<entry>
                       Remove an entry from an ipset
  --ipset=<ipset> --query-entry=<entry>
                       Return whether ipset has an entry
  --ipset=<ipset> --get-entries
                       List entries of an ipset
  --ipset=<ipset> --add-entries-from-file=<entry>
                       Add a new entries to an ipset
  --ipset=<ipset> --remove-entries-from-file=<entry>
                       Remove entries from an ipset

IcmpType Options
  --new-icmptype=<icmptype>
                       Add a new empty icmptype
  --new-icmptype-from-file=<filename> [--name=<icmptype>]
                       Add a new icmptype from file with optional name override [P only]
  --delete-icmptype=<icmptype>
                       Delete an existing icmptype
  --load-icmptype-defaults=<icmptype>
                       Load icmptype default settings
  --info-icmptype=<icmptype>
                       Print information about an icmptype
  --path-icmptype=<icmptype>
                       Print file path of an icmptype
  --icmptype=<icmptype> --set-description=<description>
                       Set new description to icmptype
  --icmptype=<icmptype> --get-description
                       Print description for icmptype
  --icmptype=<icmptype> --set-short=<description>
                       Set new short description to icmptype
  --icmptype=<icmptype> --get-short
                       Print short description for icmptype
  --icmptype=<icmptype> --add-destination=<ipv>
                       Enable destination for ipv in icmptype
  --icmptype=<icmptype> --remove-destination=<ipv>
                       Disable destination for ipv in icmptype
  --icmptype=<icmptype> --query-destination=<ipv>
                       Return whether destination ipv is enabled in icmptype
  --icmptype=<icmptype> --get-destinations
                       List destinations in icmptype

Service Options
  --new-service=<service>
                       Add a new empty service
  --new-service-from-file=<filename> [--name=<service>]
                       Add a new service from file with optional name override [P only]
  --delete-service=<service>
                       Delete an existing service
  --load-service-defaults=<service>
                       Load icmptype default settings
  --info-service=<service>
                       Print information about a service
  --path-service=<service>
                       Print file path of a service
  --service=<service> --set-description=<description>
                       Set new description to service
  --service=<service> --get-description
                       Print description for service
  --service=<service> --set-short=<description>
                       Set new short description to service
  --service=<service> --get-short
                       Print short description for service
  --service=<service> --add-port=<portid>[-<portid>]/<protocol>
                       Add a new port to service
  --service=<service> --remove-port=<portid>[-<portid>]/<protocol>
                       Remove a port from service
  --service=<service> --query-port=<portid>[-<portid>]/<protocol>
                       Return whether the port has been added for service
  --service=<service> --get-ports
                       List ports of service
  --service=<service> --add-protocol=<protocol>
                       Add a new protocol to service
  --service=<service> --remove-protocol=<protocol>
                       Remove a protocol from service
  --service=<service> --query-protocol=<protocol>
                       Return whether the protocol has been added for service
  --service=<service> --get-protocols
                       List protocols of service
  --service=<service> --add-source-port=<portid>[-<portid>]/<protocol>
                       Add a new source port to service
  --service=<service> --remove-source-port=<portid>[-<portid>]/<protocol>
                       Remove a source port from service
  --service=<service> --query-source-port=<portid>[-<portid>]/<protocol>
                       Return whether the source port has been added for service [P only]
  --service=<service> --get-source-ports
                       List source ports of service
  --service=<service> --add-helper=<helper>
                       Add a new helper to service
  --service=<service> --remove-helper=<helper>
                       Remove a helper from service
  --service=<service> --query-helper=<helper>
                       Return whether the helper has been added for service
  --service=<service> --get-service-helpers
                       List helpers of service
  --service=<service> --set-destination=<ipv>:<address>[/<mask>]
                       Set destination for ipv to address in service
  --service=<service> --remove-destination=<ipv>
                       Disable destination for ipv i service
  --service=<service> --query-destination=<ipv>:<address>[/<mask>]
                       Return whether destination ipv is set for service
  --service=<service> --get-destinations
                       List destinations in service
  --service=<service> --add-include=<service>
                       Add a new include to service
  --service=<service> --remove-include=<service>
                       Remove a include from service
  --service=<service> --query-include=<service>
                       Return whether the include has been added for service
  --service=<service> --get-includes
                       List includes of service

Options to Adapt and Query Zones and Policies
  --list-all           List everything added for or enabled [Z] [O]
  --set-description=<description>
                       Set new description [Z] [O]
  --get-description    Print description [Z] [O]
  --get-target         Get the target [Z] [O]
  --set-target=<target>
                       Set the target [Z] [O]
  --set-short=<description>
                       Set new short description to zone [Z] [O]
  --get-short          Print short description for zone [Z] [O]
  --list-services      List services added [Z] [O]
  --add-service=<service>
                       Add a service [Z] [O]
  --remove-service-from-zone=<service>
                       Remove a service from a zone [Z]
  --remove-service-from-policy=<service>
                       Remove a service from a policy [O]
  --query-service=<service>
                       Return whether service has been added [Z] [O]
  --list-ports         List ports added [Z] [O]
  --add-port=<portid>[-<portid>]/<protocol>
                       Add the port [Z] [O]
  --remove-port=<portid>[-<portid>]/<protocol>
                       Remove the port [Z] [O]
  --query-port=<portid>[-<portid>]/<protocol>
                       Return whether the port has been added [Z] [O]
  --list-protocols     List protocols added [Z] [O]
  --add-protocol=<protocol>
                       Add the protocol [Z] [O]
  --remove-protocol=<protocol>
                       Remove the protocol [Z] [O]
  --query-protocol=<protocol>
                       Return whether the protocol has been added [Z] [O]
  --list-source-ports  List source ports added [Z] [O]
  --add-source-port=<portid>[-<portid>]/<protocol>
                       Add the source port [Z] [O]
  --remove-source-port=<portid>[-<portid>]/<protocol>
                       Remove the source port [Z] [O]
  --query-source-port=<portid>[-<portid>]/<protocol>
                       Return whether the source port has been added [Z] [O]
  --list-icmp-blocks   List Internet ICMP type blocks added [Z] [O]
  --add-icmp-block=<icmptype>
                       Add an ICMP block [Z] [O]
  --remove-icmp-block=<icmptype>
                       Remove the ICMP block [Z] [O]
  --query-icmp-block=<icmptype>
                       Return whether an ICMP block has been added [Z] [O]
  --list-forward-ports List IPv4 forward ports added [Z] [O]
  --add-forward-port=port=<portid>[-<portid>]:proto=<protocol>[:toport=<portid>[-<portid>]][:toaddr=<address>[/<mask>]]
                       Add the IPv4 forward port [Z] [O]
  --remove-forward-port=port=<portid>[-<portid>]:proto=<protocol>[:toport=<portid>[-<portid>]][:toaddr=<address>[/<mask>]]
                       Remove the IPv4 forward port [Z] [O]

Options to Adapt and Query Zones
  --add-icmp-block-inversion
                       Enable inversion of icmp blocks for a zone [Z]
  --remove-icmp-block-inversion
                       Disable inversion of icmp blocks for a zone [Z]
  --query-icmp-block-inversion
                       Return whether inversion of icmp blocks has been enabled
                       for a zone [Z]
  --add-forward        Enable forwarding of packets between interfaces and
                       sources in a zone [Z]
  --remove-forward     Disable forwarding of packets between interfaces and
                       sources in a zone [Z]
  --query-forward      Return whether forwarding of packets between interfaces
                       and sources has been enabled for a zone [Z]

Options to Adapt and Query Policies
  --get-priority       Get the priority [O]
  --set-priority=<priority>
                       Set the priority [O]
  --list-ingress-zones
                       List ingress zones that are bound to a policy [O]
  --add-ingress-zone=<zone>
                       Add the ingress zone to a policy [O]
  --remove-ingress-zone=<zone>
                       Remove the ingress zone from a policy [O]
  --query-ingress-zone=<zone>
                       Query whether the ingress zone has been adedd to a
                       policy [O]
  --list-egress-zones
                       List egress zones that are bound to a policy [O]
  --add-egress-zone=<zone>
                       Add the egress zone to a policy [O]
  --remove-egress-zone=<zone>
                       Remove the egress zone from a policy [O]
  --query-egress-zone=<zone>
                       Query whether the egress zone has been adedd to a
                       policy [O]

Options to Handle Bindings of Interfaces
  --list-interfaces    List interfaces that are bound to a zone [Z]
  --add-interface=<interface>
                       Bind the <interface> to a zone [Z]
  --change-interface=<interface>
                       Change zone the <interface> is bound to [Z]
  --query-interface=<interface>
                       Query whether <interface> is bound to a zone [Z]
  --remove-interface=<interface>
                       Remove binding of <interface> from a zone [Z]

Options to Handle Bindings of Sources
  --list-sources       List sources that are bound to a zone [Z]
  --add-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
                       Bind the source to a zone [Z]
  --change-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
                       Change zone the source is bound to [Z]
  --query-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
                       Query whether the source is bound to a zone [Z]
  --remove-source=<source>[/<mask>]|<MAC>|ipset:<ipset>
                       Remove binding of the source from a zone [Z]

Helper Options
  --new-helper=<helper> --module=<module> [--family=<family>]
                       Add a new helper
  --new-helper-from-file=<filename> [--name=<helper>]
                       Add a new helper from file with optional name
  --delete-helper=<helper>
                       Delete an existing helper
  --load-helper-defaults=<helper>
                       Load helper default settings
  --info-helper=<helper> Print information about an helper
  --path-helper=<helper> Print file path of an helper
  --get-helpers         Print predefined helpers
  --helper=<helper> --set-description=<description>
                       Set new description to helper
  --helper=<helper> --get-description
                       Print description for helper
  --helper=<helper> --set-short=<description>
                       Set new short description to helper
  --helper=<helper> --get-short
                       Print short description for helper
  --helper=<helper> --add-port=<portid>[-<portid>]/<protocol>
                       Add a new port to helper
  --helper=<helper> --remove-port=<portid>[-<portid>]/<protocol>
                       Remove a port from helper
  --helper=<helper> --query-port=<portid>[-<portid>]/<protocol>
                       Return whether the port has been added for helper
  --helper=<helper> --get-ports
                       List ports of helper
  --helper=<helper> --set-module=<module>
                       Set module to helper
  --helper=<helper> --get-module
                       Get module from helper
  --helper=<helper> --set-family={ipv4|ipv6|}
                       Set family for helper
  --helper=<helper> --get-family
                       Get module from helper

Direct Options
  --direct             First option for all direct options
  --get-all-chains
                       Get all chains
  --get-chains {ipv4|ipv6|eb} <table>
                       Get all chains added to the table
  --add-chain {ipv4|ipv6|eb} <table> <chain>
                       Add a new chain to the table
  --remove-chain {ipv4|ipv6|eb} <table> <chain>
                       Remove the chain from the table
  --query-chain {ipv4|ipv6|eb} <table> <chain>
                       Return whether the chain has been added to the table
  --get-all-rules
                       Get all rules
  --get-rules {ipv4|ipv6|eb} <table> <chain>
                       Get all rules added to chain in table
  --add-rule {ipv4|ipv6|eb} <table> <chain> <priority> <arg>...
                       Add rule to chain in table
  --remove-rule {ipv4|ipv6|eb} <table> <chain> <priority> <arg>...
                       Remove rule with priority from chain in table
  --remove-rules {ipv4|ipv6|eb} <table> <chain>
                       Remove rules from chain in table
  --query-rule {ipv4|ipv6|eb} <table> <chain> <priority> <arg>...
                       Return whether a rule with priority has been added to
                       chain in table
  --get-all-passthroughs
                       Get all passthrough rules
  --get-passthroughs {ipv4|ipv6|eb} <arg>...
                       Get passthrough rules
  --add-passthrough {ipv4|ipv6|eb} <arg>...
                       Add a new passthrough rule
  --remove-passthrough {ipv4|ipv6|eb} <arg>...
                       Remove a passthrough rule
  --query-passthrough {ipv4|ipv6|eb} <arg>...
                       Return whether the passthrough rule has been added

Lockdown Options
  --lockdown-on        Enable lockdown.
  --lockdown-off       Disable lockdown.
  --query-lockdown     Query whether lockdown is enabled

Lockdown Whitelist Options
  --list-lockdown-whitelist-commands
                       List all command lines that are on the whitelist
  --add-lockdown-whitelist-command=<command>
                       Add the command to the whitelist
  --remove-lockdown-whitelist-command=<command>
                       Remove the command from the whitelist
  --query-lockdown-whitelist-command=<command>
                       Query whether the command is on the whitelist
  --list-lockdown-whitelist-contexts
                       List all contexts that are on the whitelist
  --add-lockdown-whitelist-context=<context>
                       Add the context context to the whitelist
  --remove-lockdown-whitelist-context=<context>
                       Remove the context from the whitelist
  --query-lockdown-whitelist-context=<context>
                       Query whether the context is on the whitelist
  --list-lockdown-whitelist-uids
                       List all user ids that are on the whitelist
  --add-lockdown-whitelist-uid=<uid>
                       Add the user id uid to the whitelist
  --remove-lockdown-whitelist-uid=<uid>
                       Remove the user id uid from the whitelist
  --query-lockdown-whitelist-uid=<uid>
                       Query whether the user id uid is on the whitelist
  --list-lockdown-whitelist-users
                       List all user names that are on the whitelist
  --add-lockdown-whitelist-user=<user>
                       Add the user name user to the whitelist
  --remove-lockdown-whitelist-user=<user>
                       Remove the user name user from the whitelist
  --query-lockdown-whitelist-user=<user>
                       Query whether the user name user is on the whitelist

Polkit Options
  --policy-server      Change Polkit actions to 'server'  (more restricted)
  --policy-desktop     Change Polkit actions to 'desktop' (less restricted)

""" % (SYSTEM_CONFIG_FIREWALL, config.SYSCONFIGDIR))

def parse_port_lokkit(value):
    try:
        (port, proto) = value.split(":")
    except Exception:
        cmd.fail("bad port (most likely missing protocol), correct syntax is portid[-portid]:protocol")
    return (port, proto)

def pk_symlink(product='server'):
    _PK_DIR = '/usr/share/polkit-1/actions/'
    _PK_NAME = 'org.fedoraproject.FirewallD1.'
    os.chdir(_PK_DIR)
    if os.path.isfile(_PK_NAME+product+'.policy.choice'):
        if os.path.isfile(_PK_NAME+'policy'):
            os.remove(_PK_NAME+'policy')
        os.symlink(_PK_NAME+product+'.policy.choice', _PK_NAME+'policy')
        cmd.print_and_exit('symlink '+_PK_DIR+_PK_NAME+product+'.policy.choice -> '+_PK_NAME+'policy')
    else:
        cmd.fail('no such file '+_PK_DIR+_PK_NAME+product+'.policy.choice')

# system-config-firewall
def read_sysconfig_args(config_file=SYSTEM_CONFIG_FIREWALL):
    filename = None
    if os.path.exists(config_file) and os.path.isfile(config_file):
        filename = config_file
    try:
        f = open(filename, 'r')
    except Exception:
        return None
    argv = [ ]
    for line in f:
        if not line:
            break
        line = line.strip()
        if len(line) < 1 or line[0] == '#':
            continue
        argv.append(line)
    f.close()
    return argv

parser = argparse.ArgumentParser(usage="see firewall-offline-cmd man page",
                                 add_help=False)

parser_group_output = parser.add_mutually_exclusive_group()
parser_group_output.add_argument("-v", "--verbose", action="store_true")
parser_group_output.add_argument("-q", "--quiet", action="store_true")

parser_group_lokkit = parser.add_argument_group()
parser_group_lokkit.add_argument("--enabled", action="store_true")
parser_group_lokkit.add_argument("--disabled", action="store_true")
parser_group_lokkit.add_argument("--addmodule", metavar="<module>", action='append')
parser_group_lokkit.add_argument("--removemodule", metavar="<module>", action='append')
parser_group_lokkit.add_argument("--service", "-s", metavar="<service>", action='append')
parser_group_lokkit.add_argument("--remove-service", metavar="<service>", action='append')
parser_group_lokkit.add_argument("--port", "-p", metavar="<port>", action='append')
parser_group_lokkit.add_argument("--trust", "-t", metavar="<iface>", action='append')
parser_group_lokkit.add_argument("--masq", "-m", metavar="<iface>", action='append')
parser_group_lokkit.add_argument("--custom-rules", metavar="<filename>", action='append')
parser_group_lokkit.add_argument("--forward-port", metavar="<port>", action='append')
parser_group_lokkit.add_argument("--block-icmp", metavar="<icmptype>", action='append')

parser.add_argument("--system-config", metavar="path")
parser.add_argument("--default-config", metavar="path")
parser.add_argument("--check-config", action="store_true")

parser_group_standalone = parser.add_mutually_exclusive_group()
parser_group_standalone.add_argument("-h", "--help",
                                     action="store_true")
parser_group_standalone.add_argument("-V", "--version", action="store_true")
parser_group_standalone.add_argument("--get-log-denied", action="store_true")
parser_group_standalone.add_argument("--set-log-denied", metavar="<value>")
parser_group_standalone.add_argument("--get-automatic-helpers", action="store_true")
parser_group_standalone.add_argument("--set-automatic-helpers", metavar="<value>")
parser_group_standalone.add_argument("--policy-server", action="store_true")
parser_group_standalone.add_argument("--policy-desktop", action="store_true")
parser_group_standalone.add_argument("--lockdown-on", action="store_true")
parser_group_standalone.add_argument("--lockdown-off", action="store_true")
parser_group_standalone.add_argument("--query-lockdown", action="store_true")
parser_group_standalone.add_argument("--reset-to-defaults", action="store_true")

parser_group_standalone.add_argument("--get-default-zone", action="store_true")
parser_group_standalone.add_argument("--set-default-zone", metavar="<zone>")
parser_group_standalone.add_argument("--get-zones", action="store_true")
parser_group_standalone.add_argument("--get-policies", action="store_true")
parser_group_standalone.add_argument("--get-services", action="store_true")
parser_group_standalone.add_argument("--get-icmptypes", action="store_true")
parser_group_standalone.add_argument("--get-zone-of-interface", metavar="<iface>", action='append')
parser_group_standalone.add_argument("--get-zone-of-source", metavar="<source>", action='append')
parser_group_standalone.add_argument("--list-all-zones", action="store_true")
parser_group_standalone.add_argument("--list-all-policies", action="store_true")

parser_group_standalone.add_argument("--info-zone", metavar="<zone>")
parser_group_standalone.add_argument("--info-policy", metavar="<policy>")
parser_group_standalone.add_argument("--info-service", metavar="<service>")
parser_group_standalone.add_argument("--info-icmptype", metavar="<icmptype>")
parser_group_standalone.add_argument("--info-ipset", metavar="<ipset>")
parser_group_standalone.add_argument("--info-helper", metavar="<helper>")

parser_group_config = parser.add_mutually_exclusive_group()
parser_group_config.add_argument("--new-icmptype", metavar="<icmptype>")
parser_group_config.add_argument("--new-icmptype-from-file", metavar="<filename>")
parser_group_config.add_argument("--delete-icmptype", metavar="<icmptype>")
parser_group_config.add_argument("--load-icmptype-defaults",
                                 metavar="<icmptype>")
parser_group_config.add_argument("--new-service", metavar="<service>")
parser_group_config.add_argument("--new-service-from-file", metavar="<filename>")
parser_group_config.add_argument("--delete-service", metavar="<service>")
parser_group_config.add_argument("--load-service-defaults", metavar="<service>")
parser_group_config.add_argument("--new-zone", metavar="<zone>")
parser_group_config.add_argument("--new-zone-from-file", metavar="<filename>")
parser_group_config.add_argument("--delete-zone", metavar="<zone>")
parser_group_config.add_argument("--load-zone-defaults", metavar="<zone>")
parser_group_config.add_argument("--new-policy", metavar="<policy>")
parser_group_config.add_argument("--new-policy-from-file", metavar="<filename>")
parser_group_config.add_argument("--delete-policy", metavar="<policy>")
parser_group_config.add_argument("--load-policy-defaults", metavar="<policy>")
parser_group_config.add_argument("--new-ipset", metavar="<ipset>")
parser_group_config.add_argument("--new-ipset-from-file", metavar="<filename>")
parser_group_config.add_argument("--delete-ipset", metavar="<ipset>")
parser_group_config.add_argument("--load-ipset-defaults", metavar="<ipset>")
parser_group_config.add_argument("--new-helper", metavar="<helper>")
parser_group_config.add_argument("--new-helper-from-file", metavar="<filename>")
parser_group_config.add_argument("--delete-helper", metavar="<helper>")
parser_group_config.add_argument("--load-helper-defaults", metavar="<helper>")

