194
208
        self.group.Commit()
 
195
209
    def entry_group_state_changed(self, state, error):
 
196
210
        """Derived from the Avahi example code"""
 
197
 
        logger.debug(u"Avahi state change: %i", state)
 
 
211
        logger.debug("Avahi entry group state change: %i", state)
 
199
213
        if state == avahi.ENTRY_GROUP_ESTABLISHED:
 
200
 
            logger.debug(u"Zeroconf service established.")
 
 
214
            logger.debug("Zeroconf service established.")
 
201
215
        elif state == avahi.ENTRY_GROUP_COLLISION:
 
202
 
            logger.warning(u"Zeroconf service name collision.")
 
 
216
            logger.info("Zeroconf service name collision.")
 
204
218
        elif state == avahi.ENTRY_GROUP_FAILURE:
 
205
 
            logger.critical(u"Avahi: Error in group state changed %s",
 
 
219
            logger.critical("Avahi: Error in group state changed %s",
 
207
 
            raise AvahiGroupError(u"State changed: %s"
 
 
221
            raise AvahiGroupError("State changed: %s"
 
208
222
                                  % unicode(error))
 
209
223
    def cleanup(self):
 
210
224
        """Derived from the Avahi example code"""
 
211
225
        if self.group is not None:
 
 
228
            except (dbus.exceptions.UnknownMethodException,
 
 
229
                    dbus.exceptions.DBusException) as e:
 
213
231
            self.group = None
 
214
 
    def server_state_changed(self, state):
 
 
233
    def server_state_changed(self, state, error=None):
 
215
234
        """Derived from the Avahi example code"""
 
216
 
        if state == avahi.SERVER_COLLISION:
 
217
 
            logger.error(u"Zeroconf server name collision")
 
 
235
        logger.debug("Avahi server state change: %i", state)
 
 
236
        bad_states = { avahi.SERVER_INVALID:
 
 
237
                           "Zeroconf server invalid",
 
 
238
                       avahi.SERVER_REGISTERING: None,
 
 
239
                       avahi.SERVER_COLLISION:
 
 
240
                           "Zeroconf server name collision",
 
 
241
                       avahi.SERVER_FAILURE:
 
 
242
                           "Zeroconf server failure" }
 
 
243
        if state in bad_states:
 
 
244
            if bad_states[state] is not None:
 
 
246
                    logger.error(bad_states[state])
 
 
248
                    logger.error(bad_states[state] + ": %r", error)
 
219
250
        elif state == avahi.SERVER_RUNNING:
 
 
254
                logger.debug("Unknown state: %r", state)
 
 
256
                logger.debug("Unknown state: %r: %r", state, error)
 
221
257
    def activate(self):
 
222
258
        """Derived from the Avahi example code"""
 
223
259
        if self.server is None:
 
224
260
            self.server = dbus.Interface(
 
225
261
                self.bus.get_object(avahi.DBUS_NAME,
 
226
 
                                    avahi.DBUS_PATH_SERVER),
 
 
262
                                    avahi.DBUS_PATH_SERVER,
 
 
263
                                    follow_name_owner_changes=True),
 
227
264
                avahi.DBUS_INTERFACE_SERVER)
 
228
 
        self.server.connect_to_signal(u"StateChanged",
 
 
265
        self.server.connect_to_signal("StateChanged",
 
229
266
                                 self.server_state_changed)
 
230
267
        self.server_state_changed(self.server.GetState())
 
 
269
class AvahiServiceToSyslog(AvahiService):
 
 
271
        """Add the new name to the syslog messages"""
 
 
272
        ret = AvahiService.rename(self)
 
 
273
        syslogger.setFormatter(logging.Formatter
 
 
274
                               ('Mandos (%s) [%%(process)d]:'
 
 
275
                                ' %%(levelname)s: %%(message)s'
 
 
279
def _timedelta_to_milliseconds(td):
 
 
280
    "Convert a datetime.timedelta() to milliseconds"
 
 
281
    return ((td.days * 24 * 60 * 60 * 1000)
 
 
282
            + (td.seconds * 1000)
 
 
283
            + (td.microseconds // 1000))
 
233
285
class Client(object):
 
234
286
    """A representation of a client host served by this server.
 
237
 
    name:       string; from the config file, used in log messages and
 
 
289
    _approved:   bool(); 'None' if not yet approved/disapproved
 
 
290
    approval_delay: datetime.timedelta(); Time to wait for approval
 
 
291
    approval_duration: datetime.timedelta(); Duration of one approval
 
 
292
    checker:    subprocess.Popen(); a running checker process used
 
 
293
                                    to see if the client lives.
 
 
294
                                    'None' if no process is running.
 
 
295
    checker_callback_tag: a gobject event source tag, or None
 
 
296
    checker_command: string; External command which is run to check
 
 
297
                     if client lives.  %() expansions are done at
 
 
298
                     runtime with vars(self) as dict, so that for
 
 
299
                     instance %(name)s can be used in the command.
 
 
300
    checker_initiator_tag: a gobject event source tag, or None
 
 
301
    created:    datetime.datetime(); (UTC) object creation
 
 
302
    client_structure: Object describing what attributes a client has
 
 
303
                      and is used for storing the client at exit
 
 
304
    current_checker_command: string; current running checker_command
 
 
305
    disable_initiator_tag: a gobject event source tag, or None
 
239
307
    fingerprint: string (40 or 32 hexadecimal digits); used to
 
240
308
                 uniquely identify the client
 
241
 
    secret:     bytestring; sent verbatim (over TLS) to client
 
242
309
    host:       string; available for use by the checker command
 
243
 
    created:    datetime.datetime(); (UTC) object creation
 
 
310
    interval:   datetime.timedelta(); How often to start a new checker
 
 
311
    last_approval_request: datetime.datetime(); (UTC) or None
 
 
312
    last_checked_ok: datetime.datetime(); (UTC) or None
 
 
313
    last_checker_status: integer between 0 and 255 reflecting exit status
 
 
314
                         of last checker. -1 reflect crashed checker,
 
244
316
    last_enabled: datetime.datetime(); (UTC)
 
246
 
    last_checked_ok: datetime.datetime(); (UTC) or None
 
 
317
    name:       string; from the config file, used in log messages and
 
 
319
    secret:     bytestring; sent verbatim (over TLS) to client
 
247
320
    timeout:    datetime.timedelta(); How long from last_checked_ok
 
248
321
                                      until this client is disabled
 
249
 
    interval:   datetime.timedelta(); How often to start a new checker
 
250
 
    disable_hook:  If set, called by disable() as disable_hook(self)
 
251
 
    checker:    subprocess.Popen(); a running checker process used
 
252
 
                                    to see if the client lives.
 
253
 
                                    'None' if no process is running.
 
254
 
    checker_initiator_tag: a gobject event source tag, or None
 
255
 
    disable_initiator_tag: - '' -
 
256
 
    checker_callback_tag:  - '' -
 
257
 
    checker_command: string; External command which is run to check if
 
258
 
                     client lives.  %() expansions are done at
 
259
 
                     runtime with vars(self) as dict, so that for
 
260
 
                     instance %(name)s can be used in the command.
 
261
 
    current_checker_command: string; current running checker_command
 
262
 
    approved_delay: datetime.timedelta(); Time to wait for approval
 
263
 
    _approved:   bool(); 'None' if not yet approved/disapproved
 
264
 
    approved_duration: datetime.timedelta(); Duration of one approval
 
 
322
    extended_timeout:   extra long timeout when password has been sent
 
 
323
    runtime_expansions: Allowed attributes for runtime expansion.
 
 
324
    expires:    datetime.datetime(); time (UTC) when a client will be
 
268
 
    def _timedelta_to_milliseconds(td):
 
269
 
        "Convert a datetime.timedelta() to milliseconds"
 
270
 
        return ((td.days * 24 * 60 * 60 * 1000)
 
271
 
                + (td.seconds * 1000)
 
272
 
                + (td.microseconds // 1000))
 
 
328
    runtime_expansions = ("approval_delay", "approval_duration",
 
 
329
                          "created", "enabled", "fingerprint",
 
 
330
                          "host", "interval", "last_checked_ok",
 
 
331
                          "last_enabled", "name", "timeout")
 
274
333
    def timeout_milliseconds(self):
 
275
334
        "Return the 'timeout' attribute in milliseconds"
 
276
 
        return self._timedelta_to_milliseconds(self.timeout)
 
 
335
        return _timedelta_to_milliseconds(self.timeout)
 
 
337
    def extended_timeout_milliseconds(self):
 
 
338
        "Return the 'extended_timeout' attribute in milliseconds"
 
 
339
        return _timedelta_to_milliseconds(self.extended_timeout)
 
278
341
    def interval_milliseconds(self):
 
279
342
        "Return the 'interval' attribute in milliseconds"
 
280
 
        return self._timedelta_to_milliseconds(self.interval)
 
282
 
    def approved_delay_milliseconds(self):
 
283
 
        return self._timedelta_to_milliseconds(self.approved_delay)
 
285
 
    def __init__(self, name = None, disable_hook=None, config=None):
 
 
343
        return _timedelta_to_milliseconds(self.interval)
 
 
345
    def approval_delay_milliseconds(self):
 
 
346
        return _timedelta_to_milliseconds(self.approval_delay)
 
 
348
    def __init__(self, name = None, config=None):
 
286
349
        """Note: the 'checker' key in 'config' sets the
 
287
350
        'checker_command' attribute and *not* the 'checker'
 
290
353
        if config is None:
 
292
 
        logger.debug(u"Creating client %r", self.name)
 
 
355
        logger.debug("Creating client %r", self.name)
 
293
356
        # Uppercase and remove spaces from fingerprint for later
 
294
357
        # comparison purposes with return value from the fingerprint()
 
296
 
        self.fingerprint = (config[u"fingerprint"].upper()
 
298
 
        logger.debug(u"  Fingerprint: %s", self.fingerprint)
 
299
 
        if u"secret" in config:
 
300
 
            self.secret = config[u"secret"].decode(u"base64")
 
301
 
        elif u"secfile" in config:
 
 
359
        self.fingerprint = (config["fingerprint"].upper()
 
