main.sh 53 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683
  1. #!/usr/bin/env bash
  2. #===========================================================================#
  3. # #
  4. # Hestia Control Panel - Core Function Library #
  5. # #
  6. #===========================================================================#
  7. # Internal variables
  8. HOMEDIR='/home'
  9. BACKUP='/backup'
  10. BACKUP_GZIP=9
  11. BACKUP_DISK_LIMIT=95
  12. BACKUP_LA_LIMIT=`cat /proc/cpuinfo | grep processor | wc -l`
  13. RRD_STEP=300
  14. BIN=$HESTIA/bin
  15. HESTIA_INSTALL_DIR="$HESTIA/install/deb"
  16. HESTIA_COMMON_DIR="$HESTIA/install/common"
  17. HESTIA_BACKUP="/root/hst_backups/$(date +%d%m%Y%H%M)"
  18. USER_DATA=$HESTIA/data/users/$user
  19. WEBTPL=$HESTIA/data/templates/web
  20. MAILTPL=$HESTIA/data/templates/mail
  21. DNSTPL=$HESTIA/data/templates/dns
  22. RRD=$HESTIA/web/rrd
  23. SENDMAIL="$HESTIA/web/inc/mail-wrapper.php"
  24. HESTIA_GIT_REPO="https://raw.githubusercontent.com/hestiacp/hestiacp"
  25. HESTIA_THEMES="$HESTIA/web/css/themes"
  26. HESTIA_THEMES_CUSTOM="$HESTIA/web/css/themes/custom"
  27. SCRIPT="$(basename $0)"
  28. CHECK_RESULT_CALLBACK=""
  29. # Return codes
  30. OK=0
  31. E_ARGS=1
  32. E_INVALID=2
  33. E_NOTEXIST=3
  34. E_EXISTS=4
  35. E_SUSPENDED=5
  36. E_UNSUSPENDED=6
  37. E_INUSE=7
  38. E_LIMIT=8
  39. E_PASSWORD=9
  40. E_FORBIDEN=10
  41. E_DISABLED=11
  42. E_PARSING=12
  43. E_DISK=13
  44. E_LA=14
  45. E_CONNECT=15
  46. E_FTP=16
  47. E_DB=17
  48. E_RRD=18
  49. E_UPDATE=19
  50. E_RESTART=20
  51. # Detect operating system
  52. detect_os() {
  53. if [ -e "/etc/os-release" ]; then
  54. get_os_type=$(grep "^ID=" /etc/os-release | cut -f 2 -d '=')
  55. if [ "$get_os_type" = "ubuntu" ]; then
  56. if [ -e '/usr/bin/lsb_release' ]; then
  57. OS_VERSION="$(lsb_release -s -r)"
  58. OS_TYPE='Ubuntu'
  59. fi
  60. elif [ "$get_os_type" = "debian" ]; then
  61. OS_TYPE='Debian'
  62. OS_VERSION=$(cat /etc/debian_version|grep -o "[0-9]\{1,2\}"|head -n1)
  63. fi
  64. else
  65. OS_TYPE="Unsupported OS"
  66. OS_VERSION="Unknown"
  67. fi
  68. }
  69. # Generate time stamp
  70. new_timestamp() {
  71. time_n_date=$(date +'%T %F')
  72. time=$(echo "$time_n_date" |cut -f 1 -d \ )
  73. date=$(echo "$time_n_date" |cut -f 2 -d \ )
  74. }
  75. # Event string for logger
  76. ARGS=("$@")
  77. for ((I=1; I <= $# ; I++)); do
  78. if [[ "$HIDE" != "$I" ]]; then
  79. ARGUMENTS="$ARGUMENTS '${ARGS[${I}-1]}'"
  80. else
  81. ARGUMENTS="$ARGUMENTS '******'"
  82. fi
  83. done
  84. # Log event function
  85. log_event() {
  86. if [ -z "$time" ]; then
  87. LOG_TIME="$(date +'%F %T') $(basename $0)"
  88. else
  89. LOG_TIME="$date $time $(basename $0)"
  90. fi
  91. if [ "$1" -eq 0 ]; then
  92. echo "$LOG_TIME $2" >> $HESTIA/log/system.log
  93. else
  94. echo "$LOG_TIME $2 [Error $1]" >> $HESTIA/log/error.log
  95. fi
  96. }
  97. # Log user history
  98. log_history() {
  99. message=${1//\'/\´} # Avoid single quotes broken the log
  100. evt_level=${2:-$event_level}
  101. log_user=${3-$user}
  102. evt_category=${4:-$event_category}
  103. # Set default event level and category if not specified
  104. if [ -z "$evt_level" ]; then
  105. evt_level="Info"
  106. fi
  107. if [ -z "$evt_category" ]; then
  108. evt_category="System"
  109. fi
  110. # Log system events to system log file
  111. if [ "$log_user" = "system" ]; then
  112. log=$HESTIA/data/users/admin/system.log
  113. else
  114. if ! $BIN/v-list-user "$log_user" >/dev/null; then
  115. return $E_NOTEXIST
  116. fi
  117. log=$HESTIA/data/users/$log_user/history.log
  118. fi
  119. touch $log
  120. # TODO: Improve log pruning and pagination
  121. #
  122. #if [ '1000' -lt "$(wc -l $log |cut -f 1 -d ' ')" ]; then
  123. # tail -n 499 $log > $log.moved
  124. # mv -f $log.moved $log
  125. # chmod 660 $log
  126. #fi
  127. if [ -z "$date" ]; then
  128. time_n_date=$(date +'%T %F')
  129. time=$(echo "$time_n_date" |cut -f 1 -d \ )
  130. date=$(echo "$time_n_date" |cut -f 2 -d \ )
  131. fi
  132. curr_str=$(grep "ID=" $log | cut -f 2 -d \' | sort -n | tail -n1)
  133. id="$((curr_str +1))"
  134. echo "ID='$id' DATE='$date' TIME='$time' LEVEL='$evt_level' CATEGORY='$evt_category' MESSAGE='$message'" >> $log
  135. }
  136. # Result checker
  137. check_result() {
  138. if [ $1 -ne 0 ]; then
  139. local err_code="${3:-$1}"
  140. if [[ -n "$CHECK_RESULT_CALLBACK" && "$(type -t "$CHECK_RESULT_CALLBACK")" == 'function' ]]; then
  141. $CHECK_RESULT_CALLBACK "$err_code" "$2"
  142. else
  143. echo "Error: $2"
  144. log_event "$err_code" "$ARGUMENTS"
  145. fi
  146. exit $err_code
  147. fi
  148. }
  149. # Argument list checker
  150. check_args() {
  151. if [ "$1" -gt "$2" ]; then
  152. echo "Usage: $(basename $0) $3"
  153. check_result "$E_ARGS" "not enought arguments" >/dev/null
  154. fi
  155. }
  156. # Subsystem checker
  157. is_system_enabled() {
  158. if [ -z "$1" ] || [ "$1" = no ]; then
  159. check_result "$E_DISABLED" "$2 is not enabled"
  160. fi
  161. }
  162. # User package check
  163. is_package_full() {
  164. case "$1" in
  165. WEB_DOMAINS) used=$(wc -l $USER_DATA/web.conf);;
  166. WEB_ALIASES) used=$(echo $aliases |tr ',' '\n' |wc -l);;
  167. DNS_DOMAINS) used=$(wc -l $USER_DATA/dns.conf);;
  168. DNS_RECORDS) used=$(wc -l $USER_DATA/dns/$domain.conf);;
  169. MAIL_DOMAINS) used=$(wc -l $USER_DATA/mail.conf);;
  170. MAIL_ACCOUNTS) used=$(wc -l $USER_DATA/mail/$domain.conf);;
  171. DATABASES) used=$(wc -l $USER_DATA/db.conf);;
  172. CRON_JOBS) used=$(wc -l $USER_DATA/cron.conf);;
  173. esac
  174. used=$(echo "$used"| cut -f 1 -d \ )
  175. limit=$(grep "^$1=" $USER_DATA/user.conf |cut -f 2 -d \')
  176. if [ "$1" = WEB_ALIASES ]; then
  177. # Used is always calculated with the new alias added
  178. if [ "$limit" != 'unlimited' ] && [[ "$used" -gt "$limit" ]]; then
  179. check_result "$E_LIMIT" "$1 limit is reached :: upgrade user package"
  180. fi
  181. else
  182. if [ "$limit" != 'unlimited' ] && [[ "$used" -ge "$limit" ]]; then
  183. check_result "$E_LIMIT" "$1 limit is reached :: upgrade user package"
  184. fi
  185. fi
  186. }
  187. # User owner for reseller plugin
  188. get_user_owner() {
  189. if [ -z "$RESELLER_KEY" ]; then
  190. owner='admin'
  191. else
  192. owner=$(grep "^OWNER" $USER_DATA/user.conf| cut -f 2 -d \')
  193. if [ -z "$owner" ]; then
  194. owner='admin'
  195. fi
  196. fi
  197. }
  198. # Random password generator
  199. generate_password() {
  200. matrix=$1
  201. length=$2
  202. if [ -z "$matrix" ]; then
  203. matrix="A-Za-z0-9"
  204. fi
  205. if [ -z "$length" ]; then
  206. length=16
  207. fi
  208. head /dev/urandom | tr -dc $matrix | head -c$length
  209. }
  210. # Package existence check
  211. is_package_valid() {
  212. if [ -z $1 ]; then
  213. if [ ! -e "$HESTIA/data/packages/$package.pkg" ]; then
  214. check_result "$E_NOTEXIST" "package $package doesn't exist"
  215. fi
  216. else
  217. if [ ! -e "$HESTIA/data/packages/$1.pkg" ]; then
  218. check_result "$E_NOTEXIST" "package $1 doesn't exist"
  219. fi
  220. fi
  221. }
  222. is_package_new() {
  223. if [ -e "$HESTIA/data/packages/$1.pkg" ]; then
  224. echo "Error: package $1 already exists."
  225. log_event "$E_EXISTS" "$ARGUMENTS"
  226. exit "$E_EXISTS"
  227. fi
  228. }
  229. # Validate system type
  230. is_type_valid() {
  231. if [ -z "$(echo $1 | grep -w $2)" ]; then
  232. check_result "$E_INVALID" "$2 type is invalid"
  233. fi
  234. }
  235. # Check user backup settings
  236. is_backup_enabled() {
  237. BACKUPS=$(grep "^BACKUPS=" $USER_DATA/user.conf | cut -f2 -d \')
  238. if [ -z "$BACKUPS" ] || [[ "$BACKUPS" -le '0' ]]; then
  239. check_result "$E_DISABLED" "user backup is disabled"
  240. fi
  241. }
  242. # Check user backup settings
  243. is_backup_scheduled() {
  244. if [ -e "$HESTIA/data/queue/backup.pipe" ]; then
  245. check_q=$(grep " $user " $HESTIA/data/queue/backup.pipe | grep $1)
  246. if [ -n "$check_q" ]; then
  247. check_result "$E_EXISTS" "$1 is already scheduled"
  248. fi
  249. fi
  250. }
  251. # Check if object is new
  252. is_object_new() {
  253. if [ $2 = 'USER' ]; then
  254. if [ -d "$USER_DATA" ]; then
  255. object="OK"
  256. fi
  257. else
  258. object=$(grep "$2='$3'" $USER_DATA/$1.conf)
  259. fi
  260. if [ -n "$object" ]; then
  261. check_result "$E_EXISTS" "$2=$3 already exists"
  262. fi
  263. }
  264. # Check if object is valid
  265. is_object_valid() {
  266. if [ $2 = 'USER' ]; then
  267. tstpath="$(readlink -f "$HESTIA/data/users/$3")"
  268. if [ "$(dirname "$tstpath")" != "$(readlink -f "$HESTIA/data/users")" ] || [ ! -d "$HESTIA/data/users/$3" ]; then
  269. check_result "$E_NOTEXIST" "$1 $3 doesn't exist"
  270. fi
  271. elif [ $2 = 'KEY' ]; then
  272. local key="$(basename "$3")"
  273. if [[ -z "$key" || ${#key} -lt 16 ]] || [[ ! -f "$HESTIA/data/access-keys/${key}" && ! -f "$HESTIA/data/access-keys/$key" ]]; then
  274. check_result "$E_NOTEXIST" "$1 $3 doesn't exist"
  275. fi
  276. else
  277. object=$(grep "$2='$3'" $HESTIA/data/users/$user/$1.conf)
  278. if [ -z "$object" ]; then
  279. arg1=$(basename $1)
  280. arg2=$(echo $2 |tr '[:upper:]' '[:lower:]')
  281. check_result "$E_NOTEXIST" "$arg1 $arg2 $3 doesn't exist"
  282. fi
  283. fi
  284. }
  285. # Check if a object string with key values pairs has the correct format and load it afterwards
  286. parse_object_kv_list_non_eval() {
  287. local str
  288. local objkv obj_key obj_val
  289. local OLD_IFS="$IFS"
  290. str=${@//$'\n'/ }
  291. str=${str//\"/\\\"}
  292. str=${str//$/\\$}
  293. IFS=$'\n'
  294. # Extract and loop trough each key-value pair. (Regex test: https://regex101.com/r/eiMufk/5)
  295. for objkv in $( echo "$str" | perl -n -e "while(/\b([a-zA-Z]+[\w]*)='(.*?)'(\s|\$)/g) {print \$1.'='.\$2 . \"\n\" }" ); do
  296. if ! [[ "$objkv" =~ ^([[:alnum:]][_[:alnum:]]{0,64}[[:alnum:]])=(\'?[^\']+?\'?)?$ ]]; then
  297. check_result "$E_INVALID" "Invalid key value format [$objkv]"
  298. fi
  299. obj_key=${objkv%%=*} # strip everything after first '=' char
  300. obj_val=${objkv#*=} # strip everything before first '=' char
  301. declare -g $obj_key="$obj_val"
  302. done
  303. IFS="$OLD_IFS"
  304. }
  305. # Check if a object string with key values pairs has the correct format and load it afterwards
  306. parse_object_kv_list() {
  307. local str
  308. local objkv
  309. local suboutput
  310. local OLD_IFS="$IFS"
  311. str=${@//$'\n'/ }
  312. str=${str//\"/\\\"}
  313. str=${str//$/\\$}
  314. IFS=$'\n'
  315. suboutput=$(setpriv --clear-groups --reuid nobody --regid nogroup bash -c "PS4=''; set -xe; eval \"${str}\"" 2>&1)
  316. check_result $? "Invalid object format: ${str}" $E_INVALID
  317. for objkv in $suboutput; do
  318. if [[ "$objkv" =~ ^'eval ' ]]; then
  319. continue
  320. fi
  321. if ! [[ "$objkv" =~ ^([[:alnum:]][_[:alnum:]]{0,64}[[:alnum:]])=(\'?[^\']+?\'?)?$ ]]; then
  322. check_result "$E_INVALID" "Invalid key value format [$objkv]"
  323. fi
  324. eval "$objkv"
  325. done
  326. IFS="$OLD_IFS"
  327. }
  328. # Check if object is supended
  329. is_object_suspended() {
  330. if [ $2 = 'USER' ]; then
  331. spnd=$(cat $USER_DATA/$1.conf|grep "SUSPENDED='yes'")
  332. else
  333. spnd=$(grep "$2='$3'" $USER_DATA/$1.conf|grep "SUSPENDED='yes'")
  334. fi
  335. if [ -z "$spnd" ]; then
  336. check_result "$E_UNSUSPENDED" "$(basename $1) $3 is not suspended"
  337. fi
  338. }
  339. # Check if object is unsupended
  340. is_object_unsuspended() {
  341. if [ $2 = 'USER' ]; then
  342. spnd=$(cat $USER_DATA/$1.conf |grep "SUSPENDED='yes'")
  343. else
  344. spnd=$(grep "$2='$3'" $USER_DATA/$1.conf |grep "SUSPENDED='yes'")
  345. fi
  346. if [ -n "$spnd" ]; then
  347. check_result "$E_SUSPENDED" "$(basename $1) $3 is suspended"
  348. fi
  349. }
  350. # Check if object value is empty
  351. is_object_value_empty() {
  352. str=$(grep "$2='$3'" $USER_DATA/$1.conf)
  353. parse_object_kv_list "$str"
  354. eval value=$4
  355. if [ -n "$value" ] && [ "$value" != 'no' ]; then
  356. check_result "$E_EXISTS" "${4//$}=$value already exists"
  357. fi
  358. }
  359. # Check if object value is empty
  360. is_object_value_exist() {
  361. str=$(grep "$2='$3'" $USER_DATA/$1.conf)
  362. parse_object_kv_list "$str"
  363. eval value=$4
  364. if [ -z "$value" ] || [ "$value" = 'no' ]; then
  365. check_result "$E_NOTEXIST" "${4//$}=$value doesn't exist"
  366. fi
  367. }
  368. # Check if password is transmitted via file
  369. is_password_valid() {
  370. if [[ "$password" =~ ^/tmp/ ]]; then
  371. if ! [[ "$password" == *../* ]]; then
  372. if [ -f "$password" ]; then
  373. password="$(head -n1 $password)"
  374. fi
  375. fi
  376. fi
  377. }
  378. # Check if hash is transmitted via file
  379. is_hash_valid() {
  380. if [[ "$hash" =~ ^/tmp/ ]]; then
  381. if ! [[ "$hash" == *../* ]]; then
  382. if [ -f "$hash" ]; then
  383. hash="$(head -n1 $hash)"
  384. fi
  385. fi
  386. fi
  387. }
  388. # Check if directory is a symlink
  389. is_dir_symlink() {
  390. if [[ -L "$1" ]]; then
  391. check_result "$E_FORBIDEN" "$1 directory is a symlink"
  392. fi
  393. }
  394. # Get object value
  395. get_object_value() {
  396. object=$(grep "$2='$3'" $USER_DATA/$1.conf)
  397. parse_object_kv_list "$object"
  398. eval echo $4
  399. }
  400. get_object_values() {
  401. parse_object_kv_list $(grep "$2='$3'" $USER_DATA/$1.conf)
  402. }
  403. # Update object value
  404. update_object_value() {
  405. row=$(grep -nF "$2='$3'" $USER_DATA/$1.conf)
  406. lnr=$(echo $row | cut -f 1 -d ':')
  407. object=$(echo $row | sed "s/^$lnr://")
  408. parse_object_kv_list "$object"
  409. eval old="$4"
  410. old=$(echo "$old" | sed -e 's/\\/\\\\/g' -e 's/&/\\&/g' -e 's/\//\\\//g')
  411. new=$(echo "$5" | sed -e 's/\\/\\\\/g' -e 's/&/\\&/g' -e 's/\//\\\//g')
  412. sed -i "$lnr s/${4//$/}='${old//\*/\\*}'/${4//$/}='${new//\*/\\*}'/g" \
  413. $USER_DATA/$1.conf
  414. }
  415. # Add object key
  416. add_object_key() {
  417. row=$(grep -n "$2='$3'" $USER_DATA/$1.conf)
  418. lnr=$(echo $row | cut -f 1 -d ':')
