uawdijnntqw1x1x1
IP : 216.73.216.110
Hostname : 6.87.74.97.host.secureserver.net
Kernel : Linux 6.87.74.97.host.secureserver.net 4.18.0-553.83.1.el8_10.x86_64 #1 SMP Mon Nov 10 04:22:44 EST 2025 x86_64
Disable Function : None :)
OS : Linux
PATH:
/
home
/
emeraadmin
/
.caldav
/
.
/
..
/
public_html
/
node_modules
/
ionicons
/
..
/
..
/
4d695
/
dbus-1.zip
/
/
PK(��\A�F~~(system.d/org.freedesktop.PolicyKit1.confnu�[���<?xml version="1.0" encoding="UTF-8"?> <!-- -*- XML -*- --> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <policy user="polkitd"> <allow own="org.freedesktop.PolicyKit1"/> </policy> <policy context="default"> <allow send_destination="org.freedesktop.PolicyKit1"/> </policy> <!-- Allow uid 0 to send messages on the org.freedesktop.PolicyKit1.AuthenticationAgent interface --> <policy user="polkitd"> <allow send_interface="org.freedesktop.PolicyKit1.AuthenticationAgent"/> </policy> </busconfig> PK(��\�����system.d/teamd.confnu�[���<?xml version="1.0"?> <!--*-nxml-*--> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <policy user="root"> <allow own_prefix="org.libteam.teamd"/> <allow send_interface="org.libteam.teamd"/> </policy> <policy context="default"> <deny own_prefix="org.libteam.teamd"/> </policy> </busconfig> PK(��\�y�u} } system.d/oddjob.confnu�[���<?xml version="1.0"?> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <!-- This configuration file specifies the required security policies for the oddjob service to work. It controls which requests users will be allowed to issue to oddjobd over the bus, which is quite different from controlling whether or not oddjobd will attempt to fulfill the request. --> <!-- Only root can own the oddjob service --> <policy user="root"> <allow own="com.redhat.oddjob"/> </policy> <!-- Allow anyone to try to call the quit method of the com.redhat.oddjob interface implemented by the /com/redhat/oddjob object provided by the com.redhat.oddjob service --> <policy context="default"> <allow send_destination="com.redhat.oddjob" send_path="/com/redhat/oddjob" send_interface="com.redhat.oddjob" send_member="quit"/> </policy> <!-- Allow anyone to try to call the list method of the com.redhat.oddjob interface implemented by the /com/redhat/oddjob object provided by the com.redhat.oddjob service --> <policy context="default"> <allow send_destination="com.redhat.oddjob" send_path="/com/redhat/oddjob" send_interface="com.redhat.oddjob" send_member="list"/> </policy> <!-- Allow anyone to try to call the listall method of the com.redhat.oddjob interface implemented by the /com/redhat/oddjob object provided by the com.redhat.oddjob service --> <policy context="default"> <allow send_destination="com.redhat.oddjob" send_path="/com/redhat/oddjob" send_interface="com.redhat.oddjob" send_member="listall"/> </policy> <!-- Allow anyone to try to call the reload method of the com.redhat.oddjob interface implemented by the /com/redhat/oddjob object provided by the com.redhat.oddjob service --> <policy context="default"> <allow send_destination="com.redhat.oddjob" send_path="/com/redhat/oddjob" send_interface="com.redhat.oddjob" send_member="reload"/> </policy> <!-- Allow anyone to try to call the introspection methods of the every object provided by the com.redhat.oddjob service --> <policy context="default"> <allow send_destination="com.redhat.oddjob" send_interface="org.freedesktop.DBus.Introspectable"/> </policy> </busconfig> PK(��\����GGsystem.d/oddjob-mkhomedir.confnu�[���<?xml version="1.0"?> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <!-- This configuration file specifies the required security policies for the oddjob_mkhomedir service to work. It controls which requests users will be allowed to issue to oddjobd over the bus, which is quite different from controlling whether or not oddjobd will attempt to fulfill the request. --> <!-- Only root can own (provide) the com.redhat.oddjob_mkhomedir service on the system bus. --> <policy user="root"> <allow own="com.redhat.oddjob_mkhomedir"/> </policy> <!-- Allow anyone to call the introspection methods of any object provided by the com.redhat.oddjob_mkhomedir service. --> <policy context="default"> <allow send_destination="com.redhat.oddjob_mkhomedir" send_interface="org.freedesktop.DBus.Introspectable"/> </policy> <!-- Allow anyone to try to call the mkhomedirfor method, which is part of the "mkhomedir" interface implemented by the "/" object provided by the com.redhat.oddjob_mkhomedir service. --> <policy context="default"> <allow send_destination="com.redhat.oddjob_mkhomedir" send_path="/" send_interface="com.redhat.oddjob_mkhomedir" send_member="mkhomedirfor"/> </policy> <!-- Allow anyone to try to call the mkmyhomedir method, which is part of the "mkhomedir" interface implemented by the "/" object provided by the com.redhat.oddjob_mkhomedir service. --> <policy context="default"> <allow send_destination="com.redhat.oddjob_mkhomedir" send_path="/" send_interface="com.redhat.oddjob_mkhomedir" send_member="mkmyhomedir"/> </policy> </busconfig> PK(��\A���� � session.confnu�[���<!-- This configuration file controls the per-user-login-session message bus. Add a session-local.conf and edit that rather than changing this file directly. --> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <!-- Our well-known bus type, don't change this --> <type>session</type> <!-- If we fork, keep the user's original umask to avoid affecting the behavior of child processes. --> <keep_umask/> <listen>unix:tmpdir=/tmp</listen> <!-- On Unix systems, the most secure authentication mechanism is EXTERNAL, which uses credential-passing over Unix sockets. This authentication mechanism is not available on Windows, is not suitable for use with the tcp: or nonce-tcp: transports, and will not work on obscure flavours of Unix that do not have a supported credentials-passing mechanism. On those platforms/transports, comment out the <auth> element to allow fallback to DBUS_COOKIE_SHA1. --> <auth>EXTERNAL</auth> <standard_session_servicedirs /> <policy context="default"> <!-- Allow everything to be sent --> <allow send_destination="*" eavesdrop="true"/> <!-- Allow everything to be received --> <allow eavesdrop="true"/> <!-- Allow anyone to own anything --> <allow own="*"/> </policy> <!-- Include legacy configuration location --> <include ignore_missing="yes">/etc/dbus-1/session.conf</include> <!-- Config files are placed here that among other things, further restrict the above policy for specific services. --> <includedir>session.d</includedir> <includedir>/etc/dbus-1/session.d</includedir> <!-- This is included last so local configuration can override what's in this standard file --> <include ignore_missing="yes">/etc/dbus-1/session-local.conf</include> <include if_selinux_enabled="yes" selinux_root_relative="yes">contexts/dbus_contexts</include> <!-- For the session bus, override the default relatively-low limits with essentially infinite limits, since the bus is just running as the user anyway, using up bus resources is not something we need to worry about. In some cases, we do set the limits lower than "all available memory" if exceeding the limit is almost certainly a bug, having the bus enforce a limit is nicer than a huge memory leak. But the intent is that these limits should never be hit. --> <!-- the memory limits are 1G instead of say 4G because they can't exceed 32-bit signed int max --> <limit name="max_incoming_bytes">1000000000</limit> <limit name="max_incoming_unix_fds">250000000</limit> <limit name="max_outgoing_bytes">1000000000</limit> <limit name="max_outgoing_unix_fds">250000000</limit> <limit name="max_message_size">1000000000</limit> <!-- We do not override max_message_unix_fds here since the in-kernel limit is also relatively low --> <limit name="service_start_timeout">120000</limit> <limit name="auth_timeout">240000</limit> <limit name="pending_fd_timeout">150000</limit> <limit name="max_completed_connections">100000</limit> <limit name="max_incomplete_connections">10000</limit> <limit name="max_connections_per_user">100000</limit> <limit name="max_pending_service_starts">10000</limit> <limit name="max_names_per_connection">50000</limit> <limit name="max_match_rules_per_connection">50000</limit> <limit name="max_replies_per_connection">50000</limit> </busconfig> PK(��\x�[1>>system.confnu�[���<!-- This configuration file controls the systemwide message bus. Add a system-local.conf and edit that rather than changing this file directly. --> <!-- Note that there are any number of ways you can hose yourself security-wise by screwing up this file; in particular, you probably don't want to listen on any more addresses, add any more auth mechanisms, run as a different user, etc. --> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-Bus Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <!-- Our well-known bus type, do not change this --> <type>system</type> <!-- Run as special user --> <user>dbus</user> <!-- Fork into daemon mode --> <fork/> <!-- We use system service launching using a helper --> <standard_system_servicedirs/> <!-- This is a setuid helper that is used to launch system services --> <servicehelper>//usr/libexec/dbus-1/dbus-daemon-launch-helper</servicehelper> <!-- Write a pid file --> <pidfile>/var/run/dbus/pid</pidfile> <!-- Enable logging to syslog --> <syslog/> <!-- Only allow socket-credentials-based authentication --> <auth>EXTERNAL</auth> <!-- Only listen on a local socket. (abstract=/path/to/socket means use abstract namespace, don't really create filesystem file; only Linux supports this. Use path=/whatever on other systems.) --> <listen>unix:path=/run/dbus/system_bus_socket</listen> <policy context="default"> <!-- All users can connect to system bus --> <allow user="*"/> <!-- Holes must be punched in service configuration files for name ownership and sending method calls --> <deny own="*"/> <deny send_type="method_call"/> <!-- Signals and reply messages (method returns, errors) are allowed by default --> <allow send_type="signal"/> <allow send_requested_reply="true" send_type="method_return"/> <allow send_requested_reply="true" send_type="error"/> <!-- All messages may be received by default --> <allow receive_type="method_call"/> <allow receive_type="method_return"/> <allow receive_type="error"/> <allow receive_type="signal"/> <!-- Allow anyone to talk to the message bus --> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus" /> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus.Introspectable"/> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus.Properties"/> <!-- But disallow some specific bus services --> <deny send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus" send_member="UpdateActivationEnvironment"/> <deny send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus.Debug.Stats"/> <deny send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.systemd1.Activator"/> </policy> <!