 
361
        logger.debug("  Fingerprint: %s", self.fingerprint)
 
 
362
        if "secret" in config:
 
 
363
            self.secret = config["secret"].decode("base64")
 
 
364
        elif "secfile" in config:
 
302
365
            with open(os.path.expanduser(os.path.expandvars
 
303
 
                                         (config[u"secfile"])),
 
 
366
                                         (config["secfile"])),
 
304
367
                      "rb") as secfile:
 
305
368
                self.secret = secfile.read()
 
307
 
            raise TypeError(u"No secret or secfile for client %s"
 
 
370
            raise TypeError("No secret or secfile for client %s"
 
309
 
        self.host = config.get(u"host", u"")
 
 
372
        self.host = config.get("host", "")
 
310
373
        self.created = datetime.datetime.utcnow()
 
312
 
        self.last_enabled = None
 
 
375
        self.last_approval_request = None
 
 
376
        self.last_enabled = datetime.datetime.utcnow()
 
313
377
        self.last_checked_ok = None
 
314
 
        self.timeout = string_to_delta(config[u"timeout"])
 
315
 
        self.interval = string_to_delta(config[u"interval"])
 
316
 
        self.disable_hook = disable_hook
 
 
378
        self.last_checker_status = None
 
 
379
        self.timeout = string_to_delta(config["timeout"])
 
 
380
        self.extended_timeout = string_to_delta(config
 
 
381
                                                ["extended_timeout"])
 
 
382
        self.interval = string_to_delta(config["interval"])
 
317
383
        self.checker = None
 
318
384
        self.checker_initiator_tag = None
 
319
385
        self.disable_initiator_tag = None
 
 
386
        self.expires = datetime.datetime.utcnow() + self.timeout
 
320
387
        self.checker_callback_tag = None
 
321
 
        self.checker_command = config[u"checker"]
 
 
388
        self.checker_command = config["checker"]
 
322
389
        self.current_checker_command = None
 
323
 
        self.last_connect = None
 
324
390
        self._approved = None
 
325
 
        self.approved_by_default = config.get(u"approved_by_default",
 
 
391
        self.approved_by_default = config.get("approved_by_default",
 
327
393
        self.approvals_pending = 0
 
328
 
        self.approved_delay = string_to_delta(
 
329
 
            config[u"approved_delay"])
 
330
 
        self.approved_duration = string_to_delta(
 
331
 
            config[u"approved_duration"])
 
332
 
        self.changedstate = multiprocessing_manager.Condition(multiprocessing_manager.Lock())
 
 
394
        self.approval_delay = string_to_delta(
 
 
395
            config["approval_delay"])
 
 
396
        self.approval_duration = string_to_delta(
 
 
397
            config["approval_duration"])
 
 
398
        self.changedstate = (multiprocessing_manager
 
 
399
                             .Condition(multiprocessing_manager
 
 
401
        self.client_structure = [attr for attr in self.__dict__.iterkeys() if not attr.startswith("_")]
 
 
402
        self.client_structure.append("client_structure")
 
 
405
        for name, t in inspect.getmembers(type(self),
 
 
406
                                          lambda obj: isinstance(obj, property)):
 
 
407
            if not name.startswith("_"):
 
 
408
                self.client_structure.append(name)
 
 
410
    # Send notice to process children that client state has changed
 
334
411
    def send_changedstate(self):
 
335
 
        self.changedstate.acquire()
 
336
 
        self.changedstate.notify_all()
 
337
 
        self.changedstate.release()
 
 
412
        with self.changedstate:
 
 
413
            self.changedstate.notify_all()
 
339
415
    def enable(self):
 
340
416
        """Start this client's checker and timeout hooks"""
 
341
 
        if getattr(self, u"enabled", False):
 
 
417
        if getattr(self, "enabled", False):
 
342
418
            # Already enabled
 
344
420
        self.send_changedstate()
 
 
421
        self.expires = datetime.datetime.utcnow() + self.timeout
 
345
423
        self.last_enabled = datetime.datetime.utcnow()
 
346
 
        # Schedule a new checker to be started an 'interval' from now,
 
347
 
        # and every interval from then on.
 
348
 
        self.checker_initiator_tag = (gobject.timeout_add
 
349
 
                                      (self.interval_milliseconds(),
 
351
 
        # Schedule a disable() when 'timeout' has passed
 
352
 
        self.disable_initiator_tag = (gobject.timeout_add
 
353
 
                                   (self.timeout_milliseconds(),
 
356
 
        # Also start a new checker *right now*.
 
359
426
    def disable(self, quiet=True):
 
360
427
        """Disable this client."""
 
 
364
431
            self.send_changedstate()
 
366
 
            logger.info(u"Disabling client %s", self.name)
 
367
 
        if getattr(self, u"disable_initiator_tag", False):
 
 
433
            logger.info("Disabling client %s", self.name)
 
 
434
        if getattr(self, "disable_initiator_tag", False):
 
368
435
            gobject.source_remove(self.disable_initiator_tag)
 
369
436
            self.disable_initiator_tag = None
 
370
 
        if getattr(self, u"checker_initiator_tag", False):
 
 
438
        if getattr(self, "checker_initiator_tag", False):
 
371
439
            gobject.source_remove(self.checker_initiator_tag)
 
372
440
            self.checker_initiator_tag = None
 
373
441
        self.stop_checker()
 
374
 
        if self.disable_hook:
 
375
 
            self.disable_hook(self)
 
376
442
        self.enabled = False
 
377
443
        # Do not run this again if called by a gobject.timeout_add
 
380
446
    def __del__(self):
 
381
 
        self.disable_hook = None
 
 
449
    def init_checker(self):
 
 
450
        # Schedule a new checker to be started an 'interval' from now,
 
 
451
        # and every interval from then on.
 
 
452
        self.checker_initiator_tag = (gobject.timeout_add
 
 
453
                                      (self.interval_milliseconds(),
 
 
455
        # Schedule a disable() when 'timeout' has passed
 
 
456
        self.disable_initiator_tag = (gobject.timeout_add
 
 
457
                                   (self.timeout_milliseconds(),
 
 
459
        # Also start a new checker *right now*.
 
384
463
    def checker_callback(self, pid, condition, command):
 
385
464
        """The checker has completed, so take appropriate actions."""
 
386
465
        self.checker_callback_tag = None
 
387
466
        self.checker = None
 
388
467
        if os.WIFEXITED(condition):
 
389
 
            exitstatus = os.WEXITSTATUS(condition)
 
391
 
                logger.info(u"Checker for %(name)s succeeded",
 
 
468
            self.last_checker_status =  os.WEXITSTATUS(condition)
 
 
469
            if self.last_checker_status == 0:
 
 
470
                logger.info("Checker for %(name)s succeeded",
 
393
472
                self.checked_ok()
 
395
 
                logger.info(u"Checker for %(name)s failed",
 
 
474
                logger.info("Checker for %(name)s failed",
 
398
 
            logger.warning(u"Checker for %(name)s crashed?",
 
 
477
            self.last_checker_status = -1
 
 
478
            logger.warning("Checker for %(name)s crashed?",
 
401
 
    def checked_ok(self):
 
 
481
    def checked_ok(self, timeout=None):
 
402
482
        """Bump up the timeout for this client.
 
404
484
        This should only be called when the client has been seen,
 
 
488
            timeout = self.timeout
 
407
489
        self.last_checked_ok = datetime.datetime.utcnow()
 
408
 
        gobject.source_remove(self.disable_initiator_tag)
 
409
 
        self.disable_initiator_tag = (gobject.timeout_add
 
410
 
                                      (self.timeout_milliseconds(),
 
 
490
        if self.disable_initiator_tag is not None:
 
 
491
            gobject.source_remove(self.disable_initiator_tag)
 
 
492
        if getattr(self, "enabled", False):
 
 
493
            self.disable_initiator_tag = (gobject.timeout_add
 
 
494
                                          (_timedelta_to_milliseconds
 
 
495
                                           (timeout), self.disable))
 
 
496
            self.expires = datetime.datetime.utcnow() + timeout
 
 
498
    def need_approval(self):
 
 
499
        self.last_approval_request = datetime.datetime.utcnow()
 
413
501
    def start_checker(self):
 
414
502
        """Start a new checker subprocess if one is not running.
 
 
488
578
        if self.checker_callback_tag:
 
489
579
            gobject.source_remove(self.checker_callback_tag)
 
490
580
            self.checker_callback_tag = None
 
491
 
        if getattr(self, u"checker", None) is None:
 
 
581
        if getattr(self, "checker", None) is None:
 
493
 
        logger.debug(u"Stopping checker for %(name)s", vars(self))
 
 
583
        logger.debug("Stopping checker for %(name)s", vars(self))
 
495
585
            os.kill(self.checker.pid, signal.SIGTERM)
 
497
587
            #if self.checker.poll() is None:
 
498
588
            #    os.kill(self.checker.pid, signal.SIGKILL)
 
499
 
        except OSError, error:
 
 
589
        except OSError as error:
 
500
590
            if error.errno != errno.ESRCH: # No such process
 
502
592
        self.checker = None
 
504
 
def dbus_service_property(dbus_interface, signature=u"v",
 
505
 
                          access=u"readwrite", byte_arrays=False):
 
 
594
    # Encrypts a client secret and stores it in a varible encrypted_secret
 
 
595
    def encrypt_secret(self, key):
 
 
596
        # Encryption-key need to be of a specific size, so we hash inputed key
 
 
597
        hasheng = hashlib.sha256()
 
 
599
        encryptionkey = hasheng.digest()
 
 
601
        # Create validation hash so we know at decryption if it was sucessful
 
 
602
        hasheng = hashlib.sha256()
 
 
603
        hasheng.update(self.secret)
 
 
604
        validationhash = hasheng.digest()
 
 
607
        iv = os.urandom(Crypto.Cipher.AES.block_size)
 
 
608
        ciphereng = Crypto.Cipher.AES.new(encryptionkey,
 
 
609
                                        Crypto.Cipher.AES.MODE_CFB, iv)
 
 
610
        ciphertext = ciphereng.encrypt(validationhash+self.secret)
 
 
611
        self.encrypted_secret = (ciphertext, iv)
 
 
613
    # Decrypt a encrypted client secret
 
 
614
    def decrypt_secret(self, key):
 
 
615
        # Decryption-key need to be of a specific size, so we hash inputed key
 
 
616
        hasheng = hashlib.sha256()
 
 
618
        encryptionkey = hasheng.digest()
 
 
620
        # Decrypt encrypted secret
 
 
621
        ciphertext, iv = self.encrypted_secret
 
 
622
        ciphereng = Crypto.Cipher.AES.new(encryptionkey,
 
 
623
                                        Crypto.Cipher.AES.MODE_CFB, iv)
 
 
624
        plain = ciphereng.decrypt(ciphertext)
 
 
626
        # Validate decrypted secret to know if it was succesful
 
 
627
        hasheng = hashlib.sha256()
 
 
628
        validationhash = plain[:hasheng.digest_size]
 
 
629
        secret = plain[hasheng.digest_size:]
 
 
630
        hasheng.update(secret)
 
 
632
        # if validation fails, we use key as new secret. Otherwhise, we use
 
 
633
        # the decrypted secret
 
 
634
        if hasheng.digest() == validationhash:
 
 
638
        del self.encrypted_secret
 
 
641
def dbus_service_property(dbus_interface, signature="v",
 
 
642
                          access="readwrite", byte_arrays=False):
 
506
643
    """Decorators for marking methods of a DBusObjectWithProperties to
 
507
644
    become properties on the D-Bus.
 
 
562
699
    def _is_dbus_property(obj):
 
563
 
        return getattr(obj, u"_dbus_is_property", False)
 
 
700
        return getattr(obj, "_dbus_is_property", False)
 
565
702
    def _get_all_dbus_properties(self):
 
566
703
        """Returns a generator of (name, attribute) pairs
 
568
 
        return ((prop._dbus_name, prop)
 
 
705
        return ((prop.__get__(self)._dbus_name, prop.__get__(self))
 
 
706
                for cls in self.__class__.__mro__
 
569
707
                for name, prop in
 
570
 
                inspect.getmembers(self, self._is_dbus_property))
 
 
708
                inspect.getmembers(cls, self._is_dbus_property))
 
572
710
    def _get_dbus_property(self, interface_name, property_name):
 
573
711
        """Returns a bound method if one exists which is a D-Bus
 
574
712
        property with the specified name and interface.
 
576
 
        for name in (property_name,
 
577
 
                     property_name + u"_dbus_property"):
 
578
 
            prop = getattr(self, name, None)
 
580
 
                or not self._is_dbus_property(prop)
 
581
 
                or prop._dbus_name != property_name
 
582
 
                or (interface_name and prop._dbus_interface
 
583
 
                    and interface_name != prop._dbus_interface)):
 
 
714
        for cls in  self.__class__.__mro__:
 
 
715
            for name, value in (inspect.getmembers
 
 
716
                                (cls, self._is_dbus_property)):
 
 
717
                if (value._dbus_name == property_name
 
 
718
                    and value._dbus_interface == interface_name):
 
 
719
                    return value.__get__(self)
 
586
721
        # No such property
 
587
 
        raise DBusPropertyNotFound(self.dbus_object_path + u":"
 
588
 
                                   + interface_name + u"."
 
 
722
        raise DBusPropertyNotFound(self.dbus_object_path + ":"
 
 
723
                                   + interface_name + "."
 
591
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"ss",
 
 
726
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="ss",
 
593
728
    def Get(self, interface_name, property_name):
 
594
729
        """Standard D-Bus property Get() method, see D-Bus standard.
 
596
731
        prop = self._get_dbus_property(interface_name, property_name)
 
597
 
        if prop._dbus_access == u"write":
 
 
732
        if prop._dbus_access == "write":
 
598
733
            raise DBusPropertyAccessException(property_name)
 
600
 
        if not hasattr(value, u"variant_level"):
 
 
735
        if not hasattr(value, "variant_level"):
 
602
737
        return type(value)(value, variant_level=value.variant_level+1)
 
604
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"ssv")
 
 
739
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="ssv")
 
605
740
    def Set(self, interface_name, property_name, value):
 
606
741
        """Standard D-Bus property Set() method, see D-Bus standard.
 
608
743
        prop = self._get_dbus_property(interface_name, property_name)
 
609
 
        if prop._dbus_access == u"read":
 
 
744
        if prop._dbus_access == "read":
 
610
745
            raise DBusPropertyAccessException(property_name)
 
611
 
        if prop._dbus_get_args_options[u"byte_arrays"]:
 
 
746
        if prop._dbus_get_args_options["byte_arrays"]:
 
612
747
            # The byte_arrays option is not supported yet on
 
613
748
            # signatures other than "ay".
 
614
 
            if prop._dbus_signature != u"ay":
 
 
749
            if prop._dbus_signature != "ay":
 
616
751
            value = dbus.ByteArray(''.join(unichr(byte)
 
617
752
                                           for byte in value))
 
620
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"s",
 
621
 
                         out_signature=u"a{sv}")
 
 
755
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="s",
 
 
756
                         out_signature="a{sv}")
 
622
757
    def GetAll(self, interface_name):
 
623
758
        """Standard D-Bus property GetAll() method, see D-Bus
 
626
761
        Note: Will not include properties with access="write".
 
 
655
790
            document = xml.dom.minidom.parseString(xmlstring)
 
656
791
            def make_tag(document, name, prop):
 
657
 
                e = document.createElement(u"property")
 
658
 
                e.setAttribute(u"name", name)
 
659
 
                e.setAttribute(u"type", prop._dbus_signature)
 
660
 
                e.setAttribute(u"access", prop._dbus_access)
 
 
792
                e = document.createElement("property")
 
 
793
                e.setAttribute("name", name)
 
 
794
                e.setAttribute("type", prop._dbus_signature)
 
 
795
                e.setAttribute("access", prop._dbus_access)
 
662
 
            for if_tag in document.getElementsByTagName(u"interface"):
 
 
797
            for if_tag in document.getElementsByTagName("interface"):
 
663
798
                for tag in (make_tag(document, name, prop)
 
665
800
                            in self._get_all_dbus_properties()
 
666
801
                            if prop._dbus_interface
 
667
 
                            == if_tag.getAttribute(u"name")):
 
 
802
                            == if_tag.getAttribute("name")):
 
668
803
                    if_tag.appendChild(tag)
 
669
804
                # Add the names to the return values for the
 
670
805
                # "org.freedesktop.DBus.Properties" methods
 
671
 
                if (if_tag.getAttribute(u"name")
 
672
 
                    == u"org.freedesktop.DBus.Properties"):
 
673
 
                    for cn in if_tag.getElementsByTagName(u"method"):
 
674
 
                        if cn.getAttribute(u"name") == u"Get":
 
675
 
                            for arg in cn.getElementsByTagName(u"arg"):
 
676
 
                                if (arg.getAttribute(u"direction")
 
678
 
                                    arg.setAttribute(u"name", u"value")
 
679
 
                        elif cn.getAttribute(u"name") == u"GetAll":
 
680
 
                            for arg in cn.getElementsByTagName(u"arg"):
 
681
 
                                if (arg.getAttribute(u"direction")
 
683
 
                                    arg.setAttribute(u"name", u"props")
 
684
 
            xmlstring = document.toxml(u"utf-8")
 
 
806
                if (if_tag.getAttribute("name")
 
 
807
                    == "org.freedesktop.DBus.Properties"):
 
 
808
                    for cn in if_tag.getElementsByTagName("method"):
 
 
809
                        if cn.getAttribute("name") == "Get":
 
 
810
                            for arg in cn.getElementsByTagName("arg"):
 
 
811
                                if (arg.getAttribute("direction")
 
 
813
                                    arg.setAttribute("name", "value")
 
 
814
                        elif cn.getAttribute("name") == "GetAll":
 
 
815
                            for arg in cn.getElementsByTagName("arg"):
 
 
816
                                if (arg.getAttribute("direction")
 
 
818
                                    arg.setAttribute("name", "props")
 
 
819
            xmlstring = document.toxml("utf-8")
 
685
820
            document.unlink()
 
686
821
        except (AttributeError, xml.dom.DOMException,
 
687
 
                xml.parsers.expat.ExpatError), error:
 
688
 
            logger.error(u"Failed to override Introspection method",
 
 
822
                xml.parsers.expat.ExpatError) as error:
 
 
823
            logger.error("Failed to override Introspection method",
 
 
828
def datetime_to_dbus (dt, variant_level=0):
 
 
829
    """Convert a UTC datetime.datetime() to a D-Bus type."""
 
 
831
        return dbus.String("", variant_level = variant_level)
 
 
832
    return dbus.String(dt.isoformat(),
 
 
833
                       variant_level=variant_level)
 
 
835
class AlternateDBusNamesMetaclass(DBusObjectWithProperties
 
 
837
    """Applied to an empty subclass of a D-Bus object, this metaclass
 
 
838
    will add additional D-Bus attributes matching a certain pattern.
 
 
840
    def __new__(mcs, name, bases, attr):
 
 
841
        # Go through all the base classes which could have D-Bus
 
 
842
        # methods, signals, or properties in them
 
 
843
        for base in (b for b in bases
 
 
844
                     if issubclass(b, dbus.service.Object)):
 
 
845
            # Go though all attributes of the base class
 
 
846
            for attrname, attribute in inspect.getmembers(base):
 
 
847
                # Ignore non-D-Bus attributes, and D-Bus attributes
 
 
848
                # with the wrong interface name
 
 
849
                if (not hasattr(attribute, "_dbus_interface")
 
 
850
                    or not attribute._dbus_interface
 
 
851
                    .startswith("se.recompile.Mandos")):
 
 
853
                # Create an alternate D-Bus interface name based on
 
 
855
                alt_interface = (attribute._dbus_interface
 
 
856
                                 .replace("se.recompile.Mandos",
 
 
857
                                          "se.bsnet.fukt.Mandos"))
 
 
858
                # Is this a D-Bus signal?
 
 
859
                if getattr(attribute, "_dbus_is_signal", False):
 
 
860
                    # Extract the original non-method function by
 
 
862
                    nonmethod_func = (dict(
 
 
863
                            zip(attribute.func_code.co_freevars,
 
 
864
                                attribute.__closure__))["func"]
 
 
866
                    # Create a new, but exactly alike, function
 
 
867
                    # object, and decorate it to be a new D-Bus signal
 
 
868
                    # with the alternate D-Bus interface name
 
 
869
                    new_function = (dbus.service.signal
 
 
871
                                     attribute._dbus_signature)
 
 
873
                                nonmethod_func.func_code,
 
 
874
                                nonmethod_func.func_globals,
 
 
875
                                nonmethod_func.func_name,
 
 
876
                                nonmethod_func.func_defaults,
 
 
877
                                nonmethod_func.func_closure)))
 
 
878
                    # Define a creator of a function to call both the
 
 
879
                    # old and new functions, so both the old and new
 
 
880
                    # signals gets sent when the function is called
 
 
881
                    def fixscope(func1, func2):
 
 
882
                        """This function is a scope container to pass
 
 
883
                        func1 and func2 to the "call_both" function
 
 
884
                        outside of its arguments"""
 
 
885
                        def call_both(*args, **kwargs):
 
 
886
                            """This function will emit two D-Bus
 
 
887
                            signals by calling func1 and func2"""
 
 
888
                            func1(*args, **kwargs)
 
 
889
                            func2(*args, **kwargs)
 
 
891
                    # Create the "call_both" function and add it to
 
 
893
                    attr[attrname] = fixscope(attribute,
 
 
895
                # Is this a D-Bus method?
 
 
896
                elif getattr(attribute, "_dbus_is_method", False):
 
 
897
                    # Create a new, but exactly alike, function
 
 
898
                    # object.  Decorate it to be a new D-Bus method
 
 
899
                    # with the alternate D-Bus interface name.  Add it
 
 
901
                    attr[attrname] = (dbus.service.method
 
 
903
                                       attribute._dbus_in_signature,
 
 
904
                                       attribute._dbus_out_signature)
 
 
906
                                       (attribute.func_code,
 
 
907
                                        attribute.func_globals,
 
 
909
                                        attribute.func_defaults,
 
 
910
                                        attribute.func_closure)))
 
 
911
                # Is this a D-Bus property?
 
 
912
                elif getattr(attribute, "_dbus_is_property", False):
 
 
913
                    # Create a new, but exactly alike, function
 
 
914
                    # object, and decorate it to be a new D-Bus
 
 
915
                    # property with the alternate D-Bus interface
 
 
916
                    # name.  Add it to the class.
 
 
917
                    attr[attrname] = (dbus_service_property
 
 
919
                                       attribute._dbus_signature,
 
 
920
                                       attribute._dbus_access,
 
 
922
                                       ._dbus_get_args_options
 
 
925
                                       (attribute.func_code,
 
 
926
                                        attribute.func_globals,
 
 
928
                                        attribute.func_defaults,
 
 
929
                                        attribute.func_closure)))
 
 
930
        return type.__new__(mcs, name, bases, attr)
 
693
932
class ClientDBus(Client, DBusObjectWithProperties):
 
694
933
    """A Client class using D-Bus
 
 
697
936
    dbus_object_path: dbus.ObjectPath
 
698
937
    bus: dbus.SystemBus()
 
 
940
    runtime_expansions = (Client.runtime_expansions
 
 
941
                          + ("dbus_object_path",))
 
700
943
    # dbus.service.Object doesn't use super(), so we can't either.
 
702
945
    def __init__(self, bus = None, *args, **kwargs):
 
 
947
        Client.__init__(self, *args, **kwargs)
 
703
949
        self._approvals_pending = 0
 
705
 
        Client.__init__(self, *args, **kwargs)
 
706
950
        # Only now, when this client is initialized, can it show up on
 
 
952
        client_object_name = unicode(self.name).translate(
 
708
955
        self.dbus_object_path = (dbus.ObjectPath
 
710
 
                                  + self.name.replace(u".", u"_")))
 
 
956
                                 ("/clients/" + client_object_name))
 
711
957
        DBusObjectWithProperties.__init__(self, self.bus,
 
712
958
                                          self.dbus_object_path)
 
714
 
    def _get_approvals_pending(self):
 
715
 
        return self._approvals_pending
 
716
 
    def _set_approvals_pending(self, value):
 
717
 
        old_value = self._approvals_pending
 
718
 
        self._approvals_pending = value
 
720
 
        if (hasattr(self, "dbus_object_path")
 
721
 
            and bval is not bool(old_value)):
 
722
 
            dbus_bool = dbus.Boolean(bval, variant_level=1)
 
723
 
            self.PropertyChanged(dbus.String(u"approved_pending"),
 
726
 
    approvals_pending = property(_get_approvals_pending,
 
727
 
                                 _set_approvals_pending)
 
728
 
    del _get_approvals_pending, _set_approvals_pending
 
731
 
    def _datetime_to_dbus(dt, variant_level=0):
 
732
 
        """Convert a UTC datetime.datetime() to a D-Bus type."""
 
733
 
        return dbus.String(dt.isoformat(),
 
734
 
                           variant_level=variant_level)
 
737
 
        oldstate = getattr(self, u"enabled", False)
 
738
 
        r = Client.enable(self)
 
739
 
        if oldstate != self.enabled:
 
741
 
            self.PropertyChanged(dbus.String(u"enabled"),
 
742
 
                                 dbus.Boolean(True, variant_level=1))
 
743
 
            self.PropertyChanged(
 
744
 
                dbus.String(u"last_enabled"),
 
745
 
                self._datetime_to_dbus(self.last_enabled,
 
749
 
    def disable(self, quiet = False):
 
750
 
        oldstate = getattr(self, u"enabled", False)
 
751
 
        r = Client.disable(self, quiet=quiet)
 
752
 
        if not quiet and oldstate != self.enabled:
 
754
 
            self.PropertyChanged(dbus.String(u"enabled"),
 
755
 
                                 dbus.Boolean(False, variant_level=1))
 
 
960
    def notifychangeproperty(transform_func,
 
 
961
                             dbus_name, type_func=lambda x: x,
 
 
963
        """ Modify a variable so that it's a property which announces
 
 
966
        transform_fun: Function that takes a value and a variant_level
 
 
967
                       and transforms it to a D-Bus type.
 
 
968
        dbus_name: D-Bus name of the variable
 
 
969
        type_func: Function that transform the value before sending it
 
 
970
                   to the D-Bus.  Default: no transform
 
 
971
        variant_level: D-Bus variant level.  Default: 1
 
 
973
        attrname = "_{0}".format(dbus_name)
 
 
974
        def setter(self, value):
 
 
975
            if hasattr(self, "dbus_object_path"):
 
 
976
                if (not hasattr(self, attrname) or
 
 
977
                    type_func(getattr(self, attrname, None))
 
 
978
                    != type_func(value)):
 
 
979
                    dbus_value = transform_func(type_func(value),
 
 
982
                    self.PropertyChanged(dbus.String(dbus_name),
 
 
984
            setattr(self, attrname, value)
 
 
986
        return property(lambda self: getattr(self, attrname), setter)
 
 
989
    expires = notifychangeproperty(datetime_to_dbus, "Expires")
 
 
990
    approvals_pending = notifychangeproperty(dbus.Boolean,
 
 
993
    enabled = notifychangeproperty(dbus.Boolean, "Enabled")
 
 
994
    last_enabled = notifychangeproperty(datetime_to_dbus,
 
 
996
    checker = notifychangeproperty(dbus.Boolean, "CheckerRunning",
 
 
997
                                   type_func = lambda checker:
 
 
999
    last_checked_ok = notifychangeproperty(datetime_to_dbus,
 
 
1001
    last_approval_request = notifychangeproperty(
 
 
1002
        datetime_to_dbus, "LastApprovalRequest")
 
 
1003
    approved_by_default = notifychangeproperty(dbus.Boolean,
 
 
1004
                                               "ApprovedByDefault")
 
 
1005
    approval_delay = notifychangeproperty(dbus.UInt16,
 
 
1008
                                          _timedelta_to_milliseconds)
 
 
1009
    approval_duration = notifychangeproperty(
 
 
1010
        dbus.UInt16, "ApprovalDuration",
 
 
1011
        type_func = _timedelta_to_milliseconds)
 
 
1012
    host = notifychangeproperty(dbus.String, "Host")
 
 
1013
    timeout = notifychangeproperty(dbus.UInt16, "Timeout",
 
 
1015
                                   _timedelta_to_milliseconds)
 
 
1016
    extended_timeout = notifychangeproperty(
 
 
1017
        dbus.UInt16, "ExtendedTimeout",
 
 
1018
        type_func = _timedelta_to_milliseconds)
 
 
1019
    interval = notifychangeproperty(dbus.UInt16,
 
 
1022
                                    _timedelta_to_milliseconds)
 
 
1023
    checker_command = notifychangeproperty(dbus.String, "Checker")
 
 
1025
    del notifychangeproperty
 
758
1027
    def __del__(self, *args, **kwargs):
 
760
1029
            self.remove_from_connection()
 
761
1030
        except LookupError:
 
763
 
        if hasattr(DBusObjectWithProperties, u"__del__"):
 
 
1032
        if hasattr(DBusObjectWithProperties, "__del__"):
 
764
1033
            DBusObjectWithProperties.__del__(self, *args, **kwargs)
 
765
1034
        Client.__del__(self, *args, **kwargs)
 
 
916
 
    # approved_pending - property
 
917
 
    @dbus_service_property(_interface, signature=u"b", access=u"read")
 
918
 
    def approved_pending_dbus_property(self):
 
 
1162
    # ApprovalPending - property
 
 
1163
    @dbus_service_property(_interface, signature="b", access="read")
 
 
1164
    def ApprovalPending_dbus_property(self):
 
919
1165
        return dbus.Boolean(bool(self.approvals_pending))
 
921
 
    # approved_by_default - property
 
922
 
    @dbus_service_property(_interface, signature=u"b",
 
924
 
    def approved_by_default_dbus_property(self):
 
925
 
        return dbus.Boolean(self.approved_by_default)
 
927
 
    # approved_delay - property
 
928
 
    @dbus_service_property(_interface, signature=u"t",
 
930
 
    def approved_delay_dbus_property(self):
 
931
 
        return dbus.UInt64(self.approved_delay_milliseconds())
 
933
 
    # approved_duration - property
 
934
 
    @dbus_service_property(_interface, signature=u"t",
 
936
 
    def approved_duration_dbus_property(self):
 
937
 
        return dbus.UInt64(self._timedelta_to_milliseconds(
 
938
 
                self.approved_duration))
 
941
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
942
 
    def name_dbus_property(self):
 
 
1167
    # ApprovedByDefault - property
 
 
1168
    @dbus_service_property(_interface, signature="b",
 
 
1170
    def ApprovedByDefault_dbus_property(self, value=None):
 
 
1171
        if value is None:       # get
 
 
1172
            return dbus.Boolean(self.approved_by_default)
 
 
1173
        self.approved_by_default = bool(value)
 
 
1175
    # ApprovalDelay - property
 
 
1176
    @dbus_service_property(_interface, signature="t",
 
 
1178
    def ApprovalDelay_dbus_property(self, value=None):
 
 
1179
        if value is None:       # get
 
 
1180
            return dbus.UInt64(self.approval_delay_milliseconds())
 
 
1181
        self.approval_delay = datetime.timedelta(0, 0, 0, value)
 
 
1183
    # ApprovalDuration - property
 
 
1184
    @dbus_service_property(_interface, signature="t",
 
 
1186
    def ApprovalDuration_dbus_property(self, value=None):
 
 
1187
        if value is None:       # get
 
 
1188
            return dbus.UInt64(_timedelta_to_milliseconds(
 
 
1189
                    self.approval_duration))
 
 
1190
        self.approval_duration = datetime.timedelta(0, 0, 0, value)
 
 
1193
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1194
    def Name_dbus_property(self):
 
943
1195
        return dbus.String(self.name)
 
945
 
    # fingerprint - property
 
946
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
947
 
    def fingerprint_dbus_property(self):
 
 
1197
    # Fingerprint - property
 
 
1198
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1199
    def Fingerprint_dbus_property(self):
 
948
1200
        return dbus.String(self.fingerprint)
 
951
 
    @dbus_service_property(_interface, signature=u"s",
 
953
 
    def host_dbus_property(self, value=None):
 
 
1203
    @dbus_service_property(_interface, signature="s",
 
 
1205
    def Host_dbus_property(self, value=None):
 
954
1206
        if value is None:       # get
 
955
1207
            return dbus.String(self.host)
 
956
1208
        self.host = value
 
958
 
        self.PropertyChanged(dbus.String(u"host"),
 
959
 
                             dbus.String(value, variant_level=1))
 
962
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
963
 
    def created_dbus_property(self):
 
964
 
        return dbus.String(self._datetime_to_dbus(self.created))
 
966
 
    # last_enabled - property
 
967
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
968
 
    def last_enabled_dbus_property(self):
 
969
 
        if self.last_enabled is None:
 
970
 
            return dbus.String(u"")
 
971
 
        return dbus.String(self._datetime_to_dbus(self.last_enabled))
 
974
 
    @dbus_service_property(_interface, signature=u"b",
 
976
 
    def enabled_dbus_property(self, value=None):
 
 
1210
    # Created - property
 
 
1211
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1212
    def Created_dbus_property(self):
 
 
1213
        return dbus.String(datetime_to_dbus(self.created))
 
 
1215
    # LastEnabled - property
 
 
1216
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1217
    def LastEnabled_dbus_property(self):
 
 
1218
        return datetime_to_dbus(self.last_enabled)
 
 
1220
    # Enabled - property
 
 
1221
    @dbus_service_property(_interface, signature="b",
 
 
1223
    def Enabled_dbus_property(self, value=None):
 
977
1224
        if value is None:       # get
 
978
1225
            return dbus.Boolean(self.enabled)
 
 
984
 
    # last_checked_ok - property
 
985
 
    @dbus_service_property(_interface, signature=u"s",
 
987
 
    def last_checked_ok_dbus_property(self, value=None):
 
 
1231
    # LastCheckedOK - property
 
 
1232
    @dbus_service_property(_interface, signature="s",
 
 
1234
    def LastCheckedOK_dbus_property(self, value=None):
 
988
1235
        if value is not None:
 
989
1236
            self.checked_ok()
 
991
 
        if self.last_checked_ok is None:
 
992
 
            return dbus.String(u"")
 
993
 
        return dbus.String(self._datetime_to_dbus(self
 
997
 
    @dbus_service_property(_interface, signature=u"t",
 
999
 
    def timeout_dbus_property(self, value=None):
 
 
1238
        return datetime_to_dbus(self.last_checked_ok)
 
 
1240
    # Expires - property
 
 
1241
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1242
    def Expires_dbus_property(self):
 
 
1243
        return datetime_to_dbus(self.expires)
 
 
1245
    # LastApprovalRequest - property
 
 
1246
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1247
    def LastApprovalRequest_dbus_property(self):
 
 
1248
        return datetime_to_dbus(self.last_approval_request)
 
 
1250
    # Timeout - property
 
 
1251
    @dbus_service_property(_interface, signature="t",
 
 
1253
    def Timeout_dbus_property(self, value=None):
 
1000
1254
        if value is None:       # get
 
1001
1255
            return dbus.UInt64(self.timeout_milliseconds())
 
1002
1256
        self.timeout = datetime.timedelta(0, 0, 0, value)
 
1004
 
        self.PropertyChanged(dbus.String(u"timeout"),
 
1005
 
                             dbus.UInt64(value, variant_level=1))
 
1006
 
        if getattr(self, u"disable_initiator_tag", None) is None:
 
 
1257
        if getattr(self, "disable_initiator_tag", None) is None:
 
1008
1259
        # Reschedule timeout
 
1009
1260
        gobject.source_remove(self.disable_initiator_tag)
 
1010
1261
        self.disable_initiator_tag = None
 
1011
 
        time_to_die = (self.
 
1012
 
                       _timedelta_to_milliseconds((self
 
 
1263
        time_to_die = _timedelta_to_milliseconds((self
 
1017
1268
        if time_to_die <= 0:
 
1018
1269
            # The timeout has passed
 
 
1272
            self.expires = (datetime.datetime.utcnow()
 
 
1273
                            + datetime.timedelta(milliseconds =
 
1021
1275
            self.disable_initiator_tag = (gobject.timeout_add
 
1022
1276
                                          (time_to_die, self.disable))
 
1024
 
    # interval - property
 
1025
 
    @dbus_service_property(_interface, signature=u"t",
 
1026
 
                           access=u"readwrite")
 
1027
 
    def interval_dbus_property(self, value=None):
 
 
1278
    # ExtendedTimeout - property
 
 
1279
    @dbus_service_property(_interface, signature="t",
 
 
1281
    def ExtendedTimeout_dbus_property(self, value=None):
 
 
1282
        if value is None:       # get
 
 
1283
            return dbus.UInt64(self.extended_timeout_milliseconds())
 
 
1284
        self.extended_timeout = datetime.timedelta(0, 0, 0, value)
 
 
1286
    # Interval - property
 
 
1287
    @dbus_service_property(_interface, signature="t",
 
 
1289
    def Interval_dbus_property(self, value=None):
 
1028
1290
        if value is None:       # get
 
1029
1291
            return dbus.UInt64(self.interval_milliseconds())
 
1030
1292
        self.interval = datetime.timedelta(0, 0, 0, value)
 
1032
 
        self.PropertyChanged(dbus.String(u"interval"),
 
1033
 
                             dbus.UInt64(value, variant_level=1))
 
1034
 
        if getattr(self, u"checker_initiator_tag", None) is None:
 
 
1293
        if getattr(self, "checker_initiator_tag", None) is None:
 
1036
1295
        # Reschedule checker run
 
1037
1296
        gobject.source_remove(self.checker_initiator_tag)
 
1038
1297
        self.checker_initiator_tag = (gobject.timeout_add
 
1039
1298
                                      (value, self.start_checker))
 
1040
1299
        self.start_checker()    # Start one now, too
 
1042
 
    # checker - property
 
1043
 
    @dbus_service_property(_interface, signature=u"s",
 
1044
 
                           access=u"readwrite")
 
1045
 
    def checker_dbus_property(self, value=None):
 
 
1301
    # Checker - property
 
 
1302
    @dbus_service_property(_interface, signature="s",
 
 
1304
    def Checker_dbus_property(self, value=None):
 
1046
1305
        if value is None:       # get
 
1047
1306
            return dbus.String(self.checker_command)
 
1048
1307
        self.checker_command = value
 
1050
 
        self.PropertyChanged(dbus.String(u"checker"),
 
1051
 
                             dbus.String(self.checker_command,
 
1054
 
    # checker_running - property
 
1055
 
    @dbus_service_property(_interface, signature=u"b",
 
1056
 
                           access=u"readwrite")
 
1057
 
    def checker_running_dbus_property(self, value=None):
 
 
1309
    # CheckerRunning - property
 
 
1310
    @dbus_service_property(_interface, signature="b",
 
 
1312
    def CheckerRunning_dbus_property(self, value=None):
 
1058
1313
        if value is None:       # get
 
1059
1314
            return dbus.Boolean(self.checker is not None)
 
 
1111
1368
    def handle(self):
 
1112
1369
        with contextlib.closing(self.server.child_pipe) as child_pipe:
 
1113
 
            logger.info(u"TCP connection from: %s",
 
 
1370
            logger.info("TCP connection from: %s",
 
1114
1371
                        unicode(self.client_address))
 
1115
 
            logger.debug(u"Pipe FD: %d",
 
 
1372
            logger.debug("Pipe FD: %d",
 
1116
1373
                         self.server.child_pipe.fileno())
 
1118
1375
            session = (gnutls.connection
 
1119
1376
                       .ClientSession(self.request,
 
1120
1377
                                      gnutls.connection
 
1121
1378
                                      .X509Credentials()))
 
1123
1380
            # Note: gnutls.connection.X509Credentials is really a
 
1124
1381
            # generic GnuTLS certificate credentials object so long as
 
1125
1382
            # no X.509 keys are added to it.  Therefore, we can use it
 
1126
1383
            # here despite using OpenPGP certificates.
 
1128
 
            #priority = u':'.join((u"NONE", u"+VERS-TLS1.1",
 
1129
 
            #                      u"+AES-256-CBC", u"+SHA1",
 
1130
 
            #                      u"+COMP-NULL", u"+CTYPE-OPENPGP",
 
 
1385
            #priority = ':'.join(("NONE", "+VERS-TLS1.1",
 
 
1386
            #                      "+AES-256-CBC", "+SHA1",
 
 
1387
            #                      "+COMP-NULL", "+CTYPE-OPENPGP",
 
1132
1389
            # Use a fallback default, since this MUST be set.
 
1133
1390
            priority = self.server.gnutls_priority
 
1134
1391
            if priority is None:
 
1135
 
                priority = u"NORMAL"
 
1136
1393
            (gnutls.library.functions
 
1137
1394
             .gnutls_priority_set_direct(session._c_object,
 
1138
1395
                                         priority, None))
 
1140
1397
            # Start communication using the Mandos protocol
 
1141
1398
            # Get protocol number
 
1142
1399
            line = self.request.makefile().readline()
 
1143
 
            logger.debug(u"Protocol version: %r", line)
 
 
1400
            logger.debug("Protocol version: %r", line)
 
1145
1402
                if int(line.strip().split()[0]) > 1:
 
1146
1403
                    raise RuntimeError
 
1147
 
            except (ValueError, IndexError, RuntimeError), error:
 
1148
 
                logger.error(u"Unknown protocol version: %s", error)
 
 
1404
            except (ValueError, IndexError, RuntimeError) as error:
 
 
1405
                logger.error("Unknown protocol version: %s", error)
 
1151
1408
            # Start GnuTLS connection
 
1153
1410
                session.handshake()
 
1154
 
            except gnutls.errors.GNUTLSError, error:
 
1155
 
                logger.warning(u"Handshake failed: %s", error)
 
 
1411
            except gnutls.errors.GNUTLSError as error:
 
 
1412
                logger.warning("Handshake failed: %s", error)
 
1156
1413
                # Do not run session.bye() here: the session is not
 
1157
1414
                # established.  Just abandon the request.
 
1159
 
            logger.debug(u"Handshake succeeded")
 
 
1416
            logger.debug("Handshake succeeded")
 
1161
1418
            approval_required = False
 
1164
1421
                    fpr = self.fingerprint(self.peer_certificate
 
1166
 
                except (TypeError, gnutls.errors.GNUTLSError), error:
 
1167
 
                    logger.warning(u"Bad certificate: %s", error)
 
 
1424
                        gnutls.errors.GNUTLSError) as error:
 
 
1425
                    logger.warning("Bad certificate: %s", error)
 
1169
 
                logger.debug(u"Fingerprint: %s", fpr)
 
 
1427
                logger.debug("Fingerprint: %s", fpr)
 
1172
1430
                    client = ProxyClient(child_pipe, fpr,
 
1173
1431
                                         self.client_address)
 
1174
1432
                except KeyError:
 
1177
 
                if client.approved_delay:
 
1178
 
                    delay = client.approved_delay
 
 
1435
                if client.approval_delay:
 
 
1436
                    delay = client.approval_delay
 
1179
1437
                    client.approvals_pending += 1
 
1180
1438
                    approval_required = True
 
1183
1441
                    if not client.enabled:
 
1184
 
                        logger.warning(u"Client %s is disabled",
 
 
1442
                        logger.info("Client %s is disabled",
 
1186
1444
                        if self.server.use_dbus:
 
1187
1445
                            # Emit D-Bus signal
 
1188
 
                            client.Rejected("Disabled")                    
 
 
1446
                            client.Rejected("Disabled")
 
1191
 
                    if client._approved or not client.approved_delay:
 
 
1449
                    if client._approved or not client.approval_delay:
 
1192
1450
                        #We are approved or approval is disabled
 
1194
1452
                    elif client._approved is None:
 
1195
 
                        logger.info(u"Client %s need approval",
 
 
1453
                        logger.info("Client %s needs approval",
 
1197
1455
                        if self.server.use_dbus:
 
1198
1456
                            # Emit D-Bus signal
 
1199
1457
                            client.NeedApproval(
 
1200
 
                                client.approved_delay_milliseconds(),
 
 
1458
                                client.approval_delay_milliseconds(),
 
1201
1459
                                client.approved_by_default)
 
1203
 
                        logger.warning(u"Client %s was not approved",
 
 
1461
                        logger.warning("Client %s was not approved",
 
1205
1463
                        if self.server.use_dbus:
 
1206
1464
                            # Emit D-Bus signal
 
1207
 
                            client.Rejected("Disapproved")
 
 
1465
                            client.Rejected("Denied")
 
1210
1468
                    #wait until timeout or approved
 
1211
 
                    #x = float(client._timedelta_to_milliseconds(delay))
 
1212
1469
                    time = datetime.datetime.now()
 
1213
1470
                    client.changedstate.acquire()
 
1214
 
                    client.changedstate.wait(float(client._timedelta_to_milliseconds(delay) / 1000))
 
 
1471
                    (client.changedstate.wait
 
 
1472
                     (float(client._timedelta_to_milliseconds(delay)
 
1215
1474
                    client.changedstate.release()
 
1216
1475
                    time2 = datetime.datetime.now()
 
1217
1476
                    if (time2 - time) >= delay:
 
 
1465
1733
                                       for cond, name in
 
1466
1734
                                       condition_names.iteritems()
 
1467
1735
                                       if cond & condition)
 
1468
 
        logger.debug(u"Handling IPC: FD = %d, condition = %s", source,
 
1471
 
        # error or the other end of multiprocessing.Pipe has closed
 
 
1736
        # error, or the other end of multiprocessing.Pipe has closed
 
1472
1737
        if condition & (gobject.IO_ERR | condition & gobject.IO_HUP):
 
 
1738
            # Wait for other process to exit
 
1475
1742
        # Read a request from the child
 
1476
1743
        request = parent_pipe.recv()
 
1477
 
        logger.debug(u"IPC request: %s", repr(request))
 
1478
1744
        command = request[0]
 
1480
1746
        if command == 'init':
 
1481
1747
            fpr = request[1]
 
1482
1748
            address = request[2]
 
1484
 
            for c in self.clients:
 
 
1750
            for c in self.clients.itervalues():
 
1485
1751
                if c.fingerprint == fpr:
 
1489
 
                logger.warning(u"Client not found for fingerprint: %s, ad"
 
1490
 
                               u"dress: %s", fpr, address)
 
 
1755
                logger.info("Client not found for fingerprint: %s, ad"
 
 
1756
                            "dress: %s", fpr, address)
 
1491
1757
                if self.use_dbus:
 
1492
1758
                    # Emit D-Bus signal
 
1493
 
                    mandos_dbus_service.ClientNotFound(fpr, address)
 
 
1759
                    mandos_dbus_service.ClientNotFound(fpr,
 
1494
1761
                parent_pipe.send(False)
 
1497
1764
            gobject.io_add_watch(parent_pipe.fileno(),
 
1498
1765
                                 gobject.IO_IN | gobject.IO_HUP,
 
1499
1766
                                 functools.partial(self.handle_ipc,
 
1500
 
                                                   parent_pipe = parent_pipe,
 
1501
 
                                                   client_object = client))
 
1502
1772
            parent_pipe.send(True)
 
1503
 
            # remove the old hook in favor of the new above hook on same fileno
 
 
1773
            # remove the old hook in favor of the new above hook on
 
1505
1776
        if command == 'funcall':
 
1506
1777
            funcname = request[1]
 
1507
1778
            args = request[2]
 
1508
1779
            kwargs = request[3]
 
1510
 
            parent_pipe.send(('data', getattr(client_object, funcname)(*args, **kwargs)))
 
 
1781
            parent_pipe.send(('data', getattr(client_object,
 
1512
1785
        if command == 'getattr':
 
1513
1786
            attrname = request[1]
 
1514
1787
            if callable(client_object.__getattribute__(attrname)):
 
1515
1788
                parent_pipe.send(('function',))
 
1517
 
                parent_pipe.send(('data', client_object.__getattribute__(attrname)))
 
 
1790
                parent_pipe.send(('data', client_object
 
 
1791
                                  .__getattribute__(attrname)))
 
1519
1793
        if command == 'setattr':
 
1520
1794
            attrname = request[1]
 
1521
1795
            value = request[2]
 
1522
1796
            setattr(client_object, attrname, value)
 
1527
1801
def string_to_delta(interval):
 
1528
1802
    """Parse a string and return a datetime.timedelta
 
1530
 
    >>> string_to_delta(u'7d')
 
 
1804
    >>> string_to_delta('7d')
 
1531
1805
    datetime.timedelta(7)
 
1532
 
    >>> string_to_delta(u'60s')
 
 
1806
    >>> string_to_delta('60s')
 
1533
1807
    datetime.timedelta(0, 60)
 
1534
 
    >>> string_to_delta(u'60m')
 
 
1808
    >>> string_to_delta('60m')
 
1535
1809
    datetime.timedelta(0, 3600)
 
1536
 
    >>> string_to_delta(u'24h')
 
 
1810
    >>> string_to_delta('24h')
 
1537
1811
    datetime.timedelta(1)
 
1538
 
    >>> string_to_delta(u'1w')
 
 
1812
    >>> string_to_delta('1w')
 
1539
1813
    datetime.timedelta(7)
 
1540
 
    >>> string_to_delta(u'5m 30s')
 
 
1814
    >>> string_to_delta('5m 30s')
 
1541
1815
    datetime.timedelta(0, 330)
 
1543
1817
    timevalue = datetime.timedelta(0)
 
 
1617
1891
    ##################################################################
 
1618
1892
    # Parsing of options, both command line and config file
 
1620
 
    parser = optparse.OptionParser(version = "%%prog %s" % version)
 
