2
2
# -*- mode: python; coding: utf-8 -*-
4
4
# Mandos Monitor - Control and monitor the Mandos server
6
# Copyright © 2008-2019 Teddy Hogeborn
7
# Copyright © 2008-2019 Björn Påhlsson
9
# This file is part of Mandos.
11
# Mandos is free software: you can redistribute it and/or modify it
12
# under the terms of the GNU General Public License as published by
6
# Copyright © 2008-2012 Teddy Hogeborn
7
# Copyright © 2008-2012 Björn Påhlsson
9
# This program is free software: you can redistribute it and/or modify
10
# it under the terms of the GNU General Public License as published by
13
11
# the Free Software Foundation, either version 3 of the License, or
14
12
# (at your option) any later version.
16
# Mandos is distributed in the hope that it will be useful, but
17
# WITHOUT ANY WARRANTY; without even the implied warranty of
14
# This program is distributed in the hope that it will be useful,
15
# but WITHOUT ANY WARRANTY; without even the implied warranty of
18
16
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19
17
# GNU General Public License for more details.
21
19
# You should have received a copy of the GNU General Public License
22
# along with Mandos. If not, see <http://www.gnu.org/licenses/>.
20
# along with this program. If not, see
21
# <http://www.gnu.org/licenses/>.
24
23
# Contact the authors at <mandos@recompile.se>.
27
26
from __future__ import (division, absolute_import, print_function,
31
from future_builtins import *
29
from future_builtins import *
67
58
"ApprovalDelay": "Approval Delay",
68
59
"ApprovalDuration": "Approval Duration",
69
60
"Checker": "Checker",
70
"ExtendedTimeout": "Extended Timeout",
72
"LastCheckerStatus": "Last Checker Status",
61
"ExtendedTimeout" : "Extended Timeout"
74
63
defaultkeywords = ("Name", "Enabled", "Timeout", "LastCheckedOK")
75
64
domain = "se.recompile"
76
65
busname = domain + ".Mandos"
78
67
server_interface = domain + ".Mandos"
79
68
client_interface = domain + ".Mandos.Client"
84
dbus.OBJECT_MANAGER_IFACE
85
except AttributeError:
86
dbus.OBJECT_MANAGER_IFACE = "org.freedesktop.DBus.ObjectManager"
71
def timedelta_to_milliseconds(td):
72
"""Convert a datetime.timedelta object to milliseconds"""
73
return ((td.days * 24 * 60 * 60 * 1000)
75
+ (td.microseconds // 1000))
89
77
def milliseconds_to_string(ms):
90
78
td = datetime.timedelta(0, 0, 0, ms)
91
79
return ("{days}{hours:02}:{minutes:02}:{seconds:02}"
92
.format(days="{}T".format(td.days) if td.days else "",
93
hours=td.seconds // 3600,
94
minutes=(td.seconds % 3600) // 60,
95
seconds=td.seconds % 60))
80
.format(days = "{0}T".format(td.days) if td.days else "",
81
hours = td.seconds // 3600,
82
minutes = (td.seconds % 3600) // 60,
83
seconds = td.seconds % 60,
98
87
def rfc3339_duration_to_delta(duration):
99
88
"""Parse an RFC 3339 "duration" and return a datetime.timedelta
101
90
>>> rfc3339_duration_to_delta("P7D")
102
91
datetime.timedelta(7)
103
92
>>> rfc3339_duration_to_delta("PT60S")
113
102
>>> rfc3339_duration_to_delta("P1DT3M20S")
114
103
datetime.timedelta(1, 200)
117
106
# Parsing an RFC 3339 duration with regular expressions is not
118
107
# possible - there would have to be multiple places for the same
119
108
# values, like seconds. The current code, while more esoteric, is
120
109
# cleaner without depending on a parsing library. If Python had a
121
110
# built-in library for parsing we would use it, but we'd like to
122
111
# avoid excessive use of external libraries.
124
113
# New type for defining tokens, syntax, and semantics all-in-one
125
Token = collections.namedtuple("Token", (
126
"regexp", # To match token; if "value" is not None, must have
127
# a "group" containing digits
128
"value", # datetime.timedelta or None
129
"followers")) # Tokens valid after this token
114
Token = collections.namedtuple("Token",
115
("regexp", # To match token; if
116
# "value" is not None,
117
# must have a "group"
119
"value", # datetime.timedelta or
121
"followers")) # Tokens valid after
130
123
# RFC 3339 "duration" tokens, syntax, and semantics; taken from
131
124
# the "duration" ABNF definition in RFC 3339, Appendix A.
132
125
token_end = Token(re.compile(r"$"), None, frozenset())
133
126
token_second = Token(re.compile(r"(\d+)S"),
134
127
datetime.timedelta(seconds=1),
135
frozenset((token_end, )))
128
frozenset((token_end,)))
136
129
token_minute = Token(re.compile(r"(\d+)M"),
137
130
datetime.timedelta(minutes=1),
138
131
frozenset((token_second, token_end)))
190
180
# No currently valid tokens were found
191
raise ValueError("Invalid RFC 3339 duration: {!r}"
181
raise ValueError("Invalid RFC 3339 duration")
193
182
# End token found
197
186
def string_to_delta(interval):
198
187
"""Parse a string and return a datetime.timedelta
200
>>> string_to_delta('7d')
189
>>> string_to_delta("7d")
201
190
datetime.timedelta(7)
202
>>> string_to_delta('60s')
191
>>> string_to_delta("60s")
203
192
datetime.timedelta(0, 60)
204
>>> string_to_delta('60m')
193
>>> string_to_delta("60m")
205
194
datetime.timedelta(0, 3600)
206
>>> string_to_delta('24h')
195
>>> string_to_delta("24h")
207
196
datetime.timedelta(1)
208
>>> string_to_delta('1w')
197
>>> string_to_delta("1w")
209
198
datetime.timedelta(7)
210
>>> string_to_delta('5m 30s')
199
>>> string_to_delta("5m 30s")
211
200
datetime.timedelta(0, 330)
202
value = datetime.timedelta(0)
203
regexp = re.compile(r"(\d+)([dsmhw]?)")
215
206
return rfc3339_duration_to_delta(interval)
216
207
except ValueError:
219
value = datetime.timedelta(0)
220
regexp = re.compile(r"(\d+)([dsmhw]?)")
222
210
for num, suffix in regexp.findall(interval):
223
211
if suffix == "d":
224
212
value += datetime.timedelta(int(num))
242
229
if keyword in ("Timeout", "Interval", "ApprovalDelay",
243
230
"ApprovalDuration", "ExtendedTimeout"):
244
231
return milliseconds_to_string(value)
232
return unicode(value)
247
234
# Create format string to print table rows
248
235
format_string = " ".join("{{{key}:{width}}}".format(
249
width=max(len(tablewords[key]),
250
max(len(valuetostring(client[key], key))
251
for client in clients)),
236
width = max(len(tablewords[key]),
237
max(len(valuetostring(client[key],
241
key = key) for key in keywords)
254
242
# Print header line
255
243
print(format_string.format(**tablewords))
256
244
for client in clients:
258
.format(**{key: valuetostring(client[key], key)
259
for key in keywords}))
245
print(format_string.format(**dict((key,
246
valuetostring(client[key],
248
for key in keywords)))
262
250
def has_actions(options):
263
251
return any((options.enable,
284
271
parser = argparse.ArgumentParser()
285
272
parser.add_argument("--version", action="version",
286
version="%(prog)s {}".format(version),
273
version = "%(prog)s {0}".format(version),
287
274
help="show version number and exit")
288
275
parser.add_argument("-a", "--all", action="store_true",
289
276
help="Select all clients")
290
277
parser.add_argument("-v", "--verbose", action="store_true",
291
278
help="Print all fields")
292
parser.add_argument("-j", "--dump-json", action="store_true",
293
help="Dump client data in JSON format")
294
279
parser.add_argument("-e", "--enable", action="store_true",
295
280
help="Enable client")
296
281
parser.add_argument("-d", "--disable", action="store_true",
335
319
help="Run self-test")
336
320
parser.add_argument("client", nargs="*", help="Client name")
337
321
options = parser.parse_args()
339
323
if has_actions(options) and not (options.client or options.all):
340
324
parser.error("Options require clients names or --all.")
341
325
if options.verbose and has_actions(options):
342
parser.error("--verbose can only be used alone.")
343
if options.dump_json and (options.verbose
344
or has_actions(options)):
345
parser.error("--dump-json can only be used alone.")
326
parser.error("--verbose can only be used alone or with"
346
328
if options.all and not has_actions(options):
347
329
parser.error("--all requires an action.")
332
fail_count, test_count = doctest.testmod()
333
sys.exit(0 if fail_count == 0 else 1)
350
336
bus = dbus.SystemBus()
351
337
mandos_dbus_objc = bus.get_object(busname, server_path)
352
338
except dbus.exceptions.DBusException:
353
print("Could not connect to Mandos server", file=sys.stderr)
339
print("Could not connect to Mandos server",
356
343
mandos_serv = dbus.Interface(mandos_dbus_objc,
357
dbus_interface=server_interface)
358
mandos_serv_object_manager = dbus.Interface(
359
mandos_dbus_objc, dbus_interface=dbus.OBJECT_MANAGER_IFACE)
361
# block stderr since dbus library prints to stderr
344
dbus_interface = server_interface)
346
#block stderr since dbus library prints to stderr
362
347
null = os.open(os.path.devnull, os.O_RDWR)
363
348
stderrcopy = os.dup(sys.stderr.fileno())
364
349
os.dup2(null, sys.stderr.fileno())
368
mandos_clients = {path: ifs_and_props[client_interface]
369
for path, ifs_and_props in
370
mandos_serv_object_manager
371
.GetManagedObjects().items()
372
if client_interface in ifs_and_props}
353
mandos_clients = mandos_serv.GetAllClientsWithProperties()
375
356
os.dup2(stderrcopy, sys.stderr.fileno())
376
357
os.close(stderrcopy)
377
except dbus.exceptions.DBusException as e:
378
print("Access denied: "
379
"Accessing mandos server through D-Bus: {}".format(e),
358
except dbus.exceptions.DBusException:
359
print("Access denied: Accessing mandos server through dbus.",
383
363
# Compile dict of (clients: properties) to process
386
366
if options.all or not options.client:
387
clients = {bus.get_object(busname, path): properties
388
for path, properties in mandos_clients.items()}
367
clients = dict((bus.get_object(busname, path), properties)
368
for path, properties in
369
mandos_clients.iteritems())
390
371
for name in options.client:
391
for path, client in mandos_clients.items():
372
for path, client in mandos_clients.iteritems():
392
373
if client["Name"] == name:
393
374
client_objc = bus.get_object(busname, path)
394
375
clients[client_objc] = client
397
print("Client not found on server: {!r}"
378
print("Client not found on server: {0!r}"
398
379
.format(name), file=sys.stderr)
401
382
if not has_actions(options) and clients:
402
if options.verbose or options.dump_json:
403
keywords = ("Name", "Enabled", "Timeout", "LastCheckedOK",
404
"Created", "Interval", "Host", "KeyID",
405
"Fingerprint", "CheckerRunning",
384
keywords = ("Name", "Enabled", "Timeout",
385
"LastCheckedOK", "Created", "Interval",
386
"Host", "Fingerprint", "CheckerRunning",
406
387
"LastEnabled", "ApprovalPending",
407
"ApprovedByDefault", "LastApprovalRequest",
408
"ApprovalDelay", "ApprovalDuration",
409
"Checker", "ExtendedTimeout", "Expires",
389
"LastApprovalRequest", "ApprovalDelay",
390
"ApprovalDuration", "Checker",
412
393
keywords = defaultkeywords
414
if options.dump_json:
415
json.dump({client["Name"]: {key:
417
if isinstance(client[key],
421
for client in clients.values()},
422
fp=sys.stdout, indent=4,
423
separators=(',', ': '))
426
print_clients(clients.values(), keywords)
395
print_clients(clients.values(), keywords)
428
397
# Process each client in the list by all selected options
429
398
for client in clients:
431
399
def set_client_prop(prop, value):
432
400
"""Set a Client D-Bus property"""
433
401
client.Set(client_interface, prop, value,
434
402
dbus_interface=dbus.PROPERTIES_IFACE)
436
403
def set_client_prop_ms(prop, value):
437
404
"""Set a Client D-Bus property, converted
438
405
from a string to milliseconds."""
439
406
set_client_prop(prop,
440
string_to_delta(value).total_seconds()
407
timedelta_to_milliseconds
408
(string_to_delta(value)))
443
409
if options.remove:
444
410
mandos_serv.RemoveClient(client.__dbus_object_path__)
445
411
if options.enable: