80
85
    except ImportError:
 
81
86
        SO_BINDTODEVICE = None
 
86
 
#logger = logging.getLogger(u'mandos')
 
87
 
logger = logging.Logger(u'mandos')
 
 
89
stored_state_file = "clients.pickle"
 
 
91
logger = logging.getLogger()
 
88
92
syslogger = (logging.handlers.SysLogHandler
 
89
93
             (facility = logging.handlers.SysLogHandler.LOG_DAEMON,
 
90
 
              address = "/dev/log"))
 
91
 
syslogger.setFormatter(logging.Formatter
 
92
 
                       (u'Mandos [%(process)d]: %(levelname)s:'
 
94
 
logger.addHandler(syslogger)
 
96
 
console = logging.StreamHandler()
 
97
 
console.setFormatter(logging.Formatter(u'%(name)s [%(process)d]:'
 
100
 
logger.addHandler(console)
 
 
94
              address = str("/dev/log")))
 
 
97
    if_nametoindex = (ctypes.cdll.LoadLibrary
 
 
98
                      (ctypes.util.find_library("c"))
 
 
100
except (OSError, AttributeError):
 
 
101
    def if_nametoindex(interface):
 
 
102
        "Get an interface index the hard way, i.e. using fcntl()"
 
 
103
        SIOCGIFINDEX = 0x8933  # From /usr/include/linux/sockios.h
 
 
104
        with contextlib.closing(socket.socket()) as s:
 
 
105
            ifreq = fcntl.ioctl(s, SIOCGIFINDEX,
 
 
106
                                struct.pack(str("16s16x"),
 
 
108
        interface_index = struct.unpack(str("I"),
 
 
110
        return interface_index
 
 
113
def initlogger(level=logging.WARNING):
 
 
114
    """init logger and add loglevel"""
 
 
116
    syslogger.setFormatter(logging.Formatter
 
 
117
                           ('Mandos [%(process)d]: %(levelname)s:'
 
 
119
    logger.addHandler(syslogger)
 
 
121
    console = logging.StreamHandler()
 
 
122
    console.setFormatter(logging.Formatter('%(asctime)s %(name)s'
 
 
126
    logger.addHandler(console)
 
 
127
    logger.setLevel(level)
 
 
130
class PGPError(Exception):
 
 
131
    """Exception if encryption/decryption fails"""
 
 
135
class PGPEngine(object):
 
 
136
    """A simple class for OpenPGP symmetric encryption & decryption"""
 
 
138
        self.gnupg = GnuPGInterface.GnuPG()
 
 
139
        self.tempdir = tempfile.mkdtemp(prefix="mandos-")
 
 
140
        self.gnupg = GnuPGInterface.GnuPG()
 
 
141
        self.gnupg.options.meta_interactive = False
 
 
142
        self.gnupg.options.homedir = self.tempdir
 
 
143
        self.gnupg.options.extra_args.extend(['--force-mdc',
 
 
149
    def __exit__ (self, exc_type, exc_value, traceback):
 
 
157
        if self.tempdir is not None:
 
 
158
            # Delete contents of tempdir
 
 
159
            for root, dirs, files in os.walk(self.tempdir,
 
 
161
                for filename in files:
 
 
162
                    os.remove(os.path.join(root, filename))
 
 
164
                    os.rmdir(os.path.join(root, dirname))
 
 
166
            os.rmdir(self.tempdir)
 
 
169
    def password_encode(self, password):
 
 
170
        # Passphrase can not be empty and can not contain newlines or
 
 
171
        # NUL bytes.  So we prefix it and hex encode it.
 
 
172
        return b"mandos" + binascii.hexlify(password)
 
 
174
    def encrypt(self, data, password):
 
 
175
        self.gnupg.passphrase = self.password_encode(password)
 
 
176
        with open(os.devnull) as devnull:
 
 
178
                proc = self.gnupg.run(['--symmetric'],
 
 
179
                                      create_fhs=['stdin', 'stdout'],
 
 
180
                                      attach_fhs={'stderr': devnull})
 
 
181
                with contextlib.closing(proc.handles['stdin']) as f:
 
 
183
                with contextlib.closing(proc.handles['stdout']) as f:
 
 
184
                    ciphertext = f.read()
 
 
188
        self.gnupg.passphrase = None
 
 
191
    def decrypt(self, data, password):
 
 
192
        self.gnupg.passphrase = self.password_encode(password)
 
 
193
        with open(os.devnull) as devnull:
 
 
195
                proc = self.gnupg.run(['--decrypt'],
 
 
196
                                      create_fhs=['stdin', 'stdout'],
 
 
197
                                      attach_fhs={'stderr': devnull})
 
 
198
                with contextlib.closing(proc.handles['stdin'] ) as f:
 
 
200
                with contextlib.closing(proc.handles['stdout']) as f:
 
 
201
                    decrypted_plaintext = f.read()
 
 
205
        self.gnupg.passphrase = None
 
 
206
        return decrypted_plaintext
 
102
210
class AvahiError(Exception):
 
103
211
    def __init__(self, value, *args, **kwargs):
 
 
194
309
        self.group.Commit()
 
195
310
    def entry_group_state_changed(self, state, error):
 
196
311
        """Derived from the Avahi example code"""
 
197
 
        logger.debug(u"Avahi state change: %i", state)
 
 
312
        logger.debug("Avahi entry group state change: %i", state)
 
199
314
        if state == avahi.ENTRY_GROUP_ESTABLISHED:
 
200
 
            logger.debug(u"Zeroconf service established.")
 
 
315
            logger.debug("Zeroconf service established.")
 
201
316
        elif state == avahi.ENTRY_GROUP_COLLISION:
 
202
 
            logger.warning(u"Zeroconf service name collision.")
 
 
317
            logger.info("Zeroconf service name collision.")
 
204
319
        elif state == avahi.ENTRY_GROUP_FAILURE:
 
205
 
            logger.critical(u"Avahi: Error in group state changed %s",
 
 
320
            logger.critical("Avahi: Error in group state changed %s",
 
207
 
            raise AvahiGroupError(u"State changed: %s"
 
 
322
            raise AvahiGroupError("State changed: %s"
 
208
323
                                  % unicode(error))
 
209
324
    def cleanup(self):
 
210
325
        """Derived from the Avahi example code"""
 
211
326
        if self.group is not None:
 
 
329
            except (dbus.exceptions.UnknownMethodException,
 
 
330
                    dbus.exceptions.DBusException):
 
213
332
            self.group = None
 
214
 
    def server_state_changed(self, state):
 
 
334
    def server_state_changed(self, state, error=None):
 
215
335
        """Derived from the Avahi example code"""
 
216
 
        if state == avahi.SERVER_COLLISION:
 
217
 
            logger.error(u"Zeroconf server name collision")
 
 
336
        logger.debug("Avahi server state change: %i", state)
 
 
337
        bad_states = { avahi.SERVER_INVALID:
 
 
338
                           "Zeroconf server invalid",
 
 
339
                       avahi.SERVER_REGISTERING: None,
 
 
340
                       avahi.SERVER_COLLISION:
 
 
341
                           "Zeroconf server name collision",
 
 
342
                       avahi.SERVER_FAILURE:
 
 
343
                           "Zeroconf server failure" }
 
 
344
        if state in bad_states:
 
 
345
            if bad_states[state] is not None:
 
 
347
                    logger.error(bad_states[state])
 
 
349
                    logger.error(bad_states[state] + ": %r", error)
 
219
351
        elif state == avahi.SERVER_RUNNING:
 
 
355
                logger.debug("Unknown state: %r", state)
 
 
357
                logger.debug("Unknown state: %r: %r", state, error)
 
221
358
    def activate(self):
 
222
359
        """Derived from the Avahi example code"""
 
223
360
        if self.server is None:
 
224
361
            self.server = dbus.Interface(
 
225
362
                self.bus.get_object(avahi.DBUS_NAME,
 
226
 
                                    avahi.DBUS_PATH_SERVER),
 
 
363
                                    avahi.DBUS_PATH_SERVER,
 
 
364
                                    follow_name_owner_changes=True),
 
227
365
                avahi.DBUS_INTERFACE_SERVER)
 
228
 
        self.server.connect_to_signal(u"StateChanged",
 
 
366
        self.server.connect_to_signal("StateChanged",
 
229
367
                                 self.server_state_changed)
 
230
368
        self.server_state_changed(self.server.GetState())
 
 
370
class AvahiServiceToSyslog(AvahiService):
 
 
372
        """Add the new name to the syslog messages"""
 
 
373
        ret = AvahiService.rename(self)
 
 
374
        syslogger.setFormatter(logging.Formatter
 
 
375
                               ('Mandos (%s) [%%(process)d]:'
 
 
376
                                ' %%(levelname)s: %%(message)s'
 
 
380
def timedelta_to_milliseconds(td):
 
 
381
    "Convert a datetime.timedelta() to milliseconds"
 
 
382
    return ((td.days * 24 * 60 * 60 * 1000)
 
 
383
            + (td.seconds * 1000)
 
 
384
            + (td.microseconds // 1000))
 
233
386
class Client(object):
 
234
387
    """A representation of a client host served by this server.
 
237
 
    name:       string; from the config file, used in log messages and
 
 
390
    approved:   bool(); 'None' if not yet approved/disapproved
 
 
391
    approval_delay: datetime.timedelta(); Time to wait for approval
 
 
392
    approval_duration: datetime.timedelta(); Duration of one approval
 
 
393
    checker:    subprocess.Popen(); a running checker process used
 
 
394
                                    to see if the client lives.
 
 
395
                                    'None' if no process is running.
 
 
396
    checker_callback_tag: a gobject event source tag, or None
 
 
397
    checker_command: string; External command which is run to check
 
 
398
                     if client lives.  %() expansions are done at
 
 
399
                     runtime with vars(self) as dict, so that for
 
 
400
                     instance %(name)s can be used in the command.
 
