????
Current Path : /proc/322176/root/scripts/ |
Current File : //proc/322176/root/scripts/cpuser_port_authority |
#!/usr/local/cpanel/3rdparty/bin/perl # cpanel - scripts/cpuser_port_authority Copyright 2022 cPanel, L.L.C. # All rights reserved. # copyright@cpanel.net http://cpanel.net # This code is subject to the cPanel license. Unauthorized copying is prohibited use strict; use warnings; package scripts::cpuser_port_authority; use Cpanel::JSON (); use Cpanel::Transaction::File::JSON (); use Cpanel::Config::LoadUserDomains (); use Cpanel::Debug (); use Cpanel::Validate::Username (); use Cpanel::FileUtils::Write (); use Cpanel::PwCache (); our $port_authority_conf = "/etc/cpanel/cpuser_port_authority.json"; my $cmds = { give => { code => \&give, clue => "give <user> <number of ports> [--service=my_app]", abstract => 'Give a user 1 or more ports.', help => "Give a user 1 or more ports, that only they can run a service on.\n --service=<NAME> this will tie a service name, as appropriate for scripts/cpuser_service_manager, to the ports for reference", }, take => { code => \&take, clue => "take <user> <port-number> [<port-number> <port-number> …]", abstract => "Take 1 or more ports from a user.", help => "Take 1 or more ports from a user. Errors out completely if any of the given ports do not belong to them.", }, list => { code => \&list, clue => "list [<user>]", abstract => "List port assignment information.", help => "List port assignment information. If given a user it lists only that user’s information. The output is in human friendly JSON format.", }, fw => { code => \&fw, clue => "fw", abstract => "Setup Firewall", help => "Setup the firewall rules to match the configured port assignments", }, user => { code => \&user, clue => "user (remove|change) <user> [<new_user>]", abstract => "Operate on a given user’s port assignments", help => "Remove all ports owned by the given user. Change port ownership from <user> to <new_user>.", }, }; my $hint_blurb = "Usage: `$0 {command} …`.\n\tThis tool supports the following commands:"; my $opts = { 'help:pre_hint' => $hint_blurb, 'help:pre_help' => "Various user-assigned-port related admin utilities\n\n$hint_blurb", default_commands => "help", alias => { free => "take", firewall => "fw" }, }; run(@ARGV) if !caller; sub run { my (@argv) = @_; die "This script should only be called as root\n" if $> != 0; local $ENV{TERM} = $ENV{TERM} || "xterm-256color"; # non-CLI modulino avoid needless: Cannot find termcap: TERM not set at …/Term/ReadLine.pm line 373. require App::CmdDispatch; import App::CmdDispatch; # need to have App::CmdDispatch do this automatically see CPANEL-22328 if ( @argv && grep { defined && m/\A\-\-help\z/ } @argv ) { App::CmdDispatch->new( $cmds, $opts )->help(); exit(0); } my $orig_command_hint = \&App::CmdDispatch::command_hint; no warnings "redefine"; local *App::CmdDispatch::command_hint = sub { $orig_command_hint->(@_); exit(1); }; no warnings 'once'; require App::CmdDispatch::IO; local *App::CmdDispatch::IO::print = sub { shift; if ( ref($@) && $@ =~ m/^App::CmdDispatch::Exception/ ) { CORE::print STDERR @_; return; } CORE::print(@_); return; }; local *App::CmdDispatch::MinimalIO::print = \&App::CmdDispatch::IO::print; use warnings 'once'; # ^^^ /need to have App::CmdDispatch do this automatically see CPANEL-22328 if ( $ARGV[0] && $ARGV[0] eq 'help' ) { require Cpanel::Services::Firewall; if ( Cpanel::Services::Firewall::is_firewalld() ) { $opts->{'help:post_help'} = _get_firewalld_caveat(); } } my $app = App::CmdDispatch->new( $cmds, $opts ); if ( ref( $app->{io} ) eq "1" ) { # To work around https://rt.cpan.org/Ticket/Display.html?id=132309 $app->{io} = bless {}, "App::CmdDispatch::MinimalIO"; } return $app->run(@argv); } ################ #### commands ## ################ sub give { my ( $app, $user, $count, @flags ) = @_; _validate_user_arg( $app, $user ); if ( !defined $count || $count !