1621
 
    parser.add_option("-i", u"--interface", type=u"string",
 
1622
 
                      metavar="IF", help=u"Bind to interface IF")
 
1623
 
    parser.add_option("-a", u"--address", type=u"string",
 
1624
 
                      help=u"Address to listen for requests on")
 
1625
 
    parser.add_option("-p", u"--port", type=u"int",
 
1626
 
                      help=u"Port number to receive requests on")
 
1627
 
    parser.add_option("--check", action=u"store_true",
 
1628
 
                      help=u"Run self-test")
 
1629
 
    parser.add_option("--debug", action=u"store_true",
 
1630
 
                      help=u"Debug mode; run in foreground and log to"
 
1632
 
    parser.add_option("--debuglevel", type=u"string", metavar="Level",
 
1633
 
                      help=u"Debug level for stdout output")
 
1634
 
    parser.add_option("--priority", type=u"string", help=u"GnuTLS"
 
1635
 
                      u" priority string (see GnuTLS documentation)")
 
1636
 
    parser.add_option("--servicename", type=u"string",
 
1637
 
                      metavar=u"NAME", help=u"Zeroconf service name")
 
1638
 
    parser.add_option("--configdir", type=u"string",
 
1639
 
                      default=u"/etc/mandos", metavar=u"DIR",
 
1640
 
                      help=u"Directory to search for configuration"
 
1642
 
    parser.add_option("--no-dbus", action=u"store_false",
 
1643
 
                      dest=u"use_dbus", help=u"Do not provide D-Bus"
 
1644
 
                      u" system bus interface")
 
1645
 
    parser.add_option("--no-ipv6", action=u"store_false",
 
1646
 
                      dest=u"use_ipv6", help=u"Do not use IPv6")
 
1647
 
    options = parser.parse_args()[0]
 
 
1894
    parser = argparse.ArgumentParser()
 
 
1895
    parser.add_argument("-v", "--version", action="version",
 
 
1896
                        version = "%%(prog)s %s" % version,
 
 
1897
                        help="show version number and exit")
 
 
1898
    parser.add_argument("-i", "--interface", metavar="IF",
 
 
1899
                        help="Bind to interface IF")
 
 
1900
    parser.add_argument("-a", "--address",
 
 
1901
                        help="Address to listen for requests on")
 
 
1902
    parser.add_argument("-p", "--port", type=int,
 
 
1903
                        help="Port number to receive requests on")
 
 
1904
    parser.add_argument("--check", action="store_true",
 
 
1905
                        help="Run self-test")
 
 
1906
    parser.add_argument("--debug", action="store_true",
 
 
1907
                        help="Debug mode; run in foreground and log"
 
 
1909
    parser.add_argument("--debuglevel", metavar="LEVEL",
 
 
1910
                        help="Debug level for stdout output")
 
 
1911
    parser.add_argument("--priority", help="GnuTLS"
 
 
1912
                        " priority string (see GnuTLS documentation)")
 
 
1913
    parser.add_argument("--servicename",
 
 
1914
                        metavar="NAME", help="Zeroconf service name")
 
 
1915
    parser.add_argument("--configdir",
 
 
1916
                        default="/etc/mandos", metavar="DIR",
 
 
1917
                        help="Directory to search for configuration"
 
 
1919
    parser.add_argument("--no-dbus", action="store_false",
 
 
1920
                        dest="use_dbus", help="Do not provide D-Bus"
 
 
1921
                        " system bus interface")
 
 
1922
    parser.add_argument("--no-ipv6", action="store_false",
 
 
1923
                        dest="use_ipv6", help="Do not use IPv6")
 
 
1924
    parser.add_argument("--no-restore", action="store_false",
 
 
1925
                        dest="restore", help="Do not restore stored state",
 
 
1928
    options = parser.parse_args()
 
1649
1930
    if options.check:
 
 
1698
1979
    ##################################################################
 
1700
1981
    # For convenience
 
1701
 
    debug = server_settings[u"debug"]
 
1702
 
    debuglevel = server_settings[u"debuglevel"]
 
1703
 
    use_dbus = server_settings[u"use_dbus"]
 
1704
 
    use_ipv6 = server_settings[u"use_ipv6"]
 
1706
 
    if server_settings[u"servicename"] != u"Mandos":
 
 
1982
    debug = server_settings["debug"]
 
 
1983
    debuglevel = server_settings["debuglevel"]
 
 
1984
    use_dbus = server_settings["use_dbus"]
 
 
1985
    use_ipv6 = server_settings["use_ipv6"]
 
 
1987
    if server_settings["servicename"] != "Mandos":
 
1707
1988
        syslogger.setFormatter(logging.Formatter
 
1708
 
                               (u'Mandos (%s) [%%(process)d]:'
 
1709
 
                                u' %%(levelname)s: %%(message)s'
 
1710
 
                                % server_settings[u"servicename"]))
 
 
1989
                               ('Mandos (%s) [%%(process)d]:'
 
 
1990
                                ' %%(levelname)s: %%(message)s'
 
 
1991
                                % server_settings["servicename"]))
 
1712
1993
    # Parse config file with clients
 
1713
 
    client_defaults = { u"timeout": u"1h",
 
1715
 
                        u"checker": u"fping -q -- %%(host)s",
 
1717
 
                        u"approved_delay": u"0s",
 
1718
 
                        u"approved_duration": u"1s",
 
 
1994
    client_defaults = { "timeout": "5m",
 
 
1995
                        "extended_timeout": "15m",
 
 
1997
                        "checker": "fping -q -- %%(host)s",
 
 
1999
                        "approval_delay": "0s",
 
 
2000
                        "approval_duration": "1s",
 
1720
2002
    client_config = configparser.SafeConfigParser(client_defaults)
 
1721
 
    client_config.read(os.path.join(server_settings[u"configdir"],
 
 
2003
    client_config.read(os.path.join(server_settings["configdir"],
 
1724
2006
    global mandos_dbus_service
 
1725
2007
    mandos_dbus_service = None
 
1727
 
    tcp_server = MandosServer((server_settings[u"address"],
 
1728
 
                               server_settings[u"port"]),
 
 
2009
    tcp_server = MandosServer((server_settings["address"],
 
 
2010
                               server_settings["port"]),
 
1730
 
                              interface=server_settings[u"interface"],
 
 
2012
                              interface=(server_settings["interface"]
 
1731
2014
                              use_ipv6=use_ipv6,
 
1732
2015
                              gnutls_priority=
 
1733
 
                              server_settings[u"priority"],
 
 
2016
                              server_settings["priority"],
 
1734
2017
                              use_dbus=use_dbus)
 
1735
 
    pidfilename = u"/var/run/mandos.pid"
 
1737
 
        pidfile = open(pidfilename, u"w")
 
1739
 
        logger.error(u"Could not open file %r", pidfilename)
 
 
2019
        pidfilename = "/var/run/mandos.pid"
 
 
2021
            pidfile = open(pidfilename, "w")
 
 
2023
            logger.error("Could not open file %r", pidfilename)
 
1742
 
        uid = pwd.getpwnam(u"_mandos").pw_uid
 
1743
 
        gid = pwd.getpwnam(u"_mandos").pw_gid
 
 
2026
        uid = pwd.getpwnam("_mandos").pw_uid
 
 
2027
        gid = pwd.getpwnam("_mandos").pw_gid
 
1744
2028
    except KeyError:
 
1746
 
            uid = pwd.getpwnam(u"mandos").pw_uid
 
1747
 
            gid = pwd.getpwnam(u"mandos").pw_gid
 
 
2030
            uid = pwd.getpwnam("mandos").pw_uid
 
 
2031
            gid = pwd.getpwnam("mandos").pw_gid
 
1748
2032
        except KeyError:
 
1750
 
                uid = pwd.getpwnam(u"nobody").pw_uid
 
1751
 
                gid = pwd.getpwnam(u"nobody").pw_gid
 
 
2034
                uid = pwd.getpwnam("nobody").pw_uid
 
 
2035
                gid = pwd.getpwnam("nobody").pw_gid
 
1752
2036
            except KeyError:
 
1758
 
    except OSError, error:
 
 
2042
    except OSError as error:
 
1759
2043
        if error[0] != errno.EPERM:
 
1762
 
    # Enable all possible GnuTLS debugging
 
1765
2046
    if not debug and not debuglevel:
 
1766
 
        syslogger.setLevel(logging.WARNING)
 
1767
 
        console.setLevel(logging.WARNING)
 
 
2047
        logger.setLevel(logging.WARNING)
 
1769
2049
        level = getattr(logging, debuglevel.upper())
 
1770
 
        syslogger.setLevel(level)
 
1771
 
        console.setLevel(level)
 
 
2050
        logger.setLevel(level)
 
 
2053
        logger.setLevel(logging.DEBUG)
 
 
2054
        # Enable all possible GnuTLS debugging
 
1774
2056
        # "Use a log level over 10 to enable all debugging options."
 
