Hacked By AnonymousFox

Current Path : /opt/cloudlinux/venv/lib64/python3.11/site-packages/__pycache__/
Upload File :
Current File : //opt/cloudlinux/venv/lib64/python3.11/site-packages/__pycache__/secureio.cpython-311.pyc

�

J{�f2K����ddlmZddlmZddlmZddlZddlZddlZddlZddlZddl	m
Z
ddlmZddl
mZmZmZmZmZmZmZmZmZmZddlmZdd	lmZd
�Zd�Ze
d���d
���Zer
e��ZeZ eZ!Gd�de��Z"ee"��Z#d�Z$d�Z%d�Z&d�Z'd�Z(d�Z)e
d���d���Z*er
e*��Z+d�Z,d�Z-d�Z.d�Z/d�Z0da1dZ2dZ3dZ4d �Z5d!�Z6d"�Z7d#�Z8d;d$�Z9d;d%�Z:d;d&�Z;d<d'�Z<d=d(�Z=d>d*�Z>	d?d,�Z?d@d-�Z@d@d.�ZAd/�ZBd0�ZCdaDd1�ZEee3�2��ZFd3�ZGdaHdAd4�ZId5�ZJdBd6�ZKd7�ZLd8�ZMejNd9���ZOejNd:���ZPdS)C�)�print_function)�absolute_import)�divisionN)�	lru_cache)�
TYPE_CHECKING)
�cdll�c_long�	Structure�c_ushort�c_ubyte�c_char�POINTER�c_int�c_void_p�c_char_p)�ClPwd)�drop_user_privilegesc��|dkrt��S|dkrt��Stdt�d|�����)N�libc�liblvezmodule z has no attribute )�
_load_libc�_load_liblve�AttributeError�__name__)�names ��/builddir/build/BUILDROOT/alt-python27-cllib-3.4.10-1.el8.cloudlinux.x86_64/opt/cloudlinux/venv/lib/python3.11/site-packages/secureio.py�__getattr__rsK���v�~�~��|�|��	
��	�	��~�~��
�E�8�E�E�t�E�E�
F�
F�F�c�J�ddgt������S)Nrr)�globals�keys�rr�__dir__r#&s ���H�0�w�y�y�~�~�/�/�0�0r)�maxsizec���tjd��}tttg|j_t|j_ttg|j_t|j_tg|j_t|j_tg|j	_t|j	_tg|j_d|j_tg|j_t|j_|S)Nz	libc.so.6)
r�LoadLibraryr�fchown�argtypes�restype�fchmod�	fdopendirr�readdir�
DIRENTRY_P�	rewinddir�closedir)rs rrr+s�����K�(�(�D�!�5�%�0�D�K���D�K��!�5�>�D�K���D�K�� %�g�D�N��%�D�N��&�J�D�L��%�D�L�� (�j�D�N��!�D�N��'�Z�D�M��!�D�M���Krc�6�eZdZdefdefdefdefdedzfgZdS)�DIRENTRY�d_ino�d_off�d_reclen�d_type�d_name�N)	r�
__module__�__qualname__�ino_t�off_trrr
�_fields_r"rrr1r1SsA������	�%��	�%��	�X��	�7��	�6�C�<� ��H�H�Hrr1c�H�t���|||��S�N)rr')�fd�uid�gids   rr'r'`s���<�<���r�3��,�,�,rc�F�t���||��Sr>)rr*)r?�modes  rr*r*ds���<�<���r�4�(�(�(rc�D�t���|��Sr>)r�fdopen�r?s rrErEhs���<�<���r�"�"�"rc�D�t���|��Sr>)rr,��dirps rr,r,ls���<�<����%�%�%rc�D�t���|��Sr>)rr.rHs rr.r.ps���<�<�!�!�$�'�'�'rc�D�t���|��Sr>)rr/rHs rr/r/ts���<�<� � ��&�&�&rc�(�	tjd��}n$#t$rtjd��}YnwxYwttg|j_t|j_tg|j_d|j_tg|j	_t|j	_tttg|j
_t|j
_ttttg|j_t|j_tttttg|j_t|j_ttttttg|j
_t|j
_tttttg|j_t|j_ttg|j_t|j_ttg|j_t|j_|S)Nzlibsecureio.so.0zliblve.so.0)rr&�OSErrorr�open_not_symlinkr(rr)�closefd�	check_dir�isdir�set_perm_dir_secure�set_owner_dir_secure�create_dir_secure�makedirs_secure�get_path_from_descriptor�	is_subdir)rs rrrys���1��!�"4�5�5�����1�1�1��!�-�0�0����1����)1�(�';�F��$�&+�F��#� %�g�F�N��!�F�N��
"'��F���$�F���&�u�h�7�F�L�� �F�L��,4�U�E�8�*L�F��'�).�F��&�-5�e�U�E�8�+T�F��(�*/�F��'�*2�5�%���x�(X�F��%�',�F��$�(0���u�h�&O�F��#�%*�F��"�
16�x�/@�F�#�,�.6�F�#�+�"*�8� 4�F���$�F����Ms��8�8c�F�t���||��Sr>)rrN)�path�parent_paths  r�_open_not_symlinkr[�s���>�>�*�*�4��=�=�=rc�D�t���|��Sr>)rrPrFs rrPrP�s���>�>�#�#�B�'�'�'rc�H�t���|||��Sr>)rrQ)rY�
descriptorrZs   rrQrQ�s���>�>����j�+�>�>�>rc�F�t���||��Sr>)rrV)r?�bufs  rrVrV�s���>�>�2�2�2�s�;�;�;rc�F�t���||��Sr>)rrW)�dir�subdirs  rrWrW�s���>�>�#�#�C��0�0�0rTz/var/log/cagefs-update.logi�Fc�Z�tj|tjtjz��Sr>)�os�open�O_RDONLY�
O_NOFOLLOW�rYs rrNrN�s��
�7�4���r�}�4�5�5�5rc�F�tjt|��d��S)N�r)rerErNris r�open_file_not_symlinkrl�s��
�9�%�d�+�+�S�1�1�1rc�6�tj|��}t|��}|std���t	|��g}	t|��}|sn"|j}|�|j���4t	|��t|��|S)z:Returns list of entries of directory pointed by descriptorzfdopendir error)
re�dupr+�	Exceptionr.r,�contents�appendr6r/)r?�fd2rI�dirlist�entryp�entrys      r�flistdirrv�s���
�&��*�*�C��S�>�>�D��+��)�*�*�*�
�d�O�O�O��G�%�������	��������u�|�$�$�$�%��d�O�O�O��T�N�N�N��Nrc�Z�|�(	tj|��dS#t$rYdSwxYwdSr>)re�closerMrFs rrOrOsF��	�~�	��H�R�L�L�L�L�L���	�	�	��D�D�	�����~s��
(�(c���|�d}t���|���|||�����}|dkr|S|�|d|zdd��dS)z{Sets permissions to directory (in secure manner)
    Returns descriptor if successful
    Returns None if error has occuredN���rz.Error: failed to set permissions of directory FT)rrR�encode)rY�permrZr?�loggers     rrRrRsr��
�z�
��	���	+�	+�D�K�K�M�M�4��[�EW�EW�EY�EY�	Z�	Z�B�	�A�v�v��	�
����?�$�F��t�T�T�T��4rc���|�d}t���|���||||�����}|dkr|S|�|d|zdd��dS)zSets owner and group of directory (in secure manner)
    Returns descriptor if successful
    Returns None if error has occuredNrzrz(Error: failed to set owner of directory FT)rrSr{)rYr@rArZr?r}s      rrSrS'st��
�z�
��	���	,�	,�T�[�[�]�]�C��b�+�J\�J\�J^�J^�	_�	_�B�	�A�v�v��	�
����9�D�@�%��N�N�N��4rc	���|�d}t���|���|||||�����}|dkr|S|�|d|zdd��dS)z�Creates directory if it does not exist, sets permissions/owner otherwise
    Returns descriptor if successful
    Returns None if error has occuredNrzr�#Error : failed to create directory FT)rrTr{)rYr|r@rArZr?r}s       rrTrT5sv��
�z�
��	���	)�	)�$�+�+�-�-��s�C��[�M_�M_�Ma�Ma�	b�	b�B�	�A�v�v��	�
����4�t�;�U�D�I�I�I��4rc��t���|���||||�����}|r|r|d|zdd��|S)zeRecursive directory creation function
    Returns 0 if successful
    Returns -1 if error has occuredr�FT)rrUr{)rYr|r@rArZr}�ress       rrUrUCsg���.�.�
(�
(�������c�3��HZ�HZ�H\�H\�
]�
]�C�
�J�v�J���4�t�;�U�D�I�I�I��Jrc���|�|�|�|�td���|duo|du}|rt||��	t|��}|���}|���|rt��|S#ttf$r_}|rt��td|zdzt|��ztd|��|s�tjd��Yd}~dSd}~wwxYw)z read file not following symlinksNzEread_file_secure: uid and gid should be both null or be both not nullzError: failed to read � : �)
ro�
set_user_permrl�	readlinesrx�
set_root_permrM�IOError�logging�str�SILENT_FLAG�sys�exit)	�filenamer@rA�
exit_on_error�	write_log�	drop_perm�file_object�content�es	         r�read_file_securer�Ms����C�K������_�`�`�`��D��7�s�$��I�� ��c�3����
�+�H�5�5���'�'�)�)���������	��O�O�O�����W������	��O�O�O��(�8�3�e�;�c�!�f�f�D�k�ST�V_�`�`�`��	������������������
���s�AA<�<C,�
AC'�'C,�c��tj�|��}|rt||��	t	jd|���\}}	tj|d��}
|
�d�|����|s$|�"|� t|||��rtd���t||��rtd���|
����n#ttf$r�}	|
���n#YnxYw	tj|��n#YnxYw	tj|	��n#YnxYw|rt��t!d|zd	zt#|���d
d��zt&d|��Yd}~dSd}~wt($rD}t!d
t#|��zt&d��t+jd��Yd}~nd}~wwxYwd}	tj|	|��nl#t$r_}d}t!d|zd	zt#|��zt&d|��	tj|	��n#t$rYnwxYwYd}~nd}~wwxYw|rt��|S)z!Returns True if error has occured�cagefs_)�prefixrb�w�Nz
fchown failedz
fchmod failedzError : failed to write file r��ErrnozErr codeTzError: r�Fz$Error: failed to rename tempfile to )rerY�dirnamer��tempfile�mkstemprE�write�joinr'rMr*rxr��unlinkr�r�r��replacer�ror�r��rename)
r��ini_pathr@rAr�r|r��dirpathr?�	temp_pathr�r��errors
             r�write_file_securer�fs����g�o�o�h�'�'�G�� ��c�3����� �(�	�w�G�G�G�
��I��i��C�(�(�����"�'�'�'�*�*�+�+�+��	/�S�_����b�#�s�#�#�
/��o�.�.�.��"�d���	+��/�*�*�*����������W�����	���������	��D����	��H�R�L�L�L�L��	��D����	��I�i� � � � ��	��D�����	��O�O�O��/�(�:�U�B�S��V�V�^�^�T[�]g�Eh�Eh�h�ju�w{�~G�	H�	H�	H��t�t�t�t�t����������	�C��F�F�"�K��3�3�3��������������������
�E��
�	�)�X�&�&�&�&���������6��A�E�I�C�PQ�F�F�R�T_�ab�dm�n�n�n�	��I�i� � � � ���	�	�	��D�	������������������������Ls��B/C$�$G4�6D�
F#�D�
F#�D(�'F#�(D,�*F#�0E�F#�E	�AF#�#
G4�0:G/�/G4�:H�
I9�/I4�
I�I4�
I,�)I4�+I,�,I4�4I9r�c��|�%tj��}t|dd���tj�|��}d\}}		tj|||���\}}	tj|dd�	��5}
|
�|��ddd��n#1swxYwYnu#ttf$ra|�|	��	tj|��n#ttf$rYnwxYw	tj|	��n#ttf$rYnwxYw�wxYw	tj
|	|��tj|	|��nI#tttf$r/	tj|	��n#ttf$rYnwxYw�wxYw|�htj��}tj|��tjtj����|d
krtj|��dSdSdS)aP
    Safely write string content to a file
    :param content: str
    :param dest_path: str -> path to a file
    :param perm: int -> permissions for the file
    :param prefix: str -> add to temporary file name
    :param suffix: str -> add to temporary file name
    :param as_user: str -> name of the user to drop privileges to
    NTF)�effective_or_real�set_env�NN)r��suffixrbr��surrogateescape)�errorsr)re�	getgroupsrrYr�r�r�rEr�r�rMrxr��chmodr��	TypeError�getuid�seteuid�setegid�getgid�	setgroups)r��	dest_pathr|r�r��as_user�
old_groupsr�r?r��f_temp�ruids            r�write_file_via_tempfiler��s������\�^�^�
��W��e�L�L�L�L��g�o�o�i�(�(�G��M�B�	�� �(��f�'�;�;�;�
��I�
�Y�r�3�'8�
9�
9�
9�	"�V��L�L��!�!�!�	"�	"�	"�	"�	"�	"�	"�	"�	"�	"�	"����	"�	"�	"�	"����W�����
�:��*��	��H�R�L�L�L�L����!�	�	�	��D�	����	��I�i� � � � ����!�	�	�	��D�	����
������
���D�!�!�!�
�	�)�Y�'�'�'�'���W�i�(����	��I�i� � � � ����!�	�	�	��D�	����
��������y�{�{��
�
�4����
�
�2�9�;�;�����1�9�9��L��$�$�$�$�$�
��
�9s��
1B,�>B �B,� B$�$B,�'B$�(B,�,D�C�D�C,�)D�+C,�,D�0D�D�D�D�D�D�"*E
�
F�%E:�9F�:F�F�
F�Fc�D�	tj|��ng#tf$rY}|rGtdt	|��zdzt	|��z��tjd��nYd}~dSYd}~nd}~wwxYwt||��}	tj|��nS#tf$rE}|r3td|t	|����tjd��nYd}~dSYd}~nd}~wwxYw	tj	|��ng#tf$rY}|rGtdt	|��zdzt	|��z��tjd��nYd}~dSYd}~nd}~wwxYw|dkrda
dSt�����d	a
dS)
Nzfailed to set egid to z: r�rzz'failed to set supplementary groups to :zfailed to set euid to rTF)
rer�rM�print_errorr�r�r��
get_groupsr�r��	root_flagr�enable_quota_capability)r@rAr�r��groupss     rr�r��s����
�
�3�������:�����	��0�3�s�8�8�;�d�B�S��V�V�K�L�L�L��H�Q�K�K�K�K��2�2�2�2�2�
�K�K�K�K�����������S�
!�
!�F��
��V�������:�����	��A�6�3�q�6�6�R�R�R��H�Q�K�K�K�K��2�2�2�2�2�
�K�K�K�K����������
�
�3�������:�����	��0�3�s�8�8�;�d�B�S��V�V�K�L�L�L��H�Q�K�K�K�K��2�2�2�2�2�
�K�K�K�K����������a�x�x��	�	�	�	���.�.�0�0�0��	�	�	sF��A;�A	A6�6A;�B$�$C4�/5C/�/C4�8D
�
E1�A	E,�,E1c��	tjd��nR#tf$rD}|r2tdt	|����tjd��nYd}~dSYd}~nd}~wwxYw	tjd��nR#tf$rD}|r2tdt	|����tjd��nYd}~dSYd}~nd}~wwxYwtdd��}	tj	|��nS#tf$rE}|r3td|t	|����tjd��nYd}~dSYd}~nd}~wwxYwda
dS)Nrzfailed to set euid to 0 :r�rzz Error: failed to set egid to 0 :z.Error: failed to set supplementary groups to :T)rer�rMr�r�r�r�r�r�r�r�)r�r�r�s   rr�r��s����
�
�1�
�
�
�
���:�����	��3�S��V�V�<�<�<��H�Q�K�K�K�K��2�2�2�2�2�
�K�K�K�K����������
�
�1�
�
�
�
���:�����	��:�C��F�F�C�C�C��H�Q�K�K�K�K��2�2�2�2�2�
�K�K�K�K�����������1�
�
�F��
��V�������:�����	��H�&�RU�VW�RX�RX�Y�Y�Y��H�Q�K�K�K�K��2�2�2�2�2�
�K�K�K�K����������I�I�IsD��A&�4A!�!A&�*A?�?C�
4C	�	C�"C7�7E�5E�Ec��tddtj���|D]}t|dtj����ttj���dS)NzError:� )�end�file)r�)�printr��stderr)�args�as  rr�r�s[��	�(��#�*�-�-�-�-�
�+�+��
�a�S�s�z�*�*�*�*�*�	�s�z������rc�V�t��}t��}t��}|D]Y}||j}|D]G}	||j}n#t
$rY�wxYw||kr |�||j���H�Z|�|��t|��S)z$Returns supplementary groups for uid)	�get_grp_dict�get_pwd_dict�set�gr_mem�pw_uid�KeyError�add�gr_gid�list)	r@rA�gr�pwr��group�members�user�
member_uids	         rr�r�#s���	���B�	���B�
�U�U�F��-�-���U�)�"���	-�	-�D�
���X�_�
�
���
�
�
���
�����S� � ��
�
�2�e�9�+�,�,�,��
	-��J�J�s�O�O�O���<�<�s�
A�
A�Ac�p�t�)iatj��}|D]}|t|j<�tSr>)�grp_dict�grp�getgrall�gr_name)r��lines  rr�r�7s;������
�\�^�^���	*�	*�D�%)�H�T�\�"�"��Or)�min_uidc�4�t���Sr>)�clpwd�
get_user_dictr"rrr�r�Ds����� � � rc�X�|s|rt|��|�rt}tst��\}}t��	t�>tjd��}ttdd��atj|��t�	|��t�	d��nU#ttf$rA}tdtt|����tjd��Yd}~nd}~wwxYw|st!||��dSdSdS)N�r�r��
zwriting to )r�r��get_permr��log_filere�umaskrf�LOGFILEr�rMr�r�r�r�r�r�)	�msg�silent�verboser��root_flag_savedr@rA�umask_savedr�s	         rr�r�Ks/�����	��#�J�J�J��$�#���	��z�z�H�C���O�O�O�
	��� �h�t�n�n�����a�0�0�����%�%�%��N�N�3�����N�N�4� � � � ����!�	�	�	��
�w��A���7�7�7��H�Q�K�K�K�K�K�K�K�K�����	�����	$��#�s�#�#�#�#�#�#$�$� 	$�	$s�A9B?�?D�7D�Dc���	tj��}tj��}nI#tf$r;}t	dt|����t
jd��Yd}~nd}~wwxYw||fS)Nzfailed to get (euid,egid)r�)re�geteuid�getegidrMr�r�r�r�)r@rAr�s   rr�r�esy����j�l�l���j�l�l�����:�����/��Q���8�8�8����������������������8�Os�&)�A/�1A*�*A/c��|r t�����nt�����S)z�
    Set CAP_SYS_RESOURCE capability

    :param bool clear: Set on if it's true, set off otherwise
    :return: 0 for success, -1 otherwise
    :rtype: int
    )r�disable_quota_capabilityr�)�clears r�set_capabilityr�os9��9>�6�<�>�>�2�2�4�4�4�
�^�^�
3�
3�
5�
5�6rc�F�tj|��t��S)a
    Change effective uid of current process and set CAP_SYS_RESOURCE capbality
    to prevent "Disk quota exceeded" error

    :param int euid: User ID to set it as current effective UID
    :return: 0 if capability was set successfuly, -1 otherwise
    :rtype: int
    )rer�r�)r@s r�
change_uidr�{s���J�s�O�O�O����rc��|s"t�����dSt�����dS)zZ
    Disable quota kernel check to allow us to write
    more than user can by quota.
    N)rr�r���enableds r�_set_quota_checks_statusr�sD��
�2����.�.�0�0�0�0�0����/�/�1�1�1�1�1rc#�~K�td���	dV�td���dS#td���wxYw)NFr�T)rr"rr�
disable_quotar�sT�����U�+�+�+�+�/�
���� ��.�.�.�.�.�.�� ��.�.�.�.�.���s�*�<c#�K�tj|��}	dV�tj|��dS#tj|��wxYwr>)rer�)�umask_value�saved_umasks  r�	set_umaskr�sO�����(�;�'�'�K��
����
������������������s	�2�Ar�r>)NNTT)Tr�T)r�r�N)T)FTT)F)Q�
__future__rrrr�r�r��
contextlibre�	functoolsr�typingr�ctypesrr	r
rrr
rrrr�clcommonr�clcommon.clpwdrrr#rrr:r;r1r-r'r*rEr,r.r/rrr[rPrQrVrWr�r��MIN_UIDr�rNrlrvrOrRrSrTrUr�r�r�r�r�r�r�r�r�r�r�r�r�r�r�r�r�contextmanagerrrr"rr�<module>rs���&�%�%�%�%�%�&�&�&�&�&�&�������
�
�
�
�
�
�
�
���������	�	�	�	������� � � � � � �/�/�/�/�/�/�/�/�/�/�/�/�/�/�/�/�/�/�/�/�/�/�/�/�������/�/�/�/�/�/�G�G�G�1�1�1�
��4���������>���:�<�<�D�	���������y�����W�X�
�
�
�-�-�-�)�)�)�#�#�#�&�&�&�(�(�(�'�'�'�
��4����L�L���L�^��
�\�^�^�F�>�>�>�(�(�(�?�?�?�<�<�<�1�1�1�
�	�
&��

����6�6�6�2�2�2����8�����������������������24�4�4�4�pAE�3%�3%�3%�3%�l$�$�$�$�N����D������"�����	��g�����!�!�!�
��$�$�$�$�4���	6�	6�	6�	6�
�
�
�2�2�2���/�/���/���������r

Hacked By AnonymousFox1.0, Coded By AnonymousFox