2018-06-05 00:53:45 +05:00
|
|
|
import os,sys
|
|
|
|
|
sys.path.append('/usr/local/CyberCP')
|
|
|
|
|
import django
|
|
|
|
|
os.environ.setdefault("DJANGO_SETTINGS_MODULE", "CyberCP.settings")
|
2019-07-18 14:08:00 +05:00
|
|
|
try:
|
|
|
|
|
django.setup()
|
|
|
|
|
except:
|
|
|
|
|
pass
|
2017-12-09 22:30:10 +05:00
|
|
|
import os.path
|
|
|
|
|
import shutil
|
2019-12-12 08:46:07 +05:00
|
|
|
import CyberCPLogFileWriter as logging
|
2017-12-09 22:30:10 +05:00
|
|
|
import subprocess
|
|
|
|
|
import argparse
|
|
|
|
|
import shlex
|
2019-12-11 10:40:35 +05:00
|
|
|
from .processUtilities import ProcessUtilities
|
2019-06-08 21:41:43 +00:00
|
|
|
import os, getpass
|
|
|
|
|
import hashlib
|
2019-07-16 23:23:16 +05:00
|
|
|
import bcrypt
|
2019-08-25 05:25:48 +05:00
|
|
|
import getpass
|
2019-11-02 19:29:02 +05:00
|
|
|
import smtplib
|
2019-08-25 05:25:48 +05:00
|
|
|
|
2019-07-18 14:08:00 +05:00
|
|
|
try:
|
|
|
|
|
from mailServer.models import Domains, EUsers
|
|
|
|
|
from emailPremium.models import DomainLimits, EmailLimits
|
|
|
|
|
from websiteFunctions.models import Websites, ChildDomains
|
|
|
|
|
except:
|
|
|
|
|
pass
|
2017-12-09 22:30:10 +05:00
|
|
|
|
|
|
|
|
class mailUtilities:
|
|
|
|
|
|
2018-05-08 21:25:37 +05:00
|
|
|
installLogPath = "/home/cyberpanel/openDKIMInstallLog"
|
2018-06-25 05:45:38 +05:00
|
|
|
spamassassinInstallLogPath = "/home/cyberpanel/spamassassinInstallLogPath"
|
2018-05-08 21:25:37 +05:00
|
|
|
cyberPanelHome = "/home/cyberpanel"
|
2018-05-03 01:22:28 +05:00
|
|
|
|
2019-11-02 19:29:02 +05:00
|
|
|
@staticmethod
|
|
|
|
|
def SendEmail(sender, receivers, message):
|
|
|
|
|
try:
|
|
|
|
|
smtpObj = smtplib.SMTP('localhost')
|
|
|
|
|
smtpObj.sendmail(sender, receivers, message)
|
2019-12-10 15:09:10 +05:00
|
|
|
print("Successfully sent email")
|
|
|
|
|
except BaseException as msg:
|
2019-11-02 19:29:02 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(str(msg))
|
2019-07-16 23:23:16 +05:00
|
|
|
@staticmethod
|
|
|
|
|
def AfterEffects(domain):
|
|
|
|
|
path = "/usr/local/CyberCP/install/rainloop/cyberpanel.net.ini"
|
|
|
|
|
|
|
|
|
|
if not os.path.exists("/usr/local/lscp/cyberpanel/rainloop/data/_data_/_default_/domains/"):
|
|
|
|
|
os.makedirs("/usr/local/lscp/cyberpanel/rainloop/data/_data_/_default_/domains/")
|
|
|
|
|
|
|
|
|
|
finalPath = "/usr/local/lscp/cyberpanel/rainloop/data/_data_/_default_/domains/" + domain + ".ini"
|
|
|
|
|
|
|
|
|
|
if not os.path.exists(finalPath):
|
|
|
|
|
shutil.copy(path, finalPath)
|
|
|
|
|
|
|
|
|
|
command = 'chown -R lscpd:lscpd /usr/local/lscp/cyberpanel/rainloop/data/'
|
|
|
|
|
ProcessUtilities.normalExecutioner(command)
|
|
|
|
|
|
2017-12-09 22:30:10 +05:00
|
|
|
@staticmethod
|
2018-06-05 00:53:45 +05:00
|
|
|
def createEmailAccount(domain, userName, password):
|
2017-12-09 22:30:10 +05:00
|
|
|
try:
|
|
|
|
|
|
2018-06-05 00:53:45 +05:00
|
|
|
## Check if already exists
|
|
|
|
|
|
|
|
|
|
finalEmailUsername = userName + "@" + domain
|
|
|
|
|
|
|
|
|
|
if EUsers.objects.filter(email=finalEmailUsername).exists():
|
|
|
|
|
raise BaseException("This account already exists!")
|
|
|
|
|
|
|
|
|
|
## Check for email limits.
|
|
|
|
|
|
2019-06-08 21:41:43 +00:00
|
|
|
ChildCheck = 0
|
|
|
|
|
try:
|
|
|
|
|
website = Websites.objects.get(domain=domain)
|
|
|
|
|
except:
|
|
|
|
|
website = ChildDomains.objects.get(domain=domain)
|
|
|
|
|
ChildCheck = 1
|
2018-06-05 00:53:45 +05:00
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
|
2018-06-25 03:37:23 +05:00
|
|
|
if not Domains.objects.filter(domain=domain).exists():
|
2019-06-08 21:41:43 +00:00
|
|
|
if ChildCheck == 0:
|
|
|
|
|
newEmailDomain = Domains(domainOwner=website, domain=domain)
|
|
|
|
|
else:
|
|
|
|
|
newEmailDomain = Domains(childOwner=website, domain=domain)
|
|
|
|
|
|
2018-06-25 03:37:23 +05:00
|
|
|
newEmailDomain.save()
|
|
|
|
|
|
|
|
|
|
if not DomainLimits.objects.filter(domain=newEmailDomain).exists():
|
|
|
|
|
domainLimits = DomainLimits(domain=newEmailDomain)
|
|
|
|
|
domainLimits.save()
|
2018-06-05 00:53:45 +05:00
|
|
|
|
2019-06-08 21:41:43 +00:00
|
|
|
if ChildCheck == 0:
|
|
|
|
|
if website.package.emailAccounts == 0 or (
|
|
|
|
|
newEmailDomain.eusers_set.all().count() < website.package.emailAccounts):
|
|
|
|
|
pass
|
|
|
|
|
else:
|
|
|
|
|
raise BaseException("Exceeded maximum amount of email accounts allowed for the package.")
|
2018-06-05 00:53:45 +05:00
|
|
|
else:
|
2019-06-08 21:41:43 +00:00
|
|
|
if website.master.package.emailAccounts == 0 or (
|
|
|
|
|
newEmailDomain.eusers_set.all().count() < website.master.package.emailAccounts):
|
|
|
|
|
pass
|
|
|
|
|
else:
|
|
|
|
|
raise BaseException("Exceeded maximum amount of email accounts allowed for the package.")
|
2018-06-05 00:53:45 +05:00
|
|
|
|
|
|
|
|
except:
|
|
|
|
|
|
|
|
|
|
emailDomain = Domains.objects.get(domain=domain)
|
2019-06-08 21:41:43 +00:00
|
|
|
if ChildCheck == 0:
|
|
|
|
|
if website.package.emailAccounts == 0 or (
|
|
|
|
|
emailDomain.eusers_set.all().count() < website.package.emailAccounts):
|
|
|
|
|
pass
|
|
|
|
|
else:
|
|
|
|
|
raise BaseException("Exceeded maximum amount of email accounts allowed for the package.")
|
2018-06-05 00:53:45 +05:00
|
|
|
else:
|
2019-06-08 21:41:43 +00:00
|
|
|
if website.master.package.emailAccounts == 0 or (
|
|
|
|
|
emailDomain.eusers_set.all().count() < website.master.package.emailAccounts):
|
|
|
|
|
pass
|
|
|
|
|
else:
|
|
|
|
|
raise BaseException("Exceeded maximum amount of email accounts allowed for the package.")
|
2018-06-05 00:53:45 +05:00
|
|
|
|
|
|
|
|
|
|
|
|
|
## After effects
|
|
|
|
|
|
2019-12-10 23:04:24 +05:00
|
|
|
execPath = "/usr/local/CyberCP/bin/python /usr/local/CyberCP/plogical/mailUtilities.py"
|
2019-07-16 23:23:16 +05:00
|
|
|
execPath = execPath + " AfterEffects --domain " + domain
|
2019-08-23 17:29:24 +05:00
|
|
|
|
2019-08-25 05:25:48 +05:00
|
|
|
if getpass.getuser() == 'root':
|
2019-08-23 17:29:24 +05:00
|
|
|
## This is the case when cPanel Importer is running and token is not present in enviroment.
|
|
|
|
|
ProcessUtilities.normalExecutioner(execPath)
|
|
|
|
|
else:
|
|
|
|
|
ProcessUtilities.executioner(execPath, 'lscpd')
|
2017-12-09 22:30:10 +05:00
|
|
|
|
2018-06-05 00:53:45 +05:00
|
|
|
## After effects ends
|
|
|
|
|
|
|
|
|
|
emailDomain = Domains.objects.get(domain=domain)
|
|
|
|
|
|
2019-06-08 21:41:43 +00:00
|
|
|
hash = hashlib.md5()
|
|
|
|
|
hash.update(password)
|
|
|
|
|
|
|
|
|
|
#emailAcct = EUsers(emailOwner=emailDomain, email=finalEmailUsername, password=hash.hexdigest())
|
2019-07-03 13:15:26 +05:00
|
|
|
|
|
|
|
|
CentOSPath = '/etc/redhat-release'
|
|
|
|
|
|
|
|
|
|
if os.path.exists(CentOSPath):
|
2019-07-16 23:23:16 +05:00
|
|
|
password = bcrypt.hashpw(str(password), bcrypt.gensalt())
|
|
|
|
|
password = '{CRYPT}%s' % (password)
|
2019-07-03 13:15:26 +05:00
|
|
|
emailAcct = EUsers(emailOwner=emailDomain, email=finalEmailUsername, password=password)
|
|
|
|
|
emailAcct.mail = 'maildir:/home/vmail/%s/%s/Maildir' % (domain, userName)
|
|
|
|
|
emailAcct.save()
|
|
|
|
|
else:
|
2019-07-24 22:37:37 +05:00
|
|
|
password = bcrypt.hashpw(str(password), bcrypt.gensalt())
|
|
|
|
|
password = '{CRYPT}%s' % (password)
|
2019-07-03 13:15:26 +05:00
|
|
|
emailAcct = EUsers(emailOwner=emailDomain, email=finalEmailUsername, password=password)
|
|
|
|
|
emailAcct.mail = 'maildir:/home/vmail/%s/%s/Maildir' % (domain, userName)
|
|
|
|
|
emailAcct.save()
|
2018-06-05 00:53:45 +05:00
|
|
|
|
2018-06-25 03:37:23 +05:00
|
|
|
emailLimits = EmailLimits(email=emailAcct)
|
|
|
|
|
emailLimits.save()
|
|
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
print("1,None")
|
2018-06-05 00:53:45 +05:00
|
|
|
return 1,"None"
|
2017-12-09 22:30:10 +05:00
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2017-12-09 22:30:10 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(
|
|
|
|
|
str(msg) + " [createEmailAccount]")
|
2019-12-10 15:09:10 +05:00
|
|
|
print("0," + str(msg))
|
2018-06-05 00:53:45 +05:00
|
|
|
return 0, str(msg)
|
2017-12-09 22:30:10 +05:00
|
|
|
|
2018-06-05 00:53:45 +05:00
|
|
|
@staticmethod
|
|
|
|
|
def deleteEmailAccount(email):
|
|
|
|
|
try:
|
|
|
|
|
|
|
|
|
|
email = EUsers(email=email)
|
|
|
|
|
email.delete()
|
|
|
|
|
|
|
|
|
|
return 1, 'None'
|
|
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-06-05 00:53:45 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(
|
|
|
|
|
str(msg) + " [deleteEmailAccount]")
|
|
|
|
|
return 0, str(msg)
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def getEmailAccounts(virtualHostName):
|
|
|
|
|
try:
|
|
|
|
|
emailDomain = Domains.objects.get(domain=virtualHostName)
|
|
|
|
|
return emailDomain.eusers_set.all()
|
|
|
|
|
except:
|
|
|
|
|
return 0
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
2019-10-06 18:41:09 +05:00
|
|
|
def changeEmailPassword(email, newPassword, encrypt = None):
|
2018-06-05 00:53:45 +05:00
|
|
|
try:
|
2019-10-06 18:41:09 +05:00
|
|
|
if encrypt == None:
|
|
|
|
|
CentOSPath = '/etc/redhat-release'
|
|
|
|
|
changePass = EUsers.objects.get(email=email)
|
|
|
|
|
if os.path.exists(CentOSPath):
|
|
|
|
|
password = bcrypt.hashpw(str(newPassword), bcrypt.gensalt())
|
|
|
|
|
password = '{CRYPT}%s' % (password)
|
|
|
|
|
changePass.password = password
|
|
|
|
|
else:
|
|
|
|
|
changePass.password = newPassword
|
|
|
|
|
changePass.save()
|
2019-07-03 13:15:26 +05:00
|
|
|
else:
|
2019-10-06 18:41:09 +05:00
|
|
|
changePass = EUsers.objects.get(email=email)
|
2019-07-03 13:15:26 +05:00
|
|
|
changePass.password = newPassword
|
2019-10-06 18:41:09 +05:00
|
|
|
changePass.save()
|
2018-06-05 00:53:45 +05:00
|
|
|
return 0,'None'
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-06-05 00:53:45 +05:00
|
|
|
return 0, str(msg)
|
2017-12-09 22:30:10 +05:00
|
|
|
|
2018-05-01 00:49:47 +05:00
|
|
|
@staticmethod
|
|
|
|
|
def setupDKIM(virtualHostName):
|
|
|
|
|
try:
|
|
|
|
|
## Generate DKIM Keys
|
|
|
|
|
|
2018-06-11 21:04:55 +05:00
|
|
|
import tldextract
|
|
|
|
|
|
2018-11-21 14:50:27 +05:00
|
|
|
#extractDomain = tldextract.extract(virtualHostName)
|
|
|
|
|
#virtualHostName = extractDomain.domain + '.' + extractDomain.suffix
|
2018-06-11 21:04:55 +05:00
|
|
|
|
2018-05-01 00:49:47 +05:00
|
|
|
if os.path.exists("/etc/opendkim/keys/" + virtualHostName):
|
|
|
|
|
return 1, "None"
|
|
|
|
|
|
|
|
|
|
|
2019-10-20 23:33:19 +05:00
|
|
|
path = '/etc/opendkim/keys/%s' % (virtualHostName)
|
|
|
|
|
command = 'mkdir %s' % (path)
|
|
|
|
|
ProcessUtilities.normalExecutioner(command)
|
2018-06-05 00:53:45 +05:00
|
|
|
|
2019-10-20 23:33:19 +05:00
|
|
|
## Generate keys
|
2018-05-01 00:49:47 +05:00
|
|
|
|
2019-10-20 23:33:19 +05:00
|
|
|
command = "sudo opendkim-genkey -D /etc/opendkim/keys/%s -d %s -s default" % (virtualHostName, virtualHostName)
|
|
|
|
|
ProcessUtilities.normalExecutioner(command)
|
2018-05-01 00:49:47 +05:00
|
|
|
## Fix permissions
|
|
|
|
|
|
|
|
|
|
command = "chown -R root:opendkim /etc/opendkim/keys/" + virtualHostName
|
2019-10-20 23:33:19 +05:00
|
|
|
ProcessUtilities.normalExecutioner(command)
|
2018-05-01 00:49:47 +05:00
|
|
|
|
|
|
|
|
command = "chmod 640 /etc/opendkim/keys/" + virtualHostName + "/default.private"
|
2019-10-20 23:33:19 +05:00
|
|
|
ProcessUtilities.normalExecutioner(command)
|
2018-05-01 00:49:47 +05:00
|
|
|
|
|
|
|
|
command = "chmod 644 /etc/opendkim/keys/" + virtualHostName + "/default.txt"
|
2019-10-20 23:33:19 +05:00
|
|
|
ProcessUtilities.normalExecutioner(command)
|
2018-05-01 00:49:47 +05:00
|
|
|
|
|
|
|
|
## Edit key file
|
|
|
|
|
|
2019-10-20 23:33:19 +05:00
|
|
|
|
2018-05-01 00:49:47 +05:00
|
|
|
keyTable = "/etc/opendkim/KeyTable"
|
|
|
|
|
configToWrite = "default._domainkey." + virtualHostName + " " + virtualHostName + ":default:/etc/opendkim/keys/" + virtualHostName + "/default.private\n"
|
|
|
|
|
|
|
|
|
|
writeToFile = open(keyTable, 'a')
|
|
|
|
|
writeToFile.write(configToWrite)
|
|
|
|
|
writeToFile.close()
|
|
|
|
|
|
|
|
|
|
## Edit signing table
|
|
|
|
|
|
|
|
|
|
signingTable = "/etc/opendkim/SigningTable"
|
|
|
|
|
configToWrite = "*@" + virtualHostName + " default._domainkey." + virtualHostName + "\n"
|
|
|
|
|
|
|
|
|
|
writeToFile = open(signingTable, 'a')
|
|
|
|
|
writeToFile.write(configToWrite)
|
|
|
|
|
writeToFile.close()
|
|
|
|
|
|
|
|
|
|
## Trusted hosts
|
|
|
|
|
|
|
|
|
|
trustedHosts = "/etc/opendkim/TrustedHosts"
|
|
|
|
|
configToWrite = virtualHostName + "\n"
|
|
|
|
|
|
|
|
|
|
writeToFile = open(trustedHosts, 'a')
|
|
|
|
|
writeToFile.write(configToWrite)
|
|
|
|
|
writeToFile.close()
|
|
|
|
|
|
|
|
|
|
## Restart postfix and OpenDKIM
|
|
|
|
|
|
|
|
|
|
command = "systemctl restart opendkim"
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-05-01 00:49:47 +05:00
|
|
|
|
|
|
|
|
command = "systemctl restart postfix"
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-05-01 00:49:47 +05:00
|
|
|
|
|
|
|
|
return 1, "None"
|
|
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-05-01 00:49:47 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(
|
2019-10-20 23:33:19 +05:00
|
|
|
str(msg) + " [setupDKIM:275]")
|
2018-05-01 00:49:47 +05:00
|
|
|
return 0, str(msg)
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def checkIfDKIMInstalled():
|
|
|
|
|
try:
|
|
|
|
|
|
|
|
|
|
path = "/etc/opendkim.conf"
|
|
|
|
|
|
2018-05-08 21:25:37 +05:00
|
|
|
command = "sudo cat " + path
|
2019-03-31 02:47:35 +05:00
|
|
|
return ProcessUtilities.executioner(command)
|
2018-05-01 00:49:47 +05:00
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-05-01 00:49:47 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(
|
|
|
|
|
str(msg) + " [checkIfDKIMInstalled]")
|
|
|
|
|
return 0
|
|
|
|
|
|
2018-05-03 01:22:28 +05:00
|
|
|
@staticmethod
|
|
|
|
|
def generateKeys(domain):
|
|
|
|
|
try:
|
|
|
|
|
result = mailUtilities.setupDKIM(domain)
|
|
|
|
|
if result[0] == 0:
|
|
|
|
|
raise BaseException(result[1])
|
|
|
|
|
else:
|
2019-12-10 15:09:10 +05:00
|
|
|
print("1,None")
|
2018-05-03 01:22:28 +05:00
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-05-03 01:22:28 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(
|
|
|
|
|
str(msg) + " [generateKeys]")
|
2019-12-10 15:09:10 +05:00
|
|
|
print("0," + str(msg))
|
2018-05-03 01:22:28 +05:00
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def configureOpenDKIM():
|
|
|
|
|
try:
|
|
|
|
|
|
|
|
|
|
## Configure OpenDKIM specific settings
|
|
|
|
|
|
|
|
|
|
openDKIMConfigurePath = "/etc/opendkim.conf"
|
|
|
|
|
|
|
|
|
|
configData = """
|
|
|
|
|
Mode sv
|
|
|
|
|
Canonicalization relaxed/simple
|
|
|
|
|
KeyTable refile:/etc/opendkim/KeyTable
|
|
|
|
|
SigningTable refile:/etc/opendkim/SigningTable
|
|
|
|
|
ExternalIgnoreList refile:/etc/opendkim/TrustedHosts
|
|
|
|
|
InternalHosts refile:/etc/opendkim/TrustedHosts
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
writeToFile = open(openDKIMConfigurePath, 'a')
|
|
|
|
|
writeToFile.write(configData)
|
|
|
|
|
writeToFile.close()
|
|
|
|
|
|
|
|
|
|
## Configure postfix specific settings
|
|
|
|
|
|
|
|
|
|
postfixFilePath = "/etc/postfix/main.cf"
|
|
|
|
|
|
|
|
|
|
configData = """
|
|
|
|
|
smtpd_milters = inet:127.0.0.1:8891
|
|
|
|
|
non_smtpd_milters = $smtpd_milters
|
|
|
|
|
milter_default_action = accept
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
writeToFile = open(postfixFilePath, 'a')
|
|
|
|
|
writeToFile.write(configData)
|
|
|
|
|
writeToFile.close()
|
|
|
|
|
|
|
|
|
|
#### Restarting Postfix and OpenDKIM
|
|
|
|
|
|
|
|
|
|
command = "systemctl start opendkim"
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-05-03 01:22:28 +05:00
|
|
|
|
|
|
|
|
command = "systemctl enable opendkim"
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-05-03 01:22:28 +05:00
|
|
|
|
|
|
|
|
##
|
|
|
|
|
|
|
|
|
|
command = "systemctl start postfix"
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-05-03 01:22:28 +05:00
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
print("1,None")
|
2018-05-03 01:22:28 +05:00
|
|
|
return
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
except OSError as msg:
|
2018-05-03 01:22:28 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(str(msg) + " [configureOpenDKIM]")
|
2019-12-10 15:09:10 +05:00
|
|
|
print("0," + str(msg))
|
2018-05-03 01:22:28 +05:00
|
|
|
return
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-05-03 01:22:28 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(str(msg) + " [configureOpenDKIM]")
|
2019-12-10 15:09:10 +05:00
|
|
|
print("0," + str(msg))
|
2018-05-03 01:22:28 +05:00
|
|
|
return
|
|
|
|
|
|
2018-05-08 21:25:37 +05:00
|
|
|
@staticmethod
|
|
|
|
|
def checkHome():
|
|
|
|
|
try:
|
|
|
|
|
try:
|
2018-11-26 02:32:30 +05:00
|
|
|
FNULL = open(os.devnull, 'w')
|
|
|
|
|
|
2019-06-08 21:41:43 +00:00
|
|
|
if getpass.getuser() == 'root':
|
|
|
|
|
command = "sudo mkdir " + mailUtilities.cyberPanelHome
|
|
|
|
|
subprocess.call(shlex.split(command), stdout=FNULL)
|
2018-05-08 21:25:37 +05:00
|
|
|
|
2019-06-08 21:41:43 +00:00
|
|
|
command = "sudo chown -R cyberpanel:cyberpanel " + mailUtilities.cyberPanelHome
|
|
|
|
|
subprocess.call(shlex.split(command), stdout=FNULL)
|
|
|
|
|
else:
|
|
|
|
|
command = "sudo mkdir " + mailUtilities.cyberPanelHome
|
|
|
|
|
ProcessUtilities.executioner(command)
|
|
|
|
|
|
|
|
|
|
command = "sudo chown -R cyberpanel:cyberpanel " + mailUtilities.cyberPanelHome
|
|
|
|
|
ProcessUtilities.executioner(command)
|
2018-05-08 21:25:37 +05:00
|
|
|
except:
|
2019-02-03 13:37:14 +05:00
|
|
|
FNULL = open(os.devnull, 'w')
|
2018-05-08 21:25:37 +05:00
|
|
|
command = "sudo chown -R cyberpanel:cyberpanel " + mailUtilities.cyberPanelHome
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command), stdout=FNULL)
|
2018-05-08 21:25:37 +05:00
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-05-08 21:25:37 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(str(msg) + " [checkHome]")
|
|
|
|
|
|
2018-05-03 01:22:28 +05:00
|
|
|
@staticmethod
|
|
|
|
|
def installOpenDKIM(install, openDKIMINstall):
|
|
|
|
|
try:
|
|
|
|
|
|
2018-05-08 21:25:37 +05:00
|
|
|
mailUtilities.checkHome()
|
|
|
|
|
|
2018-05-03 01:22:28 +05:00
|
|
|
command = 'sudo yum install opendkim -y'
|
|
|
|
|
|
|
|
|
|
cmd = shlex.split(command)
|
|
|
|
|
|
|
|
|
|
with open(mailUtilities.installLogPath, 'w') as f:
|
2019-03-26 16:19:03 +05:00
|
|
|
res = subprocess.call(cmd, stdout=f)
|
2018-05-03 01:22:28 +05:00
|
|
|
|
|
|
|
|
if res == 1:
|
|
|
|
|
writeToFile = open(mailUtilities.installLogPath, 'a')
|
|
|
|
|
writeToFile.writelines("Can not be installed.[404]\n")
|
|
|
|
|
writeToFile.close()
|
2018-05-08 21:25:37 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile("[Could not Install OpenDKIM.]")
|
2018-05-03 01:22:28 +05:00
|
|
|
return 0
|
|
|
|
|
else:
|
|
|
|
|
writeToFile = open(mailUtilities.installLogPath, 'a')
|
|
|
|
|
writeToFile.writelines("OpenDKIM Installed.[200]\n")
|
|
|
|
|
writeToFile.close()
|
|
|
|
|
|
|
|
|
|
return 1
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-05-08 21:25:37 +05:00
|
|
|
writeToFile = open(mailUtilities.installLogPath, 'a')
|
|
|
|
|
writeToFile.writelines("Can not be installed.[404]\n")
|
|
|
|
|
writeToFile.close()
|
2018-05-03 01:22:28 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(str(msg) + "[installOpenDKIM]")
|
|
|
|
|
|
2018-05-24 23:37:10 +05:00
|
|
|
@staticmethod
|
|
|
|
|
def restartServices():
|
|
|
|
|
try:
|
|
|
|
|
command = 'systemctl restart postfix'
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-05-24 23:37:10 +05:00
|
|
|
|
|
|
|
|
command = 'systemctl restart dovecot'
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-05-24 23:37:10 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(str(msg) + " [restartServices]")
|
|
|
|
|
|
2018-06-25 05:45:38 +05:00
|
|
|
@staticmethod
|
|
|
|
|
def installSpamAssassin(install, SpamAssassin):
|
|
|
|
|
try:
|
|
|
|
|
|
2018-11-12 18:39:04 +05:00
|
|
|
if ProcessUtilities.decideDistro() == ProcessUtilities.centos:
|
|
|
|
|
command = 'sudo yum install spamassassin -y'
|
|
|
|
|
else:
|
|
|
|
|
command = 'sudo apt-get install spamassassin spamc -y'
|
2018-06-25 05:45:38 +05:00
|
|
|
|
|
|
|
|
cmd = shlex.split(command)
|
|
|
|
|
|
|
|
|
|
with open(mailUtilities.spamassassinInstallLogPath, 'w') as f:
|
2019-03-26 16:19:03 +05:00
|
|
|
res = subprocess.call(cmd, stdout=f)
|
2018-06-25 05:45:38 +05:00
|
|
|
|
|
|
|
|
if res == 1:
|
|
|
|
|
writeToFile = open(mailUtilities.spamassassinInstallLogPath, 'a')
|
|
|
|
|
writeToFile.writelines("Can not be installed.[404]\n")
|
|
|
|
|
writeToFile.close()
|
|
|
|
|
logging.CyberCPLogFileWriter.writeToFile("[Could not Install SpamAssassin.]")
|
|
|
|
|
return 0
|
|
|
|
|
else:
|
|
|
|
|
writeToFile = open(mailUtilities.spamassassinInstallLogPath, 'a')
|
|
|
|
|
writeToFile.writelines("SpamAssassin Installed.[200]\n")
|
|
|
|
|
writeToFile.close()
|
|
|
|
|
|
|
|
|
|
return 1
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-06-25 05:45:38 +05:00
|
|
|
writeToFile = open(mailUtilities.spamassassinInstallLogPath, 'a')
|
|
|
|
|
writeToFile.writelines("Can not be installed.[404]\n")
|
|
|
|
|
writeToFile.close()
|
|
|
|
|
logging.CyberCPLogFileWriter.writeToFile(str(msg) + "[installSpamAssassin]")
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def checkIfSpamAssassinInstalled():
|
|
|
|
|
try:
|
|
|
|
|
|
|
|
|
|
path = "/etc/mail/spamassassin/local.cf"
|
|
|
|
|
|
|
|
|
|
command = "sudo cat " + path
|
2019-04-15 15:54:23 +05:00
|
|
|
output = ProcessUtilities.outputExecutioner(command)
|
2018-06-25 05:45:38 +05:00
|
|
|
|
2019-04-15 15:54:23 +05:00
|
|
|
if output.find('No such') > -1:
|
2018-06-25 05:45:38 +05:00
|
|
|
return 0
|
|
|
|
|
else:
|
|
|
|
|
return 1
|
|
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-06-25 05:45:38 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(
|
|
|
|
|
str(msg) + " [checkIfSpamAssassinInstalled]")
|
|
|
|
|
return 0
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def configureSpamAssassin():
|
|
|
|
|
try:
|
|
|
|
|
|
2019-01-12 17:52:45 +05:00
|
|
|
if ProcessUtilities.decideDistro() == ProcessUtilities.ubuntu:
|
|
|
|
|
confFile = "/etc/mail/spamassassin/local.cf"
|
|
|
|
|
confData = open(confFile).readlines()
|
|
|
|
|
|
|
|
|
|
conf = open(confFile, 'w')
|
|
|
|
|
|
|
|
|
|
for items in confData:
|
|
|
|
|
if items.find('report_safe') > -1 or items.find('rewrite_header') > -1 or items.find('required_score') > -1 or items.find('required_hits') > -1:
|
|
|
|
|
conf.write(items.strip('#').strip(' '))
|
|
|
|
|
else:
|
|
|
|
|
conf.write(items)
|
|
|
|
|
|
|
|
|
|
conf.close()
|
|
|
|
|
|
|
|
|
|
|
2018-06-25 05:45:38 +05:00
|
|
|
command = "groupadd spamd"
|
2019-08-31 13:13:59 +05:00
|
|
|
ProcessUtilities.normalExecutioner(command)
|
2018-06-25 05:45:38 +05:00
|
|
|
|
|
|
|
|
command = "useradd -g spamd -s /bin/false -d /var/log/spamassassin spamd"
|
2019-08-31 13:13:59 +05:00
|
|
|
ProcessUtilities.normalExecutioner(command)
|
2018-06-25 05:45:38 +05:00
|
|
|
|
|
|
|
|
##
|
|
|
|
|
|
|
|
|
|
command = "chown spamd:spamd /var/log/spamassassin"
|
2019-08-31 13:13:59 +05:00
|
|
|
ProcessUtilities.normalExecutioner(command)
|
2018-06-25 05:45:38 +05:00
|
|
|
|
|
|
|
|
command = "systemctl enable spamassassin"
|
2019-08-31 13:13:59 +05:00
|
|
|
ProcessUtilities.normalExecutioner(command)
|
2018-06-25 05:45:38 +05:00
|
|
|
|
|
|
|
|
command = "systemctl start spamassassin"
|
2019-08-31 13:13:59 +05:00
|
|
|
ProcessUtilities.normalExecutioner(command)
|
2018-06-25 05:45:38 +05:00
|
|
|
|
|
|
|
|
## Configuration to postfix
|
|
|
|
|
|
|
|
|
|
postfixConf = '/etc/postfix/master.cf'
|
|
|
|
|
data = open(postfixConf, 'r').readlines()
|
|
|
|
|
|
|
|
|
|
writeToFile = open(postfixConf, 'w')
|
|
|
|
|
checker = 1
|
|
|
|
|
|
|
|
|
|
for items in data:
|
|
|
|
|
if items.find('smtp') > - 1 and items.find('inet') > - 1 and items.find('smtpd') > - 1 and checker == 1:
|
|
|
|
|
writeToFile.writelines(items.strip('\n') + ' -o content_filter=spamassassin\n')
|
|
|
|
|
checker = 0
|
|
|
|
|
else:
|
|
|
|
|
writeToFile.writelines(items)
|
|
|
|
|
|
|
|
|
|
writeToFile.writelines('spamassassin unix - n n - - pipe flags=R user=spamd argv=/usr/bin/spamc -e /usr/sbin/sendmail -oi -f ${sender} ${recipient}')
|
|
|
|
|
writeToFile.close()
|
|
|
|
|
|
|
|
|
|
command = 'systemctl restart postfix'
|
2019-08-31 13:13:59 +05:00
|
|
|
ProcessUtilities.normalExecutioner(command)
|
2018-06-25 05:45:38 +05:00
|
|
|
|
|
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
print("1,None")
|
2018-06-25 05:45:38 +05:00
|
|
|
return
|
|
|
|
|
|
|
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
except OSError as msg:
|
2018-06-25 05:45:38 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(str(msg) + " [configureSpamAssassin]")
|
2019-12-10 15:09:10 +05:00
|
|
|
print("0," + str(msg))
|
2018-06-25 05:45:38 +05:00
|
|
|
return
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-06-25 05:45:38 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(str(msg) + " [configureSpamAssassin]")
|
2019-12-10 15:09:10 +05:00
|
|
|
print("0," + str(msg))
|
2018-06-25 05:45:38 +05:00
|
|
|
return
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def saveSpamAssassinConfigs(tempConfigPath):
|
|
|
|
|
try:
|
|
|
|
|
|
|
|
|
|
data = open(tempConfigPath).readlines()
|
|
|
|
|
os.remove(tempConfigPath)
|
|
|
|
|
|
|
|
|
|
confFile = "/etc/mail/spamassassin/local.cf"
|
|
|
|
|
confData = open(confFile).readlines()
|
|
|
|
|
|
|
|
|
|
conf = open(confFile, 'w')
|
|
|
|
|
|
|
|
|
|
rsCheck = 0
|
|
|
|
|
|
|
|
|
|
for items in confData:
|
|
|
|
|
|
|
|
|
|
if items.find('report_safe ') > -1:
|
|
|
|
|
conf.writelines(data[0])
|
|
|
|
|
continue
|
|
|
|
|
elif items.find('required_hits ') > -1:
|
|
|
|
|
conf.writelines(data[1])
|
|
|
|
|
continue
|
|
|
|
|
elif items.find('rewrite_header ') > -1:
|
|
|
|
|
conf.writelines(data[2])
|
|
|
|
|
continue
|
|
|
|
|
elif items.find('required_score ') > -1:
|
|
|
|
|
conf.writelines(data[3])
|
|
|
|
|
rsCheck = 1
|
|
|
|
|
continue
|
|
|
|
|
|
|
|
|
|
if rsCheck == 0:
|
|
|
|
|
conf.writelines(data[3])
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
conf.close()
|
|
|
|
|
|
|
|
|
|
command = 'systemctl restart spamassassin'
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-06-25 05:45:38 +05:00
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
print("1,None")
|
2018-06-25 05:45:38 +05:00
|
|
|
return
|
|
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-06-25 05:45:38 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(
|
|
|
|
|
str(msg) + " [saveSpamAssassinConfigs]")
|
2019-12-10 15:09:10 +05:00
|
|
|
print("0," + str(msg))
|
2018-06-25 05:45:38 +05:00
|
|
|
|
2018-06-27 00:16:50 +05:00
|
|
|
@staticmethod
|
|
|
|
|
def savePolicyServerStatus(install):
|
|
|
|
|
try:
|
|
|
|
|
|
|
|
|
|
postfixPath = '/etc/postfix/main.cf'
|
|
|
|
|
|
|
|
|
|
if install == '1':
|
|
|
|
|
if not os.path.exists('/etc/systemd/system/cpecs.service'):
|
|
|
|
|
shutil.copy("/usr/local/CyberCP/postfixSenderPolicy/cpecs.service", "/etc/systemd/system/cpecs.service")
|
|
|
|
|
|
2018-10-12 18:18:10 +05:00
|
|
|
command = 'systemctl enable cpecs'
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-10-12 18:18:10 +05:00
|
|
|
|
2018-06-27 00:16:50 +05:00
|
|
|
command = 'systemctl start cpecs'
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-06-27 00:16:50 +05:00
|
|
|
|
|
|
|
|
writeToFile = open(postfixPath, 'a')
|
2018-07-13 04:26:40 +05:00
|
|
|
writeToFile.writelines('smtpd_data_restrictions = check_policy_service unix:/var/log/policyServerSocket\n')
|
2018-10-13 18:31:47 +05:00
|
|
|
writeToFile.writelines('smtpd_policy_service_default_action = DUNNO\n')
|
2018-06-27 00:16:50 +05:00
|
|
|
writeToFile.close()
|
|
|
|
|
|
|
|
|
|
command = 'systemctl restart postfix'
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-06-27 00:16:50 +05:00
|
|
|
else:
|
|
|
|
|
|
|
|
|
|
data = open(postfixPath, 'r').readlines()
|
|
|
|
|
writeToFile = open(postfixPath, 'w')
|
|
|
|
|
|
|
|
|
|
for items in data:
|
2018-07-13 04:26:40 +05:00
|
|
|
if items.find('check_policy_service unix:/var/log/policyServerSocket') > -1:
|
2018-06-27 00:16:50 +05:00
|
|
|
continue
|
2018-10-13 18:31:47 +05:00
|
|
|
elif items.find('smtpd_policy_service_default_action = DUNNO') > -1:
|
|
|
|
|
continue
|
2018-06-27 00:16:50 +05:00
|
|
|
else:
|
|
|
|
|
writeToFile.writelines(items)
|
|
|
|
|
|
|
|
|
|
writeToFile.close()
|
|
|
|
|
|
|
|
|
|
command = 'systemctl stop cpecs'
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-06-27 00:16:50 +05:00
|
|
|
|
|
|
|
|
command = 'systemctl restart postfix'
|
2019-03-26 16:19:03 +05:00
|
|
|
subprocess.call(shlex.split(command))
|
2018-06-27 00:16:50 +05:00
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
print("1,None")
|
2018-06-27 00:16:50 +05:00
|
|
|
return
|
|
|
|
|
|
2019-12-10 15:09:10 +05:00
|
|
|
except BaseException as msg:
|
2018-06-27 00:16:50 +05:00
|
|
|
logging.CyberCPLogFileWriter.writeToFile(
|
|
|
|
|
str(msg) + " [savePolicyServerStatus]")
|
2019-12-10 15:09:10 +05:00
|
|
|
print("0," + str(msg))
|
2018-06-27 00:16:50 +05:00
|
|
|
|
2018-05-01 00:49:47 +05:00
|
|
|
|
2017-12-09 22:30:10 +05:00
|
|
|
def main():
|
|
|
|
|
|
|
|
|
|
parser = argparse.ArgumentParser(description='CyberPanel Installer')
|
|
|
|
|
parser.add_argument('function', help='Specific a function to call!')
|
|
|
|
|
parser.add_argument('--domain', help='Domain name!')
|
2018-06-05 00:53:45 +05:00
|
|
|
parser.add_argument('--userName', help='Email Username!')
|
|
|
|
|
parser.add_argument('--password', help='Email password!')
|
2018-06-25 05:45:38 +05:00
|
|
|
parser.add_argument('--tempConfigPath', help='Temporary Configuration Path!')
|
2018-06-27 00:16:50 +05:00
|
|
|
parser.add_argument('--install', help='Enable/Disable Policy Server!')
|
2018-06-05 00:53:45 +05:00
|
|
|
|
2017-12-09 22:30:10 +05:00
|
|
|
|
|
|
|
|
|
|
|
|
|
args = parser.parse_args()
|
|
|
|
|
|
|
|
|
|
if args.function == "createEmailAccount":
|
2018-06-05 00:53:45 +05:00
|
|
|
mailUtilities.createEmailAccount(args.domain, args.userName, args.password)
|
2018-05-03 01:22:28 +05:00
|
|
|
elif args.function == "generateKeys":
|
|
|
|
|
mailUtilities.generateKeys(args.domain)
|
|
|
|
|
elif args.function == "configureOpenDKIM":
|
|
|
|
|
mailUtilities.configureOpenDKIM()
|
2018-06-25 05:45:38 +05:00
|
|
|
elif args.function == "configureSpamAssassin":
|
|
|
|
|
mailUtilities.configureSpamAssassin()
|
|
|
|
|
elif args.function == "saveSpamAssassinConfigs":
|
|
|
|
|
mailUtilities.saveSpamAssassinConfigs(args.tempConfigPath)
|
2018-06-27 00:16:50 +05:00
|
|
|
elif args.function == 'savePolicyServerStatus':
|
|
|
|
|
mailUtilities.savePolicyServerStatus(args.install)
|
2019-04-15 15:54:23 +05:00
|
|
|
elif args.function == 'installSpamAssassin':
|
|
|
|
|
mailUtilities.installSpamAssassin("install", "SpamAssassin")
|
2019-07-16 23:23:16 +05:00
|
|
|
elif args.function == 'AfterEffects':
|
|
|
|
|
mailUtilities.AfterEffects(args.domain)
|
2017-12-09 22:30:10 +05:00
|
|
|
|
|
|
|
|
if __name__ == "__main__":
|
|
|
|
|
main()
|