2
# -*- mode: python; coding: utf-8 -*-
2
# -*- mode: python; coding: utf-8; after-save-hook: (lambda () (let ((command (if (and (boundp 'tramp-file-name-structure) (string-match (car tramp-file-name-structure) (buffer-file-name))) (tramp-file-name-localname (tramp-dissect-file-name (buffer-file-name))) (buffer-file-name)))) (if (= (shell-command (format "%s --check" (shell-quote-argument command)) "*Test*") 0) (let ((w (get-buffer-window "*Test*"))) (if w (delete-window w)) (kill-buffer "*Test*")) (display-buffer "*Test*")))); -*-
4
4
# Mandos Monitor - Control and monitor the Mandos server
6
# Copyright © 2008-2012 Teddy Hogeborn
7
# Copyright © 2008-2012 Björn Påhlsson
9
# This program is free software: you can redistribute it and/or modify
10
# it under the terms of the GNU General Public License as published by
6
# Copyright © 2008-2019 Teddy Hogeborn
7
# Copyright © 2008-2019 Björn Påhlsson
9
# This file is part of Mandos.
11
# Mandos is free software: you can redistribute it and/or modify it
12
# under the terms of the GNU General Public License as published by
11
13
# the Free Software Foundation, either version 3 of the License, or
12
14
# (at your option) any later version.
14
# This program is distributed in the hope that it will be useful,
15
# but WITHOUT ANY WARRANTY; without even the implied warranty of
16
# Mandos is distributed in the hope that it will be useful, but
17
# WITHOUT ANY WARRANTY; without even the implied warranty of
16
18
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17
19
# GNU General Public License for more details.
19
21
# You should have received a copy of the GNU General Public License
20
# along with this program. If not, see
21
# <http://www.gnu.org/licenses/>.
22
# along with Mandos. If not, see <http://www.gnu.org/licenses/>.
23
24
# Contact the authors at <mandos@recompile.se>.
26
27
from __future__ import (division, absolute_import, print_function,
29
from future_builtins import *
31
from future_builtins import *
48
# Show warnings by default
49
if not sys.warnoptions:
51
warnings.simplefilter("default")
53
log = logging.getLogger(sys.argv[0])
54
logging.basicConfig(level="INFO", # Show info level messages
55
format="%(message)s") # Show basic log messages
57
logging.captureWarnings(True) # Show warnings via the logging system
59
if sys.version_info.major == 2:
42
62
locale.setlocale(locale.LC_ALL, "")
48
"LastCheckedOK": "Last Successful Check",
49
"LastApprovalRequest": "Last Approval Request",
51
"Interval": "Interval",
53
"Fingerprint": "Fingerprint",
54
"CheckerRunning": "Check Is Running",
55
"LastEnabled": "Last Enabled",
56
"ApprovalPending": "Approval Is Pending",
57
"ApprovedByDefault": "Approved By Default",
58
"ApprovalDelay": "Approval Delay",
59
"ApprovalDuration": "Approval Duration",
61
"ExtendedTimeout" : "Extended Timeout"
63
64
defaultkeywords = ("Name", "Enabled", "Timeout", "LastCheckedOK")
64
65
domain = "se.recompile"
65
66
busname = domain + ".Mandos"
67
68
server_interface = domain + ".Mandos"
68
69
client_interface = domain + ".Mandos.Client"
71
def timedelta_to_milliseconds(td):
72
"""Convert a datetime.timedelta object to milliseconds"""
73
return ((td.days * 24 * 60 * 60 * 1000)
75
+ (td.microseconds // 1000))
74
dbus.OBJECT_MANAGER_IFACE
75
except AttributeError:
76
dbus.OBJECT_MANAGER_IFACE = "org.freedesktop.DBus.ObjectManager"
77
79
def milliseconds_to_string(ms):
78
80
td = datetime.timedelta(0, 0, 0, ms)
79
81
return ("{days}{hours:02}:{minutes:02}:{seconds:02}"
80
.format(days = "{0}T".format(td.days) if td.days else "",
81
hours = td.seconds // 3600,
82
minutes = (td.seconds % 3600) // 60,
83
seconds = td.seconds % 60,
82
.format(days="{}T".format(td.days) if td.days else "",
83
hours=td.seconds // 3600,
84
minutes=(td.seconds % 3600) // 60,
85
seconds=td.seconds % 60))
87
88
def rfc3339_duration_to_delta(duration):
88
89
"""Parse an RFC 3339 "duration" and return a datetime.timedelta
90
91
>>> rfc3339_duration_to_delta("P7D")
91
92
datetime.timedelta(7)
92
93
>>> rfc3339_duration_to_delta("PT60S")
93
94
datetime.timedelta(0, 60)
94
95
>>> rfc3339_duration_to_delta("PT60M")
95
96
datetime.timedelta(0, 3600)
97
>>> rfc3339_duration_to_delta("P60M")
98
datetime.timedelta(1680)
96
99
>>> rfc3339_duration_to_delta("PT24H")
