32
32
import ivle.console
34
from ivle.webapp.base.rest import JSONRESTView, write_operation
35
from ivle.webapp.base.rest import JSONRESTView, named_operation
35
36
from ivle.webapp.errors import BadRequest
37
38
# XXX: Should be RPC view, with actions in URL?
38
39
class ConsoleServiceRESTView(JSONRESTView):
39
40
'''An RPC interface to a Python console.'''
40
def get_permissions(self, user, config):
41
def get_permissions(self, user):
41
42
if user is not None:
42
43
return set(['use'])
46
@write_operation('use')
47
@named_operation('use')
47
48
def start(self, req, cwd=''):
48
49
working_dir = os.path.join("/home", req.user.login, cwd)
51
jail_path = os.path.join(req.config['paths']['jails']['mounts'],
53
cons = ivle.console.Console(req.config, req.user, jail_path,
54
jail_path = os.path.join(ivle.conf.jail_base, req.user.login)
55
cons = ivle.console.Console(uid, jail_path, working_dir)
56
57
# Assemble the key and return it. Yes, it is double-encoded.
57
58
return {'key': cjson.encode({"host": cons.host,
59
60
"magic": cons.magic}).encode('hex')}
61
@write_operation('use')
62
def chat(self, req, key, text='', cwd='', kind="chat"):
62
@named_operation('use')
63
def chat(self, req, key, text='', kind="chat"):
63
64
# The request *should* have the following four fields:
64
65
# key: Hex JSON dict of host and port where the console server lives,
65
66
# and the secret to use to digitally sign the communication with the
76
77
raise BadRequest("Invalid console key.")
78
jail_path = os.path.join(req.config['paths']['jails']['mounts'],
81
working_dir = os.path.join("/home", req.user.login, cwd)
83
# XXX: JSONRESTView should do this for us.
84
text = text.decode('utf-8')
79
jail_path = os.path.join(ivle.conf.jail_base, req.user.login)
80
working_dir = os.path.join("/home", req.user.login) # Within jail
86
83
msg = {'cmd':kind, 'text':text}
85
json_response = ivle.chat.chat(host, port, msg, magic,decode=False)
87
# Snoop the response from python-console to check that it's valid
89
json_response = ivle.chat.chat(host, port, msg, magic,decode=False)
90
# Snoop the response from python-console to check that it's valid
91
89
response = cjson.decode(json_response)
92
except (cjson.DecodeError, ivle.chat.ProtocolError):
90
except cjson.DecodeError:
93
91
# Could not decode the reply from the python-console server
94
92
response = {"terminate":
93
"Communication to console process lost"}
96
94
if "terminate" in response:
97
response = restart_console(req.config, req.user, jail_path,
98
working_dir, response["terminate"])
95
response = restart_console(uid, jail_path, working_dir,
96
response["terminate"])
99
97
except socket.error, (enumber, estring):
100
98
if enumber == errno.ECONNREFUSED:
101
99
# Timeout: Restart the session
102
response = restart_console(req.config, req.user, jail_path,
104
"Timed out due to inactivity")
100
response = restart_console(uid, jail_path, working_dir,
101
"The IVLE console has timed out due to inactivity")
105
102
elif enumber == errno.ECONNRESET:
106
103
# Communication issue: Restart the session
107
response = restart_console(req.config, req.user, jail_path,
104
response = restart_console(uid, jail_path, working_dir,
105
"Connection with the console has been reset")
111
107
# Some other error - probably serious
112
108
raise socket.error, (enumber, estring)
116
def restart_console(config, user, jail_path, working_dir, reason):
112
def restart_console(uid, jail_path, working_dir, reason):
117
113
"""Tells the client that it must be issued a new console since the old
118
114
console is no longer availible. The client must accept the new key.
119
115
Returns the JSON response to be given to the client.
121
117
# Start a new console server console
122
cons = ivle.console.Console(config, user, jail_path, working_dir)
118
cons = ivle.console.Console(uid, jail_path, working_dir)
124
120
# Make a JSON object to tell the browser to restart its console client
125
121
new_key = cjson.encode(