55
74
chown_to_webserver(path)
57
def rebuild_svn_config(store, config):
76
def rebuild_svn_config():
58
77
"""Build the complete SVN configuration file.
60
@param config: An ivle.config.Config object.
62
users = store.find(User)
63
conf_name = config['paths']['svn']['conf']
64
temp_name = conf_name + ".new"
65
f = open(temp_name, "w")
67
# IVLE SVN repository authorisation configuration
69
""" % {'time': time.asctime()})
75
""" % {'login': u.login.encode('utf-8')})
77
# Now we need to grant offering tutors and lecturers access to the latest
78
# submissions in their offerings. There are much prettier ways to do this,
79
# but a lot of browser requests call this function, so it needs to be
80
# fast. We can grab all of the paths needing authorisation directives with
81
# a single query, and we cache the list of viewers for each offering.
82
offering_viewers_cache = {}
83
for (login, psid, pspath, offeringid) in store.find(
84
(User.login, ProjectSubmission.id, ProjectSubmission.path,
86
Assessed.id == ProjectSubmission.assessed_id,
87
User.id == Assessed.user_id,
88
Project.id == Assessed.project_id,
89
ProjectSet.id == Project.project_set_id,
90
Offering.id == ProjectSet.offering_id,
91
ProjectSubmission.date_submitted == Select(
92
Max(ProjectSubmission.date_submitted),
93
ProjectSubmission.assessed_id == Assessed.id,
94
tables=ProjectSubmission
98
# Do we already have the list of logins authorised for this offering
99
# cached? If not, get it.
100
if offeringid not in offering_viewers_cache:
101
offering_viewers_cache[offeringid] = list(store.find(
103
User.id == Enrolment.user_id,
104
Enrolment.offering_id == offeringid,
105
Enrolment.role.is_in((u'tutor', u'lecturer')),
106
Enrolment.active == True,
113
""" % {'login': login.encode('utf-8'), 'id': psid,
114
'path': pspath.encode('utf-8')})
116
for viewer_login in offering_viewers_cache[offeringid]:
117
# We don't want to override the owner's write privilege,
118
# so we don't add them to the read-only ACL.
119
if login != viewer_login:
120
f.write("%s = r\n" % viewer_login.encode('utf-8'))
80
users = conn.get_users()
84
if role not in groups:
86
groups[role].append(u.login)
87
f = open(ivle.conf.svn_conf + ".new", "w")
88
f.write("# IVLE SVN Repositories Configuration\n")
89
f.write("# Auto-generated on %s\n" % time.asctime())
92
for (g,ls) in groups.iteritems():
93
f.write("%s = %s\n" % (g, ",".join(ls)))
96
f.write("[%s:/]\n" % u.login)
97
f.write("%s = rw\n" % u.login)
98
#f.write("@tutor = r\n")
99
#f.write("@lecturer = rw\n")
100
#f.write("@admin = rw\n")
123
os.rename(temp_name, conf_name)
124
chown_to_webserver(conf_name)
103
os.rename(ivle.conf.svn_conf + ".new", ivle.conf.svn_conf)
104
chown_to_webserver(ivle.conf.svn_conf)
126
def rebuild_svn_group_config(store, config):
106
def rebuild_svn_group_config():
127
107
"""Build the complete SVN configuration file for groups
129
@param config: An ivle.config.Config object.
131
conf_name = config['paths']['svn']['group_conf']
132
temp_name = conf_name + ".new"
133
f = open(temp_name, "w")
136
# IVLE SVN group repository authorisation configuration
137
# Generated: %(time)s
139
""" % {'time': time.asctime()})
141
group_members_cache = {}
142
for group in store.find(ProjectGroup):
143
offering = group.project_set.offering
144
reponame = "_".join([offering.subject.short_name,
145
offering.semester.year,
146
offering.semester.semester,
149
f.write("[%s:/]\n" % reponame.encode('utf-8'))
150
if group.id not in group_members_cache:
151
group_members_cache[group.id] = set()
152
for user in group.members:
153
group_members_cache[group.id].add(user.login)
154
f.write("%s = rw\n" % user.login.encode('utf-8'))
110
groups = conn.get_all('project_group',
111
['groupid', 'groupnm', 'projectsetid'])
112
f = open(ivle.conf.svn_group_conf + ".new", "w")
113
f.write("# IVLE SVN Group Repositories Configuration\n")
114
f.write("# Auto-generated on %s\n" % time.asctime())
117
projectsetid = g['projectsetid']
118
offeringinfo = conn.get_offering_info(projectsetid)
119
subj_short_name = offeringinfo['subj_short_name']
120
year = offeringinfo['year']
121
semester = offeringinfo['semester']
122
reponame = "_".join([subj_short_name, year, semester, g['groupnm']])
123
f.write("[%s:/]\n"%reponame)
124
users = conn.get_projectgroup_members(g['groupid'])
126
f.write("%s = rw\n"%u['login'])
157
# Now we need to grant offering tutors and lecturers access to the latest
158
# submissions in their offerings. There are much prettier ways to do this,
159
# but a lot of browser requests call this function, so it needs to be
160
# fast. We can grab all of the paths needing authorisation directives with
161
# a single query, and we cache the list of viewers for each offering.
162
offering_viewers_cache = {}
163
for (ssn, year, sem, name, psid, pspath, gid, offeringid) in store.find(
164
(Subject.short_name, Semester.year, Semester.semester,
165
ProjectGroup.name, ProjectSubmission.id, ProjectSubmission.path,
166
ProjectGroup.id, Offering.id),
167
Assessed.id == ProjectSubmission.assessed_id,
168
ProjectGroup.id == Assessed.project_group_id,
169
Project.id == Assessed.project_id,
170
ProjectSet.id == Project.project_set_id,
171
Offering.id == ProjectSet.offering_id,
172
Subject.id == Offering.subject_id,
173
Semester.id == Offering.semester_id,
174
ProjectSubmission.date_submitted == Select(
175
Max(ProjectSubmission.date_submitted),
176
ProjectSubmission.assessed_id == Assessed.id,
177
tables=ProjectSubmission
181
reponame = "_".join([ssn, year, sem, name])
183
# Do we already have the list of logins authorised for this offering
184
# cached? If not, get it.
185
if offeringid not in offering_viewers_cache:
186
offering_viewers_cache[offeringid] = list(store.find(
188
User.id == Enrolment.user_id,
189
Enrolment.offering_id == offeringid,
190
Enrolment.role.is_in((u'tutor', u'lecturer')),
191
Enrolment.active == True,
198
""" % {'repo': reponame.encode('utf-8'), 'id': psid,
199
'path': pspath.encode('utf-8')})
201
for viewer_login in offering_viewers_cache[offeringid]:
202
# Skip existing group members, or they can't write to it any more.
203
if viewer_login not in group_members_cache[gid]:
204
f.write("%s = r\n" % viewer_login)
207
os.rename(temp_name, conf_name)
208
chown_to_webserver(conf_name)
210
def make_svn_auth(store, login, config, throw_on_error=True):
211
"""Create a Subversion password for a user.
213
Generates a new random Subversion password, and assigns it to the user.
214
The password is added to Apache's Subversion authentication file.
129
os.rename(ivle.conf.svn_group_conf + ".new", ivle.conf.svn_group_conf)
130
chown_to_webserver(ivle.conf.svn_group_conf)
132
def make_svn_auth(store, login, throw_on_error=True):
133
"""Setup svn authentication for the given user.
134
Uses the given DB store object. Does not commit to the db.
216
# filename is, eg, /var/lib/ivle/svn/ivle.auth
217
filename = config['paths']['svn']['auth_ivle']
218
if os.path.exists(filename):
136
passwd = md5.new(uuid.uuid4().bytes).digest().encode('hex')
137
if os.path.exists(ivle.conf.svn_auth_ivle):
223
user = User.get_by_login(store, login)
225
if user.svn_pass is None:
226
passwd = hashlib.md5(uuid.uuid4().bytes).hexdigest()
227
user.svn_pass = unicode(passwd)
229
res = subprocess.call(['htpasswd', '-%smb' % create,
230
filename, login, user.svn_pass])
142
user = ivle.database.User.get_by_login(store, login)
143
user.svn_pass = unicode(passwd)
145
res = os.system("htpasswd -%smb %s %s %s" % (create,
146
ivle.conf.svn_auth_ivle,
231
148
if res != 0 and throw_on_error:
232
149
raise Exception("Unable to create ivle-auth for %s" % login)
234
151
# Make sure the file is owned by the web server
235
152
if create == "c":
236
chown_to_webserver(filename)
240
def make_jail(user, config, force=True):
241
"""Create or update a user's jail.
243
Only the user-specific parts of the jail are created here - everything
244
else is expected to be part of another aufs branch.
153
chown_to_webserver(ivle.conf.svn_auth_ivle)
157
def generate_manifest(basedir, targetdir, parent=''):
158
""" From a basedir and a targetdir work out which files are missing or out
159
of date and need to be added/updated and which files are redundant and need
162
parent: This is used for the recursive call to track the relative paths
163
that we have decended.
166
cmp = filecmp.dircmp(basedir, targetdir)
168
# Add all new files and files that have changed
169
to_add = [os.path.join(parent,x) for x in (cmp.left_only + cmp.diff_files)]
171
# Remove files that are redundant
172
to_remove = [os.path.join(parent,x) for x in cmp.right_only]
175
for d in cmp.common_dirs:
176
newbasedir = os.path.join(basedir, d)
177
newtargetdir = os.path.join(targetdir, d)
178
newparent = os.path.join(parent, d)
179
(sadd,sremove) = generate_manifest(newbasedir, newtargetdir, newparent)
183
return (to_add, to_remove)
186
def make_jail(username, uid, force=True, svn_pass=None):
187
"""Creates a new user's jail space, in the jail directory as configured in
190
This only creates things within /home - everything else is expected to be
191
part of another UnionFS branch.
246
193
Returns the path to the user's home directory.
248
195
Chowns the user's directory within the jail to the given UID.
250
@param force: If False, raise an exception if the user already has a jail.
251
If True (default), rebuild the jail preserving /home.
197
Note: This takes separate username and uid arguments. The UID need not
198
*necessarily* correspond to a Unix username at all, if all you are
199
planning to do is setuid to it. This allows the caller the freedom of
200
deciding the binding between username and uid, if any.
202
force: If false, exception if jail already exists for this user.
203
If true (default), overwrites it, but preserves home directory.
205
svn_pass: If provided this will be a string, the randomly-generated
206
Subversion password for this user (if you happen to already have it).
207
If not provided, it will be read from the database.
253
209
# MUST run as root or some of this may fail
254
210
if os.getuid() != 0:
255
211
raise Exception("Must run make_jail as root")
257
213
# tempdir is for putting backup homes in
258
jail_src_base = config['paths']['jails']['src']
259
tempdir = os.path.join(jail_src_base, '__temp__')
214
tempdir = os.path.join(ivle.conf.jail_base, '__temp__')
260
215
if not os.path.exists(tempdir):
261
216
os.makedirs(tempdir)
262
217
elif not os.path.isdir(tempdir):
263
218
os.unlink(tempdir)
264
219
os.mkdir(tempdir)
265
userdir = os.path.join(jail_src_base, user.login)
220
userdir = os.path.join(ivle.conf.jail_src_base, username)
266
221
homedir = os.path.join(userdir, 'home')
267
tmpdir = os.path.join(userdir, 'tmp')
268
userhomedir = os.path.join(homedir, user.login) # Return value
222
userhomedir = os.path.join(homedir, username) # Return value
270
224
if os.path.exists(userdir):
273
227
# User jail already exists. Blow it away but preserve their home
274
228
# directory. It should be all that is there anyway, but you never
276
# Ignore warnings about the use of tempnam
230
# Ignore warnings about the use of tmpnam
277
231
warnings.simplefilter('ignore')
278
232
homebackup = os.tempnam(tempdir)
279
233
warnings.resetwarnings()
280
# Back up the /home directory, delete the entire jail, recreate the
281
# jail directory tree, then copy the /home back
282
# NOTE that shutil.move changed in Python 2.6, it now moves a
283
# directory INTO the target (like `mv`), which it didn't use to do.
284
# This code works regardless.
285
shutil.move(userhomedir, homebackup)
234
# Note: shutil.move does not behave like "mv" - it does not put a file
235
# into a directory if it already exists, just fails. Therefore it is
236
# not susceptible to tmpnam symlink attack.
237
shutil.move(homedir, homebackup)
286
238
shutil.rmtree(userdir)
287
239
os.makedirs(homedir)
288
shutil.move(homebackup, userhomedir)
240
shutil.move(homebackup, homedir)
289
241
# Change the ownership of all the files to the right unixid
290
242
logging.debug("chown %s's home directory files to uid %d"
291
%(user.login, user.unixid))
292
os.spawnvp(os.P_WAIT, 'chown', ['chown', '-R', '%d:%d' % (user.unixid,
293
user.unixid), userhomedir])
244
os.chown(userhomedir, uid, uid)
245
for root, dirs, files in os.walk(userhomedir):
246
for fsobj in dirs + files:
247
os.chown(os.path.join(root, fsobj), uid, uid)
295
249
# No user jail exists
296
250
# Set up the user's home directory
297
251
os.makedirs(userhomedir)
298
252
# Chown (and set the GID to the same as the UID).
299
os.chown(userhomedir, user.unixid, user.unixid)
253
os.chown(userhomedir, uid, uid)
300
254
# Chmod to rwxr-xr-x (755)
301
255
os.chmod(userhomedir, 0755)
303
make_ivle_conf(user.login, userdir, user.svn_pass, config)
304
make_etc_passwd(user.login, userdir, config['paths']['jails']['template'],
307
os.chmod(tmpdir, 01777)
257
# There are 2 special files which need to be generated specific to this
258
# user: ${python_site_packages}/lib/conf/conf.py and /etc/passwd.
259
# "__" username "__" users are exempt (special)
260
if not (username.startswith("__") and username.endswith("__")):
261
make_conf_py(username, userdir, ivle.conf.jail_system, svn_pass)
262
make_etc_passwd(username, userdir, ivle.conf.jail_system, uid)
309
264
return userhomedir
311
def make_ivle_conf(username, user_jail_dir, svn_pass, sys_config):
312
"""Generate an ivle.conf for a user's jail.
266
def make_conf_py(username, user_jail_dir, staging_dir, svn_pass=None):
314
268
Creates (overwriting any existing file, and creating directories) a
315
file /etc/ivle/ivle.conf in a given user's jail.
317
@param username: Username.
318
@param user_jail_dir: User's jail dir, ie. ['jails']['src'] + username
319
@param svn_pass: User's SVN password.
320
@param sys_config: An ivle.config.Config object (the system-wide config).
269
file ${python_site_packages}/ivle/conf/conf.py in a given user's jail.
271
user_jail_dir: User's jail dir, ie. ivle.conf.jail_base + username
272
staging_dir: The dir with the staging copy of the jail. (With the
273
template conf.py file).
274
svn_pass: As with make_jail. User's SVN password, but if not supplied,
275
will look up in the DB.
322
conf_path = os.path.join(user_jail_dir, "home/.ivle.conf")
323
if not os.path.exists(os.path.dirname(conf_path)):
324
os.makedirs(os.path.dirname(conf_path))
326
# In the "in-jail" version of conf, we don't need MOST of the details
327
# (it would be a security risk to have them here).
328
# So we just write root_dir.
329
conf_obj = ivle.config.Config(blank=True)
330
conf_obj.filename = conf_path
331
conf_obj['urls'] = {}
332
conf_obj['urls']['root'] = sys_config['urls']['root']
333
conf_obj['urls']['public_host'] = sys_config['urls']['public_host']
334
conf_obj['urls']['svn_addr'] = sys_config['urls']['svn_addr']
335
conf_obj['user_info'] = {}
336
conf_obj['user_info']['login'] = username
337
conf_obj['user_info']['svn_pass'] = svn_pass
277
template_conf_path = os.path.join(staging_dir,
278
ivle.conf.python_site_packages[1:], "ivle/conf/conf.py")
279
conf_path = os.path.join(user_jail_dir,
280
ivle.conf.python_site_packages[1:], "ivle/conf/conf.py")
281
os.makedirs(os.path.dirname(conf_path))
283
# If svn_pass isn't supplied, grab it from the DB
285
dbconn = ivle.db.DB()
286
svn_pass = dbconn.get_user(username).svn_pass
289
# Read the contents of the template conf file
291
template_conf_file = open(template_conf_path, "r")
292
template_conf_data = template_conf_file.read()
293
template_conf_file.close()
295
# Couldn't open template conf.py for some reason
296
# Just treat it as empty file
297
template_conf_data = ("# Warning: Problem building config script.\n"
298
"# Could not find template conf.py file.\n")
300
conf_file = open(conf_path, "w")
301
conf_file.write(template_conf_data)
302
conf_file.write("\n# The login name for the owner of the jail\n")
303
conf_file.write("login = %s\n" % repr(username))
304
conf_file.write("\n")
305
conf_file.write("# The subversion-only password for the owner of "
307
conf_file.write("svn_pass = %s\n" % repr(svn_pass))
340
310
# Make this file world-readable
341
311
# (chmod 644 conf_path)