404

[ Avaa Bypassed ]




Upload:

Command:

elspacio@3.135.207.193: ~ $
# Copyright 2014-2015, Tresys Technology, LLC
#
# This file is part of SETools.
#
# SETools is free software: you can redistribute it and/or modify
# it under the terms of the GNU Lesser General Public License as
# published by the Free Software Foundation, either version 2.1 of
# the License, or (at your option) any later version.
#
# SETools is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU Lesser General Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public
# License along with SETools.  If not, see
# <http://www.gnu.org/licenses/>.
#
import logging
import re

from . import mixins, query
from .descriptors import CriteriaDescriptor, CriteriaSetDescriptor
from .exception import InvalidType, RuleUseError
from .policyrep import RBACRuletype
from .util import match_indirect_regex


class RBACRuleQuery(mixins.MatchObjClass, query.PolicyQuery):

    """
    Query the RBAC rules.

    Parameter:
    policy            The policy to query.

    Keyword Parameters/Class attributes:
    ruletype        The list of rule type(s) to match.
    source          The name of the source role/attribute to match.
    source_indirect If true, members of an attribute will be
                    matched rather than the attribute itself.
    source_regex    If true, regular expression matching will
                    be used on the source role/attribute.
                    Obeys the source_indirect option.
    target          The name of the target role/attribute to match.
    target_indirect If true, members of an attribute will be
                    matched rather than the attribute itself.
    target_regex    If true, regular expression matching will
                    be used on the target role/attribute.
                    Obeys target_indirect option.
    tclass          The object class(es) to match.
    tclass_regex    If true, use a regular expression for
                    matching the rule's object class.
    default         The name of the default role to match.
    default_regex   If true, regular expression matching will
                    be used on the default role.
    """

    ruletype = CriteriaSetDescriptor(enum_class=RBACRuletype)
    source = CriteriaDescriptor("source_regex", "lookup_role")
    source_regex = False
    source_indirect = True
    _target = None
    target_regex = False
    target_indirect = True
    tclass = CriteriaSetDescriptor("tclass_regex", "lookup_class")
    tclass_regex = False
    default = CriteriaDescriptor("default_regex", "lookup_role")
    default_regex = False

    @property
    def target(self):
        return self._target

    @target.setter
    def target(self, value):
        if not value:
            self._target = None
        elif self.target_regex:
            self._target = re.compile(value)
        else:
            try:
                self._target = self.policy.lookup_type_or_attr(value)
            except InvalidType:
                self._target = self.policy.lookup_role(value)

    def __init__(self, policy, **kwargs):
        super(RBACRuleQuery, self).__init__(policy, **kwargs)
        self.log = logging.getLogger(__name__)

    def results(self):
        """Generator which yields all matching RBAC rules."""
        self.log.info("Generating RBAC rule results from {0.policy}".format(self))
        self.log.debug("Ruletypes: {0.ruletype}".format(self))
        self.log.debug("Source: {0.source!r}, indirect: {0.source_indirect}, "
                       "regex: {0.source_regex}".format(self))
        self.log.debug("Target: {0.target!r}, indirect: {0.target_indirect}, "
                       "regex: {0.target_regex}".format(self))
        self._match_object_class_debug(self.log)
        self.log.debug("Default: {0.default!r}, regex: {0.default_regex}".format(self))

        for rule in self.policy.rbacrules():
            #
            # Matching on rule type
            #
            if self.ruletype:
                if rule.ruletype not in self.ruletype:
                    continue

            #
            # Matching on source role
            #
            if self.source and not match_indirect_regex(
                    rule.source,
                    self.source,
                    self.source_indirect,
                    self.source_regex):
                continue

            #
            # Matching on target type (role_transition)/role(allow)
            #
            if self.target and not match_indirect_regex(
                    rule.target,
                    self.target,
                    self.target_indirect,
                    self.target_regex):
                continue

            #
            # Matching on object class
            #
            try:
                if not self._match_object_class(rule):
                    continue
            except RuleUseError:
                continue

            #
            # Matching on default role
            #
            if self.default:
                try:
                    # because default role is always a single
                    # role, hard-code indirect to True
                    # so the criteria can be an attribute
                    if not match_indirect_regex(
                            rule.default,
                            self.default,
                            True,
                            self.default_regex):
                        continue
                except RuleUseError:
                    continue

            # if we get here, we have matched all available criteria
            yield rule

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
diff Folder 0755
__init__.py File 2.79 KB 0644
boolquery.py File 2.19 KB 0644
boundsquery.py File 2.35 KB 0644
categoryquery.py File 1.88 KB 0644
commonquery.py File 2.11 KB 0644
constraintquery.py File 5.5 KB 0644
defaultquery.py File 2.8 KB 0644
descriptors.py File 7.47 KB 0644
devicetreeconquery.py File 2.72 KB 0644
dta.py File 21.4 KB 0644
exception.py File 5.97 KB 0644
fsusequery.py File 3.36 KB 0644
genfsconquery.py File 3.68 KB 0644
ibendportconquery.py File 3.52 KB 0644
ibpkeyconquery.py File 5.22 KB 0644
infoflow.py File 14.59 KB 0644
initsidquery.py File 2.79 KB 0644
iomemconquery.py File 4.44 KB 0644
ioportconquery.py File 4.46 KB 0644
mixins.py File 7.14 KB 0644
mlsrulequery.py File 4.59 KB 0644
netifconquery.py File 2.93 KB 0644
nodeconquery.py File 4.16 KB 0644
objclassquery.py File 3.78 KB 0644
pcideviceconquery.py File 3.04 KB 0644
perm_map File 87.16 KB 0644
permmap.py File 16.1 KB 0644
pirqconquery.py File 2.95 KB 0644
polcapquery.py File 1.64 KB 0644
policyrep.cpython-36m-x86_64-linux-gnu.so File 1.87 MB 0755
portconquery.py File 5.04 KB 0644
query.py File 1.69 KB 0644
rbacrulequery.py File 5.61 KB 0644
rolequery.py File 2.48 KB 0644
sensitivityquery.py File 2.65 KB 0644
terulequery.py File 9.11 KB 0644
typeattrquery.py File 2.62 KB 0644
typequery.py File 3.43 KB 0644
userquery.py File 4.68 KB 0644
util.py File 5.32 KB 0644