summaryrefslogtreecommitdiffstats
path: root/mattermost.go
diff options
context:
space:
mode:
author=Corey Hulen <corey@hulen.com>2015-09-04 11:59:10 -0700
committer=Corey Hulen <corey@hulen.com>2015-09-04 11:59:10 -0700
commit58d0d9afd286afd715e9f04825e1305045d404e2 (patch)
tree10615aa68c68106684503fb18ae4e4ef8998bc22 /mattermost.go
parent05d95d80a896d14474c7f7384d67b9edd524b922 (diff)
downloadchat-58d0d9afd286afd715e9f04825e1305045d404e2.tar.gz
chat-58d0d9afd286afd715e9f04825e1305045d404e2.tar.bz2
chat-58d0d9afd286afd715e9f04825e1305045d404e2.zip
Adding cmd line options
Diffstat (limited to 'mattermost.go')
-rw-r--r--mattermost.go338
1 files changed, 315 insertions, 23 deletions
diff --git a/mattermost.go b/mattermost.go
index 109692c67..54d08c243 100644
--- a/mattermost.go
+++ b/mattermost.go
@@ -6,46 +6,338 @@ package main
import (
"flag"
"fmt"
+ "os"
+ "os/signal"
+ "strings"
+ "syscall"
+ "time"
+
+ l4g "code.google.com/p/log4go"
"github.com/mattermost/platform/api"
"github.com/mattermost/platform/manualtesting"
+ "github.com/mattermost/platform/model"
"github.com/mattermost/platform/utils"
"github.com/mattermost/platform/web"
- "os"
- "os/signal"
- "syscall"
)
-func main() {
+var flagCmdCreateTeam bool
+var flagCmdCreateUser bool
+var flagCmdAssignRole bool
+var flagCmdResetPassword bool
+var flagConfigFile string
+var flagEmail string
+var flagPassword string
+var flagTeamName string
+var flagRole string
+var flagRunCmds bool
- pwd, _ := os.Getwd()
- fmt.Println("Current working directory is set to " + pwd)
+func main() {
- var config = flag.String("config", "config.json", "path to config file")
- var action = flag.String("action", "none", "path to config file")
- flag.Parse()
+ parseCmds()
- fmt.Println(action)
+ utils.LoadConfig(flagConfigFile)
- if len(action) > 0 {
- return
+ if flagRunCmds {
+ utils.ConfigureCmdLineLog()
}
- utils.LoadConfig(*config)
+ pwd, _ := os.Getwd()
+ l4g.Info("Current working directory is %v", pwd)
+ l4g.Info("Loaded config file from %v", utils.FindConfigFile(flagConfigFile))
+
api.NewServer()
api.InitApi()
web.InitWeb()
- api.StartServer()
- // If we allow testing then listen for manual testing URL hits
- if utils.Cfg.ServiceSettings.AllowTesting {
- manualtesting.InitManualTesting()
+ if flagRunCmds {
+ runCmds()
+ } else {
+ api.StartServer()
+
+ // If we allow testing then listen for manual testing URL hits
+ if utils.Cfg.ServiceSettings.AllowTesting {
+ manualtesting.InitManualTesting()
+ }
+
+ // wait for kill signal before attempting to gracefully shutdown
+ // the running service
+ c := make(chan os.Signal)
+ signal.Notify(c, os.Interrupt, syscall.SIGINT, syscall.SIGTERM)
+ <-c
+
+ api.StopServer()
+ }
+}
+
+func parseCmds() {
+ flag.Usage = func() {
+ fmt.Fprintln(os.Stderr, usage)
+ }
+
+ flag.StringVar(&flagConfigFile, "config", "config.json", "")
+ flag.StringVar(&flagEmail, "email", "", "")
+ flag.StringVar(&flagPassword, "password", "", "")
+ flag.StringVar(&flagTeamName, "team_name", "", "")
+ flag.StringVar(&flagRole, "role", "", "")
+
+ flag.BoolVar(&flagCmdCreateTeam, "create_team", false, "")
+ flag.BoolVar(&flagCmdCreateUser, "create_user", false, "")