97
100
datetime.timedelta(1)
98
101
>>> rfc3339_duration_to_delta("P1W")
101
104
datetime.timedelta(0, 330)
102
105
>>> rfc3339_duration_to_delta("P1DT3M20S")
103
106
datetime.timedelta(1, 200)
107
>>> # Can not be empty:
108
>>> rfc3339_duration_to_delta("")
109
Traceback (most recent call last):
111
ValueError: Invalid RFC 3339 duration: u''
112
>>> # Must start with "P":
113
>>> rfc3339_duration_to_delta("1D")
114
Traceback (most recent call last):
116
ValueError: Invalid RFC 3339 duration: u'1D'
117
>>> # Must use correct order
118
>>> rfc3339_duration_to_delta("PT1S2M")
119
Traceback (most recent call last):
121
ValueError: Invalid RFC 3339 duration: u'PT1S2M'
122
>>> # Time needs time marker
123
>>> rfc3339_duration_to_delta("P1H2S")
124
Traceback (most recent call last):
126
ValueError: Invalid RFC 3339 duration: u'P1H2S'
127
>>> # Weeks can not be combined with anything else
128
>>> rfc3339_duration_to_delta("P1D2W")
129
Traceback (most recent call last):
131
ValueError: Invalid RFC 3339 duration: u'P1D2W'
132
>>> rfc3339_duration_to_delta("P2W2H")
133
Traceback (most recent call last):
135
ValueError: Invalid RFC 3339 duration: u'P2W2H'
106
138
# Parsing an RFC 3339 duration with regular expressions is not
107
139
# possible - there would have to be multiple places for the same
108
140
# values, like seconds. The current code, while more esoteric, is
109
141
# cleaner without depending on a parsing library. If Python had a
110
142
# built-in library for parsing we would use it, but we'd like to
111
143
# avoid excessive use of external libraries.
113
145
# New type for defining tokens, syntax, and semantics all-in-one
114
Token = collections.namedtuple("Token",
115
("regexp", # To match token; if
116
# "value" is not None,
117
# must have a "group"
119
"value", # datetime.timedelta or
121
"followers")) # Tokens valid after
146
Token = collections.namedtuple("Token", (
147
"regexp", # To match token; if "value" is not None, must have
148
# a "group" containing digits
149
"value", # datetime.timedelta or None
150
"followers")) # Tokens valid after this token
123
151
# RFC 3339 "duration" tokens, syntax, and semantics; taken from
124
152
# the "duration" ABNF definition in RFC 3339, Appendix A.
125
153
token_end = Token(re.compile(r"$"), None, frozenset())
126
154
token_second = Token(re.compile(r"(\d+)S"),
127
155
datetime.timedelta(seconds=1),
128
frozenset((token_end,)))
156
frozenset((token_end, )))
129
157
token_minute = Token(re.compile(r"(\d+)M"),
130
158
datetime.timedelta(minutes=1),
131
159
frozenset((token_second, token_end)))
180
211
# No currently valid tokens were found
181
raise ValueError("Invalid RFC 3339 duration")
212
raise ValueError("Invalid RFC 3339 duration: {!r}"
182
214
# End token found
186
218
def string_to_delta(interval):
187
219
"""Parse a string and return a datetime.timedelta
189
>>> string_to_delta("7d")
190
datetime.timedelta(7)
191
>>> string_to_delta("60s")
192
datetime.timedelta(0, 60)
193
>>> string_to_delta("60m")
194
datetime.timedelta(0, 3600)
195
>>> string_to_delta("24h")
196
datetime.timedelta(1)
197
>>> string_to_delta("1w")
198
datetime.timedelta(7)
199
>>> string_to_delta("5m 30s")
200
datetime.timedelta(0, 330)
204
223
return rfc3339_duration_to_delta(interval)
224
except ValueError as e:
225
log.warning("%s - Parsing as pre-1.6.1 interval instead",
227
return parse_pre_1_6_1_interval(interval)
230
def parse_pre_1_6_1_interval(interval):
231
"""Parse an interval string as documented by Mandos before 1.6.1, and
232
return a datetime.timedelta
233
>>> parse_pre_1_6_1_interval('7d')
234
datetime.timedelta(7)
235
>>> parse_pre_1_6_1_interval('60s')
236
datetime.timedelta(0, 60)
237
>>> parse_pre_1_6_1_interval('60m')
238
datetime.timedelta(0, 3600)
239
>>> parse_pre_1_6_1_interval('24h')
240
datetime.timedelta(1)
241
>>> parse_pre_1_6_1_interval('1w')
242
datetime.timedelta(7)
243
>>> parse_pre_1_6_1_interval('5m 30s')
244
datetime.timedelta(0, 330)
245
>>> parse_pre_1_6_1_interval('')
246
datetime.timedelta(0)
247
>>> # Ignore unknown characters, allow any order and repetitions
248
>>> parse_pre_1_6_1_interval('2dxy7zz11y3m5m')
249
datetime.timedelta(2, 480, 18000)
208
253
value = datetime.timedelta(0)
209
254
regexp = re.compile(r"(\d+)([dsmhw]?)")
