74
55
chown_to_webserver(path)
76
def rebuild_svn_config():
57
def rebuild_svn_config(store, config):
77
58
"""Build the complete SVN configuration file.
60
@param config: An ivle.config.Config object.
80
users = conn.get_users()
84
if role not in groups:
86
groups[role].append(u.login)
87
f = open(ivle.conf.svn_conf + ".new", "w")
88
f.write("# IVLE SVN Repositories Configuration\n")
89
f.write("# Auto-generated on %s\n" % time.asctime())
92
for (g,ls) in groups.iteritems():
93
f.write("%s = %s\n" % (g, ",".join(ls)))
96
f.write("[%s:/]\n" % u.login)
97
f.write("%s = rw\n" % u.login)
98
#f.write("@tutor = r\n")
99
#f.write("@lecturer = rw\n")
100
#f.write("@admin = rw\n")
62
users = store.find(User)
63
conf_name = config['paths']['svn']['conf']
64
temp_name = conf_name + ".new"
65
f = open(temp_name, "w")
67
# IVLE SVN repository authorisation configuration
69
""" % {'time': time.asctime()})
75
""" % {'login': u.login.encode('utf-8')})
77
# Now we need to grant offering tutors and lecturers access to the latest
78
# submissions in their offerings. There are much prettier ways to do this,
79
# but a lot of browser requests call this function, so it needs to be
80
# fast. We can grab all of the paths needing authorisation directives with
81
# a single query, and we cache the list of viewers for each offering.
82
offering_viewers_cache = {}
83
for (login, psid, pspath, offeringid) in store.find(
84
(User.login, ProjectSubmission.id, ProjectSubmission.path,
86
Assessed.id == ProjectSubmission.assessed_id,
87
User.id == Assessed.user_id,
88
Project.id == Assessed.project_id,
89
ProjectSet.id == Project.project_set_id,
90
Offering.id == ProjectSet.id,
91
ProjectSubmission.date_submitted == Select(
92
Max(ProjectSubmission.date_submitted),
93
ProjectSubmission.assessed_id == Assessed.id,
94
tables=ProjectSubmission
98
# Do we already have the list of logins authorised for this offering
99
# cached? If not, get it.
100
if offeringid not in offering_viewers_cache:
101
offering_viewers_cache[offeringid] = list(store.find(
103
User.id == Enrolment.user_id,
104
Enrolment.offering_id == offeringid,
105
Enrolment.role.is_in((u'tutor', u'lecturer')),
106
Enrolment.active == True,
113
""" % {'login': login.encode('utf-8'), 'id': psid,
114
'path': pspath.encode('utf-8')})
116
for viewer_login in offering_viewers_cache[offeringid]:
117
# We don't want to override the owner's write privilege,
118
# so we don't add them to the read-only ACL.
119
if login != viewer_login:
120
f.write("%s = r\n" % viewer_login.encode('utf-8'))
103
os.rename(ivle.conf.svn_conf + ".new", ivle.conf.svn_conf)
104
chown_to_webserver(ivle.conf.svn_conf)
123
os.rename(temp_name, conf_name)
124
chown_to_webserver(conf_name)
106
def rebuild_svn_group_config():
126
def rebuild_svn_group_config(store, config):
107
127
"""Build the complete SVN configuration file for groups
129
@param config: An ivle.config.Config object.
110
groups = conn.get_all('project_group',
111
['groupid', 'groupnm', 'projectsetid'])
112
f = open(ivle.conf.svn_group_conf + ".new", "w")
113
f.write("# IVLE SVN Group Repositories Configuration\n")
114
f.write("# Auto-generated on %s\n" % time.asctime())
117
projectsetid = g['projectsetid']
118
offeringinfo = conn.get_offering_info(projectsetid)
119
subj_short_name = offeringinfo['subj_short_name']
120
year = offeringinfo['year']
121
semester = offeringinfo['semester']
122
reponame = "_".join([subj_short_name, year, semester, g['groupnm']])
123
f.write("[%s:/]\n"%reponame)
124
users = conn.get_projectgroup_members(g['groupid'])
126
f.write("%s = rw\n"%u['login'])
131
conf_name = config['paths']['svn']['group_conf']
132
temp_name = conf_name + ".new"
133
f = open(temp_name, "w")
136
# IVLE SVN group repository authorisation configuration
137
# Generated: %(time)s
139
""" % {'time': time.asctime()})
141
group_members_cache = {}
142
for group in store.find(ProjectGroup):
143
offering = group.project_set.offering
144
reponame = "_".join([offering.subject.short_name,
145
offering.semester.year,
146
offering.semester.semester,
149
f.write("[%s:/]\n" % reponame.encode('utf-8'))
150
if group.id not in group_members_cache:
151
group_members_cache[group.id] = set()
152
for user in group.members:
153
group_members_cache[group.id].add(user.login)
154
f.write("%s = rw\n" % user.login.encode('utf-8'))
157
# Now we need to grant offering tutors and lecturers access to the latest
158
# submissions in their offerings. There are much prettier ways to do this,
159
# but a lot of browser requests call this function, so it needs to be
160
# fast. We can grab all of the paths needing authorisation directives with
161
# a single query, and we cache the list of viewers for each offering.
162
offering_viewers_cache = {}
163
for (ssn, year, sem, name, psid, pspath, gid, offeringid) in store.find(
164
(Subject.short_name, Semester.year, Semester.semester,
165
ProjectGroup.name, ProjectSubmission.id, ProjectSubmission.path,
166
ProjectGroup.id, Offering.id),
167
Assessed.id == ProjectSubmission.assessed_id,
168
ProjectGroup.id == Assessed.project_group_id,
169
Project.id == Assessed.project_id,
170
ProjectSet.id == Project.project_set_id,
171
Offering.id == ProjectSet.offering_id,
172
Subject.id == Offering.subject_id,
173
Semester.id == Offering.semester_id,
174
ProjectSubmission.date_submitted == Select(
175
Max(ProjectSubmission.date_submitted),
176
ProjectSubmission.assessed_id == Assessed.id,
177
tables=ProjectSubmission
181
reponame = "_".join([ssn, year, sem, name])
183
# Do we already have the list of logins authorised for this offering
184
# cached? If not, get it.
185
if offeringid not in offering_viewers_cache:
186
offering_viewers_cache[offeringid] = list(store.find(
188
User.id == Enrolment.user_id,
189
Enrolment.offering_id == offeringid,
190
Enrolment.role.is_in((u'tutor', u'lecturer')),
191
Enrolment.active == True,
198
""" % {'repo': reponame.encode('utf-8'), 'id': psid,
199
'path': pspath.encode('utf-8')})
201
for viewer_login in offering_viewers_cache[offeringid]:
202
# Skip existing group members, or they can't write to it any more.
203
if viewer_login not in group_members_cache[gid]:
204
f.write("%s = r\n" % viewer_login)
129
os.rename(ivle.conf.svn_group_conf + ".new", ivle.conf.svn_group_conf)
130
chown_to_webserver(ivle.conf.svn_group_conf)
132
def make_svn_auth(login, throw_on_error=True):
133
"""Setup svn authentication for the given user.
134
FIXME: create local.auth entry
207
os.rename(temp_name, conf_name)
208
chown_to_webserver(conf_name)
210
def make_svn_auth(store, login, config, throw_on_error=True):
211
"""Create a Subversion password for a user.
213
Generates a new random Subversion password, and assigns it to the user.
214
The password is added to Apache's Subversion authentication file.
136
passwd = md5.new(uuid.uuid4().bytes).digest().encode('hex')
137
if os.path.exists(ivle.conf.svn_auth_ivle):
216
# filename is, eg, /var/lib/ivle/svn/ivle.auth
217
filename = config['paths']['svn']['auth_ivle']
218
if os.path.exists(filename):
142
ivle.db.DB().update_user(login, svn_pass=passwd)
144
res = os.system("htpasswd -%smb %s %s %s" % (create,
145
ivle.conf.svn_auth_ivle,
223
user = User.get_by_login(store, login)
225
if user.svn_pass is None:
226
passwd = hashlib.md5(uuid.uuid4().bytes).hexdigest()
227
user.svn_pass = unicode(passwd)
229
res = subprocess.call(['htpasswd', '-%smb' % create,
230
filename, login, user.svn_pass])
147
231
if res != 0 and throw_on_error:
148
232
raise Exception("Unable to create ivle-auth for %s" % login)
150
234
# Make sure the file is owned by the web server
151
235
if create == "c":
152
chown_to_webserver(ivle.conf.svn_auth_ivle)
156
def generate_manifest(basedir, targetdir, parent=''):
157
""" From a basedir and a targetdir work out which files are missing or out
158
of date and need to be added/updated and which files are redundant and need
161
parent: This is used for the recursive call to track the relative paths
162
that we have decended.