+ flag.BoolVar(&flagCmdAssignRole, "assign_role", false, "")
+ flag.BoolVar(&flagCmdResetPassword, "reset_password", false, "")
+
+ flag.Parse()
+
+ flagRunCmds = flagCmdCreateTeam || flagCmdCreateUser || flagCmdAssignRole || flagCmdResetPassword
+}
+
+func runCmds() {
+ cmdCreateTeam()
+ cmdCreateUser()
+ cmdAssignRole()
+ cmdResetPassword()
+}
+
+func cmdCreateTeam() {
+ if flagCmdCreateTeam {
+ if len(flagTeamName) == 0 {
+ fmt.Fprintln(os.Stderr, "flag needs an argument: -team_name")
+ flag.Usage()
+ os.Exit(1)
+ }
+
+ if len(flagEmail) == 0 {
+ fmt.Fprintln(os.Stderr, "flag needs an argument: -email")
+ flag.Usage()
+ os.Exit(1)
+ }
+
+ c := &api.Context{}
+ c.RequestId = model.NewId()
+ c.IpAddress = "cmd_line"
+
+ team := &model.Team{}
+ team.DisplayName = flagTeamName
+ team.Name = flagTeamName
+ team.Email = flagEmail
+ team.Type = model.TEAM_INVITE
+
+ api.CreateTeam(c, team)
+ if c.Err != nil {
+ if c.Err.Message != "A team with that domain already exists" {
+ l4g.Error("%v", c.Err)
+ flushLogAndExit(1)
+ }
+ }
+
+ os.Exit(0)
+ }
+}
+
+func cmdCreateUser() {
+ if flagCmdCreateUser {
+ if len(flagTeamName) == 0 {
+ fmt.Fprintln(os.Stderr, "flag needs an argument: -team_name")
+ flag.Usage()
+ os.Exit(1)
+ }
+
+ if len(flagEmail) == 0 {
+ fmt.Fprintln(os.Stderr, "flag needs an argument: -email")
+ flag.Usage()
+ os.Exit(1)
+ }
+
+ if len(flagPassword) == 0 {
+ fmt.Fprintln(os.Stderr, "flag needs an argument: -password")
+ flag.Usage()
+ os.Exit(1)
+ }
+
+ c := &api.Context{}
+ c.RequestId = model.NewId()
+ c.IpAddress = "cmd_line"
+
+ var team *model.Team
+ user := &model.User{}
+ user.Email = flagEmail
+ user.Password = flagPassword
+ splits := strings.Split(strings.Replace(flagEmail, "@", " ", -1), " ")
+ user.Username = splits[0]
+
+ if result := <-api.Srv.Store.Team().GetByName(flagTeamName); result.Err != nil {
+ l4g.Error("%v", result.Err)
+ flushLogAndExit(1)
+ } else {
+ team = result.Data.(*model.Team)
+ user.TeamId = team.Id
+ }
+
+ api.CreateUser(c, team, user)
+ if c.Err != nil {
+ if c.Err.Message != "An account with that email already exists." {
+ l4g.Error("%v", c.Err)
+ flushLogAndExit(1)
+ }
+ }
+
+ os.Exit(0)
}
+}
+
+func cmdAssignRole() {
+ if flagCmdAssignRole {
+ if len(flagTeamName) == 0 {
+ fmt.Fprintln(os.Stderr, "flag needs an argument: -team_name")
+ flag.Usage()
+ os.Exit(1)
+ }
+
+ if len(flagEmail) == 0 {
+ fmt.Fprintln(os.Stderr, "flag needs an argument: -email")
+ flag.Usage()
+ os.Exit(1)
+ }
+
+ if !model.IsValidRoles(flagRole) {
+ fmt.Fprintln(os.Stderr, "flag invalid argument: -role")
+ flag.Usage()
+ os.Exit(1)
+ }
+
+ c := &api.Context{}
+ c.RequestId = model.NewId()
+ c.IpAddress = "cmd_line"
- // wait for kill signal before attempting to gracefully shutdown
- // the running service
- c := make(chan os.Signal)
- signal.Notify(c, os.Interrupt, syscall.SIGINT, syscall.SIGTERM)
- <-c
+ var team *model.Team
+ if result := <-api.Srv.Store.Team().GetByName(flagTeamName); result.Err != nil {
+ l4g.Error("%v", result.Err)
+ flushLogAndExit(1)
+ } else {
+ team = result.Data.(*model.Team)
+ }
- api.StopServer()
+ var user *model.User
+ if result := <-api.Srv.Store.User().GetByEmail(team.Id, flagEmail); result.Err != nil {
+ l4g.Error("%v", result.Err)
+ flushLogAndExit(1)
+ } else {
+ user = result.Data.(*model.User)
+ }
+
+ if !user.IsInRole(flagRole) {
+ if flagRole == model.ROLE_SYSTEM_ADMIN && team.Name != "admin" {
+ l4g.Error("system_admin can only be added to a user in the admin team")
+ flushLogAndExit(1)
+ }
+
+ api.UpdateRoles(c, user, flagRole)
+ }
+
+ os.Exit(0)
+ }
}
+
+func cmdResetPassword() {
+ if flagCmdResetPassword {
+ if len(flagTeamName) == 0 {
+ fmt.Fprintln(os.Stderr, "flag needs an argument: -team_name")
+ flag.Usage()
+ os.Exit(1)
+ }
+
+ if len(flagEmail) == 0 {
+ fmt.Fprintln(os.Stderr, "flag needs an argument: -email")
+ flag.Usage()
+ os.Exit(1)
+ }
+
+ if len(flagPassword) == 0 {
+ fmt.Fprintln(os.Stderr, "flag needs an argument: -password")
+ flag.Usage()
+ os.Exit(1)
+ }
+
+ c := &api.Context{}
+ c.RequestId = model.NewId()
+ c.IpAddress = "cmd_line"
+
+ var team *model.Team
+ if result := <-api.Srv.Store.Team().GetByName(flagTeamName); result.Err != nil {
+ l4g.Error("%v", result.Err)
+ flushLogAndExit(1)
+ } else {
+ team = result.Data.(*model.Team)
+ }
+
+ var user *model.User
+ if result := <-api.Srv.Store.User().GetByEmail(team.Id, flagEmail); result.Err != nil {
+ l4g.Error("%v", result.Err)
+ flushLogAndExit(1)
+ } else {
+ user = result.Data.(*model.User)
+ }
+
+ if result := <-api.Srv.Store.User().UpdatePassword(user.Id, model.HashPassword(flagPassword)); result.Err != nil {
+ l4g.Error("%v", result.Err)
+ flushLogAndExit(1)
+ }
+
+ os.Exit(0)
+ }
+}
+
+func flushLogAndExit(code int) {
+ l4g.Close()
+ time.Sleep(time.Second)
+ os.Exit(code)
+}
+
+var usage = `Mattermost commands to help configure the system
+Usage:
+
+ platform [options]
+
+ -config="config.json" Path to the config file
+
+ -email="user@example.com" Email address used in other commands
+
+ -password="mypassword" Password used in other commands
+
+ -team_name="name" The team name used in other commands
+
+ -role="admin" The role used in other commands
+ valid values are
+ "" - The empty role is basic user
+ permissions
+ "admin" - Represents a team admin and
+ is used to help adminsiter one team.
+ "system_admin" - Represents a system
+ admin who has access to all teams
+ and configuration settings. This
+ role can only be created on the
+ team named "admin"
+
+ -create_team Creates a team. It requres the -team_name
+ and -email flag to create a team.
+ Example:
+ platform -create_team -team_name="name" -email="user@example.com"
+
+ -create_user Creates a user. It requres the -team_name,
+ -email and -password flag to create a user.
+ Example:
+ platform -create_user -team_name="name" -email="user@example.com" -password="mypassword"
+
+ -assign_role Assigns role to a user. It requres the -team_name,
+ -email and -role flag. If you're assigning the
+ "system_admin" role it must be for a user on the
+ team_name="admin"
+ Example:
+ platform -assign_role -team_name="name" -email="user@example.com" -role="admin"
+
+ -reset_password Resets the password for a user. It requres the
+ -team_name, -email and -password flag.
+ Example:
+ platform -reset_password -team_name="name" -email="user@example.com" -paossword="newpassword"
+
+
+`