2020-07-13 12:35:56 +02:00
|
|
|
#!/usr/bin/python3
|
|
|
|
|
|
|
|
import sys
|
|
|
|
import locale
|
|
|
|
import requests
|
|
|
|
import json
|
|
|
|
import math
|
|
|
|
import time
|
|
|
|
import datetime, time
|
2020-07-14 15:35:59 +02:00
|
|
|
import subprocess
|
2020-07-13 12:35:56 +02:00
|
|
|
import codecs, grpc, os
|
|
|
|
from pathlib import Path
|
|
|
|
import toml
|
|
|
|
from blitzpy import RaspiBlitzConfig
|
|
|
|
|
|
|
|
####### SCRIPT INFO #########
|
|
|
|
|
|
|
|
# - this subscription does not require any payments
|
|
|
|
# - the recurring part is managed by the lets encrypt ACME script
|
|
|
|
|
|
|
|
# display config script info
|
|
|
|
if len(sys.argv) <= 1 or sys.argv[1] == "-h" or sys.argv[1] == "help":
|
|
|
|
print("# manage letsencrypt HTTPS certificates for raspiblitz")
|
|
|
|
print("# blitz.subscriptions.letsencrypt.py create-ssh-dialog")
|
|
|
|
print("# blitz.subscriptions.ip2tor.py subscriptions-list")
|
2020-07-14 18:20:04 +02:00
|
|
|
print("# blitz.subscriptions.ip2tor.py subscription-new dyndns|ip duckdns|freedns id token ip|tor|ip&tor")
|
2020-07-13 13:12:06 +02:00
|
|
|
print("# blitz.subscriptions.ip2tor.py subscription-detail id")
|
2020-07-14 19:07:06 +02:00
|
|
|
print("# blitz.subscriptions.ip2tor.py domain-by-ip ip")
|
2020-07-13 12:35:56 +02:00
|
|
|
print("# blitz.subscriptions.ip2tor.py subscription-cancel id")
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
####### BASIC SETTINGS #########
|
|
|
|
|
|
|
|
SUBSCRIPTIONS_FILE="/mnt/hdd/app-data/subscriptions/subscriptions.toml"
|
|
|
|
|
|
|
|
cfg = RaspiBlitzConfig()
|
|
|
|
cfg.reload()
|
|
|
|
|
|
|
|
# todo: make sure that also ACME script uses TOR if activated
|
|
|
|
session = requests.session()
|
|
|
|
if cfg.run_behind_tor:
|
|
|
|
session.proxies = {'http': 'socks5h://127.0.0.1:9050', 'https': 'socks5h://127.0.0.1:9050'}
|
|
|
|
|
|
|
|
####### HELPER CLASSES #########
|
|
|
|
|
|
|
|
class BlitzError(Exception):
|
|
|
|
def __init__(self, errorShort, errorLong="", errorException=None):
|
|
|
|
self.errorShort = str(errorShort)
|
|
|
|
self.errorLong = str(errorLong)
|
|
|
|
self.errorException = errorException
|
|
|
|
|
|
|
|
####### HELPER FUNCTIONS #########
|
|
|
|
|
|
|
|
def eprint(*args, **kwargs):
|
|
|
|
print(*args, file=sys.stderr, **kwargs)
|
|
|
|
|
|
|
|
def handleException(e):
|
|
|
|
if isinstance(e, BlitzError):
|
|
|
|
eprint(e.errorLong)
|
|
|
|
eprint(e.errorException)
|
|
|
|
print("error='{0}'".format(e.errorShort))
|
|
|
|
else:
|
|
|
|
eprint(e)
|
|
|
|
print("error='{0}'".format(str(e)))
|
|
|
|
sys.exit(1)
|
|
|
|
|
|
|
|
def getsubdomain(fulldomainstring):
|
|
|
|
return fulldomainstring.split('.')[0]
|
|
|
|
|
|
|
|
####### API Calls to DNS Servcies #########
|
|
|
|
|
2020-07-14 16:22:55 +02:00
|
|
|
def duckDNSupdate(domain, token, ip):
|
2020-07-13 12:35:56 +02:00
|
|
|
|
2020-07-14 17:58:35 +02:00
|
|
|
print("# duckDNS update IP API call for {0}".format(domain))
|
2020-07-13 12:35:56 +02:00
|
|
|
|
|
|
|
# make HTTP request
|
|
|
|
try:
|
|
|
|
url="https://www.duckdns.org/update?domains={0}&token={1}&ip={2}".format(getsubdomain(domain), token, ip)
|
|
|
|
response = session.get(url)
|
|
|
|
except Exception as e:
|
|
|
|
raise BlitzError("failed HTTP request",url,e)
|
|
|
|
if response.status_code != 200:
|
2020-07-13 13:12:06 +02:00
|
|
|
raise BlitzError("failed HTTP code",response.status_code)
|
2020-07-13 12:35:56 +02:00
|
|
|
|
|
|
|
return response.content
|
|
|
|
|
|
|
|
####### PROCESS FUNCTIONS #########
|
|
|
|
|
2020-07-14 16:18:16 +02:00
|
|
|
def subscriptionsNew(ip, dnsservice, id, token, target):
|
2020-07-13 12:35:56 +02:00
|
|
|
|
2020-07-14 17:44:32 +02:00
|
|
|
# id needs to the full domain name
|
|
|
|
if id.find(".") == -1:
|
|
|
|
raise BlitzError("not a fully qualified domainname", dnsservice_id)
|
|
|
|
|
2020-07-13 13:12:06 +02:00
|
|
|
# check if id already exists
|
|
|
|
if len(getSubscription(id)) > 0:
|
|
|
|
raise BlitzError("id already exists", id)
|
|
|
|
|
2020-07-14 00:43:15 +02:00
|
|
|
# make sure lets encrypt client is installed
|
|
|
|
os.system("/home/admin/config.scripts/bonus.letsencrypt.sh on")
|
2020-07-14 00:07:28 +02:00
|
|
|
|
2020-07-13 16:24:31 +02:00
|
|
|
# dyndns
|
|
|
|
realip=ip
|
|
|
|
if ip == "dyndns":
|
2020-07-14 16:18:16 +02:00
|
|
|
# TODO: activate DynDNS (set in raspiBlitz Config the update url)
|
2020-07-13 16:24:31 +02:00
|
|
|
realip=cfg.public_ip
|
2020-07-13 12:35:56 +02:00
|
|
|
|
2020-07-13 16:24:31 +02:00
|
|
|
# update DNS with actual IP
|
|
|
|
if dnsservice == "duckdns":
|
|
|
|
duckDNSupdate(getsubdomain(id), token, realip)
|
2020-07-13 16:18:22 +02:00
|
|
|
|
2020-07-14 16:18:16 +02:00
|
|
|
# run the ACME script
|
2020-07-14 18:17:14 +02:00
|
|
|
print("# Running letsencrypt ACME script ...")
