????

Your IP : 3.137.199.214


Current Path : /usr/local/ssl/share/cagefs/
Upload File :
Current File : //usr/local/ssl/share/cagefs/cagefslib.py

# -*- coding: utf-8 -*-

# Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2019 All Rights Reserved
#
# Licensed under CLOUD LINUX LICENSE AGREEMENT
# http://cloudlinux.com/docs/LICENSE.TXT


from __future__ import print_function
from __future__ import absolute_import
from __future__ import division
from __future__ import unicode_literals

import locale
from typing import AnyStr, Dict, List, Optional
from future import standard_library
standard_library.install_aliases()
from builtins import *
import errno
import re
import sys
import shutil
import glob
import subprocess
import inspect
import pickle
import configparser
import time
import filecmp
import syslog
import traceback
import io
import datetime
import stat
import os
import functools

# provides functions for secure filesystem and I/O operations
from secureio import read_file_secure, write_file_secure, set_user_perm, open_file_not_symlink, set_root_perm
from secureio import create_dir_secure, closefd, set_owner_dir_secure, set_perm_dir_secure
from secureio import root_flag, print_error, get_groups, clpwd, SILENT_FLAG, logging, get_perm

# Provides functions to detect different control panels
import cldetectlib

from clcagefslib.const import CL_ALT_NAME, ETC_CL_ALT_PATH, BASEDIR
from clcagefslib.fs import get_linksafe_gid, get_user_prefix
from clcagefslib.io import make_userdir, read_file, read_file_cached
from clcagefslib.selector.configure import is_ea4_enabled
from clcagefslib.selector.paths import get_alt_dirs
from clcommon.clfunc import byteify, unicodeify
from clcommon import ClPwd, clcaptain
from clcommon.const import Feature
from clcommon.cpapi import is_panel_feature_supported
import phpinivalidator
from signals_handlers import sigterm_check
from clcommon.utils import (
    ExternalProgramFailed,
    is_socket_file,
    mod_makedirs,
)
from cldetectlib import get_boolean_param, CL_CONFIG_FILE
from logs import logger


class CageFSException(Exception):
    def __init__(self, *args, **kwargs):
        Exception.__init__(self, *args, **kwargs)


# This variables are set by cagefsctl module

ETC_VERSION_NAME = ".etc.version"
ETC_VERSION = "/" + ETC_VERSION_NAME

# CageFS global settings & values
CAGEFS_INI = '/etc/cagefs/cagefs.ini'
PHP_CONF = '/etc/cl.selector/php.conf'

ETC_TEMPLATE_DIR = "/usr/share/cagefs"
ETC_TEMPLATE_NEW_DIR = "/usr/share/cagefs/etc.new"

VAR_RUN_CAGEFS = '/var/run/cagefs'

VERBOSE_FLAG = 0

# Validate PHP options or not
validate_alt_php_ini = False

PHP_OPTIONS_LOGFILE = "/var/log/cagefs-php-opt-check.log"
php_log_opt = None

GLOBAL_PLESK_CFG = '/etc/psa/psa.conf'
FALLBACK_PLESK_VHOSTS_D = '/var/www/vhosts'

SYSTEMD_JOURNAL_SOCKET = '/run/systemd/journal/dev-log'
LOG_SOCKET = '/usr/share/cagefs-skeleton/dev/log'
DEV_LOG_SOCKET = '/dev/log'

SYSCONFIG_SYSLOG = "/etc/sysconfig/syslog"
CAGEFS_SOCKET = " -a " + LOG_SOCKET
RSYSLOG_CONF = '/etc/rsyslog.conf'
CHROOT_CONF = '/etc/rsyslog.d/cagefs-syslog-socket.conf'
CHROOT_OLD_CONF = '/etc/rsyslog.d/schroot.conf'

def touch(fname):
    """
    /bin/touch analog - update timestamp of a file if it exists
    or create a file otherwise
    :param fname: file path
    :type fname: string
    """
    try:
        os.utime(fname, None)
    except OSError:
        open(fname, 'a').close()


def _add_syslog_socket_for_syslog_pkg() -> None:
    """
    Add syslog socket into CageFS, add it to syslog config and restart
    syslog service
    """
    def _insert(original, new, pos):
        """
        Inserts new inside original at pos.
        """
        return original[:pos] + new + original[pos:]

    lines = read_file(SYSCONFIG_SYSLOG)
    for i, _ in enumerate(lines):
        if lines[i].startswith("SYSLOGD_OPTIONS"):
            # CageFS socket is not added yet ?
            if lines[i].find(CAGEFS_SOCKET) == -1:
                if lines[i][-2] == '"' or lines[i][-2] == "'":
                    tmp = _insert(lines[i], CAGEFS_SOCKET, -2)
                    lines[i] = tmp
                else:
                    tmp = _insert(lines[i], CAGEFS_SOCKET, -1)
                    lines[i] = tmp
            break

    write_file(SYSCONFIG_SYSLOG, lines, make_backup=True)
    ExecuteSimple('/sbin/service syslog restart &> /dev/null')


def _add_syslog_socket_for_rsyslog_pkg() -> None:
    """
    Add syslog socket into CageFS, add it to rsyslog config and restart
    rsyslog service
    """
    chroot_conf_content = f'$AddUnixListenSocket {LOG_SOCKET}\n'
    lines = read_file(RSYSLOG_CONF)
    for i, _ in enumerate(lines):
        pos = lines[i].find('$ModLoad imuxsock')
        if pos not in (-1, 0):
            # enable module `imuxsock` if it was disabled
            lines[i] = lines[i][pos:]
            break

    # if exists old rsyslog config file then unlink it
    if os.path.isfile(CHROOT_OLD_CONF):
        with open(CHROOT_OLD_CONF, "r") as f:
            old_content = f.read()
        if old_content == chroot_conf_content:
            os.unlink(CHROOT_OLD_CONF)

    write_file(
        RSYSLOG_CONF,
        lines,
        make_backup=True,
    )
    write_file(
        CHROOT_CONF,
        [chroot_conf_content],
        make_backup=True,
    )
    ExecuteSimple('/sbin/service rsyslog restart &> /dev/null')


def add_syslog_socket() -> None:
    """
    Add cagefs skeleton syslog socket to syslog config file.
    Create .conf file for rsyslog
    Restart syslog/rsyslog service
    """
    if is_new_syslog_socket_used():
        if is_old_syslog_socket_in_cage():
            # We should disable using of older version of socket in CageFS
            # if server has systemd-journal package which uses socket by path
            # SYSTEMD_JOURNAL_SOCKET.
            # The newer version of socket is mounted in function
            # cagefsctl._mount_systemd_journal_socket which is used at moment
            # mounting of CageFS skeleton
            # see for details: CAG-1062: Mount socket of systemd-journal into CageFS
            remove_syslog_socket()
            # touch /usr/share/cagefs/need.remount for future remounting already
            # mounted users because we want to provide changes to them
            touch('/usr/share/cagefs/need.remount')
    elif os.path.isfile(SYSCONFIG_SYSLOG):
        _add_syslog_socket_for_syslog_pkg()
    elif os.path.isfile(RSYSLOG_CONF):
        _add_syslog_socket_for_rsyslog_pkg()


def remove_syslog_socket():
    """
    Remove syslog socket info for cagefs from system syslog configs
    Restart syslog/rsyslog service
    """
    if os.path.isfile(SYSCONFIG_SYSLOG):
        lines = read_file(SYSCONFIG_SYSLOG)

        for i, _ in enumerate(lines):
            if lines[i].startswith("SYSLOGD_OPTIONS"):
                tmp = lines[i].replace(CAGEFS_SOCKET, "")
                lines[i] = tmp
                break

        write_file(
            SYSCONFIG_SYSLOG,
            lines,
            make_backup=True,
        )
        ExecuteSimple('/sbin/service syslog restart &> /dev/null')

    if os.path.isfile(CHROOT_CONF):
        try:
            os.unlink(CHROOT_CONF)
        except OSError as e:
            print_error('removing', CHROOT_CONF, ':', str(e))

        ExecuteSimple('/sbin/service rsyslog restart &> /dev/null')


def is_new_syslog_socket_used() -> bool:
    """
    File `/dev/log` is symlink to socket `/run/systemd/journal/dev-log` if
    server uses the newer version of syslog socket
    """
    return os.path.islink(DEV_LOG_SOCKET) and \
        os.path.realpath(DEV_LOG_SOCKET) == SYSTEMD_JOURNAL_SOCKET and \
        is_socket_file(SYSTEMD_JOURNAL_SOCKET)


def is_old_syslog_socket_in_cage() -> bool:
    """
    Return True if CageFS has into self an old syslog socket
    """
    return is_socket_file(LOG_SOCKET)


def getItem(txt1, txt2, op):
    try:
        i1 = int(txt1)
    except ValueError:
        i1 = -1
    try:
        i2 = int(txt2)
    except ValueError:
        i2 = -1
    if i1 == -1 or i2 == -1:
        if op == 0:
            return txt1 > txt2
        else:
            return txt1 < txt2
    else:
        if op == 0:
            return i1 > i2
        else:
            return i1 < i2

# Compare version of types xx.xx.xxx... and yyy.yy.yy.y..
# if xxx and yyy is numbers, than comapre as numbers
# else - compare as strings
def verCompare(base, test):
    base = base.split(".")
    test = test.split(".")
    if (len(base) > len(test)):
        ln = len(test)
    else:
        ln = len(base)
    for i in range(ln):
        if getItem(base[i], test[i], 0):
            return 1
        if getItem(base[i], test[i], 1):
            return -1
    if len(base) == len(test):
        return 0
    elif len(base) > len(test):
        return 1
    else:
        return -1

def unlink(path):
    try:
        os.unlink(path)
    except OSError:
        pass


# Write message to php options log file
def php_options_log_write(msg, unknown_options_list, invalid_values_options_list, invalid_options_list):
    global php_log_opt
    root_flag_saved = root_flag
    if not root_flag:
        uid, gid = get_perm()
        set_root_perm()
    try:
        if php_log_opt is None:
            umask_saved = os.umask(0o77)
            # log_file is opened in "line buffered" mode
            php_log_opt = open(PHP_OPTIONS_LOGFILE, 'a', 1)
            os.umask(umask_saved)
        php_log_opt.write(datetime.datetime.now().strftime("%Y.%m.%d %H:%M:%S") + ": " + msg + "\n")
        if unknown_options_list:
            php_log_opt.write(" - The following options have been disabled as unknown:\n")
            for option in unknown_options_list:
                php_log_opt.write("     * " + option + "\n")
        if invalid_values_options_list:
            php_log_opt.write(" - The following options have been disabled as have incorrect values:\n")
            for option in invalid_values_options_list:
                php_log_opt.write("     * " + option + "\n")
        if invalid_options_list:
            php_log_opt.write(" - The following options have been disabled as invalid (have no values):\n")
            for option in invalid_options_list:
                php_log_opt.write("     * " + option + "\n")
    except (OSError, IOError) as e:
        print_error("writing to ", PHP_OPTIONS_LOGFILE, str(e))
        sys.exit(1)
    if not root_flag_saved:
        set_user_perm(uid, gid)


def print_exception(level = syslog.LOG_ERR, includetraceback = False):
    exctype, exception, exctraceback = sys.exc_info()
    excclass = str(exception.__class__)
    message = str(exception)

    if not includetraceback:
        msg = "%s: %s" % (excclass, message)
        msg = msg.replace('Errno', 'Err code')
        syslog.syslog(level, msg)
        print(msg, file=sys.stderr)
    else:
        try:
            import StringIO
        except ImportError:
            # for python 3
            excfd = io.StringIO()
        else:
            # for python 2
            excfd = StringIO.StringIO()
        traceback.print_exception(exctype, exception, exctraceback, None, excfd)
        for line in excfd.getvalue().split("\n"):
            syslog.syslog(level, line)
            print(line, file=sys.stderr)


def _read_vhosts_dir():
    try:
        with open(GLOBAL_PLESK_CFG, 'rt') as f:
            data = f.read()
    except Exception:
        return None             # e.g. case when Plesk is not installed
    match = re.search(r'^HTTPD_VHOSTS_D[ \t]+(\S+)$', data, re.MULTILINE)
    if not match:
        return None
    return match.groups()[0].rstrip("/")

# CAG-673
PLESK_VHOSTS_D = _read_vhosts_dir() or FALLBACK_PLESK_VHOSTS_D


# Black list of files and directories (that should not exist in skeleton)
black_list = []


def is_in_black_list(_file):
    rfile = strip_path(_file)
    rfile = addslash(rfile)
    for path in black_list:
        path = addslash(path)
        if rfile.startswith(path):
            return True
    return False


def lineno():
    """Returns the current line number in program"""
    return inspect.currentframe().f_back.f_lineno


def stripslash(_dir):
    if _dir != '':
        if (_dir[-1] == '/'):
            return _dir[:-1]
    return _dir


def addslash(_dir):
    if _dir == '':
        return '/'
    if (_dir[-1] != '/'):
        return '%s/' % (_dir,)
    return _dir


# Turns on/off additional checks and debug output
# This variable is set by cagefsctl module
debug_option = False

# Path to skeleton set by cagefsctl module
SKELETON = ''

# Pathes to white and safe lists used by cagefs-fuse
# This variables are set by cagefsctl module
FUSE_WHITE_LIST = ''
FUSE_SAFE_LIST = ''

# Save (overwrite) safe list for cagefs-fuse
def save_etc_safe_list(safe_list):
    sigterm_check()
    umask_saved = os.umask(0o22)
    _file = open(FUSE_SAFE_LIST, 'w')
    for filename in safe_list:
        _file.write('%s\n' % filename)
    _file.close()
    os.umask(umask_saved)
    os.chmod(FUSE_SAFE_LIST, 0o600)



def strip_path(path: str) -> str:
    """
    Remove leading path to skeleton from the specified path.
    """
    path = path.removeprefix(SKELETON)
    return path or '/'



# White list of files in system's /etc directory
white_list = {}


# Function adds directory tree rooted in src to list
def add_tree_to_list(src, _list, follow_symlinks=False, cut_path=None, add_path=None):
    for name in os.listdir(src):
        srcname = os.path.join(src, name)
        path = srcname
        if cut_path != None:
            path = path[len(cut_path):]
        if add_path != None:
            path = add_path + path
        _list[path] = 1
        if os.path.isdir(srcname) and (follow_symlinks or (not os.path.islink(srcname))):
            add_tree_to_list(srcname, _list, cut_path=cut_path, add_path=add_path)



def get_real_path(path):
    return os.path.join(os.path.realpath(os.path.dirname(path)), os.path.basename(path))



def copy2etc(path: str) -> None:
    if not path.startswith('/etc/'):
        return

    if move_to_alternatives(path, etc=True):
        return

    if path.startswith('/etc/cl.php.d/') or path.startswith('/etc/cl.selector/'):
        return

    if path in ['/etc/passwd', '/etc/group', '/etc/shadow', '/etc/cl.php.d', '/etc/cl.selector']:
        return

    if not os.path.exists(path):
        return

    destination = ETC_TEMPLATE_NEW_DIR + path
    if os.path.isfile(path) or (os.path.islink(path)
                                and is_path_read_only_mounted(os.path.realpath(path))):
        copy_file(path, destination)
    else:
        copytree(path, destination, True)


# Returns True if path refers to object in /etc directory
# and adds to white_list directory tree rooted in path
# Also copies path to the template of /etc directory
def add_to_white_list(path):
    global white_list
    path = stripslash(path)
    # Strip path to skeleton from path
    path = strip_path(path)
    # path = get_real_path(path)
    copy2etc(path)
    if path.startswith('/etc/'):
        if (path not in white_list) and os.path.exists(path):
            white_list[path] = 1
            if os.path.isdir(path):
                add_tree_to_list(path, white_list, True)
        return True
    return False




