2019-07-15 06:19:57 -06:00
|
|
|
# Copyright 2019 Matrix.org Foundation C.I.C.
|
2019-07-01 10:55:26 -06:00
|
|
|
#
|
|
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
# you may not use this file except in compliance with the License.
|
|
|
|
# You may obtain a copy of the License at
|
|
|
|
#
|
|
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
#
|
|
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
# See the License for the specific language governing permissions and
|
|
|
|
# limitations under the License.
|
2019-07-15 06:43:25 -06:00
|
|
|
import argparse
|
2020-09-08 05:33:48 -06:00
|
|
|
import json
|
2019-07-01 10:55:26 -06:00
|
|
|
import logging
|
2019-07-15 07:15:22 -06:00
|
|
|
import os
|
2019-07-01 10:55:26 -06:00
|
|
|
import sys
|
2019-07-15 07:15:22 -06:00
|
|
|
import tempfile
|
2023-09-18 07:55:04 -06:00
|
|
|
from typing import List, Mapping, Optional, Sequence
|
2019-07-15 07:15:22 -06:00
|
|
|
|
2019-07-01 10:55:26 -06:00
|
|
|
from twisted.internet import defer, task
|
|
|
|
|
|
|
|
import synapse
|
|
|
|
from synapse.app import _base
|
|
|
|
from synapse.config._base import ConfigError
|
|
|
|
from synapse.config.homeserver import HomeServerConfig
|
|
|
|
from synapse.config.logger import setup_logging
|
2021-11-10 13:06:54 -07:00
|
|
|
from synapse.events import EventBase
|
2019-07-15 07:15:22 -06:00
|
|
|
from synapse.handlers.admin import ExfiltrationWriter
|
2019-07-01 10:55:26 -06:00
|
|
|
from synapse.server import HomeServer
|
2022-07-11 07:14:09 -06:00
|
|
|
from synapse.storage.database import DatabasePool, LoggingDatabaseConnection
|
2022-07-21 11:56:45 -06:00
|
|
|
from synapse.storage.databases.main.account_data import AccountDataWorkerStore
|
|
|
|
from synapse.storage.databases.main.appservice import (
|
|
|
|
ApplicationServiceTransactionWorkerStore,
|
|
|
|
ApplicationServiceWorkerStore,
|
|
|
|
)
|
2023-02-01 08:45:19 -07:00
|
|
|
from synapse.storage.databases.main.client_ips import ClientIpWorkerStore
|
2022-07-21 11:56:45 -06:00
|
|
|
from synapse.storage.databases.main.deviceinbox import DeviceInboxWorkerStore
|
2022-11-11 03:51:49 -07:00
|
|
|
from synapse.storage.databases.main.devices import DeviceWorkerStore
|
|
|
|
from synapse.storage.databases.main.event_federation import EventFederationWorkerStore
|
|
|
|
from synapse.storage.databases.main.event_push_actions import (
|
|
|
|
EventPushActionsWorkerStore,
|
|
|
|
)
|
|
|
|
from synapse.storage.databases.main.events_worker import EventsWorkerStore
|
|
|
|
from synapse.storage.databases.main.filtering import FilteringWorkerStore
|
2023-02-23 11:14:17 -07:00
|
|
|
from synapse.storage.databases.main.media_repository import MediaRepositoryStore
|
2023-02-01 08:45:19 -07:00
|
|
|
from synapse.storage.databases.main.profile import ProfileWorkerStore
|
2022-11-11 03:51:49 -07:00
|
|
|
from synapse.storage.databases.main.push_rule import PushRulesWorkerStore
|
2022-07-21 11:56:45 -06:00
|
|
|
from synapse.storage.databases.main.receipts import ReceiptsWorkerStore
|
|
|
|
from synapse.storage.databases.main.registration import RegistrationWorkerStore
|
2022-11-11 03:51:49 -07:00
|
|
|
from synapse.storage.databases.main.relations import RelationsWorkerStore
|
2021-10-18 09:14:12 -06:00
|
|
|
from synapse.storage.databases.main.room import RoomWorkerStore
|
2022-11-11 03:51:49 -07:00
|
|
|
from synapse.storage.databases.main.roommember import RoomMemberWorkerStore
|
|
|
|
from synapse.storage.databases.main.signatures import SignatureWorkerStore
|
|
|
|
from synapse.storage.databases.main.state import StateGroupWorkerStore
|
|
|
|
from synapse.storage.databases.main.stream import StreamWorkerStore
|
2022-07-21 11:56:45 -06:00
|
|
|
from synapse.storage.databases.main.tags import TagsWorkerStore
|
2022-11-11 03:51:49 -07:00
|
|
|
from synapse.storage.databases.main.user_erasure_store import UserErasureWorkerStore
|
2023-09-18 07:55:04 -06:00
|
|
|
from synapse.types import JsonMapping, StateMap
|
2022-06-07 08:24:11 -06:00
|
|
|
from synapse.util import SYNAPSE_VERSION
|
2019-07-01 10:55:26 -06:00
|
|
|
from synapse.util.logcontext import LoggingContext
|
|
|
|
|
|
|
|
logger = logging.getLogger("synapse.app.admin_cmd")
|
|
|
|
|
|
|
|
|
2023-05-16 13:56:38 -06:00
|
|
|
class AdminCmdStore(
|
2022-11-11 03:51:49 -07:00
|
|
|
FilteringWorkerStore,
|
2023-02-01 08:45:19 -07:00
|
|
|
ClientIpWorkerStore,
|
2022-11-11 03:51:49 -07:00
|
|
|
DeviceWorkerStore,
|
2022-07-21 11:56:45 -06:00
|
|
|
TagsWorkerStore,
|
|
|
|
DeviceInboxWorkerStore,
|
|
|
|
AccountDataWorkerStore,
|
2022-11-11 03:51:49 -07:00
|
|
|
PushRulesWorkerStore,
|
2022-07-21 11:56:45 -06:00
|
|
|
ApplicationServiceTransactionWorkerStore,
|
|
|
|
ApplicationServiceWorkerStore,
|
2022-11-11 03:51:49 -07:00
|
|
|
RoomMemberWorkerStore,
|
|
|
|
RelationsWorkerStore,
|
|
|
|
EventFederationWorkerStore,
|
|
|
|
EventPushActionsWorkerStore,
|
|
|
|
StateGroupWorkerStore,
|
|
|
|
SignatureWorkerStore,
|
|
|
|
UserErasureWorkerStore,
|
2022-07-21 11:56:45 -06:00
|
|
|
ReceiptsWorkerStore,
|
2022-11-11 03:51:49 -07:00
|
|
|
StreamWorkerStore,
|
|
|
|
EventsWorkerStore,
|
|
|
|
RegistrationWorkerStore,
|
2021-10-18 09:14:12 -06:00
|
|
|
RoomWorkerStore,
|
2023-02-01 08:45:19 -07:00
|
|
|
ProfileWorkerStore,
|
2023-02-23 11:14:17 -07:00
|
|
|
MediaRepositoryStore,
|
2019-07-01 10:55:26 -06:00
|
|
|
):
|
2022-07-11 07:14:09 -06:00
|
|
|
def __init__(
|
|
|
|
self,
|
|
|
|
database: DatabasePool,
|
|
|
|
db_conn: LoggingDatabaseConnection,
|
|
|
|
hs: "HomeServer",
|
|
|
|
):
|
|
|
|
super().__init__(database, db_conn, hs)
|
|
|
|
|
|
|
|
# Annoyingly `filter_events_for_client` assumes that this exists. We
|
|
|
|
# should refactor it to take a `Clock` directly.
|
|
|
|
self.clock = hs.get_clock()
|
2019-07-01 10:55:26 -06:00
|
|
|
|
|
|
|
|
|
|
|
class AdminCmdServer(HomeServer):
|
2023-05-16 13:56:38 -06:00
|
|
|
DATASTORE_CLASS = AdminCmdStore # type: ignore
|
2019-07-01 10:55:26 -06:00
|
|
|
|
|
|
|
|
2021-11-10 13:06:54 -07:00
|
|
|
async def export_data_command(hs: HomeServer, args: argparse.Namespace) -> None:
|
|
|
|
"""Export data for a user."""
|
2019-07-01 10:55:26 -06:00
|
|
|
|
2019-07-15 06:49:18 -06:00
|
|
|
user_id = args.user_id
|
|
|
|
directory = args.output_directory
|
|
|
|
|
2020-10-09 05:24:34 -06:00
|
|
|
res = await hs.get_admin_handler().export_user_data(
|
2020-09-02 05:44:50 -06:00
|
|
|
user_id, FileExfiltrationWriter(user_id, directory=directory)
|
2019-07-01 10:55:26 -06:00
|
|
|
)
|
|
|
|
print(res)
|
|
|
|
|
|
|
|
|
2019-07-15 07:15:22 -06:00
|
|
|
class FileExfiltrationWriter(ExfiltrationWriter):
|
|
|
|
"""An ExfiltrationWriter that writes the users data to a directory.
|
|
|
|
Returns the directory location on completion.
|
|
|
|
|
|
|
|
Note: This writes to disk on the main reactor thread.
|
|
|
|
|
|
|
|
Args:
|
2021-11-10 13:06:54 -07:00
|
|
|
user_id: The user whose data is being exfiltrated.
|
|
|
|
directory: The directory to write the data to, if None then will write
|
|
|
|
to a temporary directory.
|
2019-07-15 07:15:22 -06:00
|
|
|
"""
|
|
|
|
|
2021-11-10 13:06:54 -07:00
|
|
|
def __init__(self, user_id: str, directory: Optional[str] = None):
|
2019-07-15 07:15:22 -06:00
|
|
|
self.user_id = user_id
|
|
|
|
|
|
|
|
if directory:
|
|
|
|
self.base_directory = directory
|
|
|
|
else:
|
|
|
|
self.base_directory = tempfile.mkdtemp(
|
|
|
|
prefix="synapse-exfiltrate__%s__" % (user_id,)
|
|
|
|
)
|
|
|
|
|
|
|
|
os.makedirs(self.base_directory, exist_ok=True)
|
|
|
|
if list(os.listdir(self.base_directory)):
|
|
|
|
raise Exception("Directory must be empty")
|
|
|
|
|
2021-11-10 13:06:54 -07:00
|
|
|
def write_events(self, room_id: str, events: List[EventBase]) -> None:
|
2019-07-15 07:15:22 -06:00
|
|
|
room_directory = os.path.join(self.base_directory, "rooms", room_id)
|
|
|
|
os.makedirs(room_directory, exist_ok=True)
|
|
|
|
events_file = os.path.join(room_directory, "events")
|
|
|
|
|
|
|
|
with open(events_file, "a") as f:
|
|
|
|
for event in events:
|
2023-02-22 12:29:39 -07:00
|
|
|
json.dump(event.get_pdu_json(), fp=f)
|
2019-07-15 07:15:22 -06:00
|
|
|
|
2021-11-10 13:06:54 -07:00
|
|
|
def write_state(
|
|
|
|
self, room_id: str, event_id: str, state: StateMap[EventBase]
|
|
|
|
) -> None:
|
2019-07-15 07:15:22 -06:00
|
|
|
room_directory = os.path.join(self.base_directory, "rooms", room_id)
|
|
|
|
state_directory = os.path.join(room_directory, "state")
|
|
|
|
os.makedirs(state_directory, exist_ok=True)
|
|
|
|
|
|
|
|
event_file = os.path.join(state_directory, event_id)
|
|
|
|
|
|
|
|
with open(event_file, "a") as f:
|
|
|
|
for event in state.values():
|
2023-02-22 12:29:39 -07:00
|
|
|
json.dump(event.get_pdu_json(), fp=f)
|
2019-07-15 07:15:22 -06:00
|
|
|
|
2021-11-10 13:06:54 -07:00
|
|
|
def write_invite(
|
|
|
|
self, room_id: str, event: EventBase, state: StateMap[EventBase]
|
|
|
|
) -> None:
|
2019-07-15 07:15:22 -06:00
|
|
|
self.write_events(room_id, [event])
