/mandos/release

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/release

« back to all changes in this revision

Viewing changes to mandos

* plugin-runner.c: Whitespace changes only.

Show diffs side-by-side

added added

removed removed

Lines of Context:
11
11
# and some lines in "main".
12
12
13
13
# Everything else is
14
 
# Copyright © 2007-2008 Teddy Hogeborn & Björn Påhlsson
 
14
# Copyright © 2008,2009 Teddy Hogeborn
 
15
# Copyright © 2008,2009 Björn Påhlsson
15
16
16
17
# This program is free software: you can redistribute it and/or modify
17
18
# it under the terms of the GNU General Public License as published by
24
25
#     GNU General Public License for more details.
25
26
26
27
# You should have received a copy of the GNU General Public License
27
 
# along with this program.  If not, see <http://www.gnu.org/licenses/>.
 
28
# along with this program.  If not, see
 
29
# <http://www.gnu.org/licenses/>.
28
30
29
31
# Contact the authors at <mandos@fukt.bsnet.se>.
30
32
31
33
 
32
 
from __future__ import division
 
34
from __future__ import division, with_statement, absolute_import
33
35
 
34
36
import SocketServer
35
37
import socket
36
 
import select
37
 
from optparse import OptionParser
 
38
import optparse
38
39
import datetime
39
40
import errno
40
41
import gnutls.crypto
54
55
import stat
55
56
import logging
56
57
import logging.handlers
 
58
import pwd
 
59
from contextlib import closing
57
60
 
58
61
import dbus
 
62
import dbus.service
59
63
import gobject
60
64
import avahi
61
65
from dbus.mainloop.glib import DBusGMainLoop
62
66
import ctypes
 
67
import ctypes.util
63
68
 
 
69
version = "1.0.5"
64
70
 
65
71
logger = logging.Logger('mandos')
66
 
syslogger = logging.handlers.SysLogHandler\
67
 
            (facility = logging.handlers.SysLogHandler.LOG_DAEMON)
68
 
syslogger.setFormatter(logging.Formatter\
69
 
                        ('%(levelname)s: %(message)s'))
 
72
syslogger = (logging.handlers.SysLogHandler
 
73
             (facility = logging.handlers.SysLogHandler.LOG_DAEMON,
 
74
              address = "/dev/log"))
 
75
syslogger.setFormatter(logging.Formatter
 
76
                       ('Mandos [%(process)d]: %(levelname)s:'
 
77
                        ' %(message)s'))
70
78
logger.addHandler(syslogger)
71
 
del syslogger
72
79
 
 
80
console = logging.StreamHandler()
 
81
console.setFormatter(logging.Formatter('%(name)s [%(process)d]:'
 
82
                                       ' %(levelname)s: %(message)s'))
 
83
logger.addHandler(console)
73
84
 
74
85
class AvahiError(Exception):
75
 
    def __init__(self, value):
 
86
    def __init__(self, value, *args, **kwargs):
76
87
        self.value = value
77
 
    def __str__(self):
78
 
        return repr(self.value)
 
88
        super(AvahiError, self).__init__(value, *args, **kwargs)
 
89
    def __unicode__(self):
 
90
        return unicode(repr(self.value))
79
91
 
80
92
class AvahiServiceError(AvahiError):
81
93
    pass
101
113
                  a sensible number of times
102
114
    """
103
115
    def __init__(self, interface = avahi.IF_UNSPEC, name = None,
104
 
                 type = None, port = None, TXT = None, domain = "",
105
 
                 host = "", max_renames = 12):
 
116
                 servicetype = None, port = None, TXT = None,
 
117
                 domain = "", host = "", max_renames = 32768):
106
118
        self.interface = interface
107
119
        self.name = name
108
 
        self.type = type
 
120
        self.type = servicetype
109
121
        self.port = port
110
 
        if TXT is None:
111
 
            self.TXT = []
112
 
        else:
113
 
            self.TXT = TXT
 
122
        self.TXT = TXT if TXT is not None else []
114
123
        self.domain = domain
115
124
        self.host = host
116
125
        self.rename_count = 0
 
126
        self.max_renames = max_renames
117
127
    def rename(self):
118
128
        """Derived from the Avahi example code"""
119
129
        if self.rename_count >= self.max_renames:
120
 
            logger.critical(u"No suitable service name found after %i"
121
 
                            u" retries, exiting.", rename_count)
122
 
            raise AvahiServiceError("Too many renames")
123
 
        name = server.GetAlternativeServiceName(name)
124
 
        logger.error(u"Changing name to %r ...", name)
 
130
            logger.critical(u"No suitable Zeroconf service name found"
 
131
                            u" after %i retries, exiting.",
 
132
                            self.rename_count)
 
133
            raise AvahiServiceError(u"Too many renames")
 
134
        self.name = server.GetAlternativeServiceName(self.name)
 
135
        logger.info(u"Changing Zeroconf service name to %r ...",
 
136
                    str(self.name))
 
137
        syslogger.setFormatter(logging.Formatter
 
138
                               ('Mandos (%s): %%(levelname)s:'
 
139
                                ' %%(message)s' % self.name))
125
140
        self.remove()
126
141
        self.add()
127
142
        self.rename_count += 1
133
148
        """Derived from the Avahi example code"""
134
149
        global group
135
150
        if group is None:
136
 
            group = dbus.Interface\
137
 
                    (bus.get_object(avahi.DBUS_NAME,
 
151
            group = dbus.Interface(bus.get_object
 
152
                                   (avahi.DBUS_NAME,
138
153
                                    server.EntryGroupNew()),
139
 
                     avahi.DBUS_INTERFACE_ENTRY_GROUP)
 
154
                                   avahi.DBUS_INTERFACE_ENTRY_GROUP)
140
155
            group.connect_to_signal('StateChanged',
141
156
                                    entry_group_state_changed)
142
 
        logger.debug(u"Adding service '%s' of type '%s' ...",
 
157
        logger.debug(u"Adding Zeroconf service '%s' of type '%s' ...",
143
158
                     service.name, service.type)
144
159
        group.AddService(
145
160
                self.interface,         # interface
156
171
# End of Avahi example code
157
172
 
158
173
 
159
 
class Client(object):
 
174
def _datetime_to_dbus(dt, variant_level=0):
 
175
    """Convert a UTC datetime.datetime() to a D-Bus type."""
 
176
    return dbus.String(dt.isoformat(), variant_level=variant_level)
 
177
 
 
178
 
 
179
class Client(dbus.service.Object):
160
180
    """A representation of a client host served by this server.
161
181
    Attributes:
162
 
    name:      string; from the config file, used in log messages
 
182
    name:       string; from the config file, used in log messages and
 
183
                        D-Bus identifiers
163
184
    fingerprint: string (40 or 32 hexadecimal digits); used to
164
185
                 uniquely identify the client
165
 
    secret:    bytestring; sent verbatim (over TLS) to client
166
 
    host:      string; available for use by the checker command
167
 
    created:   datetime.datetime(); object creation, not client host
168
 
    last_checked_ok: datetime.datetime() or None if not yet checked OK
169
 
    timeout:   datetime.timedelta(); How long from last_checked_ok
170
 
                                     until this client is invalid
171
 
    interval:  datetime.timedelta(); How often to start a new checker
172
 
    stop_hook: If set, called by stop() as stop_hook(self)
173
 
    checker:   subprocess.Popen(); a running checker process used
174
 
                                   to see if the client lives.
175
 
                                   'None' if no process is running.
 
186
    secret:     bytestring; sent verbatim (over TLS) to client
 
187
    host:       string; available for use by the checker command
 
188
    created:    datetime.datetime(); (UTC) object creation
 
189
    last_enabled: datetime.datetime(); (UTC)
 
190
    enabled:    bool()
 
191
    last_checked_ok: datetime.datetime(); (UTC) or None
 
192
    timeout:    datetime.timedelta(); How long from last_checked_ok
 
193
                                      until this client is invalid
 
194
    interval:   datetime.timedelta(); How often to start a new checker
 
195
    disable_hook:  If set, called by disable() as disable_hook(self)
 
196
    checker:    subprocess.Popen(); a running checker process used
 
197
                                    to see if the client lives.
 
198
                                    'None' if no process is running.
176
199
    checker_initiator_tag: a gobject event source tag, or None
177
 
    stop_initiator_tag:    - '' -
 
200
    disable_initiator_tag:    - '' -
178
201
    checker_callback_tag:  - '' -
179
202
    checker_command: string; External command which is run to check if
180
203
                     client lives.  %() expansions are done at
181
204
                     runtime with vars(self) as dict, so that for
182
205
                     instance %(name)s can be used in the command.
183
 
    Private attibutes:
184
 
    _timeout: Real variable for 'timeout'
185
 
    _interval: Real variable for 'interval'
186
 
    _timeout_milliseconds: Used when calling gobject.timeout_add()
187
 
    _interval_milliseconds: - '' -
 
206
    use_dbus: bool(); Whether to provide D-Bus interface and signals
 
207
    dbus_object_path: dbus.ObjectPath ; only set if self.use_dbus
188
208
    """
189
 
    def _set_timeout(self, timeout):
190
 
        "Setter function for 'timeout' attribute"
191
 
        self._timeout = timeout
192
 
        self._timeout_milliseconds = ((self.timeout.days
193
 
                                       * 24 * 60 * 60 * 1000)
194
 
                                      + (self.timeout.seconds * 1000)
195
 
                                      + (self.timeout.microseconds
196
 
                                         // 1000))
197
 
    timeout = property(lambda self: self._timeout,
198
 
                       _set_timeout)
199
 
    del _set_timeout
200
 
    def _set_interval(self, interval):
201
 
        "Setter function for 'interval' attribute"
202
 
        self._interval = interval
203
 
        self._interval_milliseconds = ((self.interval.days
204
 
                                        * 24 * 60 * 60 * 1000)
205
 
                                       + (self.interval.seconds
206
 
                                          * 1000)
207
 
                                       + (self.interval.microseconds
208
 
                                          // 1000))
209
 
    interval = property(lambda self: self._interval,
210
 
                        _set_interval)
211
 
    del _set_interval
212
 
    def __init__(self, name = None, stop_hook=None, config={}):
 
209
    def timeout_milliseconds(self):
 
210
        "Return the 'timeout' attribute in milliseconds"
 
211
        return ((self.timeout.days * 24 * 60 * 60 * 1000)
 
212
                + (self.timeout.seconds * 1000)
 
213
                + (self.timeout.microseconds // 1000))
 
214
    
 
215
    def interval_milliseconds(self):
 
216
        "Return the 'interval' attribute in milliseconds"
 
217
        return ((self.interval.days * 24 * 60 * 60 * 1000)
 
218
                + (self.interval.seconds * 1000)
 
219
                + (self.interval.microseconds // 1000))
 
220
    
 
221
    def __init__(self, name = None, disable_hook=None, config=None,
 
222
                 use_dbus=True):
213
223
        """Note: the 'checker' key in 'config' sets the
214
224
        'checker_command' attribute and *not* the 'checker'
215
225
        attribute."""
216
226
        self.name = name
 
227
        if config is None:
 
228
            config = {}
217
229
        logger.debug(u"Creating client %r", self.name)
 
230
        self.use_dbus = False   # During __init__
218
231
        # Uppercase and remove spaces from fingerprint for later
219
232
        # comparison purposes with return value from the fingerprint()
220
233
        # function
221
 
        self.fingerprint = config["fingerprint"].upper()\
222
 
                           .replace(u" ", u"")
 
234
        self.fingerprint = (config["fingerprint"].upper()
 
235
                            .replace(u" ", u""))
223
236
        logger.debug(u"  Fingerprint: %s", self.fingerprint)
224
237
        if "secret" in config:
225
238
            self.secret = config["secret"].decode(u"base64")
226
239
        elif "secfile" in config:
227
 
            sf = open(config["secfile"])
228
 
            self.secret = sf.read()
229
 
            sf.close()
 
240
            with closing(open(os.path.expanduser
 
241
                              (os.path.expandvars
 
242
                               (config["secfile"])))) as secfile:
 
243
                self.secret = secfile.read()
230
244
        else:
231
245
            raise TypeError(u"No secret or secfile for client %s"
232
246
                            % self.name)
233
247
        self.host = config.get("host", "")
234
 
        self.created = datetime.datetime.now()
 
248
        self.created = datetime.datetime.utcnow()
 
249
        self.enabled = False
 
250
        self.last_enabled = None
235
251
        self.last_checked_ok = None
236
252
        self.timeout = string_to_delta(config["timeout"])
237
253
        self.interval = string_to_delta(config["interval"])
238
 
        self.stop_hook = stop_hook
 
254
        self.disable_hook = disable_hook
239
255
        self.checker = None
240
256
        self.checker_initiator_tag = None
241
 
        self.stop_initiator_tag = None
 
257
        self.disable_initiator_tag = None
242
258
        self.checker_callback_tag = None
243
 
        self.check_command = config["checker"]
244
 
    def start(self):
 
259
        self.checker_command = config["checker"]
 
260
        self.last_connect = None
 
261
        # Only now, when this client is initialized, can it show up on
 
262
        # the D-Bus
 
263
        self.use_dbus = use_dbus
 
264
        if self.use_dbus:
 
265
            self.dbus_object_path = (dbus.ObjectPath
 
266
                                     ("/clients/"
 
267
                                      + self.name.replace(".", "_")))
 
268
            dbus.service.Object.__init__(self, bus,
 
269
                                         self.dbus_object_path)
 
270
    
 
271
    def enable(self):
245
272
        """Start this client's checker and timeout hooks"""
 
273
        self.last_enabled = datetime.datetime.utcnow()
246
274
        # Schedule a new checker to be started an 'interval' from now,
247
275
        # and every interval from then on.
248
 
        self.checker_initiator_tag = gobject.timeout_add\
249
 
                                     (self._interval_milliseconds,
250
 
                                      self.start_checker)
 
276
        self.checker_initiator_tag = (gobject.timeout_add
 
277
                                      (self.interval_milliseconds(),
 
278
                                       self.start_checker))
251
279
        # Also start a new checker *right now*.
252
280
        self.start_checker()
253
 
        # Schedule a stop() when 'timeout' has passed
254
 
        self.stop_initiator_tag = gobject.timeout_add\
255
 
                                  (self._timeout_milliseconds,
256
 
                                   self.stop)
257
 
    def stop(self):
258
 
        """Stop this client.
259
 
        The possibility that a client might be restarted is left open,
260
 
        but not currently used."""
261
 
        # If this client doesn't have a secret, it is already stopped.
262
 
        if hasattr(self, "secret") and self.secret:
263
 
            logger.info(u"Stopping client %s", self.name)
264
 
            self.secret = None
265
 
        else:
 
281
        # Schedule a disable() when 'timeout' has passed
 
282
        self.disable_initiator_tag = (gobject.timeout_add
 
283
                                   (self.timeout_milliseconds(),
 
284
                                    self.disable))
 
285
        self.enabled = True
 
286
        if self.use_dbus:
 
287
            # Emit D-Bus signals
 
288
            self.PropertyChanged(dbus.String(u"enabled"),
 
289
                                 dbus.Boolean(True, variant_level=1))
 
290
            self.PropertyChanged(dbus.String(u"last_enabled"),
 
291
                                 (_datetime_to_dbus(self.last_enabled,
 
292
                                                    variant_level=1)))
 
293
    
 
294
    def disable(self):
 
295
        """Disable this client."""
 
296
        if not getattr(self, "enabled", False):
266
297
            return False
267
 
        if getattr(self, "stop_initiator_tag", False):
268
 
            gobject.source_remove(self.stop_initiator_tag)
269
 
            self.stop_initiator_tag = None
 
298
        logger.info(u"Disabling client %s", self.name)
 
299
        if getattr(self, "disable_initiator_tag", False):
 
300
            gobject.source_remove(self.disable_initiator_tag)
 
301
            self.disable_initiator_tag = None
270
302
        if getattr(self, "checker_initiator_tag", False):
271
303
            gobject.source_remove(self.checker_initiator_tag)
272
304
            self.checker_initiator_tag = None
273
305
        self.stop_checker()
274
 
        if self.stop_hook:
275
 
            self.stop_hook(self)
 
306
        if self.disable_hook:
 
307
            self.disable_hook(self)
 
308
        self.enabled = False
 
309
        if self.use_dbus:
 
310
            # Emit D-Bus signal
 
311
            self.PropertyChanged(dbus.String(u"enabled"),
 
312
                                 dbus.Boolean(False, variant_level=1))
276
313
        # Do not run this again if called by a gobject.timeout_add
277
314
        return False
 
315
    
278
316
    def __del__(self):
279
 
        self.stop_hook = None
280
 
        self.stop()
281
 
    def checker_callback(self, pid, condition):
 
317
        self.disable_hook = None
 
318
        self.disable()
 
319
    
 
320
    def checker_callback(self, pid, condition, command):
282
321
        """The checker has completed, so take appropriate actions."""
283
 
        now = datetime.datetime.now()
284
322
        self.checker_callback_tag = None
285
323
        self.checker = None
286
 
        if os.WIFEXITED(condition) \
287
 
               and (os.WEXITSTATUS(condition) == 0):
288
 
            logger.info(u"Checker for %(name)s succeeded",
289
 
                        vars(self))
290
 
            self.last_checked_ok = now
291
 
            gobject.source_remove(self.stop_initiator_tag)
292
 
            self.stop_initiator_tag = gobject.timeout_add\
293
 
                                      (self._timeout_milliseconds,
294
 
                                       self.stop)
295
 
        elif not os.WIFEXITED(condition):
 
324
        if self.use_dbus:
 
325
            # Emit D-Bus signal
 
326
            self.PropertyChanged(dbus.String(u"checker_running"),
 
327
                                 dbus.Boolean(False, variant_level=1))
 
328
        if os.WIFEXITED(condition):
 
329
            exitstatus = os.WEXITSTATUS(condition)
 
330
            if exitstatus == 0:
 
331
                logger.info(u"Checker for %(name)s succeeded",
 
332
                            vars(self))
 
333
                self.checked_ok()
 
334
            else:
 
335
                logger.info(u"Checker for %(name)s failed",
 
336
                            vars(self))
 
337
            if self.use_dbus:
 
338
                # Emit D-Bus signal
 
339
                self.CheckerCompleted(dbus.Int16(exitstatus),
 
340
                                      dbus.Int64(condition),
 
341
                                      dbus.String(command))
 
342
        else:
296
343
            logger.warning(u"Checker for %(name)s crashed?",
297
344
                           vars(self))
298
 
        else:
299
 
            logger.info(u"Checker for %(name)s failed",
300
 
                        vars(self))
 
345
            if self.use_dbus:
 
346
                # Emit D-Bus signal
 
347
                self.CheckerCompleted(dbus.Int16(-1),
 
348
                                      dbus.Int64(condition),
 
349
                                      dbus.String(command))
 
350
    
 
351
    def checked_ok(self):
 
352
        """Bump up the timeout for this client.
 
353
        This should only be called when the client has been seen,
 
354
        alive and well.
 
355
        """
 
356
        self.last_checked_ok = datetime.datetime.utcnow()
 
357
        gobject.source_remove(self.disable_initiator_tag)
 
358
        self.disable_initiator_tag = (gobject.timeout_add
 
359
                                      (self.timeout_milliseconds(),
 
360
                                       self.disable))
 
361
        if self.use_dbus:
 
362
            # Emit D-Bus signal
 
363
            self.PropertyChanged(
 
364
                dbus.String(u"last_checked_ok"),
 
365
                (_datetime_to_dbus(self.last_checked_ok,
 
366
                                   variant_level=1)))
 
367
    
301
368
    def start_checker(self):
302
369
        """Start a new checker subprocess if one is not running.
303
370
        If a checker already exists, leave it running and do
312
379
        # is as it should be.
313
380
        if self.checker is None:
314
381
            try:
315
 
                # In case check_command has exactly one % operator
316
 
                command = self.check_command % self.host
 
382
                # In case checker_command has exactly one % operator
 
383
                command = self.checker_command % self.host
317
384
            except TypeError:
318
385
                # Escape attributes for the shell
319
386
                escaped_attrs = dict((key, re.escape(str(val)))
320
387
                                     for key, val in
321
388
                                     vars(self).iteritems())
322
389
                try:
323
 
                    command = self.check_command % escaped_attrs
 
390
                    command = self.checker_command % escaped_attrs
324
391
                except TypeError, error:
325
392
                    logger.error(u'Could not format string "%s":'
326
 
                                 u' %s', self.check_command, error)
 
393
                                 u' %s', self.checker_command, error)
327
394
                    return True # Try again later
328
395
            try:
329
396
                logger.info(u"Starting checker %r for %s",
330
397
                            command, self.name)
 
398
                # We don't need to redirect stdout and stderr, since
 
399
                # in normal mode, that is already done by daemon(),
 
400
                # and in debug mode we don't want to.  (Stdin is
 
401
                # always replaced by /dev/null.)
331
402
                self.checker = subprocess.Popen(command,
332
403
                                                close_fds=True,
333
404
                                                shell=True, cwd="/")
334
 
                self.checker_callback_tag = gobject.child_watch_add\
335
 
                                            (self.checker.pid,
336
 
                                             self.checker_callback)
337
 
            except subprocess.OSError, error:
 
405
                if self.use_dbus:
 
406
                    # Emit D-Bus signal
 
407
                    self.CheckerStarted(command)
 
408
                    self.PropertyChanged(
 
409
                        dbus.String("checker_running"),
 
410
                        dbus.Boolean(True, variant_level=1))
 
411
                self.checker_callback_tag = (gobject.child_watch_add
 
412
                                             (self.checker.pid,
 
413
                                              self.checker_callback,
 
414
                                              data=command))
 
415
                # The checker may have completed before the gobject
 
416
                # watch was added.  Check for this.
 