~ m/^[1-9][0-9]*$/ ) { _bail( $app, "The number of ports you want assigned must be a whole number greater than 0." ); } my @ports = _get_next_n_ports($count); # dies if it can't get $count ports _add_conf( $app, $user => \@ports, @flags ); # dies if port is already assigned (i.e. raced from _get_next_n_ports()), dies if it can’t save for my $port (@ports) { print "$port\n"; } _setup_firewall(); return; } sub take { my ( $app, $user, @ports ) = @_; _validate_user_arg( $app, $user ); die "No ports given.\n" if !@ports; my $transaction = Cpanel::Transaction::File::JSON->new( path => $port_authority_conf, permissions => 0640, ); my $data = $transaction->get_data(); my $hr = ref($data) eq 'HASH' ? $data : {}; for my $port (@ports) { if ( !defined $port || $port !~ m/^[1-9][0-9]*$/ ) { die "Invalid port.\n"; } elsif ( !exists $hr->{$port} ) { die "“$port” is not assigned.\n"; } elsif ( $hr->{$port}{owner} ne $user ) { die "“$port” is not owned by “$user”.\n"; } else { delete $hr->{$port}; } } $transaction->set_data($hr); _write_transaction($transaction); _setup_firewall(); return; } sub user { my ( $app, $action, $user, $new_user ) = @_; die "invalid action for `user` subcommand\n" if !defined $action || ( $action ne "remove" && $action ne "change" ); # This function is used in 2 ways, from the command line where multiple actions are # allowed. And from the Task processor, where it is in reaction to a modify account. # In the latter case, the action will be "change", and the original user will have # already been changed to new_user, and is no longer valid. if ( $action eq "change" && defined $user && defined $new_user && Cpanel::Validate::Username::user_exists($new_user) && !Cpanel::Validate::Username::user_exists($user) ) { _validate_user_arg( $app, $new_user ); } else { _validate_user_arg( $app, $user ); } if ( $action eq "change" ) { die "New username is not valid.\n" if !defined $new_user || !Cpanel::Validate::Username::is_strictly_valid($new_user); die "Too many arguments.\n" if @_ > 4; } else { die "Too many arguments.\n" if @_ > 3; } my $transaction = Cpanel::Transaction::File::JSON->new( path => $port_authority_conf, permissions => 0640, ); my $data = $transaction->get_data(); my $hr = ref($data) eq 'HASH' ? $data : {}; my $count = 0; for my $port ( sort keys %{$hr} ) { if ( $hr->{$port}{owner} eq $user ) { $count++; if ( $action eq "change" ) { $hr->{$port}{owner} = $new_user; } else { delete $hr->{$port}; } } } if ($count) { $transaction->set_data($hr); _write_transaction($transaction); _setup_firewall(); } else { eval { $transaction->close_or_die; }; warn $@ if $@; } print "", ( $action eq "change" ? "Updated" : "Removed" ), ": $count\n"; return; } sub list { my ( $app, $user ) = @_; my $hr = eval { Cpanel::JSON::LoadFile($port_authority_conf) } || {}; if ( $user || @_ == 2 ) { _validate_user_arg( $app, $user ); for my $port ( keys %{$hr} ) { delete $hr->{$port} if $hr->{$port}{owner} ne $user; } } print Cpanel::JSON::pretty_canonical_dump($hr); return; } sub fw { _setup_firewall(); return; } ############################## #### used by task processor ## ############################## sub call_ubic { my ( $user, @args ) = @_; my $curhome = Cpanel::PwCache::gethomedir($user); if ( -s "$curhome/.ubic.cfg" ) { require Cpanel::AccessIds; Cpanel::AccessIds::do_as_user_with_exception( $user, sub { local $ENV{HOME} = $curhome; # would be cool if Cpanel::FindBin (or whatever) did this for us: CPANEL-22345 and CPANEL-23118 my $real_perl = readlink("/usr/local/cpanel/3rdparty/bin/perl"); my $cp_bin_dir = $real_perl; $cp_bin_dir =~ s{/perl$}{}; local $ENV{PATH} = "$cp_bin_dir:$ENV{PATH}"; # not only does this allow it to find our ubic-admin, it allows its env-shebang to pick up our perl system( "ubic", @args ); } ); } return; } sub update_ubic_conf { my ( $user, $orig_user ) = @_; my $newhome = Cpanel::PwCache::gethomedir($user); die "Invalid new username\n" if ( !