main.sh 51 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830
  1. #!/usr/bin/env bash
  2. #===========================================================================#
  3. # #
  4. # Hestia Control Panel - Core Function Library #
  5. # #
  6. #===========================================================================#
  7. # Source conf function for correct variable initialisation
  8. source_conf() {
  9. while IFS='= ' read -r lhs rhs; do
  10. if [[ ! $lhs =~ ^\ *# && -n $lhs ]]; then
  11. rhs="${rhs%%^\#*}" # Del in line right comments
  12. rhs="${rhs%%*( )}" # Del trailing spaces
  13. rhs="${rhs%\'*}" # Del opening string quotes
  14. rhs="${rhs#\'*}" # Del closing string quotes
  15. declare -g $lhs="$rhs"
  16. fi
  17. done < $1
  18. }
  19. if [ -z "$user" ]; then
  20. if [ -z "$ROOT_USER" ]; then
  21. if [ -z "$HESTIA" ]; then
  22. # shellcheck source=/etc/hestiacp/hestia.conf
  23. source /etc/hestiacp/hestia.conf
  24. fi
  25. source_conf "$HESTIA/conf/hestia.conf" # load config file
  26. fi
  27. user="$ROOT_USER"
  28. fi
  29. # Internal variables
  30. HOMEDIR='/home'
  31. BACKUP='/backup'
  32. BACKUP_GZIP=9
  33. BACKUP_DISK_LIMIT=95
  34. BACKUP_LA_LIMIT=$(grep -c '^processor' /proc/cpuinfo)
  35. RRD_STEP=300
  36. BIN=$HESTIA/bin
  37. HESTIA_INSTALL_DIR="$HESTIA/install/deb"
  38. HESTIA_COMMON_DIR="$HESTIA/install/common"
  39. HESTIA_BACKUP="/root/hst_backups/$(date +%d%m%Y%H%M)"
  40. HESTIA_PHP="$HESTIA/php/bin/php"
  41. USER_DATA=$HESTIA/data/users/$user
  42. WEBTPL=$HESTIA/data/templates/web
  43. MAILTPL=$HESTIA/data/templates/mail
  44. DNSTPL=$HESTIA/data/templates/dns
  45. RRD=$HESTIA/web/rrd
  46. SENDMAIL="$HESTIA/web/inc/mail-wrapper.php"
  47. HESTIA_GIT_REPO="https://raw.githubusercontent.com/hestiacp/hestiacp"
  48. HESTIA_THEMES="$HESTIA/web/css/themes"
  49. HESTIA_THEMES_CUSTOM="$HESTIA/web/css/themes/custom"
  50. SCRIPT="$(basename $0)"
  51. CHECK_RESULT_CALLBACK=""
  52. # Return codes
  53. OK=0
  54. E_ARGS=1
  55. E_INVALID=2
  56. E_NOTEXIST=3
  57. E_EXISTS=4
  58. E_SUSPENDED=5
  59. E_UNSUSPENDED=6
  60. E_INUSE=7
  61. E_LIMIT=8
  62. E_PASSWORD=9
  63. E_FORBIDEN=10
  64. E_DISABLED=11
  65. E_PARSING=12
  66. E_DISK=13
  67. E_LA=14
  68. E_CONNECT=15
  69. E_FTP=16
  70. E_DB=17
  71. E_RRD=18
  72. E_UPDATE=19
  73. E_RESTART=20
  74. # Detect operating system
  75. detect_os() {
  76. if [ -e "/etc/os-release" ]; then
  77. get_os_type=$(grep "^ID=" /etc/os-release | cut -f 2 -d '=')
  78. if [ "$get_os_type" = "ubuntu" ]; then
  79. if [ -e '/usr/bin/lsb_release' ]; then
  80. OS_VERSION="$(lsb_release -s -r)"
  81. OS_TYPE='Ubuntu'
  82. fi
  83. elif [ "$get_os_type" = "debian" ]; then
  84. OS_TYPE='Debian'
  85. OS_VERSION=$(cat /etc/debian_version | grep -o "[0-9]\{1,2\}" | head -n1)
  86. fi
  87. else
  88. OS_TYPE="Unsupported OS"
  89. OS_VERSION="Unknown"
  90. fi
  91. }
  92. # Generate time stamp
  93. new_timestamp() {
  94. time_n_date=$(date +'%T %F')
  95. time=$(echo "$time_n_date" | cut -f 1 -d \ )
  96. date=$(echo "$time_n_date" | cut -f 2 -d \ )
  97. }
  98. # Event string for logger
  99. ARGS=("$@")
  100. for ((I = 1; I <= $#; I++)); do
  101. if [[ "$HIDE" != "$I" ]]; then
  102. ARGUMENTS="$ARGUMENTS '${ARGS[${I} - 1]}'"
  103. else
  104. ARGUMENTS="$ARGUMENTS '******'"
  105. fi
  106. done
  107. # Log event function
  108. log_event() {
  109. if [ -z "$time" ]; then
  110. LOG_TIME="$(date +'%F %T') $(basename $0)"
  111. else
  112. LOG_TIME="$date $time $(basename $0)"
  113. fi
  114. if [ "$1" -eq 0 ]; then
  115. echo "$LOG_TIME $2" >> $HESTIA/log/system.log
  116. else
  117. echo "$LOG_TIME $2 [Error $1]" >> $HESTIA/log/error.log
  118. fi
  119. }
  120. # Log user history
  121. log_history() {
  122. message=${1//\'/\´} # Avoid single quotes broken the log
  123. evt_level=${2:-$event_level}
  124. log_user=${3-$user}
  125. evt_category=${4:-$event_category}
  126. # Set default event level and category if not specified
  127. if [ -z "$evt_level" ]; then
  128. evt_level="Info"
  129. fi
  130. if [ -z "$evt_category" ]; then
  131. evt_category="System"
  132. fi
  133. # Log system events to system log file
  134. if [ "$log_user" = "system" ]; then
  135. log=$HESTIA/log/activity.log
  136. else
  137. if ! $BIN/v-list-user "$log_user" > /dev/null; then
  138. return $E_NOTEXIST
  139. fi
  140. log=$HESTIA/data/users/$log_user/history.log
  141. fi
  142. touch $log
  143. if [ '300' -lt "$(wc -l $log | cut -f 1 -d ' ')" ]; then
  144. tail -n 250 $log > $log.moved
  145. mv -f $log.moved $log
  146. chmod 660 $log
  147. fi
  148. if [ -z "$date" ]; then
  149. time_n_date=$(date +'%T %F')
  150. time=$(echo "$time_n_date" | cut -f 1 -d \ )
  151. date=$(echo "$time_n_date" | cut -f 2 -d \ )
  152. fi
  153. curr_str=$(tail -n1 $log | grep "ID=" --text | cut -f2 -d \')
  154. id="$((curr_str + 1))"
  155. echo "ID='$id' DATE='$date' TIME='$time' LEVEL='$evt_level' CATEGORY='$evt_category' MESSAGE='$message'" >> $log
  156. }
  157. # Result checker
  158. check_result() {
  159. if [ $1 -ne 0 ]; then
  160. local err_code="${3:-$1}"
  161. if [[ -n "$CHECK_RESULT_CALLBACK" && "$(type -t "$CHECK_RESULT_CALLBACK")" == 'function' ]]; then
  162. $CHECK_RESULT_CALLBACK "$err_code" "$2"
  163. else
  164. echo "Error: $2"
  165. log_event "$err_code" "$ARGUMENTS"
  166. fi
  167. exit $err_code
  168. fi
  169. }
  170. # Argument list checker
  171. check_args() {
  172. if [ "$1" -gt "$2" ]; then
  173. echo "Usage: $(basename $0) $3"
  174. check_result "$E_ARGS" "not enought arguments" > /dev/null
  175. fi
  176. }
  177. # Define version check function
  178. version_ge() { test "$(printf '%s\n' "$@" | sort -V | head -n 1)" != "$1" -o -n "$1" -a "$1" = "$2"; }
  179. # Subsystem checker
  180. is_system_enabled() {
  181. if [ -z "$1" ] || [ "$1" = no ]; then
  182. check_result "$E_DISABLED" "$2 is not enabled"
  183. fi
  184. }
  185. # User package check
  186. is_package_full() {
  187. case "$1" in
  188. WEB_DOMAINS) used=$(wc -l $USER_DATA/web.conf) ;;
  189. WEB_ALIASES) used=$(echo $aliases | tr ',' '\n' | wc -l) ;;
  190. DNS_DOMAINS) used=$(wc -l $USER_DATA/dns.conf) ;;
  191. DNS_RECORDS) used=$(wc -l $USER_DATA/dns/$domain.conf) ;;
  192. MAIL_DOMAINS) used=$(wc -l $USER_DATA/mail.conf) ;;
  193. MAIL_ACCOUNTS) used=$(wc -l $USER_DATA/mail/$domain.conf) ;;
  194. DATABASES) used=$(wc -l $USER_DATA/db.conf) ;;
  195. CRON_JOBS) used=$(wc -l $USER_DATA/cron.conf) ;;
  196. esac
  197. used=$(echo "$used" | cut -f 1 -d \ )
  198. limit=$(grep "^$1=" $USER_DATA/user.conf | cut -f 2 -d \')
  199. if [ "$1" = WEB_ALIASES ]; then
  200. # Used is always calculated with the new alias added
  201. if [ "$limit" != 'unlimited' ] && [[ "$used" -gt "$limit" ]]; then
  202. check_result "$E_LIMIT" "$1 limit is reached :: upgrade user package"
  203. fi
  204. else
  205. if [ "$limit" != 'unlimited' ] && [[ "$used" -ge "$limit" ]]; then
  206. check_result "$E_LIMIT" "$1 limit is reached :: upgrade user package"
  207. fi
  208. fi
  209. }
  210. # User owner for reseller plugin
  211. get_user_owner() {
  212. if [ -z "$RESELLER_KEY" ]; then
  213. owner="$ROOT_USER"
  214. else
  215. owner=$(grep "^OWNER" $USER_DATA/user.conf | cut -f 2 -d \')
  216. if [ -z "$owner" ]; then
  217. owner="$ROOT_USER"
  218. fi
  219. fi
  220. }
  221. # Random password generator
  222. generate_password() {
  223. matrix=$1
  224. length=$2
  225. if [ -z "$matrix" ]; then
  226. matrix="A-Za-z0-9"
  227. fi
  228. if [ -z "$length" ]; then
  229. length=16
  230. fi
  231. head /dev/urandom | tr -dc $matrix | head -c$length
  232. }
  233. # Package existence check
  234. is_package_valid() {
  235. if [ -z $1 ]; then
  236. if [ ! -e "$HESTIA/data/packages/$package.pkg" ]; then
  237. check_result "$E_NOTEXIST" "package $package doesn't exist"
  238. fi
  239. else
  240. if [ ! -e "$HESTIA/data/packages/$1.pkg" ]; then
  241. check_result "$E_NOTEXIST" "package $1 doesn't exist"
  242. fi
  243. fi
  244. }
  245. is_package_new() {
  246. if [ -e "$HESTIA/data/packages/$1.pkg" ]; then
  247. echo "Error: package $1 already exists."
