main.sh 53 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672
  1. #!/usr/bin/env bash
  2. #===========================================================================#
  3. # #
  4. # Hestia Control Panel - Core Function Library #
  5. # #
  6. #===========================================================================#
  7. # Internal variables
  8. HOMEDIR='/home'
  9. BACKUP='/backup'
  10. BACKUP_GZIP=9
  11. BACKUP_DISK_LIMIT=95
  12. BACKUP_LA_LIMIT=`cat /proc/cpuinfo | grep processor | wc -l`
  13. RRD_STEP=300
  14. BIN=$HESTIA/bin
  15. HESTIA_INSTALL_DIR=$HESTIA/install/deb
  16. HESTIA_BACKUP="/root/hst_backups/$(date +%d%m%Y%H%M)"
  17. USER_DATA=$HESTIA/data/users/$user
  18. WEBTPL=$HESTIA/data/templates/web
  19. MAILTPL=$HESTIA/data/templates/mail
  20. DNSTPL=$HESTIA/data/templates/dns
  21. RRD=$HESTIA/web/rrd
  22. SENDMAIL="$HESTIA/web/inc/mail-wrapper.php"
  23. HESTIA_GIT_REPO="https://raw.githubusercontent.com/hestiacp/hestiacp"
  24. HESTIA_THEMES="$HESTIA/web/css/themes"
  25. HESTIA_THEMES_CUSTOM="$HESTIA/web/css/themes/custom"
  26. SCRIPT="$(basename $0)"
  27. CHECK_RESULT_CALLBACK=""
  28. # Return codes
  29. OK=0
  30. E_ARGS=1
  31. E_INVALID=2
  32. E_NOTEXIST=3
  33. E_EXISTS=4
  34. E_SUSPENDED=5
  35. E_UNSUSPENDED=6
  36. E_INUSE=7
  37. E_LIMIT=8
  38. E_PASSWORD=9
  39. E_FORBIDEN=10
  40. E_DISABLED=11
  41. E_PARSING=12
  42. E_DISK=13
  43. E_LA=14
  44. E_CONNECT=15
  45. E_FTP=16
  46. E_DB=17
  47. E_RRD=18
  48. E_UPDATE=19
  49. E_RESTART=20
  50. # Detect operating system
  51. detect_os() {
  52. if [ -e "/etc/os-release" ]; then
  53. get_os_type=$(grep "^ID=" /etc/os-release | cut -f 2 -d '=')
  54. if [ "$get_os_type" = "ubuntu" ]; then
  55. if [ -e '/usr/bin/lsb_release' ]; then
  56. OS_VERSION="$(lsb_release -s -r)"
  57. OS_TYPE='Ubuntu'
  58. fi
  59. elif [ "$get_os_type" = "debian" ]; then
  60. OS_TYPE='Debian'
  61. OS_VERSION=$(cat /etc/debian_version|grep -o "[0-9]\{1,2\}"|head -n1)
  62. fi
  63. else
  64. OS_TYPE="Unsupported OS"
  65. OS_VERSION="Unknown"
  66. fi
  67. }
  68. # Generate time stamp
  69. new_timestamp() {
  70. time_n_date=$(date +'%T %F')
  71. time=$(echo "$time_n_date" |cut -f 1 -d \ )
  72. date=$(echo "$time_n_date" |cut -f 2 -d \ )
  73. }
  74. # Event string for logger
  75. ARGS=("$@")
  76. for ((I=1; I <= $# ; I++)); do
  77. if [[ "$HIDE" != "$I" ]]; then
  78. ARGUMENTS="$ARGUMENTS '${ARGS[${I}-1]}'"
  79. else
  80. ARGUMENTS="$ARGUMENTS '******'"
  81. fi
  82. done
  83. # Log event function
  84. log_event() {
  85. if [ -z "$time" ]; then
  86. LOG_TIME="$(date +'%F %T') $(basename $0)"
  87. else
  88. LOG_TIME="$date $time $(basename $0)"
  89. fi
  90. if [ "$1" -eq 0 ]; then
  91. echo "$LOG_TIME $2" >> $HESTIA/log/system.log
  92. else
  93. echo "$LOG_TIME $2 [Error $1]" >> $HESTIA/log/error.log
  94. fi
  95. }
  96. # Log user history
  97. log_history() {
  98. message=${1//\'/\´} # Avoid single quotes broken the log
  99. evt_level=${2:-$event_level}
  100. log_user=${3-$user}
  101. evt_category=${4:-$event_category}
  102. # Set default event level and category if not specified
  103. if [ -z "$evt_level" ]; then
  104. evt_level="Info"
  105. fi
  106. if [ -z "$evt_category" ]; then
  107. evt_category="System"
  108. fi
  109. # Log system events to system log file
  110. if [ "$log_user" = "system" ]; then
  111. log=$HESTIA/data/users/admin/system.log
  112. else
  113. if ! $BIN/v-list-user "$log_user" >/dev/null; then
  114. return $E_NOTEXIST
  115. fi
  116. log=$HESTIA/data/users/$log_user/history.log
  117. fi
  118. touch $log
  119. # TODO: Improve log pruning and pagination
  120. #
  121. #if [ '1000' -lt "$(wc -l $log |cut -f 1 -d ' ')" ]; then
  122. # tail -n 499 $log > $log.moved
  123. # mv -f $log.moved $log
  124. # chmod 660 $log
  125. #fi
  126. if [ -z "$date" ]; then
  127. time_n_date=$(date +'%T %F')
  128. time=$(echo "$time_n_date" |cut -f 1 -d \ )
  129. date=$(echo "$time_n_date" |cut -f 2 -d \ )
  130. fi
  131. curr_str=$(grep "ID=" $log | cut -f 2 -d \' | sort -n | tail -n1)
  132. id="$((curr_str +1))"
  133. echo "ID='$id' DATE='$date' TIME='$time' LEVEL='$evt_level' CATEGORY='$evt_category' MESSAGE='$message'" >> $log
  134. }
  135. # Result checker
  136. check_result() {
  137. if [ $1 -ne 0 ]; then
  138. local err_code="${3:-$1}"
  139. if [[ -n "$CHECK_RESULT_CALLBACK" && "$(type -t "$CHECK_RESULT_CALLBACK")" == 'function' ]]; then
  140. $CHECK_RESULT_CALLBACK "$err_code" "$2"
  141. else
  142. echo "Error: $2"
  143. log_event "$err_code" "$ARGUMENTS"
  144. fi
  145. exit $err_code
  146. fi
  147. }
  148. # Argument list checker
  149. check_args() {
  150. if [ "$1" -gt "$2" ]; then
  151. echo "Usage: $(basename $0) $3"
  152. check_result "$E_ARGS" "not enought arguments" >/dev/null
  153. fi
  154. }
  155. # Subsystem checker
  156. is_system_enabled() {
  157. if [ -z "$1" ] || [ "$1" = no ]; then
  158. check_result "$E_DISABLED" "$2 is not enabled"
  159. fi
  160. }
  161. # User package check
  162. is_package_full() {
  163. case "$1" in
  164. WEB_DOMAINS) used=$(wc -l $USER_DATA/web.conf);;
  165. WEB_ALIASES) used=$(echo $aliases |tr ',' '\n' |wc -l);;
  166. DNS_DOMAINS) used=$(wc -l $USER_DATA/dns.conf);;
  167. DNS_RECORDS) used=$(wc -l $USER_DATA/dns/$domain.conf);;
  168. MAIL_DOMAINS) used=$(wc -l $USER_DATA/mail.conf);;
  169. MAIL_ACCOUNTS) used=$(wc -l $USER_DATA/mail/$domain.conf);;
  170. DATABASES) used=$(wc -l $USER_DATA/db.conf);;
  171. CRON_JOBS) used=$(wc -l $USER_DATA/cron.conf);;
  172. esac
  173. used=$(echo "$used"| cut -f 1 -d \ )
  174. limit=$(grep "^$1=" $USER_DATA/user.conf |cut -f 2 -d \')
  175. if [ "$1" = WEB_ALIASES ]; then
  176. # Used is always calculated with the new alias added
  177. if [ "$limit" != 'unlimited' ] && [[ "$used" -gt "$limit" ]]; then
  178. check_result "$E_LIMIT" "$1 limit is reached :: upgrade user package"
  179. fi
  180. else
  181. if [ "$limit" != 'unlimited' ] && [[ "$used" -ge "$limit" ]]; then
  182. check_result "$E_LIMIT" "$1 limit is reached :: upgrade user package"
  183. fi
  184. fi
  185. }
  186. # User owner for reseller plugin
  187. get_user_owner() {
  188. if [ -z "$RESELLER_KEY" ]; then
  189. owner='admin'
  190. else
  191. owner=$(grep "^OWNER" $USER_DATA/user.conf| cut -f 2 -d \')
  192. if [ -z "$owner" ]; then
  193. owner='admin'
  194. fi
  195. fi
  196. }
  197. # Random password generator
  198. generate_password() {
  199. matrix=$1
  200. length=$2
  201. if [ -z "$matrix" ]; then
  202. matrix="A-Za-z0-9"
  203. fi
  204. if [ -z "$length" ]; then
  205. length=16
  206. fi
  207. head /dev/urandom | tr -dc $matrix | head -c$length
  208. }
  209. # Package existence check
  210. is_package_valid() {
  211. if [ -z $1 ]; then
  212. if [ ! -e "$HESTIA/data/packages/$package.pkg" ]; then
  213. check_result "$E_NOTEXIST" "package $package doesn't exist"
  214. fi
  215. else
  216. if [ ! -e "$HESTIA/data/packages/$1.pkg" ]; then
  217. check_result "$E_NOTEXIST" "package $1 doesn't exist"
  218. fi
  219. fi
  220. }
  221. is_package_new() {
  222. if [ -e "$HESTIA/data/packages/$1.pkg" ]; then
  223. echo "Error: package $1 already exists."