  419. object=$(echo $row | sed "s/^$lnr://")
  420. if [ -z "$(echo $object |grep $4=)" ]; then
  421. eval old="$4"
  422. sed -i "$lnr s/$5='/$4='' $5='/" $USER_DATA/$1.conf
  423. fi
  424. }
  425. # Search objects
  426. search_objects() {
  427. OLD_IFS="$IFS"
  428. IFS=$'\n'
  429. for line in $(grep $2=\'$3\' $USER_DATA/$1.conf); do
  430. parse_object_kv_list "$line"
  431. eval echo \$$4
  432. done
  433. IFS="$OLD_IFS"
  434. }
  435. # Get user value
  436. get_user_value() {
  437. grep "^${1//$/}=" $USER_DATA/user.conf | head -1 | awk -F "'" '{print $2}'
  438. }
  439. # Update user value in user.conf
  440. update_user_value() {
  441. key="${2//$}"
  442. lnr=$(grep -n "^$key='" $HESTIA/data/users/$1/user.conf |cut -f 1 -d ':')
  443. if [ -n "$lnr" ]; then
  444. sed -i "$lnr d" $HESTIA/data/users/$1/user.conf
  445. sed -i "$lnr i\\$key='${3}'" $HESTIA/data/users/$1/user.conf
  446. fi
  447. }
  448. # Increase user counter
  449. increase_user_value() {
  450. key="${2//$}"
  451. factor="${3-1}"
  452. conf="$HESTIA/data/users/$1/user.conf"
  453. old=$(grep "$key=" $conf | cut -f 2 -d \')
  454. if [ -z "$old" ]; then
  455. old=0
  456. fi
  457. new=$((old + factor))
  458. sed -i "s/$key='$old'/$key='$new'/g" $conf
  459. }
  460. # Decrease user counter
  461. decrease_user_value() {
  462. key="${2//$}"
  463. factor="${3-1}"
  464. conf="$HESTIA/data/users/$1/user.conf"
  465. old=$(grep "$key=" $conf | cut -f 2 -d \')
  466. if [ -z "$old" ]; then
  467. old=0
  468. fi
  469. if [ "$old" -le 1 ]; then
  470. new=0
  471. else
  472. new=$((old - factor))
  473. fi
  474. if [ "$new" -lt 0 ]; then
  475. new=0
  476. fi
  477. sed -i "s/$key='$old'/$key='$new'/g" $conf
  478. }
  479. # Notify user
  480. send_notice() {
  481. topic=$1
  482. notice=$2
  483. if [ "$notify" = 'yes' ]; then
  484. touch $USER_DATA/notifications.conf
  485. chmod 660 $USER_DATA/notifications.conf
  486. time_n_date=$(date +'%T %F')
  487. time=$(echo "$time_n_date" |cut -f 1 -d \ )
  488. date=$(echo "$time_n_date" |cut -f 2 -d \ )
  489. nid=$(grep "NID=" $USER_DATA/notifications.conf |cut -f 2 -d \')
  490. nid=$(echo "$nid" |sort -n |tail -n1)
  491. if [ -n "$nid" ]; then
  492. nid="$((nid +1))"
  493. else
  494. nid=1
  495. fi
  496. str="NID='$nid' TOPIC='$topic' NOTICE='$notice' TYPE='$type'"
  497. str="$str ACK='no' TIME='$time' DATE='$date'"
  498. echo "$str" >> $USER_DATA/notifications.conf
  499. if [ -z "$(grep NOTIFICATIONS $USER_DATA/user.conf)" ]; then
  500. sed -i "s/^TIME/NOTIFICATIONS='yes'\nTIME/g" $USER_DATA/user.conf
  501. else
  502. update_user_value "$user" '$NOTIFICATIONS' "yes"
  503. fi
  504. fi
  505. }
  506. # Recalculate U_DISK value
  507. recalc_user_disk_usage() {
  508. u_usage=0
  509. if [ -f "$USER_DATA/web.conf" ]; then
  510. usage=0
  511. dusage=$(grep 'U_DISK=' $USER_DATA/web.conf |\
  512. awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  513. for disk_usage in $dusage; do
  514. usage=$((usage + disk_usage))
  515. done
  516. d=$(grep "U_DISK_WEB='" $USER_DATA/user.conf | cut -f 2 -d \')
  517. sed -i "s/U_DISK_WEB='$d'/U_DISK_WEB='$usage'/g" $USER_DATA/user.conf
  518. u_usage=$((u_usage + usage))
  519. fi
  520. if [ -f "$USER_DATA/mail.conf" ]; then
  521. usage=0
  522. dusage=$(grep 'U_DISK=' $USER_DATA/mail.conf |\
  523. awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  524. for disk_usage in $dusage; do
  525. usage=$((usage + disk_usage))
  526. done
  527. d=$(grep "U_DISK_MAIL='" $USER_DATA/user.conf | cut -f 2 -d \')
  528. sed -i "s/U_DISK_MAIL='$d'/U_DISK_MAIL='$usage'/g" $USER_DATA/user.conf
  529. u_usage=$((u_usage + usage))
  530. fi
  531. if [ -f "$USER_DATA/db.conf" ]; then
  532. usage=0
  533. dusage=$(grep 'U_DISK=' $USER_DATA/db.conf |\
  534. awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  535. for disk_usage in $dusage; do
  536. usage=$((usage + disk_usage))
  537. done
  538. d=$(grep "U_DISK_DB='" $USER_DATA/user.conf | cut -f 2 -d \')
  539. sed -i "s/U_DISK_DB='$d'/U_DISK_DB='$usage'/g" $USER_DATA/user.conf
  540. u_usage=$((u_usage + usage))
  541. fi
  542. usage=$(grep 'U_DISK_DIRS=' $USER_DATA/user.conf | cut -f 2 -d "'")
  543. u_usage=$((u_usage + usage))
  544. old=$(grep "U_DISK='" $USER_DATA/user.conf | cut -f 2 -d \')
  545. sed -i "s/U_DISK='$old'/U_DISK='$u_usage'/g" $USER_DATA/user.conf
  546. }
  547. # Recalculate U_BANDWIDTH value
  548. recalc_user_bandwidth_usage() {
  549. usage=0
  550. bandwidth_usage=$(grep 'U_BANDWIDTH=' $USER_DATA/web.conf |\
  551. awk -F "U_BANDWIDTH='" '{print $2}'|cut -f 1 -d \')
  552. for bandwidth in $bandwidth_usage; do
  553. usage=$((usage + bandwidth))
  554. done
  555. old=$(grep "U_BANDWIDTH='" $USER_DATA/user.conf | cut -f 2 -d \')
  556. sed -i "s/U_BANDWIDTH='$old'/U_BANDWIDTH='$usage'/g" $USER_DATA/user.conf
  557. }
  558. # Get next cron job id
  559. get_next_cronjob() {
  560. if [ -z "$job" ]; then
  561. curr_str=$(grep "JOB=" $USER_DATA/cron.conf|cut -f 2 -d \'|\
  562. sort -n|tail -n1)
  563. job="$((curr_str +1))"
  564. fi
  565. }
  566. # Sort cron jobs by id
  567. sort_cron_jobs() {
  568. cat $USER_DATA/cron.conf |sort -n -k 2 -t \' > $USER_DATA/cron.tmp
  569. mv -f $USER_DATA/cron.tmp $USER_DATA/cron.conf
  570. }
  571. # Sync cronjobs with system cron
  572. sync_cron_jobs() {
  573. source_conf "$USER_DATA/user.conf"
  574. if [ -e "/var/spool/cron/crontabs" ]; then
  575. crontab="/var/spool/cron/crontabs/$user"
  576. else
  577. crontab="/var/spool/cron/$user"
  578. fi
  579. # remove file if exists
  580. if [ -e "$crontab" ]; then
  581. rm -f $crontab
  582. fi
  583. # touch new crontab file
  584. touch $crontab
  585. if [ "$CRON_REPORTS" = 'yes' ]; then
  586. echo "MAILTO=$CONTACT" > $crontab
  587. echo 'CONTENT_TYPE="text/plain; charset=utf-8"' >> $crontab
  588. else
  589. echo 'MAILTO=""' > $crontab
  590. fi
  591. while read line; do
  592. parse_object_kv_list "$line"
  593. if [ "$SUSPENDED" = 'no' ]; then
  594. echo "$MIN $HOUR $DAY $MONTH $WDAY $CMD" |\
  595. sed -e "s/%quote%/'/g" -e "s/%dots%/:/g" \
  596. >> $crontab
  597. fi
  598. done < $USER_DATA/cron.conf
  599. chown $user:$user $crontab
  600. chmod 600 $crontab
  601. }
  602. # User format validator
  603. is_user_format_valid() {
  604. if [ ${#1} -eq 1 ]; then
  605. if ! [[ "$1" =~ ^^[[:alnum:]]$ ]]; then
  606. check_result "$E_INVALID" "invalid $2 format :: $1"
  607. fi
  608. else
  609. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,28}[[:alnum:]]$ ]]
  610. then
  611. check_result "$E_INVALID" "invalid $2 format :: $1"
  612. fi
  613. fi
  614. }
  615. # Domain format validator
  616. is_domain_format_valid() {
  617. object_name=${2-domain}
  618. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|_|/|\|\"|'|;|%|\`| ]"
  619. if [[ $1 =~ $exclude ]] || [[ $1 =~ ^[0-9]+$ ]] || [[ $1 =~ \.\. ]] || [[ $1 =~ $(printf '\t') ]] || [[ "$1" = "www" ]]; then
  620. check_result "$E_INVALID" "invalid $object_name format :: $1"
  621. fi
  622. is_no_new_line_format "$1";
  623. }
  624. # Alias forman validator
  625. is_alias_format_valid() {
  626. for object in ${1//,/ }; do
  627. exclude="[!|@|#|$|^|&|(|)|+|=|{|}|:|<|>|?|_|/|\|\"|'|;|%|\`| ]"
  628. if [[ "$object" =~ $exclude ]]; then
  629. check_result "$E_INVALID" "invalid alias format :: $object"
  630. fi
  631. if [[ "$object" =~ [*] ]] && ! [[ "$object" =~ ^[*]\..* ]]; then
  632. check_result "$E_INVALID" "invalid alias format :: $object"
  633. fi
  634. done
  635. }
  636. # IP format validator
  637. is_ip_format_valid() {
  638. object_name=${2-ip}
  639. ip_regex='([1-9]?[0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])'
  640. ip_clean=$(echo "${1%/*}")
  641. if ! [[ $ip_clean =~ ^$ip_regex\.$ip_regex\.$ip_regex\.$ip_regex$ ]]; then
  642. check_result "$E_INVALID" "invalid $object_name format :: $1"
  643. fi
  644. if [ $1 != "$ip_clean" ]; then
  645. ip_cidr="$ip_clean/"
  646. ip_cidr=$(echo "${1#$ip_cidr}")
  647. if [[ "$ip_cidr" -gt 32 ]] || [[ "$ip_cidr" =~ [:alnum:] ]]; then
  648. check_result "$E_INVALID" "invalid $object_name format :: $1"
  649. fi
  650. fi
  651. }
  652. # IPv6 format validator
  653. is_ipv6_format_valid() {
  654. object_name=${2-ip6}
  655. ip_regex='([1-9]?[0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])'
  656. t_ip=$(echo $1 |awk -F / '{print $1}')
  657. t_cidr=$(echo $1 |awk -F / '{print $2}')
  658. valid_cidr=1
  659. WORD="[0-9A-Fa-f]\{1,4\}"
  660. # flat address, no compressed words
  661. FLAT="^${WORD}\(:${WORD}\)\{7\}$"
  662. COMP2="^\(${WORD}:\)\{1,1\}\(:${WORD}\)\{1,6\}$"
  663. COMP3="^\(${WORD}:\)\{1,2\}\(:${WORD}\)\{1,5\}$"
  664. COMP4="^\(${WORD}:\)\{1,3\}\(:${WORD}\)\{1,4\}$"
  665. COMP5="^\(${WORD}:\)\{1,4\}\(:${WORD}\)\{1,3\}$"
  666. COMP6="^\(${WORD}:\)\{1,5\}\(:${WORD}\)\{1,2\}$"
  667. COMP7="^\(${WORD}:\)\{1,6\}\(:${WORD}\)\{1,1\}$"
  668. # trailing :: edge case, includes case of only :: (all 0's)
  669. EDGE_TAIL="^\(\(${WORD}:\)\{1,7\}\|:\):$"
  670. # leading :: edge case
  671. EDGE_LEAD="^:\(:${WORD}\)\{1,7\}$"
  672. echo $t_ip | grep --silent "\(${FLAT}\)\|\(${COMP2}\)\|\(${COMP3}\)\|\(${COMP4}\)\|\(${COMP5}\)\|\(${COMP6}\)\|\(${COMP7}\)\|\(${EDGE_TAIL}\)\|\(${EDGE_LEAD}\)"
  673. if [ $? -ne 0 ]; then
  674. check_result "$E_INVALID" "invalid $object_name format :: $1"
  675. fi
  676. if [ -n "$(echo $1|grep '/')" ]; then
  677. if [[ "$t_cidr" -lt 0 ]] || [[ "$t_cidr" -gt 128 ]]; then
  678. valid_cidr=0
  679. fi
  680. if ! [[ "$t_cidr" =~ ^[0-9]+$ ]]; then
  681. valid_cidr=0
  682. fi
  683. fi
  684. if [ "$valid_cidr" -eq 0 ]; then
  685. check_result "$E_INVALID" "invalid $object_name format :: $1"
  686. fi
  687. }
  688. is_ip46_format_valid() {
  689. t_ip=$(echo $1 |awk -F / '{print $1}')
  690. t_cidr=$(echo $1 |awk -F / '{print $2}')
  691. valid_octets=0
  692. valid_cidr=1
  693. for octet in ${t_ip//./ }; do
  694. if [[ $octet =~ ^[0-9]{1,3}$ ]] && [[ $octet -le 255 ]]; then
  695. ((++valid_octets))
  696. fi
  697. done
  698. if [ -n "$(echo $1|grep '/')" ]; then
  699. if [[ "$t_cidr" -lt 0 ]] || [[ "$t_cidr" -gt 32 ]]; then
  700. valid_cidr=0
  701. fi
  702. if ! [[ "$t_cidr" =~ ^[0-9]+$ ]]; then
  703. valid_cidr=0
  704. fi
  705. fi
  706. if [ "$valid_octets" -lt 4 ] || [ "$valid_cidr" -eq 0 ]; then
  707. #Check IPV6
  708. ipv6_valid=""
  709. WORD="[0-9A-Fa-f]\{1,4\}"
  710. # flat address, no compressed words
  711. FLAT="^${WORD}\(:${WORD}\)\{7\}$"
  712. COMP2="^\(${WORD}:\)\{1,1\}\(:${WORD}\)\{1,6\}$"
  713. COMP3="^\(${WORD}:\)\{1,2\}\(:${WORD}\)\{1,5\}$"
  714. COMP4="^\(${WORD}:\)\{1,3\}\(:${WORD}\)\{1,4\}$"
  715. COMP5="^\(${WORD}:\)\{1,4\}\(:${WORD}\)\{1,3\}$"
  716. COMP6="^\(${WORD}:\)\{1,5\}\(:${WORD}\)\{1,2\}$"
  717. COMP7="^\(${WORD}:\)\{1,6\}\(:${WORD}\)\{1,1\}$"
  718. # trailing :: edge case, includes case of only :: (all 0's)
  719. EDGE_TAIL="^\(\(${WORD}:\)\{1,7\}\|:\):$"
  720. # leading :: edge case
  721. EDGE_LEAD="^:\(:${WORD}\)\{1,7\}$"
  722. echo $t_ip | grep --silent "\(${FLAT}\)\|\(${COMP2}\)\|\(${COMP3}\)\|\(${COMP4}\)\|\(${COMP5}\)\|\(${COMP6}\)\|\(${COMP7}\)\|\(${EDGE_TAIL}\)\|\(${EDGE_LEAD}\)"
  723. if [ $? -ne 0 ]; then
  724. ipv6_valid="INVALID"
  725. fi
  726. if [ -n "$(echo $1|grep '/')" ]; then
  727. if [[ "$t_cidr" -lt 0 ]] || [[ "$t_cidr" -gt 128 ]]; then
  728. valid_cidr=0
  729. fi
  730. if ! [[ "$t_cidr" =~ ^[0-9]+$ ]]; then
  731. valid_cidr=0
  732. fi
  733. fi
  734. if [ -n "$ipv6_valid" ] || [ "$valid_cidr" -eq 0 ]; then
  735. check_result "$E_INVALID" "invalid IP format :: $1"
  736. fi
  737. fi
  738. }
  739. # Proxy extention format validator
  740. is_extention_format_valid() {
  741. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|@|<|>|?|/|\|\"|'|;|%|\`| ]"
  742. if [[ "$1" =~ $exclude ]]; then
  743. check_result "$E_INVALID" "invalid proxy extention format :: $1"
  744. fi
  745. is_no_new_line_format "$1";
  746. }
  747. # Number format validator
  748. is_number_format_valid() {
  749. object_name=${2-number}
  750. if ! [[ "$1" =~ ^[0-9]+$ ]] ; then
  751. check_result "$E_INVALID" "invalid $object_name format :: $1"
  752. fi
  753. }
  754. # Autoreply format validator
  755. is_autoreply_format_valid() {
  756. if [ 10240 -le ${#1} ]; then
  757. check_result "$E_INVALID" "invalid autoreply format :: $1"
  758. fi
  759. }
  760. # Boolean format validator
  761. is_boolean_format_valid() {
  762. if [ "$1" != 'yes' ] && [ "$1" != 'no' ]; then
  763. check_result "$E_INVALID" "invalid $2 format :: $1"
  764. fi
  765. }
  766. # Common format validator
  767. is_common_format_valid() {
  768. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|<|>|?|/|\|\"|'|;|%|\`| ]"
  769. if [[ "$1" =~ $exclude ]]; then
  770. check_result "$E_INVALID" "invalid $2 format :: $1"
  771. fi
  772. if [ 400 -le ${#1} ]; then
  773. check_result "$E_INVALID" "invalid $2 format :: $1"
  774. fi
  775. if [[ "$1" =~ @ ]] && [ ${#1} -gt 1 ] ; then
  776. check_result "$E_INVALID" "invalid $2 format :: $1"
  777. fi
  778. if [[ $1 =~ \* ]]; then
  779. if [[ "$(echo $1 | grep -o '\*\.' |wc -l)" -eq 0 ]] && [[ $1 != '*' ]] ; then
  780. check_result "$E_INVALID" "invalid $2 format :: $1"
  781. fi
  782. fi
  783. if [[ $(echo -n "$1" | tail -c 1) =~ [^a-zA-Z0-9_*@] ]]; then
  784. check_result "$E_INVALID" "invalid $2 format :: $1"
  785. fi
  786. if [[ $(echo -n "$1" | grep -c '\.\.') -gt 0 ]];then
  787. check_result "$E_INVALID" "invalid $2 format :: $1"
  788. fi
  789. if [[ $(echo -n "$1" | head -c 1) =~ [^a-zA-Z0-9_*@] ]]; then
  790. check_result "$E_INVALID" "invalid $2 format :: $1"
  791. fi
  792. if [[ $(echo -n "$1" | grep -c '\-\-') -gt 0 ]]; then
  793. check_result "$E_INVALID" "invalid $2 format :: $1"
  794. fi
