Linux ams-business-8.hostwindsdns.com 4.18.0-553.80.1.lve.el8.x86_64 #1 SMP Wed Oct 22 19:29:36 UTC 2025 x86_64
LiteSpeed
Server IP : 192.236.177.161 & Your IP : 216.73.216.50
Domains :
Cant Read [ /etc/named.conf ]
User : ajzdfbpz
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
lib64 /
python3.6 /
site-packages /
setools /
Delete
Unzip
Name
Size
Permission
Date
Action
__pycache__
[ DIR ]
drwxr-xr-x
2024-02-12 23:51
diff
[ DIR ]
drwxr-xr-x
2024-02-12 23:51
__init__.py
2.79
KB
-rw-r--r--
2023-10-15 02:31
boolquery.py
2.19
KB
-rw-r--r--
2020-04-01 14:57
boundsquery.py
2.35
KB
-rw-r--r--
2020-04-01 14:57
categoryquery.py
1.88
KB
-rw-r--r--
2020-04-01 14:57
commonquery.py
2.11
KB
-rw-r--r--
2020-04-01 14:57
constraintquery.py
5.5
KB
-rw-r--r--
2020-04-01 14:57
defaultquery.py
2.8
KB
-rw-r--r--
2020-04-01 14:57
descriptors.py
7.47
KB
-rw-r--r--
2020-04-01 14:57
devicetreeconquery.py
2.72
KB
-rw-r--r--
2020-04-01 14:57
dta.py
21.4
KB
-rw-r--r--
2023-10-15 02:31
exception.py
5.97
KB
-rw-r--r--
2020-04-01 14:57
fsusequery.py
3.36
KB
-rw-r--r--
2020-04-01 14:57
genfsconquery.py
3.68
KB
-rw-r--r--
2020-04-01 14:57
ibendportconquery.py
3.52
KB
-rw-r--r--
2020-04-01 14:57
ibpkeyconquery.py
5.22
KB
-rw-r--r--
2020-04-01 14:57
infoflow.py
14.59
KB
-rw-r--r--
2023-10-15 02:31
initsidquery.py
2.79
KB
-rw-r--r--
2020-04-01 14:57
iomemconquery.py
4.44
KB
-rw-r--r--
2020-04-01 14:57
ioportconquery.py
4.46
KB
-rw-r--r--
2020-04-01 14:57
mixins.py
7.14
KB
-rw-r--r--
2020-04-01 14:57
mlsrulequery.py
4.59
KB
-rw-r--r--
2020-04-01 14:57
netifconquery.py
2.93
KB
-rw-r--r--
2020-04-01 14:57
nodeconquery.py
4.16
KB
-rw-r--r--
2020-04-01 14:57
objclassquery.py
3.78
KB
-rw-r--r--
2020-04-01 14:57
pcideviceconquery.py
3.04
KB
-rw-r--r--
2020-04-01 14:57
perm_map
87.16
KB
-rw-r--r--
2020-04-01 14:57
permmap.py
16.1
KB
-rw-r--r--
2020-04-01 14:57
pirqconquery.py
2.95
KB
-rw-r--r--
2020-04-01 14:57
polcapquery.py
1.64
KB
-rw-r--r--
2020-04-01 14:57
policyrep.cpython-36m-x86_64-linux-gnu.so
1.87
MB
-rwxr-xr-x
2023-10-15 02:32
portconquery.py
5.04
KB
-rw-r--r--
2020-04-01 14:57
query.py
1.69
KB
-rw-r--r--
2020-04-01 14:57
rbacrulequery.py
5.61
KB
-rw-r--r--
2020-04-01 14:57
rolequery.py
2.48
KB
-rw-r--r--
2020-04-01 14:57
sensitivityquery.py
2.65
KB
-rw-r--r--
2020-04-01 14:57
terulequery.py
9.11
KB
-rw-r--r--
2020-04-01 14:57
typeattrquery.py
2.62
KB
-rw-r--r--
2020-04-01 14:57
typequery.py
3.43
KB
-rw-r--r--
2020-04-01 14:57
userquery.py
4.68
KB
-rw-r--r--
2020-04-01 14:57
util.py
5.32
KB
-rw-r--r--
2020-04-01 14:57
Save
Rename
# Copyright 2015, Tresys Technology, LLC # # This file is part of SETools. # # SETools is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License as # published by the Free Software Foundation, either version 2.1 of # the License, or (at your option) any later version. # # SETools is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with SETools. If not, see # <http://www.gnu.org/licenses/>. # import logging import re from .descriptors import CriteriaDescriptor, CriteriaSetDescriptor from .exception import ConstraintUseError from .mixins import MatchObjClass, MatchPermission from .policyrep import ConstraintRuletype from .query import PolicyQuery from .util import match_in_set class ConstraintQuery(MatchObjClass, MatchPermission, PolicyQuery): """ Query constraint rules, (mls)constrain/(mls)validatetrans. Parameter: policy The policy to query. Keyword Parameters/Class attributes: ruletype The list of rule type(s) to match. tclass The object class(es) to match. tclass_regex If true, use a regular expression for matching the rule's object class. perms The permission(s) to match. perms_equal If true, the permission set of the rule must exactly match the permissions criteria. If false, any set intersection will match. perms_regex If true, regular expression matching will be used on the permission names instead of set logic. role The name of the role to match in the constraint expression. role_indirect If true, members of an attribute will be matched rather than the attribute itself. role_regex If true, regular expression matching will be used on the role. type_ The name of the type/attribute to match in the constraint expression. type_indirect If true, members of an attribute will be matched rather than the attribute itself. type_regex If true, regular expression matching will be used on the type/attribute. user The name of the user to match in the constraint expression. user_regex If true, regular expression matching will be used on the user. """ ruletype = CriteriaSetDescriptor(enum_class=ConstraintRuletype) user = CriteriaDescriptor("user_regex", "lookup_user") user_regex = False role = CriteriaDescriptor("role_regex", "lookup_role") role_regex = False role_indirect = True type_ = CriteriaDescriptor("type_regex", "lookup_type_or_attr") type_regex = False type_indirect = True def __init__(self, policy, **kwargs): super(ConstraintQuery, self).__init__(policy, **kwargs) self.log = logging.getLogger(__name__) def _match_expr(self, expr, criteria, indirect, regex): """ Match roles/types/users in a constraint expression, optionally by expanding the contents of attributes. Parameters: expr The expression to match. criteria The criteria to match. indirect If attributes in the expression should be expanded. regex If regular expression matching should be used. """ if indirect: obj = set() for item in expr: obj.update(item.expand()) else: obj = expr return match_in_set(obj, criteria, regex) def results(self): """Generator which yields all matching constraints rules.""" self.log.info("Generating constraint results from {0.policy}".format(self)) self.log.debug("Ruletypes: {0.ruletype}".format(self)) self._match_object_class_debug(self.log) self._match_perms_debug(self.log) self.log.debug("User: {0.user!r}, regex: {0.user_regex}".format(self)) self.log.debug("Role: {0.role!r}, regex: {0.role_regex}".format(self)) self.log.debug("Type: {0.type_!r}, regex: {0.type_regex}".format(self)) for c in self.policy.constraints(): if self.ruletype: if c.ruletype not in self.ruletype: continue if not self._match_object_class(c): continue try: if not self._match_perms(c): continue except ConstraintUseError: continue if self.role and not self._match_expr( c.expression.roles, self.role, self.role_indirect, self.role_regex): continue if self.type_ and not self._match_expr( c.expression.types, self.type_, self.type_indirect, self.type_regex): continue if self.user and not self._match_expr( c.expression.users, self.user, False, self.user_regex): continue yield c