404

[ Avaa Bypassed ]




Upload:

Command:

elspacio@3.143.5.233: ~ $
# coding=utf-8

# Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2018 All Rights Reserved
#
# Licensed under CLOUD LINUX LICENSE AGREEMENT
# http://cloudlinux.com/docs/LICENSE.TXT

import os
import pwd
import grp
import re
import subprocess
import tempfile
from stat import S_IRUSR, S_IRGRP


class NoSuchUser(Exception):
    def __init__(self, user):
        Exception.__init__(self, f'No such user ({user})')


class NoSuchGroup(Exception):
    def __init__(self, group):
        Exception.__init__(self, f'No such group ({group})')


class UnableToReadFile(Exception):
    def __init__(self):
        Exception.__init__(self, 'Cannot read sudoers file')


class UnableToWriteFile(Exception):
    def __init__(self):
        Exception.__init__(self, 'Cannot modify sudoers file')


SUDOERS_FILE = '/etc/sudoers'
ALIAS_LVECTL_CMDS = ["/bin/ps", "/bin/grep", "/sbin/service", "/usr/bin/getcontrolpaneluserspackages",
                     "/usr/sbin/lvectl", "/usr/local/directadmin/plugins/new_lvemanager/admin/GetDomains",
                     "/usr/share/l.v.e-manager/utils/cloudlinux-cli.py"]

ALIAS_LVECTL_USER_CMDS = ["/usr/share/l.v.e-manager/utils/cloudlinux-cli-user.py"]

ALIAS_SELECTOR_CMDS = ["/usr/bin/cl-selector", "/usr/bin/piniset", "/usr/sbin/lveps", "/usr/bin/selectorctl"]

DEFAULTS_REQUIRETTY = 'Defaults:%s !requiretty'
# Patterns for group
GROUP_LVECTL_SELECTOR = '%%%s ALL=NOPASSWD: LVECTL_CMDS, SELECTOR_CMDS'
GROUP_DEFAULTS_REQUIRETTY = 'Defaults:%%%s !requiretty'


class Clsudo:
    """
    Adds CloudLinux users to sudoers file
    """
    filepath = None
    sudoers_list = []
    has_action = False
    has_group_action = False
    has_alias = False
    has_user_alias = False
    has_rights = False
    has_user_rights = False
    has_selector_alias = False
    has_selector_rights = False
    has_cagefs_alias = False
    has_cagefs_rights = False

    @staticmethod
    def add_user(user, sudoers_file=SUDOERS_FILE):
        """
        Adds username to sudoers file (for lvemanager)
        """
        # Update command lists for lvemanager
        Clsudo.update_commands_list(sudoers_file)
        Clsudo._check_user(user)
        Clsudo._get_contents(user)

        if not Clsudo.has_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias LVECTL_CMDS = ' + ", ".join(ALIAS_LVECTL_CMDS))
        if not Clsudo.has_user_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias LVECTL_USER_CMDS = ' + ", ".join(ALIAS_LVECTL_USER_CMDS))
        if not Clsudo.has_selector_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias SELECTOR_CMDS = ' + ", ".join(ALIAS_SELECTOR_CMDS))
        if not Clsudo.has_rights:
            Clsudo.sudoers_list.append(f'{user} ALL=NOPASSWD: LVECTL_CMDS')
        if not Clsudo.has_user_rights:
            Clsudo.sudoers_list.append(f'{user} ALL=(ALL) NOPASSWD: LVECTL_USER_CMDS')
        if not Clsudo.has_selector_rights:
            Clsudo.sudoers_list.append(f'{user} ALL=NOPASSWD: SELECTOR_CMDS')
        if not Clsudo.has_action:
            Clsudo.sudoers_list.append(DEFAULTS_REQUIRETTY % (user,))
        Clsudo._write_contents()

    @staticmethod
    def add_cagefs_user(user, sudoers_file=SUDOERS_FILE):
        """
        Adds username to sudoers file (for cagefs)
        """
        Clsudo.filepath = sudoers_file
        Clsudo._check_user(user)
        Clsudo._get_contents(user)
        if not Clsudo.has_cagefs_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias CAGEFS_CMDS = /usr/sbin/cagefsctl, '
                                       '/bin/ps, /bin/grep, /sbin/service')
        if not Clsudo.has_cagefs_rights:
            Clsudo.sudoers_list.append(f'{user} ALL=NOPASSWD: CAGEFS_CMDS')
        if not Clsudo.has_action:
            Clsudo.sudoers_list.append(DEFAULTS_REQUIRETTY % (user,))
        Clsudo._write_contents()

    @staticmethod
    def add_lvemanager_group(group_name, sudoers_file=SUDOERS_FILE):
        """
        Adds group to sudoers file, grants access to LVE Manager
        """
        # Update command lists for lvemanager
        Clsudo.update_commands_list(sudoers_file)
        Clsudo._check_group(group_name)
        Clsudo._get_contents_group(group_name)
        if not Clsudo.has_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias LVECTL_CMDS = ' + ", ".join(ALIAS_LVECTL_CMDS))
        if not Clsudo.has_selector_alias:
            Clsudo.sudoers_list.append('Cmnd_Alias SELECTOR_CMDS = ' + ", ".join(ALIAS_SELECTOR_CMDS))
        if not Clsudo.has_action:
            Clsudo.sudoers_list.append(GROUP_LVECTL_SELECTOR % (group_name,))
        if not Clsudo.has_group_action:
            Clsudo.sudoers_list.append(GROUP_DEFAULTS_REQUIRETTY % (group_name,))
        # writes file
        Clsudo._write_contents()

    @staticmethod
    def remove_user(user, sudoers_file=SUDOERS_FILE):
        """
         Removes username from sudoers file
        """
        Clsudo.filepath = sudoers_file
        try:
            with open(Clsudo.filepath, encoding='utf-8') as f:
                Clsudo.sudoers_list = f.read().splitlines()
            idx = 0
            removed = False
            while idx < len(Clsudo.sudoers_list):
                line = Clsudo.sudoers_list[idx]
                if ((f'{user} ALL=NOPASSWD:') in line) or ((DEFAULTS_REQUIRETTY % (user,)) in line):
                    Clsudo.sudoers_list.remove(line)
                    removed = True
                    continue
                idx += 1
            if removed:
                Clsudo._write_contents()
        except (IOError, OSError) as e:
            raise UnableToReadFile() from e

    @staticmethod
    def update_user(user, sudoers_file=SUDOERS_FILE):
        """
        updates username in sudoers file
        :param user: username for caching
        :param sudoers_file: path to /etc/sudoers (only for tests)
        :return: None
        """
        # Update command lists
        Clsudo.update_commands_list(sudoers_file)
        # For backward compatibility
        # Check user presence in system
        Clsudo._check_user(user)
        Clsudo._get_contents(user)

    @staticmethod
    def update_commands_list(sudoers_file=SUDOERS_FILE):
        """
        Update command lists for lvemanager plugin
        If any required command absent in file, add it
        :param sudoers_file: path to /etc/sudoers
        :return: None
        """
        # Read /etc/sudoers
        Clsudo.filepath = sudoers_file
        Clsudo.temp_dir = os.path.dirname(Clsudo.filepath)
        Clsudo._read_sudoers()
        cmnd_dict = {"Cmnd_Alias LVECTL_CMDS": ALIAS_LVECTL_CMDS,
                     "Cmnd_Alias SELECTOR_CMDS": ALIAS_SELECTOR_CMDS}
        is_sudoer_change = False
        for idx, command_string in enumerate(Clsudo.sudoers_list):
            for aliase_key, aliase_list in cmnd_dict.items():
                if aliase_key in command_string:
                    command_string = command_string.replace(aliase_key, "").strip()
                    cmnd_list = command_string.split(",")
                    for aliase_cmnd_item in aliase_list:
                        if aliase_cmnd_item not in cmnd_list:
                            is_sudoer_change = True
                            Clsudo.sudoers_list[idx] = f"{aliase_key} = {', '.join(aliase_list)}"
                            break
            if is_sudoer_change:
                Clsudo._write_contents()

    @staticmethod
    def _check_user(user):
        """
        Checks passwd database for username presence
        @param user: string
        """
        try:
            pwd.getpwnam(user)
        except KeyError as e:
            raise NoSuchUser(user) from e

    @staticmethod
    def _check_group(group_name):
        """
        Checks grp database for group_name presence
        @param group_name: string
        """
        try:
            grp.getgrnam(group_name)
        except KeyError as e:
            raise NoSuchGroup(group_name) from e

    @staticmethod
    def _read_sudoers():
        with open(Clsudo.filepath, encoding='utf-8') as f:
            Clsudo.sudoers_list = f.read().splitlines()

    @staticmethod
    def _get_contents(user):
        """
        Reads file into list of strings
        @param user: string
        """
        # Clear all status flags
        Clsudo.has_action = False
        Clsudo.has_group_action = False
        Clsudo.has_alias = False
        Clsudo.has_user_alias = False
        Clsudo.has_rights = False
        Clsudo.has_user_rights = False
        Clsudo.has_selector_alias = False
        Clsudo.has_selector_rights = False
        Clsudo.has_cagefs_alias = False
        Clsudo.has_cagefs_rights = False
        require_tty_pattern = re.compile(rf'Defaults:\s*{user}\s*!requiretty')

        try:
            # Read sudoers file
            Clsudo._read_sudoers()
            for idx, command_string in enumerate(Clsudo.sudoers_list):
                if "Cmnd_Alias LVECTL_CMDS" in command_string:
                    Clsudo.has_alias = True
                    continue
                if "Cmnd_Alias LVECTL_USER_CMDS" in command_string:
                    Clsudo.has_user_alias = True
                    continue
                if "Cmnd_Alias CAGEFS_CMDS" in command_string:
                    Clsudo.has_cagefs_alias = True
                    continue
                if f"{user} ALL=NOPASSWD: LVECTL_CMDS" in command_string:
                    Clsudo.has_rights = True
                    continue
                if f"{user} ALL=(ALL) NOPASSWD: LVECTL_USER_CMDS" in command_string:
                    Clsudo.has_user_rights = True
                    continue
                if f"{user} ALL=NOPASSWD: CAGEFS_CMDS" in command_string:
                    Clsudo.has_cagefs_rights = True
                    continue
                if "requiretty" in command_string:
                    pattern_match = require_tty_pattern.search(command_string)
                    if pattern_match:
                        Clsudo.has_action = True
                    continue
                if "Cmnd_Alias SELECTOR_CMDS" in command_string:
                    if 'piniset' not in command_string:
                        Clsudo.sudoers_list[idx] = command_string.replace(
                            '/usr/bin/cl-selector',
                            '/usr/bin/cl-selector, /usr/bin/piniset',
                        )
                    if 'lveps' not in command_string:
                        Clsudo.sudoers_list[idx] = command_string.replace(
                            '/usr/bin/cl-selector, /usr/bin/piniset',
                            '/usr/bin/cl-selector, /usr/bin/piniset, /usr/sbin/lveps',
                        )
                    Clsudo.has_selector_alias = True
                    continue
                if f"{user} ALL=NOPASSWD: SELECTOR_CMDS" in command_string:
                    Clsudo.has_selector_rights = True
                    continue
        except (IOError, OSError) as e:
            raise UnableToReadFile() from e

    @staticmethod
    def _get_contents_group(group_name):
        """
        Reads file into list of strings
        @param group_name: string
        """
        # Clear all status flags
        Clsudo.has_action = False
        Clsudo.has_group_action = False
        Clsudo.has_alias = False
        Clsudo.has_rights = False
        Clsudo.has_selector_alias = False
        Clsudo.has_selector_rights = False
        Clsudo.has_cagefs_alias = False
        Clsudo.has_cagefs_rights = False
        group_prefix = f"%{group_name}"
        group_action = f"Defaults:%{group_name}"
        group_pattern = re.compile(rf'{group_name}\s*ALL=NOPASSWD:\s*LVECTL_CMDS,\s*SELECTOR_CMDS')

