Linux bear.hostingplus.cl 4.18.0-513.18.1.lve.2.el8.x86_64 #1 SMP Sat Mar 30 15:36:11 UTC 2024 x86_64
LiteSpeed
Server IP : 192.140.57.17 & Your IP : 216.73.216.38
Domains :
Cant Read [ /etc/named.conf ]
User : explo
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
sbin /
Delete
Unzip
Name
Size
Permission
Date
Action
cagefs_enter_site
1.83
KB
-rwxr-xr-x
2026-03-24 06:59
cagefsctl-user
12.89
KB
-rwxr-xr-x
2026-03-24 06:59
chroot
41.45
KB
-rwxr-xr-x
2026-03-24 10:05
cloudlinux-selector
654
B
-rwxr-xr-x
2026-03-13 16:15
consoletype
11.88
KB
-rwxr-xr-x
2025-11-10 07:42
cracklib-check
13.05
KB
-rwxr-xr-x
2019-10-11 21:47
cracklib-format
251
B
-rwxr-xr-x
2019-10-11 21:47
cracklib-packer
13.05
KB
-rwxr-xr-x
2019-10-11 21:47
cracklib-unpacker
9.03
KB
-rwxr-xr-x
2019-10-11 21:47
create-cracklib-dict
990
B
-rwxr-xr-x
2019-10-11 21:47
ddns-confgen
20.45
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-checkds
936
B
-rwxr-xr-x
2025-11-06 04:45
dnssec-coverage
938
B
-rwxr-xr-x
2025-11-06 04:45
dnssec-dsfromkey
60.84
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-importkey
60.84
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-keyfromlabel
64.76
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-keygen
72.84
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-keymgr
934
B
-rwxr-xr-x
2025-11-06 04:45
dnssec-revoke
56.74
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-settime
60.84
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-signzone
117.2
KB
-rwxr-xr-x
2025-11-06 04:45
dnssec-verify
52.84
KB
-rwxr-xr-x
2025-11-06 04:45
exim
1.25
KB
-rwxr-xr-x
2026-02-03 15:25
faillock
20.52
KB
-rwxr-xr-x
2025-12-17 15:54
genrandom
12.38
KB
-rwxr-xr-x
2025-11-06 04:45
ip
693.3
KB
-rwxr-xr-x
2024-05-23 04:36
isc-hmac-fixup
11.85
KB
-rwxr-xr-x
2025-11-06 04:45
ldconfig
986.09
KB
-rwxr-xr-x
2026-03-17 14:06
lvdctl
5.42
KB
-rwxr-xr-x
2026-03-10 11:09
mkhomedir_helper
24.44
KB
-rwxr-xr-x
2025-12-17 15:54
named-checkzone
36.63
KB
-rwxr-xr-x
2025-11-06 04:45
named-compilezone
36.63
KB
-rwxr-xr-x
2025-11-06 04:45
nsec3hash
12.29
KB
-rwxr-xr-x
2025-11-06 04:45
pam_console_apply
45.2
KB
-rwxr-xr-x
2025-12-17 15:54
pam_timestamp_check
11.87
KB
-rwxr-xr-x
2025-12-17 15:54
pluginviewer
20.57
KB
-rwxr-xr-x
2022-02-23 17:13
proxyexec
21.17
KB
-r-xr-xr-x
2020-09-02 03:49
pwhistory_helper
20.44
KB
-rwxr-xr-x
2025-12-17 15:54
saslauthd
94.42
KB
-rwxr-xr-x
2022-02-23 17:13
sasldblistusers2
20.77
KB
-rwxr-xr-x
2022-02-23 17:13
saslpasswd2
16.42
KB
-rwxr-xr-x
2022-02-23 17:13
sendmail
1.26
KB
-rwxr-xr-x
2026-02-03 15:25
testsaslauthd
16.66
KB
-rwxr-xr-x
2022-02-23 17:13
tmpwatch
35.47
KB
-rwxr-xr-x
2019-10-12 08:32
tsig-keygen
20.45
KB
-rwxr-xr-x
2025-11-06 04:45
unix_chkpwd
36.86
KB
-rwxr-xr-x
2025-12-17 15:54
unix_update
36.86
KB
-rwx------
2025-12-17 15:54
Save
Rename
#!/opt/cloudlinux/venv/bin/python3 -bb # coding=utf-8 # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2026 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # http://cloudlinux.com/docs/LICENSE.TXT # # lvdctl — end-user utility for managing per-domain (LVD) resource limits. # JSON-only output. import argparse import json import logging import os import sys from clcommon.clpwd import ClPwd from websiteisolation.commands import cmd_apply, cmd_list, cmd_set from websiteisolation.config import resolve_lve_id from websiteisolation.exceptions import LvdError VERSION = '1.0.0' def _setup_logging(): log_dir = os.path.join(ClPwd(min_uid=0).get_pw_by_uid(os.getuid())[0].pw_dir, '.lve') log_path = os.path.join(log_dir, 'lvdctl.log') logger = logging.getLogger('websiteisolation') logger.setLevel(logging.DEBUG) logger.propagate = False fmt = logging.Formatter('[%(levelname)s | %(asctime)s]: %(message)s') os.makedirs(log_dir, mode=0o700, exist_ok=True) fh = logging.FileHandler(log_path) fh.setLevel(logging.DEBUG) fh.setFormatter(fmt) logger.addHandler(fh) def _output(data): """Print JSON response to stdout.""" print(json.dumps(data, indent=2)) def _error(message, exit_code=1): """Print JSON error to stdout and exit.""" _output({'result': 'error', 'message': str(message)}) sys.exit(exit_code) def _add_user_args(parser): """Add mutually exclusive --lve-id / --username to a subparser.""" group = parser.add_mutually_exclusive_group() group.add_argument('--lve-id', type=int, metavar='ID', help='LVE (user) ID') group.add_argument('--username', metavar='NAME', help='username (alternative to --lve-id)') def _add_domain_arg(parser, required=True): parser.add_argument('--domain', required=required, metavar='NAME', help='domain name') def _add_limit_args(parser): parser.add_argument('--cpu', type=int, metavar='VAL', help='CPU limit (hundredths of percent, 2500 = 25%%)') parser.add_argument('--pmem', type=int, metavar='VAL', help='physical memory limit (bytes)') parser.add_argument('--io', type=int, metavar='VAL', help='I/O limit (KB/s)') parser.add_argument('--nproc', type=int, metavar='VAL', help='max processes') parser.add_argument('--iops', type=int, metavar='VAL', help='I/O operations per second') def _collect_limits(args): limits = {} for field in ('cpu', 'pmem', 'io', 'nproc', 'iops'): val = getattr(args, field, None) if val is not None: limits[field] = val return limits def handle_list(args): lve_id = resolve_lve_id(args.lve_id, args.username) return cmd_list(lve_id=lve_id, domain=args.domain) def handle_set(args): lve_id = resolve_lve_id(args.lve_id, args.username) limits = _collect_limits(args) if not limits: _error("at least one limit (--cpu, --pmem, --io, --nproc, --iops) required") return cmd_set(lve_id, args.domain, limits) def handle_apply(args): lve_id = resolve_lve_id(args.lve_id, args.username) return cmd_apply(lve_id, args.domain) def build_parser(): parser = argparse.ArgumentParser( prog='lvdctl', description='Manage per-domain (LVD) resource limits. JSON-only output.') parser.add_argument('--version', action='version', version=json.dumps({'version': VERSION})) sub = parser.add_subparsers(dest='command', metavar='command') # list p = sub.add_parser('list', help='show limits for all domains or a specific domain') _add_user_args(p) _add_domain_arg(p, required=False) p.set_defaults(func=handle_list) # set p = sub.add_parser('set', help='store per-domain limits and apply them to kernel', epilog='Example:\n' ' lvdctl set --domain example.com --cpu 5000 --pmem 268435456 --io 2048 --nproc 30 --iops 500\n' '\n' 'This sets: CPU 50%, 256 MB RAM, 2048 KB/s IO, 30 procs, 500 IOPS.\n' 'Use PYLVE_DEBUG=1 for verbose helper output.', formatter_class=argparse.RawDescriptionHelpFormatter) _add_user_args(p) _add_domain_arg(p) _add_limit_args(p) p.set_defaults(func=handle_set) # apply p = sub.add_parser('apply', help='push one domain\'s limits from config to kernel') _add_user_args(p) _add_domain_arg(p) p.set_defaults(func=handle_apply) return parser def main(): if os.getuid() == 0: _error("lvdctl must not be run as root; run as a regular user") _setup_logging() log = logging.getLogger(__name__) log.debug('Executing "%s"', ' '.join(sys.argv)) is_debug = int(os.environ.get('PYLVE_DEBUG', 0)) if is_debug: print(f"DEBUG [lvdctl]: uid={os.getuid()} argv={sys.argv}", file=sys.stderr) parser = build_parser() args = parser.parse_args() if not args.command: parser.print_help() sys.exit(1) try: result = args.func(args) _output(result) except LvdError as e: log.error('%s', e) _error(str(e)) except Exception as e: log.exception('unexpected error') _error(f"unexpected error: {e}") if __name__ == '__main__': main()