15
15
# along with this program; if not, write to the Free Software
16
16
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
19
# Author: Matt Giuca, Tom Conway
18
# Author: Matt Giuca, Tom Conway, Will Grant
20
'''Python console RPC service.
22
Provides an HTTP RPC interface to a Python console process.
32
from common import (util, studpath, chat)
35
trampoline_path = os.path.join(conf.ivle_install_dir, "bin/trampoline")
36
python_path = "/usr/bin/python" # Within jail
37
console_dir = "/opt/ivle/scripts" # Within jail
38
console_path = "/opt/ivle/scripts/python-console" # Within jail
41
"""Handler for the Console Service AJAX backend application."""
42
if len(req.path) > 0 and req.path[-1] == os.sep:
46
# The path determines which "command" we are receiving
47
if req.path == "start":
49
elif req.path == "interrupt":
50
handle_chat(req, kind='interrupt')
51
elif req.path == "chat":
53
elif req.path == "block":
54
handle_chat(req, kind="block")
56
req.throw_error(req.HTTP_BAD_REQUEST)
58
def handle_start(req):
59
jail_path = os.path.join(conf.jail_base, req.user.login)
60
working_dir = os.path.join("/home", req.user.login) # Within jail
62
# Get the UID of the logged-in user
65
# Set request attributes
66
req.content_type = "text/plain"
67
req.write_html_head_foot = False
69
# TODO: Figure out the host name the console server is running on.
70
host = socket.gethostname()
74
magic = md5.new(uuid.uuid4().bytes).digest().encode('hex')
76
# Try to find a free port on the server.
77
# Just try some random ports in the range [3000,8000)
78
# until we either succeed, or give up. If you think this
79
# sounds risky, it isn't:
80
# For N ports (e.g. 5000) with k (e.g. 100) in use, the
81
# probability of failing to find a free port in t (e.g. 5) tries
82
# is (k / N) ** t (e.g. 3.2*10e-9).
86
port = int(random.uniform(3000, 8000))
88
# Start the console server (port, magic)
89
# trampoline usage: tramp uid jail_dir working_dir script_path args
90
# console usage: python-console port magic
91
cmd = ' '.join([trampoline_path, str(uid), jail_path,
92
console_dir, python_path, console_path,
93
str(port), str(magic), working_dir])
104
raise Exception, "unable to find a free port!"
106
# Assemble the key and return it.
107
key = cjson.encode({"host": host, "port": port, "magic": magic})
108
req.write(cjson.encode(key.encode("hex")))
110
def handle_chat(req, kind = "chat"):
111
# The request *should* have the following four fields:
112
# host, port, magic: Host and port where the console server lives,
113
# and the secret to use to digitally sign the communication with the
115
# text: Fields to pass along to the console server
116
# It simply acts as a proxy to the console server
117
if req.method != "POST":
118
req.throw_error(req.HTTP_BAD_REQUEST)
119
fields = req.get_fieldstorage()
121
key = cjson.decode(fields.getfirst("key").value.decode("hex"))
125
except AttributeError:
126
# Any of the getfirsts returned None
127
req.throw_error(req.HTTP_BAD_REQUEST)
128
# If text is None, it was probably just an empty line
130
text = fields.getfirst("text").value
131
except AttributeError:
134
msg = {'cmd':kind, 'text':text}
135
response = chat.chat(host, port, msg, magic, decode = False)
136
req.content_type = "text/plain"
35
from ivle.webapp.base.rest import JSONRESTView, named_operation
36
from ivle.webapp.errors import BadRequest
38
# XXX: Should be RPC view, with actions in URL?
39
class ConsoleServiceRESTView(JSONRESTView):
40
'''An RPC interface to a Python console.'''
42
def start(self, req, cwd=''):
43
working_dir = os.path.join("/home", req.user.login, cwd)
48
jail_path = os.path.join(ivle.conf.jail_base, req.user.login)
49
cons = ivle.console.Console(uid, jail_path, working_dir)
51
# Assemble the key and return it. Yes, it is double-encoded.
52
return {'key': cjson.encode({"host": cons.host,
54
"magic": cons.magic}).encode('hex')}
57
def chat(self, req, key, text='', kind="chat"):
58
# The request *should* have the following four fields:
59
# key: Hex JSON dict of host and port where the console server lives,
60
# and the secret to use to digitally sign the communication with the
62
# text: Fields to pass along to the console server
63
# It simply acts as a proxy to the console server
66
keydict = cjson.decode(key.decode('hex'))
67
host = keydict['host']
68
port = keydict['port']
69
magic = keydict['magic']
71
raise BadRequest("Invalid console key.")
73
jail_path = os.path.join(ivle.conf.jail_base, req.user.login)
74
working_dir = os.path.join("/home", req.user.login) # Within jail
77
msg = {'cmd':kind, 'text':text}
79
json_response = ivle.chat.chat(host, port, msg, magic,decode=False)
81
# Snoop the response from python-console to check that it's valid
83
response = cjson.decode(json_response)
84
except cjson.DecodeError:
85
# Could not decode the reply from the python-console server
86
response = {"terminate":
87
"Communication to console process lost"}
88
if "terminate" in response:
89
response = restart_console(uid, jail_path, working_dir,
90
response["terminate"])
91
except socket.error, (enumber, estring):
92
if enumber == errno.ECONNREFUSED:
93
# Timeout: Restart the session
94
response = restart_console(uid, jail_path, working_dir,
95
"The IVLE console has timed out due to inactivity")
96
elif enumber == errno.ECONNRESET:
97
# Communication issue: Restart the session
98
response = restart_console(uid, jail_path, working_dir,
99
"Connection with the console has been reset")
101
# Some other error - probably serious
102
raise socket.error, (enumber, estring)
106
def restart_console(uid, jail_path, working_dir, reason):
107
"""Tells the client that it must be issued a new console since the old
108
console is no longer availible. The client must accept the new key.
109
Returns the JSON response to be given to the client.
111
# Start a new console server console
112
cons = ivle.console.Console(uid, jail_path, working_dir)
114
# Make a JSON object to tell the browser to restart its console client
115
new_key = cjson.encode(
116
{"host": cons.host, "port": cons.port, "magic": cons.magic})
118
return {"restart": reason, "key": new_key.encode("hex")}