        try:
            # Read sudoers file
            Clsudo._read_sudoers()
            for idx, command_string in enumerate(Clsudo.sudoers_list):
                if "Cmnd_Alias SELECTOR_CMDS" in command_string:
                    if 'piniset' not in command_string:
                        Clsudo.sudoers_list[idx] = command_string.replace(
                            '/usr/bin/cl-selector',
                            '/usr/bin/cl-selector, /usr/bin/piniset',
                        )
                    if 'lveps' not in command_string:
                        Clsudo.sudoers_list[idx] = command_string.replace(
                            '/usr/bin/cl-selector, /usr/bin/piniset',
                            '/usr/bin/cl-selector, /usr/bin/piniset, /usr/sbin/lveps',
                        )
                    Clsudo.has_selector_alias = True
                    continue
                if "Cmnd_Alias LVECTL_CMDS" in command_string:
                    Clsudo.has_alias = True
                    continue
                if "Cmnd_Alias CAGEFS_CMDS" in command_string:
                    Clsudo.has_cagefs_alias = True
                    continue
                if command_string.startswith(group_prefix):
                    pattern_match = group_pattern.search(command_string)
                    if pattern_match:
                        Clsudo.has_action = True
                if command_string.startswith(group_action):
                    Clsudo.has_group_action = True
        except (IOError, OSError) as e:
            raise UnableToReadFile() from e

    @staticmethod
    def _write_contents():
        """
        Writes data to temporary file then checks it and rewrites sudoers file
        """
        try:
            temp_dir = os.path.dirname(Clsudo.filepath)
            temp_prefix = 'lve_sudoers_'
            fd, temp_path = tempfile.mkstemp(prefix=temp_prefix, dir=temp_dir)
            fo = os.fdopen(fd, 'w')
            fo.write('\n'.join(Clsudo.sudoers_list) + '\n')
            fo.close()
            mask = S_IRUSR | S_IRGRP
            os.chmod(temp_path, mask)
            if not Clsudo._is_file_valid(temp_path):
                raise IOError
        except (IOError, OSError) as e:
            try:
                if os.path.exists(temp_path):
                    os.unlink(temp_path)
            except Exception:
                pass
            raise UnableToWriteFile() from e
        try:
            os.rename(temp_path, Clsudo.filepath)
        except OSError as e:
            raise UnableToWriteFile() from e

    @staticmethod
    def _is_file_valid(filename):
        cmd = [
            '/usr/sbin/visudo',
            '-c',
            '-f', filename
        ]
        with subprocess.Popen(
            cmd,
            stdin=subprocess.DEVNULL,
            stdout=subprocess.PIPE,
            stderr=subprocess.STDOUT,
        ) as proc:
            proc.communicate()
            if proc.returncode != 0:
                return False
        return True

Filemanager

Name Type Size Permission Actions
GitPython-3.1.32.dist-info Folder 0755
Jinja2-3.0.3.dist-info Folder 0755
Mako-1.2.4.dist-info Folder 0755
MarkupSafe-2.1.3.dist-info Folder 0755
PyJWT-2.8.0.dist-info Folder 0755
PyMySQL-1.1.0.dist-info Folder 0755
PyVirtualDisplay-3.0.dist-info Folder 0755
PyYAML-6.0.1.dist-info Folder 0755
SQLAlchemy-1.3.24.dist-info Folder 0755
__pycache__ Folder 0755
_distutils_hack Folder 0755
_pytest Folder 0755
_yaml Folder 0755
aiohttp Folder 0755
aiohttp-3.9.2.dist-info Folder 0755
aiosignal Folder 0755
aiosignal-1.3.1.dist-info Folder 0755
alembic Folder 0755
alembic-1.11.1.dist-info Folder 0755
astroid Folder 0755
astroid-2.15.6.dist-info Folder 0755
async_timeout Folder 0755
async_timeout-4.0.3.dist-info Folder 0755
attr Folder 0755
attrs Folder 0755
attrs-23.1.0.dist-info Folder 0755
certifi Folder 0755
certifi-2023.7.22.dist-info Folder 0755
cffi Folder 0755
cffi-1.15.1.dist-info Folder 0755
chardet Folder 0755
chardet-5.2.0.dist-info Folder 0755
charset_normalizer Folder 0755
charset_normalizer-2.1.1.dist-info Folder 0755
cl_dom_collector Folder 0755
clcagefslib Folder 0755
clcommon Folder 0755
clconfig Folder 0755
clconfigure Folder 0755
cldashboard Folder 0755
clevents Folder 0755
clflags Folder 0755
cllicense Folder 0755
cllimits Folder 0755
cllimits_validator Folder 0755
cllimitslib_v2 Folder 0755
cllvectl Folder 0755
clpackages Folder 0755
clquota Folder 0755
clselect Folder 0755
clselector Folder 0755
clsentry Folder 0755
clsummary Folder 0755
clveconfig Folder 0755
clwizard Folder 0755
colorama Folder 0755
colorama-0.4.6.dist-info Folder 0755
contextlib2 Folder 0755
contextlib2-21.6.0.dist-info Folder 0755
coverage Folder 0755
coverage-7.2.7.dist-info Folder 0755
cryptography Folder 0755
cryptography-41.0.2.dist-info Folder 0755
ddt-1.4.4.dist-info Folder 0755
dill Folder 0755
dill-0.3.7.dist-info Folder 0755
distlib Folder 0755
distlib-0.3.8.dist-info Folder 0755
docopt-0.6.2.dist-info Folder 0755
dodgy Folder 0755
dodgy-0.2.1.dist-info Folder 0755
filelock Folder 0755
filelock-3.13.1.dist-info Folder 0755
flake8 Folder 0755
flake8-5.0.4.dist-info Folder 0755
flake8_polyfill Folder 0755
flake8_polyfill-1.0.2.dist-info Folder 0755
frozenlist Folder 0755
frozenlist-1.4.0.dist-info Folder 0755
future Folder 0755
future-0.18.3.dist-info Folder 0755
git Folder 0755
gitdb Folder 0755
gitdb-4.0.10.dist-info Folder 0755
guppy Folder 0755
guppy3-3.1.3.dist-info Folder 0755
idna Folder 0755
idna-3.4.dist-info Folder 0755
iniconfig Folder 0755
iniconfig-2.0.0.dist-info Folder 0755
isort Folder 0755
isort-5.12.0.dist-info Folder 0755
jinja2 Folder 0755
jsonschema Folder 0755
jsonschema-3.2.0.dist-info Folder 0755
jwt Folder 0755
lazy_object_proxy Folder 0755
lazy_object_proxy-1.9.0.dist-info Folder 0755
libfuturize Folder 0755
libpasteurize Folder 0755
lve_stats-2.0.dist-info Folder 0755
lve_utils Folder 0755
lvemanager Folder 0755
lvestats Folder 0755
lxml Folder 0755
lxml-4.9.2.dist-info Folder 0755
mako Folder 0755
markupsafe Folder 0755
mccabe-0.7.0.dist-info Folder 0755
mock Folder 0755
mock-5.1.0.dist-info Folder 0755
multidict Folder 0755
multidict-6.0.4.dist-info Folder 0755
numpy Folder 0755
numpy-1.25.1.dist-info Folder 0755
numpy.libs Folder 0755
packaging Folder 0755
packaging-23.1.dist-info Folder 0755
past Folder 0755
pep8_naming-0.10.0.dist-info Folder 0755
pip Folder 0755
pip-24.1.2.dist-info Folder 0755
pkg_resources Folder 0755
platformdirs Folder 0755
platformdirs-3.11.0.dist-info Folder 0755
pluggy Folder 0755
pluggy-1.2.0.dist-info Folder 0755
prettytable Folder 0755
prettytable-3.8.0.dist-info Folder 0755
prometheus_client Folder 0755
prometheus_client-0.8.0.dist-info Folder 0755
prospector Folder 0755
prospector-1.10.2.dist-info Folder 0755
psutil Folder 0755
psutil-5.9.5.dist-info Folder 0755
psycopg2 Folder 0755
psycopg2_binary-2.9.6.dist-info Folder 0755
psycopg2_binary.libs Folder 0755
pycodestyle-2.9.1.dist-info Folder 0755
pycparser Folder 0755
pycparser-2.21.dist-info Folder 0755
pydocstyle Folder 0755
pydocstyle-6.3.0.dist-info Folder 0755
pyfakefs Folder 0755
pyfakefs-5.2.3.dist-info Folder 0755
pyflakes Folder 0755
pyflakes-2.5.0.dist-info Folder 0755
pylint Folder 0755
pylint-2.17.4.dist-info Folder 0755
pylint_celery Folder 0755
pylint_celery-0.3.dist-info Folder 0755
pylint_django Folder 0755
pylint_django-2.5.3.dist-info Folder 0755
pylint_flask Folder 0755
pylint_flask-0.6.dist-info Folder 0755
pylint_plugin_utils Folder 0755
pylint_plugin_utils-0.7.dist-info Folder 0755
pylve-2.1-py3.11.egg-info Folder 0755
pymysql Folder 0755
pyparsing Folder 0755
pyparsing-3.0.9.dist-info Folder 0755
pyrsistent Folder 0755
pyrsistent-0.19.3.dist-info Folder 0755
pytest Folder 0755
pytest-7.4.0.dist-info Folder 0755
pytest_subprocess Folder 0755
pytest_subprocess-1.5.0.dist-info Folder 0755
pyvirtualdisplay Folder 0755
raven Folder 0755
raven-6.10.0.dist-info Folder 0755
requests Folder 0755
requests-2.31.0.dist-info Folder 0755
requirements_detector Folder 0755
requirements_detector-1.2.2.dist-info Folder 0755
schema-0.7.5.dist-info Folder 0755
semver Folder 0755
semver-3.0.1.dist-info Folder 0755
sentry_sdk Folder 0755
sentry_sdk-1.29.2.dist-info Folder 0755
setoptconf Folder 0755
setoptconf_tmp-0.3.1.dist-info Folder 0755
setuptools Folder 0755
setuptools-70.2.0.dist-info Folder 0755
simplejson Folder 0755
simplejson-3.19.1.dist-info Folder 0755
six-1.16.0.dist-info Folder 0755
smmap Folder 0755
smmap-5.0.0.dist-info Folder 0755
snowballstemmer Folder 0755
snowballstemmer-2.2.0.dist-info Folder 0755
sqlalchemy Folder 0755
ssa Folder 0755
svgwrite Folder 0755
svgwrite-1.4.3.dist-info Folder 0755
tap Folder 0755
tap.py-3.1.dist-info Folder 0755
testfixtures Folder 0755
testfixtures-7.1.0.dist-info Folder 0755
toml Folder 0755
toml-0.10.2.dist-info Folder 0755
tomlkit Folder 0755
tomlkit-0.11.8.dist-info Folder 0755
typing_extensions-4.7.1.dist-info Folder 0755
unshare-0.22.dist-info Folder 0755
urllib3 Folder 0755
urllib3-2.0.4.dist-info Folder 0755
vendors_api Folder 0755
virtualenv Folder 0755
virtualenv-20.21.1.dist-info Folder 0755
wcwidth Folder 0755
wcwidth-0.2.6.dist-info Folder 0755
wmt Folder 0755
wrapt Folder 0755
wrapt-1.15.0.dist-info Folder 0755
yaml Folder 0755
yarl Folder 0755
yarl-1.9.2.dist-info Folder 0755
_cffi_backend.cpython-311-x86_64-linux-gnu.so File 267.63 KB 0755
_pyrsistent_version.py File 23 B 0644
cl_proc_hidepid.py File 4.53 KB 0644
clcontrollib.py File 51.73 KB 0644
cldetectlib.py File 18.13 KB 0644
cldiaglib.py File 45.57 KB 0644
clhooklib.py File 1.27 KB 0644
cli_utils.py File 1.66 KB 0644
cllicenselib.py File 9.1 KB 0644
clsetuplib.py File 4.35 KB 0644
clsudo.py File 14.42 KB 0644
ddt.py File 12.43 KB 0644
distutils-precedence.pth File 151 B 0644
docopt.py File 19.48 KB 0644
lveapi.py File 19.53 KB 0644
lvectllib.py File 102.55 KB 0644
lvestat.py File 6.83 KB 0644
mccabe.py File 10.4 KB 0644
pep8ext_naming.py File 18.61 KB 0644
py.py File 263 B 0644
pycodestyle.py File 101.08 KB 0644
pylve.cpython-311-x86_64-linux-gnu.so File 25.48 KB 0755
remove_ubc.py File 5.73 KB 0755
schema.py File 29.51 KB 0644
secureio.py File 18.83 KB 0644
simple_rpm.so File 11.29 KB 0755
six.py File 33.74 KB 0644
typing_extensions.py File 108.48 KB 0644
unshare.cpython-311-x86_64-linux-gnu.so File 8.17 KB 0755