# Function copies paths (list of paths) to the template of /etc directory
def copy_to_etc(paths):
    for path in paths:
        path = stripslash(path)
        # Strip path to skeleton from path
        path = strip_path(path)
        copy2etc(path)
        path2 = get_real_path(path)
        if path2 != path:
            copy2etc(path2)
        path3 = os.path.realpath(path)
        if path3 != path and path3 != path2:
            copy2etc(path3)
        if os.path.islink(path):
            linkto = os.readlink(path)
            copy2etc(linkto)




# lines of mp-file (set by cagefsctl module)
mounts = []


def path_includes_mount_point_comparator(path, mount):
    return mount.startswith(path)

def path_is_mounted_comparator(path, mount):
    return path.startswith(mount)

def mounts_are_found_comparator(path, mount):
    return path_includes_mount_point_comparator(path, mount) or path_is_mounted_comparator(path, mount)


# path == path to directory or file in skeleton
def mounts_are_found(path, comparator, mounts_list=None):
    if mounts_list is None:
        mounts_list = mounts
    # Strip path to skeleton from path
    path = strip_path(path)
    # path = os.path.realpath(path)
    path = addslash(path)
    if path.startswith('/etc/') or path.startswith('/var/log/'):
        return True
    for line in mounts_list:
        if line != '' and line[0] == '/':
            line = line.rstrip()
            line = addslash(line)
            if comparator(path, line):
                return True
    return False



# path == path to directory or file in skeleton
def path_is_mounted(path):
    return mounts_are_found(path, path_is_mounted_comparator)



# path == path to directory or file in skeleton
def path_includes_mount_point(path):
    return mounts_are_found(path, path_includes_mount_point_comparator)


def is_path_read_only_mounted(path: str) -> bool:
    from cagefsctl import MountpointConfig
    read_only_mounts = MountpointConfig().read_only_mounts
    return mounts_are_found(path,
                            path_is_mounted_comparator,
                            mounts_list=read_only_mounts)


# List of libraries for each binary file in cagefs-skeleton directory
# key = binary file
# value = list of libraries
libs_list = {}


def add_libs_to_list(binary, libs):
    global libs_list
    libs_list[binary] = libs


def get_libs_from_list(binary):
    try:
        return libs_list[binary]
    except KeyError:
        return None


def del_libs_from_list(binary):
    try:
        del libs_list[binary]
    except KeyError:
        pass


# Save libs_list to file
def save_libs(filename):
    sigterm_check()
    try:
        umask_saved = os.umask(0o77)
        _file = open(filename, "wb")
        pickle.dump(byteify(libs_list), _file, protocol=2)
        _file.close()
        os.umask(umask_saved)
        os.chmod(filename, 0o600)
    except Exception as err:
        print_error("while saving", filename, "-", err)


# Load libs_list from file
def load_libs(filename):
    global libs_list
    if os.path.isfile(filename):
        try:
            _file = open(filename, "rb")
            libs_list = unicodeify(pickle.load(_file, encoding=locale.getpreferredencoding()))
            _file.close()
        except Exception as err:
            print_error("loading", filename, "-", err)



# List of files and directories in cagefs-skeleton directory
files_list = {}


def path_is_in_list(path):
    path = stripslash(path)
    # Strip path to skeleton from path
    path = strip_path(path)
    path = get_real_path(path)
    return path in files_list



def check_error(path, linenum):
    if (not debug_option) or path_is_mounted(path):
        return
    # Strip path to skeleton from path
    path = strip_path(path)
    if os.path.lexists(path):
        if not path_is_in_list(path):
            print_error('Error in line', linenum, ': ', path, 'is not in list')



# Adds to list directory tree rooted in path
def add_to_list(path, add_tree = True):
    global files_list
    path = stripslash(path)
    if debug_option:
        rpath = get_real_path(path)
        if path != rpath:
            print_error('Error in line', lineno(), ': ', path, '!=', rpath)
    if os.path.lexists(path):
        # Strip path to skeleton from path
        path = strip_path(path)
        # if not path_is_mounted(path):
        if path not in files_list:
            files_list[path] = 1
            if add_tree and os.path.isdir(path) and (not os.path.islink(path)):
                add_tree_to_list(path, files_list, False)
    else:
        if debug_option:
            print_error('line', lineno(), 'path does not exist:', path)



stat_cache = {}

def cached_lstat(path, use_cache=True):
    global stat_cache
    if not use_cache:
        return os.lstat(path)
    try:
        res = stat_cache[path]
    except KeyError:
        stat_cache[path] = res = os.lstat(path)
    return res


def clear_stat_cache(path):
    try:
        del stat_cache[path]
    except KeyError:
        pass



# Returns True if files are "equal", False if not
def is_same_metadata(fileA, fileB, sbA=None, sbB=None, use_cache=True, relative_symlinks=False):
    if (sbA==None):
        sbA = cached_lstat(fileA, use_cache=use_cache)
    if (sbB==None):
        sbB = cached_lstat(fileB, use_cache=use_cache)

    if (stat.S_ISLNK(sbA[stat.ST_MODE]) != stat.S_ISLNK(sbB[stat.ST_MODE])):
        return False

    if (stat.S_ISLNK(sbA[stat.ST_MODE])):
        realfileA = os.readlink(fileA)
        realfileB = os.readlink(fileB)
        if relative_symlinks:
            relative_path = get_relative_path(realfileA, fileB)
            return realfileB == relative_path
        return realfileA == realfileB

    modeA = sbA[stat.ST_MODE]
    modeB = sbB[stat.ST_MODE]

    # clear SUID & SGID before comparing
    modeA = (modeA & ~stat.S_ISUID) & ~stat.S_ISGID
    modeB = (modeB & ~stat.S_ISUID) & ~stat.S_ISGID

    # Compare permissions and file type bits
    if modeA != modeB:
        return False

    # Comapre mtime, size, owner, group
    if (sbA[stat.ST_MTIME] != sbB[stat.ST_MTIME]) or (sbA[stat.ST_SIZE] != sbB[stat.ST_SIZE])\
                    or (sbA[stat.ST_UID] != sbB[stat.ST_UID]) or (sbA[stat.ST_GID] != sbB[stat.ST_GID]):
        return False

    return True



def is_update_needed(original, injail, origstatbuf=None, injailstatbuf=None, use_cache=True, relative_symlinks=False):
    """
    Returns: True if update of "injail" file is needed
             False if update is NOT needed (file in jail has same metadata)
    """
    try :
        return not is_same_metadata(original, injail, sbA=origstatbuf, sbB=injailstatbuf,
                                    use_cache=use_cache, relative_symlinks=relative_symlinks)
    except OSError as e:
        # file does not exist in cagefs-skeleton - update is needed
        return (e.errno == 2)


class StaticallyLinkedError(Exception):
    pass


def _parse_lib_path(line: str, executable: str) -> Optional[str]:
    if "no version information available" in line:
        return

    splitted = line.split()
    if not splitted:
        print_error('failed to parse ldd output', line[:-1])
        return

    if (splitted[0:2] == ['statically', 'linked']) \
            or (splitted[0:1] + splitted[2:4] == ['not', 'dynamic', 'executable']):
        raise StaticallyLinkedError()

    if splitted[0] in ('linux-gate.so.1', 'linux-vdso.so.1') \
            or (len(splitted) == 4 and splitted[2:4] == ['not', 'found']):
        return

    if len(splitted) >= 3:
        # the line containing dynamic linker may vary,
        # but we want it to be added to CageFS anyway
        dynamic_linker = '/lib64/ld-linux-x86-64.so.2'
        lib_path = dynamic_linker if dynamic_linker in splitted else splitted[2]
    elif len(splitted) >= 1 and splitted[0][0] == '/':
        lib_path = splitted[0]
    else:
        print_error('failed to parse ldd output', line[:-1])
        return

    if not os.path.exists(lib_path):
        print_error('ldd returns non existing library', lib_path, 'for', executable)
        return

    return lib_path


def get_ldd_libs(executable: str) -> List[str]:
    """
    Returns list of libraries for the executable
    """
    import struct
    retval = []
    try:
        # check if executable is binary
        f = open(executable, 'rb')
        # read 4 byte signature
        signature = struct.unpack('<I', f.read(4))[0]
        f.close()
    except:
        return retval

    # binary executables have signature 464C457Fh,
    # e.g. ELF (in little-endian format)
    if signature != 0x464C457F:
        return retval

    ldd_path = '/usr/bin/ldd'
    # ldd now prints warnings in stdout, they should be omitted
    # This array stores all error patterns for skip
    # Sample of line with such pattern:
    # <lib>: <other_lib>: no version information available (required by <lib>)
    # This warning doesn't produce any crucial errors, but can break parse

    # Note (gponomarenko): ldd can't load libraries from fs mounted with noexec option (e.g. /tmp)
    # When it tries then there is an error in stdout:
    # "error while loading shared libraries: <lib.so>: failed to map segment from shared object"
    p = subprocess.Popen([ldd_path, executable], shell=False,
                         stdin=subprocess.PIPE, stdout=subprocess.PIPE,
                         stderr=subprocess.PIPE, close_fds=True, text=True)
    for line in p.stdout.readlines():
        try:
            lib_path = _parse_lib_path(line, executable)
        except StaticallyLinkedError:
            break
        if lib_path is not None:
            retval.append(lib_path)

    return retval



# os.path.realpath() seems to do the same:
# NO: it cannot handle symlink resolving WITH a chroot
def resolve_realpath(path, chroot='', include_file=0):
    if (path=='/'):
        return '/'
    spath = split_path(path)
    basename = ''
    if (not include_file):
        basename = spath[-1]
        spath = spath[:-1]
    ret = '/'
    doscounter=0# a symlink loop may otherwise hang this script
    #print 'path',path,'spath',spath
    for entry in spath:
        ret = os.path.join(ret,entry)
        #print 'lstat',ret
        sb = cached_lstat(ret)
        if (stat.S_ISLNK(sb.st_mode)):
            doscounter+=1
            realpath = os.readlink(ret)
            if (realpath[0]=='/'):
                ret = os.path.normpath(chroot+realpath)
            else:
                tmp = os.path.normpath(os.path.join(os.path.dirname(ret),realpath))
                if (len(chroot)>0 and tmp[:len(chroot)]!=chroot):
                    print_error('symlink ', tmp, ' points outside jail, ABORT')
                    raise Exception("Symlink points outside jail")
                ret = tmp
    return os.path.join(ret,basename)



# similar to shutil.copymode(src, dst) but we do not copy any SUID bits
# the caller should catch any exceptions!
def copy_time_and_permissions(src, dst, be_verbose=0, allow_suid=0, copy_ownership=0):
    sbuf = os.stat(src)
#       in python 2.1 the return value is a tuple, not an object, st_mode is field 0
#       mode = stat.S_IMODE(sbuf.st_mode)
    mode = stat.S_IMODE(sbuf[stat.ST_MODE])
    if (not allow_suid):
        if (mode & (stat.S_ISUID | stat.S_ISGID)):
            logging('removing setuid and setgid permissions from '+dst, SILENT_FLAG, be_verbose)
            mode = (mode & ~stat.S_ISUID) & ~stat.S_ISGID
    os.utime(dst, (sbuf[stat.ST_ATIME], sbuf[stat.ST_MTIME]))
    if (copy_ownership):
        os.chown(dst, sbuf[stat.ST_UID], sbuf[stat.ST_GID])
    os.chmod(dst, mode)



def split_path(path):
    spath = path.split('/')
    res = []
    for item in spath:
        if item:
            res.append(item)
    return res


def join_path(spath):
    if (len(spath)==0):
        return '/'
    ret = ''
    for entry in spath:
        ret += '/'+entry
    return ret

handled_dir = {}
def gen_path_key(path, copy_permissions, copy_ownership):
    return path + "_"+str(copy_permissions) + "_" + str(copy_ownership)

def create_parent_path(chroot,path,be_verbose=0, copy_permissions=1, allow_suid=0, copy_ownership=0):
    sigterm_check()
    # Do not create path if it is in black list
    if is_in_black_list(path):
        return chroot+path
    # check if we already processed that directory
    global handled_dir
    key = gen_path_key(path, copy_permissions, copy_ownership)
    if key in handled_dir:
        return handled_dir[key]
    # the first part of the function checks the already existing paths in the jail
    # and follows any symlinks relative to the jail
    spath = split_path(path)
    existpath = chroot
    i=0
    while (i<len(spath)):
        sigterm_check()
        origpath = join_path(spath[0:i+1])
        origkey = gen_path_key(origpath, copy_permissions, copy_ownership)
        if origkey not in handled_dir:
            tmp1 = os.path.join(existpath,spath[i])
            if not os.path.exists(tmp1):
                break
            tmp = resolve_realpath(tmp1,chroot,1)
            if not os.path.exists(tmp):
                break
            existpath = tmp
            if copy_permissions and not path_is_mounted(existpath):
                try:
                    copy_time_and_permissions(origpath, existpath, be_verbose, allow_suid, copy_ownership)
                except OSError as e:
                    print_error('failed to copy time/permissions/owner from', origpath, 'to', existpath, ':', e.strerror)
            handled_dir[origkey]=existpath
        else:
            existpath = handled_dir[origkey]
        i+=1

    # the second part of the function creates the missing parts in the jail
    # according to the original directory names, including any symlinks
    while (i<len(spath)):
        sigterm_check()
        origpath = join_path(spath[0:i+1])
        jailpath = os.path.join(existpath,spath[i])
        try:
            sb = cached_lstat(origpath)
        except OSError as e:
            print_error('failed to lstat('+origpath+'):', e.strerror)
            return None

        if (stat.S_ISDIR(sb.st_mode)):

            try:
                injailsb = cached_lstat(jailpath)
                if not stat.S_ISDIR(injailsb.st_mode):
                    clear_stat_cache(jailpath)
                    os.unlink(jailpath)
            except OSError:
                pass

            logging('Create directory '+jailpath,SILENT_FLAG,be_verbose)

            try:
                os.mkdir(jailpath, 0o755)
                add_to_list(jailpath, False)
            except OSError as e:
                logging('Warning: failed to create directory ' + jailpath + ' -- ' + e.strerror, SILENT_FLAG, be_verbose)

            if (copy_permissions):
                try:
                    copy_time_and_permissions(origpath, jailpath, be_verbose, allow_suid, copy_ownership)
                except OSError as e:
                    print_error('failed to copy time/permissions/owner from', origpath, 'to', jailpath, ':', e.strerror)
        elif (stat.S_ISLNK(sb.st_mode)):
            realfile = update_symlink_in_skeleton(origpath, jailpath)
            add_to_list(jailpath, False)
            if (realfile[0]=='/'):
                jailpath = create_parent_path(chroot, realfile, be_verbose,
                                              copy_permissions, allow_suid, copy_ownership)
                check_error(jailpath, lineno())
            else:
                tmp = os.path.normpath(os.path.join(os.path.dirname(jailpath), realfile))
                if (len(chroot)>0 and tmp[:len(chroot)]!=chroot):
                    print_error('symlink '+tmp+' points outside jail, ABORT')
                    raise Exception("Symlink points outside jail")
                realfile = tmp[len(chroot):]
                jailpath = create_parent_path(chroot, realfile,
                                              be_verbose, copy_permissions, allow_suid, copy_ownership)
                check_error(jailpath, lineno())
        existpath = jailpath
        i+=1
    add_to_list(existpath, False)
    # save directory as processed so we don't test it twice.
    handled_dir[key]=existpath
    return existpath



def copy_with_permissions(src, dst, be_verbose=0, try_hardlink=1, retain_owner=0):
    """copies/links the file and the permissions, except any setuid or setgid bits"""
    if is_in_black_list(dst):
        return

    try:
        injailsb = cached_lstat(dst)
        if stat.S_ISDIR(injailsb.st_mode):
            clear_stat_cache(dst)
            shutil.rmtree(dst)
    except (IOError, OSError, shutil.Error):
        pass

    do_normal_copy = 1
    if (try_hardlink==1):
        try:
            os.link(src,dst)
            do_normal_copy = 0
            add_to_list(dst)
        except:
            print_error('Linking '+src+' to '+dst+' failed, will revert to copying')
            pass
    if (do_normal_copy == 1):
        try:
            shutil.copyfile(src,dst)
            add_to_list(dst, add_tree = False)
            copy_time_and_permissions(src, dst, be_verbose, allow_suid=0, copy_ownership=retain_owner)
        except (IOError, OSError, shutil.Error) as e:
            print_error('ERROR: copying file and permissions ', src, ' to ', dst, ': ', e.strerror)