-- Only systemd, which runs as root, may report activation failures. --> <policy user="root"> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.systemd1.Activator"/> </policy> <!-- root may monitor the system bus. --> <policy user="root"> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus.Monitoring"/> </policy> <!-- If the Stats interface was enabled at compile-time, root may use it. Copy this into system.local.conf or system.d/*.conf if you want to enable other privileged users to view statistics and debug info --> <policy user="root"> <allow send_destination="org.freedesktop.DBus" send_interface="org.freedesktop.DBus.Debug.Stats"/> </policy> <!-- Include legacy configuration location --> <include ignore_missing="yes">/etc/dbus-1/system.conf</include> <!-- The defaults for these limits are hard-coded in dbus-daemon. Some clarifications: Times are in milliseconds (ms); 1000ms = 1 second 133169152 bytes = 127 MiB 33554432 bytes = 32 MiB 150000ms = 2.5 minutes --> <!-- <limit name="max_incoming_bytes">133169152</limit> --> <!-- <limit name="max_incoming_unix_fds">64</limit> --> <!-- <limit name="max_outgoing_bytes">133169152</limit> --> <!-- <limit name="max_outgoing_unix_fds">64</limit> --> <!-- <limit name="max_message_size">33554432</limit> --> <!-- <limit name="max_message_unix_fds">16</limit> --> <!-- <limit name="service_start_timeout">25000</limit> --> <!-- <limit name="auth_timeout">5000</limit> --> <!-- <limit name="pending_fd_timeout">150000</limit> --> <!-- <limit name="max_completed_connections">2048</limit> --> <!-- <limit name="max_incomplete_connections">64</limit> --> <!-- <limit name="max_connections_per_user">256</limit> --> <!-- <limit name="max_pending_service_starts">512</limit> --> <!-- <limit name="max_names_per_connection">512</limit> --> <!-- <limit name="max_match_rules_per_connection">512</limit> --> <!-- <limit name="max_replies_per_connection">128</limit> --> <!-- Config files are placed here that among other things, punch holes in the above policy for specific services. --> <includedir>system.d</includedir> <includedir>/etc/dbus-1/system.d</includedir> <!-- This is included last so local configuration can override what's in this standard file --> <include ignore_missing="yes">/etc/dbus-1/system-local.conf</include> <include if_selinux_enabled="yes" selinux_root_relative="yes">contexts/dbus_contexts</include> </busconfig> PKѫ�\)�58��0system-services/org.freedesktop.systemd1.servicenu�[���# SPDX-License-Identifier: LGPL-2.1+ # # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. [D-BUS Service] Name=org.freedesktop.systemd1 Exec=/bin/false User=root PKѫ�\&�MN��1system-services/org.freedesktop.hostname1.servicenu�[���# SPDX-License-Identifier: LGPL-2.1+ # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. [D-BUS Service] Name=org.freedesktop.hostname1 Exec=/bin/false User=root SystemdService=dbus-org.freedesktop.hostname1.service PKѫ�\� �L��/system-services/org.freedesktop.locale1.servicenu�[���# SPDX-License-Identifier: LGPL-2.1+ # # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. [D-BUS Service] Name=org.freedesktop.locale1 Exec=/bin/false User=root SystemdService=dbus-org.freedesktop.locale1.service PKѫ�\)1��.system-services/org.freedesktop.login1.servicenu�[���# SPDX-License-Identifier: LGPL-2.1+ # # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. [D-BUS Service] Name=org.freedesktop.login1 Exec=/bin/false User=root SystemdService=dbus-org.freedesktop.login1.service PKѫ�\����1system-services/org.freedesktop.portable1.servicenu�[���# SPDX-License-Identifier: LGPL-2.1+ [D-BUS Service] Name=org.freedesktop.portable1 Exec=/bin/false User=root SystemdService=dbus-org.freedesktop.portable1.service PKѫ�\)'.���0system-services/org.freedesktop.resolve1.servicenu�[���# SPDX-License-Identifier: LGPL-2.1+ # # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. [D-BUS Service] Name=org.freedesktop.resolve1 Exec=/bin/false User=root SystemdService=dbus-org.freedesktop.resolve1.service PKѫ�\�����1system-services/org.freedesktop.timedate1.servicenu�[���# SPDX-License-Identifier: LGPL-2.1+ # # This file is part of systemd. # # systemd is free software; you can redistribute it and/or modify it # under the terms of the GNU Lesser General Public License as published by # the Free Software Foundation; either version 2.1 of the License, or # (at your option) any later version. [D-BUS Service] Name=org.freedesktop.timedate1 Exec=/bin/false User=root SystemdService=dbus-org.freedesktop.timedate1.service PKѫ�\^��z��5system-services/org.freedesktop.nm_dispatcher.servicenu�[���[D-BUS Service] Name=org.freedesktop.nm_dispatcher Exec=/usr/libexec/nm-dispatcher User=root SystemdService=dbus-org.freedesktop.nm-dispatcher.service PKѫ�\g�K��6system-services/org.freedesktop.nm_priv_helper.servicenu�[���[D-BUS Service] Name=org.freedesktop.nm_priv_helper Exec=/usr/libexec/nm-priv-helper User=root SystemdService=nm-priv-helper.service PKѫ�\��1�2system-services/org.freedesktop.PolicyKit1.servicenu�[���[D-BUS Service] Name=org.freedesktop.PolicyKit1 Exec=/usr/lib/polkit-1/polkitd --no-debug User=root SystemdService=polkit.service PKѫ�\�8K���'system.d/org.freedesktop.hostname1.confnu�[���<?xml version="1.0"?> <!--*-nxml-*--> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <!-- SPDX-License-Identifier: LGPL-2.1+ This file is part of systemd. systemd is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. --> <busconfig> <policy user="root"> <allow own="org.freedesktop.hostname1"/> <allow send_destination="org.freedesktop.hostname1"/> <allow receive_sender="org.freedesktop.hostname1"/> </policy> <policy context="default"> <allow send_destination="org.freedesktop.hostname1"/> <allow receive_sender="org.freedesktop.hostname1"/> </policy> </busconfig> PKѫ�\ym��%system.d/org.freedesktop.locale1.confnu�[���<?xml version="1.0"?