SILENT KILLERPanel

Current Path: > > opt > cloudlinux > venv > lib64 > python3.11 > > site-packages


Operation   : Linux premium131.web-hosting.com 4.18.0-553.44.1.lve.el8.x86_64 #1 SMP Thu Mar 13 14:29:12 UTC 2025 x86_64
Software     : Apache
Server IP    : 162.0.232.56 | Your IP: 216.73.216.111
Domains      : 1034 Domain(s)
Permission   : [ 0755 ]

Files and Folders in: //opt/cloudlinux/venv/lib64/python3.11//site-packages

NameTypeSizeLast ModifiedActions
GitPython-3.1.32.dist-info Directory - -
Jinja2-3.0.3.dist-info Directory - -
Mako-1.2.4.dist-info Directory - -
MarkupSafe-2.1.3.dist-info Directory - -
PyJWT-2.8.0.dist-info Directory - -
PyMySQL-1.1.0.dist-info Directory - -
PyVirtualDisplay-3.0.dist-info Directory - -
PyYAML-6.0.1.dist-info Directory - -
__pycache__ Directory - -
_distutils_hack Directory - -
_pytest Directory - -
_yaml Directory - -
aiohttp Directory - -
aiohttp-3.9.2.dist-info Directory - -
aiohttp_jinja2 Directory - -
aiohttp_jinja2-1.5.dist-info Directory - -
aiohttp_security Directory - -
aiohttp_security-0.4.0.dist-info Directory - -
aiohttp_session Directory - -
aiohttp_session-2.9.0.dist-info Directory - -
aiosignal Directory - -
aiosignal-1.3.1.dist-info Directory - -
alembic Directory - -
alembic-1.11.1.dist-info Directory - -
annotated_types Directory - -
annotated_types-0.6.0.dist-info Directory - -
astroid Directory - -
astroid-2.15.6.dist-info Directory - -
attr Directory - -
attrs Directory - -
attrs-23.1.0.dist-info Directory - -
backports Directory - -
certifi Directory - -
certifi-2023.7.22.dist-info Directory - -
cffi Directory - -
cffi-1.15.1.dist-info Directory - -
chardet Directory - -
chardet-5.2.0.dist-info Directory - -
charset_normalizer Directory - -
charset_normalizer-2.1.1.dist-info Directory - -
cl_dom_collector Directory - -
clcagefslib Directory - -
clcommon Directory - -
clconfig Directory - -
clconfigure Directory - -
cldashboard Directory - -
clevents Directory - -
clflags Directory - -
cllicense Directory - -
cllimits Directory - -
cllimits_validator Directory - -
cllimitslib_v2 Directory - -
cllvectl Directory - -
clpackages Directory - -
clquota Directory - -
clselect Directory - -
clselector Directory - -
clsentry Directory - -
clsummary Directory - -
clveconfig Directory - -
clwizard Directory - -
configparser-5.0.2.dist-info Directory - -
contextlib2 Directory - -
contextlib2-21.6.0.dist-info Directory - -
coverage Directory - -
coverage-7.2.7.dist-info Directory - -
cryptography Directory - -
cryptography-41.0.2.dist-info Directory - -
ddt-1.4.4.dist-info Directory - -
dill Directory - -
dill-0.3.7.dist-info Directory - -
distlib Directory - -
distlib-0.3.8.dist-info Directory - -
docopt-0.6.2.dist-info Directory - -
dodgy Directory - -
dodgy-0.2.1.dist-info Directory - -
filelock Directory - -
filelock-3.13.1.dist-info Directory - -
flake8 Directory - -
flake8-5.0.4.dist-info Directory - -
flake8_polyfill Directory - -
flake8_polyfill-1.0.2.dist-info Directory - -
frozenlist Directory - -
frozenlist-1.4.0.dist-info Directory - -
future Directory - -
future-0.18.3.dist-info Directory - -
git Directory - -
gitdb Directory - -
gitdb-4.0.10.dist-info Directory - -
guppy Directory - -
guppy3-3.1.3.dist-info Directory - -
hc_json_rpc_client Directory - -
hc_json_rpc_client-1.0.1.dist-info Directory - -
idna Directory - -
idna-3.4.dist-info Directory - -
iniconfig Directory - -
iniconfig-2.0.0.dist-info Directory - -
isort Directory - -
isort-5.12.0.dist-info Directory - -
jinja2 Directory - -
jsonschema Directory - -
jsonschema-3.2.0.dist-info Directory - -
jwt Directory - -
lazy_object_proxy Directory - -
lazy_object_proxy-1.9.0.dist-info Directory - -
libfuturize Directory - -
libpasteurize Directory - -
lve_stats-2.0.dist-info Directory - -
lve_utils Directory - -
lvemanager Directory - -
lvestats Directory - -
lxml Directory - -
lxml-4.9.2.dist-info Directory - -
mako Directory - -
markupsafe Directory - -
mccabe-0.7.0.dist-info Directory - -
mock Directory - -
mock-5.1.0.dist-info Directory - -
multidict Directory - -
multidict-6.0.4.dist-info Directory - -
numpy Directory - -
numpy-1.25.1.dist-info Directory - -
numpy.libs Directory - -
packaging Directory - -
packaging-23.1.dist-info Directory - -
past Directory - -
pep8_naming-0.10.0.dist-info Directory - -
pip Directory - -
pip-25.0.1.dist-info Directory - -
pkg_resources Directory - -
platformdirs Directory - -
platformdirs-3.11.0.dist-info Directory - -
pluggy Directory - -
pluggy-1.2.0.dist-info Directory - -
prettytable Directory - -
prettytable-3.8.0.dist-info Directory - -
prometheus_client Directory - -
prometheus_client-0.8.0.dist-info Directory - -
prospector Directory - -
prospector-1.10.2.dist-info Directory - -
psutil Directory - -
psutil-5.9.5.dist-info Directory - -
psycopg2 Directory - -
psycopg2_binary-2.9.6.dist-info Directory - -
psycopg2_binary.libs Directory - -
pycodestyle-2.9.1.dist-info Directory - -
pycparser Directory - -
pycparser-2.21.dist-info Directory - -
pydantic Directory - -
pydantic-2.4.2.dist-info Directory - -
pydantic_core Directory - -
pydantic_core-2.10.1.dist-info Directory - -
pydocstyle Directory - -
pydocstyle-6.3.0.dist-info Directory - -
pyfakefs Directory - -
pyfakefs-5.2.3.dist-info Directory - -
pyflakes Directory - -
pyflakes-2.5.0.dist-info Directory - -
pylint Directory - -
pylint-2.17.4.dist-info Directory - -
pylint_celery Directory - -
pylint_celery-0.3.dist-info Directory - -
pylint_django Directory - -
pylint_django-2.5.3.dist-info Directory - -
pylint_flask Directory - -
pylint_flask-0.6.dist-info Directory - -
pylint_plugin_utils Directory - -
pylint_plugin_utils-0.7.dist-info Directory - -
pylve-2.1-py3.11.egg-info Directory - -
pymysql Directory - -
pyparsing Directory - -
pyparsing-3.0.9.dist-info Directory - -
pyrsistent Directory - -
pyrsistent-0.19.3.dist-info Directory - -
pytest Directory - -
pytest-7.4.0.dist-info Directory - -
pytest_check Directory - -
pytest_check-2.5.3.dist-info Directory - -
pytest_snapshot Directory - -
pytest_snapshot-0.9.0.dist-info Directory - -
pytest_subprocess Directory - -
pytest_subprocess-1.5.0.dist-info Directory - -
pytest_tap Directory - -
pytest_tap-3.5.dist-info Directory - -
python_pam-1.8.4.dist-info Directory - -
pyvirtualdisplay Directory - -
raven Directory - -
raven-6.10.0.dist-info Directory - -
requests Directory - -
requests-2.31.0.dist-info Directory - -
requirements_detector Directory - -
