/mandos/trunk

To get this branch, use:
bzr branch http://bzr.recompile.se/loggerhead/mandos/trunk

« back to all changes in this revision

Viewing changes to mandos

  • Committer: Teddy Hogeborn
  • Date: 2011-08-08 21:12:37 UTC
  • Revision ID: teddy@fukt.bsnet.se-20110808211237-jejsz5brjytrjot8
* Makefile (DOCS): Added "intro.8mandos".
  (intro.8mandos, intro.8mandos.xhtml): New.
* README: Replaced text with link, reference and short summary.
* intro.xml: New.
* mandos-clients.conf.xml (SEE ALSO): Added "intro(8mandos)".
* mandos-ctl.xml (SEE ALSO): - '' -
* mandos-keygen.xml (SEE ALSO): - '' -
* mandos-monitor.xml (SEE ALSO): - '' -
* mandos.conf.xml (SEE ALSO): - '' -
* mandos.xml (SEE ALSO): - '' -
* plugin-runner.xml (SEE ALSO): - '' -
* plugins.d/askpass-fifo.xml (SEE ALSO): - '' -
* plugins.d/mandos-client.xml (SEE ALSO): - '' -
* plugins.d/password-prompt.xml (SEE ALSO): - '' -
* plugins.d/plymouth.xml (SEE ALSO): - '' -
* plugins.d/splashy.xml (SEE ALSO): - '' -
* plugins.d/usplash.xml (SEE ALSO): - '' -

Show diffs side-by-side

added added

removed removed

Lines of Context:
11
11
# "AvahiService" class, and some lines in "main".
12
12
13
13
# Everything else is
14
 
# Copyright © 2008,2009 Teddy Hogeborn
15
 
# Copyright © 2008,2009 Björn Påhlsson
 
14
# Copyright © 2008-2011 Teddy Hogeborn
 
15
# Copyright © 2008-2011 Björn Påhlsson
16
16
17
17
# This program is free software: you can redistribute it and/or modify
18
18
# it under the terms of the GNU General Public License as published by
31
31
# Contact the authors at <mandos@fukt.bsnet.se>.
32
32
33
33
 
34
 
from __future__ import division, with_statement, absolute_import
 
34
from __future__ import (division, absolute_import, print_function,
 
35
                        unicode_literals)
35
36
 
36
37
import SocketServer as socketserver
37
38
import socket
38
 
import optparse
 
39
import argparse
39
40
import datetime
40
41
import errno
41
42
import gnutls.crypto
81
82
        SO_BINDTODEVICE = None
82
83
 
83
84
 
84
 
version = "1.0.14"
 
85
version = "1.3.1"
85
86
 
86
 
#logger = logging.getLogger(u'mandos')
87
 
logger = logging.Logger(u'mandos')
 
87
#logger = logging.getLogger('mandos')
 
88
logger = logging.Logger('mandos')
88
89
syslogger = (logging.handlers.SysLogHandler
89
90
             (facility = logging.handlers.SysLogHandler.LOG_DAEMON,
90
 
              address = "/dev/log"))
 
91
              address = str("/dev/log")))
91
92
syslogger.setFormatter(logging.Formatter
92
 
                       (u'Mandos [%(process)d]: %(levelname)s:'
93
 
                        u' %(message)s'))
 
93
                       ('Mandos [%(process)d]: %(levelname)s:'
 
94
                        ' %(message)s'))
94
95
logger.addHandler(syslogger)
95
96
 
96
97
console = logging.StreamHandler()
97
 
console.setFormatter(logging.Formatter(u'%(name)s [%(process)d]:'
98
 
                                       u' %(levelname)s:'
99
 
                                       u' %(message)s'))
 
98
console.setFormatter(logging.Formatter('%(name)s [%(process)d]:'
 
99
                                       ' %(levelname)s:'
 
100
                                       ' %(message)s'))
100
101
logger.addHandler(console)
101
102
 
102
103
class AvahiError(Exception):
119
120
    Attributes:
120
121
    interface: integer; avahi.IF_UNSPEC or an interface index.
121
122
               Used to optionally bind to the specified interface.
122
 
    name: string; Example: u'Mandos'
123
 
    type: string; Example: u'_mandos._tcp'.
 
123
    name: string; Example: 'Mandos'
 
124
    type: string; Example: '_mandos._tcp'.
124
125
                  See <http://www.dns-sd.org/ServiceTypes.html>
125
126
    port: integer; what port to announce
126
127
    TXT: list of strings; TXT record for the service
135
136
    """
136
137
    def __init__(self, interface = avahi.IF_UNSPEC, name = None,
137
138
                 servicetype = None, port = None, TXT = None,
138
 
                 domain = u"", host = u"", max_renames = 32768,
 
139
                 domain = "", host = "", max_renames = 32768,
139
140
                 protocol = avahi.PROTO_UNSPEC, bus = None):
140
141
        self.interface = interface
141
142
        self.name = name
150
151
        self.group = None       # our entry group
151
152
        self.server = None
152
153
        self.bus = bus
 
154
        self.entry_group_state_changed_match = None
153
155
    def rename(self):
154
156
        """Derived from the Avahi example code"""
155
157
        if self.rename_count >= self.max_renames:
156
 
            logger.critical(u"No suitable Zeroconf service name found"
157
 
                            u" after %i retries, exiting.",
 
158
            logger.critical("No suitable Zeroconf service name found"
 
159
                            " after %i retries, exiting.",
158
160
                            self.rename_count)
159
 
            raise AvahiServiceError(u"Too many renames")
 
161
            raise AvahiServiceError("Too many renames")
160
162
        self.name = unicode(self.server.GetAlternativeServiceName(self.name))
161
 
        logger.info(u"Changing Zeroconf service name to %r ...",
 
163
        logger.info("Changing Zeroconf service name to %r ...",
162
164
                    self.name)
163
165
        syslogger.setFormatter(logging.Formatter
164
 
                               (u'Mandos (%s) [%%(process)d]:'
165
 
                                u' %%(levelname)s: %%(message)s'
 
166
                               ('Mandos (%s) [%%(process)d]:'
 
167
                                ' %%(levelname)s: %%(message)s'
166
168
                                % self.name))
167
169
        self.remove()
168
170
        try:
169
171
            self.add()
170
 
        except dbus.exceptions.DBusException, error:
171
 
            logger.critical(u"DBusException: %s", error)
 
172
        except dbus.exceptions.DBusException as error:
 
173
            logger.critical("DBusException: %s", error)
172
174
            self.cleanup()
173
175
            os._exit(1)
174
176
        self.rename_count += 1
175
177
    def remove(self):
176
178
        """Derived from the Avahi example code"""
 
179
        if self.entry_group_state_changed_match is not None:
 
180
            self.entry_group_state_changed_match.remove()
 
181
            self.entry_group_state_changed_match = None
177
182
        if self.group is not None:
178
183
            self.group.Reset()
179
184
    def add(self):
180
185
        """Derived from the Avahi example code"""
 
186
        self.remove()
181
187
        if self.group is None:
182
188
            self.group = dbus.Interface(
183
189
                self.bus.get_object(avahi.DBUS_NAME,
184
190
                                    self.server.EntryGroupNew()),
185
191
                avahi.DBUS_INTERFACE_ENTRY_GROUP)
186
 
            self.group.connect_to_signal('StateChanged',
187
 
                                         self
188
 
                                         .entry_group_state_changed)
189
 
        logger.debug(u"Adding Zeroconf service '%s' of type '%s' ...",
 
192
        self.entry_group_state_changed_match = (
 
193
            self.group.connect_to_signal(
 
194
                'StateChanged', self .entry_group_state_changed))
 
195
        logger.debug("Adding Zeroconf service '%s' of type '%s' ...",
190
196
                     self.name, self.type)
191
197
        self.group.AddService(
192
198
            self.interface,
199
205
        self.group.Commit()
200
206
    def entry_group_state_changed(self, state, error):
201
207
        """Derived from the Avahi example code"""
202
 
        logger.debug(u"Avahi entry group state change: %i", state)
 
208
        logger.debug("Avahi entry group state change: %i", state)
203
209
        
204
210
        if state == avahi.ENTRY_GROUP_ESTABLISHED:
205
 
            logger.debug(u"Zeroconf service established.")
 
211
            logger.debug("Zeroconf service established.")
206
212
        elif state == avahi.ENTRY_GROUP_COLLISION:
207
 
            logger.warning(u"Zeroconf service name collision.")
 
213
            logger.info("Zeroconf service name collision.")
208
214
            self.rename()
209
215
        elif state == avahi.ENTRY_GROUP_FAILURE:
210
 
            logger.critical(u"Avahi: Error in group state changed %s",
 
216
            logger.critical("Avahi: Error in group state changed %s",
211
217
                            unicode(error))
212
 
            raise AvahiGroupError(u"State changed: %s"
 
218
            raise AvahiGroupError("State changed: %s"
213
219
                                  % unicode(error))
214
220
    def cleanup(self):
215
221
        """Derived from the Avahi example code"""
216
222
        if self.group is not None:
217
 
            self.group.Free()
 
223
            try:
 
224
                self.group.Free()
 
225
            except (dbus.exceptions.UnknownMethodException,
 
226
                    dbus.exceptions.DBusException) as e:
 
227
                pass
218
228
            self.group = None
219
 
    def server_state_changed(self, state):
 
229
        self.remove()
 
230
    def server_state_changed(self, state, error=None):
220
231
        """Derived from the Avahi example code"""
221
 
        logger.debug(u"Avahi server state change: %i", state)
222
 
        if state == avahi.SERVER_COLLISION:
223
 
            logger.error(u"Zeroconf server name collision")
224
 
            self.remove()
 
232
        logger.debug("Avahi server state change: %i", state)
 
233
        bad_states = { avahi.SERVER_INVALID:
 
234
                           "Zeroconf server invalid",
 
235
                       avahi.SERVER_REGISTERING: None,
 
236
                       avahi.SERVER_COLLISION:
 
237
                           "Zeroconf server name collision",
 
238
                       avahi.SERVER_FAILURE:
 
239
                           "Zeroconf server failure" }
 
240
        if state in bad_states:
 
241
            if bad_states[state] is not None:
 
242
                if error is None:
 
243
                    logger.error(bad_states[state])
 
244
                else:
 
245
                    logger.error(bad_states[state] + ": %r", error)
 
246
            self.cleanup()
225
247
        elif state == avahi.SERVER_RUNNING:
226
248
            self.add()
 
249
        else:
 
250
            if error is None:
 
251
                logger.debug("Unknown state: %r", state)
 
252
            else:
 
253
                logger.debug("Unknown state: %r: %r", state, error)
227
254
    def activate(self):
228
255
        """Derived from the Avahi example code"""
229
256
        if self.server is None:
230
257
            self.server = dbus.Interface(
231
258
                self.bus.get_object(avahi.DBUS_NAME,
232
 
                                    avahi.DBUS_PATH_SERVER),
 
259
                                    avahi.DBUS_PATH_SERVER,
 
260
                                    follow_name_owner_changes=True),
233
261
                avahi.DBUS_INTERFACE_SERVER)
234
 
        self.server.connect_to_signal(u"StateChanged",
 
262
        self.server.connect_to_signal("StateChanged",
235
263
                                 self.server_state_changed)
236
264
        self.server_state_changed(self.server.GetState())
237
265
 
240
268
    """A representation of a client host served by this server.
241
269
    
242
270
    Attributes:
243
 
    name:       string; from the config file, used in log messages and
244
 
                        D-Bus identifiers
 
271
    _approved:   bool(); 'None' if not yet approved/disapproved
 
272
    approval_delay: datetime.timedelta(); Time to wait for approval
 
273
    approval_duration: datetime.timedelta(); Duration of one approval
 
274
    checker:    subprocess.Popen(); a running checker process used
 
275
                                    to see if the client lives.
 
