15
15
# along with this program; if not, write to the Free Software
16
16
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
19
# Author: Matt Giuca, Tom Conway
18
# Author: Matt Giuca, Tom Conway, Will Grant
20
'''Python console RPC service.
22
Provides an HTTP RPC interface to a Python console process.
32
from common import (util, studpath, chat)
35
trampoline_path = os.path.join(conf.ivle_install_dir, "bin/trampoline")
36
python_path = "/usr/bin/python" # Within jail
37
console_dir = "/opt/ivle/scripts" # Within jail
38
console_path = "/opt/ivle/scripts/python-console" # Within jail
41
"""Handler for the Console Service AJAX backend application."""
42
if len(req.path) > 0 and req.path[-1] == os.sep:
46
# The path determines which "command" we are receiving
47
if req.path == "start":
49
elif req.path == "chat":
51
elif req.path == "block":
52
handle_chat(req, kind="block")
54
req.throw_error(req.HTTP_BAD_REQUEST)
56
def handle_start(req):
57
jail_path = os.path.join(conf.jail_base, req.username)
58
working_dir = os.path.join("/home", req.username) # Within jail
60
# Get the UID of the logged-in user
61
uid = req.get_session()['unixid']
63
# Set request attributes
64
req.content_type = "text/plain"
65
req.write_html_head_foot = False
67
# TODO: Figure out the host name the console server is running on.
68
host = socket.gethostname()
72
magic = md5.new(uuid.uuid4().bytes).digest().encode('hex')
74
# Try to find a free port on the server.
75
# Just try some random ports in the range [3000,8000)
76
# until we either succeed, or give up. If you think this
77
# sounds risky, it isn't:
78
# For N ports (e.g. 5000) with k (e.g. 100) in use, the
79
# probability of failing to find a free port in t (e.g. 5) tries
80
# is (k / N) ** t (e.g. 3.2*10e-9).
84
port = int(random.uniform(3000, 8000))
86
# Start the console server (port, magic)
87
# trampoline usage: tramp uid jail_dir working_dir script_path args
88
# console usage: python-console port magic
89
# TODO: Pass working_dir as argument, let console cd to it
90
cmd = ' '.join([trampoline_path, str(uid), jail_path,
91
console_dir, python_path, console_path,
92
str(port), str(magic)])
103
raise Exception, "unable to find a free port!"
105
# Assemble the key and return it.
106
key = cjson.encode({"host": host, "port": port, "magic": magic})
107
req.write(cjson.encode(key.encode("hex")))
109
def handle_chat(req, kind = "chat"):
110
# The request *should* have the following four fields:
111
# host, port, magic: Host and port where the console server lives,
112
# and the secret to use to digitally sign the communication with the
114
# text: Fields to pass along to the console server
115
# It simply acts as a proxy to the console server
116
if req.method != "POST":
117
req.throw_error(req.HTTP_BAD_REQUEST)
118
fields = req.get_fieldstorage()
120
key = cjson.decode(fields.getfirst("key").value.decode("hex"))
124
except AttributeError:
125
# Any of the getfirsts returned None
126
req.throw_error(req.HTTP_BAD_REQUEST)
127
# If text is None, it was probably just an empty line
129
text = fields.getfirst("text").value
130
except AttributeError:
133
msg = {'cmd':kind, 'text':text}
134
response = chat.chat(host, port, msg, magic, decode = False)
135
req.content_type = "text/plain"
35
from ivle.webapp.base.rest import JSONRESTView, named_operation
37
# XXX: Should be RPC view, with actions in URL?
38
class ConsoleServiceRESTView(JSONRESTView):
39
'''An RPC interface to a Python console.'''
41
def start(self, req, cwd=''):
42
working_dir = os.path.join("/home", req.user.login, cwd)
47
jail_path = os.path.join(ivle.conf.jail_base, req.user.login)
48
cons = ivle.console.Console(uid, jail_path, working_dir)
50
# Assemble the key and return it. Yes, it is double-encoded.
51
return {'key': cjson.encode({"host": cons.host,
53
"magic": cons.magic}).encode('hex')}
56
def chat(self, req, key, text='', kind="chat"):
57
# The request *should* have the following four fields:
58
# key: Hex JSON dict of host and port where the console server lives,
59
# and the secret to use to digitally sign the communication with the
61
# text: Fields to pass along to the console server
62
# It simply acts as a proxy to the console server
65
keydict = cjson.decode(key.decode('hex'))
66
host = keydict['host']
67
port = keydict['port']
68
magic = keydict['magic']
70
raise BadRequest("Invalid console key.")
72
jail_path = os.path.join(ivle.conf.jail_base, req.user.login)
73
working_dir = os.path.join("/home", req.user.login) # Within jail
76
msg = {'cmd':kind, 'text':text}
78
json_response = ivle.chat.chat(host, port, msg, magic,decode=False)
80
# Snoop the response from python-console to check that it's valid
82
response = cjson.decode(json_response)
83
except cjson.DecodeError:
84
# Could not decode the reply from the python-console server
85
response = {"terminate":
86
"Communication to console process lost"}
87
if "terminate" in response:
88
response = restart_console(uid, jail_path, working_dir,
89
response["terminate"])
90
except socket.error, (enumber, estring):
91
if enumber == errno.ECONNREFUSED:
92
# Timeout: Restart the session
93
response = restart_console(uid, jail_path, working_dir,
94
"The IVLE console has timed out due to inactivity")
95
elif enumber == errno.ECONNRESET:
96
# Communication issue: Restart the session
97
response = restart_console(uid, jail_path, working_dir,
98
"Connection with the console has been reset")
100
# Some other error - probably serious
101
raise socket.error, (enumber, estring)
105
def restart_console(uid, jail_path, working_dir, reason):
106
"""Tells the client that it must be issued a new console since the old
107
console is no longer availible. The client must accept the new key.
108
Returns the JSON response to be given to the client.
110
# Start a new console server console
111
cons = ivle.console.Console(uid, jail_path, working_dir)
113
# Make a JSON object to tell the browser to restart its console client
114
new_key = cjson.encode(
115
{"host": cons.host, "port": cons.port, "magic": cons.magic})
117
return {"restart": reason, "key": new_key.encode("hex")}