55
74
chown_to_webserver(path)
57
def rebuild_svn_config(store, config):
76
def rebuild_svn_config():
58
77
"""Build the complete SVN configuration file.
60
@param config: An ivle.config.Config object.
62
users = store.find(User)
63
conf_name = config['paths']['svn']['conf']
64
temp_name = conf_name + ".new"
65
f = open(temp_name, "w")
67
# IVLE SVN repository authorisation configuration
69
""" % {'time': time.asctime()})
75
""" % {'login': u.login.encode('utf-8')})
77
# Now we need to grant offering tutors and lecturers access to the latest
78
# submissions in their offerings. There are much prettier ways to do this,
79
# but a lot of browser requests call this function, so it needs to be
80
# fast. We can grab all of the paths needing authorisation directives with
81
# a single query, and we cache the list of viewers for each offering.
82
offering_viewers_cache = {}
83
for (login, psid, pspath, offeringid) in store.find(
84
(User.login, ProjectSubmission.id, ProjectSubmission.path,
86
Assessed.id == ProjectSubmission.assessed_id,
87
User.id == Assessed.user_id,
88
Project.id == Assessed.project_id,
89
ProjectSet.id == Project.project_set_id,
90
Offering.id == ProjectSet.offering_id,
91
ProjectSubmission.date_submitted == Select(
92
Max(ProjectSubmission.date_submitted),
93
ProjectSubmission.assessed_id == Assessed.id,
94
tables=ProjectSubmission
98
# Do we already have the list of logins authorised for this offering
99
# cached? If not, get it.
100
if offeringid not in offering_viewers_cache:
101
offering_viewers_cache[offeringid] = list(store.find(
103
User.id == Enrolment.user_id,
104
Enrolment.offering_id == offeringid,
105
Enrolment.role.is_in((u'tutor', u'lecturer')),
106
Enrolment.active == True,
113
""" % {'login': login.encode('utf-8'), 'id': psid,
114
'path': pspath.encode('utf-8')})
116
for viewer_login in offering_viewers_cache[offeringid]:
117
# We don't want to override the owner's write privilege,
118
# so we don't add them to the read-only ACL.
119
if login != viewer_login:
120
f.write("%s = r\n" % viewer_login.encode('utf-8'))
80
users = conn.get_users()
84
if role not in groups:
86
groups[role].append(u.login)
87
f = open(ivle.conf.svn_conf + ".new", "w")
88
f.write("# IVLE SVN Repositories Configuration\n")
89
f.write("# Auto-generated on %s\n" % time.asctime())
92
for (g,ls) in groups.iteritems():
93
f.write("%s = %s\n" % (g, ",".join(ls)))
96
f.write("[%s:/]\n" % u.login)
97
f.write("%s = rw\n" % u.login)
98
#f.write("@tutor = r\n")
99
#f.write("@lecturer = rw\n")
100
#f.write("@admin = rw\n")
123
os.rename(temp_name, conf_name)
124
chown_to_webserver(conf_name)
103
os.rename(ivle.conf.svn_conf + ".new", ivle.conf.svn_conf)
104
chown_to_webserver(ivle.conf.svn_conf)
126
def rebuild_svn_group_config(store, config):
106
def rebuild_svn_group_config():
127
107
"""Build the complete SVN configuration file for groups
129
@param config: An ivle.config.Config object.
131
conf_name = config['paths']['svn']['group_conf']
132
temp_name = conf_name + ".new"
133
f = open(temp_name, "w")
136
# IVLE SVN group repository authorisation configuration
137
# Generated: %(time)s
139
""" % {'time': time.asctime()})
141
group_members_cache = {}
142
for group in store.find(ProjectGroup):
143
offering = group.project_set.offering
144
reponame = "_".join([offering.subject.short_name,
145
offering.semester.year,
146
offering.semester.semester,
149
f.write("[%s:/]\n" % reponame.encode('utf-8'))
150
if group.id not in group_members_cache:
151
group_members_cache[group.id] = set()
152
for user in group.members:
153
group_members_cache[group.id].add(user.login)
154
f.write("%s = rw\n" % user.login.encode('utf-8'))
110
groups = conn.get_all('project_group',
111
['groupid', 'groupnm', 'projectsetid'])
112
f = open(ivle.conf.svn_group_conf + ".new", "w")
113
f.write("# IVLE SVN Group Repositories Configuration\n")
114
f.write("# Auto-generated on %s\n" % time.asctime())
117
projectsetid = g['projectsetid']
118
offeringinfo = conn.get_offering_info(projectsetid)
119
subj_short_name = offeringinfo['subj_short_name']
120
year = offeringinfo['year']
121
semester = offeringinfo['semester']
122
reponame = "_".join([subj_short_name, year, semester, g['groupnm']])
123
f.write("[%s:/]\n"%reponame)
124
users = conn.get_projectgroup_members(g['groupid'])
126
f.write("%s = rw\n"%u['login'])
