55
74
chown_to_webserver(path)
57
def rebuild_svn_config(store, config):
76
def rebuild_svn_config():
58
77
"""Build the complete SVN configuration file.
60
@param config: An ivle.config.Config object.
62
users = store.find(User)
63
conf_name = config['paths']['svn']['conf']
64
temp_name = conf_name + ".new"
65
f = open(temp_name, "w")
67
# IVLE SVN repository authorisation configuration
69
""" % {'time': time.asctime()})
75
""" % {'login': u.login})
77
# Now we need to grant offering tutors and lecturers access to the latest
78
# submissions in their offerings. There are much prettier ways to do this,
79
# but a lot of browser requests call this function, so it needs to be
80
# fast. We can grab all of the paths needing authorisation directives with
81
# a single query, and we cache the list of viewers for each offering.
82
offering_viewers_cache = {}
83
for (login, psid, pspath, offeringid) in store.find(
84
(User.login, ProjectSubmission.id, ProjectSubmission.path,
86
Assessed.id == ProjectSubmission.assessed_id,
87
User.id == Assessed.user_id,
88
Project.id == Assessed.project_id,
89
ProjectSet.id == Project.project_set_id,
90
Offering.id == ProjectSet.id,
91
ProjectSubmission.date_submitted == Select(
92
Max(ProjectSubmission.date_submitted),
93
ProjectSubmission.assessed_id == Assessed.id,
94
tables=ProjectSubmission
98
# Do we already have the list of logins authorised for this offering
99
# cached? If not, get it.
100
if offeringid not in offering_viewers_cache:
101
offering_viewers_cache[offeringid] = list(store.find(
103
User.id == Enrolment.user_id,
104
Enrolment.offering_id == offeringid,
105
Enrolment.role.is_in((u'tutor', u'lecturer')),
106
Enrolment.active == True,
113
""" % {'login': login, 'id': psid, 'path': pspath})
115
for viewer_login in offering_viewers_cache[offeringid]:
116
# We don't want to override the owner's write privilege,
117
# so we don't add them to the read-only ACL.
118
if login != viewer_login:
119
f.write("%s = r\n" % viewer_login)
80
users = conn.get_users()
84
if role not in groups:
86
groups[role].append(u.login)
87
f = open(ivle.conf.svn_conf + ".new", "w")
88
f.write("# IVLE SVN Repositories Configuration\n")
89
f.write("# Auto-generated on %s\n" % time.asctime())
92
for (g,ls) in groups.iteritems():
93
f.write("%s = %s\n" % (g, ",".join(ls)))
96
f.write("[%s:/]\n" % u.login)
97
f.write("%s = rw\n" % u.login)
98
#f.write("@tutor = r\n")
99
#f.write("@lecturer = rw\n")
100
#f.write("@admin = rw\n")
122
os.rename(temp_name, conf_name)
123
chown_to_webserver(conf_name)
103
os.rename(ivle.conf.svn_conf + ".new", ivle.conf.svn_conf)
104
chown_to_webserver(ivle.conf.svn_conf)
125
def rebuild_svn_group_config(store, config):
106
def rebuild_svn_group_config():
126
107
"""Build the complete SVN configuration file for groups
128
@param config: An ivle.config.Config object.
130
conf_name = config['paths']['svn']['group_conf']
131
temp_name = conf_name + ".new"
132
f = open(temp_name, "w")
135
# IVLE SVN group repository authorisation configuration
136
# Generated: %(time)s
138
""" % {'time': time.asctime()})
140
group_members_cache = {}
141
for group in store.find(ProjectGroup):
142
offering = group.project_set.offering
143
reponame = "_".join([offering.subject.short_name,
144
offering.semester.year,
145
offering.semester.semester,
148
f.write("[%s:/]\n" % reponame)
149
if group.id not in group_members_cache:
150
group_members_cache[group.id] = set()
151
for user in group.members:
152
group_members_cache[group.id].add(user.login)
153
f.write("%s = rw\n" % user.login)
110
groups = conn.get_all('project_group',
111
['groupid', 'groupnm', 'projectsetid'])
112
f = open(ivle.conf.svn_group_conf + ".new", "w")
113
f.write("# IVLE SVN Group Repositories Configuration\n")
114
f.write("# Auto-generated on %s\n" % time.asctime())
117
projectsetid = g['projectsetid']
118
offeringinfo = conn.get_offering_info(projectsetid)
119
subj_short_name = offeringinfo['subj_short_name']
120
year = offeringinfo['year']
121
semester = offeringinfo['semester']
122
reponame = "_".join([subj_short_name, year, semester, g['groupnm']])
123
f.write("[%s:/]\n"%reponame)
124
users = conn.get_projectgroup_members(g['groupid'])
126
f.write("%s = rw\n"%u['login'])
156
# Now we need to grant offering tutors and lecturers access to the latest
157
# submissions in their offerings. There are much prettier ways to do this,
158
# but a lot of browser requests call this function, so it needs to be
159
# fast. We can grab all of the paths needing authorisation directives with
160
# a single query, and we cache the list of viewers for each offering.
161
offering_viewers_cache = {}
162
for (ssn, year, sem, name, psid, pspath, gid, offeringid) in store.find(
163
(Subject.short_name, Semester.year, Semester.semester,
164
ProjectGroup.name, ProjectSubmission.id, ProjectSubmission.path,
165
ProjectGroup.id, Offering.id),
166
Assessed.id == ProjectSubmission.assessed_id,
167
ProjectGroup.id == Assessed.project_group_id,
168
Project.id == Assessed.project_id,
169
ProjectSet.id == Project.project_set_id,
170
Offering.id == ProjectSet.offering_id,
171
Subject.id == Offering.subject_id,
172
Semester.id == Offering.semester_id,
173
ProjectSubmission.date_submitted == Select(
174
Max(ProjectSubmission.date_submitted),
175
ProjectSubmission.assessed_id == Assessed.id,
176
tables=ProjectSubmission
180
reponame = "_".join([ssn, year, sem, name])
182
# Do we already have the list of logins authorised for this offering
183
# cached? If not, get it.
184
if offeringid not in offering_viewers_cache:
185
offering_viewers_cache[offeringid] = list(store.find(
187
User.id == Enrolment.user_id,
188
Enrolment.offering_id == offeringid,
189
Enrolment.role.is_in((u'tutor', u'lecturer')),
190
Enrolment.active == True,
197
""" % {'repo': reponame, 'id': psid, 'path': pspath})
199
for viewer_login in offering_viewers_cache[offeringid]:
200
# Skip existing group members, or they can't write to it any more.
201
if viewer_login not in group_members_cache[gid]:
202
f.write("%s = r\n" % viewer_login)
205
os.rename(temp_name, conf_name)
206
chown_to_webserver(conf_name)
208
def make_svn_auth(store, login, config, throw_on_error=True):
209
"""Create a Subversion password for a user.
211
Generates a new random Subversion password, and assigns it to the user.
212
The password is added to Apache's Subversion authentication file.
129
os.rename(ivle.conf.svn_group_conf + ".new", ivle.conf.svn_group_conf)
130
chown_to_webserver(ivle.conf.svn_group_conf)
132
def make_svn_auth(login, throw_on_error=True):
133
"""Setup svn authentication for the given user.
134
FIXME: create local.auth entry
214
# filename is, eg, /var/lib/ivle/svn/ivle.auth
215
filename = config['paths']['svn']['auth_ivle']
216
if os.path.exists(filename):
136
passwd = md5.new(uuid.uuid4().bytes).digest().encode('hex')
137
if os.path.exists(ivle.conf.svn_auth_ivle):
221
user = User.get_by_login(store, login)
223
if user.svn_pass is None:
224
passwd = hashlib.md5(uuid.uuid4().bytes).hexdigest()
225
user.svn_pass = unicode(passwd)
227
res = subprocess.call(['htpasswd', '-%smb' % create,
228
filename, login, user.svn_pass])
142
ivle.db.DB().update_user(login, svn_pass=passwd)
144
res = os.system("htpasswd -%smb %s %s %s" % (create,
145
ivle.conf.svn_auth_ivle,
229
147
if res != 0 and throw_on_error:
230
148
raise Exception("Unable to create ivle-auth for %s" % login)
232
150
# Make sure the file is owned by the web server
233
151
if create == "c":
234
chown_to_webserver(filename)
238
def make_jail(user, config, force=True):
239
"""Create or update a user's jail.
241
Only the user-specific parts of the jail are created here - everything
242
else is expected to be part of another aufs branch.
152
chown_to_webserver(ivle.conf.svn_auth_ivle)
156
def generate_manifest(basedir, targetdir, parent=''):
157
""" From a basedir and a targetdir work out which files are missing or out
158
of date and need to be added/updated and which files are redundant and need
161
parent: This is used for the recursive call to track the relative paths
162
that we have decended.
165
cmp = filecmp.dircmp(basedir, targetdir)
167
# Add all new files and files that have changed
168
to_add = [os.path.join(parent,x) for x in (cmp.left_only + cmp.diff_files)]
170
# Remove files that are redundant
171
to_remove = [os.path.join(parent,x) for x in cmp.right_only]
174
for d in cmp.common_dirs:
175
newbasedir = os.path.join(basedir, d)
176
newtargetdir = os.path.join(targetdir, d)
177
newparent = os.path.join(parent, d)
178
(sadd,sremove) = generate_manifest(newbasedir, newtargetdir, newparent)
182
return (to_add, to_remove)
185
def make_jail(username, uid, force=True, svn_pass=None):
186
"""Creates a new user's jail space, in the jail directory as configured in
189
This only creates things within /home - everything else is expected to be
190
part of another UnionFS branch.
244
192
Returns the path to the user's home directory.
246
194
Chowns the user's directory within the jail to the given UID.
248
@param force: If False, raise an exception if the user already has a jail.
249
If True (default), rebuild the jail preserving /home.
196
Note: This takes separate username and uid arguments. The UID need not
197
*necessarily* correspond to a Unix username at all, if all you are
198
planning to do is setuid to it. This allows the caller the freedom of
199
deciding the binding between username and uid, if any.
201
force: If false, exception if jail already exists for this user.
202
If true (default), overwrites it, but preserves home directory.
204
svn_pass: If provided this will be a string, the randomly-generated
205
Subversion password for this user (if you happen to already have it).
206
If not provided, it will be read from the database.
251
208
# MUST run as root or some of this may fail
252
209
if os.getuid() != 0:
253
210
raise Exception("Must run make_jail as root")
255
212
# tempdir is for putting backup homes in
256
jail_src_base = config['paths']['jails']['src']
257
tempdir = os.path.join(jail_src_base, '__temp__')
213
tempdir = os.path.join(ivle.conf.jail_base, '__temp__')
258
214
if not os.path.exists(tempdir):
259
215
os.makedirs(tempdir)
260
216
elif not os.path.isdir(tempdir):
261
217
os.unlink(tempdir)
262
218
os.mkdir(tempdir)
263
userdir = os.path.join(jail_src_base, user.login)
219
userdir = os.path.join(ivle.conf.jail_src_base, username)
264
220
homedir = os.path.join(userdir, 'home')
265
tmpdir = os.path.join(userdir, 'tmp')
266
userhomedir = os.path.join(homedir, user.login) # Return value
221
userhomedir = os.path.join(homedir, username) # Return value
268
223
if os.path.exists(userdir):
271
226
# User jail already exists. Blow it away but preserve their home
272
227
# directory. It should be all that is there anyway, but you never
274
# Ignore warnings about the use of tempnam
229
# Ignore warnings about the use of tmpnam
275
230
warnings.simplefilter('ignore')
276
231
homebackup = os.tempnam(tempdir)
277
232
warnings.resetwarnings()
278
# Back up the /home directory, delete the entire jail, recreate the
279
# jail directory tree, then copy the /home back
280
# NOTE that shutil.move changed in Python 2.6, it now moves a
281
# directory INTO the target (like `mv`), which it didn't use to do.
282
# This code works regardless.
283
shutil.move(userhomedir, homebackup)
233
# Note: shutil.move does not behave like "mv" - it does not put a file
234
# into a directory if it already exists, just fails. Therefore it is
235
# not susceptible to tmpnam symlink attack.
236
shutil.move(homedir, homebackup)
284
237
shutil.rmtree(userdir)
285
238
os.makedirs(homedir)
286
shutil.move(homebackup, userhomedir)
239
shutil.move(homebackup, homedir)
287
240
# Change the ownership of all the files to the right unixid
288
241
logging.debug("chown %s's home directory files to uid %d"
289
%(user.login, user.unixid))
290
os.spawnvp(os.P_WAIT, 'chown', ['chown', '-R', '%d:%d' % (user.unixid,
291
user.unixid), userhomedir])
243
os.chown(userhomedir, uid, uid)
244
for root, dirs, files in os.walk(userhomedir):
245
for fsobj in dirs + files:
246
os.chown(os.path.join(root, fsobj), uid, uid)
293
248
# No user jail exists
294
249
# Set up the user's home directory
295
250
os.makedirs(userhomedir)
296
251
# Chown (and set the GID to the same as the UID).
297
os.chown(userhomedir, user.unixid, user.unixid)
252
os.chown(userhomedir, uid, uid)
298
253
# Chmod to rwxr-xr-x (755)
299
254
os.chmod(userhomedir, 0755)
301
make_ivle_conf(user.login, userdir, user.svn_pass, config)
302
make_etc_passwd(user.login, userdir, config['paths']['jails']['template'],
305
os.chmod(tmpdir, 01777)
256
# There are 2 special files which need to be generated specific to this
257
# user: ${python_site_packages}/lib/conf/conf.py and /etc/passwd.
258
# "__" username "__" users are exempt (special)
259
if not (username.startswith("__") and username.endswith("__")):
260
make_conf_py(username, userdir, ivle.conf.jail_system, svn_pass)
261
make_etc_passwd(username, userdir, ivle.conf.jail_system, uid)
307
263
return userhomedir
309
def make_ivle_conf(username, user_jail_dir, svn_pass, sys_config):
310
"""Generate an ivle.conf for a user's jail.
265
def make_conf_py(username, user_jail_dir, staging_dir, svn_pass=None):
312
267
Creates (overwriting any existing file, and creating directories) a
313
file /etc/ivle/ivle.conf in a given user's jail.
315
@param username: Username.
316
@param user_jail_dir: User's jail dir, ie. ['jails']['src'] + username
317
@param svn_pass: User's SVN password.
318
@param sys_config: An ivle.config.Config object (the system-wide config).
268
file ${python_site_packages}/ivle/conf/conf.py in a given user's jail.
270
user_jail_dir: User's jail dir, ie. ivle.conf.jail_base + username
271
staging_dir: The dir with the staging copy of the jail. (With the
272
template conf.py file).
273
svn_pass: As with make_jail. User's SVN password, but if not supplied,
274
will look up in the DB.
320
conf_path = os.path.join(user_jail_dir, "home/.ivle.conf")
321
if not os.path.exists(os.path.dirname(conf_path)):
322
os.makedirs(os.path.dirname(conf_path))
324
# In the "in-jail" version of conf, we don't need MOST of the details
325
# (it would be a security risk to have them here).
326
# So we just write root_dir.
327
conf_obj = ivle.config.Config(blank=True)
328
conf_obj.filename = conf_path
329
conf_obj['urls']['root'] = sys_config['urls']['root']
330
conf_obj['urls']['public_host'] = sys_config['urls']['public_host']
331
conf_obj['urls']['svn_addr'] = sys_config['urls']['svn_addr']
332
conf_obj['user_info']['login'] = username
333
conf_obj['user_info']['svn_pass'] = svn_pass
276
template_conf_path = os.path.join(staging_dir,
277
ivle.conf.python_site_packages[1:], "ivle/conf/conf.py")
278
conf_path = os.path.join(user_jail_dir,
279
ivle.conf.python_site_packages[1:], "ivle/conf/conf.py")
280
os.makedirs(os.path.dirname(conf_path))
282
# If svn_pass isn't supplied, grab it from the DB
284
dbconn = ivle.db.DB()
285
svn_pass = dbconn.get_user(username).svn_pass
288
# Read the contents of the template conf file
290
template_conf_file = open(template_conf_path, "r")
291
template_conf_data = template_conf_file.read()
292
template_conf_file.close()
294
# Couldn't open template conf.py for some reason
295
# Just treat it as empty file
296
template_conf_data = ("# Warning: Problem building config script.\n"
297
"# Could not find template conf.py file.\n")
299
conf_file = open(conf_path, "w")
300
conf_file.write(template_conf_data)
301
conf_file.write("\n# The login name for the owner of the jail\n")
302
conf_file.write("login = %s\n" % repr(username))
303
conf_file.write("\n")
304
conf_file.write("# The subversion-only password for the owner of "
306
conf_file.write("svn_pass = %s\n" % repr(svn_pass))
336
309
# Make this file world-readable
337
310
# (chmod 644 conf_path)