PK œqhYî¶J‚ßFßF)nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/ $#$#$#

Dir : /proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/opt/sharedrads/
Server: Linux ngx353.inmotionhosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64
IP: 209.182.202.254
Choose File :

Url:
Dir : //proc/thread-self/root/proc/self/root/proc/self/root/proc/thread-self/root/opt/sharedrads/dns-sync

#!/opt/imh-python/bin/python3
"""
Attempt to sync a DNS zone to our cluster, and print any known errors.

Provides a bunch of additional checking for common causes of issues syncing.

Wraps dnscluster synczone and reads /usr/local/cpanel/logs/error_log for a result.

-- Common errors --

Error 401: Unauthorized
    This means there is something wrong with the DNS cluster key located in
    /var/cpanel/cluster/. This could mean that the DNS key isn't active, or that
    it needs to be installed from PowerPanel. For VPS+ accounts, this can mean
    that the domain's cPanel account has a reseller that is not set up with the
    user's current PowerPanel API key.
    In rare cases, the key may need to be activated directly on the
    DNS authority server by Systems.

Error 409: Conflict
    DNS authority for this domain is owned by another server. If the other
    server is verified, reset DNS authority for the domain.
    Always follow policy for this.

No result when searching for log entry in /usr/local/cpanel/logs/error_log
    This typically indicates that dnsadmin didn't attempt to sync the zone to our servers.

DNS cluster key not set up
    On VPS+ this indicates there is no DNS cluster configuration file for the
    reseller account that owns the cPanel account the domain belongs to.
    If activating the DNS key through PowerPanel does not resolve this, check
    if the reseller account is the primary account in PowerPanel. If it is not,
    copy the DNS cluster configuration from /var/cpanel/cluster/ for the primary
    reseller into a new directory with the name of the the correct reseller.
    e.g. rsync -avP /var/cpanel/cluster/mainreseller5/ /var/cpanel/cluster/reseller2

    On shared, this simply means the DNS key needs to be activated from PowerPanel.

Reseller does not exist on the server
    This means the domain's cPanel account has a reseller owner that isn't on
    the server. Typically the result of a server transfer, simply assign a
    valid reseller owner to the domain's cPanel account.

"""
import re
import subprocess
import sys
from argparse import ArgumentParser, RawTextHelpFormatter
from datetime import datetime
from os import isatty
from os.path import exists
from rads import whmapi1, whoowns, cpuser_safe


class SyncError(Exception):
    """
    An exception raised when an issue is detected when attempting to sync DNS
    to the cluster, either preventing it from succeeding or a detected failure.
    """


class SerialUpdateError(Exception):
    """
    An exception raised when an issue is detected when attempting to update
    the serial number in an SOA record, either preventing it from succeeding or
    a detected failure
    """


def get_args():
    parser = ArgumentParser(
        description=__doc__, formatter_class=RawTextHelpFormatter
    )
    # fmt: off
    parser.add_argument(
        "domains", metavar="domain", nargs='+', default=[],
        help="Domain(s) to sync",
    )
    parser.add_argument(
        "-s", "--serial-update", default=False, action="store_true",
        help="Force SOA serial update",
    )
    # fmt: on
    return parser.parse_args()


def process_entry(domain, error, error_code, message):
    """
    Process status message from a dnsadmin log line
    """
    reply = re.search(r" server replied: (.+)", message)
    user_msg = ""
    if error:
        user_msg += f"{error}. "
    success = False

    if reply:
        if "Success" in reply.group(1):
            user_msg += "Successfully synced to DNS cluster"
            success = True
        else:
            user_msg += reply.group(1)
    else:
        user_msg += message

    if error_code:
        status_messages = {
            "409": (
                "Zone ownership may need to be reset in the DNS authority "
                "server."
            ),
            "401": (
                "This may mean that the DNS key needs to be activated, "
                "reset, or installed. Check /var/cpanel/cluster/"
            ),
            "500": (
                "Inspect cPanel error log and logs on DNS" " authority server"
            ),
        }
        if error_code in status_messages:
            user_msg += f". {status_messages[error_code]}"
    if success:
        log_success(domain, user_msg)
    else:
        log_error(domain, user_msg)