def copy_device(chroot, path, be_verbose=1, retain_owner=1):
    if path_is_mounted(path):
        return
    try:
        sb = os.lstat(path)
    except OSError:
        logging('Device ' + path+ ' does NOT exist in real system',SILENT_FLAG,be_verbose)
        return
    create_parent_path(chroot, os.path.dirname(path), be_verbose, copy_permissions=1, allow_suid=0, copy_ownership=1)
    chrootpath = resolve_realpath(chroot+path,chroot)
    if (stat.S_ISCHR(sb.st_mode)):
        mode = 'c'
    elif (stat.S_ISBLK(sb.st_mode)):
        mode = 'b'
    elif (stat.S_ISLNK(sb.st_mode)):
        try:
            realfile = os.readlink(path)
            logging('Creating symlink '+chrootpath+' to '+realfile,SILENT_FLAG,be_verbose)
            remove_file_or_dir(chrootpath, check_mounts = True)
            os.symlink(realfile,chrootpath)
        except OSError:
            logging('Failed to create symlink '+chrootpath+' to '+realfile,SILENT_FLAG, 1)
        if realfile[0] != '/':
            realfile = os.path.normpath(os.path.join(os.path.dirname(path), realfile))
        if not realfile.startswith('/proc/') and os.path.exists(realfile):
            copy_device(chroot, realfile, be_verbose, retain_owner)
        return
    else:
        return
    # major = st_rdev divided by 256 (8bit reserved for the minor number)
    # minor = remainder of st_rdev divided by 256
    major, minor = divmod(sb.st_rdev, 256)
    try:
        if not os.path.lexists(chrootpath):
            logging('Creating device '+chroot+path,SILENT_FLAG,be_verbose)
            os.spawnlp(os.P_WAIT, 'mknod','mknod', chrootpath, str(mode), str(major), str(minor))
        else:
            logging('Device '+chrootpath+' does exist already',SILENT_FLAG,be_verbose)
        copy_time_and_permissions(path, chrootpath, allow_suid=0, copy_ownership=retain_owner)
    except OSError:
        logging('Failed to create device '+chrootpath,SILENT_FLAG, 1)



def copy_dir_recursive(chroot,_dir,force_overwrite=0, be_verbose=0, check_libs=1, try_hardlink=1, retain_owner=0, handledfiles=[], update=0):
    """copies a directory and the permissions recursive, except any setuid or setgid bits"""
    sigterm_check()
    if is_in_black_list(_dir):
        return handledfiles

    files2 = ()
    for entry in os.listdir(_dir):
        sigterm_check()
        tmp = os.path.join(_dir, entry)
        try:
            sbuf = cached_lstat(tmp)
            if (stat.S_ISDIR(sbuf.st_mode)):
                epath = create_parent_path(chroot, tmp, be_verbose=be_verbose, copy_permissions=1, allow_suid=0, copy_ownership=retain_owner)
                check_error(epath, lineno())
                # add_to_list(epath, False)
                handledfiles = copy_dir_recursive(chroot,tmp,force_overwrite, be_verbose, check_libs, try_hardlink, retain_owner, handledfiles, update=update)
            else:
                files2 += os.path.join(_dir, entry),
        except OSError as e:
            print_error('failed to investigate source file',tmp,':',e.strerror)
    handledfiles = copy_binaries_and_libs(chroot,files2,force_overwrite, be_verbose, check_libs, try_hardlink, retain_owner, handledfiles, update=update)
    if debug_option:
        for item in files2:
            check_error(item, lineno())
    return handledfiles




def libs_check_is_needed(_file, mode):
    return (_file.find('/lib') != -1 or _file.find('.so') != -1\
                            or (mode & (stat.S_IXUSR | stat.S_IXGRP | stat.S_IXOTH)))


def write_file(filename, lines, add_eol=False, make_backup=False):
    """
    Helper for write lines to file
    :param: filename `str` filename for write
    :param: lines `list` list with content lines
    :param: add_eol `bool` if True than add \n to end each line
    """
    sigterm_check()
    try:
        if make_backup:
            try:
                backup_name = "{}.bak".format(filename)
                shutil.copyfile(filename, backup_name)
                os.chmod(backup_name, stat.S_IMODE(os.lstat(filename).st_mode))
            except (IOError, OSError, shutil.Error):
                pass

        with open(filename, "w") as f:
            splitter = "" if not add_eol else "\n"
            f.write(splitter.join(lines))
    except (OSError, IOError):
        logging('Error: failed to write ' + filename, SILENT_FLAG, 1)
        sys.exit(1)


def isdigit(n):
    return n in ['0', '1', '2', '3', '4', '5', '6', '7', '8', '9']


# Function returns True if string contains digits only
def isdigits(s):
    if not s:
        return False
    for char in s:
        if not isdigit(char):
            return False
    return True



def get_version(line, sign):
    length = len(sign)
    pos = line.find(sign)
    if pos != -1:
        end = line[pos+length:]
        pos2 = 0
        while pos2 < len(end):
            if not isdigit(end[pos2]):
                break
            pos2 += 1
        ver = end[:pos2]
        return int(ver)
    return 0



# command = path to wrapper inside skeleton
def update_wrapper(program, alias, command):
    # copy content of the program
    script = program[:]

    # replace "ALIAS" with alias
    for i in range(len(script)):
        tmp = script[i].replace("ALIAS", alias)
        script[i] = tmp

    if os.path.isfile(command):
        try:
            os.unlink(command)
        except (OSError, IOError):
            logging('Error: failed to delete ' + command, SILENT_FLAG, 1)
            sys.exit(1)

    umask_saved = os.umask(0o22)
    write_file(command, script)
    os.umask(umask_saved)



# Returns True if wrapper is not installed or its version is older than required
# command = path to wrapper inside skeleton
def wrapper_not_installed(command, version, sign):
    if not os.path.isfile(command):
        # wrapper is NOT installed
        return True

    GREP = "/bin/grep"

    try:
        # run the "grep" command and suppress it's output
        p = subprocess.Popen([GREP, "-m", "1", sign, command],\
                                                        stdout=subprocess.PIPE, stderr=subprocess.PIPE, text=True)
        (out, _) = p.communicate()
        # check return code of the child
        if p.returncode == 2:
            # trouble
            logging('Error while executing ' + GREP + " -m 1 " + sign + " " + command, SILENT_FLAG, 1)
            # assume that wrapper is NOT installed
            return True
        elif p.returncode != 0:
            # signature is NOT found - wrapper is NOT installed yet
            return True
    except OSError:
        logging('Error: failed to run ' + GREP + " -m 1 " + sign + " " + command, SILENT_FLAG, 1)
        # assume that wrapper is NOT installed
        return True

    if out != None:
        ver = get_version(out, sign)
        if ver >= version:
            # wrapper is installed already
            return False

    # wrapper is NOT installed
    return True



# Path to wrapper scripts (sources)
PROXY_PATH = "/usr/share/cagefs/safeprograms/"

# Signature of proxy script
SIGNATURE = "#CageFS proxyexec wrapper - ver "

# pairs "Path to wrapper" : "Alias"
wrappers = {}

# pairs "Path to wrapper" : "Name of wrapper"
wrappers_names = {}


def get_proxy_version(lines: List[str]) -> int:
    """
    Detect wrapper version from the file lines.
    If unable to detect, return -1.
    """
    for line in lines:
        version = get_version(line, SIGNATURE)
        if version != 0:
            return version
    return -1


def install_wrapper(_file):
    # Strip path to skeleton from path to file
    _file = strip_path(_file)

    if not os.path.isfile(_file):
        return

    # Read lines of proxy script
    proxy = read_file(PROXY_PATH + wrappers_names[_file])

    # Determine version of proxy script
    proxy_ver = get_proxy_version(proxy)

    # Installing if version equals -1 as it's most likely user's custom wrapper
    if proxy_ver == -1 or wrapper_not_installed(SKELETON+_file, proxy_ver, SIGNATURE):
        update_wrapper(proxy, wrappers[_file], SKELETON+_file)

    try:
        # os.chmod(command, 0755)
        copy_time_and_permissions(_file, SKELETON+_file, be_verbose=0, allow_suid=0, copy_ownership=1)
    except (OSError, IOError):
        logging('Error: failed to set permissions/owner to ' + SKELETON+_file, SILENT_FLAG, 1)
        sys.exit(1)


# Returns True if file is wrapper
def update_proxy_wrapper(_file):
    sigterm_check()
    # Strip path to skeleton from path to file
    _file = strip_path(_file)

    if _file in wrappers:
        add_to_list(_file, add_tree = False)
        install_wrapper(_file)
        return True

    return False


def remove_file_or_dir(path, check_mounts = False):
    try:
        os.unlink(path)
    except (OSError, IOError):
        pass

    if os.path.isdir(path):
        if (not check_mounts) or (not path_includes_mount_point(path)):
            shutil.rmtree(path, True)
        else:
            logging('Error: failed to remove directory ' + path + 'because it includes mount points', SILENT_FLAG, 1)



# Paths to binaries (with appropriate alias) that can be replaced by alternatives
# alias -> path
orig_binaries = \
{
        'php' : '/usr/bin/php-cgi',
'php-cli' : '/usr/bin/php',
'php.ini' : '/etc/php.ini',
  'lsphp' : '/usr/local/bin/lsphp',
'php-fpm' : '/usr/local/sbin/php-fpm'
}

# original binaries are moved to this directory (in skeleton)
ALT_DEST_PATH = '/usr/selector'

# original php.ini is moved to this directory (in skeleton)
ALT_DEST_ETC_PATH = '/usr/selector.etc'

# User's "selector" directory that contains symlinks to alternatives
NATIVE_CONF = ETC_CL_ALT_PATH + '/' + 'native.conf'


def is_mandatory(alias):
    """
    Returns True if php file for appropriate alias is mandatory
    for proper work of PHP Selector (i.e the file should exist
    and should be replaced with symlink successfully)
    :param alias: alias for php file
    :type alias: string
    """
    if is_ea4_enabled():
        return False
    return alias in ('php', 'php-cli', 'php.ini')



config_loaded = False

def read_native_conf():
    global orig_binaries, config_loaded
    if not config_loaded:
        if os.path.isfile(NATIVE_CONF):
            f = open(NATIVE_CONF, 'r')
            for line in f:
                if not line.startswith('#'):
                    line = line.strip()
                    ar = line.split('=', 1)
                    if len(ar) == 2:
                        alias = ar[0].strip()
                        path = ar[1].strip()
                        if alias in orig_binaries:
                            orig_binaries[alias] = path
            f.close()
            config_loaded = True


def is_etc_in_native_conf():
    read_native_conf()
    for path in orig_binaries.values():
        path2 = os.path.realpath(path)
        if path2.startswith('/etc/'):
            return True
    return False



def get_usr_selector_path(alias):
    if alias == 'php.ini':
        return ALT_DEST_ETC_PATH+'/'+alias
    return ALT_DEST_PATH+'/'+alias


def kill_php(file_name):
    if file_name != '' and (not file_name.endswith('.ini')):
        Execute(['/usr/bin/killall', '-q', file_name], check_return_code=False)


def create_php_stub(alias):
    """
    Create stub (empty file) for php file.
    Return True when error has occured
    """
    if alias == 'php.ini':
        selector_dir = SKELETON + ALT_DEST_ETC_PATH
    else:
        selector_dir = SKELETON + ALT_DEST_PATH
    stub_path = os.path.join(selector_dir, alias)
    if not os.path.lexists(stub_path):
        try:
            if not os.path.isdir(selector_dir):
                mod_makedirs(selector_dir, 0o755)
            umask_saved = os.umask(0o22)
            open(stub_path, 'w').close()
            os.umask(umask_saved)
        except (OSError, IOError) as e:
            print_error("Failed to write:", stub_path, ':', str(e))
            return True
    if (linksafe_gid := get_linksafe_gid()) is not None:
        os.chown(stub_path, -1, linksafe_gid)
    return False


def move_to_alternatives(path, etc = False):
    """
    Move php file to /usr/selector* directory inside cagefs-skeleton and create symlink to it
    Return True if php binary has been moved successfully, False otherwise
    :param path: path to original php file
    :type path: string
    :param etc: True = /etc directory is being processed, False otherwise
    :type etc: bool
    """
    sigterm_check()
    if etc:
        if not path.startswith('/etc/'):
            return False
        spath = path
    else:
        spath = strip_path(path)

    read_native_conf()

    for alias in orig_binaries:
        sigterm_check()
        orig_path = os.path.realpath(orig_binaries[alias])
        if (spath == orig_path) and os.path.isfile(orig_path) and (not os.path.islink(orig_path)):
            if alias in ('php', 'php-cli', 'lsphp', 'php.ini'):
                if is_ea4_enabled():
                    create_php_stub(alias)
                    # do not move php file when EA4 is used
                    return False
            filename = alias
            DEST_PATH = get_usr_selector_path(alias)
            LINK_TO = ETC_CL_ALT_PATH+'/'+filename
            dest_file = SKELETON + DEST_PATH
            dest_dir = os.path.dirname(dest_file)
            if etc:
                orig_file = ETC_TEMPLATE_NEW_DIR + orig_path
            else:
                orig_file = SKELETON + orig_path

            for parent_path in (dest_dir, os.path.dirname(orig_file)):
                if not os.path.isdir(parent_path):
                    try:
                        mod_makedirs(parent_path, 0o755)
                    except OSError as e:
                        msg = f'Error: failed to create directory {parent_path} : {str(e).replace("Errno", "Err code")}'
                        logger.error(msg, exc_info=e)
                        logging(msg, SILENT_FLAG, 1)
                        return False

            if is_update_needed(orig_path, dest_file, use_cache=False):
                if copy_file(orig_path, dest_file, create_parent_dir = False):
                    file_name = os.path.basename(orig_path)
                    kill_php(file_name)
                    if copy_file(orig_path, dest_file, create_parent_dir = False):
                        logging('Error copying '+orig_path+' to '+dest_file, SILENT_FLAG, 1)
                        return False
            if (linksafe_gid := get_linksafe_gid()) is not None:
                os.chown(dest_file, -1, linksafe_gid)

            try:
                if os.path.islink(orig_file):
                    if os.readlink(orig_file) != LINK_TO:
                        os.unlink(orig_file)
                        os.symlink(LINK_TO, orig_file)
                else:
                    remove_file_or_dir(orig_file)
                    os.symlink(LINK_TO, orig_file)
            except OSError as e:
                msg = f'Error: failed to create symlink {orig_file} : {str(e).replace("Errno", "Err code")}'
                logger.error(msg, exc_info=e)
                logging(msg, SILENT_FLAG, 1)
                return False

            if not etc:
                add_to_list(orig_file, add_tree = False)
            return True

    return False


def is_path_in_exclusions(path):
    if path == '/':
        return True
    path = stripslash(path)
    return path in {
            '/bin',
            '/boot',
            '/dev',
            '/etc',
            '/lib',
            '/lost+found',
            '/mnt',
            '/proc',
            '/root',
            '/sbin',
            '/sys',
            '/tmp',
            '/usr',
            '/var',
            '/home',
            # Keep both dirs just to be sure for cases when two dirs exists
            # simultaneously, which is itself wrong configuration, but we don't
            # want to fail even in such case
            '/var/www/vhosts',
            PLESK_VHOSTS_D,
    }


