/mandos/trunk

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/trunk

« back to all changes in this revision

Viewing changes to mandos

  • Committer: teddy at bsnet
  • Date: 2011-03-21 19:34:39 UTC
  • Revision ID: teddy@fukt.bsnet.se-20110321193439-lkj3kwvhmujd8lwv
* plugins.d/mandos-client.c (good_interface): Reject non-ARP
                                              interfaces.

Show diffs side-by-side

added added

removed removed

Lines of Context:
11
11
# "AvahiService" class, and some lines in "main".
12
12
13
13
# Everything else is
14
 
# Copyright © 2008,2009 Teddy Hogeborn
15
 
# Copyright © 2008,2009 Björn Påhlsson
 
14
# Copyright © 2008-2011 Teddy Hogeborn
 
15
# Copyright © 2008-2011 Björn Påhlsson
16
16
17
17
# This program is free software: you can redistribute it and/or modify
18
18
# it under the terms of the GNU General Public License as published by
31
31
# Contact the authors at <mandos@fukt.bsnet.se>.
32
32
33
33
 
34
 
from __future__ import division, with_statement, absolute_import
 
34
from __future__ import (division, absolute_import, print_function,
 
35
                        unicode_literals)
35
36
 
36
37
import SocketServer as socketserver
37
38
import socket
38
 
import optparse
 
39
import argparse
39
40
import datetime
40
41
import errno
41
42
import gnutls.crypto
81
82
        SO_BINDTODEVICE = None
82
83
 
83
84
 
84
 
version = "1.0.14"
 
85
version = "1.3.0"
85
86
 
86
 
logger = logging.getLogger(u'mandos')
 
87
#logger = logging.getLogger('mandos')
 
88
logger = logging.Logger('mandos')
87
89
syslogger = (logging.handlers.SysLogHandler
88
90
             (facility = logging.handlers.SysLogHandler.LOG_DAEMON,
89
 
              address = "/dev/log"))
 
91
              address = str("/dev/log")))
90
92
syslogger.setFormatter(logging.Formatter
91
 
                       (u'Mandos [%(process)d]: %(levelname)s:'
92
 
                        u' %(message)s'))
 
93
                       ('Mandos [%(process)d]: %(levelname)s:'
 
94
                        ' %(message)s'))
93
95
logger.addHandler(syslogger)
94
96
 
95
97
console = logging.StreamHandler()
96
 
console.setFormatter(logging.Formatter(u'%(name)s [%(process)d]:'
97
 
                                       u' %(levelname)s:'
98
 
                                       u' %(message)s'))
 
98
console.setFormatter(logging.Formatter('%(name)s [%(process)d]:'
 
99
                                       ' %(levelname)s:'
 
100
                                       ' %(message)s'))
99
101
logger.addHandler(console)
100
102
 
101
 
multiprocessing_manager = multiprocessing.Manager()
102
 
 
103
103
class AvahiError(Exception):
104
104
    def __init__(self, value, *args, **kwargs):
105
105
        self.value = value
120
120
    Attributes:
121
121
    interface: integer; avahi.IF_UNSPEC or an interface index.
122
122
               Used to optionally bind to the specified interface.
123
 
    name: string; Example: u'Mandos'
124
 
    type: string; Example: u'_mandos._tcp'.
 
123
    name: string; Example: 'Mandos'
 
124
    type: string; Example: '_mandos._tcp'.
125
125
                  See <http://www.dns-sd.org/ServiceTypes.html>
126
126
    port: integer; what port to announce
127
127
    TXT: list of strings; TXT record for the service
136
136
    """
137
137
    def __init__(self, interface = avahi.IF_UNSPEC, name = None,
138
138
                 servicetype = None, port = None, TXT = None,
139
 
                 domain = u"", host = u"", max_renames = 32768,
 
139
                 domain = "", host = "", max_renames = 32768,
140
140
                 protocol = avahi.PROTO_UNSPEC, bus = None):
141
141
        self.interface = interface
142
142
        self.name = name
154
154
    def rename(self):
155
155
        """Derived from the Avahi example code"""
156
156
        if self.rename_count >= self.max_renames:
157
 
            logger.critical(u"No suitable Zeroconf service name found"
158
 
                            u" after %i retries, exiting.",
 
157
            logger.critical("No suitable Zeroconf service name found"
 
158
                            " after %i retries, exiting.",
159
159
                            self.rename_count)
160
 
            raise AvahiServiceError(u"Too many renames")
161
 
        self.name = self.server.GetAlternativeServiceName(self.name)
162
 
        logger.info(u"Changing Zeroconf service name to %r ...",
163
 
                    unicode(self.name))
 
160
            raise AvahiServiceError("Too many renames")
 
161
        self.name = unicode(self.server.GetAlternativeServiceName(self.name))
 
162
        logger.info("Changing Zeroconf service name to %r ...",
 
163
                    self.name)
164
164
        syslogger.setFormatter(logging.Formatter
165
 
                               (u'Mandos (%s) [%%(process)d]:'
166
 
                                u' %%(levelname)s: %%(message)s'
 
165
                               ('Mandos (%s) [%%(process)d]:'
 
166
                                ' %%(levelname)s: %%(message)s'
167
167
                                % self.name))
168
168
        self.remove()
169
 
        self.add()
 
169
        try:
 
170
            self.add()
 
171
        except dbus.exceptions.DBusException, error:
 
172
            logger.critical("DBusException: %s", error)
 
173
            self.cleanup()
 
174
            os._exit(1)
170
175
        self.rename_count += 1
171
176
    def remove(self):
172
177
        """Derived from the Avahi example code"""
182
187
            self.group.connect_to_signal('StateChanged',
183
188
                                         self
184
189
                                         .entry_group_state_changed)
185
 
        logger.debug(u"Adding Zeroconf service '%s' of type '%s' ...",
 
190
        logger.debug("Adding Zeroconf service '%s' of type '%s' ...",
186
191
                     self.name, self.type)
187
192
        self.group.AddService(
188
193
            self.interface,
195
200
        self.group.Commit()
196
201
    def entry_group_state_changed(self, state, error):
197
202
        """Derived from the Avahi example code"""
198
 
        logger.debug(u"Avahi state change: %i", state)
 
203
        logger.debug("Avahi entry group state change: %i", state)
199
204
        
200
205
        if state == avahi.ENTRY_GROUP_ESTABLISHED:
201
 
            logger.debug(u"Zeroconf service established.")
 
206
            logger.debug("Zeroconf service established.")
202
207
        elif state == avahi.ENTRY_GROUP_COLLISION:
203
 
            logger.warning(u"Zeroconf service name collision.")
 
208
            logger.info("Zeroconf service name collision.")
204
209
            self.rename()
205
210
        elif state == avahi.ENTRY_GROUP_FAILURE:
206
 
            logger.critical(u"Avahi: Error in group state changed %s",
 
211
            logger.critical("Avahi: Error in group state changed %s",
207
212
                            unicode(error))
208
 
            raise AvahiGroupError(u"State changed: %s"
 
213
            raise AvahiGroupError("State changed: %s"
209
214
                                  % unicode(error))
210
215
    def cleanup(self):
211
216
        """Derived from the Avahi example code"""
214
219
            self.group = None
215
220
    def server_state_changed(self, state):
216
221
        """Derived from the Avahi example code"""
 
222
        logger.debug("Avahi server state change: %i", state)
217
223
        if state == avahi.SERVER_COLLISION:
218
 
            logger.error(u"Zeroconf server name collision")
 
224
            logger.error("Zeroconf server name collision")
219
225
            self.remove()
220
226
        elif state == avahi.SERVER_RUNNING:
221
227
            self.add()
226
232
                self.bus.get_object(avahi.DBUS_NAME,
227
233
                                    avahi.DBUS_PATH_SERVER),
228
234
                avahi.DBUS_INTERFACE_SERVER)
229
 
        self.server.connect_to_signal(u"StateChanged",
 
235
        self.server.connect_to_signal("StateChanged",
230
236
                                 self.server_state_changed)
231
237
        self.server_state_changed(self.server.GetState())
232
238
 
235
241
    """A representation of a client host served by this server.
236
242
    
237
243
    Attributes:
238
 
    name:       string; from the config file, used in log messages and
239
 
                        D-Bus identifiers
 
244
    _approved:   bool(); 'None' if not yet approved/disapproved
 
245
    approval_delay: datetime.timedelta(); Time to wait for approval
 
246
    approval_duration: datetime.timedelta(); Duration of one approval
 
247
    checker:    subprocess.Popen(); a running checker process used
 
248
                                    to see if the client lives.
 
249
                                    'None' if no process is running.
 
250
    checker_callback_tag: a gobject event source tag, or None
 
251
    checker_command: string; External command which is run to check
 
252
                     if client lives.  %() expansions are done at
 
253
                     runtime with vars(self) as dict, so that for
 
254
                     instance %(name)s can be used in the command.
 
255
    checker_initiator_tag: a gobject event source tag, or None
 
256
    created:    datetime.datetime(); (UTC) object creation
 
257
    current_checker_command: string; current running checker_command
 
258
    disable_hook:  If set, called by disable() as disable_hook(self)
 
259
    disable_initiator_tag: a gobject event source tag, or None
 
260
    enabled:    bool()
240
261
    fingerprint: string (40 or 32 hexadecimal digits); used to
241
262
                 uniquely identify the client
242
 
    secret:     bytestring; sent verbatim (over TLS) to client
243
263
    host:       string; available for use by the checker command
244
 
    created:    datetime.datetime(); (UTC) object creation
 
264
    interval:   datetime.timedelta(); How often to start a new checker
 
265
    last_approval_request: datetime.datetime(); (UTC) or None
 
266
    last_checked_ok: datetime.datetime(); (UTC) or None
245
267
    last_enabled: datetime.datetime(); (UTC)
246
 
    enabled:    bool()
247
 
    last_checked_ok: datetime.datetime(); (UTC) or None
 
268
    name:       string; from the config file, used in log messages and
 
269
                        D-Bus identifiers
 
270
    secret:     bytestring; sent verbatim (over TLS) to client
248
271
    timeout:    datetime.timedelta(); How long from last_checked_ok
249
272
                                      until this client is disabled
250
 
    interval:   datetime.timedelta(); How often to start a new checker
251
 
    disable_hook:  If set, called by disable() as disable_hook(self)
252
 
    checker:    subprocess.Popen(); a running checker process used
253
 
                                    to see if the client lives.
254
 
                                    'None' if no process is running.
255
 
    checker_initiator_tag: a gobject event source tag, or None
256
 
    disable_initiator_tag: - '' -
257
 
    checker_callback_tag:  - '' -
258
 
    checker_command: string; External command which is run to check if
259
 
                     client lives.  %() expansions are done at
260
 
                     runtime with vars(self) as dict, so that for
261
 
                     instance %(name)s can be used in the command.
262
 
    current_checker_command: string; current running checker_command
263
 
    approved_delay: datetime.timedelta(); Time to wait for approval
264
 
    _approved:   bool(); 'None' if not yet approved/disapproved
265
 
    approved_duration: datetime.timedelta(); Duration of one approval
 
273
    runtime_expansions: Allowed attributes for runtime expansion.
266
274
    """
267
275
    
