2018-08-26 20:21:03 +02:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-10-27 22:56:16 +02:00
|
|
|
require 'set'
|
2018-08-26 20:21:03 +02:00
|
|
|
require_relative '../../config/boot'
|
|
|
|
require_relative '../../config/environment'
|
|
|
|
require_relative 'cli_helper'
|
|
|
|
|
|
|
|
module Mastodon
|
|
|
|
class AccountsCLI < Thor
|
2018-10-25 16:05:33 +02:00
|
|
|
def self.exit_on_failure?
|
|
|
|
true
|
|
|
|
end
|
2018-10-27 22:56:16 +02:00
|
|
|
|
2018-08-26 20:21:03 +02:00
|
|
|
option :all, type: :boolean
|
|
|
|
desc 'rotate [USERNAME]', 'Generate and broadcast new keys'
|
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Generate and broadcast new RSA keys as part of security
|
|
|
|
maintenance.
|
|
|
|
|
|
|
|
With the --all option, all local accounts will be subject
|
|
|
|
to the rotation. Otherwise, and by default, only a single
|
|
|
|
account specified by the USERNAME argument will be
|
|
|
|
processed.
|
|
|
|
LONG_DESC
|
|
|
|
def rotate(username = nil)
|
|
|
|
if options[:all]
|
|
|
|
processed = 0
|
|
|
|
delay = 0
|
|
|
|
|
|
|
|
Account.local.without_suspended.find_in_batches do |accounts|
|
|
|
|
accounts.each do |account|
|
|
|
|
rotate_keys_for_account(account, delay)
|
|
|
|
processed += 1
|
|
|
|
say('.', :green, false)
|
|
|
|
end
|
|
|
|
|
|
|
|
delay += 5.minutes
|
|
|
|
end
|
|
|
|
|
|
|
|
say
|
|
|
|
say("OK, rotated keys for #{processed} accounts", :green)
|
|
|
|
elsif username.present?
|
|
|
|
rotate_keys_for_account(Account.find_local(username))
|
|
|
|
say('OK', :green)
|
|
|
|
else
|
|
|
|
say('No account(s) given', :red)
|
2018-09-14 17:42:22 +02:00
|
|
|
exit(1)
|
2018-08-26 20:21:03 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-09-09 13:33:36 +02:00
|
|
|
option :email, required: true
|
|
|
|
option :confirmed, type: :boolean
|
|
|
|
option :role, default: 'user'
|
|
|
|
option :reattach, type: :boolean
|
|
|
|
option :force, type: :boolean
|
2018-09-14 17:42:22 +02:00
|
|
|
desc 'create USERNAME', 'Create a new user'
|
2018-09-09 13:33:36 +02:00
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Create a new user account with a given USERNAME and an
|
|
|
|
e-mail address provided with --email.
|
|
|
|
|
|
|
|
With the --confirmed option, the confirmation e-mail will
|
|
|
|
be skipped and the account will be active straight away.
|
|
|
|
|
|
|
|
With the --role option one of "user", "admin" or "moderator"
|
|
|
|
can be supplied. Defaults to "user"
|
|
|
|
|
|
|
|
With the --reattach option, the new user will be reattached
|
|
|
|
to a given existing username of an old account. If the old
|
|
|
|
account is still in use by someone else, you can supply
|
|
|
|
the --force option to delete the old record and reattach the
|
|
|
|
username to the new account anyway.
|
|
|
|
LONG_DESC
|
2018-09-14 17:42:22 +02:00
|
|
|
def create(username)
|
2018-09-09 13:33:36 +02:00
|
|
|
account = Account.new(username: username)
|
|
|
|
password = SecureRandom.hex
|
|
|
|
user = User.new(email: options[:email], password: password, admin: options[:role] == 'admin', moderator: options[:role] == 'moderator', confirmed_at: Time.now.utc)
|
|
|
|
|
|
|
|
if options[:reattach]
|
|
|
|
account = Account.find_local(username) || Account.new(username: username)
|
|
|
|
|
|
|
|
if account.user.present? && !options[:force]
|
|
|
|
say('The chosen username is currently in use', :red)
|
|
|
|
say('Use --force to reattach it anyway and delete the other user')
|
|
|
|
return
|
|
|
|
elsif account.user.present?
|
|
|
|
account.user.destroy!
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-09-29 11:40:40 +02:00
|
|
|
account.suspended = false
|
|
|
|
user.account = account
|
2018-09-09 13:33:36 +02:00
|
|
|
|
|
|
|
if user.save
|
|
|
|
if options[:confirmed]
|
|
|
|
user.confirmed_at = nil
|
|
|
|
user.confirm!
|
|
|
|
end
|
|
|
|
|
|
|
|
say('OK', :green)
|
|
|
|
say("New password: #{password}")
|
|
|
|
else
|
|
|
|
user.errors.to_h.each do |key, error|
|
|
|
|
say('Failure/Error: ', :red)
|
|
|
|
say(key)
|
|
|
|
say(' ' + error, :red)
|
|
|
|
end
|
2018-09-14 17:42:22 +02:00
|
|
|
|
|
|
|
exit(1)
|
2018-09-09 13:33:36 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-09-14 17:42:22 +02:00
|
|
|
option :role
|
|
|
|
option :email
|
|
|
|
option :confirm, type: :boolean
|
|
|
|
option :enable, type: :boolean
|
|
|
|
option :disable, type: :boolean
|
|
|
|
option :disable_2fa, type: :boolean
|
|
|
|
desc 'modify USERNAME', 'Modify a user'
|
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Modify a user account.
|
|
|
|
|
|
|
|
With the --role option, update the user's role to one of "user",
|
|
|
|
"moderator" or "admin".
|
|
|
|
|
|
|
|
With the --email option, update the user's e-mail address. With
|
|
|
|
the --confirm option, mark the user's e-mail as confirmed.
|
|
|
|
|
|
|
|
With the --disable option, lock the user out of their account. The
|
|
|
|
--enable option is the opposite.
|
|
|
|
|
|
|
|
With the --disable-2fa option, the two-factor authentication
|
|
|
|
requirement for the user can be removed.
|
|
|
|
LONG_DESC
|
|
|
|
def modify(username)
|
|
|
|
user = Account.find_local(username)&.user
|
|
|
|
|
|
|
|
if user.nil?
|
|
|
|
say('No user with such username', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
if options[:role]
|
|
|
|
user.admin = options[:role] == 'admin'
|
|
|
|
user.moderator = options[:role] == 'moderator'
|
|
|
|
end
|
|
|
|
|
|
|
|
user.email = options[:email] if options[:email]
|
|
|
|
user.disabled = false if options[:enable]
|
|
|
|
user.disabled = true if options[:disable]
|
|
|
|
user.otp_required_for_login = false if options[:disable_2fa]
|
|
|
|
user.confirm if options[:confirm]
|
|
|
|
|
|
|
|
if user.save
|
|
|
|
say('OK', :green)
|
|
|
|
else
|
|
|
|
user.errors.to_h.each do |key, error|
|
|
|
|
say('Failure/Error: ', :red)
|
|
|
|
say(key)
|
|
|
|
say(' ' + error, :red)
|
|
|
|
end
|
|
|
|
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
desc 'delete USERNAME', 'Delete a user'
|
2018-09-09 13:33:36 +02:00
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Remove a user account with a given USERNAME.
|
|
|
|
LONG_DESC
|
2018-09-14 17:42:22 +02:00
|
|
|
def delete(username)
|
2018-09-09 13:33:36 +02:00
|
|
|
account = Account.find_local(username)
|
|
|
|
|
|
|
|
if account.nil?
|
|
|
|
say('No user with such username', :red)
|
2018-09-14 17:42:22 +02:00
|
|
|
exit(1)
|
2018-09-09 13:33:36 +02:00
|
|
|
end
|
|
|
|
|
2018-09-28 03:34:24 +02:00
|
|
|
say("Deleting user with #{account.statuses_count} statuses, this might take a while...")
|
2018-09-09 13:33:36 +02:00
|
|
|
SuspendAccountService.new.call(account, remove_user: true)
|
|
|
|
say('OK', :green)
|
|
|
|
end
|
|
|
|
|
2018-09-28 03:34:24 +02:00
|
|
|
desc 'backup USERNAME', 'Request a backup for a user'
|
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Request a new backup for an account with a given USERNAME.
|
|
|
|
|
|
|
|
The backup will be created in Sidekiq asynchronously, and
|
|
|
|
the user will receive an e-mail with a link to it once
|
|
|
|
it's done.
|
|
|
|
LONG_DESC
|
|
|
|
def backup(username)
|
|
|
|
account = Account.find_local(username)
|
|
|
|
|
|
|
|
if account.nil?
|
|
|
|
say('No user with such username', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
backup = account.user.backups.create!
|
|
|
|
BackupWorker.perform_async(backup.id)
|
|
|
|
say('OK', :green)
|
|
|
|
end
|
|
|
|
|
2018-09-09 13:33:36 +02:00
|
|
|
option :dry_run, type: :boolean
|
|
|
|
desc 'cull', 'Remove remote accounts that no longer exist'
|
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Query every single remote account in the database to determine
|
|
|
|
if it still exists on the origin server, and if it doesn't,
|
|
|
|
remove it from the database.
|
|
|
|
|
|
|
|
Accounts that have had confirmed activity within the last week
|
|
|
|
are excluded from the checks.
|
|
|
|
|
2018-10-27 22:56:16 +02:00
|
|
|
Domains that are unreachable are not checked.
|
2018-09-09 13:33:36 +02:00
|
|
|
|
|
|
|
With the --dry-run option, no deletes will actually be carried
|
|
|
|
out.
|
|
|
|
LONG_DESC
|
|
|
|
def cull
|
2018-10-27 22:56:16 +02:00
|
|
|
skip_threshold = 7.days.ago
|
|
|
|
culled = 0
|
|
|
|
skip_domains = Set.new
|
|
|
|
dry_run = options[:dry_run] ? ' (DRY RUN)' : ''
|
2018-09-09 13:33:36 +02:00
|
|
|
|
|
|
|
Account.remote.where(protocol: :activitypub).partitioned.find_each do |account|
|
2018-10-22 16:58:08 +02:00
|
|
|
next if account.updated_at >= skip_threshold || (account.last_webfingered_at.present? && account.last_webfingered_at >= skip_threshold)
|
2018-09-09 13:33:36 +02:00
|
|
|
|
2018-10-27 22:56:16 +02:00
|
|
|
unless skip_domains.include?(account.domain)
|
2018-09-09 13:33:36 +02:00
|
|
|
begin
|
|
|
|
code = Request.new(:head, account.uri).perform(&:code)
|
|
|
|
rescue HTTP::ConnectionError
|
2018-10-27 22:56:16 +02:00
|
|
|
skip_domains << account.domain
|
2018-09-09 13:33:36 +02:00
|
|
|
rescue StandardError
|
|
|
|
next
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-10-21 22:52:27 +02:00
|
|
|
if [404, 410].include?(code)
|
2018-09-09 13:33:36 +02:00
|
|
|
unless options[:dry_run]
|
|
|
|
SuspendAccountService.new.call(account)
|
|
|
|
account.destroy
|
|
|
|
end
|
|
|
|
|
|
|
|
culled += 1
|
2018-11-20 22:25:32 +01:00
|
|
|
say('+', :green, false)
|
2018-09-09 13:33:36 +02:00
|
|
|
else
|
2018-11-20 22:25:32 +01:00
|
|
|
account.touch # Touch account even during dry run to avoid getting the account into the window again
|
2018-09-09 13:33:36 +02:00
|
|
|
say('.', nil, false)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
say
|
2018-10-27 22:56:16 +02:00
|
|
|
say("Removed #{culled} accounts. #{skip_domains.size} servers skipped#{dry_run}", skip_domains.empty? ? :green : :yellow)
|
2018-09-09 13:33:36 +02:00
|
|
|
|
2018-10-27 22:56:16 +02:00
|
|
|
unless skip_domains.empty?
|
|
|
|
say('The following servers were not available during the check:', :yellow)
|
|
|
|
skip_domains.each { |domain| say(' ' + domain) }
|
2018-09-09 13:33:36 +02:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-09-14 17:42:22 +02:00
|
|
|
option :all, type: :boolean
|
|
|
|
option :domain
|
|
|
|
desc 'refresh [USERNAME]', 'Fetch remote user data and files'
|
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Fetch remote user data and files for one or multiple accounts.
|
|
|
|
|
|
|
|
With the --all option, all remote accounts will be processed.
|
|
|
|
Through the --domain option, this can be narrowed down to a
|
|
|
|
specific domain only. Otherwise, a single remote account must
|
|
|
|
be specified with USERNAME.
|
|
|
|
|
|
|
|
All processing is done in the background through Sidekiq.
|
|
|
|
LONG_DESC
|
|
|
|
def refresh(username = nil)
|
|
|
|
if options[:domain] || options[:all]
|
|
|
|
queued = 0
|
|
|
|
scope = Account.remote
|
|
|
|
scope = scope.where(domain: options[:domain]) if options[:domain]
|
|
|
|
|
|
|
|
scope.select(:id).reorder(nil).find_in_batches do |accounts|
|
|
|
|
Maintenance::RedownloadAccountMediaWorker.push_bulk(accounts.map(&:id))
|
|
|
|
queued += accounts.size
|
|
|
|
end
|
|
|
|
|
|
|
|
say("Scheduled refreshment of #{queued} accounts", :green, true)
|
|
|
|
elsif username.present?
|
|
|
|
username, domain = username.split('@')
|
|
|
|
account = Account.find_remote(username, domain)
|
|
|
|
|
|
|
|
if account.nil?
|
|
|
|
say('No such account', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
Maintenance::RedownloadAccountMediaWorker.perform_async(account.id)
|
|
|
|
say('OK', :green)
|
|
|
|
else
|
|
|
|
say('No account(s) given', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-08-26 20:21:03 +02:00
|
|
|
private
|
|
|
|
|
|
|
|
def rotate_keys_for_account(account, delay = 0)
|
2018-09-14 17:42:22 +02:00
|
|
|
if account.nil?
|
|
|
|
say('No such account', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
2018-08-26 20:21:03 +02:00
|
|
|
old_key = account.private_key
|
2018-12-18 01:22:29 +01:00
|
|
|
new_key = OpenSSL::PKey::RSA.new(2048)
|
|
|
|
account.update(private_key: new_key.to_pem, public_key: new_key.public_key.to_pem)
|
2018-08-26 20:21:03 +02:00
|
|
|
ActivityPub::UpdateDistributionWorker.perform_in(delay, account.id, sign_with: old_key)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|