requirements_detector-1.2.2.dist-info Directory - -
schema-0.7.5.dist-info Directory - -
semver Directory - -
semver-3.0.1.dist-info Directory - -
sentry_sdk Directory - -
sentry_sdk-1.29.2.dist-info Directory - -
setoptconf Directory - -
setoptconf_tmp-0.3.1.dist-info Directory - -
setuptools Directory - -
setuptools-78.1.0.dist-info Directory - -
simplejson Directory - -
simplejson-3.19.1.dist-info Directory - -
six-1.16.0.dist-info Directory - -
smmap Directory - -
smmap-5.0.0.dist-info Directory - -
snowballstemmer Directory - -
snowballstemmer-2.2.0.dist-info Directory - -
sqlalchemy Directory - -
sqlalchemy-1.3.24.dist-info Directory - -
ssa Directory - -
svgwrite Directory - -
svgwrite-1.4.3.dist-info Directory - -
tap Directory - -
tap_py-3.2.1.dist-info Directory - -
testfixtures Directory - -
testfixtures-7.1.0.dist-info Directory - -
toml Directory - -
toml-0.10.2.dist-info Directory - -
tomlkit Directory - -
tomlkit-0.11.8.dist-info Directory - -
typing_extensions-4.8.0.dist-info Directory - -
unshare-0.22.dist-info Directory - -
urllib3 Directory - -
urllib3-2.0.4.dist-info Directory - -
vendors_api Directory - -
virtualenv Directory - -
virtualenv-20.21.1.dist-info Directory - -
wcwidth Directory - -
wcwidth-0.2.6.dist-info Directory - -
wmt Directory - -
wrapt Directory - -
wrapt-1.15.0.dist-info Directory - -
yaml Directory - -
yarl Directory - -
yarl-1.9.2.dist-info Directory - -
_cffi_backend.cpython-311-x86_64-linux-gnu.so File 274048 bytes April 17 2025 13:11:30.
_pyrsistent_version.py File 23 bytes April 17 2025 13:10:58.
cl_proc_hidepid.py File 4638 bytes June 05 2025 09:53:15.
clcontrollib.py File 52970 bytes June 05 2025 09:53:15.
cldetectlib.py File 18565 bytes June 05 2025 09:53:15.
cldiaglib.py File 46943 bytes June 05 2025 09:53:15.
clhooklib.py File 1296 bytes July 11 2025 17:46:23.
cli_utils.py File 1698 bytes June 05 2025 09:53:15.
cllicenselib.py File 9322 bytes June 05 2025 09:53:15.
clsetuplib.py File 4452 bytes June 05 2025 09:53:15.
clsudo.py File 14761 bytes June 23 2025 12:47:48.
configparser.py File 1546 bytes April 17 2025 13:10:58.
ddt.py File 12733 bytes April 17 2025 13:10:58.
distutils-precedence.pth File 151 bytes April 17 2025 13:10:58.
docopt.py File 19946 bytes April 17 2025 13:10:58.
hc_lve_profiler.py File 6353 bytes May 22 2025 11:14:48.
lveapi.py File 19994 bytes June 05 2025 09:53:15.
lvectllib.py File 105010 bytes June 05 2025 09:53:15.
lvestat.py File 6997 bytes June 23 2025 12:47:48.
mccabe.py File 10654 bytes April 17 2025 13:10:58.
pam.py File 7556 bytes April 17 2025 13:10:58.
pep8ext_naming.py File 19052 bytes April 17 2025 13:10:58.
py.py File 263 bytes April 17 2025 13:10:58.
pycodestyle.py File 103501 bytes April 17 2025 13:10:58.
pylve.cpython-311-x86_64-linux-gnu.so File 26088 bytes March 18 2025 16:24:34.
remove_ubc.py File 5864 bytes June 05 2025 09:53:15.
schema.py File 30221 bytes April 17 2025 13:10:58.
secureio.py File 19278 bytes June 23 2025 12:47:48.
simple_rpm.so File 11560 bytes June 23 2025 12:23:46.
six.py File 34549 bytes April 17 2025 13:10:58.
typing_extensions.py File 103397 bytes June 07 2025 10:31:54.
unshare.cpython-311-x86_64-linux-gnu.so File 8368 bytes April 17 2025 13:11:30.

Reading File: //opt/cloudlinux/venv/lib64/python3.11//site-packages/clsudo.py

# coding=utf-8

# Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2018 All Rights Reserved
#
# Licensed under CLOUD LINUX LICENSE AGREEMENT
# http://cloudlinux.com/docs/LICENSE.TXT

import os
import pwd
import grp
import re
import subprocess
import tempfile
from stat import S_IRUSR, S_IRGRP


class NoSuchUser(Exception):
    def __init__(self, user):
        Exception.__init__(self, f'No such user ({user})')


class NoSuchGroup(Exception):
    def __init__(self, group):
        Exception.__init__(self, f'No such group ({group})')


class UnableToReadFile(Exception):
    def __init__(self):
        Exception.__init__(self, 'Cannot read sudoers file')


class UnableToWriteFile(Exception):
    def __init__(self):
        Exception.__init__(self, 'Cannot modify sudoers file')


SUDOERS_FILE = '/etc/sudoers'
ALIAS_LVECTL_CMDS = ["/bin/ps", "/bin/grep", "/sbin/service", "/usr/bin/getcontrolpaneluserspackages",
                     "/usr/sbin/lvectl", "/usr/local/directadmin/plugins/new_lvemanager/admin/GetDomains",
                     "/usr/share/l.v.e-manager/utils/cloudlinux-cli.py"]

ALIAS_LVECTL_USER_CMDS = ["/usr/share/l.v.e-manager/utils/cloudlinux-cli-user.py"]

ALIAS_SELECTOR_CMDS = ["/usr/bin/cl-selector", "/usr/bin/piniset", "/usr/sbin/lveps", "/usr/bin/selectorctl"]

DEFAULTS_REQUIRETTY = 'Defaults:%s !requiretty'
# Patterns for group
GROUP_LVECTL_SELECTOR = '%%%s ALL=NOPASSWD: LVECTL_CMDS, SELECTOR_CMDS'
GROUP_DEFAULTS_REQUIRETTY = 'Defaults:%%%s !requiretty'


class Clsudo:
    """
    Adds CloudLinux users to sudoers file
    """
    filepath = None
    sudoers_list = []
    has_action = False
    has_group_action = False
    has_alias = False
    has_user_alias = False
    has_rights = False
    has_user_rights = False
    has_selector_alias = False
    has_selector_rights = False
    has_cagefs_alias = False
    has_cagefs_rights = False

    @staticmethod
    def add_user(user, sudoers_file=SUDOERS_FILE):
        """
        Adds username to sudoers file (for lvemanager)
        """
        # Update command lists for lvemanager
        Clsudo.update_commands_list(sudoers_file)
        Clsudo._check_user(user)
        Clsudo._get_contents(user)

        if not Clsudo.has_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias LVECTL_CMDS = ' + ", ".join(ALIAS_LVECTL_CMDS))
        if not Clsudo.has_user_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias LVECTL_USER_CMDS = ' + ", ".join(ALIAS_LVECTL_USER_CMDS))
        if not Clsudo.has_selector_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias SELECTOR_CMDS = ' + ", ".join(ALIAS_SELECTOR_CMDS))
        if not Clsudo.has_rights:
            Clsudo.sudoers_list.append(f'{user} ALL=NOPASSWD: LVECTL_CMDS')
        if not Clsudo.has_user_rights:
            Clsudo.sudoers_list.append(f'{user} ALL=(ALL) NOPASSWD: LVECTL_USER_CMDS')
        if not Clsudo.has_selector_rights:
            Clsudo.sudoers_list.append(f'{user} ALL=NOPASSWD: SELECTOR_CMDS')
        if not Clsudo.has_action:
            Clsudo.sudoers_list.append(DEFAULTS_REQUIRETTY % (user,))
        Clsudo._write_contents()

    @staticmethod
    def add_cagefs_user(user, sudoers_file=SUDOERS_FILE):
        """
        Adds username to sudoers file (for cagefs)
        """
        Clsudo.filepath = sudoers_file
        Clsudo._check_user(user)
        Clsudo._get_contents(user)
        if not Clsudo.has_cagefs_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias CAGEFS_CMDS = /usr/sbin/cagefsctl, '
                                       '/bin/ps, /bin/grep, /sbin/service')
        if not Clsudo.has_cagefs_rights:
            Clsudo.sudoers_list.append(f'{user} ALL=NOPASSWD: CAGEFS_CMDS')
        if not Clsudo.has_action:
            Clsudo.sudoers_list.append(DEFAULTS_REQUIRETTY % (user,))
        Clsudo._write_contents()

    @staticmethod
    def add_lvemanager_group(group_name, sudoers_file=SUDOERS_FILE):
        """
        Adds group to sudoers file, grants access to LVE Manager
        """
        # Update command lists for lvemanager
        Clsudo.update_commands_list(sudoers_file)
        Clsudo._check_group(group_name)
        Clsudo._get_contents_group(group_name)
        if not Clsudo.has_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias LVECTL_CMDS = ' + ", ".join(ALIAS_LVECTL_CMDS))
        if not Clsudo.has_selector_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias SELECTOR_CMDS = ' + ", ".join(ALIAS_SELECTOR_CMDS))
        if not Clsudo.has_action:
            Clsudo.sudoers_list.append(GROUP_LVECTL_SELECTOR % (group_name,))
        if not Clsudo.has_group_action:
            Clsudo.sudoers_list.append(GROUP_DEFAULTS_REQUIRETTY % (group_name,))
        # writes file
        Clsudo._write_contents()

    @staticmethod
    def remove_user(user, sudoers_file=SUDOERS_FILE):
        """
         Removes username from sudoers file
        """
        Clsudo.filepath = sudoers_file
        try:
            with open(Clsudo.filepath, encoding='utf-8') as f:
                Clsudo.sudoers_list = f.read().splitlines()
            idx = 0
            removed = False
            while idx < len(Clsudo.sudoers_list):
                line = Clsudo.sudoers_list[idx]
                if ((f'{user} ALL=NOPASSWD:') in line) or ((DEFAULTS_REQUIRETTY % (user,)) in line):
                    Clsudo.sudoers_list.remove(line)
                    removed = True
                    continue
                idx += 1
            if removed:
                Clsudo._write_contents()
        except (IOError, OSError) as e:
            raise UnableToReadFile() from e

    @staticmethod
    def update_user(user, sudoers_file=SUDOERS_FILE):
        """
        updates username in sudoers file
        :param user: username for caching
        :param sudoers_file: path to /etc/sudoers (only for tests)
        :return: None
        """
        # Update command lists
        Clsudo.update_commands_list(sudoers_file)
        # For backward compatibility
        # Check user presence in system
        Clsudo._check_user(user)
        Clsudo._get_contents(user)

    @staticmethod
    def update_commands_list(sudoers_file=SUDOERS_FILE):
        """
        Update command lists for lvemanager plugin
        If any required command absent in file, add it
        :param sudoers_file: path to /etc/sudoers
        :return: None
        """
        # Read /etc/sudoers
        Clsudo.filepath = sudoers_file
        Clsudo.temp_dir = os.path.dirname(Clsudo.filepath)
        Clsudo._read_sudoers()
        cmnd_dict = {"Cmnd_Alias LVECTL_CMDS": ALIAS_LVECTL_CMDS,
                     "Cmnd_Alias SELECTOR_CMDS": ALIAS_SELECTOR_CMDS}
        is_sudoer_change = False
        for idx, command_string in enumerate(Clsudo.sudoers_list):
            for aliase_key, aliase_list in cmnd_dict.items():
                if aliase_key in command_string:
                    command_string = command_string.replace(aliase_key, "").strip()
                    cmnd_list = command_string.split(",")
                    for aliase_cmnd_item in aliase_list:
                        if aliase_cmnd_item not in cmnd_list:
                            is_sudoer_change = True
                            Clsudo.sudoers_list[idx] = f"{aliase_key} = {', '.join(aliase_list)}"
                            break
            if is_sudoer_change:
                Clsudo._write_contents()

    @staticmethod
    def _check_user(user):
        """
        Checks passwd database for username presence
        @param user: string
        """
        try:
            pwd.getpwnam(user)
        except KeyError as e:
            raise NoSuchUser(user) from e

    @staticmethod
    def _check_group(group_name):
        """
        Checks grp database for group_name presence
        @param group_name: string
        """
        try:
            grp.getgrnam(group_name)
        except KeyError as e:
            raise NoSuchGroup(group_name) from e

    @staticmethod
    def _read_sudoers():
        with open(Clsudo.filepath, encoding='utf-8') as f:
            Clsudo.sudoers_list = f.read().splitlines()

    @staticmethod
    def _get_contents(user):
        """
        Reads file into list of strings
        @param user: string
        """
        # Clear all status flags
        Clsudo.has_action = False
        Clsudo.has_group_action = False
        Clsudo.has_alias = False
        Clsudo.has_user_alias = False
        Clsudo.has_rights = False
        Clsudo.has_user_rights = False
        Clsudo.has_selector_alias = False
        Clsudo.has_selector_rights = False
        Clsudo.has_cagefs_alias = False
        Clsudo.has_cagefs_rights = False
        require_tty_pattern = re.compile(rf'Defaults:\s*{user}\s*!requiretty')

        try:
            # Read sudoers file
            Clsudo._read_sudoers()
            for idx, command_string in enumerate(Clsudo.sudoers_list):
                if "Cmnd_Alias LVECTL_CMDS" in command_string:
                    Clsudo.has_alias = True
                    continue
                if "Cmnd_Alias LVECTL_USER_CMDS" in command_string:
                    Clsudo.has_user_alias = True
                    continue
                if "Cmnd_Alias CAGEFS_CMDS" in command_string:
                    Clsudo.has_cagefs_alias = True
                    continue
                if f"{user} ALL=NOPASSWD: LVECTL_CMDS" in command_string:
                    Clsudo.has_rights = True
                    continue
                if f"{user} ALL=(ALL) NOPASSWD: LVECTL_USER_CMDS" in command_string:
                    Clsudo.has_user_rights = True
                    continue
                if f"{user} ALL=NOPASSWD: CAGEFS_CMDS" in command_string:
                    Clsudo.has_cagefs_rights = True
                    continue
                if "requiretty" in command_string:
                    pattern_match = require_tty_pattern.search(command_string)
                    if pattern_match:
                        Clsudo.has_action = True
                    continue
                if "Cmnd_Alias SELECTOR_CMDS" in command_string:
                    if 'piniset' not in command_string:
                        Clsudo.sudoers_list[idx] = command_string.replace(
                            '/usr/bin/cl-selector',
                            '/usr/bin/cl-selector, /usr/bin/piniset',
                        )
                    if 'lveps' not in command_string:
                        Clsudo.sudoers_list[idx] = command_string.replace(
                            '/usr/bin/cl-selector, /usr/bin/piniset',
                            '/usr/bin/cl-selector, /usr/bin/piniset, /usr/sbin/lveps',
                        )
                    Clsudo.has_selector_alias = True
                    continue
                if f"{user} ALL=NOPASSWD: SELECTOR_CMDS" in command_string:
                    Clsudo.has_selector_rights = True
                    continue
        except (IOError, OSError) as e:
            raise UnableToReadFile() from e

    @staticmethod
    def _get_contents_group(group_name):
        """
        Reads file into list of strings
        @param group_name: string
        """
        # Clear all status flags
        Clsudo.has_action = False
        Clsudo.has_group_action = False
        Clsudo.has_alias = False
        Clsudo.has_rights = False
        Clsudo.has_selector_alias = False
        Clsudo.has_selector_rights = False
        Clsudo.has_cagefs_alias = False
        Clsudo.has_cagefs_rights = False
        group_prefix = f"%{group_name}"
        group_action = f"Defaults:%{group_name}"
        group_pattern = re.compile(rf'{group_name}\s*ALL=NOPASSWD:\s*LVECTL_CMDS,\s*SELECTOR_CMDS')

        try:
            # Read sudoers file
            Clsudo._read_sudoers()
            for idx, command_string in enumerate(Clsudo.sudoers_list):
                if "Cmnd_Alias SELECTOR_CMDS" in command_string:
                    if 'piniset' not in command_string:
                        Clsudo.sudoers_list[idx] = command_string.replace(
                            '/usr/bin/cl-selector',
                            '/usr/bin/cl-selector, /usr/bin/piniset',
                        )
                    if 'lveps' not in command_string:
                        Clsudo.sudoers_list[idx] = command_string.replace(
                            '/usr/bin/cl-selector, /usr/bin/piniset',
                            '/usr/bin/cl-selector, /usr/bin/piniset, /usr/sbin/lveps',
                        )
                    Clsudo.has_selector_alias = True
                    continue
                if "Cmnd_Alias LVECTL_CMDS" in command_string:
                    Clsudo.has_alias = True
                    continue
                if "Cmnd_Alias CAGEFS_CMDS" in command_string:
                    Clsudo.has_cagefs_alias = True
                    continue
                if command_string.startswith(group_prefix):
                    pattern_match = group_pattern.search(command_string)
                    if pattern_match:
                        Clsudo.has_action = True
                if command_string.startswith(group_action):
                    Clsudo.has_group_action = True
        except (IOError, OSError) as e:
            raise UnableToReadFile() from e

    @staticmethod
    def _write_contents():
        """
        Writes data to temporary file then checks it and rewrites sudoers file
        """
        try:
            temp_dir = os.path.dirname(Clsudo.filepath)
            temp_prefix = 'lve_sudoers_'
            fd, temp_path = tempfile.mkstemp(prefix=temp_prefix, dir=temp_dir)
            fo = os.fdopen(fd, 'w')
            fo.write('\n'.join(Clsudo.sudoers_list) + '\n')
            fo.close()
            mask = S_IRUSR | S_IRGRP
            os.chmod(temp_path, mask)
            if not Clsudo._is_file_valid(temp_path):
                raise IOError
        except (IOError, OSError) as e:
            try:
                if os.path.exists(temp_path):
                    os.unlink(temp_path)
            except Exception:
                pass
            raise UnableToWriteFile() from e
        try:
            os.rename(temp_path, Clsudo.filepath)
        except OSError as e:
            raise UnableToWriteFile() from e

    @staticmethod
    def _is_file_valid(filename):
        cmd = [
            '/usr/sbin/visudo',
            '-c',
            '-f', filename
        ]
        with subprocess.Popen(
            cmd,
            stdin=subprocess.DEVNULL,
            stdout=subprocess.PIPE,
            stderr=subprocess.STDOUT,
        ) as proc:
            proc.communicate()
            if proc.returncode != 0:
                return False
        return True

SILENT KILLER Tool