26
26
import ivle.jailbuilder.debian
28
class UnsafeJail(Exception):
31
28
usage = """usage: %prog [options]
33
30
Builds or updates the base IVLE jail."""
37
print >> sys.stderr, "This script requires root privileges to run"
40
32
conf = ivle.config.Config()
41
build_path = conf['paths']['jails']['template_build']
33
build_path = ivle.conf.jail_system_build
44
36
parser = optparse.OptionParser(usage)
51
43
help='''Apply any package updates in the jail.''')
52
44
parser.add_option("-m", "--mirror",
53
45
action="store", dest="apt_mirror",
54
help="Sets the apt mirror.", default=conf['jail']['mirror'])
46
help="Sets the apt mirror.", default="http://archive.ubuntu.com/ubuntu")
55
47
parser.add_option("--python-site-packages",
56
48
action="store", dest="python_site_packages",
57
49
help="Path to Python site packages directory inside the jail.",
84
76
build_path, mirror=options.apt_mirror)
86
78
ivle.jailbuilder.debian.apt_update_cache(build_path)
87
# Minimal required packages
88
79
ivle.jailbuilder.debian.apt_install(build_path,
89
['python2.5', 'python-cjson', 'python-svn', 'python-configobj'])
80
['python2.5', 'python-cjson', 'python-svn'])
91
82
ivle.jailbuilder.debian.apt_clean(build_path)
121
112
if conf['jail']['devmode']:
122
113
# Copy all console and operating system files into the jail
123
services_path = os.path.join(conf['paths']['share'], 'services')
114
services_path = os.path.join(ivle.conf.share_path, 'services')
124
115
jail_services_path = os.path.join(build_path, services_path[1:])
125
116
if os.path.exists(jail_services_path):
126
117
shutil.rmtree(jail_services_path)
146
137
shutil.rmtree(jail_site_packages)
147
138
shutil.copytree(ivle_site_packages, jail_site_packages)
149
# And finally copy in /etc/hosts, /etc/resolv.conf and /etc/hostname,
150
# so name resolution is less unlikely to work.
152
'/etc/resolv.conf', os.path.join(build_path, 'etc/resolv.conf'))
153
shutil.copy('/etc/hosts', os.path.join(build_path, 'etc/hosts'))
154
shutil.copy('/etc/hostname', os.path.join(build_path, 'etc/hostname'))
156
# Make /tmp and /var/lock un-world-writable. /tmp will be mounted over,
157
# and /var/{lock,tmp} should die.
158
for path in ('tmp', 'var/lock', 'var/tmp'):
159
path = os.path.join(build_path, path)
160
os.chmod(path, os.stat(path).st_mode & ~stat.S_IWOTH)
162
# Verify that nothing in the jail is world-writable.
163
# We don't want students to write into places that others can see.
165
for path, dirs, files in os.walk(build_path):
167
d = os.path.join(path, dname)
168
if os.path.islink(d):
170
if os.stat(d).st_mode & stat.S_IWOTH:
174
f = os.path.join(path, fname)
175
if os.path.islink(f):
177
if os.stat(f).st_mode & stat.S_IWOTH:
178
if (os.path.dirname(f) == os.path.join(build_path, 'dev') and
179
os.path.basename(f) in ('ptmx', 'null', 'tty', 'full', 'zero',
184
except UnsafeJail, e:
185
print >> sys.stderr,"""Error: Jail contains world writable path: '%s'.
186
This is a security vulnerability as jail template contents are shared between
187
users. Please either make this path world unwriteable or remove it from the
191
# Copy jail template build to actual jail template
192
template_path = conf['paths']['jails']['template']
193
140
if os.spawnvp(os.P_WAIT, 'rsync', ['rsync', '-a', '--delete',
194
build_path + '/', template_path]) != 0:
141
build_path + '/', ivle.conf.jail_system]) != 0:
195
142
print >> sys.stderr, "Jail copying failed."
198
# Now mangle things a bit, so we can bind-mount the user bits in.
199
# /etc/passwd and /etc/ivle/ivle.conf need to be symlinks to somewhere in /home
201
os.rename(os.path.join(template_path, 'etc/passwd'),
202
os.path.join(template_path, 'home/.passwd')
204
os.symlink('../home/.passwd', os.path.join(template_path, 'etc/passwd'))
206
os.makedirs(os.path.join(template_path, "etc/ivle"))
207
os.symlink('../../home/.ivle.conf',
208
os.path.join(template_path, "etc/ivle/ivle.conf"))