server.py 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405
  1. from flask import Flask
  2. from flask_restful import Resource, Api
  3. from flask import jsonify
  4. from flask import Response
  5. from flask import request
  6. from threading import Thread
  7. from OpenSSL import crypto
  8. import docker
  9. import uuid
  10. import signal
  11. import time
  12. import os
  13. import re
  14. import sys
  15. import ssl
  16. import socket
  17. docker_client = docker.DockerClient(base_url='unix://var/run/docker.sock', version='auto')
  18. app = Flask(__name__)
  19. api = Api(app)
  20. class containers_get(Resource):
  21. def get(self):
  22. containers = {}
  23. try:
  24. for container in docker_client.containers.list(all=True):
  25. containers.update({container.attrs['Id']: container.attrs})
  26. return containers
  27. except Exception as e:
  28. return jsonify(type='danger', msg=str(e))
  29. class container_get(Resource):
  30. def get(self, container_id):
  31. if container_id and container_id.isalnum():
  32. try:
  33. for container in docker_client.containers.list(all=True, filters={"id": container_id}):
  34. return container.attrs
  35. except Exception as e:
  36. return jsonify(type='danger', msg=str(e))
  37. else:
  38. return jsonify(type='danger', msg='no or invalid id defined')
  39. class container_post(Resource):
  40. def post(self, container_id, post_action):
  41. if container_id and container_id.isalnum() and post_action:
  42. if post_action == 'stop':
  43. try:
  44. for container in docker_client.containers.list(all=True, filters={"id": container_id}):
  45. container.stop()
  46. return jsonify(type='success', msg='command completed successfully')
  47. except Exception as e:
  48. return jsonify(type='danger', msg=str(e))
  49. elif post_action == 'start':
  50. try:
  51. for container in docker_client.containers.list(all=True, filters={"id": container_id}):
  52. container.start()
  53. return jsonify(type='success', msg='command completed successfully')
  54. except Exception as e:
  55. return jsonify(type='danger', msg=str(e))
  56. elif post_action == 'restart':
  57. try:
  58. for container in docker_client.containers.list(all=True, filters={"id": container_id}):
  59. container.restart()
  60. return jsonify(type='success', msg='command completed successfully')
  61. except Exception as e:
  62. return jsonify(type='danger', msg=str(e))
  63. elif post_action == 'exec':
  64. if not request.json or not 'cmd' in request.json:
  65. return jsonify(type='danger', msg='cmd is missing')
  66. if request.json['cmd'] == 'mailq':
  67. if 'items' in request.json:
  68. # Check if queue id is valid
  69. r = re.compile("^[0-9a-fA-F]+$")
  70. filtered_qids = filter(r.match, request.json['items'])
  71. if filtered_qids:
  72. if request.json['task'] == 'delete':
  73. flagged_qids = ['-d %s' % i for i in filtered_qids]
  74. sanitized_string = str(' '.join(flagged_qids));
  75. try:
  76. for container in docker_client.containers.list(filters={"id": container_id}):
  77. postsuper_r = container.exec_run(["/bin/bash", "-c", "/usr/sbin/postsuper " + sanitized_string])
  78. if postsuper_r.exit_code == 0:
  79. return jsonify(type='success', msg='command completed successfully')
  80. else:
  81. return jsonify(type='danger', msg=str(postsuper_r.output))
  82. except Exception as e:
  83. return jsonify(type='danger', msg=str(e))
  84. if request.json['task'] == 'hold':
  85. flagged_qids = ['-h %s' % i for i in filtered_qids]
  86. sanitized_string = str(' '.join(flagged_qids));
  87. try:
  88. for container in docker_client.containers.list(filters={"id": container_id}):
  89. postsuper_r = container.exec_run(["/bin/bash", "-c", "/usr/sbin/postsuper " + sanitized_string])
  90. if postsuper_r.exit_code == 0:
  91. return jsonify(type='success', msg='command completed successfully')
  92. else:
  93. return jsonify(type='danger', msg=str(postsuper_r.output))
  94. except Exception as e:
  95. return jsonify(type='danger', msg=str(e))
  96. if request.json['task'] == 'unhold':
  97. flagged_qids = ['-H %s' % i for i in filtered_qids]
  98. sanitized_string = str(' '.join(flagged_qids));
  99. try:
  100. for container in docker_client.containers.list(filters={"id": container_id}):
  101. postsuper_r = container.exec_run(["/bin/bash", "-c", "/usr/sbin/postsuper " + sanitized_string])
  102. if postsuper_r.exit_code == 0:
  103. return jsonify(type='success', msg='command completed successfully')
  104. else:
  105. return jsonify(type='danger', msg=str(postsuper_r.output))
  106. except Exception as e:
  107. return jsonify(type='danger', msg=str(e))
  108. if request.json['task'] == 'deliver':
  109. flagged_qids = ['-i %s' % i for i in filtered_qids]
  110. try:
  111. for container in docker_client.containers.list(filters={"id": container_id}):
  112. for i in flagged_qids:
  113. postqueue_r = container.exec_run(["/bin/bash", "-c", "/usr/sbin/postqueue " + i], user='postfix')
  114. # todo: check each exit code
  115. return jsonify(type='success', msg=str("Scheduled immediate delivery"))
  116. except Exception as e:
  117. return jsonify(type='danger', msg=str(e))
  118. elif request.json['task'] == 'list':
  119. try:
  120. for container in docker_client.containers.list(filters={"id": container_id}):
  121. mailq_return = container.exec_run(["/usr/sbin/postqueue", "-j"], user='postfix')
  122. if mailq_return.exit_code == 0:
  123. # We want plain text content from Postfix
  124. r = Response(response=mailq_return.output, status=200, mimetype="text/plain")
  125. r.headers["Content-Type"] = "text/plain; charset=utf-8"
  126. return r
  127. except Exception as e:
  128. return jsonify(type='danger', msg=str(e))
  129. elif request.json['task'] == 'flush':
  130. try:
  131. for container in docker_client.containers.list(filters={"id": container_id}):
  132. postqueue_r = container.exec_run(["/usr/sbin/postqueue", "-f"], user='postfix')
  133. if postqueue_r.exit_code == 0:
  134. return jsonify(type='success', msg='command completed successfully')
  135. else:
  136. return jsonify(type='danger', msg=str(postqueue_r.output))
  137. except Exception as e:
  138. return jsonify(type='danger', msg=str(e))
  139. elif request.json['task'] == 'super_delete':
  140. try:
  141. for container in docker_client.containers.list(filters={"id": container_id}):
  142. postsuper_r = container.exec_run(["/usr/sbin/postsuper", "-d", "ALL"])
  143. if postsuper_r.exit_code == 0:
  144. return jsonify(type='success', msg='command completed successfully')
  145. else:
  146. return jsonify(type='danger', msg=str(postsuper_r.output))
  147. except Exception as e:
  148. return jsonify(type='danger', msg=str(e))
  149. elif request.json['cmd'] == 'system':
  150. if request.json['task'] == 'df':
  151. if 'dir' in request.json:
  152. try:
  153. for container in docker_client.containers.list(filters={"id": container_id}):
  154. # Should be changed to be able to validate a path
  155. directory = re.sub('[^0-9a-zA-Z/]+', '', request.json['dir'])
  156. df_return = container.exec_run(["/bin/bash", "-c", "/bin/df -H " + directory + " | /usr/bin/tail -n1 | /usr/bin/tr -s [:blank:] | /usr/bin/tr ' ' ','"], user='nobody')
  157. if df_return.exit_code == 0:
  158. return df_return.output.rstrip()
  159. else:
  160. return "0,0,0,0,0,0"
  161. except Exception as e:
  162. return jsonify(type='danger', msg=str(e))
  163. elif request.json['cmd'] == 'reload':
  164. if request.json['task'] == 'dovecot':
  165. try:
  166. for container in docker_client.containers.list(filters={"id": container_id}):
  167. # Should be changed to be able to validate a path
  168. reload_return = container.exec_run(["/bin/bash", "-c", "/usr/local/sbin/dovecot reload"])
  169. if reload_return.exit_code == 0:
  170. return jsonify(type='success', msg='command completed successfully')
  171. else:
  172. return jsonify(type='danger', msg='command failed: ' + reload_return.output)
  173. except Exception as e:
  174. return jsonify(type='danger', msg=str(e))
  175. if request.json['task'] == 'postfix':
  176. try:
  177. for container in docker_client.containers.list(filters={"id": container_id}):
  178. # Should be changed to be able to validate a path
  179. reload_return = container.exec_run(["/bin/bash", "-c", "/usr/sbin/postfix reload"])
  180. if reload_return.exit_code == 0:
  181. return jsonify(type='success', msg='command completed successfully')
  182. else:
  183. return jsonify(type='danger', msg='command failed: ' + reload_return.output)
  184. except Exception as e:
  185. return jsonify(type='danger', msg=str(e))
  186. if request.json['task'] == 'nginx':
  187. try:
  188. for container in docker_client.containers.list(filters={"id": container_id}):
  189. # Should be changed to be able to validate a path
  190. reload_return = container.exec_run(["/bin/sh", "-c", "/usr/sbin/nginx -s reload"])
  191. if reload_return.exit_code == 0:
  192. return jsonify(type='success', msg='command completed successfully')
  193. else:
  194. return jsonify(type='danger', msg='command failed: ' + reload_return.output)
  195. except Exception as e:
  196. return jsonify(type='danger', msg=str(e))
  197. elif request.json['cmd'] == 'sieve':
  198. if request.json['task'] == 'list':
  199. if 'username' in request.json:
  200. try:
  201. for container in docker_client.containers.list(filters={"id": container_id}):
  202. sieve_return = container.exec_run(["/bin/bash", "-c", "/usr/local/bin/doveadm sieve list -u '" + request.json['username'].replace("'", "'\\''") + "'"])
  203. r = Response(response=sieve_return.output, status=200, mimetype="text/plain")
  204. r.headers["Content-Type"] = "text/plain; charset=utf-8"
  205. return r
  206. except Exception as e:
  207. return jsonify(type='danger', msg=str(e))
  208. elif request.json['task'] == 'print':
  209. if 'username' in request.json and 'script_name' in request.json:
  210. try:
  211. for container in docker_client.containers.list(filters={"id": container_id}):
  212. sieve_return = container.exec_run(["/bin/bash", "-c", "/usr/local/bin/doveadm sieve get -u '" + request.json['username'].replace("'", "'\\''") + "' '" + request.json['script_name'].replace("'", "'\\''") + "'"])
  213. r = Response(response=sieve_return.output, status=200, mimetype="text/plain")
  214. r.headers["Content-Type"] = "text/plain; charset=utf-8"
  215. return r
  216. except Exception as e:
  217. return jsonify(type='danger', msg=str(e))
  218. # elif request.json['cmd'] == 'mail_crypt_generate' and request.json['username'] and request.json['old_password'] and request.json['new_password']:
  219. # try:
  220. # for container in docker_client.containers.list(filters={"id": container_id}):
  221. # # create if missing
  222. # crypto_generate = container.exec_run(["/bin/bash", "-c", "/usr/local/bin/doveadm mailbox cryptokey generate -u '" + request.json['username'].replace("'", "'\\''") + "' -URf"], user='vmail')
  223. # if crypto_generate.exit_code == 0:
  224. # # open a shell, bind stdin and return socket
  225. # cryptokey_shell = container.exec_run(["/bin/bash"], stdin=True, socket=True, user='vmail')
  226. # # command to be piped to shell
  227. # cryptokey_cmd = "/usr/local/bin/doveadm mailbox cryptokey password -u '" + request.json['username'].replace("'", "'\\''") + "' -n '" + request.json['new_password'].replace("'", "'\\''") + "' -o '" + request.json['old_password'].replace("'", "'\\''") + "'\n"
  228. # # socket is .output
  229. # cryptokey_socket = cryptokey_shell.output;
  230. # try :
  231. # # send command utf-8 encoded
  232. # cryptokey_socket.sendall(cryptokey_cmd.encode('utf-8'))
  233. # # we won't send more data than this
  234. # cryptokey_socket.shutdown(socket.SHUT_WR)
  235. # except socket.error:
  236. # # exit on socket error
  237. # return jsonify(type='danger', msg=str('socket error'))
  238. # # read response
  239. # cryptokey_response = recv_socket_data(cryptokey_socket)
  240. # crypto_error = re.search('dcrypt_key_load_private.+failed.+error', cryptokey_response)
  241. # if crypto_error is not None:
  242. # return jsonify(type='danger', msg=str("dcrypt_key_load_private error"))
  243. # return jsonify(type='success', msg=str("key pair generated"))
  244. # else:
  245. # return jsonify(type='danger', msg=str(crypto_generate.output))
  246. # except Exception as e:
  247. # return jsonify(type='danger', msg=str(e))
  248. elif request.json['cmd'] == 'maildir':
  249. if request.json['task'] == 'cleanup':
  250. if 'maildir' in request.json:
  251. try:
  252. for container in docker_client.containers.list(filters={"id": container_id}):
  253. sane_name = re.sub(r'\W+', '', request.json['maildir'])
  254. maildir_cleanup = container.exec_run(["/bin/bash", "-c", "if [[ -d '/var/vmail/" + request.json['maildir'].replace("'", "'\\''") + "' ]]; then /bin/mv '/var/vmail/" + request.json['maildir'].replace("'", "'\\''") + "' '/var/vmail/_garbage/" + str(int(time.time())) + "_" + sane_name + "'; fi"], user='vmail')
  255. if maildir_cleanup.exit_code == 0:
  256. return jsonify(type='success', msg=str("moved to garbage"))
  257. else:
  258. return jsonify(type='danger', msg=str(maildir_cleanup.output))
  259. except Exception as e:
  260. return jsonify(type='danger', msg=str(e))
  261. elif request.json['cmd'] == 'rspamd':
  262. if request.json['task'] == 'worker_password':
  263. if 'raw' in request.json:
  264. try:
  265. for container in docker_client.containers.list(filters={"id": container_id}):
  266. worker_shell = container.exec_run(["/bin/bash"], stdin=True, socket=True, user='_rspamd')
  267. worker_cmd = "/usr/bin/rspamadm pw -e -p '" + request.json['raw'].replace("'", "'\\''") + "' 2> /dev/null\n"
  268. worker_socket = worker_shell.output;
  269. try :
  270. worker_socket.sendall(worker_cmd.encode('utf-8'))
  271. worker_socket.shutdown(socket.SHUT_WR)
  272. except socket.error:
  273. return jsonify(type='danger', msg=str('socket error'))
  274. worker_response = recv_socket_data(worker_socket)
  275. matched = False
  276. for line in worker_response.split("\n"):
  277. if '$2$' in line:
  278. matched = True
  279. hash = line.strip()
  280. hash_out = re.search('\$2\$.+$', hash).group(0)
  281. f = open("/access.inc", "w")
  282. f.write('enable_password = "' + re.sub('[^0-9a-zA-Z\$]+', '', hash_out.rstrip()) + '";\n')
  283. f.close()
  284. container.restart()
  285. if matched:
  286. return jsonify(type='success', msg='command completed successfully')
  287. else:
  288. return jsonify(type='danger', msg='command did not complete')
  289. except Exception as e:
  290. return jsonify(type='danger', msg=str(e))
  291. # elif request.json['cmd'] == 'mailman':
  292. # if request.json['task'] == 'password':
  293. # if request.json['email'] and request.json['passwd']:
  294. # try:
  295. # for container in docker_client.containers.list(filters={"id": container_id}):
  296. # add_su = container.exec_run(["/bin/bash", "-c", "/opt/mm_web/add_su.py '" + request.json['passwd'].replace("'", "'\\''") + "' '" + request.json['email'].replace("'", "'\\''") + "'"], user='mailman')
  297. # if add_su.exit_code == 0:
  298. # return jsonify(type='success', msg='command completed successfully')
  299. # else:
  300. # return jsonify(type='danger', msg='command did not complete, exit code was ' + int(add_su.exit_code))
  301. # except Exception as e:
  302. # return jsonify(type='danger', msg=str(e))
  303. else:
  304. return jsonify(type='danger', msg='Unknown command')
  305. else:
  306. return jsonify(type='danger', msg='invalid action')
  307. else:
  308. return jsonify(type='danger', msg='invalid container id or missing action')
  309. class GracefulKiller:
  310. kill_now = False
  311. def __init__(self):
  312. signal.signal(signal.SIGINT, self.exit_gracefully)
  313. signal.signal(signal.SIGTERM, self.exit_gracefully)
  314. def exit_gracefully(self, signum, frame):
  315. self.kill_now = True
  316. def startFlaskAPI():
  317. create_self_signed_cert()
  318. try:
  319. ctx = ssl.create_default_context(ssl.Purpose.CLIENT_AUTH)
  320. ctx.check_hostname = False
  321. ctx.load_cert_chain(certfile='/cert.pem', keyfile='/key.pem')
  322. except:
  323. print "Cannot initialize TLS, retrying in 5s..."
  324. time.sleep(5)
  325. app.run(debug=False, host='0.0.0.0', port=443, threaded=True, ssl_context=ctx)
  326. def recv_socket_data(c_socket, timeout=10):
  327. c_socket.setblocking(0)
  328. total_data=[];
  329. data='';
  330. begin=time.time()
  331. while True:
  332. if total_data and time.time()-begin > timeout:
  333. break
  334. elif time.time()-begin > timeout*2:
  335. break
  336. try:
  337. data = c_socket.recv(8192)
  338. if data:
  339. total_data.append(data)
  340. #change the beginning time for measurement
  341. begin=time.time()
  342. else:
  343. #sleep for sometime to indicate a gap
  344. time.sleep(0.1)
  345. break
  346. except:
  347. pass
  348. return ''.join(total_data)
  349. def create_self_signed_cert():
  350. pkey = crypto.PKey()
  351. pkey.generate_key(crypto.TYPE_RSA, 2048)
  352. cert = crypto.X509()
  353. cert.get_subject().O = "mailcow"
  354. cert.get_subject().CN = "dockerapi"
  355. cert.set_serial_number(int(uuid.uuid4()))
  356. cert.gmtime_adj_notBefore(0)
  357. cert.gmtime_adj_notAfter(10*365*24*60*60)
  358. cert.set_issuer(cert.get_subject())
  359. cert.set_pubkey(pkey)
  360. cert.sign(pkey, 'sha512')
  361. cert = crypto.dump_certificate(crypto.FILETYPE_PEM, cert)
  362. pkey = crypto.dump_privatekey(crypto.FILETYPE_PEM, pkey)
  363. with os.fdopen(os.open('/cert.pem', os.O_WRONLY | os.O_CREAT, 0o644), 'w') as handle:
  364. handle.write(cert)
  365. with os.fdopen(os.open('/key.pem', os.O_WRONLY | os.O_CREAT, 0o600), 'w') as handle:
  366. handle.write(pkey)
  367. api.add_resource(containers_get, '/containers/json')
  368. api.add_resource(container_get, '/containers/<string:container_id>/json')
  369. api.add_resource(container_post, '/containers/<string:container_id>/<string:post_action>')
  370. if __name__ == '__main__':
  371. api_thread = Thread(target=startFlaskAPI)
  372. api_thread.daemon = True
  373. api_thread.start()
  374. killer = GracefulKiller()
  375. while True:
  376. time.sleep(1)
  377. if killer.kill_now:
  378. break
  379. print "Stopping dockerapi-mailcow"