PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
| Dir : /usr/libexec/kcare/python/kcarectl/ |
| Server: Linux host100322.itwesthosting.com 3.10.0-1160.144.1.el7.tuxcare.els4.x86_64 #1 SMP Tue Apr 7 08:40:40 UTC 2026 x86_64 IP: 144.91.64.173 |
| Dir : //usr/libexec/kcare/python/kcarectl/constants.py |
# Copyright (c) Cloud Linux Software, Inc # Licensed under CLOUD LINUX LICENSE AGREEMENT # http://cloudlinux.com/docs/LICENCE.TXT import os import sys PRINT_DEBUG = 0 PRINT_INFO = 1 PRINT_WARN = 2 PRINT_ERROR = 3 PRINT_CRITICAL = 4 PY2 = sys.version_info[0] == 2 PY2_6 = PY2 and sys.version_info[1] == 6 PATCH_CACHE = '/var/cache/kcare' FEATURE_FLAGS_CACHE = os.path.join(PATCH_CACHE, 'feature_flags.json') UPDATE_STATUS_PATH = os.path.join(PATCH_CACHE, 'update_status.json') UPDATE_ERROR_MAX_LENGTH = 100 CACHE_KEY_HEADER = 'Kc-Cache-Key' CACHE_KEY_DUMP_PATH = '/etc/sysconfig/kcare/cache_key' POLICY_REMOTE = 'REMOTE' POLICY_LOCAL = 'LOCAL' POLICY_LOCAL_FIRST = 'LOCAL_FIRST' KC_PATCH_VERSION = '3' LOG_FILE = '/var/log/kcarectl.log' SIG = '.sig' SIG_JSON = '.json-sig' # false positives by bandit based on the `TOKEN` keyword in name AUTH_TOKEN_HEADER = 'Kc-Auth-Token' # nosec hardcoded_password_string AUTH_TOKEN_DUMP_PATH = '/etc/sysconfig/kcare/auth_token' # nosec hardcoded_password_string # urlopen retry options RETRY_DELAY = 3 RETRY_MAX_DELAY = 30 RETRY_BACKOFF = 2 RETRY_COUNT = 4 # helper vars for tests SKIP_SYSTEMCTL_CHECK = False SYSTEMCTL = '/usr/bin/systemctl' UPDATE_MODE_MANUAL = 'manual' # update is launched manually by `kcarectl -u` UPDATE_MODE_AUTO = 'auto' # update is launched by cron UPDATE_MODE_SMART = 'smart' # update is launched by kcare daemon KMOD_BIN = 'kcare.ko' KPATCH_CTL = '/usr/libexec/kcare/kpatch_ctl' VERSION = '3.6-1.el7'