276
                                    'None' if no process is running.
 
277
    checker_callback_tag: a gobject event source tag, or None
 
278
    checker_command: string; External command which is run to check
 
279
                     if client lives.  %() expansions are done at
 
280
                     runtime with vars(self) as dict, so that for
 
281
                     instance %(name)s can be used in the command.
 
282
    checker_initiator_tag: a gobject event source tag, or None
 
283
    created:    datetime.datetime(); (UTC) object creation
 
284
    current_checker_command: string; current running checker_command
 
285
    disable_hook:  If set, called by disable() as disable_hook(self)
 
286
    disable_initiator_tag: a gobject event source tag, or None
 
287
    enabled:    bool()
245
288
    fingerprint: string (40 or 32 hexadecimal digits); used to
246
289
                 uniquely identify the client
247
 
    secret:     bytestring; sent verbatim (over TLS) to client
248
290
    host:       string; available for use by the checker command
249
 
    created:    datetime.datetime(); (UTC) object creation
 
291
    interval:   datetime.timedelta(); How often to start a new checker
 
292
    last_approval_request: datetime.datetime(); (UTC) or None
 
293
    last_checked_ok: datetime.datetime(); (UTC) or None
250
294
    last_enabled: datetime.datetime(); (UTC)
251
 
    enabled:    bool()
252
 
    last_checked_ok: datetime.datetime(); (UTC) or None
 
295
    name:       string; from the config file, used in log messages and
 
296
                        D-Bus identifiers
 
297
    secret:     bytestring; sent verbatim (over TLS) to client
253
298
    timeout:    datetime.timedelta(); How long from last_checked_ok
254
299
                                      until this client is disabled
255
 
    interval:   datetime.timedelta(); How often to start a new checker
256
 
    disable_hook:  If set, called by disable() as disable_hook(self)
257
 
    checker:    subprocess.Popen(); a running checker process used
258
 
                                    to see if the client lives.
259
 
                                    'None' if no process is running.
260
 
    checker_initiator_tag: a gobject event source tag, or None
261
 
    disable_initiator_tag: - '' -
262
 
    checker_callback_tag:  - '' -
263
 
    checker_command: string; External command which is run to check if
264
 
                     client lives.  %() expansions are done at
265
 
                     runtime with vars(self) as dict, so that for
266
 
                     instance %(name)s can be used in the command.
267
 
    current_checker_command: string; current running checker_command
268
 
    approved_delay: datetime.timedelta(); Time to wait for approval
269
 
    _approved:   bool(); 'None' if not yet approved/disapproved
270
 
    approved_duration: datetime.timedelta(); Duration of one approval
 
300
    runtime_expansions: Allowed attributes for runtime expansion.
271
301
    """
272
302
    
 
303
    runtime_expansions = ("approval_delay", "approval_duration",
 
304
                          "created", "enabled", "fingerprint",
 
305
                          "host", "interval", "last_checked_ok",
 
306
                          "last_enabled", "name", "timeout")
 
307
    
273
308
    @staticmethod
274
309
    def _timedelta_to_milliseconds(td):
275
310
        "Convert a datetime.timedelta() to milliseconds"
285
320
        "Return the 'interval' attribute in milliseconds"
286
321
        return self._timedelta_to_milliseconds(self.interval)
287
322
 
288
 
    def approved_delay_milliseconds(self):
289
 
        return self._timedelta_to_milliseconds(self.approved_delay)
 
323
    def approval_delay_milliseconds(self):
 
324
        return self._timedelta_to_milliseconds(self.approval_delay)
290
325
    
291
326
    def __init__(self, name = None, disable_hook=None, config=None):
292
327
        """Note: the 'checker' key in 'config' sets the
295
330
        self.name = name
296
331
        if config is None:
297
332
            config = {}
298
 
        logger.debug(u"Creating client %r", self.name)
 
333
        logger.debug("Creating client %r", self.name)
299
334
        # Uppercase and remove spaces from fingerprint for later
300
335
        # comparison purposes with return value from the fingerprint()
301
336
        # function
302
 
        self.fingerprint = (config[u"fingerprint"].upper()
303
 
                            .replace(u" ", u""))
304
 
        logger.debug(u"  Fingerprint: %s", self.fingerprint)
305
 
        if u"secret" in config:
306
 
            self.secret = config[u"secret"].decode(u"base64")
307
 
        elif u"secfile" in config:
 
337
        self.fingerprint = (config["fingerprint"].upper()
 
338
                            .replace(" ", ""))
 
339
        logger.debug("  Fingerprint: %s", self.fingerprint)
 
340
        if "secret" in config:
 
341
            self.secret = config["secret"].decode("base64")
 
342
        elif "secfile" in config:
308
343
            with open(os.path.expanduser(os.path.expandvars
309
 
                                         (config[u"secfile"])),
 
344
                                         (config["secfile"])),
310
345
                      "rb") as secfile:
311
346
                self.secret = secfile.read()
312
347
        else:
313
 
            raise TypeError(u"No secret or secfile for client %s"
 
348
            raise TypeError("No secret or secfile for client %s"
314
349
                            % self.name)
315
 
        self.host = config.get(u"host", u"")
 
350
        self.host = config.get("host", "")
316
351
        self.created = datetime.datetime.utcnow()
317
352
        self.enabled = False
 
353
        self.last_approval_request = None
318
354
        self.last_enabled = None
319
355
        self.last_checked_ok = None
320
 
        self.timeout = string_to_delta(config[u"timeout"])
321
 
        self.interval = string_to_delta(config[u"interval"])
 
356
        self.timeout = string_to_delta(config["timeout"])
 
357
        self.interval = string_to_delta(config["interval"])
322
358
        self.disable_hook = disable_hook
323
359
        self.checker = None
324
360
        self.checker_initiator_tag = None
325
361
        self.disable_initiator_tag = None
326
362
        self.checker_callback_tag = None
327
 
        self.checker_command = config[u"checker"]
 
363
        self.checker_command = config["checker"]
328
364
        self.current_checker_command = None
329
365
        self.last_connect = None
330
366
        self._approved = None
331
 
        self.approved_by_default = config.get(u"approved_by_default",
 
367
        self.approved_by_default = config.get("approved_by_default",
332
368
                                              True)
333
369
        self.approvals_pending = 0
334
 
        self.approved_delay = string_to_delta(
335
 
            config[u"approved_delay"])
336
 
        self.approved_duration = string_to_delta(
337
 
            config[u"approved_duration"])
 
370
        self.approval_delay = string_to_delta(
 
371
            config["approval_delay"])
 
372
        self.approval_duration = string_to_delta(
 
373
            config["approval_duration"])
338
374
        self.changedstate = multiprocessing_manager.Condition(multiprocessing_manager.Lock())
339
375
    
340
376
    def send_changedstate(self):
344
380
        
345
381
    def enable(self):
346
382
        """Start this client's checker and timeout hooks"""
347
 
        if getattr(self, u"enabled", False):
 
383
        if getattr(self, "enabled", False):
348
384
            # Already enabled
349
385
            return
350
386
        self.send_changedstate()
369
405
        if not quiet:
370
406
            self.send_changedstate()
371
407
        if not quiet:
372
 
            logger.info(u"Disabling client %s", self.name)
373
 
        if getattr(self, u"disable_initiator_tag", False):
 
408
            logger.info("Disabling client %s", self.name)
 
409
        if getattr(self, "disable_initiator_tag", False):
374
410
            gobject.source_remove(self.disable_initiator_tag)
375
411
            self.disable_initiator_tag = None
376
 
        if getattr(self, u"checker_initiator_tag", False):
 
412
        if getattr(self, "checker_initiator_tag", False):
377
413
            gobject.source_remove(self.checker_initiator_tag)
378
414
            self.checker_initiator_tag = None
379
415
        self.stop_checker()
394
430
        if os.WIFEXITED(condition):
395
431
            exitstatus = os.WEXITSTATUS(condition)
396
432
            if exitstatus == 0:
397
 
                logger.info(u"Checker for %(name)s succeeded",
 
433
                logger.info("Checker for %(name)s succeeded",
398
434
                            vars(self))
399
435
                self.checked_ok()
400
436
            else:
401
 
                logger.info(u"Checker for %(name)s failed",
 
437
                logger.info("Checker for %(name)s failed",
402
438
                            vars(self))
403
439
        else:
404
 
            logger.warning(u"Checker for %(name)s crashed?",
 
440
            logger.warning("Checker for %(name)s crashed?",
405
441
                           vars(self))
406
442
    
407
443
    def checked_ok(self):
416
452
                                      (self.timeout_milliseconds(),
417
453
                                       self.disable))
418
454
    
 
455
    def need_approval(self):
 
456
        self.last_approval_request = datetime.datetime.utcnow()
 
457
    
419
458
    def start_checker(self):
420
459
        """Start a new checker subprocess if one is not running.
421
460
        
433
472
        # If a checker exists, make sure it is not a zombie
434
473
        try:
435
474
            pid, status = os.waitpid(self.checker.pid, os.WNOHANG)
436
 
        except (AttributeError, OSError), error:
 
475
        except (AttributeError, OSError) as error:
437
476
            if (isinstance(error, OSError)
438
477
                and error.errno != errno.ECHILD):
439
478
                raise error
440
479
        else:
441
480
            if pid:
442
 
                logger.warning(u"Checker was a zombie")
 
481
                logger.warning("Checker was a zombie")
443
482
                gobject.source_remove(self.checker_callback_tag)
444
483
                self.checker_callback(pid, status,
445
484
                                      self.current_checker_command)
450
489
                command = self.checker_command % self.host
451
490
            except TypeError:
452
491
                # Escape attributes for the shell
453
 
                escaped_attrs = dict((key,
454
 
                                      re.escape(unicode(str(val),
455
 
                                                        errors=
456
 
                                                        u'replace')))
457
 
                                     for key, val in
458
 
                                     vars(self).iteritems())
 
492
                escaped_attrs = dict(
 
493
                    (attr,
 
494
                     re.escape(unicode(str(getattr(self, attr, "")),
 
495
                                       errors=
 
496
                                       'replace')))
 
497
                    for attr in
 
498
                    self.runtime_expansions)
 
499
 
459
500
                try:
460
501
                    command = self.checker_command % escaped_attrs
461
 
                except TypeError, error:
462
 
                    logger.error(u'Could not format string "%s":'
463
 
                                 u' %s', self.checker_command, error)
 
502
                except TypeError as error:
 
503
                    logger.error('Could not format string "%s":'
 
504
                                 ' %s', self.checker_command, error)
464
505
                    return True # Try again later
465
506
            self.current_checker_command = command
466
507
            try:
467
 
                logger.info(u"Starting checker %r for %s",
 
508
                logger.info("Starting checker %r for %s",
468
509
                            command, self.name)
469
510
                # We don't need to redirect stdout and stderr, since
470
511
                # in normal mode, that is already done by daemon(),
472
513
                # always replaced by /dev/null.)
473
514
                self.checker = subprocess.Popen(command,
474
515
                                                close_fds=True,
475
 
                                                shell=True, cwd=u"/")
 
516
                                                shell=True, cwd="/")
476
517
                self.checker_callback_tag = (gobject.child_watch_add
477
518
                                             (self.checker.pid,
478
519
                                              self.checker_callback,
483
524
                if pid:
484
525
                    gobject.source_remove(self.checker_callback_tag)
485
526
                    self.checker_callback(pid, status, command)
486
 
            except OSError, error:
487
 
                logger.error(u"Failed to start subprocess: %s",
 
527
            except OSError as error:
 