211
256
for num, suffix in regexp.findall(interval):
212
257
if suffix == "d":
213
258
value += datetime.timedelta(int(num))
223
268
value += datetime.timedelta(0, 0, 0, int(num))
226
272
def print_clients(clients, keywords):
273
print('\n'.join(TableOfClients(clients, keywords).rows()))
275
class TableOfClients(object):
278
"Enabled": "Enabled",
279
"Timeout": "Timeout",
280
"LastCheckedOK": "Last Successful Check",
281
"LastApprovalRequest": "Last Approval Request",
282
"Created": "Created",
283
"Interval": "Interval",
285
"Fingerprint": "Fingerprint",
287
"CheckerRunning": "Check Is Running",
288
"LastEnabled": "Last Enabled",
289
"ApprovalPending": "Approval Is Pending",
290
"ApprovedByDefault": "Approved By Default",
291
"ApprovalDelay": "Approval Delay",
292
"ApprovalDuration": "Approval Duration",
293
"Checker": "Checker",
294
"ExtendedTimeout": "Extended Timeout",
295
"Expires": "Expires",
296
"LastCheckerStatus": "Last Checker Status",
299
def __init__(self, clients, keywords, tablewords=None):
300
self.clients = clients
301
self.keywords = keywords
302
if tablewords is not None:
303
self.tablewords = tablewords
227
306
def valuetostring(value, keyword):
228
if type(value) is dbus.Boolean:
307
if isinstance(value, dbus.Boolean):
229
308
return "Yes" if value else "No"
230
309
if keyword in ("Timeout", "Interval", "ApprovalDelay",
231
310
"ApprovalDuration", "ExtendedTimeout"):
232
311
return milliseconds_to_string(value)
233
return unicode(value)
235
# Create format string to print table rows
236
format_string = " ".join("{{{key}:{width}}}".format(
237
width = max(len(tablewords[key]),
238
max(len(valuetostring(client[key],
242
key = key) for key in keywords)
244
print(format_string.format(**tablewords))
245
for client in clients:
246
print(format_string.format(**dict((key,
247
valuetostring(client[key],
249
for key in keywords)))
315
# Create format string to format table rows
316
format_string = " ".join("{{{key}:{width}}}".format(
317
width=max(len(self.tablewords[key]),
318
max(len(self.valuetostring(client[key], key))
319
for client in self.clients)),
321
for key in self.keywords)
322
# Start with header line
323
rows = [format_string.format(**self.tablewords)]
324
for client in self.clients:
325
rows.append(format_string
326
.format(**{key: self.valuetostring(client[key], key)
327
for key in self.keywords}))
251
331
def has_actions(options):
252
332
return any((options.enable,
272
353
parser = argparse.ArgumentParser()
273
354
parser.add_argument("--version", action="version",
274
version = "%(prog)s {0}".format(version),
355
version="%(prog)s {}".format(version),
275
356
help="show version number and exit")
276
357
parser.add_argument("-a", "--all", action="store_true",
277
358
help="Select all clients")
278
359
parser.add_argument("-v", "--verbose", action="store_true",
279
360
help="Print all fields")
361
parser.add_argument("-j", "--dump-json", action="store_true",
362
help="Dump client data in JSON format")
280
363
parser.add_argument("-e", "--enable", action="store_true",
281
364
help="Enable client")
282
365
parser.add_argument("-d", "--disable", action="store_true",
320
404
help="Run self-test")
321
405
parser.add_argument("client", nargs="*", help="Client name")
322
406
options = parser.parse_args()
324
408
if has_actions(options) and not (options.client or options.all):
325
409
parser.error("Options require clients names or --all.")
