2
2
# -*- mode: python; coding: utf-8 -*-
4
4
# Mandos Monitor - Control and monitor the Mandos server
6
# Copyright © 2008-2012 Teddy Hogeborn
7
# Copyright © 2008-2012 Björn Påhlsson
9
# This program is free software: you can redistribute it and/or modify
10
# it under the terms of the GNU General Public License as published by
6
# Copyright © 2008-2019 Teddy Hogeborn
7
# Copyright © 2008-2019 Björn Påhlsson
9
# This file is part of Mandos.
11
# Mandos is free software: you can redistribute it and/or modify it
12
# under the terms of the GNU General Public License as published by
11
13
# the Free Software Foundation, either version 3 of the License, or
12
14
# (at your option) any later version.
14
# This program is distributed in the hope that it will be useful,
15
# but WITHOUT ANY WARRANTY; without even the implied warranty of
16
# Mandos is distributed in the hope that it will be useful, but
17
# WITHOUT ANY WARRANTY; without even the implied warranty of
16
18
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17
19
# GNU General Public License for more details.
19
21
# You should have received a copy of the GNU General Public License
20
# along with this program. If not, see
21
# <http://www.gnu.org/licenses/>.
22
# along with Mandos. If not, see <http://www.gnu.org/licenses/>.
23
24
# Contact the authors at <mandos@recompile.se>.
26
27
from __future__ import (division, absolute_import, print_function,
29
from future_builtins import *
31
from future_builtins import *
46
if sys.version_info.major == 2:
39
49
locale.setlocale(locale.LC_ALL, "")
55
66
"ApprovalDelay": "Approval Delay",
56
67
"ApprovalDuration": "Approval Duration",
57
68
"Checker": "Checker",
58
"ExtendedTimeout" : "Extended Timeout"
69
"ExtendedTimeout": "Extended Timeout",
71
"LastCheckerStatus": "Last Checker Status",
60
73
defaultkeywords = ("Name", "Enabled", "Timeout", "LastCheckedOK")
61
74
domain = "se.recompile"
62
75
busname = domain + ".Mandos"
64
77
server_interface = domain + ".Mandos"
65
78
client_interface = domain + ".Mandos.Client"
68
def timedelta_to_milliseconds(td):
69
"""Convert a datetime.timedelta object to milliseconds"""
70
return ((td.days * 24 * 60 * 60 * 1000)
72
+ (td.microseconds // 1000))
83
dbus.OBJECT_MANAGER_IFACE
84
except AttributeError:
85
dbus.OBJECT_MANAGER_IFACE = "org.freedesktop.DBus.ObjectManager"
74
88
def milliseconds_to_string(ms):
75
89
td = datetime.timedelta(0, 0, 0, ms)
76
90
return ("{days}{hours:02}:{minutes:02}:{seconds:02}"
77
.format(days = "{0}T".format(td.days) if td.days else "",
78
hours = td.seconds // 3600,
79
minutes = (td.seconds % 3600) // 60,
80
seconds = td.seconds % 60,
91
.format(days="{}T".format(td.days) if td.days else "",
92
hours=td.seconds // 3600,
93
minutes=(td.seconds % 3600) // 60,
94
seconds=td.seconds % 60))
97
def rfc3339_duration_to_delta(duration):
98
"""Parse an RFC 3339 "duration" and return a datetime.timedelta
100
>>> rfc3339_duration_to_delta("P7D")
101
datetime.timedelta(7)
102
>>> rfc3339_duration_to_delta("PT60S")
103
datetime.timedelta(0, 60)
104
>>> rfc3339_duration_to_delta("PT60M")
105
datetime.timedelta(0, 3600)
106
>>> rfc3339_duration_to_delta("PT24H")
107
datetime.timedelta(1)
108
>>> rfc3339_duration_to_delta("P1W")
109
datetime.timedelta(7)
110
>>> rfc3339_duration_to_delta("PT5M30S")
111
datetime.timedelta(0, 330)
112
>>> rfc3339_duration_to_delta("P1DT3M20S")
113
datetime.timedelta(1, 200)
116
# Parsing an RFC 3339 duration with regular expressions is not
117
# possible - there would have to be multiple places for the same
118
# values, like seconds. The current code, while more esoteric, is
119
# cleaner without depending on a parsing library. If Python had a
120
# built-in library for parsing we would use it, but we'd like to
121
# avoid excessive use of external libraries.
123
# New type for defining tokens, syntax, and semantics all-in-one
124
Token = collections.namedtuple("Token", (
125
"regexp", # To match token; if "value" is not None, must have
126
# a "group" containing digits
127
"value", # datetime.timedelta or None
128
"followers")) # Tokens valid after this token
129
# RFC 3339 "duration" tokens, syntax, and semantics; taken from
130
# the "duration" ABNF definition in RFC 3339, Appendix A.
131
token_end = Token(re.compile(r"$"), None, frozenset())
132
token_second = Token(re.compile(r"(\d+)S"),
133
datetime.timedelta(seconds=1),
134
frozenset((token_end, )))
135
token_minute = Token(re.compile(r"(\d+)M"),
136
datetime.timedelta(minutes=1),
137
frozenset((token_second, token_end)))
138
token_hour = Token(re.compile(r"(\d+)H"),
139
datetime.timedelta(hours=1),
140
frozenset((token_minute, token_end)))
141
token_time = Token(re.compile(r"T"),
143
frozenset((token_hour, token_minute,
145
token_day = Token(re.compile(r"(\d+)D"),
146
datetime.timedelta(days=1),
147
frozenset((token_time, token_end)))
148
token_month = Token(re.compile(r"(\d+)M"),
149
datetime.timedelta(weeks=4),
150
frozenset((token_day, token_end)))
151
token_year = Token(re.compile(r"(\d+)Y"),
152
datetime.timedelta(weeks=52),
153
frozenset((token_month, token_end)))
154
token_week = Token(re.compile(r"(\d+)W"),
155
datetime.timedelta(weeks=1),
156
frozenset((token_end, )))
157
token_duration = Token(re.compile(r"P"), None,
158
frozenset((token_year, token_month,
159
token_day, token_time,
161
# Define starting values:
163
value = datetime.timedelta()
165
# Following valid tokens
166
followers = frozenset((token_duration, ))
167
# String left to parse
169
# Loop until end token is found
170
while found_token is not token_end:
171
# Search for any currently valid tokens
172
for token in followers:
173
match = token.regexp.match(s)
174
if match is not None:
176
if token.value is not None:
177
# Value found, parse digits
178
factor = int(match.group(1), 10)
179
# Add to value so far
180
value += factor * token.value
181
# Strip token from string
182
s = token.regexp.sub("", s, 1)
185
# Set valid next tokens
186
followers = found_token.followers
189
# No currently valid tokens were found
190
raise ValueError("Invalid RFC 3339 duration: {!r}"
83
196
def string_to_delta(interval):
84
197
"""Parse a string and return a datetime.timedelta
86
>>> string_to_delta("7d")
199
>>> string_to_delta('7d')
87
200
datetime.timedelta(7)
88
>>> string_to_delta("60s")
201
>>> string_to_delta('60s')
89
202
datetime.timedelta(0, 60)
90
>>> string_to_delta("60m")
203
>>> string_to_delta('60m')
91
204
datetime.timedelta(0, 3600)
92
>>> string_to_delta("24h")
205
>>> string_to_delta('24h')
93
206
datetime.timedelta(1)
94
>>> string_to_delta("1w")
207
>>> string_to_delta('1w')
95
208
datetime.timedelta(7)
96
>>> string_to_delta("5m 30s")
209
>>> string_to_delta('5m 30s')
97
210
datetime.timedelta(0, 330)
214
return rfc3339_duration_to_delta(interval)
99
218
value = datetime.timedelta(0)
100
regexp = re.compile("(\d+)([dsmhw]?)")
219
regexp = re.compile(r"(\d+)([dsmhw]?)")
102
221
for num, suffix in regexp.findall(interval):
103
222
if suffix == "d":
104
223
value += datetime.timedelta(int(num))
201
323
parser.add_argument("--approval-duration",
202
324
help="Set duration of one client approval")
203
325
parser.add_argument("-H", "--host", help="Set host for client")
204
parser.add_argument("-s", "--secret", type=file,
326
parser.add_argument("-s", "--secret",
327
type=argparse.FileType(mode="rb"),
205
328
help="Set password blob (file) for client")
206
329
parser.add_argument("-A", "--approve", action="store_true",
207
330
help="Approve any current client request")
208
331
parser.add_argument("-D", "--deny", action="store_true",
209
332
help="Deny any current client request")
333
parser.add_argument("--check", action="store_true",
334
help="Run self-test")
210
335
parser.add_argument("client", nargs="*", help="Client name")
211
336
options = parser.parse_args()
213
338
if has_actions(options) and not (options.client or options.all):
214
339
parser.error("Options require clients names or --all.")