  795. if [[ $(echo -n "$1" | grep -c '\_\_') -gt 0 ]]; then
  796. check_result "$E_INVALID" "invalid $2 format :: $1"
  797. fi
  798. is_no_new_line_format "$1";
  799. }
  800. is_no_new_line_format() {
  801. test=$(echo "$1" | head -n1 );
  802. if [[ "$test" != "$1" ]]; then
  803. check_result "$E_INVALID" "invalid value :: $1"
  804. fi
  805. }
  806. is_string_format_valid() {
  807. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|<|>|?|/|\|\"|'|;|%|\`]"
  808. if [[ "$1" =~ $exclude ]]; then
  809. check_result "$E_INVALID" "invalid $2 format :: $1"
  810. fi
  811. is_no_new_line_format "$1";
  812. }
  813. # Database format validator
  814. is_database_format_valid() {
  815. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|/|\|\"|'|;|%|\`| ]"
  816. if [[ "$1" =~ $exclude ]] || [ 64 -le ${#1} ]; then
  817. check_result "$E_INVALID" "invalid $2 format :: $1"
  818. fi
  819. is_no_new_line_format "$1";
  820. }
  821. # Date format validator
  822. is_date_format_valid() {
  823. if ! [[ "$1" =~ ^[0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9]$ ]]; then
  824. check_result "$E_INVALID" "invalid date format :: $1"
  825. fi
  826. }
  827. # Database user validator
  828. is_dbuser_format_valid() {
  829. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|/|\|\"|'|;|%|\`| ]"
  830. if [ 33 -le ${#1} ]; then
  831. check_result "$E_INVALID" "mysql username can be up to 32 characters long"
  832. fi
  833. if [[ "$1" =~ $exclude ]]; then
  834. check_result "$E_INVALID" "invalid $2 format :: $1"
  835. fi
  836. is_no_new_line_format "$1"
  837. }
  838. # DNS record type validator
  839. is_dns_type_format_valid() {
  840. known_dnstype='A,AAAA,NS,CNAME,MX,TXT,SRV,DNSKEY,KEY,IPSECKEY,PTR,SPF,TLSA,CAA'
  841. if [ -z "$(echo $known_dnstype |grep -w $1)" ]; then
  842. check_result "$E_INVALID" "invalid dns record type format :: $1"
  843. fi
  844. }
  845. # DNS record validator
  846. is_dns_record_format_valid() {
  847. if [ "$rtype" = 'A' ]; then
  848. is_ip_format_valid "$1"
  849. fi
  850. if [ "$rtype" = 'NS' ]; then
  851. is_domain_format_valid "${1::-1}" 'ns_record'
  852. fi
  853. if [ "$rtype" = 'MX' ]; then
  854. is_domain_format_valid "${1::-1}" 'mx_record'
  855. is_int_format_valid "$priority" 'priority_record'
  856. fi
  857. is_no_new_line_format "$1";
  858. }
  859. # Email format validator
  860. is_email_format_valid() {
  861. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.[A-Za-z]{2,63}$ ]] ; then
  862. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.(xn--)[[:alnum:]]{2,63}$ ]] ; then
  863. check_result "$E_INVALID" "invalid email format :: $1"
  864. fi
  865. fi
  866. }
  867. # Firewall action validator
  868. is_fw_action_format_valid() {
  869. if [ "$1" != "ACCEPT" ] && [ "$1" != 'DROP' ] ; then
  870. check_result "$E_INVALID" "invalid action format :: $1"
  871. fi
  872. }
  873. # Firewall protocol validator
  874. is_fw_protocol_format_valid() {
  875. if [ "$1" != "ICMP" ] && [ "$1" != 'UDP' ] && [ "$1" != 'TCP' ] ; then
  876. check_result "$E_INVALID" "invalid protocol format :: $1"
  877. fi
  878. }
  879. # Firewall port validator
  880. is_fw_port_format_valid() {
  881. if [ "${#1}" -eq 1 ]; then
  882. if ! [[ "$1" =~ [0-9] ]]; then
  883. check_result "$E_INVALID" "invalid port format :: $1"
  884. fi
  885. else
  886. if ! [[ "$1" =~ ^[0-9][-|,|:|0-9]{0,30}[0-9]$ ]]
  887. then
  888. check_result "$E_INVALID" "invalid port format :: $1"
  889. fi
  890. fi
  891. }
  892. # Integer validator
  893. is_int_format_valid() {
  894. if ! [[ "$1" =~ ^[0-9]+$ ]] ; then
  895. check_result "$E_INVALID" "invalid $2 format :: $1"
  896. fi
  897. }
  898. # Interface validator
  899. is_interface_format_valid() {
  900. netdevices=$(cat /proc/net/dev |grep : |cut -f 1 -d : |tr -d ' ')
  901. if [ -z $(echo "$netdevices" |grep -x $1) ]; then
  902. check_result "$E_INVALID" "invalid interface format :: $1"
  903. fi
  904. }
  905. # IP status validator
  906. is_ip_status_format_valid() {
  907. if [ -z "$(echo shared,dedicated | grep -w $1 )" ]; then
  908. check_result "$E_INVALID" "invalid status format :: $1"
  909. fi
  910. }
  911. # Cron validator
  912. is_cron_format_valid() {
  913. limit=59
  914. check_format=''
  915. if [ "$2" = 'hour' ]; then
  916. limit=23
  917. fi
  918. if [ "$2" = 'day' ]; then
  919. limit=31
  920. fi
  921. if [ "$2" = 'month' ]; then
  922. limit=12
  923. fi
  924. if [ "$2" = 'wday' ]; then
  925. limit=7
  926. fi
  927. if [ "$1" = '*' ]; then
  928. check_format='ok'
  929. fi
  930. if [[ "$1" =~ ^[\*]+[/]+[0-9] ]]; then
  931. if [ "$(echo $1 |cut -f 2 -d /)" -lt $limit ]; then
  932. check_format='ok'
  933. fi
  934. fi
  935. if [[ "$1" =~ ^[0-9][-|,|0-9]{0,70}[\/][0-9]$ ]]; then
  936. check_format='ok'
  937. crn_values=${1//,/ }
  938. crn_values=${crn_values//-/ }
  939. crn_values=${crn_values//\// }
  940. for crn_vl in $crn_values; do
  941. if [ "$crn_vl" -gt $limit ]; then
  942. check_format='invalid'
  943. fi
  944. done
  945. fi
  946. crn_values=$(echo $1 |tr "," " " | tr "-" " ")
  947. for crn_vl in $crn_values
  948. do
  949. if [[ "$crn_vl" =~ ^[0-9]+$ ]] && [ "$crn_vl" -le $limit ]; then
  950. check_format='ok'
  951. fi
  952. done
  953. if [ "$check_format" != 'ok' ]; then
  954. check_result "$E_INVALID" "invalid $2 format :: $1"
  955. fi
  956. }
  957. # Name validator
  958. is_name_format_valid() {
  959. if ! [[ "$1" =~ ^[[:alnum:]][-|\ |\.|_[:alnum:]]{0,28}[[:alnum:]]$ ]]; then
  960. check_result "$E_INVALID" "invalid $2 format :: $1"
  961. fi
  962. }
  963. # Object validator
  964. is_object_format_valid() {
  965. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,64}[[:alnum:]]$ ]]; then
  966. check_result "$E_INVALID" "invalid $2 format :: $1"
  967. fi
  968. }
  969. # Role validator
  970. is_role_valid (){
  971. if ! [[ "$1" =~ ^admin$|^user$ ]]; then
  972. check_result "$E_INVALID" "invalid $2 format :: $1"
  973. fi
  974. }
  975. # Password validator
  976. is_password_format_valid() {
  977. if [ "${#1}" -lt '6' ]; then
  978. check_result "$E_INVALID" "invalid password format :: $1"
  979. fi
  980. }
  981. # Missing function -
  982. # Before: validate_format_shell
  983. # After: is_format_valid_shell
  984. is_format_valid_shell() {
  985. if [ -z "$(grep -w $1 /etc/shells)" ]; then
  986. echo "Error: shell $1 is not valid"
  987. log_event "$E_INVALID" "$EVENT"
  988. exit $E_INVALID
  989. fi
  990. }
  991. # Service name validator
  992. is_service_format_valid() {
  993. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,64}$ ]]; then
  994. check_result "$E_INVALID" "invalid $2 format :: $1"
  995. fi
  996. }
  997. is_hash_format_valid() {
  998. if ! [[ "$1" =~ ^[[:alnum:]|\:|\=|_|-]{1,80}$ ]]; then
  999. check_result "$E_INVALID" "invalid $2 format :: $1"
  1000. fi
  1001. }
  1002. # Format validation controller
  1003. is_format_valid() {
  1004. for arg_name in $*; do
  1005. eval arg=\$$arg_name
  1006. if [ -n "$arg" ]; then
  1007. case $arg_name in
  1008. access_key_id) is_access_key_id_format_valid "$arg" "$arg_name";;
  1009. account) is_user_format_valid "$arg" "$arg_name";;
  1010. action) is_fw_action_format_valid "$arg";;
  1011. active) is_boolean_format_valid "$arg" 'active' ;;
  1012. aliases) is_alias_format_valid "$arg" ;;
  1013. alias) is_alias_format_valid "$arg" ;;
  1014. antispam) is_boolean_format_valid "$arg" 'antispam' ;;
  1015. antivirus) is_boolean_format_valid "$arg" 'antivirus' ;;
  1016. autoreply) is_autoreply_format_valid "$arg" ;;
  1017. backup) is_object_format_valid "$arg" 'backup' ;;
  1018. charset) is_object_format_valid "$arg" "$arg_name" ;;
  1019. charsets) is_common_format_valid "$arg" 'charsets' ;;
  1020. chain) is_object_format_valid "$arg" 'chain' ;;
  1021. comment) is_object_format_valid "$arg" 'comment' ;;
  1022. database) is_database_format_valid "$arg" 'database';;
  1023. day) is_cron_format_valid "$arg" $arg_name ;;
  1024. dbpass) is_password_format_valid "$arg" ;;
  1025. dbuser) is_dbuser_format_valid "$arg" 'dbuser';;
  1026. dkim) is_boolean_format_valid "$arg" 'dkim' ;;
  1027. dkim_size) is_int_format_valid "$arg" ;;
  1028. domain) is_domain_format_valid "$arg" ;;
  1029. dom_alias) is_alias_format_valid "$arg" ;;
  1030. dvalue) is_dns_record_format_valid "$arg";;
  1031. email) is_email_format_valid "$arg" ;;
  1032. email_forward) is_email_format_valid "$arg" ;;
  1033. exp) is_date_format_valid "$arg" ;;
  1034. extentions) is_common_format_valid "$arg" 'extentions' ;;
  1035. format) is_type_valid 'plain json shell csv' "$arg" ;;
  1036. ftp_password) is_password_format_valid "$arg" ;;
  1037. ftp_user) is_user_format_valid "$arg" "$arg_name" ;;
  1038. hash) is_hash_format_valid "$arg" "$arg_name" ;;
  1039. host) is_object_format_valid "$arg" "$arg_name" ;;
  1040. hour) is_cron_format_valid "$arg" $arg_name ;;
  1041. id) is_int_format_valid "$arg" 'id' ;;
  1042. iface) is_interface_format_valid "$arg" ;;
  1043. ip) is_ip_format_valid "$arg" ;;
  1044. ipv6) is_ipv6_format_valid "$arg" ;;
  1045. ip46) is_ip46_format_valid "$arg" ;;
  1046. ip_name) is_domain_format_valid "$arg" 'IP name';;
  1047. ip_status) is_ip_status_format_valid "$arg" ;;
  1048. job) is_int_format_valid "$arg" 'job' ;;
  1049. key) is_common_format_valid "$arg" "$arg_name" ;;
  1050. malias) is_user_format_valid "$arg" "$arg_name" ;;
  1051. max_db) is_int_format_valid "$arg" 'max db';;
  1052. min) is_cron_format_valid "$arg" $arg_name ;;
  1053. month) is_cron_format_valid "$arg" $arg_name ;;
  1054. name) is_name_format_valid "$arg" "name" ;;
  1055. nat_ip) is_ip_format_valid "$arg" ;;
  1056. netmask) is_ip_format_valid "$arg" 'netmask' ;;
  1057. newid) is_int_format_valid "$arg" 'id' ;;
  1058. ns1) is_domain_format_valid "$arg" 'ns1' ;;
  1059. ns2) is_domain_format_valid "$arg" 'ns2' ;;
  1060. ns3) is_domain_format_valid "$arg" 'ns3' ;;
  1061. ns4) is_domain_format_valid "$arg" 'ns4' ;;
  1062. ns5) is_domain_format_valid "$arg" 'ns5' ;;
  1063. ns6) is_domain_format_valid "$arg" 'ns6' ;;
  1064. ns7) is_domain_format_valid "$arg" 'ns7' ;;
  1065. ns8) is_domain_format_valid "$arg" 'ns8' ;;
  1066. object) is_name_format_valid "$arg" 'object';;
  1067. package) is_object_format_valid "$arg" "$arg_name" ;;
  1068. password) is_password_format_valid "$arg" ;;
  1069. port) is_int_format_valid "$arg" 'port' ;;
  1070. port_ext) is_fw_port_format_valid "$arg";;
  1071. protocol) is_fw_protocol_format_valid "$arg" ;;
  1072. proxy_ext) is_extention_format_valid "$arg" ;;
  1073. quota) is_int_format_valid "$arg" 'quota' ;;
  1074. rate) is_int_format_valid "$arg" 'rate' ;;
  1075. record) is_common_format_valid "$arg" 'record';;
  1076. reject) is_boolean_format_valid "$arg" 'reject' ;;
  1077. restart) is_restart_format_valid "$arg" 'restart' ;;
  1078. role) is_role_valid "$arg" 'role' ;;
  1079. rtype) is_dns_type_format_valid "$arg" ;;
  1080. rule) is_int_format_valid "$arg" "rule id" ;;
  1081. service) is_service_format_valid "$arg" "$arg_name" ;;
  1082. secret_access_key) is_secret_access_key_format_valid "$arg" "$arg_name" ;;
  1083. soa) is_domain_format_valid "$arg" 'SOA' ;;
  1084. #missing command: is_format_valid_shell
  1085. shell) is_format_valid_shell "$arg" ;;
  1086. ssl_dir) is_folder_exists "$arg" "$arg_name" ;;
  1087. stats_pass) is_password_format_valid "$arg" ;;
  1088. stats_user) is_user_format_valid "$arg" "$arg_name" ;;
  1089. template) is_object_format_valid "$arg" "$arg_name" ;;
  1090. theme) is_common_format_valid "$arg" "$arg_name" ;;
  1091. ttl) is_int_format_valid "$arg" 'ttl';;
  1092. user) is_user_format_valid "$arg" $arg_name;;
  1093. wday) is_cron_format_valid "$arg" $arg_name ;;
  1094. value) is_common_format_valid "$arg" $arg_name;;
  1095. esac
  1096. fi
  1097. done
  1098. }
  1099. is_folder_exists () {
  1100. if [ ! -d "$1" ]; then
  1101. check_result "$E_NOTEXIST" "folder $1 does not exist"
  1102. fi
  1103. }
  1104. is_command_valid_format () {
  1105. if [[ ! "$1" =~ ^v-[[:alnum:]][-|\.|_[:alnum:]]{0,64}[[:alnum:]]$ ]]; then
  1106. check_result "$E_INVALID" "Invalid command format"
  1107. fi
  1108. if [[ -n $( echo "$1" | grep -e '\-\-' ) ]]; then
  1109. check_result "$E_INVALID" "Invalid command format"
  1110. fi
  1111. }
  1112. # Check access_key_id name
  1113. # Don't work with legacy key format
  1114. is_access_key_id_format_valid() {
  1115. local hash="$1"
  1116. # ACCESS_KEY_ID format validation
  1117. if ! [[ "$hash" =~ ^[[:alnum:]]{20}$ ]]; then
  1118. check_result "$E_INVALID" "invalid $2 format :: $hash"
  1119. fi
  1120. }
  1121. # SECRET_ACCESS_KEY format validation
  1122. is_secret_access_key_format_valid() {
  1123. local hash="$1"
  1124. if ! [[ "$hash" =~ ^[[:alnum:]|_|\.|\+|/|\^|~|=|%|\-]{40}$ ]]; then
  1125. check_result "$E_INVALID" "invalid $2 format"
  1126. fi
  1127. }
  1128. # Checks if the secret belongs to the access key
  1129. check_access_key_secret() {
  1130. local access_key_id="$(basename "$1")"
  1131. local secret_access_key=$2
  1132. local -n key_user=$3
  1133. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1134. check_result "$E_PASSWORD" "Access key $access_key_id doesn't exist"
  1135. fi
  1136. if [[ -z "$secret_access_key" ]]; then
  1137. check_result "$E_PASSWORD" "Secret key not provided for key $access_key_id"
  1138. elif ! [[ "$secret_access_key" =~ ^[[:alnum:]|_|\.|\+|/|\^|~|=|%|\-]{40}$ ]]; then
  1139. check_result "$E_PASSWORD" "Invalid secret key for key $access_key_id"
  1140. else
  1141. SECRET_ACCESS_KEY=""
  1142. source_conf "$HESTIA/data/access-keys/${access_key_id}";
  1143. if [[ -z "$SECRET_ACCESS_KEY" || "$SECRET_ACCESS_KEY" != "$secret_access_key" ]]; then
  1144. check_result "$E_PASSWORD" "Invalid secret key for key $access_key_id"
  1145. fi
  1146. fi
  1147. key_user="$USER"
  1148. }
  1149. # Checks if the key belongs to the user
  1150. check_access_key_user() {
  1151. local access_key_id="$(basename "$1")"
  1152. local user=$2
  1153. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1154. check_result "$E_FORBIDEN" "Access key $access_key_id doesn't exist"
  1155. fi
  1156. if [[ -z "$user" ]]; then
  1157. check_result "$E_FORBIDEN" "User not provided"
  1158. else
  1159. USER=""
  1160. source_conf "$HESTIA/data/access-keys/${access_key_id}";
  1161. if [[ -z "$USER" || "$USER" != "$user" ]]; then
  1162. check_result "$E_FORBIDEN" "key $access_key_id does not belong to the user $user"
  1163. fi
  1164. fi
  1165. }
  1166. # Checks if the key is allowed to run the command
  1167. check_access_key_cmd() {
  1168. local access_key_id="$(basename "$1")"
  1169. local cmd=$2
  1170. local -n user_arg_position=$3
  1171. if [[ "$DEBUG_MODE" = "true" ]]; then
  1172. new_timestamp
  1173. echo "[$date:$time] $1 $2" >> /var/log/hestia/api.log
  1174. fi
  1175. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1176. check_result "$E_FORBIDEN" "Access key $access_key_id doesn't exist"
  1177. fi
  1178. if [[ -z "$cmd" ]]; then
  1179. check_result "$E_FORBIDEN" "Command not provided"
  1180. elif [[ "$cmd" = 'v-make-tmp-file' ]]; then
  1181. USER="" PERMISSIONS=""
  1182. source_conf "${HESTIA}/data/access-keys/${access_key_id}"
  1183. local allowed_commands
  1184. if [[ -n "$PERMISSIONS" ]]; then
  1185. allowed_commands="$(get_apis_commands "$PERMISSIONS")"
  1186. if [[ -z "$(echo ",${allowed_commands}," | grep ",${hst_command},")" ]]; then
  1187. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1188. fi
  1189. elif [[ -z "$PERMISSIONS" && "$USER" != "admin" ]]; then
  1190. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1191. fi
  1192. user_arg_position="0"
  1193. elif [[ ! -e "$BIN/$cmd" ]]; then
  1194. check_result "$E_FORBIDEN" "Command $cmd not found"
  1195. else
  1196. USER="" PERMISSIONS=""
  1197. source_conf "${HESTIA}/data/access-keys/${access_key_id}"
  1198. local allowed_commands
  1199. if [[ -n "$PERMISSIONS" ]]; then
  1200. allowed_commands="$(get_apis_commands "$PERMISSIONS")"
  1201. if [[ -z "$(echo ",${allowed_commands}," | grep ",${hst_command},")" ]]; then
  1202. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1203. fi
  1204. elif [[ -z "$PERMISSIONS" && "$USER" != "admin" ]]; then
  1205. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1206. fi
  1207. if [[ "$USER" == "admin" ]]; then
  1208. # Admin can run commands for any user
  1209. user_arg_position="0"
  1210. else
  1211. user_arg_position="$(search_command_arg_position "$hst_command" "USER")"
  1212. if ! [[ "$user_arg_position" =~ ^[0-9]+$ ]]; then
  1213. check_result "$E_FORBIDEN" "Command $hst_command not found"
  1214. fi
  1215. fi
  1216. fi
  1217. }
  1218. # Domain argument formatting
  1219. format_domain() {
  1220. if [[ "$domain" = *[![:ascii:]]* ]]; then
  1221. if [[ "$domain" =~ [[:upper:]] ]]; then
  1222. domain=$(echo "$domain" |sed 's/[[:upper:]].*/\L&/')
  1223. fi
  1224. else
  1225. if [[ "$domain" =~ [[:upper:]] ]]; then
  1226. domain=$(echo "$domain" |tr '[:upper:]' '[:lower:]')
  1227. fi
  1228. fi
  1229. if [[ "$domain" =~ ^www\..* ]]; then
  1230. domain=$(echo "$domain" |sed -e "s/^www.//")
  1231. fi
  1232. if [[ "$domain" =~ .*\.$ ]]; then
  1233. domain=$(echo "$domain" |sed -e "s/[.]*$//g")
  1234. fi
  1235. if [[ "$domain" =~ ^\. ]]; then
  1236. domain=$(echo "$domain" |sed -e "s/^[.]*//")
  1237. fi
  1238. }
  1239. format_domain_idn() {
  1240. if [ -z "$domain_idn" ]; then
  1241. domain_idn=$domain
  1242. fi
  1243. if [[ "$domain_idn" = *[![:ascii:]]* ]]; then
  1244. domain_idn=$(idn2 --quiet $domain_idn)
  1245. fi
  1246. }
  1247. format_aliases() {
  1248. if [ -n "$aliases" ] && [ "$aliases" != 'none' ]; then
  1249. aliases=$(echo $aliases |tr '[:upper:]' '[:lower:]' |tr ',' '\n')
  1250. aliases=$(echo "$aliases" |sed -e "s/\.$//" |sort -u)
  1251. aliases=$(echo "$aliases" |tr -s '.')
  1252. aliases=$(echo "$aliases" |sed -e "s/[.]*$//g")
  1253. aliases=$(echo "$aliases" |sed -e "s/^[.]*//")
  1254. aliases=$(echo "$aliases" |sed -e "/^$/d")
  1255. aliases=$(echo "$aliases" |tr '\n' ',' |sed -e "s/,$//")
  1256. fi
  1257. }
  1258. is_restart_format_valid() {
  1259. if [ "$1" != 'yes' ] && [ "$1" != 'no' ] && [ "$1" != 'ssl' ] && [ "$1" != 'reload' ] && [ "$1" != 'updatessl' ]; then
  1260. check_result "$E_INVALID" "invalid $2 format :: $1"
  1261. fi
  1262. }
  1263. check_backup_conditions() {
  1264. # Checking load average
  1265. la=$(cat /proc/loadavg |cut -f 1 -d ' ' |cut -f 1 -d '.')
  1266. # i=0
  1267. while [ "$la" -ge "$BACKUP_LA_LIMIT" ]; do
  1268. echo -e "$(date "+%F %T") Load Average $la"
  1269. sleep 60
  1270. la=$(cat /proc/loadavg |cut -f 1 -d ' ' |cut -f 1 -d '.')
  1271. done
  1272. }
  1273. # Define download function
  1274. download_file() {
  1275. local url=$1
  1276. local destination=$2
  1277. local force=$3
  1278. # Default destination is the curent working directory
  1279. local dstopt=""
  1280. if [ -n "$(echo "$url" | grep -E "\.(gz|gzip|bz2|zip|xz)$")" ]; then
  1281. # When an archive file is downloaded it will be first saved localy
  1282. dstopt="--directory-prefix=$ARCHIVE_DIR"
  1283. local is_archive="true"
  1284. local filename="${url##*/}"
  1285. if [ -z "$filename" ]; then
  1286. >&2 echo "[!] No filename was found in url, exiting ($url)"
  1287. exit 1
  1288. fi
  1289. if [ -n "$force" ] && [ -f "$ARCHIVE_DIR/$filename" ]; then
  1290. rm -f $ARCHIVE_DIR/$filename
  1291. fi
  1292. elif [ -n "$destination" ]; then
  1293. # Plain files will be written to specified location
  1294. dstopt="-O $destination"
  1295. fi
  1296. # check for corrupted archive
  1297. if [ -f "$ARCHIVE_DIR/$filename" ] && [ "$is_archive" = "true" ]; then
  1298. tar -tzf "$ARCHIVE_DIR/$filename" > /dev/null 2>&1
  1299. if [ $? -ne 0 ]; then
  1300. >&2 echo "[!] Archive $ARCHIVE_DIR/$filename is corrupted, redownloading"
  1301. rm -f $ARCHIVE_DIR/$filename
  1302. fi
  1303. fi
  1304. if [ ! -f "$ARCHIVE_DIR/$filename" ]; then
  1305. wget $url -q $dstopt --show-progress --progress=bar:force --limit-rate=3m
  1306. fi
  1307. if [ -n "$destination" ] && [ "$is_archive" = "true" ]; then
  1308. if [ "$destination" = "-" ]; then
  1309. cat "$ARCHIVE_DIR/$filename"
  1310. elif [ -d "$(dirname $destination)" ]; then
  1311. cp "$ARCHIVE_DIR/$filename" "$destination"
  1312. fi
  1313. fi
  1314. }
  1315. check_hestia_demo_mode() {
  1316. demo_mode=$(grep DEMO_MODE /usr/local/hestia/conf/hestia.conf | cut -d '=' -f2 | sed "s|'||g")
  1317. if [ -n "$demo_mode" ] && [ "$demo_mode" = "yes" ]; then
  1318. echo "ERROR: Unable to perform operation due to security restrictions that are in place."
  1319. exit 1
  1320. fi
  1321. }
  1322. multiphp_count() {
  1323. $BIN/v-list-sys-php plain | wc -l
  1324. }
  1325. multiphp_versions() {
  1326. local -a php_versions_list;
  1327. local php_ver;
  1328. if [ "$(multiphp_count)" -gt 0 ] ; then
  1329. for php_ver in $( $BIN/v-list-sys-php plain); do
  1330. [ ! -d "/etc/php/$php_ver/fpm/pool.d/" ] && continue
  1331. php_versions_list+=($php_ver)
  1332. done
  1333. echo "${php_versions_list[@]}"
  1334. fi
  1335. }
  1336. multiphp_default_version() {
  1337. # Get system wide default php version (set by update-alternatives)
  1338. local sys_phpversion=$(php -r "echo substr(phpversion(),0,3);")
  1339. # Check if the system php also has php-fpm enabled, otherwise return
  1340. # the most recent php version which does have it installed.
  1341. if [ ! -d "/etc/php/$sys_phpversion/fpm/pool.d/" ]; then
  1342. local all_versions="$(multiphp_versions)"
  1343. if [ -n "$all_versions" ]; then
  1344. sys_phpversion="${all_versions##*\ }";
  1345. fi
  1346. fi
  1347. echo "$sys_phpversion"
  1348. }
  1349. is_hestia_package(){
  1350. check=false;
  1351. for package in $1; do
  1352. if [ $package == "$2" ]; then
  1353. check="true";
  1354. fi
  1355. done
  1356. if [ "$check" != "true" ]; then
  1357. check_result $E_INVALID "$2 package is not controlled by hestiacp"
  1358. fi
  1359. }
  1360. # Run arbitrary cli commands with dropped privileges
  1361. # Note: setpriv --init-groups is not available on debian9 (util-linux 2.29.2)
  1362. # Input:
  1363. # - $user : Vaild hestia user
  1364. user_exec() {
  1365. is_object_valid 'user' 'USER' "$user"
  1366. local user_groups=$(id -G "$user")
  1367. user_groups=${user_groups//\ /,}
  1368. setpriv --groups "$user_groups" --reuid "$user" --regid "$user" -- "${@}"
  1369. }
  1370. # Simple chmod wrapper that skips symlink files after glob expand
  1371. no_symlink_chmod() {
  1372. local filemode=$1; shift;
  1373. for i in "$@"; do
  1374. [[ -L ${i} ]] && continue
  1375. chmod "${filemode}" "${i}"
  1376. done
  1377. }
  1378. source_conf(){
  1379. while IFS='= ' read -r lhs rhs
  1380. do
  1381. if [[ ! $lhs =~ ^\ *# && -n $lhs ]]; then
  1382. rhs="${rhs%%^\#*}" # Del in line right comments
  1383. rhs="${rhs%%*( )}" # Del trailing spaces
  1384. rhs="${rhs%\'*}" # Del opening string quotes
  1385. rhs="${rhs#\'*}" # Del closing string quotes
  1386. declare -g $lhs="$rhs"
  1387. fi
  1388. done < $1
  1389. }
  1390. format_no_quotes() {
  1391. exclude="['|\"]"
  1392. if [[ "$1" =~ $exclude ]]; then
  1393. check_result "$E_INVALID" "Invalid $2 contains qoutes (\" or ') :: $1"
  1394. fi
  1395. is_no_new_line_format "$1"
  1396. }
  1397. is_username_format_valid(){
  1398. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.[A-Za-z]{2,63}$ ]] ; then
  1399. is_string_format_valid "$1" "$2"
  1400. fi
  1401. }
  1402. change_sys_value(){
  1403. check_ckey=$(grep "^$1='" "$HESTIA/conf/hestia.conf")
  1404. if [ -z "$check_ckey" ]; then
  1405. echo "$1='$2'" >> "$HESTIA/conf/hestia.conf"
  1406. else
  1407. sed -i "s|^$1=.*|$1='$2'|g" "$HESTIA/conf/hestia.conf"
  1408. fi
  1409. }
  1410. # Checks the format of APIs that will be allowed for the key
  1411. is_key_permissions_format_valid() {
  1412. local permissions="$1"
  1413. local user="$2"
  1414. if [[ "$user" != "admin" && -z "$permissions" ]]; then
  1415. check_result "$E_INVALID" "Non-admin users need a permission list"
  1416. fi
  1417. while IFS=',' read -ra permissions_arr; do
  1418. for permission in "${permissions_arr[@]}"; do
  1419. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1420. # if [[ -z "$(echo "$permission" | grep -E "^v-")" ]]; then
  1421. if [[ ! -e "$HESTIA/data/api/$permission" ]]; then
  1422. check_result "$E_NOTEXIST" "API $permission doesn't exist"
  1423. fi
  1424. source_conf "$HESTIA/data/api/$permission";
  1425. if [ "$ROLE" = "admin" ] && [ "$user" != "admin" ]; then
  1426. check_result "$E_INVALID" "Only the admin can run this API"
  1427. fi
  1428. # elif [[ ! -e "$BIN/$permission" ]]; then
  1429. # check_result "$E_NOTEXIST" "Command $permission doesn't exist"
  1430. # fi
  1431. done
  1432. done <<<"$permissions"
  1433. }
  1434. # Remove whitespaces, and bin path from commands
  1435. cleanup_key_permissions() {
  1436. local permissions="$1"
  1437. local final quote
  1438. while IFS=',' read -ra permissions_arr; do
  1439. for permission in "${permissions_arr[@]}"; do
  1440. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1441. # Avoid duplicate items
  1442. if [[ -z "$(echo ",${final}," | grep ",${permission},")" ]]; then
  1443. final+="${quote}${permission}"
  1444. quote=','
  1445. fi
  1446. done
  1447. done <<<"$permissions"
  1448. echo "$final"
  1449. }
  1450. # Extract all allowed commands from a permission list
  1451. get_apis_commands() {
  1452. local permissions="$1"
  1453. local allowed_commands quote commands_to_add
  1454. while IFS=',' read -ra permissions_arr; do
  1455. for permission in "${permissions_arr[@]}"; do
  1456. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1457. commands_to_add=""
  1458. # if [[ -n "$(echo "$permission" | grep -E "^v-")" ]]; then
  1459. # commands_to_add="$permission"
  1460. # el
  1461. if [[ -e "$HESTIA/data/api/$permission" ]]; then
  1462. source_conf "$HESTIA/data/api/$permission";
  1463. commands_to_add="$COMMANDS"
  1464. fi
  1465. if [[ -n "$commands_to_add" ]]; then
  1466. allowed_commands+="${quote}${commands_to_add}"
  1467. quote=','
  1468. fi
  1469. done
  1470. done <<<"$permissions"
  1471. cleanup_key_permissions "$allowed_commands"
  1472. }
  1473. # Get the position of an argument by name in a hestia command using the command's documentation comment.
  1474. #
  1475. # Return:
  1476. # * 0: It doesn't have the argument;
  1477. # * 1-9: The position of the argument in the command.
  1478. search_command_arg_position() {
  1479. local hst_command="$(basename "$1")"
  1480. local arg_name="$2"
  1481. local command_path="$BIN/$hst_command"
  1482. if [[ -z "$hst_command" || ! -e "$command_path" ]]; then
  1483. echo "-1"
  1484. return
  1485. fi
  1486. local position=0
  1487. local count=0
  1488. local command_options="$(sed -En 's/^# options: (.+)/\1/p' "$command_path")"
  1489. while IFS=' ' read -ra options_arr; do
  1490. for option in "${options_arr[@]}"; do
  1491. count=$((count+1))
  1492. option_name="$(echo " $option " | sed -E 's/^(\s|\[)*|(\s|\])*$//g')"
  1493. if [[ "${option_name^^}" == "$arg_name" ]]; then
  1494. position=$count
  1495. fi
  1496. done
  1497. done <<<"$command_options"
  1498. echo "$position"
  1499. }