404

[ Avaa Bypassed ]




Upload:

Command:

elspacio@18.188.43.85: ~ $
# Copyright 2014-2015, Tresys Technology, LLC
#
# This file is part of SETools.
#
# SETools is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License as
# published by the Free Software Foundation, either version 2.1 of
# the License, or (at your option) any later version.
#
# SETools is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public
# License along with SETools.  If not, see
# <http://www.gnu.org/licenses/>.
#
import logging
from socket import IPPROTO_TCP, IPPROTO_UDP

from .mixins import MatchContext
from .query import PolicyQuery
from .policyrep import PortconRange, PortconProtocol
from .util import match_range


class PortconQuery(MatchContext, PolicyQuery):

    """
    Port context query.

    Parameter:
    policy          The policy to query.

    Keyword Parameters/Class attributes:
    protocol        The protocol to match (socket.IPPROTO_TCP for
                    TCP or socket.IPPROTO_UDP for UDP)

    ports           A 2-tuple of the port range to match. (Set both to
                    the same value for a single port)
    ports_subset    If true, the criteria will match if it is a subset
                    of the portcon's range.
    ports_overlap   If true, the criteria will match if it overlaps
                    any of the portcon's range.
    ports_superset  If true, the criteria will match if it is a superset
                    of the portcon's range.
    ports_proper    If true, use proper superset/subset operations.
                    No effect if not using set operations.

    user            The criteria to match the context's user.
    user_regex      If true, regular expression matching
                    will be used on the user.

    role            The criteria to match the context's role.
    role_regex      If true, regular expression matching
                    will be used on the role.

    type_           The criteria to match the context's type.
    type_regex      If true, regular expression matching
                    will be used on the type.

    range_          The criteria to match the context's range.
    range_subset    If true, the criteria will match if it is a subset
                    of the context's range.
    range_overlap   If true, the criteria will match if it overlaps
                    any of the context's range.
    range_superset  If true, the criteria will match if it is a superset
                    of the context's range.
    range_proper    If true, use proper superset/subset operations.
                    No effect if not using set operations.
    """

    _protocol = None
    _ports = None
    ports_subset = False
    ports_overlap = False
    ports_superset = False
    ports_proper = False

    @property
    def ports(self):
        return self._ports

    @ports.setter
    def ports(self, value):
        pending_ports = PortconRange(*value)

        if all(pending_ports):
            if pending_ports.low < 1 or pending_ports.high < 1:
                raise ValueError("Port numbers must be positive: {0.low}-{0.high}".
                                 format(pending_ports))

            if pending_ports.low > pending_ports.high:
                raise ValueError(
                    "The low port must be smaller than the high port: {0.low}-{0.high}".
                    format(pending_ports))

            self._ports = pending_ports
        else:
            self._ports = None

    @property
    def protocol(self):
        return self._protocol

    @protocol.setter
    def protocol(self, value):
        if value:
            self._protocol = PortconProtocol.lookup(value)
        else:
            self._protocol = None

    def __init__(self, policy, **kwargs):
        super(PortconQuery, self).__init__(policy, **kwargs)
        self.log = logging.getLogger(__name__)

    def results(self):
        """Generator which yields all matching portcons."""
        self.log.info("Generating portcon results from {0.policy}".format(self))
        self.log.debug("Ports: {0.ports}, overlap: {0.ports_overlap}, "
                       "subset: {0.ports_subset}, superset: {0.ports_superset}, "
                       "proper: {0.ports_proper}".format(self))
        self.log.debug("Protocol: {0.protocol!r}".format(self))
        self._match_context_debug(self.log)

        for portcon in self.policy.portcons():

            if self.ports and not match_range(
                    portcon.ports,
                    self.ports,
                    self.ports_subset,
                    self.ports_overlap,
                    self.ports_superset,
                    self.ports_proper):
                continue

            if self.protocol and self.protocol != portcon.protocol:
                continue

            if not self._match_context(portcon.context):
                continue

            yield portcon

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
diff Folder 0755
__init__.py File 2.79 KB 0644
boolquery.py File 2.19 KB 0644
boundsquery.py File 2.35 KB 0644
categoryquery.py File 1.88 KB 0644
commonquery.py File 2.11 KB 0644
constraintquery.py File 5.5 KB 0644
defaultquery.py File 2.8 KB 0644
descriptors.py File 7.47 KB 0644
devicetreeconquery.py File 2.72 KB 0644
dta.py File 21.4 KB 0644
exception.py File 5.97 KB 0644
fsusequery.py File 3.36 KB 0644
genfsconquery.py File 3.68 KB 0644
ibendportconquery.py File 3.52 KB 0644
ibpkeyconquery.py File 5.22 KB 0644
infoflow.py File 14.59 KB 0644
initsidquery.py File 2.79 KB 0644
iomemconquery.py File 4.44 KB 0644
ioportconquery.py File 4.46 KB 0644
mixins.py File 7.14 KB 0644
mlsrulequery.py File 4.59 KB 0644
netifconquery.py File 2.93 KB 0644
nodeconquery.py File 4.16 KB 0644
objclassquery.py File 3.78 KB 0644
pcideviceconquery.py File 3.04 KB 0644
perm_map File 87.16 KB 0644
permmap.py File 16.1 KB 0644
pirqconquery.py File 2.95 KB 0644
polcapquery.py File 1.64 KB 0644
policyrep.cpython-36m-x86_64-linux-gnu.so File 1.87 MB 0755
portconquery.py File 5.04 KB 0644
query.py File 1.69 KB 0644
rbacrulequery.py File 5.61 KB 0644
rolequery.py File 2.48 KB 0644
sensitivityquery.py File 2.65 KB 0644
terulequery.py File 9.11 KB 0644
typeattrquery.py File 2.62 KB 0644
typequery.py File 3.43 KB 0644
userquery.py File 4.68 KB 0644
util.py File 5.32 KB 0644