2
2
# -*- mode: python; coding: utf-8 -*-
4
4
# Mandos Monitor - Control and monitor the Mandos server
6
# Copyright © 2008-2012 Teddy Hogeborn
7
# Copyright © 2008-2012 Björn Påhlsson
9
# This program is free software: you can redistribute it and/or modify
10
# it under the terms of the GNU General Public License as published by
6
# Copyright © 2008-2019 Teddy Hogeborn
7
# Copyright © 2008-2019 Björn Påhlsson
9
# This file is part of Mandos.
11
# Mandos is free software: you can redistribute it and/or modify it
12
# under the terms of the GNU General Public License as published by
11
13
# the Free Software Foundation, either version 3 of the License, or
12
14
# (at your option) any later version.
14
# This program is distributed in the hope that it will be useful,
15
# but WITHOUT ANY WARRANTY; without even the implied warranty of
16
# Mandos is distributed in the hope that it will be useful, but
17
# WITHOUT ANY WARRANTY; without even the implied warranty of
16
18
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17
19
# GNU General Public License for more details.
19
21
# You should have received a copy of the GNU General Public License
20
# along with this program. If not, see
21
# <http://www.gnu.org/licenses/>.
22
# along with Mandos. If not, see <http://www.gnu.org/licenses/>.
23
24
# Contact the authors at <mandos@recompile.se>.
26
27
from __future__ import (division, absolute_import, print_function,
29
from future_builtins import *
31
from future_builtins import *
58
67
"ApprovalDelay": "Approval Delay",
59
68
"ApprovalDuration": "Approval Duration",
60
69
"Checker": "Checker",
61
"ExtendedTimeout" : "Extended Timeout"
70
"ExtendedTimeout": "Extended Timeout",
72
"LastCheckerStatus": "Last Checker Status",
63
74
defaultkeywords = ("Name", "Enabled", "Timeout", "LastCheckedOK")
64
75
domain = "se.recompile"
65
76
busname = domain + ".Mandos"
67
78
server_interface = domain + ".Mandos"
68
79
client_interface = domain + ".Mandos.Client"
71
def timedelta_to_milliseconds(td):
72
"""Convert a datetime.timedelta object to milliseconds"""
73
return ((td.days * 24 * 60 * 60 * 1000)
75
+ (td.microseconds // 1000))
84
dbus.OBJECT_MANAGER_IFACE
85
except AttributeError:
86
dbus.OBJECT_MANAGER_IFACE = "org.freedesktop.DBus.ObjectManager"
77
89
def milliseconds_to_string(ms):
78
90
td = datetime.timedelta(0, 0, 0, ms)
79
91
return ("{days}{hours:02}:{minutes:02}:{seconds:02}"
80
.format(days = "{0}T".format(td.days) if td.days else "",
81
hours = td.seconds // 3600,
82
minutes = (td.seconds % 3600) // 60,
83
seconds = td.seconds % 60,
92
.format(days="{}T".format(td.days) if td.days else "",
93
hours=td.seconds // 3600,
94
minutes=(td.seconds % 3600) // 60,
95
seconds=td.seconds % 60))
87
98
def rfc3339_duration_to_delta(duration):
88
99
"""Parse an RFC 3339 "duration" and return a datetime.timedelta
90
101
>>> rfc3339_duration_to_delta("P7D")
91
102
datetime.timedelta(7)
92
103
>>> rfc3339_duration_to_delta("PT60S")
102
113
>>> rfc3339_duration_to_delta("P1DT3M20S")
103
114
datetime.timedelta(1, 200)
106
117
# Parsing an RFC 3339 duration with regular expressions is not
107
118
# possible - there would have to be multiple places for the same
108
119
# values, like seconds. The current code, while more esoteric, is
109
120
# cleaner without depending on a parsing library. If Python had a
110
121
# built-in library for parsing we would use it, but we'd like to
111
122
# avoid excessive use of external libraries.
113
124
# New type for defining tokens, syntax, and semantics all-in-one
114
Token = collections.namedtuple("Token",
115
("regexp", # To match token; if
116
# "value" is not None,
117
# must have a "group"
119
"value", # datetime.timedelta or
121
"followers")) # Tokens valid after
125
Token = collections.namedtuple("Token", (
126
"regexp", # To match token; if "value" is not None, must have
127
# a "group" containing digits
128
"value", # datetime.timedelta or None
129
"followers")) # Tokens valid after this token
123
130
# RFC 3339 "duration" tokens, syntax, and semantics; taken from
124
131
# the "duration" ABNF definition in RFC 3339, Appendix A.
125
132
token_end = Token(re.compile(r"$"), None, frozenset())
126
133
token_second = Token(re.compile(r"(\d+)S"),
127
134
datetime.timedelta(seconds=1),
128
frozenset((token_end,)))
135
frozenset((token_end, )))
129
136
token_minute = Token(re.compile(r"(\d+)M"),
130
137
datetime.timedelta(minutes=1),
131
138
frozenset((token_second, token_end)))
180
190
# No currently valid tokens were found
181
raise ValueError("Invalid RFC 3339 duration")
191
raise ValueError("Invalid RFC 3339 duration: {!r}"
182
193
# End token found
186
197
def string_to_delta(interval):
187
198
"""Parse a string and return a datetime.timedelta
189
>>> string_to_delta("7d")
200
>>> string_to_delta('7d')
190
201
datetime.timedelta(7)
191
>>> string_to_delta("60s")
202
>>> string_to_delta('60s')
192
203
datetime.timedelta(0, 60)
193
>>> string_to_delta("60m")
204
>>> string_to_delta('60m')
194
205
datetime.timedelta(0, 3600)
195
>>> string_to_delta("24h")
206
>>> string_to_delta('24h')
196
207
datetime.timedelta(1)
197
>>> string_to_delta("1w")
208
>>> string_to_delta('1w')
198
209
datetime.timedelta(7)
199
>>> string_to_delta("5m 30s")
210
>>> string_to_delta('5m 30s')
200
211
datetime.timedelta(0, 330)
202
value = datetime.timedelta(0)
203
regexp = re.compile(r"(\d+)([dsmhw]?)")
206
215
return rfc3339_duration_to_delta(interval)
207
216
except ValueError:
219
value = datetime.timedelta(0)
220
regexp = re.compile(r"(\d+)([dsmhw]?)")
210
222
for num, suffix in regexp.findall(interval):
211
223
if suffix == "d":
212
224
value += datetime.timedelta(int(num))
229
242
if keyword in ("Timeout", "Interval", "ApprovalDelay",
230
243
"ApprovalDuration", "ExtendedTimeout"):
231
244
return milliseconds_to_string(value)
232
return unicode(value)
234
247
# Create format string to print table rows
235
248
format_string = " ".join("{{{key}:{width}}}".format(
236
width = max(len(tablewords[key]),
237
max(len(valuetostring(client[key],
241
key = key) for key in keywords)
249
width=max(len(tablewords[key]),
250
max(len(valuetostring(client[key], key))
251
for client in clients)),
242
254
# Print header line
243
255
print(format_string.format(**tablewords))
244
256
for client in clients:
245
print(format_string.format(**dict((key,
246
valuetostring(client[key],
248
for key in keywords)))
258
.format(**{key: valuetostring(client[key], key)
259
for key in keywords}))
250
262
def has_actions(options):
251
263
return any((options.enable,
271
284
parser = argparse.ArgumentParser()
272
285
parser.add_argument("--version", action="version",
273
version = "%(prog)s {0}".format(version),
286
version="%(prog)s {}".format(version),
274
287
help="show version number and exit")
275
288
parser.add_argument("-a", "--all", action="store_true",
276
289
help="Select all clients")
277
290
parser.add_argument("-v", "--verbose", action="store_true",
278
291
help="Print all fields")
292
parser.add_argument("-j", "--dump-json", action="store_true",
293
help="Dump client data in JSON format")
279
294
parser.add_argument("-e", "--enable", action="store_true",
280
295
help="Enable client")
281
296
parser.add_argument("-d", "--disable", action="store_true",
319
335
help="Run self-test")
320
336
parser.add_argument("client", nargs="*", help="Client name")
321
337
options = parser.parse_args()
323
339
if has_actions(options) and not (options.client or options.all):
324
340
parser.error("Options require clients names or --all.")
325
341
if options.verbose and has_actions(options):
326
parser.error("--verbose can only be used alone or with"
342
parser.error("--verbose can only be used alone.")
343
if options.dump_json and (options.verbose
344
or has_actions(options)):
345
parser.error("--dump-json can only be used alone.")
