Files
mattermost/mattermost.go

466 lines
13 KiB
Go
Raw Normal View History

// Copyright (c) 2015 Mattermost, Inc. All Rights Reserved.
2015-06-14 23:53:32 -08:00
// See License.txt for license information.
package main
import (
"flag"
"fmt"
2015-10-05 17:33:45 -07:00
"io/ioutil"
"net/http"
2015-10-07 08:58:56 -07:00
"net/url"
2015-09-04 11:59:10 -07:00
"os"
"os/signal"
2015-10-01 13:02:04 -07:00
"runtime"
"strconv"
2015-09-04 11:59:10 -07:00
"strings"
"syscall"
"time"
l4g "code.google.com/p/log4go"
2015-06-14 23:53:32 -08:00
"github.com/mattermost/platform/api"
"github.com/mattermost/platform/manualtesting"
2015-09-04 11:59:10 -07:00
"github.com/mattermost/platform/model"
2015-06-14 23:53:32 -08:00
"github.com/mattermost/platform/utils"
"github.com/mattermost/platform/web"
)
2015-09-04 11:59:10 -07:00
var flagCmdCreateTeam bool
var flagCmdCreateUser bool
var flagCmdAssignRole bool
var flagCmdVersion bool
2015-09-04 11:59:10 -07:00
var flagCmdResetPassword bool
var flagConfigFile string
var flagEmail string
var flagPassword string
var flagTeamName string
var flagRole string
var flagRunCmds bool
2015-06-14 23:53:32 -08:00
2015-09-04 11:59:10 -07:00
func main() {
2015-06-14 23:53:32 -08:00
2015-09-04 11:59:10 -07:00
parseCmds()
2015-06-14 23:53:32 -08:00
2015-09-04 11:59:10 -07:00
utils.LoadConfig(flagConfigFile)
2015-09-04 11:59:10 -07:00
if flagRunCmds {
utils.ConfigureCmdLineLog()
}
2015-09-04 11:59:10 -07:00
pwd, _ := os.Getwd()
2015-09-17 13:01:40 -07:00
l4g.Info("Current version is %v (%v/%v/%v)", model.CurrentVersion, model.BuildNumber, model.BuildDate, model.BuildHash)
2015-09-04 11:59:10 -07:00
l4g.Info("Current working directory is %v", pwd)
l4g.Info("Loaded config file from %v", utils.FindConfigFile(flagConfigFile))
2015-06-14 23:53:32 -08:00
api.NewServer()
api.InitApi()
web.InitWeb()
2015-09-04 11:59:10 -07:00
if flagRunCmds {
runCmds()
} else {
api.StartServer()
// If we allow testing then listen for manual testing URL hits
if utils.Cfg.ServiceSettings.EnableTesting {
2015-09-04 11:59:10 -07:00
manualtesting.InitManualTesting()
}
runSecurityAndDiagnosticsJobAndForget()
2015-10-01 13:02:04 -07:00
2015-09-04 11:59:10 -07:00
// wait for kill signal before attempting to gracefully shutdown
// the running service
c := make(chan os.Signal)
signal.Notify(c, os.Interrupt, syscall.SIGINT, syscall.SIGTERM)
<-c
api.StopServer()
}
}
func runSecurityAndDiagnosticsJobAndForget() {
2015-10-01 13:02:04 -07:00
go func() {
for {
2015-10-12 10:57:39 -07:00
if *utils.Cfg.ServiceSettings.EnableSecurityFixAlert {
2015-10-01 13:02:04 -07:00
if result := <-api.Srv.Store.System().Get(); result.Err == nil {
props := result.Data.(model.StringMap)
2015-10-15 11:16:26 -07:00
lastSecurityTime, _ := strconv.ParseInt(props[model.SYSTEM_LAST_SECURITY_TIME], 10, 0)
2015-10-01 13:02:04 -07:00
currentTime := model.GetMillis()
if (currentTime - lastSecurityTime) > 1000*60*60*24*1 {
l4g.Debug("Checking for security update from Mattermost")
2015-10-01 13:02:04 -07:00
2015-10-15 11:16:26 -07:00
id := props[model.SYSTEM_DIAGNOSTIC_ID]
if len(id) == 0 {
id = model.NewId()
2015-10-15 11:16:26 -07:00
systemId := &model.System{Name: model.SYSTEM_DIAGNOSTIC_ID, Value: id}
<-api.Srv.Store.System().Save(systemId)
}
2015-10-05 17:33:45 -07:00
v := url.Values{}
v.Set(utils.PROP_DIAGNOSTIC_ID, id)
v.Set(utils.PROP_DIAGNOSTIC_BUILD, model.CurrentVersion+"."+model.BuildNumber)
v.Set(utils.PROP_DIAGNOSTIC_DATABASE, utils.Cfg.SqlSettings.DriverName)
v.Set(utils.PROP_DIAGNOSTIC_OS, runtime.GOOS)
v.Set(utils.PROP_DIAGNOSTIC_CATEGORY, utils.VAL_DIAGNOSTIC_CATEGORY_DEFAULT)
2015-10-01 13:02:04 -07:00
2015-10-15 11:16:26 -07:00
if len(props[model.SYSTEM_RAN_UNIT_TESTS]) > 0 {
v.Set(utils.PROP_DIAGNOSTIC_UNIT_TESTS, "1")
} else {
v.Set(utils.PROP_DIAGNOSTIC_UNIT_TESTS, "0")
}
systemSecurityLastTime := &model.System{Name: model.SYSTEM_LAST_SECURITY_TIME, Value: strconv.FormatInt(currentTime, 10)}
2015-10-05 17:33:45 -07:00
if lastSecurityTime == 0 {
<-api.Srv.Store.System().Save(systemSecurityLastTime)
2015-10-01 13:02:04 -07:00
} else {
2015-10-05 17:33:45 -07:00
<-api.Srv.Store.System().Update(systemSecurityLastTime)
2015-10-01 13:02:04 -07:00
}
if ucr := <-api.Srv.Store.User().GetTotalUsersCount(); ucr.Err == nil {
v.Set(utils.PROP_DIAGNOSTIC_USER_COUNT, strconv.FormatInt(ucr.Data.(int64), 10))
}
if ucr := <-api.Srv.Store.User().GetTotalActiveUsersCount(); ucr.Err == nil {
v.Set(utils.PROP_DIAGNOSTIC_ACTIVE_USER_COUNT, strconv.FormatInt(ucr.Data.(int64), 10))
}
2015-10-07 09:23:26 -07:00
res, err := http.Get(utils.DIAGNOSTIC_URL + "/security?" + v.Encode())
2015-10-05 17:33:45 -07:00
if err != nil {
l4g.Error("Failed to get security update information from Mattermost.")
return
}
bulletins := model.SecurityBulletinsFromJson(res.Body)
for _, bulletin := range bulletins {
if bulletin.AppliesToVersion == model.CurrentVersion {
if props["SecurityBulletin_"+bulletin.Id] == "" {
if results := <-api.Srv.Store.User().GetSystemAdminProfiles(); results.Err != nil {
l4g.Error("Failed to get system admins for security update information from Mattermost.")
return
} else {
users := results.Data.(map[string]*model.User)
resBody, err := http.Get(utils.DIAGNOSTIC_URL + "/bulletins/" + bulletin.Id)
if err != nil {
l4g.Error("Failed to get security bulletin details")
return
}
body, err := ioutil.ReadAll(resBody.Body)
res.Body.Close()
if err != nil || resBody.StatusCode != 200 {
l4g.Error("Failed to read security bulletin details")
return
}
for _, user := range users {
l4g.Info("Sending security bulletin for " + bulletin.Id + " to " + user.Email)
utils.SendMail(user.Email, "Mattermost Security Bulletin", string(body))
}
}
bulletinSeen := &model.System{Name: "SecurityBulletin_" + bulletin.Id, Value: bulletin.Id}
<-api.Srv.Store.System().Save(bulletinSeen)
}
}
}
2015-10-01 13:02:04 -07:00
}
}
}
2015-10-05 17:33:45 -07:00
time.Sleep(time.Hour * 4)
2015-10-01 13:02:04 -07:00
}
}()
}
2015-09-04 11:59:10 -07:00
func parseCmds() {
flag.Usage = func() {
fmt.Fprintln(os.Stderr, usage)
}
flag.StringVar(&flagConfigFile, "config", "config.json", "")
flag.StringVar(&flagEmail, "email", "", "")
flag.StringVar(&flagPassword, "password", "", "")
flag.StringVar(&flagTeamName, "team_name", "", "")
flag.StringVar(&flagRole, "role", "", "")
flag.BoolVar(&flagCmdCreateTeam, "create_team", false, "")
flag.BoolVar(&flagCmdCreateUser, "create_user", false, "")
flag.BoolVar(&flagCmdAssignRole, "assign_role", false, "")
flag.BoolVar(&flagCmdVersion, "version", false, "")
2015-09-04 11:59:10 -07:00
flag.BoolVar(&flagCmdResetPassword, "reset_password", false, "")
flag.Parse()
