2018-08-27 04:21:03 +10:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-10-28 07:56:16 +11:00
|
|
|
require 'set'
|
2023-05-24 00:08:26 +10:00
|
|
|
require_relative '../../../config/boot'
|
|
|
|
require_relative '../../../config/environment'
|
|
|
|
require_relative 'helper'
|
2018-08-27 04:21:03 +10:00
|
|
|
|
2023-05-24 00:08:26 +10:00
|
|
|
module Mastodon::CLI
|
|
|
|
class Accounts < Thor
|
|
|
|
include Helper
|
2019-09-10 21:48:48 +10:00
|
|
|
|
2018-10-26 01:05:33 +11:00
|
|
|
def self.exit_on_failure?
|
|
|
|
true
|
|
|
|
end
|
2018-10-28 07:56:16 +11:00
|
|
|
|
2018-08-27 04:21:03 +10:00
|
|
|
option :all, type: :boolean
|
|
|
|
desc 'rotate [USERNAME]', 'Generate and broadcast new keys'
|
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Generate and broadcast new RSA keys as part of security
|
|
|
|
maintenance.
|
|
|
|
|
|
|
|
With the --all option, all local accounts will be subject
|
|
|
|
to the rotation. Otherwise, and by default, only a single
|
|
|
|
account specified by the USERNAME argument will be
|
|
|
|
processed.
|
|
|
|
LONG_DESC
|
|
|
|
def rotate(username = nil)
|
|
|
|
if options[:all]
|
|
|
|
processed = 0
|
|
|
|
delay = 0
|
2019-09-10 21:48:48 +10:00
|
|
|
scope = Account.local.without_suspended
|
|
|
|
progress = create_progress_bar(scope.count)
|
2018-08-27 04:21:03 +10:00
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
scope.find_in_batches do |accounts|
|
2018-08-27 04:21:03 +10:00
|
|
|
accounts.each do |account|
|
|
|
|
rotate_keys_for_account(account, delay)
|
2019-09-10 21:48:48 +10:00
|
|
|
progress.increment
|
2018-08-27 04:21:03 +10:00
|
|
|
processed += 1
|
|
|
|
end
|
|
|
|
|
|
|
|
delay += 5.minutes
|
|
|
|
end
|
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
progress.finish
|
2018-08-27 04:21:03 +10:00
|
|
|
say("OK, rotated keys for #{processed} accounts", :green)
|
|
|
|
elsif username.present?
|
|
|
|
rotate_keys_for_account(Account.find_local(username))
|
|
|
|
say('OK', :green)
|
|
|
|
else
|
|
|
|
say('No account(s) given', :red)
|
2018-09-15 01:42:22 +10:00
|
|
|
exit(1)
|
2018-08-27 04:21:03 +10:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-09-09 21:33:36 +10:00
|
|
|
option :email, required: true
|
|
|
|
option :confirmed, type: :boolean
|
2022-07-05 10:41:40 +10:00
|
|
|
option :role
|
2018-09-09 21:33:36 +10:00
|
|
|
option :reattach, type: :boolean
|
|
|
|
option :force, type: :boolean
|
2023-04-14 22:41:15 +10:00
|
|
|
option :approve, type: :boolean
|
2022-08-13 23:41:12 +10:00
|
|
|
desc 'create USERNAME', 'Create a new user account'
|
2018-09-09 21:33:36 +10:00
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Create a new user account with a given USERNAME and an
|
|
|
|
e-mail address provided with --email.
|
|
|
|
|
|
|
|
With the --confirmed option, the confirmation e-mail will
|
|
|
|
be skipped and the account will be active straight away.
|
|
|
|
|
2022-07-05 10:41:40 +10:00
|
|
|
With the --role option, the role can be supplied.
|
2018-09-09 21:33:36 +10:00
|
|
|
|
|
|
|
With the --reattach option, the new user will be reattached
|
|
|
|
to a given existing username of an old account. If the old
|
|
|
|
account is still in use by someone else, you can supply
|
|
|
|
the --force option to delete the old record and reattach the
|
|
|
|
username to the new account anyway.
|
2023-04-14 22:41:15 +10:00
|
|
|
|
|
|
|
With the --approve option, the account will be approved.
|
2018-09-09 21:33:36 +10:00
|
|
|
LONG_DESC
|
2018-09-15 01:42:22 +10:00
|
|
|
def create(username)
|
2022-07-05 10:41:40 +10:00
|
|
|
role_id = nil
|
|
|
|
|
|
|
|
if options[:role]
|
|
|
|
role = UserRole.find_by(name: options[:role])
|
|
|
|
|
|
|
|
if role.nil?
|
|
|
|
say('Cannot find user role with that name', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
role_id = role.id
|
|
|
|
end
|
|
|
|
|
2018-09-09 21:33:36 +10:00
|
|
|
account = Account.new(username: username)
|
|
|
|
password = SecureRandom.hex
|
2023-04-14 22:41:15 +10:00
|
|
|
user = User.new(email: options[:email], password: password, agreement: true, role_id: role_id, confirmed_at: options[:confirmed] ? Time.now.utc : nil, bypass_invite_request_check: true)
|
2018-09-09 21:33:36 +10:00
|
|
|
|
|
|
|
if options[:reattach]
|
|
|
|
account = Account.find_local(username) || Account.new(username: username)
|
|
|
|
|
|
|
|
if account.user.present? && !options[:force]
|
|
|
|
say('The chosen username is currently in use', :red)
|
|
|
|
say('Use --force to reattach it anyway and delete the other user')
|
|
|
|
return
|
|
|
|
elsif account.user.present?
|
2023-04-27 18:15:45 +10:00
|
|
|
DeleteAccountService.new.call(account, reserve_email: false, reserve_username: false)
|
2023-04-24 06:29:31 +10:00
|
|
|
account = Account.new(username: username)
|
2018-09-09 21:33:36 +10:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-05-15 03:05:02 +10:00
|
|
|
account.suspended_at = nil
|
|
|
|
user.account = account
|
2018-09-09 21:33:36 +10:00
|
|
|
|
|
|
|
if user.save
|
|
|
|
if options[:confirmed]
|
|
|
|
user.confirmed_at = nil
|
|
|
|
user.confirm!
|
|
|
|
end
|
|
|
|
|
2023-04-14 22:41:15 +10:00
|
|
|
user.approve! if options[:approve]
|
|
|
|
|
2018-09-09 21:33:36 +10:00
|
|
|
say('OK', :green)
|
|
|
|
say("New password: #{password}")
|
|
|
|
else
|
2023-05-03 02:39:22 +10:00
|
|
|
user.errors.each do |error|
|
2018-09-09 21:33:36 +10:00
|
|
|
say('Failure/Error: ', :red)
|
2023-05-03 02:39:22 +10:00
|
|
|
say(error.attribute)
|
|
|
|
say(" #{error.type}", :red)
|
2018-09-09 21:33:36 +10:00
|
|
|
end
|
2018-09-15 01:42:22 +10:00
|
|
|
|
|
|
|
exit(1)
|
2018-09-09 21:33:36 +10:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-07-05 10:41:40 +10:00
|
|
|
option :role
|
2022-10-27 23:31:10 +11:00
|
|
|
option :remove_role, type: :boolean
|
2018-09-15 01:42:22 +10:00
|
|
|
option :email
|
|
|
|
option :confirm, type: :boolean
|
|
|
|
option :enable, type: :boolean
|
|
|
|
option :disable, type: :boolean
|
|
|
|
option :disable_2fa, type: :boolean
|
2019-05-04 04:49:27 +10:00
|
|
|
option :approve, type: :boolean
|
2020-02-22 11:29:14 +11:00
|
|
|
option :reset_password, type: :boolean
|
2022-08-13 23:41:12 +10:00
|
|
|
desc 'modify USERNAME', 'Modify a user account'
|
2018-09-15 01:42:22 +10:00
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Modify a user account.
|
|
|
|
|
2022-10-27 23:31:10 +11:00
|
|
|
With the --role option, update the user's role. To remove the user's
|
|
|
|
role, i.e. demote to normal user, use --remove-role.
|
2018-09-15 01:42:22 +10:00
|
|
|
|
|
|
|
With the --email option, update the user's e-mail address. With
|
|
|
|
the --confirm option, mark the user's e-mail as confirmed.
|
|
|
|
|
|
|
|
With the --disable option, lock the user out of their account. The
|
|
|
|
--enable option is the opposite.
|
|
|
|
|
2019-05-04 04:49:27 +10:00
|
|
|
With the --approve option, the account will be approved, if it was
|
|
|
|
previously not due to not having open registrations.
|
|
|
|
|
2018-09-15 01:42:22 +10:00
|
|
|
With the --disable-2fa option, the two-factor authentication
|
|
|
|
requirement for the user can be removed.
|
2020-02-22 11:29:14 +11:00
|
|
|
|
|
|
|
With the --reset-password option, the user's password is replaced by
|
|
|
|
a randomly-generated one, printed in the output.
|
2018-09-15 01:42:22 +10:00
|
|
|
LONG_DESC
|
|
|
|
def modify(username)
|
|
|
|
user = Account.find_local(username)&.user
|
|
|
|
|
|
|
|
if user.nil?
|
|
|
|
say('No user with such username', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
if options[:role]
|
2022-07-05 10:41:40 +10:00
|
|
|
role = UserRole.find_by(name: options[:role])
|
|
|
|
|
|
|
|
if role.nil?
|
|
|
|
say('Cannot find user role with that name', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
user.role_id = role.id
|
2022-10-27 23:31:10 +11:00
|
|
|
elsif options[:remove_role]
|
|
|
|
user.role_id = nil
|
2018-09-15 01:42:22 +10:00
|
|
|
end
|
|
|
|
|
2020-02-22 11:29:14 +11:00
|
|
|
password = SecureRandom.hex if options[:reset_password]
|
|
|
|
user.password = password if options[:reset_password]
|
2018-09-15 01:42:22 +10:00
|
|
|
user.email = options[:email] if options[:email]
|
|
|
|
user.disabled = false if options[:enable]
|
|
|
|
user.disabled = true if options[:disable]
|
2019-05-04 04:49:27 +10:00
|
|
|
user.approved = true if options[:approve]
|
2018-09-15 01:42:22 +10:00
|
|
|
user.otp_required_for_login = false if options[:disable_2fa]
|
|
|
|
|
|
|
|
if user.save
|
2023-04-18 17:51:24 +10:00
|
|
|
user.confirm if options[:confirm]
|
|
|
|
|
2018-09-15 01:42:22 +10:00
|
|
|
say('OK', :green)
|
2020-02-22 11:29:14 +11:00
|
|
|
say("New password: #{password}") if options[:reset_password]
|
2018-09-15 01:42:22 +10:00
|
|
|
else
|
2023-05-03 02:39:22 +10:00
|
|
|
user.errors.each do |error|
|
2018-09-15 01:42:22 +10:00
|
|
|
say('Failure/Error: ', :red)
|
2023-05-03 02:39:22 +10:00
|
|
|
say(error.attribute)
|
|
|
|
say(" #{error.type}", :red)
|
2018-09-15 01:42:22 +10:00
|
|
|
end
|
|
|
|
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2022-12-16 00:52:50 +11:00
|
|
|
option :email
|
|
|
|
option :dry_run, type: :boolean
|
|
|
|
desc 'delete [USERNAME]', 'Delete a user'
|
2018-09-09 21:33:36 +10:00
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Remove a user account with a given USERNAME.
|
|
|
|
|
2022-12-16 00:52:50 +11:00
|
|
|
With the --email option, the user is selected based on email
|
|
|
|
rather than username.
|
|
|
|
LONG_DESC
|
|
|
|
def delete(username = nil)
|
|
|
|
if username.present? && options[:email].present?
|
|
|
|
say('Use username or --email, not both', :red)
|
2018-09-15 01:42:22 +10:00
|
|
|
exit(1)
|
2022-12-16 00:52:50 +11:00
|
|
|
elsif username.blank? && options[:email].blank?
|
|
|
|
say('No username provided', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
dry_run = options[:dry_run] ? ' (DRY RUN)' : ''
|
|
|
|
account = nil
|
|
|
|
|
|
|
|
if username.present?
|
|
|
|
account = Account.find_local(username)
|
|
|
|
if account.nil?
|
|
|
|
say('No user with such username', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
else
|
|
|
|
account = Account.left_joins(:user).find_by(user: { email: options[:email] })
|
|
|
|
if account.nil?
|
|
|
|
say('No user with such email', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
2018-09-09 21:33:36 +10:00
|
|
|
end
|
|
|
|
|
2022-12-16 00:52:50 +11:00
|
|
|
say("Deleting user with #{account.statuses_count} statuses, this might take a while...#{dry_run}")
|
|
|
|
DeleteAccountService.new.call(account, reserve_email: false) unless options[:dry_run]
|
|
|
|
say("OK#{dry_run}", :green)
|
2018-09-09 21:33:36 +10:00
|
|
|
end
|
|
|
|
|
2020-11-24 03:50:16 +11:00
|
|
|
option :force, type: :boolean, aliases: [:f], description: 'Override public key check'
|
|
|
|
desc 'merge FROM TO', 'Merge two remote accounts into one'
|
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Merge two remote accounts specified by their username@domain
|
|
|
|
into one, whereby the TO account is the one being merged into
|
|
|
|
and kept, while the FROM one is removed. It is primarily meant
|
|
|
|
to fix duplicates caused by other servers changing their domain.
|
|
|
|
|
|
|
|
The command by default only works if both accounts have the same
|
|
|
|
public key to prevent mistakes. To override this, use the --force.
|
|
|
|
LONG_DESC
|
|
|
|
def merge(from_acct, to_acct)
|
|
|
|
username, domain = from_acct.split('@')
|
|
|
|
from_account = Account.find_remote(username, domain)
|
|
|
|
|
|
|
|
if from_account.nil? || from_account.local?
|
|
|
|
say("No such account (#{from_acct})", :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
username, domain = to_acct.split('@')
|
|
|
|
to_account = Account.find_remote(username, domain)
|
|
|
|
|
|
|
|
if to_account.nil? || to_account.local?
|
|
|
|
say("No such account (#{to_acct})", :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
if from_account.public_key != to_account.public_key && !options[:force]
|
|
|
|
say("Accounts don't have the same public key, might not be duplicates!", :red)
|
|
|
|
say('Override with --force', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
to_account.merge_with!(from_account)
|
|
|
|
from_account.destroy
|
|
|
|
|
|
|
|
say('OK', :green)
|
|
|
|
end
|
|
|
|
|
2020-12-19 09:26:26 +11:00
|
|
|
desc 'fix-duplicates', 'Find duplicate remote accounts and merge them'
|
|
|
|
option :dry_run, type: :boolean
|
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Merge known remote accounts sharing an ActivityPub actor identifier.
|
|
|
|
|
|
|
|
Such duplicates can occur when a remote server admin misconfigures their
|
|
|
|
domain configuration.
|
|
|
|
LONG_DESC
|
|
|
|
def fix_duplicates
|
2020-12-19 23:34:16 +11:00
|
|
|
Account.remote.select(:uri, 'count(*)').group(:uri).having('count(*) > 1').pluck(:uri).each do |uri|
|
2020-12-19 09:26:26 +11:00
|
|
|
say("Duplicates found for #{uri}")
|
|
|
|
begin
|
2020-12-19 23:34:16 +11:00
|
|
|
ActivityPub::FetchRemoteAccountService.new.call(uri) unless options[:dry_run]
|
2020-12-19 09:26:26 +11:00
|
|
|
rescue => e
|
|
|
|
say("Error processing #{uri}: #{e}", :red)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-09-28 11:34:24 +10:00
|
|
|
desc 'backup USERNAME', 'Request a backup for a user'
|
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Request a new backup for an account with a given USERNAME.
|
|
|
|
|
|
|
|
The backup will be created in Sidekiq asynchronously, and
|
|
|
|
the user will receive an e-mail with a link to it once
|
|
|
|
it's done.
|
|
|
|
LONG_DESC
|
|
|
|
def backup(username)
|
|
|
|
account = Account.find_local(username)
|
|
|
|
|
|
|
|
if account.nil?
|
|
|
|
say('No user with such username', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
backup = account.user.backups.create!
|
|
|
|
BackupWorker.perform_async(backup.id)
|
|
|
|
say('OK', :green)
|
|
|
|
end
|
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
option :concurrency, type: :numeric, default: 5, aliases: [:c]
|
2018-09-09 21:33:36 +10:00
|
|
|
option :dry_run, type: :boolean
|
2021-10-15 06:09:56 +11:00
|
|
|
desc 'cull [DOMAIN...]', 'Remove remote accounts that no longer exist'
|
2018-09-09 21:33:36 +10:00
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Query every single remote account in the database to determine
|
|
|
|
if it still exists on the origin server, and if it doesn't,
|
|
|
|
remove it from the database.
|
|
|
|
|
|
|
|
Accounts that have had confirmed activity within the last week
|
|
|
|
are excluded from the checks.
|
|
|
|
LONG_DESC
|
2021-10-15 06:09:56 +11:00
|
|
|
def cull(*domains)
|
2018-10-28 07:56:16 +11:00
|
|
|
skip_threshold = 7.days.ago
|
|
|
|
dry_run = options[:dry_run] ? ' (DRY RUN)' : ''
|
2019-09-10 21:48:48 +10:00
|
|
|
skip_domains = Concurrent::Set.new
|
2018-09-09 21:33:36 +10:00
|
|
|
|
2021-10-15 06:09:56 +11:00
|
|
|
query = Account.remote.where(protocol: :activitypub)
|
|
|
|
query = query.where(domain: domains) unless domains.empty?
|
|
|
|
|
|
|
|
processed, culled = parallelize_with_progress(query.partitioned) do |account|
|
2019-09-10 21:48:48 +10:00
|
|
|
next if account.updated_at >= skip_threshold || (account.last_webfingered_at.present? && account.last_webfingered_at >= skip_threshold) || skip_domains.include?(account.domain)
|
2018-09-09 21:33:36 +10:00
|
|
|
|
2019-04-05 01:46:27 +11:00
|
|
|
code = 0
|
2019-09-10 21:48:48 +10:00
|
|
|
|
|
|
|
begin
|
|
|
|
code = Request.new(:head, account.uri).perform(&:code)
|
2023-05-02 23:10:09 +10:00
|
|
|
rescue HTTP::TimeoutError, HTTP::ConnectionError, OpenSSL::SSL::SSLError, Mastodon::PrivateNetworkAddressError
|
2019-09-10 21:48:48 +10:00
|
|
|
skip_domains << account.domain
|
2018-09-09 21:33:36 +10:00
|
|
|
end
|
|
|
|
|
2018-10-22 07:52:27 +11:00
|
|
|
if [404, 410].include?(code)
|
2020-11-08 10:28:39 +11:00
|
|
|
DeleteAccountService.new.call(account, reserve_username: false) unless options[:dry_run]
|
2019-09-10 21:48:48 +10:00
|
|
|
1
|
2018-09-09 21:33:36 +10:00
|
|
|
else
|
2019-09-10 21:48:48 +10:00
|
|
|
# Touch account even during dry run to avoid getting the account into the window again
|
|
|
|
account.touch
|
2018-09-09 21:33:36 +10:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
say("Visited #{processed} accounts, removed #{culled}#{dry_run}", :green)
|
2018-09-09 21:33:36 +10:00
|
|
|
|
2018-10-28 07:56:16 +11:00
|
|
|
unless skip_domains.empty?
|
2019-09-10 21:48:48 +10:00
|
|
|
say('The following domains were not available during the check:', :yellow)
|
2022-07-05 10:41:40 +10:00
|
|
|
skip_domains.each { |domain| say(" #{domain}") }
|
2018-09-09 21:33:36 +10:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-09-15 01:42:22 +10:00
|
|
|
option :all, type: :boolean
|
|
|
|
option :domain
|
2019-09-10 21:48:48 +10:00
|
|
|
option :concurrency, type: :numeric, default: 5, aliases: [:c]
|
|
|
|
option :verbose, type: :boolean, aliases: [:v]
|
|
|
|
option :dry_run, type: :boolean
|
2023-03-09 03:06:53 +11:00
|
|
|
desc 'refresh [USERNAMES]', 'Fetch remote user data and files'
|
2018-09-15 01:42:22 +10:00
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Fetch remote user data and files for one or multiple accounts.
|
|
|
|
|
|
|
|
With the --all option, all remote accounts will be processed.
|
|
|
|
Through the --domain option, this can be narrowed down to a
|
2023-03-09 03:06:53 +11:00
|
|
|
specific domain only. Otherwise, remote accounts must be
|
|
|
|
specified with space-separated USERNAMES.
|
2018-09-15 01:42:22 +10:00
|
|
|
LONG_DESC
|
2023-03-09 03:06:53 +11:00
|
|
|
def refresh(*usernames)
|
2019-09-10 21:48:48 +10:00
|
|
|
dry_run = options[:dry_run] ? ' (DRY RUN)' : ''
|
|
|
|
|
2018-09-15 01:42:22 +10:00
|
|
|
if options[:domain] || options[:all]
|
|
|
|
scope = Account.remote
|
|
|
|
scope = scope.where(domain: options[:domain]) if options[:domain]
|
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
processed, = parallelize_with_progress(scope) do |account|
|
|
|
|
next if options[:dry_run]
|
|
|
|
|
|
|
|
account.reset_avatar!
|
|
|
|
account.reset_header!
|
|
|
|
account.save
|
2018-09-15 01:42:22 +10:00
|
|
|
end
|
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
say("Refreshed #{processed} accounts#{dry_run}", :green, true)
|
2023-03-09 03:06:53 +11:00
|
|
|
elsif !usernames.empty?
|
|
|
|
usernames.each do |user|
|
|
|
|
user, domain = user.split('@')
|
|
|
|
account = Account.find_remote(user, domain)
|
|
|
|
|
|
|
|
if account.nil?
|
|
|
|
say('No such account', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
2018-09-15 01:42:22 +10:00
|
|
|
|
2023-03-09 03:06:53 +11:00
|
|
|
next if options[:dry_run]
|
2018-09-15 01:42:22 +10:00
|
|
|
|
2023-03-09 03:06:53 +11:00
|
|
|
begin
|
|
|
|
account.reset_avatar!
|
|
|
|
account.reset_header!
|
|
|
|
account.save
|
|
|
|
rescue Mastodon::UnexpectedResponseError
|
|
|
|
say("Account failed: #{user}@#{domain}", :red)
|
|
|
|
end
|
2019-09-10 21:48:48 +10:00
|
|
|
end
|
|
|
|
|
|
|
|
say("OK#{dry_run}", :green)
|
2018-09-15 01:42:22 +10:00
|
|
|
else
|
|
|
|
say('No account(s) given', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
option :concurrency, type: :numeric, default: 5, aliases: [:c]
|
|
|
|
option :verbose, type: :boolean, aliases: [:v]
|
|
|
|
desc 'follow USERNAME', 'Make all local accounts follow account specified by USERNAME'
|
|
|
|
def follow(username)
|
|
|
|
target_account = Account.find_local(username)
|
2019-01-02 02:24:26 +11:00
|
|
|
|
|
|
|
if target_account.nil?
|
2019-09-10 21:48:48 +10:00
|
|
|
say('No such account', :red)
|
2019-01-02 02:24:26 +11:00
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
processed, = parallelize_with_progress(Account.local.without_suspended) do |account|
|
2020-12-27 09:52:46 +11:00
|
|
|
FollowService.new.call(account, target_account, bypass_limit: true)
|
2019-01-02 02:24:26 +11:00
|
|
|
end
|
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
say("OK, followed target from #{processed} accounts", :green)
|
2019-01-02 02:24:26 +11:00
|
|
|
end
|
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
option :concurrency, type: :numeric, default: 5, aliases: [:c]
|
|
|
|
option :verbose, type: :boolean, aliases: [:v]
|
2019-01-02 02:24:26 +11:00
|
|
|
desc 'unfollow ACCT', 'Make all local accounts unfollow account specified by ACCT'
|
|
|
|
def unfollow(acct)
|
2020-11-24 03:50:16 +11:00
|
|
|
username, domain = acct.split('@')
|
|
|
|
target_account = Account.find_remote(username, domain)
|
2019-01-02 02:24:26 +11:00
|
|
|
|
|
|
|
if target_account.nil?
|
2019-09-10 21:48:48 +10:00
|
|
|
say('No such account', :red)
|
2019-01-02 02:24:26 +11:00
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
2021-01-30 04:38:56 +11:00
|
|
|
processed, = parallelize_with_progress(target_account.followers.local) do |account|
|
2019-09-10 21:48:48 +10:00
|
|
|
UnfollowService.new.call(account, target_account)
|
2019-01-02 02:24:26 +11:00
|
|
|
end
|
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
say("OK, unfollowed target from #{processed} accounts", :green)
|
2019-01-02 02:24:26 +11:00
|
|
|
end
|
|
|
|
|
2019-04-08 15:46:55 +10:00
|
|
|
option :follows, type: :boolean, default: false
|
|
|
|
option :followers, type: :boolean, default: false
|
|
|
|
desc 'reset-relationships USERNAME', 'Reset all follows and/or followers for a user'
|
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Reset all follows and/or followers for a user specified by USERNAME.
|
|
|
|
|
|
|
|
With the --follows option, the command unfollows everyone that the account follows,
|
|
|
|
and then re-follows the users that would be followed by a brand new account.
|
|
|
|
|
|
|
|
With the --followers option, the command removes all followers of the account.
|
|
|
|
LONG_DESC
|
|
|
|
def reset_relationships(username)
|
|
|
|
unless options[:follows] || options[:followers]
|
|
|
|
say('Please specify either --follows or --followers, or both', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
account = Account.find_local(username)
|
|
|
|
|
|
|
|
if account.nil?
|
2019-09-10 21:48:48 +10:00
|
|
|
say('No such account', :red)
|
2019-04-08 15:46:55 +10:00
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
total = 0
|
|
|
|
total += Account.where(id: ::Follow.where(account: account).select(:target_account_id)).count if options[:follows]
|
|
|
|
total += Account.where(id: ::Follow.where(target_account: account).select(:account_id)).count if options[:followers]
|
|
|
|
progress = create_progress_bar(total)
|
|
|
|
processed = 0
|
2019-04-08 15:46:55 +10:00
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
if options[:follows]
|
|
|
|
scope = Account.where(id: ::Follow.where(account: account).select(:target_account_id))
|
2019-04-08 15:46:55 +10:00
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
scope.find_each do |target_account|
|
2023-02-19 09:09:40 +11:00
|
|
|
UnfollowService.new.call(account, target_account)
|
|
|
|
rescue => e
|
|
|
|
progress.log pastel.red("Error processing #{target_account.id}: #{e}")
|
|
|
|
ensure
|
|
|
|
progress.increment
|
|
|
|
processed += 1
|
2019-04-08 15:46:55 +10:00
|
|
|
end
|
|
|
|
|
|
|
|
BootstrapTimelineWorker.perform_async(account.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
if options[:followers]
|
2019-09-10 21:48:48 +10:00
|
|
|
scope = Account.where(id: ::Follow.where(target_account: account).select(:account_id))
|
2019-04-08 15:46:55 +10:00
|
|
|
|
2019-09-10 21:48:48 +10:00
|
|
|
scope.find_each do |target_account|
|
2023-02-19 09:09:40 +11:00
|
|
|
UnfollowService.new.call(target_account, account)
|
|
|
|
rescue => e
|
|
|
|
progress.log pastel.red("Error processing #{target_account.id}: #{e}")
|
|
|
|
ensure
|
|
|
|
progress.increment
|
|
|
|
processed += 1
|
2019-04-08 15:46:55 +10:00
|
|
|
end
|
|
|
|
end
|
2019-09-10 21:48:48 +10:00
|
|
|
|
|
|
|
progress.finish
|
|
|
|
say("Processed #{processed} relationships", :green, true)
|
2019-04-08 15:46:55 +10:00
|
|
|
end
|
|
|
|
|
2019-04-06 13:47:05 +11:00
|
|
|
option :number, type: :numeric, aliases: [:n]
|
|
|
|
option :all, type: :boolean
|
|
|
|
desc 'approve [USERNAME]', 'Approve pending accounts'
|
|
|
|
long_desc <<~LONG_DESC
|
|
|
|
When registrations require review from staff, approve pending accounts,
|
|
|
|
either all of them with the --all option, or a specific number of them
|
|
|
|
specified with the --number (-n) option, or only a single specific
|
|
|
|
account identified by its username.
|
|
|
|
LONG_DESC
|
|
|
|
def approve(username = nil)
|
|
|
|
if options[:all]
|
|
|
|
User.pending.find_each(&:approve!)
|
|
|
|
say('OK', :green)
|
2023-04-20 18:57:11 +10:00
|
|
|
elsif options[:number]&.positive?
|
2023-04-30 14:50:58 +10:00
|
|
|
User.pending.order(created_at: :asc).limit(options[:number]).each(&:approve!)
|
2019-04-06 13:47:05 +11:00
|
|
|
say('OK', :green)
|
|
|
|
elsif username.present?
|
|
|
|
account = Account.find_local(username)
|
|
|
|
|
|
|
|
if account.nil?
|
|
|
|
say('No such account', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
account.user&.approve!
|
|
|
|
say('OK', :green)
|
|
|
|
else
|
2023-04-20 18:57:11 +10:00
|
|
|
say('Number must be positive', :red) if options[:number]
|
2019-04-06 13:47:05 +11:00
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2023-01-14 08:34:16 +11:00
|
|
|
option :concurrency, type: :numeric, default: 5, aliases: [:c]
|
|
|
|
option :dry_run, type: :boolean
|
|
|
|
desc 'prune', 'Prune remote accounts that never interacted with local users'
|
|
|
|
long_desc <<-LONG_DESC
|
|
|
|
Prune remote account that
|
|
|
|
- follows no local accounts
|
|
|
|
- is not followed by any local accounts
|
|
|
|
- has no statuses on local
|
|
|
|
- has not been mentioned
|
|
|
|
- has not been favourited local posts
|
|
|
|
- not muted/blocked by us
|
|
|
|
LONG_DESC
|
|
|
|
def prune
|
|
|
|
dry_run = options[:dry_run] ? ' (dry run)' : ''
|
|
|
|
|
|
|
|
query = Account.remote.where.not(actor_type: %i(Application Service))
|
|
|
|
query = query.where('NOT EXISTS (SELECT 1 FROM mentions WHERE account_id = accounts.id)')
|
|
|
|
query = query.where('NOT EXISTS (SELECT 1 FROM favourites WHERE account_id = accounts.id)')
|
|
|
|
query = query.where('NOT EXISTS (SELECT 1 FROM statuses WHERE account_id = accounts.id)')
|
|
|
|
query = query.where('NOT EXISTS (SELECT 1 FROM follows WHERE account_id = accounts.id OR target_account_id = accounts.id)')
|
|
|
|
query = query.where('NOT EXISTS (SELECT 1 FROM blocks WHERE account_id = accounts.id OR target_account_id = accounts.id)')
|
|
|
|
query = query.where('NOT EXISTS (SELECT 1 FROM mutes WHERE target_account_id = accounts.id)')
|
|
|
|
query = query.where('NOT EXISTS (SELECT 1 FROM reports WHERE target_account_id = accounts.id)')
|
|
|
|
query = query.where('NOT EXISTS (SELECT 1 FROM follow_requests WHERE account_id = accounts.id OR target_account_id = accounts.id)')
|
|
|
|
|
|
|
|
_, deleted = parallelize_with_progress(query) do |account|
|
|
|
|
next if account.bot? || account.group?
|
|
|
|
next if account.suspended?
|
|
|
|
next if account.silenced?
|
|
|
|
|
|
|
|
account.destroy unless options[:dry_run]
|
|
|
|
1
|
|
|
|
end
|
|
|
|
|
|
|
|
say("OK, pruned #{deleted} accounts#{dry_run}", :green)
|
|
|
|
end
|
|
|
|
|
2023-01-14 03:00:23 +11:00
|
|
|
option :force, type: :boolean
|
|
|
|
option :replay, type: :boolean
|
|
|
|
option :target
|
|
|
|
desc 'migrate USERNAME', 'Migrate a local user to another account'
|
|
|
|
long_desc <<~LONG_DESC
|
|
|
|
With --replay, replay the last migration of the specified account, in
|
|
|
|
case some remote server may not have properly processed the associated
|
|
|
|
`Move` activity.
|
|
|
|
|
|
|
|
With --target, specify another account to migrate to.
|
|
|
|
|
|
|
|
With --force, perform the migration even if the selected account
|
|
|
|
redirects to a different account that the one specified.
|
|
|
|
LONG_DESC
|
|
|
|
def migrate(username)
|
|
|
|
if options[:replay].present? && options[:target].present?
|
|
|
|
say('Use --replay or --target, not both', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
if options[:replay].blank? && options[:target].blank?
|
|
|
|
say('Use either --replay or --target', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
account = Account.find_local(username)
|
|
|
|
|
|
|
|
if account.nil?
|
|
|
|
say("No such account: #{username}", :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
migration = nil
|
|
|
|
|
|
|
|
if options[:replay]
|
|
|
|
migration = account.migrations.last
|
|
|
|
if migration.nil?
|
|
|
|
say('The specified account has not performed any migration', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
2023-03-04 06:45:12 +11:00
|
|
|
unless options[:force] || migration.target_account_id == account.moved_to_account_id
|
2023-01-14 03:00:23 +11:00
|
|
|
say('The specified account is not redirecting to its last migration target. Use --force if you want to replay the migration anyway', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
if options[:target]
|
|
|
|
target_account = ResolveAccountService.new.call(options[:target])
|
|
|
|
|
|
|
|
if target_account.nil?
|
|
|
|
say("The specified target account could not be found: #{options[:target]}", :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
unless options[:force] || account.moved_to_account_id.nil? || account.moved_to_account_id == target_account.id
|
|
|
|
say('The specified account is redirecting to a different target account. Use --force if you want to change the migration target', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
begin
|
|
|
|
migration = account.migrations.create!(acct: target_account.acct)
|
|
|
|
rescue ActiveRecord::RecordInvalid => e
|
|
|
|
say("Error: #{e.message}", :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
MoveService.new.call(migration)
|
|
|
|
|
|
|
|
say("OK, migrated #{account.acct} to #{migration.target_account.acct}", :green)
|
|
|
|
end
|
|
|
|
|
2018-08-27 04:21:03 +10:00
|
|
|
private
|
|
|
|
|
|
|
|
def rotate_keys_for_account(account, delay = 0)
|
2018-09-15 01:42:22 +10:00
|
|
|
if account.nil?
|
|
|
|
say('No such account', :red)
|
|
|
|
exit(1)
|
|
|
|
end
|
|
|
|
|
2018-08-27 04:21:03 +10:00
|
|
|
old_key = account.private_key
|
2018-12-18 11:22:29 +11:00
|
|
|
new_key = OpenSSL::PKey::RSA.new(2048)
|
|
|
|
account.update(private_key: new_key.to_pem, public_key: new_key.public_key.to_pem)
|
2022-12-08 00:13:10 +11:00
|
|
|
ActivityPub::UpdateDistributionWorker.perform_in(delay, account.id, { 'sign_with' => old_key })
|
2018-08-27 04:21:03 +10:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|