1
.. IVLE - Informatics Virtual Learning Environment
2
Copyright (C) 2007-2009 The University of Melbourne
4
.. This program is free software; you can redistribute it and/or modify
5
it under the terms of the GNU General Public License as published by
6
the Free Software Foundation; either version 2 of the License, or
7
(at your option) any later version.
9
.. This program is distributed in the hope that it will be useful,
10
but WITHOUT ANY WARRANTY; without even the implied warranty of
11
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12
GNU General Public License for more details.
14
.. You should have received a copy of the GNU General Public License
15
along with this program; if not, write to the Free Software
16
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
22
IVLE is a complex piece of software that integrates closely with the
23
underlying system. It can be considered part web service and part local system
24
daemon. Due to the implementation of these parts it is tied to Apache Web
25
Server (mainly due to the use of mod_python) and Linux.
31
IVLE uses mod_python_ to allow Python scripts to be called from Apache. We
32
register the :mod:`ivle.dispatch` module as the ``PythonHandler`` in the
33
associated VirtualHost, allowing us to intercept all HTTP requests to the web
36
The :mod:`ivle.dispatch` module is responsible for mapping requests from the
37
client to the correct application plugin. Plugins can be specified by placing
38
a :file:`*.conf` file into the :file:`/etc/ivle/plugins.d/` directory
39
containing lines of the form :samp:`[{plugin_module}#{classname}]`.
41
.. TODO: Document Plugin Format and Routing Strings
43
In future, this may be ported to a WSGI (:pep:`333`) based dispatch to allow
44
IVLE to be run on web servers other than Apache.
46
.. _mod_python: http://www.modpython.org/
51
IVLE uses the Genshi_ XHTML template system to generate all HTML pages. We
52
have an inheritance-based "views" system. :class:`BaseView` is a class from
53
which all views derive.
55
There are 3 sub-types of :class:`BaseView` (more can be implemented if
59
* browser, console, debuginfo, diff, forum, groups, help, home, logout,
60
settings, subjects, svnlog, tos, tutorial
64
* consoleservice, fileservice, tutorialservice, userservice
66
The apps each derive from one of the above.
69
IVLE used to write its HTML output as a raw stream to an output file, until
70
it was refactored to use Genshi. All apps which haven't yet been refactored
71
properly were ported to use the "raw byte streaming" view.
73
.. _Genshi: http://genshi.edgewall.org/
78
One of the main features of IVLE is it's ability to execute user's code in a
79
customised environment that prevents access to other users files or underlying
80
file system as well as placing basic resource limits to prevent users from
81
accidentally exhausting shared resources such as CPU time and memory.
87
To each user, it appears that they have their own private Unix filesystem
88
containing software, libraries and a home directory to do with what they
89
please. This is mainly done by the setuid root program ``trampoline`` (See
90
:file:`bin/trampoline/trampoline.c`) which mounts the users home directory,
91
sets up the users environment, jumps into the user's jail using the
92
:manpage:`chroot(2)` system call and finally drops privileges to the desired
95
To prevent abuse, ``trampoline`` can only be used by root or one of the uids
96
specified when trampoline is built by ``setup.py build`` (defaults to UID 33,
97
www-data on Debian systems). Since it's one of two C programs involved in IVLE
98
and runs setuid root it is rather secuity sensative.
100
Base Image Generation
101
---------------------
103
All user jails share a common base image that contains the files required for
104
both IVLE's operation and for executing user code. This base image is
105
generated automatically by the ``ivle-buildjail`` script. This then calls the
106
distribution dependant details in :mod:`ivle.jailbuilder` module. At present
107
we only support building jails for Debian derived systems using
108
:program:`debootstrap`.
110
The contents of the base image contains a few core packages required for the
111
operation of IVLE - Python and the Python CJSON and SVN libraries. Other
112
options that can be configured in :file:`/etc/ivle/ivle.conf` are the file
113
mirror that debootstrap should use, the suite to build (such as hardy or
114
jaunty), extra apt-sources, extra apt keys and any additional packages to
117
To prevent users from altering files in the base image we change the
118
permissions of :file:`/tmp`, :file:`/var/tmp` and :file:`/var/lock` to not be
119
world writeable and check that no other files are world writeable.
121
Finally we make the user dependent :file:`/etc/passwd` and
122
:file:`/etc/ivle/ivle.conf` symlinks to files in the :file:`/home` directory
123
so that they will be used when we mount a user's home directory.
125
Mounting Home Directories
126
-------------------------
128
To give the appearance of a private file system we need to merge together a
129
user's local home directory with the base image.
130
To achieve this, IVLE uses the *bind mount* feature of Linux, which allows
131
directories to be accessible from another location in the
132
file system. By carefully read-only bind mounting the jail image and then bind
133
mounting the user's :file:`/home` and :file:`/tmp` directory data over the top
134
we can create a jail with only three bind mounts and at virtually no
138
IVLE has historically used numerous solutions to this problem, which are
139
chronicled here to avoid the same mistakes being made again.
141
In the first release of IVLE this was done off-line by hardlinking all the
142
files into the target directory, but for more than a handful of users this
143
process could take several hours and also ran the risk of exhausting inodes
144
on the underlying file system.
146
The first solution was to use `AUFS <http://aufs.sourceforge.net/>`_ to
147
mount the user's home directory over a read-only version of the base on
148
demand. This was implemented as part of ``trampoline`` and used a secondary
149
program ``timount`` (see :file:`bin/timount/timount.c`) run at regular
150
intervals to unmount unused jails. This uses the :const:`MNT_EXPIRE` flag
151
for :manpage:`umount(2)` (available since Linux 2.6.8) that only unmounts a
152
directory if it hasn't been accessed since the previous call with
155
While quite effective, AUFS appears to cause NFS caching issues when IVLE
156
is run as a cluster as well as questionable inclusion status in newer
157
distributions. This is why the current system uses the much older bind
158
mount feature to achieve the same ends.
163
Before running the specified program in the users jail we need to
164
:manpage:`chroot(2)` into the users jail and update the processes environment
165
so that we have the correct environment variables and user/group ids.
167
At this stage we also may apply a number of resource limits (see
168
:manpage:`setrlimit`) to prevent run away processes (such as those containing
169
infinite loops or "fork bombs") from exhausting all system resources. The
170
default limits are on maximum address space (:const:`RLIMIT_AS`), process data
171
space (:const:`RLIMIT_DATA`), core dump size (:const:`RLIMIT_CORE`), CPU time
172
(:const:`RLIMIT_CPU`), file size (:const:`RLIMIT_FSIZE`) and number of
173
processes that may be spawned (:const:`RLIMIT_NPROC`).
175
Unfortunately due to glibc's :manpage:`malloc(2)` implementation being able to
176
allocate memory using :manpage:`mmap(2)`, :const:`RLIMIT_DATA` does not
177
provide an effective limit on the amount of memory that a process can allocate
178
(short of applying a kernel patch). Thus the only way to limit memory
179
allocations is by placing limits on the address space, but this can cause
180
problems with certain applications that allocate far larger address spaces
181
than the real memory used. For this reason :const:`RLIMIT_AS` is currently set
187
IVLE provides a web based programming console, exposing similar features to
188
Python's command line console. It is built around python script
189
:file:`services/python-console` which opens up a socket to which `JSON`_
190
encoded chat requests can be made. A new console is typically from launched on
191
demand by the web client to the HTTP API, which in turn calls the wrapper
192
class :class:`ivle.console.Console` to start a new console in the user's jail.
194
.. _JSON: http://json.org
196
User Management Server
197
======================
199
The **User Management Server** is a daemon responsible for handling privileged
200
actions on IVLE and should be launched along with IVLE. It is primarily
203
* Creating user jails, Subversion repositories, and Subversion authentication
205
* Creating group Subversion repositories.
206
* Rebuilding Subversion authorization files.
208
Communication with the Server is done using the `Chat Protocol`_. To prevent
209
unauthorized use, communication with the User Management Server requires that
210
a *shared secret* be used to communicate with the server. This secret is
211
stored in the `magic` variable in the `[usrmgt]` section of
212
:file:`/etc/ivle/ivle.conf`.
214
The User Management Server is called almost exclusively from the
215
:mod:`ivle.webapp.userservice` module.
217
See :file:`services/usrmgt-server` for details.
222
**Chat** is our JSON_-based client/server communication protocol used in
223
communicating to `Python Console`_ processes and `User Management Server`_.
224
Since it is JSON-based it can be called from either Python or JavaScript.
228
The protocol is a fairly simple client/server based one consisting of a single
229
JSON object. Before communication starts a shared secret :const:`MAGIC` must
230
be known by both parties. The shared secret is then used to form a
231
'keyed-Hash Message Authentication Code' to ensure that the content is valid
232
and not been modified in transit.
234
The client request takes the following form::
241
where :const:`DATA` is any valid JSON value and :const:`HASH` is an string
242
containing the MD5 hash of the :const:`DATA` appended to :const:`MAGIC` and
245
The server will respond with a JSON value corresponding to the request.
246
If an error occurs then a special JSON object will be returned of the
252
"traceback": TRACEBACK
255
where :const:`NAME` is a JSON string of the exception type (such as
256
'AttributeError'), :const:`VALUE` is the string value associated with the
257
exception and :const:`TRACEBACK` is a string of the traceback generated by the
258
server's exception handler.
260
See :file:`ivle/chat.py` for details.
272
.. TODO: Not yet merged