3
# IVLE - Informatics Virtual Learning Environment
4
# Copyright (C) 2007-2008 The University of Melbourne
6
# This program is free software; you can redistribute it and/or modify
7
# it under the terms of the GNU General Public License as published by
8
# the Free Software Foundation; either version 2 of the License, or
9
# (at your option) any later version.
11
# This program is distributed in the hope that it will be useful,
12
# but WITHOUT ANY WARRANTY; without even the implied warranty of
13
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14
# GNU General Public License for more details.
16
# You should have received a copy of the GNU General Public License
17
# along with this program; if not, write to the Free Software
18
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
20
# Script: interpretservice
24
# A CGI script for interpreting files.
33
from common import (cgirequest, studpath)
35
import conf.mimetypes, conf.app, conf.app.server
37
serveservice_path = "/opt/ivle/services/serveservice"
39
def determine_file_type(filename):
40
filetype = mimetypes.guess_type(filename)[0]
42
filetype = conf.mimetypes.default_mimetype
45
req = cgirequest.CGIRequest()
46
req.install_error_handler()
48
python = "/usr/bin/python"
50
# Work out the parts of the URL
51
urlpath = urlparse.urlparse(req.path)[2]
52
filename = studpath.url_to_jailpaths(urlpath)[2]
56
req.throw_error(req.HTTP_NOT_FOUND, "The path specified is invalid.")
58
if not os.access(filename, os.F_OK):
59
# The given path doesn't exist. CGI lets us backtrack and put the path
60
# elements through which we pass into PATH_INFO, so we try that.
61
while not os.access(filename, os.F_OK):
62
filename, path_info_frag = os.path.split(filename)
64
# os.path.join tacks a / on the end even if the second fragment is
65
# empty, which we don't want.
66
if len(path_info) > 0:
67
path_info = os.path.join(path_info_frag, path_info)
69
path_info = path_info_frag
71
# PATH_INFO is meant to start with a /.
72
path_info = os.path.join(os.sep, path_info)
74
# We now have a file that exists, but is it something that we're allowed
75
# to execute? If not, we should 404 anyway.
76
if determine_file_type(filename) not in conf.app.server.interpreters:
77
req.throw_error(req.HTTP_NOT_FOUND,
78
"The specified file (%s) does not exist." % urlpath)
80
path = os.path.split(filename)[0]
82
# Everything should be done from the same directory as the script
86
req.throw_error(req.HTTP_NOT_FOUND,
87
"The specified file (%s) does not exist." % urlpath)
89
# Search the path for modules first
92
# Now we have lots of fun mangling environment variables to fix PATH_INFO
94
os.environ['PATH_INFO'] = path_info
95
if len(path_info) > 0:
96
os.environ['SCRIPT_NAME'] = os.environ['SCRIPT_NAME'][:-len(path_info)]
98
# Set PATH_TRANSLATED. We trim the leading / from path_info or things go bad.
99
path_translated = studpath.url_to_jailpaths(path_info[1:])[2]
100
if path_translated is not None:
101
if len(path_translated) == 0 or path_translated[0] != os.sep:
102
path_translated = os.sep + path_translated
103
os.environ['PATH_TRANSLATED'] = path_translated
105
if not os.access(filename, os.R_OK):
106
req.throw_error(req.HTTP_NOT_FOUND,
107
"The specified file (%s) does not exist." % urlpath)
108
elif os.path.isdir(filename):
109
# 403 Forbidden error for visiting a directory
110
# (Not giving a directory listing, since this can be seen by
111
# the world at large. Directory contents are private).
112
req.throw_error(req.HTTP_FORBIDDEN,
113
"The path specified is a directory.")
114
elif determine_file_type(filename) in conf.app.server.interpreters:
115
# We'll save on a fork and execute in this python process
116
# Let exceptions blow up normally again
117
sys.excepthook = sys.__excepthook__
118
execfile(filename, {})
119
# Non-Python process should probably use something like
120
# subprocess.call([python, filename])
122
# Otherwise, use the blacklist/whitelist to see if this file should be
123
# served or disallowed
124
if (conf.app.server.blacklist_served_filetypes and \
125
determine_file_type(filename) in \
126
conf.app.server.served_filetypes_blacklist) or \
127
(conf.app.server.served_filetypes_whitelist and \
128
determine_file_type(filename) not in \
129
conf.app.server.served_filetypes_whitelist):
130
req.throw_error(req.HTTP_FORBIDDEN,
131
"Files of this type are not allowed to be served.")
133
execfile(serveservice_path)