157
# Now we need to grant offering tutors and lecturers access to the latest
158
# submissions in their offerings. There are much prettier ways to do this,
159
# but a lot of browser requests call this function, so it needs to be
160
# fast. We can grab all of the paths needing authorisation directives with
161
# a single query, and we cache the list of viewers for each offering.
162
offering_viewers_cache = {}
163
for (ssn, year, sem, name, psid, pspath, gid, offeringid) in store.find(
164
(Subject.short_name, Semester.year, Semester.semester,
165
ProjectGroup.name, ProjectSubmission.id, ProjectSubmission.path,
166
ProjectGroup.id, Offering.id),
167
Assessed.id == ProjectSubmission.assessed_id,
168
ProjectGroup.id == Assessed.project_group_id,
169
Project.id == Assessed.project_id,
170
ProjectSet.id == Project.project_set_id,
171
Offering.id == ProjectSet.offering_id,
172
Subject.id == Offering.subject_id,
173
Semester.id == Offering.semester_id,
174
ProjectSubmission.date_submitted == Select(
175
Max(ProjectSubmission.date_submitted),
176
ProjectSubmission.assessed_id == Assessed.id,
177
tables=ProjectSubmission
181
reponame = "_".join([ssn, year, sem, name])
183
# Do we already have the list of logins authorised for this offering
184
# cached? If not, get it.
185
if offeringid not in offering_viewers_cache:
186
offering_viewers_cache[offeringid] = list(store.find(
188
User.id == Enrolment.user_id,
189
Enrolment.offering_id == offeringid,
190
Enrolment.role.is_in((u'tutor', u'lecturer')),
191
Enrolment.active == True,
198
""" % {'repo': reponame.encode('utf-8'), 'id': psid,
199
'path': pspath.encode('utf-8')})
201
for viewer_login in offering_viewers_cache[offeringid]:
202
# Skip existing group members, or they can't write to it any more.
203
if viewer_login not in group_members_cache[gid]:
204
f.write("%s = r\n" % viewer_login)
207
os.rename(temp_name, conf_name)
208
chown_to_webserver(conf_name)
210
def make_svn_auth(store, login, config, throw_on_error=True):
211
"""Create a Subversion password for a user.
213
Generates a new random Subversion password, and assigns it to the user.
214
The password is added to Apache's Subversion authentication file.
129
os.rename(ivle.conf.svn_group_conf + ".new", ivle.conf.svn_group_conf)
130
chown_to_webserver(ivle.conf.svn_group_conf)
132
def make_svn_auth(login, throw_on_error=True):
133
"""Setup svn authentication for the given user.
134
FIXME: create local.auth entry
216
# filename is, eg, /var/lib/ivle/svn/ivle.auth
217
filename = config['paths']['svn']['auth_ivle']
218
if os.path.exists(filename):
136
passwd = md5.new(uuid.uuid4().bytes).digest().encode('hex')
137
if os.path.exists(ivle.conf.svn_auth_ivle):
223
user = User.get_by_login(store, login)
225
if user.svn_pass is None:
226
passwd = hashlib.md5(uuid.uuid4().bytes).hexdigest()
227
user.svn_pass = unicode(passwd)
229
res = subprocess.call(['htpasswd', '-%smb' % create,
230
filename, login, user.svn_pass])
142
ivle.db.DB().update_user(login, svn_pass=passwd)
144
res = os.system("htpasswd -%smb %s %s %s" % (create,
145
ivle.conf.svn_auth_ivle,
231
147
if res != 0 and throw_on_error:
232
148
raise Exception("Unable to create ivle-auth for %s" % login)
234
150
# Make sure the file is owned by the web server
235
151
if create == "c":
236
chown_to_webserver(filename)
240
def make_jail(user, config, force=True):
241
"""Create or update a user's jail.
243
Only the user-specific parts of the jail are created here - everything
244
else is expected to be part of another aufs branch.
152
chown_to_webserver(ivle.conf.svn_auth_ivle)
156
def generate_manifest(basedir, targetdir, parent=''):
157
""" From a basedir and a targetdir work out which files are missing or out
158
of date and need to be added/updated and which files are redundant and need
161
parent: This is used for the recursive call to track the relative paths
162
that we have decended.
165
cmp = filecmp.dircmp(basedir, targetdir)
167
# Add all new files and files that have changed
168
to_add = [os.path.join(parent,x) for x in (cmp.left_only + cmp.diff_files)]
170
# Remove files that are redundant
171
to_remove = [os.path.join(parent,x) for x in cmp.right_only]
174
for d in cmp.common_dirs:
175
newbasedir = os.path.join(basedir, d)
176
newtargetdir = os.path.join(targetdir, d)
177
newparent = os.path.join(parent, d)
178
(sadd,sremove) = generate_manifest(newbasedir, newtargetdir, newparent)
182
return (to_add, to_remove)
185
def make_jail(username, uid, force=True, svn_pass=None):
186
"""Creates a new user's jail space, in the jail directory as configured in
189
This only creates things within /home - everything else is expected to be
190
part of another UnionFS branch.
246
192
Returns the path to the user's home directory.
248
194
Chowns the user's directory within the jail to the given UID.
250
@param force: If False, raise an exception if the user already has a jail.
251
If True (default), rebuild the jail preserving /home.
196
Note: This takes separate username and uid arguments. The UID need not
197
*necessarily* correspond to a Unix username at all, if all you are
198
planning to do is setuid to it. This allows the caller the freedom of
199
deciding the binding between username and uid, if any.
201
force: If false, exception if jail already exists for this user.
202
If true (default), overwrites it, but preserves home directory.
204
svn_pass: If provided this will be a string, the randomly-generated
205
Subversion password for this user (if you happen to already have it).
206
If not provided, it will be read from the database.
253
208
# MUST run as root or some of this may fail
254
209
if os.getuid() != 0:
255
210
raise Exception("Must run make_jail as root")
257
212
# tempdir is for putting backup homes in
258
jail_src_base = config['paths']['jails']['src']
259
tempdir = os.path.join(jail_src_base, '__temp__')
213
tempdir = os.path.join(ivle.conf.jail_base, '__temp__')
260
214
if not os.path.exists(tempdir):
261
215
os.makedirs(tempdir)
262
216
elif not os.path.isdir(tempdir):
263
217
os.unlink(tempdir)
264
218
os.mkdir(tempdir)
265
userdir = os.path.join(jail_src_base, user.login)
219
userdir = os.path.join(ivle.conf.jail_src_base, username)
266
220
homedir = os.path.join(userdir, 'home')
267
tmpdir = os.path.join(userdir, 'tmp')
268
userhomedir = os.path.join(homedir, user.login) # Return value
221
userhomedir = os.path.join(homedir, username) # Return value
270
223
if os.path.exists(userdir):
273
226
# User jail already exists. Blow it away but preserve their home
274
227
# directory. It should be all that is there anyway, but you never
276
# Ignore warnings about the use of tempnam
229
# Ignore warnings about the use of tmpnam
277
230
warnings.simplefilter('ignore')
278
231
homebackup = os.tempnam(tempdir)
279
232
warnings.resetwarnings()
280
# Back up the /home directory, delete the entire jail, recreate the
281
# jail directory tree, then copy the /home back
282
# NOTE that shutil.move changed in Python 2.6, it now moves a
283
# directory INTO the target (like `mv`), which it didn't use to do.
284
# This code works regardless.
285
shutil.move(userhomedir, homebackup)
233
# Note: shutil.move does not behave like "mv" - it does not put a file
234
# into a directory if it already exists, just fails. Therefore it is
235
# not susceptible to tmpnam symlink attack.
236
shutil.move(homedir, homebackup)
286
237
shutil.rmtree(userdir)
287
238
os.makedirs(homedir)
288
shutil.move(homebackup, userhomedir)
239
shutil.move(homebackup, homedir)
289
240
# Change the ownership of all the files to the right unixid
290
241
logging.debug("chown %s's home directory files to uid %d"
291
%(user.login, user.unixid))
292
os.spawnvp(os.P_WAIT, 'chown', ['chown', '-R', '%d:%d' % (user.unixid,
293
user.unixid), userhomedir])
243
os.chown(userhomedir, uid, uid)
244
for root, dirs, files in os.walk(userhomedir):
245
for fsobj in dirs + files:
246
os.chown(os.path.join(root, fsobj), uid, uid)
295
248
# No user jail exists
296
249
# Set up the user's home directory
297
250
os.makedirs(userhomedir)
298
251
# Chown (and set the GID to the same as the UID).
299
os.chown(userhomedir, user.unixid, user.unixid)
252
os.chown(userhomedir, uid, uid)
300
253
# Chmod to rwxr-xr-x (755)
301
254
os.chmod(userhomedir, 0755)
303
make_ivle_conf(user.login, userdir, user.svn_pass, config)
304
make_etc_passwd(user.login, userdir, config['paths']['jails']['template'],
307
os.chmod(tmpdir, 01777)
256
# There are 2 special files which need to be generated specific to this
257
# user: ${python_site_packages}/lib/conf/conf.py and /etc/passwd.
258
# "__" username "__" users are exempt (special)
259
if not (username.startswith("__") and username.endswith("__")):
260
make_conf_py(username, userdir, ivle.conf.jail_system, svn_pass)
261
make_etc_passwd(username, userdir, ivle.conf.jail_system, uid)
309
263
return userhomedir
311
def make_ivle_conf(username, user_jail_dir, svn_pass, sys_config):
312
"""Generate an ivle.conf for a user's jail.
265
def make_conf_py(username, user_jail_dir, staging_dir, svn_pass=None):
314
267
Creates (overwriting any existing file, and creating directories) a
315
file /etc/ivle/ivle.conf in a given user's jail.
317
@param username: Username.
318
@param user_jail_dir: User's jail dir, ie. ['jails']['src'] + username
319
@param svn_pass: User's SVN password.
320
@param sys_config: An ivle.config.Config object (the system-wide config).
268
file ${python_site_packages}/ivle/conf/conf.py in a given user's jail.
270
user_jail_dir: User's jail dir, ie. ivle.conf.jail_base + username
271
staging_dir: The dir with the staging copy of the jail. (With the
272
template conf.py file).
273
svn_pass: As with make_jail. User's SVN password, but if not supplied,
274
will look up in the DB.
322
conf_path = os.path.join(user_jail_dir, "home/.ivle.conf")
323
if not os.path.exists(os.path.dirname(conf_path)):
324
os.makedirs(os.path.dirname(conf_path))
326
# In the "in-jail" version of conf, we don't need MOST of the details
327
# (it would be a security risk to have them here).
328
# So we just write root_dir.
329
conf_obj = ivle.config.Config(blank=True)
330
conf_obj.filename = conf_path
331
conf_obj['urls'] = {}
332
conf_obj['urls']['root'] = sys_config['urls']['root']
333
conf_obj['urls']['public_host'] = sys_config['urls']['public_host']
334
conf_obj['urls']['svn_addr'] = sys_config['urls']['svn_addr']
335
conf_obj['user_info'] = {}
336
conf_obj['user_info']['login'] = username
337
conf_obj['user_info']['svn_pass'] = svn_pass
276
template_conf_path = os.path.join(staging_dir,
277
ivle.conf.python_site_packages[1:], "ivle/conf/conf.py")
278
conf_path = os.path.join(user_jail_dir,
279
ivle.conf.python_site_packages[1:], "ivle/conf/conf.py")
280
os.makedirs(os.path.dirname(conf_path))
282
# If svn_pass isn't supplied, grab it from the DB
284
dbconn = ivle.db.DB()
285
svn_pass = dbconn.get_user(username).svn_pass
288
# Read the contents of the template conf file
290
template_conf_file = open(template_conf_path, "r")
291
template_conf_data = template_conf_file.read()
292
template_conf_file.close()
294
# Couldn't open template conf.py for some reason
295
# Just treat it as empty file
296
template_conf_data = ("# Warning: Problem building config script.\n"
297
"# Could not find template conf.py file.\n")
299
conf_file = open(conf_path, "w")
300
conf_file.write(template_conf_data)
301
conf_file.write("\n# The login name for the owner of the jail\n")
302
conf_file.write("login = %s\n" % repr(username))
303
conf_file.write("\n")
304
conf_file.write("# The subversion-only password for the owner of "
306
conf_file.write("svn_pass = %s\n" % repr(svn_pass))
340
309
# Make this file world-readable
341
310
# (chmod 644 conf_path)