417
                pid, status = os.waitpid(self.checker.pid, os.WNOHANG)
 
418
                if pid:
 
419
                    gobject.source_remove(self.checker_callback_tag)
 
420
                    self.checker_callback(pid, status, command)
 
421
            except OSError, error:
338
422
                logger.error(u"Failed to start subprocess: %s",
339
423
                             error)
340
424
        # Re-run this periodically if run by gobject.timeout_add
341
425
        return True
 
426
    
342
427
    def stop_checker(self):
343
428
        """Force the checker process, if any, to stop."""
344
429
        if self.checker_callback_tag:
356
441
            if error.errno != errno.ESRCH: # No such process
357
442
                raise
358
443
        self.checker = None
 
444
        if self.use_dbus:
 
445
            self.PropertyChanged(dbus.String(u"checker_running"),
 
446
                                 dbus.Boolean(False, variant_level=1))
 
447
    
359
448
    def still_valid(self):
360
449
        """Has the timeout not yet passed for this client?"""
361
 
        now = datetime.datetime.now()
 
450
        if not getattr(self, "enabled", False):
 
451
            return False
 
452
        now = datetime.datetime.utcnow()
362
453
        if self.last_checked_ok is None:
363
454
            return now < (self.created + self.timeout)
364
455
        else:
365
456
            return now < (self.last_checked_ok + self.timeout)
 
457
    
 
458
    ## D-Bus methods & signals
 
459
    _interface = u"se.bsnet.fukt.Mandos.Client"
 
460
    
 
461
    # CheckedOK - method
 
462
    CheckedOK = dbus.service.method(_interface)(checked_ok)
 
463
    CheckedOK.__name__ = "CheckedOK"
 
464
    
 
465
    # CheckerCompleted - signal
 
466
    @dbus.service.signal(_interface, signature="nxs")
 
467
    def CheckerCompleted(self, exitcode, waitstatus, command):
 
468
        "D-Bus signal"
 
469
        pass
 
470
    
 
471
    # CheckerStarted - signal
 
472
    @dbus.service.signal(_interface, signature="s")
 
473
    def CheckerStarted(self, command):
 
474
        "D-Bus signal"
 
475
        pass
 
476
    
 
477
    # GetAllProperties - method
 
478
    @dbus.service.method(_interface, out_signature="a{sv}")
 
479
    def GetAllProperties(self):
 
480
        "D-Bus method"
 
481
        return dbus.Dictionary({
 
482
                dbus.String("name"):
 
483
                    dbus.String(self.name, variant_level=1),
 
484
                dbus.String("fingerprint"):
 
485
                    dbus.String(self.fingerprint, variant_level=1),
 
486
                dbus.String("host"):
 
487
                    dbus.String(self.host, variant_level=1),
 
488
                dbus.String("created"):
 
489
                    _datetime_to_dbus(self.created, variant_level=1),
 
490
                dbus.String("last_enabled"):
 
491
                    (_datetime_to_dbus(self.last_enabled,
 
492
                                       variant_level=1)
 
493
                     if self.last_enabled is not None
 
494
                     else dbus.Boolean(False, variant_level=1)),
 
495
                dbus.String("enabled"):
 
496
                    dbus.Boolean(self.enabled, variant_level=1),
 
497
                dbus.String("last_checked_ok"):
 
498
                    (_datetime_to_dbus(self.last_checked_ok,
 
499
                                       variant_level=1)
 
500
                     if self.last_checked_ok is not None
 
501
                     else dbus.Boolean (False, variant_level=1)),
 
502
                dbus.String("timeout"):
 
503
                    dbus.UInt64(self.timeout_milliseconds(),
 
504
                                variant_level=1),
 
505
                dbus.String("interval"):
 
506
                    dbus.UInt64(self.interval_milliseconds(),
 
507
                                variant_level=1),
 
508
                dbus.String("checker"):
 
509
                    dbus.String(self.checker_command,
 
510
                                variant_level=1),
 
511
                dbus.String("checker_running"):
 
512
                    dbus.Boolean(self.checker is not None,
 
513
                                 variant_level=1),
 
514
                dbus.String("object_path"):
 
515
                    dbus.ObjectPath(self.dbus_object_path,
 
516
                                    variant_level=1)
 
517
                }, signature="sv")
 
518
    
 
519
    # IsStillValid - method
 
520
    IsStillValid = (dbus.service.method(_interface, out_signature="b")
 
521
                    (still_valid))
 
522
    IsStillValid.__name__ = "IsStillValid"
 
523
    
 
524
    # PropertyChanged - signal
 
525
    @dbus.service.signal(_interface, signature="sv")
 
526
    def PropertyChanged(self, property, value):
 
527
        "D-Bus signal"
 
528
        pass
 
529
    
 
530
    # SetChecker - method
 
531
    @dbus.service.method(_interface, in_signature="s")
 
532
    def SetChecker(self, checker):
 
533
        "D-Bus setter method"
 
534
        self.checker_command = checker
 
535
        # Emit D-Bus signal
 
536
        self.PropertyChanged(dbus.String(u"checker"),
 
537
                             dbus.String(self.checker_command,
 
538
                                         variant_level=1))
 
539
    
 
540
    # SetHost - method
 
541
    @dbus.service.method(_interface, in_signature="s")
 
542
    def SetHost(self, host):
 
543
        "D-Bus setter method"
 
544
        self.host = host
 
545
        # Emit D-Bus signal
 
546
        self.PropertyChanged(dbus.String(u"host"),
 
547
                             dbus.String(self.host, variant_level=1))
 
548
    
 
549
    # SetInterval - method
 
550
    @dbus.service.method(_interface, in_signature="t")
 
551
    def SetInterval(self, milliseconds):
 
552
        self.interval = datetime.timedelta(0, 0, 0, milliseconds)
 
553
        # Emit D-Bus signal
 
554
        self.PropertyChanged(dbus.String(u"interval"),
 
555
                             (dbus.UInt64(self.interval_milliseconds(),
 
556
                                          variant_level=1)))
 
557
    
 
558
    # SetSecret - method
 
559
    @dbus.service.method(_interface, in_signature="ay",
 
560
                         byte_arrays=True)
 
561
    def SetSecret(self, secret):
 
562
        "D-Bus setter method"
 
563
        self.secret = str(secret)
 
564
    
 
565
    # SetTimeout - method
 
566
    @dbus.service.method(_interface, in_signature="t")
 
567
    def SetTimeout(self, milliseconds):
 
568
        self.timeout = datetime.timedelta(0, 0, 0, milliseconds)
 
569
        # Emit D-Bus signal
 
570
        self.PropertyChanged(dbus.String(u"timeout"),
 
571
                             (dbus.UInt64(self.timeout_milliseconds(),
 
572
                                          variant_level=1)))
 
573
    
 
574
    # Enable - method
 
575
    Enable = dbus.service.method(_interface)(enable)
 
576
    Enable.__name__ = "Enable"
 
577
    
 
578
    # StartChecker - method
 
579
    @dbus.service.method(_interface)
 
580
    def StartChecker(self):
 
581
        "D-Bus method"
 
582
        self.start_checker()
 
583
    
 
584
    # Disable - method
 
585
    @dbus.service.method(_interface)
 
586
    def Disable(self):
 
587
        "D-Bus method"
 
588
        self.disable()
 
589
    
 
590
    # StopChecker - method
 
591
    StopChecker = dbus.service.method(_interface)(stop_checker)
 
592
    StopChecker.__name__ = "StopChecker"
 
593
    
 
594
    del _interface
366
595
 
367
596
 
368
597
def peer_certificate(session):
369
598
    "Return the peer's OpenPGP certificate as a bytestring"
370
599
    # If not an OpenPGP certificate...
371
 
    if gnutls.library.functions.gnutls_certificate_type_get\
372
 
            (session._c_object) \
373
 
           != gnutls.library.constants.GNUTLS_CRT_OPENPGP:
 
600
    if (gnutls.library.functions
 
601
        .gnutls_certificate_type_get(session._c_object)
 
602
        != gnutls.library.constants.GNUTLS_CRT_OPENPGP):
374
603
        # ...do the normal thing
375
604
        return session.peer_certificate
376
 
    list_size = ctypes.c_uint()
377
 
    cert_list = gnutls.library.functions.gnutls_certificate_get_peers\
378
 
        (session._c_object, ctypes.byref(list_size))
 
605
    list_size = ctypes.c_uint(1)
 
606
    cert_list = (gnutls.library.functions
 
607
                 .gnutls_certificate_get_peers
 
608
                 (session._c_object, ctypes.byref(list_size)))
 
609
    if not bool(cert_list) and list_size.value != 0:
 
610
        raise gnutls.errors.GNUTLSError("error getting peer"
 
611
                                        " certificate")
379
612
    if list_size.value == 0:
380
613
        return None
381
614
    cert = cert_list[0]
385
618
def fingerprint(openpgp):
386
619
    "Convert an OpenPGP bytestring to a hexdigit fingerprint string"
387
620
    # New GnuTLS "datum" with the OpenPGP public key
388
 
    datum = gnutls.library.types.gnutls_datum_t\
389
 
        (ctypes.cast(ctypes.c_char_p(openpgp),
390
 
                     ctypes.POINTER(ctypes.c_ubyte)),
391
 
         ctypes.c_uint(len(openpgp)))
 
621
    datum = (gnutls.library.types
 
622
             .gnutls_datum_t(ctypes.cast(ctypes.c_char_p(openpgp),
 
623
                                         ctypes.POINTER
 
624
                                         (ctypes.c_ubyte)),
 
625
                             ctypes.c_uint(len(openpgp))))
392
626
    # New empty GnuTLS certificate
393
627
    crt = gnutls.library.types.gnutls_openpgp_crt_t()
394
 
    gnutls.library.functions.gnutls_openpgp_crt_init\
395
 
        (ctypes.byref(crt))
 
628
    (gnutls.library.functions
 
629
     .gnutls_openpgp_crt_init(ctypes.byref(crt)))
396
630
    # Import the OpenPGP public key into the certificate
397
 
    gnutls.library.functions.gnutls_openpgp_crt_import\
398
 
                    (crt, ctypes.byref(datum),
399
 
                     gnutls.library.constants.GNUTLS_OPENPGP_FMT_RAW)
 
631
    (gnutls.library.functions
 
632
     .gnutls_openpgp_crt_import(crt, ctypes.byref(datum),
 
633
                                gnutls.library.constants
 
634
                                .GNUTLS_OPENPGP_FMT_RAW))
 
635
    # Verify the self signature in the key
 
636
    crtverify = ctypes.c_uint()
 
637
    (gnutls.library.functions
 
638
     .gnutls_openpgp_crt_verify_self(crt, 0, ctypes.byref(crtverify)))
 
639
    if crtverify.value != 0:
 
640
        gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
 
641
        raise gnutls.errors.CertificateSecurityError("Verify failed")
400
642
    # New buffer for the fingerprint
401
 
    buffer = ctypes.create_string_buffer(20)
402
 
    buffer_length = ctypes.c_size_t()
 
643
    buf = ctypes.create_string_buffer(20)
 
644
    buf_len = ctypes.c_size_t()
403
645
    # Get the fingerprint from the certificate into the buffer
404
 
    gnutls.library.functions.gnutls_openpgp_crt_get_fingerprint\
405
 
        (crt, ctypes.byref(buffer), ctypes.byref(buffer_length))
 
646
    (gnutls.library.functions
 
647
     .gnutls_openpgp_crt_get_fingerprint(crt, ctypes.byref(buf),
 
648
                                         ctypes.byref(buf_len)))
406
649
    # Deinit the certificate
407
650
    gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
408
651
    # Convert the buffer to a Python bytestring
409
 
    fpr = ctypes.string_at(buffer, buffer_length.value)
 
652
    fpr = ctypes.string_at(buf, buf_len.value)
410
653
    # Convert the bytestring to hexadecimal notation
411
654
    hex_fpr = u''.join(u"%02X" % ord(char) for char in fpr)
412
655
    return hex_fpr
413
656
 
414
657
 
415
 
class tcp_handler(SocketServer.BaseRequestHandler, object):
 
658
class TCP_handler(SocketServer.BaseRequestHandler, object):
416
659
    """A TCP request handler class.
417
660
    Instantiated by IPv6_TCPServer for each request to handle it.
418
661
    Note: This will run in its own forked process."""
419
662
    
420
663
    def handle(self):
421
664
        logger.info(u"TCP connection from: %s",
422
 
                     unicode(self.client_address))
423
 
        session = gnutls.connection.ClientSession\
424
 
                  (self.request, gnutls.connection.X509Credentials())
 
665
                    unicode(self.client_address))
 
666
        session = (gnutls.connection
 
667
                   .ClientSession(self.request,
 
668
                                  gnutls.connection
 
669
                                  .X509Credentials()))
425
670
        
426
671
        line = self.request.makefile().readline()
427
672
        logger.debug(u"Protocol version: %r", line)
438
683
        # using OpenPGP certificates.
439
684
        
440
685
        #priority = ':'.join(("NONE", "+VERS-TLS1.1", "+AES-256-CBC",
441
 
        #                "+SHA1", "+COMP-NULL", "+CTYPE-OPENPGP",
442
 
        #                "+DHE-DSS"))
443
 
        priority = "NORMAL"             # Fallback default, since this
444
 
                                        # MUST be set.
445
 
        if self.server.settings["priority"]:
446
 
            priority = self.server.settings["priority"]
447
 
        gnutls.library.functions.gnutls_priority_set_direct\
448
 
            (session._c_object, priority, None);
 
686
        #                     "+SHA1", "+COMP-NULL", "+CTYPE-OPENPGP",
 
687
        #                     "+DHE-DSS"))
 
688
        # Use a fallback default, since this MUST be set.
 
689
        priority = self.server.settings.get("priority", "NORMAL")
 
690
        (gnutls.library.functions
 
691
         .gnutls_priority_set_direct(session._c_object,
 
692
                                     priority, None))
449
693
        
450
694
        try:
451
695
            session.handshake()
454
698
            # Do not run session.bye() here: the session is not
455
699
            # established.  Just abandon the request.
456
700
            return
 
701
        logger.debug(u"Handshake succeeded")
457
702
        try:
458
703
            fpr = fingerprint(peer_certificate(session))
459
704
        except (TypeError, gnutls.errors.GNUTLSError), error:
461
706
            session.bye()
462
707
            return
463
708
        logger.debug(u"Fingerprint: %s", fpr)
464
 
        client = None
 
709
        
465
710
        for c in self.server.clients:
466
711
            if c.fingerprint == fpr:
467
712
                client = c
468
713
                break
469
 
        if not client:
 
714
        else:
470
715
            logger.warning(u"Client not found for fingerprint: %s",
471
716
                           fpr)
472
717
            session.bye()
479
724
                           vars(client))
480
725
            session.bye()
481
726
            return
 
727
        ## This won't work here, since we're in a fork.
 
728
        # client.checked_ok()
482
729
        sent_size = 0
483
730
        while sent_size < len(client.secret):
484
731
            sent = session.send(client.secret[sent_size:])
489
736
        session.bye()
490
737
 
491
738
 
492
 
class IPv6_TCPServer(SocketServer.ForkingTCPServer, object):
 
739
class IPv6_TCPServer(SocketServer.ForkingMixIn,
 
740
                     SocketServer.TCPServer, object):
493
741
    """IPv6 TCP server.  Accepts 'None' as address and/or port.
494
742
    Attributes:
495
743
        settings:       Server settings
496
744
        clients:        Set() of Client objects
 
745
        enabled:        Boolean; whether this server is activated yet
497
746
    """
498
747
    address_family = socket.AF_INET6
499
748
    def __init__(self, *args, **kwargs):
503
752
        if "clients" in kwargs:
504
753
            self.clients = kwargs["clients"]
505
754
            del kwargs["clients"]
506
 
        return super(type(self), self).__init__(*args, **kwargs)
 
755
        self.enabled = False
 
756
        super(IPv6_TCPServer, self).__init__(*args, **kwargs)
507
757
    def server_bind(self):
508
758
        """This overrides the normal server_bind() function
509
759
        to bind to an interface if one was specified, and also NOT to
521
771
                                 u" bind to interface %s",
522
772
                                 self.settings["interface"])
523
773
                else:
524
 
                    raise error
 
774
                    raise
525
775
        # Only bind(2) the socket if we really need to.
526
776
        if self.server_address[0] or self.server_address[1]:
527
777
            if not self.server_address[0]:
538
788
#                                            if_nametoindex
539
789
#                                            (self.settings
540
790
#                                             ["interface"]))
541
 
            return super(type(self), self).server_bind()
 
791
            return super(IPv6_TCPServer, self).server_bind()
 
792
    def server_activate(self):
 
793
        if self.enabled:
 
794
            return super(IPv6_TCPServer, self).server_activate()
 
795
    def enable(self):
 
796
        self.enabled = True
542
797
 
543
798
 
544
799
def string_to_delta(interval):
545
800
    """Parse a string and return a datetime.timedelta
546
 
 
 
801
    
547
802
    >>> string_to_delta('7d')
548
803
    datetime.timedelta(7)
549
804
    >>> string_to_delta('60s')
554
809
    datetime.timedelta(1)
555
810
    >>> string_to_delta(u'1w')
556
811
    datetime.timedelta(7)
 
812
    >>> string_to_delta('5m 30s')
 
813
    datetime.timedelta(0, 330)
557
814
    """
558
 
    try:
559
 
        suffix=unicode(interval[-1])
560
 
        value=int(interval[:-1])
561
 
        if suffix == u"d":
562
 
            delta = datetime.timedelta(value)
563
 
        elif suffix == u"s":
564
 
            delta = datetime.timedelta(0, value)
565
 
        elif suffix == u"m":
566
 
            delta = datetime.timedelta(0, 0, 0, 0, value)
567
 
        elif suffix == u"h":
568
 
            delta = datetime.timedelta(0, 0, 0, 0, 0, value)
569
 
        elif suffix == u"w":
570
 
            delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
571
 
        else:
 
815
    timevalue = datetime.timedelta(0)
 
816
    for s in interval.split():
 
817
        try:
 
818
            suffix = unicode(s[-1])
 
819
            value = int(s[:-1])
 
820
            if suffix == u"d":
 
821
                delta = datetime.timedelta(value)
 
822
            elif suffix == u"s":
 
823
                delta = datetime.timedelta(0, value)
 
824
            elif suffix == u"m":
 
825
                delta = datetime.timedelta(0, 0, 0, 0, value)
 
826
            elif suffix == u"h":
 
827
                delta = datetime.timedelta(0, 0, 0, 0, 0, value)
 
828
            elif suffix == u"w":
 
829
                delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
 
830
            else:
 
831
                raise ValueError
 
832
        except (ValueError, IndexError):
572
833
            raise ValueError
573
 
    except (ValueError, IndexError):
574
 
        raise ValueError
575
 
    return delta
 
834
        timevalue += delta
 
835
    return timevalue
576
836
 
577
837
 
578
838
def server_state_changed(state):
579
839
    """Derived from the Avahi example code"""
580
840
    if state == avahi.SERVER_COLLISION:
581
 
        logger.error(u"Server name collision")
 
841
        logger.error(u"Zeroconf server name collision")
582
842
        service.remove()
583
843
    elif state == avahi.SERVER_RUNNING:
584
844
        service.add()
586
846
 
587
847
def entry_group_state_changed(state, error):
588
848
    """Derived from the Avahi example code"""
589
 
    logger.debug(u"state change: %i", state)
 
849
    logger.debug(u"Avahi state change: %i", state)
590
850
    
591
851
    if state == avahi.ENTRY_GROUP_ESTABLISHED:
592
 
        logger.debug(u"Service established.")
 
852
        logger.debug(u"Zeroconf service established.")
593
853
    elif state == avahi.ENTRY_GROUP_COLLISION:
594
 
        logger.warning(u"Service name collision.")
 
854
        logger.warning(u"Zeroconf service name collision.")
595
855
        service.rename()
596
856
    elif state == avahi.ENTRY_GROUP_FAILURE:
597
 
        logger.critical(u"Error in group state changed %s",
 
857
        logger.critical(u"Avahi: Error in group state changed %s",
598
858
                        unicode(error))
599
 
        raise AvahiGroupError("State changed: %s", str(error))
 
859
        raise AvahiGroupError(u"State changed: %s" % unicode(error))
600
860
 
601
861
def if_nametoindex(interface):
602
862
    """Call the C function if_nametoindex(), or equivalent"""
603
863
    global if_nametoindex
604
864
    try:
605
 
        if "ctypes.util" not in sys.modules:
606
 
            import ctypes.util
607
 
        if_nametoindex = ctypes.cdll.LoadLibrary\
608
 
            (ctypes.util.find_library("c")).if_nametoindex
 
865
        if_nametoindex = (ctypes.cdll.LoadLibrary
 
866
                          (ctypes.util.find_library("c"))
 
867
                          .if_nametoindex)
609
868
    except (OSError, AttributeError):
610
869
        if "struct" not in sys.modules:
611
870
            import struct
614
873
        def if_nametoindex(interface):
615
874
            "Get an interface index the hard way, i.e. using fcntl()"
616
875
            SIOCGIFINDEX = 0x8933  # From /usr/include/linux/sockios.h
617
 
            s = socket.socket()
618
 
            ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
619
 
                                struct.pack("16s16x", interface))
620
 
            s.close()
 
876
            with closing(socket.socket()) as s:
 
877
                ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
 
878
                                    struct.pack("16s16x", interface))
621
879
            interface_index = struct.unpack("I", ifreq[16:20])[0]
622
880
            return interface_index
623
881
    return if_nametoindex(interface)
647
905
 
648
906
 
649
907
def main():
650
 
    global main_loop_started
651
 
    main_loop_started = False
652
 
    
653
 
    parser = OptionParser()
 
908
    parser = optparse.OptionParser(version = "%%prog %s" % version)
654
909
    parser.add_option("-i", "--interface", type="string",
655
910
                      metavar="IF", help="Bind to interface IF")
656
911
    parser.add_option("-a", "--address", type="string",
657
912
                      help="Address to listen for requests on")
658
913
    parser.add_option("-p", "--port", type="int",
659
914
                      help="Port number to receive requests on")
660
 
    parser.add_option("--check", action="store_true", default=False,
 
915
    parser.add_option("--check", action="store_true",
661
916
                      help="Run self-test")
662
917
    parser.add_option("--debug", action="store_true",
663
918
                      help="Debug mode; run in foreground and log to"
670
925
                      default="/etc/mandos", metavar="DIR",
671
926
                      help="Directory to search for configuration"
672
927
                      " files")
673
 
    (options, args) = parser.parse_args()
 
928
    parser.add_option("--no-dbus", action="store_false",
 
929
                      dest="use_dbus",
 
930
                      help="Do not provide D-Bus system bus"
 
931
                      " interface")
 
932
    options = parser.parse_args()[0]
674
933
    
675
934
    if options.check:
676
935
        import doctest
685
944
                        "priority":
686
945
                        "SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP",
687
946
                        "servicename": "Mandos",
 
947
                        "use_dbus": "True",
688
948
                        }
689
949
    
690
950
    # Parse config file for server-global settings
691
951
    server_config = ConfigParser.SafeConfigParser(server_defaults)
692
952
    del server_defaults
693
953
    server_config.read(os.path.join(options.configdir, "mandos.conf"))
694
 
    server_section = "server"
695
954
    # Convert the SafeConfigParser object to a dict
696
 
    server_settings = dict(server_config.items(server_section))
697
 
    # Use getboolean on the boolean config option
698
 
    server_settings["debug"] = server_config.getboolean\
699
 
                               (server_section, "debug")
 
955
    server_settings = server_config.defaults()
 
956
    # Use the appropriate methods on the non-string config options
 
957
    server_settings["debug"] = server_config.getboolean("DEFAULT",
 
958
                                                        "debug")
 
959
    server_settings["use_dbus"] = server_config.getboolean("DEFAULT",
 
960
                                                           "use_dbus")
 
961
    if server_settings["port"]:
 
962
        server_settings["port"] = server_config.getint("DEFAULT",
 
963
                                                       "port")
700
964
    del server_config
701
965
    
702
966
    # Override the settings from the config file with command line
703
967
    # options, if set.
704
968
    for option in ("interface", "address", "port", "debug",
705
 
                   "priority", "servicename", "configdir"):
 
969
                   "priority", "servicename", "configdir",
 
970
                   "use_dbus"):
706
971
        value = getattr(options, option)
707
972
        if value is not None:
708
973
            server_settings[option] = value
709
974
    del options
710
975
    # Now we have our good server settings in "server_settings"
711
976
    
 
977
    # For convenience
 
978
    debug = server_settings["debug"]
 
979
    use_dbus = server_settings["use_dbus"]
 
980
    
 
981
    if not debug:
 
982
        syslogger.setLevel(logging.WARNING)
 
983
        console.setLevel(logging.WARNING)
 
984
    
 
985
    if server_settings["servicename"] != "Mandos":
 
986
        syslogger.setFormatter(logging.Formatter
 
987
                               ('Mandos (%s): %%(levelname)s:'
 
988
                                ' %%(message)s'
 
989
                                % server_settings["servicename"]))
 
990
    
712
991
    # Parse config file with clients
713
992
    client_defaults = { "timeout": "1h",
714
993
                        "interval": "5m",
715
994
                        "checker": "fping -q -- %%(host)s",
 
995
                        "host": "",
716
996
                        }
717
997
    client_config = ConfigParser.SafeConfigParser(client_defaults)
718
998
    client_config.read(os.path.join(server_settings["configdir"],
719
999
                                    "clients.conf"))
720
1000
    
 
1001
    clients = Set()
 
1002
    tcp_server = IPv6_TCPServer((server_settings["address"],
 
1003
                                 server_settings["port"]),
 
1004
                                TCP_handler,
 
1005
                                settings=server_settings,
 
1006
                                clients=clients)
 
1007
    pidfilename = "/var/run/mandos.pid"
 
1008
    try:
 
1009
        pidfile = open(pidfilename, "w")
 
1010
    except IOError:
 
1011
        logger.error("Could not open file %r", pidfilename)
 
1012
    
 
1013
    try:
 
1014
        uid = pwd.getpwnam("_mandos").pw_uid
 
1015
        gid = pwd.getpwnam("_mandos").pw_gid
 
1016
    except KeyError:
 
1017
        try:
 
1018
            uid = pwd.getpwnam("mandos").pw_uid
 
1019
            gid = pwd.getpwnam("mandos").pw_gid
 
1020
        except KeyError:
 
1021
            try:
 
1022
                uid = pwd.getpwnam("nobody").pw_uid
 
1023
                gid = pwd.getpwnam("nogroup").pw_gid
 
1024
            except KeyError:
 
1025
                uid = 65534
 
1026
                gid = 65534
 
1027
    try:
 
1028
        os.setgid(gid)
 
1029
        os.setuid(uid)
 
1030
    except OSError, error:
 
1031
        if error[0] != errno.EPERM:
 
1032
            raise error
 
1033
    
 
1034
    # Enable all possible GnuTLS debugging
 
1035
    if debug:
 
1036
        # "Use a log level over 10 to enable all debugging options."
 
1037
        # - GnuTLS manual
 
1038
        gnutls.library.functions.gnutls_global_set_log_level(11)
 
1039
        
 
1040
        @gnutls.library.types.gnutls_log_func
 
1041
        def debug_gnutls(level, string):
 
1042
            logger.debug("GnuTLS: %s", string[:-1])
 
1043
        
 
1044
        (gnutls.library.functions
 
1045
         .gnutls_global_set_log_function(debug_gnutls))
 
1046
    
721
1047
    global service
722
1048
    service = AvahiService(name = server_settings["servicename"],
723
 
                           type = "_mandos._tcp", );
 
1049
                           servicetype = "_mandos._tcp", )
724
1050
    if server_settings["interface"]:
725
 
        service.interface = if_nametoindex(server_settings["interface"])
 
1051
        service.interface = (if_nametoindex
 
1052
                             (server_settings["interface"]))
726
1053
    
727
1054
    global main_loop
728
1055
    global bus
731
1058
    DBusGMainLoop(set_as_default=True )
732
1059
    main_loop = gobject.MainLoop()
733
1060
    bus = dbus.SystemBus()
734
 
    server = dbus.Interface(
735
 
            bus.get_object( avahi.DBUS_NAME, avahi.DBUS_PATH_SERVER ),
736
 
            avahi.DBUS_INTERFACE_SERVER )
 
1061
    server = dbus.Interface(bus.get_object(avahi.DBUS_NAME,
 
1062
                                           avahi.DBUS_PATH_SERVER),
 
1063
                            avahi.DBUS_INTERFACE_SERVER)
737
1064
    # End of Avahi example code
738
 
    
739
 
    debug = server_settings["debug"]
740
 
    
741
 
    if debug:
742
 
        console = logging.StreamHandler()
743
 
        # console.setLevel(logging.DEBUG)
744
 
        console.setFormatter(logging.Formatter\
745
 
                             ('%(levelname)s: %(message)s'))
746
 
        logger.addHandler(console)
747
 
        del console
748
 
    
749
 
    clients = Set()
750
 
    def remove_from_clients(client):
751
 
        clients.remove(client)
752
 
        if not clients:
753
 
            logger.critical(u"No clients left, exiting")
754
 
            sys.exit()
 
1065
    if use_dbus:
 
1066
        bus_name = dbus.service.BusName(u"se.bsnet.fukt.Mandos", bus)
755
1067
    
756
1068
    clients.update(Set(Client(name = section,
757
 
                              stop_hook = remove_from_clients,
758
1069
                              config
759
 
                              = dict(client_config.items(section)))
 
1070
                              = dict(client_config.items(section)),
 
1071
                              use_dbus = use_dbus)
760
1072
                       for section in client_config.sections()))
761
1073
    if not clients:
762
 
        logger.critical(u"No clients defined")
763
 
        sys.exit(1)
 
1074
        logger.warning(u"No clients defined")
764
1075
    
765
 
    if not debug:
 
1076
    if debug:
 
1077
        # Redirect stdin so all checkers get /dev/null
 
1078
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
 
1079
        os.dup2(null, sys.stdin.fileno())
 
1080
        if null > 2:
 
1081
            os.close(null)
 
1082
    else:
 
1083
        # No console logging
 
1084
        logger.removeHandler(console)
 
1085
        # Close all input and output, do double fork, etc.
766
1086
        daemon()
767
1087
    
768
 
    pidfilename = "/var/run/mandos/mandos.pid"
769
 
    pid = os.getpid()
770
1088
    try:
771
 
        pidfile = open(pidfilename, "w")
 
1089
        pid = os.getpid()
772
1090
        pidfile.write(str(pid) + "\n")
773
1091
        pidfile.close()
774
1092
        del pidfile
775
 
    except IOError, err:
776
 
        logger.error(u"Could not write %s file with PID %d",
777
 
                     pidfilename, os.getpid())
 
1093
    except IOError:
 
1094
        logger.error(u"Could not write to file %r with PID %d",
 
1095
                     pidfilename, pid)
 
1096
    except NameError:
 
1097
        # "pidfile" was never created
 
1098
        pass
 
1099
    del pidfilename
778
1100
    
779
1101
    def cleanup():
780
1102
        "Cleanup function; run on exit"
787
1109
        
788
1110
        while clients:
789
1111
            client = clients.pop()
790
 
            client.stop_hook = None
791
 
            client.stop()
 
1112
            client.disable_hook = None
 
1113
            client.disable()
792
1114
    
793
1115
    atexit.register(cleanup)
794
1116
    
797
1119
    signal.signal(signal.SIGHUP, lambda signum, frame: sys.exit())
798
1120
    signal.signal(signal.SIGTERM, lambda signum, frame: sys.exit())
799
1121
    
 
1122
    if use_dbus:
 
1123
        class MandosServer(dbus.service.Object):
 
1124
            """A D-Bus proxy object"""
 
1125
            def __init__(self):
 
1126
                dbus.service.Object.__init__(self, bus, "/")
 
1127
            _interface = u"se.bsnet.fukt.Mandos"
 
1128
            
 
1129
            @dbus.service.signal(_interface, signature="oa{sv}")
 
1130
            def ClientAdded(self, objpath, properties):
 
1131
                "D-Bus signal"
 
1132
                pass
 
1133
            
 
1134
            @dbus.service.signal(_interface, signature="os")
 
1135
            def ClientRemoved(self, objpath, name):
 
1136
                "D-Bus signal"
 
1137
                pass
 
1138
            
 
1139
            @dbus.service.method(_interface, out_signature="ao")
 
1140
            def GetAllClients(self):
 
1141
                "D-Bus method"
 
1142
                return dbus.Array(c.dbus_object_path for c in clients)
 
1143
            
 
1144
            @dbus.service.method(_interface, out_signature="a{oa{sv}}")
 
1145
            def GetAllClientsWithProperties(self):
 
1146
                "D-Bus method"
 
1147
                return dbus.Dictionary(
 
1148
                    ((c.dbus_object_path, c.GetAllProperties())
 
1149
                     for c in clients),
 
1150
                    signature="oa{sv}")
 
1151
            
 
1152
            @dbus.service.method(_interface, in_signature="o")
 
1153
            def RemoveClient(self, object_path):
 
1154
                "D-Bus method"
 
1155
                for c in clients:
 
1156
                    if c.dbus_object_path == object_path:
 
1157
                        clients.remove(c)
 
1158
                        # Don't signal anything except ClientRemoved
 
1159
                        c.use_dbus = False
 
1160
                        c.disable()
 
1161
                        # Emit D-Bus signal
 
1162
                        self.ClientRemoved(object_path, c.name)
 
1163
                        return
 
1164
                raise KeyError
 
1165
            
 
1166
            del _interface
 
1167
        
 
1168
        mandos_server = MandosServer()
 
1169
    
800
1170
    for client in clients:
801
 
        client.start()
802
 
    
803
 
    tcp_server = IPv6_TCPServer((server_settings["address"],
804
 
                                 server_settings["port"]),
805
 
                                tcp_handler,
806
 
                                settings=server_settings,
807
 
                                clients=clients)
 
1171
        if use_dbus:
 
1172
            # Emit D-Bus signal
 
1173
            mandos_server.ClientAdded(client.dbus_object_path,
 
1174
                                      client.GetAllProperties())
 
1175
        client.enable()
 
1176
    
 
1177
    tcp_server.enable()
 
1178
    tcp_server.server_activate()
 
1179
    
808
1180
    # Find out what port we got
809
1181
    service.port = tcp_server.socket.getsockname()[1]
810
1182
    logger.info(u"Now listening on address %r, port %d, flowinfo %d,"
824
1196
        
825
1197
        gobject.io_add_watch(tcp_server.fileno(), gobject.IO_IN,
826
1198
                             lambda *args, **kwargs:
827
 
                             tcp_server.handle_request\
828
 
                             (*args[2:], **kwargs) or True)
 
1199
                             (tcp_server.handle_request
 
1200
                              (*args[2:], **kwargs) or True))
829
1201
        
830
1202
        logger.debug(u"Starting main loop")
831
 
        main_loop_started = True
832
1203
        main_loop.run()
833
1204
    except AvahiError, error:
834
 
        logger.critical(u"AvahiError: %s" + unicode(error))
 
1205
        logger.critical(u"AvahiError: %s", error)
835
1206
        sys.exit(1)
836
1207
    except KeyboardInterrupt:
837
1208
        if debug:
838
 
            print
 
1209
            print >> sys.stderr
 
1210
        logger.debug("Server received KeyboardInterrupt")
 
1211
    logger.debug("Server exiting")
839
1212
 
840
1213
if __name__ == '__main__':
841
1214
    main()