 
401
    checker_initiator_tag: a gobject event source tag, or None
 
 
402
    created:    datetime.datetime(); (UTC) object creation
 
 
403
    client_structure: Object describing what attributes a client has
 
 
404
                      and is used for storing the client at exit
 
 
405
    current_checker_command: string; current running checker_command
 
 
406
    disable_initiator_tag: a gobject event source tag, or None
 
239
408
    fingerprint: string (40 or 32 hexadecimal digits); used to
 
240
409
                 uniquely identify the client
 
241
 
    secret:     bytestring; sent verbatim (over TLS) to client
 
242
410
    host:       string; available for use by the checker command
 
243
 
    created:    datetime.datetime(); (UTC) object creation
 
244
 
    last_enabled: datetime.datetime(); (UTC)
 
 
411
    interval:   datetime.timedelta(); How often to start a new checker
 
 
412
    last_approval_request: datetime.datetime(); (UTC) or None
 
246
413
    last_checked_ok: datetime.datetime(); (UTC) or None
 
 
414
    last_checker_status: integer between 0 and 255 reflecting exit
 
 
415
                         status of last checker. -1 reflects crashed
 
 
417
    last_enabled: datetime.datetime(); (UTC) or None
 
 
418
    name:       string; from the config file, used in log messages and
 
 
420
    secret:     bytestring; sent verbatim (over TLS) to client
 
247
421
    timeout:    datetime.timedelta(); How long from last_checked_ok
 
248
422
                                      until this client is disabled
 
249
 
    interval:   datetime.timedelta(); How often to start a new checker
 
250
 
    disable_hook:  If set, called by disable() as disable_hook(self)
 
251
 
    checker:    subprocess.Popen(); a running checker process used
 
252
 
                                    to see if the client lives.
 
253
 
                                    'None' if no process is running.
 
254
 
    checker_initiator_tag: a gobject event source tag, or None
 
255
 
    disable_initiator_tag: - '' -
 
256
 
    checker_callback_tag:  - '' -
 
257
 
    checker_command: string; External command which is run to check if
 
258
 
                     client lives.  %() expansions are done at
 
259
 
                     runtime with vars(self) as dict, so that for
 
260
 
                     instance %(name)s can be used in the command.
 
261
 
    current_checker_command: string; current running checker_command
 
262
 
    approved_delay: datetime.timedelta(); Time to wait for approval
 
263
 
    _approved:   bool(); 'None' if not yet approved/disapproved
 
264
 
    approved_duration: datetime.timedelta(); Duration of one approval
 
 
423
    extended_timeout:   extra long timeout when password has been sent
 
 
424
    runtime_expansions: Allowed attributes for runtime expansion.
 
 
425
    expires:    datetime.datetime(); time (UTC) when a client will be
 
268
 
    def _timedelta_to_milliseconds(td):
 
269
 
        "Convert a datetime.timedelta() to milliseconds"
 
270
 
        return ((td.days * 24 * 60 * 60 * 1000)
 
271
 
                + (td.seconds * 1000)
 
272
 
                + (td.microseconds // 1000))
 
 
429
    runtime_expansions = ("approval_delay", "approval_duration",
 
 
430
                          "created", "enabled", "fingerprint",
 
 
431
                          "host", "interval", "last_checked_ok",
 
 
432
                          "last_enabled", "name", "timeout")
 
 
433
    client_defaults = { "timeout": "5m",
 
 
434
                        "extended_timeout": "15m",
 
 
436
                        "checker": "fping -q -- %%(host)s",
 
 
438
                        "approval_delay": "0s",
 
 
439
                        "approval_duration": "1s",
 
 
440
                        "approved_by_default": "True",
 
274
444
    def timeout_milliseconds(self):
 
275
445
        "Return the 'timeout' attribute in milliseconds"
 
276
 
        return self._timedelta_to_milliseconds(self.timeout)
 
 
446
        return timedelta_to_milliseconds(self.timeout)
 
 
448
    def extended_timeout_milliseconds(self):
 
 
449
        "Return the 'extended_timeout' attribute in milliseconds"
 
 
450
        return timedelta_to_milliseconds(self.extended_timeout)
 
278
452
    def interval_milliseconds(self):
 
279
453
        "Return the 'interval' attribute in milliseconds"
 
280
 
        return self._timedelta_to_milliseconds(self.interval)
 
282
 
    def approved_delay_milliseconds(self):
 
283
 
        return self._timedelta_to_milliseconds(self.approved_delay)
 
 
454
        return timedelta_to_milliseconds(self.interval)
 
285
 
    def __init__(self, name = None, disable_hook=None, config=None):
 
 
456
    def approval_delay_milliseconds(self):
 
 
457
        return timedelta_to_milliseconds(self.approval_delay)
 
 
460
    def config_parser(config):
 
 
461
        """ Construct a new dict of client settings of this form:
 
 
462
        { client_name: {setting_name: value, ...}, ...}
 
 
463
        with exceptions for any special settings as defined above"""
 
 
465
        for client_name in config.sections():
 
 
466
            section = dict(config.items(client_name))
 
 
467
            client = settings[client_name] = {}
 
 
469
            client["host"] = section["host"]
 
 
470
            # Reformat values from string types to Python types
 
 
471
            client["approved_by_default"] = config.getboolean(
 
 
472
                client_name, "approved_by_default")
 
 
473
            client["enabled"] = config.getboolean(client_name, "enabled")
 
 
475
            client["fingerprint"] = (section["fingerprint"].upper()
 
 
477
            if "secret" in section:
 
 
478
                client["secret"] = section["secret"].decode("base64")
 
 
479
            elif "secfile" in section:
 
 
480
                with open(os.path.expanduser(os.path.expandvars
 
 
481
                                             (section["secfile"])),
 
 
483
                    client["secret"] = secfile.read()
 
 
485
                raise TypeError("No secret or secfile for section %s"
 
 
487
            client["timeout"] = string_to_delta(section["timeout"])
 
 
488
            client["extended_timeout"] = string_to_delta(
 
 
489
                section["extended_timeout"])
 
 
490
            client["interval"] = string_to_delta(section["interval"])
 
 
491
            client["approval_delay"] = string_to_delta(
 
 
492
                section["approval_delay"])
 
 
493
            client["approval_duration"] = string_to_delta(
 
 
494
                section["approval_duration"])
 
 
495
            client["checker_command"] = section["checker"]
 
 
496
            client["last_approval_request"] = None
 
 
497
            client["last_checked_ok"] = None
 
 
498
            client["last_checker_status"] = None
 
 
499
            if client["enabled"]:
 
 
500
                client["last_enabled"] = datetime.datetime.utcnow()
 
 
501
                client["expires"] = (datetime.datetime.utcnow()
 
 
504
                client["last_enabled"] = None
 
 
505
                client["expires"] = None
 
 
510
    def __init__(self, settings, name = None):
 
286
511
        """Note: the 'checker' key in 'config' sets the
 
287
512
        'checker_command' attribute and *not* the 'checker'
 
292
 
        logger.debug(u"Creating client %r", self.name)
 
 
515
        # adding all client settings
 
 
516
        for setting, value in settings.iteritems():
 
 
517
            setattr(self, setting, value)
 
 
519
        logger.debug("Creating client %r", self.name)
 
293
520
        # Uppercase and remove spaces from fingerprint for later
 
294
521
        # comparison purposes with return value from the fingerprint()
 
296
 
        self.fingerprint = (config[u"fingerprint"].upper()
 
298
 
        logger.debug(u"  Fingerprint: %s", self.fingerprint)
 
299
 
        if u"secret" in config:
 
300
 
            self.secret = config[u"secret"].decode(u"base64")
 
301
 
        elif u"secfile" in config:
 
302
 
            with open(os.path.expanduser(os.path.expandvars
 
303
 
                                         (config[u"secfile"])),
 
305
 
                self.secret = secfile.read()
 
307
 
            raise TypeError(u"No secret or secfile for client %s"
 
309
 
        self.host = config.get(u"host", u"")
 
310
 
        self.created = datetime.datetime.utcnow()
 
312
 
        self.last_enabled = None
 
313
 
        self.last_checked_ok = None
 
314
 
        self.timeout = string_to_delta(config[u"timeout"])
 
315
 
        self.interval = string_to_delta(config[u"interval"])
 
316
 
        self.disable_hook = disable_hook
 
 
523
        logger.debug("  Fingerprint: %s", self.fingerprint)
 
 
524
        self.created = settings.get("created", datetime.datetime.utcnow())
 
 
526
        # attributes specific for this server instance
 
317
527
        self.checker = None
 
318
528
        self.checker_initiator_tag = None
 
319
529
        self.disable_initiator_tag = None
 
320
530
        self.checker_callback_tag = None
 
321
 
        self.checker_command = config[u"checker"]
 
322
531
        self.current_checker_command = None
 
323
 
        self.last_connect = None
 
324
 
        self._approved = None
 
325
 
        self.approved_by_default = config.get(u"approved_by_default",
 
327
533
        self.approvals_pending = 0
 
328
 
        self.approved_delay = string_to_delta(
 
329
 
            config[u"approved_delay"])
 
330
 
        self.approved_duration = string_to_delta(
 
331
 
            config[u"approved_duration"])
 
332
 
        self.changedstate = multiprocessing_manager.Condition(multiprocessing_manager.Lock())
 
 
534
        self.changedstate = (multiprocessing_manager
 
 
535
                             .Condition(multiprocessing_manager
 
 
537
        self.client_structure = [attr for attr in
 
 
538
                                 self.__dict__.iterkeys()
 
 
539
                                 if not attr.startswith("_")]
 
 
540
        self.client_structure.append("client_structure")
 
 
542
        for name, t in inspect.getmembers(type(self),
 
 
546
            if not name.startswith("_"):
 
 
547
                self.client_structure.append(name)
 
 
549
    # Send notice to process children that client state has changed
 
334
550
    def send_changedstate(self):
 
335
 
        self.changedstate.acquire()
 
336
 
        self.changedstate.notify_all()
 
337
 
        self.changedstate.release()
 
 
551
        with self.changedstate:
 
 
552
            self.changedstate.notify_all()
 
339
554
    def enable(self):
 
340
555
        """Start this client's checker and timeout hooks"""
 
341
 
        if getattr(self, u"enabled", False):
 
 
556
        if getattr(self, "enabled", False):
 
342
557
            # Already enabled
 
344
559
        self.send_changedstate()
 
 
560
        self.expires = datetime.datetime.utcnow() + self.timeout
 
345
562
        self.last_enabled = datetime.datetime.utcnow()
 
 
565
    def disable(self, quiet=True):
 
 
566
        """Disable this client."""
 
 
567
        if not getattr(self, "enabled", False):
 
 
570
            self.send_changedstate()
 
 
572
            logger.info("Disabling client %s", self.name)
 
 
573
        if getattr(self, "disable_initiator_tag", False):
 
 
574
            gobject.source_remove(self.disable_initiator_tag)
 
 
575
            self.disable_initiator_tag = None
 
 
577
        if getattr(self, "checker_initiator_tag", False):
 
 
578
            gobject.source_remove(self.checker_initiator_tag)
 
 
579
            self.checker_initiator_tag = None
 
 
582
        # Do not run this again if called by a gobject.timeout_add
 
 
588
    def init_checker(self):
 
346
589
        # Schedule a new checker to be started an 'interval' from now,
 
347
590
        # and every interval from then on.
 
348
591
        self.checker_initiator_tag = (gobject.timeout_add
 
 
352
595
        self.disable_initiator_tag = (gobject.timeout_add
 
353
596
                                   (self.timeout_milliseconds(),
 
356
598
        # Also start a new checker *right now*.
 
357
599
        self.start_checker()
 
359
 
    def disable(self, quiet=True):
 
360
 
        """Disable this client."""
 
361
 
        if not getattr(self, "enabled", False):
 
364
 
            self.send_changedstate()
 
366
 
            logger.info(u"Disabling client %s", self.name)
 
367
 
        if getattr(self, u"disable_initiator_tag", False):
 
368
 
            gobject.source_remove(self.disable_initiator_tag)
 
369
 
            self.disable_initiator_tag = None
 
370
 
        if getattr(self, u"checker_initiator_tag", False):
 
371
 
            gobject.source_remove(self.checker_initiator_tag)
 
372
 
            self.checker_initiator_tag = None
 
374
 
        if self.disable_hook:
 
375
 
            self.disable_hook(self)
 
377
 
        # Do not run this again if called by a gobject.timeout_add
 
381
 
        self.disable_hook = None
 
384
601
    def checker_callback(self, pid, condition, command):
 
385
602
        """The checker has completed, so take appropriate actions."""
 
386
603
        self.checker_callback_tag = None
 
387
604
        self.checker = None
 
388
605
        if os.WIFEXITED(condition):
 
389
 
            exitstatus = os.WEXITSTATUS(condition)
 
391
 
                logger.info(u"Checker for %(name)s succeeded",
 
 
606
            self.last_checker_status = os.WEXITSTATUS(condition)
 
 
607
            if self.last_checker_status == 0:
 
 
608
                logger.info("Checker for %(name)s succeeded",
 
393
610
                self.checked_ok()
 
395
 
                logger.info(u"Checker for %(name)s failed",
 
 
612
                logger.info("Checker for %(name)s failed",
 
398
 
            logger.warning(u"Checker for %(name)s crashed?",
 
 
615
            self.last_checker_status = -1
 
 
616
            logger.warning("Checker for %(name)s crashed?",
 
401
 
    def checked_ok(self):
 
 
619
    def checked_ok(self, timeout=None):
 
402
620
        """Bump up the timeout for this client.
 
404
622
        This should only be called when the client has been seen,
 
 
626
            timeout = self.timeout
 
407
627
        self.last_checked_ok = datetime.datetime.utcnow()
 
408
 
        gobject.source_remove(self.disable_initiator_tag)
 
409
 
        self.disable_initiator_tag = (gobject.timeout_add
 
410
 
                                      (self.timeout_milliseconds(),
 
 
628
        if self.disable_initiator_tag is not None:
 
 
629
            gobject.source_remove(self.disable_initiator_tag)
 
 
630
        if getattr(self, "enabled", False):
 
 
631
            self.disable_initiator_tag = (gobject.timeout_add
 
 
632
                                          (timedelta_to_milliseconds
 
 
633
                                           (timeout), self.disable))
 
 
634
            self.expires = datetime.datetime.utcnow() + timeout
 
 
636
    def need_approval(self):
 
 
637
        self.last_approval_request = datetime.datetime.utcnow()
 
413
639
    def start_checker(self):
 
414
640
        """Start a new checker subprocess if one is not running.
 
 
562
791
    def _is_dbus_property(obj):
 
563
 
        return getattr(obj, u"_dbus_is_property", False)
 
 
792
        return getattr(obj, "_dbus_is_property", False)
 
565
794
    def _get_all_dbus_properties(self):
 
566
795
        """Returns a generator of (name, attribute) pairs
 
568
 
        return ((prop._dbus_name, prop)
 
 
797
        return ((prop.__get__(self)._dbus_name, prop.__get__(self))
 
 
798
                for cls in self.__class__.__mro__
 
569
799
                for name, prop in
 
570
 
                inspect.getmembers(self, self._is_dbus_property))
 
 
800
                inspect.getmembers(cls, self._is_dbus_property))
 
572
802
    def _get_dbus_property(self, interface_name, property_name):
 
573
803
        """Returns a bound method if one exists which is a D-Bus
 
574
804
        property with the specified name and interface.
 
576
 
        for name in (property_name,
 
577
 
                     property_name + u"_dbus_property"):
 
578
 
            prop = getattr(self, name, None)
 
580
 
                or not self._is_dbus_property(prop)
 
581
 
                or prop._dbus_name != property_name
 
582
 
                or (interface_name and prop._dbus_interface
 
583
 
                    and interface_name != prop._dbus_interface)):
 
 
806
        for cls in  self.__class__.__mro__:
 
 
807
            for name, value in (inspect.getmembers
 
 
808
                                (cls, self._is_dbus_property)):
 
 
809
                if (value._dbus_name == property_name
 
 
810
                    and value._dbus_interface == interface_name):
 
 
811
                    return value.__get__(self)
 
586
813
        # No such property
 
587
 
        raise DBusPropertyNotFound(self.dbus_object_path + u":"
 
588
 
                                   + interface_name + u"."
 
 
814
        raise DBusPropertyNotFound(self.dbus_object_path + ":"
 
 
815
                                   + interface_name + "."
 
591
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"ss",
 
 
818
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="ss",
 
593
820
    def Get(self, interface_name, property_name):
 
594
821
        """Standard D-Bus property Get() method, see D-Bus standard.
 
596
823
        prop = self._get_dbus_property(interface_name, property_name)
 
597
 
        if prop._dbus_access == u"write":
 
 
824
        if prop._dbus_access == "write":
 
598
825
            raise DBusPropertyAccessException(property_name)
 
600
 
        if not hasattr(value, u"variant_level"):
 
 
827
        if not hasattr(value, "variant_level"):
 
602
829
        return type(value)(value, variant_level=value.variant_level+1)
 
604
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"ssv")
 
 
831
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="ssv")
 
605
832
    def Set(self, interface_name, property_name, value):
 
606
833
        """Standard D-Bus property Set() method, see D-Bus standard.
 
608
835
        prop = self._get_dbus_property(interface_name, property_name)
 
609
 
        if prop._dbus_access == u"read":
 
 
836
        if prop._dbus_access == "read":
 
610
837
            raise DBusPropertyAccessException(property_name)
 
611
 
        if prop._dbus_get_args_options[u"byte_arrays"]:
 
 
838
        if prop._dbus_get_args_options["byte_arrays"]:
 
612
839
            # The byte_arrays option is not supported yet on
 
613
840
            # signatures other than "ay".
 
614
 
            if prop._dbus_signature != u"ay":
 
 
841
            if prop._dbus_signature != "ay":
 
616
843
            value = dbus.ByteArray(''.join(unichr(byte)
 
617
844
                                           for byte in value))
 
620
 
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature=u"s",
 
621
 
                         out_signature=u"a{sv}")
 
 
847
    @dbus.service.method(dbus.PROPERTIES_IFACE, in_signature="s",
 
 
848
                         out_signature="a{sv}")
 
622
849
    def GetAll(self, interface_name):
 
623
850
        """Standard D-Bus property GetAll() method, see D-Bus
 
626
853
        Note: Will not include properties with access="write".
 
629
856
        for name, prop in self._get_all_dbus_properties():
 
630
857
            if (interface_name
 
631
858
                and interface_name != prop._dbus_interface):
 
632
859
                # Interface non-empty but did not match
 
634
861
            # Ignore write-only properties
 
635
 
            if prop._dbus_access == u"write":
 
 
862
            if prop._dbus_access == "write":
 
638
 
            if not hasattr(value, u"variant_level"):
 
 
865
            if not hasattr(value, "variant_level"):
 
 
866
                properties[name] = value
 
641
 
            all[name] = type(value)(value, variant_level=
 
642
 
                                    value.variant_level+1)
 
643
 
        return dbus.Dictionary(all, signature=u"sv")
 
 
868
            properties[name] = type(value)(value, variant_level=
 
 
869
                                           value.variant_level+1)
 
 
870
        return dbus.Dictionary(properties, signature="sv")
 
645
872
    @dbus.service.method(dbus.INTROSPECTABLE_IFACE,
 
647
874
                         path_keyword='object_path',
 
648
875
                         connection_keyword='connection')
 
649
876
    def Introspect(self, object_path, connection):
 
 
655
882
            document = xml.dom.minidom.parseString(xmlstring)
 
656
883
            def make_tag(document, name, prop):
 
657
 
                e = document.createElement(u"property")
 
658
 
                e.setAttribute(u"name", name)
 
659
 
                e.setAttribute(u"type", prop._dbus_signature)
 
660
 
                e.setAttribute(u"access", prop._dbus_access)
 
 
884
                e = document.createElement("property")
 
 
885
                e.setAttribute("name", name)
 
 
886
                e.setAttribute("type", prop._dbus_signature)
 
 
887
                e.setAttribute("access", prop._dbus_access)
 
662
 
            for if_tag in document.getElementsByTagName(u"interface"):
 
 
889
            for if_tag in document.getElementsByTagName("interface"):
 
663
890
                for tag in (make_tag(document, name, prop)
 
665
892
                            in self._get_all_dbus_properties()
 
666
893
                            if prop._dbus_interface
 
667
 
                            == if_tag.getAttribute(u"name")):
 
 
894
                            == if_tag.getAttribute("name")):
 
668
895
                    if_tag.appendChild(tag)
 
669
896
                # Add the names to the return values for the
 
670
897
                # "org.freedesktop.DBus.Properties" methods
 
671
 
                if (if_tag.getAttribute(u"name")
 