  224. log_event "$E_EXISTS" "$ARGUMENTS"
  225. exit "$E_EXISTS"
  226. fi
  227. }
  228. # Validate system type
  229. is_type_valid() {
  230. if [ -z "$(echo $1 | grep -w $2)" ]; then
  231. check_result "$E_INVALID" "$2 type is invalid"
  232. fi
  233. }
  234. # Check user backup settings
  235. is_backup_enabled() {
  236. BACKUPS=$(grep "^BACKUPS=" $USER_DATA/user.conf | cut -f2 -d \')
  237. if [ -z "$BACKUPS" ] || [[ "$BACKUPS" -le '0' ]]; then
  238. check_result "$E_DISABLED" "user backup is disabled"
  239. fi
  240. }
  241. # Check user backup settings
  242. is_backup_scheduled() {
  243. if [ -e "$HESTIA/data/queue/backup.pipe" ]; then
  244. check_q=$(grep " $user " $HESTIA/data/queue/backup.pipe | grep $1)
  245. if [ -n "$check_q" ]; then
  246. check_result "$E_EXISTS" "$1 is already scheduled"
  247. fi
  248. fi
  249. }
  250. # Check if object is new
  251. is_object_new() {
  252. if [ $2 = 'USER' ]; then
  253. if [ -d "$USER_DATA" ]; then
  254. object="OK"
  255. fi
  256. else
  257. object=$(grep "$2='$3'" $USER_DATA/$1.conf)
  258. fi
  259. if [ -n "$object" ]; then
  260. check_result "$E_EXISTS" "$2=$3 already exists"
  261. fi
  262. }
  263. # Check if object is valid
  264. is_object_valid() {
  265. if [ $2 = 'USER' ]; then
  266. tstpath="$(readlink -f "$HESTIA/data/users/$3")"
  267. if [ "$(dirname "$tstpath")" != "$(readlink -f "$HESTIA/data/users")" ] || [ ! -d "$HESTIA/data/users/$3" ]; then
  268. check_result "$E_NOTEXIST" "$1 $3 doesn't exist"
  269. fi
  270. elif [ $2 = 'KEY' ]; then
  271. local key="$(basename "$3")"
  272. if [[ -z "$key" || ${#key} -lt 16 ]] || [[ ! -f "$HESTIA/data/access-keys/${key}" && ! -f "$HESTIA/data/access-keys/$key" ]]; then
  273. check_result "$E_NOTEXIST" "$1 $3 doesn't exist"
  274. fi
  275. else
  276. object=$(grep "$2='$3'" $HESTIA/data/users/$user/$1.conf)
  277. if [ -z "$object" ]; then
  278. arg1=$(basename $1)
  279. arg2=$(echo $2 |tr '[:upper:]' '[:lower:]')
  280. check_result "$E_NOTEXIST" "$arg1 $arg2 $3 doesn't exist"
  281. fi
  282. fi
  283. }
  284. # Check if a object string with key values pairs has the correct format and load it afterwards
  285. parse_object_kv_list_non_eval() {
  286. local str
  287. local objkv obj_key obj_val
  288. local OLD_IFS="$IFS"
  289. str=${@//$'\n'/ }
  290. str=${str//\"/\\\"}
  291. str=${str//$/\\$}
  292. IFS=$'\n'
  293. # Extract and loop trough each key-value pair. (Regex test: https://regex101.com/r/eiMufk/5)
  294. for objkv in $( echo "$str" | perl -n -e "while(/\b([a-zA-Z]+[\w]*)='(.*?)'(\s|\$)/g) {print \$1.'='.\$2 . \"\n\" }" ); do
  295. if ! [[ "$objkv" =~ ^([[:alnum:]][_[:alnum:]]{0,64}[[:alnum:]])=(\'?[^\']+?\'?)?$ ]]; then
  296. check_result "$E_INVALID" "Invalid key value format [$objkv]"
  297. fi
  298. obj_key=${objkv%%=*} # strip everything after first '=' char
  299. obj_val=${objkv#*=} # strip everything before first '=' char
  300. declare -g $obj_key="$obj_val"
  301. done
  302. IFS="$OLD_IFS"
  303. }
  304. # Check if a object string with key values pairs has the correct format and load it afterwards
  305. parse_object_kv_list() {
  306. local str
  307. local objkv
  308. local suboutput
  309. local OLD_IFS="$IFS"
  310. str=${@//$'\n'/ }
  311. str=${str//\"/\\\"}
  312. str=${str//$/\\$}
  313. IFS=$'\n'
  314. suboutput=$(setpriv --clear-groups --reuid nobody --regid nogroup bash -c "PS4=''; set -xe; eval \"${str}\"" 2>&1)
  315. check_result $? "Invalid object format: ${str}" $E_INVALID
  316. for objkv in $suboutput; do
  317. if [[ "$objkv" =~ ^'eval ' ]]; then
  318. continue
  319. fi
  320. if ! [[ "$objkv" =~ ^([[:alnum:]][_[:alnum:]]{0,64}[[:alnum:]])=(\'?[^\']+?\'?)?$ ]]; then
  321. check_result "$E_INVALID" "Invalid key value format [$objkv]"
  322. fi
  323. eval "$objkv"
  324. done
  325. IFS="$OLD_IFS"
  326. }
  327. # Check if object is supended
  328. is_object_suspended() {
  329. if [ $2 = 'USER' ]; then
  330. spnd=$(cat $USER_DATA/$1.conf|grep "SUSPENDED='yes'")
  331. else
  332. spnd=$(grep "$2='$3'" $USER_DATA/$1.conf|grep "SUSPENDED='yes'")
  333. fi
  334. if [ -z "$spnd" ]; then
  335. check_result "$E_UNSUSPENDED" "$(basename $1) $3 is not suspended"
  336. fi
  337. }
  338. # Check if object is unsupended
  339. is_object_unsuspended() {
  340. if [ $2 = 'USER' ]; then
  341. spnd=$(cat $USER_DATA/$1.conf |grep "SUSPENDED='yes'")
  342. else
  343. spnd=$(grep "$2='$3'" $USER_DATA/$1.conf |grep "SUSPENDED='yes'")
  344. fi
  345. if [ -n "$spnd" ]; then
  346. check_result "$E_SUSPENDED" "$(basename $1) $3 is suspended"
  347. fi
  348. }
  349. # Check if object value is empty
  350. is_object_value_empty() {
  351. str=$(grep "$2='$3'" $USER_DATA/$1.conf)
  352. parse_object_kv_list "$str"
  353. eval value=$4
  354. if [ -n "$value" ] && [ "$value" != 'no' ]; then
  355. check_result "$E_EXISTS" "${4//$}=$value already exists"
  356. fi
  357. }
  358. # Check if object value is empty
  359. is_object_value_exist() {
  360. str=$(grep "$2='$3'" $USER_DATA/$1.conf)
  361. parse_object_kv_list "$str"
  362. eval value=$4
  363. if [ -z "$value" ] || [ "$value" = 'no' ]; then
  364. check_result "$E_NOTEXIST" "${4//$}=$value doesn't exist"
  365. fi
  366. }
  367. # Check if password is transmitted via file
  368. is_password_valid() {
  369. if [[ "$password" =~ ^/tmp/ ]]; then
  370. if [ -f "$password" ]; then
  371. password="$(head -n1 $password)"
  372. fi
  373. fi
  374. }
  375. # Check if hash is transmitted via file
  376. is_hash_valid() {
  377. if [[ "$hash" =~ ^/tmp/ ]]; then
  378. if [ -f "$hash" ]; then
  379. hash="$(head -n1 $hash)"
  380. fi
  381. fi
  382. }
  383. # Check if directory is a symlink
  384. is_dir_symlink() {
  385. if [[ -L "$1" ]]; then
  386. check_result "$E_FORBIDEN" "$1 directory is a symlink"
  387. fi
  388. }
  389. # Get object value
  390. get_object_value() {
  391. object=$(grep "$2='$3'" $USER_DATA/$1.conf)
  392. parse_object_kv_list "$object"
  393. eval echo $4
  394. }
  395. get_object_values() {
  396. parse_object_kv_list $(grep "$2='$3'" $USER_DATA/$1.conf)
  397. }
  398. # Update object value
  399. update_object_value() {
  400. row=$(grep -nF "$2='$3'" $USER_DATA/$1.conf)
  401. lnr=$(echo $row | cut -f 1 -d ':')
  402. object=$(echo $row | sed "s/^$lnr://")
  403. parse_object_kv_list "$object"
  404. eval old="$4"
  405. old=$(echo "$old" | sed -e 's/\\/\\\\/g' -e 's/&/\\&/g' -e 's/\//\\\//g')
  406. new=$(echo "$5" | sed -e 's/\\/\\\\/g' -e 's/&/\\&/g' -e 's/\//\\\//g')
  407. sed -i "$lnr s/${4//$/}='${old//\*/\\*}'/${4//$/}='${new//\*/\\*}'/g" \
  408. $USER_DATA/$1.conf
  409. }
  410. # Add object key
  411. add_object_key() {
  412. row=$(grep -n "$2='$3'" $USER_DATA/$1.conf)
  413. lnr=$(echo $row | cut -f 1 -d ':')
  414. object=$(echo $row | sed "s/^$lnr://")
  415. if [ -z "$(echo $object |grep $4=)" ]; then