|
2020-07-14 17:58:35 +02:00
|
|
|
acmeResult=subprocess.Popen(["/home/admin/config.scripts/bonus.letsencrypt.sh", "issue-cert", dnsservice, id, token, target], stdout=subprocess.PIPE, stderr = subprocess.STDOUT, encoding='utf8')
|
2020-07-14 17:53:13 +02:00
|
|
|
out, err = acmeResult.communicate()
|
|
|
|
if out.find("error=") > -1:
|
|
|
|
time.sleep(6)
|
|
|
|
raise BlitzError("letsancrypt acme failed", out)
|
2020-07-13 12:35:56 +02:00
|
|
|
|
|
|
|
# create subscription data for storage
|
|
|
|
subscription = {}
|
|
|
|
subscription['type'] = "letsencrypt-v1"
|
|
|
|
subscription['id'] = id
|
|
|
|
subscription['active'] = True
|
|
|
|
subscription['name'] = "{0} for {1}".format(dnsservice, id)
|
|
|
|
subscription['dnsservice_type'] = dnsservice
|
|
|
|
subscription['dnsservice_token'] = token
|
|
|
|
subscription['ip'] = ip
|
2020-07-14 17:22:40 +02:00
|
|
|
subscription['target'] = target
|
2020-07-14 16:18:16 +02:00
|
|
|
subscription['description'] = "For {0}".format(target)
|
2020-07-13 12:35:56 +02:00
|
|
|
subscription['time_created'] = str(datetime.datetime.now().strftime("%Y-%m-%d %H:%M"))
|
|
|
|
subscription['warning'] = ""
|
|
|
|
|
|
|
|
# load, add and store subscriptions
|
|
|
|
try:
|
|
|
|
os.system("sudo chown admin:admin {0}".format(SUBSCRIPTIONS_FILE))
|
|
|
|
if Path(SUBSCRIPTIONS_FILE).is_file():
|
|
|
|
print("# load toml file")
|
|
|
|
subscriptions = toml.load(SUBSCRIPTIONS_FILE)
|
|
|
|
else:
|
|
|
|
print("# new toml file")
|
|
|
|
subscriptions = {}
|
2020-07-13 12:58:35 +02:00
|
|
|
if "subscriptions_letsencrypt" not in subscriptions:
|
2020-07-13 12:35:56 +02:00
|
|
|
subscriptions['subscriptions_letsencrypt'] = []
|
|
|
|
subscriptions['subscriptions_letsencrypt'].append(subscription)
|
|
|
|
with open(SUBSCRIPTIONS_FILE, 'w') as writer:
|
|
|
|
writer.write(toml.dumps(subscriptions))
|
|
|
|
writer.close()
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
eprint(e)
|
|
|
|
raise BlitzError("fail on subscription storage",subscription, e)
|
|
|
|
|
2020-07-13 12:58:35 +02:00
|
|
|
print("# OK - LETSENCRYPT DOMAIN IS READY")
|
2020-07-13 12:35:56 +02:00
|
|
|
return subscription
|
|
|
|
|
|
|
|
def subscriptionsCancel(id):
|
|
|
|
|
|
|
|
os.system("sudo chown admin:admin {0}".format(SUBSCRIPTIONS_FILE))
|
|
|
|
subs = toml.load(SUBSCRIPTIONS_FILE)
|
|
|
|
newList = []
|
2020-07-14 17:22:40 +02:00
|
|
|
removedCert = False
|
2020-07-13 12:35:56 +02:00
|
|
|
for idx, sub in enumerate(subs['subscriptions_letsencrypt']):
|
|
|
|
if sub['id'] != subscriptionID:
|
|
|
|
newList.append(sub)
|
2020-07-14 17:22:40 +02:00
|
|
|
else:
|
|
|
|
removedCert=sub
|
2020-07-13 12:35:56 +02:00
|
|
|
subs['subscriptions_letsencrypt'] = newList
|
|
|
|
|
2020-07-14 17:22:40 +02:00
|
|
|
# run the ACME script to remove cert
|
|
|
|
if removedCert:
|
2020-07-14 17:58:35 +02:00
|
|
|
acmeResult=subprocess.Popen(["/home/admin/config.scripts/bonus.letsencrypt.sh", "remove-cert", removedCert['id'], removedCert['target']], stdout=subprocess.PIPE, stderr = subprocess.STDOUT, encoding='utf8')
|
2020-07-14 17:49:34 +02:00
|
|
|
out, err = acmeResult.communicate()
|
2020-07-14 17:49:50 +02:00
|
|
|
if out.find("error=") > -1:
|
2020-07-14 17:22:40 +02:00
|
|
|
time.sleep(6)
|
2020-07-14 17:52:21 +02:00
|
|
|
raise BlitzError("letsancrypt acme failed", out)
|
2020-07-14 17:22:40 +02:00
|
|
|
|
2020-07-13 12:35:56 +02:00
|
|
|
# persist change
|
|
|
|
with open(SUBSCRIPTIONS_FILE, 'w') as writer:
|
|
|
|
writer.write(toml.dumps(subs))
|
|
|
|
writer.close()
|
|
|
|
|
|
|
|
print(json.dumps(subs, indent=2))
|
|
|
|
|
|
|
|
# todo: deinstall letsencrypt if this was last subscription
|
|
|
|
|
2020-07-13 13:12:06 +02:00
|
|
|
def getSubscription(subscriptionID):
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
|
|
|
if Path(SUBSCRIPTIONS_FILE).is_file():
|
|
|
|
os.system("sudo chown admin:admin {0}".format(SUBSCRIPTIONS_FILE))
|
|
|
|
subs = toml.load(SUBSCRIPTIONS_FILE)
|
|
|
|
else:
|
|
|
|
return []
|
|
|
|
if "subscriptions_letsencrypt" not in subs:
|
|
|
|
return []
|
|
|
|
for idx, sub in enumerate(subs['subscriptions_letsencrypt']):
|
|
|
|
if sub['id'] == subscriptionID:
|
|
|
|
return sub
|
|
|
|
return []
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
return []
|
|
|
|
|
2020-07-14 19:07:06 +02:00
|
|
|
|
|
|
|
def getDomainByIP(ip):
|
|
|
|
|
2020-07-14 19:10:40 +02:00
|
|
|
# does subscriptin file exists
|
|
|
|
if Path(SUBSCRIPTIONS_FILE).is_file():
|
|
|
|
os.system("sudo chown admin:admin {0}".format(SUBSCRIPTIONS_FILE))
|
|
|
|
subs = toml.load(SUBSCRIPTIONS_FILE)
|
|
|
|
else:
|
2020-07-14 19:07:06 +02:00
|
|
|
raise BlitzError("no match")
|
2020-07-14 19:10:40 +02:00
|
|
|
# section with letsencrypt subs exists
|
|
|
|
if "subscriptions_letsencrypt" not in subs:
|
|
|
|
raise BlitzError("no match")
|
|
|
|
# go thru subscription and check of a match
|
|
|
|
for idx, sub in enumerate(subs['subscriptions_letsencrypt']):
|
|
|
|
# if IP is a direct match
|
|
|
|
if sub['ip'] == ip:
|
|
|
|
return sub['id']
|
|
|
|
# if IP is a dynamicIP - check with the publicIP from the config
|
|
|
|
if sub['ip'] == "dyndns":
|
|
|
|
if cfg.public_ip == ip:
|
|
|
|
return sub['id']
|
|
|
|
raise BlitzError("no match")
|
2020-07-14 19:07:06 +02:00
|
|
|
|
|
|
|
|
2020-07-13 12:35:56 +02:00
|
|
|
def menuMakeSubscription():
|
|
|
|
|
|
|
|
# todo ... copy parts of IP2TOR dialogs
|
|
|
|
|
|
|
|
############################
|
|
|
|
# PHASE 1: Choose DNS service
|
|
|
|
|
2020-07-13 15:53:12 +02:00
|
|
|
# ask user for which RaspiBlitz service the bridge should be used
|
|
|
|
choices = []
|
2020-07-13 15:59:05 +02:00
|
|
|
choices.append( ("DUCKDNS", "Use duckdns.org") )
|
2020-07-13 15:53:12 +02:00
|
|
|
|
|
|
|
d = Dialog(dialog="dialog",autowidgetsize=True)
|
|
|
|
d.set_background_title("LetsEncrypt Subscription")
|
|
|
|
code, tag = d.menu(
|
|
|
|
"\nChoose a free DNS service to work with:",
|
|
|
|
choices=choices, width=60, height=10, title="Select Service")
|
|
|
|
|
|
|
|
# if user chosses CANCEL
|
|
|
|
if code != d.OK:
|
|
|
|
sys.exit(0)
|
|
|
|
|
|
|
|
# get the fixed dnsservice string
|
|
|
|
dnsservice=tag.lower()
|
|
|
|
|
2020-07-13 12:35:56 +02:00
|
|
|
############################
|
|
|
|
# PHASE 2: Enter ID & API token for service
|
|
|
|
|
2020-07-13 15:53:12 +02:00
|
|
|
if dnsservice == "duckdns":
|
|
|
|
|
|
|
|
# show basic info on duck dns
|
|
|
|
Dialog(dialog="dialog",autowidgetsize=True).msgbox('''
|
2020-07-13 16:03:01 +02:00
|
|
|
If you havent already go to https://duckdns.org
|
2020-07-13 16:18:22 +02:00
|
|
|
- consider using the TOR browser
|
|
|
|
- create an account or login
|
|
|
|
- make sure you have a subdomain added
|
2020-07-13 15:53:12 +02:00
|
|
|
''',title="DuckDNS Account needed")
|
|
|
|
|
|
|
|
# enter the subdomain
|
|
|
|
code, text = d.inputbox(
|
|
|
|
"Enter yor duckDNS subdomain:",
|
|
|
|
height=10, width=40, init="",
|
|
|
|
title="DuckDNS Domain")
|
|
|
|
subdomain = text.strip()
|
|
|
|
subdomain = subdomain.split(' ')[0]
|
|
|
|
subdomain = getsubdomain(subdomain)
|
|
|
|
domain = "{0}.duckdns.org".format(subdomain)
|
|
|
|
os.system("clear")
|
|
|
|
|
|
|
|
# check for valid input
|
|
|
|
if len(subdomain) == 0:
|
|
|
|
Dialog(dialog="dialog",autowidgetsize=True).msgbox('''
|
|
|
|
This looks not like a valid subdomain.
|
|
|
|
''',title="Unvalid Input")
|
|
|
|
sys.exit(0)
|
|
|
|
|
|
|
|
# enter the token
|
|
|
|
code, text = d.inputbox(
|
2020-07-13 16:03:01 +02:00
|
|
|
"Enter the duckDNS token of your account:",
|
|
|
|
height=10, width=50, init="",
|
2020-07-13 15:53:12 +02:00
|
|
|
title="DuckDNS Token")
|
|
|
|
token = text.strip()
|
|
|
|
token = token.split(' ')[0]
|
|
|
|
|
|
|
|
# check for valid input
|
|
|
|
try:
|
|
|
|
token.index("-")
|
|
|
|
except Exception as e:
|
|
|
|
token=""
|
2020-07-13 16:18:22 +02:00
|
|
|
if len(token) < 20:
|
2020-07-13 15:53:12 +02:00
|
|
|
Dialog(dialog="dialog",autowidgetsize=True).msgbox('''
|
|
|
|
This looks not like a valid token.
|
|
|
|
''',title="Unvalid Input")
|
|
|
|
sys.exit(0)
|
|
|
|
|
|
|
|
else:
|
|
|
|
os.system("clear")
|
|
|
|
print("Not supported yet: {0}".format(dnsservice))
|
|
|
|
time.sleep(4)
|
|
|
|
sys.exit(0)
|
|
|
|
|
2020-07-13 12:35:56 +02:00
|
|
|
############################
|
|
|
|
# PHASE 3: Choose what kind of IP: dynDNS, IP2TOR, fixedIP
|
|
|
|
|
2020-07-13 15:53:12 +02:00
|
|
|
# ask user for which RaspiBlitz service the bridge should be used
|
|
|
|
choices = []
|
2020-07-13 15:59:05 +02:00
|
|
|
choices.append( ("IP2TOR", "HTTPS for a IP2TOR Bridge") )
|
|
|
|
choices.append( ("DYNDNS", "HTTPS for {0} DynamicIP DNS".format(dnsservice.upper())) )
|
|
|
|
choices.append( ("STATIC", "HTTPS for a static IP") )
|
2020-07-13 15:53:12 +02:00
|
|
|
|
|
|
|
d = Dialog(dialog="dialog",autowidgetsize=True)
|
|
|
|
d.set_background_title("LetsEncrypt Subscription")
|
|
|
|
code, tag = d.menu(
|
|
|
|
"\nChoose the kind of IP you want to use:",
|
|
|
|
choices=choices, width=60, height=10, title="Select Service")
|
|
|
|
|
|
|
|
# if user chosses CANCEL
|
2020-07-14 16:24:08 +02:00
|
|
|
os.system("clear")
|
2020-07-13 15:53:12 +02:00
|
|
|
if code != d.OK:
|
|
|
|
sys.exit(0)
|
|
|
|
|
2020-07-14 16:18:16 +02:00
|
|
|
# default target are the nginx ip ports
|
|
|
|
target="ip"
|
|
|
|
|
2020-07-13 15:53:12 +02:00
|
|
|
if tag == "IP2TOR":
|
|
|
|
|
|
|
|
# get all active IP2TOR subscriptions (just in case)
|
|
|
|
ip2torSubs=[]
|
|
|
|
if Path(SUBSCRIPTIONS_FILE).is_file():
|
|
|
|
os.system("sudo chown admin:admin {0}".format(SUBSCRIPTIONS_FILE))
|
|
|
|
subs = toml.load(SUBSCRIPTIONS_FILE)
|
|
|
|
for idx, sub in enumerate(subs['subscriptions_ip2tor']):
|
|
|
|
if sub['active']:
|
|
|
|
ip2torSubs.append(sub)
|
|
|
|
|
|
|
|
# when user has no IP2TOR subs yet
|
|
|
|
if len(ip2torSubs) == 0:
|
|
|
|
Dialog(dialog="dialog",autowidgetsize=True).msgbox('''
|
|
|
|
You have no active IP2TOR subscriptions.
|
|
|
|
Create one first and try again.
|
|
|
|
''',title="No IP2TOR available")
|
|
|
|
sys.exit(0)
|
|
|
|
|
|
|
|
# let user select a IP2TOR subscription
|
|
|
|
choices = []
|
|
|
|
for idx, sub in enumerate(ip2torSubs):
|
2020-07-13 16:03:01 +02:00
|
|
|
choices.append( ("{0}".format(idx), "IP2TOR {0} {1}:{2}".format(sub['name'], sub['ip'], sub['port'])) )
|
2020-07-13 15:53:12 +02:00
|
|
|
|
|
|
|
d = Dialog(dialog="dialog",autowidgetsize=True)
|
|
|
|
d.set_background_title("LetsEncrypt Subscription")
|
|
|
|
code, tag = d.menu(
|
|
|
|
"\nChoose the IP2TOR subscription:",
|
|
|
|
choices=choices, width=60, height=10, title="Select")
|
|
|
|
|
|
|
|
# if user chosses CANCEL
|
|
|
|
if code != d.OK:
|
|
|
|
sys.exit(0)
|
|
|
|
|
|
|
|
# get the slected IP2TOR bridge
|
|
|
|
ip2torSelect=ip2torSubs[int(tag)]
|
|
|
|
ip=ip2torSelect["ip"]
|
2020-07-14 16:18:16 +02:00
|
|
|
target="tor"
|
2020-07-13 15:53:12 +02:00
|
|
|
|
|
|
|
elif tag == "DYNDNS":
|
|
|
|
|
2020-07-13 16:18:22 +02:00
|
|
|
# the subscriptioNew method will handle acrivating the dnydns part
|
|
|
|
ip="dyndns"
|
2020-07-13 15:53:12 +02:00
|
|
|
|
|
|
|
elif tag == "STATIC":
|
|
|
|
|
|
|
|
# enter the static IP
|
|
|
|
code, text = d.inputbox(
|
|
|
|
"Enter the static public IP of this RaspiBlitz:",
|
|
|
|
height=10, width=40, init="",
|
|
|
|
title="Static IP")
|
|
|
|
ip = text.strip()
|
|
|
|
ip = token.split(' ')[0]
|
|
|
|
|
|
|
|
# check for valid input
|
|
|
|
try:
|
|
|
|
ip.index(".")
|
|
|
|
except Exception as e:
|
|
|
|
ip=""
|
|
|
|
if len(ip) == 0:
|
|
|
|
Dialog(dialog="dialog",autowidgetsize=True).msgbox('''
|
|
|
|
This looks not like a valid IP.
|
|
|
|
''',title="Unvalid Input")
|
|
|
|
sys.exit(0)
|
|
|
|
|
2020-07-13 16:18:22 +02:00
|
|
|
# create the letsenscript subscription
|
2020-07-13 15:53:12 +02:00
|
|
|
try:
|
2020-07-14 16:44:28 +02:00
|
|
|
os.system("clear")
|
2020-07-14 16:18:16 +02:00
|
|
|
subscription = subscriptionsNew(ip, dnsservice, domain, token, target)
|
2020-07-13 16:18:22 +02:00
|
|
|
|
|
|
|
# success dialog
|
|
|
|
Dialog(dialog="dialog",autowidgetsize=True).msgbox('''
|
|
|
|
OK your LetsEncrypt subscription is now ready.
|
|
|
|
Go to SUBSCRIBE > LIST to see details.
|
|
|
|
Use the correct port on {0}
|
|
|
|
to reach the service you wanted.
|
|
|
|
'''.format(domain),title="OK LetsEncrypt Created")
|
|
|
|
|
2020-07-13 15:53:12 +02:00
|
|
|
except Exception as e:
|
|
|
|
|
|
|
|
# unkown error happend
|
|
|
|
Dialog(dialog="dialog",autowidgetsize=True).msgbox('''
|
|
|
|
Unkown Error happend - please report to developers:
|
|
|
|
{0}
|
|
|
|
'''.format(str(e)),title="Exception on Subscription")
|
|
|
|
sys.exit(1)
|
2020-07-13 12:41:52 +02:00
|
|
|
|
2020-07-13 12:35:56 +02:00
|
|
|
####### COMMANDS #########
|
|
|
|
|
|
|
|
###############
|
|
|
|
# CREATE SSH DIALOG
|
|
|
|
# use for ssh shell menu
|
|
|
|
###############
|
|
|
|
|
|
|
|
if sys.argv[1] == "create-ssh-dialog":
|
|
|
|
|
|
|
|
# late imports - so that rest of script can run also if dependency is not available
|
|
|
|
from dialog import Dialog
|
|
|
|
|
2020-07-13 15:53:12 +02:00
|
|
|
menuMakeSubscription()
|
|
|
|
|
2020-07-13 12:35:56 +02:00
|
|
|
sys.exit()
|
|
|
|
|
|
|
|
###############
|
|
|
|
# SUBSCRIPTIONS NEW
|
|
|
|
# call from web interface
|
|
|
|
###############
|
|
|
|
|
2020-07-14 18:20:04 +02:00
|
|
|
if sys.argv[1] == "subscription-new":
|
2020-07-13 12:35:56 +02:00
|
|
|
|
|
|
|
# check parameters
|
|
|
|
try:
|
|
|
|
if len(sys.argv) <= 5: raise BlitzError("incorrect parameters","")
|
|
|
|
ip = sys.argv[2]
|
|
|
|
dnsservice_type = sys.argv[3]
|
|
|
|
dnsservice_id = sys.argv[4]
|
|
|
|
dnsservice_token = sys.argv[5]
|
2020-07-14 16:18:16 +02:00
|
|
|
if len(sys.argv) <= 6:
|
|
|
|
target = "ip&tor"
|
2020-07-14 18:17:14 +02:00
|
|
|
else:
|
|
|
|
target = sys.argv[6]
|
2020-07-13 12:35:56 +02:00
|
|
|
except Exception as e:
|
|
|
|
handleException(e)
|
|
|
|
|
2020-07-13 15:53:12 +02:00
|
|
|
# create the subscription
|
2020-07-13 12:35:56 +02:00
|
|
|
try:
|
2020-07-14 16:18:16 +02:00
|
|
|
subscription = subscriptionsNew(ip, dnsservice_type, dnsservice_id, dnsservice_token, target)
|
2020-07-13 12:35:56 +02:00
|
|
|
except Exception as e:
|
|
|
|
handleException(e)
|
|
|
|
|
|
|
|
# output json ordered bridge
|
|
|
|
print(json.dumps(subscription, indent=2))
|
|
|
|
sys.exit()
|
|
|
|
|
|
|
|
#######################
|
|
|
|
# SUBSCRIPTIONS LIST
|
|
|
|
#######################
|
|
|
|
|
|
|
|
if sys.argv[1] == "subscriptions-list":
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
|
|
|
if Path(SUBSCRIPTIONS_FILE).is_file():
|
|
|
|
os.system("sudo chown admin:admin {0}".format(SUBSCRIPTIONS_FILE))
|
|
|
|
subs = toml.load(SUBSCRIPTIONS_FILE)
|
|
|
|
else:
|
|
|
|
subs = {}
|
2020-07-13 12:52:15 +02:00
|
|
|
if "subscriptions_letsencrypt" not in subs:
|
2020-07-13 12:35:56 +02:00
|
|
|
subs['subscriptions_letsencrypt'] = []
|
|
|
|
print(json.dumps(subs['subscriptions_letsencrypt'], indent=2))
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
handleException(e)
|
|
|
|
|
|
|
|
sys.exit(0)
|
|
|
|
|
2020-07-13 13:12:06 +02:00
|
|
|
#######################
|
|
|
|
# SUBSCRIPTION DETAIL
|
|
|
|
#######################
|
2020-07-13 13:13:09 +02:00
|
|
|
if sys.argv[1] == "subscription-detail":
|
2020-07-13 13:12:06 +02:00
|
|
|
|
|
|
|
# check parameters
|
|
|
|
try:
|
|
|
|
if len(sys.argv) <= 2: raise BlitzError("incorrect parameters","")
|
|
|
|
subscriptionID = sys.argv[2]
|
|
|
|
except Exception as e:
|
|
|
|
handleException(e)
|
|
|
|
|
|
|
|
try:
|
|
|
|
sub = getSubscription(subscriptionID)
|
|
|
|
print(json.dumps(sub, indent=2))
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
handleException(e)
|
|
|
|
|
|
|
|
sys.exit(0)
|
|
|
|
|
2020-07-14 19:07:06 +02:00
|
|
|
#######################
|
|
|
|
# DOMAIN BY IP
|
|
|
|
# to check if an ip has a domain mapping
|
|
|
|
#######################
|
|
|
|
if sys.argv[1] == "domain-by-ip":
|
|
|
|
|
|
|
|
# check parameters
|
|
|
|
try:
|
|
|
|
if len(sys.argv) <= 2: raise BlitzError("incorrect parameters","")
|
|
|
|
ip = sys.argv[2]
|
|
|
|
except Exception as e:
|
|
|
|
handleException(e)
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
|
|
|
domain=getDomainByIP(ip)
|
|
|
|
print("domain='{0}'".format(domain))
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
handleException(e)
|
|
|
|
|
|
|
|
sys.exit(0)
|
|
|
|
|
2020-07-13 12:35:56 +02:00
|
|
|
#######################
|
|
|
|
# SUBSCRIPTION CANCEL
|
|
|
|
#######################
|
|
|
|
if sys.argv[1] == "subscription-cancel":
|
|
|
|
|
|
|
|
# check parameters
|
|
|
|
try:
|
|
|
|
if len(sys.argv) <= 2: raise BlitzError("incorrect parameters","")
|
|
|
|
subscriptionID = sys.argv[2]
|
|
|
|
except Exception as e:
|
|
|
|
handleException(e)
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
|
|
|
subscriptionsCancel(subscriptionID)
|
|
|
|
|
|
|
|
except Exception as e:
|
|
|
|
handleException(e)
|
|
|
|
|
|
|
|
sys.exit(0)
|
|
|
|
|
|
|
|
# unkown command
|
|
|
|
print("# unkown command")
|