flagRunCmds = flagCmdCreateTeam || flagCmdCreateUser || flagCmdAssignRole || flagCmdResetPassword || flagCmdVersion
2015-09-04 11:59:10 -07:00
}
func runCmds() {
cmdVersion()
2015-09-04 11:59:10 -07:00
cmdCreateTeam()
cmdCreateUser()
cmdAssignRole()
cmdResetPassword()
}
func cmdCreateTeam() {
if flagCmdCreateTeam {
if len(flagTeamName) == 0 {
fmt.Fprintln(os.Stderr, "flag needs an argument: -team_name")
flag.Usage()
os.Exit(1)
}
if len(flagEmail) == 0 {
fmt.Fprintln(os.Stderr, "flag needs an argument: -email")
flag.Usage()
os.Exit(1)
}
c := &api.Context{}
c.RequestId = model.NewId()
c.IpAddress = "cmd_line"
team := &model.Team{}
team.DisplayName = flagTeamName
team.Name = flagTeamName
team.Email = flagEmail
team.Type = model.TEAM_INVITE
api.CreateTeam(c, team)
if c.Err != nil {
if c.Err.Message != "A team with that domain already exists" {
l4g.Error("%v", c.Err)
flushLogAndExit(1)
}
}
os.Exit(0)
}
}
func cmdCreateUser() {
if flagCmdCreateUser {
if len(flagTeamName) == 0 {
fmt.Fprintln(os.Stderr, "flag needs an argument: -team_name")
flag.Usage()
os.Exit(1)
}
if len(flagEmail) == 0 {
fmt.Fprintln(os.Stderr, "flag needs an argument: -email")
flag.Usage()
os.Exit(1)
}
if len(flagPassword) == 0 {
fmt.Fprintln(os.Stderr, "flag needs an argument: -password")
flag.Usage()
os.Exit(1)
}
c := &api.Context{}
c.RequestId = model.NewId()
c.IpAddress = "cmd_line"
var team *model.Team
user := &model.User{}
user.Email = flagEmail
user.Password = flagPassword
splits := strings.Split(strings.Replace(flagEmail, "@", " ", -1), " ")
user.Username = splits[0]
if result := <-api.Srv.Store.Team().GetByName(flagTeamName); result.Err != nil {
l4g.Error("%v", result.Err)
flushLogAndExit(1)
} else {
team = result.Data.(*model.Team)
user.TeamId = team.Id
}
api.CreateUser(c, team, user)
if c.Err != nil {
if c.Err.Message != "An account with that email already exists." {
l4g.Error("%v", c.Err)
flushLogAndExit(1)
}
}
os.Exit(0)
2015-06-14 23:53:32 -08:00
}
2015-09-04 11:59:10 -07:00
}
func cmdVersion() {
if flagCmdVersion {
2015-09-17 13:01:40 -07:00
fmt.Fprintln(os.Stderr, "Version: "+model.CurrentVersion)
fmt.Fprintln(os.Stderr, "Build Number: "+model.BuildNumber)
fmt.Fprintln(os.Stderr, "Build Date: "+model.BuildDate)
fmt.Fprintln(os.Stderr, "Build Hash: "+model.BuildHash)
os.Exit(0)
}
}
2015-09-04 11:59:10 -07:00
func cmdAssignRole() {
if flagCmdAssignRole {
if len(flagTeamName) == 0 {
fmt.Fprintln(os.Stderr, "flag needs an argument: -team_name")
flag.Usage()
os.Exit(1)
}
if len(flagEmail) == 0 {
fmt.Fprintln(os.Stderr, "flag needs an argument: -email")
flag.Usage()
os.Exit(1)
}
if !model.IsValidRoles(flagRole) {
fmt.Fprintln(os.Stderr, "flag invalid argument: -role")
flag.Usage()
os.Exit(1)
}
c := &api.Context{}
c.RequestId = model.NewId()
c.IpAddress = "cmd_line"
2015-06-14 23:53:32 -08:00
2015-09-04 11:59:10 -07:00
var team *model.Team
if result := <-api.Srv.Store.Team().GetByName(flagTeamName); result.Err != nil {
l4g.Error("%v", result.Err)
flushLogAndExit(1)
} else {
team = result.Data.(*model.Team)
}
2015-06-14 23:53:32 -08:00
2015-09-04 11:59:10 -07:00
var user *model.User
if result := <-api.Srv.Store.User().GetByEmail(team.Id, flagEmail); result.Err != nil {
l4g.Error("%v", result.Err)
flushLogAndExit(1)
} else {
user = result.Data.(*model.User)
}
if !user.IsInRole(flagRole) {
api.UpdateRoles(c, user, flagRole)
}
os.Exit(0)
}
2015-06-14 23:53:32 -08:00
}
2015-09-04 11:59:10 -07:00
func cmdResetPassword() {
if flagCmdResetPassword {
if len(flagTeamName) == 0 {
fmt.Fprintln(os.Stderr, "flag needs an argument: -team_name")
flag.Usage()
os.Exit(1)
}
if len(flagEmail) == 0 {
fmt.Fprintln(os.Stderr, "flag needs an argument: -email")
flag.Usage()
os.Exit(1)
}
if len(flagPassword) == 0 {
fmt.Fprintln(os.Stderr, "flag needs an argument: -password")
flag.Usage()
os.Exit(1)
}
2015-09-04 16:56:18 -07:00
if len(flagPassword) < 5 {
fmt.Fprintln(os.Stderr, "flag invalid argument needs to be more than 4 characters: -password")
flag.Usage()
os.Exit(1)
}
2015-09-04 11:59:10 -07:00
c := &api.Context{}
c.RequestId = model.NewId()
c.IpAddress = "cmd_line"
var team *model.Team
if result := <-api.Srv.Store.Team().GetByName(flagTeamName); result.Err != nil {
l4g.Error("%v", result.Err)
flushLogAndExit(1)
} else {
team = result.Data.(*model.Team)
}
var user *model.User
if result := <-api.Srv.Store.User().GetByEmail(team.Id, flagEmail); result.Err != nil {
l4g.Error("%v", result.Err)
flushLogAndExit(1)
} else {
user = result.Data.(*model.User)
}
if result := <-api.Srv.Store.User().UpdatePassword(user.Id, model.HashPassword(flagPassword)); result.Err != nil {
l4g.Error("%v", result.Err)
flushLogAndExit(1)
}
os.Exit(0)
}
}
func flushLogAndExit(code int) {
l4g.Close()
time.Sleep(time.Second)
os.Exit(code)
}
var usage = `Mattermost commands to help configure the system
Usage:
platform [options]
-version Display the current version
2015-09-04 11:59:10 -07:00
-config="config.json" Path to the config file
-email="user@example.com" Email address used in other commands
-password="mypassword" Password used in other commands
-team_name="name" The team name used in other commands
-role="admin" The role used in other commands
valid values are
"" - The empty role is basic user
2015-09-04 11:59:10 -07:00
permissions
"admin" - Represents a team admin and
is used to help administer one team.
2015-09-04 11:59:10 -07:00
"system_admin" - Represents a system
admin who has access to all teams
and configuration settings. This
role can only be created on the
team named "admin"
2015-09-15 19:56:21 -07:00
-create_team Creates a team. It requires the -team_name
2015-09-04 11:59:10 -07:00
and -email flag to create a team.
Example:
platform -create_team -team_name="name" -email="user@example.com"
2015-09-15 19:56:21 -07:00
-create_user Creates a user. It requires the -team_name,
2015-09-04 11:59:10 -07:00
-email and -password flag to create a user.
Example:
platform -create_user -team_name="name" -email="user@example.com" -password="mypassword"
2015-09-15 19:56:21 -07:00
-assign_role Assigns role to a user. It requires the -role,
2015-09-15 09:19:29 -07:00
-email and -team_name flag. You may need to logout
of your current sessions for the new role to be
applied.
2015-09-04 11:59:10 -07:00
Example:
platform -assign_role -team_name="name" -email="user@example.com" -role="admin"
2015-09-15 19:56:21 -07:00
-reset_password Resets the password for a user. It requires the
2015-09-04 11:59:10 -07:00
-team_name, -email and -password flag.
Example:
2015-10-01 16:37:15 -04:00
platform -reset_password -team_name="name" -email="user@example.com" -password="newpassword"
2015-09-04 11:59:10 -07:00
`