$newhome || !-d $newhome ); my $ubic_note = "IMPORTANT = Do not edit this cPanel User Service Manager generated file!"; # from scripts/cpuser_service_manager, DO NOT prepend a '#' my $ubic_cnf_path = "$newhome/.ubic.cfg"; if ( -s $ubic_cnf_path ) { require Cpanel::LoadFile; require Cpanel::AccessIds; Cpanel::AccessIds::do_as_user_with_exception( $user, sub { my $had_ubic_note = 0; my $new_ubic = ""; for my $line ( split( /\n/, Cpanel::LoadFile::load($ubic_cnf_path) ) ) { if ( $line =~ m/^\s*data_dir\s*=/ ) { $new_ubic .= "data_dir = $newhome/ubic/data\n"; } elsif ( $line =~ m/^\s*default_user\s*=/ ) { $new_ubic .= "default_user = $user\n"; } elsif ( $line =~ m/^\s*service_dir\s*=/ ) { $new_ubic .= "service_dir = $newhome/ubic/service\n"; } elsif ( $line eq $ubic_note ) { $had_ubic_note++; $new_ubic .= "$ubic_note\n"; } else { if ( $line ne "" ) { warn "Custom line in $ubic_cnf_path may be incorrect:\n\t(Line: '$line')\n"; # could modify it but you get into a rats nest: # e.g. change homedir then username: # what happens when old name is foo and the new name if foo1: # /home/foo becomes /home/foo1 # /home/foo1 becomes /home/foo11 # e.g. change username then homedir # what happens when old name is bar and the new homedir is /home2/bart # /home/bar becomes /home/bart # /home/bart becomes /home2/bartt # they really shouldn't be editing this file anyway ¯\_(ツ)_/¯ } $new_ubic .= "$line\n"; } } if ( !$had_ubic_note ) { $new_ubic = "$ubic_note\n$new_ubic"; } Cpanel::FileUtils::Write::overwrite( $ubic_cnf_path, $new_ubic ); my $ubic_update_service = $newhome . "/ubic/service/ubic/update"; my $ubic_watchdog_service = $newhome . "/ubic/service/ubic/watchdog"; foreach my $file ( $ubic_update_service, $ubic_watchdog_service ) { if ( -e $file ) { my $new_ubic = ""; my $did_something = 0; for my $line ( split( /\n/, Cpanel::LoadFile::load($file) ) ) { my $working = $line; if ( $working =~ m:'--stdout=/.+?/$orig_user/.*': ) { $working =~ s:(--stdout=/.+?)/$orig_user/:$1/$user/:; } if ( $working =~ m:'--stderr=/.+?/$orig_user/.*': ) { $working =~ s:(--stderr=/.+?)/$orig_user/:$1/$user/:; } $new_ubic .= $working; } Cpanel::FileUtils::Write::overwrite( $file, $new_ubic ); } } } ); } return; } ############### #### helpers ## ############### sub _setup_firewall { require Cpanel::Services::Firewall; if ( Cpanel::Services::Firewall::is_firewalld() ) { warn _get_firewalld_caveat() . "\n"; } print "Setting up firewall …\n"; require Capture::Tiny; my ( $out, $rv ) = Capture::Tiny::capture_merged( \&Cpanel::Services::Firewall::setup_firewall ); if ($rv) { # setup_firewall() RV is suitable for exit($rv||0) warn "Firewall setup reported a problem. Please run /usr/local/cpanel/scripts/configure_firewall_for_cpanel to ensure the firewall is OK.\n"; return; } else { print " … done.\n"; } return 1; } sub _validate_user_arg { my ( $app, $user ) = @_; _bail( $app, "The user argument is missing." ) if !$user; if ( $user ne "root" ) { my $user_lookup = Cpanel::Config::LoadUserDomains::loaduserdomains( undef, 0, 1 ); _bail( $app, "The given user is not a cPanel user.\n" ) if !$user_lookup->{$user}; } return 1; } sub _get_next_n_ports { my ($n) = @_; my ( $bottom_min, $bottom_max, $top_min, $top_max ) = _get_port_ranges(); my $port; # buffer my @ports; for $port ( $bottom_min .. $bottom_max ) { push @ports, $port if !_is_port_assigned($port); last if @ports == $n; } return @ports if @ports == $n; if ( defined $top_min ) { for $port ( $top_min .. $top_max ) { push @ports, $port if !_is_port_assigned($port); last if @ports == $n; } } die "Not enough free ports (wanted $n)\n" if @ports != $n; return @ports; } my $lookup_cache; sub _add_conf { my ( $app, $user, $ports, @flags ) = @_; # There is an old unused system (to be deprecated/removed via CPANEL-22447) that uses # /var/cpanel/portassignments.db (YAML) && /etc/portassignments (key: value version of the .db file …) # We could import those here if they exist but probably YAGNI. my $service; for my $flag (@flags) { if ( defined $flag && $flag =~ m/^\-\-service/ ) { $service = $flag; $service =~ s/^\-\-service//; $service =~ s/^=//; # do this sperately in case they just pass `--service` or `--service=` if ( $service !