215
340
if options.verbose and has_actions(options):
216
parser.error("--verbose can only be used alone or with"
341
parser.error("--verbose can only be used alone.")
342
if options.dump_json and (options.verbose
343
or has_actions(options)):
344
parser.error("--dump-json can only be used alone.")
218
345
if options.all and not has_actions(options):
219
346
parser.error("--all requires an action.")
350
fail_count, test_count = doctest.testmod()
351
sys.exit(os.EX_OK if fail_count == 0 else 1)
222
354
bus = dbus.SystemBus()
223
355
mandos_dbus_objc = bus.get_object(busname, server_path)
224
356
except dbus.exceptions.DBusException:
225
print("Could not connect to Mandos server",
357
print("Could not connect to Mandos server", file=sys.stderr)
229
360
mandos_serv = dbus.Interface(mandos_dbus_objc,
230
dbus_interface = server_interface)
232
#block stderr since dbus library prints to stderr
361
dbus_interface=server_interface)
362
mandos_serv_object_manager = dbus.Interface(
363
mandos_dbus_objc, dbus_interface=dbus.OBJECT_MANAGER_IFACE)
365
# block stderr since dbus library prints to stderr
233
366
null = os.open(os.path.devnull, os.O_RDWR)
234
367
stderrcopy = os.dup(sys.stderr.fileno())
235
368
os.dup2(null, sys.stderr.fileno())
239
mandos_clients = mandos_serv.GetAllClientsWithProperties()
372
mandos_clients = {path: ifs_and_props[client_interface]
373
for path, ifs_and_props in
374
mandos_serv_object_manager
375
.GetManagedObjects().items()
376
if client_interface in ifs_and_props}
242
379
os.dup2(stderrcopy, sys.stderr.fileno())
243
380
os.close(stderrcopy)
244
except dbus.exceptions.DBusException:
245
print("Access denied: Accessing mandos server through dbus.",
381
except dbus.exceptions.DBusException as e:
382
print("Access denied: "
383
"Accessing mandos server through D-Bus: {}".format(e),
249
387
# Compile dict of (clients: properties) to process
252
390
if options.all or not options.client:
253
clients = dict((bus.get_object(busname, path), properties)
254
for path, properties in
255
mandos_clients.iteritems())
391
clients = {bus.get_object(busname, path): properties
392
for path, properties in mandos_clients.items()}
257
394
for name in options.client:
258
for path, client in mandos_clients.iteritems():
395
for path, client in mandos_clients.items():
259
396
if client["Name"] == name:
260
397
client_objc = bus.get_object(busname, path)
261
398
clients[client_objc] = client
264
print("Client not found on server: {0!r}"
401
print("Client not found on server: {!r}"
265
402
.format(name), file=sys.stderr)
268
405
if not has_actions(options) and clients:
270
keywords = ("Name", "Enabled", "Timeout",
271
"LastCheckedOK", "Created", "Interval",
272
"Host", "Fingerprint", "CheckerRunning",
406
if options.verbose or options.dump_json:
407
keywords = ("Name", "Enabled", "Timeout", "LastCheckedOK",
408
"Created", "Interval", "Host", "KeyID",
409
"Fingerprint", "CheckerRunning",
273
410
"LastEnabled", "ApprovalPending",
275
"LastApprovalRequest", "ApprovalDelay",
276
"ApprovalDuration", "Checker",
411
"ApprovedByDefault", "LastApprovalRequest",
412
"ApprovalDelay", "ApprovalDuration",
413
"Checker", "ExtendedTimeout", "Expires",
279
416
keywords = defaultkeywords
281
print_clients(clients.values(), keywords)
418
if options.dump_json:
419
json.dump({client["Name"]: {key:
421
if isinstance(client[key],
425
for client in clients.values()},
426
fp=sys.stdout, indent=4,
427
separators=(',', ': '))
430
print_clients(clients.values(), keywords)
283
432
# Process each client in the list by all selected options
284
433
for client in clients:
285
435
def set_client_prop(prop, value):
286
436
"""Set a Client D-Bus property"""
287
437
client.Set(client_interface, prop, value,
288
438
dbus_interface=dbus.PROPERTIES_IFACE)
289
440
def set_client_prop_ms(prop, value):
290
441
"""Set a Client D-Bus property, converted
291
442
from a string to milliseconds."""
292
443
set_client_prop(prop,
293
timedelta_to_milliseconds
294
(string_to_delta(value)))
444
string_to_delta(value).total_seconds()
295
447
if options.remove:
296
448
mandos_serv.RemoveClient(client.__dbus_object_path__)
297
449
if options.enable: