Bobby Sanabria is a 7-time Grammy-nominee as a leader. He is a noted drummer, percussionist, composer, arranger, conductor, producer, educator, documentary film maker, and bandleader of Puerto Rican descent born and raised in NY’s South Bronx. He was the drummer for the acknowledged creator of Afro-Cuban jazz, Mario Bauzá touring and recording three CD’s with him, two of which were Grammy nominated, as well as an incredible variety of artists. From Dizzy Gillespie, Tito Puente, Mongo Santamaria (with whom he started his career) Paquito D’Rivera, Yomo Toro, Candido, The Mills Brothers, Ray Barretto, Chico O’Farrill, Francisco Aguabella, Henry Threadgill, Luis “Perico” Ortiz, Daniel Ponce, Larry Harlow, Daniel Santos, Celia Cruz, Adalberto Santiago, Xiomara Portuondo, Pedrito Martinez, Roswell Rudd, Patato, David Amram, the Cleveland Jazz Orchestra, Michael Gibbs, Charles McPherson Jon Faddis, Bob Mintzer, Phil Wilson, Randy Brecker, Charles Tolliver, M’BOOM, Michelle Shocked, Marco Rizo, and many more. In addition he has guest conducted and performed as a soloist with numerous orchestras like the WDR Big Band, The Airmen of Note, The U.S. Jazz Ambassadors, Eau Claire University Big, The University of Calgary Big Band to name just a few.
His first big band recording, Live & in Clave!!! was nominated for a Grammy in 2001. A Grammy nomination followed in 2003 for 50 Years of Mambo: A Tribute to Perez Prado. His 2008 Grammy nominated Big Band Urban Folktales was the first Latin jazz recording to ever reach #1 on the national Jazz Week charts. In 2009 the Afro-Cuban Jazz Orchestra he directs at the Manhattan School of Music was nominated for a Latin Grammy for Kenya Revisited Live!!!, a reworking of the music from Machito’s greatest album, Kenya. In 2011 the recording Tito Puente Masterworks Live!!! by the same orchestra under Bobby’s direction was nominated for a Latin Jazz Grammy. Partial proceeds from the sale of both CD’s continue to support the scholarship program in the Manhattan School of Music’s jazz program. Bobby’s 2012 big band recording, inspired by the writings of Mexican author Octavio Paz, entitled MULTIVERSE was nominated for 2 Grammys. His work as an activist led him to fight to reinstate the Latin Jazz category after NARAS decided to eliminate many ethnic and regional categories in 2010. He and three other colleagues actually sued the Grammys which led to the reinstatement of the category. He is an associate producer of and featured interviewee in the documentaries, The Palladium: Where Mambo Was King, winner of the IMAGINE award for Best TV documentary of 2003, and the Alma Award winning From Mambo to Hip Hop: A South Bronx Tale where he also composed the score in 2006 and was broadcast on PBS. In 2009 he was a consultant and featured on screen personality in Latin Music U.S.A. also broadcast on PBS. In 2017 he was also a consultant and featured on air personality for the documentary We Like It Like That: The Story of Latin Boogaloo. He is the composer for the score of the 2017 documentary Some Girls. DRUM! Magazine named him Percussionist of the Year in 2005; he was also named 2011 and 2013 Percussionist of the Year by the Jazz Journalists Association. This South Bronx native of Puerto Rican parents was a 2006 inductee into the Bronx Walk of Fame. He holds a BM from the Berklee College of Music and is on the faculty of the New School University and the Manhattan School of Music where he has taught Afro-Cuban Jazz Orchestras passing on the tradition while moving it forward. His recording with the Manhattan School of Music Afro-Cuban Jazz Orchestra entitled “Que Viva Harlem!” released in 2014 on the Jazzheads label has received ****1/2 stars in Downbeat magazine.
Mr. Sanabria has conducted hundreds of clinics in the states and worldwide under the auspices of TAMA Drums, Sabian Cymbals, Remo Drumheads, Vic Firth Sticks and Latin Percussion Inc. His background having performed and recorded as both a drummer and/or percussionist with every major figure in the history of Latin jazz, as well as his encyclopedic knowledge of both jazz and Latin music history, makes him unique in his field. His critically acclaimed video instructional series, Conga Basics Volumes 1, 2 and 3, have been the highest selling videos in the history of video instruction and have set a standard worldwide. He is the Co-Artistic Director of the Bronx Music Heritage Center and is part of Jazz at Lincoln Center’s Jazz Academy as well as The Weill Music Institute at Carnegie Hall. His latest recording released in July 2018 is a monumental Latin jazz reworking of the entire score of West Side Story entitled, West Side Story Reimagined, on the Jazzheads label in celebration of the shows recent 60th anniversary (2017) and its composer, Maestro Leonard Bernstein’s centennial (2018). Partial proceeds from the sale of this historic double CD set go the Jazz Foundation of America’s Puerto Relief Fund to aid Bobby’s ancestral homeland after the devastation form hurricanes Irma and Maria.
403WebShell
403Webshell
Server IP : 23.235.221.107 / Your IP : 216.73.217.144 Web Server : Apache System : Linux drums.jazzcorner.com 4.18.0-513.24.1.el8_9.x86_64 #1 SMP Mon Apr 8 11:23:13 EDT 2024 x86_64 User : bsanabri ( 1025) PHP Version : 8.1.34 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /scripts/
#!/usr/local/cpanel/3rdparty/bin/perl
# cpanel - scripts/sshcontrol Copyright 2022 cPanel, L.L.C.
# All rights reserved.
# copyright@cpanel.net http://cpanel.net
# This code is subject to the cPanel license. Unauthorized copying is prohibited
#----------------------------------------------------------------------
# This script controls a Net::OpenSSH session.
#
#It can authenticate a connection via password or SSH private key.
#
#It can connect via:
# 1) root login
# 2) user login, then su to root
# 3) user login, then sudo to root
#
#Additionally, existing connections may persist and be reused.
#
#Once connected, it can:
# 1) copy a file from/to local/remote
# 2) AS ROOT: execute an arbitrary command on the remote server
#
#Inputs:
# key/value are read from STDIN as a hash,
# serialized with Cpanel::AdminBin::Serializer::Dump()
#
#
# Required arguments:
# authuser The user as which to identify during the SSH login.
#
# host The remote host.
#
# ctl "ssh" or (usually "scp", but anything defined will do)
#
#
# Additional, optional arguments:
# external_master ctl_pass parameter for Net::OpenSSH
# Required if die_on_pid is not given.
#
# die_on_pid ID of a specific process for the SSH control process
# to watch and self-destruct upon the end of that
# process. Defaults to the script's process ID.
#
# port passed to Net::OpenSSH
#
# root_pass If authuser is "root", used to login;
# otherwise, used to escalate privileges via su.
# (Don’t submit if you mean to do sudo.)
#
# ssh_private_key_password passphrase for sshkey
#
# sshkey filename under $HOME/.ssh/
#
# stay_alive boolean; whether to keep the SSH control
# process around and pass back its PID and
# path in the response
#
# wheel_pass Used to login as a non-root user.
# If there is no root_pass, also used to escalate
# privileges via sudo.
#
#
# Additional arguments when ctl is "ssh":
# cmd if ctl is "ssh", executed AS ROOT on the remote server
#
#
# Additional arguments when ctl is "scp":
# destfile if ctl ne "ssh", passed to Cpanel::SSHControl::scp
# NOTE: If ".", value is read from the last node in the
# path from srcfile
#
# direction if ctl ne "ssh", passed to Cpanel::SSHControl::scp
#
# srcfile if ctl ne "ssh", passed to Cpanel::SSHControl::scp
#
#
#Output:
# This speaks the "protocol" that Whostmgr/Remote/Parser.pm understands.
# Note that this prints even error statuses to STDOUT.
#
#----------------------------------------------------------------------
package Script::SSHControl;
use strict;
use warnings;
use IO::Pipe ();
use Cpanel::AdminBin::Serializer ();
use Cpanel::ForkAsync ();
use Cpanel::SSHControl ();
use Cpanel::Locale::Lazy 'lh';
use Cpanel::TimeHiRes ();
use Cpanel::Exception ();
use Cpanel::Sys::Setsid::Fast ();
use Cpanel::BinCheck::Lite ();
my $ONEDAY = (86400);
my @REQUIRED_ARGS = qw( authuser host ctl );
Cpanel::BinCheck::Lite::check_argv();
my $debug = 0;
__PACKAGE__->script() unless caller();
sub script { ## no critic qw(Subroutines::ProhibitExcessComplexity)
my ($class) = @_;
local $| = 1;
local $ENV{'TERM'} = 'dumb';
my $self = {};
bless $self, $class;
my $parsed_args = Cpanel::AdminBin::Serializer::SafeLoadFile( \*STDIN );
my @missing = grep { !length $parsed_args->{$_} } @REQUIRED_ARGS;
if (@missing) {
_leave( lh()->maketext( 'Specify the [list_and_quoted,_1] [numerate,_2,parameter,parameters].', \@missing, ( scalar @missing ) ) );
}
my $escalation_method;
if ( $parsed_args->{'root_escalation_method'} && $parsed_args->{'root_escalation_method'} eq 'none' ) {
$escalation_method = 'none';
}
else {
# NB: Avoid length() here because we want to interpret
# root_pass==0 as no root password.
my $gave_root_pass = !!$parsed_args->{'root_pass'};
if ( length $parsed_args->{'wheel_pass'} ) {
if ( $parsed_args->{'authuser'} eq 'root' ) {
_leave( lh()->maketext( 'If “[_1]” is “[_2]”, you cannot specify “[_3]”.', qw(authuser root wheel_pass) ) );
}
# Just a wheel/sudo password? Gotta be sudo.
if ( !$gave_root_pass ) {
$escalation_method = 'sudo';
}
}
# Root password + non-root = su
if ($gave_root_pass) {
if ( $parsed_args->{'authuser'} ne 'root' ) {
$escalation_method = 'su';
}
}
}
my $cmd = $parsed_args->{'cmd'};
my $ssh_key = $parsed_args->{'sshkey'} ? ( ( getpwuid($>) )[7] . "/.ssh/" . $parsed_args->{sshkey} ) : undef;
my $ssh_username = $parsed_args->{'authuser'};
$parsed_args->{'die_on_pid'} ||= $$;
my $auth_info = {
'ssh_username' => $ssh_username,
'ssh_ip' => $parsed_args->{'host'},
'ssh_port' => $parsed_args->{'port'},
'root_pass' => $parsed_args->{'root_pass'} || ( $ssh_username eq 'root' ? $parsed_args->{'wheel_pass'} : undef ),
'wheel_pass' => $parsed_args->{'wheel_pass'},
'ssh_private_key_password' => $parsed_args->{'ssh_private_key_password'},
'root_escalation_method' => $escalation_method,
'ssh_private_key' => $ssh_key,
'key_or_pass' => ( $ssh_key ? 1 : 0 ),
};
my ( $status, $master_pid, $data );
my $ssh_obj;
if ( $parsed_args->{'external_master'} ) {
$0 = "sshcontrol parent: $auth_info->{'ssh_ip'} - external master";
$ssh_obj = Net::OpenSSH->new( 'child', external_master => 1, ctl_path => $parsed_args->{'external_master'} );
}
else {
$0 = "sshcontrol parent: $auth_info->{'ssh_ip'} - create connection";
}
my $keep_ssh_master = $parsed_args->{'stay_alive'} ? 1 : 0;
if ( $ssh_obj && $ssh_obj->check_master() ) {
print "Reused existing connection.\n";
$0 = "sshcontrol parent: $auth_info->{'ssh_ip'} - reused external master";
}
else {
$0 = "sshcontrol parent: $auth_info->{'ssh_ip'} - creating connection";
if ( $parsed_args->{'external_master'} ) {
$keep_ssh_master = 1;
}
( $status, $master_pid, $data ) = $self->_create_ssh_master_connection( $auth_info, $parsed_args->{'die_on_pid'} );
if ( !$status ) {
_ssh_error_to_whm_remote_error_and_leave($data);
}
$ssh_obj = Net::OpenSSH->new( 'child', external_master => 1, ctl_path => $data );
}
if ( $ssh_obj->error() ) {
my $ssh_error = $ssh_obj->error();
_ssh_error_to_whm_remote_error_and_leave($ssh_error);
}
$0 = "sshcontrol parent: $auth_info->{'ssh_ip'} - attaching to external";
my $ssh_control = Cpanel::SSHControl->new_from_external( 'debug' => 0, 'quiet' => 0, 'verbose' => 0, 'auth_info' => $auth_info, 'ssh' => $ssh_obj );
$0 = "sshcontrol parent: $auth_info->{'ssh_ip'} - attached to external";
$SIG{'TERM'} = sub {
$ssh_control->disconnect();
};
if ( $parsed_args->{ctl} eq 'ssh' ) {
$0 = "sshcontrol parent: $auth_info->{'ssh_ip'} - ssh";
my ( $status, $msg ) = $ssh_control->exec_as_root($cmd);
if ( !$status ) {
_ssh_error_to_whm_remote_error_and_leave($msg);
}
}
elsif ( $parsed_args->{'ctl'} eq 'scp' ) {
$0 = "sshcontrol parent: $auth_info->{'ssh_ip'} - scp";
my $destfile = $parsed_args->{'destfile'} eq '.' ? ( split( m{/+}, $parsed_args->{'srcfile'} ) )[-1] : $parsed_args->{'destfile'};
my ( $status, $msg ) = $ssh_control->scp(
'direction' => $parsed_args->{'direction'},
'srcfile' => $parsed_args->{'srcfile'},
'destfile' => $destfile,
);
if ( !$status ) {
_ssh_error_to_whm_remote_error_and_leave($msg);
}
elsif ( $parsed_args->{'direction'} eq 'download' && !-e $destfile ) {
_ssh_error_to_whm_remote_error_and_leave("The destination file: “$destfile” failed to download.");
}
}
else {
die "Invalid “ctl”: [$parsed_args->{'ctl'}]";
}
$self->_write_sshcontrol_info( $master_pid, $ssh_obj );
if ( !$keep_ssh_master || !$master_pid ) {
$ssh_control->disconnect_master();
}
undef $ssh_obj;
return $self;
}
sub _write_sshcontrol_info {
my ( $self, $master_pid, $ssh_obj ) = @_;
if ($master_pid) {
print "\n==sshcontrolpid=$master_pid==\n";
}
print "\n==sshcontrolpath=" . $ssh_obj->get_ctl_path() . "==\n";
return;
}
sub _leave {
my @args = @_;
print @args;
die "\n";
}
sub _create_ssh_master_connection {
my ( $self, $auth_info, $die_on_pid ) = @_;
my $ssh_pipe = IO::Pipe->new();
my $child_result;
my $sshcontrol_pid = Cpanel::ForkAsync::do_in_child(
sub {
$ssh_pipe->writer();
open( STDOUT, '>&=' . fileno($ssh_pipe) ); ## no critic qw(RequireCheckedOpen)
if ($die_on_pid) {
$0 = "sshcontrol child: $auth_info->{'ssh_ip'} - waiting on pid $die_on_pid";
}
else {
$0 = "sshcontrol child: $auth_info->{'ssh_ip'}";
}
my $ssh_control = Cpanel::SSHControl->new( 'debug' => 0, 'quiet' => 0, 'verbose' => 0, 'auth_info' => $auth_info );
{
local $@;
eval { $ssh_control->connect() };
if ($@) {
my $error_as_string = Cpanel::Exception::get_string_no_id($@);
$error_as_string =~ s/\n/ /g;
# This is going to the parent
print "\nsshcontrol:0:" . $error_as_string . "\n";
exit(1);
}
}
my $master_pid = $ssh_control->{'ssh'}->get_master_pid();
if ( !$master_pid ) {
print "\nsshcontrol:0:failed to create sshcontrol master\n";
exit(1);
}
$SIG{'HUP'} = 'IGNORE';
$SIG{'ALRM'} = $SIG{'TERM'} = sub {
$ssh_control->disconnect_master();
exit(0);
};
# This is going to the parent
print "\nsshcontrol:1:" . $ssh_control->{'ssh'}->get_ctl_path() . "\n";
Cpanel::Sys::Setsid::Fast::fast_setsid();
open( STDIN, '<', '/dev/null' ); ## no critic qw(RequireCheckedOpen)
open( STDOUT, '>', '/dev/null' ); ## no critic qw(RequireCheckedOpen)
open( STDERR, '>', '/dev/null' ); ## no critic qw(RequireCheckedOpen)
alarm($ONEDAY); # If something gets killed off expire in one day
while ( waitpid( $master_pid, 1 ) != -1 && kill( 0, $die_on_pid ) ) {
Cpanel::TimeHiRes::sleep(0.1);
}
$ssh_control->disconnect_master();
waitpid( $master_pid, 0 );
exit(0);
}
);
$ssh_pipe->reader();
while ( readline($ssh_pipe) ) {
if (m{^sshcontrol:}) { $child_result = $_; last; }
print;
}
chomp($child_result);
my ( $sshcontrol_tag, $status, $data ) = split( m{:}, $child_result, 3 );
return ( $status, $sshcontrol_pid, $data );
}
my @SSH_ERRORS;
sub _ssh_error_to_whm_remote_error_and_leave {
my ($ssh_error) = @_;
if ( !@SSH_ERRORS ) {
@SSH_ERRORS = (
[ qr{master process exited unexpectedly:\s+([^:]+).*?No such file or directory} => 'RemoteSSHMissing' ],
[ qr{No such file or directory} => 'RemoteSSHMissing' ],
[ qr{normalize shell} => 'RemoteSSHMissing' ],
[ qr{Name or service not known} => 'RemoteSSHHostNotFound' ],
[ qr{Connection timed out} => 'RemoteSSHTimeout' ],
[ qr{(scp failed)} => 'RemoteSCPError' ],
[ qr{(^scp:.*)} => 'RemoteSCPError' ],
[ qr{(Connection (?:to [^ ]+? )?closed)} => 'RemoteSSHConnectionFailed' ],
[ qr{(No route to host)} => 'RemoteSSHConnectionFailed' ],
[ qr{(Connection refused)} => 'RemoteSSHConnectionFailed' ],
[ qr{(lost connection)} => 'RemoteSSHConnectionFailed' ],
[ qr{(Failed to escalate to root)}i => 'RemoteSSHRootEscalationFailed' ],
[ qr{(timeout)}i => 'RemoteSSHTimeout' ],
[ qr{master process exited unexpectedly:\s+(.*)} => 'RemoteSSHAccessDenied' ],
#A catch-all, must be last.
[ qr<> => 'RemoteSSHAccessDenied' ],
);
}
for my $re_code (@SSH_ERRORS) {
if ( $ssh_error =~ $re_code->[0] ) {
my $raw_error = $1 || $ssh_error;
$raw_error =~ s/=//g;
$raw_error =~ s/\r*\n/ /g;
_leave("\n==sshcontrol_error=$re_code->[1]=$raw_error==\n");
}
}
# If we did not parse the error, we need to show it
# but only if we haven't already to avoid showing it twice
print $ssh_error . "\n";
#This error is meant to look a bit more "professional" than
#"Oops! We should never get here!". :)
die "Misdirected execution flow!";
}
1;