OpenSecurity/bin/opensecurityd.pyw
author BarthaM@N3SIM1218.D03.arc.local
Fri, 29 Aug 2014 11:44:45 +0100
changeset 220 f5805ee62d80
parent 219 9480e5ba1a82
child 221 853af9cfab6a
permissions -rwxr-xr-x
Added temporary Initialize button to Tray. has to be clicked after import to start the system.
Rewrite of the init.sh script in progress.
mb@63
     1
#!/bin/env python
mb@63
     2
# -*- coding: utf-8 -*-
mb@63
     3
mb@63
     4
# ------------------------------------------------------------
mb@63
     5
# opensecurityd
BarthaM@212
     6
#   
mb@63
     7
# the opensecurityd as RESTful server
mb@63
     8
#
mb@63
     9
# Autor: Oliver Maurhart, <oliver.maurhart@ait.ac.at>
BarthaM@212
    10
#        Mihai Bartha, <mihai.bartha@ait.ac.at>       
mb@63
    11
#
mb@63
    12
# Copyright (C) 2013 AIT Austrian Institute of Technology
mb@63
    13
# AIT Austrian Institute of Technology GmbH
mb@63
    14
# Donau-City-Strasse 1 | 1220 Vienna | Austria
mb@63
    15
# http://www.ait.ac.at
mb@63
    16
#
mb@63
    17
# This program is free software; you can redistribute it and/or
mb@63
    18
# modify it under the terms of the GNU General Public License
mb@63
    19
# as published by the Free Software Foundation version 2.
mb@63
    20
# 
mb@63
    21
# This program is distributed in the hope that it will be useful,
mb@63
    22
# but WITHOUT ANY WARRANTY; without even the implied warranty of
mb@63
    23
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
mb@63
    24
# GNU General Public License for more details.
mb@63
    25
# 
mb@63
    26
# You should have received a copy of the GNU General Public License
mb@63
    27
# along with this program; if not, write to the Free Software
mb@63
    28
# Foundation, Inc., 51 Franklin Street, Fifth Floor, 
mb@63
    29
# Boston, MA  02110-1301, USA.
mb@63
    30
# ------------------------------------------------------------
mb@63
    31
mb@63
    32
mb@63
    33
# ------------------------------------------------------------
mb@63
    34
# imports
mb@63
    35
oliver@130
    36
import json
mb@63
    37
import os
mb@63
    38
import os.path
mb@63
    39
import subprocess
mb@63
    40
import sys
oliver@91
    41
import tempfile
mb@63
    42
import web
mb@63
    43
oliver@87
    44
import vmmanager
mb@63
    45
mb@63
    46
# local
oliver@144
    47
import __init__ as opensecurity
oliver@91
    48
from cygwin import Cygwin
oliver@147
    49
from environment import Environment
oliver@193
    50
from opensecurity_util import logger, showTrayMessage
oliver@193
    51
mb@63
    52
mb@63
    53
mb@63
    54
# ------------------------------------------------------------
mb@63
    55
# const
mb@63
    56
mb@63
    57
"""All the URLs we know mapping to class handler"""
mb@63
    58
opensecurity_urls = (
mb@63
    59
    '/browsing',                        'os_browsing',          # http://localhost:8080/browsing                                GET
oliver@91
    60
    '/fetch_initial_image',             'os_fetch_image',       # http://localhost:8080/fetch_initial_image                     GET
oliver@91
    61
    '/init',                            'os_init',              # http://localhost:8080/init                                    GET
oliver@107
    62
    '/initial_image',                   'os_initial_image',     # http://localhost:8080/initial_image                           GET
mb@63
    63
    '/sdvms',                           'os_sdvms',             # http://localhost:8080/sdvms                                   GET, PUT
mb@63
    64
    '/sdvms/(.*)/application/(.*)',     'os_sdvm_application',  # http://localhost:8080/sdvms/[VMNAME]/application/[COMMAND]    GET
mb@63
    65
    '/sdvms/(.*)/ip',                   'os_sdvm_ip',           # http://localhost:8080/sdvms/[VMNAME]/ip                       GET
mb@63
    66
    '/sdvms/(.*)/start',                'os_sdvm_start',        # http://localhost:8080/sdvms/[VMNAME]/start                    GET
mb@63
    67
    '/sdvms/(.*)/stop',                 'os_sdvm_stop',         # http://localhost:8080/sdvms/[VMNAME]/stop                     GET
mb@63
    68
    '/sdvms/(.*)',                      'os_sdvm',              # http://localhost:8080/sdvms/[VMNAME]                          GET, DELETE
oliver@93
    69
    '/setup',                           'os_setup',             # http://localhost:8080/setup                                   GET
mb@63
    70
    '/vms',                             'os_vms',               # http://localhost:8080/vms                                     GET
mb@63
    71
    '/vms/(.*)',                        'os_vm',                # http://localhost:8080/vms/[VMNAME]                            GET
oliver@87
    72
    '/update_template',                 'os_update_template',   # http://localhost:8080/update_template                         GET
oliver@87
    73
    '/terminate',                       'os_terminate',         # http://localhost:8080/terminate                               GET
BarthaM@212
    74
    '/initialize',                      'os_initialize',        # http://localhost:8080/initialize                               GET
oliver@87
    75
    '/',                                'os_root'               # http://localhost:8080/                                        GET
mb@63
    76
)
mb@63
    77
oliver@87
    78
mb@66
    79
# ------------------------------------------------------------
mb@63
    80
# vars
mb@63
    81
mb@63
    82
# Global VMManager instance
oliver@86
    83
gvm_mgr = None
oliver@86
    84
oliver@138
    85
# server instance
oliver@138
    86
server = None
oliver@138
    87
oliver@138
    88
mb@63
    89
# ------------------------------------------------------------
mb@63
    90
# code
mb@63
    91
mb@63
    92
mb@63
    93
class os_browsing:
mb@63
    94
    """OpenSecurity '/browsing' handler
mb@63
    95
    
mb@63
    96
    - GET: Start and prepare a new SecurityVM for Internet Browsing. Return the name of the VM.
mb@63
    97
    """
mb@63
    98
    
mb@63
    99
    def GET(self):
BarthaM@213
   100
        args = web.input()
oliver@74
   101
        log_call(web.ctx.environ)
oliver@87
   102
        global gvm_mgr
mb@63
   103
        try:
BarthaM@213
   104
            proxy = None
BarthaM@213
   105
            if 'ProxyServer' in args:
BarthaM@213
   106
                proxy = args['ProxyServer']
BarthaM@213
   107
            result = gvm_mgr.handleBrowsingRequest(proxy)
mb@90
   108
            return result
mb@63
   109
        except:
mb@63
   110
            raise web.internalerror()
mb@63
   111
oliver@87
   112
       
oliver@91
   113
class os_fetch_image:
oliver@91
   114
    """OpenSecurity '/fetch_initial_image' handler
oliver@91
   115
    
oliver@91
   116
    - GET: fetch the initial image from the X-Net Servers
oliver@91
   117
            The initial image is stored in the
oliver@91
   118
            Virtual Box default machine path.
oliver@91
   119
            The result to this call is a temprary file
oliver@91
   120
            which shows the progress (or error state)
oliver@91
   121
            of this call.
oliver@91
   122
    """
oliver@91
   123
    
oliver@91
   124
    def GET(self):
oliver@91
   125
        
oliver@91
   126
        log_call(web.ctx.environ)
oliver@91
   127
        global gvm_mgr
oliver@91
   128
oliver@147
   129
        trace_file_name = os.path.join(Environment('OpenSecurity').log_path, 'OpenSecurity_fetch_image.log')
oliver@91
   130
        trace_file = open(trace_file_name, 'w+')
oliver@91
   131
oliver@91
   132
        machine_folder = Cygwin.cygPath(gvm_mgr.getMachineFolder()) 
oliver@164
   133
        download_initial_image_script = Cygwin.cygPath(os.path.abspath(os.path.join(os.path.split(__file__)[0], 'download_initial_image.sh')))
BarthaM@170
   134
        Cygwin.bashExecute('\\"' + download_initial_image_script + '\\" \'' + machine_folder + '\'', wait_return = False, stdout = trace_file, stderr = trace_file) 
oliver@91
   135
oliver@116
   136
        res = '{ "fetch_log": "' + trace_file_name.replace('\\', '\\\\') + '" }'
oliver@115
   137
        return res
oliver@91
   138
oliver@147
   139
oliver@91
   140
class os_init:
oliver@91
   141
    """OpenSecurity '/init' handler
oliver@91
   142
    
oliver@91
   143
    - GET: Do initial import of OsecVM.ova
oliver@91
   144
    """
oliver@91
   145
    
oliver@91
   146
    def GET(self):
oliver@91
   147
        log_call(web.ctx.environ)
oliver@91
   148
        global gvm_mgr
oliver@91
   149
BarthaM@170
   150
        gvm_mgr.stop()
BarthaM@170
   151
        gvm_mgr.cleanup()
BarthaM@170
   152
        
BarthaM@170
   153
        if gvm_mgr.vmRootName in gvm_mgr.listVM():
BarthaM@170
   154
            gvm_mgr.poweroffVM(gvm_mgr.vmRootName)
BarthaM@171
   155
            tmplateUUID = gvm_mgr.getTemplateUUID()
BarthaM@171
   156
            if tmplateUUID != None:
BarthaM@171
   157
                logger.debug('found parent uuid ' + tmplateUUID)
BarthaM@219
   158
                gvm_mgr.detachStorage(gvm_mgr.vmRootName)
BarthaM@171
   159
                gvm_mgr.removeSnapshots(tmplateUUID)
BarthaM@171
   160
                gvm_mgr.removeImage(tmplateUUID)
BarthaM@171
   161
            else:
BarthaM@171
   162
                logger.debug('parent uuid not found')
BarthaM@171
   163
            gvm_mgr.removeVM(gvm_mgr.vmRootName)
BarthaM@219
   164
        gvm_mgr.removeVMFolder(gvm_mgr.vmRootName)
BarthaM@170
   165
        
oliver@147
   166
        trace_file_name = os.path.join(Environment('OpenSecurity').log_path, 'OpenSecurity_initial_import.log')
oliver@91
   167
        trace_file = open(trace_file_name, 'w+')
oliver@91
   168
oliver@91
   169
        vm_image = Cygwin.cygPath(gvm_mgr.getMachineFolder()) + '/OsecVM.ova'
BarthaM@220
   170
        
oliver@164
   171
        initial_import_script = Cygwin.cygPath(os.path.abspath(os.path.join(os.path.split(__file__)[0], 'initial_vm.sh')))
BarthaM@170
   172
        Cygwin.bashExecute('\\"' + initial_import_script + '\\" \'' + vm_image + '\'', wait_return = False, stdout = trace_file, stderr = trace_file) 
oliver@116
   173
        res = '{ "init_log": "' + trace_file_name.replace('\\', '\\\\') + '" }'
BarthaM@220
   174
        
oliver@115
   175
        return res
oliver@91
   176
oliver@91
   177
oliver@107
   178
class os_initial_image:
oliver@107
   179
    """OpenSecurity '/initial_image' handler
oliver@107
   180
    
oliver@107
   181
    - GET: Return what we have as initial image.
oliver@107
   182
    """
oliver@107
   183
    
oliver@107
   184
    def GET(self):
oliver@107
   185
        log_call(web.ctx.environ)
oliver@107
   186
        global gvm_mgr
oliver@107
   187
        t = os.path.join(gvm_mgr.systemProperties['Default machine folder'], 'OsecVM.ova')
oliver@107
   188
        res = ''
oliver@107
   189
        if os.path.isfile(t):
oliver@107
   190
            res = '{"initial_template": { '
oliver@107
   191
            res += '"name": "OsecVM.ova", '
oliver@107
   192
            res += '"path": "' + t.replace('\\', '\\\\') + '", '
oliver@107
   193
            res += '"size": ' + str(os.path.getsize(t)) + ', ' 
oliver@107
   194
            res += '"date": ' + str(os.path.getmtime(t)) + ''
oliver@112
   195
            res += '}}'
oliver@107
   196
        return res
oliver@107
   197
oliver@107
   198
oliver@87
   199
class os_root:
oliver@87
   200
    """OpenSecurity '/' handler
oliver@87
   201
    
oliver@87
   202
    - GET: give information about current installation.
oliver@87
   203
    """
oliver@87
   204
    
oliver@87
   205
    def GET(self):
oliver@87
   206
        log_call(web.ctx.environ)
oliver@87
   207
        global gvm_mgr
oliver@130
   208
oliver@130
   209
        # create a json string and pretty print it
oliver@107
   210
        res = '{"os_server": { '
oliver@144
   211
        res += '"version": "' + opensecurity.__version__ + '" '
oliver@130
   212
        res += ', "virtual box systemproperties": ' + str(gvm_mgr.systemProperties).replace("'", '"') 
oliver@130
   213
        res += ', "current temporary folder": "' + tempfile.gettempdir().replace('\\', '\\\\') + '"'
oliver@147
   214
        res += ', "current log folder": "' + Environment('OpenSecurity').log_path.replace('\\', '\\\\') + '"'
oliver@130
   215
oliver@130
   216
        try:
oliver@130
   217
            res += ', "whoami": "' + Cygwin.bashExecute('whoami')[1].strip() + '"'
oliver@130
   218
        except:
oliver@130
   219
            res += ', "whoami": "FAILED"'
oliver@130
   220
oliver@130
   221
        try:
oliver@130
   222
            res += ', "mount": ' + str(Cygwin.bashExecute('mount')[1].split('\n')[:-1]).replace("'", '"')
oliver@130
   223
        except:
oliver@130
   224
            res += ', "mount": "FAILED"'
oliver@130
   225
oliver@130
   226
        try:
oliver@130
   227
            res += ', "cygpath --windows ~": "' + Cygwin.bashExecute('cygpath --windows ~')[1].strip().replace('\\', '\\\\') + '"'
oliver@130
   228
        except:
oliver@130
   229
            res += ', "cygpath --windows ~": "FAILED"'
oliver@130
   230
oliver@131
   231
oliver@131
   232
        res += ', "status message": "' + gvm_mgr.status_message.replace('"', "'") + '"'
oliver@131
   233
oliver@107
   234
        res += '}}'
oliver@130
   235
oliver@130
   236
        # loading it into json and print it again ensures
oliver@130
   237
        # we really do have a valid RFC conform json string
oliver@130
   238
        # created (as long as the python json module is RFC conform)
oliver@130
   239
        return json.dumps(json.loads(res), indent = 4)
oliver@87
   240
oliver@87
   241
oliver@204
   242
mb@63
   243
class os_sdvm:
mb@63
   244
    """OpenSecurity '/sdvms/[VM]' handler
mb@63
   245
    
mb@63
   246
    - GET: Information about a specific SecurityVM
mb@63
   247
    - DELETE: Remove a specific
mb@63
   248
    """
mb@63
   249
    
mb@63
   250
    def GET(self, name):
oliver@74
   251
        log_call(web.ctx.environ)
oliver@87
   252
        global gvm_mgr
oliver@203
   253
        return json.dumps(gvm_mgr.getVMInfo(name), indent = 4)
mb@63
   254
mb@63
   255
    def DELETE(self, name):
oliver@74
   256
        log_call(web.ctx.environ)
oliver@87
   257
        global gvm_mgr
oliver@87
   258
        return gvm_mgr.removeVM(name)
mb@63
   259
            
mb@63
   260
mb@63
   261
class os_sdvm_application:
mb@63
   262
    """OpenSecurity '/sdvms/[VM]/application/[CMD]' handler
mb@63
   263
    
mb@63
   264
    - GET: start application with given command in the VM.
mb@63
   265
    """
mb@63
   266
    
mb@63
   267
    def GET(self, name, command):
oliver@74
   268
        log_call(web.ctx.environ)
oliver@87
   269
        global gvm_mgr
mb@63
   270
        command = '/' + command
oliver@193
   271
        showTrayMessage('Launching application in isolated VM...', 7000)
oliver@87
   272
        result = Cygwin.sshExecuteX11(command, gvm_mgr.getHostOnlyIP(name), 'osecuser', Cygwin.cygPath(gvm_mgr.getMachineFolder()) + '/' + name + '/dvm_key'  )
oliver@165
   273
        return 'Command ' + str(command) + ' started on VM "' + name + '" with IP ' + gvm_mgr.getHostOnlyIP(name)
mb@63
   274
    
mb@63
   275
mb@63
   276
class os_sdvm_ip:
mb@63
   277
    """OpenSecurity '/sdvms/[VM]/ip' handler
mb@63
   278
    
mb@63
   279
    - GET: give IP of SecurityVM.
mb@63
   280
    """
mb@63
   281
    
mb@63
   282
    def GET(self, name):
oliver@74
   283
        log_call(web.ctx.environ)
oliver@87
   284
        global gvm_mgr
oliver@87
   285
        return gvm_mgr.getHostOnlyIP(name)
mb@63
   286
            
mb@63
   287
mb@63
   288
class os_sdvm_start:
mb@63
   289
    """OpenSecurity '/sdvms/[VM]/start' handler
mb@63
   290
    
mb@63
   291
    - GET: Start specific SecuirtyVM.
mb@63
   292
    """
mb@63
   293
    
mb@63
   294
    def GET(self, name):
oliver@74
   295
        log_call(web.ctx.environ)
oliver@87
   296
        global gvm_mgr
oliver@87
   297
        return gvm_mgr.startVM(name)
mb@63
   298
            
mb@63
   299
mb@63
   300
class os_sdvm_stop:
mb@63
   301
    """OpenSecurity '/sdvms/[VM]/stop' handler
mb@63
   302
    
mb@63
   303
    - GET: stop specific Secuirty VM.
mb@63
   304
    """
mb@63
   305
    
mb@63
   306
    def GET(self, name):
oliver@74
   307
        log_call(web.ctx.environ)
oliver@87
   308
        global gvm_mgr
oliver@87
   309
        return gvm_mgr.stopVM(name)
mb@63
   310
            
mb@63
   311
mb@63
   312
class os_sdvms:
mb@63
   313
    """OpenSecurity '/sdvms' handler
mb@63
   314
    
mb@63
   315
    - GET: list all available secuirty VMs.
mb@63
   316
    - POST: create new security vm.
mb@63
   317
    """
mb@63
   318
    
mb@63
   319
    def GET(self):
mb@63
   320
        """get the list of SDVMs"""
oliver@74
   321
        log_call(web.ctx.environ)
oliver@87
   322
        global gvm_mgr
oliver@204
   323
oliver@204
   324
        d = {}
oliver@204
   325
        for sdvm in gvm_mgr.listSDVM():
oliver@204
   326
            d[sdvm] = gvm_mgr.getHostOnlyIP(sdvm)
oliver@204
   327
oliver@204
   328
        return json.dumps(d, indent = 4)
mb@63
   329
            
mb@63
   330
    def POST(self):
mb@63
   331
        """create a new SDVM"""
oliver@74
   332
        log_call(web.ctx.environ)
oliver@87
   333
        global gvm_mgr
oliver@74
   334
        
mb@63
   335
        # get a new vm-name
oliver@87
   336
        name = gvm_mgr.generateSDVMName()
mb@63
   337
        try:
oliver@87
   338
            gvm_mgr.createVM(name)
mb@63
   339
        except:
mb@63
   340
            raise web.internalerror()
mb@63
   341
            
mb@63
   342
        return name
mb@63
   343
            
oliver@87
   344
oliver@93
   345
class os_setup:
oliver@93
   346
    """OpenSecurity '/setup' handler
oliver@93
   347
    
BarthaM@172
   348
    - GET: Give user some info how to setup the OpenSecurity environment
oliver@93
   349
    """
oliver@93
   350
    
oliver@93
   351
    def GET(self):
oliver@93
   352
oliver@93
   353
        log_call(web.ctx.environ)
oliver@93
   354
oliver@93
   355
        page = """
oliver@93
   356
        <html>
oliver@93
   357
        <body>
oliver@93
   358
        <h1>Setup OpenSecurity</h1>
oliver@93
   359
        In order to setup OpenSecurity an inital VM image has to be downloaded and imported:<br/>
oliver@93
   360
        <ul>
oliver@93
   361
            <li>Download initial VM image: <a href="/fetch_initial_image">fetch_initial_image</a>
oliver@93
   362
            <li>Import initial VM: <a href="/init">init</a>
oliver@93
   363
        </ul>
oliver@93
   364
        </body>
oliver@93
   365
        </html>
oliver@93
   366
        """
oliver@93
   367
        return page
oliver@93
   368
oliver@93
   369
oliver@87
   370
class os_terminate:
oliver@87
   371
    """OpenSecurity '/terminate' handler
oliver@87
   372
    
oliver@87
   373
    - GET: terminate the opensecurityd.
oliver@87
   374
oliver@87
   375
    TODO: need to find a better way doing this, and not via the
oliver@87
   376
          REST api. Maybe hack web.py server code?
oliver@87
   377
    """
oliver@87
   378
    
oliver@87
   379
    def GET(self):
oliver@87
   380
        log_call(web.ctx.environ)
oliver@139
   381
        global gvm_mgr
BarthaM@170
   382
        gvm_mgr.stop()
oliver@139
   383
        gvm_mgr.cleanup()
oliver@138
   384
        global server
oliver@138
   385
        server.stop()
oliver@87
   386
        return None
oliver@87
   387
BarthaM@212
   388
class os_initialize:
BarthaM@212
   389
    """OpenSecurity '/initialize' handler
BarthaM@212
   390
    
BarthaM@212
   391
    - GET: initialize / starts the vmmanager.
BarthaM@212
   392
BarthaM@212
   393
    """
BarthaM@212
   394
    
BarthaM@212
   395
    def GET(self):
BarthaM@212
   396
        log_call(web.ctx.environ)
BarthaM@212
   397
        global gvm_mgr
BarthaM@212
   398
        gvm_mgr.cleanup()
BarthaM@212
   399
        gvm_mgr.start()
BarthaM@212
   400
        global server
BarthaM@212
   401
        server.run()
BarthaM@212
   402
        return None
oliver@87
   403
oliver@87
   404
class os_update_template:
oliver@87
   405
    """OpenSecurity '/update_template' handler
oliver@87
   406
    
oliver@87
   407
    - GET: update template vm
oliver@87
   408
    """
oliver@87
   409
    
oliver@87
   410
    def GET(self):
oliver@87
   411
        #return gvm_mgr.guestExecute('SecurityDVM', 'sudo apt-get -y update')
oliver@87
   412
        global gvm_mgr
oliver@87
   413
        log_call(web.ctx.environ)
oliver@87
   414
        return gvm_mgr.updateTemplate()
oliver@87
   415
oliver@87
   416
mb@63
   417
class os_vm:
mb@63
   418
    """OpenSecurity '/vms/[VM]' handler
mb@63
   419
    
mb@63
   420
    - GET: list information of arbitrary VM.
mb@63
   421
    """
mb@63
   422
    
mb@63
   423
    def GET(self, name):
oliver@74
   424
        log_call(web.ctx.environ)
oliver@87
   425
        global gvm_mgr
oliver@87
   426
        return gvm_mgr.getVMInfo(name)
mb@63
   427
            
mb@63
   428
mb@63
   429
class os_vms:
mb@63
   430
    """OpenSecurity '/vms' handler
mb@63
   431
    
mb@63
   432
    - GET: list all (also non Security) VMs.
mb@63
   433
    """
mb@63
   434
    
mb@63
   435
    def GET(self):
oliver@74
   436
        log_call(web.ctx.environ)
oliver@87
   437
        global gvm_mgr
oliver@112
   438
        return str(gvm_mgr.listVM()).replace("'",'"')
mb@63
   439
            
mb@63
   440
oliver@74
   441
def log_call(web_environ):
oliver@74
   442
    """log the incoming call to the REST api"""
oliver@74
   443
    try:
oliver@74
   444
        call = 'REST ' +  web_environ['REQUEST_METHOD'] + ' ' + web_environ['REQUEST_URI'] + ' from ' + web_environ['REMOTE_ADDR'] + ':' + web_environ['REMOTE_PORT']
oliver@74
   445
        logger.debug(call)
oliver@74
   446
    except:
oliver@74
   447
        pass
oliver@74
   448
oliver@86
   449
oliver@86
   450
def main():
oliver@86
   451
    """main startup for the opensecuirityd"""
oliver@87
   452
oliver@139
   453
    global gvm_mgr
oliver@139
   454
    global server
oliver@139
   455
oliver@87
   456
    logger.debug('Starting OpenSecurity REST server')
oliver@87
   457
oliver@87
   458
    # ensure a VMManger is yet loaded
oliver@87
   459
    gvm_mgr = vmmanager.VMManager.getInstance()
BarthaM@212
   460
    gvm_mgr.start()
oliver@98
   461
    # tweak sys.argv to control wep.py server start behavior
oliver@98
   462
    sys.argv = [__file__, "8080"]
oliver@87
   463
    server = web.application(opensecurity_urls, globals(), autoreload = False)
mb@63
   464
    server.run()
oliver@87
   465
    
oliver@87
   466
    logger.debug('Stopped OpenSecurity REST server')
oliver@86
   467
oliver@86
   468
oliver@88
   469
def stop():
oliver@88
   470
    """stop the opensecuirityd"""
oliver@88
   471
oliver@88
   472
    # calling sys.exit() raises a SystemExit exception
oliver@88
   473
    # of the WSGI Server to let it wind down
oliver@89
   474
    # gracefully
oliver@88
   475
    sys.exit(0)
oliver@88
   476
oliver@86
   477
# start
oliver@86
   478
if __name__ == "__main__":
oliver@86
   479
    main()
BarthaM@170
   480
    sys.exit(0)
oliver@86
   481