GIF89a=( �' 7IAXKgNgYvYx\%wh&h}t�h%�s%x�}9�R��&�0%� (�.��5�SD��&�a)�x5��;ͣ*ȡ&ղ)ׯ7׵<ѻ4�3�H֧KͯT��Y�aq��q��F� !� ' !� NETSCAPE2.0 , =( ��pH,�Ȥr�l:xШtJ�Z�جv��z��xL.:��z�n���|N�����~�������& !�0`9R�}��"�"a:S�~x��������g���E�������R���E����B�� ��ȸ��D���"�Ů� �H��L��D٫D�B�����D���T���H �G��A R�ڐ |�� ٭&��E8�S�kG�A�px�a��� R2XB��E8I���6X�:vT)�~��q�賥��"F~%x� � 4#Z�0O|-4Bs�X:= Q� Sal��yXJ`GȦ|s h��K3l7�B|�$'7Jީܪ0!��D�n=�P� ����0`�R�lj����v>���5 �.69�ϸd�����nlv�9��f{���Pbx �l5}�p� ��� �3a���I�O����!ܾ���i��9��#��)p�a ޽ �{�)vm��%D~ 6f��s}Œ�D�W E�`!� �&L8x� �ܝ{)x`X/>�}m��R�*|`D�=�_ ^�5 !_&'a�O�7�c��`DCx`�¥�9�Y�F���`?��"� �n@`�} lď��@4>�d S �v�xN��"@~d��=�g�s~G��� ���ud &p8Q�)ƫlXD����A~H�ySun�j���k*D�LH�] ��C"J��Xb~ʪwSt}6K,��q�S:9ت:���l�@�`�� �.۬�t9�S�[:��=`9N����{¿�A !R�:���6��x�0�_ �;������^���#����!����U���;0L1�����p% A��U̬ݵ��%�S��!���~`�G���� ���=4�np�3���������u�u�ٮ|%2�I��r�#0��J``8�@S@5� ���^`8E�]�.�S���7 � �0�j S�D� z���i�S�����!���l��w9*�D�I�nEX��� &A�Go�Qf��F��;���}�J����F5��Q|���X��T��y���]� o ��C=��:���PB@ D׽S�(>�C�x}`��xJЬ�۠��p+eE0`�}`A �/NE�� �9@��� H�7�!%B0`�l*��!8 2�%� �:�1�0E��ux%nP1�!�C)�P81l�ɸF#Ƭ{����B0>�� �b�`��O3��()yRpb��E.ZD8�H@% �Rx+%���c� ���f��b�d�`F�"8�XH"��-�|1�6iI, 2�$+](A*j� QT�o0.�U�`�R�}`�SN����yae�����b��o~ S)�y�@��3 �tT�0�&�+~L�f"�-|�~��>!�v��~�\Q1)}@�}h#aP72�"�$ !� " , =( &7IAXG]KgNgYvYxR"k\%w]'}h}t�h%�g+�s%r.m3ax3�x�}9��&��+�!7�0%� (�.�SD��&��;�"&ײ)׻4��6�K� �@pH,�Ȥr�l:xШtJ�Z�جv��z��xL.:��z�n���|N�����~�������& !�0`9R�}��"�"a:S�~x��������g �� E �� �������E �´��C���ǶR��D��"Ʒ�ʱH��M��GڬD�B����D��T����G���C�C� l&�~:'�tU�6ɹ#��)�'�.6�&��Ȼ K(8p0N�?!�2"��NIJX>R��OM '��2�*x�>#n� �@<[:�I�f ��T���Cdb��[�}E�5MBo��@�`@��tW-3 �x�B���jI�&E�9[T&$��ﯧ&"s��ȳ����dc�UUρ#���ldj?����`\}���u|3'�R]�6 �S#�!�FKL�*N E���`$�:e�YD�q�.�촁�s \-�jA 9�����-��M[�x(�s��x�|���p��}k�T�DpE@W� ��]k`1� ���Yb ��0l��*n0��"~zBd�~u�7�0Bl��0-�x~|U�U0 �h�*HS�|��e"#"?vp�i`e6^�+q��`m8 #V�� ��VS|`��"m"сSn|@:U���~`pb�G�ED����2F�I�? >�x� R� ��%~jx��<�a�9ij�2�D��&: Z`�]w���:�6��B�7eFJ|�ҧ�,���FǮcS�ʶ+B�,�ܺN���>PAD�HD��~���n��}�#�� Q��S���2�X�{�k�lQ�2�����w�|2� h9��G�,m���3��6-��E�L��I�³*K���q�`DwV�QXS��peS��� qܧTS����R�u �<�a�*At�lmE� � ��N[P1�ۦ��$��@`��Dpy�yXvCAy�B`}D� 0QwG#� �a[^�� $���Ǧ{L�"[��K�g�;�S~��GX.�goT.��ư��x���?1z��x~:�g�|�L� ��S`��0S]P�^p F<""�?!,�!N4&P� ����:T�@h�9%t��:�-~�I<`�9p I&.)^ 40D#p@�j4�ج:�01��rܼF2oW�#Z ;$Q q  �K��Nl#29 !F@�Bh�ᏬL!XF�LHKh�.�hE&J�G��<"WN!�����Y@� >R~19J"�2,/ &.GXB%�R�9B6�W]���W�I�$��9�RE8Y� ��"�A5�Q.axB�&ة�J�! �t)K%tS-�JF b�NMxL��)�R��"���6O!TH�H� 0 !� ) , =( &AXKgNgYvYxR"k\%wh&h}h%�g+�s%r.x3�x�}9��&��+�R,�!7�0%� (�.��5��&�a)��;�"&ף*Ȳ)ׯ7׻4�3��6�H֧KͻH�T��Y��q��h� ��pH,�Ȥr�l:xШtJ�Z�جv��z��xL.:��z�n���|N�����~�������& !�0`9R�}��"�"a:S�~x��������g �� E$����� � ����$E$��"��D� � ������R��C��� E ��H�M��G�D� �B��ϾD��a��`1r��Ӑ�� �o~�zU!L�C'�yW�UGt����ll�0���uG�)A�s[��x� �xO%��X2�  P�n:R/��aHae+�Dm?# ǣ6�8�J�x�Di�M���j���5oQ7�- <! *�l��R2r/a!l)d� A"�E���� &� ;��c �%����b��pe~C"B���H�eF2��`8qb�t_`ur`e� w�u3��Pv�h""�`�Íx�LĹ��3� �~ֺ�:���MDfJ� �۵�W�%�S�X �؁)�@��:E��w�u�Sxb8y\m�zS��Zb�E�L��w!y(>�"w�=�|��s�d �C�W)H�cC$�L �7r.�\{)@�`@ �X�$PD `aaG:���O�72E�amn]�"Rc�x�R� &dR8`g��i�xLR!�P &d����T���i�|�_ � Qi�#�`g:��:noM� :V �)p����W&a=�e�k� j���1߲s�x�W�jal|0��B0�, \j۴:6���C ��W��|��9���zĸV {�;��n��V�m�I��.��PN� ����C��+��By�ѾHŸ:��� 7�Y�FTk�SaoaY$D�S���29R�kt� ��f� ��:��Sp�3�I��DZ� �9���g��u�*3)O��[_hv ,���Et x�BH� �[��64M@�S�M7d�l�ܶ5-��U܍��z�R3Ԭ3~ ��P��5�g: ���kN�&0�j4���#{��3S�2�K�'ợl���2K{� {۶?~m𸧠�I�nE�='����^���_�=��~�#O���'���o..�Y�n��CSO��a��K��o,���b�����{�C�� "�{�K ��w��Ozdը�:$ ���v�] A#� ���a�z)Rx׿ƥ�d``�w-�y�f�K!����|��P��=�`�(f��'Pa ��BJa%��f�%`�}F����6>��`G"�}�=�!o`�^FP�ةQ�C���`(�}\�ݮ ��$<��n@dĠE#��U�I�!� #l��9`k���'Rr��Z�NB�MF �[�+9���-�wj���8�r� ,V�h"�|�S=�G_��"E� 0i*%̲��da0mVk�):;&6p>�jK ��# �D�:�c?:R Ӭf��I-�"�<�="��7�3S��c2RW ,�8(T"P0F¡Jh�" ; 403WebShell
403Webshell
Server IP : 173.249.157.85  /  Your IP : 3.148.200.110
Web Server : Apache
System : Linux server.frogzhost.com 3.10.0-1127.19.1.el7.x86_64 #1 SMP Tue Aug 25 17:23:54 UTC 2020 x86_64
User : econtech ( 1005)
PHP Version : 7.3.33
Disable Function : NONE
MySQL : OFF  |  cURL : OFF  |  WGET : ON  |  Perl : ON  |  Python : ON  |  Sudo : ON  |  Pkexec : ON
Directory :  /lib/Acronis/PyShell/site-tools/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ Back ]     

