Server IP : 192.64.112.168 / Your IP : 3.145.43.200 Web Server : Apache System : Linux nc-ph-2300-85.bluforrest.com 4.18.0-513.9.1.el8_9.x86_64 #1 SMP Sat Dec 2 05:23:44 EST 2023 x86_64 User : expressoneac ( 1128) PHP Version : 8.0.30 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /lib/python3.6/site-packages/sos/report/plugins/ |
Upload File : |
# This file is part of the sos project: https://github.com/sosreport/sos # # This copyrighted material is made available to anyone wishing to use, # modify, copy, or redistribute it subject to the terms and conditions of # version 2 of the GNU General Public License. # # See the LICENSE file in the source distribution for further information. from sos.report.plugins import Plugin, RedHatPlugin, UbuntuPlugin, PluginOpt class SELinux(Plugin, RedHatPlugin, UbuntuPlugin): short_desc = 'SELinux access control' plugin_name = 'selinux' profiles = ('container', 'system', 'security', 'openshift') option_list = [ PluginOpt('fixfiles', default=False, desc='collect incorrect file context labels') ] packages = ('libselinux', 'selinux-utils') def setup(self): self.add_copy_spec([ '/etc/sestatus.conf', '/etc/selinux' ]) # capture this with a higher log limit since #2035 may limit this # collection self.add_copy_spec('/var/lib/selinux', sizelimit=50) self.add_cmd_output('sestatus') state = self.exec_cmd('getenforce')['output'] if state != 'Disabled': self.add_cmd_output([ 'ps auxZww', 'sestatus -v', 'sestatus -b', 'selinuxdefcon root', 'selinuxconlist root', 'selinuxexeccon /bin/passwd', 'semanage -o' # deprecated, may disappear at some point ]) subcmds = [ 'fcontext', 'user', 'port', 'login', 'node', 'interface', 'module' ] for subcmd in subcmds: self.add_cmd_output(f"semanage {subcmd} -l") if self.get_option('fixfiles'): self.add_cmd_output("restorecon -Rvn /", stderr=False, priority=100) # vim: set et ts=4 sw=4 :