404

[ Avaa Bypassed ]




Upload:

Command:

elspacio@3.23.103.14: ~ $
#!/opt/cloudlinux/venv/bin/python3 -bb
# -*- coding: utf-8 -*-

# Copyright © Cloud Linux GmbH & Cloud Linux Software, Inc 2010-2018 All Rights Reserved
#
# Licensed under CLOUD LINUX LICENSE AGREEMENT
# http://cloudlinux.com/docs/LICENSE.TXT

"""
CloudLinux control panel API command line interface
"""

import argparse
from clcommon import cpapi
from clcommon.cloutput import prepare_data_json, prepare_attention_json
from clcommon.cpapi import cpapiexceptions


def cpapi_parser():

    parser = argparse.ArgumentParser(description="%(prog)s - CloudLinux control panel API command line interface")
    parser.add_argument('-j', '--json', action='store_true', default=False, help='Output in json format')
    subparsers = parser.add_subparsers(dest='command')

    docroot_parser = subparsers.add_parser('docroot')
    docroot_parser.add_argument('domain', help='Return document root for domain')

    userdomains_parser = subparsers.add_parser('userdomains')
    userdomains_parser.add_argument('userdomains', help='Return domain and document root pairs for control panel user')

    dblogin_cplogin_pairs_parser = subparsers.add_parser("dblogin_cplogin_pairs")
    dblogin_cplogin_pairs_parser.add_argument("--cplogin_lst", nargs="*",
                                  help="Return mapping for this system users")
    dblogin_cplogin_pairs_parser.add_argument("--with_system_users", action="store_true", default=False,
                                  help="Show system users in output")
    reseller_users = subparsers.add_parser("reseller-users",
                                  help="Show reseller users")
    reseller_users.add_argument(
        'resellername', type=str, nargs='?',
        help='Reseller name')
    return parser


def flat_plain(data, sep=' '):
    return '\n'.join([sep.join(tuple_) for tuple_ in data])


def main():
    parser = cpapi_parser()
    namespace = parser.parse_args()
    output_ = None
    exit_code = 0
    try:
        if namespace.command == 'docroot':
            domain, user = cpapi.docroot(namespace.domain)
            if namespace.json:
                output_ = prepare_data_json({'domain': domain, 'user': user})
            else:
                output_ = domain + ' ' + user
        elif namespace.command == 'userdomains':
            domain_docroot_pairs = cpapi.userdomains(namespace.userdomains)
            if namespace.json:
                data = [{'domain': domain_docroot[0],
                         'docroot': domain_docroot[1]}
                        for domain_docroot in domain_docroot_pairs]
                output_ = prepare_data_json(data)
            else:
                output_ = flat_plain(domain_docroot_pairs)
        elif namespace.command == 'dblogin_cplogin_pairs':
            db_mapping = cpapi.dblogin_cplogin_pairs(namespace.cplogin_lst,
                                                     namespace.with_system_users)
            if namespace.json:
                output_ = prepare_data_json(db_mapping)
            else:
                output_ = flat_plain(db_mapping)
        elif namespace.command == 'reseller-users':
            users = cpapi.reseller_users(namespace.resellername)
            if namespace.json:
                output_ = prepare_data_json(users)
            else:
                output_ = '\n'.join(users)

    except cpapiexceptions.CPAPIException as e_:
        if namespace.json:
            output_ = prepare_attention_json(str(e_))
        else:
            exit_code = 1
            output_ = 'ERROR: ' + str(e_)
    return output_, exit_code


if __name__ == '__main__':
    import sys
    output_, exit_code = main()
    if output_:
        print(output_)
    if exit_code:
        sys.exit(exit_code)

Filemanager

Name Type Size Permission Actions
Activate.ps1 File 8.82 KB 0644
activate File 1.65 KB 0644
activate.csh File 913 B 0644
activate.fish File 2.14 KB 0644
alembic File 229 B 0755
chardetect File 237 B 0755
cl_sysctl File 4.51 KB 0755
clcpapi File 3.64 KB 0755
coverage File 231 B 0755
coverage-3.11 File 231 B 0755
coverage3 File 231 B 0755
cpanel-dbmapping File 3.83 KB 0755
da_suid_caller.py File 686 B 0644
detect-requirements File 238 B 0755
dodgy File 224 B 0755
epylint File 235 B 0755
f2py File 232 B 0755
f2py3 File 232 B 0755
f2py3.11 File 232 B 0755
flake8 File 230 B 0755
futurize File 231 B 0755
get_gprof File 1.84 KB 0755
get_objgraph File 1.63 KB 0755
isort File 225 B 0755
isort-identify-imports File 259 B 0755
jsonschema File 229 B 0755
lvestats_config_reader.py File 1.12 KB 0644
mako-render File 229 B 0755
normalizer File 260 B 0755
pasteurize File 233 B 0755
pip File 237 B 0755
pip3 File 237 B 0755
pip3.11 File 237 B 0755
plesk_suid_caller.py File 905 B 0644
prospector File 229 B 0755
py.test File 237 B 0755
pycodestyle File 228 B 0755
pydocstyle File 229 B 0755
pyflakes File 227 B 0755
pylint File 233 B 0755
pylint-config File 249 B 0755
pyreverse File 239 B 0755
pysemver File 225 B 0755
pytest File 237 B 0755
python File 15.59 KB 0755
python3 File 15.59 KB 0755
python3.11 File 15.59 KB 0755
raven File 235 B 0755
symilar File 235 B 0755
tap File 223 B 0755
tappy File 223 B 0755
undill File 603 B 0755
virtualenv File 254 B 0755