15
15
# along with this program; if not, write to the Free Software
16
16
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
19
# Author: Matt Giuca, Tom Conway
18
# Author: Matt Giuca, Tom Conway, Will Grant
20
'''Python console RPC service.
22
Provides an HTTP RPC interface to a Python console process.
35
from common import (util, studpath, chat)
38
trampoline_path = os.path.join(conf.ivle_install_dir, "bin/trampoline")
39
python_path = "/usr/bin/python" # Within jail
40
console_dir = "/opt/ivle/scripts" # Within jail
41
console_path = "/opt/ivle/scripts/python-console" # Within jail
44
"""Handler for the Console Service AJAX backend application."""
45
if len(req.path) > 0 and req.path[-1] == os.sep:
49
# The path determines which "command" we are receiving
50
if req.path == "start":
52
elif req.path == "chat":
54
elif req.path == "block":
55
handle_chat(req, kind="block")
57
req.throw_error(req.HTTP_BAD_REQUEST)
59
def handle_start(req):
60
jail_path = os.path.join(conf.jail_base, req.username)
61
working_dir = os.path.join("/home", req.username) # Within jail
63
# Get the UID of the logged-in user
64
uid = req.get_session()['unixid']
66
# Set request attributes
67
req.content_type = "text/plain"
68
req.write_html_head_foot = False
70
# TODO: Figure out the host name the console server is running on.
71
host = socket.gethostname()
75
magic = md5.new(uuid.uuid4().bytes).digest().encode('hex')
77
# Try to find a free port on the server.
78
# Just try some random ports in the range [3000,8000)
79
# until we either succeed, or give up. If you think this
80
# sounds risky, it isn't:
81
# For N ports (e.g. 5000) with k (e.g. 100) in use, the
82
# probability of failing to find a free port in t (e.g. 5) tries
83
# is (k / N) ** t (e.g. 3.2*10e-9).
87
port = int(random.uniform(3000, 8000))
89
# Start the console server (port, magic)
90
# trampoline usage: tramp uid jail_dir working_dir script_path args
91
# console usage: python-console port magic
92
# TODO: Pass working_dir as argument, let console cd to it
93
cmd = ' '.join([trampoline_path, str(uid), jail_path,
94
console_dir, python_path, console_path,
95
str(port), str(magic)])
106
raise Exception, "unable to find a free port!"
108
# Assemble the key and return it.
109
key = cjson.encode({"host": host, "port": port, "magic": magic})
110
req.write(cjson.encode(key.encode("hex")))
112
def handle_chat(req, kind = "chat"):
113
# The request *should* have the following four fields:
114
# host, port, magic: Host and port where the console server lives,
115
# and the secret to use to digitally sign the communication with the
117
# text: Fields to pass along to the console server
118
# It simply acts as a proxy to the console server
119
if req.method != "POST":
120
req.throw_error(req.HTTP_BAD_REQUEST)
121
fields = req.get_fieldstorage()
123
key = cjson.decode(fields.getfirst("key").value.decode("hex"))
127
except AttributeError:
128
# Any of the getfirsts returned None
129
req.throw_error(req.HTTP_BAD_REQUEST)
130
# If text is None, it was probably just an empty line
132
text = fields.getfirst("text").value
133
except AttributeError:
136
msg = {'cmd':kind, 'text':text}
137
response = chat.chat(host, port, msg, magic, decode = False)
138
req.content_type = "text/plain"
35
from ivle.webapp.base.rest import JSONRESTView, named_operation
36
from ivle.webapp.errors import BadRequest
38
# XXX: Should be RPC view, with actions in URL?
39
class ConsoleServiceRESTView(JSONRESTView):
40
'''An RPC interface to a Python console.'''
41
def get_permissions(self, user):
47
@named_operation('use')
48
def start(self, req, cwd=''):
49
working_dir = os.path.join("/home", req.user.login, cwd)
54
jail_path = os.path.join(ivle.conf.jail_base, req.user.login)
55
cons = ivle.console.Console(uid, jail_path, working_dir)
57
# Assemble the key and return it. Yes, it is double-encoded.
58
return {'key': cjson.encode({"host": cons.host,
60
"magic": cons.magic}).encode('hex')}
62
@named_operation('use')
63
def chat(self, req, key, text='', kind="chat"):
64
# The request *should* have the following four fields:
65
# key: Hex JSON dict of host and port where the console server lives,
66
# and the secret to use to digitally sign the communication with the
68
# text: Fields to pass along to the console server
69
# It simply acts as a proxy to the console server
72
keydict = cjson.decode(key.decode('hex'))
73
host = keydict['host']
74
port = keydict['port']
75
magic = keydict['magic']
77
raise BadRequest("Invalid console key.")
79
jail_path = os.path.join(ivle.conf.jail_base, req.user.login)
80
working_dir = os.path.join("/home", req.user.login) # Within jail
83
msg = {'cmd':kind, 'text':text}
85
json_response = ivle.chat.chat(host, port, msg, magic,decode=False)
87
# Snoop the response from python-console to check that it's valid
89
response = cjson.decode(json_response)
90
except cjson.DecodeError:
91
# Could not decode the reply from the python-console server
92
response = {"terminate":
93
"Communication to console process lost"}
94
if "terminate" in response:
95
response = restart_console(uid, jail_path, working_dir,
96
response["terminate"])
97
except socket.error, (enumber, estring):
98
if enumber == errno.ECONNREFUSED:
99
# Timeout: Restart the session
100
response = restart_console(uid, jail_path, working_dir,
101
"The IVLE console has timed out due to inactivity")
102
elif enumber == errno.ECONNRESET:
103
# Communication issue: Restart the session
104
response = restart_console(uid, jail_path, working_dir,
105
"Connection with the console has been reset")
107
# Some other error - probably serious
108
raise socket.error, (enumber, estring)
112
def restart_console(uid, jail_path, working_dir, reason):
113
"""Tells the client that it must be issued a new console since the old
114
console is no longer availible. The client must accept the new key.
115
Returns the JSON response to be given to the client.
117
# Start a new console server console
118
cons = ivle.console.Console(uid, jail_path, working_dir)
120
# Make a JSON object to tell the browser to restart its console client
121
new_key = cjson.encode(
122
{"host": cons.host, "port": cons.port, "magic": cons.magic})
124
return {"restart": reason, "key": new_key.encode("hex")}