PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
Dir : /proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/bin/ |
Server: Linux ngx353.inmotionhosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 IP: 209.182.202.254 |
Dir : //proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/bin/lvemanager-service |
#!/opt/cloudlinux/venv/bin/python3 -bb # coding=utf-8 # # Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2021 All Rights Reserved # # Licensed under CLOUD LINUX LICENSE AGREEMENT # http://cloudlinux.com/docs/LICENSE.TXT # import base64 import json import os import uuid from encodings.base64_codec import base64_encode from pwd import getpwnam import aiohttp_jinja2 import jinja2 import pam from aiohttp import web from aiohttp.web_request import Request from aiohttp.web_response import Response from aiohttp_session import setup as setup_session from aiohttp_security import is_anonymous, remember, forget, \ setup as setup_security, SessionIdentityPolicy, authorized_userid, check_permission from aiohttp_security.abc import AbstractAuthorizationPolicy from aiohttp_session.cookie_storage import EncryptedCookieStorage from cryptography import fernet from constants import * from utils import parse_params, run_cmd_pw, get_user_data, get_service_port,\ get_ssl_context, get_user_type, get_user_plugins # ToDo(dpoleev): Use PKG_VERSION from lvemanager package after migrate to python 3.7 PKG_VERSION = open('/usr/share/l.v.e-manager/version').read().strip() SERVER_PATH = os.path.dirname(os.path.realpath(__file__)) STATIC_FILE_PATH = os.path.join(SERVER_PATH, '../../commons/spa-resources/') CLOUDLINUX_CLI = '/usr/share/l.v.e-manager/utils/cloudlinux-cli.py' CLOUDLINUX_USER_CLI = '/usr/share/l.v.e-manager/utils/cloudlinux-cli-user.py' DISABLE_CSP_FLAG='/var/lve/disable_csp.flag' SECURITY_HEADERS = { "X-Content-Type-Options": "nosniff", "X-Frame-Options": "DENY", "Content-Security-Policy": "default-src 'self' 'unsafe-inline' *.cloudlinux.com *.googleapis.com;object-src 'none';font-src *;script-src 'self' 'unsafe-eval' 'unsafe-inline' *.cloudlinux.com;img-src 'self' data:" } class AuthorizationPolicy(AbstractAuthorizationPolicy): """ get information about user by identity """ async def authorized_userid(self, identity): pw = getpwnam(identity) result = { 'pw': pw, 'type': get_user_type(pw.pw_name) } return result async def permits(self, identity, permission, context=None): return bool(identity) async def handler_root(request): """ Main page """ is_logged = not await is_anonymous(request) if is_logged: user_data = await authorized_userid(request) if user_data['type'] == TYPE_ADMIN: return await admin_page(request) elif user_data['type'] == TYPE_RESELLER: return await reseller_page(request) else: return await user_page(request) else: return await login_page(request) @aiohttp_jinja2.template('login.html') async def login_page(request: Request): """ Login page """ return { 'login_error': request.query_string == 'incorrect' } @aiohttp_jinja2.template('user.html') async def user_page(request): """ List applications page """ return { 'userdata': await authorized_userid(request), 'apps': get_user_plugins() } async def admin_page(request): """ Open admin LveManager """ response = await show_app('main', await authorized_userid(request), request) set_csrf_token(response) return response async def reseller_page(request): """ Open Reseller LveManager """ response = await show_app('main', await authorized_userid(request), request) set_csrf_token(response) return response async def handler_login(request: Request): """ Check authorization and show error message """ redirect_response = web.HTTPFound('/') data = await request.post() pam_object = pam.pam() if pam_object.authenticate(data.get('username'), data.get('password'), service='system-auth'): await remember(request, redirect_response, data.get('username')) return redirect_response else: return web.HTTPFound('/?incorrect') async def handler_app(request: Request): """ Show app handler """ plugin_name = request.match_info['plugin_name'] userdata = await authorized_userid(request) response = await show_app(plugin_name, userdata, request) set_csrf_token(response) return response @aiohttp_jinja2.template('app.html') async def show_app(plugin_name, userdata, request: Request): """ Show certain SPA application :param plugin_name: plugin name show what bundle and title should be used :param userdata: information about user :param request:Request for rendering jinja template :return: """ plugin_title = PLUGINS.get(plugin_name).get('title') panel_data = await get_user_data(userdata) return { 'plugin_title': plugin_title, 'plugin_name': plugin_name, 'panel_data': panel_data, 'pluginVersion': PKG_VERSION } async def handler_logout(request): """ Logout handler: remove cookies information """ redirect_response = web.HTTPFound('/') await forget(request, redirect_response) return redirect_response async def handler_request(request): """ Middleware for providing requests to cloudlinux-cli level """ check_csrf_token(request) plugin_name = request.match_info['plugin_name'] plugin_title = PLUGINS.get(plugin_name).get('title') await check_permission(request, plugin_name) user_data = await authorized_userid(request) request_data = parse_params(await request.post()) data = { 'plugin_name': plugin_name, 'owner': user_data['type'], 'command': request_data.get('command'), 'params': request_data.get('params') or {}, } if 'mockJson' in request_data: data['mockJson'] = request_data.get('mockJson') if 'lang' in request_data: data['lang'] = request_data.get('lang') if 'method' in request_data: data['method'] = request_data.get('method') if user_data['pw'].pw_uid > 0: data['user_info'] = { 'username': user_data['pw'].pw_name, 'lve-id': user_data['pw'].pw_uid, } cli_file_path = CLOUDLINUX_USER_CLI if user_data['type'] not in [TYPE_ADMIN, TYPE_RESELLER] else CLOUDLINUX_CLI # Show unavailable page for end user if CLOUDLINUX_CLI missed if not os.path.isfile(cli_file_path): return sendError({ 'code': 503, 'context': {'pluginName': plugin_title }, 'error_id': 'ERROR.not_available_plugin', 'icon': 'disabled', 'result': ''}, 1) cli_comand = [cli_file_path, '--data={}'.format(base64_encode(json.dumps(data) .encode('utf8').strip())[0].decode('utf-8'))] (retcode, stdout, stderr) = await run_cmd_pw(user_data['pw'], cli_comand) # If decode_json is catched an exeption, send error header with backtrace try: json_data = json.loads(stdout) except: return sendError('ERROR.wrong_received_data', 0, 0, stdout + stderr) if json_data.get('result') not in ['success', 'rollback']: return sendError(json_data, 1) if stdout == '': return sendError('RESPONSE OF COMMAND IS EMPTY'); return web.Response(body=stdout + stderr, content_type='application/json') def sendError(error_message, is_json = False, logout_signal = False, details = ''): if is_json: return web.json_response(error_message, status=503) else: response = json.dumps({ 'result': error_message, 'logoutSignal': 1 if logout_signal else 0, 'details': details }) return web.Response(status=503, body=response, content_type='application/json') def make_app(): """ Prepare web server """ app = web.Application() # add the routes app.add_routes([ web.get('/', handler_root), web.post('/login', handler_login), web.get('/app/{plugin_name}', handler_app), web.get('/logout', handler_logout), web.post('/send-request/{plugin_name}', handler_request), web.static('/assets', STATIC_FILE_PATH) ]) # set up policies policy = SessionIdentityPolicy() setup_security(app, policy, AuthorizationPolicy()) # we need to initialize aiohttp_session fernet_key = fernet.Fernet.generate_key() secret_key = base64.urlsafe_b64decode(fernet_key) setup_session(app, EncryptedCookieStorage(secret_key)) app.on_response_prepare.append(set_security_headers) return app def set_csrf_token(response: Response): """ Generate random csrf token and set to cookie """ response.set_cookie('csrftoken', str(uuid.uuid4())) def check_csrf_token(request: Request): """ Check csrf token """ if not request.cookies.get('csrftoken') or request.cookies.get('csrftoken') != request.headers.get('X-CSRFToken'): raise web.HTTPForbidden(body='BAD FORGERY PROTECTION TOKEN') async def set_security_headers(request, response): """ Add security headers """ if os.path.isfile(DISABLE_CSP_FLAG): return for key, value in SECURITY_HEADERS.items(): response.headers[key] = value if __name__ == '__main__': app = make_app() env = aiohttp_jinja2.setup( app, loader=jinja2.FileSystemLoader( os.path.join(SERVER_PATH, 'templates')), context_processors=[], autoescape=True, ) web.run_app( app, ssl_context=get_ssl_context(), port=get_service_port() )