528
                logger.error("Failed to start subprocess: %s",
488
529
                             error)
489
530
        # Re-run this periodically if run by gobject.timeout_add
490
531
        return True
494
535
        if self.checker_callback_tag:
495
536
            gobject.source_remove(self.checker_callback_tag)
496
537
            self.checker_callback_tag = None
497
 
        if getattr(self, u"checker", None) is None:
 
538
        if getattr(self, "checker", None) is None:
498
539
            return
499
 
        logger.debug(u"Stopping checker for %(name)s", vars(self))
 
540
        logger.debug("Stopping checker for %(name)s", vars(self))
500
541
        try:
501
542
            os.kill(self.checker.pid, signal.SIGTERM)
502
543
            #time.sleep(0.5)
503
544
            #if self.checker.poll() is None:
504
545
            #    os.kill(self.checker.pid, signal.SIGKILL)
505
 
        except OSError, error:
 
546
        except OSError as error:
506
547
            if error.errno != errno.ESRCH: # No such process
507
548
                raise
508
549
        self.checker = None
509
550
 
510
 
def dbus_service_property(dbus_interface, signature=u"v",
511
 
                          access=u"readwrite", byte_arrays=False):
 
551
def dbus_service_property(dbus_interface, signature="v",
 
552
                          access="readwrite", byte_arrays=False):
512
553
    """Decorators for marking methods of a DBusObjectWithProperties to
513
554
    become properties on the D-Bus.
514
555
    
521
562
    """
522
563
    # Encoding deeply encoded byte arrays is not supported yet by the
523
564
    # "Set" method, so we fail early here:
524
 
    if byte_arrays and signature != u"ay":
525
 
        raise ValueError(u"Byte arrays not supported for non-'ay'"
526
 
                         u" signature %r" % signature)
 
565
    if byte_arrays and signature != "ay":
 
566
        raise ValueError("Byte arrays not supported for non-'ay'"
 
567
                         " signature %r" % signature)
527
568
    def decorator(func):
528
569
        func._dbus_is_property = True
529
570
        func._dbus_interface = dbus_interface
530
571
        func._dbus_signature = signature
531
572
        func._dbus_access = access
532
573
        func._dbus_name = func.__name__
533
 
        if func._dbus_name.endswith(u"_dbus_property"):
 
574
        if func._dbus_name.endswith("_dbus_property"):
534
575
            func._dbus_name = func._dbus_name[:-14]
535
 
        func._dbus_get_args_options = {u'byte_arrays': byte_arrays }
 
576
        func._dbus_get_args_options = {'byte_arrays': byte_arrays }
536
577
        return func
537
578
    return decorator
538
579
 
566
607
    
567
608
    @staticmethod
568
609
    def _is_dbus_property(obj):
569
 
        return getattr(obj, u"_dbus_is_property", False)
 
610
        return getattr(obj, "_dbus_is_property", False)
570
611
    
571
612
    def _get_all_dbus_properties(self):
572
613
        """Returns a generator of (name, attribute) pairs
580
621
        property with the specified name and interface.
581
622
        """
582
623
        for name in (property_name,
583
 
                     property_name + u"_dbus_property"):
 
624
                     property_name + "_dbus_property"):
584
625
            prop = getattr(self, name, None)
585
626
            if (prop is None
586
627
                or not self._is_dbus_property(prop)
590
631
                continue
591
632
            return prop
592
633
        # No such property
593
 
        raise DBusPropertyNotFound(self.dbus_object_path + u":"
594
 
                                   + interface_name + u"."
 
634
        raise DBusPropertyNotFound(self.dbus_object_path + ":"
 
635
                                   + interface_name + "."
595
636
                                   + property_name)
596
637
    
597
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"ss",
598
 
                         out_signature=u"v")
 
638
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="ss",
 
639
                         out_signature="v")
599
640
    def Get(self, interface_name, property_name):
600
641
        """Standard D-Bus property Get() method, see D-Bus standard.
601
642
        """
602
643
        prop = self._get_dbus_property(interface_name, property_name)
603
 
        if prop._dbus_access == u"write":
 
644
        if prop._dbus_access == "write":
604
645
            raise DBusPropertyAccessException(property_name)
605
646
        value = prop()
606
 
        if not hasattr(value, u"variant_level"):
 
647
        if not hasattr(value, "variant_level"):
607
648
            return value
608
649
        return type(value)(value, variant_level=value.variant_level+1)
609
650
    
610
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"ssv")
 
651
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="ssv")
611
652
    def Set(self, interface_name, property_name, value):
612
653
        """Standard D-Bus property Set() method, see D-Bus standard.
613
654
        """
614
655
        prop = self._get_dbus_property(interface_name, property_name)
615
 
        if prop._dbus_access == u"read":
 
656
        if prop._dbus_access == "read":
616
657
            raise DBusPropertyAccessException(property_name)
617
 
        if prop._dbus_get_args_options[u"byte_arrays"]:
 
658
        if prop._dbus_get_args_options["byte_arrays"]:
618
659
            # The byte_arrays option is not supported yet on
619
660
            # signatures other than "ay".
620
 
            if prop._dbus_signature != u"ay":
 
661
            if prop._dbus_signature != "ay":
621
662
                raise ValueError
622
663
            value = dbus.ByteArray(''.join(unichr(byte)
623
664
                                           for byte in value))
624
665
        prop(value)
625
666
    
626
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"s",
627
 
                         out_signature=u"a{sv}")
 
667
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="s",
 
668
                         out_signature="a{sv}")
628
669
    def GetAll(self, interface_name):
629
670
        """Standard D-Bus property GetAll() method, see D-Bus
630
671
        standard.
638
679
                # Interface non-empty but did not match
639
680
                continue
640
681
            # Ignore write-only properties
641
 
            if prop._dbus_access == u"write":
 
682
            if prop._dbus_access == "write":
642
683
                continue
643
684
            value = prop()
644
 
            if not hasattr(value, u"variant_level"):
 
685
            if not hasattr(value, "variant_level"):
645
686
                all[name] = value
646
687
                continue
647
688
            all[name] = type(value)(value, variant_level=
648
689
                                    value.variant_level+1)
649
 
        return dbus.Dictionary(all, signature=u"sv")
 
690
        return dbus.Dictionary(all, signature="sv")
650
691
    
651
692
    @dbus.service.method(dbus.INTROSPECTABLE_IFACE,
652
 
                         out_signature=u"s",
 
693
                         out_signature="s",
653
694
                         path_keyword='object_path',
654
695
                         connection_keyword='connection')
655
696
    def Introspect(self, object_path, connection):
660
701
        try:
661
702
            document = xml.dom.minidom.parseString(xmlstring)
662
703
            def make_tag(document, name, prop):
663
 
                e = document.createElement(u"property")
664
 
                e.setAttribute(u"name", name)
665
 
                e.setAttribute(u"type", prop._dbus_signature)
666
 
                e.setAttribute(u"access", prop._dbus_access)
 
704
                e = document.createElement("property")
 
705
                e.setAttribute("name", name)
 
706
                e.setAttribute("type", prop._dbus_signature)
 
707
                e.setAttribute("access", prop._dbus_access)
667
708
                return e
668
 
            for if_tag in document.getElementsByTagName(u"interface"):
 
709
            for if_tag in document.getElementsByTagName("interface"):
669
710
                for tag in (make_tag(document, name, prop)
670
711
                            for name, prop
671
712
                            in self._get_all_dbus_properties()
672
713
                            if prop._dbus_interface
673
 
                            == if_tag.getAttribute(u"name")):
 
714
                            == if_tag.getAttribute("name")):
674
715
                    if_tag.appendChild(tag)
675
716
                # Add the names to the return values for the
676
717
                # "org.freedesktop.DBus.Properties" methods
677
 
                if (if_tag.getAttribute(u"name")
678
 
                    == u"org.freedesktop.DBus.Properties"):
679
 
                    for cn in if_tag.getElementsByTagName(u"method"):
680
 
                        if cn.getAttribute(u"name") == u"Get":
681
 
                            for arg in cn.getElementsByTagName(u"arg"):
682
 
                                if (arg.getAttribute(u"direction")
683
 
                                    == u"out"):
684
 
                                    arg.setAttribute(u"name", u"value")
685
 
                        elif cn.getAttribute(u"name") == u"GetAll":
686
 
                            for arg in cn.getElementsByTagName(u"arg"):
687
 
                                if (arg.getAttribute(u"direction")
688
 
                                    == u"out"):
689
 
                                    arg.setAttribute(u"name", u"props")
690
 
            xmlstring = document.toxml(u"utf-8")
 
718
                if (if_tag.getAttribute("name")
 
719
                    == "org.freedesktop.DBus.Properties"):
 
720
                    for cn in if_tag.getElementsByTagName("method"):
 
721
                        if cn.getAttribute("name") == "Get":
 
722
                            for arg in cn.getElementsByTagName("arg"):
 
723
                                if (arg.getAttribute("direction")
 
724
                                    == "out"):
 
725
                                    arg.setAttribute("name", "value")
 
726
                        elif cn.getAttribute("name") == "GetAll":
 
727
                            for arg in cn.getElementsByTagName("arg"):
 
728
                                if (arg.getAttribute("direction")
 
729
                                    == "out"):
 
730
                                    arg.setAttribute("name", "props")
 
731
            xmlstring = document.toxml("utf-8")
691
732
            document.unlink()
692
733
        except (AttributeError, xml.dom.DOMException,
693
 
                xml.parsers.expat.ExpatError), error:
694
 
            logger.error(u"Failed to override Introspection method",
 
734
                xml.parsers.expat.ExpatError) as error:
 
735
            logger.error("Failed to override Introspection method",
695
736
                         error)
696
737
        return xmlstring
697
738
 
703
744
    dbus_object_path: dbus.ObjectPath
704
745
    bus: dbus.SystemBus()
705
746
    """
 
747
    
 
748
    runtime_expansions = (Client.runtime_expansions
 
749
                          + ("dbus_object_path",))
 
750
    
706
751
    # dbus.service.Object doesn't use super(), so we can't either.
707
752
    
708
753
    def __init__(self, bus = None, *args, **kwargs):
711
756
        Client.__init__(self, *args, **kwargs)
712
757
        # Only now, when this client is initialized, can it show up on
713
758
        # the D-Bus
 
759
        client_object_name = unicode(self.name).translate(
 
760
            {ord("."): ord("_"),
 
761
             ord("-"): ord("_")})
714
762
        self.dbus_object_path = (dbus.ObjectPath
715
 
                                 (u"/clients/"
716
 
                                  + self.name.replace(u".", u"_")))
 
763
                                 ("/clients/" + client_object_name))
717
764
        DBusObjectWithProperties.__init__(self, self.bus,
718
765
                                          self.dbus_object_path)
719
 
 
 
766
        
720
767
    def _get_approvals_pending(self):
721
768
        return self._approvals_pending
722
769
    def _set_approvals_pending(self, value):
726
773
        if (hasattr(self, "dbus_object_path")
727
774
            and bval is not bool(old_value)):
728
775
            dbus_bool = dbus.Boolean(bval, variant_level=1)
729
 
            self.PropertyChanged(dbus.String(u"approved_pending"),
 
776
            self.PropertyChanged(dbus.String("ApprovalPending"),
730
777
                                 dbus_bool)
731
778
 
732
779
    approvals_pending = property(_get_approvals_pending,
740
787
                           variant_level=variant_level)
741
788
    
742
789
    def enable(self):
743
 
        oldstate = getattr(self, u"enabled", False)
 
790
        oldstate = getattr(self, "enabled", False)
744
791
        r = Client.enable(self)
745
792
        if oldstate != self.enabled:
746
793
            # Emit D-Bus signals
747
 
            self.PropertyChanged(dbus.String(u"enabled"),
 
794
            self.PropertyChanged(dbus.String("Enabled"),
748
795
                                 dbus.Boolean(True, variant_level=1))
749
796
            self.PropertyChanged(
750
 
                dbus.String(u"last_enabled"),
 
797
                dbus.String("LastEnabled"),
751
798
                self._datetime_to_dbus(self.last_enabled,
752
799
                                       variant_level=1))
753
800
        return r
754
801
    
755
802
    def disable(self, quiet = False):
756
 
        oldstate = getattr(self, u"enabled", False)
 
803
        oldstate = getattr(self, "enabled", False)
757
804
        r = Client.disable(self, quiet=quiet)
758
805
        if not quiet and oldstate != self.enabled:
759
806
            # Emit D-Bus signal
760
 
            self.PropertyChanged(dbus.String(u"enabled"),
 
807
            self.PropertyChanged(dbus.String("Enabled"),
761
808
                                 dbus.Boolean(False, variant_level=1))
762
809
        return r
763
810
    
766
813
            self.remove_from_connection()
767
814
        except LookupError:
768
815
            pass
769
 
        if hasattr(DBusObjectWithProperties, u"__del__"):
 
816
        if hasattr(DBusObjectWithProperties, "__del__"):
770
817
            DBusObjectWithProperties.__del__(self, *args, **kwargs)
771
818
        Client.__del__(self, *args, **kwargs)
772
819
    
775
822
        self.checker_callback_tag = None
776
823
        self.checker = None
777
824
        # Emit D-Bus signal
778
 
        self.PropertyChanged(dbus.String(u"checker_running"),
 
825
        self.PropertyChanged(dbus.String("CheckerRunning"),
779
826
                             dbus.Boolean(False, variant_level=1))
780
827
        if os.WIFEXITED(condition):
781
828
            exitstatus = os.WEXITSTATUS(condition)
793
840
                                       *args, **kwargs)
794
841
    
795
842
    def checked_ok(self, *args, **kwargs):
796
 
        r = Client.checked_ok(self, *args, **kwargs)
 
843
        Client.checked_ok(self, *args, **kwargs)
797
844
        # Emit D-Bus signal
798
845
        self.PropertyChanged(
799
 
            dbus.String(u"last_checked_ok"),
 
846
            dbus.String("LastCheckedOK"),
800
847
            (self._datetime_to_dbus(self.last_checked_ok,
801
848
                                    variant_level=1)))
 
849
    
 
850
    def need_approval(self, *args, **kwargs):
 
851
        r = Client.need_approval(self, *args, **kwargs)
 
852
        # Emit D-Bus signal
 
853
        self.PropertyChanged(
 
854
            dbus.String("LastApprovalRequest"),
 
855
            (self._datetime_to_dbus(self.last_approval_request,
 
856
                                    variant_level=1)))
802
857
        return r
803
858
    
804
859
    def start_checker(self, *args, **kwargs):
814
869
            # Emit D-Bus signal
815
870
            self.CheckerStarted(self.current_checker_command)
816
871
            self.PropertyChanged(
817
 
                dbus.String(u"checker_running"),
 
872
                dbus.String("CheckerRunning"),
818
873
                dbus.Boolean(True, variant_level=1))
819
874
        return r
820
875
    
821
876
    def stop_checker(self, *args, **kwargs):
822
 
        old_checker = getattr(self, u"checker", None)
 
877
        old_checker = getattr(self, "checker", None)
823
878
        r = Client.stop_checker(self, *args, **kwargs)
824
879
        if (old_checker is not None
825
 
            and getattr(self, u"checker", None) is None):
826
 
            self.PropertyChanged(dbus.String(u"checker_running"),
 
880
            and getattr(self, "checker", None) is None):
 
881
            self.PropertyChanged(dbus.String("CheckerRunning"),
827
882
                                 dbus.Boolean(False, variant_level=1))
828
883
        return r
829
884
 
834
889
    def approve(self, value=True):
835
890
        self.send_changedstate()
836
891
        self._approved = value
837
 
        gobject.timeout_add(self._timedelta_to_milliseconds(self.approved_duration),
 
892
        gobject.timeout_add(self._timedelta_to_milliseconds
 
893
                            (self.approval_duration),
838
894
                            self._reset_approved)
839
895
    
840
896
    
841
897
    ## D-Bus methods, signals & properties
842
 
    _interface = u"se.bsnet.fukt.Mandos.Client"
 
898
    _interface = "se.bsnet.fukt.Mandos.Client"
843
899
    
844
900
    ## Signals
845
901
    
846
902
    # CheckerCompleted - signal
847
 
    @dbus.service.signal(_interface, signature=u"nxs")
 
903
    @dbus.service.signal(_interface, signature="nxs")
848
904
    def CheckerCompleted(self, exitcode, waitstatus, command):
849
905
        "D-Bus signal"
850
906
        pass
851
907
    
852
908
    # CheckerStarted - signal
853
 
    @dbus.service.signal(_interface, signature=u"s")
 
909
    @dbus.service.signal(_interface, signature="s")
854
910
    def CheckerStarted(self, command):
855
911
        "D-Bus signal"
856
912
        pass
857
913
    
858
914
    # PropertyChanged - signal
859
 
    @dbus.service.signal(_interface, signature=u"sv")
 
915
    @dbus.service.signal(_interface, signature="sv")
860
916
    def PropertyChanged(self, property, value):
861
917
        "D-Bus signal"
862
918
        pass
871
927
        pass
872
928
    
873
929
    # Rejected - signal
874
 
    @dbus.service.signal(_interface, signature=u"s")
 
930
    @dbus.service.signal(_interface, signature="s")
875
931
    def Rejected(self, reason):
876
932
        "D-Bus signal"
877
933
        pass
878
934
    
879
935
    # NeedApproval - signal
880
 
    @dbus.service.signal(_interface, signature=u"db")
 
936
    @dbus.service.signal(_interface, signature="tb")
881
937
    def NeedApproval(self, timeout, default):
882
938
        "D-Bus signal"
883
 
        pass
 
939
        return self.need_approval()
884
940
    
885
941
    ## Methods
886
 
 
 
942
    
887
943
    # Approve - method
888
 
    @dbus.service.method(_interface, in_signature=u"b")
 
944
    @dbus.service.method(_interface, in_signature="b")
889
945
    def Approve(self, value):
890
946
        self.approve(value)
891
 
 
 
947
    
892
948
    # CheckedOK - method
893
949
    @dbus.service.method(_interface)
894
950
    def CheckedOK(self):
895
 
        return self.checked_ok()
 
951
        self.checked_ok()
896
952
    
897
953
    # Enable - method
898
954
    @dbus.service.method(_interface)
919
975
    
920
976
    ## Properties
921
977
    
922
 
    # approved_pending - property
923
 
    @dbus_service_property(_interface, signature=u"b", access=u"read")
924
 
    def approved_pending_dbus_property(self):
 
978
    # ApprovalPending - property
 
979
    @dbus_service_property(_interface, signature="b", access="read")
 
980
    def ApprovalPending_dbus_property(self):
925
981
        return dbus.Boolean(bool(self.approvals_pending))
926
982
    
927
 
    # approved_by_default - property
928
 
    @dbus_service_property(_interface, signature=u"b",
929
 
                           access=u"readwrite")
930
 
    def approved_by_default_dbus_property(self):
931
 
        return dbus.Boolean(self.approved_by_default)
932
 
    
933
 
    # approved_delay - property
934
 
    @dbus_service_property(_interface, signature=u"t",
935
 
                           access=u"readwrite")
936
 
    def approved_delay_dbus_property(self):
937
 
        return dbus.UInt64(self.approved_delay_milliseconds())
938
 
    
939
 
    # approved_duration - property
940
 
    @dbus_service_property(_interface, signature=u"t",
941
 
                           access=u"readwrite")
942
 
    def approved_duration_dbus_property(self):
943
 
        return dbus.UInt64(self._timedelta_to_milliseconds(
944
 
                self.approved_duration))
945
 
    
946
 
    # name - property
947
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
948
 
    def name_dbus_property(self):
 
983
    # ApprovedByDefault - property
 
984
    @dbus_service_property(_interface, signature="b",
 
985
                           access="readwrite")
 
986
    def ApprovedByDefault_dbus_property(self, value=None):
 
987
        if value is None:       # get
 
988
            return dbus.Boolean(self.approved_by_default)
 
989
        self.approved_by_default = bool(value)
 
990
        # Emit D-Bus signal
 
991
        self.PropertyChanged(dbus.String("ApprovedByDefault"),
 
992
                             dbus.Boolean(value, variant_level=1))
 
993
    
 
994
    # ApprovalDelay - property
 
995
    @dbus_service_property(_interface, signature="t",
 
996
                           access="readwrite")
 
997
    def ApprovalDelay_dbus_property(self, value=None):
 
998
        if value is None:       # get
 
999
            return dbus.UInt64(self.approval_delay_milliseconds())
 
1000
        self.approval_delay = datetime.timedelta(0, 0, 0, value)
 
1001
        # Emit D-Bus signal
 
1002
        self.PropertyChanged(dbus.String("ApprovalDelay"),
 
1003
                             dbus.UInt64(value, variant_level=1))
 
1004
    
 
1005
    # ApprovalDuration - property
 
1006
    @dbus_service_property(_interface, signature="t",
 
1007
                           access="readwrite")
 
1008
    def ApprovalDuration_dbus_property(self, value=None):
 
1009
        if value is None:       # get
 
1010
            return dbus.UInt64(self._timedelta_to_milliseconds(
 
1011
                    self.approval_duration))
 
1012
        self.approval_duration = datetime.timedelta(0, 0, 0, value)
 
1013
        # Emit D-Bus signal
 
1014
        self.PropertyChanged(dbus.String("ApprovalDuration"),
 
1015
                             dbus.UInt64(value, variant_level=1))
 
1016
    
 
1017
    # Name - property
 
1018
    @dbus_service_property(_interface, signature="s", access="read")
 
1019
    def Name_dbus_property(self):
949
1020
        return dbus.String(self.name)
950
1021
    
951
 
    # fingerprint - property
952
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
953
 
    def fingerprint_dbus_property(self):
 
1022
    # Fingerprint - property
 
1023
    @dbus_service_property(_interface, signature="s", access="read")
 
1024
    def Fingerprint_dbus_property(self):
954
1025
        return dbus.String(self.fingerprint)
955
1026
    
956
 
    # host - property
957
 
    @dbus_service_property(_interface, signature=u"s",
958
 
                           access=u"readwrite")
959
 
    def host_dbus_property(self, value=None):
 
1027
    # Host - property
 
1028
    @dbus_service_property(_interface, signature="s",
 
1029
                           access="readwrite")
 
1030
    def Host_dbus_property(self, value=None):
960
1031
        if value is None:       # get
961
1032
            return dbus.String(self.host)
962
1033
        self.host = value
963
1034
        # Emit D-Bus signal
964
 
        self.PropertyChanged(dbus.String(u"host"),
 
1035
        self.PropertyChanged(dbus.String("Host"),
965
1036
                             dbus.String(value, variant_level=1))
966
1037
    
967
 
    # created - property
968
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
969
 
    def created_dbus_property(self):
 
1038
    # Created - property
 
1039
    @dbus_service_property(_interface, signature="s", access="read")
 
1040
    def Created_dbus_property(self):
970
1041
        return dbus.String(self._datetime_to_dbus(self.created))
971
1042
    
972
 
    # last_enabled - property
973
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
974
 
    def last_enabled_dbus_property(self):
 
1043
    # LastEnabled - property
 
1044
    @dbus_service_property(_interface, signature="s", access="read")
 
1045
    def LastEnabled_dbus_property(self):
975
1046
        if self.last_enabled is None:
976
 
            return dbus.String(u"")
 
1047
            return dbus.String("")
977
1048
        return dbus.String(self._datetime_to_dbus(self.last_enabled))
978
1049
    
979
 
    # enabled - property
980
 
    @dbus_service_property(_interface, signature=u"b",
981
 
                           access=u"readwrite")
982
 
    def enabled_dbus_property(self, value=None):
 
1050
    # Enabled - property
 
1051
    @dbus_service_property(_interface, signature="b",
 
1052
                           access="readwrite")
 
1053
    def Enabled_dbus_property(self, value=None):
983
1054
        if value is None:       # get
984
1055
            return dbus.Boolean(self.enabled)
985
1056
        if value:
987
1058
        else:
988
1059
            self.disable()
989
1060
    
990
 
    # last_checked_ok - property
991
 
    @dbus_service_property(_interface, signature=u"s",
992
 
                           access=u"readwrite")
993
 
    def last_checked_ok_dbus_property(self, value=None):
 
1061
    # LastCheckedOK - property
 
1062
    @dbus_service_property(_interface, signature="s",
 
1063
                           access="readwrite")
 
1064
    def LastCheckedOK_dbus_property(self, value=None):
994
1065
        if value is not None:
995
1066
            self.checked_ok()
996
1067
            return
997
1068
        if self.last_checked_ok is None:
998
 
            return dbus.String(u"")
 
1069
            return dbus.String("")
999
1070
        return dbus.String(self._datetime_to_dbus(self
1000
1071
                                                  .last_checked_ok))
1001
1072
    
1002
 
    # timeout - property
1003
 
    @dbus_service_property(_interface, signature=u"t",
1004
 
                           access=u"readwrite")
1005
 
    def timeout_dbus_property(self, value=None):
 
1073
    # LastApprovalRequest - property
 
1074
    @dbus_service_property(_interface, signature="s", access="read")
 
1075
    def LastApprovalRequest_dbus_property(self):
 
1076
        if self.last_approval_request is None:
 
1077
            return dbus.String("")
 
1078
        return dbus.String(self.
 
1079
                           _datetime_to_dbus(self
 
1080
                                             .last_approval_request))
 
1081
    
 
1082
    # Timeout - property
 
1083
    @dbus_service_property(_interface, signature="t",
 
1084
                           access="readwrite")
 
1085
    def Timeout_dbus_property(self, value=None):
1006
1086
        if value is None:       # get
1007
1087
            return dbus.UInt64(self.timeout_milliseconds())
1008
1088
        self.timeout = datetime.timedelta(0, 0, 0, value)
1009
1089
        # Emit D-Bus signal
1010
 
        self.PropertyChanged(dbus.String(u"timeout"),
 
1090
        self.PropertyChanged(dbus.String("Timeout"),
1011
1091
                             dbus.UInt64(value, variant_level=1))
1012
 
        if getattr(self, u"disable_initiator_tag", None) is None:
 
1092
        if getattr(self, "disable_initiator_tag", None) is None:
1013
1093
            return
1014
1094
        # Reschedule timeout
1015
1095
        gobject.source_remove(self.disable_initiator_tag)
1027
1107
            self.disable_initiator_tag = (gobject.timeout_add
1028
1108
                                          (time_to_die, self.disable))
1029
1109
    
1030
 
    # interval - property
1031
 
    @dbus_service_property(_interface, signature=u"t",
1032
 
                           access=u"readwrite")
1033
 
    def interval_dbus_property(self, value=None):
 
1110
    # Interval - property
 
1111
    @dbus_service_property(_interface, signature="t",
 
1112
                           access="readwrite")
 
1113
    def Interval_dbus_property(self, value=None):
1034
1114
        if value is None:       # get
1035
1115
            return dbus.UInt64(self.interval_milliseconds())
1036
1116
        self.interval = datetime.timedelta(0, 0, 0, value)
1037
1117
        # Emit D-Bus signal
1038
 
        self.PropertyChanged(dbus.String(u"interval"),
 
1118
        self.PropertyChanged(dbus.String("Interval"),
1039
1119
                             dbus.UInt64(value, variant_level=1))
1040
 
        if getattr(self, u"checker_initiator_tag", None) is None:
 
1120
        if getattr(self, "checker_initiator_tag", None) is None:
1041
1121
            return
1042
1122
        # Reschedule checker run
1043
1123
        gobject.source_remove(self.checker_initiator_tag)
1045
1125
                                      (value, self.start_checker))
1046
1126
        self.start_checker()    # Start one now, too
1047
1127
 
1048
 
    # checker - property
1049
 
    @dbus_service_property(_interface, signature=u"s",
1050
 
                           access=u"readwrite")
1051
 
    def checker_dbus_property(self, value=None):
 
1128
    # Checker - property
 
1129
    @dbus_service_property(_interface, signature="s",
 
1130
                           access="readwrite")
 
1131
    def Checker_dbus_property(self, value=None):
1052
1132
        if value is None:       # get
1053
1133
            return dbus.String(self.checker_command)
1054
1134
        self.checker_command = value
1055
1135
        # Emit D-Bus signal
1056
 
        self.PropertyChanged(dbus.String(u"checker"),
 
1136
        self.PropertyChanged(dbus.String("Checker"),
1057
1137
                             dbus.String(self.checker_command,
1058
1138
                                         variant_level=1))
1059
1139
    
1060
 
    # checker_running - property
1061
 
    @dbus_service_property(_interface, signature=u"b",
1062
 
                           access=u"readwrite")
1063
 
    def checker_running_dbus_property(self, value=None):
 
1140
    # CheckerRunning - property
 
1141
    @dbus_service_property(_interface, signature="b",
 
1142
                           access="readwrite")
 
1143
    def CheckerRunning_dbus_property(self, value=None):
1064
1144
        if value is None:       # get
1065
1145
            return dbus.Boolean(self.checker is not None)
1066
1146
        if value:
1068
1148
        else:
1069
1149
            self.stop_checker()
1070
1150
    
1071
 
    # object_path - property
1072
 
    @dbus_service_property(_interface, signature=u"o", access=u"read")
1073
 
    def object_path_dbus_property(self):
 
1151
    # ObjectPath - property
 
1152
    @dbus_service_property(_interface, signature="o", access="read")
 
1153
    def ObjectPath_dbus_property(self):
1074
1154
        return self.dbus_object_path # is already a dbus.ObjectPath
1075
1155
    
1076
 
    # secret = property
1077
 
    @dbus_service_property(_interface, signature=u"ay",
1078
 
                           access=u"write", byte_arrays=True)
1079
 
    def secret_dbus_property(self, value):
 
1156
    # Secret = property
 
1157
    @dbus_service_property(_interface, signature="ay",
 
1158
                           access="write", byte_arrays=True)
 
1159
    def Secret_dbus_property(self, value):
1080
1160
        self.secret = str(value)
1081
1161
    
1082
1162
    del _interface
1116
1196
    
1117
1197
    def handle(self):
1118
1198
        with contextlib.closing(self.server.child_pipe) as child_pipe:
1119
 
            logger.info(u"TCP connection from: %s",
 
1199
            logger.info("TCP connection from: %s",
1120
1200
                        unicode(self.client_address))
1121
 
            logger.debug(u"Pipe FD: %d",
 
1201
            logger.debug("Pipe FD: %d",
1122
1202
                         self.server.child_pipe.fileno())
1123
1203
 
1124
1204
            session = (gnutls.connection
1131
1211
            # no X.509 keys are added to it.  Therefore, we can use it
1132
1212
            # here despite using OpenPGP certificates.
1133
1213
 
1134
 
            #priority = u':'.join((u"NONE", u"+VERS-TLS1.1",
1135
 
            #                      u"+AES-256-CBC", u"+SHA1",
1136
 
            #                      u"+COMP-NULL", u"+CTYPE-OPENPGP",
1137
 
            #                      u"+DHE-DSS"))
 
1214
            #priority = ':'.join(("NONE", "+VERS-TLS1.1",
 
1215
            #                      "+AES-256-CBC", "+SHA1",
 
1216
            #                      "+COMP-NULL", "+CTYPE-OPENPGP",
 
1217
            #                      "+DHE-DSS"))
1138
1218
            # Use a fallback default, since this MUST be set.
1139
1219
            priority = self.server.gnutls_priority
1140
1220
            if priority is None:
1141
 
                priority = u"NORMAL"
 
1221
                priority = "NORMAL"
1142
1222
            (gnutls.library.functions
1143
1223
             .gnutls_priority_set_direct(session._c_object,
1144
1224
                                         priority, None))
1146
1226
            # Start communication using the Mandos protocol
1147
1227
            # Get protocol number
1148
1228
            line = self.request.makefile().readline()
1149
 
            logger.debug(u"Protocol version: %r", line)
 
1229
            logger.debug("Protocol version: %r", line)
1150
1230
            try:
1151
1231
                if int(line.strip().split()[0]) > 1:
1152
1232
                    raise RuntimeError
1153
 
            except (ValueError, IndexError, RuntimeError), error:
1154
 
                logger.error(u"Unknown protocol version: %s", error)
 
1233
            except (ValueError, IndexError, RuntimeError) as error:
 
1234
                logger.error("Unknown protocol version: %s", error)
1155
1235
                return
1156
1236
 
1157
1237
            # Start GnuTLS connection
1158
1238
            try:
1159
1239
                session.handshake()
1160
 
            except gnutls.errors.GNUTLSError, error:
1161
 
                logger.warning(u"Handshake failed: %s", error)
 
1240
            except gnutls.errors.GNUTLSError as error:
 
1241
                logger.warning("Handshake failed: %s", error)
1162
1242
                # Do not run session.bye() here: the session is not
1163
1243
                # established.  Just abandon the request.
1164
1244
                return
1165
 
            logger.debug(u"Handshake succeeded")
 
1245
            logger.debug("Handshake succeeded")
1166
1246
 
1167
1247
            approval_required = False
1168
1248
            try:
1169
1249
                try:
1170
1250
                    fpr = self.fingerprint(self.peer_certificate
1171
1251
                                           (session))
1172
 
                except (TypeError, gnutls.errors.GNUTLSError), error:
1173
 
                    logger.warning(u"Bad certificate: %s", error)
 
1252
                except (TypeError,
 
1253
                        gnutls.errors.GNUTLSError) as error:
 
1254
                    logger.warning("Bad certificate: %s", error)
1174
1255
                    return
1175
 
                logger.debug(u"Fingerprint: %s", fpr)
 
1256
                logger.debug("Fingerprint: %s", fpr)
1176
1257
 
1177
1258
                try:
1178
1259
                    client = ProxyClient(child_pipe, fpr,
1180
1261
                except KeyError:
1181
1262
                    return
1182
1263
                
1183
 
                if client.approved_delay:
1184
 
                    delay = client.approved_delay
 
1264
                if client.approval_delay:
 
1265
                    delay = client.approval_delay
1185
1266
                    client.approvals_pending += 1
1186
1267
                    approval_required = True
1187
1268
                
1188
1269
                while True:
1189
1270
                    if not client.enabled:
1190
 
                        logger.warning(u"Client %s is disabled",
 
1271
                        logger.info("Client %s is disabled",
1191
1272
                                       client.name)
1192
1273
                        if self.server.use_dbus:
1193
1274
                            # Emit D-Bus signal
1194
1275
                            client.Rejected("Disabled")                    
1195
1276
                        return
1196
1277
                    
1197
 
                    if client._approved or not client.approved_delay:
 
1278
                    if client._approved or not client.approval_delay:
1198
1279
                        #We are approved or approval is disabled
1199
1280
                        break
1200
1281
                    elif client._approved is None:
1201
 
                        logger.info(u"Client %s need approval",
 
1282
                        logger.info("Client %s needs approval",
1202
1283
                                    client.name)
1203
1284
                        if self.server.use_dbus:
1204
1285
                            # Emit D-Bus signal
1205
1286
                            client.NeedApproval(
1206
 
                                client.approved_delay_milliseconds(),
 
1287
                                client.approval_delay_milliseconds(),
1207
1288
                                client.approved_by_default)
1208
1289
                    else:
1209
 
                        logger.warning(u"Client %s was not approved",
 
1290
                        logger.warning("Client %s was not approved",
1210
1291
                                       client.name)
1211
1292
                        if self.server.use_dbus:
1212
1293
                            # Emit D-Bus signal
1213
 
                            client.Rejected("Disapproved")
 
1294
                            client.Rejected("Denied")
1214
1295
                        return
1215
1296
                    
1216
1297
                    #wait until timeout or approved
1227
1308
                                           client.name)
1228
1309
                            if self.server.use_dbus:
1229
1310
                                # Emit D-Bus signal
1230
 
                                client.Rejected("Time out")
 
1311
                                client.Rejected("Approval timed out")
1231
1312
                            return
1232
1313
                        else:
1233
1314
                            break
1238
1319
                while sent_size < len(client.secret):
1239
1320
                    try:
1240
1321
                        sent = session.send(client.secret[sent_size:])
1241
 
                    except (gnutls.errors.GNUTLSError), error:
 
1322
                    except gnutls.errors.GNUTLSError as error:
1242
1323
                        logger.warning("gnutls send failed")
1243
1324
                        return
1244
 
                    logger.debug(u"Sent: %d, remaining: %d",
 
1325
                    logger.debug("Sent: %d, remaining: %d",
1245
1326
                                 sent, len(client.secret)
1246
1327
                                 - (sent_size + sent))
1247
1328
                    sent_size += sent
1248
1329
 
1249
 
                logger.info(u"Sending secret to %s", client.name)
 
1330
                logger.info("Sending secret to %s", client.name)
1250
1331
                # bump the timeout as if seen
1251
1332
                client.checked_ok()
1252
1333
                if self.server.use_dbus:
1258
1339
                    client.approvals_pending -= 1
1259
1340
                try:
1260
1341
                    session.bye()
1261
 
                except (gnutls.errors.GNUTLSError), error:
1262
 
                    logger.warning("gnutls bye failed")
 
1342
                except gnutls.errors.GNUTLSError as error:
 
1343
                    logger.warning("GnuTLS bye failed")
1263
1344
    
1264
1345
    @staticmethod
1265
1346
    def peer_certificate(session):
1275
1356
                     .gnutls_certificate_get_peers
1276
1357
                     (session._c_object, ctypes.byref(list_size)))
1277
1358
        if not bool(cert_list) and list_size.value != 0:
1278
 
            raise gnutls.errors.GNUTLSError(u"error getting peer"
1279
 
                                            u" certificate")
 
1359
            raise gnutls.errors.GNUTLSError("error getting peer"
 
1360
                                            " certificate")
1280
1361
        if list_size.value == 0:
1281
1362
            return None
1282
1363
        cert = cert_list[0]
1308
1389
        if crtverify.value != 0:
1309
1390
            gnutls.library.functions.gnutls_openpgp_crt_deinit(crt)
1310
1391
            raise (gnutls.errors.CertificateSecurityError
1311
 
                   (u"Verify failed"))
 
1392
                   ("Verify failed"))
1312
1393
        # New buffer for the fingerprint
1313
1394
        buf = ctypes.create_string_buffer(20)
1314
1395
        buf_len = ctypes.c_size_t()
1321
1402
        # Convert the buffer to a Python bytestring
1322
1403
        fpr = ctypes.string_at(buf, buf_len.value)
1323
1404
        # Convert the bytestring to hexadecimal notation
1324
 
        hex_fpr = u''.join(u"%02X" % ord(char) for char in fpr)
 
1405
        hex_fpr = ''.join("%02X" % ord(char) for char in fpr)
1325
1406
        return hex_fpr
1326
1407
 
1327
1408
 
1355
1436
 
1356
1437
    def add_pipe(self, parent_pipe):
1357
1438
        """Dummy function; override as necessary"""
1358
 
        pass
 
1439
        raise NotImplementedError
1359
1440
 
1360
1441
class IPv6_TCPServer(MultiprocessingMixInWithPipe,
1361
1442
                     socketserver.TCPServer, object):
1379
1460
        bind to an address or port if they were not specified."""
1380
1461
        if self.interface is not None:
1381
1462
            if SO_BINDTODEVICE is None:
1382
 
                logger.error(u"SO_BINDTODEVICE does not exist;"
1383
 
                             u" cannot bind to interface %s",
 
1463
                logger.error("SO_BINDTODEVICE does not exist;"
 
1464
                             " cannot bind to interface %s",
1384
1465
                             self.interface)
1385
1466
            else:
1386
1467
                try:
1387
1468
                    self.socket.setsockopt(socket.SOL_SOCKET,
1388
1469
                                           SO_BINDTODEVICE,
1389
1470
                                           str(self.interface
1390
 
                                               + u'\0'))
1391
 
                except socket.error, error:
 
1471
                                               + '\0'))
 
1472
                except socket.error as error:
1392
1473
                    if error[0] == errno.EPERM:
1393
 
                        logger.error(u"No permission to"
1394
 
                                     u" bind to interface %s",
 
1474
                        logger.error("No permission to"
 
1475
                                     " bind to interface %s",
1395
1476
                                     self.interface)
1396
1477
                    elif error[0] == errno.ENOPROTOOPT:
1397
 
                        logger.error(u"SO_BINDTODEVICE not available;"
1398
 
                                     u" cannot bind to interface %s",
 
1478
                        logger.error("SO_BINDTODEVICE not available;"
 
1479
                                     " cannot bind to interface %s",
1399
1480
                                     self.interface)
1400
1481
                    else:
1401
1482
                        raise
1403
1484
        if self.server_address[0] or self.server_address[1]:
1404
1485
            if not self.server_address[0]:
1405
1486
                if self.address_family == socket.AF_INET6:
1406
 
                    any_address = u"::" # in6addr_any
 
1487
                    any_address = "::" # in6addr_any
1407
1488
                else:
1408
1489
                    any_address = socket.INADDR_ANY
1409
1490
                self.server_address = (any_address,
1458
1539
    def handle_ipc(self, source, condition, parent_pipe=None,
1459
1540
                   client_object=None):
1460
1541
        condition_names = {
1461
 
            gobject.IO_IN: u"IN",   # There is data to read.
1462
 
            gobject.IO_OUT: u"OUT", # Data can be written (without
 
1542
            gobject.IO_IN: "IN",   # There is data to read.
 
1543
            gobject.IO_OUT: "OUT", # Data can be written (without
1463
1544
                                    # blocking).
1464
 
            gobject.IO_PRI: u"PRI", # There is urgent data to read.
1465
 
            gobject.IO_ERR: u"ERR", # Error condition.
1466
 
            gobject.IO_HUP: u"HUP"  # Hung up (the connection has been
 
1545
            gobject.IO_PRI: "PRI", # There is urgent data to read.
 
1546
            gobject.IO_ERR: "ERR", # Error condition.
 
1547
            gobject.IO_HUP: "HUP"  # Hung up (the connection has been
1467
1548
                                    # broken, usually for pipes and
1468
1549
                                    # sockets).
1469
1550
            }
1471
1552
                                       for cond, name in
1472
1553
                                       condition_names.iteritems()
1473
1554
                                       if cond & condition)
1474
 
        logger.debug(u"Handling IPC: FD = %d, condition = %s", source,
1475
 
                     conditions_string)
1476
 
 
1477
1555
        # error or the other end of multiprocessing.Pipe has closed
1478
1556
        if condition & (gobject.IO_ERR | condition & gobject.IO_HUP):
1479
1557
            return False
1480
1558
        
1481
1559
        # Read a request from the child
1482
1560
        request = parent_pipe.recv()
1483
 
        logger.debug(u"IPC request: %s", repr(request))
1484
1561
        command = request[0]
1485
1562
        
1486
1563
        if command == 'init':
1492
1569
                    client = c
1493
1570
                    break
1494
1571
            else:
1495
 
                logger.warning(u"Client not found for fingerprint: %s, ad"
1496
 
                               u"dress: %s", fpr, address)
 
1572
                logger.info("Client not found for fingerprint: %s, ad"
 
1573
                            "dress: %s", fpr, address)
1497
1574
                if self.use_dbus:
1498
1575
                    # Emit D-Bus signal
1499
 
                    mandos_dbus_service.ClientNotFound(fpr, address)
 
1576
                    mandos_dbus_service.ClientNotFound(fpr, address[0])
1500
1577
                parent_pipe.send(False)
1501
1578
                return False
1502
1579
            
1533
1610
def string_to_delta(interval):
1534
1611
    """Parse a string and return a datetime.timedelta
1535
1612
    
1536
 
    >>> string_to_delta(u'7d')
 
1613
    >>> string_to_delta('7d')
1537
1614
    datetime.timedelta(7)
1538
 
    >>> string_to_delta(u'60s')
 
1615
    >>> string_to_delta('60s')
1539
1616
    datetime.timedelta(0, 60)
1540
 
    >>> string_to_delta(u'60m')
 
1617
    >>> string_to_delta('60m')
1541
1618
    datetime.timedelta(0, 3600)
1542
 
    >>> string_to_delta(u'24h')
 
1619
    >>> string_to_delta('24h')
1543
1620
    datetime.timedelta(1)
1544
 
    >>> string_to_delta(u'1w')
 
1621
    >>> string_to_delta('1w')
1545
1622
    datetime.timedelta(7)
1546
 
    >>> string_to_delta(u'5m 30s')
 
1623
    >>> string_to_delta('5m 30s')
1547
1624
    datetime.timedelta(0, 330)
1548
1625
    """
1549
1626
    timevalue = datetime.timedelta(0)
1551
1628
        try:
1552
1629
            suffix = unicode(s[-1])
1553
1630
            value = int(s[:-1])
1554
 
            if suffix == u"d":
 
1631
            if suffix == "d":
1555
1632
                delta = datetime.timedelta(value)
1556
 
            elif suffix == u"s":
 
1633
            elif suffix == "s":
1557
1634
                delta = datetime.timedelta(0, value)
1558
 
            elif suffix == u"m":
 
1635
            elif suffix == "m":
1559
1636
                delta = datetime.timedelta(0, 0, 0, 0, value)
1560
 
            elif suffix == u"h":
 
1637
            elif suffix == "h":
1561
1638
                delta = datetime.timedelta(0, 0, 0, 0, 0, value)
1562
 
            elif suffix == u"w":
 
1639
            elif suffix == "w":
1563
1640
                delta = datetime.timedelta(0, 0, 0, 0, 0, 0, value)
1564
1641
            else:
1565
 
                raise ValueError(u"Unknown suffix %r" % suffix)
1566
 
        except (ValueError, IndexError), e:
1567
 
            raise ValueError(e.message)
 
1642
                raise ValueError("Unknown suffix %r" % suffix)
 
1643
        except (ValueError, IndexError) as e:
 
1644
            raise ValueError(*(e.args))
1568
1645
        timevalue += delta
1569
1646
    return timevalue
1570
1647
 
1576
1653
    global if_nametoindex
1577
1654
    try:
1578
1655
        if_nametoindex = (ctypes.cdll.LoadLibrary
1579
 
                          (ctypes.util.find_library(u"c"))
 
1656
                          (ctypes.util.find_library("c"))
1580
1657
                          .if_nametoindex)
1581
1658
    except (OSError, AttributeError):
1582
 
        logger.warning(u"Doing if_nametoindex the hard way")
 
1659
        logger.warning("Doing if_nametoindex the hard way")
1583
1660
        def if_nametoindex(interface):
1584
1661
            "Get an interface index the hard way, i.e. using fcntl()"
1585
1662
            SIOCGIFINDEX = 0x8933  # From /usr/include/linux/sockios.h
1586
1663
            with contextlib.closing(socket.socket()) as s:
1587
1664
                ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
1588
 
                                    struct.pack(str(u"16s16x"),
 
1665
                                    struct.pack(str("16s16x"),
1589
1666
                                                interface))
1590
 
            interface_index = struct.unpack(str(u"I"),
 
1667
            interface_index = struct.unpack(str("I"),
1591
1668
                                            ifreq[16:20])[0]
1592
1669
            return interface_index
1593
1670
    return if_nametoindex(interface)
1601
1678
        sys.exit()
1602
1679
    os.setsid()
1603
1680
    if not nochdir:
1604
 
        os.chdir(u"/")
 
1681
        os.chdir("/")
1605
1682
    if os.fork():
1606
1683
        sys.exit()
1607
1684
    if not noclose:
1609
1686
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
1610
1687
        if not stat.S_ISCHR(os.fstat(null).st_mode):
1611
1688
            raise OSError(errno.ENODEV,
1612
 
                          u"%s not a character device"
 
1689
                          "%s not a character device"
1613
1690
                          % os.path.devnull)
1614
1691
        os.dup2(null, sys.stdin.fileno())
1615
1692
        os.dup2(null, sys.stdout.fileno())
1623
1700
    ##################################################################
1624
1701
    # Parsing of options, both command line and config file
1625
1702
    
1626
 
    parser = optparse.OptionParser(version = "%%prog %s" % version)
1627
 
    parser.add_option("-i", u"--interface", type=u"string",
1628
 
                      metavar="IF", help=u"Bind to interface IF")
1629
 
    parser.add_option("-a", u"--address", type=u"string",
1630
 
                      help=u"Address to listen for requests on")
1631
 
    parser.add_option("-p", u"--port", type=u"int",
1632
 
                      help=u"Port number to receive requests on")
1633
 
    parser.add_option("--check", action=u"store_true",
1634
 
                      help=u"Run self-test")
1635
 
    parser.add_option("--debug", action=u"store_true",
1636
 
                      help=u"Debug mode; run in foreground and log to"
1637
 
                      u" terminal")
1638
 
    parser.add_option("--debuglevel", type=u"string", metavar="Level",
1639
 
                      help=u"Debug level for stdout output")
1640
 
    parser.add_option("--priority", type=u"string", help=u"GnuTLS"
1641
 
                      u" priority string (see GnuTLS documentation)")
1642
 
    parser.add_option("--servicename", type=u"string",
1643
 
                      metavar=u"NAME", help=u"Zeroconf service name")
1644
 
    parser.add_option("--configdir", type=u"string",
1645
 
                      default=u"/etc/mandos", metavar=u"DIR",
1646
 
                      help=u"Directory to search for configuration"
1647
 
                      u" files")
1648
 
    parser.add_option("--no-dbus", action=u"store_false",
1649
 
                      dest=u"use_dbus", help=u"Do not provide D-Bus"
1650
 
                      u" system bus interface")
1651
 
    parser.add_option("--no-ipv6", action=u"store_false",
1652
 
                      dest=u"use_ipv6", help=u"Do not use IPv6")
1653
 
    options = parser.parse_args()[0]
 
1703
    parser = argparse.ArgumentParser()
 
1704
    parser.add_argument("-v", "--version", action="version",
 
1705
                        version = "%%(prog)s %s" % version,
 
1706
                        help="show version number and exit")
 
1707
    parser.add_argument("-i", "--interface", metavar="IF",
 
1708
                        help="Bind to interface IF")
 
1709
    parser.add_argument("-a", "--address",
 
1710
                        help="Address to listen for requests on")
 
1711
    parser.add_argument("-p", "--port", type=int,
 
1712
                        help="Port number to receive requests on")
 
1713
    parser.add_argument("--check", action="store_true",
 
1714
                        help="Run self-test")
 
1715
    parser.add_argument("--debug", action="store_true",
 
1716
                        help="Debug mode; run in foreground and log"
 
1717
                        " to terminal")
 
1718
    parser.add_argument("--debuglevel", metavar="LEVEL",
 
1719
                        help="Debug level for stdout output")
 
1720
    parser.add_argument("--priority", help="GnuTLS"
 
1721
                        " priority string (see GnuTLS documentation)")
 
1722
    parser.add_argument("--servicename",
 
1723
                        metavar="NAME", help="Zeroconf service name")
 
1724
    parser.add_argument("--configdir",
 
1725
                        default="/etc/mandos", metavar="DIR",
 
1726
                        help="Directory to search for configuration"
 
1727
                        " files")
 
1728
    parser.add_argument("--no-dbus", action="store_false",
 
1729
                        dest="use_dbus", help="Do not provide D-Bus"
 
1730
                        " system bus interface")
 
1731
    parser.add_argument("--no-ipv6", action="store_false",
 
1732
                        dest="use_ipv6", help="Do not use IPv6")
 
1733
    options = parser.parse_args()
1654
1734
    
1655
1735
    if options.check:
1656
1736
        import doctest
1658
1738
        sys.exit()
1659
1739
    
1660
1740
    # Default values for config file for server-global settings
1661
 
    server_defaults = { u"interface": u"",
1662
 
                        u"address": u"",
1663
 
                        u"port": u"",
1664
 
                        u"debug": u"False",
1665
 
                        u"priority":
1666
 
                        u"SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP",
1667
 
                        u"servicename": u"Mandos",
1668
 
                        u"use_dbus": u"True",
1669
 
                        u"use_ipv6": u"True",
1670
 
                        u"debuglevel": u"",
 
1741
    server_defaults = { "interface": "",
 
1742
                        "address": "",
 
1743
                        "port": "",
 
1744
                        "debug": "False",
 
1745
                        "priority":
 
1746
                        "SECURE256:!CTYPE-X.509:+CTYPE-OPENPGP",
 
1747
                        "servicename": "Mandos",
 
1748
                        "use_dbus": "True",
 
1749
                        "use_ipv6": "True",
 
1750
                        "debuglevel": "",
1671
1751
                        }
1672
1752
    
1673
1753
    # Parse config file for server-global settings
1674
1754
    server_config = configparser.SafeConfigParser(server_defaults)
1675
1755
    del server_defaults
1676
1756
    server_config.read(os.path.join(options.configdir,
1677
 
                                    u"mandos.conf"))
 
1757
                                    "mandos.conf"))
1678
1758
    # Convert the SafeConfigParser object to a dict
1679
1759
    server_settings = server_config.defaults()
1680
1760
    # Use the appropriate methods on the non-string config options
1681
 
    for option in (u"debug", u"use_dbus", u"use_ipv6"):
1682
 
        server_settings[option] = server_config.getboolean(u"DEFAULT",
 
1761
    for option in ("debug", "use_dbus", "use_ipv6"):
 
1762
        server_settings[option] = server_config.getboolean("DEFAULT",
1683
1763
                                                           option)
1684
1764
    if server_settings["port"]:
1685
 
        server_settings["port"] = server_config.getint(u"DEFAULT",
1686
 
                                                       u"port")
 
1765
        server_settings["port"] = server_config.getint("DEFAULT",
 
1766
                                                       "port")
1687
1767
    del server_config
1688
1768
    
1689
1769
    # Override the settings from the config file with command line
1690
1770
    # options, if set.
1691
 
    for option in (u"interface", u"address", u"port", u"debug",
1692
 
                   u"priority", u"servicename", u"configdir",
1693
 
                   u"use_dbus", u"use_ipv6", u"debuglevel"):
 
1771
    for option in ("interface", "address", "port", "debug",
 
1772
                   "priority", "servicename", "configdir",
 
1773
                   "use_dbus", "use_ipv6", "debuglevel"):
1694
1774
        value = getattr(options, option)
1695
1775
        if value is not None:
1696
1776
            server_settings[option] = value
1704
1784
    ##################################################################
1705
1785
    
1706
1786
    # For convenience
1707
 
    debug = server_settings[u"debug"]
1708
 
    debuglevel = server_settings[u"debuglevel"]
1709
 
    use_dbus = server_settings[u"use_dbus"]
1710
 
    use_ipv6 = server_settings[u"use_ipv6"]
 
1787
    debug = server_settings["debug"]
 
1788
    debuglevel = server_settings["debuglevel"]
 
1789
    use_dbus = server_settings["use_dbus"]
 
1790
    use_ipv6 = server_settings["use_ipv6"]
1711
1791
 
1712
 
    if server_settings[u"servicename"] != u"Mandos":
 
1792
    if server_settings["servicename"] != "Mandos":
1713
1793
        syslogger.setFormatter(logging.Formatter
1714
 
                               (u'Mandos (%s) [%%(process)d]:'
1715
 
                                u' %%(levelname)s: %%(message)s'
1716
 
                                % server_settings[u"servicename"]))
 
1794
                               ('Mandos (%s) [%%(process)d]:'
 
1795
                                ' %%(levelname)s: %%(message)s'
 
1796
                                % server_settings["servicename"]))
1717
1797
    
1718
1798
    # Parse config file with clients
1719
 
    client_defaults = { u"timeout": u"1h",
1720
 
                        u"interval": u"5m",
1721
 
                        u"checker": u"fping -q -- %%(host)s",
1722
 
                        u"host": u"",
1723
 
                        u"approved_delay": u"0s",
1724
 
                        u"approved_duration": u"1s",
 
1799
    client_defaults = { "timeout": "1h",
 
1800
                        "interval": "5m",
 
1801
                        "checker": "fping -q -- %%(host)s",
 
1802
                        "host": "",
 
1803
                        "approval_delay": "0s",
 
1804
                        "approval_duration": "1s",
1725
1805
                        }
1726
1806
    client_config = configparser.SafeConfigParser(client_defaults)
1727
 
    client_config.read(os.path.join(server_settings[u"configdir"],
1728
 
                                    u"clients.conf"))
 
1807
    client_config.read(os.path.join(server_settings["configdir"],
 
1808
                                    "clients.conf"))
1729
1809
    
1730
1810
    global mandos_dbus_service
1731
1811
    mandos_dbus_service = None
1732
1812
    
1733
 
    tcp_server = MandosServer((server_settings[u"address"],
1734
 
                               server_settings[u"port"]),
 
1813
    tcp_server = MandosServer((server_settings["address"],
 
1814
                               server_settings["port"]),
1735
1815
                              ClientHandler,
1736
 
                              interface=(server_settings[u"interface"]
 
1816
                              interface=(server_settings["interface"]
1737
1817
                                         or None),
1738
1818
                              use_ipv6=use_ipv6,
1739
1819
                              gnutls_priority=
1740
 
                              server_settings[u"priority"],
 
1820
                              server_settings["priority"],
1741
1821
                              use_dbus=use_dbus)
1742
 
    pidfilename = u"/var/run/mandos.pid"
1743
 
    try:
1744
 
        pidfile = open(pidfilename, u"w")
1745
 
    except IOError:
1746
 
        logger.error(u"Could not open file %r", pidfilename)
 
1822
    if not debug:
 
1823
        pidfilename = "/var/run/mandos.pid"
 
1824
        try:
 
1825
            pidfile = open(pidfilename, "w")
 
1826
        except IOError:
 
1827
            logger.error("Could not open file %r", pidfilename)
1747
1828
    
1748
1829
    try:
1749
 
        uid = pwd.getpwnam(u"_mandos").pw_uid
1750
 
        gid = pwd.getpwnam(u"_mandos").pw_gid
 
1830
        uid = pwd.getpwnam("_mandos").pw_uid
 
1831
        gid = pwd.getpwnam("_mandos").pw_gid
1751
1832
    except KeyError:
1752
1833
        try:
1753
 
            uid = pwd.getpwnam(u"mandos").pw_uid
1754
 
            gid = pwd.getpwnam(u"mandos").pw_gid
 
1834
            uid = pwd.getpwnam("mandos").pw_uid
 
1835
            gid = pwd.getpwnam("mandos").pw_gid
1755
1836
        except KeyError:
1756
1837
            try:
1757
 
                uid = pwd.getpwnam(u"nobody").pw_uid
1758
 
                gid = pwd.getpwnam(u"nobody").pw_gid
 
1838
                uid = pwd.getpwnam("nobody").pw_uid
 
1839
                gid = pwd.getpwnam("nobody").pw_gid
1759
1840
            except KeyError:
1760
1841
                uid = 65534
1761
1842
                gid = 65534
1762
1843
    try:
1763
1844
        os.setgid(gid)
1764
1845
        os.setuid(uid)
1765
 
    except OSError, error:
 
1846
    except OSError as error:
1766
1847
        if error[0] != errno.EPERM:
1767
1848
            raise error
1768
1849
    
1769
 
    # Enable all possible GnuTLS debugging
1770
 
 
1771
 
 
1772
1850
    if not debug and not debuglevel:
1773
1851
        syslogger.setLevel(logging.WARNING)
1774
1852
        console.setLevel(logging.WARNING)
1778
1856
        console.setLevel(level)
1779
1857
 
1780
1858
    if debug:
 
1859
        # Enable all possible GnuTLS debugging
 
1860
        
1781
1861
        # "Use a log level over 10 to enable all debugging options."
1782
1862
        # - GnuTLS manual
1783
1863
        gnutls.library.functions.gnutls_global_set_log_level(11)
1784
1864
        
1785
1865
        @gnutls.library.types.gnutls_log_func
1786
1866
        def debug_gnutls(level, string):
1787
 
            logger.debug(u"GnuTLS: %s", string[:-1])
 
1867
            logger.debug("GnuTLS: %s", string[:-1])
1788
1868
        
1789
1869
        (gnutls.library.functions
1790
1870
         .gnutls_global_set_log_function(debug_gnutls))
1791
 
 
 
1871
        
1792
1872
        # Redirect stdin so all checkers get /dev/null
1793
1873
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
1794
1874
        os.dup2(null, sys.stdin.fileno())
1797
1877
    else:
1798
1878
        # No console logging
1799
1879
        logger.removeHandler(console)
1800
 
 
 
1880
    
 
1881
    # Need to fork before connecting to D-Bus
 
1882
    if not debug:
 
1883
        # Close all input and output, do double fork, etc.
 
1884
        daemon()
1801
1885
    
1802
1886
    global main_loop
1803
1887
    # From the Avahi example code
1807
1891
    # End of Avahi example code
1808
1892
    if use_dbus:
1809
1893
        try:
1810
 
            bus_name = dbus.service.BusName(u"se.bsnet.fukt.Mandos",
 
1894
            bus_name = dbus.service.BusName("se.bsnet.fukt.Mandos",
1811
1895
                                            bus, do_not_queue=True)
1812
 
        except dbus.exceptions.NameExistsException, e:
1813
 
            logger.error(unicode(e) + u", disabling D-Bus")
 
1896
        except dbus.exceptions.NameExistsException as e:
 
1897
            logger.error(unicode(e) + ", disabling D-Bus")
1814
1898
            use_dbus = False
1815
 
            server_settings[u"use_dbus"] = False
 
1899
            server_settings["use_dbus"] = False
1816
1900
            tcp_server.use_dbus = False
1817
1901
    protocol = avahi.PROTO_INET6 if use_ipv6 else avahi.PROTO_INET
1818
 
    service = AvahiService(name = server_settings[u"servicename"],
1819
 
                           servicetype = u"_mandos._tcp",
 
1902
    service = AvahiService(name = server_settings["servicename"],
 
1903
                           servicetype = "_mandos._tcp",
1820
1904
                           protocol = protocol, bus = bus)
1821
1905
    if server_settings["interface"]:
1822
1906
        service.interface = (if_nametoindex
1823
 
                             (str(server_settings[u"interface"])))
1824
 
 
1825
 
    if not debug:
1826
 
        # Close all input and output, do double fork, etc.
1827
 
        daemon()
1828
 
        
 
1907
                             (str(server_settings["interface"])))
 
1908
    
1829
1909
    global multiprocessing_manager
1830
1910
    multiprocessing_manager = multiprocessing.Manager()
1831
1911
    
1850
1930
                        client_config, section)))
1851
1931
            for section in client_config.sections()))
1852
1932
    if not tcp_server.clients:
1853
 
        logger.warning(u"No clients defined")
 
1933
        logger.warning("No clients defined")
1854
1934
        
1855
 
    try:
1856
 
        with pidfile:
1857
 
            pid = os.getpid()
1858
 
            pidfile.write(str(pid) + "\n")
1859
 
        del pidfile
1860
 
    except IOError:
1861
 
        logger.error(u"Could not write to file %r with PID %d",
1862
 
                     pidfilename, pid)
1863
 
    except NameError:
1864
 
        # "pidfile" was never created
1865
 
        pass
1866
 
    del pidfilename
1867
 
    
1868
1935
    if not debug:
 
1936
        try:
 
1937
            with pidfile:
 
1938
                pid = os.getpid()
 
1939
                pidfile.write(str(pid) + "\n".encode("utf-8"))
 
1940
            del pidfile
 
1941
        except IOError:
 
1942
            logger.error("Could not write to file %r with PID %d",
 
1943
                         pidfilename, pid)
 
1944
        except NameError:
 
1945
            # "pidfile" was never created
 
1946
            pass
 
1947
        del pidfilename
 
1948
        
1869
1949
        signal.signal(signal.SIGINT, signal.SIG_IGN)
 
1950
 
1870
1951
    signal.signal(signal.SIGHUP, lambda signum, frame: sys.exit())
1871
1952
    signal.signal(signal.SIGTERM, lambda signum, frame: sys.exit())
1872
1953
    
1874
1955
        class MandosDBusService(dbus.service.Object):
1875
1956
            """A D-Bus proxy object"""
1876
1957
            def __init__(self):
1877
 
                dbus.service.Object.__init__(self, bus, u"/")
1878
 
            _interface = u"se.bsnet.fukt.Mandos"
 
1958
                dbus.service.Object.__init__(self, bus, "/")
 
1959
            _interface = "se.bsnet.fukt.Mandos"
1879
1960
            
1880
 
            @dbus.service.signal(_interface, signature=u"o")
 
1961
            @dbus.service.signal(_interface, signature="o")
1881
1962
            def ClientAdded(self, objpath):
1882
1963
                "D-Bus signal"
1883
1964
                pass
1884
1965
            
1885
 
            @dbus.service.signal(_interface, signature=u"ss")
 
1966
            @dbus.service.signal(_interface, signature="ss")
1886
1967
            def ClientNotFound(self, fingerprint, address):
1887
1968
                "D-Bus signal"
1888
1969
                pass
1889
1970
            
1890
 
            @dbus.service.signal(_interface, signature=u"os")
 
1971
            @dbus.service.signal(_interface, signature="os")
1891
1972
            def ClientRemoved(self, objpath, name):
1892
1973
                "D-Bus signal"
1893
1974
                pass
1894
1975
            
1895
 
            @dbus.service.method(_interface, out_signature=u"ao")
 
1976
            @dbus.service.method(_interface, out_signature="ao")
1896
1977
            def GetAllClients(self):
1897
1978
                "D-Bus method"
1898
1979
                return dbus.Array(c.dbus_object_path
1899
1980
                                  for c in tcp_server.clients)
1900
1981
            
1901
1982
            @dbus.service.method(_interface,
1902
 
                                 out_signature=u"a{oa{sv}}")
 
1983
                                 out_signature="a{oa{sv}}")
1903
1984
            def GetAllClientsWithProperties(self):
1904
1985
                "D-Bus method"
1905
1986
                return dbus.Dictionary(
1906
 
                    ((c.dbus_object_path, c.GetAll(u""))
 
1987
                    ((c.dbus_object_path, c.GetAll(""))
1907
1988
                     for c in tcp_server.clients),
1908
 
                    signature=u"oa{sv}")
 
1989
                    signature="oa{sv}")
1909
1990
            
1910
 
            @dbus.service.method(_interface, in_signature=u"o")
 
1991
            @dbus.service.method(_interface, in_signature="o")
1911
1992
            def RemoveClient(self, object_path):
1912
1993
                "D-Bus method"
1913
1994
                for c in tcp_server.clients:
1955
2036
    # Find out what port we got
1956
2037
    service.port = tcp_server.socket.getsockname()[1]
1957
2038
    if use_ipv6:
1958
 
        logger.info(u"Now listening on address %r, port %d,"
 
2039
        logger.info("Now listening on address %r, port %d,"
1959
2040
                    " flowinfo %d, scope_id %d"
1960
2041
                    % tcp_server.socket.getsockname())
1961
2042
    else:                       # IPv4
1962
 
        logger.info(u"Now listening on address %r, port %d"
 
2043
        logger.info("Now listening on address %r, port %d"
1963
2044
                    % tcp_server.socket.getsockname())
1964
2045
    
1965
2046
    #service.interface = tcp_server.socket.getsockname()[3]
1968
2049
        # From the Avahi example code
1969
2050
        try:
1970
2051
            service.activate()
1971
 
        except dbus.exceptions.DBusException, error:
1972
 
            logger.critical(u"DBusException: %s", error)
 
2052
        except dbus.exceptions.DBusException as error:
 
2053
            logger.critical("DBusException: %s", error)
1973
2054
            cleanup()
1974
2055
            sys.exit(1)
1975
2056
        # End of Avahi example code
1979
2060
                             (tcp_server.handle_request
1980
2061
                              (*args[2:], **kwargs) or True))
1981
2062
        
1982
 
        logger.debug(u"Starting main loop")
 
2063
        logger.debug("Starting main loop")
1983
2064
        main_loop.run()
1984
 
    except AvahiError, error:
1985
 
        logger.critical(u"AvahiError: %s", error)
 
2065
    except AvahiError as error:
 
2066
        logger.critical("AvahiError: %s", error)
1986
2067
        cleanup()
1987
2068
        sys.exit(1)
1988
2069
    except KeyboardInterrupt:
1989
2070
        if debug:
1990
 
            print >> sys.stderr
1991
 
        logger.debug(u"Server received KeyboardInterrupt")
1992
 
    logger.debug(u"Server exiting")
 
2071
            print("", file=sys.stderr)
 
2072
        logger.debug("Server received KeyboardInterrupt")
 
2073
    logger.debug("Server exiting")
1993
2074
    # Must run before the D-Bus bus name gets deregistered
1994
2075
    cleanup()
1995
2076