165
cmp = filecmp.dircmp(basedir, targetdir)
167
# Add all new files and files that have changed
168
to_add = [os.path.join(parent,x) for x in (cmp.left_only + cmp.diff_files)]
170
# Remove files that are redundant
171
to_remove = [os.path.join(parent,x) for x in cmp.right_only]
174
for d in cmp.common_dirs:
175
newbasedir = os.path.join(basedir, d)
176
newtargetdir = os.path.join(targetdir, d)
177
newparent = os.path.join(parent, d)
178
(sadd,sremove) = generate_manifest(newbasedir, newtargetdir, newparent)
182
return (to_add, to_remove)
185
def make_jail(username, uid, force=True, svn_pass=None):
186
"""Creates a new user's jail space, in the jail directory as configured in
189
This only creates things within /home - everything else is expected to be
190
part of another UnionFS branch.
236
chown_to_webserver(filename)
240
def make_jail(user, config, force=True):
241
"""Create or update a user's jail.
243
Only the user-specific parts of the jail are created here - everything
244
else is expected to be part of another aufs branch.
192
246
Returns the path to the user's home directory.
194
248
Chowns the user's directory within the jail to the given UID.
196
Note: This takes separate username and uid arguments. The UID need not
197
*necessarily* correspond to a Unix username at all, if all you are
198
planning to do is setuid to it. This allows the caller the freedom of
199
deciding the binding between username and uid, if any.
201
force: If false, exception if jail already exists for this user.
202
If true (default), overwrites it, but preserves home directory.
204
svn_pass: If provided this will be a string, the randomly-generated
205
Subversion password for this user (if you happen to already have it).
206
If not provided, it will be read from the database.
250
@param force: If False, raise an exception if the user already has a jail.
251
If True (default), rebuild the jail preserving /home.
208
253
# MUST run as root or some of this may fail
209
254
if os.getuid() != 0:
210
255
raise Exception("Must run make_jail as root")
212
257
# tempdir is for putting backup homes in
213
tempdir = os.path.join(ivle.conf.jail_base, '__temp__')
258
jail_src_base = config['paths']['jails']['src']
259
tempdir = os.path.join(jail_src_base, '__temp__')
214
260
if not os.path.exists(tempdir):
215
261
os.makedirs(tempdir)
216
262
elif not os.path.isdir(tempdir):
217
263
os.unlink(tempdir)
218
264
os.mkdir(tempdir)
219
userdir = os.path.join(ivle.conf.jail_src_base, username)
265
userdir = os.path.join(jail_src_base, user.login)
220
266
homedir = os.path.join(userdir, 'home')
221
userhomedir = os.path.join(homedir, username) # Return value
267
tmpdir = os.path.join(userdir, 'tmp')
268
userhomedir = os.path.join(homedir, user.login) # Return value
223
270
if os.path.exists(userdir):
226
273
# User jail already exists. Blow it away but preserve their home
227
274
# directory. It should be all that is there anyway, but you never
229
# Ignore warnings about the use of tmpnam
276
# Ignore warnings about the use of tempnam
230
277
warnings.simplefilter('ignore')
231
278
homebackup = os.tempnam(tempdir)
232
279
warnings.resetwarnings()
233
# Note: shutil.move does not behave like "mv" - it does not put a file
234
# into a directory if it already exists, just fails. Therefore it is
235
# not susceptible to tmpnam symlink attack.
236
shutil.move(homedir, homebackup)
280
# Back up the /home directory, delete the entire jail, recreate the
281
# jail directory tree, then copy the /home back
282
# NOTE that shutil.move changed in Python 2.6, it now moves a
283
# directory INTO the target (like `mv`), which it didn't use to do.
284
# This code works regardless.
285
shutil.move(userhomedir, homebackup)
237
286
shutil.rmtree(userdir)
238
287
os.makedirs(homedir)
239
shutil.move(homebackup, homedir)
288
shutil.move(homebackup, userhomedir)
240
289
# Change the ownership of all the files to the right unixid
241
290
logging.debug("chown %s's home directory files to uid %d"
243
os.chown(userhomedir, uid, uid)
244
for root, dirs, files in os.walk(userhomedir):
245
for fsobj in dirs + files:
246
os.chown(os.path.join(root, fsobj), uid, uid)
291
%(user.login, user.unixid))
292
os.spawnvp(os.P_WAIT, 'chown', ['chown', '-R', '%d:%d' % (user.unixid,
293
user.unixid), userhomedir])
248
295
# No user jail exists
249
296
# Set up the user's home directory
250
297
os.makedirs(userhomedir)
251
298
# Chown (and set the GID to the same as the UID).
252
os.chown(userhomedir, uid, uid)
299
os.chown(userhomedir, user.unixid, user.unixid)
253
300
# Chmod to rwxr-xr-x (755)
254
301
os.chmod(userhomedir, 0755)
256
# There are 2 special files which need to be generated specific to this
257
# user: ${python_site_packages}/lib/conf/conf.py and /etc/passwd.
258
# "__" username "__" users are exempt (special)
259
if not (username.startswith("__") and username.endswith("__")):
260
make_conf_py(username, userdir, ivle.conf.jail_system, svn_pass)
261
make_etc_passwd(username, userdir, ivle.conf.jail_system, uid)
303
make_ivle_conf(user.login, userdir, user.svn_pass, config)
304
make_etc_passwd(user.login, userdir, config['paths']['jails']['template'],
307
os.chmod(tmpdir, 01777)
263
309
return userhomedir
265
def make_conf_py(username, user_jail_dir, staging_dir, svn_pass=None):
311
def make_ivle_conf(username, user_jail_dir, svn_pass, sys_config):
312
"""Generate an ivle.conf for a user's jail.
267
314
Creates (overwriting any existing file, and creating directories) a
268
file ${python_site_packages}/ivle/conf/conf.py in a given user's jail.
270
user_jail_dir: User's jail dir, ie. ivle.conf.jail_base + username
271
staging_dir: The dir with the staging copy of the jail. (With the
272
template conf.py file).
273
svn_pass: As with make_jail. User's SVN password, but if not supplied,
274
will look up in the DB.
315
file /etc/ivle/ivle.conf in a given user's jail.
317
@param username: Username.
318
@param user_jail_dir: User's jail dir, ie. ['jails']['src'] + username
319
@param svn_pass: User's SVN password.
320
@param sys_config: An ivle.config.Config object (the system-wide config).
276
template_conf_path = os.path.join(staging_dir,
277
ivle.conf.python_site_packages[1:], "ivle/conf/conf.py")
278
conf_path = os.path.join(user_jail_dir,
279
ivle.conf.python_site_packages[1:], "ivle/conf/conf.py")
280
os.makedirs(os.path.dirname(conf_path))
282
# If svn_pass isn't supplied, grab it from the DB
284
dbconn = ivle.db.DB()
285
svn_pass = dbconn.get_user(username).svn_pass
288
# Read the contents of the template conf file
290
template_conf_file = open(template_conf_path, "r")
291
template_conf_data = template_conf_file.read()
292
template_conf_file.close()
294
# Couldn't open template conf.py for some reason
295
# Just treat it as empty file
296
template_conf_data = ("# Warning: Problem building config script.\n"
297
"# Could not find template conf.py file.\n")
299
conf_file = open(conf_path, "w")
300
conf_file.write(template_conf_data)
301
conf_file.write("\n# The login name for the owner of the jail\n")
302
conf_file.write("login = %s\n" % repr(username))
303
conf_file.write("\n")
304
conf_file.write("# The subversion-only password for the owner of "
306
conf_file.write("svn_pass = %s\n" % repr(svn_pass))
322
conf_path = os.path.join(user_jail_dir, "home/.ivle.conf")
323
if not os.path.exists(os.path.dirname(conf_path)):
324
os.makedirs(os.path.dirname(conf_path))
326
# In the "in-jail" version of conf, we don't need MOST of the details
327
# (it would be a security risk to have them here).
328
# So we just write root_dir.
329
conf_obj = ivle.config.Config(blank=True)
330
conf_obj.filename = conf_path
331
conf_obj['urls'] = {}
332
conf_obj['urls']['root'] = sys_config['urls']['root']
333
conf_obj['urls']['public_host'] = sys_config['urls']['public_host']
334
conf_obj['urls']['svn_addr'] = sys_config['urls']['svn_addr']
335
conf_obj['user_info'] = {}
336
conf_obj['user_info']['login'] = username
337
conf_obj['user_info']['svn_pass'] = svn_pass
309
340
# Make this file world-readable
310
341
# (chmod 644 conf_path)