X7ROOT File Manager
Current Path:
/lib
lib
/
ðŸ“
..
ðŸ“
.build-id
ðŸ“
NetworkManager
ðŸ“
binfmt.d
📄
cpp
(1.21 MB)
ðŸ“
debug
ðŸ“
dracut
ðŸ“
environment.d
ðŸ“
exim
ðŸ“
firewalld
ðŸ“
firmware
ðŸ“
fontconfig
ðŸ“
games
ðŸ“
gcc
ðŸ“
gems
ðŸ“
grub
ðŸ“
kbd
ðŸ“
kdump
ðŸ“
kernel
ðŸ“
locale
ðŸ“
modprobe.d
ðŸ“
modules
ðŸ“
modules-load.d
ðŸ“
motd.d
ðŸ“
node_modules
📄
os-release
(381 B)
ðŸ“
polkit-1
ðŸ“
python2.7
ðŸ“
python3.6
ðŸ“
python3.8
ðŸ“
rpm
📄
sendmail
(1.02 KB)
ðŸ“
sse2
ðŸ“
sysctl.d
ðŸ“
sysimage
ðŸ“
systemd
ðŸ“
sysusers.d
ðŸ“
tmpfiles.d
ðŸ“
tuned
ðŸ“
udev
Editing: sendmail
#!/bin/bash ##CageFS proxyexec wrapper - ver 16 if [[ $EUID -eq 0 ]]; then echo 'Cannot be run as root' exit 1 fi USR=`/usr/bin/whoami` TOKEN=`/bin/cat /var/.cagefs/.cagefs.token` # It's user's tmp directory and write to it is secure procedure # because this script is running only under usual user PIDFILE="/tmp/.cagefs.proxy.$$" USER_INTERRUPT=13 CWD=`pwd` ctrl_c_handler() { if [[ -f "$PIDFILE" ]]; then pid=`/bin/cat $PIDFILE` /bin/rm -f $PIDFILE > /dev/null 2>&1 /bin/kill -s SIGINT "$pid" > /dev/null 2>&1 fi exit $USER_INTERRUPT } if [[ -e /var/.cagefs/origin ]]; then ORIGIN=`/bin/cat /var/.cagefs/origin` REMOTE="/usr/bin/ssh -F /etc/ssh/cagefs-rexec_config $USR@$ORIGIN" $REMOTE CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" SENDMAIL $$ "$@" RETVAL=$? else trap 'ctrl_c_handler' 2 CAGEFS_TOKEN="$TOKEN" /usr/sbin/proxyexec -c cagefs.sock "$USR" "$CWD" SENDMAIL $$ "$@" RETVAL=$? /bin/rm -f $PIDFILE > /dev/null 2>&1 fi exit $RETVAL
Upload File
Create Folder