  416. eval old="$4"
  417. sed -i "$lnr s/$5='/$4='' $5='/" $USER_DATA/$1.conf
  418. fi
  419. }
  420. # Search objects
  421. search_objects() {
  422. OLD_IFS="$IFS"
  423. IFS=$'\n'
  424. for line in $(grep $2=\'$3\' $USER_DATA/$1.conf); do
  425. parse_object_kv_list "$line"
  426. eval echo \$$4
  427. done
  428. IFS="$OLD_IFS"
  429. }
  430. # Get user value
  431. get_user_value() {
  432. grep "^${1//$/}=" $USER_DATA/user.conf | head -1 | awk -F "'" '{print $2}'
  433. }
  434. # Update user value in user.conf
  435. update_user_value() {
  436. key="${2//$}"
  437. lnr=$(grep -n "^$key='" $HESTIA/data/users/$1/user.conf |cut -f 1 -d ':')
  438. if [ -n "$lnr" ]; then
  439. sed -i "$lnr d" $HESTIA/data/users/$1/user.conf
  440. sed -i "$lnr i\\$key='${3}'" $HESTIA/data/users/$1/user.conf
  441. fi
  442. }
  443. # Increase user counter
  444. increase_user_value() {
  445. key="${2//$}"
  446. factor="${3-1}"
  447. conf="$HESTIA/data/users/$1/user.conf"
  448. old=$(grep "$key=" $conf | cut -f 2 -d \')
  449. if [ -z "$old" ]; then
  450. old=0
  451. fi
  452. new=$((old + factor))
  453. sed -i "s/$key='$old'/$key='$new'/g" $conf
  454. }
  455. # Decrease user counter
  456. decrease_user_value() {
  457. key="${2//$}"
  458. factor="${3-1}"
  459. conf="$HESTIA/data/users/$1/user.conf"
  460. old=$(grep "$key=" $conf | cut -f 2 -d \')
  461. if [ -z "$old" ]; then
  462. old=0
  463. fi
  464. if [ "$old" -le 1 ]; then
  465. new=0
  466. else
  467. new=$((old - factor))
  468. fi
  469. if [ "$new" -lt 0 ]; then
  470. new=0
  471. fi
  472. sed -i "s/$key='$old'/$key='$new'/g" $conf
  473. }
  474. # Notify user
  475. send_notice() {
  476. topic=$1
  477. notice=$2
  478. if [ "$notify" = 'yes' ]; then
  479. touch $USER_DATA/notifications.conf
  480. chmod 660 $USER_DATA/notifications.conf
  481. time_n_date=$(date +'%T %F')
  482. time=$(echo "$time_n_date" |cut -f 1 -d \ )
  483. date=$(echo "$time_n_date" |cut -f 2 -d \ )
  484. nid=$(grep "NID=" $USER_DATA/notifications.conf |cut -f 2 -d \')
  485. nid=$(echo "$nid" |sort -n |tail -n1)
  486. if [ -n "$nid" ]; then
  487. nid="$((nid +1))"
  488. else
  489. nid=1
  490. fi
  491. str="NID='$nid' TOPIC='$topic' NOTICE='$notice' TYPE='$type'"
  492. str="$str ACK='no' TIME='$time' DATE='$date'"
  493. echo "$str" >> $USER_DATA/notifications.conf
  494. if [ -z "$(grep NOTIFICATIONS $USER_DATA/user.conf)" ]; then
  495. sed -i "s/^TIME/NOTIFICATIONS='yes'\nTIME/g" $USER_DATA/user.conf
  496. else
  497. update_user_value "$user" '$NOTIFICATIONS' "yes"
  498. fi
  499. fi
  500. }
  501. # Recalculate U_DISK value
  502. recalc_user_disk_usage() {
  503. u_usage=0
  504. if [ -f "$USER_DATA/web.conf" ]; then
  505. usage=0
  506. dusage=$(grep 'U_DISK=' $USER_DATA/web.conf |\
  507. awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  508. for disk_usage in $dusage; do
  509. usage=$((usage + disk_usage))
  510. done
  511. d=$(grep "U_DISK_WEB='" $USER_DATA/user.conf | cut -f 2 -d \')
  512. sed -i "s/U_DISK_WEB='$d'/U_DISK_WEB='$usage'/g" $USER_DATA/user.conf
  513. u_usage=$((u_usage + usage))
  514. fi
  515. if [ -f "$USER_DATA/mail.conf" ]; then
  516. usage=0
  517. dusage=$(grep 'U_DISK=' $USER_DATA/mail.conf |\
  518. awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  519. for disk_usage in $dusage; do
  520. usage=$((usage + disk_usage))
  521. done
  522. d=$(grep "U_DISK_MAIL='" $USER_DATA/user.conf | cut -f 2 -d \')
  523. sed -i "s/U_DISK_MAIL='$d'/U_DISK_MAIL='$usage'/g" $USER_DATA/user.conf
  524. u_usage=$((u_usage + usage))
  525. fi
  526. if [ -f "$USER_DATA/db.conf" ]; then
  527. usage=0
  528. dusage=$(grep 'U_DISK=' $USER_DATA/db.conf |\
  529. awk -F "U_DISK='" '{print $2}' | cut -f 1 -d \')
  530. for disk_usage in $dusage; do
  531. usage=$((usage + disk_usage))
  532. done
  533. d=$(grep "U_DISK_DB='" $USER_DATA/user.conf | cut -f 2 -d \')
  534. sed -i "s/U_DISK_DB='$d'/U_DISK_DB='$usage'/g" $USER_DATA/user.conf
  535. u_usage=$((u_usage + usage))
  536. fi
  537. usage=$(grep 'U_DISK_DIRS=' $USER_DATA/user.conf | cut -f 2 -d "'")
  538. u_usage=$((u_usage + usage))
  539. old=$(grep "U_DISK='" $USER_DATA/user.conf | cut -f 2 -d \')
  540. sed -i "s/U_DISK='$old'/U_DISK='$u_usage'/g" $USER_DATA/user.conf
  541. }
  542. # Recalculate U_BANDWIDTH value
  543. recalc_user_bandwidth_usage() {
  544. usage=0
  545. bandwidth_usage=$(grep 'U_BANDWIDTH=' $USER_DATA/web.conf |\
  546. awk -F "U_BANDWIDTH='" '{print $2}'|cut -f 1 -d \')
  547. for bandwidth in $bandwidth_usage; do
  548. usage=$((usage + bandwidth))
  549. done
  550. old=$(grep "U_BANDWIDTH='" $USER_DATA/user.conf | cut -f 2 -d \')
  551. sed -i "s/U_BANDWIDTH='$old'/U_BANDWIDTH='$usage'/g" $USER_DATA/user.conf
  552. }
  553. # Get next cron job id
  554. get_next_cronjob() {
  555. if [ -z "$job" ]; then
  556. curr_str=$(grep "JOB=" $USER_DATA/cron.conf|cut -f 2 -d \'|\
  557. sort -n|tail -n1)
  558. job="$((curr_str +1))"
  559. fi
  560. }
  561. # Sort cron jobs by id
  562. sort_cron_jobs() {
  563. cat $USER_DATA/cron.conf |sort -n -k 2 -t \' > $USER_DATA/cron.tmp
  564. mv -f $USER_DATA/cron.tmp $USER_DATA/cron.conf
  565. }
  566. # Sync cronjobs with system cron
  567. sync_cron_jobs() {
  568. source_conf "$USER_DATA/user.conf"
  569. if [ -e "/var/spool/cron/crontabs" ]; then
  570. crontab="/var/spool/cron/crontabs/$user"
  571. else
  572. crontab="/var/spool/cron/$user"
  573. fi
  574. # remove file if exists
  575. if [ -e "$crontab" ]; then
  576. rm -f $crontab
  577. fi
  578. # touch new crontab file
  579. touch $crontab
  580. if [ "$CRON_REPORTS" = 'yes' ]; then
  581. echo "MAILTO=$CONTACT" > $crontab
  582. echo 'CONTENT_TYPE="text/plain; charset=utf-8"' >> $crontab
  583. else
  584. echo 'MAILTO=""' > $crontab
  585. fi
  586. while read line; do
  587. parse_object_kv_list "$line"
  588. if [ "$SUSPENDED" = 'no' ]; then
  589. echo "$MIN $HOUR $DAY $MONTH $WDAY $CMD" |\
  590. sed -e "s/%quote%/'/g" -e "s/%dots%/:/g" \
  591. >> $crontab
  592. fi
  593. done < $USER_DATA/cron.conf
  594. chown $user:$user $crontab
  595. chmod 600 $crontab
  596. }
  597. # User format validator
  598. is_user_format_valid() {
  599. if [ ${#1} -eq 1 ]; then
  600. if ! [[ "$1" =~ ^^[[:alnum:]]$ ]]; then
  601. check_result "$E_INVALID" "invalid $2 format :: $1"
  602. fi
  603. else
  604. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,28}[[:alnum:]]$ ]]
  605. then
  606. check_result "$E_INVALID" "invalid $2 format :: $1"
  607. fi
  608. fi
  609. }
  610. # Domain format validator
  611. is_domain_format_valid() {
  612. object_name=${2-domain}
  613. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|_|/|\|\"|'|;|%|\`| ]"
  614. if [[ $1 =~ $exclude ]] || [[ $1 =~ ^[0-9]+$ ]] || [[ $1 =~ \.\. ]] || [[ $1 =~ $(printf '\t') ]] || [[ "$1" = "www" ]]; then
  615. check_result "$E_INVALID" "invalid $object_name format :: $1"
  616. fi
  617. is_no_new_line_format "$1";
  618. }
  619. # Alias forman validator
  620. is_alias_format_valid() {
  621. for object in ${1//,/ }; do
  622. exclude="[!|@|#|$|^|&|(|)|+|=|{|}|:|<|>|?|_|/|\|\"|'|;|%|\`| ]"
  623. if [[ "$object" =~ $exclude ]]; then
  624. check_result "$E_INVALID" "invalid alias format :: $object"
  625. fi
  626. if [[ "$object" =~ [*] ]] && ! [[ "$object" =~ ^[*]\..* ]]; then
  627. check_result "$E_INVALID" "invalid alias format :: $object"
  628. fi
  629. done
  630. }
  631. # IP format validator
  632. is_ip_format_valid() {
  633. object_name=${2-ip}
  634. ip_regex='([1-9]?[0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])'
  635. ip_clean=$(echo "${1%/*}")
  636. if ! [[ $ip_clean =~ ^$ip_regex\.$ip_regex\.$ip_regex\.$ip_regex$ ]]; then
  637. check_result "$E_INVALID" "invalid $object_name format :: $1"
  638. fi
  639. if [ $1 != "$ip_clean" ]; then
  640. ip_cidr="$ip_clean/"
  641. ip_cidr=$(echo "${1#$ip_cidr}")
  642. if [[ "$ip_cidr" -gt 32 ]] || [[ "$ip_cidr" =~ [:alnum:] ]]; then
  643. check_result "$E_INVALID" "invalid $object_name format :: $1"
  644. fi
  645. fi
  646. }
  647. # IPv6 format validator
  648. is_ipv6_format_valid() {
  649. object_name=${2-ip6}
  650. ip_regex='([1-9]?[0-9]|1[0-9]{2}|2[0-4][0-9]|25[0-5])'
  651. t_ip=$(echo $1 |awk -F / '{print $1}')
  652. t_cidr=$(echo $1 |awk -F / '{print $2}')
  653. valid_cidr=1
  654. WORD="[0-9A-Fa-f]\{1,4\}"
  655. # flat address, no compressed words
  656. FLAT="^${WORD}\(:${WORD}\)\{7\}$"
  657. COMP2="^\(${WORD}:\)\{1,1\}\(:${WORD}\)\{1,6\}$"
  658. COMP3="^\(${WORD}:\)\{1,2\}\(:${WORD}\)\{1,5\}$"
  659. COMP4="^\(${WORD}:\)\{1,3\}\(:${WORD}\)\{1,4\}$"
  660. COMP5="^\(${WORD}:\)\{1,4\}\(:${WORD}\)\{1,3\}$"
  661. COMP6="^\(${WORD}:\)\{1,5\}\(:${WORD}\)\{1,2\}$"
  662. COMP7="^\(${WORD}:\)\{1,6\}\(:${WORD}\)\{1,1\}$"
  663. # trailing :: edge case, includes case of only :: (all 0's)
  664. EDGE_TAIL="^\(\(${WORD}:\)\{1,7\}\|:\):$"
  665. # leading :: edge case
  666. EDGE_LEAD="^:\(:${WORD}\)\{1,7\}$"
  667. echo $t_ip | grep --silent "\(${FLAT}\)\|\(${COMP2}\)\|\(${COMP3}\)\|\(${COMP4}\)\|\(${COMP5}\)\|\(${COMP6}\)\|\(${COMP7}\)\|\(${EDGE_TAIL}\)\|\(${EDGE_LEAD}\)"
  668. if [ $? -ne 0 ]; then
  669. check_result "$E_INVALID" "invalid $object_name format :: $1"
  670. fi
  671. if [ -n "$(echo $1|grep '/')" ]; then
  672. if [[ "$t_cidr" -lt 0 ]] || [[ "$t_cidr" -gt 128 ]]; then
  673. valid_cidr=0
  674. fi
  675. if ! [[ "$t_cidr" =~ ^[0-9]+$ ]]; then
  676. valid_cidr=0
  677. fi
  678. fi
  679. if [ "$valid_cidr" -eq 0 ]; then
  680. check_result "$E_INVALID" "invalid $object_name format :: $1"
  681. fi
  682. }
  683. is_ip46_format_valid() {
  684. t_ip=$(echo $1 |awk -F / '{print $1}')
  685. t_cidr=$(echo $1 |awk -F / '{print $2}')
  686. valid_octets=0
  687. valid_cidr=1
  688. for octet in ${t_ip//./ }; do
  689. if [[ $octet =~ ^[0-9]{1,3}$ ]] && [[ $octet -le 255 ]]; then
  690. ((++valid_octets))
  691. fi
  692. done
  693. if [ -n "$(echo $1|grep '/')" ]; then
  694. if [[ "$t_cidr" -lt 0 ]] || [[ "$t_cidr" -gt 32 ]]; then
  695. valid_cidr=0
  696. fi
  697. if ! [[ "$t_cidr" =~ ^[0-9]+$ ]]; then
  698. valid_cidr=0
  699. fi
  700. fi
  701. if [ "$valid_octets" -lt 4 ] || [ "$valid_cidr" -eq 0 ]; then
  702. #Check IPV6
  703. ipv6_valid=""
  704. WORD="[0-9A-Fa-f]\{1,4\}"
  705. # flat address, no compressed words
  706. FLAT="^${WORD}\(:${WORD}\)\{7\}$"
  707. COMP2="^\(${WORD}:\)\{1,1\}\(:${WORD}\)\{1,6\}$"
  708. COMP3="^\(${WORD}:\)\{1,2\}\(:${WORD}\)\{1,5\}$"
  709. COMP4="^\(${WORD}:\)\{1,3\}\(:${WORD}\)\{1,4\}$"
  710. COMP5="^\(${WORD}:\)\{1,4\}\(:${WORD}\)\{1,3\}$"
  711. COMP6="^\(${WORD}:\)\{1,5\}\(:${WORD}\)\{1,2\}$"
  712. COMP7="^\(${WORD}:\)\{1,6\}\(:${WORD}\)\{1,1\}$"
  713. # trailing :: edge case, includes case of only :: (all 0's)
  714. EDGE_TAIL="^\(\(${WORD}:\)\{1,7\}\|:\):$"
  715. # leading :: edge case
  716. EDGE_LEAD="^:\(:${WORD}\)\{1,7\}$"
  717. echo $t_ip | grep --silent "\(${FLAT}\)\|\(${COMP2}\)\|\(${COMP3}\)\|\(${COMP4}\)\|\(${COMP5}\)\|\(${COMP6}\)\|\(${COMP7}\)\|\(${EDGE_TAIL}\)\|\(${EDGE_LEAD}\)"
  718. if [ $? -ne 0 ]; then
  719. ipv6_valid="INVALID"
  720. fi
  721. if [ -n "$(echo $1|grep '/')" ]; then
  722. if [[ "$t_cidr" -lt 0 ]] || [[ "$t_cidr" -gt 128 ]]; then
  723. valid_cidr=0
  724. fi
  725. if ! [[ "$t_cidr" =~ ^[0-9]+$ ]]; then
  726. valid_cidr=0
  727. fi
  728. fi
  729. if [ -n "$ipv6_valid" ] || [ "$valid_cidr" -eq 0 ]; then
  730. check_result "$E_INVALID" "invalid IP format :: $1"
  731. fi
  732. fi
  733. }
  734. # Proxy extention format validator
  735. is_extention_format_valid() {
  736. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|@|<|>|?|/|\|\"|'|;|%|\`| ]"
  737. if [[ "$1" =~ $exclude ]]; then
  738. check_result "$E_INVALID" "invalid proxy extention format :: $1"
  739. fi
  740. is_no_new_line_format "$1";
  741. }
  742. # Number format validator
  743. is_number_format_valid() {
  744. object_name=${2-number}
  745. if ! [[ "$1" =~ ^[0-9]+$ ]] ; then
  746. check_result "$E_INVALID" "invalid $object_name format :: $1"
  747. fi
  748. }
  749. # Autoreply format validator
  750. is_autoreply_format_valid() {
  751. if [ 10240 -le ${#1} ]; then
  752. check_result "$E_INVALID" "invalid autoreply format :: $1"
  753. fi
  754. }
  755. # Boolean format validator
  756. is_boolean_format_valid() {
  757. if [ "$1" != 'yes' ] && [ "$1" != 'no' ]; then
  758. check_result "$E_INVALID" "invalid $2 format :: $1"
  759. fi
  760. }
  761. # Common format validator
  762. is_common_format_valid() {
  763. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|<|>|?|/|\|\"|'|;|%|\`| ]"
  764. if [[ "$1" =~ $exclude ]]; then
  765. check_result "$E_INVALID" "invalid $2 format :: $1"
  766. fi
  767. if [ 400 -le ${#1} ]; then
  768. check_result "$E_INVALID" "invalid $2 format :: $1"
  769. fi
  770. if [[ "$1" =~ @ ]] && [ ${#1} -gt 1 ] ; then
  771. check_result "$E_INVALID" "invalid $2 format :: $1"
  772. fi
  773. if [[ $1 =~ \* ]]; then
  774. if [[ "$(echo $1 | grep -o '\*\.' |wc -l)" -eq 0 ]] && [[ $1 != '*' ]] ; then
  775. check_result "$E_INVALID" "invalid $2 format :: $1"
  776. fi
  777. fi
  778. if [[ $(echo -n "$1" | tail -c 1) =~ [^a-zA-Z0-9_*@] ]]; then
  779. check_result "$E_INVALID" "invalid $2 format :: $1"
  780. fi
  781. if [[ $(echo -n "$1" | grep -c '\.\.') -gt 0 ]];then
  782. check_result "$E_INVALID" "invalid $2 format :: $1"
  783. fi
  784. if [[ $(echo -n "$1" | head -c 1) =~ [^a-zA-Z0-9_*@] ]]; then
  785. check_result "$E_INVALID" "invalid $2 format :: $1"
  786. fi
  787. if [[ $(echo -n "$1" | grep -c '\-\-') -gt 0 ]]; then
  788. check_result "$E_INVALID" "invalid $2 format :: $1"
  789. fi
  790. if [[ $(echo -n "$1" | grep -c '\_\_') -gt 0 ]]; then
  791. check_result "$E_INVALID" "invalid $2 format :: $1"
  792. fi
  793. is_no_new_line_format "$1";
  794. }
  795. is_no_new_line_format() {
  796. test=$(echo "$1" | head -n1 );
  797. if [[ "$test" != "$1" ]]; then
  798. check_result "$E_INVALID" "invalid value :: $1"
  799. fi
  800. }
  801. is_string_format_valid() {
  802. exclude="[!|#|$|^|&|(|)|+|=|{|}|:|<|>|?|/|\|\"|'|;|%|\`]"
  803. if [[ "$1" =~ $exclude ]]; then
  804. check_result "$E_INVALID" "invalid $2 format :: $1"
  805. fi
  806. is_no_new_line_format "$1";
  807. }
  808. # Database format validator
  809. is_database_format_valid() {
  810. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|/|\|\"|'|;|%|\`| ]"
  811. if [[ "$1" =~ $exclude ]] || [ 64 -le ${#1} ]; then
  812. check_result "$E_INVALID" "invalid $2 format :: $1"
  813. fi
  814. is_no_new_line_format "$1";
  815. }
  816. # Date format validator
  817. is_date_format_valid() {
  818. if ! [[ "$1" =~ ^[0-9][0-9][0-9][0-9]-[0-9][0-9]-[0-9][0-9]$ ]]; then
  819. check_result "$E_INVALID" "invalid date format :: $1"
  820. fi
  821. }
  822. # Database user validator
  823. is_dbuser_format_valid() {
  824. exclude="[!|@|#|$|^|&|*|(|)|+|=|{|}|:|,|<|>|?|/|\|\"|'|;|%|\`| ]"
  825. if [ 33 -le ${#1} ]; then
  826. check_result "$E_INVALID" "mysql username can be up to 32 characters long"
  827. fi
  828. if [[ "$1" =~ $exclude ]]; then
  829. check_result "$E_INVALID" "invalid $2 format :: $1"
  830. fi
  831. is_no_new_line_format "$1"
  832. }
  833. # DNS record type validator
  834. is_dns_type_format_valid() {
  835. known_dnstype='A,AAAA,NS,CNAME,MX,TXT,SRV,DNSKEY,KEY,IPSECKEY,PTR,SPF,TLSA,CAA'
  836. if [ -z "$(echo $known_dnstype |grep -w $1)" ]; then
  837. check_result "$E_INVALID" "invalid dns record type format :: $1"
  838. fi
  839. }
  840. # DNS record validator
  841. is_dns_record_format_valid() {
  842. if [ "$rtype" = 'A' ]; then
  843. is_ip_format_valid "$1"
  844. fi
  845. if [ "$rtype" = 'NS' ]; then
  846. is_domain_format_valid "${1::-1}" 'ns_record'
  847. fi
  848. if [ "$rtype" = 'MX' ]; then
  849. is_domain_format_valid "${1::-1}" 'mx_record'
  850. is_int_format_valid "$priority" 'priority_record'
  851. fi
  852. is_no_new_line_format "$1";
  853. }
  854. # Email format validator
  855. is_email_format_valid() {
  856. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.[A-Za-z]{2,63}$ ]] ; then
  857. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.(xn--)[[:alnum:]]{2,63}$ ]] ; then
  858. check_result "$E_INVALID" "invalid email format :: $1"
  859. fi
  860. fi
  861. }
  862. # Firewall action validator
  863. is_fw_action_format_valid() {
  864. if [ "$1" != "ACCEPT" ] && [ "$1" != 'DROP' ] ; then
  865. check_result "$E_INVALID" "invalid action format :: $1"
  866. fi
  867. }
  868. # Firewall protocol validator
  869. is_fw_protocol_format_valid() {
  870. if [ "$1" != "ICMP" ] && [ "$1" != 'UDP' ] && [ "$1" != 'TCP' ] ; then
  871. check_result "$E_INVALID" "invalid protocol format :: $1"
  872. fi
  873. }
  874. # Firewall port validator
  875. is_fw_port_format_valid() {
  876. if [ "${#1}" -eq 1 ]; then
  877. if ! [[ "$1" =~ [0-9] ]]; then
  878. check_result "$E_INVALID" "invalid port format :: $1"
  879. fi
  880. else
  881. if ! [[ "$1" =~ ^[0-9][-|,|:|0-9]{0,30}[0-9]$ ]]
  882. then
  883. check_result "$E_INVALID" "invalid port format :: $1"
  884. fi
  885. fi
  886. }
  887. # Integer validator
  888. is_int_format_valid() {
  889. if ! [[ "$1" =~ ^[0-9]+$ ]] ; then
  890. check_result "$E_INVALID" "invalid $2 format :: $1"
  891. fi
  892. }
  893. # Interface validator
  894. is_interface_format_valid() {
  895. netdevices=$(cat /proc/net/dev |grep : |cut -f 1 -d : |tr -d ' ')
  896. if [ -z $(echo "$netdevices" |grep -x $1) ]; then
  897. check_result "$E_INVALID" "invalid interface format :: $1"
  898. fi
  899. }
  900. # IP status validator
  901. is_ip_status_format_valid() {
  902. if [ -z "$(echo shared,dedicated | grep -w $1 )" ]; then
  903. check_result "$E_INVALID" "invalid status format :: $1"
  904. fi
  905. }
  906. # Cron validator
  907. is_cron_format_valid() {
  908. limit=59
  909. check_format=''
  910. if [ "$2" = 'hour' ]; then
  911. limit=23
  912. fi
  913. if [ "$2" = 'day' ]; then
  914. limit=31
  915. fi
  916. if [ "$2" = 'month' ]; then
  917. limit=12
  918. fi
  919. if [ "$2" = 'wday' ]; then
  920. limit=7
  921. fi
  922. if [ "$1" = '*' ]; then
  923. check_format='ok'
  924. fi
  925. if [[ "$1" =~ ^[\*]+[/]+[0-9] ]]; then
  926. if [ "$(echo $1 |cut -f 2 -d /)" -lt $limit ]; then
  927. check_format='ok'
  928. fi
  929. fi
  930. if [[ "$1" =~ ^[0-9][-|,|0-9]{0,70}[\/][0-9]$ ]]; then
  931. check_format='ok'
  932. crn_values=${1//,/ }
  933. crn_values=${crn_values//-/ }
  934. crn_values=${crn_values//\// }
  935. for crn_vl in $crn_values; do
  936. if [ "$crn_vl" -gt $limit ]; then
  937. check_format='invalid'
  938. fi
  939. done
  940. fi
  941. crn_values=$(echo $1 |tr "," " " | tr "-" " ")
  942. for crn_vl in $crn_values
  943. do
  944. if [[ "$crn_vl" =~ ^[0-9]+$ ]] && [ "$crn_vl" -le $limit ]; then
  945. check_format='ok'
  946. fi
  947. done
  948. if [ "$check_format" != 'ok' ]; then
  949. check_result "$E_INVALID" "invalid $2 format :: $1"
  950. fi
  951. }
  952. # Name validator
  953. is_name_format_valid() {
  954. if ! [[ "$1" =~ ^[[:alnum:]][-|\ |\.|_[:alnum:]]{0,28}[[:alnum:]]$ ]]; then
  955. check_result "$E_INVALID" "invalid $2 format :: $1"
  956. fi
  957. }
  958. # Object validator
  959. is_object_format_valid() {
  960. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,64}[[:alnum:]]$ ]]; then
  961. check_result "$E_INVALID" "invalid $2 format :: $1"
  962. fi
  963. }
  964. # Role validator
  965. is_role_valid (){
  966. if ! [[ "$1" =~ ^admin$|^user$ ]]; then
  967. check_result "$E_INVALID" "invalid $2 format :: $1"
  968. fi
  969. }
  970. # Password validator
  971. is_password_format_valid() {
  972. if [ "${#1}" -lt '6' ]; then
  973. check_result "$E_INVALID" "invalid password format :: $1"
  974. fi
  975. }
  976. # Missing function -
  977. # Before: validate_format_shell
  978. # After: is_format_valid_shell
  979. is_format_valid_shell() {
  980. if [ -z "$(grep -w $1 /etc/shells)" ]; then
  981. echo "Error: shell $1 is not valid"
  982. log_event "$E_INVALID" "$EVENT"
  983. exit $E_INVALID
  984. fi
  985. }
  986. # Service name validator
  987. is_service_format_valid() {
  988. if ! [[ "$1" =~ ^[[:alnum:]][-|\.|_[:alnum:]]{0,64}$ ]]; then
  989. check_result "$E_INVALID" "invalid $2 format :: $1"
  990. fi
  991. }
  992. is_hash_format_valid() {
  993. if ! [[ "$1" =~ ^[[:alnum:]|\:|\=|_|-]{1,80}$ ]]; then
  994. check_result "$E_INVALID" "invalid $2 format :: $1"
  995. fi
  996. }
  997. # Format validation controller
  998. is_format_valid() {
  999. for arg_name in $*; do
  1000. eval arg=\$$arg_name
  1001. if [ -n "$arg" ]; then
  1002. case $arg_name in
  1003. access_key_id) is_access_key_id_format_valid "$arg" "$arg_name";;
  1004. account) is_user_format_valid "$arg" "$arg_name";;
  1005. action) is_fw_action_format_valid "$arg";;
  1006. active) is_boolean_format_valid "$arg" 'active' ;;
  1007. aliases) is_alias_format_valid "$arg" ;;
  1008. alias) is_alias_format_valid "$arg" ;;
  1009. antispam) is_boolean_format_valid "$arg" 'antispam' ;;
  1010. antivirus) is_boolean_format_valid "$arg" 'antivirus' ;;
  1011. autoreply) is_autoreply_format_valid "$arg" ;;
  1012. backup) is_object_format_valid "$arg" 'backup' ;;
  1013. charset) is_object_format_valid "$arg" "$arg_name" ;;
  1014. charsets) is_common_format_valid "$arg" 'charsets' ;;
  1015. chain) is_object_format_valid "$arg" 'chain' ;;
  1016. comment) is_object_format_valid "$arg" 'comment' ;;
  1017. database) is_database_format_valid "$arg" 'database';;
  1018. day) is_cron_format_valid "$arg" $arg_name ;;
  1019. dbpass) is_password_format_valid "$arg" ;;
  1020. dbuser) is_dbuser_format_valid "$arg" 'dbuser';;
  1021. dkim) is_boolean_format_valid "$arg" 'dkim' ;;
  1022. dkim_size) is_int_format_valid "$arg" ;;
  1023. domain) is_domain_format_valid "$arg" ;;
  1024. dom_alias) is_alias_format_valid "$arg" ;;
  1025. dvalue) is_dns_record_format_valid "$arg";;
  1026. email) is_email_format_valid "$arg" ;;
  1027. email_forward) is_email_format_valid "$arg" ;;
  1028. exp) is_date_format_valid "$arg" ;;
  1029. extentions) is_common_format_valid "$arg" 'extentions' ;;
  1030. format) is_type_valid 'plain json shell csv' "$arg" ;;
  1031. ftp_password) is_password_format_valid "$arg" ;;
  1032. ftp_user) is_user_format_valid "$arg" "$arg_name" ;;
  1033. hash) is_hash_format_valid "$arg" "$arg_name" ;;
  1034. host) is_object_format_valid "$arg" "$arg_name" ;;
  1035. hour) is_cron_format_valid "$arg" $arg_name ;;
  1036. id) is_int_format_valid "$arg" 'id' ;;
  1037. iface) is_interface_format_valid "$arg" ;;
  1038. ip) is_ip_format_valid "$arg" ;;
  1039. ipv6) is_ipv6_format_valid "$arg" ;;
  1040. ip46) is_ip46_format_valid "$arg" ;;
  1041. ip_name) is_domain_format_valid "$arg" 'IP name';;
  1042. ip_status) is_ip_status_format_valid "$arg" ;;
  1043. job) is_int_format_valid "$arg" 'job' ;;
  1044. key) is_common_format_valid "$arg" "$arg_name" ;;
  1045. malias) is_user_format_valid "$arg" "$arg_name" ;;
  1046. max_db) is_int_format_valid "$arg" 'max db';;
  1047. min) is_cron_format_valid "$arg" $arg_name ;;
  1048. month) is_cron_format_valid "$arg" $arg_name ;;
  1049. name) is_name_format_valid "$arg" "name" ;;
  1050. nat_ip) is_ip_format_valid "$arg" ;;
  1051. netmask) is_ip_format_valid "$arg" 'netmask' ;;
  1052. newid) is_int_format_valid "$arg" 'id' ;;
  1053. ns1) is_domain_format_valid "$arg" 'ns1' ;;
  1054. ns2) is_domain_format_valid "$arg" 'ns2' ;;
  1055. ns3) is_domain_format_valid "$arg" 'ns3' ;;
  1056. ns4) is_domain_format_valid "$arg" 'ns4' ;;
  1057. ns5) is_domain_format_valid "$arg" 'ns5' ;;
  1058. ns6) is_domain_format_valid "$arg" 'ns6' ;;
  1059. ns7) is_domain_format_valid "$arg" 'ns7' ;;
  1060. ns8) is_domain_format_valid "$arg" 'ns8' ;;
  1061. object) is_name_format_valid "$arg" 'object';;
  1062. package) is_object_format_valid "$arg" "$arg_name" ;;
  1063. password) is_password_format_valid "$arg" ;;
  1064. port) is_int_format_valid "$arg" 'port' ;;
  1065. port_ext) is_fw_port_format_valid "$arg";;
  1066. protocol) is_fw_protocol_format_valid "$arg" ;;
  1067. proxy_ext) is_extention_format_valid "$arg" ;;
  1068. quota) is_int_format_valid "$arg" 'quota' ;;
  1069. rate) is_int_format_valid "$arg" 'rate' ;;
  1070. record) is_common_format_valid "$arg" 'record';;
  1071. restart) is_restart_format_valid "$arg" 'restart' ;;
  1072. role) is_role_valid "$arg" 'role' ;;
  1073. rtype) is_dns_type_format_valid "$arg" ;;
  1074. rule) is_int_format_valid "$arg" "rule id" ;;
  1075. service) is_service_format_valid "$arg" "$arg_name" ;;
  1076. secret_access_key) is_secret_access_key_format_valid "$arg" "$arg_name" ;;
  1077. soa) is_domain_format_valid "$arg" 'SOA' ;;
  1078. #missing command: is_format_valid_shell
  1079. shell) is_format_valid_shell "$arg" ;;
  1080. ssl_dir) is_folder_exists "$arg" "$arg_name" ;;
  1081. stats_pass) is_password_format_valid "$arg" ;;
  1082. stats_user) is_user_format_valid "$arg" "$arg_name" ;;
  1083. template) is_object_format_valid "$arg" "$arg_name" ;;
  1084. theme) is_common_format_valid "$arg" "$arg_name" ;;
  1085. ttl) is_int_format_valid "$arg" 'ttl';;
  1086. user) is_user_format_valid "$arg" $arg_name;;
  1087. wday) is_cron_format_valid "$arg" $arg_name ;;
  1088. value) is_common_format_valid "$arg" $arg_name;;
  1089. esac
  1090. fi
  1091. done
  1092. }
  1093. is_folder_exists () {
  1094. if [ ! -d "$1" ]; then
  1095. check_result "$E_NOTEXIST" "folder $1 does not exist"
  1096. fi
  1097. }
  1098. is_command_valid_format () {
  1099. if [[ ! "$1" =~ ^v-[[:alnum:]][-|\.|_[:alnum:]]{0,64}[[:alnum:]]$ ]]; then
  1100. check_result "$E_INVALID" "Invalid command format"
  1101. fi
  1102. if [[ -n $( echo "$1" | grep -e '\-\-' ) ]]; then
  1103. check_result "$E_INVALID" "Invalid command format"
  1104. fi
  1105. }
  1106. # Check access_key_id name
  1107. # Don't work with legacy key format
  1108. is_access_key_id_format_valid() {
  1109. local hash="$1"
  1110. # ACCESS_KEY_ID format validation
  1111. if ! [[ "$hash" =~ ^[[:alnum:]]{20}$ ]]; then
  1112. check_result "$E_INVALID" "invalid $2 format :: $hash"
  1113. fi
  1114. }
  1115. # SECRET_ACCESS_KEY format validation
  1116. is_secret_access_key_format_valid() {
  1117. local hash="$1"
  1118. if ! [[ "$hash" =~ ^[[:alnum:]|_|\.|\+|/|\^|~|=|%|\-]{40}$ ]]; then
  1119. check_result "$E_INVALID" "invalid $2 format"
  1120. fi
  1121. }
  1122. # Checks if the secret belongs to the access key
  1123. check_access_key_secret() {
  1124. local access_key_id="$(basename "$1")"
  1125. local secret_access_key=$2
  1126. local -n key_user=$3
  1127. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1128. check_result "$E_PASSWORD" "Access key $access_key_id doesn't exist"
  1129. fi
  1130. if [[ -z "$secret_access_key" ]]; then
  1131. check_result "$E_PASSWORD" "Secret key not provided for key $access_key_id"
  1132. elif ! [[ "$secret_access_key" =~ ^[[:alnum:]|_|\.|\+|/|\^|~|=|%|\-]{40}$ ]]; then
  1133. check_result "$E_PASSWORD" "Invalid secret key for key $access_key_id"
  1134. else
  1135. SECRET_ACCESS_KEY=""
  1136. source_conf "$HESTIA/data/access-keys/${access_key_id}";
  1137. if [[ -z "$SECRET_ACCESS_KEY" || "$SECRET_ACCESS_KEY" != "$secret_access_key" ]]; then
  1138. check_result "$E_PASSWORD" "Invalid secret key for key $access_key_id"
  1139. fi
  1140. fi
  1141. key_user="$USER"
  1142. }
  1143. # Checks if the key belongs to the user
  1144. check_access_key_user() {
  1145. local access_key_id="$(basename "$1")"
  1146. local user=$2
  1147. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1148. check_result "$E_FORBIDEN" "Access key $access_key_id doesn't exist"
  1149. fi
  1150. if [[ -z "$user" ]]; then
  1151. check_result "$E_FORBIDEN" "User not provided"
  1152. else
  1153. USER=""
  1154. source_conf "$HESTIA/data/access-keys/${access_key_id}";
  1155. if [[ -z "$USER" || "$USER" != "$user" ]]; then
  1156. check_result "$E_FORBIDEN" "key $access_key_id does not belong to the user $user"
  1157. fi
  1158. fi
  1159. }
  1160. # Checks if the key is allowed to run the command
  1161. check_access_key_cmd() {
  1162. local access_key_id="$(basename "$1")"
  1163. local cmd=$2
  1164. local -n user_arg_position=$3
  1165. if [[ "$DEBUG_MODE" = "true" ]]; then
  1166. new_timestamp
  1167. echo "[$date:$time] $1 $2" >> /var/log/hestia/api.log
  1168. fi
  1169. if [[ -z "$access_key_id" || ! -f "$HESTIA/data/access-keys/${access_key_id}" ]]; then
  1170. check_result "$E_FORBIDEN" "Access key $access_key_id doesn't exist"
  1171. fi
  1172. if [[ -z "$cmd" ]]; then
  1173. check_result "$E_FORBIDEN" "Command not provided"
  1174. elif [[ "$cmd" = 'v-make-tmp-file' ]]; then
  1175. USER="" PERMISSIONS=""
  1176. source_conf "${HESTIA}/data/access-keys/${access_key_id}"
  1177. local allowed_commands
  1178. if [[ -n "$PERMISSIONS" ]]; then
  1179. allowed_commands="$(get_apis_commands "$PERMISSIONS")"
  1180. if [[ -z "$(echo ",${allowed_commands}," | grep ",${hst_command},")" ]]; then
  1181. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1182. fi
  1183. elif [[ -z "$PERMISSIONS" && "$USER" != "admin" ]]; then
  1184. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1185. fi
  1186. user_arg_position="0"
  1187. elif [[ ! -e "$BIN/$cmd" ]]; then
  1188. check_result "$E_FORBIDEN" "Command $cmd not found"
  1189. else
  1190. USER="" PERMISSIONS=""
  1191. source_conf "${HESTIA}/data/access-keys/${access_key_id}"
  1192. local allowed_commands
  1193. if [[ -n "$PERMISSIONS" ]]; then
  1194. allowed_commands="$(get_apis_commands "$PERMISSIONS")"
  1195. if [[ -z "$(echo ",${allowed_commands}," | grep ",${hst_command},")" ]]; then
  1196. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1197. fi
  1198. elif [[ -z "$PERMISSIONS" && "$USER" != "admin" ]]; then
  1199. check_result "$E_FORBIDEN" "Key $access_key_id don't have permission to run the command $hst_command"
  1200. fi
  1201. if [[ "$USER" == "admin" ]]; then
  1202. # Admin can run commands for any user
  1203. user_arg_position="0"
  1204. else
  1205. user_arg_position="$(search_command_arg_position "$hst_command" "USER")"
  1206. if ! [[ "$user_arg_position" =~ ^[0-9]+$ ]]; then
  1207. check_result "$E_FORBIDEN" "Command $hst_command not found"
  1208. fi
  1209. fi
  1210. fi
  1211. }
  1212. # Domain argument formatting
  1213. format_domain() {
  1214. if [[ "$domain" = *[![:ascii:]]* ]]; then
  1215. if [[ "$domain" =~ [[:upper:]] ]]; then
  1216. domain=$(echo "$domain" |sed 's/[[:upper:]].*/\L&/')
  1217. fi
  1218. else
  1219. if [[ "$domain" =~ [[:upper:]] ]]; then
  1220. domain=$(echo "$domain" |tr '[:upper:]' '[:lower:]')
  1221. fi
  1222. fi
  1223. if [[ "$domain" =~ ^www\..* ]]; then
  1224. domain=$(echo "$domain" |sed -e "s/^www.//")
  1225. fi
  1226. if [[ "$domain" =~ .*\.$ ]]; then
  1227. domain=$(echo "$domain" |sed -e "s/[.]*$//g")
  1228. fi
  1229. if [[ "$domain" =~ ^\. ]]; then
  1230. domain=$(echo "$domain" |sed -e "s/^[.]*//")
  1231. fi
  1232. }
  1233. format_domain_idn() {
  1234. if [ -z "$domain_idn" ]; then
  1235. domain_idn=$domain
  1236. fi
  1237. if [[ "$domain_idn" = *[![:ascii:]]* ]]; then
  1238. domain_idn=$(idn2 --quiet $domain_idn)
  1239. fi
  1240. }
  1241. format_aliases() {
  1242. if [ -n "$aliases" ] && [ "$aliases" != 'none' ]; then
  1243. aliases=$(echo $aliases |tr '[:upper:]' '[:lower:]' |tr ',' '\n')
  1244. aliases=$(echo "$aliases" |sed -e "s/\.$//" |sort -u)
  1245. aliases=$(echo "$aliases" |tr -s '.')
  1246. aliases=$(echo "$aliases" |sed -e "s/[.]*$//g")
  1247. aliases=$(echo "$aliases" |sed -e "s/^[.]*//")
  1248. aliases=$(echo "$aliases" |sed -e "/^$/d")
  1249. aliases=$(echo "$aliases" |tr '\n' ',' |sed -e "s/,$//")
  1250. fi
  1251. }
  1252. is_restart_format_valid() {
  1253. if [ "$1" != 'yes' ] && [ "$1" != 'no' ] && [ "$1" != 'ssl' ] && [ "$1" != 'reload' ] && [ "$1" != 'updatessl' ]; then
  1254. check_result "$E_INVALID" "invalid $2 format :: $1"
  1255. fi
  1256. }
  1257. check_backup_conditions() {
  1258. # Checking load average
  1259. la=$(cat /proc/loadavg |cut -f 1 -d ' ' |cut -f 1 -d '.')
  1260. # i=0
  1261. while [ "$la" -ge "$BACKUP_LA_LIMIT" ]; do
  1262. echo -e "$(date "+%F %T") Load Average $la"
  1263. sleep 60
  1264. la=$(cat /proc/loadavg |cut -f 1 -d ' ' |cut -f 1 -d '.')
  1265. done
  1266. }
  1267. # Define download function
  1268. download_file() {
  1269. local url=$1
  1270. local destination=$2
  1271. local force=$3
  1272. # Default destination is the curent working directory
  1273. local dstopt=""
  1274. if [ -n "$(echo "$url" | grep -E "\.(gz|gzip|bz2|zip|xz)$")" ]; then
  1275. # When an archive file is downloaded it will be first saved localy
  1276. dstopt="--directory-prefix=$ARCHIVE_DIR"
  1277. local is_archive="true"
  1278. local filename="${url##*/}"
  1279. if [ -z "$filename" ]; then
  1280. >&2 echo "[!] No filename was found in url, exiting ($url)"
  1281. exit 1
  1282. fi
  1283. if [ -n "$force" ] && [ -f "$ARCHIVE_DIR/$filename" ]; then
  1284. rm -f $ARCHIVE_DIR/$filename
  1285. fi
  1286. elif [ -n "$destination" ]; then
  1287. # Plain files will be written to specified location
  1288. dstopt="-O $destination"
  1289. fi
  1290. # check for corrupted archive
  1291. if [ -f "$ARCHIVE_DIR/$filename" ] && [ "$is_archive" = "true" ]; then
  1292. tar -tzf "$ARCHIVE_DIR/$filename" > /dev/null 2>&1
  1293. if [ $? -ne 0 ]; then
  1294. >&2 echo "[!] Archive $ARCHIVE_DIR/$filename is corrupted, redownloading"
  1295. rm -f $ARCHIVE_DIR/$filename
  1296. fi
  1297. fi
  1298. if [ ! -f "$ARCHIVE_DIR/$filename" ]; then
  1299. wget $url -q $dstopt --show-progress --progress=bar:force --limit-rate=3m
  1300. fi
  1301. if [ -n "$destination" ] && [ "$is_archive" = "true" ]; then
  1302. if [ "$destination" = "-" ]; then
  1303. cat "$ARCHIVE_DIR/$filename"
  1304. elif [ -d "$(dirname $destination)" ]; then
  1305. cp "$ARCHIVE_DIR/$filename" "$destination"
  1306. fi
  1307. fi
  1308. }
  1309. check_hestia_demo_mode() {
  1310. demo_mode=$(grep DEMO_MODE /usr/local/hestia/conf/hestia.conf | cut -d '=' -f2 | sed "s|'||g")
  1311. if [ -n "$demo_mode" ] && [ "$demo_mode" = "yes" ]; then
  1312. echo "ERROR: Unable to perform operation due to security restrictions that are in place."
  1313. exit 1
  1314. fi
  1315. }
  1316. multiphp_count() {
  1317. $BIN/v-list-sys-php plain | wc -l
  1318. }
  1319. multiphp_versions() {
  1320. local -a php_versions_list;
  1321. local php_ver;
  1322. if [ "$(multiphp_count)" -gt 0 ] ; then
  1323. for php_ver in $( $BIN/v-list-sys-php plain); do
  1324. [ ! -d "/etc/php/$php_ver/fpm/pool.d/" ] && continue
  1325. php_versions_list+=($php_ver)
  1326. done
  1327. echo "${php_versions_list[@]}"
  1328. fi
  1329. }
  1330. multiphp_default_version() {
  1331. # Get system wide default php version (set by update-alternatives)
  1332. local sys_phpversion=$(php -r "echo substr(phpversion(),0,3);")
  1333. # Check if the system php also has php-fpm enabled, otherwise return
  1334. # the most recent php version which does have it installed.
  1335. if [ ! -d "/etc/php/$sys_phpversion/fpm/pool.d/" ]; then
  1336. local all_versions="$(multiphp_versions)"
  1337. if [ -n "$all_versions" ]; then
  1338. sys_phpversion="${all_versions##*\ }";
  1339. fi
  1340. fi
  1341. echo "$sys_phpversion"
  1342. }
  1343. is_hestia_package(){
  1344. if [ -z "$(echo $1 | grep -w $2)" ]; then
  1345. check_result "$E_INVALID" "$2 package is not controlled by hestiacp"
  1346. fi
  1347. }
  1348. # Run arbitrary cli commands with dropped privileges
  1349. # Note: setpriv --init-groups is not available on debian9 (util-linux 2.29.2)
  1350. # Input:
  1351. # - $user : Vaild hestia user
  1352. user_exec() {
  1353. is_object_valid 'user' 'USER' "$user"
  1354. local user_groups=$(id -G "$user")
  1355. user_groups=${user_groups//\ /,}
  1356. setpriv --groups "$user_groups" --reuid "$user" --regid "$user" -- "${@}"
  1357. }
  1358. # Simple chmod wrapper that skips symlink files after glob expand
  1359. no_symlink_chmod() {
  1360. local filemode=$1; shift;
  1361. for i in "$@"; do
  1362. [[ -L ${i} ]] && continue
  1363. chmod "${filemode}" "${i}"
  1364. done
  1365. }
  1366. source_conf(){
  1367. while IFS='= ' read -r lhs rhs
  1368. do
  1369. if [[ ! $lhs =~ ^\ *# && -n $lhs ]]; then
  1370. rhs="${rhs%%^\#*}" # Del in line right comments
  1371. rhs="${rhs%%*( )}" # Del trailing spaces
  1372. rhs="${rhs%\'*}" # Del opening string quotes
  1373. rhs="${rhs#\'*}" # Del closing string quotes
  1374. declare -g $lhs="$rhs"
  1375. fi
  1376. done < $1
  1377. }
  1378. format_no_quotes() {
  1379. exclude="['|\"]"
  1380. if [[ "$1" =~ $exclude ]]; then
  1381. check_result "$E_INVALID" "Invalid $2 contains qoutes (\" or ') :: $1"
  1382. fi
  1383. is_no_new_line_format "$1"
  1384. }
  1385. is_username_format_valid(){
  1386. if [[ ! "$1" =~ ^[A-Za-z0-9._%+-]+@[[:alnum:].-]+\.[A-Za-z]{2,63}$ ]] ; then
  1387. is_string_format_valid "$1" "$2"
  1388. fi
  1389. }
  1390. change_sys_value(){
  1391. check_ckey=$(grep "^$1='" "$HESTIA/conf/hestia.conf")
  1392. if [ -z "$check_ckey" ]; then
  1393. echo "$1='$2'" >> "$HESTIA/conf/hestia.conf"
  1394. else
  1395. sed -i "s|^$1=.*|$1='$2'|g" "$HESTIA/conf/hestia.conf"
  1396. fi
  1397. }
  1398. # Checks the format of APIs that will be allowed for the key
  1399. is_key_permissions_format_valid() {
  1400. local permissions="$1"
  1401. local user="$2"
  1402. if [[ "$user" != "admin" && -z "$permissions" ]]; then
  1403. check_result "$E_INVALID" "Non-admin users need a permission list"
  1404. fi
  1405. while IFS=',' read -ra permissions_arr; do
  1406. for permission in "${permissions_arr[@]}"; do
  1407. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1408. # if [[ -z "$(echo "$permission" | grep -E "^v-")" ]]; then
  1409. if [[ ! -e "$HESTIA/data/api/$permission" ]]; then
  1410. check_result "$E_NOTEXIST" "API $permission doesn't exist"
  1411. fi
  1412. source_conf "$HESTIA/data/api/$permission";
  1413. if [ "$ROLE" = "admin" ] && [ "$user" != "admin" ]; then
  1414. check_result "$E_INVALID" "Only the admin can run this API"
  1415. fi
  1416. # elif [[ ! -e "$BIN/$permission" ]]; then
  1417. # check_result "$E_NOTEXIST" "Command $permission doesn't exist"
  1418. # fi
  1419. done
  1420. done <<<"$permissions"
  1421. }
  1422. # Remove whitespaces, and bin path from commands
  1423. cleanup_key_permissions() {
  1424. local permissions="$1"
  1425. local final quote
  1426. while IFS=',' read -ra permissions_arr; do
  1427. for permission in "${permissions_arr[@]}"; do
  1428. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1429. # Avoid duplicate items
  1430. if [[ -z "$(echo ",${final}," | grep ",${permission},")" ]]; then
  1431. final+="${quote}${permission}"
  1432. quote=','
  1433. fi
  1434. done
  1435. done <<<"$permissions"
  1436. echo "$final"
  1437. }
  1438. # Extract all allowed commands from a permission list
  1439. get_apis_commands() {
  1440. local permissions="$1"
  1441. local allowed_commands quote commands_to_add
  1442. while IFS=',' read -ra permissions_arr; do
  1443. for permission in "${permissions_arr[@]}"; do
  1444. permission="$(basename "$permission" | sed -E "s/^\s*|\s*$//g")"
  1445. commands_to_add=""
  1446. # if [[ -n "$(echo "$permission" | grep -E "^v-")" ]]; then
  1447. # commands_to_add="$permission"
  1448. # el
  1449. if [[ -e "$HESTIA/data/api/$permission" ]]; then
  1450. source_conf "$HESTIA/data/api/$permission";
  1451. commands_to_add="$COMMANDS"
  1452. fi
  1453. if [[ -n "$commands_to_add" ]]; then
  1454. allowed_commands+="${quote}${commands_to_add}"
  1455. quote=','
  1456. fi
  1457. done
  1458. done <<<"$permissions"
  1459. cleanup_key_permissions "$allowed_commands"
  1460. }
  1461. # Get the position of an argument by name in a hestia command using the command's documentation comment.
  1462. #
  1463. # Return:
  1464. # * 0: It doesn't have the argument;
  1465. # * 1-9: The position of the argument in the command.
  1466. search_command_arg_position() {
  1467. local hst_command="$(basename "$1")"
  1468. local arg_name="$2"
  1469. local command_path="$BIN/$hst_command"
  1470. if [[ -z "$hst_command" || ! -e "$command_path" ]]; then
  1471. echo "-1"
  1472. return
  1473. fi
  1474. local position=0
  1475. local count=0
  1476. local command_options="$(sed -En 's/^# options: (.+)/\1/p' "$command_path")"
  1477. while IFS=' ' read -ra options_arr; do
  1478. for option in "${options_arr[@]}"; do
  1479. count=$((count+1))
  1480. option_name="$(echo " $option " | sed -E 's/^(\s|\[)*|(\s|\])*$//g')"
  1481. if [[ "${option_name^^}" == "$arg_name" ]]; then
  1482. position=$count
  1483. fi
  1484. done
  1485. done <<<"$command_options"
  1486. echo "$position"
  1487. }