~ m/^[\w-]+(?:\.[\w-]+)*$/ ) { # regexp is $service_name_re from Ubic.pm v1.60 _bail( $app, "Invalid service name" ); } } } my $transaction = Cpanel::Transaction::File::JSON->new( path => $port_authority_conf, permissions => 0640, ); my $data = $transaction->get_data(); my $hr = ref($data) eq 'HASH' ? $data : {}; for my $port ( @{$ports} ) { die "port “$port” already assigned (is someone else logged in as root and running this script?)\n" if exists $hr->{$port}; $hr->{$port} = { owner => $user }; $hr->{$port}{service} = $service if $service; } $transaction->set_data($hr); _write_transaction($transaction); return; } sub _write_transaction { my ($transaction) = @_; eval { $transaction->save_pretty_canonical_or_die(); $transaction->close_or_die(); }; warn $@ if $@; $lookup_cache = undef; return; } sub _get_cmd { return $cmds; } sub _bail { my ( $app, $msg ) = @_; chomp($msg); # !$app for task processor die "$msg\n" if $ENV{ __PACKAGE__ . "::bail_die" } || !$app; # for API calls, otherwise: warn "$msg\n"; $app->help(); # there is no return()ing from this lol exit(1); ## no critic qw(Cpanel::NoExitsFromSubroutines) the refactor here is risky } sub _is_port_assigned { my ($port) = @_; if ( !$lookup_cache ) { $lookup_cache = eval { Cpanel::JSON::LoadFile($port_authority_conf) } || {}; } return exists $lookup_cache->{$port}; } my ( $bottom_min, $bottom_max, $top_min, $top_max ); sub _get_port_ranges { if ( !defined $bottom_min ) { # even if FTP is disabled ATM, it could be re-enabled (¿TODO/YAGNI? only factor these in if FTP is currently enabled my ( $passive_ftp_start, $passive_ftp_end ) = ( 49_152, 65_534 ); no warnings "redefine"; local *Cpanel::Debug::log_warn = sub { }; # facepalm … require Cpanel::FtpUtils::Config; my $ftp_conf = Cpanel::FtpUtils::Config->new->get_config; my $ftp_passive_range = $ftp_conf->{PassivePortRange} || $ftp_conf->{PassivePorts}; if ($ftp_passive_range) { ( $passive_ftp_start, $passive_ftp_end ) = split( /\s+/, $ftp_passive_range ); } my ( $ephemeral_start, $ephemeral_end ) = ( 49_152, 65_535 ); # IANA defaults require File::stat; if ( File::stat::stat("/proc/sys/net/ipv4/ip_local_port_range") ) { require Path::Tiny; my $ip_local_port_range_raw = Path::Tiny::path("/proc/sys/net/ipv4/ip_local_port_range")->slurp; chomp($ip_local_port_range_raw); ( $ephemeral_start, $ephemeral_end ) = split( /\s+/, $ip_local_port_range_raw ); if ( $ephemeral_start > $passive_ftp_start ) { $ephemeral_start = $passive_ftp_start; } if ( $ephemeral_end < $passive_ftp_end ) { $ephemeral_end = $passive_ftp_end; } } $ephemeral_start = 10_001 if $ephemeral_start < 10_001; $ephemeral_end = $ephemeral_start + 1 if $ephemeral_end < $ephemeral_start; ( $bottom_min, $bottom_max, $top_min, $top_max ) = ( 10_000 => ( $ephemeral_start - 1 ), ( $ephemeral_end + 1 ) => 65535 ); if ( $ephemeral_end >= 65535 ) { ( $top_min, $top_max ) = ( undef, undef ); } } return ( $bottom_min, $bottom_max, $top_min, $top_max ); } sub _silent_sys { my (@sys) = @_; require Capture::Tiny; my ( $out, $exit ) = Capture::Tiny::capture_merged( sub { system(@sys) } ); die "`@sys` exited unclean ($exit)\n" if $exit; #TODO/YAGNI: output $out if --verbose return; } sub _get_firewalld_caveat { my $message = <<"END_FIREWALLD"; ℹ️ [Caveat] Currently, firewalld does not respect port ownership assignments. To enforce port ownership, you must use iptables tables instead. We will update this system when the functionality is available. END_FIREWALLD require Cpanel::Output::Formatted::Terminal; return Cpanel::Output::Formatted::Terminal->new->format_message( "bold black on_blue" => $message ); } 1;