328
346
if options.all and not has_actions(options):
329
347
parser.error("--all requires an action.")
332
fail_count, test_count = doctest.testmod()
333
sys.exit(0 if fail_count == 0 else 1)
336
350
bus = dbus.SystemBus()
337
351
mandos_dbus_objc = bus.get_object(busname, server_path)
338
352
except dbus.exceptions.DBusException:
339
print("Could not connect to Mandos server",
353
print("Could not connect to Mandos server", file=sys.stderr)
343
356
mandos_serv = dbus.Interface(mandos_dbus_objc,
344
dbus_interface = server_interface)
346
#block stderr since dbus library prints to stderr
357
dbus_interface=server_interface)
358
mandos_serv_object_manager = dbus.Interface(
359
mandos_dbus_objc, dbus_interface=dbus.OBJECT_MANAGER_IFACE)
361
# block stderr since dbus library prints to stderr
347
362
null = os.open(os.path.devnull, os.O_RDWR)
348
363
stderrcopy = os.dup(sys.stderr.fileno())
349
364
os.dup2(null, sys.stderr.fileno())
353
mandos_clients = mandos_serv.GetAllClientsWithProperties()
368
mandos_clients = {path: ifs_and_props[client_interface]
369
for path, ifs_and_props in
370
mandos_serv_object_manager
371
.GetManagedObjects().items()
372
if client_interface in ifs_and_props}
356
375
os.dup2(stderrcopy, sys.stderr.fileno())
357
376
os.close(stderrcopy)
358
except dbus.exceptions.DBusException:
359
print("Access denied: Accessing mandos server through dbus.",
377
except dbus.exceptions.DBusException as e:
378
print("Access denied: "
379
"Accessing mandos server through D-Bus: {}".format(e),
363
383
# Compile dict of (clients: properties) to process
366
386
if options.all or not options.client:
367
clients = dict((bus.get_object(busname, path), properties)
368
for path, properties in
369
mandos_clients.iteritems())
387
clients = {bus.get_object(busname, path): properties
388
for path, properties in mandos_clients.items()}
371
390
for name in options.client:
372
for path, client in mandos_clients.iteritems():
391
for path, client in mandos_clients.items():
373
392
if client["Name"] == name:
374
393
client_objc = bus.get_object(busname, path)
375
394
clients[client_objc] = client
378
print("Client not found on server: {0!r}"
397
print("Client not found on server: {!r}"
379
398
.format(name), file=sys.stderr)
382
401
if not has_actions(options) and clients:
384
keywords = ("Name", "Enabled", "Timeout",
385
"LastCheckedOK", "Created", "Interval",
386
"Host", "Fingerprint", "CheckerRunning",
402
if options.verbose or options.dump_json:
403
keywords = ("Name", "Enabled", "Timeout", "LastCheckedOK",
404
"Created", "Interval", "Host", "KeyID",
405
"Fingerprint", "CheckerRunning",
387
406
"LastEnabled", "ApprovalPending",
389
"LastApprovalRequest", "ApprovalDelay",
390
"ApprovalDuration", "Checker",
407
"ApprovedByDefault", "LastApprovalRequest",
408
"ApprovalDelay", "ApprovalDuration",
409
"Checker", "ExtendedTimeout", "Expires",
393
412
keywords = defaultkeywords
395
print_clients(clients.values(), keywords)
414
if options.dump_json:
415
json.dump({client["Name"]: {key:
417
if isinstance(client[key],
421
for client in clients.values()},
422
fp=sys.stdout, indent=4,
423
separators=(',', ': '))
426
print_clients(clients.values(), keywords)
397
428
# Process each client in the list by all selected options
398
429
for client in clients:
399
431
def set_client_prop(prop, value):
400
432
"""Set a Client D-Bus property"""
401
433
client.Set(client_interface, prop, value,
402
434
dbus_interface=dbus.PROPERTIES_IFACE)
403
436
def set_client_prop_ms(prop, value):
404
437
"""Set a Client D-Bus property, converted
405
438
from a string to milliseconds."""
406
439
set_client_prop(prop,
407
timedelta_to_milliseconds
408
(string_to_delta(value)))
440
string_to_delta(value).total_seconds()
409
443
if options.remove:
410
444
mandos_serv.RemoveClient(client.__dbus_object_path__)
411
445
if options.enable: