blob: e794da7ff91136a979777498d137defa9c5ce5fd [file] [log] [blame]
#!/usr/bin/env python
# Copyright 2014-2015, Tresys Technology, LLC
#
# This file is part of SETools.
#
# SETools is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 2 of the License, or
# (at your option) any later version.
#
# SETools is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with SETools. If not, see <http://www.gnu.org/licenses/>.
#
from __future__ import print_function
import setools
import argparse
import sys
import logging
def expand_attr(attr):
"""Render type and role attributes."""
items = "\n\t".join(sorted(str(i) for i in attr.expand()))
contents = items if items else "<empty attribute>"
return "{0}\n\t{1}".format(attr.statement(), contents)
parser = argparse.ArgumentParser(
description="SELinux policy information tool.")
parser.add_argument("--version", action="version", version=setools.__version__)
parser.add_argument("policy", help="Path to the SELinux policy to query.", nargs="?")
parser.add_argument("-x", "--expand", action="store_true",
help="Print additional information about the specified components.")
parser.add_argument("--flat", help="Print without item count nor indentation.",
dest="flat", default=False, action="store_true")
parser.add_argument("-v", "--verbose", action="store_true",
help="Print extra informational messages")
parser.add_argument("--debug", action="store_true", dest="debug", help="Enable debugging.")
queries = parser.add_argument_group("Component Queries")
queries.add_argument("-a", "--attribute", help="Print type attributes.", dest="typeattrquery",
nargs='?', const=True, metavar="ATTR")
queries.add_argument("-b", "--bool", help="Print Booleans.", dest="boolquery",
nargs='?', const=True, metavar="BOOL")
queries.add_argument("-c", "--class", help="Print object classes.", dest="classquery",
nargs='?', const=True, metavar="CLASS")
queries.add_argument("-r", "--role", help="Print roles.", dest="rolequery",
nargs='?', const=True, metavar="ROLE")
queries.add_argument("-t", "--type", help="Print types.", dest="typequery",
nargs='?', const=True, metavar="TYPE")
queries.add_argument("-u", "--user", help="Print users.", dest="userquery",
nargs='?', const=True, metavar="USER")
queries.add_argument("--category", help="Print MLS categories.", dest="mlscatsquery",
nargs='?', const=True, metavar="CAT")
queries.add_argument("--common", help="Print common permission set.", dest="commonquery",
nargs='?', const=True, metavar="COMMON")
queries.add_argument("--constrain", help="Print constraints.", dest="constraintquery",
nargs='?', const=True, metavar="CLASS")
queries.add_argument("--default", help="Print default_* rules.", dest="defaultquery",
nargs='?', const=True, metavar="CLASS")
queries.add_argument("--fs_use", help="Print fs_use statements.", dest="fsusequery",
nargs='?', const=True, metavar="FS_TYPE")
queries.add_argument("--genfscon", help="Print genfscon statements.", dest="genfsconquery",
nargs='?', const=True, metavar="FS_TYPE")
queries.add_argument("--initialsid", help="Print initial SIDs (contexts).", dest="initialsidquery",
nargs='?', const=True, metavar="NAME")
queries.add_argument("--netifcon", help="Print netifcon statements.", dest="netifconquery",
nargs='?', const=True, metavar="DEVICE")
queries.add_argument("--nodecon", help="Print nodecon statements.", dest="nodeconquery",
nargs='?', const=True, metavar="ADDR")
queries.add_argument("--permissive", help="Print permissive types.", dest="permissivequery",
nargs='?', const=True, metavar="TYPE")
queries.add_argument("--polcap", help="Print policy capabilities.", dest="polcapquery",
nargs='?', const=True, metavar="NAME")
queries.add_argument("--portcon", help="Print portcon statements.", dest="portconquery",
nargs='?', const=True, metavar="PORTNUM[-PORTNUM]")
queries.add_argument("--sensitivity", help="Print MLS sensitivities.", dest="mlssensquery",
nargs='?', const=True, metavar="SENS")
queries.add_argument("--typebounds", help="Print typebounds statements.", dest="typeboundsquery",
nargs='?', const=True, metavar="BOUND_TYPE")
queries.add_argument("--validatetrans", help="Print validatetrans.", dest="validatetransquery",
nargs='?', const=True, metavar="CLASS")
queries.add_argument("--all", help="Print all of the above. On a Xen policy, the Xen components "
"will also be printed", dest="all", default=False, action="store_true")
xen = parser.add_argument_group("Xen Component Queries")
xen.add_argument("--ioportcon", help="Print all ioportcon statements.", dest="ioportconquery",
default=False, action="store_true")
xen.add_argument("--iomemcon", help="Print all iomemcon statements.", dest="iomemconquery",
default=False, action="store_true")
xen.add_argument("--pcidevicecon", help="Print all pcidevicecon statements.",
dest="pcideviceconquery", default=False, action="store_true")
xen.add_argument("--pirqcon", help="Print all pirqcon statements.", dest="pirqconquery",
default=False, action="store_true")
xen.add_argument("--devicetreecon", help="Print all devicetreecon statements.",
dest="devicetreeconquery", default=False, action="store_true")
args = parser.parse_args()
if args.debug:
logging.basicConfig(level=logging.DEBUG,
format='%(asctime)s|%(levelname)s|%(name)s|%(message)s')
elif args.verbose:
logging.basicConfig(level=logging.INFO, format='%(message)s')
else:
logging.basicConfig(level=logging.WARNING, format='%(message)s')
try:
p = setools.SELinuxPolicy(args.policy)
components = []
if args.boolquery or args.all:
q = setools.BoolQuery(p)
if isinstance(args.boolquery, str):
q.name = args.boolquery
components.append(("Booleans", q, lambda x: x.statement()))
if args.mlscatsquery or args.all:
q = setools.CategoryQuery(p)
if isinstance(args.mlscatsquery, str):
q.name = args.mlscatsquery
components.append(("Categories", q, lambda x: x.statement()))
if args.classquery or args.all:
q = setools.ObjClassQuery(p)
if isinstance(args.classquery, str):
q.name = args.classquery
components.append(("Classes", q, lambda x: x.statement()))
if args.commonquery or args.all:
q = setools.CommonQuery(p)
if isinstance(args.commonquery, str):
q.name = args.commonquery
components.append(("Commons", q, lambda x: x.statement()))
if args.constraintquery or args.all:
q = setools.ConstraintQuery(p, ruletype=["constrain", "mlsconstrain"])
if isinstance(args.constraintquery, str):
q.tclass = [args.constraintquery]
components.append(("Constraints", q, lambda x: x.statement()))
if args.defaultquery or args.all:
q = setools.DefaultQuery(p)
if isinstance(args.defaultquery, str):
q.tclass = [args.defaultquery]
components.append(("Default rules", q, lambda x: x.statement()))
if args.fsusequery or args.all:
q = setools.FSUseQuery(p)
if isinstance(args.fsusequery, str):
q.fs = args.fsusequery
components.append(("Fs_use", q, lambda x: x.statement()))
if args.genfsconquery or args.all:
q = setools.GenfsconQuery(p)
if isinstance(args.genfsconquery, str):
q.fs = args.genfsconquery
components.append(("Genfscon", q, lambda x: x.statement()))
if args.initialsidquery or args.all:
q = setools.InitialSIDQuery(p)
if isinstance(args.initialsidquery, str):
q.name = args.initialsidquery
components.append(("Initial SIDs", q, lambda x: x.statement()))
if args.netifconquery or args.all:
q = setools.NetifconQuery(p)
if isinstance(args.netifconquery, str):
q.name = args.netifconquery
components.append(("Netifcon", q, lambda x: x.statement()))
if args.nodeconquery or args.all:
q = setools.NodeconQuery(p)
if isinstance(args.nodeconquery, str):
q.network = args.nodeconquery
components.append(("Nodecon", q, lambda x: x.statement()))
if args.permissivequery or args.all:
q = setools.TypeQuery(p, permissive=True, match_permissive=True)
if isinstance(args.permissivequery, str):
q.name = args.permissivequery
components.append(("Permissive Types", q, lambda x: x.statement()))
if args.polcapquery or args.all:
q = setools.PolCapQuery(p)
if isinstance(args.polcapquery, str):
q.name = args.polcapquery
components.append(("Polcap", q, lambda x: x.statement()))
if args.portconquery or args.all:
q = setools.PortconQuery(p)
if isinstance(args.portconquery, str):
try:
ports = [int(i) for i in args.portconquery.split("-")]
except ValueError:
parser.error("Enter a port number or range, e.g. 22 or 6000-6020")
if len(ports) == 2:
q.ports = ports
elif len(ports) == 1:
q.ports = (ports[0], ports[0])
else:
parser.error("Enter a port number or range, e.g. 22 or 6000-6020")
components.append(("Portcon", q, lambda x: x.statement()))
if args.rolequery or args.all:
q = setools.RoleQuery(p)
if isinstance(args.rolequery, str):
q.name = args.rolequery
components.append(("Roles", q, lambda x: x.statement()))
if args.mlssensquery or args.all:
q = setools.SensitivityQuery(p)
if isinstance(args.mlssensquery, str):
q.name = args.mlssensquery
components.append(("Sensitivities", q, lambda x: x.statement()))
if args.typeboundsquery or args.all:
q = setools.BoundsQuery(p, ruletype=["typebounds"])
if isinstance(args.typeboundsquery, str):
q.child = args.typeboundsquery
components.append(("Typebounds", q, lambda x: x.statement()))
if args.typequery or args.all:
q = setools.TypeQuery(p)
if isinstance(args.typequery, str):
q.name = args.typequery
components.append(("Types", q, lambda x: x.statement()))
if args.typeattrquery or args.all:
q = setools.TypeAttributeQuery(p)
if isinstance(args.typeattrquery, str):
q.name = args.typeattrquery
components.append(("Type Attributes", q, expand_attr))
if args.userquery or args.all:
q = setools.UserQuery(p)
if isinstance(args.userquery, str):
q.name = args.userquery
components.append(("Users", q, lambda x: x.statement()))
if args.validatetransquery or args.all:
q = setools.ConstraintQuery(p, ruletype=["validatetrans", "mlsvalidatetrans"])
if isinstance(args.validatetransquery, str):
q.tclass = [args.validatetransquery]
components.append(("Validatetrans", q, lambda x: x.statement()))
if p.target_platform == "xen":
if args.ioportconquery or args.all:
q = setools.IoportconQuery(p)
components.append(("Ioportcon", q, lambda x: x.statement()))
if args.iomemconquery or args.all:
q = setools.IomemconQuery(p)
components.append(("Iomemcon", q, lambda x: x.statement()))
if args.pcideviceconquery or args.all:
q = setools.PcideviceconQuery(p)
components.append(("Pcidevicecon", q, lambda x: x.statement()))
if args.pirqconquery or args.all:
q = setools.PirqconQuery(p)
components.append(("Pirqcon", q, lambda x: x.statement()))
if args.devicetreeconquery or args.all:
q = setools.DevicetreeconQuery(p)
components.append(("Devicetreecon", q, lambda x: x.statement()))
if (not components or args.all) and not args.flat:
mls = "enabled" if p.mls else "disabled"
print("Statistics for policy file: {0}".format(p))
print("Policy Version: {0} (MLS {1})".format(p.version, mls))
print("Target Policy: {0}".format(p.target_platform))
print("Handle unknown classes: {0}".format(p.handle_unknown))
print(" Classes: {0:7} Permissions: {1:7}".format(
p.class_count, p.permission_count))
print(" Sensitivities: {0:7} Categories: {1:7}".format(
p.level_count, p.category_count))
print(" Types: {0:7} Attributes: {1:7}".format(
p.type_count, p.type_attribute_count))
print(" Users: {0:7} Roles: {1:7}".format(
p.user_count, p.role_count))
print(" Booleans: {0:7} Cond. Expr.: {1:7}".format(
p.boolean_count, p.conditional_count))
print(" Allow: {0:7} Neverallow: {1:7}".format(
p.allow_count, p.neverallow_count))
print(" Auditallow: {0:7} Dontaudit: {1:7}".format(
p.auditallow_count, p.dontaudit_count))
print(" Type_trans: {0:7} Type_change: {1:7}".format(
p.type_transition_count, p.type_change_count))
print(" Type_member: {0:7} Range_trans: {1:7}".format(
p.type_member_count, p.range_transition_count))
print(" Role allow: {0:7} Role_trans: {1:7}".format(
p.role_allow_count, p.role_transition_count))
print(" Constraints: {0:7} Validatetrans: {1:7}".format(
p.constraint_count, p.validatetrans_count))
print(" MLS Constrain: {0:7} MLS Val. Tran: {1:7}".format(
p.mlsconstraint_count, p.mlsvalidatetrans_count))
print(" Permissives: {0:7} Polcap: {1:7}".format(
p.permissives_count, p.polcap_count))
print(" Defaults: {0:7} Typebounds: {1:7}".format(
p.default_count, p.typebounds_count))
if p.target_platform == "selinux":
print(" Allowxperm: {0:7} Neverallowxperm: {1:7}".format(
p.allowxperm_count, p.neverallowxperm_count))
print(" Auditallowxperm: {0:7} Dontauditxperm: {1:7}".format(
p.auditallowxperm_count, p.dontauditxperm_count))
print(" Initial SIDs: {0:7} Fs_use: {1:7}".format(
p.initialsids_count, p.fs_use_count))
print(" Genfscon: {0:7} Portcon: {1:7}".format(
p.genfscon_count, p.portcon_count))
print(" Netifcon: {0:7} Nodecon: {1:7}".format(
p.netifcon_count, p.nodecon_count))
elif p.target_platform == "xen":
print(" Initial SIDs: {0:7} Devicetreecon {1:7}".format(
p.initialsids_count, p.devicetreecon_count))
print(" Iomemcon: {0:7} Ioportcon: {1:7}".format(
p.iomemcon_count, p.ioportcon_count))
print(" Pcidevicecon: {0:7} Pirqcon: {1:7}".format(
p.pcidevicecon_count, p.pirqcon_count))
for desc, component, expander in components:
results = sorted(component.results())
if not args.flat:
print("\n{0}: {1}".format(desc, len(results)))
for item in results:
result = expander(item) if args.expand else item
strfmt = " {0}" if not args.flat else "{0}"
print(strfmt.format(result))
except Exception as err:
if args.debug:
logging.exception(str(err))
else:
print(err)
sys.exit(1)