326
410
if options.verbose and has_actions(options):
327
parser.error("--verbose can only be used alone or with"
411
parser.error("--verbose can only be used alone.")
412
if options.dump_json and (options.verbose
413
or has_actions(options)):
414
parser.error("--dump-json can only be used alone.")
329
415
if options.all and not has_actions(options):
330
416
parser.error("--all requires an action.")
333
fail_count, test_count = doctest.testmod()
334
sys.exit(0 if fail_count == 0 else 1)
337
419
bus = dbus.SystemBus()
338
420
mandos_dbus_objc = bus.get_object(busname, server_path)
339
421
except dbus.exceptions.DBusException:
340
print("Could not connect to Mandos server",
422
log.critical("Could not connect to Mandos server")
344
425
mandos_serv = dbus.Interface(mandos_dbus_objc,
345
dbus_interface = server_interface)
347
#block stderr since dbus library prints to stderr
426
dbus_interface=server_interface)
427
mandos_serv_object_manager = dbus.Interface(
428
mandos_dbus_objc, dbus_interface=dbus.OBJECT_MANAGER_IFACE)
430
# block stderr since dbus library prints to stderr
348
431
null = os.open(os.path.devnull, os.O_RDWR)
349
432
stderrcopy = os.dup(sys.stderr.fileno())
350
433
os.dup2(null, sys.stderr.fileno())
354
mandos_clients = mandos_serv.GetAllClientsWithProperties()
437
mandos_clients = {path: ifs_and_props[client_interface]
438
for path, ifs_and_props in
439
mandos_serv_object_manager
440
.GetManagedObjects().items()
441
if client_interface in ifs_and_props}
357
444
os.dup2(stderrcopy, sys.stderr.fileno())
358
445
os.close(stderrcopy)
359
except dbus.exceptions.DBusException:
360
print("Access denied: Accessing mandos server through dbus.",
446
except dbus.exceptions.DBusException as e:
447
log.critical("Failed to access Mandos server through D-Bus:"
364
451
# Compile dict of (clients: properties) to process
367
454
if options.all or not options.client:
368
clients = dict((bus.get_object(busname, path), properties)
369
for path, properties in
370
mandos_clients.iteritems())
455
clients = {bus.get_object(busname, path): properties
456
for path, properties in mandos_clients.items()}
372
458
for name in options.client:
373
for path, client in mandos_clients.iteritems():
459
for path, client in mandos_clients.items():
374
460
if client["Name"] == name:
375
461
client_objc = bus.get_object(busname, path)
376
462
clients[client_objc] = client
379
print("Client not found on server: {0!r}"
380
.format(name), file=sys.stderr)
465
log.critical("Client not found on server: %r", name)
383
468
if not has_actions(options) and clients:
385
keywords = ("Name", "Enabled", "Timeout",
386
"LastCheckedOK", "Created", "Interval",
387
"Host", "Fingerprint", "CheckerRunning",
469
if options.verbose or options.dump_json:
470
keywords = ("Name", "Enabled", "Timeout", "LastCheckedOK",
471
"Created", "Interval", "Host", "KeyID",
472
"Fingerprint", "CheckerRunning",
388
473
"LastEnabled", "ApprovalPending",
390
"LastApprovalRequest", "ApprovalDelay",
391
"ApprovalDuration", "Checker",
474
"ApprovedByDefault", "LastApprovalRequest",
475
"ApprovalDelay", "ApprovalDuration",
476
"Checker", "ExtendedTimeout", "Expires",
394
479
keywords = defaultkeywords
396
print_clients(clients.values(), keywords)
481
if options.dump_json:
482
json.dump({client["Name"]: {key:
484
if isinstance(client[key],
488
for client in clients.values()},
489
fp=sys.stdout, indent=4,
490
separators=(',', ': '))
493
print_clients(clients.values(), keywords)
398
495
# Process each client in the list by all selected options
399
496
for client in clients:
400
498
def set_client_prop(prop, value):
401
499
"""Set a Client D-Bus property"""
402
500
client.Set(client_interface, prop, value,
403
501
dbus_interface=dbus.PROPERTIES_IFACE)
404
503
def set_client_prop_ms(prop, value):
405
504
"""Set a Client D-Bus property, converted
406
505
from a string to milliseconds."""