PLESK_ORIG_WRAPPER_FILENAME = "/var/www/cgi-bin/cgi_wrapper/cgi_wrapper"

def __copy_wrapper(A, B, C=None):
    logging( 'Copying ' + A + ' to ' + B, SILENT_FLAG, 1)
    shutil.copyfile(A, B)
    if C:
        copy_time_and_permissions(C, B)
    else:
        copy_time_and_permissions(A, B)


def install_plesk_wrapper():
    sigterm_check()
    try:
        if cldetectlib.is_plesk():
            # copy Plesk wrappers
            CLOUDLINUX_WRAPPER = "/var/www/cgi-bin/cgi_wrapper/cloudlinux_wrapper"
            CLOUDLINUX_WRAPPER_PACKAGE = "/usr/share/cagefs-plugins/plesk-cagefs/cloudlinux_wrapper"
            WRAPPERS = (
                    (PLESK_ORIG_WRAPPER_FILENAME, SKELETON+"/var/www/cgi-bin/cgi_wrapper/cgi_wrapper.orig.cagefs", PLESK_ORIG_WRAPPER_FILENAME),
                    ("/usr/share/cagefs-plugins/plesk-cagefs/cgi_wrapper", SKELETON+PLESK_ORIG_WRAPPER_FILENAME, PLESK_ORIG_WRAPPER_FILENAME),
                    (CLOUDLINUX_WRAPPER_PACKAGE, SKELETON+CLOUDLINUX_WRAPPER, PLESK_ORIG_WRAPPER_FILENAME),
                    (CLOUDLINUX_WRAPPER_PACKAGE, CLOUDLINUX_WRAPPER, PLESK_ORIG_WRAPPER_FILENAME)
            )
            # create parent directory (/usr/share/cagefs-skeleton/var/www/cgi-bin/cgi_wrapper)
            dirpath = os.path.dirname(SKELETON+PLESK_ORIG_WRAPPER_FILENAME)
            if not os.path.lexists(dirpath):
                mod_makedirs(dirpath, 0o755)
            # Copy wrappers to cagefs skeleton
            for src, dst, perm in WRAPPERS:
                __copy_wrapper(src, dst, perm)
    except (OSError, IOError) as e:
        print_error('failed to install Plesk wrapper: ' + str(e))


# there is a very tricky situation for this function:
# suppose /srv/jail/opt/bin is a symlink to /usr/bin
# try to lstat(/srv/jail/opt/bin/foo) and you get the result for /usr/bin/foo
# so use resolve_realpath to find you want lstat(/srv/jail/usr/bin/foo)
#
def copy_binaries_and_libs(chroot, binarieslist, force_overwrite=0, be_verbose=0, check_libs=1, try_hardlink=1, retain_owner=0, try_glob_matching=0, handledfiles=[], update=0):
    """copies a list of executables and their libraries to the chroot"""
    sigterm_check()

    if (chroot[-1] == '/'):
        chroot = chroot[:-1]

    for _file in binarieslist:
        sigterm_check()
        if _file in handledfiles:
            continue

        # Build white list of files in etc directory and do nothing else
        if add_to_white_list(_file):
            if os.path.isfile(_file) or os.path.islink(_file):
                handledfiles.append(_file)
            continue

        # Do nothing if path is mounted to skeleton from real system
        if path_is_mounted(_file):
            if os.path.isfile(_file) or os.path.islink(_file):
                handledfiles.append(_file)
            continue

        try:
            sb = cached_lstat(_file)
        except OSError as e:
            if (e.errno == 2):
                if (try_glob_matching == 1):
                    ret = glob.glob(_file)
                    if (len(ret)>0):
                        handledfiles = copy_binaries_and_libs(chroot, ret, force_overwrite, be_verbose, check_libs,
                                                              try_hardlink=try_hardlink, retain_owner=retain_owner,
                                                              try_glob_matching=0, handledfiles=handledfiles, update=update)
                        if debug_option:
                            for item in ret:
                                check_error(item, lineno())
                    else:
                        logging('Source file(s) '+_file+' do not exist',SILENT_FLAG,be_verbose)
                else:
                    logging('Source file(s) '+_file+' do not exist',SILENT_FLAG,be_verbose)
            else:
                print_error('failed to investigate source file',_file,':',e.strerror)
            continue

        # source file exists, resolve the chroot realfile
        create_parent_path(chroot,os.path.dirname(_file), be_verbose, copy_permissions=1, allow_suid=0, copy_ownership=retain_owner)
        try:
            chrootrfile = resolve_realpath(os.path.normpath(chroot+'/'+_file),chroot)
        except OSError:
            continue

        # Check again after resolve_realpath...
        # Do nothing if path is mounted to skeleton from real system
        if path_is_mounted(chrootrfile):
            if os.path.isfile(_file) or os.path.islink(_file):
                handledfiles.append(_file)
            continue

        # Install wrapper and do nothing else
        if update_proxy_wrapper(chrootrfile):
            handledfiles.append(_file)
            continue

        if _file == PLESK_ORIG_WRAPPER_FILENAME:
            install_plesk_wrapper()
            handledfiles.append(_file)
            continue

        # Replace php binary with symlink (move php binary to /usr/selector)
        if move_to_alternatives(chrootrfile):
            php_libs = get_ldd_libs(_file)
            handledfiles = copy_binaries_and_libs(chroot, php_libs, force_overwrite, be_verbose,
                    check_libs = 0, try_hardlink = try_hardlink, handledfiles = handledfiles, update = update)
            handledfiles.append(_file)
            continue

        # Do nothing if path is blacklisted
        if is_in_black_list(chrootrfile):
            if os.path.isfile(_file) or os.path.islink(_file):
                handledfiles.append(_file)
            continue

        try:
            chrootsb = cached_lstat(chrootrfile)
            chrootfile_exists = 1
            add_to_list(chrootrfile)
        except OSError as e:
            if (e.errno == 2):
                chrootfile_exists = 0
            else:
                print_error('failed to investigate destination file ',chroot,_file,':',e.strerror)

        if ((force_overwrite == 0) and (update == 0) and chrootfile_exists and not stat.S_ISDIR(chrootsb.st_mode)):
            logging(''+chrootrfile+' already exists, will not touch it',SILENT_FLAG,be_verbose)
            check_error(chrootrfile, lineno())
        else:
            if (chrootfile_exists):
                if (force_overwrite):
                    if (stat.S_ISREG(chrootsb.st_mode) or stat.S_ISLNK(chrootsb.st_mode)):
                        logging('Destination file '+chrootrfile+' exists, will delete to force update',SILENT_FLAG,be_verbose)
                        try:
                            os.unlink(chrootrfile)
                        except OSError as e:
                            print_error('ERROR: failed to delete',chrootrfile,':',e.strerror)
                    elif (stat.S_ISDIR(chrootsb.st_mode)):
                        logging('Destination dir '+chrootrfile+' exists',SILENT_FLAG,be_verbose)
                elif (update):
                    if stat.S_ISREG(chrootsb.st_mode) or stat.S_ISLNK(chrootsb.st_mode):
                        if (is_update_needed(_file, chrootrfile, sb, chrootsb, relative_symlinks=True)):
                            logging('Destination file '+chrootrfile+' needs update',SILENT_FLAG,be_verbose)
                            try:
                                os.unlink(chrootrfile)
                            except OSError as e:
                                print_error('failed to delete',chrootrfile,':',e.strerror)
                        else:
                            logging('Destination file '+chrootrfile+' does NOT need update',SILENT_FLAG,be_verbose)
                            add_to_list(chrootrfile, add_tree = False)
                            check_error(chrootrfile, lineno())
                            handledfiles.append(_file)

                            if stat.S_ISLNK(chrootsb.st_mode):
                                try:
                                    realfile = os.readlink(_file)
                                except (OSError, IOError):
                                    realfile = None
                                if realfile != None and (not is_path_in_exclusions(realfile)):
                                    if (realfile[0] != '/'):
                                        realfile = os.path.normpath(os.path.join(os.path.dirname(_file),realfile))
                                    handledfiles = copy_binaries_and_libs(chroot, [realfile], force_overwrite, be_verbose, check_libs=check_libs, try_hardlink=try_hardlink,
                                                                                                              retain_owner=retain_owner, handledfiles=handledfiles, update=update)
                                    check_error(realfile, lineno())

                            # in python 2.1 the return value is a tuple, not an object, st_mode is field 0
                            # mode = stat.S_IMODE(sbuf.st_mode)
                            mode = stat.S_IMODE(sb[stat.ST_MODE])
                            if (check_libs and libs_check_is_needed(_file, mode)):
                                libs = get_libs_from_list(_file)
                                # file is NOT found in list of libs (key is NOT found in dict)?
                                if libs == None:
                                    libs = get_ldd_libs(_file)
                                    add_libs_to_list(_file, libs)
                                handledfiles = copy_binaries_and_libs(chroot, libs, force_overwrite, be_verbose,
                                                                                                          check_libs=0, try_hardlink=try_hardlink,
                                                                                                          handledfiles=handledfiles, update=update)
                                if debug_option:
                                    for item in libs:
                                        check_error(item, lineno())
                            continue
                    elif (stat.S_ISDIR(chrootsb.st_mode)):
                        logging('Destination dir '+chrootrfile+' exists',SILENT_FLAG,be_verbose)
                else:
                    if (stat.S_ISDIR(chrootsb.st_mode)):
                        pass
                        # for a directory we also should inspect all the contents, so we do not
                        # skip to the next item of the loop
                    else:
                        logging('Destination file '+chrootrfile+' exists',SILENT_FLAG,be_verbose)
                        continue
            # endif (chrootfile_exists)

            create_parent_path(chroot,os.path.dirname(_file), be_verbose, copy_permissions=1, allow_suid=0, copy_ownership=retain_owner)
            if (stat.S_ISLNK(sb.st_mode)):
                realfile = update_symlink_in_skeleton(_file, chrootrfile)
                add_to_list(chrootrfile, add_tree = False)
                handledfiles.append(_file)
                if not is_path_in_exclusions(realfile):
                    if (realfile[0] != '/'):
                        realfile = os.path.normpath(os.path.join(os.path.dirname(_file),realfile))
                    handledfiles = copy_binaries_and_libs(chroot, [realfile], force_overwrite, be_verbose,
                                                                                      check_libs=check_libs, try_hardlink=try_hardlink,
                                                                                      retain_owner=retain_owner,
                                                                                      handledfiles=handledfiles, update=update)
                    check_error(realfile, lineno())
            elif (stat.S_ISDIR(sb.st_mode)):
                epath = create_parent_path(chroot, _file, be_verbose, copy_permissions=1, allow_suid=0, copy_ownership=retain_owner)
                epath = stripslash(epath)
                if debug_option and (epath != chrootrfile):
                    print_error('line', lineno(), ': ', epath, '!=', chrootrfile)
                # add_to_list(chrootrfile)
                handledfiles = copy_dir_recursive(chroot,_file,force_overwrite, be_verbose,
                                                                                  check_libs=check_libs, try_hardlink=try_hardlink,
                                                                                  retain_owner=retain_owner,
                                                                                  handledfiles=handledfiles, update=update)
                check_error(chrootrfile, lineno())
            elif (stat.S_ISREG(sb.st_mode)):
                if (try_hardlink):
                    logging ('Trying to link '+_file+' to '+chrootrfile ,SILENT_FLAG,1)
                else:
                    logging ('Copying '+_file+' to '+chrootrfile,SILENT_FLAG,1)
                copy_with_permissions(_file,chrootrfile,be_verbose, try_hardlink=try_hardlink, retain_owner=retain_owner)
                handledfiles.append(_file)
                check_error(chrootrfile, lineno())
            elif (stat.S_ISCHR(sb.st_mode) or stat.S_ISBLK(sb.st_mode)):
                copy_device(chroot, _file, be_verbose, retain_owner)

            # in python 2.1 the return value is a tuple, not an object, st_mode is field 0
            # mode = stat.S_IMODE(sbuf.st_mode)
            mode = stat.S_IMODE(sb[stat.ST_MODE])
            if (check_libs and libs_check_is_needed(_file, mode)):
                if stat.S_ISLNK(sb.st_mode) or stat.S_ISREG(sb.st_mode):
                    libs = get_ldd_libs(_file)
                    add_libs_to_list(_file, libs)
                    handledfiles = copy_binaries_and_libs(chroot, libs, force_overwrite, be_verbose,
                                                                                              check_libs=0, try_hardlink=try_hardlink,
                                                                                              handledfiles=handledfiles, update=update)
                    if debug_option:
                        for item in libs:
                            check_error(item, lineno())

    return handledfiles



def config_get_option_as_list(cfgparser, sectionname, optionname):
    """retrieves a comma separated option from the configparser and splits it into a list, returning an empty list if it does not exist"""
    retval = []
    if (cfgparser.has_option(sectionname,optionname)):
        inputstr = cfgparser.get(sectionname,optionname)
        for tmp in inputstr.split(','):
            item = tmp.strip()
            if item != '':
                retval += [item]
    return retval



def init_passwd_and_group(dest_dir, users_list, groups_list, be_verbose=0):
    if (dest_dir[-1] == '/'):
        dest_dir = dest_dir[:-1]

    if not os.path.isdir(dest_dir):
        try:
            mod_makedirs(dest_dir, 0o755)
        except OSError:
            print_error('creating', dest_dir)
            sys.exit(1)

    os.chmod(dest_dir, 0o755)

    users = []
    users.extend(users_list)
    groups = []
    groups.extend(groups_list)

    if (sys.platform[4:7] == 'bsd'):
        open(dest_dir+'/passwd','a').close()
        open(dest_dir+'/spwd.db','a').close()
        open(dest_dir+'/pwd.db','a').close()
        open(dest_dir+'/master.passwd','a').close()
    else:
        if (not os.path.isfile(dest_dir+'/passwd')):
            fd2 = open(dest_dir+'/passwd','w')
        else:
            # the passwds file exists, check if any of the users exist already
            fd2 = open(dest_dir+'/passwd','r+')
            line = fd2.readline()
            while (len(line)>0):
                pwstruct = line.split(':')
                if (len(pwstruct) >=3):
                    if ((pwstruct[0] in users) or (pwstruct[2] in users)):
                        logging('user '+pwstruct[0]+' exists in '+dest_dir+'/passwd',SILENT_FLAG,be_verbose)
                        try:
                            users.remove(pwstruct[0])
                        except ValueError:
                            pass
                        try:
                            users.remove(pwstruct[2])
                        except ValueError:
                            pass
                line = fd2.readline()
            fd2.seek(0,2)
        if (len(users) > 0):
            fd = open('/etc/passwd','r')
            line = fd.readline()
            while (len(line)>0):
                pwstruct = line.split(':')
                if (len(pwstruct) >=3):
                    if ((pwstruct[0] in users) or (pwstruct[2] in users)):
                        fd2.write(line)
                        logging('writing user '+pwstruct[0]+' to '+dest_dir+'/passwd',SILENT_FLAG,be_verbose)
                        if (not pwstruct[3] in groups):
                            groups += [pwstruct[3]]
                line = fd.readline()
            fd.close()
        fd2.close()

    # Copy permissions from real system to template file
    copy_time_and_permissions('/etc/passwd', dest_dir+'/passwd', be_verbose=0, allow_suid=0, copy_ownership=1)

    # do the same sequence for the group files
    if (not os.path.isfile(dest_dir+'/group')):
        fd2 = open(dest_dir+'/group','w')
    else:
        fd2 = open(dest_dir+'/group','r+')
        line = fd2.readline()
        while (len(line)>0):
            groupstruct = line.split(':')
            if (len(groupstruct) >=2):
                if ((groupstruct[0] in groups) or (groupstruct[2] in groups)):
                    logging('group '+groupstruct[0]+' exists in '+dest_dir+'/group',SILENT_FLAG,be_verbose)
                    try:
                        groups.remove(groupstruct[0])
                    except ValueError:
                        pass
                    try:
                        groups.remove(groupstruct[2])
                    except ValueError:
                        pass
            line = fd2.readline()
        fd2.seek(0,2)
    if (len(groups) > 0):
        fd = open('/etc/group','r')
        line = fd.readline()
        while (len(line)>0):
            groupstruct = line.split(':')
            if (len(groupstruct) >=2):
                if ((groupstruct[0] in groups) or (groupstruct[2] in groups)):
                    fd2.write(line)
                    logging('writing group '+groupstruct[0]+' to '+dest_dir+'/group',SILENT_FLAG,be_verbose)
            line = fd.readline()
        fd.close()
    fd2.close()