672
 
                    == u"org.freedesktop.DBus.Properties"):
 
673
 
                    for cn in if_tag.getElementsByTagName(u"method"):
 
674
 
                        if cn.getAttribute(u"name") == u"Get":
 
675
 
                            for arg in cn.getElementsByTagName(u"arg"):
 
676
 
                                if (arg.getAttribute(u"direction")
 
678
 
                                    arg.setAttribute(u"name", u"value")
 
679
 
                        elif cn.getAttribute(u"name") == u"GetAll":
 
680
 
                            for arg in cn.getElementsByTagName(u"arg"):
 
681
 
                                if (arg.getAttribute(u"direction")
 
683
 
                                    arg.setAttribute(u"name", u"props")
 
684
 
            xmlstring = document.toxml(u"utf-8")
 
 
898
                if (if_tag.getAttribute("name")
 
 
899
                    == "org.freedesktop.DBus.Properties"):
 
 
900
                    for cn in if_tag.getElementsByTagName("method"):
 
 
901
                        if cn.getAttribute("name") == "Get":
 
 
902
                            for arg in cn.getElementsByTagName("arg"):
 
 
903
                                if (arg.getAttribute("direction")
 
 
905
                                    arg.setAttribute("name", "value")
 
 
906
                        elif cn.getAttribute("name") == "GetAll":
 
 
907
                            for arg in cn.getElementsByTagName("arg"):
 
 
908
                                if (arg.getAttribute("direction")
 
 
910
                                    arg.setAttribute("name", "props")
 
 
911
            xmlstring = document.toxml("utf-8")
 
685
912
            document.unlink()
 
686
913
        except (AttributeError, xml.dom.DOMException,
 
687
 
                xml.parsers.expat.ExpatError), error:
 
688
 
            logger.error(u"Failed to override Introspection method",
 
 
914
                xml.parsers.expat.ExpatError) as error:
 
 
915
            logger.error("Failed to override Introspection method",
 
 
920
def datetime_to_dbus (dt, variant_level=0):
 
 
921
    """Convert a UTC datetime.datetime() to a D-Bus type."""
 
 
923
        return dbus.String("", variant_level = variant_level)
 
 
924
    return dbus.String(dt.isoformat(),
 
 
925
                       variant_level=variant_level)
 
 
928
class AlternateDBusNamesMetaclass(DBusObjectWithProperties
 
 
930
    """Applied to an empty subclass of a D-Bus object, this metaclass
 
 
931
    will add additional D-Bus attributes matching a certain pattern.
 
 
933
    def __new__(mcs, name, bases, attr):
 
 
934
        # Go through all the base classes which could have D-Bus
 
 
935
        # methods, signals, or properties in them
 
 
936
        for base in (b for b in bases
 
 
937
                     if issubclass(b, dbus.service.Object)):
 
 
938
            # Go though all attributes of the base class
 
 
939
            for attrname, attribute in inspect.getmembers(base):
 
 
940
                # Ignore non-D-Bus attributes, and D-Bus attributes
 
 
941
                # with the wrong interface name
 
 
942
                if (not hasattr(attribute, "_dbus_interface")
 
 
943
                    or not attribute._dbus_interface
 
 
944
                    .startswith("se.recompile.Mandos")):
 
 
946
                # Create an alternate D-Bus interface name based on
 
 
948
                alt_interface = (attribute._dbus_interface
 
 
949
                                 .replace("se.recompile.Mandos",
 
 
950
                                          "se.bsnet.fukt.Mandos"))
 
 
951
                # Is this a D-Bus signal?
 
 
952
                if getattr(attribute, "_dbus_is_signal", False):
 
 
953
                    # Extract the original non-method function by
 
 
955
                    nonmethod_func = (dict(
 
 
956
                            zip(attribute.func_code.co_freevars,
 
 
957
                                attribute.__closure__))["func"]
 
 
959
                    # Create a new, but exactly alike, function
 
 
960
                    # object, and decorate it to be a new D-Bus signal
 
 
961
                    # with the alternate D-Bus interface name
 
 
962
                    new_function = (dbus.service.signal
 
 
964
                                     attribute._dbus_signature)
 
 
966
                                nonmethod_func.func_code,
 
 
967
                                nonmethod_func.func_globals,
 
 
968
                                nonmethod_func.func_name,
 
 
969
                                nonmethod_func.func_defaults,
 
 
970
                                nonmethod_func.func_closure)))
 
 
971
                    # Define a creator of a function to call both the
 
 
972
                    # old and new functions, so both the old and new
 
 
973
                    # signals gets sent when the function is called
 
 
974
                    def fixscope(func1, func2):
 
 
975
                        """This function is a scope container to pass
 
 
976
                        func1 and func2 to the "call_both" function
 
 
977
                        outside of its arguments"""
 
 
978
                        def call_both(*args, **kwargs):
 
 
979
                            """This function will emit two D-Bus
 
 
980
                            signals by calling func1 and func2"""
 
 
981
                            func1(*args, **kwargs)
 
 
982
                            func2(*args, **kwargs)
 
 
984
                    # Create the "call_both" function and add it to
 
 
986
                    attr[attrname] = fixscope(attribute,
 
 
988
                # Is this a D-Bus method?
 
 
989
                elif getattr(attribute, "_dbus_is_method", False):
 
 
990
                    # Create a new, but exactly alike, function
 
 
991
                    # object.  Decorate it to be a new D-Bus method
 
 
992
                    # with the alternate D-Bus interface name.  Add it
 
 
994
                    attr[attrname] = (dbus.service.method
 
 
996
                                       attribute._dbus_in_signature,
 
 
997
                                       attribute._dbus_out_signature)
 
 
999
                                       (attribute.func_code,
 
 
1000
                                        attribute.func_globals,
 
 
1001
                                        attribute.func_name,
 
 
1002
                                        attribute.func_defaults,
 
 
1003
                                        attribute.func_closure)))
 
 
1004
                # Is this a D-Bus property?
 
 
1005
                elif getattr(attribute, "_dbus_is_property", False):
 
 
1006
                    # Create a new, but exactly alike, function
 
 
1007
                    # object, and decorate it to be a new D-Bus
 
 
1008
                    # property with the alternate D-Bus interface
 
 
1009
                    # name.  Add it to the class.
 
 
1010
                    attr[attrname] = (dbus_service_property
 
 
1012
                                       attribute._dbus_signature,
 
 
1013
                                       attribute._dbus_access,
 
 
1015
                                       ._dbus_get_args_options
 
 
1018
                                       (attribute.func_code,
 
 
1019
                                        attribute.func_globals,
 
 
1020
                                        attribute.func_name,
 
 
1021
                                        attribute.func_defaults,
 
 
1022
                                        attribute.func_closure)))
 
 
1023
        return type.__new__(mcs, name, bases, attr)
 
693
1026
class ClientDBus(Client, DBusObjectWithProperties):
 
694
1027
    """A Client class using D-Bus
 
 
697
1030
    dbus_object_path: dbus.ObjectPath
 
698
1031
    bus: dbus.SystemBus()
 
 
1034
    runtime_expansions = (Client.runtime_expansions
 
 
1035
                          + ("dbus_object_path",))
 
700
1037
    # dbus.service.Object doesn't use super(), so we can't either.
 
702
1039
    def __init__(self, bus = None, *args, **kwargs):
 
703
 
        self._approvals_pending = 0
 
705
1041
        Client.__init__(self, *args, **kwargs)
 
 
1042
        self._approvals_pending = 0
 
 
1044
        self._approvals_pending = 0
 
706
1045
        # Only now, when this client is initialized, can it show up on
 
 
1047
        client_object_name = unicode(self.name).translate(
 
 
1048
            {ord("."): ord("_"),
 
 
1049
             ord("-"): ord("_")})
 
708
1050
        self.dbus_object_path = (dbus.ObjectPath
 
710
 
                                  + self.name.replace(u".", u"_")))
 
 
1051
                                 ("/clients/" + client_object_name))
 
711
1052
        DBusObjectWithProperties.__init__(self, self.bus,
 
712
1053
                                          self.dbus_object_path)
 
714
 
    def _get_approvals_pending(self):
 
715
 
        return self._approvals_pending
 
716
 
    def _set_approvals_pending(self, value):
 
717
 
        old_value = self._approvals_pending
 
718
 
        self._approvals_pending = value
 
720
 
        if (hasattr(self, "dbus_object_path")
 
721
 
            and bval is not bool(old_value)):
 
722
 
            dbus_bool = dbus.Boolean(bval, variant_level=1)
 
723
 
            self.PropertyChanged(dbus.String(u"approved_pending"),
 
726
 
    approvals_pending = property(_get_approvals_pending,
 
727
 
                                 _set_approvals_pending)
 
728
 
    del _get_approvals_pending, _set_approvals_pending
 
731
 
    def _datetime_to_dbus(dt, variant_level=0):
 
732
 
        """Convert a UTC datetime.datetime() to a D-Bus type."""
 
733
 
        return dbus.String(dt.isoformat(),
 
734
 
                           variant_level=variant_level)
 
737
 
        oldstate = getattr(self, u"enabled", False)
 
738
 
        r = Client.enable(self)
 
739
 
        if oldstate != self.enabled:
 
741
 
            self.PropertyChanged(dbus.String(u"enabled"),
 
742
 
                                 dbus.Boolean(True, variant_level=1))
 
743
 
            self.PropertyChanged(
 
744
 
                dbus.String(u"last_enabled"),
 
745
 
                self._datetime_to_dbus(self.last_enabled,
 
749
 
    def disable(self, quiet = False):
 
750
 
        oldstate = getattr(self, u"enabled", False)
 
751
 
        r = Client.disable(self, quiet=quiet)
 
752
 
        if not quiet and oldstate != self.enabled:
 
754
 
            self.PropertyChanged(dbus.String(u"enabled"),
 
755
 
                                 dbus.Boolean(False, variant_level=1))
 
 
1055
    def notifychangeproperty(transform_func,
 
 
1056
                             dbus_name, type_func=lambda x: x,
 
 
1058
        """ Modify a variable so that it's a property which announces
 
 
1059
        its changes to DBus.
 
 
1061
        transform_fun: Function that takes a value and a variant_level
 
 
1062
                       and transforms it to a D-Bus type.
 
 
1063
        dbus_name: D-Bus name of the variable
 
 
1064
        type_func: Function that transform the value before sending it
 
 
1065
                   to the D-Bus.  Default: no transform
 
 
1066
        variant_level: D-Bus variant level.  Default: 1
 
 
1068
        attrname = "_{0}".format(dbus_name)
 
 
1069
        def setter(self, value):
 
 
1070
            if hasattr(self, "dbus_object_path"):
 
 
1071
                if (not hasattr(self, attrname) or
 
 
1072
                    type_func(getattr(self, attrname, None))
 
 
1073
                    != type_func(value)):
 
 
1074
                    dbus_value = transform_func(type_func(value),
 
 
1077
                    self.PropertyChanged(dbus.String(dbus_name),
 
 
1079
            setattr(self, attrname, value)
 
 
1081
        return property(lambda self: getattr(self, attrname), setter)
 
 
1084
    expires = notifychangeproperty(datetime_to_dbus, "Expires")
 
 
1085
    approvals_pending = notifychangeproperty(dbus.Boolean,
 
 
1088
    enabled = notifychangeproperty(dbus.Boolean, "Enabled")
 
 
1089
    last_enabled = notifychangeproperty(datetime_to_dbus,
 
 
1091
    checker = notifychangeproperty(dbus.Boolean, "CheckerRunning",
 
 
1092
                                   type_func = lambda checker:
 
 
1093
                                       checker is not None)
 
 
1094
    last_checked_ok = notifychangeproperty(datetime_to_dbus,
 
 
1096
    last_approval_request = notifychangeproperty(
 
 
1097
        datetime_to_dbus, "LastApprovalRequest")
 
 
1098
    approved_by_default = notifychangeproperty(dbus.Boolean,
 
 
1099
                                               "ApprovedByDefault")
 
 
1100
    approval_delay = notifychangeproperty(dbus.UInt64,
 
 
1103
                                          timedelta_to_milliseconds)
 
 
1104
    approval_duration = notifychangeproperty(
 
 
1105
        dbus.UInt64, "ApprovalDuration",
 
 
1106
        type_func = timedelta_to_milliseconds)
 
 
1107
    host = notifychangeproperty(dbus.String, "Host")
 
 
1108
    timeout = notifychangeproperty(dbus.UInt64, "Timeout",
 
 
1110
                                   timedelta_to_milliseconds)
 
 
1111
    extended_timeout = notifychangeproperty(
 
 
1112
        dbus.UInt64, "ExtendedTimeout",
 
 
1113
        type_func = timedelta_to_milliseconds)
 
 
1114
    interval = notifychangeproperty(dbus.UInt64,
 
 
1117
                                    timedelta_to_milliseconds)
 
 
1118
    checker_command = notifychangeproperty(dbus.String, "Checker")
 
 
1120
    del notifychangeproperty
 
758
1122
    def __del__(self, *args, **kwargs):
 
760
1124
            self.remove_from_connection()
 
761
1125
        except LookupError:
 
763
 
        if hasattr(DBusObjectWithProperties, u"__del__"):
 
 
1127
        if hasattr(DBusObjectWithProperties, "__del__"):
 
764
1128
            DBusObjectWithProperties.__del__(self, *args, **kwargs)
 
765
1129
        Client.__del__(self, *args, **kwargs)
 
 
916
 
    # approved_pending - property
 
917
 
    @dbus_service_property(_interface, signature=u"b", access=u"read")
 
918
 
    def approved_pending_dbus_property(self):
 
 
1265
    # ApprovalPending - property
 
 
1266
    @dbus_service_property(_interface, signature="b", access="read")
 
 
1267
    def ApprovalPending_dbus_property(self):
 
919
1268
        return dbus.Boolean(bool(self.approvals_pending))
 
921
 
    # approved_by_default - property
 
922
 
    @dbus_service_property(_interface, signature=u"b",
 
924
 
    def approved_by_default_dbus_property(self):
 
925
 
        return dbus.Boolean(self.approved_by_default)
 
927
 
    # approved_delay - property
 
928
 
    @dbus_service_property(_interface, signature=u"t",
 
930
 
    def approved_delay_dbus_property(self):
 
931
 
        return dbus.UInt64(self.approved_delay_milliseconds())
 
933
 
    # approved_duration - property
 
934
 
    @dbus_service_property(_interface, signature=u"t",
 
936
 
    def approved_duration_dbus_property(self):
 
937
 
        return dbus.UInt64(self._timedelta_to_milliseconds(
 
938
 
                self.approved_duration))
 
941
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
942
 
    def name_dbus_property(self):
 
 
1270
    # ApprovedByDefault - property
 
 
1271
    @dbus_service_property(_interface, signature="b",
 
 
1273
    def ApprovedByDefault_dbus_property(self, value=None):
 
 
1274
        if value is None:       # get
 
 
1275
            return dbus.Boolean(self.approved_by_default)
 
 
1276
        self.approved_by_default = bool(value)
 
 
1278
    # ApprovalDelay - property
 
 
1279
    @dbus_service_property(_interface, signature="t",
 
 
1281
    def ApprovalDelay_dbus_property(self, value=None):
 
 
1282
        if value is None:       # get
 
 
1283
            return dbus.UInt64(self.approval_delay_milliseconds())
 
 
1284
        self.approval_delay = datetime.timedelta(0, 0, 0, value)
 
 
1286
    # ApprovalDuration - property
 
 
1287
    @dbus_service_property(_interface, signature="t",
 
 
1289
    def ApprovalDuration_dbus_property(self, value=None):
 
 
1290
        if value is None:       # get
 
 
1291
            return dbus.UInt64(timedelta_to_milliseconds(
 
 
1292
                    self.approval_duration))
 
 
1293
        self.approval_duration = datetime.timedelta(0, 0, 0, value)
 
 
1296
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1297
    def Name_dbus_property(self):
 
943
1298
        return dbus.String(self.name)
 
945
 
    # fingerprint - property
 
946
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
947
 
    def fingerprint_dbus_property(self):
 
 
1300
    # Fingerprint - property
 
 
1301
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1302
    def Fingerprint_dbus_property(self):
 
948
1303
        return dbus.String(self.fingerprint)
 
951
 
    @dbus_service_property(_interface, signature=u"s",
 
953
 
    def host_dbus_property(self, value=None):
 
 
1306
    @dbus_service_property(_interface, signature="s",
 
 
1308
    def Host_dbus_property(self, value=None):
 
954
1309
        if value is None:       # get
 
955
1310
            return dbus.String(self.host)
 
958
 
        self.PropertyChanged(dbus.String(u"host"),
 
959
 
                             dbus.String(value, variant_level=1))
 
962
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
963
 
    def created_dbus_property(self):
 
964
 
        return dbus.String(self._datetime_to_dbus(self.created))
 
966
 
    # last_enabled - property
 
967
 
    @dbus_service_property(_interface, signature=u"s", access=u"read")
 
968
 
    def last_enabled_dbus_property(self):
 
969
 
        if self.last_enabled is None:
 
970
 
            return dbus.String(u"")
 
971
 
        return dbus.String(self._datetime_to_dbus(self.last_enabled))
 
974
 
    @dbus_service_property(_interface, signature=u"b",
 
976
 
    def enabled_dbus_property(self, value=None):
 
 
1311
        self.host = unicode(value)
 
 
1313
    # Created - property
 
 
1314
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1315
    def Created_dbus_property(self):
 
 
1316
        return datetime_to_dbus(self.created)
 
 
1318
    # LastEnabled - property
 
 
1319
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1320
    def LastEnabled_dbus_property(self):
 
 
1321
        return datetime_to_dbus(self.last_enabled)
 
 
1323
    # Enabled - property
 
 
1324
    @dbus_service_property(_interface, signature="b",
 
 
1326
    def Enabled_dbus_property(self, value=None):
 
977
1327
        if value is None:       # get
 
978
1328
            return dbus.Boolean(self.enabled)
 
 
984
 
    # last_checked_ok - property
 
985
 
    @dbus_service_property(_interface, signature=u"s",
 
987
 
    def last_checked_ok_dbus_property(self, value=None):
 
 
1334
    # LastCheckedOK - property
 
 
1335
    @dbus_service_property(_interface, signature="s",
 
 
1337
    def LastCheckedOK_dbus_property(self, value=None):
 
988
1338
        if value is not None:
 
989
1339
            self.checked_ok()
 
991
 
        if self.last_checked_ok is None:
 
992
 
            return dbus.String(u"")
 
993
 
        return dbus.String(self._datetime_to_dbus(self
 
997
 
    @dbus_service_property(_interface, signature=u"t",
 
999
 
    def timeout_dbus_property(self, value=None):
 
 
1341
        return datetime_to_dbus(self.last_checked_ok)
 
 
1343
    # Expires - property
 
 
1344
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1345
    def Expires_dbus_property(self):
 
 
1346
        return datetime_to_dbus(self.expires)
 
 
1348
    # LastApprovalRequest - property
 
 
1349
    @dbus_service_property(_interface, signature="s", access="read")
 
 
1350
    def LastApprovalRequest_dbus_property(self):
 
 
1351
        return datetime_to_dbus(self.last_approval_request)
 
 
1353
    # Timeout - property
 
 
1354
    @dbus_service_property(_interface, signature="t",
 
 
1356
    def Timeout_dbus_property(self, value=None):
 
1000
1357
        if value is None:       # get
 
1001
1358
            return dbus.UInt64(self.timeout_milliseconds())
 
1002
1359
        self.timeout = datetime.timedelta(0, 0, 0, value)
 
1004
 
        self.PropertyChanged(dbus.String(u"timeout"),
 
1005
 
                             dbus.UInt64(value, variant_level=1))
 
1006
 
        if getattr(self, u"disable_initiator_tag", None) is None:
 
 
1360
        if getattr(self, "disable_initiator_tag", None) is None:
 
1008
1362
        # Reschedule timeout
 
1009
1363
        gobject.source_remove(self.disable_initiator_tag)
 
1010
1364
        self.disable_initiator_tag = None
 
1011
 
        time_to_die = (self.
 
1012
 
                       _timedelta_to_milliseconds((self
 
 
1366
        time_to_die = timedelta_to_milliseconds((self
 
1017
1371
        if time_to_die <= 0:
 
1018
1372
            # The timeout has passed
 
 
1375
            self.expires = (datetime.datetime.utcnow()
 
 
1376
                            + datetime.timedelta(milliseconds =
 
1021
1378
            self.disable_initiator_tag = (gobject.timeout_add
 
1022
1379
                                          (time_to_die, self.disable))
 
1024
 
    # interval - property
 
1025
 
    @dbus_service_property(_interface, signature=u"t",
 
1026
 
                           access=u"readwrite")
 
1027
 
    def interval_dbus_property(self, value=None):
 
 
1381
    # ExtendedTimeout - property
 
 
1382
    @dbus_service_property(_interface, signature="t",
 
 
1384
    def ExtendedTimeout_dbus_property(self, value=None):
 
 
1385
        if value is None:       # get
 
 
1386
            return dbus.UInt64(self.extended_timeout_milliseconds())
 
 
1387
        self.extended_timeout = datetime.timedelta(0, 0, 0, value)
 
 
1389
    # Interval - property
 
 
1390
    @dbus_service_property(_interface, signature="t",
 
 
1392
    def Interval_dbus_property(self, value=None):
 
1028
1393
        if value is None:       # get
 
1029
1394
            return dbus.UInt64(self.interval_milliseconds())
 
1030
1395
        self.interval = datetime.timedelta(0, 0, 0, value)
 
1032
 
        self.PropertyChanged(dbus.String(u"interval"),
 
1033
 
                             dbus.UInt64(value, variant_level=1))
 
1034
 
        if getattr(self, u"checker_initiator_tag", None) is None:
 
 
1396
        if getattr(self, "checker_initiator_tag", None) is None:
 
1036
 
        # Reschedule checker run
 
1037
 
        gobject.source_remove(self.checker_initiator_tag)
 
1038
 
        self.checker_initiator_tag = (gobject.timeout_add
 
1039
 
                                      (value, self.start_checker))
 
1040
 
        self.start_checker()    # Start one now, too
 
1042
 
    # checker - property
 
1043
 
    @dbus_service_property(_interface, signature=u"s",
 
1044
 
                           access=u"readwrite")
 
1045
 
    def checker_dbus_property(self, value=None):
 
 
1399
            # Reschedule checker run
 
 
1400
            gobject.source_remove(self.checker_initiator_tag)
 
 
1401
            self.checker_initiator_tag = (gobject.timeout_add
 
 
1402
                                          (value, self.start_checker))
 
 
1403
            self.start_checker()    # Start one now, too
 
 
1405
    # Checker - property
 
 
1406
    @dbus_service_property(_interface, signature="s",
 
 
1408
    def Checker_dbus_property(self, value=None):
 
1046
1409
        if value is None:       # get
 
1047
1410
            return dbus.String(self.checker_command)
 
1048
 
        self.checker_command = value
 
1050
 
        self.PropertyChanged(dbus.String(u"checker"),
 
1051
 
                             dbus.String(self.checker_command,
 
 
1411
        self.checker_command = unicode(value)
 
1054
 
    # checker_running - property
 
1055
 
    @dbus_service_property(_interface, signature=u"b",
 
1056
 
                           access=u"readwrite")
 
1057
 
    def checker_running_dbus_property(self, value=None):
 
 
1413
    # CheckerRunning - property
 
 
1414
    @dbus_service_property(_interface, signature="b",
 
 
1416
    def CheckerRunning_dbus_property(self, value=None):
 
1058
1417
        if value is None:       # get
 
1059
1418
            return dbus.Boolean(self.checker is not None)
 
 
1111
1474
    def handle(self):
 
1112
1475
        with contextlib.closing(self.server.child_pipe) as child_pipe:
 
1113
 
            logger.info(u"TCP connection from: %s",
 
 
1476
            logger.info("TCP connection from: %s",
 
1114
1477
                        unicode(self.client_address))
 
1115
 
            logger.debug(u"Pipe FD: %d",
 
 
1478
            logger.debug("Pipe FD: %d",
 
1116
1479
                         self.server.child_pipe.fileno())
 
1118
1481
            session = (gnutls.connection
 
1119
1482
                       .ClientSession(self.request,
 
1120
1483
                                      gnutls.connection
 
1121
1484
                                      .X509Credentials()))
 
1123
1486
            # Note: gnutls.connection.X509Credentials is really a
 
1124
1487
            # generic GnuTLS certificate credentials object so long as
 
1125
1488
            # no X.509 keys are added to it.  Therefore, we can use it
 
1126
1489
            # here despite using OpenPGP certificates.
 
1128
 
            #priority = u':'.join((u"NONE", u"+VERS-TLS1.1",
 
1129
 
            #                      u"+AES-256-CBC", u"+SHA1",
 
1130
 
            #                      u"+COMP-NULL", u"+CTYPE-OPENPGP",
 
 
1491
            #priority = ':'.join(("NONE", "+VERS-TLS1.1",
 
 
1492
            #                      "+AES-256-CBC", "+SHA1",
 
 
1493
            #                      "+COMP-NULL", "+CTYPE-OPENPGP",
 
1132
1495
            # Use a fallback default, since this MUST be set.
 
1133
1496
            priority = self.server.gnutls_priority
 
1134
1497
            if priority is None:
 
1135
 
                priority = u"NORMAL"
 
1136
1499
            (gnutls.library.functions
 
1137
1500
             .gnutls_priority_set_direct(session._c_object,
 
1138
1501
                                         priority, None))
 
1140
1503
            # Start communication using the Mandos protocol
 
1141
1504
            # Get protocol number
 
1142
1505
            line = self.request.makefile().readline()
 
1143
 
            logger.debug(u"Protocol version: %r", line)
 
 
1506
            logger.debug("Protocol version: %r", line)
 
1145
1508
                if int(line.strip().split()[0]) > 1:
 
1146
1509
                    raise RuntimeError
 
1147
 
            except (ValueError, IndexError, RuntimeError), error:
 
1148
 
                logger.error(u"Unknown protocol version: %s", error)
 
 
1510
            except (ValueError, IndexError, RuntimeError) as error:
 
 
1511
                logger.error("Unknown protocol version: %s", error)
 
1151
1514
            # Start GnuTLS connection
 
1153
1516
                session.handshake()
 
1154
 
            except gnutls.errors.GNUTLSError, error:
 
1155
 
                logger.warning(u"Handshake failed: %s", error)
 
 
1517
            except gnutls.errors.GNUTLSError as error:
 
 
1518
                logger.warning("Handshake failed: %s", error)
 
1156
1519
                # Do not run session.bye() here: the session is not
 
1157
1520
                # established.  Just abandon the request.
 
1159
 
            logger.debug(u"Handshake succeeded")
 
 
1522
            logger.debug("Handshake succeeded")
 
1161
1524
            approval_required = False
 
1164
1527
                    fpr = self.fingerprint(self.peer_certificate
 
1166
 
                except (TypeError, gnutls.errors.GNUTLSError), error:
 
1167
 
                    logger.warning(u"Bad certificate: %s", error)
 
 
1530
                        gnutls.errors.GNUTLSError) as error:
 
 
1531
                    logger.warning("Bad certificate: %s", error)
 
1169
 
                logger.debug(u"Fingerprint: %s", fpr)
 
 
1533
                logger.debug("Fingerprint: %s", fpr)
 
1172
1536
                    client = ProxyClient(child_pipe, fpr,
 
1173
1537
                                         self.client_address)
 
1174
1538
                except KeyError:
 
1177
 
                if client.approved_delay:
 
1178
 
                    delay = client.approved_delay
 
 
1541
                if self.server.use_dbus:
 
 
1543
                    client.NewRequest(str(self.client_address))
 
 
1545
                if client.approval_delay:
 
 
1546
                    delay = client.approval_delay
 
1179
1547
                    client.approvals_pending += 1
 
1180
1548
                    approval_required = True
 
1183
1551
                    if not client.enabled:
 
1184
 
                        logger.warning(u"Client %s is disabled",
 
 
1552
                        logger.info("Client %s is disabled",
 
1186
1554
                        if self.server.use_dbus:
 
1187
1555
                            # Emit D-Bus signal
 
1188
 
                            client.Rejected("Disabled")                    
 
 
1556
                            client.Rejected("Disabled")
 
1191
 
                    if client._approved or not client.approved_delay:
 
 
1559
                    if client.approved or not client.approval_delay:
 
1192
1560
                        #We are approved or approval is disabled
 
1194
 
                    elif client._approved is None:
 
1195
 
                        logger.info(u"Client %s need approval",
 
 
1562
                    elif client.approved is None:
 
 
1563
                        logger.info("Client %s needs approval",
 
1197
1565
                        if self.server.use_dbus:
 
1198
1566
                            # Emit D-Bus signal
 
1199
1567
                            client.NeedApproval(
 
1200
 
                                client.approved_delay_milliseconds(),
 
 
1568
                                client.approval_delay_milliseconds(),
 
1201
1569
                                client.approved_by_default)
 
1203
 
                        logger.warning(u"Client %s was not approved",
 
 
1571
                        logger.warning("Client %s was not approved",
 
1205
1573
                        if self.server.use_dbus:
 
1206
1574
                            # Emit D-Bus signal
 
1207
 
                            client.Rejected("Disapproved")
 
 
1575
                            client.Rejected("Denied")
 
1210
1578
                    #wait until timeout or approved
 
1211
 
                    #x = float(client._timedelta_to_milliseconds(delay))
 
1212
1579
                    time = datetime.datetime.now()
 
1213
1580
                    client.changedstate.acquire()
 
1214
 
                    client.changedstate.wait(float(client._timedelta_to_milliseconds(delay) / 1000))
 
 
1581
                    (client.changedstate.wait
 
 
1582
                     (float(client.timedelta_to_milliseconds(delay)
 
1215
1584
                    client.changedstate.release()
 
1216
1585
                    time2 = datetime.datetime.now()
 
1217
1586
                    if (time2 - time) >= delay:
 
 
1465
1843
                                       for cond, name in
 
1466
1844
                                       condition_names.iteritems()
 
1467
1845
                                       if cond & condition)
 
1468
 
        logger.debug(u"Handling IPC: FD = %d, condition = %s", source,
 
1471
 
        # error or the other end of multiprocessing.Pipe has closed
 
 
1846
        # error, or the other end of multiprocessing.Pipe has closed
 
1472
1847
        if condition & (gobject.IO_ERR | condition & gobject.IO_HUP):
 
