Linux srv25.usacloudserver.us 5.14.0-570.39.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Thu Sep 4 05:08:52 EDT 2025 x86_64
LiteSpeed
Server IP : 23.137.84.82 & Your IP : 216.73.216.127
Domains :
Cant Read [ /etc/named.conf ]
User : epicgamerzoneco
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
lib64 /
python3.9 /
site-packages /
setools /
Delete
Unzip
Name
Size
Permission
Date
Action
__pycache__
[ DIR ]
drwxr-xr-x
2025-08-15 18:09
checker
[ DIR ]
drwxr-xr-x
2025-08-15 18:09
diff
[ DIR ]
drwxr-xr-x
2025-08-15 18:09
__init__.py
3.24
KB
-rw-r--r--
2023-12-07 15:49
boolquery.py
1.7
KB
-rw-r--r--
2023-12-07 15:49
boundsquery.py
1.8
KB
-rw-r--r--
2023-12-07 15:49
categoryquery.py
1.34
KB
-rw-r--r--
2023-12-07 15:49
commonquery.py
1.58
KB
-rw-r--r--
2023-12-07 15:49
constraintquery.py
4.99
KB
-rw-r--r--
2023-12-07 15:49
defaultquery.py
2.29
KB
-rw-r--r--
2023-12-07 15:49
descriptors.py
9.7
KB
-rw-r--r--
2023-12-07 15:49
devicetreeconquery.py
2.22
KB
-rw-r--r--
2023-12-07 15:49
dta.py
22.67
KB
-rw-r--r--
2023-12-07 15:49
exception.py
5.96
KB
-rw-r--r--
2023-12-07 15:49
fsusequery.py
2.8
KB
-rw-r--r--
2023-12-07 15:49
genfsconquery.py
3.18
KB
-rw-r--r--
2023-12-07 15:49
ibendportconquery.py
3.05
KB
-rw-r--r--
2023-12-07 15:49
ibpkeyconquery.py
4.89
KB
-rw-r--r--
2023-12-07 15:49
infoflow.py
15.54
KB
-rw-r--r--
2023-12-07 15:49
initsidquery.py
2.25
KB
-rw-r--r--
2023-12-07 15:49
iomemconquery.py
4
KB
-rw-r--r--
2023-12-07 15:49
ioportconquery.py
4.02
KB
-rw-r--r--
2023-12-07 15:49
mixins.py
6.82
KB
-rw-r--r--
2023-12-07 15:49
mlsrulequery.py
4.09
KB
-rw-r--r--
2023-12-07 15:49
netifconquery.py
2.4
KB
-rw-r--r--
2023-12-07 15:49
nodeconquery.py
3.9
KB
-rw-r--r--
2023-12-07 15:49
objclassquery.py
3.27
KB
-rw-r--r--
2023-12-07 15:49
pcideviceconquery.py
2.58
KB
-rw-r--r--
2023-12-07 15:49
perm_map
84.1
KB
-rw-r--r--
2023-12-07 15:49
permmap.py
16.2
KB
-rw-r--r--
2023-12-07 15:49
pirqconquery.py
2.48
KB
-rw-r--r--
2023-12-07 15:49
polcapquery.py
1.12
KB
-rw-r--r--
2023-12-07 15:49
policyrep.cpython-39-x86_64-linux-gnu.so
1.45
MB
-rwxr-xr-x
2024-04-03 16:13
policyrep.pyi
51.03
KB
-rw-r--r--
2023-12-07 15:49
portconquery.py
4.77
KB
-rw-r--r--
2023-12-07 15:49
py.typed
0
B
-rw-r--r--
2023-12-07 15:49
query.py
1.24
KB
-rw-r--r--
2023-12-07 15:49
rbacrulequery.py
5.33
KB
-rw-r--r--
2023-12-07 15:49
rolequery.py
1.95
KB
-rw-r--r--
2023-12-07 15:49
sensitivityquery.py
2.22
KB
-rw-r--r--
2023-12-07 15:49
terulequery.py
8.73
KB
-rw-r--r--
2023-12-07 15:49
typeattrquery.py
2.11
KB
-rw-r--r--
2023-12-07 15:49
typequery.py
2.95
KB
-rw-r--r--
2023-12-07 15:49
userquery.py
4.19
KB
-rw-r--r--
2023-12-07 15:49
util.py
7.59
KB
-rw-r--r--
2023-12-07 15:49
Save
Rename
# Copyright 2014-2015, Tresys Technology, LLC # # SPDX-License-Identifier: LGPL-2.1-only # import logging import re from typing import Iterable from .descriptors import CriteriaDescriptor, CriteriaSetDescriptor from .mixins import MatchName from .policyrep import User from .query import PolicyQuery from .util import match_regex_or_set, match_level, match_range class UserQuery(MatchName, PolicyQuery): """ Query SELinux policy users. Parameter: policy The policy to query. Keyword Parameters/Class attributes: name The user name to match. name_regex If true, regular expression matching will be used on the user names. roles The attribute to match. roles_equal If true, only types with role sets that are equal to the criteria will match. Otherwise, any intersection will match. roles_regex If true, regular expression matching will be used on the role names instead of set logic. level The criteria to match the user's default level. level_dom If true, the criteria will match if it dominates the user's default level. level_domby If true, the criteria will match if it is dominated by the user's default level. level_incomp If true, the criteria will match if it is incomparable to the user's default level. range_ The criteria to match the user's range. range_subset If true, the criteria will match if it is a subset of the user's range. range_overlap If true, the criteria will match if it overlaps any of the user's range. range_superset If true, the criteria will match if it is a superset of the user's range. range_proper If true, use proper superset/subset operations. No effect if not using set operations. """ level = CriteriaDescriptor(lookup_function="lookup_level") level_dom: bool = False level_domby: bool = False level_incomp: bool = False range_ = CriteriaDescriptor(lookup_function="lookup_range") range_overlap: bool = False range_subset: bool = False range_superset: bool = False range_proper: bool = False roles = CriteriaSetDescriptor("roles_regex", "lookup_role") roles_equal: bool = False roles_regex: bool = False def __init__(self, policy, **kwargs) -> None: super(UserQuery, self).__init__(policy, **kwargs) self.log = logging.getLogger(__name__) def results(self) -> Iterable[User]: """Generator which yields all matching users.""" self.log.info("Generating user results from {0.policy}".format(self)) self._match_name_debug(self.log) self.log.debug("Roles: {0.roles!r}, regex: {0.roles_regex}, " "eq: {0.roles_equal}".format(self)) self.log.debug("Level: {0.level!r}, dom: {0.level_dom}, domby: {0.level_domby}, " "incomp: {0.level_incomp}".format(self)) self.log.debug("Range: {0.range_!r}, subset: {0.range_subset}, overlap: {0.range_overlap}, " "superset: {0.range_superset}, proper: {0.range_proper}".format(self)) for user in self.policy.users(): if not self._match_name(user): continue if self.roles and not match_regex_or_set( user.roles, self.roles, self.roles_equal, self.roles_regex): continue if self.level and not match_level( user.mls_level, self.level, self.level_dom, self.level_domby, self.level_incomp): continue if self.range_ and not match_range( user.mls_range, self.range_, self.range_subset, self.range_overlap, self.range_superset, self.range_proper): continue yield user