Linux velvet.gennetworks.in 4.18.0-553.83.1.lve.el8.x86_64 #1 SMP Wed Nov 12 10:04:12 UTC 2025 x86_64
LiteSpeed
Server IP : 161.129.70.235 & Your IP : 216.73.216.5
Domains :
Cant Read [ /etc/named.conf ]
User : virtueex
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
lib64 /
python3.6 /
site-packages /
setools /
Delete
Unzip
Name
Size
Permission
Date
Action
__pycache__
[ DIR ]
drwxr-xr-x
2024-09-10 15:36
diff
[ DIR ]
drwxr-xr-x
2024-09-10 15:36
__init__.py
2.79
KB
-rw-r--r--
2023-10-15 08:01
boolquery.py
2.19
KB
-rw-r--r--
2020-04-01 20:27
boundsquery.py
2.35
KB
-rw-r--r--
2020-04-01 20:27
categoryquery.py
1.88
KB
-rw-r--r--
2020-04-01 20:27
commonquery.py
2.11
KB
-rw-r--r--
2020-04-01 20:27
constraintquery.py
5.5
KB
-rw-r--r--
2020-04-01 20:27
defaultquery.py
2.8
KB
-rw-r--r--
2020-04-01 20:27
descriptors.py
7.47
KB
-rw-r--r--
2020-04-01 20:27
devicetreeconquery.py
2.72
KB
-rw-r--r--
2020-04-01 20:27
dta.py
21.4
KB
-rw-r--r--
2023-10-15 08:01
exception.py
5.97
KB
-rw-r--r--
2020-04-01 20:27
fsusequery.py
3.36
KB
-rw-r--r--
2020-04-01 20:27
genfsconquery.py
3.68
KB
-rw-r--r--
2020-04-01 20:27
ibendportconquery.py
3.52
KB
-rw-r--r--
2020-04-01 20:27
ibpkeyconquery.py
5.22
KB
-rw-r--r--
2020-04-01 20:27
infoflow.py
14.59
KB
-rw-r--r--
2023-10-15 08:01
initsidquery.py
2.79
KB
-rw-r--r--
2020-04-01 20:27
iomemconquery.py
4.44
KB
-rw-r--r--
2020-04-01 20:27
ioportconquery.py
4.46
KB
-rw-r--r--
2020-04-01 20:27
mixins.py
7.14
KB
-rw-r--r--
2020-04-01 20:27
mlsrulequery.py
4.59
KB
-rw-r--r--
2020-04-01 20:27
netifconquery.py
2.93
KB
-rw-r--r--
2020-04-01 20:27
nodeconquery.py
4.16
KB
-rw-r--r--
2020-04-01 20:27
objclassquery.py
3.78
KB
-rw-r--r--
2020-04-01 20:27
pcideviceconquery.py
3.04
KB
-rw-r--r--
2020-04-01 20:27
perm_map
87.16
KB
-rw-r--r--
2020-04-01 20:27
permmap.py
16.1
KB
-rw-r--r--
2020-04-01 20:27
pirqconquery.py
2.95
KB
-rw-r--r--
2020-04-01 20:27
polcapquery.py
1.64
KB
-rw-r--r--
2020-04-01 20:27
policyrep.cpython-36m-x86_64-linux-gnu.so
1.87
MB
-rwxr-xr-x
2023-10-15 08:02
portconquery.py
5.04
KB
-rw-r--r--
2020-04-01 20:27
query.py
1.69
KB
-rw-r--r--
2020-04-01 20:27
rbacrulequery.py
5.61
KB
-rw-r--r--
2020-04-01 20:27
rolequery.py
2.48
KB
-rw-r--r--
2020-04-01 20:27
sensitivityquery.py
2.65
KB
-rw-r--r--
2020-04-01 20:27
terulequery.py
9.11
KB
-rw-r--r--
2020-04-01 20:27
typeattrquery.py
2.62
KB
-rw-r--r--
2020-04-01 20:27
typequery.py
3.43
KB
-rw-r--r--
2020-04-01 20:27
userquery.py
4.68
KB
-rw-r--r--
2020-04-01 20:27
util.py
5.32
KB
-rw-r--r--
2020-04-01 20:27
Save
Rename
# Copyright 2014-2015, Tresys Technology, LLC # # This file is part of SETools. # # SETools is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License as # published by the Free Software Foundation, either version 2.1 of # the License, or (at your option) any later version. # # SETools is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with SETools. If not, see # <http://www.gnu.org/licenses/>. # import logging import re from . import mixins, query from .descriptors import CriteriaDescriptor, CriteriaSetDescriptor from .exception import InvalidType, RuleUseError from .policyrep import RBACRuletype from .util import match_indirect_regex class RBACRuleQuery(mixins.MatchObjClass, query.PolicyQuery): """ Query the RBAC rules. Parameter: policy The policy to query. Keyword Parameters/Class attributes: ruletype The list of rule type(s) to match. source The name of the source role/attribute to match. source_indirect If true, members of an attribute will be matched rather than the attribute itself. source_regex If true, regular expression matching will be used on the source role/attribute. Obeys the source_indirect option. target The name of the target role/attribute to match. target_indirect If true, members of an attribute will be matched rather than the attribute itself. target_regex If true, regular expression matching will be used on the target role/attribute. Obeys target_indirect option. tclass The object class(es) to match. tclass_regex If true, use a regular expression for matching the rule's object class. default The name of the default role to match. default_regex If true, regular expression matching will be used on the default role. """ ruletype = CriteriaSetDescriptor(enum_class=RBACRuletype) source = CriteriaDescriptor("source_regex", "lookup_role") source_regex = False source_indirect = True _target = None target_regex = False target_indirect = True tclass = CriteriaSetDescriptor("tclass_regex", "lookup_class") tclass_regex = False default = CriteriaDescriptor("default_regex", "lookup_role") default_regex = False @property def target(self): return self._target @target.setter def target(self, value): if not value: self._target = None elif self.target_regex: self._target = re.compile(value) else: try: self._target = self.policy.lookup_type_or_attr(value) except InvalidType: self._target = self.policy.lookup_role(value) def __init__(self, policy, **kwargs): super(RBACRuleQuery, self).__init__(policy, **kwargs) self.log = logging.getLogger(__name__) def results(self): """Generator which yields all matching RBAC rules.""" self.log.info("Generating RBAC rule results from {0.policy}".format(self)) self.log.debug("Ruletypes: {0.ruletype}".format(self)) self.log.debug("Source: {0.source!r}, indirect: {0.source_indirect}, " "regex: {0.source_regex}".format(self)) self.log.debug("Target: {0.target!r}, indirect: {0.target_indirect}, " "regex: {0.target_regex}".format(self)) self._match_object_class_debug(self.log) self.log.debug("Default: {0.default!r}, regex: {0.default_regex}".format(self)) for rule in self.policy.rbacrules(): # # Matching on rule type # if self.ruletype: if rule.ruletype not in self.ruletype: continue # # Matching on source role # if self.source and not match_indirect_regex( rule.source, self.source, self.source_indirect, self.source_regex): continue # # Matching on target type (role_transition)/role(allow) # if self.target and not match_indirect_regex( rule.target, self.target, self.target_indirect, self.target_regex): continue # # Matching on object class # try: if not self._match_object_class(rule): continue except RuleUseError: continue # # Matching on default role # if self.default: try: # because default role is always a single # role, hard-code indirect to True # so the criteria can be an attribute if not match_indirect_regex( rule.default, self.default, True, self.default_regex): continue except RuleUseError: continue # if we get here, we have matched all available criteria yield rule