1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148
|
#!/usr/bin/perl
#
# This file is part of Config-Model-OpenSsh
#
# This software is Copyright (c) 2012 by Dominique Dumont.
#
# This is free software, licensed under:
#
# The GNU Lesser General Public License, Version 2.1, February 1999
#
use strict;
use warnings;
use lib '../lib' ;
use Text::Wrap ;
use File::Path qw(make_path remove_tree);
sub go_on {
print "continue (Y/n/q)?";
my $ans = <STDIN>;
exit if $ans =~ /^q/i;
return if $ans =~ /^n/i ;
}
sub done {
print "Done.\nHit return to continue ... ";
my $ans = <STDIN>;
print "\n";
}
sub my_system {
my $run = shift ;
my $show = shift || 0 ;
print "Will run: $run\n" if $show ;
go_on ;
system($run) ;
done ;
print "\n";
}
print wrap('','',
"This program will provide a short demo of the configuration",
"upgrade feature of Config::Model seen from user's point of view.\n");
remove_tree('etc','lib') ;
make_path('etc/ssh') ;
print "Creating dummy config file\n";
open(CONF,">etc/ssh/sshd_config") ;
print CONF << "EOC" ;
# dummy config made for demo
HostKey /etc/ssh/ssh_host_key
KeepAlive no
# another comment
IgnoreRhosts no
EOC
close CONF ;
my $pid = fork ;
if (not $pid) {
# child
die "Cannot fork: $!" unless defined $pid ;
exec ("xterm -e watch -n 1 cat etc/ssh/sshd_config") ;
}
print "Forked terminal with pid $pid\n";
$SIG{KILL} = sub { kill "QUIT",$pid } ;
print "Copying ssh model\n\n\n";
make_path('lib/Config/Model/') ;
my $lib_path ;
foreach my $inc (@INC) {
my $model_path = "$inc/Config/Model/models" ;
if (-d "$model_path/Sshd") {
print "Copying model from $model_path\n" ;
# required to be able to modify the model for the demo
system("cp -r $model_path lib/Config/Model/") ;
$lib_path = $model_path ;
last;
}
}
my $showpostinst = "perl -I../lib -S cme migrate sshd" ;
my $postinst = $showpostinst . " -model_dir lib/Config/Model/models "
. "-root_dir . ";
print "Upstream upgrade: KeepAlive is to be changed to TCPKeepAlive\n";
print "postinst will run: $showpostinst\n" ;
go_on ;
system($postinst) ;
print "\n";
print "Add distro policy: Debian dev patches OpenSsh model...\n";
my_system("perl -I../lib -S config-model-edit -model Sshd -save ".
qq!class:Sshd element:PermitRootLogin default=no upstream_default~!, 1) ;
print "\n";
print "Add distro policy: show the diff...\n";
my_system("diff -Naur -b -B $lib_path lib/Config/Model/models") ;
print "\n";
print "Package upgrade: PermitRootLogin is updated\n";
go_on ;
system($postinst) ;
print "\n";
print "Add another distro policy: Patch model with reduced default cipher list...\n";
my_system("perl -I../lib -S config-model-edit -model Sshd -save ".
qq!class:Sshd element:Ciphers !.
qq!default_list=aes128-cbc,aes128-ctr,aes192-cbc,aes192-ctr,aes256-cbc,aes256-ctr!,1) ;
print "\n";
print "Package upgrade: Ciphers is added in config file\n";
go_on ;
system($postinst) ;
print "\n";
if (0) {
# bug: -force does not work
print "Big problem: aes-128-* are compromised. Need to help user remove these ciphers\n";
print "Patch model to have a hard restriction on cipher list...\n";
my_system("perl -I../lib -S config-model-edit -model Sshd -save ".
'class:Sshd element:Ciphers '.
'choice=arcfour256,aes192-cbc,aes192-ctr,aes256-cbc,aes256-ctr '.
'default_list=aes192-cbc,aes192-ctr,aes256-cbc,aes256-ctr',1) ;
print "standard upgrade: Ciphers restriction leads to error\n";
system($postinst) ;
go_on ;
print "Possibility to use -force to override\n";
my_system("$postinst -force",1) ;
}
print "Usability for maintainers is not forgotten\n",
"There's also a GUI to edit models\n";
my_system("perl -I../lib -S config-model-edit -model Sshd",1) ;
END {
kill "QUIT",$pid ;
}
|