[ SYSTEM ]: Linux srv.persadacompanies.com 4.18.0-553.56.1.el8_10.x86_64 #1 SMP Tue Jun 10 05:00:59 EDT 2025 x86_64
[ SERVER ]: Apache | PHP: 8.4.19
[ USER ]: persadamedika | IP: 45.64.1.108
GEFORCE FILE MANAGER
/
usr
/
lib64
/
python3.6
/
site-packages
/
setools
/
UPLOAD:
NAME
SIZE
QUICK PERMS
ACTIONS
📁 __pycache__
SET
[ DEL ]
📁 diff
SET
[ DEL ]
📄 __init__.py
2,856 B
SET
[ EDIT ]
|
[ DEL ]
📄 boolquery.py
2,239 B
SET
[ EDIT ]
|
[ DEL ]
📄 boundsquery.py
2,406 B
SET
[ EDIT ]
|
[ DEL ]
📄 categoryquery.py
1,922 B
SET
[ EDIT ]
|
[ DEL ]
📄 commonquery.py
2,164 B
SET
[ EDIT ]
|
[ DEL ]
📄 constraintquery.py
5,634 B
SET
[ EDIT ]
|
[ DEL ]
📄 defaultquery.py
2,865 B
SET
[ EDIT ]
|
[ DEL ]
📄 descriptors.py
7,650 B
SET
[ EDIT ]
|
[ DEL ]
📄 devicetreeconquery.py
2,788 B
SET
[ EDIT ]
|
[ DEL ]
📄 dta.py
21,918 B
SET
[ EDIT ]
|
[ DEL ]
📄 exception.py
6,109 B
SET
[ EDIT ]
|
[ DEL ]
📄 fsusequery.py
3,437 B
SET
[ EDIT ]
|
[ DEL ]
📄 genfsconquery.py
3,770 B
SET
[ EDIT ]
|
[ DEL ]
📄 ibendportconquery.py
3,608 B
SET
[ EDIT ]
|
[ DEL ]
📄 ibpkeyconquery.py
5,346 B
SET
[ EDIT ]
|
[ DEL ]
📄 infoflow.py
14,939 B
SET
[ EDIT ]
|
[ DEL ]
📄 initsidquery.py
2,860 B
SET
[ EDIT ]
|
[ DEL ]
📄 iomemconquery.py
4,544 B
SET
[ EDIT ]
|
[ DEL ]
📄 ioportconquery.py
4,567 B
SET
[ EDIT ]
|
[ DEL ]
📄 mixins.py
7,312 B
SET
[ EDIT ]
|
[ DEL ]
📄 mlsrulequery.py
4,703 B
SET
[ EDIT ]
|
[ DEL ]
📄 netifconquery.py
3,003 B
SET
[ EDIT ]
|
[ DEL ]
📄 nodeconquery.py
4,261 B
SET
[ EDIT ]
|
[ DEL ]
📄 objclassquery.py
3,871 B
SET
[ EDIT ]
|
[ DEL ]
📄 pcideviceconquery.py
3,116 B
SET
[ EDIT ]
|
[ DEL ]
📄 perm_map
89,255 B
SET
[ EDIT ]
|
[ DEL ]
📄 permmap.py
16,490 B
SET
[ EDIT ]
|
[ DEL ]
📄 pirqconquery.py
3,022 B
SET
[ EDIT ]
|
[ DEL ]
📄 polcapquery.py
1,675 B
SET
[ EDIT ]
|
[ DEL ]
📄 policyrep.cpython-36m-x86_64-linux-gnu.so
1,963,568 B
SET
[ EDIT ]
|
[ DEL ]
📄 portconquery.py
5,166 B
SET
[ EDIT ]
|
[ DEL ]
📄 query.py
1,734 B
SET
[ EDIT ]
|
[ DEL ]
📄 rbacrulequery.py
5,748 B
SET
[ EDIT ]
|
[ DEL ]
📄 rolequery.py
2,540 B
SET
[ EDIT ]
|
[ DEL ]
📄 sensitivityquery.py
2,718 B
SET
[ EDIT ]
|
[ DEL ]
📄 terulequery.py
9,324 B
SET
[ EDIT ]
|
[ DEL ]
📄 typeattrquery.py
2,682 B
SET
[ EDIT ]
|
[ DEL ]
📄 typequery.py
3,512 B
SET
[ EDIT ]
|
[ DEL ]
📄 userquery.py
4,791 B
SET
[ EDIT ]
|
[ DEL ]
📄 util.py
5,444 B
SET
[ EDIT ]
|
[ DEL ]
DELETE SELECTED
[ CLOSE ]
EDIT: nodeconquery.py
# Copyright 2014-2015, Tresys Technology, LLC # Copyright 2017, Chris PeBenito <pebenito@ieee.org> # # This file is part of SETools. # # SETools is free software: you can redistribute it and/or modify # it under the terms of the GNU Lesser General Public License as # published by the Free Software Foundation, either version 2.1 of # the License, or (at your option) any later version. # # SETools is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU Lesser General Public License for more details. # # You should have received a copy of the GNU Lesser General Public # License along with SETools. If not, see # <http://www.gnu.org/licenses/>. # import ipaddress import logging from socket import AF_INET, AF_INET6 from .mixins import MatchContext from .policyrep import NodeconIPVersion from .query import PolicyQuery class NodeconQuery(MatchContext, PolicyQuery): """ Query nodecon statements. Parameter: policy The policy to query. Keyword Parameters/Class attributes: network The IPv4/IPv6 address or IPv4/IPv6 network address with netmask, e.g. 192.168.1.0/255.255.255.0 or "192.168.1.0/24". network_overlap If true, the net will match if it overlaps with the nodecon's network instead of equality. ip_version The IP version of the nodecon to match. (socket.AF_INET for IPv4 or socket.AF_INET6 for IPv6) user The criteria to match the context's user. user_regex If true, regular expression matching will be used on the user. role The criteria to match the context's role. role_regex If true, regular expression matching will be used on the role. type_ The criteria to match the context's type. type_regex If true, regular expression matching will be used on the type. range_ The criteria to match the context's range. range_subset If true, the criteria will match if it is a subset of the context's range. range_overlap If true, the criteria will match if it overlaps any of the context's range. range_superset If true, the criteria will match if it is a superset of the context's range. range_proper If true, use proper superset/subset operations. No effect if not using set operations. """ _network = None network_overlap = False _ip_version = None @property def ip_version(self): return self._ip_version @ip_version.setter def ip_version(self, value): if value: self._ip_version = NodeconIPVersion.lookup(value) else: self._ip_version = None @property def network(self): return self._network @network.setter def network(self, value): if value: self._network = ipaddress.ip_network(value) else: self._network = None def __init__(self, policy, **kwargs): super(NodeconQuery, self).__init__(policy, **kwargs) self.log = logging.getLogger(__name__) def results(self): """Generator which yields all matching nodecons.""" self.log.info("Generating nodecon results from {0.policy}".format(self)) self.log.debug("Network: {0.network!r}, overlap: {0.network_overlap}".format(self)) self.log.debug("IP Version: {0.ip_version!r}".format(self)) self._match_context_debug(self.log) for nodecon in self.policy.nodecons(): if self.network: if self.network_overlap: if not self.network.overlaps(nodecon.network): continue else: if not nodecon.network == self.network: continue if self.ip_version and self.ip_version != nodecon.ip_version: continue if not self._match_context(nodecon.context): continue yield nodecon