Current File : /lib/Acronis/PyShell/site-tools/gtobview.py
import acrort
import acrobind
import shlex


class GtobOptions:
    def __init__(self, *, request_url=False):
        self.stop_on_error = False
        self.request_url = request_url

    def to_unit(self):
        result = acrort.plain.Unit()
        if self.stop_on_error:
            result = result.consolidate({'StopOnError': True})
        if self.request_url:
            result = result.consolidate({'ResolveHumanUrl': True})
        return result


class GtobCommandProcessor(acrobind.CommandShell):
    def __init__(self, connection, printer, config):
        acrobind.CommandShell.__init__(self, connection=connection, printer=printer, config=config)
        self._projection = None
        self._tree = connection.gtob.open_global_tree()
        self._current_item = self._tree.root

    def do_reset(self, arg):
        """Reset global tree to its default state."""
        tree = self.connection.gtob.open_global_tree()
        self._projection = None
        self._tree = tree
        self._current_item = self._tree.root
        self.print_browsing_details()

    def _open_logon_profile(self):
        return self.connection.access.open_logon_profile()

    def _open_logon_proxy_profile(self):
        host_id = self._current_item.attributes.HostID.ref
        return self.connection.access.open_logon_profile(target_machine=host_id)

    def _open_current_profile(self):
        return self.connection.access.open_user_profile()

    def _open_delegated_profile(self):
        host_id = self._current_item.attributes.HostID.ref
        return self.connection.access.open_user_profile(target_machine=host_id)

    def preloop(self):
        self.print_browsing_details()

    def print_browsing_details(self):
        self.printer.write("Hierarchy root: {}".format(self._tree.root.key))

    def item_to_display_name(self, item):
        return item.display_name

    def item_to_name(self, item):
        return item.name

    def item_to_key(self, item):
        return item.key

    def print_items(self, items, transform_handler):
        i = 0
        for item in items:
            i = i + 1
            msg = transform_handler(item)
            self.printer.write("{:<4} ...... {}".format(i, msg))

    def do_jump(self, arg):
        """Jump to the global tree inside managed machine assuming that
        current item has property 'HostID' property in attributes.
        """
        host_id = self._current_item.attributes.HostID.ref
        tree = self.connection.gtob.open_global_tree(projection=self._projection, target_machine=host_id)
        self._tree = tree
        self._current_item = tree.root
        self.print_browsing_details()

    def do_stat(self, arg):
        """List details about current item."""
        self.printer.write(self._current_item)

    def do_top(self, arg):
        """Change current item to hierarchy root."""
        self._current_item = self._tree.root

    def do_cd(self, arg):
        """Change current item. Default credentials is used if possible.
        | Synopsis:
        |     cd ..
        |     cd index
        |
        | Description:
        |     .. - change current item on parent.
        |  index - change current item on child by its index
        """
        options = GtobOptions()
        if arg == '..':
            parents = self._current_item.parents
            if not parents:
                acrort.common.make_logic_error("Current item {} doesn't have any parent.".format(self._current_item.key)).throw()
            subject = self._tree.resolve_item(key=parents[0], options=options)
        else:
            items = self._tree.select_children(key=self._current_item.key, options=options)
            idx = int(arg) - 1
            subject = items[idx]
        subject.throw_if_error_item()
        self._current_item = subject

    def do_ls(self, arg):
        """List child or parent items in specified mode. Default credentials is used if possible.
        | Synopsis:
        |     ls [d|k|n] [e]
        |
        | Description:
        |    d - print display names, used by default
        |    k - print keys
        |    n - print names
        |    e - turn on 'StopOnError' mode
        """
        options = GtobOptions()
        list_method = self.item_to_display_name

        args = shlex.split(arg)
        if 'd' in args:
            list_method = self.item_to_display_name
        if 'k' in args:
            list_method = self.item_to_key
        if 'n' in args:
            list_method = self.item_to_name
        if 'e' in args:
            options.stop_on_error = True

        items = self._tree.select_children(key=self._current_item.key, options=options)
        if items:
            items[0].throw_if_error_item()
            self.print_items(items, list_method)
        else:
            self.printer.write("No items.")

    def do_resolve_key(self, arg):
        """Resolve specified item key. Default credentials is used if possible.
        | Synopsis:
        |     resolve-key <key>
        """
        options = GtobOptions()
        subject = self._tree.resolve_item(key=arg, options=options)
        subject.throw_if_error_item()
        self._current_item = subject

    def do_resolve(self, arg):
        """Resolve item by protocol and human path. Default credentials is used if possible.
        | Synopsis:
        |     resolve <protocol> <human path>
        """
        protocol, path = shlex.split(arg)
        options = GtobOptions()
        subject = self._tree.resolve_item(url=acrort.gtob.ItemUrl(protocol=protocol, path=path), options=options)
        subject.throw_if_error_item()
        self._current_item = subject

    def do_resolve_url(self, arg):
        """Resolve specified item by its URL. Default credentials is used if possible.
        | Synopsis:
        |     resolve-url <url>
        """
        url = shlex.split(arg)[0]
        key = acrort.gtob.ItemKey(url, 'url')
        self.do_resolve_key(key)

    def do_url(self, arg):
        """List URL for current item."""
        options = GtobOptions(request_url=True)
        subject = self._tree.resolve_item(key=self._current_item.key, options=options)
        subject.throw_if_error_item()
        self.printer.write(subject.attributes.HumanUrl.ref)

    def do_human(self, arg):
        """List all human paths supported by current item."""
        options = GtobOptions()
        url_list = self._tree.describe_item(key=self._current_item.key, options=options)
        if not url_list:
            self.printer.write("No human paths are supported by current item.")
            return
        for url in url_list:
            self.printer.write("protocol='{}', path='{}'".format(url.protocol, url.path))

    def do_credtmp(self, arg):
        """List temp credentials in the current logon session."""
        profile = self._open_logon_profile()
        accounts = profile.select()
        if not accounts:
            self.printer.write("There are no temp accounts in the logon profile.")
            return
        for account in accounts:
            self.printer.write(account)

    def do_credtmp_set(self, arg):
        """Set temp credentials for specified resource in the current logon session.
        | Synopsis:
        |     credtmp-set <resource-type> <resource-address> <username> <password>
        """
        resource_type, resource_address, user_name, password = shlex.split(arg)
        profile = self._open_logon_profile()
        profile.add_account(resource_type=resource_type, resource_address=resource_address, user_name=user_name, password=password)

    def do_credtmp_reset(self, arg):
        """Reset temp credentials for specified resource in the current logon session.
        | Synopsis:
        |     credtmp-reset <resource-type> <resource-address>
        """
        resource_type, resource_address = shlex.split(arg)
        profile = self._open_logon_profile()
        profile.delete_account(resource_type=resource_type, resource_address=resource_address)

    def do_credtmp_reset_all(self, arg):
        """Reset credentials for all resources in the current logon session."""
        profile = self._open_logon_profile()
        profile.clear()

    def do_credtmp_injected(self, arg):
        """List credentials injected to specified machine to the proxy-logon session."""
        profile = self._open_logon_proxy_profile()
        accounts = profile.select()
        if not accounts:
            self.printer.write("There are no temp accounts in the proxy-logon profile.")
            return
        for account in accounts:
            self.printer.write(account)

    def do_credtmp_inject(self, arg):
        """Inject credentials to specified machine in the proxy-logon session.
        | Synopsis:
        |     cred-inject <resource-type> <resource-address> <username> <password>
        """
        resource_type, resource_address, user_name, password = shlex.split(arg)
        profile = self._open_logon_proxy_profile()
        profile.add_account(resource_type=resource_type, resource_address=resource_address, user_name=user_name, password=password)

    def do_credtmp_revoke(self, arg):
        """Revoke credentials in specified machine from the proxy-logon session.
        | Synopsis:
        |     cred-revoke <resource-type> <resource-address>
        """
        resource_type, resource_address = shlex.split(arg)
        profile = self._open_logon_proxy_profile()
        profile.delete_account(resource_type=resource_type, resource_address=resource_address)

    def do_credtmp_revoke_all(self, arg):
        """Revoke credentials for all resources in specified machine from the proxy-logon session."""
        profile = self._open_logon_proxy_profile()
        profile.clear()

    def do_cred(self, arg):
        """List credentials for current user profile."""
        profile = self._open_current_profile()
        accounts = profile.select()
        if not accounts:
            self.printer.write("There are no accounts in the current user profile.")
            return
        for account in accounts:
            self.printer.write(account)

    def do_cred_set(self, arg):
        """Set credentials for specified resource in the current user profile.
        | Synopsis:
        |     cred-set <resource-type> <resource-address> <username> <password>
        """
        resource_type, resource_address, user_name, password = shlex.split(arg)
        profile = self._open_current_profile()
        profile.add_account(resource_type=resource_type, resource_address=resource_address, user_name=user_name, password=password)

    def do_cred_reset(self, arg):
        """Reset credentials for specified resource in the current user profile.
        | Synopsis:
        |     cred-reset <resource-type> <resource-address>
        """
        resource_type, resource_address = shlex.split(arg)
        profile = self._open_current_profile()
        profile.delete_account(resource_type=resource_type, resource_address=resource_address)

    def do_cred_reset_all(self, arg):
        """Reset credentials for all resources in the current user profile."""
        profile = self._open_current_profile()
        profile.clear()

    def do_cred_injected(self, arg):
        """List credentials for the current user profile injected to specified machine."""
        profile = self._open_delegated_profile()
        accounts = profile.select()
        if not accounts:
            self.printer.write("There is no injected accounts.")
            return
        for account in accounts:
            self.printer.write(account)

    def do_cred_inject(self, arg):
        """Inject credentials to specified machine in the current user proxy-profile.
        | Synopsis:
        |     cred-inject <resource-type> <resource-address> <username> <password>
        """
        resource_type, resource_address, user_name, password = shlex.split(arg)
        profile = self._open_delegated_profile()
        profile.add_account(resource_type=resource_type, resource_address=resource_address, user_name=user_name, password=password)

    def do_cred_revoke(self, arg):
        """Revoke credentials in specified machine from the current user proxy-profile.
        | Synopsis:
        |     cred-revoke <resource-type> <resource-address>
        """
        resource_type, resource_address = shlex.split(arg)
        profile = self._open_delegated_profile()
        profile.delete_account(resource_type=resource_type, resource_address=resource_address)

    def do_cred_revoke_all(self, arg):
        """Revoke credentials for all resources in specified machine from the current user proxy-profile."""
        profile = self._open_delegated_profile()
        profile.clear()

    def do_types_list(self, arg):
        """List names for known item types."""
        for type_object in self._tree.types:
            self.printer.write("    {}".format(type_object.type_id))

    def do_ext(self, arg):
        """List extensions of specified item type. Type extensions of current item is listed by default.
        | Synopsis:
        |     ext
        |     ext <type-name>
        """
        subject = arg if arg else self._current_item.key.type_id
        for item_type in filter(lambda t: t.type_id == subject, self._tree.types):
            self.printer.write(item_type.extensions)
            return
        acrort.common.make_logic_error("Unknown type name '{}' is given.".format(subject)).throw()

    def do_types_like(self, arg):
        """List details about all types matching up the specified pattern(s).
        | Synopsis:
        |     types-like <pattern1> [<pattern2> ...]
        """
        matched_types = {}
        patterns = shlex.split(arg)
        if not patterns:
            acrort.common.make_logic_error("At least one argument must be specified for this command.").throw()
        for item_type in self._tree.types:
            for pattern in patterns:
                if item_type.type_id.startswith(pattern):
                    matched_types[item_type.type_id] = item_type
        if not matched_types:
            self.printer.write("No item types matching up the specified pattern(s) are found.")
            return
        for item_type in matched_types.values():
            self.printer.write(item_type)

    def do_projection_set(self, arg):
        """Set or reset current projection.
        | Synopsis:
        |     projection-set <name>
        |
        | Description:
        |    <name> - name of projection to be applied.
        |             Reset current projection if name is empty.
        """
        projection = None
        if arg:
            projection = arg
        tree = self.connection.gtob.open_global_tree(projection=projection)

        self._projection = projection
        self._tree = tree
        self._current_item = tree.root

        self.print_browsing_details()

    def do_projection(self, arg):
        """List current projection."""
        if self._projection is None:
            self.printer.write("No projection is currently set.")
        else:
            self.printer.write("Current projection: {}".format(self._projection))


def main():
    parser = acrobind.CommandLineParser()
    parser.append_processor(acrobind.ConnectionArgumentsProcessor())
    parser.append_processor(acrobind.CommandShellArgumentsProcessor())
    parser.append_processor(acrobind.OutputArgumentsProcessor())
    parser.append_processor(acrobind.DebugTraceArgumentsProcessor())

    try:
        config = parser.parse_arguments()
    except acrort.Exception as exception:
        error = exception.to_error()
        return error.to_exit_code()

    printer = acrobind.Output(config, end='\n')
    conn, error = acrobind.connect_to_service(config, printer=printer)
    if conn is None:
        return error.to_exit_code()

    processor = GtobCommandProcessor(connection=conn, printer=printer, config=config)
    return processor.cmdloop()


if __name__ == '__main__':
    exit(acrobind.interruptable_safe_execute(main))

Youez - 2016 - github.com/yon3zu
LinuXploit