Server IP : 80.87.202.40 / Your IP : 216.73.216.169 Web Server : Apache System : Linux rospirotorg.ru 5.14.0-539.el9.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Dec 5 22:26:13 UTC 2024 x86_64 User : bitrix ( 600) PHP Version : 8.2.27 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /lib64/python3.9/site-packages/setools/checker/ |
Upload File : |
# Copyright 2020, Chris PeBenito <pebenito@ieee.org> # # SPDX-License-Identifier: LGPL-2.1-only # import re from typing import Callable, Union from ..exception import InvalidCheckValue from ..descriptors import CriteriaDescriptor, CriteriaPermissionSetDescriptor class ConfigDescriptor(CriteriaDescriptor): """ Single item configuration option descriptor. Parameter: lookup_function The name of the SELinuxPolicy lookup function, e.g. lookup_type or lookup_boolean. Read-only instance attribute use (obj parameter): checkname The name of the check. policy The instance of SELinuxPolicy """ def __init__(self, lookup_function: Union[Callable, str]) -> None: super().__init__(lookup_function=lookup_function) def __set__(self, obj, value): if not value: self.instances[obj] = None else: try: super().__set__(obj, value.strip()) except ValueError as ex: raise InvalidCheckValue("{}: Invalid {} setting: {}".format( obj.checkname, self.name, ex)) from ex class ConfigSetDescriptor(CriteriaDescriptor): """ Descriptor for a configuration option set. Parameter: lookup_function The name of the SELinuxPolicy lookup function, e.g. lookup_type or lookup_boolean. Keyword Parameters: strict (Bool) If True, all objects must exist in the policy when setting the value. If False, any objects that fail the policy lookup will be dropped instead of raising an exception. The default is True. expand (Bool) If True, each object will be expanded. Default is False. Read-only instance attribute use (obj parameter): checkname The name of the check. log A logger instance. policy The instance of SELinuxPolicy """ def __init__(self, lookup_function: Union[Callable, str], strict: bool = True, expand: bool = False) -> None: super().__init__(lookup_function=lookup_function, default_value=frozenset()) self.strict = strict self.expand = expand def __set__(self, obj, value): if not value: self.instances[obj] = frozenset() else: log = obj.log if callable(self.lookup_function): lookup = self.lookup_function else: lookup = getattr(obj.policy, self.lookup_function) ret = set() for item in (i for i in re.split(r"\s", value) if i): try: o = lookup(item) if self.expand: ret.update(o.expand()) else: ret.add(o) except ValueError as e: if self.strict: log.error("Invalid {} item: {}".format(self.name, e)) log.debug("Traceback:", exc_info=e) raise InvalidCheckValue("{}: Invalid {} item: {}".format( obj.checkname, self.name, e)) from e log.info("{}: Invalid {} item: {}".format( obj.checkname, self.name, e)) self.instances[obj] = frozenset(ret) class ConfigPermissionSetDescriptor(CriteriaPermissionSetDescriptor): """ Descriptor for a configuration permissions set. Read-only instance attribute use (obj parameter): checkname The name of the check. policy The instance of SELinuxPolicy tclass If it exists, it will be used to validate the permissions. See validate_perms_any() """ def __init__(self) -> None: super().__init__(default_value=frozenset()) def __set__(self, obj, value): if not value: self.instances[obj] = frozenset() else: try: super().__set__(obj, (v for v in value.split(" ") if v)) except ValueError as ex: raise InvalidCheckValue("{}: Invalid {} setting: {}".format( obj.checkname, self.name, ex)) from ex