    # Copy permissions from real system to template file
    copy_time_and_permissions('/etc/group', dest_dir+'/group', be_verbose=0, allow_suid=0, copy_ownership=1)




def init_safe_users_and_groups(dest_dir, users_list ,groups_list, be_verbose=0):
    if (dest_dir[-1] == '/'):
        dest_dir = dest_dir[:-1]

    umask_saved = os.umask(0o22)

    if not os.path.isdir(dest_dir):
        try:
            mod_makedirs(dest_dir, 0o751)
        except OSError:
            print_error('creating', dest_dir)
            sys.exit(1)

    os.chmod(dest_dir, 0o751)

    users = []
    users.extend(users_list)
    groups = []
    groups.extend(groups_list)

    if (not os.path.isfile(dest_dir+'/safe.users')):
        fd2 = open(dest_dir+'/safe.users','w')
    else:
        # the file exists, check if any of the users exist already
        fd2 = open(dest_dir+'/safe.users','r+')
        line = fd2.readline()
        line = line.rstrip()
        while (len(line)>0):
            if line in users:
                logging('user '+line+' exists in '+dest_dir+'/safe.users',SILENT_FLAG,be_verbose)
                try:
                    users.remove(line)
                except ValueError:
                    pass
            line = fd2.readline()
            line = line.rstrip()
        fd2.seek(0,2)

    if (len(users) > 0):
        fd = open('/etc/passwd','r')
        line = fd.readline()
        while (len(line)>0):
            pwstruct = line.split(':')
            if (len(pwstruct) >=3):
                if ((pwstruct[0] in users) or (pwstruct[2] in users)):
                    fd2.write(pwstruct[0]+"\n")
                    logging('writing user '+pwstruct[0]+' to '+dest_dir+'/safe.users',SILENT_FLAG,be_verbose)
            line = fd.readline()
        fd.close()
    fd2.close()
    try:
        os.chmod(dest_dir+'/safe.users', 0o600)
    except (OSError, IOError):
        logging("Error: failed to set permissions to "+dest_dir+'/safe.users',SILENT_FLAG, 1)

    # do the same sequence for the group files
    if (not os.path.isfile(dest_dir+'/safe.groups')):
        fd2 = open(dest_dir+'/safe.groups','w')
    else:
        fd2 = open(dest_dir+'/safe.groups','r+')
        line = fd2.readline()
        line = line.rstrip()
        while (len(line)>0):
            if line in groups:
                logging('group '+line+' exists in '+dest_dir+'/safe.groups',SILENT_FLAG,be_verbose)
                try:
                    groups.remove(line)
                except ValueError:
                    pass
            line = fd2.readline()
            line = line.rstrip()
        fd2.seek(0,2)
    if (len(groups) > 0):
        fd = open('/etc/group','r')
        line = fd.readline()
        while (len(line)>0):
            groupstruct = line.split(':')
            if (len(groupstruct) >=2):
                if ((groupstruct[0] in groups) or (groupstruct[2] in groups)):
                    fd2.write(groupstruct[0]+"\n")
                    logging('writing group '+groupstruct[0]+' to '+dest_dir+'/safe.groups',SILENT_FLAG,be_verbose)
            line = fd.readline()
        fd.close()
    fd2.close()
    try:
        os.chmod(dest_dir+'/safe.groups', 0o600)
    except (OSError, IOError):
        logging("Error: failed to set permissions to "+dest_dir+'/safe.groups',SILENT_FLAG, 1)

    os.umask(umask_saved)




def init_shadow(dest_dir, users_list, be_verbose=0):
    if (dest_dir[-1] == '/'):
        dest_dir = dest_dir[:-1]

    if not os.path.isdir(dest_dir):
        try:
            mod_makedirs(dest_dir, 0o755)
        except OSError:
            print_error('Error while creating', dest_dir)
            sys.exit(1)

    os.chmod(dest_dir, 0o755)

    users = []
    users.extend(users_list)

    if (not os.path.isfile(dest_dir+'/shadow')):
        fd2 = open(dest_dir+'/shadow','w')
    else:
        # the shadow file exists, check if any of the users exist already
        fd2 = open(dest_dir+'/shadow','r+')
        line = fd2.readline()
        while (len(line)>0):
            pwstruct = line.split(':')
            if (len(pwstruct) >=1):
                if pwstruct[0] in users:
                    logging('user '+pwstruct[0]+' exists in '+dest_dir+'/shadow',SILENT_FLAG,be_verbose)
                    try:
                        users.remove(pwstruct[0])
                    except ValueError:
                        pass
            line = fd2.readline()
        fd2.seek(0,2)
    if (len(users) > 0):
        fd = open('/etc/shadow','r')
        line = fd.readline()
        while (len(line)>0):
            pwstruct = line.split(':')
            if (len(pwstruct) >=1):
                if pwstruct[0] in users:
                    fd2.write(line)
                    logging('writing user '+pwstruct[0]+' to '+dest_dir+'/shadow',SILENT_FLAG,be_verbose)
            line = fd.readline()
        fd.close()
    fd2.close()

    # Copy permissions from real system to template file
    copy_time_and_permissions('/etc/shadow', dest_dir+'/shadow', be_verbose=0, allow_suid=0, copy_ownership=1)




def add_user_to_shadow(dest_dir, user, be_verbose = 0):
    dest_dir = stripslash(dest_dir)
    if not os.path.isfile(dest_dir+'/shadow'):
        logging("Error: "+dest_dir+'/shadow does not exist', SILENT_FLAG, 1)
        return
    if os.path.islink(dest_dir+'/shadow'):
        logging("Error: "+dest_dir+'/shadow is a symlink', SILENT_FLAG, 1)
        return
    fd = open('/etc/shadow', 'r')
    dest = open(dest_dir+'/shadow', 'a')
    line = fd.readline()
    while len(line) > 0:
        pwstruct = line.split(':', 1)
        if len(pwstruct) >= 1:
            if pwstruct[0] == user:
                dest.write(line)
                logging('Writing user '+pwstruct[0]+' to '+dest_dir+'/shadow', SILENT_FLAG, be_verbose)
                break
        line = fd.readline()
    fd.close()
    dest.close()





# Returns common end of two lists (or strings)
def get_common_end(s1, s2):
    if len(s1) == 0 or len(s2) == 0:
        return None
    min_len = min(len(s1), len(s2))
    pos = -1
    while pos >= -min_len:
        if s1[pos] != s2[pos]:
            break
        pos -= 1
    if pos == -1:
        return None
    return s1[pos+1:]


def copy_path(src: str, dst: str) -> int:
    """
    Copy a path from a source to a destination.

    If there are shared ending directories between source and destination paths,
    iterates over the common ending directories,
    creating each corresponding directory in a destination path.
    Copies timestamp and permissions from source subdirectories.

    For example, if src = '/root/dir1/dir2' and dst = '/usr/share/cagefs-skeleton/dir1/dir2',
    running this function will result in creating directories 'dir1' and 'dir2'
    within the '/usr/share/cagefs-skeleton' path.
    """
    src = os.path.normpath(src)
    dst = os.path.normpath(dst)
    src = stripslash(src)
    dst = stripslash(dst)

    if (src == '') or (dst == '') or (src[0] != '/') or (dst[0] != '/'):
        logging("Error: invalid paths src = "+src+" dst = "+dst, SILENT_FLAG, 1)
        # error
        return 1

    common = get_common_end(split_path(src), split_path(dst))
    if common is None:
        try:
            mod_makedirs(dst, 0o755)
        except (IOError, OSError):
            # logging("Error: failed to create "+dst, SILENT_FLAG, 1)
            # error
            # return 1
            pass
        # success
        return 0

    common_str = join_path(common)
    dst_path = dst[:-len(common_str)]
    src_path = src[:-len(common_str)]
    for _dir in common:
        dst_path = dst_path+'/'+_dir
        src_path = src_path+'/'+_dir
        try:
            mod_makedirs(dst_path, 0o755)
        except (IOError, OSError):
            # logging("Error: failed to create path "+dst_path, SILENT_FLAG, 1)
            # return 1
            pass

        try:
            copy_time_and_permissions(src_path, dst_path, be_verbose=0, allow_suid=0, copy_ownership=1)
        except (IOError, OSError) as e:
            logging('ERROR: while copying permissions '+src_path+' to '+dst_path+': '+e.strerror, SILENT_FLAG, 1)
            return 1

    # success
    return 0


def oslstat(path: AnyStr) -> os.stat_result | None:
    """
    Securely get status of a file or a file descriptor.

    Returns None if unable to retrieve the status.
    """
    try:
        return os.lstat(path)
    except (IOError, OSError):
        return None


def copytree(src: str,
             dst: str,
             symlinks: bool = True,
             overwrite: bool = True,
             skip_src_dirs: list[str] | None = None,
             update: bool = False,
             skip_dst_files: list[str] | None = None) -> int:
    """
    Recursively copy an entire directory tree.

    This function acts like shutil.copytree, but works
    if destination directory already exists and does not fail if symlink exists.
    Copies timestamp and permissions from source subdirectories.
    """
    if skip_src_dirs is None:
         skip_src_dirs = []
    if skip_dst_files is None:
         skip_dst_files = []

    if src in skip_src_dirs:
        return 0

    names = os.listdir(src)

    # If destination is a directory, do nothing,
    # otherwise (file or symlink), remove it
    try:
        dstbuf = os.lstat(dst)
        if stat.S_ISDIR(dstbuf.st_mode):
            dst_exists = True
        else:
            if dst in skip_dst_files:
                return 0
            try:
                os.unlink(dst)
            except (IOError, OSError) as e:
                logging('ERROR: failed to delete file '+dst+' : '+str(e), SILENT_FLAG, 1)
                return 1
            dst_exists = False
    except (IOError, OSError):
        dst_exists = False

    error = 0

    # If destination does not exist (or removed on the previous step)
    # create required subdirectories
    if not dst_exists:
        if copy_path(src, dst) == 1:
            error = 1

    # Copy contents of the source directory to the destination one
    for name in names:
        srcname = os.path.join(src, name)
        dstname = os.path.join(dst, name)
        try:
            srcbuf = cached_lstat(srcname)
            dstbuf = oslstat(dstname)
            dstname_exists = dstbuf is not None
            if symlinks and stat.S_ISLNK(srcbuf.st_mode):
                if (not overwrite) and dstname_exists:
                    continue
                if dstname_exists and (dstname in skip_dst_files):
                    continue
                linkto = os.readlink(srcname)
                if dstname_exists:
                    if stat.S_ISDIR(dstbuf.st_mode):
                        shutil.rmtree(dstname, True)
                    else:
                        os.unlink(dstname)
                os.symlink(linkto, dstname)
            elif stat.S_ISDIR(srcbuf.st_mode):
                if copytree(srcname, dstname, symlinks, overwrite, skip_src_dirs, update) == 1:
                    error = 1
            else:
                if (not overwrite) and dstname_exists:
                    continue
                if dstname_exists and (dstname in skip_dst_files):
                    continue
                if dstname_exists and update and (not is_update_needed(srcname, dstname, srcbuf, dstbuf)):
                    continue
                if dstname_exists:
                    if stat.S_ISLNK(dstbuf.st_mode):
                        os.unlink(dstname)
                    elif stat.S_ISDIR(dstbuf.st_mode):
                        shutil.rmtree(dstname, True)
                shutil.copyfile(srcname, dstname)
                copy_time_and_permissions(srcname, dstname, be_verbose=0, allow_suid=0, copy_ownership=1)
        except (IOError, OSError, shutil.Error) as err:
            logging('ERROR: while copying '+srcname+' to '+dstname+': '+str(err), SILENT_FLAG, 1)
            error = 1
    try:
        copy_time_and_permissions(src, dst, be_verbose=0, allow_suid=0, copy_ownership=1)
    except (IOError, OSError) as err:
        logging('ERROR: while copying permissions '+src+' to '+dst+': '+str(err), SILENT_FLAG, 1)
        error = 1

    return error


def copy_file(srcname: str,
              dstname: str,
              create_parent_dir: bool = True,
              update: bool = False) -> int:
    """
    Copy a source file to a specified destination.

    The algorithm is as follows:
    - if the source is a directory - fail;
    - if the source is a symlink, remove the current destination
      and create a symlink in its place that points to the same location as the source symlink;
    - otherwise - remove current destination,
      and copy the source file copying its time and permissions as well.
    """
    sigterm_check()
    try:
        srcbuf = cached_lstat(srcname)
        if stat.S_ISDIR(srcbuf.st_mode):
            # error
            return 1
        dstbuf = oslstat(dstname)
        dstname_exists = dstbuf is not None
        if not dstname_exists:
            parent_dir = os.path.dirname(dstname)
            if parent_dir != '/' and create_parent_dir:
                copy_path(os.path.dirname(srcname), parent_dir)
        if stat.S_ISLNK(srcbuf.st_mode):
            linkto = os.readlink(srcname)
            if dstname_exists:
                if stat.S_ISDIR(dstbuf.st_mode):
                    shutil.rmtree(dstname, True)
                else:
                    os.unlink(dstname)
            os.symlink(linkto, dstname)
        else:
            if dstname_exists and update and (not is_update_needed(srcname, dstname, srcbuf, dstbuf)):
                return 0
            if dstname_exists:
                if stat.S_ISDIR(dstbuf.st_mode):
                    shutil.rmtree(dstname, True)
                else:
                    os.unlink(dstname)
            shutil.copyfile(srcname, dstname)
            copy_time_and_permissions(srcname, dstname, be_verbose=0, allow_suid=0, copy_ownership=1)
    except (IOError, OSError, shutil.Error) as e:
        logging('ERROR: while copying '+srcname+' to '+dstname+': '+e.strerror, SILENT_FLAG, 1)
        return 1

    # Success
    return 0



def test_numitem_exist(item,num,filename):
    try:
        fd = open(filename,'r')
    except:
        return 0
    line = fd.readline()
    while (len(line)>0):
        pwstruct = line.split(':')
        if (len(pwstruct) > num and pwstruct[num] == item):
            fd.close()
            return 1
        line = fd.readline()
    return 0

def test_user_exist(user, passwdfile):
    return test_numitem_exist(user,0,passwdfile)

def test_group_exist(group, groupfile):
    return test_numitem_exist(group,0,groupfile)


def get_all_users_with_uid(uid):
    # get all users from /etc/passwd
    return clpwd.get_names(uid)


def ExecuteSimple(command):
    proc = subprocess.Popen(command,
                            shell=True,
                            executable='/bin/bash',
                            stdout=subprocess.PIPE,
                            text=True,
                            bufsize=-1)
    return proc.communicate()[0]


def Execute(command, check_return_code = True, merge_stderr = False, exit_on_error = True):
    try:
        if merge_stderr:
            p = subprocess.Popen(command, stdout=subprocess.PIPE, stderr=subprocess.STDOUT, text=True)
        else:
            # run the command and suppress it's output
            p = subprocess.Popen(command, stdout=subprocess.PIPE, stderr=subprocess.PIPE, text=True)
        (out, _) = p.communicate()
        if check_return_code:
            # check return code of the child
            if p.returncode != 0:
                logging('Error while executing ' + ' '.join(command), SILENT_FLAG, 1)
    except OSError:
        logging('Error: failed to run ' + ' '.join(command), SILENT_FLAG, 1)
        if exit_on_error:
            sys.exit(1)
        raise

    return out



def get_version_str(line, sign):
    length = len(sign)
    pos = line.find(sign)
    if pos != -1:
        end = line[pos+length:]
        pos2 = 0
        while pos2 < len(end):
            if not isdigit(end[pos2]):
                break
            pos2 += 1
        ver = end[:pos2]
        return ver
    return ''


# Returns value of specified option from postgresql.conf
def get_postgres_config(option):
    value = ''
    PSQL_CONF = "/var/lib/pgsql/data/postgresql.conf"
    if os.path.isfile(PSQL_CONF):
        psql_conf = read_file(PSQL_CONF)
        for i in range(len(psql_conf)):
            line = psql_conf[i]
            if line and line[0] != '#' and line.find(option) != -1:
                v = line.split('=', 1)
                opt_name = v[0].strip()
                if opt_name == option:
                    val = v[1].strip()
                    pos = val.find("#")
                    if pos != -1:
                        val = val[:pos]
                    val = val.strip()
                    val = val.strip("'")
                    val = val.strip('"')
                    value = val
                    break

    return value


# Returns port of postgresql server (as string)
def get_postgres_port():
    OPTS = '/var/lib/pgsql/data/postmaster.opts'
    if os.path.isfile(OPTS):
        lines = read_file(OPTS)
        for line in lines:
            v = line.split()
            for i in range(len(v)):
                s = v[i]
                s = s.strip("'")
                s = s.strip('"')
                if s == '-p':
                    try:
                        port = v[i+1]
                    except:
                        print_error('Error while parsing', OPTS)
                        sys.exit(1)
                    port = port.strip("'")
                    port = port.strip('"')
                    return port

    return get_postgres_config('port')


def detect_postgres():
    PGSQL_SOCKET_CFG = "/usr/share/cagefs/pgsql.socket.name"
    default_pg_port = '5432'
    port = get_postgres_port()

    if port == '':
        print('Warning: Port of PostgreSQL server is not detected, using default: {}'.format(default_pg_port))
        port = default_pg_port

    socket_name = '/tmp/.s.PGSQL.'+port

    # Not default port ?
    if port != default_pg_port:
        write_file(PGSQL_SOCKET_CFG, [socket_name+'\n'])
    else:
        if os.path.isfile(PGSQL_SOCKET_CFG):
            try:
                os.unlink(PGSQL_SOCKET_CFG)
            except (OSError, IOError):
                # try to write default socket name to config file
                write_file(PGSQL_SOCKET_CFG, [socket_name+'\n'])



# ETC_MPFILE should be read to cagefslib.mounts before call of this function
def print_suids(src):
    if strip_path(src) == '/proc':
        return
    mounted = path_is_mounted(src)
    for name in os.listdir(src):
        srcname = os.path.join(src, name)
        try:
            mode = os.lstat(srcname).st_mode
        except OSError:
            print_error('lstat() failed for path', srcname)
            continue
        if stat.S_ISLNK(mode):
            continue
        if stat.S_ISDIR(mode):
            print_suids(srcname)
        elif (mode & (stat.S_ISUID | stat.S_ISGID)):
            if mounted:
                print('Mounted to skeleton:', srcname)
            else:
                print('Copied  to skeleton:', srcname)



def get_users_from_passwd(path):
    users = {}
    if os.path.isfile(path):
        pf = open(path, 'r')
        for line in pf:
            user = line.split(':')[0]
            users[user] = 1
        pf.close()
    return users



def remove_unwanted_users_from_groups(users = None, path = ETC_TEMPLATE_NEW_DIR):
    sigterm_check()
    group_file = path + '/etc/group'
    if not os.path.isfile(group_file):
        return

    lines = read_file(group_file)

    if users == None:
        users = get_users_from_passwd(path+'/etc/passwd')

    file_changed = False

    for i in range(len(lines)):
        splitted = lines[i].split(':')
        if (len(splitted) == 4) and (splitted[3] not in ('', '\n')):
            group_users = splitted[3][:-1].split(',')
            new_group_users = []
            changed = False
            for user in group_users:
                if user in users:
                    new_group_users.append(user)
                else:
                    changed = True

            if changed:
                tmp = splitted[0]+':x:'+splitted[2]+':'
                tmp2 = ','.join(new_group_users)
                tmp += tmp2+'\n'
                lines[i] = tmp
                file_changed = True

    if file_changed:
        write_file(group_file, lines)
        try:
            shutil.copystat('/etc/group', group_file)
        except (OSError, IOError, shutil.Error):
            pass



def read_symlinks(cl_alt_dir):
    links = {}
    if os.path.isdir(cl_alt_dir):
        for _file in os.listdir(cl_alt_dir):
            path = os.path.join(cl_alt_dir, _file)
            if os.path.islink(path):
                link_to = os.readlink(path)
                links[path] = link_to
    return links


# Returns True if error has occured
def write_symlinks(links):
    error = False
    for path in links:
        try:
            link_to = links[path]
            if os.path.islink(path):
                if link_to == os.readlink(path):
                    continue
            elif os.path.isdir(path):
                continue
            try:
                os.unlink(path)
            except OSError as e:
                if e.errno == errno.ENOENT:  # No such file error
                    logger.info(f'Path {path} does not exist')
                else:
                    logger.error(f'Error: Unable to remove path {path}', exc_info=e)

            os.symlink(link_to, path)
        except OSError as e:
            msg = f'Error: failed to create symlink {path} : {str(e).replace("Errno", "Err code")}'
            logger.error(msg, exc_info=e)
            logging(msg, SILENT_FLAG, 1)
            error = True
    return error




def is_writable(sbuf, uid, gid):
    groups = get_groups(uid, gid)
    mode = sbuf.st_mode

    # owner has write access ?
    if sbuf.st_uid == uid:
        return (mode & stat.S_IWUSR)

    return ( ((mode & stat.S_IWGRP) and (sbuf.st_gid in groups)) or (mode & stat.S_IWOTH) )


def make_dir(path, perm, allow_symlink = False, update_perm = True):
    """
    Create directory if it does not exist. Check for symlink (race conditions are not handled).
    Returns True if error has occured
    :param path: path to directory
    :type path: string
    :param perm: Linux permissions
    :type perm: int
    :param allow_symlink: True = allow path to be symlink, False = delete symlink and create directory
    :type allow_symlink: bool
    :param update_perm: True = set permissions when path exists
    :type update_perm: bool
    """
    path_exists = True
    try:
        sbuf = os.lstat(path)
    except OSError:
        path_exists = False

    if path_exists:
        if stat.S_ISDIR(sbuf.st_mode) or (allow_symlink and os.path.isdir(path)):
            if update_perm:
                return set_perm(path, perm)
            return False
        else:
            try:
                os.unlink(path)
            except (OSError, IOError):
                if os.path.lexists(path):
                    logging('Error: failed to remove ' + path, SILENT_FLAG, 1)
                    return True

    try:
        mod_makedirs(path, perm)
    except OSError as e:
        if not os.path.isdir(path):
            msg = f'Error: failed to create directory {path} : {str(e).replace("Errno", "Err code")}'
            logger.error(msg, exc_info=e)
            logging(msg, SILENT_FLAG, 1)
            return True

    return False



# Returns True if error has occured
def set_perm(path, perm):
    try:
        os.chmod(path, perm)
        return False
    except (OSError, IOError):
        logging('Error: failed to set permissions to ' + path, SILENT_FLAG, 1)
        return True



# Returns True if error has occured
def set_owner(path, uid, gid):
    try:
        os.chown(path, uid, gid)
        return False
    except (OSError, IOError):
        logging('Error: failed to set ownership to ' + path, SILENT_FLAG, 1)
        return True



# basepath == '/home/user/.cagefs'
def fix_owner_of_personal_mounts(basepath, real_homepath, uid, gid, personal_mounts):
    for mount in personal_mounts:
        names = split_path(mount)
        path = ''
        for name in names:
            path = os.path.join(path, name)
            dirpath = os.path.join(basepath, path)
            fd = set_owner_dir_secure(dirpath, uid, gid, real_homepath)
            if fd is None:
                # Error has occured or directory does not exist
                # So, do not process subdirectories
                break
            closefd(fd)



# is_user_enabled = True: users are enabled
# is_user_enabled = False: users are disabled
def update_status(users, is_user_enabled, fix_owner = False):
    if not (fix_owner or cldetectlib.is_ispmanager()):
        return

    import cagefs_ispmanager_lib
    personal_mounts = []
    if fix_owner:
        from cagefsctl import MountpointConfig
        mp_config = MountpointConfig(skip_errors=True, skip_cpanel_check=True)
        personal_mounts = mp_config.personal_mounts

    for user in users:
        try:
            pw = clpwd.get_pw_by_name(user)
        except ClPwd.NoSuchUserException:
            continue
        real_homepath = os.path.realpath(pw.pw_dir)
        path = os.path.join(pw.pw_dir, '.cagefs')
        status_flag = os.path.join(path, '.cagefs.enabled')

        # Set owner
        fd = set_owner_dir_secure(path, pw.pw_uid, pw.pw_gid, real_homepath)
        if fd is None:
            # Error has occured
            continue
        # Set permissions
        fd = set_perm_dir_secure(path, 0o771, real_homepath, fd=fd)
        if fd is None:
            # Error has occured
            continue
        closefd(fd)
        set_user_perm(pw.pw_uid, pw.pw_gid)
        # .cagefs.enabled files are not needed, we remove them unconditionally
        remove_file_or_dir(status_flag)
        set_root_perm()

        # update ISP manager user wrappers
        cagefs_ispmanager_lib.ispmanager_create_user_wrapper_detect_php_ver(pw, is_user_enabled, True)

        if fix_owner:
            fix_owner_of_personal_mounts(path, real_homepath, pw.pw_uid, pw.pw_gid, personal_mounts)


def get_php_info():
    php_path = orig_binaries['php-cli']
    php_ini_path = orig_binaries['php.ini']
    return Execute([php_path, '-c', php_ini_path, '-i'])


def get_list_of_php_modules():
    php_path = orig_binaries['php-cli']
    php_ini_path = orig_binaries['php.ini']
    try:
        if is_ea4_enabled():
            result = Execute([php_path, '-m'], merge_stderr=True, exit_on_error=False)
        else:
            result = Execute([php_path, '-c', php_ini_path, '-qm'], merge_stderr=True, exit_on_error=False)
    except OSError:
        result = ''
    return result



php_modules = None


# Returns list of php extension modules (.so)
def get_php_modules():
    global php_modules
    if php_modules == None:
        read_native_conf()
        lines = get_list_of_php_modules().split('\n')
        php_modules = {}
        for line in lines:
            if line and (not line.startswith('[')):
                module_name = line.replace(' ', '_').lower()
                php_modules[module_name] = 1
    return list(php_modules)


alt_versions = None


# Reads config file and returns versions of alternative php binaries (as dictionary)
def get_alt_versions():
    global alt_versions
    if alt_versions is None:
        CL_ALT_CONF = '/etc/cl.selector/selector.conf'
        alt_versions = {}
        if os.path.isfile(CL_ALT_CONF):
            lines = read_file_cached(CL_ALT_CONF)
            for line in lines:
                line = line.rstrip()
                if line != "":
                    ar = line.split()
                    if len(ar) == 4 and ar[0] == 'php':
                        vers = ar[1]
                        # Key - short version (5.4), value - full version (5.4.39)
                        alt_versions[vers] = ar[2]
    return alt_versions



# version -> alias -> path
alt_conf = None


# Reads config file and returns path to alternative php binary
def get_alt_conf(vers, alias = 'php', get_aliases = False):
    global alt_conf
    if alt_conf == None:
        CL_ALT_CONF = '/etc/cl.selector/selector.conf'
        alt_conf = {}
        if os.path.isfile(CL_ALT_CONF):
            lines = read_file_cached(CL_ALT_CONF)
            for line in lines:
                line = line.rstrip()
                if line != "":
                    ar = line.split()
                    if len(ar) == 4:
                        cur_alias = ar[0]
                        cur_vers = ar[1]
                        cur_path = ar[3]

                        if cur_vers in alt_conf:
                            temp = alt_conf[cur_vers]
                        else:
                            temp = {}

                        temp[cur_alias] = cur_path
                        alt_conf[cur_vers] = temp

    if vers in alt_conf:
        if get_aliases:
            # Return all available aliases for specified version
            return list(alt_conf[vers].keys())
        elif alias in alt_conf[vers]:
            # Return path for version and alias specified
            return alt_conf[vers][alias]

    return None



def get_alt_aliases(vers):
    if vers == 'native':
        return list(orig_binaries)
    else:
        aliases = get_alt_conf(vers, get_aliases = True)
        if aliases == None:
            return []
        return aliases


def get_alt_php_libs():
    FIND = '/usr/bin/find'
    altpaths = []
    binpaths = []
    for altdir in get_alt_dirs():
        path = '/opt/alt/' + altdir
        binpath = path + '/usr/bin'
        sbinpath = path + '/usr/sbin'
        if os.path.isdir(path):
            altpaths.append(path)
        else:
            continue
        if os.path.isdir(binpath):
            binpaths.append(binpath)
        if os.path.isdir(sbinpath):
            binpaths.append(sbinpath)

    paths = []
    if altpaths:
        paths.extend(Execute([FIND] + altpaths + ['-name', '*.so']).split('\n'))
    if binpaths:
        paths.extend(Execute([FIND] + binpaths + ['-type', 'f']).split('\n'))

    libs = set()
    for path in paths:
        if path:
            for lib in get_ldd_libs(path):
                libs.add(lib)
    return list(libs)


# Detect user's PHP version
def get_php_version_for_user(username):
    # read link /var/cagefs/[prefix]/[username]/etc/cl.selector/php
    #  --> /opt/alt/php54/usr/bin/php-cgi
    # or
    #  --> /usr/selector/php
    path = BASEDIR + '/' + get_user_prefix(username) + '/' + username + '/etc/cl.selector/'
    user_php_file = path + 'php'
    if not os.path.islink(user_php_file):
        user_php_file = path + 'lsphp'
        if not os.path.islink(user_php_file):
            return None
    link_to = os.readlink(user_php_file)
    if link_to.startswith('/usr/selector/'):
        return 'native'
    # PHP ver is not native, determine version from link_to
    if link_to.startswith('/opt/alt/php'):
        php_ver = link_to.replace('/opt/alt/php', '')
        php_ver = php_ver[:php_ver.find('/')]
        return php_ver
    # PHP version not determined
    return None



# Name and location of user's php.d directory, where symlinks to .ini files are stored
CL_PHP_DIR_NAME = 'cl.php.d'
ETC_CL_PHP_PATH = '/etc/'+CL_PHP_DIR_NAME


# Backup files that contain user's settings for Cloudlinux Alternatives
CL_ALT_BACKUP_DIR = '.cl.selector'
CL_ALT_DEFAULTS = 'defaults.cfg'


# php_vers 'php5.4'
# php_modules = { 'php5.3' : ['dom', 'xmlreader'], 'php5.4' : ['dom', 'xsl'] }
# dirpath is something like '/var/cagefs/prefix/user/etc/cl.php.d/alt-php54'
# dirname is something like 'php54'
def enable_extensions_symlinks(php_vers, php_modules, dirpath, dirname):
    for mod in php_modules[php_vers]:
        link_name = mod + '.ini'
        link_path = os.path.join(dirpath, link_name)
        link_to = os.path.join('/opt/alt', dirname, 'etc', 'php.d.all', link_name)
        if not os.path.islink(link_path):
            remove_file_or_dir(link_path)
            try:
                os.symlink(link_to, link_path)
            except OSError as e:
                msg = f'Error: failed to create symlink {link_path} : {str(e).replace("Errno", "Err code")}'
                logger.error(msg, exc_info=e)
                logging(msg, SILENT_FLAG, 1)


deps_cache = {}

def get_dependencies(alt_dir):
    """
    Return dependencies of php modules (extensions), determined by parsing of ini files in specified directory
    :param alt_dir: path to directory where ini files are (something like '/opt/alt/php54/etc/php.d.all')
    :type alt_dir: string
    :return: something like { 'mailparse' : ['mbstring'], 'xsl' : ['dom'], 'xmlreader' : ['dom'] }
    :rtype: dict
    """
    global deps_cache
    if alt_dir not in deps_cache:
        deps = {}
        if os.path.isdir(alt_dir):
            for ini_file in os.listdir(alt_dir):
                ini_path = alt_dir + '/' + ini_file
                if ini_path.endswith('.ini') and os.path.isfile(ini_path):
                    extname = ini_file[:-len('.ini')]
                    deps[extname] = []
                    ini_file = read_file_cached(ini_path)
                    for line in ini_file:
                        line = line.rstrip()
                        if line.startswith('extension') or line.startswith('zend_extension'):
                            if line.endswith('"'):
                                line = line.replace('"', '')
                            elif line.endswith("'"):
                                line = line.replace("'", '')
                            ar = line.split('=', 1)
                            if (len(ar) == 2) and ar[1].endswith('.so'):
                                ext = os.path.basename(ar[1].lstrip())
                                ext = ext[:-len('.so')]
                                if extname != ext:
                                    deps[extname].append(ext)
        deps_cache[alt_dir] = deps
    return deps_cache[alt_dir]



# Build load order of modules using recursive algorithm
def get_load_order(load_order, deps, mod):
    if mod in deps:
        for dep in deps[mod]:
            get_load_order(load_order, deps, dep)
        if mod not in load_order:
            load_order.append(mod)



# Build load order of modules NOT using recursive algorithm
def get_load_order_not_recursive(load_order, deps, mod):
    if mod in deps:
        for dep in deps[mod]:
            if dep not in load_order and dep in deps:
                load_order.append(dep)
        if mod not in load_order:
            load_order.append(mod)



def build_load_order(php_vers, php_modules, ini_path, deps = None, quiet = False):
    """

    :param php_vers: something like 'php5.4'
    :type php_vers: string
    :param php_modules: { 'php5.3' : ['dom', 'xmlreader'], 'php5.4' : ['dom', 'xsl'] }
    :type php_modules: dict
    :param ini_path: path to directory where ini files are (something like '/opt/alt/php54/etc/php.d.all')
    :type ini_path: string
    """
    if deps is None:
        deps = get_dependencies(ini_path)
    for func in (get_load_order, get_load_order_not_recursive):
        load_order = []
        try:
            # ioncube loader should be first in the load order
            if 'ioncube_loader' in php_modules[php_vers]:
                func(load_order, deps, 'ioncube_loader')
            elif 'ioncube_loader_4' in php_modules[php_vers]:
                func(load_order, deps, 'ioncube_loader_4')
            for mod in php_modules[php_vers]:
                if mod not in ('ioncube_loader', 'ioncube_loader_4'):
                    func(load_order, deps, mod)
            break
        except RuntimeError:
            if not quiet:
                logging('Error: cyclic dependencies of PHP modules detected. Depth of dependencies will be limited to 1', SILENT_FLAG, 1)
    return load_order


php_ini_validator = None
bad_try_init_phpinivalidator_trigger = False


def read_custom_php_settings(homepath, filename, uid, gid, php_vers=None, user_name=None, alt_php_ini_file=None):
    global php_ini_validator
    global bad_try_init_phpinivalidator_trigger
    global validate_alt_php_ini
    if homepath is None:
        return None
    # Read backup of custom php settings in user's home directory
    backup_path = os.path.join(homepath, CL_ALT_BACKUP_DIR, filename)
    if not os.path.isfile(backup_path):
        return None
    php_ini_lines = read_file_secure(backup_path, uid, gid, exit_on_error = False)
    if validate_alt_php_ini:
        # Do PHP options validation
        if not bad_try_init_phpinivalidator_trigger and php_ini_validator is None:
            try:
                php_ini_validator = phpinivalidator.PHPINIvalidator(phpconf_path=PHP_CONF)
            except (OSError, IOError):
                bad_try_init_phpinivalidator_trigger = True
        if bad_try_init_phpinivalidator_trigger:
            return php_ini_lines
        if not php_vers:
            php_vers = phpinivalidator.get_php_ver(backup_path)
        alt_vers = get_alt_versions()
        output_lines_list = php_ini_validator.validate(input_phpini_lines=php_ini_lines, php_ver=alt_vers[php_vers])
        if php_ini_validator.unknown_options or php_ini_validator.invalid_values_options or php_ini_validator.invalid_options:
            if user_name:
                log_message = "User: " + user_name
            else:
                log_message = "User: Unknown"
            log_message += "; PHP version: " + php_vers + "\n                     Backup file: " + backup_path
            if alt_php_ini_file:
                log_message += "\n                     Destination file: " + alt_php_ini_file
            else:
                log_message += "\n                     Destination file: Unknown"
            php_options_log_write(log_message, php_ini_validator.unknown_options, php_ini_validator.invalid_values_options, php_ini_validator.invalid_options)
    else:
        # Pass PHP options validation
        output_lines_list = php_ini_lines
    return output_lines_list


def enable_extensions(php_vers, php_modules, dirpath, dirname, uid, gid, homepath=None, user_name=None):
    """
    Enable specified extensions for specific php version and user
    :param php_vers: php version, something like 'php5.4'
    :type php_vers: string
    :param php_modules: extesions enabled for different php version for the user specified like { 'php5.3' : ['dom', 'xmlreader'], 'php5.4' : ['dom', 'xsl'] }
    :type php_modules: dict
    :param dirpath: path where generated alt_php.ini file is written to (something like '/var/cagefs/prefix/user/etc/cl.php.d/alt-php54')
    :type dirpath: string
    :param dirname: name of directory for specified php version inside /opt/alt directory (something like 'php54')
    :type dirname: string
    :param uid: uid of user
    :type uid: int
    :param gid: gid of user
    :type gid: int
    :param homepath: path to home directory of user (something like '/home/user')
    :type homepath: string
    :param user_name: name of user
    :type user_name: string
    """
    ini_path = os.path.join('/opt/alt', dirname, 'etc', 'php.d.all')

    # Build load order of php modules
    # example:['bcmath', 'dom', 'gd', 'imap', 'json', 'mcrypt']
    load_order = build_load_order(php_vers, php_modules, ini_path)

    # Build content of alt_php.ini file
    alt_php_ini = []

    for module in load_order:
        alt_php_ini.append(';---'+module+'---\n')

        # module.ini path
        # example: /opt/alt/php54/etc/php.d.all/imap.ini
        module_ini_path = ini_path + '/' + module + '.ini'

        # settings per module.ini
        # example: ['; Enable imap extension module\n', 'extension=imap.so\n']
        module_ini = read_file_cached(module_ini_path)

        for line in module_ini:
            line = line.rstrip()
            # Do not add empty lines and comments to alt_php.ini file
            if line and not line.startswith(';'):
                line += '\n'
                if line not in alt_php_ini:
                    alt_php_ini.append(line)

        alt_php_ini.append('\n')

    # Write generated alt_php.ini file
    user_ini_path = os.path.join(dirpath, 'alt_php.ini')

    try:
        # custom users php settings from /home/user/.cl.selector/alt_phpX.X.cfg
        # example: [';---fileinfo---\n', ';extension=fileinfo.so\n', ';\n',
        # ';---phar---\n', ';extension=phar.so\n', ';\n']
        custom_php_settings = read_custom_php_settings(homepath,
                                                       'alt_'+dirname+'.cfg',
                                                       uid,
                                                       gid,
                                                       php_vers=php_vers[3:],
                                                       user_name=user_name,
                                                       alt_php_ini_file=user_ini_path)
    except (OSError, IOError):
        custom_php_settings = None

    if custom_php_settings is not None:
        alt_php_ini.extend(custom_php_settings)
        alt_php_ini.append('\n')

    write_file_secure(alt_php_ini, user_ini_path, uid, gid)


# userpath is something like '/var/cagefs/prefix/user/etc/cl.php.d' (directory should exist already)
# def_vers = destination php version
# cl_alt_def_modules = default set of php modules from global defaults
# php_modules = set of php modules from user's backup
# vers_changed = True if def_vers != def_vers_old (selected php version has been changed for the user)
# def_vers_old = previous (old) version of php
# force = True: reset selected php modules to global defaults (ignore user's backup)
# rebuild = True: rebuild (regenerate) alt_php.ini files
# user_name = None - user name for logging
def select_default_php_modules(userpath, homepath, uid, gid, def_vers, cl_alt_def_modules, php_modules,
                               vers_changed, def_vers_old, force, rebuild, user_name=None):
    alt_vers = get_alt_versions()

    if def_vers == None:
        def_vers = 'native'
    if def_vers_old == None:
        def_vers_old = 'native'
    if php_modules == None:
        php_modules = {}
    if cl_alt_def_modules == None:
        cl_alt_def_modules = {}

    real_userpath = os.path.realpath(userpath)

    modules_changed = False
    for vers in alt_vers:
        php_vers = 'php' + vers
        dirname = 'php' + vers.replace('.', '')
        altdir = 'alt-' + dirname
        dirpath = os.path.join(userpath, altdir)
        user_ini_path = os.path.join(dirpath, 'alt_php.ini')
        if (not os.path.lexists(user_ini_path)) or force or rebuild:
            if make_userdir(dirpath, 0o755, uid, gid, real_userpath):
                continue
            if (php_vers not in php_modules) or force:
                if php_vers in cl_alt_def_modules:
                    php_modules[php_vers] = cl_alt_def_modules[php_vers]
                else:
                    modules = get_php_modules()
                    php_modules[php_vers] = modules
                modules_changed = True

            # Create symlinks for php modules
            # enable_extensions_symlinks(php_vers, php_modules, dirpath, dirname)

            # Create alt_php.ini file for php modules
            enable_extensions(php_vers,
                              php_modules,
                              dirpath,
                              dirname,
                              uid,
                              gid,
                              homepath=homepath,
                              user_name=user_name)

        # else:
        # Actions commented out are not secure, because user is owner of the parent (/var/cagefs/prefix/user/etc/cl.php.d) directory
        #       make_dir(dirpath, 0755)
        #       set_owner(dirpath, uid, gid)
        #       set_perm(user_ini_path, 0644)
        #       set_owner(user_ini_path, uid, gid)

    if vers_changed:
        new_vers = def_vers
    else:
        new_vers = def_vers_old

    if vers_changed or modules_changed:
        # Save backup
        write_cl_alt_to_backup(homepath, new_vers, php_modules, uid, gid)


def read_cl_alt_backup_as_user(homepath, uid, gid):
    backup_path = os.path.join(homepath, CL_ALT_BACKUP_DIR, CL_ALT_DEFAULTS)
    set_user_perm(uid, gid)
    result = read_cl_alt_backup(backup_path)
    set_root_perm()
    return result


def read_cl_alt_backup(backup_path):
    try:
        backup_file = open_file_not_symlink(backup_path)
    except (OSError, IOError):
        return None, None, None, None

    cfg = configparser.ConfigParser(interpolation=None, strict=False)
    try:
        cfg.readfp(backup_file)
    except configparser.Error:
        # ignore invalid (corrupted) backup file
        return None, None, None, None

    try:
        def_vers = config_get_option_as_list(cfg, 'versions', 'php')[0]
    except IndexError:
        return None, None, None, None

    modules = {}
    php_state = {}
    other = {}
    for section in cfg.sections():
        dirname = section.replace('.', '')
        if dirname.startswith('php') and isdigits(dirname[len('php'):]):
            modules[section] = config_get_option_as_list(cfg, section, 'modules')
            if cfg.has_option(section, 'state') and (cfg.get(section, 'state').strip().lower().startswith('disable')):
                php_state[section[len('php'):]] = False
        elif section not in ('versions',):
            options = {}
            for option in cfg.options(section):
                options[option] = cfg.get(section, option)
            other[section] = options

    if ('phpnative' in other) and ('state' in other['phpnative']) and (other['phpnative']['state'].strip().lower().startswith('disable')):
        php_state['native'] = False

    return def_vers, modules, php_state, other




cl_alt_def_vers = None
cl_alt_def_modules = None
cl_alt_def_php_state = None
cl_alt_def_other = None


def read_cl_alt_defaults():
    global cl_alt_def_vers, cl_alt_def_modules, cl_alt_def_php_state, cl_alt_def_other
    if cl_alt_def_vers != None and cl_alt_def_modules != None and cl_alt_def_php_state != None and cl_alt_def_other != None:
        return cl_alt_def_vers, cl_alt_def_modules, cl_alt_def_php_state, cl_alt_def_other

    cl_alt_def_vers, cl_alt_def_modules, cl_alt_def_php_state, cl_alt_def_other = read_cl_alt_backup(os.path.join(ETC_CL_ALT_PATH, CL_ALT_DEFAULTS))
    return cl_alt_def_vers, cl_alt_def_modules, cl_alt_def_php_state, cl_alt_def_other


# homepath = '/home/user'
# def_vers = '5.1'
# modules = {'php5.1': ['json', 'curl'], 'php5.2': ['calendar', 'ctypes']}
def write_cl_alt_to_backup(homepath, def_vers, modules, uid, gid, state = None, other = None):
    if homepath == None:
        # write global defaults
        backup_path = os.path.join(ETC_CL_ALT_PATH, CL_ALT_DEFAULTS)
        drop_perm = False
    else:
        # write user's backup file
        backup_dir = os.path.join(homepath, CL_ALT_BACKUP_DIR)
        real_homepath = os.path.realpath(homepath)
        if make_userdir(backup_dir, 0o755, uid, gid, real_homepath):
            return
        backup_path = os.path.join(homepath, CL_ALT_BACKUP_DIR, CL_ALT_DEFAULTS)
        # Drop privileges
        drop_perm = True

    # Generate file content
    backup = []
    backup.append('[versions]\n')
    backup.append('php='+def_vers+'\n')
    if modules == None:
        modules = {}
    for section in modules:
        backup.append('\n['+section+']\n')
        backup.append('modules='+','.join(modules[section])+'\n')
        if state != None:
            vers = section[len('php'):]
            if (vers in state) and (not state[vers]):
                backup.append('state=disabled\n')
    if other != None:
        for section in other:
            backup.append('\n['+section+']\n')
            for option in other[section]:
                backup.append(option+'='+other[section][option]+'\n')

    # Write content to the file
    write_file_secure(backup, backup_path, uid, gid, drop_perm)



def get_mounted_dirs(all_cagefs_mounts=False, without_nosuid=False, rw_mounts_only=False, all_mounts=False):
    """
    Return list of mounts points
    :param all_cagefs_mounts: return CageFS mounts points only
    :param without_nosuid: return mount points without 'nosuid' attribute
    :param rw_mounts_only: return rw mount points only (i.e. mounts without 'ro' attribute)
    :param all_mounts: return all mount points
    """
    mounts_list = []
    with open("/proc/mounts", "r") as mounts:
        for line in mounts:
            if all_mounts or line.find('cagefs-etcfs') == -1 and line.find('cagefs-varfs') == -1:
                p = line.split()
                mountpoint = p[1]
                opts = p[3].split(',')
                if without_nosuid and 'nosuid' in opts:
                    continue
                if rw_mounts_only and 'ro' in opts:
                    continue
                if all_mounts or mountpoint.find(SKELETON+'/') != -1 \
                    or (all_cagefs_mounts and (mountpoint.find('/var/cagefs/') != -1 or mountpoint.find('/.cagefs/') != -1)):
                    mounts_list.append(mountpoint[mountpoint.find('/'):])
    return mounts_list


def get_homeN_dirs(use_glob=False):
    """
    Returns set of base home directories like {"/home0", "/home1", .., "/home9"} including "/home"
    """
    pattern = re.compile(r'(/home\d?)/')
    dirs = set()
    if use_glob:
        for path in glob.glob('/home*'):
            m = pattern.match(addslash(path))
            if m and os.path.isdir(path):
                dirs.add(m.group(1))
    else:
        pw = clpwd.get_user_dict()
        for user in pw:
            line = pw[user].pw_dir
            m = pattern.match(line)
            if m:
                dirs.add(m.group(1))
    return dirs



listdir_cache = {}


def cached_listdir(path):
    global listdir_cache
    path = stripslash(path)
    if path not in listdir_cache:
        try:
            sbuf = cached_lstat(path)
            if stat.S_ISDIR(sbuf.st_mode):
                res = listdir_cache[path] = os.listdir(path)
            else:
                res = listdir_cache[path] = []
        except (OSError, IOError):
            res = listdir_cache[path] = []
    else:
        res = listdir_cache[path]
    return res




CUSTOM_ETC = '/etc/cagefs/custom.etc/'



def get_custom_etc_list():
    return cached_listdir(CUSTOM_ETC)


def get_additional_etc_files_for_user(username: str,
                                      user_etc_path: str) -> Dict[str, int]:
    """
    Get additional files for a user
    to be placed within their '/etc' directory.

    This includes retrieving files added
    by the 'custom.etc' directory mechanism
    and mount points defined in the 'cagefs.mp' file.

    Args:
        username: The user's name
        user_etc_path: The user etc path, like '/var/cagefs/<prefix>/<username>/etc'
    """
    return {
        **get_custom_etc_files_for_user(username, user_etc_path),
        **get_etc_dirs_from_mounts_for_user(username, user_etc_path),
    }


def get_custom_etc_files_for_user(username: str,
                                  user_etc_path: str) -> Dict[str, int]:
    """
    Get a list of additional files for a user,
    which have been added to the user's '/etc' directory
    by utilizing the 'custom.etc' directory mechanism.

    Args:
        username: The user's name
        user_etc_path: The user etc path, like '/var/cagefs/<prefix>/<username>/etc'
    """
    etc_list = {}
    if username in get_custom_etc_list():
        path = CUSTOM_ETC + username
        try:
            sbuf = cached_lstat(path)
        except (OSError, IOError):
            return etc_list
        if stat.S_ISDIR(sbuf.st_mode):
            add_tree_to_list(path, etc_list, cut_path = path, add_path = user_etc_path)
    return etc_list


def get_etc_dirs_from_mounts_for_user(username: str,
                                      user_etc_path: str) -> Dict[str, int]:
    """
    Get a list of additional directories for a user,
    which have been added to the user's '/etc' by defining
    additional mount points within the 'cagefs.mp' file.

    Process only the mount points splitted by username or UID,
    as only these are mounted to the user's '/var/cagefs/.../etc',
    which is subsequently mounted to the skeleton's '/etc'.

    Args:
        username: The user's name
        user_etc_path: The user etc path, like '/var/cagefs/<prefix>/<username>/etc'
    """
    import cagefsctl
    etc_list = {}

    mp_config = cagefsctl.MountpointConfig(skip_errors=True, skip_cpanel_check=True)
    splitted_by_username_mounts = mp_config.splitted_by_username_mounts
    splitted_by_uid_mounts = mp_config.splitted_by_uid_mounts

    _process_etc_mounts(splitted_by_username_mounts, username, user_etc_path, etc_list)

    try:
        user_uid = str(clpwd.get_uid(username))
    except clpwd.NoSuchUserException:
        return etc_list

    _process_etc_mounts(splitted_by_uid_mounts, user_uid, user_etc_path, etc_list)

    return etc_list


def _process_etc_mounts(mounts: List[str], user_identifier: str,
                        user_etc_path: str, etc_list: Dict[str, int]) -> None:
    """
    Process mount points and construct a list of '/etc' ones
    and their respective user subdirectories.

    Retrieve a list of contents within the mount point,
    and if it contains the user's identifier
    (UID for mount points splitted by UIDs,
    or username for mount points splitted by usernames),
    add all the subdirectories to the resulting list.
    """
    for path in mounts:
        if not path.startswith('/etc/') or user_identifier not in cached_listdir(path):
            continue

        path = path.replace('/etc/', '', 1)
        parts = path.split('/')
        parts.append(user_identifier)
        current_path = user_etc_path
        for part in parts:
            current_path = os.path.join(current_path, part)
            etc_list[current_path] = 1


# user_etc_path = something like '/var/cagefs/prefix/user/etc'
def update_custom_etc_files_for_user(user, user_etc_path):
    if user in get_custom_etc_list():
        _dir = CUSTOM_ETC + user
        try:
            sbuf = cached_lstat(_dir)
        except (OSError, IOError):
            return
        if stat.S_ISDIR(sbuf.st_mode):
            for filename in os.listdir(_dir):
                if filename not in [ CL_ALT_NAME, CL_PHP_DIR_NAME, ETC_VERSION_NAME ]:
                    src = _dir + '/' + filename
                    dest = user_etc_path +'/' + filename
                    try:
                        sbuf = cached_lstat(src)
                    except (OSError, IOError) as e:
                        logging('Error: lstat() failed file ' + src + ' : ' + str(e), SILENT_FLAG, 1)
                        continue
                    if stat.S_ISDIR(sbuf.st_mode):
                        copytree(src, dest, update = True)
                    else:
                        copy_file(src, dest, update = True)




CUSTOM_ETC_LOG = '/usr/share/cagefs/custom.etc/'


def custom_etc_present():
    # Directory is not empty ?
    if cached_listdir(CUSTOM_ETC_LOG):
        return True
    return False



# list_of_files = list of paths without path to etc directory (like ['/hosts'])
def save_custom_etc_log(user, list_of_files):
    try:
        _ = cached_lstat(CUSTOM_ETC_LOG)
    except (OSError, IOError):
        umask_saved = os.umask(0)
        os.mkdir(CUSTOM_ETC_LOG, 0o700)
        os.umask(umask_saved)
    if list_of_files:
        write_file(CUSTOM_ETC_LOG+user, list_of_files, add_eol = True)
    else:
        try:
            os.unlink(CUSTOM_ETC_LOG+user)
        except (OSError, IOError):
            pass



# Returns list of custom etc files (or directories) that has been removed from /etc/cagefs/custom.etc/user directory
# list_of_files = list of paths without path to etc directory (like ['/hosts'])
def get_custom_etc_files_to_delete(user, list_of_files):
    res = []
    if user in cached_listdir(CUSTOM_ETC_LOG):
        old_list = read_file(CUSTOM_ETC_LOG+user)
        for path in old_list:
            path = path.rstrip()
            if path not in list_of_files:
                if not (path.startswith('/'+CL_ALT_NAME) or path.startswith('/'+CL_PHP_DIR_NAME) or path.startswith(ETC_VERSION)):
                    res.append(path)
        res.sort()
    return res



def cut_path(_list, path):
    plen = len(path)
    res = set()
    for p in _list:
        res.add(p[plen:])
    return res



def is_path_secure(path):
    try:
        sbuf = os.lstat(path)
    except OSError:
        return False

    if not stat.S_ISREG(sbuf.st_mode):
        return False

    return not ( (sbuf.st_uid != 0) or (sbuf.st_gid != 0) or (sbuf.st_mode & stat.S_IWOTH) )



cagefs_ini_cfg = None


def read_cagefs_ini():
    global cagefs_ini_cfg
    if cagefs_ini_cfg is not None:
        return

    if (not os.path.isfile(CAGEFS_INI)) or (not is_path_secure(CAGEFS_INI)):
        cagefs_ini_cfg = None
        return

    cagefs_ini_cfg = configparser.ConfigParser(interpolation=None, strict=False)
    try:
        cagefs_ini_cfg.read(CAGEFS_INI)
    except configparser.Error:
        cagefs_ini_cfg = None



def get_update_period():
    seconds_in_24h = 60*60*24

    read_cagefs_ini()
    if cagefs_ini_cfg is None:
        return seconds_in_24h

    res = config_get_option_as_list(cagefs_ini_cfg, 'common', 'update_period_days')
    try:
        days = int(res[0])
        if days < 0:
            days = 1
    except (ValueError, IndexError):
        days = 1
    return seconds_in_24h * days



def set_cagefs_ini_option(section, option, value):
    global cagefs_ini_cfg
    read_cagefs_ini()
    if cagefs_ini_cfg is None:
        cagefs_ini_cfg = configparser.ConfigParser(interpolation=None, strict=False)
    if not cagefs_ini_cfg.has_section(section):
        cagefs_ini_cfg.add_section(section)
    cagefs_ini_cfg.set(section, option, value)
    ini_file = open(CAGEFS_INI, 'w')
    cagefs_ini_cfg.write(ini_file)
    ini_file.close()
    set_owner(CAGEFS_INI, 0, 0)
    set_perm(CAGEFS_INI, 0o600)



def set_update_period(days):
    set_cagefs_ini_option('common', 'update_period_days', str(days))



# Reads parameters for tmpwatch from config file
def get_tmpwatch_params():
    is_ubuntu = os.path.isfile('/opt/alt/tmpreaper/usr/sbin/tmpreaper')
    TMPWATCH = '/opt/alt/tmpreaper/usr/sbin/tmpreaper 720' if is_ubuntu else '/usr/sbin/tmpwatch -umclq 720'
    read_cagefs_ini()
    if cagefs_ini_cfg is None:
        return TMPWATCH

    if cagefs_ini_cfg.has_option('common', 'tmpwatch'):
        return cagefs_ini_cfg.get('common', 'tmpwatch')

    return TMPWATCH



def set_tmpwatch_params(params_str):
    set_cagefs_ini_option('common', 'tmpwatch', params_str)



def get_tmpwatch_dirs():
    read_cagefs_ini()
    if cagefs_ini_cfg is None:
        return []
    return config_get_option_as_list(cagefs_ini_cfg, 'common', 'tmpwatch_dirs')



LAST_UPDATE_TIME = '/usr/share/cagefs/last_update_time.txt'


def save_last_update_time():
    write_file(LAST_UPDATE_TIME, [str(int(time.time()))], add_eol = True)
    os.chmod(LAST_UPDATE_TIME, 0o644)


def read_last_update_time():
    if os.path.isfile(LAST_UPDATE_TIME):
        content = read_file(LAST_UPDATE_TIME)
        try:
            return int(content[0].strip())
        except (ValueError, IndexError):
            pass
    return 0



def update_of_cagefs_skeleton_is_needed():
    update_period = get_update_period()
    if update_period == 0:
        return True
    last_update = read_last_update_time()
    current_time = int(time.time())
    return current_time >= (last_update + update_period)



# Compare directories or files
# Returns True if they are equal, False otherwise
# This function does NOT follow symlinks
# It compares values of symlinks via readlink()
# Unless shallow is given and is false, files with identical os.stat()
# signatures are taken to be equal (st_atime is ignored in comparison).
def are_dirs_equal(dir1, dir2, shallow = True):
    sbuf1 = oslstat(dir1)
    if not sbuf1:
        return False
    sbuf2 = oslstat(dir2)
    if not sbuf1:
        return False

    if stat.S_ISDIR(sbuf1.st_mode):
        if not stat.S_ISDIR(sbuf2.st_mode):
            return False
        listdir1 = os.listdir(dir1)
        listdir1.sort()
        listdir2 = os.listdir(dir2)
        listdir2.sort()
        if listdir1 != listdir2:
            return False
        for name in listdir1:
            path1 = dir1 + '/' + name
            path2 = dir2 + '/' + name
            if not are_dirs_equal(path1, path2, shallow):
                return False
        return True
    elif stat.S_ISDIR(sbuf2.st_mode):
        return False

    if shallow or stat.S_ISLNK(sbuf1.st_mode) or stat.S_ISLNK(sbuf2.st_mode):
        # Compare values of symlinks or metadata of files
        return is_same_metadata(dir1, dir2, sbA = sbuf1, sbB = sbuf2)
    else:
        # Compare content of files
        return filecmp.cmp(dir1, dir2, shallow = False)


def clean_dir_from_old_session_files(dir_path, max_lifetime):
    """
    Clean directories from old files
    :param dir_path: Dir path to clean
    :param max_lifetime: Max lifetime for clean
    :return: None
    """
    sessions = glob.glob(os.path.join(dir_path, "sess_[a-z0-9]*"))
    cur_time = time.time()
    for sess in sessions:
        try:
            s = os.stat(sess)
            ctime = s.st_ctime
            if cur_time - ctime > max_lifetime:
                os.unlink(sess)
        except OSError:
            pass


def get_opts_from_php_ini(path, default_time, default_path='/tmp'):
    """
    Read php.ini and returns session.save_path and session.gc_maxlifitime options
    :param str path: Path to ini file
    :param int default_time: Return that time when can not get value from config
    :param str default_path: Return that path when can not get value from config
    :return: Tuple (session.save_path, session.gc_maxlifitime)
    :rtype: (str, int)
    """
    try:
        with open(path, "r") as config:
            for line in config.readlines():
                l = line.strip()
                if l.startswith(';'):
                    continue
                elif l.startswith("session.save_path") and "=" in l:
                    default_path = (l.split("=")[1]).strip()
                elif l.startswith("session.gc_maxlifetime") and "=" in l:
                    default_time = int(l.split("=")[1])
    except (IndexError, ValueError, IOError):
        pass
    return default_path.strip("\"'"), default_time


def get_relative_path(original, dest):
    """
    Convert symlink value (path) from absolute to relative
    :param original: path to original file
    :param dest: path where symlink will be created
    """
    if original.startswith('/'):
        return os.path.relpath(strip_path(original), strip_path(os.path.dirname(dest)))
    return original


def relative_symlink(original, dest):
    """
    Create relative symlink instead of absolute
    :param original: path to original file
    :param dest: path where symlink will be created
    """
    relative_path = get_relative_path(original, dest)
    os.symlink(relative_path, dest)


def update_symlink_in_skeleton(origpath, jailpath):
    """
    Create symlink or update if changed. Return value of original symlink (destination it points to)
    :param origpath: path to symlink in real file system
    :param jailpath: path to symlink in cagefs-skeleton
    """
    realfile = os.readlink(origpath)
    try:
        relative_path = get_relative_path(realfile, jailpath)
        if os.path.islink(jailpath):
            if os.readlink(jailpath) != relative_path:
                os.unlink(jailpath)
        else:
            remove_file_or_dir(jailpath, check_mounts=True)
        if not os.path.islink(jailpath):
            logging(f'Creating symlink {jailpath} to {relative_path}', SILENT_FLAG, 1)
            os.symlink(relative_path, jailpath)
    except OSError as e:
        logging(f'Failed to create symlink {jailpath} to {relative_path}: {str(e)}', SILENT_FLAG, 1)
    return realfile


def create_utmp_in_skeleton():
    """
    Create symlink /usr/share/cagefs-skeleton/var/run/utmp -> /var/run/cagefs/utmp
    needed for emulation of /var/run/utmp inside CageFS
    For details see CAG-706
    """
    if not os.path.isdir(SKELETON):
        return
    utmp_cagefs = VAR_RUN_CAGEFS + '/utmp'
    skel_cagefs_dir = SKELETON + VAR_RUN_CAGEFS
    skel_utmp = SKELETON + '/var/run/utmp'
    try:
        if not os.path.isdir(skel_cagefs_dir):
            mod_makedirs(skel_cagefs_dir, 0o755)
    except OSError as e:
        logging('Error: failed to create directory ' + skel_cagefs_dir + ' : ' + str(e), SILENT_FLAG, 1)
    try:
        if not os.path.islink(skel_utmp):
            os.symlink(utmp_cagefs, skel_utmp)
    except OSError as e:
        logging('Error: failed to create symlink ' + skel_utmp + ' -> ' + utmp_cagefs + ' : ' + str(e), SILENT_FLAG, 1)


def create_utmp_for_user(user, exit_on_error=True):
    """
    Create user's personal /home/user/.cagefs/var/run/cagefs/utmp file
    For details see CAG-706
    :param user: user name
    :type user: string
    :param exit_on_error: True == execute sys.exit(1) when error has occured
    :type exit_on_error: bool
    """
    try:
        pw = clpwd.get_pw_by_name(user)
    except ClPwd.NoSuchUserException:
        return
    utmp_dir = pw.pw_dir + '/.cagefs' + VAR_RUN_CAGEFS
    utmp_file = utmp_dir + '/utmp'
    if not os.path.lexists(utmp_file):
        set_user_perm(pw.pw_uid, pw.pw_gid)
        try:
            if not os.path.isdir(utmp_dir):
                clcaptain.mkdir(utmp_dir, 0o700, recursive=True)
            clcaptain.write(utmp_file, '')
        except (OSError, IOError, ExternalProgramFailed):
            print_exception()
            if exit_on_error:
                sys.exit(1)
        set_root_perm()


def is_clean_user_php_sessions_enabled():
    """
    Check clean_php_sessions parameter in config file
    By default sessions cleanup is enabled
    """
    if not get_boolean_param(CL_CONFIG_FILE, 'clean_user_php_sessions', default_val=True):
        return False
    return True


@functools.lru_cache(maxsize=None)
def is_running_without_lve():
    return not is_panel_feature_supported(Feature.LVE)