> <!--*-nxml-*--> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <!-- SPDX-License-Identifier: LGPL-2.1+ This file is part of systemd. systemd is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. --> <busconfig> <policy user="root"> <allow own="org.freedesktop.locale1"/> <allow send_destination="org.freedesktop.locale1"/> <allow receive_sender="org.freedesktop.locale1"/> </policy> <policy context="default"> <allow send_destination="org.freedesktop.locale1"/> <allow receive_sender="org.freedesktop.locale1"/> </policy> </busconfig> PKѫ�\�T�k::$system.d/org.freedesktop.login1.confnu�[���<?xml version="1.0"?> <!--*-nxml-*--> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <!-- SPDX-License-Identifier: LGPL-2.1+ This file is part of systemd. systemd is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. --> <busconfig> <policy user="root"> <allow own="org.freedesktop.login1"/> <allow send_destination="org.freedesktop.login1"/> <allow receive_sender="org.freedesktop.login1"/> </policy> <policy context="default"> <deny send_destination="org.freedesktop.login1"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.DBus.Introspectable"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.DBus.Peer"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.DBus.Properties" send_member="Get"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.DBus.Properties" send_member="GetAll"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="GetSession"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="GetSessionByPID"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="GetUser"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="GetUserByPID"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="GetSeat"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="ListSessions"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="ListUsers"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="ListSeats"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="ListInhibitors"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="Inhibit"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="SetUserLinger"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="ActivateSession"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="ActivateSessionOnSeat"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="LockSession"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="UnlockSession"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="LockSessions"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="UnlockSessions"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="KillSession"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="KillUser"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="TerminateSession"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="TerminateUser"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="TerminateSeat"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="PowerOff"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="PowerOffWithFlags"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="Reboot"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="RebootWithFlags"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="Halt"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="HaltWithFlags"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="Suspend"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="SuspendWithFlags"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="Hibernate"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="HibernateWithFlags"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="HybridSleep"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="HybridSleepWithFlags"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="SuspendThenHibernate"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="SuspendThenHibernateWithFlags"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="CanPowerOff"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="CanReboot"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="CanHalt"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="CanSuspend"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="CanHibernate"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="CanHybridSleep"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="CanSuspendThenHibernate"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="ScheduleShutdown"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="CancelScheduledShutdown"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="CanRebootToFirmwareSetup"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="SetRebootToFirmwareSetup"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="SetWallMessage"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="AttachDevice"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Manager" send_member="FlushDevices"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Seat" send_member="Terminate"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Seat" send_member="ActivateSession"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Seat" send_member="SwitchTo"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Seat" send_member="SwitchToPrevious"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Seat" send_member="SwitchToNext"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="Terminate"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="Activate"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="Lock"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="Unlock"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="SetIdleHint"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="SetLockedHint"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="Kill"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="TakeControl"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="ReleaseControl"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="TakeDevice"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="ReleaseDevice"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="PauseDeviceComplete"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.User" send_member="Terminate"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.User" send_member="Kill"/> <allow send_destination="org.freedesktop.login1" send_interface="org.freedesktop.login1.Session" send_member="SetDisplay"/> <allow receive_sender="org.freedesktop.login1"/> </policy> </busconfig> PKѫ�\@�$!!'system.d/org.freedesktop.portable1.confnu�[���<?xml version="1.0"?> <!--*-nxml-*--> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <!-- SPDX-License-Identifier: LGPL-2.1+ --> <busconfig> <policy user="root"> <allow own="org.freedesktop.portable1"/> <allow send_destination="org.freedesktop.portable1"/> <allow receive_sender="org.freedesktop.portable1"/> </policy> <policy context="default"> <deny send_destination="org.freedesktop.portable1"/> <!-- generic interfaces --> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.DBus.Introspectable"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.DBus.Peer"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.DBus.Properties" send_member="Get"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.DBus.Properties" send_member="GetAll"/> <!-- Manager object --> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Manager" send_member="GetImage"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Manager" send_member="ListImages"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Manager" send_member="GetImageOSRelease"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Manager" send_member="GetImageUnitFiles"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Manager" send_member="GetImageState"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Manager" send_member="AttachImage"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Manager" send_member="DetachImage"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Manager" send_member="RemoveImage"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Manager" send_member="MarkImageReadOnly"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Manager" send_member="SetImageLimit"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Manager" send_member="SetPoolLimit"/> <!-- Image object --> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Image" send_member="GetOSRelease"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Image" send_member="GetUnitFiles"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Image" send_member="GetImageState"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Image" send_member="Attach"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Image" send_member="Detach"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Image" send_member="Remove"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Image" send_member="MarkReadOnly"/> <allow send_destination="org.freedesktop.portable1" send_interface="org.freedesktop.portable1.Image" send_member="SetLimit"/> <allow receive_sender="org.freedesktop.portable1"/> </policy> </busconfig> PKѫ�\c�����&system.d/org.freedesktop.resolve1.confnu�[���<?xml version="1.0"?> <!--*-nxml-*--> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <!-- This file is part of systemd. systemd is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. --> <busconfig> <policy user="systemd-resolve"> <allow own="org.freedesktop.resolve1"/> <allow send_destination="org.freedesktop.resolve1"/> <allow receive_sender="org.freedesktop.resolve1"/> </policy> <policy context="default"> <allow send_destination="org.freedesktop.resolve1"/> <allow receive_sender="org.freedesktop.resolve1"/> </policy> </busconfig> PKѫ�\�;uwIwI&system.d/org.freedesktop.systemd1.confnu�[���<?xml version="1.0"?> <!--*-nxml-*--> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <!-- SPDX-License-Identifier: LGPL-2.1+ This file is part of systemd. systemd is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. --> <busconfig> <policy user="root"> <allow own="org.freedesktop.systemd1"/> <!-- Root clients can do everything --> <allow send_destination="org.freedesktop.systemd1"/> <allow receive_sender="org.freedesktop.systemd1"/> <!-- systemd may receive activator requests --> <allow receive_interface="org.freedesktop.systemd1.Activator" receive_member="ActivationRequest"/> </policy> <policy context="default"> <deny send_destination="org.freedesktop.systemd1"/> <!-- Completely open to anyone: org.freedesktop.DBus.* interfaces --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.DBus.Introspectable"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.DBus.Peer"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.DBus.Properties" send_member="Get"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.DBus.Properties" send_member="GetAll"/> <!-- Completely open to anyone: org.freedesktop.systemd1.Manager interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetUnitByPID"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetUnitByInvocationID"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetUnitByControlGroup"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="LoadUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetUnitProcesses"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetJob"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetJobAfter"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetJobBefore"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ListUnits"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ListUnitsFiltered"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ListUnitsByPatterns"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ListUnitsByNames"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ListJobs"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="Subscribe"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="Unsubscribe"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="Dump"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="DumpByFileDescriptor"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ListUnitFiles"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ListUnitFilesByPatterns"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetUnitFileState"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetDefaultTarget"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetUnitFileLinks"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="LookupDynamicUserByName"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="LookupDynamicUserByUID"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="GetDynamicUsers"/> <!-- Completely open to anyone: org.freedesktop.systemd1.Unit interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Service" send_member="GetProcesses"/> <!-- Completely open to anyone: org.freedesktop.systemd1.Slice interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Slice" send_member="GetProcesses"/> <!-- Completely open to anyone: org.freedesktop.systemd1.Scope interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Scope" send_member="GetProcesses"/> <!-- Completely open to anyone: org.freedesktop.systemd1.Socket interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Socket" send_member="GetProcesses"/> <!-- Completely open to anyone: org.freedesktop.systemd1.Mount interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Mount" send_member="GetProcesses"/> <!-- Completely open to anyone: org.freedesktop.systemd1.Swap interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Swap" send_member="GetProcesses"/> <!-- Managed via polkit or other criteria: org.freedesktop.systemd1.Manager interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="StartUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="StartUnitReplace"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="StopUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ReloadUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="RestartUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="TryRestartUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ReloadOrRestartUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ReloadOrTryRestartUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="KillUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ResetFailedUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="SetUnitProperties"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="RefUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="UnrefUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="StartTransientUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="AttachProcessesToUnit"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="CancelJob"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ClearJobs"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ResetFailed"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="Reload"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="Reexecute"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="EnableUnitFiles"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="DisableUnitFiles"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="ReenableUnitFiles"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="LinkUnitFiles"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="PresetUnitFiles"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="PresetUnitFilesWithMode"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="MaskUnitFiles"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="UnmaskUnitFiles"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="RevertUnitFiles"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="SetDefaultTarget"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="PresetAllUnitFiles"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Manager" send_member="AddDependencyUnitFiles"/> <!-- Managed via polkit or other criteria: org.freedesktop.systemd1.Job interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Job" send_member="Cancel"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Job" send_member="GetAfter"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Job" send_member="GetBefore"/> <!