2019-04-20 10:42:28 +02:00
|
|
|
<?php
|
2020-02-09 15:45:36 +01:00
|
|
|
/**
|
2021-03-29 08:40:20 +02:00
|
|
|
* @copyright Copyright (C) 2010-2021, the Friendica project
|
2020-02-09 15:45:36 +01:00
|
|
|
*
|
|
|
|
* @license GNU AGPL version 3 or any later version
|
|
|
|
*
|
|
|
|
* This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as
|
|
|
|
* published by the Free Software Foundation, either version 3 of the
|
|
|
|
* License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
*/
|
2019-04-20 10:42:28 +02:00
|
|
|
|
2019-05-02 23:17:35 +02:00
|
|
|
namespace Friendica\Console;
|
2019-04-20 10:42:28 +02:00
|
|
|
|
|
|
|
use Asika\SimpleConsole\CommandArgsException;
|
|
|
|
use Asika\SimpleConsole\Console;
|
|
|
|
use Console_Table;
|
2020-01-19 21:29:36 +01:00
|
|
|
use Friendica\Core\Config\IConfig;
|
2019-04-20 10:42:28 +02:00
|
|
|
|
|
|
|
/**
|
2020-01-19 07:05:23 +01:00
|
|
|
* Manage blocked servers
|
2019-04-20 10:42:28 +02:00
|
|
|
*
|
|
|
|
* With this tool, you can list the current blocked servers
|
|
|
|
* or you can add / remove a blocked server from the list
|
|
|
|
*/
|
2019-04-20 16:40:27 +02:00
|
|
|
class ServerBlock extends Console
|
2019-04-20 10:42:28 +02:00
|
|
|
{
|
2019-04-20 12:53:17 +02:00
|
|
|
const DEFAULT_REASON = 'blocked';
|
|
|
|
|
2019-04-20 10:42:28 +02:00
|
|
|
protected $helpOptions = ['h', 'help', '?'];
|
|
|
|
|
2019-07-28 22:06:33 +02:00
|
|
|
/**
|
2020-01-19 21:29:36 +01:00
|
|
|
* @var IConfig
|
2019-07-28 22:06:33 +02:00
|
|
|
*/
|
|
|
|
private $config;
|
|
|
|
|
2019-04-20 10:42:28 +02:00
|
|
|
protected function getHelp()
|
|
|
|
{
|
|
|
|
$help = <<<HELP
|
2019-07-26 04:36:50 +02:00
|
|
|
console serverblock - Manage blocked server domain patterns
|
2019-04-20 10:42:28 +02:00
|
|
|
Usage
|
2020-08-07 11:49:25 +02:00
|
|
|
bin/console serverblock [-h|--help|-?] [-v]
|
|
|
|
bin/console serverblock add <pattern> <reason> [-h|--help|-?] [-v]
|
|
|
|
bin/console serverblock remove <pattern> [-h|--help|-?] [-v]
|
|
|
|
bin/console serverblock export <filename>
|
|
|
|
bin/console serverblock import <filename>
|
2019-04-20 10:42:28 +02:00
|
|
|
|
|
|
|
Description
|
2020-08-07 11:49:25 +02:00
|
|
|
With this tool, you can list the current blocked server domain patterns
|
|
|
|
or you can add / remove a blocked server domain pattern from the list.
|
|
|
|
Using the export and import options you can share your server blocklist
|
|
|
|
with other node admins by CSV files.
|
|
|
|
|
|
|
|
Patterns are case-insensitive shell wildcard comprising the following special characters:
|
|
|
|
- * : Any number of characters
|
|
|
|
- ? : Any single character
|
|
|
|
- [<char1><char2>...] : char1 or char2 or...
|
2019-04-20 10:42:28 +02:00
|
|
|
|
|
|
|
Options
|
2020-08-07 11:49:25 +02:00
|
|
|
-h|--help|-? Show help information
|
|
|
|
-v Show more debug information.
|
2019-04-20 10:42:28 +02:00
|
|
|
HELP;
|
|
|
|
return $help;
|
|
|
|
}
|
|
|
|
|
2020-01-19 21:29:36 +01:00
|
|
|
public function __construct(IConfig $config, $argv = null)
|
2019-04-20 10:42:28 +02:00
|
|
|
{
|
2019-07-28 22:06:33 +02:00
|
|
|
parent::__construct($argv);
|
2019-04-20 10:42:28 +02:00
|
|
|
|
2019-07-28 22:06:33 +02:00
|
|
|
$this->config = $config;
|
|
|
|
}
|
|
|
|
|
|
|
|
protected function doExecute()
|
|
|
|
{
|
2019-04-20 10:42:28 +02:00
|
|
|
if (count($this->args) == 0) {
|
2019-07-28 22:06:33 +02:00
|
|
|
$this->printBlockedServers($this->config);
|
2019-04-20 10:42:28 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch ($this->getArgument(0)) {
|
|
|
|
case 'add':
|
2019-07-28 22:06:33 +02:00
|
|
|
return $this->addBlockedServer($this->config);
|
2019-04-20 10:42:28 +02:00
|
|
|
case 'remove':
|
2019-07-28 22:06:33 +02:00
|
|
|
return $this->removeBlockedServer($this->config);
|
2020-07-19 09:49:17 +02:00
|
|
|
case 'export':
|
|
|
|
return $this->exportBlockedServers($this->config);
|
|
|
|
case 'import':
|
|
|
|
return $this->importBlockedServers($this->config);
|
2019-04-20 10:42:28 +02:00
|
|
|
default:
|
|
|
|
throw new CommandArgsException('Unknown command.');
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2020-07-19 09:49:17 +02:00
|
|
|
* Exports the list of blocked domains including the reason for the
|
|
|
|
* block to a CSV file.
