404

[ Avaa Bypassed ]




Upload:

Command:

elspacio@3.144.100.31: ~ $
# Copyright 2014-2015, Tresys Technology, LLC
#
# This file is part of SETools.
#
# SETools is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License as
# published by the Free Software Foundation, either version 2.1 of
# the License, or (at your option) any later version.
#
# SETools is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public
# License along with SETools.  If not, see
# <http://www.gnu.org/licenses/>.
#
import logging
import re
from contextlib import suppress

from .descriptors import CriteriaDescriptor, CriteriaSetDescriptor
from .exception import NoCommon
from .mixins import MatchName
from .query import PolicyQuery
from .util import match_regex, match_regex_or_set


class ObjClassQuery(MatchName, PolicyQuery):

    """
    Query object classes.

    Parameter:
    policy          The policy to query.

    Keyword Parameters/Class attributes:
    name            The name of the object set to match.
    name_regex      If true, regular expression matching will
                    be used for matching the name.
    common          The name of the inherited common to match.
    common_regex    If true, regular expression matching will
                    be used for matching the common name.
    perms           The permissions to match.
    perms_equal     If true, only commons with permission sets
                    that are equal to the criteria will
                    match.  Otherwise, any intersection
                    will match.
    perms_regex     If true, regular expression matching
                    will be used on the permission names instead
                    of set logic.
                    comparison will not be used.
    perms_indirect  If false, permissions inherited from a common
                    permission set not will be evaluated.  Default
                    is true.
    """

    common = CriteriaDescriptor("common_regex", "lookup_common")
    common_regex = False
    perms = CriteriaSetDescriptor("perms_regex")
    perms_equal = False
    perms_indirect = True
    perms_regex = False

    def __init__(self, policy, **kwargs):
        super(ObjClassQuery, self).__init__(policy, **kwargs)
        self.log = logging.getLogger(__name__)

    def results(self):
        """Generator which yields all matching object classes."""
        self.log.info("Generating object class results from {0.policy}".format(self))
        self._match_name_debug(self.log)
        self.log.debug("Common: {0.common!r}, regex: {0.common_regex}".format(self))
        self.log.debug("Perms: {0.perms}, regex: {0.perms_regex}, "
                       "eq: {0.perms_equal}, indirect: {0.perms_indirect}".format(self))

        for class_ in self.policy.classes():
            if not self._match_name(class_):
                continue

            if self.common:
                try:
                    if not match_regex(
                            class_.common,
                            self.common,
                            self.common_regex):
                        continue
                except NoCommon:
                    continue

            if self.perms:
                perms = class_.perms

                if self.perms_indirect:
                    with suppress(NoCommon):
                        perms |= class_.common.perms

                if not match_regex_or_set(
                        perms,
                        self.perms,
                        self.perms_equal,
                        self.perms_regex):
                    continue

            yield class_

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
diff Folder 0755
__init__.py File 2.79 KB 0644
boolquery.py File 2.19 KB 0644
boundsquery.py File 2.35 KB 0644
categoryquery.py File 1.88 KB 0644
commonquery.py File 2.11 KB 0644
constraintquery.py File 5.5 KB 0644
defaultquery.py File 2.8 KB 0644
descriptors.py File 7.47 KB 0644
devicetreeconquery.py File 2.72 KB 0644
dta.py File 21.4 KB 0644
exception.py File 5.97 KB 0644
fsusequery.py File 3.36 KB 0644
genfsconquery.py File 3.68 KB 0644
ibendportconquery.py File 3.52 KB 0644
ibpkeyconquery.py File 5.22 KB 0644
infoflow.py File 14.59 KB 0644
initsidquery.py File 2.79 KB 0644
iomemconquery.py File 4.44 KB 0644
ioportconquery.py File 4.46 KB 0644
mixins.py File 7.14 KB 0644
mlsrulequery.py File 4.59 KB 0644
netifconquery.py File 2.93 KB 0644
nodeconquery.py File 4.16 KB 0644
objclassquery.py File 3.78 KB 0644
pcideviceconquery.py File 3.04 KB 0644
perm_map File 87.16 KB 0644
permmap.py File 16.1 KB 0644
pirqconquery.py File 2.95 KB 0644
polcapquery.py File 1.64 KB 0644
policyrep.cpython-36m-x86_64-linux-gnu.so File 1.87 MB 0755
portconquery.py File 5.04 KB 0644
query.py File 1.69 KB 0644
rbacrulequery.py File 5.61 KB 0644
rolequery.py File 2.48 KB 0644
sensitivityquery.py File 2.65 KB 0644
terulequery.py File 9.11 KB 0644
typeattrquery.py File 2.62 KB 0644
typequery.py File 3.43 KB 0644
userquery.py File 4.68 KB 0644
util.py File 5.32 KB 0644