 
276
    runtime_expansions = ("approval_delay", "approval_duration",
 
277
                          "created", "enabled", "fingerprint",
 
278
                          "host", "interval", "last_checked_ok",
 
279
                          "last_enabled", "name", "timeout")
 
280
    
268
281
    @staticmethod
269
282
    def _timedelta_to_milliseconds(td):
270
283
        "Convert a datetime.timedelta() to milliseconds"
280
293
        "Return the 'interval' attribute in milliseconds"
281
294
        return self._timedelta_to_milliseconds(self.interval)
282
295
 
283
 
    def approved_delay_milliseconds(self):
284
 
        return self._timedelta_to_milliseconds(self.approved_delay)
 
296
    def approval_delay_milliseconds(self):
 
297
        return self._timedelta_to_milliseconds(self.approval_delay)
285
298
    
286
299
    def __init__(self, name = None, disable_hook=None, config=None):
287
300
        """Note: the 'checker' key in 'config' sets the
290
303
        self.name = name
291
304
        if config is None:
292
305
            config = {}
293
 
        logger.debug(u"Creating client %r", self.name)
 
306
        logger.debug("Creating client %r", self.name)
294
307
        # Uppercase and remove spaces from fingerprint for later
295
308
        # comparison purposes with return value from the fingerprint()
296
309
        # function
297
 
        self.fingerprint = (config[u"fingerprint"].upper()
298
 
                            .replace(u" ", u""))
299
 
        logger.debug(u"  Fingerprint: %s", self.fingerprint)
300
 
        if u"secret" in config:
301
 
            self.secret = config[u"secret"].decode(u"base64")
302
 
        elif u"secfile" in config:
 
310
        self.fingerprint = (config["fingerprint"].upper()
 
311
                            .replace(" ", ""))
 
312
        logger.debug("  Fingerprint: %s", self.fingerprint)
 
313
        if "secret" in config:
 
314
            self.secret = config["secret"].decode("base64")
 
315
        elif "secfile" in config:
303
316
            with open(os.path.expanduser(os.path.expandvars
304
 
                                         (config[u"secfile"])),
 
317
                                         (config["secfile"])),
305
318
                      "rb") as secfile:
306
319
                self.secret = secfile.read()
307
320
        else:
308
 
            #XXX Need to allow secret on demand!
309
 
            raise TypeError(u"No secret or secfile for client %s"
 
321
            raise TypeError("No secret or secfile for client %s"
310
322
                            % self.name)
311
 
        self.host = config.get(u"host", u"")
 
323
        self.host = config.get("host", "")
312
324
        self.created = datetime.datetime.utcnow()
313
325
        self.enabled = False
 
326
        self.last_approval_request = None
314
327
        self.last_enabled = None
315
328
        self.last_checked_ok = None
316
 
        self.timeout = string_to_delta(config[u"timeout"])
317
 
        self.interval = string_to_delta(config[u"interval"])
 
329
        self.timeout = string_to_delta(config["timeout"])
 
330
        self.interval = string_to_delta(config["interval"])
318
331
        self.disable_hook = disable_hook
319
332
        self.checker = None
320
333
        self.checker_initiator_tag = None
321
334
        self.disable_initiator_tag = None
322
335
        self.checker_callback_tag = None
323
 
        self.checker_command = config[u"checker"]
 
336
        self.checker_command = config["checker"]
324
337
        self.current_checker_command = None
325
338
        self.last_connect = None
 
339
        self._approved = None
 
340
        self.approved_by_default = config.get("approved_by_default",
 
341
                                              True)
326
342
        self.approvals_pending = 0
327
 
        self._approved = None
328
 
        self.approved_by_default = config.get(u"approved_by_default",
329
 
                                              True)
330
 
        self.approved_delay = string_to_delta(
331
 
            config[u"approved_delay"])
332
 
        self.approved_duration = string_to_delta(
333
 
            config[u"approved_duration"])
 
343
        self.approval_delay = string_to_delta(
 
344
            config["approval_delay"])
 
345
        self.approval_duration = string_to_delta(
 
346
            config["approval_duration"])
334
347
        self.changedstate = multiprocessing_manager.Condition(multiprocessing_manager.Lock())
335
 
 
 
348
    
336
349
    def send_changedstate(self):
337
350
        self.changedstate.acquire()
338
351
        self.changedstate.notify_all()
340
353
        
341
354
    def enable(self):
342
355
        """Start this client's checker and timeout hooks"""
343
 
        if getattr(self, u"enabled", False):
 
356
        if getattr(self, "enabled", False):
344
357
            # Already enabled
345
358
            return
346
359
        self.send_changedstate()
365
378
        if not quiet:
366
379
            self.send_changedstate()
367
380
        if not quiet:
368
 
            logger.info(u"Disabling client %s", self.name)
369
 
        if getattr(self, u"disable_initiator_tag", False):
 
381
            logger.info("Disabling client %s", self.name)
 
382
        if getattr(self, "disable_initiator_tag", False):
370
383
            gobject.source_remove(self.disable_initiator_tag)
371
384
            self.disable_initiator_tag = None
372
 
        if getattr(self, u"checker_initiator_tag", False):
 
385
        if getattr(self, "checker_initiator_tag", False):
373
386
            gobject.source_remove(self.checker_initiator_tag)
374
387
            self.checker_initiator_tag = None
375
388
        self.stop_checker()
390
403
        if os.WIFEXITED(condition):
391
404
            exitstatus = os.WEXITSTATUS(condition)
392
405
            if exitstatus == 0:
393
 
                logger.info(u"Checker for %(name)s succeeded",
 
406
                logger.info("Checker for %(name)s succeeded",
394
407
                            vars(self))
395
408
                self.checked_ok()
396
409
            else:
397
 
                logger.info(u"Checker for %(name)s failed",
 
410
                logger.info("Checker for %(name)s failed",
398
411
                            vars(self))
399
412
        else:
400
 
            logger.warning(u"Checker for %(name)s crashed?",
 
413
            logger.warning("Checker for %(name)s crashed?",
401
414
                           vars(self))
402
415
    
403
416
    def checked_ok(self):
412
425
                                      (self.timeout_milliseconds(),
413
426
                                       self.disable))
414
427
    
 
428
    def need_approval(self):
 
429
        self.last_approval_request = datetime.datetime.utcnow()
 
430
    
415
431
    def start_checker(self):
416
432
        """Start a new checker subprocess if one is not running.
417
433
        
435
451
                raise error
436
452
        else:
437
453
            if pid:
438
 
                logger.warning(u"Checker was a zombie")
 
454
                logger.warning("Checker was a zombie")
439
455
                gobject.source_remove(self.checker_callback_tag)
440
456
                self.checker_callback(pid, status,
441
457
                                      self.current_checker_command)
446
462
                command = self.checker_command % self.host
447
463
            except TypeError:
448
464
                # Escape attributes for the shell
449
 
                escaped_attrs = dict((key,
450
 
                                      re.escape(unicode(str(val),
451
 
                                                        errors=
452
 
                                                        u'replace')))
453
 
                                     for key, val in
454
 
                                     vars(self).iteritems())
 
465
                escaped_attrs = dict(
 
466
                    (attr,
 
467
                     re.escape(unicode(str(getattr(self, attr, "")),
 
468
                                       errors=
 
469
                                       'replace')))
 
470
                    for attr in
 
471
                    self.runtime_expansions)
 
472
 
455
473
                try:
456
474
                    command = self.checker_command % escaped_attrs
457
475
                except TypeError, error:
458
 
                    logger.error(u'Could not format string "%s":'
459
 
                                 u' %s', self.checker_command, error)
 
476
                    logger.error('Could not format string "%s":'
 
477
                                 ' %s', self.checker_command, error)
460
478
                    return True # Try again later
461
479
            self.current_checker_command = command
462
480
            try:
463
 
                logger.info(u"Starting checker %r for %s",
 
481
                logger.info("Starting checker %r for %s",
464
482
                            command, self.name)
465
483
                # We don't need to redirect stdout and stderr, since
466
484
                # in normal mode, that is already done by daemon(),
468
486
                # always replaced by /dev/null.)
469
487
                self.checker = subprocess.Popen(command,
470
488
                                                close_fds=True,
471
 
                                                shell=True, cwd=u"/")
 
489
                                                shell=True, cwd="/")
472
490
                self.checker_callback_tag = (gobject.child_watch_add
473
491
                                             (self.checker.pid,
474
492
                                              self.checker_callback,
480
498
                    gobject.source_remove(self.checker_callback_tag)
481
499
                    self.checker_callback(pid, status, command)
482
500
            except OSError, error:
483
 
                logger.error(u"Failed to start subprocess: %s",
 
501
                logger.error("Failed to start subprocess: %s",
484
502
                             error)
485
503
        # Re-run this periodically if run by gobject.timeout_add
486
504
        return True
490
508
        if self.checker_callback_tag:
491
509
            gobject.source_remove(self.checker_callback_tag)
492
510
            self.checker_callback_tag = None
493
 
        if getattr(self, u"checker", None) is None:
 
511
        if getattr(self, "checker", None) is None:
494
512
            return
495
 
        logger.debug(u"Stopping checker for %(name)s", vars(self))
 
513
        logger.debug("Stopping checker for %(name)s", vars(self))
496
514
        try:
497
515
            os.kill(self.checker.pid, signal.SIGTERM)
498
516
            #time.sleep(0.5)
503
521
                raise
504
522
        self.checker = None
505
523
 
506
 
def dbus_service_property(dbus_interface, signature=u"v",
507
 
                          access=u"readwrite", byte_arrays=False):
 
524
def dbus_service_property(dbus_interface, signature="v",
 
525
                          access="readwrite", byte_arrays=False):
508
526
    """Decorators for marking methods of a DBusObjectWithProperties to
509
527
    become properties on the D-Bus.
510
528
    
517
535
    """
518
536
    # Encoding deeply encoded byte arrays is not supported yet by the
519
537
    # "Set" method, so we fail early here:
520
 
    if byte_arrays and signature != u"ay":
521
 
        raise ValueError(u"Byte arrays not supported for non-'ay'"
522
 
                         u" signature %r" % signature)
 
538
    if byte_arrays and signature != "ay":
 
539
        raise ValueError("Byte arrays not supported for non-'ay'"
 
540
                         " signature %r" % signature)
523
541
    def decorator(func):
524
542
        func._dbus_is_property = True
525
543
        func._dbus_interface = dbus_interface
526
544
        func._dbus_signature = signature
527
545
        func._dbus_access = access
528
546
        func._dbus_name = func.__name__
529
 
        if func._dbus_name.endswith(u"_dbus_property"):
 
547
        if func._dbus_name.endswith("_dbus_property"):
530
548
            func._dbus_name = func._dbus_name[:-14]
531
 
        func._dbus_get_args_options = {u'byte_arrays': byte_arrays }
 
549
        func._dbus_get_args_options = {'byte_arrays': byte_arrays }
532
550
        return func
533
551
    return decorator
534
552
 
562
580
    
563
581
    @staticmethod
564
582
    def _is_dbus_property(obj):
565
 
        return getattr(obj, u"_dbus_is_property", False)
 
583
        return getattr(obj, "_dbus_is_property", False)
566
584
    
567
585
    def _get_all_dbus_properties(self):
568
586
        """Returns a generator of (name, attribute) pairs
576
594
        property with the specified name and interface.
577
595
        """
578
596
        for name in (property_name,
579
 
                     property_name + u"_dbus_property"):
 
597
                     property_name + "_dbus_property"):
580
598
            prop = getattr(self, name, None)
581
599
            if (prop is None
582
600
                or not self._is_dbus_property(prop)
586
604
                continue
587
605
            return prop
588
606
        # No such property
589
 
        raise DBusPropertyNotFound(self.dbus_object_path + u":"
590
 
                                   + interface_name + u"."
 
607
        raise DBusPropertyNotFound(self.dbus_object_path + ":"
 
608
                                   + interface_name + "."
591
609
                                   + property_name)
592
610
    
593
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"ss",
594
 
                         out_signature=u"v")
 
611
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="ss",
 
612
                         out_signature="v")
595
613
    def Get(self, interface_name, property_name):
596
614
        """Standard D-Bus property Get() method, see D-Bus standard.
597
615
        """
598
616
        prop = self._get_dbus_property(interface_name, property_name)
599
 
        if prop._dbus_access == u"write":
 
617
        if prop._dbus_access == "write":
600
618
            raise DBusPropertyAccessException(property_name)
601
619
        value = prop()
602
 
        if not hasattr(value, u"variant_level"):
 
620
        if not hasattr(value, "variant_level"):
603
621
            return value
604
622
        return type(value)(value, variant_level=value.variant_level+1)
605
623
    
606
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"ssv")
 
624
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="ssv")
607
625
    def Set(self, interface_name, property_name, value):
608
626
        """Standard D-Bus property Set() method, see D-Bus standard.
609
627
        """
610
628
        prop = self._get_dbus_property(interface_name, property_name)
611
 
        if prop._dbus_access == u"read":
 
629
        if prop._dbus_access == "read":
612
630
            raise DBusPropertyAccessException(property_name)
613
 
        if prop._dbus_get_args_options[u"byte_arrays"]:
 
631
        if prop._dbus_get_args_options["byte_arrays"]:
614
632
            # The byte_arrays option is not supported yet on
615
633
            # signatures other than "ay".
616
 
            if prop._dbus_signature != u"ay":
 
634
            if prop._dbus_signature != "ay":
617
635
                raise ValueError
618
636
            value = dbus.ByteArray(''.join(unichr(byte)
619
637
                                           for byte in value))
620
638
        prop(value)
621
639
    
622
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"s",
623
 
                         out_signature=u"a{sv}")
 
640
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="s",
 
641
                         out_signature="a{sv}")
624
642
    def GetAll(self, interface_name):
625
643
        """Standard D-Bus property GetAll() method, see D-Bus
626
644
        standard.
634
652
                # Interface non-empty but did not match
635
653
                continue
636
654
            # Ignore write-only properties
637
 
            if prop._dbus_access == u"write":
 
655
            if prop._dbus_access == "write":
638
656
                continue
639
657
            value = prop()
640
 
            if not hasattr(value, u"variant_level"):
 
658
            if not hasattr(value, "variant_level"):
641
659
                all[name] = value
642
660
                continue
643
661
            all[name] = type(value)(value, variant_level=
644
662
                                    value.variant_level+1)
645
 
        return dbus.Dictionary(all, signature=u"sv")
 
663
        return dbus.Dictionary(all, signature="sv")
646
664
    
647
665
    @dbus.service.method(dbus.INTROSPECTABLE_IFACE,
648
 
                         out_signature=u"s",
 
666
                         out_signature="s",
649
667
                         path_keyword='object_path',
650
668
                         connection_keyword='connection')
651
669
    def Introspect(self, object_path, connection):
656
674
        try:
657
675
            document = xml.dom.minidom.parseString(xmlstring)
658
676
            def make_tag(document, name, prop):
659
 
                e = document.createElement(u"property")
660
 
                e.setAttribute(u"name", name)
661
 
                e.setAttribute(u"type", prop._dbus_signature)
662
 
                e.setAttribute(u"access", prop._dbus_access)
 
677
                e = document.createElement("property")
 
678
                e.setAttribute("name", name)
 
679
                e.setAttribute("type", prop._dbus_signature)
 
680
                e.setAttribute("access", prop._dbus_access)
663
681
                return e
664
 
            for if_tag in document.getElementsByTagName(u"interface"):
 
682
            for if_tag in document.getElementsByTagName("interface"):
665
683
                for tag in (make_tag(document, name, prop)
666
684
                            for name, prop
667
685
                            in self._get_all_dbus_properties()
668
686
                            if prop._dbus_interface
669
 
                            == if_tag.getAttribute(u"name")):
 
687
                            == if_tag.getAttribute("name")):
670
688
                    if_tag.appendChild(tag)
671
689
                # Add the names to the return values for the
672
690
                # "org.freedesktop.DBus.Properties" methods
673
 
                if (if_tag.getAttribute(u"name")
674
 
                    == u"org.freedesktop.DBus.Properties"):
675
 
                    for cn in if_tag.getElementsByTagName(u"method"):
676
 
                        if cn.getAttribute(u"name") == u"Get":
677
 
                            for arg in cn.getElementsByTagName(u"arg"):
678
 
                                if (arg.getAttribute(u"direction")
679
 
                                    == u"out"):
680
 
                                    arg.setAttribute(u"name", u"value")
681
 
                        elif cn.getAttribute(u"name") == u"GetAll":
682
 
                            for arg in cn.getElementsByTagName(u"arg"):
683
 
                                if (arg.getAttribute(u"direction")
684
 
                                    == u"out"):
685
 
                                    arg.setAttribute(u"name", u"props")
686
 
            xmlstring = document.toxml(u"utf-8")
 
691
                if (if_tag.getAttribute("name")
 
692
                    == "org.freedesktop.DBus.Properties"):
 
693
                    for cn in if_tag.getElementsByTagName("method"):
 
694
                        if cn.getAttribute("name") == "Get":
 
695
                            for arg in cn.getElementsByTagName("arg"):
 
696
                                if (arg.getAttribute("direction")
 
697
                                    == "out"):
 
698
                                    arg.setAttribute("name", "value")
 
699
                        elif cn.getAttribute("name") == "GetAll":
 
700
                            for arg in cn.getElementsByTagName("arg"):
 
701
                                if (arg.getAttribute("direction")
 
702
                                    == "out"):
 
703
                                    arg.setAttribute("name", "props")
 
704
            xmlstring = document.toxml("utf-8")
687
705
            document.unlink()
688
706
        except (AttributeError, xml.dom.DOMException,
689
707
                xml.parsers.expat.ExpatError), error:
690
 
            logger.error(u"Failed to override Introspection method",
 
708
            logger.error("Failed to override Introspection method",
691
709
                         error)
692
710
        return xmlstring
693
711
 
699
717
    dbus_object_path: dbus.ObjectPath
700
718
    bus: dbus.SystemBus()
701
719
    """
 
720
    
 
721
    runtime_expansions = (Client.runtime_expansions
 
722
                          + ("dbus_object_path",))
 
723
    
702
724
    # dbus.service.Object doesn't use super(), so we can't either.
703
725
    
704
726
    def __init__(self, bus = None, *args, **kwargs):
 
727
        self._approvals_pending = 0
705
728
        self.bus = bus
706
729
        Client.__init__(self, *args, **kwargs)
707
730
        # Only now, when this client is initialized, can it show up on
708
731
        # the D-Bus
 
732
        client_object_name = unicode(self.name).translate(
 
733
            {ord("."): ord("_"),
 
734
             ord("-"): ord("_")})
709
735
        self.dbus_object_path = (dbus.ObjectPath
710
 
                                 (u"/clients/"
711
 
                                  + self.name.replace(u".", u"_")))
 
736
                                 ("/clients/" + client_object_name))
712
737
        DBusObjectWithProperties.__init__(self, self.bus,
713
738
                                          self.dbus_object_path)
 
739
        
 
740
    def _get_approvals_pending(self):
 
741
        return self._approvals_pending
 
742
    def _set_approvals_pending(self, value):
 
743
        old_value = self._approvals_pending
 
744
        self._approvals_pending = value
 
745
        bval = bool(value)
 
746
        if (hasattr(self, "dbus_object_path")
 
747
            and bval is not bool(old_value)):
 
748
            dbus_bool = dbus.Boolean(bval, variant_level=1)
 
749
            self.PropertyChanged(dbus.String("ApprovalPending"),
 
750
                                 dbus_bool)
 
751
 
 
752
    approvals_pending = property(_get_approvals_pending,
 
753
                                 _set_approvals_pending)
 
754
    del _get_approvals_pending, _set_approvals_pending
714
755
    
715
756
    @staticmethod
716
757
    def _datetime_to_dbus(dt, variant_level=0):
719
760
                           variant_level=variant_level)
720
761
    
721
762
    def enable(self):
722
 
        oldstate = getattr(self, u"enabled", False)
 
763
        oldstate = getattr(self, "enabled", False)
723
764
        r = Client.enable(self)
724
765
        if oldstate != self.enabled:
725
766
            # Emit D-Bus signals
726
 
            self.PropertyChanged(dbus.String(u"enabled"),
 
767
            self.PropertyChanged(dbus.String("Enabled"),
727
768
                                 dbus.Boolean(True, variant_level=1))
728
769
            self.PropertyChanged(
729
 
                dbus.String(u"last_enabled"),
 
770
                dbus.String("LastEnabled"),
730
771
                self._datetime_to_dbus(self.last_enabled,
731
772
                                       variant_level=1))
732
773
        return r
733
774
    
734
775
    def disable(self, quiet = False):
735
 
        oldstate = getattr(self, u"enabled", False)
 
776
        oldstate = getattr(self, "enabled", False)
736
777
        r = Client.disable(self, quiet=quiet)
737
778
        if not quiet and oldstate != self.enabled:
738
779
            # Emit D-Bus signal
739
 
            self.PropertyChanged(dbus.String(u"enabled"),
 
780
            self.PropertyChanged(dbus.String("Enabled"),
740
781
                                 dbus.Boolean(False, variant_level=1))
741
782
        return r
742
783
    
745
786
            self.remove_from_connection()
746
787
        except LookupError:
747
788
            pass
748
 
        if hasattr(DBusObjectWithProperties, u"__del__"):
 
789
        if hasattr(DBusObjectWithProperties, "__del__"):
749
790
            DBusObjectWithProperties.__del__(self, *args, **kwargs)
750
791
        Client.__del__(self, *args, **kwargs)
751
792
    
754
795
        self.checker_callback_tag = None
755
796
        self.checker = None
756
797
        # Emit D-Bus signal
757
 
        self.PropertyChanged(dbus.String(u"checker_running"),
 
798
        self.PropertyChanged(dbus.String("CheckerRunning"),
758
799
                             dbus.Boolean(False, variant_level=1))
759
800
        if os.WIFEXITED(condition):
760
801
            exitstatus = os.WEXITSTATUS(condition)
775
816
        r = Client.checked_ok(self, *args, **kwargs)
776
817
        # Emit D-Bus signal
777
818
        self.PropertyChanged(
778
 
            dbus.String(u"last_checked_ok"),
 
819
            dbus.String("LastCheckedOK"),
779
820
            (self._datetime_to_dbus(self.last_checked_ok,
780
821
                                    variant_level=1)))
781
822
        return r
782
823
    
