| | |
| | | exec($command); |
| | | $app->log("Executed command: ".$command,LOGLEVEL_DEBUG); |
| | | $app->log("Added shelluser: ".$data['new']['username'],LOGLEVEL_DEBUG); |
| | | |
| | | // call the ssh-rsa update function |
| | | $app->uses("getconf"); |
| | | $this->data = $data; |
| | | $this->app = $app; |
| | | $this->_setup_ssh_rsa(); |
| | | |
| | | //* Create .bash_history file |
| | | exec('touch '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | exec('chmod 755 '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | exec('chown '.escapeshellcmd($data['new']['username']).':'.escapeshellcmd($data['new']['pgroup']).' '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | touch(escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | chmod(escapeshellcmd($data['new']['dir']).'/.bash_history', 0755); |
| | | chown(escapeshellcmd($data['new']['dir']).'/.bash_history', escapeshellcmd($data['new']['username'])); |
| | | chgrp(escapeshellcmd($data['new']['dir']).'/.bash_history', escapeshellcmd($data['new']['pgroup'])); |
| | | |
| | | //* Disable shell user temporarily if we use jailkit |
| | | if($data['new']['chroot'] == 'jailkit') { |
| | | $command = 'usermod -L '.escapeshellcmd($data['new']['username']); |
| | | $command = 'usermod -s /bin/false -L '.escapeshellcmd($data['new']['username']); |
| | | exec($command); |
| | | $app->log("Disabling shelluser temporarily: ".$command,LOGLEVEL_DEBUG); |
| | | } |
| | |
| | | $app->log("UID = $uid for shelluser:".$data['new']['username']." not allowed.",LOGLEVEL_ERROR); |
| | | } |
| | | } else { |
| | | $app->log("Skippung insert of user:".$data['new']['username'].", parent user ".$data['new']['puser']." does not exist.",LOGLEVEL_WARN); |
| | | $app->log("Skipping insertion of user:".$data['new']['username'].", parent user ".$data['new']['puser']." does not exist.",LOGLEVEL_WARN); |
| | | } |
| | | } |
| | | |
| | |
| | | exec($command); |
| | | $app->log("Executed command: $command ",LOGLEVEL_DEBUG); |
| | | $app->log("Updated shelluser: ".$data['old']['username'],LOGLEVEL_DEBUG); |
| | | |
| | | |
| | | // call the ssh-rsa update function |
| | | $app->uses("getconf"); |
| | | $this->data = $data; |
| | | $this->app = $app; |
| | | $this->_setup_ssh_rsa(); |
| | | |
| | | //* Create .bash_history file |
| | | if(!is_file($data['new']['dir']).'/.bash_history') { |
| | | exec('touch '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | exec('chmod 755 '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | exec('chown '.escapeshellcmd($data['new']['username']).':'.escapeshellcmd($data['new']['pgroup']).' '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | touch(escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | chmod(escapeshellcmd($data['new']['dir']).'/.bash_history', 0755); |
| | | chown(escapeshellcmd($data['new']['dir']).'/.bash_history',escapeshellcmd($data['new']['username'])); |
| | | chgrp(escapeshellcmd($data['new']['dir']).'/.bash_history',escapeshellcmd($data['new']['pgroup'])); |
| | | } |
| | | |
| | | } else { |
| | |
| | | $app->log("UID = $uid for shelluser:".$data['new']['username']." not allowed.",LOGLEVEL_ERROR); |
| | | } |
| | | } else { |
| | | $app->log("Skippung update for user:".$data['new']['username'].", parent user ".$data['new']['puser']." does not exist.",LOGLEVEL_WARN); |
| | | $app->log("Skipping update for user:".$data['new']['username'].", parent user ".$data['new']['puser']." does not exist.",LOGLEVEL_WARN); |
| | | } |
| | | } |
| | | |
| | |
| | | |
| | | } |
| | | |
| | | |
| | | function _setup_ssh_rsa() { |
| | | //global $app, $conf; |
| | | //$app->uses('system'); |
| | | // Okay, here we have a question, .. how to determine the client id |
| | | //$var = "Var:".intval($this->app->system->getuid($this->data['new']['puser'])); |
| | | //exec("echo $var >> /tmp/debug"); |
| | | /* |
| | | // ssh-rsa authentication variables |
| | | $sshrsa = escapeshellcmd($this->data['new']['ssh_rsa']); |
| | | $usrdir = escapeshellcmd($this->data['new']['dir']); |
| | | $sshdir = escapeshellcmd($this->data['new']['dir']).'/.ssh'; |
| | | $sshkeys= escapeshellcmd($this->data['new']['dir']).'/.ssh/authorized_keys'; |
| | | |
| | | // determine the client id |
| | | $id = $this->data['new']['sys_groupid']; |
| | | if ($id>0) $id = $id -1; |
| | | |
| | | $user = $app->db->queryOneRecord("SELECT * FROM sys_user WHERE client_id = ".$id); |
| | | $userkey = $user['ssh_rsa']; |
| | | $username= $user['username']; |
| | | |
| | | // If this user has no key yet, generate a pair |
| | | if ($userkey == '') |
| | | { |
| | | //Generate ssh-rsa-keys |
| | | exec('ssh-keygen -t rsa -C '.$username.'-rsa-key-'.time().' -f /tmp/id_rsa -N ""'); |
| | | $app->db->query("UPDATE client SET created_at = ".time().", id_rsa = '".file_get_contents('/tmp/id_rsa')."', ssh_rsa = '".file_get_contents('/tmp/id_rsa.pub')."' WHERE client_id = ".$this->id; |
| | | exec('rm -f /tmp/id_rsa /tmp/id_rsa.pub'); |
| | | |
| | | $this->app->log("ssh-rsa keypair generated for ".$username,LOGLEVEL_DEBUG); |
| | | |
| | | }; |
| | | |
| | | if (!file_exists($sshkeys)) |
| | | { |
| | | // add root's key |
| | | exec("mkdir '$sshdir'"); |
| | | exec("cat /root/.ssh/authorized_keys > '$sshkeys'"); |
| | | exec("echo '' >> '$sshkeys'"); |
| | | |
| | | // add the user's key |
| | | exec("echo '$userkey' >> '$sshkeys'"); |
| | | exec("echo '' >> '$sshkeys'"); |
| | | } |
| | | // add the custom key |
| | | exec("echo '$sshrsa' >> '$sshkeys'"); |
| | | exec("echo '' >> '$sshkeys'"); |
| | | |
| | | // set proper file permissions |
| | | exec("chown -R ".escapeshellcmd($this->data['new']['puser']).":".escapeshellcmd($this->data['new']['pgroup'])." ".$usrdir); |
| | | exec("chmod 600 '$sshkeys'"); |
| | | */ |
| | | $this->app->log("ssh-rsa key added to ".$sshkeys,LOGLEVEL_DEBUG); |
| | | } |
| | | |
| | | |
| | | } // end class |
| | | |
| | | ?> |
| | | ?> |