PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
Dir : /opt/sharedrads/ |
Server: Linux ngx353.inmotionhosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 IP: 209.182.202.254 |
Dir : //opt/sharedrads/dns-sync |
#!/opt/imh-python/bin/python3 """ Attempt to sync a DNS zone to our cluster, and print any known errors. Provides a bunch of additional checking for common causes of issues syncing. Wraps dnscluster synczone and reads /usr/local/cpanel/logs/error_log for a result. -- Common errors -- Error 401: Unauthorized This means there is something wrong with the DNS cluster key located in /var/cpanel/cluster/. This could mean that the DNS key isn't active, or that it needs to be installed from PowerPanel. For VPS+ accounts, this can mean that the domain's cPanel account has a reseller that is not set up with the user's current PowerPanel API key. In rare cases, the key may need to be activated directly on the DNS authority server by Systems. Error 409: Conflict DNS authority for this domain is owned by another server. If the other server is verified, reset DNS authority for the domain. Always follow policy for this. No result when searching for log entry in /usr/local/cpanel/logs/error_log This typically indicates that dnsadmin didn't attempt to sync the zone to our servers. DNS cluster key not set up On VPS+ this indicates there is no DNS cluster configuration file for the reseller account that owns the cPanel account the domain belongs to. If activating the DNS key through PowerPanel does not resolve this, check if the reseller account is the primary account in PowerPanel. If it is not, copy the DNS cluster configuration from /var/cpanel/cluster/ for the primary reseller into a new directory with the name of the the correct reseller. e.g. rsync -avP /var/cpanel/cluster/mainreseller5/ /var/cpanel/cluster/reseller2 On shared, this simply means the DNS key needs to be activated from PowerPanel. Reseller does not exist on the server This means the domain's cPanel account has a reseller owner that isn't on the server. Typically the result of a server transfer, simply assign a valid reseller owner to the domain's cPanel account. """ import re import subprocess import sys from argparse import ArgumentParser, RawTextHelpFormatter from datetime import datetime from os import isatty from os.path import exists from rads import whmapi1, whoowns, cpuser_safe class SyncError(Exception): """ An exception raised when an issue is detected when attempting to sync DNS to the cluster, either preventing it from succeeding or a detected failure. """ class SerialUpdateError(Exception): """ An exception raised when an issue is detected when attempting to update the serial number in an SOA record, either preventing it from succeeding or a detected failure """ def get_args(): parser = ArgumentParser( description=__doc__, formatter_class=RawTextHelpFormatter ) # fmt: off parser.add_argument( "domains", metavar="domain", nargs='+', default=[], help="Domain(s) to sync", ) parser.add_argument( "-s", "--serial-update", default=False, action="store_true", help="Force SOA serial update", ) # fmt: on return parser.parse_args() def process_entry(domain, error, error_code, message): """ Process status message from a dnsadmin log line """ reply = re.search(r" server replied: (.+)", message) user_msg = "" if error: user_msg += f"{error}. " success = False if reply: if "Success" in reply.group(1): user_msg += "Successfully synced to DNS cluster" success = True else: user_msg += reply.group(1) else: user_msg += message if error_code: status_messages = { "409": ( "Zone ownership may need to be reset in the DNS authority " "server." ), "401": ( "This may mean that the DNS key needs to be activated, " "reset, or installed. Check /var/cpanel/cluster/" ), "500": ( "Inspect cPanel error log and logs on DNS" " authority server" ), } if error_code in status_messages: user_msg += f". {status_messages[error_code]}" if success: log_success(domain, user_msg) else: log_error(domain, user_msg) def sync_zone(domain): """ Attempt to sync a zone to the cluster """ owner = whoowns(domain) if not owner: raise SyncError( "Failed to locate cPanel owner of domain. Is it on this server?" ) if not cpuser_safe(owner): raise SyncError( f"Unable to synchronize domain owned by secure user {owner}" ) if not exists(f"/var/cpanel/cluster/{owner}/config/imh"): dns_owner = reseller_owner(owner) if not exists(f"/var/cpanel/cluster/{dns_owner}/config/imh"): if dns_owner in ["inmotion", "hubhost"]: # Shared does per-user raise SyncError( f"DNS cluster key is not set up for {owner} or " f"reseller {dns_owner}. On shared, this only needs to be " "configured for the user" ) raise SyncError( "DNS cluster key not set up for " f"reseller {dns_owner}. Unable to sync." ) try: synczone_args = [ "/usr/local/cpanel/scripts/dnscluster", "synczone", domain, ] with subprocess.Popen( synczone_args, stdout=subprocess.PIPE, stderr=subprocess.DEVNULL ) as proc: output = proc.communicate() except FileNotFoundError: sys.exit( "Unable to locate /usr/local/cpanel/scripts/dnscluster on server. " "Is this a cPanel server?" ) sync_output = output[0].decode("utf-8", "ignore") if "...Done" not in sync_output: # Print as an error, trim "Done" line trimmed = sync_output.replace("\nDone\n", "") raise SyncError(trimmed) return True def sync_zones(domains): """ Sync domains to cluster, reading the cPanel error log for results. """ with open("/usr/local/cpanel/logs/error_log") as log: for domain in [domain.lower() for domain in domains]: log.seek(0, 2) # Seek to the end, because we are tailing the file try: sync_zone(domain) except SyncError as e: log_error(domain, str(e)) continue entry_found = False # Search for log entry like: # [2020-10-19 17:50:59 +0000] info [dnsadmin] update_zone (domain) for entry in reversed(log.readlines()): entry = entry.strip() year = r"\d{4}" month = day = hour = minute = second = r"\d{2}" # We're doing it this way to make this regex slightly more # readable. date = f"{year}-{month}-{day} {hour}:{minute}:{second}" # We are very strict about the format as quite a lot is dumped # into this log file. I apologize to future me (or whomever) # that have to maintain this. match = re.search( ( r"^\[{} [+-]\d+\] \w* \[dnsadmin\] " r"update_zone \({}\) (Error (\d+): \w+)?(.*)$" ).format(date, domain), entry, ) if match: entry_found = True try: process_entry( domain, match.group(1), match.group(2), match.group(3), ) except SyncError as e: log_error(domain, str(e)) if not entry_found: log_error( domain, ( "No result when searching for log entry in " "/usr/local/cpanel/logs/error_log" ), ) def fetch_zone(domain): """ Fetch zone file from cPanel for a given domain. Raises SerialUpdateError upon failure """ response = whmapi1("dumpzone", {"domain": domain}) if not response: raise SerialUpdateError( "An unknown error occured running whmapi1 dumpzone. " "This could be due to a missing access hash or network " "error" ) if "metadata" in response: status_code = response["metadata"].get("result") reason = response["metadata"].get("reason") if status_code != 1: raise SerialUpdateError( "Unable to update serial. whmapi1 dumpzone " f"failed. {reason}" ) if "data" not in response: # If we hit this block, I have no idea what's wrong. We're gonna # panic and print the full error message. print(response, file=sys.stderr) raise SerialUpdateError( "Unable to update serial. whmapi1 dumpzone returned no data." ) data = response["data"] if ( "zone" not in data or len(data["zone"]) == 0 or "record" not in data["zone"][0] ): raise SerialUpdateError( "Unable to update serial. whmapi1 dumpzone returned no zone." ) return data["zone"][0]["record"] def update_serial(domain): """ Update zone file serial in SOA record for a given domain Raised SerialUpdateError on failure """ owner = whoowns(domain) if owner and not cpuser_safe(owner): raise SerialUpdateError( f"Unable to update SOA for domain owned by secure user {owner}" ) zone_file_path = f"/var/named/{domain}.db" if not exists(zone_file_path): raise SerialUpdateError( "Unable to update serial, zone file doesn't exist." ) zone = fetch_zone(domain) if not zone: raise SerialUpdateError("Unable to update serial. Zone file is empty") soa_record = None for record in zone: if record.get("name") == f"{domain}." and record.get("type") == "SOA": soa_record = record break if not soa_record: raise SerialUpdateError("SOA record not found in zone file") serial = str(soa_record["serial"]) date_fmt = "%Y%m%d" # e.g Oct 1 is 20201001 new_date = int(datetime.today().strftime(date_fmt)) counter = 0 if len(serial) != 10: # e.g. 2020101000 serial_date = new_date # Not a standard format, overwrite. else: try: serial_date = int(serial[:-2]) counter = int(serial[-2:]) + 1 except ValueError: serial_date = new_date if serial_date < new_date: # Preserve 'future' date serial_date = new_date counter = 0 zone_file_path = f"/var/named/{domain}.db" with open(zone_file_path) as zone_file: lines = zone_file.readlines() new_serial = f"{serial_date}{str(counter).zfill(2)}" line = soa_record["Line"] record_len = soa_record.get("Lines", 1) # There's at least one line soa_lines = lines[line : line + record_len] for i in range(record_len): lines[line + i] = re.sub( fr"^([^;]+){serial}", fr"\g<1>{new_serial}", soa_lines[i] ) with open(zone_file_path, "w") as zone_file: zone_file.write("".join(lines)) # Finally, write changes def update_serials(domains): """ Update zone file serial in SOA record for given domains """ for domain in [domain.lower() for domain in domains]: try: update_serial(domain) except SerialUpdateError as err: log_error(domain, str(err)) def reseller_owner(owner): """ Get a user's reseller owner, including root. """ try: with open("/etc/trueuserowners") as file: match = next(x for x in file if x.startswith(f"{owner}: ")) # userna5: root return match.rstrip().split(": ")[1] except FileNotFoundError as e: raise SyncError( f"Unable to find {e.filename}. " "Is this a cPanel server?" ) from e except OSError as e: raise SyncError( f"Unable to load {e.filename}. " "Do you have sufficient permissions?" ) from e except StopIteration as exc: raise SyncError( f"Reseller {owner} does not exist on the server" ) from exc def log_error(domain, message): print(f"{style(domain, 'red')}: {message}") def log_success(domain, message): print(f"{style(domain, 'green')}: {message}") def style(text, color=None): """ Stylize text with ANSI escape codes for red/green, if we're in a terminal """ if not isatty(sys.stdin.fileno()) or color is None: return text # Only output color to a terminal colors = {"red": 31, "green": 32} if color and color not in colors: raise ValueError(f"Color {color} isn't accepted") return "".join([f"\033[{colors[color]}m{text}\033[0m"]) def main(): parsed = get_args() if exists("/etc/ansible/wordpress-ultrastack"): sys.exit(style( "DNS is not able to be managed by this container. Please manage " "your DNS on Platform i.\n" "https://www.inmotionhosting.com/support/product-guides/wordpress-hosting/central/domains/dns-management/" , 'red')) if not exists("/var/cpanel/useclusteringdns"): sys.exit( "DNS clustering isn't enabled on this server, please enable it!" ) for domain in parsed.domains: if ".." in domain: # I can't think of a valid path traversal exploit using this tool, # however, I can't think of a reason to risk it either sys.exit(f"{domain} is not a valid domain name") if parsed.serial_update: update_serials(parsed.domains) sync_zones(parsed.domains) if __name__ == "__main__": main()