Linux newlinux5.pouyasazan.org 3.10.0-962.3.2.lve1.5.60.el7.x86_64 #1 SMP Fri Jul 23 07:07:00 EDT 2021 x86_64
LiteSpeed
Server IP : 88.99.66.243 & Your IP : 216.73.216.178
Domains :
Cant Read [ /etc/named.conf ]
User : wdbbsgxf
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
lib /
python2.7 /
site-packages /
Delete
Unzip
Name
Size
Permission
Date
Action
Babel-0.9.6-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2021-08-25 16:50
ConfigArgParse-0.11.0-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
Jinja2-2.7.2-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2021-08-25 16:50
_dummy_thread
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
_markerlib
[ DIR ]
drwxr-xr-x
2021-08-24 16:58
_markupbase
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
_thread
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
acme
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
acme-1.11.0-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
babel
[ DIR ]
drwxr-xr-x
2021-08-25 16:50
backports
[ DIR ]
drwxr-xr-x
2021-08-24 16:58
builtins
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
certbot
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
certbot-1.11.0-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
chardet
[ DIR ]
drwxr-xr-x
2021-08-24 16:58
chardet-2.2.1-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2021-08-24 16:58
clcommon
[ DIR ]
drwxr-xr-x
2021-08-25 16:50
copyreg
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
decorator-3.4.0-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2021-08-24 16:07
distro-1.5.0-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
enum
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
firewall
[ DIR ]
drwxr-xr-x
2021-08-24 17:03
future
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
future-0.18.2-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
html
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
http
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
idna
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
idna-2.4-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
iniparse
[ DIR ]
drwxr-xr-x
2021-08-24 16:07
isc
[ DIR ]
drwxr-xr-x
2025-05-16 23:52
jinja2
[ DIR ]
drwxr-xr-x
2021-08-25 16:50
josepy
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
josepy-1.3.0-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
kitchen
[ DIR ]
drwxr-xr-x
2021-08-24 16:58
kitchen-1.1.1-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2021-08-24 16:58
libfuturize
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
libpasteurize
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
mock-1.0.1-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
ndg
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
ndg_httpsclient-0.3.2-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
parsedatetime
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
parsedatetime-2.4-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
past
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
ply
[ DIR ]
drwxr-xr-x
2021-08-24 16:58
procfs
[ DIR ]
drwxr-xr-x
2021-08-24 17:03
pyRFC3339-1.1-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
pyasn1
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
pyasn1-0.1.9-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
pycparser
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
pycparser-2.14-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
pyrfc3339
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
pytz
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
pytz-2016.10-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
pyudev
[ DIR ]
drwxr-xr-x
2021-08-24 16:07
pyudev-0.15-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2021-08-24 16:07
queue
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
reprlib
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
requests
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
requests_toolbelt
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
requests_toolbelt-0.8.0-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
rhn
[ DIR ]
drwxr-xr-x
2021-08-25 16:50
rpmUtils
[ DIR ]
drwxr-xr-x
2024-06-16 05:57
setuptools
[ DIR ]
drwxr-xr-x
2021-08-24 16:58
setuptools-0.9.8-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2021-08-24 16:58
six-1.9.0-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
slip
[ DIR ]
drwxr-xr-x
2021-08-24 16:07
socketserver
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
tkinter
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
tuned
[ DIR ]
drwxr-xr-x
2024-06-16 05:57
urlgrabber
[ DIR ]
drwxr-xr-x
2021-08-24 17:04
urllib3
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
urllib3-1.10.2-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
winreg
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
xmlrpc
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
yum
[ DIR ]
drwxr-xr-x
2024-06-16 06:04
yumutils
[ DIR ]
drwxr-xr-x
2021-08-24 16:58
zope
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
zope.component-4.1.0-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
zope.event-4.0.3-py2.7.egg-info
[ DIR ]
drwxr-xr-x
2022-02-05 00:54
IPy-0.75-py2.7.egg-info
9.83
KB
-rw-r--r--
2014-06-10 11:48
IPy.py
50.07
KB
-rw-r--r--
2011-04-12 16:23
IPy.pyc
39.92
KB
-rw-r--r--
2014-06-10 11:48
IPy.pyo
39.92
KB
-rw-r--r--
2014-06-10 11:48
backports.ssl_match_hostname-3.5.0.1-py2.7.egg-info
3.96
KB
-rw-r--r--
2018-04-11 06:55
clsudo.py
12.65
KB
-rw-r--r--
2017-06-01 20:44
clsudo.pyc
11.02
KB
-rw-r--r--
2017-06-01 20:44
clsudo.pyo
11.02
KB
-rw-r--r--
2017-06-01 20:44
configargparse.py
40.35
KB
-rw-r--r--
2016-09-05 05:10
configargparse.pyc
32.46
KB
-rw-r--r--
2020-05-07 09:46
configargparse.pyo
32.46
KB
-rw-r--r--
2020-05-07 09:46
configobj-4.7.2-py2.7.egg-info
2.08
KB
-rw-r--r--
2014-06-10 11:27
configobj.py
86.1
KB
-rw-r--r--
2010-02-28 01:06
configobj.pyc
64.72
KB
-rw-r--r--
2014-06-10 11:27
configobj.pyo
64.72
KB
-rw-r--r--
2014-06-10 11:27
decorator.py
10.39
KB
-rw-r--r--
2012-10-18 12:19
decorator.pyc
8.36
KB
-rw-r--r--
2014-06-10 04:15
decorator.pyo
8.32
KB
-rw-r--r--
2014-06-10 04:15
distro.py
42.61
KB
-rw-r--r--
2020-03-31 01:40
distro.pyc
39.01
KB
-rw-r--r--
2021-10-11 10:19
distro.pyo
38.92
KB
-rw-r--r--
2021-10-11 10:19
easy_install.py
126
B
-rw-r--r--
2013-07-15 21:42
easy_install.pyc
315
B
-rw-r--r--
2017-08-02 14:48
easy_install.pyo
315
B
-rw-r--r--
2017-08-02 14:48
enum34-1.0.4-py2.7.egg-info
28.04
KB
-rw-r--r--
2015-11-24 07:00
hwdata.py
5.89
KB
-rw-r--r--
2012-03-02 19:52
hwdata.pyc
4.38
KB
-rw-r--r--
2014-09-17 19:32
hwdata.pyo
4.38
KB
-rw-r--r--
2014-09-17 19:32
iniparse-0.4-py2.7.egg-info
1.06
KB
-rw-r--r--
2014-06-10 02:34
ipaddress-1.0.16-py2.7.egg-info
783
B
-rw-r--r--
2016-11-05 20:07
ipaddress.py
78.03
KB
-rw-r--r--
2015-12-28 20:39
ipaddress.pyc
73.75
KB
-rw-r--r--
2016-11-05 20:07
ipaddress.pyo
73.57
KB
-rw-r--r--
2016-11-05 20:07
isc-2.0-py2.7.egg-info
267
B
-rw-r--r--
2025-03-04 13:53
mock.py
73.76
KB
-rw-r--r--
2012-11-06 00:49
mock.pyc
66.98
KB
-rw-r--r--
2018-11-06 08:46
mock.pyo
66.98
KB
-rw-r--r--
2018-11-06 08:46
ndg_httpsclient-0.3.2-py2.7-nspkg.pth
298
B
-rw-r--r--
2014-10-31 13:34
pciutils-1.7.3-py2.7.egg-info
267
B
-rw-r--r--
2014-09-17 19:32
pkg_resources.py
98.74
KB
-rw-r--r--
2013-07-15 21:42
pkg_resources.pyc
105.5
KB
-rw-r--r--
2017-08-02 14:48
pkg_resources.pyo
105.47
KB
-rw-r--r--
2017-08-02 14:48
ply-3.4-py2.7.egg-info
900
B
-rw-r--r--
2017-08-03 05:16
pyparsing-1.5.6-py2.7.egg-info
670
B
-rw-r--r--
2014-06-10 02:45
pyparsing.py
151.79
KB
-rw-r--r--
2014-06-10 02:45
pyparsing.pyc
145.41
KB
-rw-r--r--
2014-06-10 02:45
pyparsing.pyo
145.41
KB
-rw-r--r--
2014-06-10 02:45
python_linux_procfs-0.4.9-py2.7.egg-info
350
B
-rw-r--r--
2019-08-09 06:38
requests-2.6.0-py2.7.egg-info
39.41
KB
-rw-r--r--
2020-06-30 06:43
rhnlib-2.5.65-py2.7.egg-info
345
B
-rw-r--r--
2018-10-30 22:06
secureio.py
9.01
KB
-rw-r--r--
2017-06-01 20:44
secureio.pyc
4.58
KB
-rw-r--r--
2017-06-01 20:44
secureio.pyo
4.58
KB
-rw-r--r--
2017-06-01 20:44
six.py
28.97
KB
-rw-r--r--
2015-01-02 20:03
six.pyc
29.01
KB
-rw-r--r--
2015-11-25 00:16
six.pyo
29.01
KB
-rw-r--r--
2015-11-25 00:16
slip-0.4.0-py2.7.egg-info
196
B
-rw-r--r--
2018-04-11 06:19
slip.dbus-0.4.0-py2.7.egg-info
269
B
-rw-r--r--
2018-04-11 06:19
urlgrabber-3.10-py2.7.egg-info
2.21
KB
-rw-r--r--
2020-04-01 08:44
validate.py
45.22
KB
-rw-r--r--
2014-06-10 11:27
validate.pyc
45.62
KB
-rw-r--r--
2014-06-10 11:27
validate.pyo
45.62
KB
-rw-r--r--
2014-06-10 11:27
zope.component-4.1.0-py2.7-nspkg.pth
301
B
-rw-r--r--
2019-03-08 07:27
zope.event-4.0.3-py2.7-nspkg.pth
301
B
-rw-r--r--
2014-10-15 17:14
Save
Rename
import os import pwd import grp import re import subprocess import tempfile from stat import S_IRUSR, S_IRGRP class NoSuchUser(Exception): def __init__(self, user): message = 'No such user (%s)' % user Exception.__init__(self, 'No such user (%s)' % (user,)) class NoSuchGroup(Exception): def __init__(self, group): message = 'No such group (%s)' % group Exception.__init__(self, message) class UnableToReadFile(Exception): def __init__(self): Exception.__init__(self, 'Cannot read sudoers file') class UnableToWriteFile(Exception): def __init__(self): Exception.__init__(self, 'Cannot modify sudoers file') ALIAS_LVECTL_CMDS = [ "/bin/ps", "/bin/grep", "/sbin/service", "/usr/bin/getcontrolpaneluserspackages", "/usr/sbin/lvectl", "/usr/local/directadmin/plugins/new_lvemanager/admin/GetDomains" ] ALIAS_SELECTOR_CMDS = [ "/usr/bin/cl-selector", "/usr/bin/piniset", "/usr/sbin/lveps", "/usr/bin/selectorctl" ] DEFAULTS_REQUIRETTY = 'Defaults:%s !requiretty' # Patterns for group GROUP_LVECTL_SELECTOR = '%%%s ALL=NOPASSWD: LVECTL_CMDS, SELECTOR_CMDS' GROUP_DEFAULTS_REQUIRETTY = 'Defaults:%%%s !requiretty' class Clsudo(object): """ Adds CloudLinux users to sudoers file """ filepath = '/etc/sudoers' temp_dir = '/etc' temp_prefix = 'lve_sudoers_' def add_user(user): """ Adds username to sudoers file """ Clsudo._check_user(user) Clsudo._get_contents(user) if not Clsudo.has_alias: Clsudo.sudoers_list.append ( 'Cmnd_Alias LVECTL_CMDS = ' + ", ".join( ALIAS_LVECTL_CMDS ) ) if not Clsudo.has_selector_alias: Clsudo.sudoers_list.append('Cmnd_Alias SELECTOR_CMDS = ' + ", ".join( ALIAS_SELECTOR_CMDS )) if not Clsudo.has_rights: Clsudo.sudoers_list.append('%s ALL=NOPASSWD: LVECTL_CMDS' % (user,)) if not Clsudo.has_selector_rights: Clsudo.sudoers_list.append('%s ALL=NOPASSWD: SELECTOR_CMDS' % (user,)) if not Clsudo.has_action: Clsudo.sudoers_list.append(DEFAULTS_REQUIRETTY % (user,)) Clsudo._write_contents() add_user = staticmethod(add_user) def add_cagefs_user(user): """ Adds username to sudoers file """ Clsudo._check_user(user) Clsudo._get_contents(user) if not Clsudo.has_cagefs_alias: Clsudo.sudoers_list.append('Cmnd_Alias CAGEFS_CMDS = /usr/sbin/cagefsctl, ' '/bin/ps, /bin/grep, /sbin/service') if not Clsudo.has_cagefs_rights: Clsudo.sudoers_list.append('%s ALL=NOPASSWD: CAGEFS_CMDS' % (user,)) if not Clsudo.has_action: Clsudo.sudoers_list.append(DEFAULTS_REQUIRETTY % (user,)) Clsudo._write_contents() add_cagefs_user = staticmethod(add_cagefs_user) def add_lvemanager_group(group_name): """ Adds group to sudoers file, grants access to LVE Manager """ Clsudo._check_group(group_name) Clsudo._get_contents_group(group_name) if not Clsudo.has_alias: Clsudo.sudoers_list.append ( 'Cmnd_Alias LVECTL_CMDS = ' + ", ".join( ALIAS_LVECTL_CMDS ) ) if not Clsudo.has_selector_alias: Clsudo.sudoers_list.append('Cmnd_Alias SELECTOR_CMDS = ' + ", ".join( ALIAS_SELECTOR_CMDS )) if not Clsudo.has_action: Clsudo.sudoers_list.append(GROUP_LVECTL_SELECTOR % (group_name,)) if not Clsudo.has_group_action: Clsudo.sudoers_list.append(GROUP_DEFAULTS_REQUIRETTY % (group_name,)) # writes file Clsudo._write_contents() add_lvemanager_group = staticmethod(add_lvemanager_group) def remove_user(user): """ Removes username from sudoers file """ try: f = open(Clsudo.filepath) Clsudo.sudoers_list = f.read().splitlines() f.close() idx = 0 removed = False while idx < len(Clsudo.sudoers_list): line = Clsudo.sudoers_list[idx] if (('%s ALL=NOPASSWD:' % (user,)) in line) or ((DEFAULTS_REQUIRETTY % (user,))in line): Clsudo.sudoers_list.remove(line) removed = True continue idx += 1 if removed: Clsudo._write_contents() except (IOError, OSError): raise UnableToReadFile() remove_user = staticmethod(remove_user) def update_user(user): """ updates username in sudoers file """ # Check user presence in system Clsudo._check_user(user) Clsudo._get_contents(user) cmnd_dict = {"Cmnd_Alias LVECTL_CMDS":ALIAS_LVECTL_CMDS, "Cmnd_Alias SELECTOR_CMDS": ALIAS_SELECTOR_CMDS} is_sudoer_change = 0 for idx in range(len(Clsudo.sudoers_list)): comand_string = Clsudo.sudoers_list[idx] for aliase_key, aliase_list in cmnd_dict.iteritems(): if aliase_key in comand_string: comand_string = comand_string.replace(aliase_key,"").strip() cmnd_list = comand_string.split(",") for aliase_cmnd_item in aliase_list: if aliase_cmnd_item not in cmnd_list: is_sudoer_change = 1 Clsudo.sudoers_list[idx] = "%s = %s" % (aliase_key, ", ".join(aliase_list)) break if(is_sudoer_change == 1): Clsudo._write_contents() update_user = staticmethod(update_user) def _check_user(user): """ Checks passwd database for username presence @param user: string """ try: pwd.getpwnam(user) except KeyError: raise NoSuchUser(user) _check_user = staticmethod(_check_user) def _check_group(group_name): """ Checks grp database for group_name presence @param group_name: string """ try: grp.getgrnam(group_name) except KeyError: raise NoSuchGroup(group_name) _check_group = staticmethod(_check_group) def _get_contents(user): """ Reads file into list of strings @param filename: string """ # Clear all status flags Clsudo.has_action = False Clsudo.has_group_action = False Clsudo.has_alias = False Clsudo.has_rights = False Clsudo.has_selector_alias = False Clsudo.has_selector_rights = False Clsudo.has_cagefs_alias = False Clsudo.has_cagefs_rights = False require_tty_pattern = re.compile(r'Defaults:\s*%s\s*!requiretty' % user) try: i = open(Clsudo.filepath) Clsudo.sudoers_list = i.read().splitlines() i.close() for idx in range(len(Clsudo.sudoers_list)): if "Cmnd_Alias LVECTL_CMDS" in Clsudo.sudoers_list[idx]: Clsudo.has_alias = True continue if "Cmnd_Alias CAGEFS_CMDS" in Clsudo.sudoers_list[idx]: Clsudo.has_cagefs_alias = True continue if ("%s ALL=NOPASSWD: LVECTL_CMDS" % (user,) in Clsudo.sudoers_list[idx]): Clsudo.has_rights = True continue if "%s ALL=NOPASSWD: CAGEFS_CMDS" % (user,) in Clsudo.sudoers_list[idx]: Clsudo.has_cagefs_rights = True continue if "requiretty" in Clsudo.sudoers_list[idx]: pattern_match = require_tty_pattern.search( Clsudo.sudoers_list[idx]) if pattern_match: Clsudo.has_action = True continue if "Cmnd_Alias SELECTOR_CMDS" in Clsudo.sudoers_list[idx]: if 'piniset' not in Clsudo.sudoers_list[idx]: Clsudo.sudoers_list[idx] = Clsudo.sudoers_list[idx].replace( '/usr/bin/cl-selector', '/usr/bin/cl-selector, /usr/bin/piniset') if 'lveps' not in Clsudo.sudoers_list[idx]: Clsudo.sudoers_list[idx] = Clsudo.sudoers_list[idx].replace( '/usr/bin/cl-selector, /usr/bin/piniset', '/usr/bin/cl-selector, /usr/bin/piniset, /usr/sbin/lveps') Clsudo.has_selector_alias = True continue if ("%s ALL=NOPASSWD: SELECTOR_CMDS" % (user,) in Clsudo.sudoers_list[idx]): Clsudo.has_selector_rights = True continue except (IOError, OSError): raise UnableToReadFile() _get_contents = staticmethod(_get_contents) def _get_contents_group(group_name): """ Reads file into list of strings @param group_name: string """ # Clear all status flags Clsudo.has_action = False Clsudo.has_group_action = False Clsudo.has_alias = False Clsudo.has_rights = False Clsudo.has_selector_alias = False Clsudo.has_selector_rights = False Clsudo.has_cagefs_alias = False Clsudo.has_cagefs_rights = False group_prefix = "%%%s" % group_name group_action = "Defaults:%%%s" % group_name group_pattern = re.compile(r'%s\s*ALL=NOPASSWD:\s*LVECTL_CMDS,\s*SELECTOR_CMDS' % (group_name,)) try: i = open(Clsudo.filepath) Clsudo.sudoers_list = i.read().splitlines() i.close() for idx in range(len(Clsudo.sudoers_list)): if "Cmnd_Alias SELECTOR_CMDS" in Clsudo.sudoers_list[idx]: if 'piniset' not in Clsudo.sudoers_list[idx]: Clsudo.sudoers_list[idx] = Clsudo.sudoers_list[idx].replace( '/usr/bin/cl-selector', '/usr/bin/cl-selector, /usr/bin/piniset') if 'lveps' not in Clsudo.sudoers_list[idx]: Clsudo.sudoers_list[idx] = Clsudo.sudoers_list[idx].replace( '/usr/bin/cl-selector, /usr/bin/piniset', '/usr/bin/cl-selector, /usr/bin/piniset, /usr/sbin/lveps') Clsudo.has_selector_alias = True continue if "Cmnd_Alias LVECTL_CMDS" in Clsudo.sudoers_list[idx]: Clsudo.has_alias = True continue if "Cmnd_Alias CAGEFS_CMDS" in Clsudo.sudoers_list[idx]: Clsudo.has_cagefs_alias = True continue if Clsudo.sudoers_list[idx].startswith(group_prefix): pattern_match = group_pattern.search(Clsudo.sudoers_list[idx]) if pattern_match: Clsudo.has_action = True if Clsudo.sudoers_list[idx].startswith(group_action): Clsudo.has_group_action = True if Clsudo.sudoers_list[idx].startswith(group_action): Clsudo.has_group_action = True except (IOError, OSError): raise UnableToReadFile() _get_contents_group = staticmethod(_get_contents_group) def _write_contents(): """ Writes data to temporary file then checks it and rewrites sudoers file """ try: fd, temp_path = tempfile.mkstemp( prefix=Clsudo.temp_prefix, dir=Clsudo.temp_dir) fo = os.fdopen(fd, 'w') fo.write('\n'.join(Clsudo.sudoers_list) + '\n') fo.close() mask = S_IRUSR | S_IRGRP os.chmod(temp_path, mask) if not Clsudo._is_file_valid(temp_path): raise IOError except (IOError, OSError): try: if os.path.exists(temp_path): os.unlink(temp_path) except: pass raise UnableToWriteFile() try: os.rename(temp_path, Clsudo.filepath) except OSError: raise UnableToWriteFile() _write_contents = staticmethod(_write_contents) def _is_file_valid(filename): cmd = [ '/usr/sbin/visudo', '-c', '-f', filename ] rv = subprocess.Popen( cmd, stdin=open('/dev/null'), stdout=subprocess.PIPE, stderr=subprocess.STDOUT, close_fds=True) rt = rv.communicate() if rv.returncode != 0: return False return True _is_file_valid = staticmethod(_is_file_valid)