2019-07-15 14:19:57 +02:00
|
|
|
# Copyright 2019 Matrix.org Foundation C.I.C.
|
2019-07-01 18:55:26 +02:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2019-07-15 14:43:25 +02:00
|
|
|
import argparse
|
2020-09-08 13:33:48 +02:00
|
|
|
import json
|
2019-07-01 18:55:26 +02:00
|
|
|
import logging
|
2019-07-15 15:15:22 +02:00
|
|
|
import os
|
2019-07-01 18:55:26 +02:00
|
|
|
import sys
|
2019-07-15 15:15:22 +02:00
|
|
|
import tempfile
|
2021-11-10 21:06:54 +01:00
|
|
|
from typing import List, Optional
|
2019-07-15 15:15:22 +02:00
|
|
|
|
2019-07-01 18:55:26 +02:00
|
|
|
from twisted.internet import defer, task
|
|
|
|
|
|
|
|
import synapse
|
|
|
|
from synapse.app import _base
|
|
|
|
from synapse.config._base import ConfigError
|
|
|
|
from synapse.config.homeserver import HomeServerConfig
|
|
|
|
from synapse.config.logger import setup_logging
|
2021-11-10 21:06:54 +01:00
|
|
|
from synapse.events import EventBase
|
2019-07-15 15:15:22 +02:00
|
|
|
from synapse.handlers.admin import ExfiltrationWriter
|
2019-07-01 18:55:26 +02:00
|
|
|
from synapse.server import HomeServer
|
2022-07-11 15:14:09 +02:00
|
|
|
from synapse.storage.database import DatabasePool, LoggingDatabaseConnection
|
2022-07-21 19:56:45 +02:00
|
|
|
from synapse.storage.databases.main.account_data import AccountDataWorkerStore
|
|
|
|
from synapse.storage.databases.main.appservice import (
|
|
|
|
ApplicationServiceTransactionWorkerStore,
|
|
|
|
ApplicationServiceWorkerStore,
|
|
|
|
)
|
|
|
|
from synapse.storage.databases.main.deviceinbox import DeviceInboxWorkerStore
|
2022-11-11 11:51:49 +01:00
|
|
|
from synapse.storage.databases.main.devices import DeviceWorkerStore
|
|
|
|
from synapse.storage.databases.main.event_federation import EventFederationWorkerStore
|
|
|
|
from synapse.storage.databases.main.event_push_actions import (
|
|
|
|
EventPushActionsWorkerStore,
|
|
|
|
)
|
|
|
|
from synapse.storage.databases.main.events_worker import EventsWorkerStore
|
|
|
|
from synapse.storage.databases.main.filtering import FilteringWorkerStore
|
|
|
|
from synapse.storage.databases.main.push_rule import PushRulesWorkerStore
|
2022-07-21 19:56:45 +02:00
|
|
|
from synapse.storage.databases.main.receipts import ReceiptsWorkerStore
|
|
|
|
from synapse.storage.databases.main.registration import RegistrationWorkerStore
|
2022-11-11 11:51:49 +01:00
|
|
|
from synapse.storage.databases.main.relations import RelationsWorkerStore
|
2021-10-18 17:14:12 +02:00
|
|
|
from synapse.storage.databases.main.room import RoomWorkerStore
|
2022-11-11 11:51:49 +01:00
|
|
|
from synapse.storage.databases.main.roommember import RoomMemberWorkerStore
|
|
|
|
from synapse.storage.databases.main.signatures import SignatureWorkerStore
|
|
|
|
from synapse.storage.databases.main.state import StateGroupWorkerStore
|
|
|
|
from synapse.storage.databases.main.stream import StreamWorkerStore
|
2022-07-21 19:56:45 +02:00
|
|
|
from synapse.storage.databases.main.tags import TagsWorkerStore
|
2022-11-11 11:51:49 +01:00
|
|
|
from synapse.storage.databases.main.user_erasure_store import UserErasureWorkerStore
|
2021-11-10 21:06:54 +01:00
|
|
|
from synapse.types import StateMap
|
2022-06-07 16:24:11 +02:00
|
|
|
from synapse.util import SYNAPSE_VERSION
|
2019-07-01 18:55:26 +02:00
|
|
|
from synapse.util.logcontext import LoggingContext
|
|
|
|
|
|
|
|
logger = logging.getLogger("synapse.app.admin_cmd")
|
|
|
|
|
|
|
|
|
|
|
|
class AdminCmdSlavedStore(
|
2022-11-11 11:51:49 +01:00
|
|
|
FilteringWorkerStore,
|
|
|
|
DeviceWorkerStore,
|
2022-07-21 19:56:45 +02:00
|
|
|
TagsWorkerStore,
|
|
|
|
DeviceInboxWorkerStore,
|
|
|
|
AccountDataWorkerStore,
|
2022-11-11 11:51:49 +01:00
|
|
|
PushRulesWorkerStore,
|
2022-07-21 19:56:45 +02:00
|
|
|
ApplicationServiceTransactionWorkerStore,
|
|
|
|
ApplicationServiceWorkerStore,
|
2022-11-11 11:51:49 +01:00
|
|
|
RoomMemberWorkerStore,
|
|
|
|
RelationsWorkerStore,
|
|
|
|
EventFederationWorkerStore,
|
|
|
|
EventPushActionsWorkerStore,
|
|
|
|
StateGroupWorkerStore,
|
|
|
|
SignatureWorkerStore,
|
|
|
|
UserErasureWorkerStore,
|
2022-07-21 19:56:45 +02:00
|
|
|
ReceiptsWorkerStore,
|
2022-11-11 11:51:49 +01:00
|
|
|
StreamWorkerStore,
|
|
|
|
EventsWorkerStore,
|
|
|
|
RegistrationWorkerStore,
|
2021-10-18 17:14:12 +02:00
|
|
|
RoomWorkerStore,
|
2019-07-01 18:55:26 +02:00
|
|
|
):
|
2022-07-11 15:14:09 +02:00
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
database: DatabasePool,
|
|
|
|
db_conn: LoggingDatabaseConnection,
|
|
|
|
hs: "HomeServer",
|
|
|
|
):
|
|
|
|
super().__init__(database, db_conn, hs)
|
|
|
|
|
|
|
|
# Annoyingly `filter_events_for_client` assumes that this exists. We
|
|
|
|
# should refactor it to take a `Clock` directly.
|
|
|
|
self.clock = hs.get_clock()
|
2019-07-01 18:55:26 +02:00
|
|
|
|
|
|
|
|
|
|
|
class AdminCmdServer(HomeServer):
|
2021-11-10 21:06:54 +01:00
|
|
|
DATASTORE_CLASS = AdminCmdSlavedStore # type: ignore
|
2019-07-01 18:55:26 +02:00
|
|
|
|
|
|
|
|
2021-11-10 21:06:54 +01:00
|
|
|
async def export_data_command(hs: HomeServer, args: argparse.Namespace) -> None:
|
|
|
|
"""Export data for a user."""
|
2019-07-01 18:55:26 +02:00
|
|
|
|
2019-07-15 14:49:18 +02:00
|
|
|
user_id = args.user_id
|
|
|
|
directory = args.output_directory
|
|
|
|
|
2020-10-09 13:24:34 +02:00
|
|
|
res = await hs.get_admin_handler().export_user_data(
|
2020-09-02 13:44:50 +02:00
|
|
|
user_id, FileExfiltrationWriter(user_id, directory=directory)
|
2019-07-01 18:55:26 +02:00
|
|
|
)
|
|
|
|
print(res)
|
|
|
|
|
|
|
|
|
2019-07-15 15:15:22 +02:00
|
|
|
class FileExfiltrationWriter(ExfiltrationWriter):
|
|
|
|
"""An ExfiltrationWriter that writes the users data to a directory.
|
|
|
|
Returns the directory location on completion.
|
|
|
|
|
|
|
|
Note: This writes to disk on the main reactor thread.
|
|
|
|
|
|
|
|
Args:
|
2021-11-10 21:06:54 +01:00
|
|
|
user_id: The user whose data is being exfiltrated.
|
|
|
|
directory: The directory to write the data to, if None then will write
|
|
|
|
to a temporary directory.
|
2019-07-15 15:15:22 +02:00
|
|
|
"""
|
|
|
|
|
2021-11-10 21:06:54 +01:00
|
|
|
def __init__(self, user_id: str, directory: Optional[str] = None):
|
2019-07-15 15:15:22 +02:00
|
|
|
self.user_id = user_id
|
|
|
|
|
|
|
|
if directory:
|
|
|
|
self.base_directory = directory
|
|
|
|
else:
|
|
|
|
self.base_directory = tempfile.mkdtemp(
|
|
|
|
prefix="synapse-exfiltrate__%s__" % (user_id,)
|
|
|
|
)
|
|
|
|
|
|
|
|
os.makedirs(self.base_directory, exist_ok=True)
|
|
|
|
if list(os.listdir(self.base_directory)):
|
|
|
|
raise Exception("Directory must be empty")
|
|
|
|
|
2021-11-10 21:06:54 +01:00
|
|
|
def write_events(self, room_id: str, events: List[EventBase]) -> None:
|
2019-07-15 15:15:22 +02:00
|
|
|
room_directory = os.path.join(self.base_directory, "rooms", room_id)
|
|
|
|
os.makedirs(room_directory, exist_ok=True)
|
|
|
|
events_file = os.path.join(room_directory, "events")
|
|
|
|
|
|
|
|
with open(events_file, "a") as f:
|
|
|
|
for event in events:
|
|
|
|
print(json.dumps(event.get_pdu_json()), file=f)
|
|
|
|
|
2021-11-10 21:06:54 +01:00
|
|
|
def write_state(
|
|
|
|
self, room_id: str, event_id: str, state: StateMap[EventBase]
|
|
|
|
) -> None:
|
2019-07-15 15:15:22 +02:00
|
|
|
room_directory = os.path.join(self.base_directory, "rooms", room_id)
|
|
|
|
state_directory = os.path.join(room_directory, "state")
|
|
|
|
os.makedirs(state_directory, exist_ok=True)
|
|
|
|
|
|
|
|
event_file = os.path.join(state_directory, event_id)
|
|
|
|
|
|
|
|
with open(event_file, "a") as f:
|
|
|
|
for event in state.values():
|
|
|
|
print(json.dumps(event.get_pdu_json()), file=f)
|
|
|
|
|
2021-11-10 21:06:54 +01:00
|
|
|
def write_invite(
|
|
|
|
self, room_id: str, event: EventBase, state: StateMap[EventBase]
|
|
|
|
) -> None:
|
2019-07-15 15:15:22 +02:00
|
|
|
self.write_events(room_id, [event])
|
|
|
|
|
|
|
|
# We write the invite state somewhere else as they aren't full events
|
|
|
|
# and are only a subset of the state at the event.
|
|
|
|
room_directory = os.path.join(self.base_directory, "rooms", room_id)
|
|
|
|
os.makedirs(room_directory, exist_ok=True)
|
|
|
|
|
|
|
|
invite_state = os.path.join(room_directory, "invite_state")
|
|
|
|
|
|
|
|
with open(invite_state, "a") as f:
|
|
|
|
for event in state.values():
|
|
|
|
print(json.dumps(event), file=f)
|
|
|
|
|
2021-11-10 21:06:54 +01:00
|
|
|
def write_knock(
|
|
|
|
self, room_id: str, event: EventBase, state: StateMap[EventBase]
|
|
|
|
) -> None:
|
2021-10-28 19:54:38 +02:00
|
|
|
self.write_events(room_id, [event])
|
|
|
|
|
|
|
|
# We write the knock state somewhere else as they aren't full events
|
|
|
|
# and are only a subset of the state at the event.
|
|
|
|
room_directory = os.path.join(self.base_directory, "rooms", room_id)
|
|
|
|
os.makedirs(room_directory, exist_ok=True)
|
|
|
|
|
|
|
|
knock_state = os.path.join(room_directory, "knock_state")
|
|
|
|
|
|
|
|
with open(knock_state, "a") as f:
|
|
|
|
for event in state.values():
|
|
|
|
print(json.dumps(event), file=f)
|
|
|
|
|
2021-11-10 21:06:54 +01:00
|
|
|
def finished(self) -> str:
|
2019-07-15 15:15:22 +02:00
|
|
|
return self.base_directory
|
|
|
|
|
|
|
|
|
2021-11-10 21:06:54 +01:00
|
|
|
def start(config_options: List[str]) -> None:
|
2019-07-15 14:43:25 +02:00
|
|
|
parser = argparse.ArgumentParser(description="Synapse Admin Command")
|
|
|
|
HomeServerConfig.add_arguments_to_parser(parser)
|
2019-07-01 18:55:26 +02:00
|
|
|
|
|
|
|
subparser = parser.add_subparsers(
|
|
|
|
title="Admin Commands",
|
|
|
|
required=True,
|
|
|
|
dest="command",
|
|
|
|
metavar="<admin_command>",
|
|
|
|
help="The admin command to perform.",
|
|
|
|
)
|
|
|
|
export_data_parser = subparser.add_parser(
|
|
|
|
"export-data", help="Export all data for a user"
|
|
|
|
)
|
|
|
|
export_data_parser.add_argument("user_id", help="User to extra data from")
|
|
|
|
export_data_parser.add_argument(
|
|
|
|
"--output-directory",
|
|
|
|
action="store",
|
|
|
|
metavar="DIRECTORY",
|
|
|
|
required=False,
|
2019-07-16 10:52:56 +02:00
|
|
|
help="The directory to store the exported data in. Must be empty. Defaults"
|
2019-07-01 18:55:26 +02:00
|
|
|
" to creating a temp directory.",
|
|
|
|
)
|
2019-07-15 14:49:18 +02:00
|
|
|
export_data_parser.set_defaults(func=export_data_command)
|
2019-07-01 18:55:26 +02:00
|
|
|
|
|
|
|
try:
|
|
|
|
config, args = HomeServerConfig.load_config_with_parser(parser, config_options)
|
|
|
|
except ConfigError as e:
|
|
|
|
sys.stderr.write("\n" + str(e) + "\n")
|
|
|
|
sys.exit(1)
|
|
|
|
|
2021-09-13 19:07:12 +02:00
|
|
|
if config.worker.worker_app is not None:
|
|
|
|
assert config.worker.worker_app == "synapse.app.admin_cmd"
|
2019-07-01 18:55:26 +02:00
|
|
|
|
|
|
|
# Update the config with some basic overrides so that don't have to specify
|
|
|
|
# a full worker config.
|
2021-09-13 19:07:12 +02:00
|
|
|
config.worker.worker_app = "synapse.app.admin_cmd"
|
2019-07-01 18:55:26 +02:00
|
|
|
|
2021-10-18 17:14:12 +02:00
|
|
|
if not config.worker.worker_daemonize and not config.worker.worker_log_config:
|
2019-07-01 18:55:26 +02:00
|
|
|
# Since we're meant to be run as a "command" let's not redirect stdio
|
|
|
|
# unless we've actually set log config.
|
2021-09-23 18:03:01 +02:00
|
|
|
config.logging.no_redirect_stdio = True
|
2019-07-01 18:55:26 +02:00
|
|
|
|
|
|
|
# Explicitly disable background processes
|
2022-05-10 12:08:45 +02:00
|
|
|
config.worker.should_update_user_directory = False
|
2021-09-13 19:07:12 +02:00
|
|
|
config.worker.run_background_tasks = False
|
2021-10-06 16:47:41 +02:00
|
|
|
config.worker.start_pushers = False
|
2021-10-18 17:14:12 +02:00
|
|
|
config.worker.pusher_shard_config.instances = []
|
2021-10-06 16:47:41 +02:00
|
|
|
config.worker.send_federation = False
|
2021-10-18 17:14:12 +02:00
|
|
|
config.worker.federation_shard_config.instances = []
|
2019-07-01 18:55:26 +02:00
|
|
|
|
2021-09-29 12:44:15 +02:00
|
|
|
synapse.events.USE_FROZEN_DICTS = config.server.use_frozen_dicts
|
2019-07-01 18:55:26 +02:00
|
|
|
|
|
|
|
ss = AdminCmdServer(
|
2021-09-13 19:07:12 +02:00
|
|
|
config.server.server_name,
|
2019-07-01 18:55:26 +02:00
|
|
|
config=config,
|
2022-06-07 16:24:11 +02:00
|
|
|
version_string=f"Synapse/{SYNAPSE_VERSION}",
|
2019-07-01 18:55:26 +02:00
|
|
|
)
|
|
|
|
|
2019-08-28 13:18:53 +02:00
|
|
|
setup_logging(ss, config, use_worker_options=True)
|
|
|
|
|
2019-07-01 18:55:26 +02:00
|
|
|
ss.setup()
|
|
|
|
|
|
|
|
# We use task.react as the basic run command as it correctly handles tearing
|
|
|
|
# down the reactor when the deferreds resolve and setting the return value.
|
|
|
|
# We also make sure that `_base.start` gets run before we actually run the
|
|
|
|
# command.
|
|
|
|
|
2021-11-10 21:06:54 +01:00
|
|
|
async def run() -> None:
|
2019-07-01 18:55:26 +02:00
|
|
|
with LoggingContext("command"):
|
2021-10-18 17:14:12 +02:00
|
|
|
await _base.start(ss)
|
2020-09-02 13:44:50 +02:00
|
|
|
await args.func(ss, args)
|
2019-07-01 18:55:26 +02:00
|
|
|
|
|
|
|
_base.start_worker_reactor(
|
2020-09-02 13:44:50 +02:00
|
|
|
"synapse-admin-cmd",
|
|
|
|
config,
|
|
|
|
run_command=lambda: task.react(lambda _reactor: defer.ensureDeferred(run())),
|
2019-07-01 18:55:26 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == "__main__":
|
|
|
|
with LoggingContext("main"):
|
|
|
|
start(sys.argv[1:])
|