main.sh 50 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808
  1. #!/usr/bin/env bash
  2. #===========================================================================#
  3. # #
  4. # Hestia Control Panel - Core Function Library #
  5. # #
  6. #===========================================================================#
  7. # Source conf function for correct variable initialisation
  8. source_conf() {
  9. while IFS='= ' read -r lhs rhs; do
  10. if [[ ! $lhs =~ ^\ *# && -n $lhs ]]; then
  11. rhs="${rhs%%^\#*}" # Del in line right comments
  12. rhs="${rhs%%*( )}" # Del trailing spaces
  13. rhs="${rhs%\'*}" # Del opening string quotes
  14. rhs="${rhs#\'*}" # Del closing string quotes
  15. declare -g $lhs="$rhs"
  16. fi
  17. done < $1
  18. }
  19. if [ -z "$user" ]; then
  20. if [ -z "$ROOT_USER" ]; then
  21. if [ -z "$HESTIA" ]; then
  22. # shellcheck source=/etc/hestiacp/hestia.conf
  23. source /etc/hestiacp/hestia.conf
  24. fi
  25. source_conf "$HESTIA/conf/hestia.conf" # load config file
  26. fi
  27. user="$ROOT_USER"
  28. fi
  29. # Internal variables
  30. HOMEDIR='/home'
  31. BACKUP='/backup'
  32. BACKUP_GZIP=9
  33. BACKUP_DISK_LIMIT=95
  34. BACKUP_LA_LIMIT=$(grep -c '^processor' /proc/cpuinfo)
  35. RRD_STEP=300
  36. BIN=$HESTIA/bin
  37. HESTIA_INSTALL_DIR="$HESTIA/install/deb"
  38. HESTIA_COMMON_DIR="$HESTIA/install/common"
  39. HESTIA_BACKUP="/root/hst_backups/$(date +%d%m%Y%H%M)"
  40. HESTIA_PHP="$HESTIA/php/bin/php"
  41. USER_DATA=$HESTIA/data/users/$user
  42. WEBTPL=$HESTIA/data/templates/web
  43. MAILTPL=$HESTIA/data/templates/mail
  44. DNSTPL=$HESTIA/data/templates/dns
  45. RRD=$HESTIA/web/rrd
  46. SENDMAIL="$HESTIA/web/inc/mail-wrapper.php"
  47. HESTIA_GIT_REPO="https://raw.githubusercontent.com/hestiacp/hestiacp"
  48. HESTIA_THEMES="$HESTIA/web/css/themes"
  49. HESTIA_THEMES_CUSTOM="$HESTIA/web/css/themes/custom"
  50. SCRIPT="$(basename $0)"
  51. CHECK_RESULT_CALLBACK=""
  52. # Return codes
  53. OK=0
  54. E_ARGS=1
  55. E_INVALID=2
  56. E_NOTEXIST=3
  57. E_EXISTS=4
  58. E_SUSPENDED=5
  59. E_UNSUSPENDED=6
  60. E_INUSE=7
  61. E_LIMIT=8
  62. E_PASSWORD=9
  63. E_FORBIDEN=10
  64. E_DISABLED=11
  65. E_PARSING=12
  66. E_DISK=13
  67. E_LA=14
  68. E_CONNECT=15
  69. E_FTP=16
  70. E_DB=17
  71. E_RRD=18
  72. E_UPDATE=19
  73. E_RESTART=20
  74. # Detect operating system
  75. detect_os() {
  76. if [ -e "/etc/os-release" ]; then
  77. get_os_type=$(grep "^ID=" /etc/os-release | cut -f 2 -d '=')
  78. if [ "$get_os_type" = "ubuntu" ]; then
  79. if [ -e '/usr/bin/lsb_release' ]; then
  80. OS_VERSION="$(lsb_release -s -r)"
  81. OS_TYPE='Ubuntu'
  82. fi
  83. elif [ "$get_os_type" = "debian" ]; then
  84. OS_TYPE='Debian'
  85. OS_VERSION=$(cat /etc/debian_version | grep -o "[0-9]\{1,2\}" | head -n1)
  86. fi
  87. else
  88. OS_TYPE="Unsupported OS"
  89. OS_VERSION="Unknown"
  90. fi
  91. }
  92. # Generate time stamp
  93. new_timestamp() {
  94. time_n_date=$(date +'%T %F')
  95. time=$(echo "$time_n_date" | cut -f 1 -d \ )
  96. date=$(echo "$time_n_date" | cut -f 2 -d \ )
  97. }
  98. # Event string for logger
  99. ARGS=("$@")
  100. for ((I = 1; I <= $#; I++)); do
  101. if [[ "$HIDE" != "$I" ]]; then
  102. ARGUMENTS="$ARGUMENTS '${ARGS[${I} - 1]}'"
  103. else
  104. ARGUMENTS="$ARGUMENTS '******'"
  105. fi
  106. done
  107. # Log event function
  108. log_event() {
  109. if [ -z "$time" ]; then
  110. LOG_TIME="$(date +'%F %T') $(basename $0)"
  111. else
  112. LOG_TIME="$date $time $(basename $0)"
  113. fi
  114. if [ "$1" -eq 0 ]; then
  115. echo "$LOG_TIME $2" >> $HESTIA/log/system.log
  116. else
  117. echo "$LOG_TIME $2 [Error $1]" >> $HESTIA/log/error.log
  118. fi
  119. }
  120. # Log user history
  121. log_history() {
  122. message=${1//\'/\´} # Avoid single quotes broken the log
  123. evt_level=${2:-$event_level}
  124. log_user=${3-$user}
  125. evt_category=${4:-$event_category}
  126. # Set default event level and category if not specified
  127. if [ -z "$evt_level" ]; then
  128. evt_level="Info"
  129. fi
  130. if [ -z "$evt_category" ]; then
  131. evt_category="System"
  132. fi
  133. # Log system events to system log file
  134. if [ "$log_user" = "system" ]; then
  135. log=$HESTIA/log/activity.log
  136. else
  137. if ! $BIN/v-list-user "$log_user" > /dev/null; then
  138. return $E_NOTEXIST
  139. fi
  140. log=$HESTIA/data/users/$log_user/history.log
  141. fi
  142. touch $log
  143. if [ '300' -lt "$(wc -l $log | cut -f 1 -d ' ')" ]; then
  144. tail -n 250 $log > $log.moved
  145. mv -f $log.moved $log
  146. chmod 660 $log
  147. fi
  148. if [ -z "$date" ]; then
  149. time_n_date=$(date +'%T %F')
  150. time=$(echo "$time_n_date" | cut -f 1 -d \ )
  151. date=$(echo "$time_n_date" | cut -f 2 -d \ )
  152. fi
  153. curr_str=$(tail -n1 $log | grep "ID=" --text | cut -f2 -d \')
  154. id="$((curr_str + 1))"
  155. echo "ID='$id' DATE='$date' TIME='$time' LEVEL='$evt_level' CATEGORY='$evt_category' MESSAGE='$message'" >> $log
  156. }
  157. # Result checker
  158. check_result() {
  159. if [ $1 -ne 0 ]; then
  160. local err_code="${3:-$1}"
  161. if [[ -n "$CHECK_RESULT_CALLBACK" && "$(type -t "$CHECK_RESULT_CALLBACK")" == 'function' ]]; then
  162. $CHECK_RESULT_CALLBACK "$err_code" "$2"
  163. else
  164. echo "Error: $2"
  165. log_event "$err_code" "$ARGUMENTS"
  166. fi
  167. exit $err_code
  168. fi
  169. }
  170. # Argument list checker
  171. check_args() {
  172. if [ "$1" -gt "$2" ]; then
  173. echo "Usage: $(basename $0) $3"
  174. check_result "$E_ARGS" "not enought arguments" > /dev/null
  175. fi
  176. }
  177. # Define version check function
  178. version_ge() { test "$(printf '%s\n' "$@" | sort -V | head -n 1)" != "$1" -o -n "$1" -a "$1" = "$2"; }
  179. # Subsystem checker
  180. is_system_enabled() {
  181. if [ -z "$1" ] || [ "$1" = no ]; then
  182. check_result "$E_DISABLED" "$2 is not enabled"
  183. fi
  184. }
  185. # User package check
  186. is_package_full() {
  187. case "$1" in
  188. WEB_DOMAINS) used=$(wc -l $USER_DATA/web.conf) ;;
  189. WEB_ALIASES) used=$(echo $aliases | tr ',' '\n' | wc -l) ;;
  190. DNS_DOMAINS) used=$(wc -l $USER_DATA/dns.conf) ;;
  191. DNS_RECORDS) used=$(wc -l $USER_DATA/dns/$domain.conf) ;;
  192. MAIL_DOMAINS) used=$(wc -l $USER_DATA/mail.conf) ;;
  193. MAIL_ACCOUNTS) used=$(wc -l $USER_DATA/mail/$domain.conf) ;;
  194. DATABASES) used=$(wc -l $USER_DATA/db.conf) ;;
  195. CRON_JOBS) used=$(wc -l $USER_DATA/cron.conf) ;;
  196. esac
  197. used=$(echo "$used" | cut -f 1 -d \ )
  198. limit=$(grep "^$1=" $USER_DATA/user.conf | cut -f 2 -d \')
  199. if [ "$1" = WEB_ALIASES ]; then
  200. # Used is always calculated with the new alias added
  201. if [ "$limit" != 'unlimited' ] && [[ "$used" -gt "$limit" ]]; then
  202. check_result "$E_LIMIT" "$1 limit is reached :: upgrade user package"
  203. fi
  204. else
  205. if [ "$limit" != 'unlimited' ] && [[ "$used" -ge "$limit" ]]; then
  206. check_result "$E_LIMIT" "$1 limit is reached :: upgrade user package"
  207. fi
  208. fi
  209. }
  210. # User owner for reseller plugin
  211. get_user_owner() {
  212. if [ -z "$RESELLER_KEY" ]; then
  213. owner="$ROOT_USER"
  214. else
  215. owner=$(grep "^OWNER" $USER_DATA/user.conf | cut -f 2 -d \')
  216. if [ -z "$owner" ]; then
  217. owner="$ROOT_USER"
  218. fi
  219. fi
  220. }
  221. # Random password generator
  222. generate_password() {
  223. matrix=$1
  224. length=$2
  225. if [ -z "$matrix" ]; then
  226. matrix="A-Za-z0-9"
  227. fi
  228. if [ -z "$length" ]; then
  229. length=16
  230. fi
  231. head /dev/urandom | tr -dc $matrix | head -c$length
  232. }
  233. # Package existence check
  234. is_package_valid() {
  235. if [ -z $1 ]; then
  236. if [ ! -e "$HESTIA/data/packages/$package.pkg" ]; then
  237. check_result "$E_NOTEXIST" "package $package doesn't exist"
  238. fi
  239. else
  240. if [ ! -e "$HESTIA/data/packages/$1.pkg" ]; then
  241. check_result "$E_NOTEXIST" "package $1 doesn't exist"
  242. fi
  243. fi
  244. }
  245. is_package_new() {
  246. if [ -e "$HESTIA/data/packages/$1.pkg" ]; then
  247. echo "Error: package $1 already exists."
  248. log_event "$E_EXISTS" "$ARGUMENTS"
  249. exit "$E_EXISTS"
  250. fi
  251. }
  252. # Validate system type
  253. is_type_valid() {
  254. if [ -z "$(echo $1 | grep -w $2)" ]; then
  255. check_result "$E_INVALID" "$2 type is invalid"
  256. fi
  257. }
  258. # Check user backup settings
  259. is_backup_enabled() {
  260. BACKUPS=$(grep "^BACKUPS=" $USER_DATA/user.conf | cut -f2 -d \')
  261. if [ -z "$BACKUPS" ] || [[ "$BACKUPS" -le '0' ]]; then
  262. check_result "$E_DISABLED" "user backup is disabled"
  263. fi
  264. }
  265. is_incremental_backup_enabled() {
  266. BACKUPS_INCREMENTAL=$(grep "^BACKUPS_INCREMENTAL=" $USER_DATA/user.conf | cut -f2 -d \')
  267. if [ -z "$BACKUPS_INCREMENTAL" ] || [[ "$BACKUPS_INCREMENTAL" != "yes" ]]; then
  268. check_result "$E_DISABLED" "incremental backups are disabled"
  269. fi
  270. }
  271. # Check user backup settings
  272. is_backup_scheduled() {
  273. if [ -e "$HESTIA/data/queue/backup.pipe" ]; then
  274. check_q=$(grep " $user " $HESTIA/data/queue/backup.pipe | grep $1)
  275. if [ -n "$check_q" ]; then
  276. check_result "$E_EXISTS" "$1 is already scheduled"
  277. fi
  278. fi
  279. }
  280. # Check if object is new
  281. is_object_new() {
  282. if [ $2 = 'USER' ]; then
  283. if [ -d "$USER_DATA" ]; then
  284. object="OK"
  285. fi
  286. else
  287. object=$(grep "$2='$3'" $USER_DATA/$1.conf)
  288. fi
  289. if [ -n "$object" ]; then
  290. check_result "$E_EXISTS" "$2=$3 already exists"
  291. fi
  292. }
  293. # Check if object is valid
  294. is_object_valid() {
  295. if [ $2 = 'USER' ]; then
  296. tstpath="$(readlink -f "$HESTIA/data/users/$3")"
  297. if [ "$(dirname "$tstpath")" != "$(readlink -f "$HESTIA/data/users")" ] || [ ! -d "$HESTIA/data/users/$3" ]; then
  298. check_result "$E_NOTEXIST" "$1 $3 doesn't exist"
  299. fi
  300. elif [ $2 = 'KEY' ]; then
  301. local key="$(basename "$3")"
  302. if [[ -z "$key" || ${#key} -lt 16 ]] || [[ ! -f "$HESTIA/data/access-keys/${key}" && ! -f "$HESTIA/data/access-keys/$key" ]]; then
  303. check_result "$E_NOTEXIST" "$1 $3 doesn't exist"
  304. fi
  305. else
  306. object=$(grep "$2='$3'" $HESTIA/data/users/$user/$1.conf)
  307. if [ -z "$object" ]; then
  308. arg1=$(basename $1)
  309. arg2=$(echo $2 | tr '[:upper:]' '[:lower:]')
  310. check_result "$E_NOTEXIST" "$arg1 $arg2 $3 doesn't exist"
  311. fi
  312. fi
  313. }
  314. # Check if a object string with key values pairs has the correct format and load it afterwards
  315. parse_object_kv_list_non_eval() {
  316. local str
  317. local objkv obj_key obj_val
  318. local OLD_IFS="$IFS"
  319. str=${@//$'\n'/ }
  320. str=${str//\"/\\\"}
  321. str=${str//$/\\$}
  322. IFS=$'\n'
  323. # Extract and loop trough each key-value pair. (Regex test: https://regex101.com/r/eiMufk/5)
  324. for objkv in $(echo "$str" | perl -n -e "while(/\b([a-zA-Z]+[\w]*)='(.*?)'(\s|\$)/g) {print \$1.'='.\$2 . \"\n\" }"); do
  325. if ! [[ "$objkv" =~ ^([[:alnum:]][_[:alnum:]]{0,64}[[:alnum:]])=(\'?[^\']+?\'?)?$ ]]; then
  326. check_result "$E_INVALID" "Invalid key value format [$objkv]"
  327. fi
  328. obj_key=${objkv%%=*} # strip everything after first '=' char
  329. obj_val=${objkv#*=} # strip everything before first '=' char
  330. declare -g $obj_key="$obj_val"
  331. done
  332. IFS="$OLD_IFS"
  333. }
  334. # Check if a object string with key values pairs has the correct format and load it afterwards
  335. parse_object_kv_list() {
  336. local str
  337. local objkv
  338. local suboutput
  339. local OLD_IFS="$IFS"
  340. str=${@//$'\n'/ }
  341. str=${str//\"/\\\"}
  342. str=${str//$/\\$}
  343. IFS=$'\n'
  344. if [ -e '/etc/redhat-release' ]; then
  345. suboutput=$(setpriv --clear-groups --reuid nobody --regid nobody bash -c "PS4=''; set -xe; eval \"${str}\"" 2>&1)
  346. else
  347. suboutput=$(setpriv --clear-groups --reuid nobody --regid nogroup bash -c "PS4=''; set -xe; eval \"${str}\"" 2>&1)
  348. fi
  349. check_result $? "Invalid object format: ${str}" $E_INVALID
  350. for objkv in $suboutput; do
  351. if [[ "$objkv" =~ ^'eval ' ]]; then
  352. continue
  353. fi
  354. if ! [[ "$objkv" =~ ^([[:alnum:]][_[:alnum:]]{0,64}[[:alnum:]])=(\'?[^\']+?\'?)?$ ]]; then
  355. check_result "$E_INVALID" "Invalid key value format [$objkv]"
  356. fi
  357. eval "$objkv"
  358. done
  359. IFS="$OLD_IFS"
  360. }
  361. # Check if object is supended
  362. is_object_suspended() {
  363. if [ $2 = 'USER' ]; then
  364. spnd=$(cat $USER_DATA/$1.conf | grep "SUSPENDED='yes'")
  365. else
  366. spnd=$(grep "$2='$3'" $USER_DATA/$1.conf | grep "SUSPENDED='yes'")
  367. fi
  368. if [ -z "$spnd" ]; then
  369. check_result "$E_UNSUSPENDED" "$(basename $1) $3 is not suspended"
  370. fi
  371. }
  372. # Check if object is unsupended
  373. is_object_unsuspended() {
  374. if [ $2 = 'USER' ]; then
  375. spnd=$(cat $USER_DATA/$1.conf | grep "SUSPENDED='yes'")
  376. else
  377. spnd=$(grep "$2='$3'" $USER_DATA/$1.conf | grep "SUSPENDED='yes'")
  378. fi
  379. if [ -n "$spnd" ]; then
  380. check_result "$E_SUSPENDED" "$(basename $1) $3 is suspended"
  381. fi
  382. }
  383. # Check if object value is empty
  384. is_object_value_empty() {
  385. str=$(grep "$2='$3'" $USER_DATA/$1.conf)
  386. parse_object_kv_list "$str"
  387. eval value=$4
  388. if [ -n "$value" ] && [ "$value" != 'no' ]; then
  389. check_result "$E_EXISTS" "${4//$/}=$value already exists"
  390. fi
  391. }
  392. # Check if object value is empty
  393. is_object_value_exist() {
  394. str=$(grep "$2='$3'" $USER_DATA/$1.conf)
  395. parse_object_kv_list "$str"
  396. eval value=$4
  397. if [ -z "$value" ] || [ "$value" = 'no' ]; then
  398. check_result "$E_NOTEXIST" "${4//$/}=$value doesn't exist"
  399. fi
  400. }
  401. # Check if password is transmitted via file
  402. is_password_valid() {
  403. if [[ "$password" =~ ^/tmp/ ]]; then
  404. if ! [[ "$password" == *../* ]]; then
  405. if [ -f "$password" ]; then
  406. password="$(head -n1 $password)"
  407. fi
  408. fi
  409. fi
  410. }
  411. # Check if hash is transmitted via file
  412. is_hash_valid() {
  413. if [[ "$hash" =~ ^/tmp/ ]]; then
  414. if ! [[ "$hash" == *../* ]]; then
  415. if [ -f "$hash" ]; then
  416. hash="$(head -n1 $hash)"
  417. fi
  418. fi
  419. fi
  420. }
  421. # Check if directory is a symlink
  422. is_dir_symlink() {
  423. if [[ -L "$1" ]]; then
  424. check_result "$E_FORBIDEN" "$1 directory is a symlink"
  425. fi
  426. }
  427. # Get object value
  428. get_object_value() {
  429. object=$(grep "$2='$3'" $USER_DATA/$1.conf)
  430. parse_object_kv_list "$object"
  431. eval echo $4
  432. }
  433. get_object_values() {
  434. parse_object_kv_list $(grep "$2='$3'" $USER_DATA/$1.conf)
  435. }
  436. # Update object value
  437. update_object_value() {
  438. row=$(grep -nF "$2='$3'" $USER_DATA/$1.conf)
  439. lnr=$(echo $row | cut -f 1 -d ':')
  440. object=$(echo $row | sed "s/^$lnr://")
  441. parse_object_kv_list "$object"
  442. eval old="$4"
  443. old=$(echo "$old" | sed -e 's/\\/\\\\/g' -e 's/&/\\&/g' -e 's/\//\\\//g')
  444. new=$(echo "$5" | sed -e 's/\\/\\\\/g' -e 's/&/\\&/g' -e 's/\//\\\//g')
  445. sed -i "$lnr s/${4//$/}='${old//\*/\\*}'/${4//$/}='${new//\*/\\*}'/g" \
  446. $USER_DATA/$1.conf
  447. }
  448. # Add object key
  449. add_object_key() {
  450. row=$(grep -n "$2='$3'" $USER_DATA/$1.conf)
  451. lnr=$(echo $row | cut -f 1 -d ':')
  452. object=$(echo $row | sed "s/^$lnr://")
  453. if [ -z "$(echo $object | grep $4=)" ]; then
  454. eval old="$4"
  455. sed -i "$lnr s/$5='/$4='' $5='/" $USER_DATA/$1.conf
  456. fi
  457. }
  458. # Search objects
  459. search_objects() {
  460. OLD_IFS="$IFS"
  461. IFS=$'\n'
  462. if [ -f $USER_DATA/$1.conf ]; then
  463. for line in $(grep $2=\'$3\' $USER_DATA/$1.conf); do
  464. parse_object_kv_list "$line"
  465. eval echo \$$4
  466. done
  467. fi
  468. IFS="$OLD_IFS"
  469. }
  470. # Get user value
  471. get_user_value() {
  472. grep "^${1//$/}=" $USER_DATA/user.conf | head -1 | awk -F "'" '{print $2}'
  473. }
  474. # Update user value in user.conf
  475. update_user_value() {
  476. key="${2//$/}"
  477. lnr=$(grep -n "^$key='" $HESTIA/data/users/$1/user.conf | cut -f 1 -d ':')
  478. if [ -n "$lnr" ]; then
  479. sed -i "$lnr d" $HESTIA/data/users/$1/user.conf
  480. sed -i "$lnr i\\$key='${3}'" $HESTIA/data/users/$1/user.conf
  481. fi
  482. }
  483. # Increase user counter
  484. increase_user_value() {
  485. key="${2//$/}"
  486. factor="${3-1}"
  487. conf="$HESTIA/data/users/$1/user.conf"
  488. old=$(grep "$key=" $conf | cut -f 2 -d \')
  489. if [ -z "$old" ]; then
  490. old=0
  491. fi
  492. new=$((old + factor))
  493. sed -i "s/$key='$old'/$key='$new'/g" $conf
  494. }
  495. # Decrease user counter
  496. decrease_user_value() {
  497. key="${2//$/}"
  498. factor="${3-1}"
  499. conf="$HESTIA/data/users/$1/user.conf"
  500. old=$(grep "$key=" $conf | cut -f 2 -d \')
  501. if [ -z "$old" ]; then
  502. old=0
  503. fi
  504. if [ "$old" -le 1 ]; then
  505. new=0
  506. else
  507. new=$((old - factor))
  508. fi
  509. if [ "$new" -lt 0 ]; then
  510. new=0
  511. fi
  512. sed -i "s/$key='$old'/$key='$new'/g" $conf
  513. }
  514. # Notify user
  515. send_notice() {
  516. topic=$1
  517. notice=$2
  518. if [ "$notify" = 'yes' ]; then
  519. touch $USER_DATA/notifications.conf
  520. chmod 660 $USER_DATA/notifications.conf
  521. time_n_date=$(date +'%T %F')
  522. time=$(echo "$time_n_date" | cut -f 1 -d \ )
  523. date=$(echo "$time_n_date" | cut -f 2 -d \ )
  524. nid=$(grep "NID=" $USER_DATA/notifications.conf | cut -f 2 -d \')
  525. nid=$(echo "$nid" | sort -n | tail -n1)
  526. if [ -n "$nid" ]; then
  527. nid="$((nid + 1))"
  528. else
  529. nid=1
  530. fi
  531. str="NID='$nid' TOPIC='$topic' NOTICE='$notice' TYPE='$type'"
  532. str="$str ACK='no' TIME='$time' DATE='$date'"
  533. echo "$str" >> $USER_DATA/notifications.conf
  534. if [ -z "$(grep NOTIFICATIONS $USER_DATA/user.conf)" ]; then
  535. sed -i "s/^TIME/NOTIFICATIONS='yes'\nTIME/g" $USER_DATA/user.conf
  536. else
  537. update_user_value "$user" '$NOTIFICATIONS' "yes"
  538. fi
  539. fi
  540. }
  541. # Recalculate U_DISK value
  542. recalc_user_disk_usage() {
  543. u_usage=0
  544. if [ -f "$USER_DATA/web.conf" ]; then
  545. usage=0
  546. dusage=$(grep 'U_DISK=' $USER_DATA/web.conf \
  547. | awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  548. for disk_usage in $dusage; do
  549. usage=$((usage + disk_usage))
  550. done
  551. d=$(grep "U_DISK_WEB='" $USER_DATA/user.conf | cut -f 2 -d \')
  552. sed -i "s/U_DISK_WEB='$d'/U_DISK_WEB='$usage'/g" $USER_DATA/user.conf
  553. u_usage=$((u_usage + usage))
  554. fi
  555. if [ -f "$USER_DATA/mail.conf" ]; then
  556. usage=0
  557. dusage=$(grep 'U_DISK=' $USER_DATA/mail.conf \
  558. | awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  559. for disk_usage in $dusage; do
  560. usage=$((usage + disk_usage))
  561. done
  562. d=$(grep "U_DISK_MAIL='" $USER_DATA/user.conf | cut -f 2 -d \')
  563. sed -i "s/U_DISK_MAIL='$d'/U_DISK_MAIL='$usage'/g" $USER_DATA/user.conf
  564. u_usage=$((u_usage + usage))
  565. fi
  566. if [ -f "$USER_DATA/db.conf" ]; then
  567. usage=0
  568. dusage=$(grep 'U_DISK=' $USER_DATA/db.conf \
  569. | awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  570. for disk_usage in $dusage; do
  571. usage=$((usage + disk_usage))
  572. done
  573. d=$(grep "U_DISK_DB='" $USER_DATA/user.conf | cut -f 2 -d \')
  574. sed -i "s/U_DISK_DB='$d'/U_DISK_DB='$usage'/g" $USER_DATA/user.conf
  575. u_usage=$((u_usage + usage))
  576. fi
  577. usage=$(grep 'U_DISK_DIRS=' $USER_DATA/user.conf | cut -f 2 -d "'")
  578. u_usage=$((u_usage + usage))
  579. old=$(grep "U_DISK='" $USER_DATA/user.conf | cut -f 2 -d \')
  580. sed -i "s/U_DISK='$old'/U_DISK='$u_usage'/g" $USER_DATA/user.conf
  581. }
  582. # Recalculate U_BANDWIDTH value
  583. recalc_user_bandwidth_usage() {
  584. usage=0
  585. bandwidth_usage=$(grep 'U_BANDWIDTH=' $USER_DATA/web.conf \
  586. | awk -F "U_BANDWIDTH='" '{print $2}' | cut -f 1 -d \')
  587. for bandwidth in $bandwidth_usage; do
  588. usage=$((usage + bandwidth))
  589. done
  590. old=$(grep "U_BANDWIDTH='" $USER_DATA/user.conf | cut -f 2 -d \')
  591. sed -i "s/U_BANDWIDTH='$old'/U_BANDWIDTH='$usage'/g" $USER_DATA/user.conf
  592. }
  593. # Get next cron job id
  594. get_next_cronjob() {
  595. if [ -z "$job" ]; then
  596. curr_str=$(grep "JOB=" $USER_DATA/cron.conf | cut -f 2 -d \' \
  597. | sort -n | tail -n1)
  598. job="$((curr_str + 1))"
  599. fi
  600. }
  601. # Sort cron jobs by id
  602. sort_cron_jobs() {
  603. cat $USER_DATA/cron.conf | sort -n -k 2 -t \' > $USER_DATA/cron.tmp
  604. mv -f $USER_DATA/cron.tmp $USER_DATA/cron.conf
  605. }
  606. # Sync cronjobs with system cron
  607. sync_cron_jobs() {
  608. source_conf "$USER_DATA/user.conf"
  609. if [ -e "/var/spool/cron/crontabs" ]; then
  610. crontab="/var/spool/cron/crontabs/$user"
  611. else
  612. crontab="/var/spool/cron/$user"
  613. fi
  614. # remove file if exists
  615. if [ -e "$crontab" ]; then
  616. rm -f $crontab
  617. fi
  618. # touch new crontab file
  619. touch $crontab
  620. if [ "$CRON_REPORTS" = 'yes' ]; then
  621. echo "MAILTO=$CONTACT" > $crontab
  622. echo 'CONTENT_TYPE="text/plain; charset=utf-8"' >> $crontab
  623. else
  624. echo 'MAILTO=""' > $crontab
  625. fi
  626. while read line; do
  627. parse_object_kv_list "$line"
  628. if [ "$SUSPENDED" = 'no' ]; then
  629. echo "$MIN $HOUR $DAY $MONTH $WDAY $CMD" \
  630. | sed -e "s/%quote%/'/g" -e "s/%dots%/:/g" \
  631. >> $crontab
  632. fi
  633. done < $USER_DATA/cron.conf
  634. chown $user:$user $crontab
  635. chmod 600 $crontab
  636. }
  637. # Validates Local part email and mail alias
  638. is_localpart_format_valid() {
  639. if [ ${#1} -eq 1 ]; then
  640. if ! [[ "$1" =~ ^[[:alnum:]]$ ]]; then
  641. check_result "$E_INVALID" "invalid $2 format :: $1"
  642. fi
  643. else
  644. if [ -n "$3" ]; then
  645. maxlenght=$(($3 - 2))
  646. # Allow leading and trailing special characters by adjusting the regex
  647. if ! [[ "$1" =~ ^[[:alnum:]_.-][[:alnum:]_.-]{0,$maxlenght}[[:alnum:]_.-]$ ]]; then
  648. check_result "$E_INVALID" "invalid $2 format :: $1"
  649. fi
  650. else
  651. # Allow leading and trailing special characters by adjusting the regex
  652. if ! [[ "$1" =~ ^[[:alnum:]_.-][[:alnum:]_.-]{0,28}[[:alnum:]_.-]$ ]]; then
  653. check_result "$E_INVALID" "invalid $2 format :: $1"
  654. fi
  655. fi
  656. fi
  657. if [ "$1" != "${1//[^[:ascii:]]/}" ]; then
  658. check_result "$E_INVALID" "invalid $2 format :: $1"
  659. fi
  660. }
  661. # Username / ftp username format validator
  662. is_user_format_valid() {
  663. if [ ${#1} -eq 1 ]; then
  664. if ! [[ "$1" =~ ^^[[:alnum:]]$ ]]; then
  665. check_result "$E_INVALID" "invalid $2 format :: $1"
  666. fi
  667. else
  668. if [ -n "$3" ]; then
  669. maxlenght=$(($3 - 2))
  670. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,$maxlenght}[[:alnum:]]$ ]]; then
  671. check_result "$E_INVALID" "invalid $2 format :: $1"
  672. fi
  673. else
  674. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,28}[[:alnum:]]$ ]]; then
  675. check_result "$E_INVALID" "invalid $2 format :: $1"
  676. fi
  677. fi
  678. fi
  679. if [ "$1" != "${1//[^[:ascii:]]/}" ]; then
  680. check_result "$E_INVALID" "invalid $2 format :: $1"
  681. fi
  682. # Only for new users
  683. if [[ "$FROM_V_ADD_USER" == "true" ]]; then
  684. if ! [[ "$1" =~ ^[a-zA-Z][-|_[:alnum:]]{0,28}[[:alnum:]]$ ]]; then
  685. check_result "$E_INVALID" "invalid $2 format :: $1"
  686. fi
  687. fi
  688. }
  689. # Domain format validator
  690. is_domain_format_valid() {
  691. object_name=${2-domain}
  692. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|_|/|\|\"|'|;|%|\`| ]"
  693. if [[ $1 =~ $exclude ]] || [[ $1 =~ ^[0-9]+$ ]] || [[ $1 =~ \.\. ]] || [[ $1 =~ $(printf '\t') ]] || [[ "$1" = "www" ]]; then
  694. check_result "$E_INVALID" "invalid $object_name format :: $1"
  695. fi
  696. is_no_new_line_format "$1"
  697. }
  698. # Alias forman validator
  699. is_alias_format_valid() {
  700. for object in ${1//,/ }; do
  701. exclude="[!|@|#|$|^|&|(|)|+|=|{|}|:|<|>|?|_|/|\|\"|'|;|%|\`| ]"
  702. if [[ "$object" =~ $exclude ]]; then
  703. check_result "$E_INVALID" "invalid alias format :: $object"
  704. fi
  705. if [[ "$object" =~ [*] ]] && ! [[ "$object" =~ ^[*]\..* ]]; then
  706. check_result "$E_INVALID" "invalid alias format :: $object"
  707. fi
  708. done
  709. }
  710. # IP format validator
  711. is_ip_format_valid() {
  712. object_name=${2-ip}
  713. valid=$($HESTIA_PHP -r '$ip="$argv[1]"; echo (filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4) ? 0 : 1);' $1)
  714. if [ "$valid" -ne 0 ]; then
  715. check_result "$E_INVALID" "invalid $object_name :: $1"
  716. fi
  717. }
  718. # IPv6 format validator
  719. is_ipv6_format_valid() {
  720. object_name=${2-ipv6}
  721. valid=$($HESTIA_PHP -r '$ip="$argv[1]"; echo (filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV6) ? 0 : 1);' $1)
  722. if [ "$valid" -ne 0 ]; then
  723. check_result "$E_INVALID" "invalid $object_name :: $1"
  724. fi
  725. }
  726. is_ip46_format_valid() {
  727. valid=$($HESTIA_PHP -r '$ip="$argv[1]"; echo (filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4 | FILTER_FLAG_IPV6) ? 0 : 1);' $1)
  728. if [ "$valid" -ne 0 ]; then
  729. check_result "$E_INVALID" "invalid IP format :: $1"
  730. fi
  731. }
  732. is_ipv4_cidr_format_valid() {
  733. object_name=${2-ip}
  734. valid=$($HESTIA_PHP -r '$cidr="$argv[1]"; list($ip, $netmask) = [...explode("/", $cidr), 32]; echo ((filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV4) && $netmask <= 32) ? 0 : 1);' $1)
  735. if [ "$valid" -ne 0 ]; then
  736. check_result "$E_INVALID" "invalid $object_name :: $1"
  737. fi
  738. }
  739. is_ipv6_cidr_format_valid() {
  740. object_name=${2-ipv6}
  741. valid=$($HESTIA_PHP -r '$cidr="$argv[1]"; list($ip, $netmask) = [...explode("/", $cidr), 128]; echo ((filter_var($ip, FILTER_VALIDATE_IP, FILTER_FLAG_IPV6) && $netmask <= 128) ? 0 : 1);' $1)
  742. if [ "$valid" -ne 0 ]; then
  743. check_result "$E_INVALID" "invalid $object_name :: $1"
  744. fi
  745. }
  746. is_netmask_format_valid() {
  747. object_name=${2-netmask}
  748. valid=$($HESTIA_PHP -r '$netmask="$argv[1]"; echo (preg_match("/^(128|192|224|240|248|252|254|255)\.(0|128|192|224|240|248|252|254|255)\.(0|128|192|224|240|248|252|254|255)\.(0|128|192|224|240|248|252|254|255)/", $netmask) ? 0 : 1);' $1)
  749. if [ "$valid" -ne 0 ]; then
  750. check_result "$E_INVALID" "invalid $object_name :: $1"
  751. fi
  752. }
  753. # Proxy extention format validator
  754. is_extention_format_valid() {
  755. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|@|<|>|?|/|\|\"|'|;|%|\`| ]"
  756. if [[ "$1" =~ $exclude ]]; then
  757. check_result "$E_INVALID" "invalid proxy extention format :: $1"
  758. fi
  759. is_no_new_line_format "$1"
  760. }
  761. # Number format validator
  762. is_number_format_valid() {
  763. object_name=${2-number}
  764. if ! [[ "$1" =~ ^[0-9]+$ ]]; then
  765. check_result "$E_INVALID" "invalid $object_name format :: $1"
  766. fi
  767. }
  768. # Autoreply format validator
  769. is_autoreply_format_valid() {
  770. if [ 10240 -le ${#1} ]; then
  771. check_result "$E_INVALID" "invalid autoreply format :: $1"
  772. fi
  773. }
  774. # Boolean format validator
  775. is_boolean_format_valid() {
  776. if [ "$1" != 'yes' ] && [ "$1" != 'no' ]; then
  777. check_result "$E_INVALID" "invalid $2 format :: $1"
  778. fi
  779. }
  780. # Refresh IPset format validator
  781. is_refresh_ipset_format_valid() {
  782. if [ "$1" != 'load' ] && [ "$1" != 'yes' ] && [ "$1" != 'no' ]; then
  783. check_result "$E_INVALID" "invalid $2 format :: $1"
  784. fi
  785. }
  786. # Common format validator
  787. is_common_format_valid() {
  788. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|<|>|?|/|\|\"|'|;|%|\`| ]"
  789. if [[ "$1" =~ $exclude ]]; then
  790. check_result "$E_INVALID" "invalid $2 format :: $1"
  791. fi
  792. if [ 400 -le ${#1} ]; then
  793. check_result "$E_INVALID" "invalid $2 format :: $1"
  794. fi
  795. if [[ "$1" =~ @ ]] && [ ${#1} -gt 1 ]; then
  796. check_result "$E_INVALID" "invalid $2 format :: $1"
  797. fi
  798. if [[ $1 =~ \* ]]; then
  799. if [[ "$(echo $1 | grep -o '\*\.' | wc -l)" -eq 0 ]] && [[ $1 != '*' ]]; then
  800. check_result "$E_INVALID" "invalid $2 format :: $1"
  801. fi
  802. fi
  803. if [[ $(echo -n "$1" | tail -c 1) =~ [^a-zA-Z0-9_*@.] ]]; then
  804. check_result "$E_INVALID" "invalid $2 format :: $1"
  805. fi
  806. if [[ $(echo -n "$1" | grep -c '\.\.') -gt 0 ]]; then
  807. check_result "$E_INVALID" "invalid $2 format :: $1"
  808. fi
  809. if [[ $(echo -n "$1" | head -c 1) =~ [^a-zA-Z0-9_*@] ]]; then
  810. check_result "$E_INVALID" "invalid $2 format :: $1"
  811. fi
  812. if [[ $(echo -n "$1" | grep -c '\-\-') -gt 0 ]]; then
  813. check_result "$E_INVALID" "invalid $2 format :: $1"
  814. fi
  815. if [[ $(echo -n "$1" | grep -c '\_\_') -gt 0 ]]; then
  816. check_result "$E_INVALID" "invalid $2 format :: $1"
  817. fi
  818. is_no_new_line_format "$1"
  819. }
  820. is_no_new_line_format() {
  821. test=$(echo "$1" | head -n1)
  822. if [[ "$test" != "$1" ]]; then
  823. check_result "$E_INVALID" "invalid value :: $1"
  824. fi
  825. }
  826. is_string_format_valid() {
  827. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|<|>|?|/|\|\"|'|;|%|\`]"
  828. if [[ "$1" =~ $exclude ]]; then
  829. check_result "$E_INVALID" "invalid $2 format :: $1"
  830. fi
  831. is_no_new_line_format "$1"
  832. }
  833. is_cron_command_valid_format() {
  834. if [[ ! "$1" =~ ^[^\`]*?$ ]]; then
  835. check_result "$E_INVALID" "Invalid cron command format"
  836. fi
  837. }
  838. # Database format validator
  839. is_database_format_valid() {
  840. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|/|\|\"|'|;|%|\`| ]"
  841. if [[ "$1" =~ $exclude ]] || [ 64 -le ${#1} ]; then
  842. check_result "$E_INVALID" "invalid $2 format :: $1"
  843. fi
  844. is_no_new_line_format "$1"
  845. }
  846. # Date format validator
  847. is_date_format_valid() {
  848. if ! [[ "$1" =~ ^[0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9]$ ]]; then
  849. check_result "$E_INVALID" "invalid date format :: $1"
  850. fi
  851. }
  852. # Database user validator
  853. is_dbuser_format_valid() {
  854. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|/|\|\"|'|;|%|\`| ]"
  855. if [ 33 -le ${#1} ]; then
  856. check_result "$E_INVALID" "mysql username can be up to 32 characters long"
  857. fi
  858. if [[ "$1" =~ $exclude ]]; then
  859. check_result "$E_INVALID" "invalid $2 format :: $1"
  860. fi
  861. is_no_new_line_format "$1"
  862. }
  863. # DNS record type validator
  864. is_dns_type_format_valid() {
  865. known_dnstype='A,AAAA,NS,CNAME,MX,TXT,SRV,DNSKEY,KEY,IPSECKEY,PTR,SPF,TLSA,CAA,DS'
  866. if [ -z "$(echo $known_dnstype | grep -w $1)" ]; then
  867. check_result "$E_INVALID" "invalid dns record type format :: $1"
  868. fi
  869. }
  870. # DNS record validator
  871. is_dns_record_format_valid() {
  872. if [ "$rtype" = 'A' ]; then
  873. is_ip_format_valid "$1"
  874. fi
  875. if [ "$rtype" = 'NS' ]; then
  876. is_domain_format_valid "${1::-1}" 'ns_record'
  877. fi
  878. if [ "$rtype" = 'MX' ]; then
  879. is_domain_format_valid "${1::-1}" 'mx_record'
  880. is_int_format_valid "$priority" 'priority_record'
  881. fi
  882. if [ "$rtype" = 'SRV' ]; then
  883. format_no_quotes "$priority" 'priority_record'
  884. fi
  885. is_no_new_line_format "$1"
  886. }
  887. # Email format validator
  888. is_email_format_valid() {
  889. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.[A-Za-z]{2,63}$ ]]; then
  890. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.(xn--)[[:alnum:]]{2,63}$ ]]; then
  891. check_result "$E_INVALID" "invalid email format :: $1"
  892. fi
  893. fi
  894. }
  895. # Firewall action validator
  896. is_fw_action_format_valid() {
  897. if [ "$1" != "ACCEPT" ] && [ "$1" != 'DROP' ]; then
  898. check_result "$E_INVALID" "invalid action format :: $1"
  899. fi
  900. }
  901. # Firewall protocol validator
  902. is_fw_protocol_format_valid() {
  903. if [ "$1" != "ICMP" ] && [ "$1" != 'UDP' ] && [ "$1" != 'TCP' ]; then
  904. check_result "$E_INVALID" "invalid protocol format :: $1"
  905. fi
  906. }
  907. # Firewall port validator
  908. is_fw_port_format_valid() {
  909. if [ "${#1}" -eq 1 ]; then
  910. if ! [[ "$1" =~ [0-9] ]]; then
  911. check_result "$E_INVALID" "invalid port format :: $1"
  912. fi
  913. else
  914. if ! [[ "$1" =~ ^[0-9][-|,|:|0-9]{0,76}[0-9]$ ]]; then
  915. check_result "$E_INVALID" "invalid port format and/or more than 78 chars used :: $1"
  916. fi
  917. fi
  918. }
  919. # DNS record id validator
  920. is_id_format_valid() {
  921. if ! echo "$1" | grep -qE '^[1-9][0-9]{0,}$'; then
  922. check_result "$E_INVALID" "invalid $2 format :: $1"
  923. fi
  924. }
  925. # Integer validator
  926. is_int_format_valid() {
  927. if ! [[ "$1" =~ ^[0-9]+$ ]]; then
  928. check_result "$E_INVALID" "invalid $2 format :: $1"
  929. fi
  930. }
  931. # Interface validator
  932. is_interface_format_valid() {
  933. nic_names="$(ip -d -j link show | jq -r '.[] | if .link_type == "loopback" then empty else .ifname, if .altnames then .altnames[] else empty end end')"
  934. if [ -z "$(echo "$nic_names" | grep -x "$1")" ]; then
  935. check_result "$E_INVALID" "invalid interface format :: $1"
  936. fi
  937. }
  938. # IP status validator
  939. is_ip_status_format_valid() {
  940. if [ -z "$(echo shared,dedicated | grep -w "$1")" ]; then
  941. check_result "$E_INVALID" "invalid status format :: $1"
  942. fi
  943. }
  944. # Cron validator
  945. is_cron_format_valid() {
  946. limit=59
  947. check_format=''
  948. if [ "$2" = 'hour' ]; then
  949. limit=23
  950. fi
  951. if [ "$2" = 'day' ]; then
  952. limit=31
  953. fi
  954. if [ "$2" = 'month' ]; then
  955. limit=12
  956. fi
  957. if [ "$2" = 'wday' ]; then
  958. limit=7
  959. fi
  960. if [ "$1" = '*' ]; then
  961. check_format='ok'
  962. fi
  963. if [[ "$1" =~ ^[\*]+[/]+[0-9] ]]; then
  964. if [ "$(echo $1 | cut -f 2 -d /)" -lt $limit ]; then
  965. check_format='ok'
  966. fi
  967. fi
  968. if [[ "$1" =~ ^[0-9][-|,|0-9]{0,70}[\/][0-9]$ ]]; then
  969. check_format='ok'
  970. crn_values=${1//,/ }
  971. crn_values=${crn_values//-/ }
  972. crn_values=${crn_values//\// }
  973. for crn_vl in $crn_values; do
  974. if [ "$crn_vl" -gt $limit ]; then
  975. check_format='invalid'
  976. fi
  977. done
  978. fi
  979. crn_values=$(echo $1 | tr "," " " | tr "-" " ")
  980. for crn_vl in $crn_values; do
  981. if [[ "$crn_vl" =~ ^[0-9]+$ ]] && [ "$crn_vl" -le $limit ]; then
  982. check_format='ok'
  983. fi
  984. done
  985. if [ "$check_format" != 'ok' ]; then
  986. check_result "$E_INVALID" "invalid $2 format :: $1"
  987. fi
  988. }
  989. # Validate CPU Quota:
  990. is_valid_cpu_quota() {
  991. local cpu_quota="$1"
  992. if [[ ! "$cpu_quota" =~ ^[1-9][0-9]*%$ ]]; then
  993. check_result "$E_INVALID" "Invalid CPU Quota format: $cpu_quota"
  994. fi
  995. }
  996. # Validate CPU Quota Period:
  997. is_valid_cpu_quota_period() {
  998. if [[ ! "$1" =~ ^[0-9]+(ms|s)$ ]]; then
  999. check_result "$E_INVALID" "Invalid CPU Quota Period format :: $1"
  1000. fi
  1001. }
  1002. # Validate Memory Size:
  1003. is_valid_memory_size() {
  1004. if [[ ! "$1" =~ ^[0-9]+[KMGTK]?$ ]]; then
  1005. check_result "$E_INVALID" "Invalid Memory Size format :: $1"
  1006. fi
  1007. }
  1008. # Validate Swap Size:
  1009. is_valid_swap_size() {
  1010. if [[ ! "$1" =~ ^[0-9]+[KMGTK]?$ ]]; then
  1011. check_result "$E_INVALID" "Invalid Swap Size format :: $1"
  1012. fi
  1013. }
  1014. is_object_name_format_valid() {
  1015. if ! [[ "$1" =~ ^[-|\ |\.|_[:alnum:]]{0,50}$ ]]; then
  1016. check_result "$E_INVALID" "invalid $2 format :: $1"
  1017. fi
  1018. }
  1019. # Name validator
  1020. is_name_format_valid() {
  1021. exclude="['|\"|<|>]"
  1022. if [[ "$1" =~ $exclude ]]; then
  1023. check_result "$E_INVALID" "Invalid $2 contains qoutes (\" or ') :: $1"
  1024. fi
  1025. is_no_new_line_format "$1"
  1026. }
  1027. # Object validator
  1028. is_object_format_valid() {
  1029. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,64}[[:alnum:]]$ ]]; then
  1030. check_result "$E_INVALID" "invalid $2 format :: $1"
  1031. fi
  1032. }
  1033. # Role validator
  1034. is_role_valid() {
  1035. if ! [[ "$1" =~ ^admin$|^user$|^dns-cluster$ ]]; then
  1036. check_result "$E_INVALID" "invalid $2 format :: $1"
  1037. fi
  1038. }
  1039. # Password validator
  1040. is_password_format_valid() {
  1041. if [ "${#1}" -lt '6' ]; then
  1042. check_result "$E_INVALID" "invalid password format :: $1"
  1043. fi
  1044. }
  1045. # Missing function -
  1046. # Before: validate_format_shell
  1047. # After: is_format_valid_shell
  1048. is_format_valid_shell() {
  1049. if [ -z "$(grep -w $1 /etc/shells)" ]; then
  1050. echo "Error: shell $1 is not valid"
  1051. log_event "$E_INVALID" "$EVENT"
  1052. exit $E_INVALID
  1053. fi
  1054. }
  1055. # Service name validator
  1056. is_service_format_valid() {
  1057. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,64}$ ]]; then
  1058. check_result "$E_INVALID" "invalid $2 format :: $1"
  1059. fi
  1060. }
  1061. is_hash_format_valid() {
  1062. if ! [[ "$1" =~ ^[[:alnum:]|\:|\=|_|-]{1,80}$ ]]; then
  1063. check_result "$E_INVALID" "invalid $2 format :: $1"
  1064. fi
  1065. }
  1066. # Format validation controller
  1067. is_format_valid() {
  1068. for arg_name in $*; do
  1069. eval arg=\$$arg_name
  1070. if [ -n "$arg" ]; then
  1071. case $arg_name in
  1072. access_key_id) is_access_key_id_format_valid "$arg" "$arg_name" ;;
  1073. account) is_localpart_format_valid "$arg" "$arg_name" '64' ;;
  1074. action) is_fw_action_format_valid "$arg" ;;
  1075. active) is_boolean_format_valid "$arg" 'active' ;;
  1076. aliases) is_alias_format_valid "$arg" ;;
  1077. alias) is_alias_format_valid "$arg" ;;
  1078. antispam) is_boolean_format_valid "$arg" 'antispam' ;;
  1079. antivirus) is_boolean_format_valid "$arg" 'antivirus' ;;
  1080. autoreply) is_autoreply_format_valid "$arg" ;;
  1081. backup) is_object_format_valid "$arg" 'backup' ;;
  1082. charset) is_object_format_valid "$arg" "$arg_name" ;;
  1083. charsets) is_common_format_valid "$arg" 'charsets' ;;
  1084. chain) is_object_format_valid "$arg" 'chain' ;;
  1085. comment) is_object_format_valid "$arg" 'comment' ;;
  1086. cron_command) is_cron_command_valid_format "$arg" ;;
  1087. database) is_database_format_valid "$arg" 'database' ;;
  1088. day) is_cron_format_valid "$arg" $arg_name ;;
  1089. dbpass) is_password_format_valid "$arg" ;;
  1090. dbuser) is_dbuser_format_valid "$arg" 'dbuser' ;;
  1091. dkim) is_boolean_format_valid "$arg" 'dkim' ;;
  1092. dkim_size) is_int_format_valid "$arg" ;;
  1093. domain) is_domain_format_valid "$arg" ;;
  1094. dom_alias) is_alias_format_valid "$arg" ;;
  1095. dvalue) is_dns_record_format_valid "$arg" ;;
  1096. email) is_email_format_valid "$arg" ;;
  1097. email_forward) is_email_format_valid "$arg" ;;
  1098. exp) is_date_format_valid "$arg" ;;
  1099. extentions) is_common_format_valid "$arg" 'extentions' ;;
  1100. format) is_type_valid 'plain json shell csv' "$arg" ;;
  1101. ftp_password) is_password_format_valid "$arg" ;;
  1102. ftp_user) is_user_format_valid "$arg" "$arg_name" ;;
  1103. hash) is_hash_format_valid "$arg" "$arg_name" ;;
  1104. host) is_object_format_valid "$arg" "$arg_name" ;;
  1105. hour) is_cron_format_valid "$arg" $arg_name ;;
  1106. id) is_id_format_valid "$arg" 'id' ;;
  1107. iface) is_interface_format_valid "$arg" ;;
  1108. ip) is_ip_format_valid "$arg" ;;
  1109. ipv6) is_ipv6_format_valid "$arg" ;;
  1110. ip46) is_ip46_format_valid "$arg" ;;
  1111. ipv4_cidr) is_ipv4_cidr_format_valid "$arg" ;;
  1112. ipv6_cidr) is_ipv6_cidr_format_valid "$arg" ;;
  1113. ip_name) is_domain_format_valid "$arg" 'IP name' ;;
  1114. ip_status) is_ip_status_format_valid "$arg" ;;
  1115. job) is_int_format_valid "$arg" 'job' ;;
  1116. key) is_common_format_valid "$arg" "$arg_name" ;;
  1117. malias) is_localpart_format_valid "$arg" "$arg_name" '64' ;;
  1118. max_db) is_int_format_valid "$arg" 'max db' ;;
  1119. min) is_cron_format_valid "$arg" $arg_name ;;
  1120. month) is_cron_format_valid "$arg" $arg_name ;;
  1121. name) is_name_format_valid "$arg" "name" ;;
  1122. nat_ip) is_ip_format_valid "$arg" ;;
  1123. netmask) is_netmask_format_valid "$arg" 'netmask' ;;
  1124. newid) is_int_format_valid "$arg" 'id' ;;
  1125. ns1) is_domain_format_valid "$arg" 'ns1' ;;
  1126. ns2) is_domain_format_valid "$arg" 'ns2' ;;
  1127. ns3) is_domain_format_valid "$arg" 'ns3' ;;
  1128. ns4) is_domain_format_valid "$arg" 'ns4' ;;
  1129. ns5) is_domain_format_valid "$arg" 'ns5' ;;
  1130. ns6) is_domain_format_valid "$arg" 'ns6' ;;
  1131. ns7) is_domain_format_valid "$arg" 'ns7' ;;
  1132. ns8) is_domain_format_valid "$arg" 'ns8' ;;
  1133. object) is_object_name_format_valid "$arg" 'object' ;;
  1134. package) is_object_format_valid "$arg" "$arg_name" ;;
  1135. password) is_password_format_valid "$arg" ;;
  1136. priority) is_int_format_valid $arg ;;
  1137. port) is_int_format_valid "$arg" 'port' ;;
  1138. port_ext) is_fw_port_format_valid "$arg" ;;
  1139. protocol) is_fw_protocol_format_valid "$arg" ;;
  1140. proxy_ext) is_extention_format_valid "$arg" ;;
  1141. quota) is_int_format_valid "$arg" 'quota' ;;
  1142. rate) is_int_format_valid "$arg" 'rate' ;;
  1143. record) is_common_format_valid "$arg" 'record' ;;
  1144. reject) is_boolean_format_valid "$arg" 'reject' ;;
  1145. restart) is_restart_format_valid "$arg" 'restart' ;;
  1146. role) is_role_valid "$arg" 'role' ;;
  1147. rtype) is_dns_type_format_valid "$arg" ;;
  1148. rule) is_int_format_valid "$arg" "rule id" ;;
  1149. service) is_service_format_valid "$arg" "$arg_name" ;;
  1150. secret_access_key) is_secret_access_key_format_valid "$arg" "$arg_name" ;;
  1151. soa) is_domain_format_valid "$arg" 'SOA' ;;
  1152. #missing command: is_format_valid_shell
  1153. shell) is_format_valid_shell "$arg" ;;
  1154. ssl_dir) is_folder_exists "$arg" "$arg_name" ;;
  1155. stats_pass) is_password_format_valid "$arg" ;;
  1156. stats_user) is_user_format_valid "$arg" "$arg_name" ;;
  1157. template) is_object_format_valid "$arg" "$arg_name" ;;
  1158. theme) is_common_format_valid "$arg" "$arg_name" ;;
  1159. ttl) is_int_format_valid "$arg" 'ttl' ;;
  1160. user) is_user_format_valid "$arg" $arg_name ;;
  1161. wday) is_cron_format_valid "$arg" $arg_name ;;
  1162. value) is_common_format_valid "$arg" $arg_name ;;
  1163. esac
  1164. fi
  1165. done
  1166. }
  1167. is_folder_exists() {
  1168. if [ ! -d "$1" ]; then
  1169. check_result "$E_NOTEXIST" "folder $1 does not exist"
  1170. fi
  1171. }
  1172. is_command_valid_format() {
  1173. if [[ ! "$1" =~ ^v-[[:alnum:]][-|\.|_[:alnum:]]{0,64}[[:alnum:]]$ ]]; then
  1174. check_result "$E_INVALID" "Invalid command format"
  1175. fi
  1176. if [[ -n $(echo "$1" | grep -e '\-\-') ]]; then
  1177. check_result "$E_INVALID" "Invalid command format"
  1178. fi
  1179. }
  1180. # Check access_key_id name
  1181. # Don't work with legacy key format
  1182. is_access_key_id_format_valid() {
  1183. local hash="$1"
  1184. # ACCESS_KEY_ID format validation
  1185. if ! [[ "$hash" =~ ^[[:alnum:]]{20}$ ]]; then
  1186. check_result "$E_INVALID" "invalid $2 format :: $hash"
  1187. fi
  1188. }
  1189. # SECRET_ACCESS_KEY format validation
  1190. is_secret_access_key_format_valid() {
  1191. local hash="$1"
  1192. if ! [[ "$hash" =~ ^[[:alnum:]|_|\.|\+|/|\^|~|=|%|\-]{40}$ ]]; then
  1193. check_result "$E_INVALID" "invalid $2 format"
  1194. fi
  1195. }
  1196. # Checks if the secret belongs to the access key
  1197. check_access_key_secret() {
  1198. local access_key_id="$(basename "$1")"
  1199. local secret_access_key=$2
  1200. local -n key_user=$3
  1201. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1202. check_result "$E_PASSWORD" "Access key $access_key_id doesn't exist"
  1203. fi
  1204. if [[ -z "$secret_access_key" ]]; then
  1205. check_result "$E_PASSWORD" "Secret key not provided for key $access_key_id"
  1206. elif ! [[ "$secret_access_key" =~ ^[[:alnum:]|_|\.|\+|/|\^|~|=|%|\-]{40}$ ]]; then
  1207. check_result "$E_PASSWORD" "Invalid secret key for key $access_key_id"
  1208. else
  1209. SECRET_ACCESS_KEY=""
  1210. source_conf "$HESTIA/data/access-keys/${access_key_id}"
  1211. if [[ -z "$SECRET_ACCESS_KEY" || "$SECRET_ACCESS_KEY" != "$secret_access_key" ]]; then
  1212. check_result "$E_PASSWORD" "Invalid secret key for key $access_key_id"
  1213. fi
  1214. fi
  1215. key_user="$USER"
  1216. }
  1217. # Checks if the key belongs to the user
  1218. check_access_key_user() {
  1219. local access_key_id="$(basename "$1")"
  1220. local user=$2
  1221. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1222. check_result "$E_FORBIDEN" "Access key $access_key_id doesn't exist"
  1223. fi
  1224. if [[ -z "$user" ]]; then
  1225. check_result "$E_FORBIDEN" "User not provided"
  1226. else
  1227. USER=""
  1228. source_conf "$HESTIA/data/access-keys/${access_key_id}"
  1229. if [[ -z "$USER" || "$USER" != "$user" ]]; then
  1230. check_result "$E_FORBIDEN" "key $access_key_id does not belong to the user $user"
  1231. fi
  1232. fi
  1233. }
  1234. # Checks if the key is allowed to run the command
  1235. check_access_key_cmd() {
  1236. local access_key_id="$(basename "$1")"
  1237. local cmd=$2
  1238. local -n user_arg_position=$3
  1239. if [[ "$DEBUG_MODE" = "true" ]]; then
  1240. new_timestamp
  1241. echo "[$date:$time] $1 $2" >> /var/log/hestia/api.log
  1242. fi
  1243. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1244. check_result "$E_FORBIDEN" "Access key $access_key_id doesn't exist"
  1245. fi
  1246. if [[ -z "$cmd" ]]; then
  1247. check_result "$E_FORBIDEN" "Command not provided"
  1248. elif [[ "$cmd" = 'v-make-tmp-file' ]]; then
  1249. USER="" PERMISSIONS=""
  1250. source_conf "${HESTIA}/data/access-keys/${access_key_id}"
  1251. local allowed_commands
  1252. if [[ -n "$PERMISSIONS" ]]; then
  1253. allowed_commands="$(get_apis_commands "$PERMISSIONS")"
  1254. if [[ -z "$(echo ",${allowed_commands}," | grep ",${hst_command},")" ]]; then
  1255. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1256. fi
  1257. elif [[ -z "$PERMISSIONS" && "$USER" != "$ROOT_USER" ]]; then
  1258. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1259. fi
  1260. user_arg_position="0"
  1261. elif [[ ! -e "$BIN/$cmd" ]]; then
  1262. check_result "$E_FORBIDEN" "Command $cmd not found"
  1263. else
  1264. USER="" PERMISSIONS=""
  1265. source_conf "${HESTIA}/data/access-keys/${access_key_id}"
  1266. local allowed_commands
  1267. if [[ -n "$PERMISSIONS" ]]; then
  1268. allowed_commands="$(get_apis_commands "$PERMISSIONS")"
  1269. if [[ -z "$(echo ",${allowed_commands}," | grep ",${hst_command},")" ]]; then
  1270. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1271. fi
  1272. elif [[ -z "$PERMISSIONS" && "$USER" != "$ROOT_USER" ]]; then
  1273. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1274. fi
  1275. if [[ "$USER" == "$ROOT_USER" ]]; then
  1276. # Admin can run commands for any user
  1277. user_arg_position="0"
  1278. else
  1279. user_arg_position="$(search_command_arg_position "$hst_command" "USER")"
  1280. if ! [[ "$user_arg_position" =~ ^[0-9]+$ ]]; then
  1281. check_result "$E_FORBIDEN" "Command $hst_command not found"
  1282. fi
  1283. fi
  1284. fi
  1285. }
  1286. # Domain argument formatting
  1287. format_domain() {
  1288. if [[ "$domain" = *[![:ascii:]]* ]]; then
  1289. if [[ "$domain" =~ [[:upper:]] ]]; then
  1290. domain=$(echo "$domain" | sed 's/[[:upper:]].*/\L&/')
  1291. fi
  1292. else
  1293. if [[ "$domain" =~ [[:upper:]] ]]; then
  1294. domain=$(echo "$domain" | tr '[:upper:]' '[:lower:]')
  1295. fi
  1296. fi
  1297. if [[ "$domain" =~ ^www\..* ]]; then
  1298. domain=$(echo "$domain" | sed -e "s/^www.//")
  1299. fi
  1300. if [[ "$domain" =~ .*\.$ ]]; then
  1301. domain=$(echo "$domain" | sed -e "s/[.]*$//g")
  1302. fi
  1303. if [[ "$domain" =~ ^\. ]]; then
  1304. domain=$(echo "$domain" | sed -e "s/^[.]*//")
  1305. fi
  1306. # Remove white spaces
  1307. domain=$(echo $domain | sed 's/^[ \t]*//;s/[ \t]*$//')
  1308. }
  1309. format_domain_idn() {
  1310. if [ -z "$domain_idn" ]; then
  1311. domain_idn=$domain
  1312. fi
  1313. if [[ "$domain_idn" = *[![:ascii:]]* ]]; then
  1314. domain_idn=$(idn2 --quiet $domain_idn)
  1315. fi
  1316. }
  1317. format_aliases() {
  1318. if [ -n "$aliases" ] && [ "$aliases" != 'none' ]; then
  1319. aliases=$(echo $aliases | tr '[:upper:]' '[:lower:]' | tr ',' '\n')
  1320. aliases=$(echo "$aliases" | sed -e "s/\.$//" | sort -u)
  1321. aliases=$(echo "$aliases" | tr -s '.')
  1322. aliases=$(echo "$aliases" | sed -e "s/[.]*$//g")
  1323. aliases=$(echo "$aliases" | sed -e "s/^[.]*//")
  1324. aliases=$(echo "$aliases" | sed -e "/^$/d")
  1325. aliases=$(echo "$aliases" | tr '\n' ',' | sed -e "s/,$//")
  1326. fi
  1327. }
  1328. is_restart_format_valid() {
  1329. if [ -n "$1" ]; then
  1330. if [ "$1" != 'yes' ] && [ "$1" != 'no' ] && [ "$1" != 'ssl' ] && [ "$1" != 'reload' ] && [ "$1" != 'updatessl' ] && [ "$1" != "scheduled" ]; then
  1331. check_result "$E_INVALID" "invalid $2 format :: $1"
  1332. fi
  1333. fi
  1334. }
  1335. check_backup_conditions() {
  1336. # Checking load average
  1337. la=$(cat /proc/loadavg | cut -f 1 -d ' ' | cut -f 1 -d '.')
  1338. # i=0
  1339. while [ "$la" -ge "$BACKUP_LA_LIMIT" ]; do
  1340. echo -e "$(date "+%F %T") Load Average $la"
  1341. sleep 60
  1342. la=$(cat /proc/loadavg | cut -f 1 -d ' ' | cut -f 1 -d '.')
  1343. done
  1344. }
  1345. # Define download function
  1346. download_file() {
  1347. local url=$1
  1348. local destination=$2
  1349. local force=$3
  1350. # Default destination is the curent working directory
  1351. local dstopt=""
  1352. if [ -n "$(echo "$url" | grep -E "\.(gz|gzip|bz2|zip|xz)$")" ]; then
  1353. # When an archive file is downloaded it will be first saved localy
  1354. dstopt="--directory-prefix=$ARCHIVE_DIR"
  1355. local is_archive="true"
  1356. local filename="${url##*/}"
  1357. if [ -z "$filename" ]; then
  1358. echo >&2 "[!] No filename was found in url, exiting ($url)"
  1359. exit 1
  1360. fi
  1361. if [ -n "$force" ] && [ -f "$ARCHIVE_DIR/$filename" ]; then
  1362. rm -f $ARCHIVE_DIR/$filename
  1363. fi
  1364. elif [ -n "$destination" ]; then
  1365. # Plain files will be written to specified location
  1366. dstopt="-O $destination"
  1367. fi
  1368. # check for corrupted archive
  1369. if [ -f "$ARCHIVE_DIR/$filename" ] && [ "$is_archive" = "true" ]; then
  1370. tar -tzf "$ARCHIVE_DIR/$filename" > /dev/null 2>&1
  1371. if [ $? -ne 0 ]; then
  1372. echo >&2 "[!] Archive $ARCHIVE_DIR/$filename is corrupted, redownloading"
  1373. rm -f $ARCHIVE_DIR/$filename
  1374. fi
  1375. fi
  1376. if [ ! -f "$ARCHIVE_DIR/$filename" ]; then
  1377. wget $url -q $dstopt --show-progress --progress=bar:force --limit-rate=3m
  1378. fi
  1379. if [ -n "$destination" ] && [ "$is_archive" = "true" ]; then
  1380. if [ "$destination" = "-" ]; then
  1381. cat "$ARCHIVE_DIR/$filename"
  1382. elif [ -d "$(dirname $destination)" ]; then
  1383. cp "$ARCHIVE_DIR/$filename" "$destination"
  1384. fi
  1385. fi
  1386. }
  1387. check_hestia_demo_mode() {
  1388. demo_mode=$(grep DEMO_MODE /usr/local/hestia/conf/hestia.conf | cut -d '=' -f2 | sed "s|'||g")
  1389. if [ -n "$demo_mode" ] && [ "$demo_mode" = "yes" ]; then
  1390. echo "ERROR: Unable to perform operation due to security restrictions that are in place."
  1391. exit 1
  1392. fi
  1393. }
  1394. multiphp_count() {
  1395. $BIN/v-list-sys-php plain | wc -l
  1396. }
  1397. multiphp_versions() {
  1398. local -a php_versions_list
  1399. local php_ver
  1400. if [ "$(multiphp_count)" -gt 0 ]; then
  1401. for php_ver in $($BIN/v-list-sys-php plain); do
  1402. [ ! -d "/etc/php/$php_ver/fpm/pool.d/" ] && continue
  1403. php_versions_list+=($php_ver)
  1404. done
  1405. echo "${php_versions_list[@]}"
  1406. fi
  1407. }
  1408. multiphp_default_version() {
  1409. # Get system wide default php version (set by update-alternatives)
  1410. local sys_phpversion=$(php -r "echo substr(phpversion(),0,3);")
  1411. # Check if the system php also has php-fpm enabled, otherwise return
  1412. # the most recent php version which does have it installed.
  1413. if [ ! -d "/etc/php/$sys_phpversion/fpm/pool.d/" ]; then
  1414. local all_versions="$(multiphp_versions)"
  1415. if [ -n "$all_versions" ]; then
  1416. sys_phpversion="${all_versions##*\ }"
  1417. fi
  1418. fi
  1419. echo "$sys_phpversion"
  1420. }
  1421. is_hestia_package() {
  1422. check=false
  1423. for pkg in $1; do
  1424. if [ "$pkg" == "$2" ]; then
  1425. check="true"
  1426. fi
  1427. done
  1428. if [ "$check" != "true" ]; then
  1429. check_result $E_INVALID "$2 package is not controlled by hestiacp"
  1430. fi
  1431. }
  1432. # Run arbitrary cli commands with dropped privileges
  1433. # Note: setpriv --init-groups is not available on debian9 (util-linux 2.29.2)
  1434. # Input:
  1435. # - $user : Vaild hestia user
  1436. user_exec() {
  1437. is_object_valid 'user' 'USER' "$user"
  1438. local user_groups=$(id -G "$user")
  1439. user_groups=${user_groups//\ /,}
  1440. setpriv --groups "$user_groups" --reuid "$user" --regid "$user" -- "${@}"
  1441. }
  1442. # Simple chmod wrapper that skips symlink files after glob expand
  1443. no_symlink_chmod() {
  1444. local filemode=$1
  1445. shift
  1446. for i in "$@"; do
  1447. [[ -L ${i} ]] && continue
  1448. chmod "${filemode}" "${i}"
  1449. done
  1450. }
  1451. format_no_quotes() {
  1452. exclude="['|\"]"
  1453. if [[ "$1" =~ $exclude ]]; then
  1454. check_result "$E_INVALID" "Invalid $2 contains qoutes (\" or ' or | ) :: $1"
  1455. fi
  1456. is_no_new_line_format "$1"
  1457. }
  1458. is_username_format_valid() {
  1459. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.[A-Za-z]{2,63}$ ]]; then
  1460. is_string_format_valid "$1" "$2"
  1461. fi
  1462. }
  1463. change_sys_value() {
  1464. check_ckey=$(grep "^$1='" "$HESTIA/conf/hestia.conf")
  1465. if [ -z "$check_ckey" ]; then
  1466. echo "$1='$2'" >> "$HESTIA/conf/hestia.conf"
  1467. else
  1468. sed -i "s|^$1=.*|$1='$2'|g" "$HESTIA/conf/hestia.conf"
  1469. fi
  1470. }
  1471. # Checks the format of APIs that will be allowed for the key
  1472. is_key_permissions_format_valid() {
  1473. local permissions="$1"
  1474. local user="$2"
  1475. if [[ "$user" != "$ROOT_USER" && -z "$permissions" ]]; then
  1476. check_result "$E_INVALID" "Non-admin users need a permission list"
  1477. fi
  1478. while IFS=',' read -ra permissions_arr; do
  1479. for permission in "${permissions_arr[@]}"; do
  1480. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1481. # if [[ -z "$(echo "$permission" | grep -E "^v-")" ]]; then
  1482. if [[ ! -e "$HESTIA/data/api/$permission" ]]; then
  1483. check_result "$E_NOTEXIST" "API $permission doesn't exist"
  1484. fi
  1485. source_conf "$HESTIA/data/api/$permission"
  1486. if [ "$ROLE" = "admin" ] && [ "$user" != "$ROOT_USER" ]; then
  1487. check_result "$E_INVALID" "Only the admin can run this API"
  1488. fi
  1489. # elif [[ ! -e "$BIN/$permission" ]]; then
  1490. # check_result "$E_NOTEXIST" "Command $permission doesn't exist"
  1491. # fi
  1492. done
  1493. done <<< "$permissions"
  1494. }
  1495. # Remove whitespaces, and bin path from commands
  1496. cleanup_key_permissions() {
  1497. local permissions="$1"
  1498. local final quote
  1499. while IFS=',' read -ra permissions_arr; do
  1500. for permission in "${permissions_arr[@]}"; do
  1501. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1502. # Avoid duplicate items
  1503. if [[ -z "$(echo ",${final}," | grep ",${permission},")" ]]; then
  1504. final+="${quote}${permission}"
  1505. quote=','
  1506. fi
  1507. done
  1508. done <<< "$permissions"
  1509. echo "$final"
  1510. }
  1511. # Extract all allowed commands from a permission list
  1512. get_apis_commands() {
  1513. local permissions="$1"
  1514. local allowed_commands quote commands_to_add
  1515. while IFS=',' read -ra permissions_arr; do
  1516. for permission in "${permissions_arr[@]}"; do
  1517. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1518. commands_to_add=""
  1519. # if [[ -n "$(echo "$permission" | grep -E "^v-")" ]]; then
  1520. # commands_to_add="$permission"
  1521. # el
  1522. if [[ -e "$HESTIA/data/api/$permission" ]]; then
  1523. source_conf "$HESTIA/data/api/$permission"
  1524. commands_to_add="$COMMANDS"
  1525. fi
  1526. if [[ -n "$commands_to_add" ]]; then
  1527. allowed_commands+="${quote}${commands_to_add}"
  1528. quote=','
  1529. fi
  1530. done
  1531. done <<< "$permissions"
  1532. cleanup_key_permissions "$allowed_commands"
  1533. }
  1534. # Get the position of an argument by name in a hestia command using the command's documentation comment.
  1535. #
  1536. # Return:
  1537. # * 0: It doesn't have the argument;
  1538. # * 1-9: The position of the argument in the command.
  1539. search_command_arg_position() {
  1540. local hst_command="$(basename "$1")"
  1541. local arg_name="$2"
  1542. local command_path="$BIN/$hst_command"
  1543. if [[ -z "$hst_command" || ! -e "$command_path" ]]; then
  1544. echo "-1"
  1545. return
  1546. fi
  1547. local position=0
  1548. local count=0
  1549. local command_options="$(sed -En 's/^# options: (.+)/\1/p' "$command_path")"
  1550. while IFS=' ' read -ra options_arr; do
  1551. for option in "${options_arr[@]}"; do
  1552. count=$((count + 1))
  1553. option_name="$(echo " $option " | sed -E 's/^(\s|\[)*|(\s|\])*$//g')"
  1554. if [[ "${option_name^^}" == "$arg_name" ]]; then
  1555. position=$count
  1556. fi
  1557. done
  1558. done <<< "$command_options"
  1559. echo "$position"
  1560. }
  1561. add_chroot_jail() {
  1562. local user=$1
  1563. mkdir -p /srv/jail/$user
  1564. chown 0:0 /srv /srv/jail /srv/jail/$user
  1565. chmod 755 /srv /srv/jail /srv/jail/$user
  1566. if [ ! -d /srv/jail/$user/home ]; then
  1567. mkdir -p /srv/jail/$user/home
  1568. chown 0:0 /srv/jail/$user/home
  1569. chmod 755 /srv/jail/$user/home
  1570. fi
  1571. if [ ! -d /srv/jail/$user/home/$user ]; then
  1572. mkdir -p /srv/jail/$user/home/$user
  1573. chown 0:0 /srv/jail/$user/home/$user
  1574. chmod 755 /srv/jail/$user/home/$user
  1575. fi
  1576. systemd=$(systemd-escape -p --suffix=mount "/srv/jail/$user/home/$user")
  1577. cat > "/etc/systemd/system/$systemd" << EOF
  1578. [Unit]
  1579. Description=Mount $user's home directory to the jail chroot
  1580. Before=local-fs.target
  1581. [Mount]
  1582. What=$(getent passwd $user | cut -d : -f 6)
  1583. Where=/srv/jail/$user/home/$user
  1584. Type=none
  1585. Options=bind
  1586. LazyUnmount=yes
  1587. [Install]
  1588. RequiredBy=local-fs.target
  1589. EOF
  1590. systemctl daemon-reload > /dev/null 2>&1
  1591. systemctl enable "$systemd" > /dev/null 2>&1
  1592. systemctl start "$systemd" > /dev/null 2>&1
  1593. }
  1594. delete_chroot_jail() {
  1595. local user=$1
  1596. # Backwards compatibility with old style home jail
  1597. systemd=$(systemd-escape -p --suffix=mount "/srv/jail/$user/home")
  1598. systemctl stop "$systemd" > /dev/null 2>&1
  1599. systemctl disable "$systemd" > /dev/null 2>&1
  1600. rm -f "/etc/systemd/system/$systemd"
  1601. # Remove the new style home jail
  1602. systemd=$(systemd-escape -p --suffix=mount "/srv/jail/$user/home/$user")
  1603. systemctl stop "$systemd" > /dev/null 2>&1
  1604. systemctl disable "$systemd" > /dev/null 2>&1
  1605. rm -f "/etc/systemd/system/$systemd"
  1606. systemctl daemon-reload > /dev/null 2>&1
  1607. rm -r /srv/jail/$user/ > /dev/null 2>&1
  1608. rmdir /srv/jail/$user > /dev/null 2>&1
  1609. }