2
2
# -*- mode: python; coding: utf-8 -*-
4
4
# Mandos Monitor - Control and monitor the Mandos server
6
# Copyright © 2008-2018 Teddy Hogeborn
7
# Copyright © 2008-2018 Björn Påhlsson
9
# This file is part of Mandos.
11
# Mandos is free software: you can redistribute it and/or modify it
12
# under the terms of the GNU General Public License as published by
6
# Copyright © 2008-2014 Teddy Hogeborn
7
# Copyright © 2008-2014 Björn Påhlsson
9
# This program is free software: you can redistribute it and/or modify
10
# it under the terms of the GNU General Public License as published by
13
11
# the Free Software Foundation, either version 3 of the License, or
14
12
# (at your option) any later version.
16
# Mandos is distributed in the hope that it will be useful, but
17
# WITHOUT ANY WARRANTY; without even the implied warranty of
14
# This program is distributed in the hope that it will be useful,
15
# but WITHOUT ANY WARRANTY; without even the implied warranty of
18
16
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19
17
# GNU General Public License for more details.
21
19
# You should have received a copy of the GNU General Public License
22
# along with Mandos. If not, see <http://www.gnu.org/licenses/>.
20
# along with this program. If not, see
21
# <http://www.gnu.org/licenses/>.
24
23
# Contact the authors at <mandos@recompile.se>.
27
26
from __future__ import (division, absolute_import, print_function,
66
64
"ApprovalDelay": "Approval Delay",
67
65
"ApprovalDuration": "Approval Duration",
68
66
"Checker": "Checker",
69
"ExtendedTimeout": "Extended Timeout",
71
"LastCheckerStatus": "Last Checker Status",
67
"ExtendedTimeout" : "Extended Timeout"
73
69
defaultkeywords = ("Name", "Enabled", "Timeout", "LastCheckedOK")
74
70
domain = "se.recompile"
75
71
busname = domain + ".Mandos"
77
73
server_interface = domain + ".Mandos"
78
74
client_interface = domain + ".Mandos.Client"
83
dbus.OBJECT_MANAGER_IFACE
84
except AttributeError:
85
dbus.OBJECT_MANAGER_IFACE = "org.freedesktop.DBus.ObjectManager"
88
77
def milliseconds_to_string(ms):
89
78
td = datetime.timedelta(0, 0, 0, ms)
90
79
return ("{days}{hours:02}:{minutes:02}:{seconds:02}"
91
.format(days="{}T".format(td.days) if td.days else "",
92
hours=td.seconds // 3600,
93
minutes=(td.seconds % 3600) // 60,
94
seconds=td.seconds % 60))
80
.format(days = "{}T".format(td.days) if td.days else "",
81
hours = td.seconds // 3600,
82
minutes = (td.seconds % 3600) // 60,
83
seconds = td.seconds % 60,
97
87
def rfc3339_duration_to_delta(duration):
98
88
"""Parse an RFC 3339 "duration" and return a datetime.timedelta
100
90
>>> rfc3339_duration_to_delta("P7D")
101
91
datetime.timedelta(7)
102
92
>>> rfc3339_duration_to_delta("PT60S")
112
102
>>> rfc3339_duration_to_delta("P1DT3M20S")
113
103
datetime.timedelta(1, 200)
