2015-05-21 08:52:10 +00:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
|
|
|
import SocketServer
|
|
|
|
import json
|
|
|
|
import guestfs
|
|
|
|
import re
|
|
|
|
|
|
|
|
|
|
|
|
PORT = 16510
|
|
|
|
ADDRESS = "0.0.0.0"
|
|
|
|
|
|
|
|
|
|
|
|
class MyTCPServer(SocketServer.ThreadingTCPServer):
|
|
|
|
allow_reuse_address = True
|
|
|
|
|
|
|
|
|
|
|
|
class MyTCPServerHandler(SocketServer.BaseRequestHandler):
|
|
|
|
def handle(self):
|
|
|
|
# recive data
|
|
|
|
data = json.loads(self.request.recv(1024).strip())
|
|
|
|
|
|
|
|
# GuestFS
|
|
|
|
gfs = guestfs.GuestFS (python_return_dict=True)
|
|
|
|
try:
|
|
|
|
gfs.add_domain(data['vname'])
|
|
|
|
gfs.launch()
|
|
|
|
parts = gfs.list_partitions()
|
|
|
|
for part in parts:
|
|
|
|
try:
|
|
|
|
gfs.mount(part, '/')
|
|
|
|
if gfs.is_file('/etc/shadow'):
|
2015-05-27 13:23:49 +00:00
|
|
|
if data['action'] == 'password':
|
|
|
|
file_shadow = gfs.cat('/etc/shadow')
|
|
|
|
new_root_hash = "root:" + data['passwd'] + ":"
|
|
|
|
file_shadow_new = re.sub('^root:.*?:', new_root_hash, file_shadow)
|
|
|
|
gfs.write('/etc/shadow', file_shadow_new)
|
|
|
|
gfs.chmod(640, '/etc/shadow')
|
|
|
|
self.request.sendall(json.dumps({'return': 'success'}))
|
|
|
|
if data['action'] == 'publickey':
|
|
|
|
if not gfs.is_dir('/root/.ssh'):
|
|
|
|
gfs.mkdir ('/root/.ssh')
|
|
|
|
gfs.chmod(0700, "/root/.ssh")
|
|
|
|
gfs.write('/root/.ssh/authorized_keys', data['key'])
|
|
|
|
gfs.chmod(0600, '/root/.ssh/authorized_keys')
|
|
|
|
self.request.sendall(json.dumps({'return': 'success'}))
|
|
|
|
gfs.umount(part)
|
2015-05-21 08:52:10 +00:00
|
|
|
except RuntimeError:
|
|
|
|
pass
|
|
|
|
gfs.shutdown()
|
|
|
|
gfs.close()
|
|
|
|
except RuntimeError, err:
|
|
|
|
self.request.sendall(json.dumps({'return': 'error', 'message': err.message}))
|
|
|
|
|
|
|
|
server = MyTCPServer((ADDRESS, PORT), MyTCPServerHandler)
|
|
|
|
server.serve_forever()
|