407
506
set_client_prop(prop,
408
timedelta_to_milliseconds
409
(string_to_delta(value)))
507
string_to_delta(value).total_seconds()
410
510
if options.remove:
411
511
mandos_serv.RemoveClient(client.__dbus_object_path__)
412
512
if options.enable:
456
556
client.Approve(dbus.Boolean(False),
457
557
dbus_interface=client_interface)
560
class Test_milliseconds_to_string(unittest.TestCase):
562
self.assertEqual(milliseconds_to_string(93785000),
564
def test_no_days(self):
565
self.assertEqual(milliseconds_to_string(7385000), "02:03:05")
566
def test_all_zero(self):
567
self.assertEqual(milliseconds_to_string(0), "00:00:00")
568
def test_no_fractional_seconds(self):
569
self.assertEqual(milliseconds_to_string(400), "00:00:00")
570
self.assertEqual(milliseconds_to_string(900), "00:00:00")
571
self.assertEqual(milliseconds_to_string(1900), "00:00:01")
573
class Test_string_to_delta(unittest.TestCase):
574
def test_handles_basic_rfc3339(self):
575
self.assertEqual(string_to_delta("PT2H"),
576
datetime.timedelta(0, 7200))
577
def test_falls_back_to_pre_1_6_1_with_warning(self):
578
# assertLogs only exists in Python 3.4
579
if hasattr(self, "assertLogs"):
580
with self.assertLogs(log, logging.WARNING):
581
value = string_to_delta("2h")
583
value = string_to_delta("2h")
584
self.assertEqual(value, datetime.timedelta(0, 7200))
586
class Test_TableOfClients(unittest.TestCase):
592
"Bool": "A D-BUS Boolean",
593
"NonDbusBoolean": "A Non-D-BUS Boolean",
594
"Integer": "An Integer",
595
"Timeout": "Timedelta 1",
596
"Interval": "Timedelta 2",
597
"ApprovalDelay": "Timedelta 3",
598
"ApprovalDuration": "Timedelta 4",
599
"ExtendedTimeout": "Timedelta 5",
600
"String": "A String",
602
self.keywords = ["Attr1", "AttrTwo"]
608
"Bool": dbus.Boolean(False),
609
"NonDbusBoolean": False,
613
"ApprovalDelay": 2000,
614
"ApprovalDuration": 3000,
615
"ExtendedTimeout": 4000,
622
"Bool": dbus.Boolean(True),
623
"NonDbusBoolean": True,
626
"Interval": 93786000,
627
"ApprovalDelay": 93787000,
628
"ApprovalDuration": 93788000,
629
"ExtendedTimeout": 93789000,
630
"String": "A huge string which will not fit," * 10,
633
def test_short_header(self):
634
rows = TableOfClients(self.clients, self.keywords,
635
self.tablewords).rows()
640
self.assertEqual(rows, expected_rows)
641
def test_booleans(self):
642
keywords = ["Bool", "NonDbusBoolean"]
643
rows = TableOfClients(self.clients, keywords,
644
self.tablewords).rows()
646
"A D-BUS Boolean A Non-D-BUS Boolean",
650
self.assertEqual(rows, expected_rows)
651
def test_milliseconds_detection(self):
652
keywords = ["Integer", "Timeout", "Interval", "ApprovalDelay",
653
"ApprovalDuration", "ExtendedTimeout"]
654
rows = TableOfClients(self.clients, keywords,
655
self.tablewords).rows()
657
An Integer Timedelta 1 Timedelta 2 Timedelta 3 Timedelta 4 Timedelta 5
658
0 00:00:00 00:00:01 00:00:02 00:00:03 00:00:04
659
1 1T02:03:05 1T02:03:06 1T02:03:07 1T02:03:08 1T02:03:09
662
self.assertEqual(rows, expected_rows)
663
def test_empty_and_long_string_values(self):
664
keywords = ["String"]
665
rows = TableOfClients(self.clients, keywords,
666
self.tablewords).rows()
670
A huge string which will not fit,A huge string which will not fit,A huge string which will not fit,A huge string which will not fit,A huge string which will not fit,A huge string which will not fit,A huge string which will not fit,A huge string which will not fit,A huge string which will not fit,A huge string which will not fit,
673
self.assertEqual(rows, expected_rows)
677
def should_only_run_tests():
678
parser = argparse.ArgumentParser(add_help=False)
679
parser.add_argument("--check", action='store_true')
680
args, unknown_args = parser.parse_known_args()
681
run_tests = args.check
683
# Remove --check argument from sys.argv
684
sys.argv[1:] = unknown_args
687
# Add all tests from doctest strings
688
def load_tests(loader, tests, none):
690
tests.addTests(doctest.DocTestSuite())
459
693
if __name__ == "__main__":
694
if should_only_run_tests():
695
# Call using ./tdd-python-script --check [--verbose]