parser_group_config.add_argument("--path-zone", metavar="<zone>")
parser_group_config.add_argument("--path-policy", metavar="<policy>")
parser_group_config.add_argument("--path-service", metavar="<service>")
parser_group_config.add_argument("--path-icmptype", metavar="<icmptype>")
parser_group_config.add_argument("--path-ipset", metavar="<ipset>")
parser_group_config.add_argument("--path-helper", metavar="<helper>")

parser.add_argument("--name", default="", metavar="<name>")

parser_group_lockdown_whitelist = parser.add_mutually_exclusive_group()
parser_group_lockdown_whitelist.add_argument("--list-lockdown-whitelist-commands", action="store_true")
parser_group_lockdown_whitelist.add_argument("--add-lockdown-whitelist-command", metavar="<command>", action='append')
parser_group_lockdown_whitelist.add_argument("--remove-lockdown-whitelist-command", metavar="<command>", action='append')
parser_group_lockdown_whitelist.add_argument("--query-lockdown-whitelist-command", metavar="<command>", action='append')

parser_group_lockdown_whitelist.add_argument("--list-lockdown-whitelist-contexts", action="store_true")
parser_group_lockdown_whitelist.add_argument("--add-lockdown-whitelist-context", metavar="<context>", action='append')
parser_group_lockdown_whitelist.add_argument("--remove-lockdown-whitelist-context", metavar="<context>", action='append')
parser_group_lockdown_whitelist.add_argument("--query-lockdown-whitelist-context", metavar="<context>", action='append')

parser_group_lockdown_whitelist.add_argument("--list-lockdown-whitelist-uids", action="store_true")
parser_group_lockdown_whitelist.add_argument("--add-lockdown-whitelist-uid", metavar="<uid>", type=int, action='append')
parser_group_lockdown_whitelist.add_argument("--remove-lockdown-whitelist-uid", metavar="<uid>", type=int, action='append')
parser_group_lockdown_whitelist.add_argument("--query-lockdown-whitelist-uid", metavar="<uid>", type=int, action='append')

parser_group_lockdown_whitelist.add_argument("--list-lockdown-whitelist-users", action="store_true")
parser_group_lockdown_whitelist.add_argument("--add-lockdown-whitelist-user", metavar="<user>", action='append')
parser_group_lockdown_whitelist.add_argument("--remove-lockdown-whitelist-user", metavar="<user>", action='append')
parser_group_lockdown_whitelist.add_argument("--query-lockdown-whitelist-user", metavar="<user>", action='append')

parser.add_argument("--zone", default="", metavar="<zone>")
parser.add_argument("--policy", default="", metavar="<policy>")

parser_group_zone_or_policy = parser.add_mutually_exclusive_group()
parser_group_zone_or_policy.add_argument("--add-interface", metavar="<iface>", action='append')
parser_group_zone_or_policy.add_argument("--remove-interface", metavar="<iface>", action='append')
parser_group_zone_or_policy.add_argument("--query-interface", metavar="<iface>", action='append')
parser_group_zone_or_policy.add_argument("--change-interface", "--change-zone", metavar="<iface>", action='append')
parser_group_zone_or_policy.add_argument("--list-interfaces", action="store_true")
parser_group_zone_or_policy.add_argument("--add-source", metavar="<source>", action='append')
parser_group_zone_or_policy.add_argument("--remove-source", metavar="<source>", action='append')
parser_group_zone_or_policy.add_argument("--query-source", metavar="<source>", action='append')
parser_group_zone_or_policy.add_argument("--change-source", metavar="<source>", action='append')
parser_group_zone_or_policy.add_argument("--list-sources", action="store_true")
parser_group_zone_or_policy.add_argument("--add-ingress-zone", metavar="<zone>", action='append')
parser_group_zone_or_policy.add_argument("--remove-ingress-zone", metavar="<zone>", action='append')
parser_group_zone_or_policy.add_argument("--query-ingress-zone", metavar="<zone>", action='append')
parser_group_zone_or_policy.add_argument("--list-ingress-zones", action="store_true")
parser_group_zone_or_policy.add_argument("--add-egress-zone", metavar="<zone>", action='append')
parser_group_zone_or_policy.add_argument("--remove-egress-zone", metavar="<zone>", action='append')
parser_group_zone_or_policy.add_argument("--query-egress-zone", metavar="<zone>", action='append')
parser_group_zone_or_policy.add_argument("--list-egress-zones", action="store_true")
parser_group_zone_or_policy.add_argument("--add-rich-rule", metavar="<rule>", action='append')
parser_group_zone_or_policy.add_argument("--remove-rich-rule", metavar="<rule>", action='append')
parser_group_zone_or_policy.add_argument("--query-rich-rule", metavar="<rule>", action='append')
parser_group_zone_or_policy.add_argument("--add-service", metavar="<service>", action='append')
parser_group_zone_or_policy.add_argument("--remove-service-from-zone", metavar="<service>", action='append')
parser_group_zone_or_policy.add_argument("--remove-service-from-policy", metavar="<service>", action='append')
parser_group_zone_or_policy.add_argument("--query-service", metavar="<service>", action='append')
parser_group_zone_or_policy.add_argument("--add-port", metavar="<port>", action='append')
parser_group_zone_or_policy.add_argument("--remove-port", metavar="<port>", action='append')
parser_group_zone_or_policy.add_argument("--query-port", metavar="<port>", action='append')
parser_group_zone_or_policy.add_argument("--add-protocol", metavar="<protocol>", action='append')
parser_group_zone_or_policy.add_argument("--remove-protocol", metavar="<protocol>", action='append')
parser_group_zone_or_policy.add_argument("--query-protocol", metavar="<protocol>", action='append')
parser_group_zone_or_policy.add_argument("--add-source-port", metavar="<port>", action='append')
parser_group_zone_or_policy.add_argument("--remove-source-port", metavar="<port>", action='append')
parser_group_zone_or_policy.add_argument("--query-source-port", metavar="<port>", action='append')
parser_group_zone_or_policy.add_argument("--add-forward", action="store_true")
parser_group_zone_or_policy.add_argument("--remove-forward", action="store_true")
parser_group_zone_or_policy.add_argument("--query-forward", action="store_true")
parser_group_zone_or_policy.add_argument("--add-masquerade", action="store_true")
parser_group_zone_or_policy.add_argument("--remove-masquerade", action="store_true")
parser_group_zone_or_policy.add_argument("--query-masquerade", action="store_true")
parser_group_zone_or_policy.add_argument("--add-icmp-block", metavar="<icmptype>", action='append')
parser_group_zone_or_policy.add_argument("--remove-icmp-block", metavar="<icmptype>", action='append')
parser_group_zone_or_policy.add_argument("--query-icmp-block", metavar="<icmptype>", action='append')
parser_group_zone_or_policy.add_argument("--add-icmp-block-inversion", action="store_true")
parser_group_zone_or_policy.add_argument("--remove-icmp-block-inversion", action="store_true")
parser_group_zone_or_policy.add_argument("--query-icmp-block-inversion", action="store_true")
parser_group_zone_or_policy.add_argument("--add-forward-port", metavar="<port>", action='append')
parser_group_zone_or_policy.add_argument("--remove-forward-port", metavar="<port>", action='append')
parser_group_zone_or_policy.add_argument("--query-forward-port", metavar="<port>", action='append')
parser_group_zone_or_policy.add_argument("--list-rich-rules", action="store_true")
parser_group_zone_or_policy.add_argument("--list-services", action="store_true")
parser_group_zone_or_policy.add_argument("--list-ports", action="store_true")
parser_group_zone_or_policy.add_argument("--list-protocols", action="store_true")
parser_group_zone_or_policy.add_argument("--list-icmp-blocks", action="store_true")
parser_group_zone_or_policy.add_argument("--list-forward-ports", action="store_true")
parser_group_zone_or_policy.add_argument("--list-source-ports", action="store_true")
parser_group_zone_or_policy.add_argument("--list-all", action="store_true")
parser_group_zone_or_policy.add_argument("--get-target", action="store_true")
parser_group_zone_or_policy.add_argument("--set-target", metavar="<target>")
parser_group_zone_or_policy.add_argument("--get-priority", action="store_true")
parser_group_zone_or_policy.add_argument("--set-priority", metavar="<priority>")

parser.add_argument("--option", metavar="<key>[=<value>]", action='append')
parser.add_argument("--type", metavar="<ipsettype>")
parser.add_argument("--ipset", metavar="<ipset>")

parser_ipset = parser.add_mutually_exclusive_group()
#parser_ipset.add_argument("--add-option", metavar="<key>[=<value>]")
#parser_ipset.add_argument("--remove-option", metavar="<key>[=<value>]")
#parser_ipset.add_argument("--query-option", metavar="<key>[=<value>]")
#parser_ipset.add_argument("--get-options", action="store_true")

parser_ipset.add_argument("--get-ipsets", action="store_true")
parser_ipset.add_argument("--add-entry", metavar="<entry>", action='append')
parser_ipset.add_argument("--remove-entry", metavar="<entry>", action='append')
parser_ipset.add_argument("--query-entry", metavar="<entry>", action='append')
parser_ipset.add_argument("--get-entries", action="store_true")
parser_ipset.add_argument("--add-entries-from-file", metavar="<filename>", action='append')
parser_ipset.add_argument("--remove-entries-from-file", metavar="<filename>", action='append')

parser.add_argument("--icmptype", metavar="<icmptype>")

parser_icmptype = parser.add_mutually_exclusive_group()
parser_icmptype.add_argument("--add-destination", metavar="<ipv>", action='append')
parser_icmptype.add_argument("--remove-destination", metavar="<ipv>", action='append')
parser_icmptype.add_argument("--query-destination", metavar="<ipv>", action='append')
parser_icmptype.add_argument("--get-destinations", action="store_true")

parser_service = parser.add_mutually_exclusive_group()
parser_service.add_argument("--get-ports", action="store_true")
parser_service.add_argument("--get-source-ports", action="store_true")
parser_service.add_argument("--get-protocols", action="store_true")

parser_service.add_argument("--add-module", metavar="<module>", action='append')
parser_service.add_argument("--remove-module", metavar="<module>", action='append')
parser_service.add_argument("--query-module", metavar="<module>", action='append')
parser_service.add_argument("--get-modules", action="store_true")

parser_service.add_argument("--add-helper", metavar="<helper>", action='append')
parser_service.add_argument("--remove-helper", metavar="<helper>", action='append')
parser_service.add_argument("--query-helper", metavar="<helper>", action='append')
parser_service.add_argument("--get-service-helpers", action="store_true")

parser_service.add_argument("--add-include", metavar="<service>", action='append')
parser_service.add_argument("--remove-include", metavar="<service>", action='append')
parser_service.add_argument("--query-include", metavar="<service>", action='append')
parser_service.add_argument("--get-includes", action="store_true")

parser_service.add_argument("--set-destination", metavar="<destination>", action='append')
parser_service.add_argument("--get-destination", action="store_true")

parser_service.add_argument("--set-description", metavar="<description>")
parser_service.add_argument("--get-description", action="store_true")

parser_service.add_argument("--set-short", metavar="<description>")
parser_service.add_argument("--get-short", action="store_true")

parser.add_argument("--helper", metavar="<helper>")
parser.add_argument("--family", metavar="<family>")
parser.add_argument("--module", metavar="<module>")

parser_helper = parser.add_mutually_exclusive_group()
#parser_helper.add_argument("--get-ports", action="store_true")
parser_helper.add_argument("--get-helpers", action="store_true")
parser_helper.add_argument("--set-module", metavar="<module>")
parser_helper.add_argument("--get-module", action="store_true")
#parser_helper.add_argument("--query-module", metavar="<module>")
parser_helper.add_argument("--set-family", metavar="<family>|''", nargs="*")
parser_helper.add_argument("--get-family", action="store_true")

parser.add_argument("--direct", action="store_true")

# not possible to have sequences of options here
parser_direct = parser.add_mutually_exclusive_group()
parser_direct.add_argument("--add-passthrough", nargs=argparse.REMAINDER,
                           metavar=("{ ipv4 | ipv6 | eb }", "<args>"))
parser_direct.add_argument("--remove-passthrough", nargs=argparse.REMAINDER,
                           metavar=("{ ipv4 | ipv6 | eb }", "<args>"))
parser_direct.add_argument("--query-passthrough", nargs=argparse.REMAINDER,
                           metavar=("{ ipv4 | ipv6 | eb }", "<args>"))
parser_direct.add_argument("--get-passthroughs", nargs=1,
                           metavar=("{ ipv4 | ipv6 | eb }"))
parser_direct.add_argument("--get-all-passthroughs", action="store_true")
parser_direct.add_argument("--add-chain", nargs=3,
                           metavar=("{ ipv4 | ipv6 | eb }", "<table>", "<chain>"))
parser_direct.add_argument("--remove-chain", nargs=3,
                           metavar=("{ ipv4 | ipv6 | eb }", "<table>", "<chain>"))
parser_direct.add_argument("--query-chain", nargs=3,
                           metavar=("{ ipv4 | ipv6 | eb }", "<table>", "<chain>"))
parser_direct.add_argument("--get-all-chains", action="store_true")
parser_direct.add_argument("--get-chains", nargs=2,
                           metavar=("{ ipv4 | ipv6 | eb }", "<table>"))
parser_direct.add_argument("--add-rule", nargs=argparse.REMAINDER,
                           metavar=("{ ipv4 | ipv6 | eb }", "<table> <chain> <priority> <args>"))
parser_direct.add_argument("--remove-rule", nargs=argparse.REMAINDER,
                           metavar=("{ ipv4 | ipv6 | eb }", "<table> <chain> <priority> <args>"))
parser_direct.add_argument("--remove-rules", nargs=3,
                           metavar=("{ ipv4 | ipv6 | eb }", "<table> <chain>"))
parser_direct.add_argument("--query-rule", nargs=argparse.REMAINDER,
                           metavar=("{ ipv4 | ipv6 | eb }", "<table> <chain> <priority> <args>"))
parser_direct.add_argument("--get-rules", nargs=3,
                           metavar=("{ ipv4 | ipv6 | eb }", "<table>", "<chain>"))
parser_direct.add_argument("--get-all-rules", action="store_true")

##############################################################################

cmd = FirewallCommand()

def myexcepthook(exctype, value, traceback):
    cmd.exception_handler(str(value))
sys.excepthook = myexcepthook

if len(sys.argv) > 1 and \
   any('--migrate-system-config-firewall' in arg for arg in sys.argv):
    args = sys.argv[1:]
    migration_parser = argparse.ArgumentParser(
        usage="see firewall-offline-cmd man page", add_help=False)
    migration_parser.add_argument("-h", "--help", action="store_true")
    migration_parser.add_argument("-v", "--verbose", action="store_true")
    migration_parser.add_argument("-q", "--quiet", action="store_true")
    migration_parser.add_argument("--migrate-system-config-firewall",
                                  metavar="<file>", action='store')
    a,unknown = migration_parser.parse_known_args(args)
    cmd.set_quiet(a.quiet)
    cmd.set_verbose(a.verbose)
    if a.help:
        __usage()
        sys.exit(0)
    else:
        assert_root()
    if a.quiet:
        # it makes no sense to use --quiet with these options
        a.quiet = False
        cmd.set_quiet(a.quiet)
        cmd.fail("-q/--quiet can't be used with this option(s)")
    if a.migrate_system_config_firewall:
        args = read_sysconfig_args(a.migrate_system_config_firewall)
        if not args:
            cmd.fail("Opening of '%s' failed, exiting." % \
                     a.migrate_system_config_firewall)
        args += unknown
elif len(sys.argv) > 1:
    i = -1
    args = sys.argv[1:]
    if '--add-passthrough' in args:
        i = args.index('--add-passthrough') + 1
    elif '--remove-passthrough' in args:
        i = args.index('--remove-passthrough') + 1
    elif '--query-passthrough' in args:
        i = args.index('--query-passthrough') + 1
    elif '--add-rule' in args:
        i = args.index('--add-rule') + 4
    elif '--remove-rule' in args:
        i = args.index('--remove-rule') + 4
    elif '--query-rule' in args:
        i = args.index('--query-rule') + 4
    # join <args> into one argument to prevent parser from parsing each iptables
    # option, because they can conflict with firewall-cmd options
    # # e.g. --delete (iptables) and --delete-* (firewall-cmd)
    if (i > -1) and (i < len(args) - 1):
        aux_args = args[:]
        args = aux_args[:i+1] # all but not <args>
        args.append(joinArgs(aux_args[i+1:])) # add <args> as one arg
else:
    assert_root()
    # migrate configuration from SYSTEM_CONFIG_FIREWALL
    args = read_sysconfig_args()
    if not args:
        cmd.fail("Opening of '%s' failed, exiting." % SYSTEM_CONFIG_FIREWALL)

a = parser.parse_args(args)

options_lokkit = a.enabled or a.disabled or a.addmodule or a.removemodule or \
                 a.trust or a.masq or a.custom_rules or \
                 a.service or a.remove_service or a.port or \
                 a.trust or a.masq or a.forward_port or a.block_icmp

options_standalone = a.help or a.version or \
    a.policy_server or a.policy_desktop or \
    a.lockdown_on or a.lockdown_off or a.query_lockdown or \
    a.reset_to_defaults or a.get_default_zone or a.set_default_zone or \
    a.get_log_denied or a.set_log_denied or \
    a.get_automatic_helpers or a.set_automatic_helpers

options_desc_xml_file = a.set_description or a.get_description or \
                        a.set_short or a.get_short

options_lockdown_whitelist = \
    a.list_lockdown_whitelist_commands or a.add_lockdown_whitelist_command or \
    a.remove_lockdown_whitelist_command or \
    a.query_lockdown_whitelist_command or \
    a.list_lockdown_whitelist_contexts or a.add_lockdown_whitelist_context or \
    a.remove_lockdown_whitelist_context or \
    a.query_lockdown_whitelist_context or \
    a.list_lockdown_whitelist_uids or a.add_lockdown_whitelist_uid is not None or \
    a.remove_lockdown_whitelist_uid is not None or \
    a.query_lockdown_whitelist_uid is not None or \
    a.list_lockdown_whitelist_users or a.add_lockdown_whitelist_user or \
    a.remove_lockdown_whitelist_user or \
    a.query_lockdown_whitelist_user

options_config = a.get_zones or a.get_services or a.get_icmptypes or \
                 options_lockdown_whitelist or a.list_all_zones or \
                 a.get_zone_of_interface or a.get_zone_of_source or \
                 a.info_zone or a.info_icmptype or a.info_service or \
                 a.info_ipset or a.info_policy or a.get_ipsets or a.info_helper or \
                 a.get_helpers or a.get_policies or a.list_all_policies

options_zone_and_policy_adapt_query = \
    a.add_service or a.remove_service_from_zone or a.query_service or \
    a.add_port or a.remove_port or a.query_port or \
    a.add_protocol or a.remove_protocol or a.query_protocol or \
    a.add_source_port or a.remove_source_port or a.query_source_port or \
    a.add_icmp_block or a.remove_icmp_block or a.query_icmp_block or \
    a.add_forward_port or a.remove_forward_port or a.query_forward_port or \
    a.add_rich_rule or a.remove_rich_rule or a.query_rich_rule or \
    a.add_masquerade or a.remove_masquerade or a.query_masquerade or \
    a.list_services or a.list_ports or a.list_protocols or \
    a.list_source_ports or \
    a.list_icmp_blocks or a.list_forward_ports or a.list_rich_rules or \
    a.list_all or a.get_target or a.set_target

options_zone_unique = \
    a.add_icmp_block_inversion or a.remove_icmp_block_inversion or \
    a.query_icmp_block_inversion or \
    a.add_forward or a.remove_forward or a.query_forward or \
    a.list_interfaces or a.change_interface or \
    a.add_interface or a.remove_interface or a.query_interface or \
    a.list_sources or a.change_source or \
    a.add_source or a.remove_source or a.query_source

options_zone_ops = options_zone_unique or options_zone_and_policy_adapt_query

options_policy_unique = \
    a.list_ingress_zones or a.add_ingress_zone or \
    a.remove_ingress_zone or a.query_ingress_zone or \
    a.list_egress_zones or a.add_egress_zone or \
    a.remove_egress_zone or a.query_egress_zone or \
    a.set_priority or a.get_priority

options_policy_ops = options_policy_unique or options_zone_and_policy_adapt_query

options_zone = a.zone or options_zone_ops or options_desc_xml_file

options_policy = a.policy or options_policy_ops or options_desc_xml_file

options_ipset = a.add_entry or a.remove_entry or a.query_entry or \
                a.get_entries or a.add_entries_from_file or \
                a.remove_entries_from_file or options_desc_xml_file

options_icmptype = a.add_destination or a.remove_destination or \
                   a.query_destination or a.get_destinations or \
                   options_desc_xml_file

options_service = a.add_port or a.remove_port or a.query_port or \
                  a.get_ports or \
                  a.add_protocol or a.remove_protocol or a.query_protocol or \
                  a.get_protocols or \
                  a.add_source_port or a.remove_source_port or \
                  a.query_source_port or a.get_source_ports or \
                  a.add_module or a.remove_module or a.query_module or \
                  a.get_modules or \
                  a.set_destination or a.remove_destination or \
                  a.query_destination or a.get_destinations or \
                  options_desc_xml_file or \
                  a.add_include or a.remove_include or a.query_include or \
                  a.get_includes or \
                  a.add_helper or a.remove_helper or a.query_helper or \
                  a.get_service_helpers

options_helper = a.add_port or a.remove_port or a.query_port or \
                  a.get_ports or a.set_module or a.get_module or \
                  a.set_family or a.get_family or \
                  options_desc_xml_file

options_permanent = options_config or options_zone or options_policy or \
                    a.new_icmptype or a.delete_icmptype or \
                    a.new_icmptype_from_file or \
                    a.load_icmptype_defaults or \
                    a.new_service or a.delete_service or \
                    a.new_service_from_file or \
                    a.load_service_defaults or \
                    a.new_zone or a.delete_zone or \
                    a.new_zone_from_file or \
                    a.load_zone_defaults or \
                    a.new_policy or a.delete_policy or \
                    a.new_policy_from_file or \
                    a.load_policy_defaults or \
                    a.new_helper or a.delete_helper or \
                    a.new_helper_from_file or \
                    a.load_helper_defaults or \
                    a.new_ipset or a.delete_ipset or \
                    a.new_ipset_from_file or \
                    a.load_ipset_defaults or \
                    a.ipset or options_ipset or \
                    (a.icmptype and options_icmptype) or \
                    (a.service and options_service) or \
                    (a.helper and options_helper) or \
                    a.path_zone or a.path_icmptype or a.path_service or \
                    a.path_ipset or a.path_helper or a.path_policy

options_direct = \
           a.add_chain or a.remove_chain or a.query_chain or \
           a.get_chains or a.get_all_chains or \
           a.add_rule or a.remove_rule or a.remove_rules or a.query_rule or \
           a.get_rules or a.get_all_rules or \
           a.add_passthrough or a.remove_passthrough or a.query_passthrough or \
           a.get_passthroughs or a.get_all_passthroughs

# these are supposed to only write out some output
options_list_get = a.help or a.version or a.list_all or a.list_all_zones or \
    a.list_lockdown_whitelist_commands or a.list_lockdown_whitelist_contexts or \
    a.list_lockdown_whitelist_uids or a.list_lockdown_whitelist_users or \
    a.list_services or a.list_ports or a.list_protocols or a.list_icmp_blocks or \
    a.list_forward_ports or a.list_rich_rules or a.list_interfaces or \
    a.list_sources or a.get_default_zone or \
    a.get_zone_of_interface or a.get_zone_of_source or a.get_zones or \
    a.get_services or a.get_icmptypes or a.get_target or \
    a.info_zone or a.info_icmptype or a.info_service or \
    a.info_ipset or a.get_ipsets or a.get_entries or \
    a.info_helper or a.get_helpers or \
    a.get_destinations or a.get_description or \
    a.list_all_policies or a.info_policy or a.get_policies

# Set quiet and verbose

cmd.set_quiet(a.quiet)
cmd.set_verbose(a.verbose)

# Check various impossible combinations of options

if not (options_standalone or options_ipset or \
        options_lokkit or \
        options_icmptype or options_service or options_helper or \
        options_permanent or options_direct or options_desc_xml_file or \
        a.check_config):
    cmd.fail(parser.format_usage() + "No option specified.")

if options_lokkit and (options_standalone or \
                       options_permanent or options_direct) and \
                       not (options_service and a.service):
    cmd.fail(parser.format_usage() +
             "Can't use lokkit options with other options.")

if options_standalone and (options_permanent or \
                           options_direct or options_ipset):
    cmd.fail(parser.format_usage() +
             "Can't use stand-alone options with other options.")

if options_ipset and not options_desc_xml_file and not a.ipset:
    cmd.fail(parser.format_usage() + "No ipset specified.")

if (options_icmptype and not a.icmptype) and \
   not (options_service and a.service) and not options_desc_xml_file:
    cmd.fail(parser.format_usage() + "No icmptype specified.")

if options_service and a.service and len(a.service) > 0:
    if len(a.service) > 1:
        cmd.fail(parser.format_usage() + "More than one service specified.")
    # use the first entry in the array only
    a.service = a.service[0]

if (options_helper and not a.helper) and \
   not (options_service and a.service) and \
   not options_zone and not options_desc_xml_file and \
   not options_policy:
    cmd.fail(parser.format_usage() + "No helper specified.")

if options_direct and (options_zone or options_policy):
    cmd.fail(parser.format_usage() +
             "Can't use 'direct' options with other options.")

if (a.direct and not options_direct) or (options_direct and not a.direct):
    cmd.fail(parser.format_usage() +
             "Wrong usage of 'direct' options.")

if a.name and not (a.new_zone_from_file or a.new_service_from_file or \
                   a.new_ipset_from_file or a.new_icmptype_from_file or \
                   a.new_helper_from_file or a.new_policy_from_file):
    cmd.fail(parser.format_usage() + "Wrong usage of '--name' option.")

if options_config and (options_zone or options_policy):
    cmd.fail(parser.format_usage() +
             "Wrong usage of --get-zones | --get-services | --get-icmptypes | --get-policies.")

if a.quiet and options_list_get:
    # it makes no sense to use --quiet with these options
    a.quiet = False
    cmd.set_quiet(a.quiet)
    cmd.fail("-q/--quiet can't be used with this option(s)")

if a.zone and a.policy:
    cmd.fail(parser.format_usage() + "Can't use --zone with --policy.")

if a.policy and options_zone_unique:
    cmd.fail(parser.format_usage() + "Can't use --policy with zone only options.")

if a.zone and options_policy_unique:
    cmd.fail(parser.format_usage() + "Can't use --zone with policy only options.")

if not a.policy and options_policy_unique:
    cmd.fail(parser.format_usage() + "Must use --policy with policy only options.")

if a.help:
    __usage()
    sys.exit(0)

assert_root()

if a.system_config:
    config.set_system_config_paths(a.system_config)
if a.default_config:
    config.set_default_config_paths(a.default_config)
if a.check_config:
    try:
        fw = Firewall(offline=True)
        fw.start()
        check_on_disk_config(fw)
    except FirewallError as error:
        cmd.print_and_exit("Configuration error: %s" % error, error.code)
    except Exception as msg:
        cmd.fail("Configuration error: %s" % msg)
    sys.exit(0)

zone = a.zone
fw = Firewall(offline=True)
fw.start()

try:
    # Lokkit Compatibility Options
    if options_lokkit and not (options_service and a.service):
        trusted_zone = "trusted"
        default_zone = fw.get_default_zone()
        fw_zone = fw.config.get_zone(default_zone)
        fw_settings = FirewallClientZoneSettings(fw.config.get_zone_config_dict(fw_zone))

        if a.enabled:
            # Enable firewall (default)
            os.system("systemctl enable firewalld.service")
        if a.disabled:
            # Disable firewall
            os.system("systemctl disable firewalld.service")
        if a.addmodule:
            for m in a.addmodule:
                cmd.print_msg("Ignoring addmodule '%s'" % m)
        if a.removemodule:
            for m in a.removemodule:
                cmd.print_msg("Ignoring removemodule '%s'" % m)
        if a.custom_rules:
            for c in a.custom_rules:
                cmd.print_msg("Ignoring custom-rule '%s'" % c)
        if a.service:
            for s in a.service:
                cmd.print_msg("Adding service '%s' to default zone." % s)
                if not fw_settings.queryService(s):
                    fw_settings.addService(s)
                else:
                    cmd.print_msg("ALREADY_ENABLED: %s" % s)
        if a.remove_service:
            for s in a.remove_service:
                cmd.print_msg("Removing service '%s' from default zone." % s)
                if fw_settings.queryService(s):
                    fw_settings.removeService(s)
                else:
                    cmd.print_msg("NOT_ENABLED: %s" % s)
        if a.port:
            for port_proto in a.port:
                (port, proto) = parse_port_lokkit(port_proto)
                cmd.print_msg("Adding port '%s/%s' to default zone." % (port, proto))
                if not fw_settings.queryPort(port, proto):
                    fw_settings.addPort(port, proto)
                else:
                    cmd.print_msg("ALREADY_ENABLED: %s" % port_proto)
        if a.trust:
            if default_zone != trusted_zone:
                fw_trusted = fw.config.get_zone("trusted")
                fw_trusted_settings = FirewallClientZoneSettings(fw.config.get_zone_config_dict(fw_trusted))
                # Bind an interface to the trusted zone
                for i in a.trust:
                    cmd.print_msg("Interface '%s' will be bound to zone '%s'." % \
                            (i, trusted_zone))
                    if not fw_trusted_settings.queryInterface(i):
                        fw_trusted_settings.addInterface(i)
                    else:
                        cmd.print_msg("ALREADY_ENABLED: %s" % i)
                fw.config.set_zone_config_dict(fw_trusted, fw_trusted_settings.getSettingsDict())
            else:
                for i in a.trust:
                    cmd.print_msg("Interface '%s' will be bound to zone '%s'." % \
                            (i, trusted_zone))
                    if not fw_settings.queryInterface(i):
                        fw_settings.addInterface(i)
                    else:
                        cmd.print_msg("ALREADY_ENABLED: %s" % i)
        if a.masq:
            # Enables masquerading in the default zone, interface argument is ignored
            cmd.print_msg("Enabling masquerade for the default zone.")
            fw_settings.setMasquerade(True)
        if a.forward_port:
            for fp in a.forward_port:
                (port, protocol, toport, toaddr) = cmd.parse_forward_port(
                    fp, compat=True)
                cmd.print_msg("Adding forward port %s:%s:%s:%s to default zone." % \
                      (port, protocol, toport, toaddr))
                if not fw_settings.queryForwardPort(port, protocol, toport,
                                                    toaddr):
                    fw_settings.addForwardPort(port, protocol, toport, toaddr)
                else:
                    cmd.print_msg("ALREADY_ENABLED: %s" % fp)
        if a.block_icmp:
            for ib in a.block_icmp:
                cmd.print_msg("Adding icmpblock '%s' to default zone." % ib)
                if not fw_settings.queryIcmpBlock(ib):
                    fw_settings.addIcmpBlock(ib)
                else:
                    cmd.print_msg("ALREADY_ENABLED: %s" % ib)

        fw.config.set_zone_config_dict(fw_zone, fw_settings.getSettingsDict())

    elif a.version:
        cmd.print_and_exit(config.VERSION)

    elif a.get_log_denied:
        cmd.print_and_exit(fw.get_log_denied())
    elif a.set_log_denied:
        fw.set_log_denied(a.set_log_denied)

    elif a.get_automatic_helpers:
        cmd.print_and_exit(fw.get_automatic_helpers())
    elif a.set_automatic_helpers:
        fw.set_automatic_helpers(a.set_automatic_helpers)

    elif a.policy_server:
        pk_symlink('server')
    elif a.policy_desktop:
        pk_symlink('desktop')

    # options from firewall-cmd
    elif a.get_default_zone:
        cmd.print_and_exit(fw.get_default_zone())
    elif a.set_default_zone:
        fw.set_default_zone(a.set_default_zone)

    # lockdown
    elif a.lockdown_on:
        fw.enable_lockdown()
    elif a.lockdown_off:
        fw.disable_lockdown()
    elif a.query_lockdown:
        cmd.print_query_result(fw.policies.query_lockdown())

    # reset defaults
    elif a.reset_to_defaults:
        fw.config.reset_defaults()

    # zones
    elif a.get_zones:
        zones = fw.config.get_zones()
        cmd.print_and_exit(" ".join(zones))

    elif a.new_zone:
        fw.config.new_zone_dict(a.new_zone, FirewallClientZoneSettings().getSettingsDict())

    elif a.new_zone_from_file:
        filename = os.path.basename(a.new_zone_from_file)
        dirname = os.path.dirname(a.new_zone_from_file)
        if dirname == "":
            dirname = "./"
        try:
            obj = zone_reader(filename, dirname)
        except FirewallError as msg:
            cmd.print_and_exit("Failed to load zone file '%s': %s" % \
                               (a.new_zone_from_file, msg), msg.code)
        except IOError as msg:
            cmd.fail("Failed to load zone file: %s" % msg)

        if a.name:
            obj.name = a.name

        fw.config.new_zone(obj.name, obj.export_config())

    elif a.delete_zone:
        obj = fw.config.get_zone(a.delete_zone)
        fw.config.remove_zone(obj)

    elif a.load_zone_defaults:
        obj = fw.config.get_zone(a.load_zone_defaults)
        fw.config.load_zone_defaults(obj)

    elif a.info_zone:
        zone = fw.config.get_zone(a.info_zone)
        settings = FirewallClientZoneSettings(fw.config.get_zone_config_dict(zone))
        cmd.print_zone_info(a.info_zone, settings, True)
        sys.exit(0)

    elif a.path_zone:
        obj = fw.config.get_zone(a.path_zone)
        cmd.print_and_exit("%s/%s" % (obj.path, obj.filename))

    # policies
    elif a.get_policies:
        policies = fw.config.get_policy_objects()
        cmd.print_and_exit(" ".join(policies))

    elif a.new_policy:
        fw.config.new_policy_object_dict(a.new_policy, FirewallClientPolicySettings().getSettingsDict())

    elif a.new_policy_from_file:
        filename = os.path.basename(a.new_policy_from_file)
        dirname = os.path.dirname(a.new_policy_from_file)
        if dirname == "":
            dirname = "./"
        try:
            obj = policy_reader(filename, dirname)
        except FirewallError as msg:
            cmd.print_and_exit("Failed to load policy file '%s': %s" % \
                               (a.new_policy_from_file, msg), msg.code)
        except IOError as msg:
            cmd.fail("Failed to load policy file: %s" % msg)

        if a.name:
            obj.name = a.name

        fw.config.new_policy_object_dict(obj.name, obj.export_config_dict())

    elif a.delete_policy:
        obj = fw.config.get_policy_object(a.delete_policy)
        fw.config.remove_policy_object(obj)

    elif a.load_policy_defaults:
        obj = fw.config.get_policy_object(a.load_policy_defaults)
        fw.config.load_policy_object_defaults(obj)

    elif a.info_policy:
        policy = fw.config.get_policy_object(a.info_policy)
        settings = FirewallClientPolicySettings(fw.config.get_policy_object_config_dict(policy))
        cmd.print_policy_info(a.info_policy, settings, True)
        sys.exit(0)

    elif a.path_policy:
        obj = fw.config.get_policy_object(a.path_policy)
        cmd.print_and_exit("%s/%s" % (obj.path, obj.filename))

    # services
    elif a.get_services:
        services = fw.config.get_services()
        cmd.print_and_exit(" ".join(services))

    elif a.new_service:
        fw.config.new_service_dict(a.new_service,
                        FirewallClientServiceSettings().getSettingsDict())

    elif a.new_service_from_file:
        filename = os.path.basename(a.new_service_from_file)
        dirname = os.path.dirname(a.new_service_from_file)
        if dirname == "":
            dirname = "./"
        try:
            obj = service_reader(filename, dirname)
        except FirewallError as msg:
            cmd.print_and_exit("Failed to load service file '%s': %s" % \
                               (a.new_service_from_file, msg), msg.code)
        except IOError as msg:
            cmd.fail("Failed to load service file: %s" % msg)

        if a.name:
            obj.name = a.name

        fw.config.new_service_dict(obj.name, obj.export_config_dict())

    elif a.delete_service:
        obj = fw.config.get_service(a.delete_service)
        fw.config.remove_service(obj)

        # remove service from all zones
        zones = fw.config.get_zones()
        for zone in zones:
            _zone = fw.config.get_zone(zone)
            _settings = FirewallClientZoneSettings(fw.config.get_zone_config_dict(_zone))
            if _settings.queryService(a.delete_service):
                _settings.removeService(a.delete_service)
                fw.config.set_zone_config_dict(_zone, _settings.getSettingsDict())

        # remove service from all policies
        for policy in fw.config.get_policy_objects():
            _policy = fw.config.get_policy_object(policy)
            _settings = FirewallClientPolicySettings(fw.config.get_policy_object_config_dict(_policy))
            if _settings.queryService(a.delete_service):
                _settings.removeService(a.delete_service)
                fw.config.set_policy_object_config_dict(_policy, _settings.getSettingsDict())

    elif a.load_service_defaults:
        obj = fw.config.get_service(a.load_service_defaults)
        fw.config.load_service_defaults(obj)

    elif a.info_service:
        service = fw.config.get_service(a.info_service)
        settings = FirewallClientServiceSettings(
                        fw.config.get_service_config_dict(service))
        cmd.print_service_info(a.info_service, settings)
        sys.exit(0)

    elif a.path_service:
        obj = fw.config.get_service(a.path_service)
        cmd.print_and_exit("%s/%s" % (obj.path, obj.filename))

    # icmptypes
    elif a.get_icmptypes:
        icmptypes = fw.config.get_icmptypes()
        cmd.print_and_exit(" ".join(icmptypes))

    elif a.new_icmptype:
        fw.config.new_icmptype(a.new_icmptype,
                               FirewallClientIcmpTypeSettings().settings)

    elif a.new_icmptype_from_file:
        filename = os.path.basename(a.new_icmptype_from_file)
        dirname = os.path.dirname(a.new_icmptype_from_file)
        if dirname == "":
            dirname = "./"
        try:
            obj = icmptype_reader(filename, dirname)
        except FirewallError as msg:
            cmd.print_and_exit("Failed to load icmptype file '%s': %s" % \
                               (a.new_icmptype_from_file, msg), msg.code)
        except IOError as msg:
            cmd.fail("Failed to load icmptype file: %s" % msg)

        if a.name:
            obj.name = a.name

        fw.config.new_icmptype(obj.name, obj.export_config())

    elif a.delete_icmptype:
        obj = fw.config.get_icmptype(a.delete_icmptype)
        fw.config.remove_icmptype(obj)

