2
# -*- mode: python; coding: utf-8 -*-
2
# -*- mode: python; coding: utf-8; after-save-hook: (lambda () (let ((command (if (and (boundp 'tramp-file-name-structure) (string-match (car tramp-file-name-structure) (buffer-file-name))) (tramp-file-name-localname (tramp-dissect-file-name (buffer-file-name))) (buffer-file-name)))) (if (= (shell-command (format "%s --check" (shell-quote-argument command)) "*Test*") 0) (let ((w (get-buffer-window "*Test*"))) (if w (delete-window w)) (kill-buffer "*Test*")) (display-buffer "*Test*")))); -*-
4
4
# Mandos Monitor - Control and monitor the Mandos server
6
# Copyright © 2008-2014 Teddy Hogeborn
7
# Copyright © 2008-2014 Björn Påhlsson
9
# This program is free software: you can redistribute it and/or modify
10
# it under the terms of the GNU General Public License as published by
6
# Copyright © 2008-2019 Teddy Hogeborn
7
# Copyright © 2008-2019 Björn Påhlsson
9
# This file is part of Mandos.
11
# Mandos is free software: you can redistribute it and/or modify it
12
# under the terms of the GNU General Public License as published by
11
13
# the Free Software Foundation, either version 3 of the License, or
12
14
# (at your option) any later version.
14
# This program is distributed in the hope that it will be useful,
15
# but WITHOUT ANY WARRANTY; without even the implied warranty of
16
# Mandos is distributed in the hope that it will be useful, but
17
# WITHOUT ANY WARRANTY; without even the implied warranty of
16
18
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17
19
# GNU General Public License for more details.
19
21
# You should have received a copy of the GNU General Public License
20
# along with this program. If not, see
21
# <http://www.gnu.org/licenses/>.
22
# along with Mandos. If not, see <http://www.gnu.org/licenses/>.
23
24
# Contact the authors at <mandos@recompile.se>.
26
27
from __future__ import (division, absolute_import, print_function,
64
67
"ApprovalDelay": "Approval Delay",
65
68
"ApprovalDuration": "Approval Duration",
66
69
"Checker": "Checker",
67
"ExtendedTimeout" : "Extended Timeout"
70
"ExtendedTimeout": "Extended Timeout",
72
"LastCheckerStatus": "Last Checker Status",
69
74
defaultkeywords = ("Name", "Enabled", "Timeout", "LastCheckedOK")
70
75
domain = "se.recompile"
71
76
busname = domain + ".Mandos"
73
78
server_interface = domain + ".Mandos"
74
79
client_interface = domain + ".Mandos.Client"
84
dbus.OBJECT_MANAGER_IFACE
85
except AttributeError:
86
dbus.OBJECT_MANAGER_IFACE = "org.freedesktop.DBus.ObjectManager"
77
89
def milliseconds_to_string(ms):
78
90
td = datetime.timedelta(0, 0, 0, ms)
79
91
return ("{days}{hours:02}:{minutes:02}:{seconds:02}"
80
.format(days = "{}T".format(td.days) if td.days else "",
81
hours = td.seconds // 3600,
82
minutes = (td.seconds % 3600) // 60,
83
seconds = td.seconds % 60,
92
.format(days="{}T".format(td.days) if td.days else "",
93
hours=td.seconds // 3600,
94
minutes=(td.seconds % 3600) // 60,
95
seconds=td.seconds % 60))
87
98
def rfc3339_duration_to_delta(duration):
88
99
"""Parse an RFC 3339 "duration" and return a datetime.timedelta
90
101
>>> rfc3339_duration_to_delta("P7D")
91
102
datetime.timedelta(7)
92
103
>>> rfc3339_duration_to_delta("PT60S")
102
113
>>> rfc3339_duration_to_delta("P1DT3M20S")
103
114
datetime.timedelta(1, 200)
106
117
# Parsing an RFC 3339 duration with regular expressions is not
107
118
# possible - there would have to be multiple places for the same
108
119
# values, like seconds. The current code, while more esoteric, is
109
120
# cleaner without depending on a parsing library. If Python had a
110
121
# built-in library for parsing we would use it, but we'd like to
111
122
# avoid excessive use of external libraries.
113
124
# New type for defining tokens, syntax, and semantics all-in-one
114
Token = collections.namedtuple("Token",
115
("regexp", # To match token; if
116
# "value" is not None,
117
# must have a "group"
119
"value", # datetime.timedelta or
121
"followers")) # Tokens valid after
125
Token = collections.namedtuple("Token", (
126
"regexp", # To match token; if "value" is not None, must have
127
# a "group" containing digits
128
"value", # datetime.timedelta or None
129
"followers")) # Tokens valid after this token
123
130
# RFC 3339 "duration" tokens, syntax, and semantics; taken from
124
131
# the "duration" ABNF definition in RFC 3339, Appendix A.
125
132
token_end = Token(re.compile(r"$"), None, frozenset())
126
133
token_second = Token(re.compile(r"(\d+)S"),
127
134
datetime.timedelta(seconds=1),
128
frozenset((token_end,)))
135
frozenset((token_end, )))
129
136
token_minute = Token(re.compile(r"(\d+)M"),
130
137
datetime.timedelta(minutes=1),
131
138
frozenset((token_second, token_end)))
147
154
frozenset((token_month, token_end)))
148
155
token_week = Token(re.compile(r"(\d+)W"),
149
156
datetime.timedelta(weeks=1),
150
frozenset((token_end,)))
157
frozenset((token_end, )))
151
158
token_duration = Token(re.compile(r"P"), None,
152
159
frozenset((token_year, token_month,
153
160
token_day, token_time,
155
# Define starting values
156
value = datetime.timedelta() # Value so far
162
# Define starting values:
164
value = datetime.timedelta()
157
165
found_token = None
158
followers = frozenset((token_duration,)) # Following valid tokens
159
s = duration # String left to parse
166
# Following valid tokens
167
followers = frozenset((token_duration, ))
168
# String left to parse
160
170
# Loop until end token is found
161
171
while found_token is not token_end:
162
172
# Search for any currently valid tokens
180
190
# No currently valid tokens were found
181
raise ValueError("Invalid RFC 3339 duration")
191
raise ValueError("Invalid RFC 3339 duration: {!r}"
182
193
# End token found
186
197
def string_to_delta(interval):
187
198
"""Parse a string and return a datetime.timedelta
189
>>> string_to_delta("7d")
200
>>> string_to_delta('7d')
190
201
datetime.timedelta(7)
191
>>> string_to_delta("60s")
202
>>> string_to_delta('60s')
192
203
datetime.timedelta(0, 60)
193
>>> string_to_delta("60m")
204
>>> string_to_delta('60m')
194
205
datetime.timedelta(0, 3600)
195
>>> string_to_delta("24h")
206
>>> string_to_delta('24h')
196
207
datetime.timedelta(1)
197
>>> string_to_delta("1w")
208
>>> string_to_delta('1w')
198
209
datetime.timedelta(7)
199
>>> string_to_delta("5m 30s")
210
>>> string_to_delta('5m 30s')
200
211
datetime.timedelta(0, 330)
204
215
return rfc3339_duration_to_delta(interval)
205
216
except ValueError:
208
219
value = datetime.timedelta(0)
209
220
regexp = re.compile(r"(\d+)([dsmhw]?)")
211
222
for num, suffix in regexp.findall(interval):
212
223
if suffix == "d":
213
224
value += datetime.timedelta(int(num))
231
243
"ApprovalDuration", "ExtendedTimeout"):
232
244
return milliseconds_to_string(value)
233
245
return str(value)
235
247
# Create format string to print table rows
236
248
format_string = " ".join("{{{key}:{width}}}".format(
237
width = max(len(tablewords[key]),
238
max(len(valuetostring(client[key],
242
key = key) for key in keywords)
249
width=max(len(tablewords[key]),
250
max(len(valuetostring(client[key], key))
251
for client in clients)),
243
254
# Print header line
244
255
print(format_string.format(**tablewords))
245
256
for client in clients:
246
print(format_string.format(**{ key:
247
valuetostring(client[key],
249
for key in keywords }))
258
.format(**{key: valuetostring(client[key], key)
259
for key in keywords}))
251
262
def has_actions(options):
252
263
return any((options.enable,
272
284
parser = argparse.ArgumentParser()
273
285
parser.add_argument("--version", action="version",
274
version = "%(prog)s {}".format(version),
286
version="%(prog)s {}".format(version),
275
287
help="show version number and exit")
276
288
parser.add_argument("-a", "--all", action="store_true",
277
289
help="Select all clients")
278
290
parser.add_argument("-v", "--verbose", action="store_true",
279
291
help="Print all fields")
292
parser.add_argument("-j", "--dump-json", action="store_true",
293
help="Dump client data in JSON format")
280
294
parser.add_argument("-e", "--enable", action="store_true",
281
295
help="Enable client")
282
296
parser.add_argument("-d", "--disable", action="store_true",
321
335
help="Run self-test")
322
336
parser.add_argument("client", nargs="*", help="Client name")
323
337
options = parser.parse_args()
325
339
if has_actions(options) and not (options.client or options.all):
326
340
parser.error("Options require clients names or --all.")
327
341
if options.verbose and has_actions(options):
328
parser.error("--verbose can only be used alone or with"
342
parser.error("--verbose can only be used alone.")
343
if options.dump_json and (options.verbose
344
or has_actions(options)):
345
parser.error("--dump-json can only be used alone.")
330
346
if options.all and not has_actions(options):
331
347
parser.error("--all requires an action.")
334
fail_count, test_count = doctest.testmod()
335
sys.exit(os.EX_OK if fail_count == 0 else 1)
338
350
bus = dbus.SystemBus()
339
351
mandos_dbus_objc = bus.get_object(busname, server_path)
340
352
except dbus.exceptions.DBusException:
341
print("Could not connect to Mandos server",
353
print("Could not connect to Mandos server", file=sys.stderr)
345
356
mandos_serv = dbus.Interface(mandos_dbus_objc,
346
dbus_interface = server_interface)
348
#block stderr since dbus library prints to stderr
357
dbus_interface=server_interface)
358
mandos_serv_object_manager = dbus.Interface(
359
mandos_dbus_objc, dbus_interface=dbus.OBJECT_MANAGER_IFACE)
361
# block stderr since dbus library prints to stderr
349
362
null = os.open(os.path.devnull, os.O_RDWR)
350
363
stderrcopy = os.dup(sys.stderr.fileno())
351
364
os.dup2(null, sys.stderr.fileno())
355
mandos_clients = mandos_serv.GetAllClientsWithProperties()
368
mandos_clients = {path: ifs_and_props[client_interface]
369
for path, ifs_and_props in
370
mandos_serv_object_manager
371
.GetManagedObjects().items()
372
if client_interface in ifs_and_props}
358
375
os.dup2(stderrcopy, sys.stderr.fileno())
359
376
os.close(stderrcopy)
360
except dbus.exceptions.DBusException:
361
print("Access denied: Accessing mandos server through dbus.",
377
except dbus.exceptions.DBusException as e:
378
print("Access denied: "
379
"Accessing mandos server through D-Bus: {}".format(e),
365
383
# Compile dict of (clients: properties) to process
368
386
if options.all or not options.client:
369
clients = { bus.get_object(busname, path): properties
370
for path, properties in mandos_clients.items() }
387
clients = {bus.get_object(busname, path): properties
388
for path, properties in mandos_clients.items()}
372
390
for name in options.client:
373
391
for path, client in mandos_clients.items():
379
397
print("Client not found on server: {!r}"
380
398
.format(name), file=sys.stderr)
383
401
if not has_actions(options) and clients:
385
keywords = ("Name", "Enabled", "Timeout",
386
"LastCheckedOK", "Created", "Interval",
387
"Host", "Fingerprint", "CheckerRunning",
402
if options.verbose or options.dump_json:
403
keywords = ("Name", "Enabled", "Timeout", "LastCheckedOK",
404
"Created", "Interval", "Host", "KeyID",
405
"Fingerprint", "CheckerRunning",
388
406
"LastEnabled", "ApprovalPending",
390
"LastApprovalRequest", "ApprovalDelay",
391
"ApprovalDuration", "Checker",
407
"ApprovedByDefault", "LastApprovalRequest",
408
"ApprovalDelay", "ApprovalDuration",
409
"Checker", "ExtendedTimeout", "Expires",
394
412
keywords = defaultkeywords
396
print_clients(clients.values(), keywords)
414
if options.dump_json:
415
json.dump({client["Name"]: {key:
417
if isinstance(client[key],
421
for client in clients.values()},
422
fp=sys.stdout, indent=4,
423
separators=(',', ': '))
426
print_clients(clients.values(), keywords)
398
428
# Process each client in the list by all selected options
399
429
for client in clients:
400
431
def set_client_prop(prop, value):
401
432
"""Set a Client D-Bus property"""
402
433
client.Set(client_interface, prop, value,
403
434
dbus_interface=dbus.PROPERTIES_IFACE)
404
436
def set_client_prop_ms(prop, value):
405
437
"""Set a Client D-Bus property, converted
406
438
from a string to milliseconds."""
407
439
set_client_prop(prop,
408
440
string_to_delta(value).total_seconds()
410
443
if options.remove:
411
444
mandos_serv.RemoveClient(client.__dbus_object_path__)
412
445
if options.enable:
420
453
if options.stop_checker:
421
454
set_client_prop("CheckerRunning", dbus.Boolean(False))
422
455
if options.is_enabled:
423
sys.exit(0 if client.Get(client_interface,
426
dbus.PROPERTIES_IFACE)
456
if client.Get(client_interface, "Enabled",
457
dbus_interface=dbus.PROPERTIES_IFACE):
428
461
if options.checker is not None:
429
462
set_client_prop("Checker", options.checker)
430
463
if options.host is not None:
456
489
client.Approve(dbus.Boolean(False),
457
490
dbus_interface=client_interface)
493
def should_only_run_tests():
494
parser = argparse.ArgumentParser(add_help=False)
495
parser.add_argument("--check", action='store_true')
496
args, unknown_args = parser.parse_known_args()
497
run_tests = args.check
499
# Remove --check argument from sys.argv
500
sys.argv[1:] = unknown_args
503
# Add all tests from doctest strings
504
def load_tests(loader, tests, none):
506
tests.addTests(doctest.DocTestSuite())
459
509
if __name__ == "__main__":
510
if should_only_run_tests():
511
# Call using ./tdd-python-script --check [--verbose]