mirror of
https://github.com/mail-in-a-box/mailinabox.git
synced 2024-12-23 07:27:05 +00:00
820a39b865
Co-authored-by: Hugh Secker-Walker <hsw+miac@hodain.net>
152 lines
5.3 KiB
Python
Executable File
152 lines
5.3 KiB
Python
Executable File
#!/usr/bin/python3
|
|
#
|
|
# This is a command-line script for calling management APIs
|
|
# on the Mail-in-a-Box control panel backend. The script
|
|
# reads /var/lib/mailinabox/api.key for the backend's
|
|
# root API key. This file is readable only by root, so this
|
|
# tool can only be used as root.
|
|
|
|
import sys, getpass, urllib.request, urllib.error, json, re, csv
|
|
|
|
def mgmt(cmd, data=None, is_json=False):
|
|
# The base URL for the management daemon. (Listens on IPv4 only.)
|
|
mgmt_uri = 'http://127.0.0.1:10222'
|
|
|
|
setup_key_auth(mgmt_uri)
|
|
|
|
req = urllib.request.Request(mgmt_uri + cmd, urllib.parse.urlencode(data).encode("utf8") if data else None)
|
|
try:
|
|
response = urllib.request.urlopen(req)
|
|
except urllib.error.HTTPError as e:
|
|
if e.code == 401:
|
|
try:
|
|
print(e.read().decode("utf8"))
|
|
except:
|
|
pass
|
|
print("The management daemon refused access. The API key file may be out of sync. Try 'service mailinabox restart'.", file=sys.stderr)
|
|
elif hasattr(e, 'read'):
|
|
print(e.read().decode('utf8'), file=sys.stderr)
|
|
else:
|
|
print(e, file=sys.stderr)
|
|
sys.exit(1)
|
|
resp = response.read().decode('utf8')
|
|
if is_json: resp = json.loads(resp)
|
|
return resp
|
|
|
|
def read_password():
|
|
while True:
|
|
first = getpass.getpass('password: ')
|
|
if len(first) < 8:
|
|
print("Passwords must be at least eight characters.")
|
|
continue
|
|
second = getpass.getpass(' (again): ')
|
|
if first != second:
|
|
print("Passwords not the same. Try again.")
|
|
continue
|
|
break
|
|
return first
|
|
|
|
def setup_key_auth(mgmt_uri):
|
|
with open('/var/lib/mailinabox/api.key', 'r') as f:
|
|
key = f.read().strip()
|
|
|
|
auth_handler = urllib.request.HTTPBasicAuthHandler()
|
|
auth_handler.add_password(
|
|
realm='Mail-in-a-Box Management Server',
|
|
uri=mgmt_uri,
|
|
user=key,
|
|
passwd='')
|
|
opener = urllib.request.build_opener(auth_handler)
|
|
urllib.request.install_opener(opener)
|
|
|
|
if len(sys.argv) < 2:
|
|
print("""Usage:
|
|
{cli} user (lists users)
|
|
{cli} user add user@domain.com [password]
|
|
{cli} user password user@domain.com [password]
|
|
{cli} user remove user@domain.com
|
|
{cli} user make-admin user@domain.com
|
|
{cli} user remove-admin user@domain.com
|
|
{cli} user admins (lists admins)
|
|
{cli} user mfa show user@domain.com (shows MFA devices for user, if any)
|
|
{cli} user mfa disable user@domain.com [id] (disables MFA for user)
|
|
{cli} alias (lists aliases)
|
|
{cli} alias add incoming.name@domain.com sent.to@other.domain.com
|
|
{cli} alias add incoming.name@domain.com 'sent.to@other.domain.com, multiple.people@other.domain.com'
|
|
{cli} alias remove incoming.name@domain.com
|
|
|
|
Removing a mail user does not delete their mail folders on disk. It only prevents IMAP/SMTP login.
|
|
""".format(
|
|
cli="management/cli.py"
|
|
))
|
|
|
|
elif sys.argv[1] == "user" and len(sys.argv) == 2:
|
|
# Dump a list of users, one per line. Mark admins with an asterisk.
|
|
users = mgmt("/mail/users?format=json", is_json=True)
|
|
for domain in users:
|
|
for user in domain["users"]:
|
|
if user['status'] == 'inactive': continue
|
|
print(user['email'], end='')
|
|
if "admin" in user['privileges']:
|
|
print("*", end='')
|
|
print()
|
|
|
|
elif sys.argv[1] == "user" and sys.argv[2] in ("add", "password"):
|
|
if len(sys.argv) < 5:
|
|
if len(sys.argv) < 4:
|
|
email = input("email: ")
|
|
else:
|
|
email = sys.argv[3]
|
|
pw = read_password()
|
|
else:
|
|
email, pw = sys.argv[3:5]
|
|
|
|
if sys.argv[2] == "add":
|
|
print(mgmt("/mail/users/add", { "email": email, "password": pw }))
|
|
elif sys.argv[2] == "password":
|
|
print(mgmt("/mail/users/password", { "email": email, "password": pw }))
|
|
|
|
elif sys.argv[1] == "user" and sys.argv[2] == "remove" and len(sys.argv) == 4:
|
|
print(mgmt("/mail/users/remove", { "email": sys.argv[3] }))
|
|
|
|
elif sys.argv[1] == "user" and sys.argv[2] in ("make-admin", "remove-admin") and len(sys.argv) == 4:
|
|
if sys.argv[2] == "make-admin":
|
|
action = "add"
|
|
else:
|
|
action = "remove"
|
|
print(mgmt("/mail/users/privileges/" + action, { "email": sys.argv[3], "privilege": "admin" }))
|
|
|
|
elif sys.argv[1] == "user" and sys.argv[2] == "admins":
|
|
# Dump a list of admin users.
|
|
users = mgmt("/mail/users?format=json", is_json=True)
|
|
for domain in users:
|
|
for user in domain["users"]:
|
|
if "admin" in user['privileges']:
|
|
print(user['email'])
|
|
|
|
elif sys.argv[1] == "user" and len(sys.argv) == 5 and sys.argv[2:4] == ["mfa", "show"]:
|
|
# Show MFA status for a user.
|
|
status = mgmt("/mfa/status", { "user": sys.argv[4] }, is_json=True)
|
|
W = csv.writer(sys.stdout)
|
|
W.writerow(["id", "type", "label"])
|
|
for mfa in status["enabled_mfa"]:
|
|
W.writerow([mfa["id"], mfa["type"], mfa["label"]])
|
|
|
|
elif sys.argv[1] == "user" and len(sys.argv) in (5, 6) and sys.argv[2:4] == ["mfa", "disable"]:
|
|
# Disable MFA (all or a particular device) for a user.
|
|
print(mgmt("/mfa/disable", { "user": sys.argv[4], "mfa-id": sys.argv[5] if len(sys.argv) == 6 else None }))
|
|
|
|
elif sys.argv[1] == "alias" and len(sys.argv) == 2:
|
|
print(mgmt("/mail/aliases"))
|
|
|
|
elif sys.argv[1] == "alias" and sys.argv[2] == "add" and len(sys.argv) == 5:
|
|
print(mgmt("/mail/aliases/add", { "address": sys.argv[3], "forwards_to": sys.argv[4] }))
|
|
|
|
elif sys.argv[1] == "alias" and sys.argv[2] == "remove" and len(sys.argv) == 4:
|
|
print(mgmt("/mail/aliases/remove", { "address": sys.argv[3] }))
|
|
|
|
else:
|
|
print("Invalid command-line arguments.")
|
|
sys.exit(1)
|
|
|