def sync_zone(domain):
    """
    Attempt to sync a zone to the cluster
    """
    owner = whoowns(domain)
    if not owner:
        raise SyncError(
            "Failed to locate cPanel owner of domain. Is it on this server?"
        )
    if not cpuser_safe(owner):
        raise SyncError(
            f"Unable to synchronize domain owned by secure user {owner}"
        )
    if not exists(f"/var/cpanel/cluster/{owner}/config/imh"):
        dns_owner = reseller_owner(owner)
        if not exists(f"/var/cpanel/cluster/{dns_owner}/config/imh"):
            if dns_owner in ["inmotion", "hubhost"]:  # Shared does per-user
                raise SyncError(
                    f"DNS cluster key is not set up for {owner} or "
                    f"reseller {dns_owner}. On shared, this only needs to be "
                    "configured for the user"
                )
            raise SyncError(
                "DNS cluster key not set up for "
                f"reseller {dns_owner}. Unable to sync."
            )
    try:
        synczone_args = [
            "/usr/local/cpanel/scripts/dnscluster",
            "synczone",
            domain,
        ]
        with subprocess.Popen(
            synczone_args, stdout=subprocess.PIPE, stderr=subprocess.DEVNULL
        ) as proc:
            output = proc.communicate()
    except FileNotFoundError:
        sys.exit(
            "Unable to locate /usr/local/cpanel/scripts/dnscluster on server. "
            "Is this a cPanel server?"
        )

    sync_output = output[0].decode("utf-8", "ignore")
    if "...Done" not in sync_output:
        # Print as an error, trim "Done" line
        trimmed = sync_output.replace("\nDone\n", "")
        raise SyncError(trimmed)

    return True


def sync_zones(domains):
    """
    Sync domains to cluster, reading the cPanel error log for results.
    """
    with open("/usr/local/cpanel/logs/error_log") as log:
        for domain in [domain.lower() for domain in domains]:
            log.seek(0, 2)  # Seek to the end, because we are tailing the file
            try:
                sync_zone(domain)
            except SyncError as e:
                log_error(domain, str(e))
                continue
            entry_found = False
            # Search for log entry like:
            # [2020-10-19 17:50:59 +0000] info [dnsadmin] update_zone (domain)
            for entry in reversed(log.readlines()):
                entry = entry.strip()
                year = r"\d{4}"
                month = day = hour = minute = second = r"\d{2}"
                # We're doing it this way to make this regex slightly more
                # readable.
                date = f"{year}-{month}-{day} {hour}:{minute}:{second}"

                # We are very strict about the format as quite a lot is dumped
                # into this log file. I apologize to future me (or whomever)
                # that have to maintain this.
                match = re.search(
                    (
                        r"^\[{} [+-]\d+\] \w* \[dnsadmin\] "
                        r"update_zone \({}\) (Error (\d+): \w+)?(.*)$"
                    ).format(date, domain),
                    entry,
                )

                if match:
                    entry_found = True

                    try:
                        process_entry(
                            domain,
                            match.group(1),
                            match.group(2),
                            match.group(3),
                        )
                    except SyncError as e:
                        log_error(domain, str(e))

            if not entry_found:
                log_error(
                    domain,
                    (
                        "No result when searching for log entry in "
                        "/usr/local/cpanel/logs/error_log"
                    ),
                )


def fetch_zone(domain):
    """
    Fetch zone file from cPanel for a given domain.
    Raises SerialUpdateError upon failure
    """
    response = whmapi1("dumpzone", {"domain": domain})
    if not response:
        raise SerialUpdateError(
            "An unknown error occured running whmapi1 dumpzone. "
            "This could be due to a missing access hash or network "
            "error"
        )

    if "metadata" in response:
        status_code = response["metadata"].get("result")
        reason = response["metadata"].get("reason")
        if status_code != 1:
            raise SerialUpdateError(
                "Unable to update serial. whmapi1 dumpzone " f"failed. {reason}"
            )

    if "data" not in response:
        #  If we hit this block, I have no idea what's wrong. We're gonna
        #  panic and print the full error message.
        print(response, file=sys.stderr)
        raise SerialUpdateError(
            "Unable to update serial. whmapi1 dumpzone returned no data."
        )

    data = response["data"]
    if (
        "zone" not in data
        or len(data["zone"]) == 0
        or "record" not in data["zone"][0]
    ):
        raise SerialUpdateError(
            "Unable to update serial. whmapi1 dumpzone returned no zone."
        )

    return data["zone"][0]["record"]


def update_serial(domain):
    """
    Update zone file serial in SOA record for a given domain
    Raised SerialUpdateError on failure
    """
    owner = whoowns(domain)
    if owner and not cpuser_safe(owner):
        raise SerialUpdateError(
            f"Unable to update SOA for domain owned by secure user {owner}"
        )

    zone_file_path = f"/var/named/{domain}.db"
    if not exists(zone_file_path):
        raise SerialUpdateError(
            "Unable to update serial, zone file doesn't exist."
        )

    zone = fetch_zone(domain)
    if not zone:
        raise SerialUpdateError("Unable to update serial. Zone file is empty")
    soa_record = None
    for record in zone:
        if record.get("name") == f"{domain}." and record.get("type") == "SOA":
            soa_record = record
            break
    if not soa_record:
        raise SerialUpdateError("SOA record not found in zone file")

    serial = str(soa_record["serial"])
    date_fmt = "%Y%m%d"  # e.g Oct 1 is 20201001
    new_date = int(datetime.today().strftime(date_fmt))
    counter = 0
    if len(serial) != 10:  # e.g. 2020101000
        serial_date = new_date  # Not a standard format, overwrite.
    else:
        try:
            serial_date = int(serial[:-2])
            counter = int(serial[-2:]) + 1
        except ValueError:
            serial_date = new_date

        if serial_date < new_date:  # Preserve 'future' date
            serial_date = new_date
            counter = 0

    zone_file_path = f"/var/named/{domain}.db"
    with open(zone_file_path) as zone_file:
        lines = zone_file.readlines()

    new_serial = f"{serial_date}{str(counter).zfill(2)}"
    line = soa_record["Line"]
    record_len = soa_record.get("Lines", 1)  # There's at least one line
    soa_lines = lines[line : line + record_len]

    for i in range(record_len):
        lines[line + i] = re.sub(
            fr"^([^;]+){serial}", fr"\g<1>{new_serial}", soa_lines[i]
        )

    with open(zone_file_path, "w") as zone_file:
        zone_file.write("".join(lines))  # Finally, write changes


def update_serials(domains):
    """
    Update zone file serial in SOA record for given domains
    """
    for domain in [domain.lower() for domain in domains]:
        try:
            update_serial(domain)
        except SerialUpdateError as err:
            log_error(domain, str(err))


def reseller_owner(owner):
    """
    Get a user's reseller owner, including root.
    """
    try:
        with open("/etc/trueuserowners") as file:
            match = next(x for x in file if x.startswith(f"{owner}: "))
            # userna5: root
            return match.rstrip().split(": ")[1]
    except FileNotFoundError as e:
        raise SyncError(
            f"Unable to find {e.filename}. " "Is this a cPanel server?"
        ) from e
    except OSError as e:
        raise SyncError(
            f"Unable to load {e.filename}. "
            "Do you have sufficient permissions?"
        ) from e
    except StopIteration as exc:
        raise SyncError(
            f"Reseller {owner} does not exist on the server"
        ) from exc


def log_error(domain, message):
    print(f"{style(domain, 'red')}: {message}")


def log_success(domain, message):
    print(f"{style(domain, 'green')}: {message}")


def style(text, color=None):
    """
    Stylize text with ANSI escape codes for red/green, if we're in a terminal
    """
    if not isatty(sys.stdin.fileno()) or color is None:
        return text  # Only output color to a terminal

    colors = {"red": 31, "green": 32}
    if color and color not in colors:
        raise ValueError(f"Color {color} isn't accepted")

    return "".join([f"\033[{colors[color]}m{text}\033[0m"])


def main():
    parsed = get_args()

    if exists("/etc/ansible/wordpress-ultrastack"):
        sys.exit(style(
            "DNS is not able to be managed by this container. Please manage "
            "your DNS on Platform i.\n"
            "https://www.inmotionhosting.com/support/product-guides/wordpress-hosting/central/domains/dns-management/"
        , 'red'))

    if not exists("/var/cpanel/useclusteringdns"):
        sys.exit(
            "DNS clustering isn't enabled on this server, please enable it!"
        )
    for domain in parsed.domains:
        if ".." in domain:
            # I can't think of a valid path traversal exploit using this tool,
            # however, I can't think of a reason to risk it either
            sys.exit(f"{domain} is not a valid domain name")

    if parsed.serial_update:
        update_serials(parsed.domains)

    sync_zones(parsed.domains)


if __name__ == "__main__":
    main()