  248. log_event "$E_EXISTS" "$ARGUMENTS"
  249. exit "$E_EXISTS"
  250. fi
  251. }
  252. # Validate system type
  253. is_type_valid() {
  254. if [ -z "$(echo $1 | grep -w $2)" ]; then
  255. check_result "$E_INVALID" "$2 type is invalid"
  256. fi
  257. }
  258. # Check user backup settings
  259. is_backup_enabled() {
  260. BACKUPS=$(grep "^BACKUPS=" $USER_DATA/user.conf | cut -f2 -d \')
  261. if [ -z "$BACKUPS" ] || [[ "$BACKUPS" -le '0' ]]; then
  262. check_result "$E_DISABLED" "user backup is disabled"
  263. fi
  264. }
  265. # Check user backup settings
  266. is_backup_scheduled() {
  267. if [ -e "$HESTIA/data/queue/backup.pipe" ]; then
  268. check_q=$(grep " $user " $HESTIA/data/queue/backup.pipe | grep $1)
  269. if [ -n "$check_q" ]; then
  270. check_result "$E_EXISTS" "$1 is already scheduled"
  271. fi
  272. fi
  273. }
  274. # Check if object is new
  275. is_object_new() {
  276. if [ $2 = 'USER' ]; then
  277. if [ -d "$USER_DATA" ]; then
  278. object="OK"
  279. fi
  280. else
  281. object=$(grep "$2='$3'" $USER_DATA/$1.conf)
  282. fi
  283. if [ -n "$object" ]; then
  284. check_result "$E_EXISTS" "$2=$3 already exists"
  285. fi
  286. }
  287. # Check if object is valid
  288. is_object_valid() {
  289. if [ $2 = 'USER' ]; then
  290. tstpath="$(readlink -f "$HESTIA/data/users/$3")"
  291. if [ "$(dirname "$tstpath")" != "$(readlink -f "$HESTIA/data/users")" ] || [ ! -d "$HESTIA/data/users/$3" ]; then
  292. check_result "$E_NOTEXIST" "$1 $3 doesn't exist"
  293. fi
  294. elif [ $2 = 'KEY' ]; then
  295. local key="$(basename "$3")"
  296. if [[ -z "$key" || ${#key} -lt 16 ]] || [[ ! -f "$HESTIA/data/access-keys/${key}" && ! -f "$HESTIA/data/access-keys/$key" ]]; then
  297. check_result "$E_NOTEXIST" "$1 $3 doesn't exist"
  298. fi
  299. else
  300. object=$(grep "$2='$3'" $HESTIA/data/users/$user/$1.conf)
  301. if [ -z "$object" ]; then
  302. arg1=$(basename $1)
  303. arg2=$(echo $2 | tr '[:upper:]' '[:lower:]')
  304. check_result "$E_NOTEXIST" "$arg1 $arg2 $3 doesn't exist"
  305. fi
  306. fi
  307. }
  308. # Check if a object string with key values pairs has the correct format and load it afterwards
  309. parse_object_kv_list_non_eval() {
  310. local str
  311. local objkv obj_key obj_val
  312. local OLD_IFS="$IFS"
  313. str=${@//$'\n'/ }
  314. str=${str//\"/\\\"}
  315. str=${str//$/\\$}
  316. IFS=$'\n'
  317. # Extract and loop trough each key-value pair. (Regex test: https://regex101.com/r/eiMufk/5)
  318. for objkv in $(echo "$str" | perl -n -e "while(/\b([a-zA-Z]+[\w]*)='(.*?)'(\s|\$)/g) {print \$1.'='.\$2 . \"\n\" }"); do
  319. if ! [[ "$objkv" =~ ^([[:alnum:]][_[:alnum:]]{0,64}[[:alnum:]])=(\'?[^\']+?\'?)?$ ]]; then
  320. check_result "$E_INVALID" "Invalid key value format [$objkv]"
  321. fi
  322. obj_key=${objkv%%=*} # strip everything after first '=' char
  323. obj_val=${objkv#*=} # strip everything before first '=' char
  324. declare -g $obj_key="$obj_val"
  325. done
  326. IFS="$OLD_IFS"
  327. }
  328. # Check if a object string with key values pairs has the correct format and load it afterwards
  329. parse_object_kv_list() {
  330. local str
  331. local objkv
  332. local suboutput
  333. local OLD_IFS="$IFS"
  334. str=${@//$'\n'/ }
  335. str=${str//\"/\\\"}
  336. str=${str//$/\\$}
  337. IFS=$'\n'
  338. suboutput=$(setpriv --clear-groups --reuid nobody --regid nogroup bash -c "PS4=''; set -xe; eval \"${str}\"" 2>&1)
  339. check_result $? "Invalid object format: ${str}" $E_INVALID
  340. for objkv in $suboutput; do
  341. if [[ "$objkv" =~ ^'eval ' ]]; then
  342. continue
  343. fi
  344. if ! [[ "$objkv" =~ ^([[:alnum:]][_[:alnum:]]{0,64}[[:alnum:]])=(\'?[^\']+?\'?)?$ ]]; then
  345. check_result "$E_INVALID" "Invalid key value format [$objkv]"
  346. fi
  347. eval "$objkv"
  348. done
  349. IFS="$OLD_IFS"
  350. }
  351. # Check if object is supended
  352. is_object_suspended() {
  353. if [ $2 = 'USER' ]; then
  354. spnd=$(cat $USER_DATA/$1.conf | grep "SUSPENDED='yes'")
  355. else
  356. spnd=$(grep "$2='$3'" $USER_DATA/$1.conf | grep "SUSPENDED='yes'")
  357. fi
  358. if [ -z "$spnd" ]; then
  359. check_result "$E_UNSUSPENDED" "$(basename $1) $3 is not suspended"
  360. fi
  361. }
  362. # Check if object is unsupended
  363. is_object_unsuspended() {
  364. if [ $2 = 'USER' ]; then
  365. spnd=$(cat $USER_DATA/$1.conf | grep "SUSPENDED='yes'")
  366. else
  367. spnd=$(grep "$2='$3'" $USER_DATA/$1.conf | grep "SUSPENDED='yes'")
  368. fi
  369. if [ -n "$spnd" ]; then
  370. check_result "$E_SUSPENDED" "$(basename $1) $3 is suspended"
  371. fi
  372. }
  373. # Check if object value is empty
  374. is_object_value_empty() {
  375. str=$(grep "$2='$3'" $USER_DATA/$1.conf)
  376. parse_object_kv_list "$str"
  377. eval value=$4
  378. if [ -n "$value" ] && [ "$value" != 'no' ]; then
  379. check_result "$E_EXISTS" "${4//$/}=$value already exists"
  380. fi
  381. }
  382. # Check if object value is empty
  383. is_object_value_exist() {
  384. str=$(grep "$2='$3'" $USER_DATA/$1.conf)
  385. parse_object_kv_list "$str"
  386. eval value=$4
  387. if [ -z "$value" ] || [ "$value" = 'no' ]; then
  388. check_result "$E_NOTEXIST" "${4//$/}=$value doesn't exist"
  389. fi
  390. }
  391. # Check if password is transmitted via file
  392. is_password_valid() {
  393. if [[ "$password" =~ ^/tmp/ ]]; then
  394. if ! [[ "$password" == *../* ]]; then
  395. if [ -f "$password" ]; then
  396. password="$(head -n1 $password)"
  397. fi
  398. fi
  399. fi
  400. }
  401. # Check if hash is transmitted via file
  402. is_hash_valid() {
  403. if [[ "$hash" =~ ^/tmp/ ]]; then
  404. if ! [[ "$hash" == *../* ]]; then
  405. if [ -f "$hash" ]; then
  406. hash="$(head -n1 $hash)"
  407. fi
  408. fi
  409. fi
  410. }
  411. # Check if directory is a symlink
  412. is_dir_symlink() {
  413. if [[ -L "$1" ]]; then
  414. check_result "$E_FORBIDEN" "$1 directory is a symlink"
  415. fi
  416. }
  417. # Get object value
  418. get_object_value() {
  419. object=$(grep "$2='$3'" $USER_DATA/$1.conf)
  420. parse_object_kv_list "$object"
  421. eval echo $4
  422. }
  423. get_object_values() {
  424. parse_object_kv_list $(grep "$2='$3'" $USER_DATA/$1.conf)
  425. }
  426. # Update object value
  427. update_object_value() {
  428. row=$(grep -nF "$2='$3'" $USER_DATA/$1.conf)
  429. lnr=$(echo $row | cut -f 1 -d ':')
  430. object=$(echo $row | sed "s/^$lnr://")
  431. parse_object_kv_list "$object"
  432. eval old="$4"
  433. old=$(echo "$old" | sed -e 's/\\/\\\\/g' -e 's/&/\\&/g' -e 's/\//\\\//g')
  434. new=$(echo "$5" | sed -e 's/\\/\\\\/g' -e 's/&/\\&/g' -e 's/\//\\\//g')
  435. sed -i "$lnr s/${4//$/}='${old//\*/\\*}'/${4//$/}='${new//\*/\\*}'/g" \
  436. $USER_DATA/$1.conf
  437. }
  438. # Add object key
  439. add_object_key() {
  440. row=$(grep -n "$2='$3'" $USER_DATA/$1.conf)
  441. lnr=$(echo $row | cut -f 1 -d ':')
  442. object=$(echo $row | sed "s/^$lnr://")
  443. if [ -z "$(echo $object | grep $4=)" ]; then
  444. eval old="$4"
  445. sed -i "$lnr s/$5='/$4='' $5='/" $USER_DATA/$1.conf
  446. fi
  447. }
  448. # Search objects
  449. search_objects() {
  450. OLD_IFS="$IFS"
  451. IFS=$'\n'
  452. if [ -f $USER_DATA/$1.conf ]; then
  453. for line in $(grep $2=\'$3\' $USER_DATA/$1.conf); do
  454. parse_object_kv_list "$line"
  455. eval echo \$$4
  456. done
  457. fi
  458. IFS="$OLD_IFS"
  459. }
  460. # Get user value
  461. get_user_value() {
  462. grep "^${1//$/}=" $USER_DATA/user.conf | head -1 | awk -F "'" '{print $2}'
  463. }
  464. # Update user value in user.conf
  465. update_user_value() {
  466. key="${2//$/}"
  467. lnr=$(grep -n "^$key='" $HESTIA/data/users/$1/user.conf | cut -f 1 -d ':')
  468. if [ -n "$lnr" ]; then
  469. sed -i "$lnr d" $HESTIA/data/users/$1/user.conf
  470. sed -i "$lnr i\\$key='${3}'" $HESTIA/data/users/$1/user.conf
  471. fi
  472. }
  473. # Increase user counter
  474. increase_user_value() {
  475. key="${2//$/}"
  476. factor="${3-1}"
  477. conf="$HESTIA/data/users/$1/user.conf"
  478. old=$(grep "$key=" $conf | cut -f 2 -d \')
  479. if [ -z "$old" ]; then
  480. old=0
  481. fi
  482. new=$((old + factor))
  483. sed -i "s/$key='$old'/$key='$new'/g" $conf
  484. }
  485. # Decrease user counter
  486. decrease_user_value() {
  487. key="${2//$/}"
  488. factor="${3-1}"
  489. conf="$HESTIA/data/users/$1/user.conf"
  490. old=$(grep "$key=" $conf | cut -f 2 -d \')
  491. if [ -z "$old" ]; then
  492. old=0
  493. fi
  494. if [ "$old" -le 1 ]; then
  495. new=0
  496. else
  497. new=$((old - factor))
  498. fi
  499. if [ "$new" -lt 0 ]; then
  500. new=0
  501. fi
  502. sed -i "s/$key='$old'/$key='$new'/g" $conf
  503. }
  504. # Notify user
  505. send_notice() {
  506. topic=$1
  507. notice=$2
  508. if [ "$notify" = 'yes' ]; then
  509. touch $USER_DATA/notifications.conf
  510. chmod 660 $USER_DATA/notifications.conf
  511. time_n_date=$(date +'%T %F')
  512. time=$(echo "$time_n_date" | cut -f 1 -d \ )
  513. date=$(echo "$time_n_date" | cut -f 2 -d \ )
  514. nid=$(grep "NID=" $USER_DATA/notifications.conf | cut -f 2 -d \')
  515. nid=$(echo "$nid" | sort -n | tail -n1)
  516. if [ -n "$nid" ]; then
  517. nid="$((nid + 1))"
  518. else
  519. nid=1
  520. fi
  521. str="NID='$nid' TOPIC='$topic' NOTICE='$notice' TYPE='$type'"
  522. str="$str ACK='no' TIME='$time' DATE='$date'"
  523. echo "$str" >> $USER_DATA/notifications.conf
  524. if [ -z "$(grep NOTIFICATIONS $USER_DATA/user.conf)" ]; then
  525. sed -i "s/^TIME/NOTIFICATIONS='yes'\nTIME/g" $USER_DATA/user.conf
  526. else
  527. update_user_value "$user" '$NOTIFICATIONS' "yes"
  528. fi
  529. fi
  530. }
  531. # Recalculate U_DISK value
  532. recalc_user_disk_usage() {
  533. u_usage=0
  534. if [ -f "$USER_DATA/web.conf" ]; then
  535. usage=0
  536. dusage=$(grep 'U_DISK=' $USER_DATA/web.conf \
  537. | awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  538. for disk_usage in $dusage; do
  539. usage=$((usage + disk_usage))
  540. done
  541. d=$(grep "U_DISK_WEB='" $USER_DATA/user.conf | cut -f 2 -d \')
  542. sed -i "s/U_DISK_WEB='$d'/U_DISK_WEB='$usage'/g" $USER_DATA/user.conf
  543. u_usage=$((u_usage + usage))
  544. fi
  545. if [ -f "$USER_DATA/mail.conf" ]; then
  546. usage=0
  547. dusage=$(grep 'U_DISK=' $USER_DATA/mail.conf \
  548. | awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  549. for disk_usage in $dusage; do
  550. usage=$((usage + disk_usage))
  551. done
  552. d=$(grep "U_DISK_MAIL='" $USER_DATA/user.conf | cut -f 2 -d \')
  553. sed -i "s/U_DISK_MAIL='$d'/U_DISK_MAIL='$usage'/g" $USER_DATA/user.conf
  554. u_usage=$((u_usage + usage))
  555. fi
  556. if [ -f "$USER_DATA/db.conf" ]; then
  557. usage=0
  558. dusage=$(grep 'U_DISK=' $USER_DATA/db.conf \
  559. | awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  560. for disk_usage in $dusage; do
  561. usage=$((usage + disk_usage))
  562. done
  563. d=$(grep "U_DISK_DB='" $USER_DATA/user.conf | cut -f 2 -d \')
  564. sed -i "s/U_DISK_DB='$d'/U_DISK_DB='$usage'/g" $USER_DATA/user.conf
  565. u_usage=$((u_usage + usage))
  566. fi
  567. usage=$(grep 'U_DISK_DIRS=' $USER_DATA/user.conf | cut -f 2 -d "'")
  568. u_usage=$((u_usage + usage))
  569. old=$(grep "U_DISK='" $USER_DATA/user.conf | cut -f 2 -d \')
  570. sed -i "s/U_DISK='$old'/U_DISK='$u_usage'/g" $USER_DATA/user.conf
  571. }
  572. # Recalculate U_BANDWIDTH value
  573. recalc_user_bandwidth_usage() {
  574. usage=0
  575. bandwidth_usage=$(grep 'U_BANDWIDTH=' $USER_DATA/web.conf \
  576. | awk -F "U_BANDWIDTH='" '{print $2}' | cut -f 1 -d \')
  577. for bandwidth in $bandwidth_usage; do
  578. usage=$((usage + bandwidth))
  579. done
  580. old=$(grep "U_BANDWIDTH='" $USER_DATA/user.conf | cut -f 2 -d \')
  581. sed -i "s/U_BANDWIDTH='$old'/U_BANDWIDTH='$usage'/g" $USER_DATA/user.conf
  582. }
  583. # Get next cron job id
  584. get_next_cronjob() {
  585. if [ -z "$job" ]; then
  586. curr_str=$(grep "JOB=" $USER_DATA/cron.conf | cut -f 2 -d \' \
  587. | sort -n | tail -n1)
  588. job="$((curr_str + 1))"
  589. fi
  590. }
  591. # Sort cron jobs by id
  592. sort_cron_jobs() {
  593. cat $USER_DATA/cron.conf | sort -n -k 2 -t \' > $USER_DATA/cron.tmp
  594. mv -f $USER_DATA/cron.tmp $USER_DATA/cron.conf
  595. }
  596. # Sync cronjobs with system cron
  597. sync_cron_jobs() {
  598. source_conf "$USER_DATA/user.conf"
  599. if [ -e "/var/spool/cron/crontabs" ]; then
  600. crontab="/var/spool/cron/crontabs/$user"
  601. else
  602. crontab="/var/spool/cron/$user"
  603. fi
  604. # remove file if exists
  605. if [ -e "$crontab" ]; then
  606. rm -f $crontab
  607. fi
  608. # touch new crontab file
  609. touch $crontab
  610. if [ "$CRON_REPORTS" = 'yes' ]; then
  611. echo "MAILTO=$CONTACT" > $crontab
  612. echo 'CONTENT_TYPE="text/plain; charset=utf-8"' >> $crontab
  613. else
  614. echo 'MAILTO=""' > $crontab
  615. fi
  616. while read line; do
  617. parse_object_kv_list "$line"
  618. if [ "$SUSPENDED" = 'no' ]; then
  619. echo "$MIN $HOUR $DAY $MONTH $WDAY $CMD" \
  620. | sed -e "s/%quote%/'/g" -e "s/%dots%/:/g" \
  621. >> $crontab
  622. fi
  623. done < $USER_DATA/cron.conf
  624. chown $user:$user $crontab
  625. chmod 600 $crontab
  626. }
  627. # Validates Local part email and mail alias
  628. is_localpart_format_valid() {
  629. if [ ${#1} -eq 1 ]; then
  630. if ! [[ "$1" =~ ^^[[:alnum:]]$ ]]; then
  631. check_result "$E_INVALID" "invalid $2 format :: $1"
  632. fi
  633. else
  634. if [ -n "$3" ]; then
  635. maxlenght=$(($3 - 2))
  636. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,$maxlenght}[[:alnum:]]$ ]]; then
  637. check_result "$E_INVALID" "invalid $2 format :: $1"
  638. fi
  639. else
  640. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,28}[[:alnum:]]$ ]]; then
  641. check_result "$E_INVALID" "invalid $2 format :: $1"
  642. fi
  643. fi
  644. fi
  645. if [ "$1" != "${1//[^[:ascii:]]/}" ]; then
  646. check_result "$E_INVALID" "invalid $2 format :: $1"
  647. fi
  648. }
  649. # Username / ftp username format validator
  650. is_user_format_valid() {
  651. if [ ${#1} -eq 1 ]; then
  652. if ! [[ "$1" =~ ^^[[:alnum:]]$ ]]; then
  653. check_result "$E_INVALID" "invalid $2 format :: $1"
  654. fi
  655. else
  656. if [ -n "$3" ]; then
  657. maxlenght=$(($3 - 2))
  658. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,$maxlenght}[[:alnum:]]$ ]]; then
  659. check_result "$E_INVALID" "invalid $2 format :: $1"
  660. fi
  661. else
  662. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,28}[[:alnum:]]$ ]]; then
  663. check_result "$E_INVALID" "invalid $2 format :: $1"
  664. fi
  665. fi
  666. fi
  667. if [ "$1" != "${1//[^[:ascii:]]/}" ]; then
  668. check_result "$E_INVALID" "invalid $2 format :: $1"
  669. fi
  670. # Only for new users
  671. if [[ "$FROM_V_ADD_USER" == "true" ]]; then
  672. if ! [[ "$1" =~ ^[a-zA-Z][-|.|_[:alnum:]]{0,28}[[:alnum:]]$ ]]; then
  673. check_result "$E_INVALID" "invalid $2 format :: $1"
  674. fi
  675. fi
  676. }
  677. # Domain format validator
  678. is_domain_format_valid() {
  679. object_name=${2-domain}
  680. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|_|/|\|\"|'|;|%|\`| ]"
  681. if [[ $1 =~ $exclude ]] || [[ $1 =~ ^[0-9]+$ ]] || [[ $1 =~ \.\. ]] || [[ $1 =~ $(printf '\t') ]] || [[ "$1" = "www" ]]; then
  682. check_result "$E_INVALID" "invalid $object_name format :: $1"
  683. fi
  684. is_no_new_line_format "$1"
  685. }
  686. # Alias forman validator
  687. is_alias_format_valid() {
  688. for object in ${1//,/ }; do
  689. exclude="[!|@|#|$|^|&|(|)|+|=|{|}|:|<|>|?|_|/|\|\"|'|;|%|\`| ]"
  690. if [[ "$object" =~ $exclude ]]; then
  691. check_result "$E_INVALID" "invalid alias format :: $object"
  692. fi
  693. if [[ "$object" =~ [*] ]] && ! [[ "$object" =~ ^[*]\..* ]]; then
  694. check_result "$E_INVALID" "invalid alias format :: $object"
  695. fi
  696. done
  697. }
  698. # IP format validator
  699. is_ip_format_valid() {
  700. object_name=${2-ip}
  701. ip_regex='([1-9]?[0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])'
  702. ip_clean=$(echo "${1%/*}")
  703. if ! [[ $ip_clean =~ ^$ip_regex\.$ip_regex\.$ip_regex\.$ip_regex$ ]]; then
  704. check_result "$E_INVALID" "invalid $object_name format :: $1"
  705. fi
  706. if [ $1 != "$ip_clean" ]; then
  707. ip_cidr="$ip_clean/"
  708. ip_cidr=$(echo "${1#$ip_cidr}")
  709. if [[ "$ip_cidr" -gt 32 ]] || [[ "$ip_cidr" =~ [:alnum:] ]]; then
  710. check_result "$E_INVALID" "invalid $object_name format :: $1"
  711. fi
  712. fi
  713. }
  714. # IPv6 format validator
  715. is_ipv6_format_valid() {
  716. object_name=${2-ipv6}
  717. ip_regex='([1-9]?[0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])'
  718. t_ip=$(echo $1 | awk -F / '{print $1}')
  719. t_cidr=$(echo $1 | awk -F / '{print $2}')
  720. valid_cidr=1
  721. WORD="[0-9A-Fa-f]\{1,4\}"
  722. # flat address, no compressed words
  723. FLAT="^${WORD}\(:${WORD}\)\{7\}$"
  724. COMP2="^\(${WORD}:\)\{1,1\}\(:${WORD}\)\{1,6\}$"
  725. COMP3="^\(${WORD}:\)\{1,2\}\(:${WORD}\)\{1,5\}$"
  726. COMP4="^\(${WORD}:\)\{1,3\}\(:${WORD}\)\{1,4\}$"
  727. COMP5="^\(${WORD}:\)\{1,4\}\(:${WORD}\)\{1,3\}$"
  728. COMP6="^\(${WORD}:\)\{1,5\}\(:${WORD}\)\{1,2\}$"
  729. COMP7="^\(${WORD}:\)\{1,6\}\(:${WORD}\)\{1,1\}$"
  730. # trailing :: edge case, includes case of only :: (all 0's)
  731. EDGE_TAIL="^\(\(${WORD}:\)\{1,7\}\|:\):$"
  732. # leading :: edge case
  733. EDGE_LEAD="^:\(:${WORD}\)\{1,7\}$"
  734. echo $t_ip | grep --silent "\(${FLAT}\)\|\(${COMP2}\)\|\(${COMP3}\)\|\(${COMP4}\)\|\(${COMP5}\)\|\(${COMP6}\)\|\(${COMP7}\)\|\(${EDGE_TAIL}\)\|\(${EDGE_LEAD}\)"
  735. if [ $? -ne 0 ]; then
  736. check_result "$E_INVALID" "invalid $object_name format :: $1"
  737. fi
  738. if [ -n "$(echo $1 | grep '/')" ]; then
  739. if [[ "$t_cidr" -lt 0 ]] || [[ "$t_cidr" -gt 128 ]]; then
  740. valid_cidr=0
  741. fi
  742. if ! [[ "$t_cidr" =~ ^[0-9]+$ ]]; then
  743. valid_cidr=0
  744. fi
  745. fi
  746. if [ "$valid_cidr" -eq 0 ]; then
  747. check_result "$E_INVALID" "invalid $object_name format :: $1"
  748. fi
  749. }
  750. is_ip46_format_valid() {
  751. t_ip=$(echo $1 | awk -F / '{print $1}')
  752. t_cidr=$(echo $1 | awk -F / '{print $2}')
  753. valid_octets=0
  754. valid_cidr=1
  755. for octet in ${t_ip//./ }; do
  756. if [[ $octet =~ ^[0-9]{1,3}$ ]] && [[ $octet -le 255 ]]; then
  757. ((++valid_octets))
  758. fi
  759. done
  760. if [ -n "$(echo $1 | grep '/')" ]; then
  761. if [[ "$t_cidr" -lt 0 ]] || [[ "$t_cidr" -gt 32 ]]; then
  762. valid_cidr=0
  763. fi
  764. if ! [[ "$t_cidr" =~ ^[0-9]+$ ]]; then
  765. valid_cidr=0
  766. fi
  767. fi
  768. if [ "$valid_octets" -lt 4 ] || [ "$valid_cidr" -eq 0 ]; then
  769. #Check IPV6
  770. ipv6_valid=""
  771. WORD="[0-9A-Fa-f]\{1,4\}"
  772. # flat address, no compressed words
  773. FLAT="^${WORD}\(:${WORD}\)\{7\}$"
  774. COMP2="^\(${WORD}:\)\{1,1\}\(:${WORD}\)\{1,6\}$"
  775. COMP3="^\(${WORD}:\)\{1,2\}\(:${WORD}\)\{1,5\}$"
  776. COMP4="^\(${WORD}:\)\{1,3\}\(:${WORD}\)\{1,4\}$"
  777. COMP5="^\(${WORD}:\)\{1,4\}\(:${WORD}\)\{1,3\}$"
  778. COMP6="^\(${WORD}:\)\{1,5\}\(:${WORD}\)\{1,2\}$"
  779. COMP7="^\(${WORD}:\)\{1,6\}\(:${WORD}\)\{1,1\}$"
  780. # trailing :: edge case, includes case of only :: (all 0's)
  781. EDGE_TAIL="^\(\(${WORD}:\)\{1,7\}\|:\):$"
  782. # leading :: edge case
  783. EDGE_LEAD="^:\(:${WORD}\)\{1,7\}$"
  784. echo $t_ip | grep --silent "\(${FLAT}\)\|\(${COMP2}\)\|\(${COMP3}\)\|\(${COMP4}\)\|\(${COMP5}\)\|\(${COMP6}\)\|\(${COMP7}\)\|\(${EDGE_TAIL}\)\|\(${EDGE_LEAD}\)"
  785. if [ $? -ne 0 ]; then
  786. ipv6_valid="INVALID"
  787. fi
  788. if [ -n "$(echo $1 | grep '/')" ]; then
  789. if [[ "$t_cidr" -lt 0 ]] || [[ "$t_cidr" -gt 128 ]]; then
  790. valid_cidr=0
  791. fi
  792. if ! [[ "$t_cidr" =~ ^[0-9]+$ ]]; then
  793. valid_cidr=0
  794. fi
  795. fi
  796. if [ -n "$ipv6_valid" ] || [ "$valid_cidr" -eq 0 ]; then
  797. check_result "$E_INVALID" "invalid IP format :: $1"
  798. fi
  799. fi
  800. }
  801. # Proxy extention format validator
  802. is_extention_format_valid() {
  803. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|@|<|>|?|/|\|\"|'|;|%|\`| ]"
  804. if [[ "$1" =~ $exclude ]]; then
  805. check_result "$E_INVALID" "invalid proxy extention format :: $1"
  806. fi
  807. is_no_new_line_format "$1"
  808. }
  809. # Number format validator
  810. is_number_format_valid() {
  811. object_name=${2-number}
  812. if ! [[ "$1" =~ ^[0-9]+$ ]]; then
  813. check_result "$E_INVALID" "invalid $object_name format :: $1"
  814. fi
  815. }
  816. # Autoreply format validator
  817. is_autoreply_format_valid() {
  818. if [ 10240 -le ${#1} ]; then
  819. check_result "$E_INVALID" "invalid autoreply format :: $1"
  820. fi
  821. }
  822. # Boolean format validator
  823. is_boolean_format_valid() {
  824. if [ "$1" != 'yes' ] && [ "$1" != 'no' ]; then
  825. check_result "$E_INVALID" "invalid $2 format :: $1"
  826. fi
  827. }
  828. # Refresh IPset format validator
  829. is_refresh_ipset_format_valid() {
  830. if [ "$1" != 'load' ] && [ "$1" != 'yes' ] && [ "$1" != 'no' ]; then
  831. check_result "$E_INVALID" "invalid $2 format :: $1"
  832. fi
  833. }
  834. # Common format validator
  835. is_common_format_valid() {
  836. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|<|>|?|/|\|\"|'|;|%|\`| ]"
  837. if [[ "$1" =~ $exclude ]]; then
  838. check_result "$E_INVALID" "invalid $2 format :: $1"
  839. fi
  840. if [ 400 -le ${#1} ]; then
  841. check_result "$E_INVALID" "invalid $2 format :: $1"
  842. fi
  843. if [[ "$1" =~ @ ]] && [ ${#1} -gt 1 ]; then
  844. check_result "$E_INVALID" "invalid $2 format :: $1"
  845. fi
  846. if [[ $1 =~ \* ]]; then
  847. if [[ "$(echo $1 | grep -o '\*\.' | wc -l)" -eq 0 ]] && [[ $1 != '*' ]]; then
  848. check_result "$E_INVALID" "invalid $2 format :: $1"
  849. fi
  850. fi
  851. if [[ $(echo -n "$1" | tail -c 1) =~ [^a-zA-Z0-9_*@.] ]]; then
  852. check_result "$E_INVALID" "invalid $2 format :: $1"
  853. fi
  854. if [[ $(echo -n "$1" | grep -c '\.\.') -gt 0 ]]; then
  855. check_result "$E_INVALID" "invalid $2 format :: $1"