1775
2057
        # - GnuTLS manual
 
1776
2058
        gnutls.library.functions.gnutls_global_set_log_level(11)
 
1778
2060
        @gnutls.library.types.gnutls_log_func
 
1779
2061
        def debug_gnutls(level, string):
 
1780
 
            logger.debug(u"GnuTLS: %s", string[:-1])
 
 
2062
            logger.debug("GnuTLS: %s", string[:-1])
 
1782
2064
        (gnutls.library.functions
 
1783
2065
         .gnutls_global_set_log_function(debug_gnutls))
 
1785
2067
        # Redirect stdin so all checkers get /dev/null
 
1786
2068
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
 
1787
2069
        os.dup2(null, sys.stdin.fileno())
 
 
1800
2086
    # End of Avahi example code
 
1803
 
            bus_name = dbus.service.BusName(u"se.bsnet.fukt.Mandos",
 
 
2089
            bus_name = dbus.service.BusName("se.recompile.Mandos",
 
1804
2090
                                            bus, do_not_queue=True)
 
1805
 
        except dbus.exceptions.NameExistsException, e:
 
1806
 
            logger.error(unicode(e) + u", disabling D-Bus")
 
 
2091
            old_bus_name = (dbus.service.BusName
 
 
2092
                            ("se.bsnet.fukt.Mandos", bus,
 
 
2094
        except dbus.exceptions.NameExistsException as e:
 
 
2095
            logger.error(unicode(e) + ", disabling D-Bus")
 
1807
2096
            use_dbus = False
 
1808
 
            server_settings[u"use_dbus"] = False
 
 
2097
            server_settings["use_dbus"] = False
 
1809
2098
            tcp_server.use_dbus = False
 
1810
2099
    protocol = avahi.PROTO_INET6 if use_ipv6 else avahi.PROTO_INET
 
1811
 
    service = AvahiService(name = server_settings[u"servicename"],
 
1812
 
                           servicetype = u"_mandos._tcp",
 
1813
 
                           protocol = protocol, bus = bus)
 
 
2100
    service = AvahiServiceToSyslog(name =
 
 
2101
                                   server_settings["servicename"],
 
 
2102
                                   servicetype = "_mandos._tcp",
 
 
2103
                                   protocol = protocol, bus = bus)
 
1814
2104
    if server_settings["interface"]:
 
1815
2105
        service.interface = (if_nametoindex
 
1816
 
                             (str(server_settings[u"interface"])))
 
1819
 
        # Close all input and output, do double fork, etc.
 
 
2106
                             (str(server_settings["interface"])))
 
1822
2108
    global multiprocessing_manager
 
1823
2109
    multiprocessing_manager = multiprocessing.Manager()
 
1825
2111
    client_class = Client
 
1827
 
        client_class = functools.partial(ClientDBus, bus = bus)
 
1828
 
    def client_config_items(config, section):
 
1829
 
        special_settings = {
 
1830
 
            "approved_by_default":
 
1831
 
                lambda: config.getboolean(section,
 
1832
 
                                          "approved_by_default"),
 
1834
 
        for name, value in config.items(section):
 
 
2113
        client_class = functools.partial(ClientDBusTransitional,
 
 
2116
    special_settings = {
 
 
2117
        # Some settings need to be accessd by special methods;
 
 
2118
        # booleans need .getboolean(), etc.  Here is a list of them:
 
 
2119
        "approved_by_default":
 
 
2121
            client_config.getboolean(section, "approved_by_default"),
 
 
2123
    # Construct a new dict of client settings of this form:
 
 
2124
    # { client_name: {setting_name: value, ...}, ...}
 
 
2125
    # with exceptions for any special settings as defined above
 
 
2126
    client_settings = dict((clientname,
 
 
2128
                                 (value if setting not in special_settings
 
 
2129
                                  else special_settings[setting](clientname)))
 
 
2130
                                for setting, value in client_config.items(clientname)))
 
 
2131
                          for clientname in client_config.sections())
 
 
2133
    old_client_settings = {}
 
 
2136
    # Get client data and settings from last running state. 
 
 
2137
    if server_settings["restore"]:
 
 
2139
            with open(stored_state_path, "rb") as stored_state:
 
 
2140
                clients_data, old_client_settings = pickle.load(stored_state)
 
 
2141
            os.remove(stored_state_path)
 
 
2142
        except IOError as e:
 
 
2143
            logger.warning("Could not load persistant state: {0}".format(e))
 
 
2144
            if e.errno != errno.ENOENT:
 
 
2147
    for client in clients_data:
 
 
2148
        client_name = client["name"]
 
 
2150
        # Decide which value to use after restoring saved state.
 
 
2151
        # We have three different values: Old config file,
 
 
2152
        # new config file, and saved state.
 
 
2153
        # New config value takes precedence if it differs from old
 
 
2154
        # config value, otherwise use saved state.
 
 
2155
        for name, value in client_settings[client_name].items():
 
1836
 
                yield (name, special_settings[name]())
 
 
2157
                # For each value in new config, check if it differs
 
 
2158
                # from the old config value (Except for the "secret"
 
 
2160
                if name != "secret" and value != old_client_settings[client_name][name]:
 
 
2161
                    setattr(client, name, value)
 
1837
2162
            except KeyError:
 
 
2165
        # Clients who has passed its expire date, can still be enabled if its
 
 
2166
        # last checker was sucessful. Clients who checkers failed before we
 
 
2167
        # stored it state is asumed to had failed checker during downtime.
 
 
2168
        if client["enabled"] and client["last_checked_ok"]:
 
 
2169
            if ((datetime.datetime.utcnow() - client["last_checked_ok"])
 
 
2170
                > client["interval"]):
 
 
2171
                if client["last_checker_status"] != 0:
 
 
2172
                    client["enabled"] = False
 
 
2174
                    client["expires"] = datetime.datetime.utcnow() + client["timeout"]
 
 
2176
        client["changedstate"] = (multiprocessing_manager
 
 
2177
                                  .Condition(multiprocessing_manager
 
 
2180
            new_client = ClientDBusTransitional.__new__(ClientDBusTransitional)
 
 
2181
            tcp_server.clients[client_name] = new_client
 
 
2182
            new_client.bus = bus
 
 
2183
            for name, value in client.iteritems():
 
 
2184
                setattr(new_client, name, value)
 
 
2185
            client_object_name = unicode(client_name).translate(
 
 
2186
                {ord("."): ord("_"),
 
 
2187
                 ord("-"): ord("_")})
 
 
2188
            new_client.dbus_object_path = (dbus.ObjectPath
 
 
2189
                                     ("/clients/" + client_object_name))
 
 
2190
            DBusObjectWithProperties.__init__(new_client,
 
 
2192
                                              new_client.dbus_object_path)
 
 
2194
            tcp_server.clients[client_name] = Client.__new__(Client)
 
 
2195
            for name, value in client.iteritems():
 
 
2196
                setattr(tcp_server.clients[client_name], name, value)
 
 
2198
        tcp_server.clients[client_name].decrypt_secret(
 
 
2199
            client_settings[client_name]["secret"])            
 
 
2201
    # Create/remove clients based on new changes made to config
 
 
2202
    for clientname in set(old_client_settings) - set(client_settings):
 
 
2203
        del tcp_server.clients[clientname]
 
 
2204
    for clientname in set(client_settings) - set(old_client_settings):
 
 
2205
        tcp_server.clients[clientname] = (client_class(name = clientname,
 
1840
 
    tcp_server.clients.update(set(
 
1841
 
            client_class(name = section,
 
1842
 
                         config= dict(client_config_items(
 
1843
 
                        client_config, section)))
 
1844
 
            for section in client_config.sections()))
 
1845
2211
    if not tcp_server.clients:
 
1846
 
        logger.warning(u"No clients defined")
 
 
2212
        logger.warning("No clients defined")
 
1851
 
            pidfile.write(str(pid) + "\n")
 
1854
 
        logger.error(u"Could not write to file %r with PID %d",
 
1857
 
        # "pidfile" was never created
 
 
2218
                pidfile.write(str(pid) + "\n".encode("utf-8"))
 
 
2221
            logger.error("Could not write to file %r with PID %d",
 
 
2224
            # "pidfile" was never created
 
1862
2228
        signal.signal(signal.SIGINT, signal.SIG_IGN)
 
1863
2230
    signal.signal(signal.SIGHUP, lambda signum, frame: sys.exit())
 
1864
2231
    signal.signal(signal.SIGTERM, lambda signum, frame: sys.exit())
 
 
1867
2234
        class MandosDBusService(dbus.service.Object):
 
1868
2235
            """A D-Bus proxy object"""
 
1869
2236
            def __init__(self):
 
1870
 
                dbus.service.Object.__init__(self, bus, u"/")
 
1871
 
            _interface = u"se.bsnet.fukt.Mandos"
 
 
2237
                dbus.service.Object.__init__(self, bus, "/")
 
 
2238
            _interface = "se.recompile.Mandos"
 
1873
 
            @dbus.service.signal(_interface, signature=u"o")
 
 
2240
            @dbus.service.signal(_interface, signature="o")
 
1874
2241
            def ClientAdded(self, objpath):
 
1878
 
            @dbus.service.signal(_interface, signature=u"ss")
 
 
2245
            @dbus.service.signal(_interface, signature="ss")
 
1879
2246
            def ClientNotFound(self, fingerprint, address):
 
1883
 
            @dbus.service.signal(_interface, signature=u"os")
 
 
2250
            @dbus.service.signal(_interface, signature="os")
 
1884
2251
            def ClientRemoved(self, objpath, name):
 
1888
 
            @dbus.service.method(_interface, out_signature=u"ao")
 
 
2255
            @dbus.service.method(_interface, out_signature="ao")
 
1889
2256
            def GetAllClients(self):
 
1891
2258
                return dbus.Array(c.dbus_object_path
 
1892
 
                                  for c in tcp_server.clients)
 
 
2260
                                  tcp_server.clients.itervalues())
 
1894
2262
            @dbus.service.method(_interface,
 
1895
 
                                 out_signature=u"a{oa{sv}}")
 
 
2263
                                 out_signature="a{oa{sv}}")
 
1896
2264
            def GetAllClientsWithProperties(self):
 
1898
2266
                return dbus.Dictionary(
 
1899
 
                    ((c.dbus_object_path, c.GetAll(u""))
 
1900
 
                     for c in tcp_server.clients),
 
1901
 
                    signature=u"oa{sv}")
 
 
2267
                    ((c.dbus_object_path, c.GetAll(""))
 
 
2268
                     for c in tcp_server.clients.itervalues()),
 
1903
 
            @dbus.service.method(_interface, in_signature=u"o")
 
 
2271
            @dbus.service.method(_interface, in_signature="o")
 
1904
2272
            def RemoveClient(self, object_path):
 
1906
 
                for c in tcp_server.clients:
 
 
2274
                for c in tcp_server.clients.itervalues():
 
1907
2275
                    if c.dbus_object_path == object_path:
 
1908
 
                        tcp_server.clients.remove(c)
 
 
2276
                        del tcp_server.clients[c.name]
 
1909
2277
                        c.remove_from_connection()
 
1910
2278
                        # Don't signal anything except ClientRemoved
 
1911
2279
                        c.disable(quiet=True)