����JFIF���������
__ __ __ __ _____ _ _ _____ _ _ _ | \/ | \ \ / / | __ \ (_) | | / ____| | | | | | \ / |_ __\ V / | |__) | __ ___ ____ _| |_ ___ | (___ | |__ ___| | | | |\/| | '__|> < | ___/ '__| \ \ / / _` | __/ _ \ \___ \| '_ \ / _ \ | | | | | | |_ / . \ | | | | | |\ V / (_| | || __/ ____) | | | | __/ | | |_| |_|_(_)_/ \_\ |_| |_| |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1 if you need WebShell for Seo everyday contact me on Telegram Telegram Address : @jackleetFor_More_Tools:
#!/usr/bin/perl
# Copyright 2017, cPanel, Inc.
# All rights reserved.
# http://cpanel.net
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are met:
#
# 1. Redistributions of source code must retain the above copyright notice,
# this list of conditions and the following disclaimer.
#
# 2. Redistributions in binary form must reproduce the above copyright notice,
# this list of conditions and the following disclaimer in the documentation
# and/or other materials provided with the distribution.
#
# 3. Neither the name of the owner nor the names of its contributors may be
# used to endorse or promote products derived from this software without
# specific prior written permission.
#
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
# ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
# WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
# DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
# SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
# OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
use strict;
use warnings;
use Test::More; # last test to print
use cPanel::PublicAPI ();
my @getpwuid = getpwuid($>);
my $homedir = $getpwuid[7];
my $user = $getpwuid[0];
if ( !-d '/usr/local/cpanel' ) {
plan skip_all => 'This test requires that cPanel and WHM are installed on a server';
}
if ( !-e $homedir . '/.accesshash' ) {
plan skip_all => 'This test requires that an account hash is defined (see "Setup Remote Access Keys" in WHM)';
}
check_cpanel_version() or plan skip_all => 'This test requires cPanel version 54 or higher';
eval { require MIME::Base32; require Digest::SHA; 1; } or do {
plan skip_all => 'This test requires the MIME::Base32 and Digest::SHA modules';
};
unshift @INC, '/usr/local/cpanel';
require Cpanel::Security::Authn::TwoFactorAuth::Google;
my $pubapi = check_api_access_and_config();
if ( !-e '/var/cpanel/users/papiunit' ) {
my $password = generate_password();
my $res = $pubapi->whm_api(
'createacct',
{
'username' => 'papiunit',
'password' => $password,
'domain' => 'cpanel-public-api-test.acct',
'reseller' => 1,
}
);
like( $res->{'metadata'}->{'reason'}, qr/Account Creation Ok/, 'Test account created' );
$res = $pubapi->whm_api(
'setacls',
{
'reseller' => 'papiunit',
'acl-create-acct' => 1,
}
);
ok( $res->{'metadata'}->{'result'}, 'Assigned create-acct ACL successfully' );
_test_tfa_as_reseller( 'papiunit', $password );
$res = $pubapi->whm_api(
'removeacct',
{
'user' => 'papiunit',
}
);
like( $res->{'metadata'}->{'reason'}, qr/papiunit account removed/, 'Test Account Removed' );
}
else {
plan skip_all => 'Unable to create test account. It already exists';
}
done_testing();
sub _test_tfa_as_reseller {
my ( $reseller, $password ) = @_;
my $reseller_api = cPanel::PublicAPI->new( 'user' => $reseller, 'pass' => $password, 'ssl_verify_mode' => 0 );
my $res = $reseller_api->whm_api( 'twofactorauth_generate_tfa_config', {} );
ok( $res->{'metadata'}->{'result'}, 'Successfully called generate tfa config API call as reseller' );
my $tfa_secret = $res->{'data'}->{'secret'};
my $google_auth = Cpanel::Security::Authn::TwoFactorAuth::Google->new( { 'secret' => $tfa_secret, 'account_name' => '', 'issuer' => '' } );
$res = $reseller_api->whm_api(
'twofactorauth_set_tfa_config',
{
'secret' => $tfa_secret,
'tfa_token' => $google_auth->generate_code(),
}
);
ok( $res->{'metadata'}->{'result'}, '2FA successfully configured for reseller' );
eval { $reseller_api->whm_api('loadavg') };
ok( $@, 'API calls fail without a 2FA session established' );
$reseller_api->establish_tfa_session( 'whostmgr', $google_auth->generate_code() );
$res = $reseller_api->whm_api('loadavg');
ok( defined $res->{'one'}, 'API call successfully made after establishing 2FA session' );
}
sub generate_password {
my @chars = ( 'A' .. 'Z', 'a' .. 'z', '0' .. '9' );
my $pass = '';
foreach ( 1 .. 32 ) {
$pass .= $chars[ int rand @chars ];
}
return $pass;
}
sub check_cpanel_version {
open( my $version_fh, '<', '/usr/local/cpanel/version' ) || return 0;
my $version = do { local $/; <$version_fh> };
chomp $version;
my ( $maj, $min, $rev, $sup ) = split /[\._]/, $version;
return 1 if $min >= 53;
return 0;
}
sub check_api_access_and_config {
open( my $config_fh, '<', '/var/cpanel/cpanel.config' ) || BAIL_OUT('Could not load /var/cpanel/cpanel.config');
my $securitypolicy_enabled = 0;
my $securitypolicy_xml_api_enabled = 0;
while ( my $line = readline($config_fh) ) {
next if $line !~ /=/;
chomp $line;
my ( $key, $value ) = split( /=/, $line, 2 );
if ( $key eq 'SecurityPolicy::TwoFactorAuth' ) {
$securitypolicy_enabled = 1 if $value;
}
elsif ( $key eq 'SecurityPolicy::xml-api' ) {
$securitypolicy_xml_api_enabled = 1 if $value;
}
}
plan skip_all => '2FA security policy is disabled on the server' if !$securitypolicy_enabled;
plan skip_all => 'Security policies do not apply to API calls on the server' if !$securitypolicy_xml_api_enabled;
my $pubapi = cPanel::PublicAPI->new( 'ssl_verify_mode' => 0 );
my $res = eval { $pubapi->whm_api('applist') };
if ($@) {
plan skip_all => "Failed to verify API access as current user: $@";
}
if ( exists $res->{'data'}->{'app'} && ref $res->{'data'}->{'app'} eq 'ARRAY' ) {
return $pubapi if grep { $_ eq 'createacct' } @{ $res->{'data'}->{'app'} };
}
plan skip_all => "Current user doesn't appear to have proper privileges";
}
| Name | Type | Size | Permission | Actions |
|---|---|---|---|---|
| lib | Folder | 0755 |
|
|
| 00-load.t | File | 182 B | 0644 |
|
| 01-api-format.t | File | 8.73 KB | 0644 |
|
| 02-construct.t | File | 7.33 KB | 0755 |
|
| 03-api-query.t | File | 6.85 KB | 0644 |
|
| 04-tfa-sessions.t | File | 6.29 KB | 0644 |
|
| 05-api-query_tokens.t | File | 4.29 KB | 0644 |
|
| check-changes.t | File | 272 B | 0644 |
|
| cpan-changes.t | File | 275 B | 0644 |
|
| manifest.t | File | 273 B | 0644 |
|
| pod-coverage.t | File | 656 B | 0644 |
|
| pod.t | File | 341 B | 0644 |
|