OXIESEC PANEL
- Current Dir:
/
/
lib64
/
python3.9
/
site-packages
/
setools
Server IP: 103.185.75.71
Upload:
Create Dir:
Name
Size
Modified
Perms
📁
..
-
12/27/2025 09:20:39 AM
rwxr-xr-x
📄
__init__.py
3.24 KB
12/07/2023 03:49:05 PM
rw-r--r--
📁
__pycache__
-
08/27/2025 09:38:37 AM
rwxr-xr-x
📄
boolquery.py
1.7 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
boundsquery.py
1.8 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
categoryquery.py
1.34 KB
12/07/2023 03:49:05 PM
rw-r--r--
📁
checker
-
08/27/2025 09:38:36 AM
rwxr-xr-x
📄
commonquery.py
1.58 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
constraintquery.py
4.99 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
defaultquery.py
2.29 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
descriptors.py
9.7 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
devicetreeconquery.py
2.22 KB
12/07/2023 03:49:05 PM
rw-r--r--
📁
diff
-
08/27/2025 09:38:36 AM
rwxr-xr-x
📄
dta.py
22.67 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
exception.py
5.96 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
fsusequery.py
2.8 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
genfsconquery.py
3.18 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
ibendportconquery.py
3.05 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
ibpkeyconquery.py
4.89 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
infoflow.py
15.54 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
initsidquery.py
2.25 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
iomemconquery.py
4 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
ioportconquery.py
4.02 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
mixins.py
6.82 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
mlsrulequery.py
4.09 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
netifconquery.py
2.4 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
nodeconquery.py
3.9 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
objclassquery.py
3.27 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
pcideviceconquery.py
2.58 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
perm_map
84.1 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
permmap.py
16.2 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
pirqconquery.py
2.48 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
polcapquery.py
1.12 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
policyrep.cpython-39-x86_64-linux-gnu.so
1.45 MB
04/03/2024 04:13:25 PM
rwxr-xr-x
📄
policyrep.pyi
51.03 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
portconquery.py
4.77 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
py.typed
0 bytes
12/07/2023 03:49:05 PM
rw-r--r--
📄
query.py
1.24 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
rbacrulequery.py
5.33 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
rolequery.py
1.95 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
sensitivityquery.py
2.22 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
terulequery.py
8.73 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
typeattrquery.py
2.11 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
typequery.py
2.95 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
userquery.py
4.19 KB
12/07/2023 03:49:05 PM
rw-r--r--
📄
util.py
7.59 KB
12/07/2023 03:49:05 PM
rw-r--r--
Editing: rbacrulequery.py
Close
# Copyright 2014-2015, Tresys Technology, LLC # # SPDX-License-Identifier: LGPL-2.1-only # import logging import re from typing import cast, Iterable, Optional, Pattern, Union from . import mixins, query from .descriptors import CriteriaDescriptor, CriteriaSetDescriptor from .exception import InvalidType, RuleUseError from .policyrep import AnyRBACRule, RBACRuletype, Role, TypeOrAttr from .util import match_indirect_regex class RBACRuleQuery(mixins.MatchObjClass, query.PolicyQuery): """ Query the RBAC rules. Parameter: policy The policy to query. Keyword Parameters/Class attributes: ruletype The list of rule type(s) to match. source The name of the source role/attribute to match. source_indirect If true, members of an attribute will be matched rather than the attribute itself. source_regex If true, regular expression matching will be used on the source role/attribute. Obeys the source_indirect option. target The name of the target role/attribute to match. target_indirect If true, members of an attribute will be matched rather than the attribute itself. target_regex If true, regular expression matching will be used on the target role/attribute. Obeys target_indirect option. tclass The object class(es) to match. tclass_regex If true, use a regular expression for matching the rule's object class. default The name of the default role to match. default_regex If true, regular expression matching will be used on the default role. """ ruletype = CriteriaSetDescriptor(enum_class=RBACRuletype) source = CriteriaDescriptor("source_regex", "lookup_role") source_regex: bool = False source_indirect: bool = True _target: Optional[Union[Pattern, Role, TypeOrAttr]] = None target_regex: bool = False target_indirect: bool = True tclass = CriteriaSetDescriptor("tclass_regex", "lookup_class") tclass_regex: bool = False default = CriteriaDescriptor("default_regex", "lookup_role") default_regex: bool = False @property def target(self) -> Optional[Union[Pattern, Role, TypeOrAttr]]: return self._target @target.setter def target(self, value: Optional[Union[str, Role, TypeOrAttr]]) -> None: if not value: self._target = None elif self.target_regex: self._target = re.compile(value) else: try: self._target = self.policy.lookup_type_or_attr(cast(Union[str, TypeOrAttr], value)) except InvalidType: self._target = self.policy.lookup_role(cast(Union[str, Role], value)) def __init__(self, policy, **kwargs) -> None: super(RBACRuleQuery, self).__init__(policy, **kwargs) self.log = logging.getLogger(__name__) def results(self) -> Iterable[AnyRBACRule]: """Generator which yields all matching RBAC rules.""" self.log.info("Generating RBAC rule results from {0.policy}".format(self)) self.log.debug("Ruletypes: {0.ruletype}".format(self)) self.log.debug("Source: {0.source!r}, indirect: {0.source_indirect}, " "regex: {0.source_regex}".format(self)) self.log.debug("Target: {0.target!r}, indirect: {0.target_indirect}, " "regex: {0.target_regex}".format(self)) self._match_object_class_debug(self.log) self.log.debug("Default: {0.default!r}, regex: {0.default_regex}".format(self)) for rule in self.policy.rbacrules(): # # Matching on rule type # if self.ruletype: if rule.ruletype not in self.ruletype: continue # # Matching on source role # if self.source and not match_indirect_regex( rule.source, self.source, self.source_indirect, self.source_regex): continue # # Matching on target type (role_transition)/role(allow) # if self.target and not match_indirect_regex( rule.target, self.target, self.target_indirect, self.target_regex): continue # # Matching on object class # try: if not self._match_object_class(rule): continue except RuleUseError: continue # # Matching on default role # if self.default: try: # because default role is always a single # role, hard-code indirect to True # so the criteria can be an attribute if not match_indirect_regex( rule.default, self.default, True, self.default_regex): continue except RuleUseError: continue # if we get here, we have matched all available criteria yield rule