|
2019-04-20 10:42:28 +02:00
|
|
|
*
|
2020-01-19 21:29:36 +01:00
|
|
|
* @param IConfig $config
|
2019-04-20 10:42:28 +02:00
|
|
|
*/
|
2020-07-19 09:49:17 +02:00
|
|
|
private function exportBlockedServers(IConfig $config)
|
|
|
|
{
|
|
|
|
$filename = $this->getArgument(1);
|
|
|
|
$blocklist = $config->get('system', 'blocklist', []);
|
|
|
|
$fp = fopen($filename, 'w');
|
2020-08-08 08:47:21 +02:00
|
|
|
if (!$fp) {
|
|
|
|
throw new Exception(sprintf('The file "%s" could not be created.', $filename));
|
|
|
|
}
|
2020-07-19 09:49:17 +02:00
|
|
|
foreach ($blocklist as $domain) {
|
|
|
|
fputcsv($fp, $domain);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/**
|
|
|
|
* Imports a list of domains and a reason for the block from a CSV
|
|
|
|
* file, e.g. created with the export function.
|
|
|
|
*
|
|
|
|
* @param IConfig $config
|
|
|
|
*/
|
|
|
|
private function importBlockedServers(IConfig $config)
|
|
|
|
{
|
|
|
|
$filename = $this->getArgument(1);
|
|
|
|
$currBlockList = $config->get('system', 'blocklist', []);
|
|
|
|
$newBlockList = [];
|
2020-08-08 08:35:34 +02:00
|
|
|
if (($fp = fopen($filename, 'r')) !== false) {
|
|
|
|
while (($data = fgetcsv($fp, 1000, ',')) !== false) {
|
2020-07-19 09:49:17 +02:00
|
|
|
$domain = $data[0];
|
2020-08-08 08:35:34 +02:00
|
|
|
if (count($data) == 0) {
|
2020-07-19 09:49:17 +02:00
|
|
|
$reason = self::DEFAULT_REASON;
|
|
|
|
} else {
|
|
|
|
$reason = $data[1];
|
|
|
|
}
|
|
|
|
$data = [
|
|
|
|
'domain' => $domain,
|
|
|
|
'reason' => $reason
|
|
|
|
];
|
2020-08-08 08:35:34 +02:00
|
|
|
if (!in_array($data, $newBlockList)) {
|
2020-07-19 09:49:17 +02:00
|
|
|
$newBlockList[] = $data;
|
2020-08-08 15:49:25 +02:00
|
|
|
}
|
2020-07-19 09:49:17 +02:00
|
|
|
}
|
|
|
|
foreach ($currBlockList as $blocked) {
|
2020-08-08 08:35:34 +02:00
|
|
|
if (!in_array($blocked, $newBlockList)) {
|
2020-07-19 09:49:17 +02:00
|
|
|
$newBlockList[] = $blocked;
|
2020-08-08 15:49:25 +02:00
|
|
|
}
|
2020-07-19 09:49:17 +02:00
|
|
|
}
|
|
|
|
if ($config->set('system', 'blocklist', $newBlockList)) {
|
|
|
|
$this->out(sprintf("Entries from %s that were not blocked before are now blocked", $filename));
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
$this->out(sprintf("Couldn't save '%s' as blocked server", $domain));
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2020-08-08 08:47:21 +02:00
|
|
|
} else {
|
|
|
|
throw new Exception(sprintf('The file "%s" could not be opened for importing', $filename));
|
2020-07-19 09:49:17 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Prints the whole list of blocked domains including the reason
|
|
|
|
*
|
2020-08-29 17:50:15 +02:00
|
|
|
* @param IConfig $config
|
2020-07-19 09:49:17 +02:00
|
|
|
*/
|
2020-01-19 21:29:36 +01:00
|
|
|
private function printBlockedServers(IConfig $config)
|
2019-04-20 10:42:28 +02:00
|
|
|
{
|
|
|
|
$table = new Console_Table();
|
|
|
|
$table->setHeaders(['Domain', 'Reason']);
|
2019-07-28 22:06:33 +02:00
|
|
|
$blocklist = $config->get('system', 'blocklist', []);
|
2019-04-20 10:42:28 +02:00
|
|
|
foreach ($blocklist as $domain) {
|
|
|
|
$table->addRow($domain);
|
|
|
|
}
|
|
|
|
$this->out($table->getTable());
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Adds a server to the blocked list
|
|
|
|
*
|
2020-01-19 21:29:36 +01:00
|
|
|
* @param IConfig $config
|
2019-04-20 10:42:28 +02:00
|
|
|
*
|
|
|
|
* @return int The return code (0 = success, 1 = failed)
|
|
|
|
*/
|
2020-01-19 21:29:36 +01:00
|
|
|
private function addBlockedServer(IConfig $config)
|
2019-04-20 10:42:28 +02:00
|
|
|
{
|
|
|
|
if (count($this->args) < 2 || count($this->args) > 3) {
|
|
|
|
throw new CommandArgsException('Add needs a domain and optional a reason.');
|
|
|
|
}
|
|
|
|
|
|
|
|
$domain = $this->getArgument(1);
|
2019-04-20 13:24:33 +02:00
|
|
|
$reason = (count($this->args) === 3) ? $this->getArgument(2) : self::DEFAULT_REASON;
|
2019-04-20 10:42:28 +02:00
|
|
|
|
2019-04-20 13:24:33 +02:00
|
|
|
$update = false;
|
|
|
|
|
2020-07-19 09:49:17 +02:00
|
|
|
$currBlockList = $config->get('system', 'blocklist', []);
|
2019-04-20 13:24:33 +02:00
|
|
|
$newBlockList = [];
|
2020-07-19 09:49:17 +02:00
|
|
|
foreach ($currBlockList as $blocked) {
|
2019-04-20 10:42:28 +02:00
|
|
|
if ($blocked['domain'] === $domain) {
|
2019-04-20 13:24:33 +02:00
|
|
|
$update = true;
|
|
|
|
$newBlockList[] = [
|
|
|
|
'domain' => $domain,
|
|
|
|
'reason' => $reason,
|
|
|
|
];
|
|
|
|
} else {
|
|
|
|
$newBlockList[] = $blocked;
|
2019-04-20 10:42:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-20 13:24:33 +02:00
|
|
|
if (!$update) {
|
|
|
|
$newBlockList[] = [
|
|
|
|
'domain' => $domain,
|
|
|
|
'reason' => $reason,
|
|
|
|
];
|
|
|
|
}
|
2019-04-20 10:42:28 +02:00
|
|
|
|
2019-04-20 13:24:33 +02:00
|
|
|
if ($config->set('system', 'blocklist', $newBlockList)) {
|
|
|
|
if ($update) {
|
|
|
|
$this->out(sprintf("The domain '%s' is now updated. (Reason: '%s')", $domain, $reason));
|
|
|
|
} else {
|
|
|
|
$this->out(sprintf("The domain '%s' is now blocked. (Reason: '%s')", $domain, $reason));
|
|
|
|
}
|
2019-04-20 10:42:28 +02:00
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
$this->out(sprintf("Couldn't save '%s' as blocked server", $domain));
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Removes a server from the blocked list
|
|
|
|
*
|
2020-01-19 21:29:36 +01:00
|
|
|
* @param IConfig $config
|
2019-04-20 10:42:28 +02:00
|
|
|
*
|
|
|
|
* @return int The return code (0 = success, 1 = failed)
|
|
|
|
*/
|
2020-01-19 21:29:36 +01:00
|
|
|
private function removeBlockedServer(IConfig $config)
|
2019-04-20 10:42:28 +02:00
|
|
|
{
|
|
|
|
if (count($this->args) !== 2) {
|
|
|
|
throw new CommandArgsException('Remove needs a second parameter.');
|
|
|
|
}
|
|
|
|
|
|
|
|
$domain = $this->getArgument(1);
|
|
|
|
|
|
|
|
$found = false;
|
|
|
|
|
2020-07-19 09:49:17 +02:00
|
|
|
$currBlockList = $config->get('system', 'blocklist', []);
|
2019-04-20 10:42:28 +02:00
|
|
|
$newBlockList = [];
|
2020-07-19 09:49:17 +02:00
|
|
|
foreach ($currBlockList as $blocked) {
|
2019-04-20 10:42:28 +02:00
|
|
|
if ($blocked['domain'] === $domain) {
|
|
|
|
$found = true;
|
|
|
|
} else {
|
|
|
|
$newBlockList[] = $blocked;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!$found) {
|
2019-04-20 13:24:33 +02:00
|
|
|
$this->out(sprintf("The domain '%s' is not blocked.", $domain));
|
2019-04-20 10:42:28 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if ($config->set('system', 'blocklist', $newBlockList)) {
|
|
|
|
$this->out(sprintf("The domain '%s' is not more blocked", $domain));
|
|
|
|
return 0;
|
|
|
|
} else {
|
|
|
|
$this->out(sprintf("Couldn't remove '%s' from blocked servers", $domain));
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|