        # remove icmpyte from all zones
        zones = fw.config.get_zones()
        for zone in zones:
            _zone = fw.config.get_zone(zone)
            _settings = FirewallClientZoneSettings(fw.config.get_zone_config_dict(_zone))
            if _settings.queryIcmpBlock(a.delete_icmptype):
                _settings.removeIcmpBlock(a.delete_icmptype)
                fw.config.set_zone_config_dict(_zone, _settings.getSettingsDict())

        for policy in fw.config.get_policy_objects():
            _policy = fw.config.get_policy_object(policy)
            _settings = FirewallClientPolicySettings(fw.config.get_policy_object_config_dict(_policy))
            if _settings.queryIcmpBlock(a.delete_icmptype):
                _settings.removeIcmpBlock(a.delete_icmptype)
                fw.config.set_policy_object_config_dict(_policy, _settings.getSettingsDict())

    elif a.load_icmptype_defaults:
        obj = fw.config.get_icmptype(a.load_icmptype_defaults)
        fw.config.load_icmptype_defaults(obj)

    elif a.info_icmptype:
        icmptype = fw.config.get_icmptype(a.info_icmptype)
        settings = FirewallClientIcmpTypeSettings(
            list(fw.config.get_icmptype_config(icmptype)))

        cmd.print_icmptype_info(a.info_icmptype, settings)
        sys.exit(0)

    elif a.path_icmptype:
        obj = fw.config.get_icmptype(a.path_icmptype)
        cmd.print_and_exit("%s/%s" % (obj.path, obj.filename))

    elif a.icmptype and options_icmptype:
        icmptype = fw.config.get_icmptype(a.icmptype)
        settings = FirewallClientIcmpTypeSettings(
            list(fw.config.get_icmptype_config(icmptype)))

        if a.add_destination:
            cmd.add_sequence(a.add_destination, settings.addDestination,
                             settings.queryDestination,
                             cmd.check_destination_ipv, "'%s'")
            fw.config.set_icmptype_config(icmptype, settings.settings)

        elif a.remove_destination:
            cmd.remove_sequence(a.remove_destination,
                                settings.removeDestination,
                                settings.queryDestination,
                                cmd.check_destination_ipv, "'%s'")
            fw.config.set_icmptype_config(icmptype, settings.settings)

        elif a.query_destination:
            cmd.query_sequence(a.query_destination, settings.queryDestination,
                               cmd.check_destination_ipv , "'%s'")

        elif a.get_destinations:
            l = settings.getDestinations()
            if len(l) == 0:
                l = [ "ipv4", "ipv6" ]
            cmd.print_and_exit("\n".join(l))

        elif a.set_description:
            settings.setDescription(a.set_description)
            fw.config.set_icmptype_config(icmptype, settings.settings)

        elif a.get_description:
            cmd.print_and_exit(settings.getDescription())

        elif a.set_short:
            settings.setShort(a.set_short)
            fw.config.set_icmptype_config(icmptype, settings.settings)

        elif a.get_short:
            cmd.print_and_exit(settings.getShort())

        else:
            cmd.fail(parser.format_usage() + "Unknown option")

        cmd.print_and_exit("success")

    elif a.service and options_service:
        service = fw.config.get_service(a.service)
        settings = FirewallClientServiceSettings(
                        fw.config.get_service_config_dict(service))

        if a.add_port:
            cmd.add_sequence(a.add_port, settings.addPort,
                             settings.queryPort, cmd.parse_port, "%s/%s")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.remove_port:
            cmd.remove_sequence(a.remove_port, settings.removePort,
                                settings.queryPort, cmd.parse_port, "%s/%s")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.query_port:
            cmd.query_sequence(a.query_port, settings.queryPort,
                               cmd.parse_port, "%s/%s")

        elif a.get_ports:
            l = settings.getPorts()
            cmd.print_and_exit(" ".join(["%s/%s" % (port[0], port[1]) for port in l]))

        elif a.add_protocol:
            cmd.add_sequence(a.add_protocol, settings.addProtocol,
                             settings.queryProtocol, None, "'%s'")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.remove_protocol:
            cmd.remove_sequence(a.remove_protocol, settings.removeProtocol,
                                settings.queryProtocol, None, "'%s'")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.query_protocol:
            cmd.query_sequence(a.query_protocol, settings.queryProtocol,
                               None, "'%s'")

        elif a.get_protocols:
            l = settings.getProtocols()
            cmd.print_and_exit(" ".join(["%s" % protocol for protocol in l]))

        elif a.add_source_port:
            cmd.add_sequence(a.add_source_port, settings.addSourcePort,
                             settings.querySourcePort, cmd.parse_port, "%s/%s")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.remove_source_port:
            cmd.remove_sequence(a.remove_source_port, settings.removeSourcePort,
                                settings.querySourcePort, cmd.parse_port,
                                "%s/%s")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.query_source_port:
            cmd.query_sequence(a.query_source_port, settings.querySourcePort,
                               cmd.parse_port, "%s/%s")

        elif a.get_source_ports:
            l = settings.getSourcePorts()
            cmd.print_and_exit(" ".join(["%s/%s" % (port[0], port[1]) for port in l]))

        elif a.add_module:
            cmd.add_sequence(a.add_module, settings.addModule,
                             settings.queryModule, None, "'%s'")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.remove_module:
            cmd.remove_sequence(a.remove_module, settings.removeModule,
                                settings.queryModule, None, "'%s'")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.query_module:
            cmd.query_sequence(a.query_module, settings.queryModule,
                               None, "'%s'")

        elif a.get_modules:
            l = settings.getModules()
            cmd.print_and_exit(" ".join(["%s" % module for module in l]))

        elif a.set_destination:
            cmd.add_sequence(a.set_destination, settings.setDestination,
                             settings.queryDestination,
                             cmd.parse_service_destination, "%s:%s")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.remove_destination:
            # special case for removeDestination: Only ipv, no address
            for ipv in a.remove_destination:
                cmd.check_destination_ipv(ipv)
                if ipv not in settings.getDestinations():
                    if len(a.remove_destination) > 1:
                        cmd.print_warning("Warning: NOT_ENABLED: '%s'" % ipv)
                    else:
                        code = FirewallError.get_code("NOT_ENABLED")
                        cmd.print_and_exit("Error: NOT_ENABLED: '%s'" % ipv,
                                           code)
                else:
                    settings.removeDestination(ipv)
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.query_destination:
            cmd.query_sequence(a.query_destination, settings.queryDestination,
                               cmd.parse_service_destination, "'%s'")

        elif a.get_destinations:
            l = settings.getDestinations()
            cmd.print_and_exit(" ".join(["%s:%s" % (dest[0], dest[1]) for dest in l.items()]))

        elif a.add_include:
            cmd.add_sequence(a.add_include, settings.addInclude,
                             settings.queryInclude, None, "'%s'")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.remove_include:
            cmd.remove_sequence(a.remove_include, settings.removeInclude,
                                settings.queryInclude, None, "'%s'")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.query_include:
            cmd.query_sequence(a.query_include, settings.queryInclude,
                               None, "'%s'")

        elif a.get_includes:
            l = settings.getIncludes()
            cmd.print_and_exit(" ".join(["%s" % include for include in sorted(l)]))

        elif a.add_helper:
            cmd.add_sequence(a.add_helper, settings.addHelper,
                             settings.queryHelper, None, "'%s'")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.remove_helper:
            cmd.remove_sequence(a.remove_helper, settings.removeHelper,
                                settings.queryHelper, None, "'%s'")
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.query_helper:
            cmd.query_sequence(a.query_helper, settings.queryHelper,
                               None, "'%s'")

        elif a.get_service_helpers:
            l = settings.getHelpers()
            cmd.print_and_exit(" ".join(["%s" % helper for helper in sorted(l)]))

        elif a.set_description:
            settings.setDescription(a.set_description)
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.get_description:
            cmd.print_and_exit(settings.getDescription())

        elif a.set_short:
            settings.setShort(a.set_short)
            fw.config.set_service_config_dict(service, settings.getSettingsDict())

        elif a.get_short:
            cmd.print_and_exit(settings.getShort())

        else:
            cmd.fail(parser.format_usage() + "Unknown option")

        cmd.print_and_exit("success")

    # ipsets
    if a.get_ipsets:
        ipsets = fw.config.get_ipsets()
        cmd.print_and_exit(" ".join(sorted(ipsets)))

    elif a.new_ipset:
        if not a.type:
            cmd.fail(parser.format_usage() + "No type specified.")

        if a.type=='hash:mac' and a.family:
            cmd.fail(parser.format_usage() + "--family is not compatible with the hash:mac type")

        settings = FirewallClientIPSetSettings()
        settings.setType(a.type)
        if a.option:
            for opt in a.option:
                settings.addOption(*cmd.parse_ipset_option(opt))
        fw.config.new_ipset(a.new_ipset, settings.settings)

    elif a.new_ipset_from_file:
        filename = os.path.basename(a.new_ipset_from_file)
        dirname = os.path.dirname(a.new_ipset_from_file)
        if dirname == "":
            dirname = "./"
        try:
            obj = ipset_reader(filename, dirname)
        except FirewallError as msg:
            cmd.print_and_exit("Failed to load ipset file '%s': %s" % \
                               (a.new_ipset_from_file, msg), msg.code)
        except IOError as msg:
            cmd.fail("Failed to load ipset file: %s" % msg)

        if a.name:
            obj.name = a.name

        fw.config.new_ipset(obj.name, obj.export_config())

    elif a.delete_ipset:
        ipset = fw.config.get_ipset(a.delete_ipset)
        fw.config.remove_ipset(ipset)

    elif a.load_ipset_defaults:
        obj = fw.config.get_ipset(a.load_ipset_defaults)
        fw.config.load_ipset_defaults(obj)

    elif a.info_ipset:
        ipset = fw.config.get_ipset(a.info_ipset)
        settings = FirewallClientIPSetSettings(
            list(fw.config.get_ipset_config(ipset)))
        cmd.print_ipset_info(a.info_ipset, settings)
        sys.exit(0)

    elif a.path_ipset:
        obj = fw.config.get_ipset(a.path_ipset)
        cmd.print_and_exit("%s/%s" % (obj.path, obj.filename))

    elif a.ipset:
        if a.add_entry:
            ipset = fw.config.get_ipset(a.ipset)
            settings = FirewallClientIPSetSettings(
                list(fw.config.get_ipset_config(ipset)))
            cmd.add_sequence(a.add_entry, settings.addEntry,
                             settings.queryEntry, None, "'%s'")
            fw.config.set_ipset_config(ipset, settings.settings)

        elif a.remove_entry:
            ipset = fw.config.get_ipset(a.ipset)
            settings = FirewallClientIPSetSettings(
                list(fw.config.get_ipset_config(ipset)))
            cmd.remove_sequence(a.remove_entry, settings.removeEntry,
                                settings.queryEntry, None, "'%s'")
            fw.config.set_ipset_config(ipset, settings.settings)

        elif a.query_entry:
            ipset = fw.config.get_ipset(a.ipset)
            settings = FirewallClientIPSetSettings(
                list(fw.config.get_ipset_config(ipset)))
            cmd.query_sequence(a.query_entry, settings.queryEntry, None, "'%s'")

        elif a.get_entries:
            ipset = fw.config.get_ipset(a.ipset)
            settings = FirewallClientIPSetSettings(
                list(fw.config.get_ipset_config(ipset)))
            l = settings.getEntries()
            cmd.print_and_exit("\n".join(l))

        elif a.add_entries_from_file:
            ipset = fw.config.get_ipset(a.ipset)
            settings = FirewallClientIPSetSettings(
                list(fw.config.get_ipset_config(ipset)))
            changed = False

            for filename in a.add_entries_from_file:
                try:
                    entries = cmd.get_ipset_entries_from_file(filename)
                except IOError as msg:
                    message = "Failed to read file '%s': %s" % (filename,
                                                                msg)
                    if len(a.add_entries_from_file) > 1:
                        cmd.print_warning(message)
                    else:
                        cmd.print_and_exit(message)
                else:
                    old_entries = settings.getEntries()
                    entries_set = set()
                    for entry in old_entries:
                        entries_set.add(entry)
                    for entry in entries:
                        if entry not in entries_set:
                            old_entries.append(entry)
                            entries_set.add(entry)
                            changed = True
                        else:
                            cmd.print_if_verbose(
                                "Warning: ALREADY_ENABLED: %s" % entry)
                    if changed:
                        settings.setEntries(old_entries)
            if changed:
                fw.config.set_ipset_config(ipset, settings.settings)

        elif a.remove_entries_from_file:
            ipset = fw.config.get_ipset(a.ipset)
            settings = FirewallClientIPSetSettings(
                list(fw.config.get_ipset_config(ipset)))
            changed = False

            for filename in a.remove_entries_from_file:
                try:
                    entries = cmd.get_ipset_entries_from_file(filename)
                except IOError as msg:
                    message = "Failed to read file '%s': %s" % (filename, msg)
                    if len(a.remove_entries_from_file) > 1:
                        cmd.print_warning(message)
                    else:
                        cmd.print_and_exit(message)
                else:
                    old_entries = settings.getEntries()
                    entries_set = set()
                    for entry in old_entries:
                        entries_set.add(entry)
                    for entry in entries:
                        if entry in entries_set:
                            old_entries.remove(entry)
                            entries_set.discard(entry)
                            changed = True
                        else:
                            cmd.print_if_verbose("Warning: NOT_ENABLED: %s" % \
                                                 entry)
                    if changed:
                        settings.setEntries(old_entries)
            if changed:
                fw.config.set_ipset_config(ipset, settings.settings)

        elif a.set_description:
            ipset = fw.config.get_ipset(a.ipset)
            settings = FirewallClientIPSetSettings(
                list(fw.config.get_ipset_config(ipset)))
            settings.setDescription(a.set_description)

            fw.config.set_ipset_config(ipset, settings.settings)

        elif a.get_description:
            ipset = fw.config.get_ipset(a.ipset)
            settings = FirewallClientIPSetSettings(
                list(fw.config.get_ipset_config(ipset)))

            cmd.print_and_exit(settings.getDescription())

        elif a.set_short:
            ipset = fw.config.get_ipset(a.ipset)
            settings = FirewallClientIPSetSettings(
                list(fw.config.get_ipset_config(ipset)))
            settings.setShort(a.set_short)

            fw.config.set_ipset_config(ipset, settings.settings)

        elif a.get_short:
            ipset = fw.config.get_ipset(a.ipset)
            settings = FirewallClientIPSetSettings(
                list(fw.config.get_ipset_config(ipset)))

            cmd.print_and_exit(settings.getShort())

        else:
            cmd.fail(parser.format_usage() + "Unknown option")

        cmd.print_and_exit("success")

    # helper

    elif a.get_helpers:
        cmd.print_and_exit(" ".join(sorted(fw.config.get_helpers())))

    elif a.new_helper:
        if not a.module:
            cmd.fail(parser.format_usage() + "No module specified.")

        settings = FirewallClientHelperSettings()
        settings.setModule(a.module)
        if a.family:
            settings.setFamily(a.family)
        fw.config.new_helper(a.new_helper, settings.settings)

    elif a.new_helper_from_file:
        filename = os.path.basename(a.new_helper_from_file)
        dirname = os.path.dirname(a.new_helper_from_file)
        if dirname == "":
            dirname = "./"
        try:
            obj = helper_reader(filename, dirname)
        except FirewallError as msg:
            cmd.print_and_exit("Failed to load helper file '%s': %s" % \
                               (a.new_helper_from_file, msg), msg.code)
        except IOError as msg:
            cmd.fail("Failed to load helper file: %s" % msg)

        if a.name:
            obj.name = a.name

        fw.config.new_helper(obj.name, obj.export_config())

    elif a.delete_helper:
        obj = fw.config.get_helper(a.delete_helper)
        fw.config.remove_helper(obj)

    elif a.load_helper_defaults:
        obj = fw.config.get_helper(a.load_helper_defaults)
        fw.config.load_helper_defaults(obj)

    elif a.info_helper:
        obj = fw.config.get_helper(a.info_helper)
        settings = FirewallClientHelperSettings(
            list(fw.config.get_helper_config(obj)))
        cmd.print_helper_info(a.info_helper, settings)
        sys.exit(0)

    elif a.path_helper:
        obj = fw.config.get_helper(a.path_helper)
        cmd.print_and_exit("%s/%s" % (obj.path, obj.filename))

    elif a.helper:
        obj = fw.config.get_helper(a.helper)
        settings = FirewallClientHelperSettings(
            list(fw.config.get_helper_config(obj)))

        if a.add_port:
            cmd.add_sequence(a.add_port, settings.addPort,
                             settings.queryPort, cmd.parse_port, "%s/%s")
            fw.config.set_helper_config(obj, settings.settings)

        elif a.remove_port:
            cmd.remove_sequence(a.remove_port, settings.removePort,
                                settings.queryPort, cmd.parse_port, "%s/%s")
            fw.config.set_helper_config(obj, settings.settings)

        elif a.query_port:
            cmd.query_sequence(a.query_port, settings.queryPort,
                               cmd.parse_port, "%s/%s")

        elif a.get_ports:
            l = settings.getPorts()
            cmd.print_and_exit(" ".join(["%s/%s" % (port[0], port[1]) for port in l]))

        elif a.get_module:
            cmd.print_and_exit(settings.getModule())

        elif a.set_module:
            settings.setModule(cmd.check_module(a.set_module))
            fw.config.set_helper_config(obj, settings.settings)

        elif a.get_family:
            cmd.print_and_exit(settings.getFamily())

        elif a.set_family:
            settings.setFamily(cmd.check_helper_family(a.set_family[0]))
            fw.config.set_helper_config(obj, settings.settings)

        elif a.set_description:
            settings.setDescription(a.set_description)

            fw.config.set_helper_config(obj, settings.settings)

        elif a.get_description:
            cmd.print_and_exit(settings.getDescription())

        elif a.set_short:
            settings.setShort(a.set_short)

            fw.config.set_helper_config(obj, settings.settings)

        elif a.get_short:
            cmd.print_and_exit(settings.getShort())

        else:
            cmd.fail(parser.format_usage() + "Unknown option")

    # lockdown whitelist

    elif options_lockdown_whitelist:
        whitelist = fw.config.get_policies().lockdown_whitelist

        # commands
        if a.list_lockdown_whitelist_commands:
            l = whitelist.get_commands()
            cmd.print_and_exit("\n".join(l))
        elif a.add_lockdown_whitelist_command:
            cmd.add_sequence(a.add_lockdown_whitelist_command,
                             whitelist.add_command,
                             whitelist.has_command, None, "'%s'")
        elif a.remove_lockdown_whitelist_command:
            cmd.remove_sequence(a.remove_lockdown_whitelist_command,
                                whitelist.remove_command,
                                whitelist.has_command, None, "'%s'")
        elif a.query_lockdown_whitelist_command:
            cmd.query_sequence(a.query_lockdown_whitelist_command,
                               whitelist.has_command, None, "'%s'")

        # contexts
        elif a.list_lockdown_whitelist_contexts:
            l = whitelist.get_contexts()
            cmd.print_and_exit("\n".join(l))
        elif a.add_lockdown_whitelist_context:
            cmd.add_sequence(a.add_lockdown_whitelist_context,
                             whitelist.add_context,
                             whitelist.has_context, None, "'%s'")
        elif a.remove_lockdown_whitelist_context:
            cmd.remove_sequence(a.remove_lockdown_whitelist_context,
                                whitelist.remove_context,
                                whitelist.has_context, None, "'%s'")
        elif a.query_lockdown_whitelist_context:
            cmd.query_sequence(a.query_lockdown_whitelist_context,
                               whitelist.has_context, None, "'%s'")

        # uids
        elif a.list_lockdown_whitelist_uids:
            l = whitelist.get_uids()
            cmd.print_and_exit(" ".join(map(str, l)))
        elif a.add_lockdown_whitelist_uid:
            cmd.add_sequence(a.add_lockdown_whitelist_uid,
                             whitelist.add_uid,
                             whitelist.has_uid, None, "'%s'")
        elif a.remove_lockdown_whitelist_uid:
            cmd.remove_sequence(a.remove_lockdown_whitelist_uid,
                                whitelist.remove_uid,
                                whitelist.has_uid, None, "'%s'")
        elif a.query_lockdown_whitelist_uid:
            cmd.query_sequence(a.query_lockdown_whitelist_uid,
                               whitelist.has_uid, None, "'%s'")

        # users
        elif a.list_lockdown_whitelist_users:
            l = whitelist.get_users()
            cmd.print_and_exit("\n".join(l))
        elif a.add_lockdown_whitelist_user:
            cmd.add_sequence(a.add_lockdown_whitelist_user,
                             whitelist.add_user,
                             whitelist.has_user, None, "'%s'")
        elif a.remove_lockdown_whitelist_user:
            cmd.remove_sequence(a.remove_lockdown_whitelist_user,
                                whitelist.remove_user,
                                whitelist.has_user, None, "'%s'")
        elif a.query_lockdown_whitelist_user:
            cmd.query_sequence(a.query_lockdown_whitelist_user,
                               whitelist.has_user, None, "'%s'")

        # apply whitelist changes
        whitelist.write()

    elif options_direct:
        obj = fw.config.get_direct()

        if a.add_passthrough:
            if len(a.add_passthrough) < 2:
                cmd.fail("usage: --direct --add-passthrough { ipv4 | ipv6 | eb } <args>")
            cmd.print_msg(
                obj.add_passthrough(cmd.check_ipv(a.add_passthrough[0]),
                                    splitArgs(a.add_passthrough[1])))

        elif a.remove_passthrough:
            if len(a.remove_passthrough) < 2:
                cmd.fail("usage: --direct --remove-passthrough { ipv4 | ipv6 | eb } <args>")
            obj.remove_passthrough(cmd.check_ipv(a.remove_passthrough[0]),
                                   splitArgs(a.remove_passthrough[1]))
        elif a.query_passthrough:
            if len(a.query_passthrough) < 2:
                cmd.fail("usage: --direct --query-passthrough { ipv4 | ipv6 | eb } <args>")
            cmd.print_query_result(
                obj.query_passthrough(cmd.check_ipv(a.query_passthrough[0]),
                                      splitArgs(a.query_passthrough[1])))
            sys.exit(0)
        elif a.get_passthroughs:
            rules = obj.get_passthroughs(cmd.check_ipv(a.get_passthroughs[0]))
            for rule in rules:
                cmd.print_msg(joinArgs(rule))
            sys.exit(0)
        elif a.get_all_passthroughs:
            rules = obj.get_all_passthroughs()
            for ipv in rules:
                for rule in rules[ipv]:
                    cmd.print_msg("%s %s" % (ipv, joinArgs(rule)))
            sys.exit(0)

        elif a.add_chain:
            obj.add_chain(cmd.check_ipv(a.add_chain[0]),
                          a.add_chain[1], a.add_chain[2])
        elif a.remove_chain:
            obj.remove_chain(cmd.check_ipv(a.remove_chain[0]),
                             a.remove_chain[1], a.remove_chain[2])
        elif a.query_chain:
            cmd.print_query_result(
                obj.query_chain(cmd.check_ipv(a.query_chain[0]),
                                a.query_chain[1], a.query_chain[2]))
            sys.exit(0)
        elif a.get_chains:
            cmd.print_and_exit(
                " ".join(obj.get_chains(cmd.check_ipv(a.get_chains[0]),
                                        a.get_chains[1])))
            sys.exit(0)
        elif a.get_all_chains:
            chains = obj.get_all_chains()
            for (ipv, table) in chains:
                for chain in chains[(ipv, table)]:
                    cmd.print_msg("%s %s %s" % (ipv, table, chain))
            sys.exit(0)

        elif a.add_rule:
            if len(a.add_rule) < 5:
                cmd.fail("usage: --direct --add-rule { ipv4 | ipv6 | eb } <table> <chain> <priority> <args>")
            try:
                priority = int(a.add_rule[3])
            except ValueError:
                cmd.fail("wrong priority\nusage: --direct --add-rule { ipv4 | ipv6 | eb } <table> <chain> <priority> <args>")
            obj.add_rule(cmd.check_ipv(a.add_rule[0]), a.add_rule[1],
                         a.add_rule[2], priority, splitArgs(a.add_rule[4]))
        elif a.remove_rule:
            if len(a.remove_rule) < 5:
                cmd.fail("usage: --direct --remove-rule { ipv4 | ipv6 | eb } <table> <chain> <priority> <args>")
            try:
                priority = int(a.remove_rule[3])
            except ValueError:
                cmd.fail("usage: --direct --remove-rule { ipv4 | ipv6 | eb } <table> <chain> <priority> <args>")
            obj.remove_rule(cmd.check_ipv(a.remove_rule[0]), a.remove_rule[1],
                            a.remove_rule[2], priority, splitArgs(a.remove_rule[4]))
        elif a.remove_rules:
            if len(a.remove_rules) < 3:
                cmd.fail("usage: --direct --remove-rules { ipv4 | ipv6 | eb } <table> <chain>")
            obj.remove_rules(cmd.check_ipv(a.remove_rules[0]),
                             a.remove_rules[1], a.remove_rules[2])
        elif a.query_rule:
            if len(a.query_rule) < 5:
                cmd.fail("usage: --direct --query-rule { ipv4 | ipv6 | eb } <table> <chain> <priority> <args>")
            try:
                priority = int(a.query_rule[3])
            except ValueError:
                cmd.fail("usage: --direct --query-rule { ipv4 | ipv6 | eb } <table> <chain> <priority> <args>")
            cmd.print_query_result(
                obj.query_rule(cmd.check_ipv(a.query_rule[0]),
                               a.query_rule[1], a.query_rule[2],
                               priority, splitArgs(a.query_rule[4])))
            sys.exit(0)
        elif a.get_rules:
            rules = obj.get_rules(cmd.check_ipv(a.get_rules[0]),
                                  a.get_rules[1], a.get_rules[2])
            for (priority, rule) in rules:
                cmd.print_msg("%d %s" % (priority, joinArgs(rule)))
            sys.exit(0)
        elif a.get_all_rules:
            rules = obj.get_all_rules()
            for (ipv, table, chain) in rules:
                for (priority, rule) in rules[(ipv, table, chain)]:
                    cmd.print_msg("%s %s %s %d %s" % \
                                  (ipv, table, chain, priority,
                                   joinArgs(rule)))
            sys.exit(0)

        obj.write()

    # list everything
    elif a.list_all_policies:
        policies = fw.config.get_policy_objects()
        for policy in policies:
            fw_policy = fw.config.get_policy_object(policy)
            fw_settings = FirewallClientPolicySettings(fw.config.get_policy_object_config_dict(fw_policy))
            cmd.print_policy_info(policy, fw_settings)
            cmd.print_msg("")
        sys.exit(0)

    elif a.policy:
        fw_policy = fw.config.get_policy_object(a.policy)
        fw_settings = FirewallClientPolicySettings(fw.config.get_policy_object_config_dict(fw_policy))

        # ingress zones
        if a.list_ingress_zones:
            l = fw_settings.getIngressZones()
            cmd.print_and_exit(" ".join(sorted(l)))
        elif a.add_ingress_zone:
            cmd.add_sequence(a.add_ingress_zone, fw_settings.addIngressZone,
                             fw_settings.queryIngressZone, None, "'%s'")
        elif a.remove_ingress_zone:
            cmd.remove_sequence(a.remove_ingress_zone, fw_settings.removeIngressZone,
                                fw_settings.queryIngressZone, None, "'%s'")
        elif a.query_ingress_zone:
            cmd.query_sequence(a.query_ingress_zone, fw_settings.queryIngressZone,
                               None, "'%s'")

        # egress zones
        if a.list_egress_zones:
            l = fw_settings.getEgressZones()
            cmd.print_and_exit(" ".join(sorted(l)))
        elif a.add_egress_zone:
            cmd.add_sequence(a.add_egress_zone, fw_settings.addEgressZone,
                             fw_settings.queryEgressZone, None, "'%s'")
        elif a.remove_egress_zone:
            cmd.remove_sequence(a.remove_egress_zone, fw_settings.removeEgressZone,
                                fw_settings.queryEgressZone, None, "'%s'")
        elif a.query_egress_zone:
            cmd.query_sequence(a.query_egress_zone, fw_settings.queryEgressZone,
                               None, "'%s'")

        # priority
        elif a.get_priority:
            cmd.print_and_exit(str(fw_settings.getPriority()))
        elif a.set_priority:
            fw_settings.setPriority(a.set_priority)

        # rich rules
        if a.list_rich_rules:
            l = fw_settings.getRichRules()
            cmd.print_and_exit("\n".join(l))
        elif a.add_rich_rule:
            cmd.add_sequence(a.add_rich_rule, fw_settings.addRichRule,
                             fw_settings.queryRichRule, None, "'%s'")
        elif a.remove_rich_rule:
            cmd.remove_sequence(a.remove_rich_rule, fw_settings.removeRichRule,
                                fw_settings.queryRichRule, None, "'%s'")
        elif a.query_rich_rule:
            cmd.query_sequence(a.query_rich_rule, fw_settings.queryRichRule,
                               None, "'%s'")

        # service
        if a.list_services:
            l = fw_settings.getServices()
            cmd.print_and_exit(" ".join(sorted(l)))
        elif a.add_service:
            cmd.add_sequence(a.add_service, fw_settings.addService,
                             fw_settings.queryService, None, "'%s'")
        elif a.remove_service_from_policy:
            cmd.remove_sequence(a.remove_service_from_policy,
                                fw_settings.removeService,
                                fw_settings.queryService, None, "'%s'")
        elif a.query_service:
            cmd.query_sequence(a.query_service, fw_settings.queryService,
                               None, "'%s'")

        # port
        elif a.list_ports:
            l = fw_settings.getPorts()
            cmd.print_and_exit(" ".join(["%s/%s" % (port[0], port[1]) for port in sorted(l, key=lambda x: (x[1], getPortRange(x[0])[0]))]))
        elif a.add_port:
            cmd.add_sequence(a.add_port, fw_settings.addPort,
                             fw_settings.queryPort, cmd.parse_port, "%s/%s")
        elif a.remove_port:
            cmd.remove_sequence(a.remove_port, fw_settings.removePort,
                                fw_settings.queryPort, cmd.parse_port, "%s/%s")
        elif a.query_port:
            cmd.query_sequence(a.query_port, fw_settings.queryPort,
                               cmd.parse_port, "%s/%s")

        # protocol
        elif a.list_protocols:
            l = fw_settings.getProtocols()
            cmd.print_and_exit(" ".join(sorted(l)))
        elif a.add_protocol:
            cmd.add_sequence(a.add_protocol, fw_settings.addProtocol,
                             fw_settings.queryProtocol, None, "'%s'")
        elif a.remove_protocol:
            cmd.remove_sequence(a.remove_protocol, fw_settings.removeProtocol,
                                fw_settings.queryProtocol, None, "'%s'")
        elif a.query_protocol:
            cmd.query_sequence(a.query_protocol, fw_settings.queryProtocol,
                               None, "'%s'")

        # source port
        elif a.list_source_ports:
            l = fw_settings.getSourcePorts()
            cmd.print_and_exit(" ".join(["%s/%s" % (port[0], port[1]) for port in sorted(l, key=lambda x: (x[1], getPortRange(x[0])[0]))]))
        elif a.add_source_port:
            cmd.add_sequence(a.add_source_port, fw_settings.addSourcePort,
                             fw_settings.querySourcePort, cmd.parse_port,
                             "%s/%s")
        elif a.remove_source_port:
            cmd.remove_sequence(a.remove_source_port,
                                fw_settings.removeSourcePort,
                                fw_settings.querySourcePort, cmd.parse_port,
                                "%s/%s")
        elif a.query_source_port:
            cmd.query_sequence(a.query_source_port, fw_settings.querySourcePort,
                               cmd.parse_port, "%s/%s")

        # masquerade
        elif a.add_masquerade:
            fw_settings.setMasquerade(True)
        elif a.remove_masquerade:
            fw_settings.setMasquerade(False)
        elif a.query_masquerade:
            cmd.print_query_result(fw_settings.getMasquerade())

        # forward port
        elif a.list_forward_ports:
            l = fw_settings.getForwardPorts()
            cmd.print_and_exit("\n".join(["port=%s:proto=%s:toport=%s:toaddr=%s" % (_port, _protocol, _toport, _toaddr) for (_port, _protocol, _toport, _toaddr) in l]))
        elif a.add_forward_port:
            cmd.add_sequence(a.add_forward_port, fw_settings.addForwardPort,
                             fw_settings.queryForwardPort,
                             cmd.parse_forward_port,
                             "port=%s:proto=%s:toport=%s:toaddr=%s")
        elif a.remove_forward_port:
            cmd.remove_sequence(a.remove_forward_port,
                                fw_settings.removeForwardPort,
                                fw_settings.queryForwardPort,
                                cmd.parse_forward_port,
                                "port=%s:proto=%s:toport=%s:toaddr=%s")
        elif a.query_forward_port:
            cmd.query_sequence(a.query_forward_port,
                               fw_settings.queryForwardPort,
                               cmd.parse_forward_port,
                               "port=%s:proto=%s:toport=%s:toaddr=%s")

        # block icmp
        elif a.list_icmp_blocks:
            l = fw_settings.getIcmpBlocks()
            cmd.print_and_exit(" ".join(l))
        elif a.add_icmp_block:
            cmd.add_sequence(a.add_icmp_block, fw_settings.addIcmpBlock,
                             fw_settings.queryIcmpBlock, None, "'%s'")
        elif a.remove_icmp_block:
            cmd.remove_sequence(a.remove_icmp_block,
                                fw_settings.removeIcmpBlock,
                                fw_settings.queryIcmpBlock, None, "'%s'")
        elif a.query_icmp_block:
            cmd.query_sequence(a.query_icmp_block, fw_settings.queryIcmpBlock,
                               None, "'%s'")

        # policy target
        elif a.get_target:
            cmd.print_and_exit(fw_settings.getTarget())
        elif a.set_target:
            fw_settings.setTarget(a.set_target)

        # list all policy settings
        elif a.list_all:
            cmd.print_policy_info(a.policy, fw_settings)
            sys.exit(0)

        elif a.set_description:
            fw_settings.setDescription(a.set_description)

        elif a.get_description:
            cmd.print_and_exit(fw_settings.getDescription())

        elif a.set_short:
            fw_settings.setShort(a.set_short)

        elif a.get_short:
            cmd.print_and_exit(fw_settings.getShort())

        fw.config.set_policy_object_config_dict(fw_policy, fw_settings.getSettingsDict())

        cmd.print_and_exit("success")

    else:
        if zone == "":
            zone = fw.get_default_zone()
        fw_zone = fw.config.get_zone(zone)
        fw_settings = FirewallClientZoneSettings(fw.config.get_zone_config_dict(fw_zone))

        # interface
        if a.list_interfaces:
            l = fw_settings.getInterfaces()
            cmd.print_and_exit(" ".join(l))
        elif a.get_zone_of_interface:
            for interface in a.get_zone_of_interface:
                ret = [ ]
                for zone in fw.config.get_zones():
                    obj = fw.config.get_zone(zone)
                    if interface in obj.interfaces:
                        ret.append(obj.name)
                if len(ret) > 1:
                    # Even it shouldn't happen, it's actually possible that
                    # the same interface is in several zone XML files
                    cmd.print_warning(" ".join(ret) + "  (ERROR: interface '%s' is in %s zone XML files, can be only in one)" % (interface, len(ret)))
                if len(ret) == 1:
                    if len(a.get_zone_of_interface) > 1:
                        cmd.print_warning("%s: %s" % (interface, ret[0]))
                    else:
                        cmd.print_and_exit(ret[0])
                else:
                    if len(a.get_zone_of_interface) > 1:
                        cmd.print_warning("%s: no zone" % interface)
                    else:
                        cmd.print_and_exit("no zone", 2)
        elif a.change_interface:
            for interface in a.change_interface:
                for old_zone in fw.config.get_zones():
                    old_zone_obj = fw.config.get_zone(old_zone)
                    if interface in old_zone_obj.interfaces:
                        if old_zone_obj.name != zone:
                            old_zone_settings = FirewallClientZoneSettings(fw.config.get_zone_config_dict(old_zone_obj))

                            old_zone_settings.removeInterface(interface) # remove from old
                            fw.config.set_zone_config_dict(old_zone_obj, old_zone_settings.getSettingsDict())
                fw_settings.addInterface(interface)              # add to new
        elif a.add_interface:
            cmd.add_sequence(a.add_interface, fw_settings.addInterface,
                             fw_settings.queryInterface, None, "'%s'")
        elif a.remove_interface:
            cmd.remove_sequence(a.remove_interface, fw_settings.removeInterface,
                                fw_settings.queryInterface, None, "'%s'")
        elif a.query_interface:
            cmd.query_sequence(a.query_interface, fw_settings.queryInterface,
                               None, "'%s'")

        # source
        if a.list_sources:
            sources = fw_settings.getSources()
            cmd.print_and_exit(" ".join(sources))
        elif a.get_zone_of_source:
            for source in a.get_zone_of_source:
                ret = [ ]
                for zone in fw.config.get_zones():
                    obj = fw.config.get_zone(zone)
                    if source in obj.sources:
                        ret.append(obj.name)
                if len(ret) > 1:
                    # Even it shouldn't happen, it's actually possible that
                    # the same source is in several zone XML files
                    cmd.print_warning(" ".join(ret) + "  (ERROR: source '%s' is in %s zone XML files, can be only in one)" % (source, len(ret)))
                if len(ret) == 1:
                    if len(a.get_zone_of_source) > 1:
                        cmd.print_warning("%s: %s" % (source, ret[0]))
                    else:
                        cmd.print_and_exit(ret[0])
                else:
                    if len(a.get_zone_of_source) > 1:
                        cmd.print_warning("%s: no zone" % source)
                    else:
                        cmd.print_and_exit("no zone", 2)
        elif a.change_source:
            for source in a.change_source:
                for old_zone in fw.config.get_zones():
                    old_zone_obj = fw.config.get_zone(old_zone)
                    if source in old_zone_obj.sources:
                        if old_zone_obj.name != zone:
                            old_zone_settings = FirewallClientZoneSettings(fw.config.get_zone_config_dict(old_zone_obj))

                            old_zone_settings.removeSource(source) # remove from old
                            fw.config.set_zone_config_dict(old_zone_obj, old_zone_settings.getSettingsDict())
                fw_settings.addSource(source)              # add to new
        elif a.add_source:
            cmd.add_sequence(a.add_source, fw_settings.addSource,
                             fw_settings.querySource, None, "'%s'")
        elif a.remove_source:
            cmd.remove_sequence(a.remove_source, fw_settings.removeSource,
                                fw_settings.querySource, None, "'%s'")
        elif a.query_source:
            cmd.query_sequence(a.query_source, fw_settings.querySource,
                               None, "'%s'")

        # rich rules
        if a.list_rich_rules:
            l = fw_settings.getRichRules()
            cmd.print_and_exit("\n".join(l))
        elif a.add_rich_rule:
            cmd.add_sequence(a.add_rich_rule, fw_settings.addRichRule,
                             fw_settings.queryRichRule, None, "'%s'")
        elif a.remove_rich_rule:
            cmd.remove_sequence(a.remove_rich_rule, fw_settings.removeRichRule,
                                fw_settings.queryRichRule, None, "'%s'")
        elif a.query_rich_rule:
            cmd.query_sequence(a.query_rich_rule, fw_settings.queryRichRule,
                               None, "'%s'")

        # service
        if a.list_services:
            l = fw_settings.getServices()
            cmd.print_and_exit(" ".join(sorted(l)))
        elif a.add_service:
            cmd.add_sequence(a.add_service, fw_settings.addService,
                             fw_settings.queryService, None, "'%s'")
        elif a.remove_service_from_zone:
            cmd.remove_sequence(a.remove_service_from_zone,
                                fw_settings.removeService,
                                fw_settings.queryService, None, "'%s'")
        elif a.query_service:
            cmd.query_sequence(a.query_service, fw_settings.queryService,
                               None, "'%s'")

        # port
        elif a.list_ports:
            l = fw_settings.getPorts()
            cmd.print_and_exit(" ".join(["%s/%s" % (port[0], port[1]) for port in sorted(l, key=lambda x: (x[1], getPortRange(x[0])[0]))]))
        elif a.add_port:
            cmd.add_sequence(a.add_port, fw_settings.addPort,
                             fw_settings.queryPort, cmd.parse_port, "%s/%s")
        elif a.remove_port:
            cmd.remove_sequence(a.remove_port, fw_settings.removePort,
                                fw_settings.queryPort, cmd.parse_port, "%s/%s")
        elif a.query_port:
            cmd.query_sequence(a.query_port, fw_settings.queryPort,
                               cmd.parse_port, "%s/%s")

        # protocol
        elif a.list_protocols:
            l = fw_settings.getProtocols()
            cmd.print_and_exit(" ".join(sorted(l)))
        elif a.add_protocol:
            cmd.add_sequence(a.add_protocol, fw_settings.addProtocol,
                             fw_settings.queryProtocol, None, "'%s'")
        elif a.remove_protocol:
            cmd.remove_sequence(a.remove_protocol, fw_settings.removeProtocol,
                                fw_settings.queryProtocol, None, "'%s'")
        elif a.query_protocol:
            cmd.query_sequence(a.query_protocol, fw_settings.queryProtocol,
                               None, "'%s'")

        # source port
        elif a.list_source_ports:
            l = fw_settings.getSourcePorts()
            cmd.print_and_exit(" ".join(["%s/%s" % (port[0], port[1]) for port in sorted(l, key=lambda x: (x[1], getPortRange(x[0])[0]))]))
        elif a.add_source_port:
            cmd.add_sequence(a.add_source_port, fw_settings.addSourcePort,
                             fw_settings.querySourcePort, cmd.parse_port,
                             "%s/%s")
        elif a.remove_source_port:
            cmd.remove_sequence(a.remove_source_port,
                                fw_settings.removeSourcePort,
                                fw_settings.querySourcePort, cmd.parse_port,
                                "%s/%s")
        elif a.query_source_port:
            cmd.query_sequence(a.query_source_port, fw_settings.querySourcePort,
                               cmd.parse_port, "%s/%s")

        # forward
        elif a.add_forward:
            fw_settings.setForward(True)
        elif a.remove_forward:
            fw_settings.setForward(False)
        elif a.query_forward:
            cmd.print_query_result(fw_settings.getForward())

        # masquerade
        elif a.add_masquerade:
            fw_settings.setMasquerade(True)
        elif a.remove_masquerade:
            fw_settings.setMasquerade(False)
        elif a.query_masquerade:
            cmd.print_query_result(fw_settings.getMasquerade())

        # forward port
        elif a.list_forward_ports:
            l = fw_settings.getForwardPorts()
            cmd.print_and_exit("\n".join(["port=%s:proto=%s:toport=%s:toaddr=%s" % (_port, _protocol, _toport, _toaddr) for (_port, _protocol, _toport, _toaddr) in l]))
        elif a.add_forward_port:
            cmd.add_sequence(a.add_forward_port, fw_settings.addForwardPort,
                             fw_settings.queryForwardPort,
                             cmd.parse_forward_port,
                             "port=%s:proto=%s:toport=%s:toaddr=%s")
        elif a.remove_forward_port:
            cmd.remove_sequence(a.remove_forward_port,
                                fw_settings.removeForwardPort,
                                fw_settings.queryForwardPort,
                                cmd.parse_forward_port,
                                "port=%s:proto=%s:toport=%s:toaddr=%s")
        elif a.query_forward_port:
            cmd.query_sequence(a.query_forward_port,
                               fw_settings.queryForwardPort,
                               cmd.parse_forward_port,
                               "port=%s:proto=%s:toport=%s:toaddr=%s")

        # block icmp
        elif a.list_icmp_blocks:
            l = fw_settings.getIcmpBlocks()
            cmd.print_and_exit(" ".join(l))
        elif a.add_icmp_block:
            cmd.add_sequence(a.add_icmp_block, fw_settings.addIcmpBlock,
                             fw_settings.queryIcmpBlock, None, "'%s'")
        elif a.remove_icmp_block:
            cmd.remove_sequence(a.remove_icmp_block,
                                fw_settings.removeIcmpBlock,
                                fw_settings.queryIcmpBlock, None, "'%s'")
        elif a.query_icmp_block:
            cmd.query_sequence(a.query_icmp_block, fw_settings.queryIcmpBlock,
                               None, "'%s'")

        # icmp block inversion
        elif a.add_icmp_block_inversion:
            fw_settings.addIcmpBlockInversion()
        elif a.remove_icmp_block_inversion:
            fw_settings.removeIcmpBlockInversion()
        elif a.query_icmp_block_inversion:
            cmd.print_query_result(fw_settings.queryIcmpBlockInversion())

        # zone target
        elif a.get_target:
            cmd.print_and_exit(fw_settings.getTarget())
        elif a.set_target:
            fw_settings.setTarget(a.set_target)

        # list all zone settings
        elif a.list_all:
            cmd.print_zone_info(zone if zone else fw.get_default_zone(),
                                fw_settings)
            sys.exit(0)

        # list everything
        elif a.list_all_zones:
            zones = fw.config.get_zones()
            for zone in zones:
                fw_zone = fw.config.get_zone(zone)
                fw_settings = FirewallClientZoneSettings(fw.config.get_zone_config_dict(fw_zone))
                cmd.print_zone_info(zone, fw_settings)
                cmd.print_msg("")
            sys.exit(0)

        elif a.set_description:
            fw_settings.setDescription(a.set_description)

        elif a.get_description:
            cmd.print_and_exit(fw_settings.getDescription())

        elif a.set_short:
            fw_settings.setShort(a.set_short)

        elif a.get_short:
            cmd.print_and_exit(fw_settings.getShort())

        fw.config.set_zone_config_dict(fw_zone, fw_settings.getSettingsDict())

        cmd.print_and_exit("success")

except FirewallError as msg:
    cmd.print_and_exit("%s" % msg, msg.code)
except Exception as msg:
    cmd.fail("%s" % msg)
else:
    cmd.print_and_exit("success")

Filemanager

Name Type Size Permission Actions
2to3 File 95 B 0755
ERROR! File 271.55 KB 0755
GET File 15.82 KB 0755
HEAD File 15.82 KB 0755
Mail File 1014.48 KB 0755
NO File 271.55 KB 0755
POST File 15.82 KB 0755
RCUpdate File 4.49 KB 0755
RCdaemon File 327.1 KB 0755
RcLicenseCP File 271.55 KB 0755
[ File 51.81 KB 0755
ab File 81.46 KB 0755
aclocal File 35.52 KB 0755
aclocal-1.16 File 35.52 KB 0755
acyclic File 15.3 KB 0755
addr2line File 27.93 KB 0755
alias File 33 B 0755
animate File 15.27 KB 0755
appstream-compose File 31.47 KB 0755
appstream-util File 116.57 KB 0755
apropos File 48.52 KB 0755
apropos.man-db File 48.52 KB 0755
ar File 56.19 KB 0755
arch File 31.66 KB 0755
aria_chk File 5.51 MB 0755
aria_dump_log File 5.3 MB 0755
aria_ftdump File 5.31 MB 0755
aria_pack File 5.34 MB 0755
aria_read_log File 5.46 MB 0755
arpaname File 15.3 KB 0755
arping File 27.42 KB 0755
as File 710.51 KB 0755
aserver File 39.66 KB 0755
aspell File 151.12 KB 0755
at File 56.62 KB 0755
atq File 56.62 KB 0755
atrm File 56.62 KB 0755
attr File 15.72 KB 0755
audit2allow File 14.71 KB 0755
audit2why File 14.71 KB 0755
aulast File 19.39 KB 0755
aulastlog File 15.34 KB 0755
ausyscall File 15.32 KB 0755
authselect File 43.68 KB 0755
autoconf File 14.42 KB 0755
autoheader File 8.33 KB 0755
autom4te File 31.43 KB 0755
automake File 251.93 KB 0755
automake-1.16 File 251.93 KB 0755
autopoint File 26.36 KB 0755
autoreconf File 20.57 KB 0755
autoscan File 16.72 KB 0755
autoupdate File 33.08 KB 0755
auvirt File 35.49 KB 0755
awk File 698.17 KB 0755
b2sum File 51.8 KB 0755
base32 File 35.7 KB 0755
base64 File 35.7 KB 0755
basename File 35.68 KB 0755
basenc File 48.02 KB 0755
bash File 1.32 MB 0755
bashbug File 6.91 KB 0755
bashbug-64 File 6.91 KB 0755
batch File 140 B 0755
bcomps File 23.37 KB 0755
bg File 30 B 0755
bison File 494.76 KB 0755
bond2team File 22.75 KB 0755
bootctl File 100.71 KB 0755
brotli File 753.47 KB 0755
bsqldb File 35.47 KB 0755
bsqlodbc File 31.37 KB 0755
bunzip2 File 40.1 KB 0755
busctl File 100.33 KB 0755
bwrap File 72.32 KB 0755
bzcat File 40.1 KB 0755
bzcmp File 2.09 KB 0755
bzdiff File 2.09 KB 0755
bzegrep File 2.01 KB 0755
bzfgrep File 2.01 KB 0755
bzgrep File 2.01 KB 0755
bzip2 File 40.1 KB 0755
bzip2recover File 15.89 KB 0755
bzless File 1.23 KB 0755
bzmore File 1.23 KB 0755
c++ File 1.04 MB 0755
c++filt File 27.38 KB 0755
c89 File 228 B 0755
c99 File 219 B 0755
ca-legacy File 1.61 KB 0755
cal File 52.02 KB 0755
canberra-boot File 19.07 KB 0755
canberra-gtk-play File 19.18 KB 0755
captoinfo File 87.8 KB 0755
cat File 35.66 KB 0755
catchsegv File 3.21 KB 0755
catman File 35.86 KB 0755
cc File 1.04 MB 0755
ccomps File 27.47 KB 0755
cd File 30 B 0755
centrino-decode File 14.13 KB 0755
chacl File 19.14 KB 0755
chage File 72.14 KB 4755
chattr File 15.19 KB 0755
chcat File 13.63 KB 0755
chcon File 60.24 KB 0755
checkmodule File 450.88 KB 0755
checkpolicy File 527.52 KB 0755
chfn File 31.48 KB 0711
chgrp File 56.17 KB 0755
chmem File 35.59 KB 0755
chmod File 56.19 KB 0755
choom File 23.48 KB 0755
chown File 60.2 KB 0755
chronyc File 100.83 KB 0755
chrt File 27.49 KB 0755
chsh File 23.41 KB 0711
chvt File 15.37 KB 0755
cifsiostat File 23.55 KB 0755
circo File 15.23 KB 0755
cksum File 35.58 KB 0755
cl-linksafe-apply-group File 558 B 0755
cl-linksafe-reconfigure File 4.83 KB 0755
clear File 15.15 KB 0755
clockdiff File 23.38 KB 0755
cluster File 47.7 KB 0755
cmp File 40.13 KB 0755
col File 23.43 KB 0755
colcrt File 15.39 KB 0755
colrm File 15.38 KB 0755
column File 35.53 KB 0755
comm File 35.77 KB 0755
command File 35 B 0755
compare File 15.27 KB 0755
compile_et File 1.31 KB 0755
composite File 15.27 KB 0755
config_data File 6.97 KB 0755
conjure File 15.27 KB 0755
convert File 15.27 KB 0755
coredumpctl File 60.03 KB 0755
corelist File 14.92 KB 0755
cp File 149.23 KB 0755
cpan File 8.06 KB 0755
cpan-mirrors File 4.19 KB 0755
cpansign File 1.98 KB 0755
cpapi1 File 3.15 MB 0755
cpapi2 File 3.15 MB 0755
cpapi3 File 3.15 MB 0755
cpio File 145.52 KB 0755
cpp File 1.04 MB 0755
cpupower File 79.92 KB 0755
crb File 2.29 KB 0744
crc32 File 1.02 KB 0755
cronnext File 39.93 KB 0755
crontab File 55.96 KB 4755
csplit File 108.88 KB 0755
curl File 248.67 KB 0755
curl-config File 4.93 KB 0755
cut File 47.82 KB 0755
cvtsudoers File 233.48 KB 0755
cxpm File 27.41 KB 0755
cyrusbdb2current File 1.58 MB 0755
datacopy File 31.43 KB 0755
date File 104.05 KB 0755
dbilogstrip File 1.35 KB 0755
dbiprof File 6.06 KB 0755
dbus-broker File 232 KB 0755
dbus-broker-launch File 130.02 KB 0755
dbus-monitor File 27.27 KB 0755
dbus-send File 27.22 KB 0755
dbus-update-activation-environment File 15.17 KB 0755
dbus-uuidgen File 15.14 KB 0755
dconf File 64.71 KB 0755
dd File 68.14 KB 0755
deallocvt File 15.38 KB 0755
debuginfo-install File 3.6 KB 0755
debuginfod-find File 19.44 KB 0755
defncopy File 31.43 KB 0755
delv File 45.58 KB 0755
df File 84.74 KB 0755
diff File 194.7 KB 0755
diff3 File 52.3 KB 0755
diffimg File 15.26 KB 0755
dig File 136.79 KB 0755
dijkstra File 19.44 KB 0755
dir File 137.66 KB 0755
dircolors File 39.81 KB 0755
dirmngr File 439.91 KB 0755
dirmngr-client File 56.12 KB 0755
dirname File 31.49 KB 0755
display File 15.27 KB 0755
distro File 953 B 0755
dltest File 15.68 KB 0755
dmesg File 71.98 KB 0755
dnf File 2.04 KB 0755
dnf-3 File 2.04 KB 0755
dnsdomainname File 23.84 KB 0755
dnstap-read File 23.39 KB 0755
domainname File 23.84 KB 0755
dot File 15.23 KB 0755
dot2gxl File 39.93 KB 0755
dotty File 2.04 KB 0755
doveadm File 826.66 KB 0755
doveconf File 220.09 KB 0755
dovecot-sysreport File 5.8 KB 0755
dpkg File 316.64 KB 0755
dpkg-deb File 149.83 KB 0755
dpkg-divert File 125.9 KB 0755
dpkg-maintscript-helper File 20.71 KB 0755
dpkg-query File 142.3 KB 0755
dpkg-realpath File 31.8 KB 0755
dpkg-split File 104.9 KB 0755
dpkg-statoverride File 52.16 KB 0755
dpkg-trigger File 44.23 KB 0755
dracut File 97.54 KB 0755
dsync File 826.66 KB 0755
dtrace File 17.38 KB 0755
du File 149.45 KB 0755
dumpkeys File 164.06 KB 0755
dwp File 851.8 KB 0755
dwz File 216.88 KB 0755
ea-php81 File 10.8 MB 0755
ea-php81-pear File 383 B 0755
ea-php81-pecl File 299 B 0755
ea-php82 File 10.88 MB 0755
ea-php82-pear File 383 B 0755
ea-php82-pecl File 299 B 0755
ea-php83 File 10.92 MB 0755
ea-php83-pear File 383 B 0755
ea-php83-pecl File 299 B 0755
echo File 35.48 KB 0755
ed File 52.51 KB 0755
edgepaint File 2.46 MB 0755
egrep File 32 B 0755
eject File 43.8 KB 0755
elfedit File 36.02 KB 0755
enc2xs File 40.69 KB 0755
encguess File 2.92 KB 0755
enchant-2 File 23.82 KB 0755
enchant-lsmod-2 File 15.82 KB 0755
env File 44.23 KB 0755
envml File 4.11 KB 0755
envsubst File 35.39 KB 0755
eps2eps File 643 B 0755
eqn File 189.52 KB 0755
event_rpcgen.py File 53.65 KB 0755
evmctl File 65.7 KB 0755
ex File 1.39 MB 0755
exempi File 28.18 KB 0755
exiv2 File 199.82 KB 0755
expand File 39.74 KB 0755
expr File 108.6 KB 0755
factor File 72.05 KB 0755
fallocate File 23.39 KB 0755
false File 27.48 KB 0755
fc File 30 B 0755
fc-cache File 139 B 0755
fc-cache-64 File 23.17 KB 0755
fc-cat File 19.16 KB 0755
fc-conflist File 15.13 KB 0755
fc-list File 15.13 KB 0755
fc-match File 15.13 KB 0755
fc-pattern File 15.14 KB 0755
fc-query File 15.13 KB 0755
fc-scan File 15.14 KB 0755
fc-validate File 15.14 KB 0755
fdp File 15.23 KB 0755
fg File 30 B 0755
fgconsole File 15.37 KB 0755
fgrep File 32 B 0755
filan File 47.84 KB 0755
file File 27.74 KB 0755
fincore File 23.49 KB 0755
find File 284.95 KB 0755
find-repos-of-install File 3.6 KB 0755
findmnt File 64.93 KB 0755
fips-finish-install File 1.72 KB 0755
fips-mode-setup File 8.02 KB 0755
firewall-cmd File 140.16 KB 0755
firewall-offline-cmd File 121.05 KB 0755
fisql File 35.47 KB 0755
flatpak File 1.75 MB 0755
flatpak-bisect File 7.66 KB 0755
flatpak-coredumpctl File 3.35 KB 0755
flex File 412.64 KB 0755
flex++ File 412.64 KB 0755
flock File 23.56 KB 0755
fmt File 39.77 KB 0755
fold File 39.72 KB 0755
free File 23.36 KB 0755
freebcp File 23.38 KB 0755
freetype-config File 4.32 KB 0755
fribidi File 28.59 KB 0755
ftp File 100.66 KB 0755
funzip File 31.44 KB 0755
fuse2fs File 72.69 KB 0755
fusermount File 35.54 KB 4755
g++ File 1.04 MB 0755
g13 File 110.29 KB 0755
galera_new_cluster File 921 B 0755
galera_recovery File 3.29 KB 0755
gapplication File 23.39 KB 0755
garb-systemd File 1.2 KB 0755
garbd File 2.39 MB 0755
gawk File 698.17 KB 0755
gc File 19.39 KB 0755
gcc File 1.04 MB 0755
gcc-ar File 27.82 KB 0755
gcc-nm File 27.8 KB 0755
gcc-ranlib File 27.82 KB 0755
gcov File 469.12 KB 0755
gcov-dump File 283.73 KB 0755
gcov-tool File 312.44 KB 0755
gdbm_dump File 28.22 KB 0755
gdbm_load File 36.48 KB 0755
gdbmtool File 149.26 KB 0755
gdbus File 51.68 KB 0755
gdbus-codegen File 1.99 KB 0755
gdk-pixbuf-query-loaders-64 File 15.34 KB 0755
gdk-pixbuf-thumbnailer File 19.32 KB 0755
gencat File 27.64 KB 0755
genl-ctrl-list File 15.3 KB 0755
geqn File 189.52 KB 0755
getconf File 35.41 KB 0755
getent File 36.03 KB 0755
getfacl File 31.8 KB 0755
getfattr File 24.35 KB 0755
getkeycodes File 15.36 KB 0755
getopt File 23.46 KB 0755
getopts File 35 B 0755
gettext File 35.35 KB 0755
gettext.sh File 5.07 KB 0755
gettextize File 41.25 KB 0755
ghostscript File 15.31 KB 0755
gio File 91.99 KB 0755
gio-querymodules-64 File 15.3 KB 0755
git File 22.87 MB 0755
git-receive-pack File 22.87 MB 0755
git-shell File 6.31 MB 0755
git-upload-archive File 22.87 MB 0755
git-upload-pack File 22.87 MB 0755
glib-compile-resources File 43.52 KB 0755
glib-compile-schemas File 51.65 KB 0755
glib-genmarshal File 40.14 KB 0755
glib-gettextize File 5.26 KB 0755
glib-mkenums File 30.08 KB 0755
gmake File 249.8 KB 0755
gml2gv File 47.78 KB 0755
gneqn File 916 B 0755
gnroff File 3.21 KB 0755
gobject-query File 15.35 KB 0755
gpasswd File 76.35 KB 4755
gpg File 1.07 MB 0755
gpg-agent File 342.25 KB 0755
gpg-card File 170.13 KB 0755
gpg-connect-agent File 84.75 KB 0755
gpg-error File 36.1 KB 0755
gpg-error-config File 1.98 KB 0755
gpg-wks-client File 129.55 KB 0755
gpg-wks-server File 113.33 KB 0755
gpg2 File 1.07 MB 0755
gpgconf File 100.99 KB 0755
gpgme-json File 84.63 KB 0755
gpgparsemail File 35.33 KB 0755
gpgrt-config File 13.13 KB 0755
gpgsplit File 27.49 KB 0755
gpgtar File 64.87 KB 0755
gpgv File 295.42 KB 0755
gpgv2 File 295.42 KB 0755
gpic File 201.72 KB 0755
gpio-event-mon File 18.13 KB 0755
gpio-hammer File 14.12 KB 0755
gpio-watch File 14.12 KB 0755
gprof File 101.66 KB 0755
gr2fonttest File 28 KB 0755
graphml2gv File 23.55 KB 0755
grep File 154.49 KB 0755
gresource File 23.46 KB 0755
groff File 96.77 KB 0755
grops File 167.26 KB 0755
grotty File 122.2 KB 0755
groups File 35.68 KB 0755
grub2-editenv File 463.6 KB 0755
grub2-file File 1.08 MB 0755
grub2-menulst2cfg File 269.65 KB 0755
grub2-mkimage File 438.44 KB 0755
grub2-mkpasswd-pbkdf2 File 294.98 KB 0755
grub2-mkrelpath File 282.31 KB 0755
grub2-mount File 1018.09 KB 0755
grub2-script-check File 315.09 KB 0755
gs File 15.31 KB 0755
gsbj File 354 B 0755
gsdj File 356 B 0755
gsdj500 File 356 B 0755
gsettings File 31.56 KB 0755
gsf-office-thumbnailer File 20.07 KB 0755
gslj File 357 B 0755
gslp File 354 B 0755
gsnd File 281 B 0755
gsoelim File 32.18 KB 0755
gst-inspect-1.0 File 71.59 KB 0755
gst-launch-1.0 File 39.3 KB 0755
gst-stats-1.0 File 35.45 KB 0755
gst-typefind-1.0 File 19.17 KB 0755
gtar File 514.27 KB 0755
gtbl File 130.86 KB 0755
gtester File 31.47 KB 0755
gtester-report File 18.64 KB 0755
gtk-launch File 19.48 KB 0755
gtk-query-immodules-2.0-64 File 19.17 KB 0755
gtk-query-immodules-3.0-64 File 23.47 KB 0755
gtk-update-icon-cache File 40.02 KB 0755
gtroff File 732.07 KB 0755
gunzip File 2.29 KB 0755
gv2gml File 23.41 KB 0755
gv2gxl File 39.93 KB 0755
gvcolor File 49.59 KB 0755
gvgen File 23.41 KB 0755
gvmap File 2.75 MB 0755
gvmap.sh File 2.14 KB 0755
gvpack File 398.14 KB 0755
gvpr File 15.2 KB 0755
gxl2dot File 39.93 KB 0755
gxl2gv File 39.93 KB 0755
gzexe File 6.3 KB 0755
gzip File 89.63 KB 0755
h2ph File 28.69 KB 0755
h2xs File 59.5 KB 0755
hardlink File 35.63 KB 0755
hash File 32 B 0755
hb-ot-shape-closure File 43.66 KB 0755
hb-shape File 47.91 KB 0755
hb-subset File 39.66 KB 0755
hb-view File 64.01 KB 0755
head File 43.8 KB 0755
hexdump File 51.6 KB 0755
host File 108.77 KB 0755
hostid File 31.67 KB 0755
hostname File 23.84 KB 0755
hostnamectl File 31.67 KB 0755
htdbm File 38.53 KB 0755
htdigest File 25.71 KB 0755
htpasswd File 38.66 KB 0755
httxt2dbm File 24.73 KB 0755
hunspell File 102.67 KB 0755
i386 File 27.67 KB 0755
iconv File 64.38 KB 0755
icu-config File 205 B 0755
icu-config-64 File 21.67 KB 0755
icuinfo File 16.07 KB 0755
id File 39.72 KB 0755
identify File 15.27 KB 0755
idiag-socket-details File 15.34 KB 0755
idn File 36.46 KB 0755
ifnames File 4.03 KB 0755
iio_event_monitor File 30.13 KB 0755
iio_generic_buffer File 34.14 KB 0755
ima-add-sigs File 2.49 KB 0755
ima-setup File 3.59 KB 0755
import File 15.27 KB 0755
imunify-antivirus File 1 KB 0755
imunify-service File 1020 B 0755
imunify360-agent File 1 KB 0755
imunify360-command-wrapper File 8.4 KB 0755
info File 312.73 KB 0755
infocmp File 63.68 KB 0755
infotocap File 87.8 KB 0755
innochecksum File 4.57 MB 0755
install File 149.29 KB 0755
instmodsh File 4.1 KB 0755
intel-speed-select File 112.66 KB 0755
ionice File 15.41 KB 0755
iostat File 55.86 KB 0755
ipcmk File 23.49 KB 0755
ipcrm File 19.42 KB 0755
ipcs File 39.54 KB 0755
iptc File 29.3 KB 0755
irqtop File 35.47 KB 0755
isosize File 15.34 KB 0755
ispell File 992 B 0755
isql File 40.01 KB 0755
iusql File 31.95 KB 0755
jobs File 32 B 0755
join File 51.88 KB 0755
journalctl File 88.27 KB 0755
jq File 31.38 KB 0755
json_pp File 4.78 KB 0755
json_reformat File 19.34 KB 0755
json_verify File 15.12 KB 0755
json_xs File 6.85 KB 0755
kbd_mode File 15.7 KB 0755
kbdinfo File 19.39 KB 0755
kbdrate File 19.4 KB 0755
kdumpctl File 47.16 KB 0755
kernel-install File 13.24 KB 0755
keyctl File 64.02 KB 0755
kill File 31.48 KB 0755
killall File 32.95 KB 0755
kmod File 165.76 KB 0755
krb5-config File 6.59 KB 0755
kvm_stat File 62.92 KB 0755
last File 35.49 KB 0755
lastb File 35.49 KB 0755
lastlog File 28.8 KB 0755
lchfn File 23.32 KB 0755
lchsh File 23.32 KB 0755
ld File 1.7 MB 0755
ld.bfd File 1.7 MB 0755
ld.gold File 2.03 MB 0755
ld.so File 871.77 KB 0755
ldd File 5.32 KB 0755
lefty File 300.45 KB 0755
less File 197.9 KB 0755
lessecho File 15.37 KB 0755
lesskey File 24.8 KB 0755
lesspipe.sh File 3.5 KB 0755
lex File 412.64 KB 0755
lexgrog File 88.19 KB 0755
libnetcfg File 15.41 KB 0755
libpng-config File 2.38 KB 0755
libpng16-config File 2.38 KB 0755
libtool File 359.18 KB 0755
libtoolize File 126.17 KB 0755
libwmf-fontmap File 13.03 KB 0755
link File 31.67 KB 0755
linux-boot-prober File 5.86 KB 0755
linux32 File 27.67 KB 0755
linux64 File 27.67 KB 0755
ln File 60.17 KB 0755
lneato File 1.51 KB 0755
loadkeys File 200.55 KB 0755
loadunimap File 31.63 KB 0755
locale File 59.34 KB 0755
localectl File 31.63 KB 0755
localedef File 314.54 KB 0755
logger File 36.17 KB 0755
login File 43.64 KB 0755
loginctl File 68.13 KB 0755
logname File 31.67 KB 0755
logresolve File 25.06 KB 0755
look File 19.37 KB 0755
ls File 137.65 KB 0755
lsattr File 15.18 KB 0755
lsblk File 124.58 KB 0755
lscpu File 108.44 KB 0755
lsgpio File 14.3 KB 0755
lsiio File 22.14 KB 0755
lsinitrd File 11.85 KB 0755
lsipc File 51.7 KB 0755
lsirq File 23.44 KB 0755
lslocks File 31.78 KB 0755
lslogins File 51.7 KB 0755
lsmem File 35.73 KB 0755
lsns File 39.52 KB 0755
lsof File 175.06 KB 0755
lsphp File 937 B 0755
lsscsi File 89.44 KB 0755
lto-dump File 26.58 MB 0755
lua File 23.23 KB 0755
luac File 157.69 KB 0755
lwp-download File 10.05 KB 0755
lwp-dump File 2.65 KB 0755
lwp-mirror File 2.36 KB 0755
lwp-request File 15.82 KB 0755
lwsCP File 271.55 KB 0755
m4 File 240.4 KB 0755
mail File 1014.48 KB 0755
mailx File 1014.48 KB 0755
mailx.s-nail File 1014.48 KB 0755
make File 249.8 KB 0755
make-dummy-cert File 614 B 0755
man File 114.91 KB 0755
man-recode File 28.01 KB 0755
man.man-db File 114.91 KB 0755
mandb File 133.01 KB 0755
manpath File 31.82 KB 0755
mapscrn File 31.58 KB 0755
mariadb File 5.07 MB 0755
mariadb-access File 109.34 KB 0755
mariadb-admin File 4.85 MB 0755
mariadb-binlog File 5.13 MB 0755
mariadb-check File 4.84 MB 0755
mariadb-config File 15.79 KB 0755
mariadb-conv File 4.56 MB 0755
mariadb-convert-table-format File 4.12 KB 0755
mariadb-dump File 4.93 MB 0755
mariadb-dumpslow File 8.05 KB 0755
mariadb-embedded File 24.19 MB 0755
mariadb-find-rows File 3.21 KB 0755
mariadb-fix-extensions File 1.22 KB 0755
mariadb-hotcopy File 34.52 KB 0755
mariadb-import File 4.84 MB 0755
mariadb-install-db File 22.11 KB 0755
mariadb-plugin File 4.53 MB 0755
mariadb-secure-installation File 13.49 KB 0755
mariadb-service-convert File 2.45 KB 0755
mariadb-setpermission File 17.56 KB 0755
mariadb-show File 4.83 MB 0755
mariadb-slap File 4.85 MB 0755
mariadb-tzinfo-to-sql File 4.53 MB 0755
mariadb-upgrade File 4.97 MB 0755
mariadb-waitpid File 4.52 MB 0755
mariadb_config File 15.79 KB 0755
mariadbd-multi File 26.71 KB 0755
mariadbd-safe File 30.43 KB 0755
mariadbd-safe-helper File 4.5 MB 0755
mcookie File 27.51 KB 0755
md5sum File 39.65 KB 0755
mdb_copy File 15.7 KB 0755
mdb_dump File 15.84 KB 0755
mdb_load File 23.84 KB 0755
mdb_stat File 15.8 KB 0755
mdig File 51.5 KB 0755
mesg File 15.34 KB 0755
mkdir File 68.31 KB 0755
mkfifo File 39.83 KB 0755
mkfontdir File 69 B 0755
mkfontscale File 44.77 KB 0755
mknod File 43.88 KB 0755
mktemp File 39.81 KB 0755
mm2gv File 39.45 KB 0755
mmdblookup File 27.72 KB 0755
modulecmd File 654.01 KB 0755
modulemd-validator File 28.39 KB 0755
mogrify File 15.27 KB 0755
montage File 15.27 KB 0755
more File 43.63 KB 0755
mount File 47.54 KB 0755
mountpoint File 19.38 KB 0755
mpstat File 51.79 KB 0755
msgattrib File 27.17 KB 0755
msgcat File 27.14 KB 0755
msgcmp File 27.27 KB 0755
msgcomm File 27.16 KB 0755
msgconv File 23.15 KB 0755
msgen File 23.15 KB 0755
msgexec File 23.15 KB 0755
msgfilter File 35.31 KB 0755
msgfmt File 84.09 KB 0755
msgfmt.py File 7.41 KB 0755
msgfmt3.9.py File 7.41 KB 0755
msgfmt3.py File 7.41 KB 0755
msggrep File 116.41 KB 0755
msginit File 67.44 KB 0755
msgmerge File 75.48 KB 0755
msgunfmt File 35.33 KB 0755
msguniq File 23.15 KB 0755
msql2mysql File 1.42 KB 0755
mv File 141.17 KB 0755
my_print_defaults File 4.53 MB 0755
myisam_ftdump File 4.86 MB 0755
myisamchk File 4.98 MB 0755
myisamlog File 4.84 MB 0755
myisampack File 4.89 MB 0755
mysql File 5.07 MB 0755
mysql_config File 4.57 KB 0755
mysql_embedded File 24.19 MB 0755
mysql_find_rows File 3.21 KB 0755
mysql_fix_extensions File 1.22 KB 0755
mysql_install_db File 22.11 KB 0755
mysql_plugin File 4.53 MB 0755
mysql_tzinfo_to_sql File 4.53 MB 0755
mysql_upgrade File 4.97 MB 0755
mysql_waitpid File 4.52 MB 0755
mysqlaccess File 109.34 KB 0755
mysqladmin File 4.85 MB 0755
mysqlbinlog File 5.13 MB 0755
mysqlcheck File 4.84 MB 0755
mysqld_multi File 26.71 KB 0755
mysqld_safe File 30.43 KB 0755
mysqld_safe_helper File 4.5 MB 0755
mysqldump File 4.93 MB 0755
mysqlimport File 4.84 MB 0755
mysqlshow File 4.83 MB 0755
mysqlslap File 4.85 MB 0755
mytop File 71.95 KB 0755
nail File 1014.48 KB 0755
named-rrchecker File 23.34 KB 0755
namei File 23.42 KB 0755
nano File 346.22 KB 0755
nc File 52.02 KB 0755
ncurses6-config File 8.13 KB 0755
ncursesw6-config File 8.13 KB 0755
ndptool File 27.42 KB 0755
neato File 15.23 KB 0755
needs-restarting File 3.6 KB 0755
neqn File 916 B 0755
netcat File 52.02 KB 0755
netstat File 156.85 KB 0755
newgidmap File 42.13 KB 0755
newgrp File 40.94 KB 4755
newuidmap File 38.1 KB 0755
nf-ct-add File 15.72 KB 0755
nf-ct-events File 15.16 KB 0755
nf-ct-list File 15.74 KB 0755
nf-exp-add File 20.13 KB 0755
nf-exp-delete File 15.91 KB 0755
nf-exp-list File 15.75 KB 0755
nf-log File 15.14 KB 0755
nf-monitor File 15.15 KB 0755
nf-queue File 15.14 KB 0755
ngettext File 35.34 KB 0755
nice File 35.68 KB 0755
nisdomainname File 23.84 KB 0755
nl File 100.7 KB 0755
nl-addr-add File 15.59 KB 0755
nl-addr-delete File 15.64 KB 0755
nl-addr-list File 19.66 KB 0755
nl-class-add File 15.58 KB 0755
nl-class-delete File 15.48 KB 0755
nl-class-list File 15.46 KB 0755
nl-classid-lookup File 15.33 KB 0755
nl-cls-add File 19.63 KB 0755
nl-cls-delete File 15.55 KB 0755
nl-cls-list File 15.51 KB 0755
nl-fib-lookup File 15.35 KB 0755
nl-link-enslave File 15.11 KB 0755
nl-link-ifindex2name File 15.11 KB 0755
nl-link-list File 15.5 KB 0755
nl-link-name2ifindex File 15.11 KB 0755
nl-link-release File 15.12 KB 0755
nl-link-set File 15.56 KB 0755
nl-link-stats File 15.36 KB 0755
nl-list-caches File 15.12 KB 0755
nl-list-sockets File 15.11 KB 0755
nl-monitor File 15.3 KB 0755
nl-neigh-add File 15.48 KB 0755
nl-neigh-delete File 15.52 KB 0755
nl-neigh-list File 15.44 KB 0755
nl-neightbl-list File 15.27 KB 0755
nl-nh-list File 15.3 KB 0755
nl-pktloc-lookup File 15.36 KB 0755
nl-qdisc-add File 15.52 KB 0755
nl-qdisc-delete File 15.48 KB 0755
nl-qdisc-list File 19.51 KB 0755
nl-route-add File 19.66 KB 0755
nl-route-delete File 19.74 KB 0755
nl-route-get File 15.14 KB 0755
nl-route-list File 15.69 KB 0755
nl-rule-list File 15.3 KB 0755
nl-tctree-list File 15.42 KB 0755
nl-util-addr File 15.11 KB 0755
nm File 44.91 KB 0755
nm-online File 23.55 KB 0755
nmcli File 1.01 MB 0755
nmtui File 821.41 KB 0755
nmtui-connect File 821.41 KB 0755
nmtui-edit File 821.41 KB 0755
nmtui-hostname File 821.41 KB 0755
nohup File 35.59 KB 0755
nop File 15.33 KB 0755
notify-send File 19.75 KB 0755
nproc File 35.7 KB 0755
nroff File 3.21 KB 0755
nsenter File 27.66 KB 0755
nslookup File 112.73 KB 0755
nsupdate File 71.99 KB 0755
numfmt File 55.83 KB 0755
objcopy File 185.56 KB 0755
objdump File 413.3 KB 0755
od File 64.07 KB 0755
odbc_config File 15.7 KB 0755
odbcinst File 23.9 KB 0755
openssl File 1.01 MB 0755
openvt File 23.75 KB 0755
orc-bugreport File 23.31 KB 0755
os-prober File 5.78 KB 0755
osage File 15.23 KB 0755
osinfo-db-export File 27.35 KB 0755
osinfo-db-import File 27.3 KB 0755
osinfo-db-path File 15.3 KB 0755
osinfo-db-validate File 23.4 KB 0755
osinfo-detect File 27.4 KB 0755
osinfo-install-script File 31.77 KB 0755
osinfo-query File 32.19 KB 0755
osql File 9.48 KB 0755
p11-kit File 188.31 KB 0755
package-cleanup File 3.6 KB 0755
page_owner_sort File 26.13 KB 0755
pango-list File 19.11 KB 0755
pango-segmentation File 19.13 KB 0755
pango-view File 60.17 KB 0755
paperconf File 15.8 KB 0755
passwd File 31.89 KB 4755
paste File 35.59 KB 0755
patch File 195.02 KB 0755
patchwork File 15.23 KB 0755
pathchk File 35.66 KB 0755
pathfix.py File 6.63 KB 0755
pathfix3.9.py File 6.63 KB 0755
pcre-config File 2.09 KB 0755
pcre2-config File 1.91 KB 0755
pdf2dsc File 701 B 0755
pdf2ps File 913 B 0755
pdns_control File 484.45 KB 0755
pdnsutil File 4.84 MB 0755
peekfd File 15.8 KB 0755
perl File 15.25 KB 0755
perl5.32.1 File 15.25 KB 0755
perlbug File 43.81 KB 0755
perldoc File 118 B 0755
perlivp File 10.56 KB 0755
perlml File 14.18 KB 0755
perlthanks File 43.81 KB 0755
perror File 4.72 MB 0755
pf2afm File 502 B 0755
pfbtopfa File 520 B 0755
pftp File 100.66 KB 0755
pgrep File 31.42 KB 0755
php File 937 B 0755
pic File 201.72 KB 0755
piconv File 8.08 KB 0755
pidof File 23.33 KB 0755
pidstat File 51.8 KB 0755
pidwait File 31.42 KB 0755
pigz File 129.81 KB 0755
ping File 76.66 KB 0755
pinky File 35.62 KB 0755
pip File 648 B 0755
pip-3 File 648 B 0755
pip-3.9 File 648 B 0755
pip3 File 648 B 0755
pip3.9 File 648 B 0755
pipewire File 15.14 KB 0755
pipewire-aes67 File 15.14 KB 0755
pipewire-avb File 15.14 KB 0755
pipewire-pulse File 15.14 KB 0755
pipewire-vulkan File 15.14 KB 0755
pkaction File 19.37 KB 0755
pkcheck File 23.37 KB 0755
pkexec File 31.38 KB 4755
pkg-config File 335 B 0755
pkgconf File 45.36 KB 0755
pkill File 31.42 KB 0755
pkla-admin-identities File 23.96 KB 0755
pkla-check-authorization File 36.1 KB 0755
pkttyagent File 23.36 KB 0755
pl2pm File 4.43 KB 0755
pldd File 23.57 KB 0755
plesk_configure File 346 B 0755
pmap File 35.39 KB 0755
png-fix-itxt File 15.69 KB 0755
pngfix File 60.23 KB 0755
pod2html File 4.04 KB 0755
pod2man File 14.68 KB 0755
pod2text File 10.55 KB 0755
pod2usage File 4.01 KB 0755
podchecker File 3.57 KB 0755
post-grohtml File 199.76 KB 0755
powernow-k8-decode File 14.13 KB 0755
pphs File 408 B 0755
pr File 72.3 KB 0755
pre-grohtml File 92.92 KB 0755
precat File 5.53 KB 0755
preconv File 56.27 KB 0755
preunzip File 5.53 KB 0755
prezip File 5.53 KB 0755
prezip-bin File 15.69 KB 0755
printafm File 399 B 0755
printenv File 31.48 KB 0755
printf File 51.78 KB 0755
prlimit File 27.95 KB 0755
procan File 35.62 KB 0755
protoc File 24.01 KB 0755
protoc-c File 158.2 KB 0755
protoc-gen-c File 158.2 KB 0755
prove File 13.24 KB 0755
prtstat File 23.84 KB 0755
prune File 15.41 KB 0755
ps File 141.15 KB 0755
ps2ascii File 635 B 0755
ps2epsi File 1.24 KB 0755
ps2pdf File 276 B 0755
ps2pdf12 File 219 B 0755
ps2pdf13 File 219 B 0755
ps2pdf14 File 219 B 0755
ps2pdfwr File 1.06 KB 0755
ps2ps File 651 B 0755
ps2ps2 File 673 B 0755
psfaddtable File 31.45 KB 0755
psfgettable File 31.45 KB 0755
psfstriptable File 31.45 KB 0755
psfxtable File 31.45 KB 0755
pslog File 15.7 KB 0755
pstree File 36.9 KB 0755
pstree.x11 File 36.9 KB 0755
ptar File 3.39 KB 0755
ptardiff File 2.49 KB 0755
ptargrep File 4.2 KB 0755
ptx File 129.04 KB 0755
pv File 65.35 KB 0755
pw-jack File 1.32 KB 0755
pwd File 35.7 KB 0755
pwdx File 15.28 KB 0755
pwmake File 15.7 KB 0755
pwscore File 15.7 KB 0755
pydoc File 78 B 0755
pydoc3 File 78 B 0755
pydoc3.9 File 78 B 0755
pygettext.py File 21.03 KB 0755
pygettext3.9.py File 21.03 KB 0755
pygettext3.py File 21.03 KB 0755
python File 15.27 KB 0755
python-config File 61 B 0755
python3 File 15.27 KB 0755
python3-config File 61 B 0755
python3.9 File 15.27 KB 0755
python3.9-config File 61 B 0755
python3.9-x86_64-config File 3.54 KB 0755
qemu-ga File 1.81 MB 0755
quota File 81.7 KB 4755
quotasync File 64.88 KB 0755
ranlib File 56.2 KB 0755
re2c File 654.16 KB 0755
re2go File 654.16 KB 0755
read File 32 B 0755
readelf File 667.48 KB 0755
readlink File 39.7 KB 0755
realpath File 39.77 KB 0755
recode-sr-latin File 15.13 KB 0755
red File 92 B 0755
rename File 23.42 KB 0755
renew-dummy-cert File 729 B 0755
renice File 15.37 KB 0755
replace File 4.5 MB 0755
repo-graph File 3.6 KB 0755
repoclosure File 3.6 KB 0755
repodiff File 3.6 KB 0755
repomanage File 3.6 KB 0755
repoquery File 3.6 KB 0755
reposync File 3.6 KB 0755
repotrack File 3.6 KB 0755
rescan-scsi-bus.sh File 38.09 KB 0755
reset File 27.34 KB 0755
resizecons File 27.57 KB 0755
resolve_stack_dump File 4.53 MB 0755
resolveip File 4.52 MB 0755
rev File 15.36 KB 0755
rm File 60.21 KB 0755
rmdir File 43.62 KB 0755
rnano File 346.22 KB 0755
rpcbind File 59.89 KB 0755
rpcinfo File 35.58 KB 0755
rpm File 23.81 KB 0755
rpm2archive File 23.5 KB 0755
rpm2cpio File 15.29 KB 0755
rpmdb File 19.91 KB 0755
rpmkeys File 15.77 KB 0755
rpmquery File 23.81 KB 0755
rpmverify File 23.81 KB 0755
rsync File 554.87 KB 0755
rsync-ssl File 4.82 KB 0755
run-parts File 1.94 KB 0755
run-with-aspell File 89 B 0755
runcon File 35.65 KB 0755
rvi File 1.39 MB 0755
rview File 1.39 MB 0755
s-nail File 1014.48 KB 0755
sadf File 459.02 KB 0755
sar File 135.88 KB 0755
sccmap File 23.37 KB 0755
scl File 39.55 KB 0755
scl_enabled File 262 B 0755
scl_source File 1.88 KB 0755
scp File 133.07 KB 0755
script File 51.76 KB 0755
scriptlive File 43.67 KB 0755
scriptreplay File 35.49 KB 0755
scsi-rescan File 38.09 KB 0755
scsi_logging_level File 8.39 KB 0755
scsi_mandat File 3.52 KB 0755
scsi_readcap File 1.3 KB 0755
scsi_ready File 1.1 KB 0755
scsi_satl File 3.74 KB 0755
scsi_start File 1.26 KB 0755
scsi_stop File 1.44 KB 0755
scsi_temperature File 940 B 0755
sdiff File 44.2 KB 0755
secon File 28.37 KB 0755
sed File 114.01 KB 0755
sedismod File 289.02 KB 0755
sedispol File 219.93 KB 0755
semodule_expand File 15.23 KB 0755
semodule_link File 15.25 KB 0755
semodule_package File 19.28 KB 0755
semodule_unpackage File 15.24 KB 0755
seq File 47.8 KB 0755
sestatus File 23.25 KB 0755
setarch File 27.67 KB 0755
setfacl File 39.98 KB 0755
setfattr File 20.16 KB 0755
setfont File 51.82 KB 0755
setkeycodes File 15.41 KB 0755
setleds File 19.46 KB 0755
setmetamode File 15.49 KB 0755
setpriv File 39.55 KB 0755
setsid File 15.35 KB 0755
setterm File 35.52 KB 0755
setup-nsssysinit File 1.51 KB 0755
setup-nsssysinit.sh File 1.51 KB 0755
setvtrgb File 15.45 KB 0755
sfdp File 15.23 KB 0755
sftp File 141.05 KB 0755
sg File 40.94 KB 4755
sg_bg_ctl File 15.93 KB 0755
sg_compare_and_write File 28.35 KB 0755
sg_copy_results File 24.65 KB 0755
sg_dd File 56.04 KB 0755
sg_decode_sense File 16.23 KB 0755
sg_emc_trespass File 15.71 KB 0755
sg_format File 40.9 KB 0755
sg_get_config File 36.75 KB 0755
sg_get_elem_status File 28.22 KB 0755
sg_get_lba_status File 24.38 KB 0755
sg_ident File 16.01 KB 0755
sg_inq File 121.35 KB 0755
sg_logs File 154.06 KB 0755
sg_luns File 24.31 KB 0755
sg_map File 19.84 KB 0755
sg_map26 File 28.31 KB 0755
sg_modes File 47.65 KB 0755
sg_opcodes File 36.61 KB 0755
sg_persist File 37.59 KB 0755
sg_prevent File 15.91 KB 0755
sg_raw File 28.34 KB 0755
sg_rbuf File 24.26 KB 0755
sg_rdac File 15.69 KB 0755
sg_read File 27.84 KB 0755
sg_read_attr File 38.18 KB 0755
sg_read_block_limits File 15.95 KB 0755
sg_read_buffer File 28.93 KB 0755
sg_read_long File 16.12 KB 0755
sg_readcap File 24.31 KB 0755
sg_reassign File 16.07 KB 0755
sg_referrals File 16.09 KB 0755
sg_rep_pip File 15.99 KB 0755
sg_rep_zones File 28.41 KB 0755
sg_requests File 24.17 KB 0755
sg_reset File 16.18 KB 0755
sg_reset_wp File 16.02 KB 0755
sg_rmsn File 15.91 KB 0755
sg_rtpg File 16.01 KB 0755
sg_safte File 24.13 KB 0755
sg_sanitize File 28.43 KB 0755
sg_sat_identify File 20.16 KB 0755
sg_sat_phy_event File 20.44 KB 0755
sg_sat_read_gplog File 20.15 KB 0755
sg_sat_set_features File 20.11 KB 0755
sg_scan File 19.84 KB 0755
sg_seek File 20.3 KB 0755
sg_senddiag File 28.74 KB 0755
sg_ses File 121.71 KB 0755
sg_ses_microcode File 28.91 KB 0755
sg_start File 20.38 KB 0755
sg_stpg File 24.13 KB 0755
sg_stream_ctl File 20.13 KB 0755
sg_sync File 16.08 KB 0755
sg_test_rwbuf File 20.17 KB 0755
sg_timestamp File 24.29 KB 0755
sg_turs File 28.27 KB 0755
sg_unmap File 24.28 KB 0755
sg_verify File 20.33 KB 0755
sg_vpd File 120.15 KB 0755
sg_wr_mode File 24.13 KB 0755
sg_write_buffer File 28.67 KB 0755
sg_write_long File 16.18 KB 0755
sg_write_same File 28.4 KB 0755
sg_write_verify File 28.23 KB 0755
sg_write_x File 61.23 KB 0755
sg_xcopy File 44.02 KB 0755
sg_zone File 20.21 KB 0755
sginfo File 74.25 KB 0755
sgm_dd File 40 KB 0755
sgp_dd File 44.45 KB 0755
sh File 1.32 MB 0755
sha1hmac File 35.27 KB 0755
sha1sum File 39.65 KB 0755
sha224hmac File 35.27 KB 0755
sha224sum File 39.65 KB 0755
sha256hmac File 35.27 KB 0755
sha256sum File 39.65 KB 0755
sha384hmac File 35.27 KB 0755
sha384sum File 39.65 KB 0755
sha512hmac File 35.27 KB 0755
sha512sum File 39.65 KB 0755
shasum File 9.66 KB 0755
showconsolefont File 19.48 KB 0755
showkey File 19.41 KB 0755
shred File 51.88 KB 0755
shuf File 48.02 KB 0755
size File 31.8 KB 0755
skill File 31.4 KB 0755
slabinfo File 42.95 KB 0755
slabtop File 23.42 KB 0755
sleep File 35.66 KB 0755
slencheck File 15.71 KB 0755
sm3hmac File 35.27 KB 0755
snice File 31.4 KB 0755
socat File 387.1 KB 0755
soelim File 32.18 KB 0755
soelim.groff File 32.18 KB 0755
sort File 113.11 KB 0755
sotruss File 4.18 KB 0755
spell File 125 B 0755
splain File 18.96 KB 0755
split File 52.33 KB 0755
sprof File 35.62 KB 0755
sqlite3 File 1.52 MB 0755
ssh File 843.51 KB 0755
ssh-add File 164.85 KB 0755
ssh-agent File 281.02 KB 0755
ssh-copy-id File 12.38 KB 0755
ssh-keygen File 455.02 KB 0755
ssh-keyscan File 197.44 KB 0755
sss_ssh_authorizedkeys File 23.47 KB 0755
sss_ssh_knownhostsproxy File 27.48 KB 0755
stat File 80.07 KB 0755
stdbuf File 43.75 KB 0755
strace File 1.94 MB 0755
strace-log-merge File 1.78 KB 0755
stream File 15.27 KB 0755
streamzip File 7.66 KB 0755
strings File 31.92 KB 0755
strip File 185.55 KB 0755
stty File 75.84 KB 0755
su File 55.79 KB 4750
sudo File 180.96 KB 4111
sudoedit File 180.96 KB 4111
sudoreplay File 84.97 KB 0111
sum File 35.6 KB 0755
sw-engine File 24.39 MB 0755
sxpm File 31.58 KB 0755
sync File 35.55 KB 0755
systemctl File 298.59 KB 0755
systemd-analyze File 201.77 KB 0755
systemd-ask-password File 19.63 KB 0755
systemd-cat File 19.44 KB 0755
systemd-cgls File 23.64 KB 0755
systemd-cgtop File 39.59 KB 0755
systemd-creds File 43.98 KB 0755
systemd-cryptenroll File 72.25 KB 0755
systemd-delta File 27.49 KB 0755
systemd-detect-virt File 19.44 KB 0755
systemd-dissect File 47.96 KB 0755
systemd-escape File 23.44 KB 0755
systemd-firstboot File 56.26 KB 0755
systemd-hwdb File 15.45 KB 0755
systemd-id128 File 27.55 KB 0755
systemd-inhibit File 23.48 KB 0755
systemd-machine-id-setup File 19.73 KB 0755
systemd-mount File 60.2 KB 0755
systemd-notify File 23.48 KB 0755
systemd-path File 19.42 KB 0755
systemd-repart File 169.41 KB 0755
systemd-run File 64.19 KB 0755
systemd-socket-activate File 27.52 KB 0755
systemd-stdio-bridge File 23.44 KB 0755
systemd-sysext File 47.94 KB 0755
systemd-sysusers File 72.53 KB 0755
systemd-tmpfiles File 124.71 KB 0755
systemd-tty-ask-password-agent File 39.55 KB 0755
systemd-umount File 60.2 KB 0755
tabs File 19.16 KB 0755
tac File 104.61 KB 0755
tail File 68.1 KB 0755
tapestat File 27.55 KB 0755
tar File 514.27 KB 0755
taskset File 23.41 KB 0755
tbl File 130.86 KB 0755
tcamgr File 27.88 KB 0755
tcamttest File 27.88 KB 0755
tcatest File 64.32 KB 0755
tcbmgr File 31.84 KB 0755
tcbmttest File 55.92 KB 0755
tcbtest File 72.3 KB 0755
tcfmgr File 27.82 KB 0755
tcfmttest File 39.92 KB 0755
tcftest File 51.91 KB 0755
tchmgr File 27.81 KB 0755
tchmttest File 51.93 KB 0755
tchtest File 64.27 KB 0755
tclsh File 15.69 KB 0755
tclsh8.6 File 15.69 KB 0755
tcptraceroute File 1.55 KB 0755
tctmgr File 35.83 KB 0755
tctmttest File 51.89 KB 0755
tcttest File 63.92 KB 0755
tcucodec File 35.8 KB 0755
tcumttest File 27.87 KB 0755
tcutest File 79.95 KB 0755
tdspool File 253.95 KB 0755
team2bond File 15.76 KB 0755
teamd File 166.59 KB 0755
teamdctl File 37.12 KB 0755
teamnl File 23.26 KB 0755
tee File 35.7 KB 0755
test File 43.8 KB 0755
tic File 87.8 KB 0755
timedatectl File 47.83 KB 0755
timeout File 40.18 KB 0755
tload File 19.34 KB 0755
tmon File 42.48 KB 0755
tmpwatch File 36.03 KB 0755
toe File 23.23 KB 0755
top File 132.27 KB 0755
touch File 92.04 KB 0755
tput File 27.25 KB 0755
tr File 47.87 KB 0755
tracepath File 19.39 KB 0755
traceroute File 77.26 KB 0755
traceroute6 File 77.26 KB 0755
tracker3 File 611.08 KB 0755
tred File 15.35 KB 0755
troff File 732.07 KB 0755
true File 27.48 KB 0755
truncate File 35.66 KB 0755
trust File 221.06 KB 0755
tset File 27.34 KB 0755
tsort File 47.8 KB 0755
tsql File 253.9 KB 0755
tty File 31.66 KB 0755
turbostat File 148.05 KB 0755
twopi File 15.23 KB 0755
type File 32 B 0755
tzselect File 14.99 KB 0755
uapi File 3.15 MB 0755
udevadm File 583.98 KB 0755
ul File 23.45 KB 0755
ulimit File 34 B 0755
ulockmgr_server File 19.4 KB 0755
umask File 33 B 0755
umount File 35.46 KB 0755
unalias File 35 B 0755
uname File 31.66 KB 0755
uname26 File 27.67 KB 0755
unexpand File 39.73 KB 0755
unflatten File 15.37 KB 0755
unicode_start File 2.57 KB 0755
unicode_stop File 367 B 0755
uniq File 43.84 KB 0755
unlink File 31.66 KB 0755
unpigz File 129.81 KB 0755
unshare File 31.75 KB 0755
unxz File 84.94 KB 0755
unzip File 196.15 KB 0755
unzipsfx File 87.91 KB 0755
update-ca-trust File 4.36 KB 0755
update-crypto-policies File 87 B 0755
update-gtk-immodules File 316 B 0755
update-mime-database File 59.87 KB 0755
upower File 23.88 KB 0755
uptime File 15.29 KB 0755
users File 35.69 KB 0755
usleep File 15.31 KB 0755
utmpdump File 23.4 KB 0755
uuidgen File 19.36 KB 0755
uuidparse File 23.41 KB 0755
vdir File 137.66 KB 0755
vi File 691 B 0755
view File 150 B 0755
vimdot File 1.06 KB 0755
vlock File 23.61 KB 0755
vmstat File 39.41 KB 0755
w File 23.37 KB 0755
wait File 32 B 0755
wall File 23.41 KB 0755
watch File 27.87 KB 0755
watchgnupg File 23.2 KB 0755
wc File 43.74 KB 0755
wdctl File 31.52 KB 0755
wget File 521.41 KB 0755
whatis File 48.52 KB 0755
whatis.man-db File 48.52 KB 0755
whereis File 32.04 KB 0755
which File 27.89 KB 0755
whiptail File 31.93 KB 0755
who File 51.77 KB 0755
whoami File 31.66 KB 0755
wireplumber File 31.67 KB 0755
wmf2eps File 19.72 KB 0755
wmf2fig File 19.81 KB 0755
wmf2gd File 15.81 KB 0755
wmf2svg File 19.82 KB 0755
wmf2x File 15.7 KB 0755
word-list-compress File 15.7 KB 0755
wpctl File 59.85 KB 0755
wpexec File 23.7 KB 0755
write File 23.42 KB 0755
wsrep_sst_backup File 2.39 KB 0755
wsrep_sst_common File 65.72 KB 0644
wsrep_sst_mariabackup File 48.1 KB 0755
wsrep_sst_mysqldump File 8.03 KB 0755
wsrep_sst_rsync File 29.69 KB 0755
wsrep_sst_rsync_wan File 29.69 KB 0755
x86_64 File 27.67 KB 0755
x86_64-redhat-linux-c++ File 1.04 MB 0755
x86_64-redhat-linux-g++ File 1.04 MB 0755
x86_64-redhat-linux-gcc File 1.04 MB 0755
x86_64-redhat-linux-gcc-11 File 1.04 MB 0755
x86_64-redhat-linux-gnu-pkg-config File 829 B 0755
x86_energy_perf_policy File 38.73 KB 0755
xargs File 64.09 KB 0755
xdg-dbus-proxy File 56.54 KB 0755
xgettext File 296.7 KB 0755
xml2-config File 1.83 KB 0755
xmlcatalog File 23.27 KB 0755
xmllint File 80.69 KB 0755
xmlwf File 39.81 KB 0755
xslt-config File 2.58 KB 0755
xsltproc File 31.88 KB 0755
xsubpp File 4.96 KB 0755
xz File 84.94 KB 0755
xzcat File 84.94 KB 0755
xzcmp File 6.48 KB 0755
xzdec File 15.85 KB 0755
xzdiff File 6.48 KB 0755
xzegrep File 5.77 KB 0755
xzfgrep File 5.77 KB 0755
xzgrep File 5.77 KB 0755
xzless File 1.76 KB 0755
xzmore File 2.12 KB 0755
yat2m File 40.04 KB 0755
yes File 31.52 KB 0755
ypdomainname File 23.84 KB 0755
yum File 2.04 KB 0755
yum-builddep File 3.6 KB 0755
yum-config-manager File 3.6 KB 0755
yum-debug-dump File 3.6 KB 0755
yum-debug-restore File 3.6 KB 0755
yum-groups-manager File 3.6 KB 0755
yumdownloader File 3.6 KB 0755
zcat File 1.94 KB 0755
zcmp File 1.64 KB 0755
zdiff File 6.31 KB 0755
zdump File 27.51 KB 0755
zegrep File 33 B 0755
zfgrep File 33 B 0755
zforce File 2.04 KB 0755
zgrep File 7.93 KB 0755
zip File 221.09 KB 0755
zipcloak File 75.7 KB 0755
zipdetails File 58.56 KB 0755
zipgrep File 2.89 KB 0755
zipinfo File 196.15 KB 0755
zipnote File 67.61 KB 0755
zipsplit File 63.58 KB 0755
zless File 2.16 KB 0755
zmore File 1.8 KB 0755
znew File 4.47 KB 0755
zone2json File 1.35 MB 0755
zone2sql File 1.37 MB 0755
zsoelim File 32.18 KB 0755