| | |
| | | exec($command); |
| | | $app->log("Executed command: ".$command,LOGLEVEL_DEBUG); |
| | | $app->log("Added shelluser: ".$data['new']['username'],LOGLEVEL_DEBUG); |
| | | |
| | | // call the ssh-rsa update function |
| | | $app->uses("getconf"); |
| | | $this->data = $data; |
| | | $this->app = $app; |
| | | $this->_setup_ssh_rsa(); |
| | | |
| | | //* Create .bash_history file |
| | | exec('touch '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | exec('chmod 755 '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | exec('chown '.escapeshellcmd($data['new']['username']).':'.escapeshellcmd($data['new']['pgroup']).' '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | touch(escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | chmod(escapeshellcmd($data['new']['dir']).'/.bash_history', 0755); |
| | | chown(escapeshellcmd($data['new']['dir']).'/.bash_history', escapeshellcmd($data['new']['username'])); |
| | | chgrp(escapeshellcmd($data['new']['dir']).'/.bash_history', escapeshellcmd($data['new']['pgroup'])); |
| | | |
| | | //* Disable shell user temporarily if we use jailkit |
| | | if($data['new']['chroot'] == 'jailkit') { |
| | |
| | | $app->log("UID = $uid for shelluser:".$data['new']['username']." not allowed.",LOGLEVEL_ERROR); |
| | | } |
| | | } else { |
| | | $app->log("Skippung insert of user:".$data['new']['username'].", parent user ".$data['new']['puser']." does not exist.",LOGLEVEL_WARN); |
| | | $app->log("Skipping insertion of user:".$data['new']['username'].", parent user ".$data['new']['puser']." does not exist.",LOGLEVEL_WARN); |
| | | } |
| | | } |
| | | |
| | |
| | | exec($command); |
| | | $app->log("Executed command: $command ",LOGLEVEL_DEBUG); |
| | | $app->log("Updated shelluser: ".$data['old']['username'],LOGLEVEL_DEBUG); |
| | | |
| | | |
| | | // call the ssh-rsa update function |
| | | $app->uses("getconf"); |
| | | $this->data = $data; |
| | | $this->app = $app; |
| | | $this->_setup_ssh_rsa(); |
| | | |
| | | //* Create .bash_history file |
| | | if(!is_file($data['new']['dir']).'/.bash_history') { |
| | | exec('touch '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | exec('chmod 755 '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | exec('chown '.escapeshellcmd($data['new']['username']).':'.escapeshellcmd($data['new']['pgroup']).' '.escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | touch(escapeshellcmd($data['new']['dir']).'/.bash_history'); |
| | | chmod(escapeshellcmd($data['new']['dir']).'/.bash_history', 0755); |
| | | chown(escapeshellcmd($data['new']['dir']).'/.bash_history',escapeshellcmd($data['new']['username'])); |
| | | chgrp(escapeshellcmd($data['new']['dir']).'/.bash_history',escapeshellcmd($data['new']['pgroup'])); |
| | | } |
| | | |
| | | } else { |
| | |
| | | $app->log("UID = $uid for shelluser:".$data['new']['username']." not allowed.",LOGLEVEL_ERROR); |
| | | } |
| | | } else { |
| | | $app->log("Skippung update for user:".$data['new']['username'].", parent user ".$data['new']['puser']." does not exist.",LOGLEVEL_WARN); |
| | | $app->log("Skipping update for user:".$data['new']['username'].", parent user ".$data['new']['puser']." does not exist.",LOGLEVEL_WARN); |
| | | } |
| | | } |
| | | |
| | |
| | | |
| | | } |
| | | |
| | | |
| | | private function _setup_ssh_rsa() { |
| | | $this->app->log("ssh-rsa setup shelluser_base",LOGLEVEL_DEBUG); |
| | | // Get the client ID, username, and the key |
| | | $domain_data = $this->app->db->queryOneRecord('SELECT sys_groupid FROM web_domain WHERE web_domain.domain_id = '.intval($this->data['new']['parent_domain_id'])); |
| | | $sys_group_data = $this->app->db->queryOneRecord('SELECT * FROM sys_group WHERE sys_group.groupid = '.intval($domain_data['sys_groupid'])); |
| | | $id = intval($sys_group_data['client_id']); |
| | | $username= $sys_group_data['name']; |
| | | $client_data = $this->app->db->queryOneRecord('SELECT * FROM client WHERE client.client_id = '.$id); |
| | | $userkey = $client_data['ssh_rsa']; |
| | | unset($domain_data); |
| | | unset($client_data); |
| | | |
| | | // ssh-rsa authentication variables |
| | | $sshrsa = escapeshellcmd($this->data['new']['ssh_rsa']); |
| | | $usrdir = escapeshellcmd($this->data['new']['dir']); |
| | | $sshdir = $usrdir.'/.ssh'; |
| | | $sshkeys= $usrdir.'/.ssh/authorized_keys'; |
| | | |
| | | // If this user has no key yet, generate a pair |
| | | if ($userkey == '' && $id>0) |
| | | { |
| | | //Generate ssh-rsa-keys |
| | | exec('ssh-keygen -t rsa -C '.$username.'-rsa-key-'.time().' -f /tmp/id_rsa -N ""'); |
| | | // save keypair in client table |
| | | $this->app->db->query("UPDATE client SET created_at = ".time().", id_rsa = '".file_get_contents('/tmp/id_rsa')."', ssh_rsa = '".file_get_contents('/tmp/id_rsa.pub')."' WHERE client_id = ".$id); |
| | | // and use the public key that has been generated |
| | | $userkey = file_get_contents('/tmp/id_rsa.pub') |
| | | ; |
| | | exec('rm -f /tmp/id_rsa /tmp/id_rsa.pub'); |
| | | $this->app->log("ssh-rsa keypair generated for ".$username,LOGLEVEL_DEBUG); |
| | | }; |
| | | |
| | | if (!file_exists($sshkeys)) |
| | | { |
| | | // add root's key |
| | | exec("mkdir '$sshdir'"); |
| | | exec("cat /root/.ssh/authorized_keys > '$sshkeys'"); |
| | | exec("echo '' >> '$sshkeys'"); |
| | | |
| | | // add the user's key |
| | | exec("echo '$userkey' >> '$sshkeys'"); |
| | | exec("echo '' >> '$sshkeys'"); |
| | | $this->app->log("ssh-rsa authorisation keyfile created in ".$sshkeys,LOGLEVEL_DEBUG); |
| | | } |
| | | if ($sshrsa!=''){ |
| | | // add the custom key |
| | | exec("echo '$sshrsa' >> '$sshkeys'"); |
| | | exec("echo '' >> '$sshkeys'"); |
| | | $this->app->log("ssh-rsa key updated in ".$sshkeys,LOGLEVEL_DEBUG); |
| | | } |
| | | // set proper file permissions |
| | | exec("chown -R ".escapeshellcmd($this->data['new']['puser']).":".escapeshellcmd($this->data['new']['pgroup'])." ".$usrdir); |
| | | exec("chmod 600 '$sshkeys'"); |
| | | |
| | | } |
| | | |
| | | |
| | | } // end class |
| | | |
| | | ?> |
| | | ?> |