 
1848
            # Wait for other process to exit
 
1475
1852
        # Read a request from the child
 
1476
1853
        request = parent_pipe.recv()
 
1477
 
        logger.debug(u"IPC request: %s", repr(request))
 
1478
1854
        command = request[0]
 
1480
1856
        if command == 'init':
 
1481
1857
            fpr = request[1]
 
1482
1858
            address = request[2]
 
1484
 
            for c in self.clients:
 
 
1860
            for c in self.clients.itervalues():
 
1485
1861
                if c.fingerprint == fpr:
 
1489
 
                logger.warning(u"Client not found for fingerprint: %s, ad"
 
1490
 
                               u"dress: %s", fpr, address)
 
 
1865
                logger.info("Client not found for fingerprint: %s, ad"
 
 
1866
                            "dress: %s", fpr, address)
 
1491
1867
                if self.use_dbus:
 
1492
1868
                    # Emit D-Bus signal
 
1493
 
                    mandos_dbus_service.ClientNotFound(fpr, address)
 
 
1869
                    mandos_dbus_service.ClientNotFound(fpr,
 
1494
1871
                parent_pipe.send(False)
 
1497
1874
            gobject.io_add_watch(parent_pipe.fileno(),
 
1498
1875
                                 gobject.IO_IN | gobject.IO_HUP,
 
1499
1876
                                 functools.partial(self.handle_ipc,
 
1500
 
                                                   parent_pipe = parent_pipe,
 
1501
 
                                                   client_object = client))
 
1502
1882
            parent_pipe.send(True)
 
1503
 
            # remove the old hook in favor of the new above hook on same fileno
 
 
1883
            # remove the old hook in favor of the new above hook on
 
1505
1886
        if command == 'funcall':
 
1506
1887
            funcname = request[1]
 
1507
1888
            args = request[2]
 
1508
1889
            kwargs = request[3]
 
1510
 
            parent_pipe.send(('data', getattr(client_object, funcname)(*args, **kwargs)))
 
 
1891
            parent_pipe.send(('data', getattr(client_object,
 
1512
1895
        if command == 'getattr':
 
1513
1896
            attrname = request[1]
 
1514
1897
            if callable(client_object.__getattribute__(attrname)):
 
1515
1898
                parent_pipe.send(('function',))
 
1517
 
                parent_pipe.send(('data', client_object.__getattribute__(attrname)))
 
 
1900
                parent_pipe.send(('data', client_object
 
 
1901
                                  .__getattribute__(attrname)))
 
1519
1903
        if command == 'setattr':
 
1520
1904
            attrname = request[1]
 
1521
1905
            value = request[2]
 
1522
1906
            setattr(client_object, attrname, value)
 
1527
1911
def string_to_delta(interval):
 
1528
1912
    """Parse a string and return a datetime.timedelta
 
1530
 
    >>> string_to_delta(u'7d')
 
 
1914
    >>> string_to_delta('7d')
 
1531
1915
    datetime.timedelta(7)
 
1532
 
    >>> string_to_delta(u'60s')
 
 
1916
    >>> string_to_delta('60s')
 
1533
1917
    datetime.timedelta(0, 60)
 
1534
 
    >>> string_to_delta(u'60m')
 
 
1918
    >>> string_to_delta('60m')
 
1535
1919
    datetime.timedelta(0, 3600)
 
1536
 
    >>> string_to_delta(u'24h')
 
 
1920
    >>> string_to_delta('24h')
 
1537
1921
    datetime.timedelta(1)
 
1538
 
    >>> string_to_delta(u'1w')
 
 
1922
    >>> string_to_delta('1w')
 
1539
1923
    datetime.timedelta(7)
 
1540
 
    >>> string_to_delta(u'5m 30s')
 
 
1924
    >>> string_to_delta('5m 30s')
 
1541
1925
    datetime.timedelta(0, 330)
 
1543
1927
    timevalue = datetime.timedelta(0)
 
 
1617
1977
    ##################################################################
 
1618
1978
    # Parsing of options, both command line and config file
 
1620
 
    parser = optparse.OptionParser(version = "%%prog %s" % version)
 
1621
 
    parser.add_option("-i", u"--interface", type=u"string",
 
1622
 
                      metavar="IF", help=u"Bind to interface IF")
 
1623
 
    parser.add_option("-a", u"--address", type=u"string",
 
1624
 
                      help=u"Address to listen for requests on")
 
1625
 
    parser.add_option("-p", u"--port", type=u"int",
 
1626
 
                      help=u"Port number to receive requests on")
 
1627
 
    parser.add_option("--check", action=u"store_true",
 
1628
 
                      help=u"Run self-test")
 
1629
 
    parser.add_option("--debug", action=u"store_true",
 
1630
 
                      help=u"Debug mode; run in foreground and log to"
 
1632
 
    parser.add_option("--debuglevel", type=u"string", metavar="Level",
 
1633
 
                      help=u"Debug level for stdout output")
 
1634
 
    parser.add_option("--priority", type=u"string", help=u"GnuTLS"
 
1635
 
                      u" priority string (see GnuTLS documentation)")
 
1636
 
    parser.add_option("--servicename", type=u"string",
 
1637
 
                      metavar=u"NAME", help=u"Zeroconf service name")
 
1638
 
    parser.add_option("--configdir", type=u"string",
 
1639
 
                      default=u"/etc/mandos", metavar=u"DIR",
 
1640
 
                      help=u"Directory to search for configuration"
 
1642
 
    parser.add_option("--no-dbus", action=u"store_false",
 
1643
 
                      dest=u"use_dbus", help=u"Do not provide D-Bus"
 
1644
 
                      u" system bus interface")
 
1645
 
    parser.add_option("--no-ipv6", action=u"store_false",
 
1646
 
                      dest=u"use_ipv6", help=u"Do not use IPv6")
 
1647
 
    options = parser.parse_args()[0]
 
 
1980
    parser = argparse.ArgumentParser()
 
 
1981
    parser.add_argument("-v", "--version", action="version",
 
 
1982
                        version = "%%(prog)s %s" % version,
 
 
1983
                        help="show version number and exit")
 
 
1984
    parser.add_argument("-i", "--interface", metavar="IF",
 
 
1985
                        help="Bind to interface IF")
 
 
1986
    parser.add_argument("-a", "--address",
 
 
1987
                        help="Address to listen for requests on")
 
 
1988
    parser.add_argument("-p", "--port", type=int,
 
 
1989
                        help="Port number to receive requests on")
 
 
1990
    parser.add_argument("--check", action="store_true",
 
 
1991
                        help="Run self-test")
 
 
1992
    parser.add_argument("--debug", action="store_true",
 
 
1993
                        help="Debug mode; run in foreground and log"
 
 
1995
    parser.add_argument("--debuglevel", metavar="LEVEL",
 
 
1996
                        help="Debug level for stdout output")
 
 
1997
    parser.add_argument("--priority", help="GnuTLS"
 
 
1998
                        " priority string (see GnuTLS documentation)")
 
 
1999
    parser.add_argument("--servicename",
 
 
2000
                        metavar="NAME", help="Zeroconf service name")
 
 
2001
    parser.add_argument("--configdir",
 
 
2002
                        default="/etc/mandos", metavar="DIR",
 
 
2003
                        help="Directory to search for configuration"
 
 
2005
    parser.add_argument("--no-dbus", action="store_false",
 
 
2006
                        dest="use_dbus", help="Do not provide D-Bus"
 
 
2007
                        " system bus interface")
 
 
2008
    parser.add_argument("--no-ipv6", action="store_false",
 
 
2009
                        dest="use_ipv6", help="Do not use IPv6")
 
 
2010
    parser.add_argument("--no-restore", action="store_false",
 
 
2011
                        dest="restore", help="Do not restore stored"
 
 
2013
    parser.add_argument("--statedir", metavar="DIR",
 
 
2014
                        help="Directory to save/restore state in")
 
 
2016
    options = parser.parse_args()
 
1649
2018
    if options.check:
 
 
1698
2070
    ##################################################################
 
1700
2072
    # For convenience
 
1701
 
    debug = server_settings[u"debug"]
 
1702
 
    debuglevel = server_settings[u"debuglevel"]
 
1703
 
    use_dbus = server_settings[u"use_dbus"]
 
1704
 
    use_ipv6 = server_settings[u"use_ipv6"]
 
1706
 
    if server_settings[u"servicename"] != u"Mandos":
 
 
2073
    debug = server_settings["debug"]
 
 
2074
    debuglevel = server_settings["debuglevel"]
 
 
2075
    use_dbus = server_settings["use_dbus"]
 
 
2076
    use_ipv6 = server_settings["use_ipv6"]
 
 
2077
    stored_state_path = os.path.join(server_settings["statedir"],
 
 
2081
        initlogger(logging.DEBUG)
 
 
2086
            level = getattr(logging, debuglevel.upper())
 
 
2089
    if server_settings["servicename"] != "Mandos":
 
1707
2090
        syslogger.setFormatter(logging.Formatter
 
1708
 
                               (u'Mandos (%s) [%%(process)d]:'
 
1709
 
                                u' %%(levelname)s: %%(message)s'
 
1710
 
                                % server_settings[u"servicename"]))
 
 
2091
                               ('Mandos (%s) [%%(process)d]:'
 
 
2092
                                ' %%(levelname)s: %%(message)s'
 
 
2093
                                % server_settings["servicename"]))
 
1712
2095
    # Parse config file with clients
 
1713
 
    client_defaults = { u"timeout": u"1h",
 
1715
 
                        u"checker": u"fping -q -- %%(host)s",
 
1717
 
                        u"approved_delay": u"0s",
 
1718
 
                        u"approved_duration": u"1s",
 
1720
 
    client_config = configparser.SafeConfigParser(client_defaults)
 
1721
 
    client_config.read(os.path.join(server_settings[u"configdir"],
 
 
2096
    client_config = configparser.SafeConfigParser(Client.client_defaults)
 
 
2097
    client_config.read(os.path.join(server_settings["configdir"],
 
1724
2100
    global mandos_dbus_service
 
1725
2101
    mandos_dbus_service = None
 
1727
 
    tcp_server = MandosServer((server_settings[u"address"],
 
1728
 
                               server_settings[u"port"]),
 
 
2103
    tcp_server = MandosServer((server_settings["address"],
 
 
2104
                               server_settings["port"]),
 
1730
 
                              interface=server_settings[u"interface"],
 
 
2106
                              interface=(server_settings["interface"]
 
1731
2108
                              use_ipv6=use_ipv6,
 
1732
2109
                              gnutls_priority=
 
1733
 
                              server_settings[u"priority"],
 
 
2110
                              server_settings["priority"],
 
1734
2111
                              use_dbus=use_dbus)
 
1735
 
    pidfilename = u"/var/run/mandos.pid"
 
1737
 
        pidfile = open(pidfilename, u"w")
 
1739
 
        logger.error(u"Could not open file %r", pidfilename)
 
 
2113
        pidfilename = "/var/run/mandos.pid"
 
 
2115
            pidfile = open(pidfilename, "w")
 
 
2117
            logger.error("Could not open file %r", pidfilename)
 
1742
 
        uid = pwd.getpwnam(u"_mandos").pw_uid
 
1743
 
        gid = pwd.getpwnam(u"_mandos").pw_gid
 
 
2120
        uid = pwd.getpwnam("_mandos").pw_uid
 
 
2121
        gid = pwd.getpwnam("_mandos").pw_gid
 
1744
2122
    except KeyError:
 
1746
 
            uid = pwd.getpwnam(u"mandos").pw_uid
 
1747
 
            gid = pwd.getpwnam(u"mandos").pw_gid
 
 
2124
            uid = pwd.getpwnam("mandos").pw_uid
 
 
2125
            gid = pwd.getpwnam("mandos").pw_gid
 
1748
2126
        except KeyError:
 
1750
 
                uid = pwd.getpwnam(u"nobody").pw_uid
 
1751
 
                gid = pwd.getpwnam(u"nobody").pw_gid
 
 
2128
                uid = pwd.getpwnam("nobody").pw_uid
 
 
2129
                gid = pwd.getpwnam("nobody").pw_gid
 
1752
2130
            except KeyError:
 
1758
 
    except OSError, error:
 
 
2136
    except OSError as error:
 
1759
2137
        if error[0] != errno.EPERM:
 
1762
 
    # Enable all possible GnuTLS debugging
 
1765
 
    if not debug and not debuglevel:
 
1766
 
        syslogger.setLevel(logging.WARNING)
 
1767
 
        console.setLevel(logging.WARNING)
 
1769
 
        level = getattr(logging, debuglevel.upper())
 
1770
 
        syslogger.setLevel(level)
 
1771
 
        console.setLevel(level)
 
 
2141
        # Enable all possible GnuTLS debugging
 
1774
2143
        # "Use a log level over 10 to enable all debugging options."
 
1775
2144
        # - GnuTLS manual
 
1776
2145
        gnutls.library.functions.gnutls_global_set_log_level(11)
 
1778
2147
        @gnutls.library.types.gnutls_log_func
 
1779
2148
        def debug_gnutls(level, string):
 
1780
 
            logger.debug(u"GnuTLS: %s", string[:-1])
 
 
2149
            logger.debug("GnuTLS: %s", string[:-1])
 
1782
2151
        (gnutls.library.functions
 
1783
2152
         .gnutls_global_set_log_function(debug_gnutls))
 
1785
2154
        # Redirect stdin so all checkers get /dev/null
 
1786
2155
        null = os.open(os.path.devnull, os.O_NOCTTY | os.O_RDWR)
 
1787
2156
        os.dup2(null, sys.stdin.fileno())
 
 
1800
2173
    # End of Avahi example code
 
1803
 
            bus_name = dbus.service.BusName(u"se.bsnet.fukt.Mandos",
 
 
2176
            bus_name = dbus.service.BusName("se.recompile.Mandos",
 
1804
2177
                                            bus, do_not_queue=True)
 
1805
 
        except dbus.exceptions.NameExistsException, e:
 
1806
 
            logger.error(unicode(e) + u", disabling D-Bus")
 
 
2178
            old_bus_name = (dbus.service.BusName
 
 
2179
                            ("se.bsnet.fukt.Mandos", bus,
 
 
2181
        except dbus.exceptions.NameExistsException as e:
 
 
2182
            logger.error(unicode(e) + ", disabling D-Bus")
 
1807
2183
            use_dbus = False
 
1808
 
            server_settings[u"use_dbus"] = False
 
 
2184
            server_settings["use_dbus"] = False
 
1809
2185
            tcp_server.use_dbus = False
 
1810
2186
    protocol = avahi.PROTO_INET6 if use_ipv6 else avahi.PROTO_INET
 
1811
 
    service = AvahiService(name = server_settings[u"servicename"],
 
1812
 
                           servicetype = u"_mandos._tcp",
 
1813
 
                           protocol = protocol, bus = bus)
 
 
2187
    service = AvahiServiceToSyslog(name =
 
 
2188
                                   server_settings["servicename"],
 
 
2189
                                   servicetype = "_mandos._tcp",
 
 
2190
                                   protocol = protocol, bus = bus)
 
1814
2191
    if server_settings["interface"]:
 
1815
2192
        service.interface = (if_nametoindex
 
1816
 
                             (str(server_settings[u"interface"])))
 
1819
 
        # Close all input and output, do double fork, etc.
 
 
2193
                             (str(server_settings["interface"])))
 
1822
2195
    global multiprocessing_manager
 
1823
2196
    multiprocessing_manager = multiprocessing.Manager()
 
1825
2198
    client_class = Client
 
1827
 
        client_class = functools.partial(ClientDBus, bus = bus)
 
1828
 
    def client_config_items(config, section):
 
1829
 
        special_settings = {
 
1830
 
            "approved_by_default":
 
1831
 
                lambda: config.getboolean(section,
 
1832
 
                                          "approved_by_default"),
 
1834
 
        for name, value in config.items(section):
 
 
2200
        client_class = functools.partial(ClientDBusTransitional,
 
 
2203
    client_settings = Client.config_parser(client_config)
 
 
2204
    old_client_settings = {}
 
 
2207
    # Get client data and settings from last running state.
 
 
2208
    if server_settings["restore"]:
 
 
2210
            with open(stored_state_path, "rb") as stored_state:
 
 
2211
                clients_data, old_client_settings = (pickle.load
 
 
2213
            os.remove(stored_state_path)
 
 
2214
        except IOError as e:
 
 
2215
            logger.warning("Could not load persistent state: {0}"
 
 
2217
            if e.errno != errno.ENOENT:
 
 
2220
    with PGPEngine() as pgp:
 
 
2221
        for client_name, client in clients_data.iteritems():
 
 
2222
            # Decide which value to use after restoring saved state.
 
 
2223
            # We have three different values: Old config file,
 
 
2224
            # new config file, and saved state.
 
 
2225
            # New config value takes precedence if it differs from old
 
 
2226
            # config value, otherwise use saved state.
 
 
2227
            for name, value in client_settings[client_name].items():
 
 
2229
                    # For each value in new config, check if it
 
 
2230
                    # differs from the old config value (Except for
 
 
2231
                    # the "secret" attribute)
 
 
2232
                    if (name != "secret" and
 
 
2233
                        value != old_client_settings[client_name]
 
 
2235
                        client[name] = value
 
 
2239
            # Clients who has passed its expire date can still be
 
 
2240
            # enabled if its last checker was successful.  Clients
 
 
2241
            # whose checker failed before we stored its state is
 
 
2242
            # assumed to have failed all checkers during downtime.
 
 
2243
            if client["enabled"]:
 
 
2244
                if datetime.datetime.utcnow() >= client["expires"]:
 
 
2245
                    if not client["last_checked_ok"]:
 
 
2247
                            "disabling client {0} - Client never "
 
 
2248
                            "performed a successfull checker"
 
 
2249
                            .format(client["name"]))
 
 
2250
                        client["enabled"] = False
 
 
2251
                    elif client["last_checker_status"] != 0:
 
 
2253
                            "disabling client {0} - Client "
 
 
2254
                            "last checker failed with error code {1}"
 
 
2255
                            .format(client["name"],
 
 
2256
                                    client["last_checker_status"]))
 
 
2257
                        client["enabled"] = False
 
 
2259
                        client["expires"] = (datetime.datetime
 
 
2261
                                             + client["timeout"])
 
1836
 
                yield (name, special_settings[name]())
 
1840
 
    tcp_server.clients.update(set(
 
1841
 
            client_class(name = section,
 
1842
 
                         config= dict(client_config_items(
 
1843
 
                        client_config, section)))
 
1844
 
            for section in client_config.sections()))
 
 
2264
                client["secret"] = (
 
 
2265
                    pgp.decrypt(client["encrypted_secret"],
 
 
2266
                                client_settings[client_name]
 
 
2269
                # If decryption fails, we use secret from new settings
 
 
2270
                logger.debug("Failed to decrypt {0} old secret"
 
 
2271
                             .format(client_name))
 
 
2272
                client["secret"] = (
 
 
2273
                    client_settings[client_name]["secret"])
 
 
2276
    # Add/remove clients based on new changes made to config
 
 
2277
    for client_name in set(old_client_settings) - set(client_settings):
 
 
2278
        del clients_data[client_name]
 
 
2279
    for client_name in set(client_settings) - set(old_client_settings):
 
 
2280
        clients_data[client_name] = client_settings[client_name]
 
 
2282
    # Create clients all clients
 
 
2283
    for client_name, client in clients_data.iteritems():
 
 
2284
        tcp_server.clients[client_name] = client_class(
 
 
2285
            name = client_name, settings = client)
 
1845
2287
    if not tcp_server.clients:
 
1846
 
        logger.warning(u"No clients defined")
 
 
2288
        logger.warning("No clients defined")
 
1851
 
            pidfile.write(str(pid) + "\n")
 
1854
 
        logger.error(u"Could not write to file %r with PID %d",
 
1857
 
        # "pidfile" was never created
 
 
2294
                pidfile.write(str(pid) + "\n".encode("utf-8"))
 
 
2297
            logger.error("Could not write to file %r with PID %d",
 
 
2300
            # "pidfile" was never created
 
1862
2303
        signal.signal(signal.SIGINT, signal.SIG_IGN)
 
1863
2305
    signal.signal(signal.SIGHUP, lambda signum, frame: sys.exit())
 
1864
2306
    signal.signal(signal.SIGTERM, lambda signum, frame: sys.exit())