-- Managed via polkit or other criteria: org.freedesktop.systemd1.Unit interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="Start"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="Stop"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="Reload"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="Restart"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="TryRestart"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="ReloadOrRestart"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="ReloadOrTryRestart"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="Kill"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="ResetFailed"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="SetProperties"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="Ref"/> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Unit" send_member="Unref"/> <!-- Managed via polkit or other criteria: org.freedesktop.systemd1.Service interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Service" send_member="AttachProcesses"/> <!-- Managed via polkit or other criteria: org.freedesktop.systemd1.Scope interface --> <allow send_destination="org.freedesktop.systemd1" send_interface="org.freedesktop.systemd1.Scope" send_member="AttachProcesses"/> <allow receive_sender="org.freedesktop.systemd1"/> </policy> </busconfig> PKѫ�\����'system.d/org.freedesktop.timedate1.confnu�[���<?xml version="1.0"?> <!--*-nxml-*--> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <!-- SPDX-License-Identifier: LGPL-2.1+ This file is part of systemd. systemd is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 2.1 of the License, or (at your option) any later version. --> <busconfig> <policy user="root"> <allow own="org.freedesktop.timedate1"/> <allow send_destination="org.freedesktop.timedate1"/> <allow receive_sender="org.freedesktop.timedate1"/> </policy> <policy context="default"> <allow send_destination="org.freedesktop.timedate1"/> <allow receive_sender="org.freedesktop.timedate1"/> </policy> </busconfig> PKѫ�\� 2���system.d/nm-dispatcher.confnu�[���<!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <policy user="root"> <allow own="org.freedesktop.nm_dispatcher"/> <allow send_destination="org.freedesktop.nm_dispatcher"/> </policy> <policy context="default"> <deny own="org.freedesktop.nm_dispatcher"/> <deny send_destination="org.freedesktop.nm_dispatcher"/> </policy> </busconfig> PKѫ�\�)�0bbsystem.d/nm-ifcfg-rh.confnu�[���<!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <policy context="default"> <allow send_destination="com.redhat.ifcfgrh1"/> </policy> <policy user="root"> <allow own="com.redhat.ifcfgrh1"/> </policy> </busconfig> PKѫ�\[�|���,system.d/org.freedesktop.NetworkManager.confnu�[���<!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <policy user="root"> <allow own="org.freedesktop.NetworkManager"/> <allow send_destination="org.freedesktop.NetworkManager"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.PPP"/> <allow send_interface="org.freedesktop.NetworkManager.SecretAgent"/> <!-- These are there because some broken policies do <deny send_interface="..." /> (see dbus-daemon(8) for details). This seems to override that for the known VPN plugins. --> <allow send_destination="org.freedesktop.NetworkManager.openconnect"/> <allow send_destination="org.freedesktop.NetworkManager.openswan"/> <allow send_destination="org.freedesktop.NetworkManager.openvpn"/> <allow send_destination="org.freedesktop.NetworkManager.pptp"/> <allow send_destination="org.freedesktop.NetworkManager.vpnc"/> <allow send_destination="org.freedesktop.NetworkManager.ssh"/> <allow send_destination="org.freedesktop.NetworkManager.iodine"/> <allow send_destination="org.freedesktop.NetworkManager.l2tp"/> <allow send_destination="org.freedesktop.NetworkManager.libreswan"/> <allow send_destination="org.freedesktop.NetworkManager.fortisslvpn"/> <allow send_destination="org.freedesktop.NetworkManager.strongswan"/> <allow send_interface="org.freedesktop.NetworkManager.VPN.Plugin"/> <allow send_destination="org.fedoraproject.FirewallD1"/> <!-- Allow the custom name for the dnsmasq instance spawned by NM from the dns dnsmasq plugin to own its dbus name, and for messages to be sent to it. --> <allow own="org.freedesktop.NetworkManager.dnsmasq"/> <allow send_destination="org.freedesktop.NetworkManager.dnsmasq"/> </policy> <policy context="default"> <deny own="org.freedesktop.NetworkManager"/> <deny send_destination="org.freedesktop.NetworkManager"/> <!-- Basic D-Bus API stuff --> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.DBus.Introspectable"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.DBus.Properties"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.DBus.ObjectManager"/> <!-- Devices (read-only properties, no methods) --> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.AccessPoint"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Adsl"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Bluetooth"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Bond"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Bridge"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Generic"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Gre"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Infiniband"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Macvlan"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Modem"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.OlpcMesh"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Team"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Tun"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Veth"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Vlan"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Wired"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.WiMax.Nsp"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.WifiP2PPeer"/> <!-- Devices (read-only, no security required) --> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.WiMax"/> <!-- Devices (read/write, secured with PolicyKit) --> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.Wireless"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device.WifiP2P"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Device"/> <!-- Core stuff (read-only properties, no methods) --> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Connection.Active"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.DHCP4Config"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.DHCP6Config"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.IP4Config"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.IP6Config"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.VPN.Connection"/> <!-- Core stuff (read/write, secured with PolicyKit) --> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Settings"/> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Settings.Connection"/> <!-- Agents; secured with PolicyKit. Any process can talk to the AgentManager API, but only NetworkManager can talk to the agents themselves. --> <allow send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.AgentManager"/> <!-- Root-only functions --> <deny send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager" send_member="SetLogging"/> <deny send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager" send_member="Sleep"/> <deny send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Settings" send_member="LoadConnections"/> <deny send_destination="org.freedesktop.NetworkManager" send_interface="org.freedesktop.NetworkManager.Settings" send_member="ReloadConnections"/> <deny own="org.freedesktop.NetworkManager.dnsmasq"/> <deny send_destination="org.freedesktop.NetworkManager.dnsmasq"/> </policy> <limit name="max_replies_per_connection">1024</limit> <limit name="max_match_rules_per_connection">2048</limit> </busconfig> PKѫ�\�Oo%KKsystem.d/com.redhat.tuned.confnu�[���<?xml version="1.0"?> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <policy context="default"> <allow receive_sender="com.redhat.tuned" /> <allow send_destination="com.redhat.tuned" send_interface="org.freedesktop.DBus.Introspectable" /> <allow send_destination="com.redhat.tuned" send_interface="com.redhat.tuned.control" /> </policy> <policy user="root"> <allow own="com.redhat.tuned" /> <allow send_destination="com.redhat.tuned" /> </policy> </busconfig> PKѫ�\��<<system.d/FirewallD.confnu�[���<?xml version="1.0" encoding="UTF-8"?> <!-- -*- XML -*- --> <!DOCTYPE busconfig PUBLIC "-//freedesktop//DTD D-BUS Bus Configuration 1.0//EN" "http://www.freedesktop.org/standards/dbus/1.0/busconfig.dtd"> <busconfig> <!-- Only root can own the service and send signals --> <policy user="root"> <allow own="org.fedoraproject.FirewallD1"/> <allow own="org.fedoraproject.FirewallD1.config"/> <allow send_destination="org.fedoraproject.FirewallD1"/> <allow send_destination="org.fedoraproject.FirewallD1.config"/> </policy> <!-- Allow anyone to invoke methods on the interfaces, authorization is performed by PolicyKit --> <policy context="default"> <allow send_destination="org.fedoraproject.FirewallD1"/> <allow send_destination="org.fedoraproject.FirewallD1" send_interface="org.freedesktop.DBus.Introspectable"/> <allow send_destination="org.fedoraproject.FirewallD1" send_interface="org.freedesktop.DBus.Properties"/> <allow send_destination="org.fedoraproject.FirewallD1.config"/> </policy> </busconfig> PK(��\A�F~~(system.d/org.freedesktop.PolicyKit1.confnu�[���PK(��\������system.d/teamd.confnu�[���PK(��\�y�u} } �system.d/oddjob.confnu�[���PK(��\����GGssystem.d/oddjob-mkhomedir.confnu�[���PK(��\A���� � session.confnu�[���PK(��\x�[1>>-$system.confnu�[���PKѫ�\)�58��0�:system-services/org.freedesktop.systemd1.servicenu�[���PKѫ�\&�MN��1�<system-services/org.freedesktop.hostname1.servicenu�[���PKѫ�\� �L��/�>system-services/org.freedesktop.locale1.servicenu�[���PKѫ�\)1��.�@system-services/org.freedesktop.login1.servicenu�[���PKѫ�\����1�Bsystem-services/org.freedesktop.portable1.servicenu�[���PKѫ�\)'.���0�Csystem-services/org.freedesktop.resolve1.servicenu�[���PKѫ�\�����1Fsystem-services/org.freedesktop.timedate1.servicenu�[���PKѫ�\^��z��5GHsystem-services/org.freedesktop.nm_dispatcher.servicenu�[���PKѫ�\g�K��6DIsystem-services/org.freedesktop.nm_priv_helper.servicenu�[���PKѫ�\��1�2/Jsystem-services/org.freedesktop.PolicyKit1.servicenu�[���PKѫ�\�8K���'Ksystem.d/org.freedesktop.hostname1.confnu�[���PKѫ�\ym��%COsystem.d/org.freedesktop.locale1.confnu�[���PKѫ�\�T�k::$gSsystem.d/org.freedesktop.login1.confnu�[���PKѫ�\@�$!!'��system.d/org.freedesktop.portable1.confnu�[���PKѫ�\c�����&8�system.d/org.freedesktop.resolve1.confnu�[���PKѫ�\�;uwIwI&G�system.d/org.freedesktop.systemd1.confnu�[���PKѫ�\����'�system.d/org.freedesktop.timedate1.confnu�[���PKѫ�\� 2���D�system.d/nm-dispatcher.confnu�[���PKѫ�\�)�0bbz�system.d/nm-ifcfg-rh.confnu�[���PKѫ�\[�|���,%�system.d/org.freedesktop.NetworkManager.confnu�[���PKѫ�\�Oo%KKWsystem.d/com.redhat.tuned.confnu�[���PKѫ�\��<<�system.d/FirewallD.confnu�[���PKs
/home/emeraadmin/.caldav/./../public_html/node_modules/ionicons/../../4d695/dbus-1.zip