# -*- coding: utf-8 -*- import json import os from werkzeug.exceptions import BadRequest, HTTPException, NotFound from werkzeug.routing import Map, Rule from werkzeug.utils import redirect from werkzeug.wrappers import Request, Response from werkzeug.wsgi import ClosingIterator from jinja2 import Environment, FileSystemLoader from . import AppMgr from . import tools from .validator import InvalidValueException from .wsgilang import WSGILang from .wsgisession import WSGISession SESSION_KEY = os.urandom(26) class WSGIApp(object): def __init__(self): self.jinja_env = Environment(loader=FileSystemLoader('/srv/spotter/templates'), autoescape=True, lstrip_blocks=True, trim_blocks=True) self.jinja_env.globals.update(is_service_autostarted=tools.is_service_autostarted) self.jinja_env.globals.update(is_service_started=tools.is_service_started) def __call__(self, environ, start_response): return self.wsgi_app(environ, start_response) def wsgi_app(self, environ, start_response): request = Request(environ) # Enhance request request.mgr = AppMgr() request.session = WSGISession(request.cookies, SESSION_KEY) request.session.lang = WSGILang() # Dispatch request response = self.dispatch_request(request) # Save session if changed request.session.save(response) return response(environ, start_response) def dispatch_request(self, request): adapter = self.get_url_map(request.session).bind_to_environ(request.environ) try: endpoint, values = adapter.match() return getattr(self, endpoint)(request, **values) except NotFound as e: # Return custom 404 page response = self.render_template('404.html', request) response.status_code = 404 return response except HTTPException as e: return e def get_url_map(self, session): rules = [ Rule('/', endpoint='portal_view'), Rule('/login', methods=['GET'], endpoint='login_view'), Rule('/login', methods=['POST'], endpoint='login_action'), Rule('/logout', endpoint='logout_action') ] if session['admin']: rules += [ Rule('/setup-host', endpoint='setup_host_view'), Rule('/setup-apps', endpoint='setup_apps_view'), Rule('/update-host', endpoint='update_host_action'), Rule('/verify-dns', endpoint='verify_dns_action'), Rule('/verify-https', endpoint='verify_http_action', defaults={'proto': 'https'}), Rule('/verify-http', endpoint='verify_http_action', defaults={'proto': 'http'}), Rule('/update-cert', endpoint='update_cert_action'), Rule('/update-common', endpoint='update_common_action'), Rule('/update-app-visibility', endpoint='update_app_visibility_action'), Rule('/update-app-autostart', endpoint='update_app_autostart_action'), Rule('/start-app', endpoint='start_app_action'), Rule('/stop-app', endpoint='stop_app_action'), Rule('/update-password', endpoint='update_password_action'), Rule('/shutdown-vm', endpoint='shutdown_vm_action'), Rule('/reboot-vm', endpoint='reboot_vm_action'), ] return Map(rules) def render_template(self, template_name, request, **context): # Enhance context context['conf'] = request.mgr.conf context['session'] = request.session # Render template t = self.jinja_env.get_template(template_name) return Response(t.render(context), mimetype='text/html') def render_json(self, data): return Response(json.dumps(data), mimetype='application/json') def login_view(self, request): return self.render_template('login.html', request) def login_action(self, request): password = request.form['password'] if tools.adminpwd_verify(password, request.mgr.conf['host']['adminpwd']): request.session['admin'] = True return redirect('/') else: return self.render_template('login.html', request, message=request.session.lang.bad_password()) def logout_action(self, request): request.session.reset() return redirect('/') def portal_view(self, request): # Default view. If domain is set to the default dummy domain, redirects to first-run setup instead. if request.mgr.domain == 'spotter.vm': request.session['admin'] = True return redirect('/setup-host') if request.session['admin']: return self.render_template('portal-admin.html', request) return self.render_template('portal-user.html', request) def setup_host_view(self, request): # First-run setup view. ex_ipv4 = tools.get_external_ipv4() ex_ipv6 = tools.get_external_ipv6() in_ipv4 = tools.get_local_ipv4() in_ipv6 = tools.get_local_ipv6() is_letsencrypt = os.path.exists('/etc/periodic/daily/acme-sh') cert_info = tools.get_cert_info() return self.render_template('setup-host.html', request, ex_ipv4=ex_ipv4, ex_ipv6=ex_ipv6, in_ipv4=in_ipv4, in_ipv6=in_ipv6, is_letsencrypt=is_letsencrypt, cert_info=cert_info) def setup_apps_view(self, request): # Application manager view. return self.render_template('setup-apps.html', request) def update_host_action(self, request): # Update domain and port, then restart nginx try: domain = request.form['domain'] port = request.form['port'] request.mgr.update_host(domain, port, False) server_name = request.environ['HTTP_X_FORWARDED_SERVER_NAME'] url = '{}/setup-host'.format(tools.compile_url(server_name, port)) response = self.render_json({'ok': request.session.lang.host_updated(url, url)}) response.call_on_close(tools.restart_nginx) return response except BadRequest: return self.render_json({'error': request.session.lang.malformed_request()}) except InvalidValueException as e: if e.args[0] == 'domain': return self.render_json({'error': request.session.lang.invalid_domain(domain)}) if e.args[0] == 'port': return self.render_json({'error': request.session.lang.invalid_port(port)}) def verify_dns_action(self, request): # Check if all FQDNs for all applications are resolvable and point to current external IP mgr = request.mgr domains = [mgr.domain]+['{}.{}'.format(mgr.conf['apps'][app]['host'], mgr.domain) for app in mgr.conf['apps']] ipv4 = tools.get_external_ipv4() ipv6 = tools.get_external_ipv6() for domain in domains: try: a = tools.resolve_ip(domain, 'A') aaaa = tools.resolve_ip(domain, 'AAAA') if not a and not aaaa: return self.render_json({'error': request.session.lang.dns_record_does_not_exist(domain)}) if a and a != ipv4: return self.render_json({'error': request.session.lang.dns_record_mismatch(domain, a, ipv4)}) if aaaa and aaaa != ipv6: return self.render_json({'error': request.session.lang.dns_record_mismatch(domain, aaaa, ipv6)}) except: return self.render_json({'error': request.session.lang.dns_timeout()}) return self.render_json({'ok': request.session.lang.dns_records_ok()}) def verify_http_action(self, request, **kwargs): # Check if all applications are accessible from the internet using 3rd party ping service proto = kwargs['proto'] mgr = request.mgr port = mgr.port if proto == 'https' else '80' domains = [mgr.domain]+['{}.{}'.format(mgr.conf['apps'][app]['host'], mgr.domain) for app in mgr.conf['apps']] for domain in domains: url = tools.compile_url(domain, port, proto) try: if not tools.ping_url(url): return self.render_json({'error': request.session.lang.http_host_not_reachable(url)}) except: return self.render_json({'error': request.session.lang.http_timeout()}) return self.render_json({'ok': request.session.lang.http_hosts_ok(port)}) def update_cert_action(self, request): # Update certificate - either request via Let's Encrypt or manually upload files try: if request.form['method'] not in ['auto', 'manual']: raise BadRequest() if request.form['method'] == 'manual': if not request.files['public']: return self.render_json({'error': request.session.lang.cert_file_missing()}) if not request.files['private']: return self.render_json({'error': request.session.lang.key_file_missing()}) request.files['public'].save('/tmp/public.pem') request.files['private'].save('/tmp/private.pem') request.mgr.install_cert('/tmp/public.pem', '/tmp/private.pem') os.unlink('/tmp/public.pem') os.unlink('/tmp/private.pem') else: request.mgr.request_cert() except BadRequest: return self.render_json({'error': request.session.lang.malformed_request()}) except: return self.render_json({'error': request.session.lang.cert_request_error()}) url = tools.compile_url(request.mgr.domain, request.mgr.port) return self.render_json({'ok': request.session.lang.cert_installed(url, url)}) def update_common_action(self, request): # Update common settings shared between apps - admin e-mail address, Google Maps API key try: request.mgr.update_common(request.form['email'], request.form['gmaps-api-key']) except BadRequest: return self.render_json({'error': request.session.lang.malformed_request()}) return self.render_json({'ok': request.session.lang.common_updated()}) def update_app_visibility_action(self, request): # Update application visibility on portal page try: if request.form['value'] == 'true': request.mgr.show_tiles(request.form['app']) else: request.mgr.hide_tiles(request.form['app']) except (BadRequest, InvalidValueException): return self.render_json({'error': request.session.lang.malformed_request()}) return self.render_json({'ok': 'ok'}) def update_app_autostart_action(self, request): # Update value determining if the app should be automatically started after VM boot try: if request.form['value'] == 'true': request.mgr.enable_autostart(request.form['app']) else: request.mgr.disable_autostart(request.form['app']) except (BadRequest, InvalidValueException): return self.render_json({'error': request.session.lang.malformed_request()}) return self.render_json({'ok': 'ok'}) def start_app_action(self, request): # Starts application along with its dependencies try: request.mgr.start_app(request.form['app']) except (BadRequest, InvalidValueException): return self.render_json({'error': request.session.lang.malformed_request()}) except: return self.render_json({'error': request.session.lang.stop_start_error()}) return self.render_json({'ok': request.session.lang.app_started()}) def stop_app_action(self, request): # Stops application along with its dependencies try: request.mgr.stop_app(request.form['app']) except (BadRequest, InvalidValueException): return self.render_json({'error': request.session.lang.malformed_request()}) except: return self.render_json({'error': request.session.lang.stop_start_error()}) return self.render_json({'ok': request.session.lang.app_stopped()}) def update_password_action(self, request): # Updates password for both HDD encryption (LUKS-on-LVM) and admin account to spotter-appmgr try: if request.form['newpassword'] != request.form['newpassword2']: return self.render_json({'error': request.session.lang.password_mismatch()}) if request.form['newpassword'] == '': return self.render_json({'error': request.session.lang.password_empty()}) # No need to explicitly validate old password, update_luks_password will raise exception if it's wrong request.mgr.update_password(request.form['oldpassword'], request.form['newpassword']) except: return self.render_json({'error': request.session.lang.bad_password()}) return self.render_json({'ok': request.session.lang.password_changed()}) def reboot_vm_action(self, request): # Reboots VM response = self.render_json({'ok': request.session.lang.reboot_initiated()}) response.call_on_close(tools.reboot_vm) return response def shutdown_vm_action(self, request): # Shuts down VM response = self.render_json({'ok': request.session.lang.shutdown_initiated()}) response.call_on_close(tools.shutdown_vm) return response class InvalidRecordException(Exception): pass