|
|
|
|
|
|
|
|
# We write the invite state somewhere else as they aren't full events
|
|
|
|
# and are only a subset of the state at the event.
|
|
|
|
room_directory = os.path.join(self.base_directory, "rooms", room_id)
|
|
|
|
os.makedirs(room_directory, exist_ok=True)
|
|
|
|
|
|
|
|
invite_state = os.path.join(room_directory, "invite_state")
|
|
|
|
|
|
|
|
with open(invite_state, "a") as f:
|
|
|
|
for event in state.values():
|
2023-02-22 12:29:39 -07:00
|
|
|
json.dump(event, fp=f)
|
2019-07-15 07:15:22 -06:00
|
|
|
|
2021-11-10 13:06:54 -07:00
|
|
|
def write_knock(
|
|
|
|
self, room_id: str, event: EventBase, state: StateMap[EventBase]
|
|
|
|
) -> None:
|
2021-10-28 11:54:38 -06:00
|
|
|
self.write_events(room_id, [event])
|
|
|
|
|
|
|
|
# We write the knock state somewhere else as they aren't full events
|
|
|
|
# and are only a subset of the state at the event.
|
|
|
|
room_directory = os.path.join(self.base_directory, "rooms", room_id)
|
|
|
|
os.makedirs(room_directory, exist_ok=True)
|
|
|
|
|
|
|
|
knock_state = os.path.join(room_directory, "knock_state")
|
|
|
|
|
|
|
|
with open(knock_state, "a") as f:
|
|
|
|
for event in state.values():
|
2023-02-22 12:29:39 -07:00
|
|
|
json.dump(event, fp=f)
|
2021-10-28 11:54:38 -06:00
|
|
|
|
2023-09-18 07:55:04 -06:00
|
|
|
def write_profile(self, profile: JsonMapping) -> None:
|
2023-02-01 08:45:19 -07:00
|
|
|
user_directory = os.path.join(self.base_directory, "user_data")
|
|
|
|
os.makedirs(user_directory, exist_ok=True)
|
|
|
|
profile_file = os.path.join(user_directory, "profile")
|
|
|
|
|
|
|
|
with open(profile_file, "a") as f:
|
2023-02-22 12:29:39 -07:00
|
|
|
json.dump(profile, fp=f)
|
2023-02-01 08:45:19 -07:00
|
|
|
|
2023-09-18 07:55:04 -06:00
|
|
|
def write_devices(self, devices: Sequence[JsonMapping]) -> None:
|
2023-02-01 08:45:19 -07:00
|
|
|
user_directory = os.path.join(self.base_directory, "user_data")
|
|
|
|
os.makedirs(user_directory, exist_ok=True)
|
|
|
|
device_file = os.path.join(user_directory, "devices")
|
|
|
|
|
|
|
|
for device in devices:
|
|
|
|
with open(device_file, "a") as f:
|
2023-02-22 12:29:39 -07:00
|
|
|
json.dump(device, fp=f)
|
2023-02-01 08:45:19 -07:00
|
|
|
|
2023-09-18 07:55:04 -06:00
|
|
|
def write_connections(self, connections: Sequence[JsonMapping]) -> None:
|
2023-02-01 08:45:19 -07:00
|
|
|
user_directory = os.path.join(self.base_directory, "user_data")
|
|
|
|
os.makedirs(user_directory, exist_ok=True)
|
|
|
|
connection_file = os.path.join(user_directory, "connections")
|
|
|
|
|
|
|
|
for connection in connections:
|
|
|
|
with open(connection_file, "a") as f:
|
2023-02-22 12:29:39 -07:00
|
|
|
json.dump(connection, fp=f)
|
2023-02-01 08:45:19 -07:00
|
|
|
|
2023-02-17 06:54:55 -07:00
|
|
|
def write_account_data(
|
2023-09-18 07:55:04 -06:00
|
|
|
self, file_name: str, account_data: Mapping[str, JsonMapping]
|
2023-02-17 06:54:55 -07:00
|
|
|
) -> None:
|
|
|
|
account_data_directory = os.path.join(
|
|
|
|
self.base_directory, "user_data", "account_data"
|
|
|
|
)
|
|
|
|
os.makedirs(account_data_directory, exist_ok=True)
|
|
|
|
|
|
|
|
account_data_file = os.path.join(account_data_directory, file_name)
|
|
|
|
|
|
|
|
with open(account_data_file, "a") as f:
|
2023-02-22 12:29:39 -07:00
|
|
|
json.dump(account_data, fp=f)
|
2023-02-17 06:54:55 -07:00
|
|
|
|
2023-09-18 07:55:04 -06:00
|
|
|
def write_media_id(self, media_id: str, media_metadata: JsonMapping) -> None:
|
2023-02-23 11:14:17 -07:00
|
|
|
file_directory = os.path.join(self.base_directory, "media_ids")
|
|
|
|
os.makedirs(file_directory, exist_ok=True)
|
|
|
|
media_id_file = os.path.join(file_directory, media_id)
|
|
|
|
|
|
|
|
with open(media_id_file, "w") as f:
|
|
|
|
json.dump(media_metadata, fp=f)
|
|
|
|
|
2021-11-10 13:06:54 -07:00
|
|
|
def finished(self) -> str:
|
2019-07-15 07:15:22 -06:00
|
|
|
return self.base_directory
|
|
|
|
|
|
|
|
|
2021-11-10 13:06:54 -07:00
|
|
|
def start(config_options: List[str]) -> None:
|
2019-07-15 06:43:25 -06:00
|
|
|
parser = argparse.ArgumentParser(description="Synapse Admin Command")
|
|
|
|
HomeServerConfig.add_arguments_to_parser(parser)
|
2019-07-01 10:55:26 -06:00
|
|
|
|
|
|
|
subparser = parser.add_subparsers(
|
|
|
|
title="Admin Commands",
|
|
|
|
required=True,
|
|
|
|
dest="command",
|
|
|
|
metavar="<admin_command>",
|
|
|
|
help="The admin command to perform.",
|
|
|
|
)
|
|
|
|
export_data_parser = subparser.add_parser(
|
|
|
|
"export-data", help="Export all data for a user"
|
|
|
|
)
|
|
|
|
export_data_parser.add_argument("user_id", help="User to extra data from")
|
|
|
|
export_data_parser.add_argument(
|
|
|
|
"--output-directory",
|
|
|
|
action="store",
|
|
|
|
metavar="DIRECTORY",
|
|
|
|
required=False,
|
2019-07-16 02:52:56 -06:00
|
|
|
help="The directory to store the exported data in. Must be empty. Defaults"
|
2019-07-01 10:55:26 -06:00
|
|
|
" to creating a temp directory.",
|
|
|
|
)
|
2019-07-15 06:49:18 -06:00
|
|
|
export_data_parser.set_defaults(func=export_data_command)
|
2019-07-01 10:55:26 -06:00
|
|
|
|
|
|
|
try:
|
|
|
|
config, args = HomeServerConfig.load_config_with_parser(parser, config_options)
|
|
|
|
except ConfigError as e:
|
|
|
|
sys.stderr.write("\n" + str(e) + "\n")
|
|
|
|
sys.exit(1)
|
|
|
|
|
2021-09-13 11:07:12 -06:00
|
|
|
if config.worker.worker_app is not None:
|
|
|
|
assert config.worker.worker_app == "synapse.app.admin_cmd"
|
2019-07-01 10:55:26 -06:00
|
|
|
|
|
|
|
# Update the config with some basic overrides so that don't have to specify
|
|
|
|
# a full worker config.
|
2021-09-13 11:07:12 -06:00
|
|
|
config.worker.worker_app = "synapse.app.admin_cmd"
|
2019-07-01 10:55:26 -06:00
|
|
|
|
2021-10-18 09:14:12 -06:00
|
|
|
if not config.worker.worker_daemonize and not config.worker.worker_log_config:
|
2019-07-01 10:55:26 -06:00
|
|
|
# Since we're meant to be run as a "command" let's not redirect stdio
|
|
|
|
# unless we've actually set log config.
|
2021-09-23 10:03:01 -06:00
|
|
|
config.logging.no_redirect_stdio = True
|
2019-07-01 10:55:26 -06:00
|
|
|
|
|
|
|
# Explicitly disable background processes
|
2022-05-10 04:08:45 -06:00
|
|
|
config.worker.should_update_user_directory = False
|
2021-09-13 11:07:12 -06:00
|
|
|
config.worker.run_background_tasks = False
|
2021-10-06 08:47:41 -06:00
|
|
|
config.worker.start_pushers = False
|
2021-10-18 09:14:12 -06:00
|
|
|
config.worker.pusher_shard_config.instances = []
|
2021-10-06 08:47:41 -06:00
|
|
|
config.worker.send_federation = False
|
2021-10-18 09:14:12 -06:00
|
|
|
config.worker.federation_shard_config.instances = []
|
2019-07-01 10:55:26 -06:00
|
|
|
|
2021-09-29 04:44:15 -06:00
|
|
|
synapse.events.USE_FROZEN_DICTS = config.server.use_frozen_dicts
|
2019-07-01 10:55:26 -06:00
|
|
|
|
|
|
|
ss = AdminCmdServer(
|
2021-09-13 11:07:12 -06:00
|
|
|
config.server.server_name,
|
2019-07-01 10:55:26 -06:00
|
|
|
config=config,
|
2022-06-07 08:24:11 -06:00
|
|
|
version_string=f"Synapse/{SYNAPSE_VERSION}",
|
2019-07-01 10:55:26 -06:00
|
|
|
)
|
|
|
|
|
2019-08-28 05:18:53 -06:00
|
|
|
setup_logging(ss, config, use_worker_options=True)
|
|
|
|
|
2019-07-01 10:55:26 -06:00
|
|
|
ss.setup()
|
|
|
|
|
|
|
|
# We use task.react as the basic run command as it correctly handles tearing
|
|
|
|
# down the reactor when the deferreds resolve and setting the return value.
|
|
|
|
# We also make sure that `_base.start` gets run before we actually run the
|
|
|
|
# command.
|
|
|
|
|
2021-11-10 13:06:54 -07:00
|
|
|
async def run() -> None:
|
2019-07-01 10:55:26 -06:00
|
|
|
with LoggingContext("command"):
|
2021-10-18 09:14:12 -06:00
|
|
|
await _base.start(ss)
|
2020-09-02 05:44:50 -06:00
|
|
|
await args.func(ss, args)
|
2019-07-01 10:55:26 -06:00
|
|
|
|
|
|
|
_base.start_worker_reactor(
|
2020-09-02 05:44:50 -06:00
|
|
|
"synapse-admin-cmd",
|
|
|
|
config,
|
|
|
|
run_command=lambda: task.react(lambda _reactor: defer.ensureDeferred(run())),
|
2019-07-01 10:55:26 -06:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == "__main__":
|
|
|
|
with LoggingContext("main"):
|
|
|
|
start(sys.argv[1:])
|