 
824
    def need_approval(self, *args, **kwargs):
 
825
        r = Client.need_approval(self, *args, **kwargs)
 
826
        # Emit D-Bus signal
 
827
        self.PropertyChanged(
 
828
            dbus.String("LastApprovalRequest"),
 
829
            (self._datetime_to_dbus(self.last_approval_request,
 
830
                                    variant_level=1)))
 
831
        return r
 
832
    
783
833
    def start_checker(self, *args, **kwargs):
784
834
        old_checker = self.checker
785
835
        if self.checker is not None:
793
843
            # Emit D-Bus signal
794
844
            self.CheckerStarted(self.current_checker_command)
795
845
            self.PropertyChanged(
796
 
                dbus.String(u"checker_running"),
 
846
                dbus.String("CheckerRunning"),
797
847
                dbus.Boolean(True, variant_level=1))
798
848
        return r
799
849
    
800
850
    def stop_checker(self, *args, **kwargs):
801
 
        old_checker = getattr(self, u"checker", None)
 
851
        old_checker = getattr(self, "checker", None)
802
852
        r = Client.stop_checker(self, *args, **kwargs)
803
853
        if (old_checker is not None
804
 
            and getattr(self, u"checker", None) is None):
805
 
            self.PropertyChanged(dbus.String(u"checker_running"),
 
854
            and getattr(self, "checker", None) is None):
 
855
            self.PropertyChanged(dbus.String("CheckerRunning"),
806
856
                                 dbus.Boolean(False, variant_level=1))
807
857
        return r
808
858
 
811
861
        return False
812
862
    
813
863
    def approve(self, value=True):
 
864
        self.send_changedstate()
814
865
        self._approved = value
815
 
        gobject.timeout_add(self._timedelta_to_milliseconds(self.approved_duration, self._reset_approved))
816
 
 
817
 
    def approved_pending(self):
818
 
        return self.approvals_pending > 0
 
866
        gobject.timeout_add(self._timedelta_to_milliseconds
 
867
                            (self.approval_duration),
 
868
                            self._reset_approved)
819
869
    
820
870
    
821
871
    ## D-Bus methods, signals & properties
822
 
    _interface = u"se.bsnet.fukt.Mandos.Client"
 
872
    _interface = "se.bsnet.fukt.Mandos.Client"
823
873
    
824
874
    ## Signals
825
875
    
826
876
    # CheckerCompleted - signal
827
 
    @dbus.service.signal(_interface, signature=u"nxs")
 
877
    @dbus.service.signal(_interface, signature="nxs")
828
878
    def CheckerCompleted(self, exitcode, waitstatus, command):
829
879
        "D-Bus signal"
830
880
        pass
831
881
    
832
882
    # CheckerStarted - signal
833
 
    @dbus.service.signal(_interface, signature=u"s")
 
883
    @dbus.service.signal(_interface, signature="s")
834
884
    def CheckerStarted(self, command):
835
885
        "D-Bus signal"
836
886
        pass
837
887
    
838
888
    # PropertyChanged - signal
839
 
    @dbus.service.signal(_interface, signature=u"sv")
 
889
    @dbus.service.signal(_interface, signature="sv")
840
890
    def PropertyChanged(self, property, value):
841
891
        "D-Bus signal"
842
892
        pass
844
894
    # GotSecret - signal
845
895
    @dbus.service.signal(_interface)
846
896
    def GotSecret(self):
847
 
        "D-Bus signal"
848
 
        if self.approved_pending():
849
 
            self.PropertyChanged(dbus.String(u"checker_running"),
850
 
                                 dbus.Boolean(False, variant_level=1))
 
897
        """D-Bus signal
 
898
        Is sent after a successful transfer of secret from the Mandos
 
899
        server to mandos-client
 
900
        """
 
901
        pass
851
902
    
852
903
    # Rejected - signal
853
 
    @dbus.service.signal(_interface, signature=u"s")
 
904
    @dbus.service.signal(_interface, signature="s")
854
905
    def Rejected(self, reason):
855
906
        "D-Bus signal"
856
 
        if self.approved_pending():
857
 
            self.PropertyChanged(dbus.String(u"checker_running"),
858
 
                                 dbus.Boolean(False, variant_level=1))
 
907
        pass
859
908
    
860
909
    # NeedApproval - signal
861
 
    @dbus.service.signal(_interface, signature=u"db")
 
910
    @dbus.service.signal(_interface, signature="tb")
862
911
    def NeedApproval(self, timeout, default):
863
912
        "D-Bus signal"
864
 
        if not self.approved_pending():
865
 
            self.PropertyChanged(dbus.String(u"approved_pending"),
866
 
                                 dbus.Boolean(True, variant_level=1))
 
913
        return self.need_approval()
867
914
    
868
915
    ## Methods
869
 
 
 
916
    
870
917
    # Approve - method
871
 
    @dbus.service.method(_interface, in_signature=u"b")
 
918
    @dbus.service.method(_interface, in_signature="b")
872
919
    def Approve(self, value):
873
920
        self.approve(value)
874
 
 
 
921
    
875
922
    # CheckedOK - method
876
923
    @dbus.service.method(_interface)
877
924
    def CheckedOK(self):
902
949
    
903
950
    ## Properties
904
951
    
905
 
    # approved_pending - property
906
 
    @dbus_service_property(_interface, signature=u"b", access=u"read")
907
 
    def approved_pending_dbus_property(self):
908
 
        return dbus.Boolean(self.approved_pending())
909
 
    
910
 
    # approved_by_default - property
911
 
    @dbus_service_property(_interface, signature=u"b",
912
 
                           access=u"readwrite")
913
 
    def approved_by_default_dbus_property(self):
914
 
        return dbus.Boolean(self.approved_by_default)
915
 
    
916
 
    # approved_delay - property
917
 
    @dbus_service_property(_interface, signature=u"t",
918
 
                           access=u"readwrite")
919
 
    def approved_delay_dbus_property(self):
920
 
        return dbus.UInt64(self.approved_delay_milliseconds())
921
 
    
922
 
    # approved_duration - property
923
 
    @dbus_service_property(_interface, signature=u"t",
924
 
                           access=u"readwrite")
925
 
    def approved_duration_dbus_property(self):
926
 
        return dbus.UInt64(self._timedelta_to_milliseconds(
927
 
                self.approved_duration))
928
 
    
929
 
    # name - property
930
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
931
 
    def name_dbus_property(self):
 
952
    # ApprovalPending - property
 
953
    @dbus_service_property(_interface, signature="b", access="read")
 
954
    def ApprovalPending_dbus_property(self):
 
955
        return dbus.Boolean(bool(self.approvals_pending))
 
956
    
 
957
    # ApprovedByDefault - property
 
958
    @dbus_service_property(_interface, signature="b",
 
959
                           access="readwrite")
 
960
    def ApprovedByDefault_dbus_property(self, value=None):
 
961
        if value is None:       # get
 
962
            return dbus.Boolean(self.approved_by_default)
 
963
        self.approved_by_default = bool(value)
 
964
        # Emit D-Bus signal
 
965
        self.PropertyChanged(dbus.String("ApprovedByDefault"),
 
966
                             dbus.Boolean(value, variant_level=1))
 
967
    
 
968
    # ApprovalDelay - property
 
969
    @dbus_service_property(_interface, signature="t",
 
970
                           access="readwrite")
 
971
    def ApprovalDelay_dbus_property(self, value=None):
 
972
        if value is None:       # get
 
973
            return dbus.UInt64(self.approval_delay_milliseconds())
 
974
        self.approval_delay = datetime.timedelta(0, 0, 0, value)
 
975
        # Emit D-Bus signal
 
976
        self.PropertyChanged(dbus.String("ApprovalDelay"),
 
977
                             dbus.UInt64(value, variant_level=1))
 
978
    
 
979
    # ApprovalDuration - property
 
980
    @dbus_service_property(_interface, signature="t",
 
981
                           access="readwrite")
 
982
    def ApprovalDuration_dbus_property(self, value=None):
 
983
        if value is None:       # get
 
984
            return dbus.UInt64(self._timedelta_to_milliseconds(
 
985
                    self.approval_duration))
 
986
        self.approval_duration = datetime.timedelta(0, 0, 0, value)
 
987
        # Emit D-Bus signal
 
988
        self.PropertyChanged(dbus.String("ApprovalDuration"),
 
989
                             dbus.UInt64(value, variant_level=1))
 
990
    
 
991
    # Name - property
 
992
    @dbus_service_property(_interface, signature="s", access="read")
 
993
    def Name_dbus_property(self):
932
994
        return dbus.String(self.name)
933
995
    
934
 
    # fingerprint - property
935
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
936
 
    def fingerprint_dbus_property(self):
 
996
    # Fingerprint - property
 
997
    @dbus_service_property(_interface, signature="s", access="read")
 
998
    def Fingerprint_dbus_property(self):
937
999
        return dbus.String(self.fingerprint)
938
1000
    
939
 
    # host - property
940
 
    @dbus_service_property(_interface, signature=u"s",
941
 
                           access=u"readwrite")
942
 
    def host_dbus_property(self, value=None):
 
1001
    # Host - property
 
1002
    @dbus_service_property(_interface, signature="s",
 
1003
                           access="readwrite")
 
1004
    def Host_dbus_property(self, value=None):
943
1005
        if value is None:       # get
944
1006
            return dbus.String(self.host)
945
1007
        self.host = value
946
1008
        # Emit D-Bus signal
947
 
        self.PropertyChanged(dbus.String(u"host"),
 
1009
        self.PropertyChanged(dbus.String("Host"),
948
1010
                             dbus.String(value, variant_level=1))
949
1011
    
950
 
    # created - property
951
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
952
 
    def created_dbus_property(self):
 
1012
    # Created - property
 
1013
    @dbus_service_property(_interface, signature="s", access="read")
 
1014
    def Created_dbus_property(self):
953
1015
        return dbus.String(self._datetime_to_dbus(self.created))
954
1016
    
955
 
    # last_enabled - property
956
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
957
 
    def last_enabled_dbus_property(self):
 
1017
    # LastEnabled - property
 
1018
    @dbus_service_property(_interface, signature="s", access="read")
 
1019
    def LastEnabled_dbus_property(self):
958
1020
        if self.last_enabled is None:
959
 
            return dbus.String(u"")
 
1021
            return dbus.String("")
960
1022
        return dbus.String(self._datetime_to_dbus(self.last_enabled))
961
1023
    
962
 
    # enabled - property
963
 
    @dbus_service_property(_interface, signature=u"b",
964
 
                           access=u"readwrite")
965
 
    def enabled_dbus_property(self, value=None):
 
1024
    # Enabled - property
 
1025
    @dbus_service_property(_interface, signature="b",
 
1026
                           access="readwrite")
 
1027
    def Enabled_dbus_property(self, value=None):
966
1028
        if value is None:       # get
967
1029
            return dbus.Boolean(self.enabled)
968
1030
        if value:
970
1032
        else:
971
1033
            self.disable()
972
1034
    
973
 
    # last_checked_ok - property
974
 
    @dbus_service_property(_interface, signature=u"s",
975
 
                           access=u"readwrite")
976
 
    def last_checked_ok_dbus_property(self, value=None):
 
1035
    # LastCheckedOK - property
 
1036
    @dbus_service_property(_interface, signature="s",
 
1037
                           access="readwrite")
 
1038
    def LastCheckedOK_dbus_property(self, value=None):
977
1039
        if value is not None:
978
1040
            self.checked_ok()
979
1041
            return
980
1042
        if self.last_checked_ok is None:
981
 
            return dbus.String(u"")
 
1043
            return dbus.String("")
982
1044
        return dbus.String(self._datetime_to_dbus(self
983
1045
                                                  .last_checked_ok))
984
1046
    
985
 
    # timeout - property
986
 
    @dbus_service_property(_interface, signature=u"t",
987
 
                           access=u"readwrite")
988
 
    def timeout_dbus_property(self, value=None):
 
1047
    # LastApprovalRequest - property
 
1048
    @dbus_service_property(_interface, signature="s", access="read")
 
1049
    def LastApprovalRequest_dbus_property(self):
 
1050
        if self.last_approval_request is None:
 
1051
            return dbus.String("")
 
1052
        return dbus.String(self.
 
1053
                           _datetime_to_dbus(self
 
1054
                                             .last_approval_request))
 
1055
    
 
1056
    # Timeout - property
 
1057
    @dbus_service_property(_interface, signature="t",
 
1058
                           access="readwrite")
 
1059
    def Timeout_dbus_property(self, value=None):
989
1060
        if value is None:       # get
990
1061
            return dbus.UInt64(self.timeout_milliseconds())
991
1062
        self.timeout = datetime.timedelta(0, 0, 0, value)
992
1063
        # Emit D-Bus signal
993
 
        self.PropertyChanged(dbus.String(u"timeout"),
 
1064
        self.PropertyChanged(dbus.String("Timeout"),
994
1065
                             dbus.UInt64(value, variant_level=1))
995
 
        if getattr(self, u"disable_initiator_tag", None) is None:
 
1066
        if getattr(self, "disable_initiator_tag", None) is None:
996
1067
            return
997
1068
        # Reschedule timeout
998
1069
        gobject.source_remove(self.disable_initiator_tag)
1010
1081
            self.disable_initiator_tag = (gobject.timeout_add
1011
1082
                                          (time_to_die, self.disable))
1012
1083
    
1013
 
    # interval - property
1014
 
    @dbus_service_property(_interface, signature=u"t",
1015
 
                           access=u"readwrite")
1016
 
    def interval_dbus_property(self, value=None):
 
1084
    # Interval - property
 
1085
    @dbus_service_property(_interface, signature="t",
 
1086
                           access="readwrite")
 
1087
    def Interval_dbus_property(self, value=None):
1017
1088
        if value is None:       # get
1018
1089
            return dbus.UInt64(self.interval_milliseconds())
1019
1090
        self.interval = datetime.timedelta(0, 0, 0, value)
1020
1091
        # Emit D-Bus signal
1021
 
        self.PropertyChanged(dbus.String(u"interval"),
 
1092
        self.PropertyChanged(dbus.String("Interval"),
1022
1093
                             dbus.UInt64(value, variant_level=1))
1023
 
        if getattr(self, u"checker_initiator_tag", None) is None:
 
1094
        if getattr(self, "checker_initiator_tag", None) is None:
1024
1095
            return
1025
1096
        # Reschedule checker run
1026
1097
        gobject.source_remove(self.checker_initiator_tag)
1028
1099
                                      (value, self.start_checker))
1029
1100
        self.start_checker()    # Start one now, too
1030
1101
 
1031
 
    # checker - property
1032
 
    @dbus_service_property(_interface, signature=u"s",
1033
 
                           access=u"readwrite")
1034
 
    def checker_dbus_property(self, value=None):
 
1102
    # Checker - property
 
1103
    @dbus_service_property(_interface, signature="s",
 
1104
                           access="readwrite")
 
1105
    def Checker_dbus_property(self, value=None):
1035
1106
        if value is None:       # get
1036
1107
            return dbus.String(self.checker_command)
1037
1108
        self.checker_command = value
1038
1109
        # Emit D-Bus signal
1039
 
        self.PropertyChanged(dbus.String(u"checker"),
 
1110
        self.PropertyChanged(dbus.String("Checker"),
1040
1111
                             dbus.String(self.checker_command,
1041
1112
                                         variant_level=1))
1042
1113
    
1043
 
    # checker_running - property
1044
 
    @dbus_service_property(_interface, signature=u"b",
1045
 
                           access=u"readwrite")
1046
 
    def checker_running_dbus_property(self, value=None):
 
1114
    # CheckerRunning - property
 
1115
    @dbus_service_property(_interface, signature="b",
 
1116
                           access="readwrite")
 
1117
    def CheckerRunning_dbus_property(self, value=None):
1047
1118
        if value is None:       # get
1048
1119
            return dbus.Boolean(self.checker is not None)
1049
1120
        if value:
1051
1122
        else:
1052
1123
            self.stop_checker()
1053
1124
    
1054
 
    # object_path - property
1055
 
    @dbus_service_property(_interface, signature=u"o", access=u"read")
1056
 
    def object_path_dbus_property(self):
 
1125
    # ObjectPath - property
 
1126
    @dbus_service_property(_interface, signature="o", access="read")
 
1127
    def ObjectPath_dbus_property(self):
1057
1128
        return self.dbus_object_path # is already a dbus.ObjectPath
1058
1129
    
1059
 
    # secret = property
1060
 
    @dbus_service_property(_interface, signature=u"ay",
1061
 
                           access=u"write", byte_arrays=True)
1062
 
    def secret_dbus_property(self, value):
 
1130
    # Secret = property
 
1131
    @dbus_service_property(_interface, signature="ay",
 
1132
                           access="write", byte_arrays=True)
 
1133
    def Secret_dbus_property(self, value):
1063
1134
        self.secret = str(value)
1064
1135
    
1065
1136
    del _interface
1099
1170
    
1100
1171
    def handle(self):
1101
1172
        with contextlib.closing(self.server.child_pipe) as child_pipe:
1102
 
            logger.info(u"TCP connection from: %s",
 
1173
            logger.info("TCP connection from: %s",
1103
1174
                        unicode(self.client_address))
1104
 
            logger.debug(u"Pipe FD: %d",
 
1175
            logger.debug("Pipe FD: %d",
1105
1176
                         self.server.child_pipe.fileno())
1106
1177
 
1107
1178
            session = (gnutls.connection
1114
1185
            # no X.509 keys are added to it.  Therefore, we can use it
1115
1186
            # here despite using OpenPGP certificates.
1116
1187
 
1117
 
            #priority = u':'.join((u"NONE", u"+VERS-TLS1.1",
1118
 
            #                      u"+AES-256-CBC", u"+SHA1",
1119
 
            #                      u"+COMP-NULL", u"+CTYPE-OPENPGP",
1120
 
            #                      u"+DHE-DSS"))
 
1188
            #priority = ':'.join(("NONE", "+VERS-TLS1.1",
 
1189
            #                      "+AES-256-CBC", "+SHA1",
 
1190
            #                      "+COMP-NULL", "+CTYPE-OPENPGP",
 
1191
            #                      "+DHE-DSS"))
1121
1192
            # Use a fallback default, since this MUST be set.
1122
1193
            priority = self.server.gnutls_priority
1123
1194
            if priority is None:
1124
 
                priority = u"NORMAL"
 
1195
                priority = "NORMAL"
1125
1196
            (gnutls.library.functions
1126
1197
             .gnutls_priority_set_direct(session._c_object,
1127
1198
                                         priority, None))
1129
1200
            # Start communication using the Mandos protocol
1130
1201
            # Get protocol number
1131
1202
            line = self.request.makefile().readline()
1132
 
            logger.debug(u"Protocol version: %r", line)
 
1203
            logger.debug("Protocol version: %r", line)
1133
1204
            try:
1134
1205
                if int(line.strip().split()[0]) > 1:
1135
1206
                    raise RuntimeError
1136
1207
            except (ValueError, IndexError, RuntimeError), error:
1137
 
                logger.error(u"Unknown protocol version: %s", error)
 
1208
                logger.error("Unknown protocol version: %s", error)
1138
1209
                return
1139
1210
 
1140
1211
            # Start GnuTLS connection
1141
1212
            try:
1142
1213
                session.handshake()
1143
1214
            except gnutls.errors.GNUTLSError, error:
1144
 
                logger.warning(u"Handshake failed: %s", error)
 
1215
                logger.warning("Handshake failed: %s", error)
1145
1216
                # Do not run session.bye() here: the session is not
1146
1217
                # established.  Just abandon the request.
1147
1218
                return
1148
 
            logger.debug(u"Handshake succeeded")
 
1219
            logger.debug("Handshake succeeded")
1149
1220
 
1150
1221
            approval_required = False
1151
1222
            try:
1153
1224
                    fpr = self.fingerprint(self.peer_certificate
1154
1225
                                           (session))
1155
1226
                except (TypeError, gnutls.errors.GNUTLSError), error:
1156
 
                    logger.warning(u"Bad certificate: %s", error)
 
1227
                    logger.warning("Bad certificate: %s", error)
1157
1228
                    return
1158
 
                logger.debug(u"Fingerprint: %s", fpr)
 
1229
                logger.debug("Fingerprint: %s", fpr)
1159
1230
 
1160
1231
                try:
1161
1232
                    client = ProxyClient(child_pipe, fpr,
1163
1234
                except KeyError:
1164
1235
                    return
1165
1236
                
1166
 
                if client.approved_delay:
1167
 
                    delay = client.approved_delay
 
1237
                if client.approval_delay:
 
1238
                    delay = client.approval_delay
1168
1239
                    client.approvals_pending += 1
1169
1240
                    approval_required = True
1170
1241
                
1171
1242
                while True:
1172
1243
                    if not client.enabled:
1173
 
                        logger.warning(u"Client %s is disabled",
 
1244
                        logger.warning("Client %s is disabled",
1174
1245
                                       client.name)
1175
1246
                        if self.server.use_dbus:
1176
1247
                            # Emit D-Bus signal
1177
1248
                            client.Rejected("Disabled")                    
1178
1249
                        return
1179
1250
                    
1180
 
                    if client._approved or not client.approved_delay:
 
1251
                    if client._approved or not client.approval_delay:
1181
1252
                        #We are approved or approval is disabled
1182
1253
                        break
1183
1254
                    elif client._approved is None:
1184
 
                        logger.info(u"Client %s need approval",
 
1255
                        logger.info("Client %s needs approval",
1185
1256
                                    client.name)
1186
1257
                        if self.server.use_dbus:
1187
1258
                            # Emit D-Bus signal
1188
1259
                            client.NeedApproval(
1189
 
                                client.approved_delay_milliseconds(),
 
1260
                                client.approval_delay_milliseconds(),
1190
1261
                                client.approved_by_default)
1191
1262
                    else:
1192
 
                        logger.warning(u"Client %s was not approved",
 
1263
                        logger.warning("Client %s was not approved",
1193
1264
                                       client.name)
1194
1265
                        if self.server.use_dbus:
1195
1266
                            # Emit D-Bus signal
1196
 
                            client.Rejected("Disapproved")
 
1267
                            client.Rejected("Denied")
1197
1268
                        return
1198
1269
                    
1199
1270
                    #wait until timeout or approved
1210
1281
                                           client.name)
1211
1282
                            if self.server.use_dbus:
1212
1283
                                # Emit D-Bus signal
1213
 
                                client.Rejected("Time out")
 
1284
                                client.Rejected("Approval timed out")
1214
1285
                            return
1215
1286
                        else:
1216
1287
                            break
1219
1290
                
1220
1291
                sent_size = 0
1221
1292
                while sent_size < len(client.secret):
1222
 
                    # XXX handle session exception
1223
 
                    sent = session.send(client.secret[sent_size:])
1224
 
                    logger.debug(u"Sent: %d, remaining: %d",
 
1293
                    try:
 
1294
                        sent = session.send(client.secret[sent_size:])
 
1295
                    except (gnutls.errors.GNUTLSError), error:
 
1296
                        logger.warning("gnutls send failed")
 
1297
                        return
 
1298
                    logger.debug("Sent: %d, remaining: %d",
1225
1299
                                 sent, len(client.secret)
1226
1300
                                 - (sent_size + sent))
1227
1301
                    sent_size += sent
1228
1302
 
1229
 
                logger.info(u"Sending secret to %s", client.name)
 
1303
                logger.info("Sending secret to %s", client.name)
1230
1304
                # bump the timeout as if seen
1231
1305
                client.checked_ok()
1232
1306
                if self.server.use_dbus:
1236
1310
            finally:
1237
1311
                if approval_required:
1238
1312
                    client.approvals_pending -= 1
1239
 
                session.bye()
 
1313
                try:
 
1314
                    session.bye()
 
1315
                except (gnutls.errors.GNUTLSError), error:
 
1316
                    logger.warning("GnuTLS bye failed")
1240
1317
    
1241
1318
    @staticmethod
1242
1319
    def peer_certificate(session):
1252
1329
                     .gnutls_certificate_get_peers
1253
1330
                     (session._c_object, ctypes.byref(list_size)))
1254
1331
        if not bool(cert_list) and list_size.value != 0:
1255
 
            raise gnutls.errors.GNUTLSError(u"error getting peer"
1256
 
                                            u" certificate")
 
1332
            raise gnutls.errors.GNUTLSError("error getting peer"
 
1333
                                            " certificate")
1257
1334
        if list_size.value == 0:
1258
1335
            return None
1259
1336
        cert = cert_list[0]
1285
1362
        if crtverify.value != 0:
1286
1363
            gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
1287
1364
            raise (gnutls.errors.CertificateSecurityError
1288
 
                   (u"Verify failed"))
 
1365
                   ("Verify failed"))
1289
1366
        # New buffer for the fingerprint
1290
1367
        buf = ctypes.create_string_buffer(20)
1291
1368
        buf_len = ctypes.c_size_t()
1298
1375
        # Convert the buffer to a Python bytestring
1299
1376
        fpr = ctypes.string_at(buf, buf_len.value)
1300
1377
        # Convert the bytestring to hexadecimal notation
1301
 
        hex_fpr = u''.join(u"%02X" % ord(char) for char in fpr)
 
1378
        hex_fpr = ''.join("%02X" % ord(char) for char in fpr)
1302
1379
        return hex_fpr
1303
1380
 
1304
1381
 
1327
1404
 
1328
1405
        super(MultiprocessingMixInWithPipe,
1329
1406
              self).process_request(request, client_address)
 
1407
        self.child_pipe.close()
1330
1408
        self.add_pipe(parent_pipe)
 
1409
 
1331
1410
    def add_pipe(self, parent_pipe):
1332
1411
        """Dummy function; override as necessary"""
1333
 
        pass
 
1412
        raise NotImplementedError
1334
1413
 
1335
1414
class IPv6_TCPServer(MultiprocessingMixInWithPipe,
1336
1415
                     socketserver.TCPServer, object):
1354
1433
        bind to an address or port if they were not specified."""
1355
1434
        if self.interface is not None:
1356
1435
            if SO_BINDTODEVICE is None:
1357
 
                logger.error(u"SO_BINDTODEVICE does not exist;"
1358
 
                             u" cannot bind to interface %s",
 
1436
                logger.error("SO_BINDTODEVICE does not exist;"
 
1437
                             " cannot bind to interface %s",
1359
1438
                             self.interface)
1360
1439
            else:
1361
1440
                try:
1362
1441
                    self.socket.setsockopt(socket.SOL_SOCKET,
1363
1442
                                           SO_BINDTODEVICE,
1364
1443
                                           str(self.interface
1365
 
                                               + u'\0'))
 
1444
                                               + '\0'))
1366
1445
                except socket.error, error:
1367
1446
                    if error[0] == errno.EPERM:
1368
 
                        logger.error(u"No permission to"
1369
 
                                     u" bind to interface %s",
 
1447
                        logger.error("No permission to"
 
1448
                                     " bind to interface %s",
1370
1449
                                     self.interface)
1371
1450
                    elif error[0] == errno.ENOPROTOOPT:
1372
 
                        logger.error(u"SO_BINDTODEVICE not available;"
1373
 
                                     u" cannot bind to interface %s",
 
1451
                        logger.error("SO_BINDTODEVICE not available;"
 
1452
                                     " cannot bind to interface %s",
1374
1453
                                     self.interface)
1375
1454
                    else:
1376
1455
                        raise
1378
1457
        if self.server_address[0] or self.server_address[1]:
1379
1458
            if not self.server_address[0]:
1380
1459
                if self.address_family == socket.AF_INET6:
1381
 
                    any_address = u"::" # in6addr_any
 
1460
                    any_address = "::" # in6addr_any
1382
1461
                else:
1383
1462
                    any_address = socket.INADDR_ANY
1384
1463
                self.server_address = (any_address,
1433
1512
    def handle_ipc(self, source, condition, parent_pipe=None,
1434
1513
                   client_object=None):
1435
1514
        condition_names = {
1436
 
            gobject.IO_IN: u"IN",   # There is data to read.
1437
 
            gobject.IO_OUT: u"OUT", # Data can be written (without
 
1515
            gobject.IO_IN: "IN",   # There is data to read.
 
1516
            gobject.IO_OUT: "OUT", # Data can be written (without
1438
1517
                                    # blocking).
1439
 
            gobject.IO_PRI: u"PRI", # There is urgent data to read.
1440
 
            gobject.IO_ERR: u"ERR", # Error condition.
1441
 
            gobject.IO_HUP: u"HUP"  # Hung up (the connection has been
 
1518
            gobject.IO_PRI: "PRI", # There is urgent data to read.
 
1519
            gobject.IO_ERR: "ERR", # Error condition.
 
1520
            gobject.IO_HUP: "HUP"  # Hung up (the connection has been
1442
1521
                                    # broken, usually for pipes and
1443
1522
                                    # sockets).
1444
1523
            }
1446
1525
                                       for cond, name in
1447
1526
                                       condition_names.iteritems()
1448
1527
                                       if cond & condition)
1449
 
        logger.debug(u"Handling IPC: FD = %d, condition = %s", source,
1450
 
                     conditions_string)
 
1528
        # error or the other end of multiprocessing.Pipe has closed
 
1529
        if condition & (gobject.IO_ERR | condition & gobject.IO_HUP):
 
1530
            return False
1451
1531
        
1452
1532
        # Read a request from the child
1453
1533
        request = parent_pipe.recv()
1462
1542
                    client = c
1463
1543
                    break
1464
1544
            else:
1465
 
                logger.warning(u"Client not found for fingerprint: %s, ad"
1466
 
                               u"dress: %s", fpr, address)
 
1545
                logger.warning("Client not found for fingerprint: %s, ad"
 
1546
                               "dress: %s", fpr, address)
1467
1547
                if self.use_dbus:
1468
1548
                    # Emit D-Bus signal
1469
 
                    mandos_dbus_service.ClientNotFound(fpr, address)
 
1549
                    mandos_dbus_service.ClientNotFound(fpr, address[0])
1470
1550
                parent_pipe.send(False)
1471
1551
                return False
1472
1552
            
1491
1571
                parent_pipe.send(('function',))
1492
1572
            else:
1493
1573
                parent_pipe.send(('data', client_object.__getattribute__(attrname)))
1494
 
 
 
1574
        
1495
1575
        if command == 'setattr':
1496
1576
            attrname = request[1]
1497
1577
            value = request[2]
1498
1578
            setattr(client_object, attrname, value)
1499
 
            
 
1579
 
1500
1580
        return True
1501
1581
 
1502
1582
 
1503
1583
def string_to_delta(interval):
1504
1584
    """Parse a string and return a datetime.timedelta
1505
1585
    
1506
 
    >>> string_to_delta(u'7d')
 
1586
    >>> string_to_delta('7d')
1507
1587
    datetime.timedelta(7)
1508
 
    >>> string_to_delta(u'60s')
 
1588
    >>> string_to_delta('60s')
1509
1589
    datetime.timedelta(0, 60)
1510
 
    >>> string_to_delta(u'60m')
 
1590
    >>> string_to_delta('60m')
1511
1591
    datetime.timedelta(0, 3600)
1512
 
    >>> string_to_delta(u'24h')
 
1592
    >>> string_to_delta('24h')
1513
1593
    datetime.timedelta(1)
1514
 
    >>> string_to_delta(u'1w')
 
1594
    >>> string_to_delta('1w')
1515
1595
    datetime.timedelta(7)
1516
 
    >>> string_to_delta(u'5m 30s')
 
1596
    >>> string_to_delta('5m 30s')
1517
1597
    datetime.timedelta(0, 330)
1518
1598
    """
1519
1599
    timevalue = datetime.timedelta(0)
1521
1601
        try:
1522
1602
            suffix = unicode(s[-1])
1523
1603
            value = int(s[:-1])
1524
 
            if suffix == u"d":
 
1604
            if suffix == "d":
1525
1605
                delta = datetime.timedelta(value)
1526
 
            elif suffix == u"s":
 
1606
            elif suffix == "s":
1527
1607
                delta = datetime.timedelta(0, value)
1528
 
            elif suffix == u"m":
 
1608
            elif suffix == "m":
1529
1609
                delta = datetime.timedelta(0, 0, 0, 0, value)
1530
 
            elif suffix == u"h":
 
1610
            elif suffix == "h":
1531
1611
                delta = datetime.timedelta(0, 0, 0, 0, 0, value)
1532
 
            elif suffix == u"w":
 
1612
            elif suffix == "w":
1533
1613
                delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
1534
1614
            else:
1535
 
                raise ValueError(u"Unknown suffix %r" % suffix)
 
1615
                raise ValueError("Unknown suffix %r" % suffix)
1536
1616
        except (ValueError, IndexError), e:
1537
 
            raise ValueError(e.message)
 
1617
            raise ValueError(*(e.args))
1538
1618
        timevalue += delta
1539
1619
    return timevalue
1540
1620
 
1546
1626
    global if_nametoindex
1547
1627
    try:
1548
1628
        if_nametoindex = (ctypes.cdll.LoadLibrary
1549
 
                          (ctypes.util.find_library(u"c"))
 
1629
                          (ctypes.util.find_library("c"))
1550
1630
                          .if_nametoindex)
1551
1631
    except (OSError, AttributeError):
1552
 
        logger.warning(u"Doing if_nametoindex the hard way")
 
1632
        logger.warning("Doing if_nametoindex the hard way")
1553
1633
        def if_nametoindex(interface):
1554
1634
            "Get an interface index the hard way, i.e. using fcntl()"
1555
1635
            SIOCGIFINDEX = 0x8933  # From /usr/include/linux/sockios.h
1556
1636
            with contextlib.closing(socket.socket()) as s:
1557
1637
                ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
1558
 
                                    struct.pack(str(u"16s16x"),
 
1638
                                    struct.pack(str("16s16x"),
1559
1639
                                                interface))
1560
 
            interface_index = struct.unpack(str(u"I"),
 
1640
            interface_index = struct.unpack(str("I"),
1561
1641
                                            ifreq[16:20])[0]
1562
1642
            return interface_index
1563
1643
    return if_nametoindex(interface)
1571
1651
        sys.exit()
1572
1652
    os.setsid()
1573
1653
    if not nochdir:
1574
 
        os.chdir(u"/")
 
1654
        os.chdir("/")
1575
1655
    if os.fork():
1576
1656
        sys.exit()
1577
1657
    if not noclose:
1579
1659
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
1580
1660
        if not stat.S_ISCHR(os.fstat(null).st_mode):
1581
1661
            raise OSError(errno.ENODEV,
1582
 
                          u"%s not a character device"
 
1662
                          "%s not a character device"
1583
1663
                          % os.path.devnull)
1584
1664
        os.dup2(null, sys.stdin.fileno())
1585
1665
        os.dup2(null, sys.stdout.fileno())
1593
1673
    ##################################################################
1594
1674
    # Parsing of options, both command line and config file
1595
1675
    
1596
 
    parser = optparse.OptionParser(version = "%%prog %s" % version)
1597
 
    parser.add_option("-i", u"--interface", type=u"string",
1598
 
                      metavar="IF", help=u"Bind to interface IF")
1599
 
    parser.add_option("-a", u"--address", type=u"string",
1600
 
                      help=u"Address to listen for requests on")
1601
 
    parser.add_option("-p", u"--port", type=u"int",
1602
 
                      help=u"Port number to receive requests on")
1603
 
    parser.add_option("--check", action=u"store_true",
1604
 
                      help=u"Run self-test")
1605
 
    parser.add_option("--debug", action=u"store_true",
1606
 
                      help=u"Debug mode; run in foreground and log to"
1607
 
                      u" terminal")
1608
 
    parser.add_option("--priority", type=u"string", help=u"GnuTLS"
1609
 
                      u" priority string (see GnuTLS documentation)")
1610
 
    parser.add_option("--servicename", type=u"string",
1611
 
                      metavar=u"NAME", help=u"Zeroconf service name")
1612
 
    parser.add_option("--configdir", type=u"string",
1613
 
                      default=u"/etc/mandos", metavar=u"DIR",
1614
 
                      help=u"Directory to search for configuration"
1615
 
                      u" files")
1616
 
    parser.add_option("--no-dbus", action=u"store_false",
1617
 
                      dest=u"use_dbus", help=u"Do not provide D-Bus"
1618
 
                      u" system bus interface")
1619
 
    parser.add_option("--no-ipv6", action=u"store_false",
1620
 
                      dest=u"use_ipv6", help=u"Do not use IPv6")
1621
 
    options = parser.parse_args()[0]
 
1676
    parser = argparse.ArgumentParser()
 
1677
    parser.add_argument("-v", "--version", action="version",
 
1678
                        version = "%%(prog)s %s" % version,
 
1679
                        help="show version number and exit")
 
1680
    parser.add_argument("-i", "--interface", metavar="IF",
 
1681
                        help="Bind to interface IF")
 
1682
    parser.add_argument("-a", "--address",
 
1683
                        help="Address to listen for requests on")
 
1684
    parser.add_argument("-p", "--port", type=int,
 
1685
                        help="Port number to receive requests on")
 
1686
    parser.add_argument("--check", action="store_true",
 
1687
                        help="Run self-test")
 
1688
    parser.add_argument("--debug", action="store_true",
 
1689
                        help="Debug mode; run in foreground and log"
 
1690
                        " to terminal")
 
1691
    parser.add_argument("--debuglevel", metavar="LEVEL",
 
1692
                        help="Debug level for stdout output")
 
1693
    parser.add_argument("--priority", help="GnuTLS"
 
1694
                        " priority string (see GnuTLS documentation)")
 
1695
    parser.add_argument("--servicename",
 
1696
                        metavar="NAME", help="Zeroconf service name")
 
1697
    parser.add_argument("--configdir",
 
1698
                        default="/etc/mandos", metavar="DIR",
 
1699
                        help="Directory to search for configuration"
 
1700
                        " files")
 
1701
    parser.add_argument("--no-dbus", action="store_false",
 
1702
                        dest="use_dbus", help="Do not provide D-Bus"
 
1703
                        " system bus interface")
 
1704
    parser.add_argument("--no-ipv6", action="store_false",
 
1705
                        dest="use_ipv6", help="Do not use IPv6")
 
1706
    options = parser.parse_args()
1622
1707
    
1623
1708
    if options.check:
1624
1709
        import doctest
1626
1711
        sys.exit()
1627
1712
    
1628
1713
    # Default values for config file for server-global settings
1629
 
    server_defaults = { u"interface": u"",
1630
 
                        u"address": u"",
1631
 
                        u"port": u"",
1632
 
                        u"debug": u"False",
1633
 
                        u"priority":
1634
 
                        u"SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP",
1635
 
                        u"servicename": u"Mandos",
1636
 
                        u"use_dbus": u"True",
1637
 
                        u"use_ipv6": u"True",
 
1714
    server_defaults = { "interface": "",
 
1715
                        "address": "",
 
1716
                        "port": "",
 
1717
                        "debug": "False",
 
1718
                        "priority":
 
1719
                        "SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP",
 
1720
                        "servicename": "Mandos",
 
1721
                        "use_dbus": "True",
 
1722
                        "use_ipv6": "True",
 
1723
                        "debuglevel": "",
1638
1724
                        }
1639
1725
    
1640
1726
    # Parse config file for server-global settings
1641
1727
    server_config = configparser.SafeConfigParser(server_defaults)
1642
1728
    del server_defaults
1643
1729
    server_config.read(os.path.join(options.configdir,
1644
 
                                    u"mandos.conf"))
 
1730
                                    "mandos.conf"))
1645
1731
    # Convert the SafeConfigParser object to a dict
1646
1732
    server_settings = server_config.defaults()
1647
1733
    # Use the appropriate methods on the non-string config options
1648
 
    for option in (u"debug", u"use_dbus", u"use_ipv6"):
1649
 
        server_settings[option] = server_config.getboolean(u"DEFAULT",
 
1734
    for option in ("debug", "use_dbus", "use_ipv6"):
 
1735
        server_settings[option] = server_config.getboolean("DEFAULT",
1650
1736
                                                           option)
1651
1737
    if server_settings["port"]:
1652
 
        server_settings["port"] = server_config.getint(u"DEFAULT",
1653
 
                                                       u"port")
 
1738
        server_settings["port"] = server_config.getint("DEFAULT",
 
1739
                                                       "port")
1654
1740
    del server_config
1655
1741
    
1656
1742
    # Override the settings from the config file with command line
1657
1743
    # options, if set.
1658
 
    for option in (u"interface", u"address", u"port", u"debug",
1659
 
                   u"priority", u"servicename", u"configdir",
1660
 
                   u"use_dbus", u"use_ipv6"):
 
1744
    for option in ("interface", "address", "port", "debug",
 
1745
                   "priority", "servicename", "configdir",
 
1746
                   "use_dbus", "use_ipv6", "debuglevel"):
1661
1747
        value = getattr(options, option)
1662
1748
        if value is not None:
1663
1749
            server_settings[option] = value
1671
1757
    ##################################################################
1672
1758
    
1673
1759
    # For convenience
1674
 
    debug = server_settings[u"debug"]
1675
 
    use_dbus = server_settings[u"use_dbus"]
1676
 
    use_ipv6 = server_settings[u"use_ipv6"]
1677
 
    
1678
 
    if not debug:
1679
 
        syslogger.setLevel(logging.WARNING)
1680
 
        console.setLevel(logging.WARNING)
1681
 
    
1682
 
    if server_settings[u"servicename"] != u"Mandos":
 
1760
    debug = server_settings["debug"]
 
1761
    debuglevel = server_settings["debuglevel"]
 
1762
    use_dbus = server_settings["use_dbus"]
 
1763
    use_ipv6 = server_settings["use_ipv6"]
 
1764
 
 
1765
    if server_settings["servicename"] != "Mandos":
1683
1766
        syslogger.setFormatter(logging.Formatter
1684
 
                               (u'Mandos (%s) [%%(process)d]:'
1685
 
                                u' %%(levelname)s: %%(message)s'
1686
 
                                % server_settings[u"servicename"]))
 
1767
                               ('Mandos (%s) [%%(process)d]:'
 
1768
                                ' %%(levelname)s: %%(message)s'
 
1769
                                % server_settings["servicename"]))
1687
1770
    
1688
1771
    # Parse config file with clients
1689
 
    client_defaults = { u"timeout": u"1h",
1690
 
                        u"interval": u"5m",
1691
 
                        u"checker": u"fping -q -- %%(host)s",
1692
 
                        u"host": u"",
1693
 
                        u"approved_delay": u"0s",
1694
 
                        u"approved_duration": u"1s",
 
1772
    client_defaults = { "timeout": "1h",
 
1773
                        "interval": "5m",
 
1774
                        "checker": "fping -q -- %%(host)s",
 
1775
                        "host": "",
 
1776
                        "approval_delay": "0s",
 
1777
                        "approval_duration": "1s",
1695
1778
                        }
1696
1779
    client_config = configparser.SafeConfigParser(client_defaults)
1697
 
    client_config.read(os.path.join(server_settings[u"configdir"],
1698
 
                                    u"clients.conf"))
 
1780
    client_config.read(os.path.join(server_settings["configdir"],
 
1781
                                    "clients.conf"))
1699
1782
    
1700
1783
    global mandos_dbus_service
1701
1784
    mandos_dbus_service = None
1702
1785
    
1703
 
    tcp_server = MandosServer((server_settings[u"address"],
1704
 
                               server_settings[u"port"]),
 
1786
    tcp_server = MandosServer((server_settings["address"],
 
1787
                               server_settings["port"]),
1705
1788
                              ClientHandler,
1706
 
                              interface=server_settings[u"interface"],
 
1789
                              interface=(server_settings["interface"]
 
1790
                                         or None),
1707
1791
                              use_ipv6=use_ipv6,
1708
1792
                              gnutls_priority=
1709
 
                              server_settings[u"priority"],
 
1793
                              server_settings["priority"],
1710
1794
                              use_dbus=use_dbus)
1711
 
    pidfilename = u"/var/run/mandos.pid"
1712
 
    try:
1713
 
        pidfile = open(pidfilename, u"w")
1714
 
    except IOError:
1715
 
        logger.error(u"Could not open file %r", pidfilename)
 
1795
    if not debug:
 
1796
        pidfilename = "/var/run/mandos.pid"
 
1797
        try:
 
1798
            pidfile = open(pidfilename, "w")
 
1799
        except IOError:
 
1800
            logger.error("Could not open file %r", pidfilename)
1716
1801
    
1717
1802
    try:
1718
 
        uid = pwd.getpwnam(u"_mandos").pw_uid
1719
 
        gid = pwd.getpwnam(u"_mandos").pw_gid
 
1803
        uid = pwd.getpwnam("_mandos").pw_uid
 
1804
        gid = pwd.getpwnam("_mandos").pw_gid
1720
1805
    except KeyError:
1721
1806
        try:
1722
 
            uid = pwd.getpwnam(u"mandos").pw_uid
1723
 
            gid = pwd.getpwnam(u"mandos").pw_gid
 
1807
            uid = pwd.getpwnam("mandos").pw_uid
 
1808
            gid = pwd.getpwnam("mandos").pw_gid
1724
1809
        except KeyError:
1725
1810
            try:
1726
 
                uid = pwd.getpwnam(u"nobody").pw_uid
1727
 
                gid = pwd.getpwnam(u"nobody").pw_gid
 
1811
                uid = pwd.getpwnam("nobody").pw_uid
 
1812
                gid = pwd.getpwnam("nobody").pw_gid
1728
1813
            except KeyError:
1729
1814
                uid = 65534
1730
1815
                gid = 65534
1735
1820
        if error[0] != errno.EPERM:
1736
1821
            raise error
1737
1822
    
1738
 
    # Enable all possible GnuTLS debugging
 
1823
    if not debug and not debuglevel:
 
1824
        syslogger.setLevel(logging.WARNING)
 
1825
        console.setLevel(logging.WARNING)
 
1826
    if debuglevel:
 
1827
        level = getattr(logging, debuglevel.upper())
 
1828
        syslogger.setLevel(level)
 
1829
        console.setLevel(level)
 
1830
 
1739
1831
    if debug:
 
1832
        # Enable all possible GnuTLS debugging
 
1833
        
1740
1834
        # "Use a log level over 10 to enable all debugging options."
1741
1835
        # - GnuTLS manual
1742
1836
        gnutls.library.functions.gnutls_global_set_log_level(11)
1743
1837
        
1744
1838
        @gnutls.library.types.gnutls_log_func
1745
1839
        def debug_gnutls(level, string):
1746
 
            logger.debug(u"GnuTLS: %s", string[:-1])
 
1840
            logger.debug("GnuTLS: %s", string[:-1])
1747
1841
        
1748
1842
        (gnutls.library.functions
1749
1843
         .gnutls_global_set_log_function(debug_gnutls))
 
1844
        
 
1845
        # Redirect stdin so all checkers get /dev/null
 
1846
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
 
1847
        os.dup2(null, sys.stdin.fileno())
 
1848
        if null > 2:
 
1849
            os.close(null)
 
1850
    else:
 
1851
        # No console logging
 
1852
        logger.removeHandler(console)
 
1853
    
 
1854
    # Need to fork before connecting to D-Bus
 
1855
    if not debug:
 
1856
        # Close all input and output, do double fork, etc.
 
1857
        daemon()
1750
1858
    
1751
1859
    global main_loop
1752
1860
    # From the Avahi example code
1756
1864
    # End of Avahi example code
1757
1865
    if use_dbus:
1758
1866
        try:
1759
 
            bus_name = dbus.service.BusName(u"se.bsnet.fukt.Mandos",
 
1867
            bus_name = dbus.service.BusName("se.bsnet.fukt.Mandos",
1760
1868
                                            bus, do_not_queue=True)
1761
1869
        except dbus.exceptions.NameExistsException, e:
1762
 
            logger.error(unicode(e) + u", disabling D-Bus")
 
1870
            logger.error(unicode(e) + ", disabling D-Bus")
1763
1871
            use_dbus = False
1764
 
            server_settings[u"use_dbus"] = False
 
1872
            server_settings["use_dbus"] = False
1765
1873
            tcp_server.use_dbus = False
1766
1874
    protocol = avahi.PROTO_INET6 if use_ipv6 else avahi.PROTO_INET
1767
 
    service = AvahiService(name = server_settings[u"servicename"],
1768
 
                           servicetype = u"_mandos._tcp",
 
1875
    service = AvahiService(name = server_settings["servicename"],
 
1876
                           servicetype = "_mandos._tcp",
1769
1877
                           protocol = protocol, bus = bus)
1770
1878
    if server_settings["interface"]:
1771
1879
        service.interface = (if_nametoindex
1772
 
                             (str(server_settings[u"interface"])))
 
1880
                             (str(server_settings["interface"])))
 
1881
    
 
1882
    global multiprocessing_manager
 
1883
    multiprocessing_manager = multiprocessing.Manager()
1773
1884
    
1774
1885
    client_class = Client
1775
1886
    if use_dbus:
1792
1903
                        client_config, section)))
1793
1904
            for section in client_config.sections()))
1794
1905
    if not tcp_server.clients:
1795
 
        logger.warning(u"No clients defined")
1796
 
    
1797
 
    if debug:
1798
 
        # Redirect stdin so all checkers get /dev/null
1799
 
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
1800
 
        os.dup2(null, sys.stdin.fileno())
1801
 
        if null > 2:
1802
 
            os.close(null)
1803
 
    else:
1804
 
        # No console logging
1805
 
        logger.removeHandler(console)
1806
 
        # Close all input and output, do double fork, etc.
1807
 
        daemon()
1808
 
    
1809
 
    try:
1810
 
        with pidfile:
1811
 
            pid = os.getpid()
1812
 
            pidfile.write(str(pid) + "\n")
1813
 
        del pidfile
1814
 
    except IOError:
1815
 
        logger.error(u"Could not write to file %r with PID %d",
1816
 
                     pidfilename, pid)
1817
 
    except NameError:
1818
 
        # "pidfile" was never created
1819
 
        pass
1820
 
    del pidfilename
1821
 
    
 
1906
        logger.warning("No clients defined")
 
1907
        
1822
1908
    if not debug:
 
1909
        try:
 
1910
            with pidfile:
 
1911
                pid = os.getpid()
 
1912
                pidfile.write(str(pid) + "\n".encode("utf-8"))
 
1913
            del pidfile
 
1914
        except IOError:
 
1915
            logger.error("Could not write to file %r with PID %d",
 
1916
                         pidfilename, pid)
 
1917
        except NameError:
 
1918
            # "pidfile" was never created
 
1919
            pass
 
1920
        del pidfilename
 
1921
        
1823
1922
        signal.signal(signal.SIGINT, signal.SIG_IGN)
 
1923
 
1824
1924
    signal.signal(signal.SIGHUP, lambda signum, frame: sys.exit())
1825
1925
    signal.signal(signal.SIGTERM, lambda signum, frame: sys.exit())
1826
1926
    
1828
1928
        class MandosDBusService(dbus.service.Object):
1829
1929
            """A D-Bus proxy object"""
1830
1930
            def __init__(self):
1831
 
                dbus.service.Object.__init__(self, bus, u"/")
1832
 
            _interface = u"se.bsnet.fukt.Mandos"
 
1931
                dbus.service.Object.__init__(self, bus, "/")
 
1932
            _interface = "se.bsnet.fukt.Mandos"
1833
1933
            
1834
 
            @dbus.service.signal(_interface, signature=u"o")
 
1934
            @dbus.service.signal(_interface, signature="o")
1835
1935
            def ClientAdded(self, objpath):
1836
1936
                "D-Bus signal"
1837
1937
                pass
1838
1938
            
1839
 
            @dbus.service.signal(_interface, signature=u"ss")
 
1939
            @dbus.service.signal(_interface, signature="ss")
1840
1940
            def ClientNotFound(self, fingerprint, address):
1841
1941
                "D-Bus signal"
1842
1942
                pass
1843
1943
            
1844
 
            @dbus.service.signal(_interface, signature=u"os")
 
1944
            @dbus.service.signal(_interface, signature="os")
1845
1945
            def ClientRemoved(self, objpath, name):
1846
1946
                "D-Bus signal"
1847
1947
                pass
1848
1948
            
1849
 
            @dbus.service.method(_interface, out_signature=u"ao")
 
1949
            @dbus.service.method(_interface, out_signature="ao")
1850
1950
            def GetAllClients(self):
1851
1951
                "D-Bus method"
1852
1952
                return dbus.Array(c.dbus_object_path
1853
1953
                                  for c in tcp_server.clients)
1854
1954
            
1855
1955
            @dbus.service.method(_interface,
1856
 
                                 out_signature=u"a{oa{sv}}")
 
1956
                                 out_signature="a{oa{sv}}")
1857
1957
            def GetAllClientsWithProperties(self):
1858
1958
                "D-Bus method"
1859
1959
                return dbus.Dictionary(
1860
 
                    ((c.dbus_object_path, c.GetAll(u""))
 
1960
                    ((c.dbus_object_path, c.GetAll(""))
1861
1961
                     for c in tcp_server.clients),
1862
 
                    signature=u"oa{sv}")
 
1962
                    signature="oa{sv}")
1863
1963
            
1864
 
            @dbus.service.method(_interface, in_signature=u"o")
 
1964
            @dbus.service.method(_interface, in_signature="o")
1865
1965
            def RemoveClient(self, object_path):
1866
1966
                "D-Bus method"
1867
1967
                for c in tcp_server.clients:
1909
2009
    # Find out what port we got
1910
2010
    service.port = tcp_server.socket.getsockname()[1]
1911
2011
    if use_ipv6:
1912
 
        logger.info(u"Now listening on address %r, port %d,"
 
2012
        logger.info("Now listening on address %r, port %d,"
1913
2013
                    " flowinfo %d, scope_id %d"
1914
2014
                    % tcp_server.socket.getsockname())
1915
2015
    else:                       # IPv4
1916
 
        logger.info(u"Now listening on address %r, port %d"
 
2016
        logger.info("Now listening on address %r, port %d"
1917
2017
                    % tcp_server.socket.getsockname())
1918
2018
    
1919
2019
    #service.interface = tcp_server.socket.getsockname()[3]
1923
2023
        try:
1924
2024
            service.activate()
1925
2025
        except dbus.exceptions.DBusException, error:
1926
 
            logger.critical(u"DBusException: %s", error)
 
2026
            logger.critical("DBusException: %s", error)
1927
2027
            cleanup()
1928
2028
            sys.exit(1)
1929
2029
        # End of Avahi example code
1933
2033
                             (tcp_server.handle_request
1934
2034
                              (*args[2:], **kwargs) or True))
1935
2035
        
1936
 
        logger.debug(u"Starting main loop")
 
2036
        logger.debug("Starting main loop")
1937
2037
        main_loop.run()
1938
2038
    except AvahiError, error:
1939
 
        logger.critical(u"AvahiError: %s", error)
 
2039
        logger.critical("AvahiError: %s", error)
1940
2040
        cleanup()
1941
2041
        sys.exit(1)
1942
2042
    except KeyboardInterrupt:
1943
2043
        if debug:
1944
 
            print >> sys.stderr
1945
 
        logger.debug(u"Server received KeyboardInterrupt")
1946
 
    logger.debug(u"Server exiting")
 
2044
            print("", file=sys.stderr)
 
2045
        logger.debug("Server received KeyboardInterrupt")
 
2046
    logger.debug("Server exiting")
1947
2047
    # Must run before the D-Bus bus name gets deregistered
1948
2048
    cleanup()
1949
2049