  856. fi
  857. if [[ $(echo -n "$1" | head -c 1) =~ [^a-zA-Z0-9_*@] ]]; then
  858. check_result "$E_INVALID" "invalid $2 format :: $1"
  859. fi
  860. if [[ $(echo -n "$1" | grep -c '\-\-') -gt 0 ]]; then
  861. check_result "$E_INVALID" "invalid $2 format :: $1"
  862. fi
  863. if [[ $(echo -n "$1" | grep -c '\_\_') -gt 0 ]]; then
  864. check_result "$E_INVALID" "invalid $2 format :: $1"
  865. fi
  866. is_no_new_line_format "$1"
  867. }
  868. is_no_new_line_format() {
  869. test=$(echo "$1" | head -n1)
  870. if [[ "$test" != "$1" ]]; then
  871. check_result "$E_INVALID" "invalid value :: $1"
  872. fi
  873. }
  874. is_string_format_valid() {
  875. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|<|>|?|/|\|\"|'|;|%|\`]"
  876. if [[ "$1" =~ $exclude ]]; then
  877. check_result "$E_INVALID" "invalid $2 format :: $1"
  878. fi
  879. is_no_new_line_format "$1"
  880. }
  881. # Database format validator
  882. is_database_format_valid() {
  883. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|/|\|\"|'|;|%|\`| ]"
  884. if [[ "$1" =~ $exclude ]] || [ 64 -le ${#1} ]; then
  885. check_result "$E_INVALID" "invalid $2 format :: $1"
  886. fi
  887. is_no_new_line_format "$1"
  888. }
  889. # Date format validator
  890. is_date_format_valid() {
  891. if ! [[ "$1" =~ ^[0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9]$ ]]; then
  892. check_result "$E_INVALID" "invalid date format :: $1"
  893. fi
  894. }
  895. # Database user validator
  896. is_dbuser_format_valid() {
  897. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|/|\|\"|'|;|%|\`| ]"
  898. if [ 33 -le ${#1} ]; then
  899. check_result "$E_INVALID" "mysql username can be up to 32 characters long"
  900. fi
  901. if [[ "$1" =~ $exclude ]]; then
  902. check_result "$E_INVALID" "invalid $2 format :: $1"
  903. fi
  904. is_no_new_line_format "$1"
  905. }
  906. # DNS record type validator
  907. is_dns_type_format_valid() {
  908. known_dnstype='A,AAAA,NS,CNAME,MX,TXT,SRV,DNSKEY,KEY,IPSECKEY,PTR,SPF,TLSA,CAA,DS'
  909. if [ -z "$(echo $known_dnstype | grep -w $1)" ]; then
  910. check_result "$E_INVALID" "invalid dns record type format :: $1"
  911. fi
  912. }
  913. # DNS record validator
  914. is_dns_record_format_valid() {
  915. if [ "$rtype" = 'A' ]; then
  916. is_ip_format_valid "$1"
  917. fi
  918. if [ "$rtype" = 'NS' ]; then
  919. is_domain_format_valid "${1::-1}" 'ns_record'
  920. fi
  921. if [ "$rtype" = 'MX' ]; then
  922. is_domain_format_valid "${1::-1}" 'mx_record'
  923. is_int_format_valid "$priority" 'priority_record'
  924. fi
  925. if [ "$rtype" = 'SRV' ]; then
  926. format_no_quotes "$priority" 'priority_record'
  927. fi
  928. is_no_new_line_format "$1"
  929. }
  930. # Email format validator
  931. is_email_format_valid() {
  932. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.[A-Za-z]{2,63}$ ]]; then
  933. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.(xn--)[[:alnum:]]{2,63}$ ]]; then
  934. check_result "$E_INVALID" "invalid email format :: $1"
  935. fi
  936. fi
  937. }
  938. # Firewall action validator
  939. is_fw_action_format_valid() {
  940. if [ "$1" != "ACCEPT" ] && [ "$1" != 'DROP' ]; then
  941. check_result "$E_INVALID" "invalid action format :: $1"
  942. fi
  943. }
  944. # Firewall protocol validator
  945. is_fw_protocol_format_valid() {
  946. if [ "$1" != "ICMP" ] && [ "$1" != 'UDP' ] && [ "$1" != 'TCP' ]; then
  947. check_result "$E_INVALID" "invalid protocol format :: $1"
  948. fi
  949. }
  950. # Firewall port validator
  951. is_fw_port_format_valid() {
  952. if [ "${#1}" -eq 1 ]; then
  953. if ! [[ "$1" =~ [0-9] ]]; then
  954. check_result "$E_INVALID" "invalid port format :: $1"
  955. fi
  956. else
  957. if ! [[ "$1" =~ ^[0-9][-|,|:|0-9]{0,76}[0-9]$ ]]; then
  958. check_result "$E_INVALID" "invalid port format and/or more than 78 chars used :: $1"
  959. fi
  960. fi
  961. }
  962. # DNS record id validator
  963. is_id_format_valid() {
  964. if ! echo "$1" | grep -qE '^[1-9][0-9]{0,}$'; then
  965. check_result "$E_INVALID" "invalid $2 format :: $1"
  966. fi
  967. }
  968. # Integer validator
  969. is_int_format_valid() {
  970. if ! [[ "$1" =~ ^[0-9]+$ ]]; then
  971. check_result "$E_INVALID" "invalid $2 format :: $1"
  972. fi
  973. }
  974. # Interface validator
  975. is_interface_format_valid() {
  976. nic_names="$(ip -d -j link show | jq -r '.[] | if .link_type == "loopback" then empty else .ifname, if .altnames then .altnames[] else empty end end')"
  977. if [ -z "$(echo "$nic_names" | grep -x "$1")" ]; then
  978. check_result "$E_INVALID" "invalid interface format :: $1"
  979. fi
  980. }
  981. # IP status validator
  982. is_ip_status_format_valid() {
  983. if [ -z "$(echo shared,dedicated | grep -w "$1")" ]; then
  984. check_result "$E_INVALID" "invalid status format :: $1"
  985. fi
  986. }
  987. # Cron validator
  988. is_cron_format_valid() {
  989. limit=59
  990. check_format=''
  991. if [ "$2" = 'hour' ]; then
  992. limit=23
  993. fi
  994. if [ "$2" = 'day' ]; then
  995. limit=31
  996. fi
  997. if [ "$2" = 'month' ]; then
  998. limit=12
  999. fi
  1000. if [ "$2" = 'wday' ]; then
  1001. limit=7
  1002. fi
  1003. if [ "$1" = '*' ]; then
  1004. check_format='ok'
  1005. fi
  1006. if [[ "$1" =~ ^[\*]+[/]+[0-9] ]]; then
  1007. if [ "$(echo $1 | cut -f 2 -d /)" -lt $limit ]; then
  1008. check_format='ok'
  1009. fi
  1010. fi
  1011. if [[ "$1" =~ ^[0-9][-|,|0-9]{0,70}[\/][0-9]$ ]]; then
  1012. check_format='ok'
  1013. crn_values=${1//,/ }
  1014. crn_values=${crn_values//-/ }
  1015. crn_values=${crn_values//\// }
  1016. for crn_vl in $crn_values; do
  1017. if [ "$crn_vl" -gt $limit ]; then
  1018. check_format='invalid'
  1019. fi
  1020. done
  1021. fi
  1022. crn_values=$(echo $1 | tr "," " " | tr "-" " ")
  1023. for crn_vl in $crn_values; do
  1024. if [[ "$crn_vl" =~ ^[0-9]+$ ]] && [ "$crn_vl" -le $limit ]; then
  1025. check_format='ok'
  1026. fi
  1027. done
  1028. if [ "$check_format" != 'ok' ]; then
  1029. check_result "$E_INVALID" "invalid $2 format :: $1"
  1030. fi
  1031. }
  1032. is_object_name_format_valid() {
  1033. if ! [[ "$1" =~ ^[-|\ |\.|_[:alnum:]]{0,50}$ ]]; then
  1034. check_result "$E_INVALID" "invalid $2 format :: $1"
  1035. fi
  1036. }
  1037. # Name validator
  1038. is_name_format_valid() {
  1039. exclude="['|\"|<|>]"
  1040. if [[ "$1" =~ $exclude ]]; then
  1041. check_result "$E_INVALID" "Invalid $2 contains qoutes (\" or ') :: $1"
  1042. fi
  1043. is_no_new_line_format "$1"
  1044. }
  1045. # Object validator
  1046. is_object_format_valid() {
  1047. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,64}[[:alnum:]]$ ]]; then
  1048. check_result "$E_INVALID" "invalid $2 format :: $1"
  1049. fi
  1050. }
  1051. # Role validator
  1052. is_role_valid() {
  1053. if ! [[ "$1" =~ ^admin$|^user$|^dns-cluster$ ]]; then
  1054. check_result "$E_INVALID" "invalid $2 format :: $1"
  1055. fi
  1056. }
  1057. # Password validator
  1058. is_password_format_valid() {
  1059. if [ "${#1}" -lt '6' ]; then
  1060. check_result "$E_INVALID" "invalid password format :: $1"
  1061. fi
  1062. }
  1063. # Missing function -
  1064. # Before: validate_format_shell
  1065. # After: is_format_valid_shell
  1066. is_format_valid_shell() {
  1067. if [ -z "$(grep -w $1 /etc/shells)" ]; then
  1068. echo "Error: shell $1 is not valid"
  1069. log_event "$E_INVALID" "$EVENT"
  1070. exit $E_INVALID
  1071. fi
  1072. }
  1073. # Service name validator
  1074. is_service_format_valid() {
  1075. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,64}$ ]]; then
  1076. check_result "$E_INVALID" "invalid $2 format :: $1"
  1077. fi
  1078. }
  1079. is_hash_format_valid() {
  1080. if ! [[ "$1" =~ ^[[:alnum:]|\:|\=|_|-]{1,80}$ ]]; then
  1081. check_result "$E_INVALID" "invalid $2 format :: $1"
  1082. fi
  1083. }
  1084. # Format validation controller
  1085. is_format_valid() {
  1086. for arg_name in $*; do
  1087. eval arg=\$$arg_name
  1088. if [ -n "$arg" ]; then
  1089. case $arg_name in
  1090. access_key_id) is_access_key_id_format_valid "$arg" "$arg_name" ;;
  1091. account) is_localpart_format_valid "$arg" "$arg_name" '64' ;;
  1092. action) is_fw_action_format_valid "$arg" ;;
  1093. active) is_boolean_format_valid "$arg" 'active' ;;
  1094. aliases) is_alias_format_valid "$arg" ;;
  1095. alias) is_alias_format_valid "$arg" ;;
  1096. antispam) is_boolean_format_valid "$arg" 'antispam' ;;
  1097. antivirus) is_boolean_format_valid "$arg" 'antivirus' ;;
  1098. autoreply) is_autoreply_format_valid "$arg" ;;
  1099. backup) is_object_format_valid "$arg" 'backup' ;;
  1100. charset) is_object_format_valid "$arg" "$arg_name" ;;
  1101. charsets) is_common_format_valid "$arg" 'charsets' ;;
  1102. chain) is_object_format_valid "$arg" 'chain' ;;
  1103. comment) is_object_format_valid "$arg" 'comment' ;;
  1104. database) is_database_format_valid "$arg" 'database' ;;
  1105. day) is_cron_format_valid "$arg" $arg_name ;;
  1106. dbpass) is_password_format_valid "$arg" ;;
  1107. dbuser) is_dbuser_format_valid "$arg" 'dbuser' ;;
  1108. dkim) is_boolean_format_valid "$arg" 'dkim' ;;
  1109. dkim_size) is_int_format_valid "$arg" ;;
  1110. domain) is_domain_format_valid "$arg" ;;
  1111. dom_alias) is_alias_format_valid "$arg" ;;
  1112. dvalue) is_dns_record_format_valid "$arg" ;;
  1113. email) is_email_format_valid "$arg" ;;
  1114. email_forward) is_email_format_valid "$arg" ;;
  1115. exp) is_date_format_valid "$arg" ;;
  1116. extentions) is_common_format_valid "$arg" 'extentions' ;;
  1117. format) is_type_valid 'plain json shell csv' "$arg" ;;
  1118. ftp_password) is_password_format_valid "$arg" ;;
  1119. ftp_user) is_user_format_valid "$arg" "$arg_name" ;;
  1120. hash) is_hash_format_valid "$arg" "$arg_name" ;;
  1121. host) is_object_format_valid "$arg" "$arg_name" ;;
  1122. hour) is_cron_format_valid "$arg" $arg_name ;;
  1123. id) is_id_format_valid "$arg" 'id' ;;
  1124. iface) is_interface_format_valid "$arg" ;;
  1125. ip) is_ip_format_valid "$arg" ;;
  1126. ipv6) is_ipv6_format_valid "$arg" ;;
  1127. ip46) is_ip46_format_valid "$arg" ;;
  1128. ip_name) is_domain_format_valid "$arg" 'IP name' ;;
  1129. ip_status) is_ip_status_format_valid "$arg" ;;
  1130. job) is_int_format_valid "$arg" 'job' ;;
  1131. key) is_common_format_valid "$arg" "$arg_name" ;;
  1132. malias) is_localpart_format_valid "$arg" "$arg_name" '64' ;;
  1133. max_db) is_int_format_valid "$arg" 'max db' ;;
  1134. min) is_cron_format_valid "$arg" $arg_name ;;
  1135. month) is_cron_format_valid "$arg" $arg_name ;;
  1136. name) is_name_format_valid "$arg" "name" ;;
  1137. notice) format_no_quotes "$arg" "notice" ;;
  1138. nat_ip) is_ip_format_valid "$arg" ;;
  1139. netmask) is_ip_format_valid "$arg" 'netmask' ;;
  1140. newid) is_int_format_valid "$arg" 'id' ;;
  1141. ns1) is_domain_format_valid "$arg" 'ns1' ;;
  1142. ns2) is_domain_format_valid "$arg" 'ns2' ;;
  1143. ns3) is_domain_format_valid "$arg" 'ns3' ;;
  1144. ns4) is_domain_format_valid "$arg" 'ns4' ;;
  1145. ns5) is_domain_format_valid "$arg" 'ns5' ;;
  1146. ns6) is_domain_format_valid "$arg" 'ns6' ;;
  1147. ns7) is_domain_format_valid "$arg" 'ns7' ;;
  1148. ns8) is_domain_format_valid "$arg" 'ns8' ;;
  1149. object) is_object_name_format_valid "$arg" 'object' ;;
  1150. package) is_object_format_valid "$arg" "$arg_name" ;;
  1151. password) is_password_format_valid "$arg" ;;
  1152. priority) is_int_format_valid $arg ;;
  1153. port) is_int_format_valid "$arg" 'port' ;;
  1154. port_ext) is_fw_port_format_valid "$arg" ;;
  1155. protocol) is_fw_protocol_format_valid "$arg" ;;
  1156. proxy_ext) is_extention_format_valid "$arg" ;;
  1157. quota) is_int_format_valid "$arg" 'quota' ;;
  1158. rate) is_int_format_valid "$arg" 'rate' ;;
  1159. record) is_common_format_valid "$arg" 'record' ;;
  1160. reject) is_boolean_format_valid "$arg" 'reject' ;;
  1161. restart) is_restart_format_valid "$arg" 'restart' ;;
  1162. role) is_role_valid "$arg" 'role' ;;
  1163. rtype) is_dns_type_format_valid "$arg" ;;
  1164. rule) is_int_format_valid "$arg" "rule id" ;;
  1165. service) is_service_format_valid "$arg" "$arg_name" ;;
  1166. secret_access_key) is_secret_access_key_format_valid "$arg" "$arg_name" ;;
  1167. soa) is_domain_format_valid "$arg" 'SOA' ;;
  1168. #missing command: is_format_valid_shell
  1169. shell) is_format_valid_shell "$arg" ;;
  1170. shell_jail_enabled) is_boolean_format_valid "$arg" 'shell_jail_enabled' ;;
  1171. ssl_dir) is_folder_exists "$arg" "$arg_name" ;;
  1172. stats_pass) is_password_format_valid "$arg" ;;
  1173. stats_user) is_user_format_valid "$arg" "$arg_name" ;;
  1174. template) is_object_format_valid "$arg" "$arg_name" ;;
  1175. theme) is_common_format_valid "$arg" "$arg_name" ;;
  1176. ttl) is_int_format_valid "$arg" 'ttl' ;;
  1177. user) is_user_format_valid "$arg" $arg_name ;;
  1178. wday) is_cron_format_valid "$arg" $arg_name ;;
  1179. value) is_common_format_valid "$arg" $arg_name ;;
  1180. esac
  1181. fi
  1182. done
  1183. }
  1184. is_folder_exists() {
  1185. if [ ! -d "$1" ]; then
  1186. check_result "$E_NOTEXIST" "folder $1 does not exist"
  1187. fi
  1188. }
  1189. is_command_valid_format() {
  1190. if [[ ! "$1" =~ ^v-[[:alnum:]][-|\.|_[:alnum:]]{0,64}[[:alnum:]]$ ]]; then
  1191. check_result "$E_INVALID" "Invalid command format"
  1192. fi
  1193. if [[ -n $(echo "$1" | grep -e '\-\-') ]]; then
  1194. check_result "$E_INVALID" "Invalid command format"
  1195. fi
  1196. }
  1197. # Check access_key_id name
  1198. # Don't work with legacy key format
  1199. is_access_key_id_format_valid() {
  1200. local hash="$1"
  1201. # ACCESS_KEY_ID format validation
  1202. if ! [[ "$hash" =~ ^[[:alnum:]]{20}$ ]]; then
  1203. check_result "$E_INVALID" "invalid $2 format :: $hash"
  1204. fi
  1205. }
  1206. # SECRET_ACCESS_KEY format validation
  1207. is_secret_access_key_format_valid() {
  1208. local hash="$1"
  1209. if ! [[ "$hash" =~ ^[[:alnum:]|_|\.|\+|/|\^|~|=|%|\-]{40}$ ]]; then
  1210. check_result "$E_INVALID" "invalid $2 format"
  1211. fi
  1212. }
  1213. # Checks if the secret belongs to the access key
  1214. check_access_key_secret() {
  1215. local access_key_id="$(basename "$1")"
  1216. local secret_access_key=$2
  1217. local -n key_user=$3
  1218. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1219. check_result "$E_PASSWORD" "Access key $access_key_id doesn't exist"
  1220. fi
  1221. if [[ -z "$secret_access_key" ]]; then
  1222. check_result "$E_PASSWORD" "Secret key not provided for key $access_key_id"
  1223. elif ! [[ "$secret_access_key" =~ ^[[:alnum:]|_|\.|\+|/|\^|~|=|%|\-]{40}$ ]]; then
  1224. check_result "$E_PASSWORD" "Invalid secret key for key $access_key_id"
  1225. else
  1226. SECRET_ACCESS_KEY=""
  1227. source_conf "$HESTIA/data/access-keys/${access_key_id}"
  1228. if [[ -z "$SECRET_ACCESS_KEY" || "$SECRET_ACCESS_KEY" != "$secret_access_key" ]]; then
  1229. check_result "$E_PASSWORD" "Invalid secret key for key $access_key_id"
  1230. fi
  1231. fi
  1232. key_user="$USER"
  1233. }
  1234. # Checks if the key belongs to the user
  1235. check_access_key_user() {
  1236. local access_key_id="$(basename "$1")"
  1237. local user=$2
  1238. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1239. check_result "$E_FORBIDEN" "Access key $access_key_id doesn't exist"
  1240. fi
  1241. if [[ -z "$user" ]]; then
  1242. check_result "$E_FORBIDEN" "User not provided"
  1243. else
  1244. USER=""
  1245. source_conf "$HESTIA/data/access-keys/${access_key_id}"
  1246. if [[ -z "$USER" || "$USER" != "$user" ]]; then
  1247. check_result "$E_FORBIDEN" "key $access_key_id does not belong to the user $user"
  1248. fi
  1249. fi
  1250. }
  1251. # Checks if the key is allowed to run the command
  1252. check_access_key_cmd() {
  1253. local access_key_id="$(basename "$1")"
  1254. local cmd=$2
  1255. local -n user_arg_position=$3
  1256. if [[ "$DEBUG_MODE" = "true" ]]; then
  1257. new_timestamp
  1258. echo "[$date:$time] $1 $2" >> /var/log/hestia/api.log
  1259. fi
  1260. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1261. check_result "$E_FORBIDEN" "Access key $access_key_id doesn't exist"
  1262. fi
  1263. if [[ -z "$cmd" ]]; then
  1264. check_result "$E_FORBIDEN" "Command not provided"
  1265. elif [[ "$cmd" = 'v-make-tmp-file' ]]; then
  1266. USER="" PERMISSIONS=""
  1267. source_conf "${HESTIA}/data/access-keys/${access_key_id}"
  1268. local allowed_commands
  1269. if [[ -n "$PERMISSIONS" ]]; then
  1270. allowed_commands="$(get_apis_commands "$PERMISSIONS")"
  1271. if [[ -z "$(echo ",${allowed_commands}," | grep ",${hst_command},")" ]]; then
  1272. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1273. fi
  1274. elif [[ -z "$PERMISSIONS" && "$USER" != "$ROOT_USER" ]]; then
  1275. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1276. fi
  1277. user_arg_position="0"
  1278. elif [[ ! -e "$BIN/$cmd" ]]; then
  1279. check_result "$E_FORBIDEN" "Command $cmd not found"
  1280. else
  1281. USER="" PERMISSIONS=""
  1282. source_conf "${HESTIA}/data/access-keys/${access_key_id}"
  1283. local allowed_commands
  1284. if [[ -n "$PERMISSIONS" ]]; then
  1285. allowed_commands="$(get_apis_commands "$PERMISSIONS")"
  1286. if [[ -z "$(echo ",${allowed_commands}," | grep ",${hst_command},")" ]]; then
  1287. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1288. fi
  1289. elif [[ -z "$PERMISSIONS" && "$USER" != "$ROOT_USER" ]]; then
  1290. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1291. fi
  1292. if [[ "$USER" == "$ROOT_USER" ]]; then
  1293. # Admin can run commands for any user
  1294. user_arg_position="0"
  1295. else
  1296. user_arg_position="$(search_command_arg_position "$hst_command" "USER")"
  1297. if ! [[ "$user_arg_position" =~ ^[0-9]+$ ]]; then
  1298. check_result "$E_FORBIDEN" "Command $hst_command not found"
  1299. fi
  1300. fi
  1301. fi
  1302. }
  1303. # Domain argument formatting
  1304. format_domain() {
  1305. if [[ "$domain" = *[![:ascii:]]* ]]; then
  1306. if [[ "$domain" =~ [[:upper:]] ]]; then
  1307. domain=$(echo "$domain" | sed 's/[[:upper:]].*/\L&/')
  1308. fi
  1309. else
  1310. if [[ "$domain" =~ [[:upper:]] ]]; then
  1311. domain=$(echo "$domain" | tr '[:upper:]' '[:lower:]')
  1312. fi
  1313. fi
  1314. if [[ "$domain" =~ ^www\..* ]]; then
  1315. domain=$(echo "$domain" | sed -e "s/^www.//")
  1316. fi
  1317. if [[ "$domain" =~ .*\.$ ]]; then
  1318. domain=$(echo "$domain" | sed -e "s/[.]*$//g")
  1319. fi
  1320. if [[ "$domain" =~ ^\. ]]; then
  1321. domain=$(echo "$domain" | sed -e "s/^[.]*//")
  1322. fi
  1323. # Remove white spaces
  1324. domain=$(echo $domain | sed 's/^[ \t]*//;s/[ \t]*$//')
  1325. }
  1326. format_domain_idn() {
  1327. if [ -z "$domain_idn" ]; then
  1328. domain_idn=$domain
  1329. fi
  1330. if [[ "$domain_idn" = *[![:ascii:]]* ]]; then
  1331. domain_idn=$(idn2 --quiet $domain_idn)
  1332. fi
  1333. }
  1334. format_aliases() {
  1335. if [ -n "$aliases" ] && [ "$aliases" != 'none' ]; then
  1336. aliases=$(echo $aliases | tr '[:upper:]' '[:lower:]' | tr ',' '\n')
  1337. aliases=$(echo "$aliases" | sed -e "s/\.$//" | sort -u)
  1338. aliases=$(echo "$aliases" | tr -s '.')
  1339. aliases=$(echo "$aliases" | sed -e "s/[.]*$//g")
  1340. aliases=$(echo "$aliases" | sed -e "s/^[.]*//")
  1341. aliases=$(echo "$aliases" | sed -e "/^$/d")
  1342. aliases=$(echo "$aliases" | tr '\n' ',' | sed -e "s/,$//")
  1343. fi
  1344. }
  1345. is_restart_format_valid() {
  1346. if [ "$1" != 'yes' ] && [ "$1" != 'no' ] && [ "$1" != 'ssl' ] && [ "$1" != 'reload' ] && [ "$1" != 'updatessl' ]; then
  1347. check_result "$E_INVALID" "invalid $2 format :: $1"
  1348. fi
  1349. }
  1350. check_backup_conditions() {
  1351. # Checking load average
  1352. la=$(cat /proc/loadavg | cut -f 1 -d ' ' | cut -f 1 -d '.')
  1353. # i=0
  1354. while [ "$la" -ge "$BACKUP_LA_LIMIT" ]; do
  1355. echo -e "$(date "+%F %T") Load Average $la"
  1356. sleep 60
  1357. la=$(cat /proc/loadavg | cut -f 1 -d ' ' | cut -f 1 -d '.')
  1358. done
  1359. }
  1360. # Define download function
  1361. download_file() {
  1362. local url=$1
  1363. local destination=$2
  1364. local force=$3
  1365. # Default destination is the curent working directory
  1366. local dstopt=""
  1367. if [ -n "$(echo "$url" | grep -E "\.(gz|gzip|bz2|zip|xz)$")" ]; then
  1368. # When an archive file is downloaded it will be first saved localy
  1369. dstopt="--directory-prefix=$ARCHIVE_DIR"
  1370. local is_archive="true"
  1371. local filename="${url##*/}"
  1372. if [ -z "$filename" ]; then
  1373. echo >&2 "[!] No filename was found in url, exiting ($url)"
  1374. exit 1
  1375. fi
  1376. if [ -n "$force" ] && [ -f "$ARCHIVE_DIR/$filename" ]; then
  1377. rm -f $ARCHIVE_DIR/$filename
  1378. fi
  1379. elif [ -n "$destination" ]; then
  1380. # Plain files will be written to specified location
  1381. dstopt="-O $destination"
  1382. fi
  1383. # check for corrupted archive
  1384. if [ -f "$ARCHIVE_DIR/$filename" ] && [ "$is_archive" = "true" ]; then
  1385. tar -tzf "$ARCHIVE_DIR/$filename" > /dev/null 2>&1
  1386. if [ $? -ne 0 ]; then
  1387. echo >&2 "[!] Archive $ARCHIVE_DIR/$filename is corrupted, redownloading"
  1388. rm -f $ARCHIVE_DIR/$filename
  1389. fi
  1390. fi
  1391. if [ ! -f "$ARCHIVE_DIR/$filename" ]; then
  1392. wget $url -q $dstopt --show-progress --progress=bar:force --limit-rate=3m
  1393. fi
  1394. if [ -n "$destination" ] && [ "$is_archive" = "true" ]; then
  1395. if [ "$destination" = "-" ]; then
  1396. cat "$ARCHIVE_DIR/$filename"
  1397. elif [ -d "$(dirname $destination)" ]; then
  1398. cp "$ARCHIVE_DIR/$filename" "$destination"
  1399. fi
  1400. fi
  1401. }
  1402. check_hestia_demo_mode() {
  1403. demo_mode=$(grep DEMO_MODE /usr/local/hestia/conf/hestia.conf | cut -d '=' -f2 | sed "s|'||g")
  1404. if [ -n "$demo_mode" ] && [ "$demo_mode" = "yes" ]; then
  1405. echo "ERROR: Unable to perform operation due to security restrictions that are in place."
  1406. exit 1
  1407. fi
  1408. }
  1409. multiphp_count() {
  1410. $BIN/v-list-sys-php plain | wc -l
  1411. }
  1412. multiphp_versions() {
  1413. local -a php_versions_list
  1414. local php_ver
  1415. if [ "$(multiphp_count)" -gt 0 ]; then
  1416. for php_ver in $($BIN/v-list-sys-php plain); do
  1417. [ ! -d "/etc/php/$php_ver/fpm/pool.d/" ] && continue
  1418. php_versions_list+=($php_ver)
  1419. done
  1420. echo "${php_versions_list[@]}"
  1421. fi
  1422. }
  1423. multiphp_default_version() {
  1424. # Get system wide default php version (set by update-alternatives)
  1425. local sys_phpversion=$(php -r "echo substr(phpversion(),0,3);")
  1426. # Check if the system php also has php-fpm enabled, otherwise return
  1427. # the most recent php version which does have it installed.
  1428. if [ ! -d "/etc/php/$sys_phpversion/fpm/pool.d/" ]; then
  1429. local all_versions="$(multiphp_versions)"
  1430. if [ -n "$all_versions" ]; then
  1431. sys_phpversion="${all_versions##*\ }"
  1432. fi
  1433. fi
  1434. echo "$sys_phpversion"
  1435. }
  1436. is_hestia_package() {
  1437. check=false
  1438. for pkg in $1; do
  1439. if [ "$pkg" == "$2" ]; then
  1440. check="true"
  1441. fi
  1442. done
  1443. if [ "$check" != "true" ]; then
  1444. check_result $E_INVALID "$2 package is not controlled by hestiacp"
  1445. fi
  1446. }
  1447. # Run arbitrary cli commands with dropped privileges
  1448. # Note: setpriv --init-groups is not available on debian9 (util-linux 2.29.2)
  1449. # Input:
  1450. # - $user : Vaild hestia user
  1451. user_exec() {
  1452. is_object_valid 'user' 'USER' "$user"
  1453. local user_groups=$(id -G "$user")
  1454. user_groups=${user_groups//\ /,}
  1455. setpriv --groups "$user_groups" --reuid "$user" --regid "$user" -- "${@}"
  1456. }
  1457. # Simple chmod wrapper that skips symlink files after glob expand
  1458. no_symlink_chmod() {
  1459. local filemode=$1
  1460. shift
  1461. for i in "$@"; do
  1462. [[ -L ${i} ]] && continue
  1463. chmod "${filemode}" "${i}"
  1464. done
  1465. }
  1466. format_no_quotes() {
  1467. exclude="['|\"]"
  1468. if [[ "$1" =~ $exclude ]]; then
  1469. check_result "$E_INVALID" "Invalid $2 contains qoutes (\" or ' or | ) :: $1"
  1470. fi
  1471. is_no_new_line_format "$1"
  1472. }
  1473. is_username_format_valid() {
  1474. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.[A-Za-z]{2,63}$ ]]; then
  1475. is_string_format_valid "$1" "$2"
  1476. fi
  1477. }
  1478. change_sys_value() {
  1479. check_ckey=$(grep "^$1='" "$HESTIA/conf/hestia.conf")
  1480. if [ -z "$check_ckey" ]; then
  1481. echo "$1='$2'" >> "$HESTIA/conf/hestia.conf"
  1482. else
  1483. sed -i "s|^$1=.*|$1='$2'|g" "$HESTIA/conf/hestia.conf"
  1484. fi
  1485. }
  1486. # Checks the format of APIs that will be allowed for the key
  1487. is_key_permissions_format_valid() {
  1488. local permissions="$1"
  1489. local user="$2"
  1490. if [[ "$user" != "$ROOT_USER" && -z "$permissions" ]]; then
  1491. check_result "$E_INVALID" "Non-admin users need a permission list"
  1492. fi
  1493. while IFS=',' read -ra permissions_arr; do
  1494. for permission in "${permissions_arr[@]}"; do
  1495. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1496. # if [[ -z "$(echo "$permission" | grep -E "^v-")" ]]; then
  1497. if [[ ! -e "$HESTIA/data/api/$permission" ]]; then
  1498. check_result "$E_NOTEXIST" "API $permission doesn't exist"
  1499. fi
  1500. source_conf "$HESTIA/data/api/$permission"
  1501. if [ "$ROLE" = "admin" ] && [ "$user" != "$ROOT_USER" ]; then
  1502. check_result "$E_INVALID" "Only the admin can run this API"
  1503. fi
  1504. # elif [[ ! -e "$BIN/$permission" ]]; then
  1505. # check_result "$E_NOTEXIST" "Command $permission doesn't exist"
  1506. # fi
  1507. done
  1508. done <<< "$permissions"
  1509. }
  1510. # Remove whitespaces, and bin path from commands
  1511. cleanup_key_permissions() {
  1512. local permissions="$1"
  1513. local final quote
  1514. while IFS=',' read -ra permissions_arr; do
  1515. for permission in "${permissions_arr[@]}"; do
  1516. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1517. # Avoid duplicate items
  1518. if [[ -z "$(echo ",${final}," | grep ",${permission},")" ]]; then
  1519. final+="${quote}${permission}"
  1520. quote=','
  1521. fi
  1522. done
  1523. done <<< "$permissions"
  1524. echo "$final"
  1525. }
  1526. # Extract all allowed commands from a permission list
  1527. get_apis_commands() {
  1528. local permissions="$1"
  1529. local allowed_commands quote commands_to_add
  1530. while IFS=',' read -ra permissions_arr; do
  1531. for permission in "${permissions_arr[@]}"; do
  1532. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1533. commands_to_add=""
  1534. # if [[ -n "$(echo "$permission" | grep -E "^v-")" ]]; then
  1535. # commands_to_add="$permission"
  1536. # el
  1537. if [[ -e "$HESTIA/data/api/$permission" ]]; then
  1538. source_conf "$HESTIA/data/api/$permission"
  1539. commands_to_add="$COMMANDS"
  1540. fi
  1541. if [[ -n "$commands_to_add" ]]; then
  1542. allowed_commands+="${quote}${commands_to_add}"
  1543. quote=','
  1544. fi
  1545. done
  1546. done <<< "$permissions"
  1547. cleanup_key_permissions "$allowed_commands"
  1548. }
  1549. # Get the position of an argument by name in a hestia command using the command's documentation comment.
  1550. #
  1551. # Return:
  1552. # * 0: It doesn't have the argument;
  1553. # * 1-9: The position of the argument in the command.
  1554. search_command_arg_position() {
  1555. local hst_command="$(basename "$1")"
  1556. local arg_name="$2"
  1557. local command_path="$BIN/$hst_command"
  1558. if [[ -z "$hst_command" || ! -e "$command_path" ]]; then
  1559. echo "-1"
  1560. return
  1561. fi
  1562. local position=0
  1563. local count=0
  1564. local command_options="$(sed -En 's/^# options: (.+)/\1/p' "$command_path")"
  1565. while IFS=' ' read -ra options_arr; do
  1566. for option in "${options_arr[@]}"; do
  1567. count=$((count + 1))
  1568. option_name="$(echo " $option " | sed -E 's/^(\s|\[)*|(\s|\])*$//g')"
  1569. if [[ "${option_name^^}" == "$arg_name" ]]; then
  1570. position=$count
  1571. fi
  1572. done
  1573. done <<< "$command_options"
  1574. echo "$position"
  1575. }
  1576. add_chroot_jail() {
  1577. local user=$1
  1578. mkdir -p /srv/jail/$user
  1579. chown 0:0 /srv /srv/jail /srv/jail/$user
  1580. chmod 755 /srv /srv/jail /srv/jail/$user
  1581. if [ ! -d /srv/jail/$user/home ]; then
  1582. mkdir -p /srv/jail/$user/home
  1583. chown 0:0 /srv/jail/$user/home
  1584. chmod 755 /srv/jail/$user/home
  1585. fi
  1586. if [ ! -d /srv/jail/$user/home/$user ]; then
  1587. mkdir -p /srv/jail/$user/home/$user
  1588. chown 0:0 /srv/jail/$user/home/$user
  1589. chmod 755 /srv/jail/$user/home/$user
  1590. fi
  1591. if [ ! -d /srv/jail/$user/tmp ]; then
  1592. mkdir -p /srv/jail/$user/tmp
  1593. chown "$user:$user" /srv/jail/$user/tmp
  1594. chmod 755 /srv/jail/$user/tmp
  1595. fi
  1596. systemd=$(systemd-escape -p --suffix=mount "/srv/jail/$user/home/$user")
  1597. cat > "/etc/systemd/system/$systemd" << EOF
  1598. [Unit]
  1599. Description=Mount $user's home directory to the jail chroot
  1600. Before=local-fs.target
  1601. [Mount]
  1602. What=$(getent passwd $user | cut -d : -f 6)
  1603. Where=/srv/jail/$user/home/$user
  1604. Type=none
  1605. Options=bind
  1606. LazyUnmount=yes
  1607. [Install]
  1608. RequiredBy=local-fs.target
  1609. EOF
  1610. systemctl daemon-reload > /dev/null 2>&1
  1611. systemctl enable "$systemd" > /dev/null 2>&1
  1612. systemctl start "$systemd" > /dev/null 2>&1
  1613. }
  1614. delete_chroot_jail() {
  1615. local user=$1
  1616. # Backwards compatibility with old style home jail
  1617. systemd=$(systemd-escape -p --suffix=mount "/srv/jail/$user/home")
  1618. systemctl stop "$systemd" > /dev/null 2>&1
  1619. systemctl disable "$systemd" > /dev/null 2>&1
  1620. rm -f "/etc/systemd/system/$systemd"
  1621. # Remove the new style home jail
  1622. systemd=$(systemd-escape -p --suffix=mount "/srv/jail/$user/home/$user")
  1623. systemctl stop "$systemd" > /dev/null 2>&1
  1624. systemctl disable "$systemd" > /dev/null 2>&1
  1625. rm -f "/etc/systemd/system/$systemd"
  1626. systemctl daemon-reload > /dev/null 2>&1
  1627. rm -r /srv/jail/$user/ > /dev/null 2>&1
  1628. rmdir /srv/jail/$user > /dev/null 2>&1
  1629. }