116
106
# Parsing an RFC 3339 duration with regular expressions is not
117
107
# possible - there would have to be multiple places for the same
118
108
# values, like seconds. The current code, while more esoteric, is
119
109
# cleaner without depending on a parsing library. If Python had a
120
110
# built-in library for parsing we would use it, but we'd like to
121
111
# avoid excessive use of external libraries.
123
113
# New type for defining tokens, syntax, and semantics all-in-one
124
Token = collections.namedtuple("Token", (
125
"regexp", # To match token; if "value" is not None, must have
126
# a "group" containing digits
127
"value", # datetime.timedelta or None
128
"followers")) # Tokens valid after this token
114
Token = collections.namedtuple("Token",
115
("regexp", # To match token; if
116
# "value" is not None,
117
# must have a "group"
119
"value", # datetime.timedelta or
121
"followers")) # Tokens valid after
129
123
# RFC 3339 "duration" tokens, syntax, and semantics; taken from
130
124
# the "duration" ABNF definition in RFC 3339, Appendix A.
131
125
token_end = Token(re.compile(r"$"), None, frozenset())
132
126
token_second = Token(re.compile(r"(\d+)S"),
133
127
datetime.timedelta(seconds=1),
134
frozenset((token_end, )))
128
frozenset((token_end,)))
135
129
token_minute = Token(re.compile(r"(\d+)M"),
136
130
datetime.timedelta(minutes=1),
137
131
frozenset((token_second, token_end)))
153
147
frozenset((token_month, token_end)))
154
148
token_week = Token(re.compile(r"(\d+)W"),
155
149
datetime.timedelta(weeks=1),
156
frozenset((token_end, )))
150
frozenset((token_end,)))
157
151
token_duration = Token(re.compile(r"P"), None,
158
152
frozenset((token_year, token_month,
159
153
token_day, token_time,
161
# Define starting values:
163
value = datetime.timedelta()
155
# Define starting values
156
value = datetime.timedelta() # Value so far
164
157
found_token = None
165
# Following valid tokens
166
followers = frozenset((token_duration, ))
167
# String left to parse
158
followers = frozenset((token_duration,)) # Following valid tokens
159
s = duration # String left to parse
169
160
# Loop until end token is found
170
161
while found_token is not token_end:
171
162
# Search for any currently valid tokens
189
180
# No currently valid tokens were found
190
raise ValueError("Invalid RFC 3339 duration: {!r}"
181
raise ValueError("Invalid RFC 3339 duration")
192
182
# End token found
196
186
def string_to_delta(interval):
197
187
"""Parse a string and return a datetime.timedelta
199
>>> string_to_delta('7d')
189
>>> string_to_delta("7d")
200
190
datetime.timedelta(7)
201
>>> string_to_delta('60s')
191
>>> string_to_delta("60s")
202
192
datetime.timedelta(0, 60)
203
>>> string_to_delta('60m')
193
>>> string_to_delta("60m")
204
194
datetime.timedelta(0, 3600)
205
>>> string_to_delta('24h')
195
>>> string_to_delta("24h")
206
196
datetime.timedelta(1)
207
>>> string_to_delta('1w')
197
>>> string_to_delta("1w")
208
198
datetime.timedelta(7)
209
>>> string_to_delta('5m 30s')
199
>>> string_to_delta("5m 30s")
210
200
datetime.timedelta(0, 330)
214
204
return rfc3339_duration_to_delta(interval)
215
205
except ValueError:
218
208
value = datetime.timedelta(0)
219
209
regexp = re.compile(r"(\d+)([dsmhw]?)")
221
211
for num, suffix in regexp.findall(interval):
222
212
if suffix == "d":
223
213
value += datetime.timedelta(int(num))
242
231
"ApprovalDuration", "ExtendedTimeout"):
243
232
return milliseconds_to_string(value)
244
233
return str(value)
246
235
# Create format string to print table rows
247
236
format_string = " ".join("{{{key}:{width}}}".format(
248
width=max(len(tablewords[key]),
249
max(len(valuetostring(client[key], key))
250
for client in clients)),
237
width = max(len(tablewords[key]),
238
max(len(valuetostring(client[key],
242
key = key) for key in keywords)
253
243
# Print header line
254
244
print(format_string.format(**tablewords))
255
245
for client in clients:
257
.format(**{key: valuetostring(client[key], key)
258
for key in keywords}))
246
print(format_string.format(**{ key:
247
valuetostring(client[key],
249
for key in keywords }))
261
251
def has_actions(options):
262
252
return any((options.enable,
283
272
parser = argparse.ArgumentParser()
284
273
parser.add_argument("--version", action="version",
285
version="%(prog)s {}".format(version),
274
version = "%(prog)s {}".format(version),
286
275
help="show version number and exit")
287
276
parser.add_argument("-a", "--all", action="store_true",
288
277
help="Select all clients")
289
278
parser.add_argument("-v", "--verbose", action="store_true",
290
279
help="Print all fields")
291
parser.add_argument("-j", "--dump-json", action="store_true",
292
help="Dump client data in JSON format")
293
280
parser.add_argument("-e", "--enable", action="store_true",
294
281
help="Enable client")
295
282
parser.add_argument("-d", "--disable", action="store_true",
334
321
help="Run self-test")
335
322
parser.add_argument("client", nargs="*", help="Client name")
336
323
options = parser.parse_args()
338
325
if has_actions(options) and not (options.client or options.all):
339
326
parser.error("Options require clients names or --all.")
340
327
if options.verbose and has_actions(options):
341
parser.error("--verbose can only be used alone.")
342
if options.dump_json and (options.verbose
343
or has_actions(options)):
344
parser.error("--dump-json can only be used alone.")
328
parser.error("--verbose can only be used alone or with"
345
330
if options.all and not has_actions(options):
346
331
parser.error("--all requires an action.")
348
333
if options.check:
350
334
fail_count, test_count = doctest.testmod()
351
335
sys.exit(os.EX_OK if fail_count == 0 else 1)
354
338
bus = dbus.SystemBus()
355
339
mandos_dbus_objc = bus.get_object(busname, server_path)
356
340
except dbus.exceptions.DBusException:
357
print("Could not connect to Mandos server", file=sys.stderr)
341
print("Could not connect to Mandos server",
360
345
mandos_serv = dbus.Interface(mandos_dbus_objc,
361
dbus_interface=server_interface)
362
mandos_serv_object_manager = dbus.Interface(
363
mandos_dbus_objc, dbus_interface=dbus.OBJECT_MANAGER_IFACE)
365
# block stderr since dbus library prints to stderr
346
dbus_interface = server_interface)
348
#block stderr since dbus library prints to stderr
366
349
null = os.open(os.path.devnull, os.O_RDWR)
367
350
stderrcopy = os.dup(sys.stderr.fileno())
368
351
os.dup2(null, sys.stderr.fileno())
372
mandos_clients = {path: ifs_and_props[client_interface]
373
for path, ifs_and_props in
374
mandos_serv_object_manager
375
.GetManagedObjects().items()
376
if client_interface in ifs_and_props}
355
mandos_clients = mandos_serv.GetAllClientsWithProperties()
379
358
os.dup2(stderrcopy, sys.stderr.fileno())
380
359
os.close(stderrcopy)
381
except dbus.exceptions.DBusException as e:
382
print("Access denied: "
383
"Accessing mandos server through D-Bus: {}".format(e),
360
except dbus.exceptions.DBusException:
361
print("Access denied: Accessing mandos server through dbus.",
387
365
# Compile dict of (clients: properties) to process
390
368
if options.all or not options.client:
391
clients = {bus.get_object(busname, path): properties
392
for path, properties in mandos_clients.items()}
369
clients = { bus.get_object(busname, path): properties
370
for path, properties in mandos_clients.items() }
394
372
for name in options.client:
395
373
for path, client in mandos_clients.items():
401
379
print("Client not found on server: {!r}"
402
380
.format(name), file=sys.stderr)
405
383
if not has_actions(options) and clients:
406
if options.verbose or options.dump_json:
407
keywords = ("Name", "Enabled", "Timeout", "LastCheckedOK",
408
"Created", "Interval", "Host", "KeyID",
409
"Fingerprint", "CheckerRunning",
385
keywords = ("Name", "Enabled", "Timeout",
386
"LastCheckedOK", "Created", "Interval",
387
"Host", "Fingerprint", "CheckerRunning",
410
388
"LastEnabled", "ApprovalPending",
411
"ApprovedByDefault", "LastApprovalRequest",
412
"ApprovalDelay", "ApprovalDuration",
413
"Checker", "ExtendedTimeout", "Expires",
390
"LastApprovalRequest", "ApprovalDelay",
391
"ApprovalDuration", "Checker",
416
394
keywords = defaultkeywords
418
if options.dump_json:
419
json.dump({client["Name"]: {key:
421
if isinstance(client[key],
425
for client in clients.values()},
426
fp=sys.stdout, indent=4,
427
separators=(',', ': '))
430
print_clients(clients.values(), keywords)
396
print_clients(clients.values(), keywords)
432
398
# Process each client in the list by all selected options
433
399
for client in clients:
435
400
def set_client_prop(prop, value):
436
401
"""Set a Client D-Bus property"""
437
402
client.Set(client_interface, prop, value,
438
403
dbus_interface=dbus.PROPERTIES_IFACE)
440
404
def set_client_prop_ms(prop, value):
441
405
"""Set a Client D-Bus property, converted
442
406
from a string to milliseconds."""
443
407
set_client_prop(prop,
444
408
string_to_delta(value).total_seconds()
447
410
if options.remove:
448
411
mandos_serv.RemoveClient(client.__dbus_object_path__)
449
412
if options.enable:
457
420
if options.stop_checker:
458
421
set_client_prop("CheckerRunning", dbus.Boolean(False))
459
422
if options.is_enabled:
460
if client.Get(client_interface, "Enabled",
461
dbus_interface=dbus.PROPERTIES_IFACE):
423
sys.exit(0 if client.Get(client_interface,
426
dbus.PROPERTIES_IFACE)
465
428
if options.checker is not None:
466
429
set_client_prop("Checker", options.checker)
467
430
if options.host is not None: