PNG  IHDRX cHRMz&u0`:pQ<bKGD pHYsodtIME MeqIDATxw]Wug^Qd˶ 6`!N:!@xI~)%7%@Bh&`lnjVF29gΨ4E$|>cɚ{gk= %,a KX%,a KX%,a KX%,a KX%,a KX%,a KX%, b` ǟzeאfp]<!SJmɤY޲ڿ,%c ~ع9VH.!Ͳz&QynֺTkRR.BLHi٪:l;@(!MԴ=žI,:o&N'Kù\vRmJ雵֫AWic H@" !: Cé||]k-Ha oݜ:y F())u]aG7*JV@J415p=sZH!=!DRʯvɱh~V\}v/GKY$n]"X"}t@ xS76^[bw4dsce)2dU0 CkMa-U5tvLƀ~mlMwfGE/-]7XAƟ`׮g ewxwC4\[~7@O-Q( a*XGƒ{ ՟}$_y3tĐƤatgvێi|K=uVyrŲlLӪuܿzwk$m87k( `múcE)"@rK( z4$D; 2kW=Xb$V[Ru819קR~qloѱDyįݎ*mxw]y5e4K@ЃI0A D@"BDk_)N\8͜9dz"fK0zɿvM /.:2O{ Nb=M=7>??Zuo32 DLD@D| &+֎C #B8ַ`bOb $D#ͮҪtx]%`ES`Ru[=¾!@Od37LJ0!OIR4m]GZRJu$‡c=%~s@6SKy?CeIh:[vR@Lh | (BhAMy=݃  G"'wzn޺~8ԽSh ~T*A:xR[ܹ?X[uKL_=fDȊ؂p0}7=D$Ekq!/t.*2ʼnDbŞ}DijYaȲ(""6HA;:LzxQ‘(SQQ}*PL*fc\s `/d'QXW, e`#kPGZuŞuO{{wm[&NBTiiI0bukcA9<4@SӊH*؎4U/'2U5.(9JuDfrޱtycU%j(:RUbArLֺN)udA':uGQN"-"Is.*+k@ `Ojs@yU/ H:l;@yyTn}_yw!VkRJ4P)~y#)r,D =ě"Q]ci'%HI4ZL0"MJy 8A{ aN<8D"1#IJi >XjX֔#@>-{vN!8tRݻ^)N_╗FJEk]CT՟ YP:_|H1@ CBk]yKYp|og?*dGvzنzӴzjֺNkC~AbZƷ`.H)=!QͷVTT(| u78y֮}|[8-Vjp%2JPk[}ԉaH8Wpqhwr:vWª<}l77_~{s۴V+RCģ%WRZ\AqHifɤL36: #F:p]Bq/z{0CU6ݳEv_^k7'>sq*+kH%a`0ԣisqにtү04gVgW΂iJiS'3w.w}l6MC2uԯ|>JF5`fV5m`Y**Db1FKNttu]4ccsQNnex/87+}xaUW9y>ͯ骵G{䩓Գ3+vU}~jJ.NFRD7<aJDB1#ҳgSb,+CS?/ VG J?|?,2#M9}B)MiE+G`-wo߫V`fio(}S^4e~V4bHOYb"b#E)dda:'?}׮4繏`{7Z"uny-?ǹ;0MKx{:_pÚmFמ:F " .LFQLG)Q8qN q¯¯3wOvxDb\. BKD9_NN &L:4D{mm o^tֽ:q!ƥ}K+<"m78N< ywsard5+вz~mnG)=}lYݧNj'QJS{S :UYS-952?&O-:W}(!6Mk4+>A>j+i|<<|;ر^߉=HE|V#F)Emm#}/"y GII웻Jі94+v뾧xu~5C95~ūH>c@덉pʃ1/4-A2G%7>m;–Y,cyyaln" ?ƻ!ʪ<{~h~i y.zZB̃/,雋SiC/JFMmBH&&FAbϓO^tubbb_hZ{_QZ-sύodFgO(6]TJA˯#`۶ɟ( %$&+V'~hiYy>922 Wp74Zkq+Ovn錄c>8~GqܲcWꂎz@"1A.}T)uiW4="jJ2W7mU/N0gcqܗOO}?9/wìXžΏ0 >֩(V^Rh32!Hj5`;O28؇2#ݕf3 ?sJd8NJ@7O0 b־?lldщ̡&|9C.8RTWwxWy46ah嘦mh٤&l zCy!PY?: CJyв]dm4ǜҐR޻RլhX{FƯanшQI@x' ao(kUUuxW_Ñ줮[w8 FRJ(8˼)_mQ _!RJhm=!cVmm ?sFOnll6Qk}alY}; "baӌ~M0w,Ggw2W:G/k2%R,_=u`WU R.9T"v,<\Ik޽/2110Ӿxc0gyC&Ny޽JҢrV6N ``یeA16"J³+Rj*;BϜkZPJaÍ<Jyw:NP8/D$ 011z֊Ⱳ3ι֘k1V_"h!JPIΣ'ɜ* aEAd:ݺ>y<}Lp&PlRfTb1]o .2EW\ͮ]38؋rTJsǏP@芎sF\> P^+dYJLbJ C-xϐn> ι$nj,;Ǖa FU *择|h ~izť3ᤓ`K'-f tL7JK+vf2)V'-sFuB4i+m+@My=O҈0"|Yxoj,3]:cо3 $#uŘ%Y"y죯LebqtҢVzq¼X)~>4L׶m~[1_k?kxֺQ`\ |ٛY4Ѯr!)N9{56(iNq}O()Em]=F&u?$HypWUeB\k]JɩSع9 Zqg4ZĊo oMcjZBU]B\TUd34ݝ~:7ڶSUsB0Z3srx 7`:5xcx !qZA!;%͚7&P H<WL!džOb5kF)xor^aujƍ7 Ǡ8/p^(L>ὴ-B,{ۇWzֺ^k]3\EE@7>lYBȝR.oHnXO/}sB|.i@ɥDB4tcm,@ӣgdtJ!lH$_vN166L__'Z)y&kH;:,Y7=J 9cG) V\hjiE;gya~%ks_nC~Er er)muuMg2;֫R)Md) ,¶ 2-wr#F7<-BBn~_(o=KO㭇[Xv eN_SMgSҐ BS헃D%g_N:/pe -wkG*9yYSZS.9cREL !k}<4_Xs#FmҶ:7R$i,fi!~' # !6/S6y@kZkZcX)%5V4P]VGYq%H1!;e1MV<!ϐHO021Dp= HMs~~a)ަu7G^];git!Frl]H/L$=AeUvZE4P\.,xi {-~p?2b#amXAHq)MWǾI_r`S Hz&|{ +ʖ_= (YS(_g0a03M`I&'9vl?MM+m~}*xT۲(fY*V4x@29s{DaY"toGNTO+xCAO~4Ϳ;p`Ѫ:>Ҵ7K 3}+0 387x\)a"/E>qpWB=1 ¨"MP(\xp߫́A3+J] n[ʼnӼaTbZUWb={~2ooKױӰp(CS\S筐R*JغV&&"FA}J>G֐p1ٸbk7 ŘH$JoN <8s^yk_[;gy-;߉DV{c B yce% aJhDȶ 2IdйIB/^n0tNtџdcKj4϶v~- CBcgqx9= PJ) dMsjpYB] GD4RDWX +h{y`,3ꊕ$`zj*N^TP4L:Iz9~6s) Ga:?y*J~?OrMwP\](21sZUD ?ܟQ5Q%ggW6QdO+\@ ̪X'GxN @'4=ˋ+*VwN ne_|(/BDfj5(Dq<*tNt1х!MV.C0 32b#?n0pzj#!38}޴o1KovCJ`8ŗ_"]] rDUy޲@ Ȗ-;xџ'^Y`zEd?0„ DAL18IS]VGq\4o !swV7ˣι%4FѮ~}6)OgS[~Q vcYbL!wG3 7띸*E Pql8=jT\꘿I(z<[6OrR8ºC~ډ]=rNl[g|v TMTղb-o}OrP^Q]<98S¤!k)G(Vkwyqyr޽Nv`N/e p/~NAOk \I:G6]4+K;j$R:Mi #*[AȚT,ʰ,;N{HZTGMoּy) ]%dHء9Պ䠬|<45,\=[bƟ8QXeB3- &dҩ^{>/86bXmZ]]yޚN[(WAHL$YAgDKp=5GHjU&99v簪C0vygln*P)9^͞}lMuiH!̍#DoRBn9l@ xA/_v=ȺT{7Yt2N"4!YN`ae >Q<XMydEB`VU}u]嫇.%e^ánE87Mu\t`cP=AD/G)sI"@MP;)]%fH9'FNsj1pVhY&9=0pfuJ&gޤx+k:!r˭wkl03׼Ku C &ѓYt{.O.zҏ z}/tf_wEp2gvX)GN#I ݭ߽v/ .& и(ZF{e"=V!{zW`, ]+LGz"(UJp|j( #V4, 8B 0 9OkRrlɱl94)'VH9=9W|>PS['G(*I1==C<5"Pg+x'K5EMd؞Af8lG ?D FtoB[je?{k3zQ vZ;%Ɠ,]E>KZ+T/ EJxOZ1i #T<@ I}q9/t'zi(EMqw`mYkU6;[t4DPeckeM;H}_g pMww}k6#H㶏+b8雡Sxp)&C $@'b,fPߑt$RbJ'vznuS ~8='72_`{q纶|Q)Xk}cPz9p7O:'|G~8wx(a 0QCko|0ASD>Ip=4Q, d|F8RcU"/KM opKle M3#i0c%<7׿p&pZq[TR"BpqauIp$ 8~Ĩ!8Սx\ւdT>>Z40ks7 z2IQ}ItԀ<-%S⍤};zIb$I 5K}Q͙D8UguWE$Jh )cu4N tZl+[]M4k8֦Zeq֮M7uIqG 1==tLtR,ƜSrHYt&QP윯Lg' I,3@P'}'R˪e/%-Auv·ñ\> vDJzlӾNv5:|K/Jb6KI9)Zh*ZAi`?S {aiVDԲuy5W7pWeQJk֤#5&V<̺@/GH?^τZL|IJNvI:'P=Ϛt"¨=cud S Q.Ki0 !cJy;LJR;G{BJy޺[^8fK6)=yʊ+(k|&xQ2`L?Ȓ2@Mf 0C`6-%pKpm')c$׻K5[J*U[/#hH!6acB JA _|uMvDyk y)6OPYjœ50VT K}cǻP[ $:]4MEA.y)|B)cf-A?(e|lɉ#P9V)[9t.EiQPDѠ3ϴ;E:+Օ t ȥ~|_N2,ZJLt4! %ա]u {+=p.GhNcŞQI?Nd'yeh n7zi1DB)1S | S#ًZs2|Ɛy$F SxeX{7Vl.Src3E℃Q>b6G ўYCmtկ~=K0f(=LrAS GN'ɹ9<\!a`)֕y[uՍ[09` 9 +57ts6}b4{oqd+J5fa/,97J#6yν99mRWxJyѡyu_TJc`~W>l^q#Ts#2"nD1%fS)FU w{ܯ R{ ˎ󅃏џDsZSQS;LV;7 Od1&1n$ N /.q3~eNɪ]E#oM~}v֯FڦwyZ=<<>Xo稯lfMFV6p02|*=tV!c~]fa5Y^Q_WN|Vs 0ҘދU97OI'N2'8N֭fgg-}V%y]U4 峧p*91#9U kCac_AFңĪy뚇Y_AiuYyTTYЗ-(!JFLt›17uTozc. S;7A&&<ԋ5y;Ro+:' *eYJkWR[@F %SHWP 72k4 qLd'J "zB6{AC0ƁA6U.'F3:Ȅ(9ΜL;D]m8ڥ9}dU "v!;*13Rg^fJyShyy5auA?ɩGHRjo^]׽S)Fm\toy 4WQS@mE#%5ʈfFYDX ~D5Ϡ9tE9So_aU4?Ѽm%&c{n>.KW1Tlb}:j uGi(JgcYj0qn+>) %\!4{LaJso d||u//P_y7iRJ߬nHOy) l+@$($VFIQ9%EeKʈU. ia&FY̒mZ=)+qqoQn >L!qCiDB;Y<%} OgBxB!ØuG)WG9y(Ą{_yesuZmZZey'Wg#C~1Cev@0D $a@˲(.._GimA:uyw֬%;@!JkQVM_Ow:P.s\)ot- ˹"`B,e CRtaEUP<0'}r3[>?G8xU~Nqu;Wm8\RIkբ^5@k+5(By'L&'gBJ3ݶ!/㮻w҅ yqPWUg<e"Qy*167΃sJ\oz]T*UQ<\FԎ`HaNmڜ6DysCask8wP8y9``GJ9lF\G g's Nn͵MLN֪u$| /|7=]O)6s !ĴAKh]q_ap $HH'\1jB^s\|- W1:=6lJBqjY^LsPk""`]w)󭃈,(HC ?䔨Y$Sʣ{4Z+0NvQkhol6C.婧/u]FwiVjZka&%6\F*Ny#8O,22+|Db~d ~Çwc N:FuuCe&oZ(l;@ee-+Wn`44AMK➝2BRՈt7g*1gph9N) *"TF*R(#'88pm=}X]u[i7bEc|\~EMn}P瘊J)K.0i1M6=7'_\kaZ(Th{K*GJyytw"IO-PWJk)..axӝ47"89Cc7ĐBiZx 7m!fy|ϿF9CbȩV 9V-՛^pV̌ɄS#Bv4-@]Vxt-Z, &ֺ*diؠ2^VXbs֔Ìl.jQ]Y[47gj=幽ex)A0ip׳ W2[ᎇhuE^~q흙L} #-b۸oFJ_QP3r6jr+"nfzRJTUqoaۍ /$d8Mx'ݓ= OՃ| )$2mcM*cЙj}f };n YG w0Ia!1Q.oYfr]DyISaP}"dIӗթO67jqR ҊƐƈaɤGG|h;t]䗖oSv|iZqX)oalv;۩meEJ\!8=$4QU4Xo&VEĊ YS^E#d,yX_> ۘ-e\ "Wa6uLĜZi`aD9.% w~mB(02G[6y.773a7 /=o7D)$Z 66 $bY^\CuP. (x'"J60׿Y:Oi;F{w佩b+\Yi`TDWa~|VH)8q/=9!g߆2Y)?ND)%?Ǐ`k/sn:;O299yB=a[Ng 3˲N}vLNy;*?x?~L&=xyӴ~}q{qE*IQ^^ͧvü{Huu=R|>JyUlZV, B~/YF!Y\u_ݼF{_C)LD]m {H 0ihhadd nUkf3oٺCvE\)QJi+֥@tDJkB$1!Đr0XQ|q?d2) Ӣ_}qv-< FŊ߫%roppVBwü~JidY4:}L6M7f٬F "?71<2#?Jyy4뷢<_a7_=Q E=S1И/9{+93֮E{ǂw{))?maÆm(uLE#lïZ  ~d];+]h j?!|$F}*"4(v'8s<ŏUkm7^7no1w2ؗ}TrͿEk>p'8OB7d7R(A 9.*Mi^ͳ; eeUwS+C)uO@ =Sy]` }l8^ZzRXj[^iUɺ$tj))<sbDJfg=Pk_{xaKo1:-uyG0M ԃ\0Lvuy'ȱc2Ji AdyVgVh!{]/&}}ċJ#%d !+87<;qN޼Nفl|1N:8ya  8}k¾+-$4FiZYÔXk*I&'@iI99)HSh4+2G:tGhS^繿 Kتm0 вDk}֚+QT4;sC}rՅE,8CX-e~>G&'9xpW,%Fh,Ry56Y–hW-(v_,? ; qrBk4-V7HQ;ˇ^Gv1JVV%,ik;D_W!))+BoS4QsTM;gt+ndS-~:11Sgv!0qRVh!"Ȋ(̦Yl.]PQWgٳE'`%W1{ndΗBk|Ž7ʒR~,lnoa&:ü$ 3<a[CBݮwt"o\ePJ=Hz"_c^Z.#ˆ*x z̝grY]tdkP*:97YľXyBkD4N.C_[;F9`8& !AMO c `@BA& Ost\-\NX+Xp < !bj3C&QL+*&kAQ=04}cC!9~820G'PC9xa!w&bo_1 Sw"ܱ V )Yl3+ס2KoXOx]"`^WOy :3GO0g;%Yv㐫(R/r (s } u B &FeYZh0y> =2<Ϟc/ -u= c&׭,.0"g"7 6T!vl#sc>{u/Oh Bᾈ)۴74]x7 gMӒ"d]U)}" v4co[ ɡs 5Gg=XR14?5A}D "b{0$L .\4y{_fe:kVS\\O]c^W52LSBDM! C3Dhr̦RtArx4&agaN3Cf<Ԉp4~ B'"1@.b_/xQ} _߃҉/gٓ2Qkqp0շpZ2fԫYz< 4L.Cyυι1t@鎫Fe sYfsF}^ V}N<_`p)alٶ "(XEAVZ<)2},:Ir*#m_YӼ R%a||EƼIJ,,+f"96r/}0jE/)s)cjW#w'Sʯ5<66lj$a~3Kʛy 2:cZ:Yh))+a߭K::N,Q F'qB]={.]h85C9cr=}*rk?vwV렵ٸW Rs%}rNAkDv|uFLBkWY YkX מ|)1!$#3%y?pF<@<Rr0}: }\J [5FRxY<9"SQdE(Q*Qʻ)q1E0B_O24[U'],lOb ]~WjHޏTQ5Syu wq)xnw8~)c 쫬gٲߠ H% k5dƝk> kEj,0% b"vi2Wس_CuK)K{n|>t{P1򨾜j>'kEkƗBg*H%'_aY6Bn!TL&ɌOb{c`'d^{t\i^[uɐ[}q0lM˕G:‚4kb祔c^:?bpg… +37stH:0}en6x˟%/<]BL&* 5&fK9Mq)/iyqtA%kUe[ڛKN]Ě^,"`/ s[EQQm?|XJ߅92m]G.E΃ח U*Cn.j_)Tѧj̿30ڇ!A0=͜ar I3$C^-9#|pk!)?7.x9 @OO;WƝZBFU keZ75F6Tc6"ZȚs2y/1 ʵ:u4xa`C>6Rb/Yм)^=+~uRd`/|_8xbB0?Ft||Z\##|K 0>>zxv8۴吅q 8ĥ)"6>~\8:qM}#͚'ĉ#p\׶ l#bA?)|g g9|8jP(cr,BwV (WliVxxᡁ@0Okn;ɥh$_ckCgriv}>=wGzβ KkBɛ[˪ !J)h&k2%07δt}!d<9;I&0wV/ v 0<H}L&8ob%Hi|޶o&h1L|u֦y~󛱢8fٲUsւ)0oiFx2}X[zVYr_;N(w]_4B@OanC?gĦx>мgx>ΛToZoOMp>40>V Oy V9iq!4 LN,ˢu{jsz]|"R޻&'ƚ{53ўFu(<٪9:΋]B;)B>1::8;~)Yt|0(pw2N%&X,URBK)3\zz&}ax4;ǟ(tLNg{N|Ǽ\G#C9g$^\}p?556]/RP.90 k,U8/u776s ʪ_01چ|\N 0VV*3H鴃J7iI!wG_^ypl}r*jɤSR 5QN@ iZ#1ٰy;_\3\BQQ x:WJv츟ٯ$"@6 S#qe딇(/P( Dy~TOϻ<4:-+F`0||;Xl-"uw$Цi󼕝mKʩorz"mϺ$F:~E'ҐvD\y?Rr8_He@ e~O,T.(ފR*cY^m|cVR[8 JҡSm!ΆԨb)RHG{?MpqrmN>߶Y)\p,d#xۆWY*,l6]v0h15M˙MS8+EdI='LBJIH7_9{Caз*Lq,dt >+~ّeʏ?xԕ4bBAŚjﵫ!'\Ը$WNvKO}ӽmSşذqsOy?\[,d@'73'j%kOe`1.g2"e =YIzS2|zŐƄa\U,dP;jhhhaxǶ?КZ՚.q SE+XrbOu%\GتX(H,N^~]JyEZQKceTQ]VGYqnah;y$cQahT&QPZ*iZ8UQQM.qo/T\7X"u?Mttl2Xq(IoW{R^ ux*SYJ! 4S.Jy~ BROS[V|žKNɛP(L6V^|cR7i7nZW1Fd@ Ara{詑|(T*dN]Ko?s=@ |_EvF]׍kR)eBJc" MUUbY6`~V޴dJKß&~'d3i WWWWWW
Current Directory: /opt/imunify360/venv/lib/python3.11/site-packages/defence360agent/subsys/panels/cpanel
Viewing File: /opt/imunify360/venv/lib/python3.11/site-packages/defence360agent/subsys/panels/cpanel/panel.py
import glob import json import logging import os import os.path import pwd import shutil import sys from collections import OrderedDict, defaultdict from contextlib import suppress from pathlib import Path from typing import Dict, List, Set from urllib.parse import urlparse from packaging.version import Version from defence360agent.application.determine_hosting_panel import ( is_cpanel_installed, ) from defence360agent.contracts import config from defence360agent.utils import ( CheckRunError, antivirus_mode, async_lru_cache, check_run, run, ) from defence360agent.utils.ipecho import IPEchoAPI from defence360agent.utils.kwconfig import KWConfig from .. import base from ..base import DomainData, forbid_dns_only from . import packages from .whm import WHMAPIException, whmapi1 CPANEL_PACKAGE_EXTENSIONS_PATH = Path("/var/cpanel/packages/extensions") CPANEL_HOOKS_PATH = Path("/usr/local/cpanel") PREINSTALL_PACKAGE_EXTENSIONS_PATH = ( Path(config.Packaging.DATADIR) / "cpanel/packages/extensions" ) CPANEL_USERPLANS_PATH = "/etc/userplans" CPANEL_USERDATADOMAINS_PATH = ( "/etc/userdatadomains;/var/cpanel/userdata/{user}/cache" ) AV_PLUGIN_NAME = "imunify-antivirus" IM360_PLUGIN_NAME = "imunify360" PLUGIN_NAME = AV_PLUGIN_NAME if antivirus_mode.enabled else IM360_PLUGIN_NAME PLUGIN_INSTALL_SCRIPT = "/usr/local/cpanel/scripts/install_plugin" PLUGIN_UNINSTALL_SCRIPT = "/usr/local/cpanel/scripts/uninstall_plugin" CONFIG_PATH = "/etc/sysconfig/imunify360/cpanel/" logger = logging.getLogger(__name__) CONFIG_FILE_TEMPLATE = "/etc/sysconfig/imunify360/cpanel/{name}.conf" TCP_PORTS_CPANEL = base.TCP_PORTS_COMMON + ["2086-2087"] BASE_DIR = "/home" WWWACT_CONF = "/etc/wwwacct.conf" _CACHE = {"userplans": {}, "userdatadomains": {}} class cPanelException(base.PanelException): pass class AccountConfig(KWConfig): SEARCH_PATTERN = r"^{}\s+(.*)?$" WRITE_PATTERN = "{} {}" DEFAULT_FILENAME = WWWACT_CONF class cPanel(base.AbstractPanel): NAME = "cPanel" OPEN_PORTS = { "tcp": { "in": ["143", "465", "2077-2080", "2082-2083", "2095", "2096"] + TCP_PORTS_CPANEL, "out": [ "37", "43", "113", "873", "2073", "2089", "2195", "2703", "6277", "24441", ] + TCP_PORTS_CPANEL, }, "udp": { "in": ["20", "21", "53", "443"], "out": ["20", "21", "53", "113", "123", "873", "6277", "24441"], }, } exception = cPanelException smtp_allow_users = ["cpanel"] # type: List[str] USER_INFO_DIR = "/var/cpanel/users.cache/" RESELLERS_INFO = "/var/cpanel/resellers" @staticmethod def _is_dns_only(): return os.path.isfile("/var/cpanel/dnsonly") @classmethod def get_server_ip(cls): ip_conf = "/var/cpanel/mainip" # fallback: in case there is not ip file if not os.path.exists(ip_conf): return IPEchoAPI.get_ip() with open(ip_conf) as f: return f.read().strip() @classmethod def is_installed(cls): return is_cpanel_installed() @classmethod async def version(cls): _, data, _ = await run(["/usr/local/cpanel/cpanel", "-V"]) version = data.decode().split() return version[0] if version else "unknown" @base.ensure_valid_panel() async def enable_imunify_plugin(self, name=None): plugin_name = name or PLUGIN_NAME assert plugin_name in [AV_PLUGIN_NAME, IM360_PLUGIN_NAME] config_filename = CONFIG_FILE_TEMPLATE.format(name=plugin_name) new_conf = config_filename + ".rpmnew" if os.path.exists(new_conf): shutil.move(new_conf, config_filename) if Version(await self.version()) > Version("65.0"): os.system( '/bin/sed -i -e "s@^target=.*@target=%s@g" ' % "_self" + config_filename ) # (re-) register plugin sys.stdout.write("cPanel: register_appconfig...\n") os.system( "/usr/local/cpanel/bin/register_appconfig " + config_filename ) @base.ensure_valid_panel() async def disable_imunify_plugin(self, plugin_name=None): plugin = plugin_name or PLUGIN_NAME config_filename = CONFIG_FILE_TEMPLATE.format(name=plugin) config_created = False if not os.path.exists(config_filename): logger.info( "Warning: cpanel " f"{plugin}.conf missing, " "creating temporary config for uninstall" ) os.makedirs(CONFIG_PATH, exist_ok=True) with open(config_filename, "w") as f: f.write("# Temporary config for uninstall\n") config_created = True sys.stderr.write("cPanel: unregister_appconfig...\n") os.system( "/usr/local/cpanel/bin/unregister_appconfig " + config_filename ) if config_created: try: os.remove(config_filename) except Exception as e: logger.error(f"Failed to remove temporary config: {e}") @forbid_dns_only async def get_user_domains(self): """ :return: list: domains hosted on server via cpanel """ return [ domain for user in await self.get_users() for domain, user_path in self._userdomains(user) ] @classmethod async def get_user_domains_details( cls, username, _path=CPANEL_USERDATADOMAINS_PATH, quiet=True ) -> list[DomainData]: domains = [] def parser(path, d, domain_data): user_ = domain_data[0] if user_ != username: return doc_type = domain_data[2] docroot = domain_data[4] domains.append( DomainData( docroot=docroot, domain=d, type=doc_type, username=username ) ) cls._parse_userdatadomains(_path, parser, quiet=quiet) return domains async def _do_get_users(self, userplans_path: str) -> List[str]: if not os.path.isfile(userplans_path): return [] _cached_mtime = _CACHE["userplans"].get("mtime", 0) if _cached_mtime == os.path.getmtime(userplans_path): return _CACHE["userplans"]["users"] with open( userplans_path, encoding="utf-8", errors="surrogateescape" ) as f: users = [] for line in f: if ( not line.startswith("#") and line.count(":") == 1 and len(line.strip()) > 3 ): users.append(line.split(":")[0].strip()) _CACHE["userplans"]["mtime"] = os.path.getmtime(userplans_path) _CACHE["userplans"]["users"] = users return users async def get_users( self, ) -> List[str]: return await self._do_get_users(CPANEL_USERPLANS_PATH) async def get_domain_to_owner(self) -> Dict[str, List[str]]: """ Returns dict with domain to list of users pairs :return: dict domain to list of users: """ domain_to_users = defaultdict(list) # type: Dict[str, List[str]] for user in await self.get_users(): for domain, _ in self._userdomains(user): domain_to_users[domain].append(user) return domain_to_users async def get_domains_per_user(self): """ Returns dict with users to list of domains pairs :return: dict user to list of domains """ user_to_domains = defaultdict(list) for user in await self.get_users(): for domain, _ in self._userdomains(user): user_to_domains[user].append(domain) return user_to_domains @async_lru_cache(maxsize=128) async def panel_user_link(self, username) -> str: """ Returns panel url :return: str """ link = ( await whmapi1( "create_user_session", user=username, service="cpaneld" ) )["url"] if len(link) == 0: return "" parsed = urlparse(link) return f"{parsed.scheme}://{parsed.netloc}/cpsess0000000000/frontend/jupiter/imunify/imunify.live.pl" async def switch_ui_config(self, myimunify_enabled: bool) -> None: """ Switch UI panel configuration between Im360 and MyImunify """ if antivirus_mode.enabled: return None if not Path("/var/imunify360/i360-userside-plugin.installed").exists(): return None config_to_enable = "myimunify_conf" if myimunify_enabled else "conf" config_to_disable = "conf" if myimunify_enabled else "myimunify_conf" for theme_path in glob.glob("/usr/local/cpanel/base/frontend/*"): if Path(theme_path).is_dir(): theme_name = os.path.basename(theme_path) await self.disable_config(config_to_disable, theme_name) await self.enable_config(config_to_enable, theme_name) async def enable_config(self, config: str, theme: str) -> None: try: await check_run( [ PLUGIN_INSTALL_SCRIPT, f"{CONFIG_PATH}{config}", "--theme", theme, ] ) except CheckRunError as e: logger.warning("Error in enabling config '%s': %s", config, e) async def disable_config(self, config: str, theme: str) -> None: try: await check_run( [ PLUGIN_UNINSTALL_SCRIPT, f"{CONFIG_PATH}{config}", "--theme", theme, ] ) except CheckRunError as e: logger.warning("Error in disabling config '%s': %s", config, e) async def get_user_details(self) -> Dict[str, Dict[str, str]]: """ Returns dict with user to email and locale pairs """ user_details = {} # noinspection PyBroadException try: resellers = { line.split(":", 1)[0] for line in Path(self.RESELLERS_INFO).read_text().splitlines() } except Exception: resellers = None for user in await self.get_users(): level = base.UserLevel.REGULAR_USER if user == "root": try: with open("/etc/wwwacct.conf.cache") as f: user_info = json.load(f) email = user_info.get("CONTACTEMAIL", "") except (FileNotFoundError, json.JSONDecodeError): email = "" locale = "en" parent = "root" suspended = False level = base.UserLevel.ADMIN else: try: with open(os.path.join(self.USER_INFO_DIR, user)) as f: user_info = json.load(f) email = user_info.get("CONTACTEMAIL", "") locale = user_info.get("LOCALE", "") parent = user_info.get("OWNER", "") suspended = user_info.get("SUSPENDED", "") == "1" except (FileNotFoundError, json.JSONDecodeError): email = "" locale = "" parent = "" suspended = False if resellers and user in resellers: # 1 for the root (see above) # 2 for a reseller # 3 for a regular customer level = base.UserLevel.RESSELER user_details[user] = { "email": email, "locale": locale, "parent": parent, "suspended": suspended, "level": int(level), } return user_details @classmethod def _get_max_mtime(cls, _path): """checks mtime of userdatadomains files (including cache) returns max mtime of all files""" _mtimes = [] if "{user}" in _path: call_as_user = pwd.getpwuid(os.getuid()).pw_name _path = _path.replace("{user}", call_as_user) path_list = _path.split(";") for path_ in path_list: if os.path.exists(path_): _mtimes.append(os.path.getmtime(path_)) return max(_mtimes) if _mtimes else 0 @classmethod def _get_from_cache(cls, cpuser, _path): """check and invalidate cache if needed""" _cached_mtime = ( _CACHE["userdatadomains"].get(cpuser, {}).get("mtime", 0) ) if _cached_mtime < cls._get_max_mtime(_path): _CACHE["userdatadomains"][cpuser] = {} return None return _CACHE["userdatadomains"].get(cpuser, {}).get("domains", []) @classmethod def _userdomains( cls, cpuser, _path=CPANEL_USERDATADOMAINS_PATH, quiet=True ): cached_data = cls._get_from_cache(cpuser, _path) if cached_data is not None: return cached_data # use dict to avoid duplicates domains_tmp = OrderedDict() domains = OrderedDict() def parser(path, d, domain_data): user_ = domain_data[0] if user_ == cpuser: document_root = domain_data[4] if "main" == domain_data[2]: # main domain must be first in list domains.update({d: document_root}) else: domains_tmp.update({d: document_root}) cls._parse_userdatadomains(_path, parser, quiet=quiet) domains.update(domains_tmp) _CACHE["userdatadomains"][cpuser] = { "mtime": cls._get_max_mtime(_path), "domains": domains.items(), } return domains.items() @staticmethod def _parse_userdatadomains(_path, parser, quiet=True): if "{user}" in _path: call_as_user = pwd.getpwuid(os.getuid()).pw_name _path = _path.replace("{user}", call_as_user) path_list = _path.split(";") for path_ in path_list: try: file_ = open(path_, "rb") except Exception as e: if not quiet: logger.warning("Can't open file %s [%s]", path_, e) continue try: # example line: # test.russianguns.ru: russianguns==root==sub==russianguns.ru== # /home/russianguns/fla==192.168.122.40:80======0 for i, line in enumerate(file_): try: line = line.decode() except UnicodeDecodeError: logger.warning( 'Broken %s line in file "%s"; line was ignored', i, path_, ) continue if not line.strip(): # ignore the empty string continue if line.count(": ") != 1: if not quiet: logger.warning( "Can't parse %s line in file '%s'; " "line was ignored", i, path_, ) continue domain, domain_raw_data = line.split(": ") domain_data = domain_raw_data.strip().split("==") parser(path_, domain, domain_data) finally: file_.close() @classmethod def is_extension_installed(cls, pkgs): return all( CPANEL_PACKAGE_EXTENSIONS_PATH.joinpath(file).is_file() for file in pkgs ) @classmethod async def is_hook_installed(cls): try: hooks = await whmapi1("list_hooks") category = next( cat for cat in hooks["categories"] if cat["category"] == "Whostmgr" ) for event_name in ( "Accounts::change_package", "Accounts::Create", "Accounts::Modify", ): event = next( ev for ev in category["events"] if ev["event"] == event_name ) stage = next( st for st in event["stages"] if st["stage"] == "post" ) if not any( action["hook"] == "ImunifyHook::hook_processing" for action in stage["actions"] ): return False except (StopIteration, WHMAPIException): return False return True @classmethod async def install_extension( cls, extention_name: str, extention_files, **kwargs, ) -> None: # copy cpanel's package extension files CPANEL_PACKAGE_EXTENSIONS_PATH.mkdir( mode=0o700, parents=True, exist_ok=True ) for filename in extention_files: shutil.copy2( PREINSTALL_PACKAGE_EXTENSIONS_PATH / filename, CPANEL_PACKAGE_EXTENSIONS_PATH, ) # enable extension for all packages await packages.add_extension_for_all(extention_name, **kwargs) # add hooks for native feature management os.makedirs(config.Core.INBOX_HOOKS_DIR, mode=0o700, exist_ok=True) shutil.copy2( PREINSTALL_PACKAGE_EXTENSIONS_PATH / "ImunifyHook.pm", CPANEL_HOOKS_PATH, ) await check_run( [ "/usr/local/cpanel/bin/manage_hooks", "add", "module", "ImunifyHook", ] ) @classmethod async def uninstall_extension(cls, extension_name: str, extention_files): # remove the hook await check_run( [ "/usr/local/cpanel/bin/manage_hooks", "del", "module", "ImunifyHook", ] ) with suppress(FileNotFoundError): (CPANEL_HOOKS_PATH / "ImunifyHook.pm").unlink() # remove the package extension from all packages await packages.remove_extension_from_all(extension_name) # remove cpanel's package extension files for filename in extention_files: with suppress(FileNotFoundError): (CPANEL_PACKAGE_EXTENSIONS_PATH / filename).unlink() @staticmethod def mounts(): mounts = [] with open("/proc/mounts", "r") as f: for line in f: values = line.strip().split() if len(values) > 1: mounts.append(values[1]) return mounts def basedirs(self) -> Set[str]: """Fetch list of basedirs. On cPanel, basedir is configured as HOMEDIR variable in /etc/wwwacct.conf. Also, there is a way to specify additional mount points as containing user folders, through HOMEMATCH variable. If value from HOMEMATCH variable is contained within a mount point path, cPanel uses this directory too.""" homedir = AccountConfig("HOMEDIR").get() homematch = AccountConfig("HOMEMATCH").get() homedir = BASE_DIR if homedir is None else homedir basedirs = {BASE_DIR, homedir} if homematch is None: return basedirs for mount in self.mounts(): # exclude virtfs from basedirs (DEF-14266) if homematch in mount and not mount.startswith("/home/virtfs/"): basedirs.add(mount) return basedirs @classmethod async def notify(cls, *, message_type, params, user=None): """ Notify a customer using cPanel iContact Notifications """ if not config.AdminContacts.ENABLE_ICONTACT_NOTIFICATIONS: return False if not config.should_send_user_notifications(username=user): return False data = {"message_type": message_type, "params": params, "user": user} logger.info(f"{cls.__name__}.notify(%s)", data) cmd = ( "/usr/local/cpanel/whostmgr/docroot/cgi" "/imunify/handlers/notify.cgi" ) stdin = json.dumps(data) out = await check_run([cmd], input=stdin.encode()) return json.loads(out.decode(errors="surrogateescape")) async def list_docroots(self) -> Dict[str, str]: result = dict() def parser(path, d, domain_data): result[domain_data[4]] = domain_data[3] self._parse_userdatadomains( CPANEL_USERDATADOMAINS_PATH, parser, quiet=True ) return result async def get_domain_paths(self) -> Dict[str, List[str]]: result = {} def parser(_, d, domain_data): result[d] = [domain_data[4]] self._parse_userdatadomains( CPANEL_USERDATADOMAINS_PATH, parser, quiet=True ) return result