]>
Commit | Line | Data |
---|---|---|
1 | #!/usr/bin/perl -w | |
2 | use v5.14; | |
3 | ||
4 | use Apache2::Authen::Passphrase qw/pwcheck/; | |
5 | use Apache2::AuthzCaps qw/hascaps/; | |
6 | use Gruntmaster::Data; | |
7 | use Plack::App::Gruntmaster; | |
8 | use Plack::Builder; | |
9 | use Plack::Request; | |
10 | use Digest::SHA qw/sha256/; | |
11 | use Log::Log4perl; | |
12 | ||
13 | use constant ACCESSLOG_FORMAT => '%{X-Forwarded-For}i|%h %u "%r" %>s %b "%{Referer}i" "%{User-agent}i"'; | |
14 | use constant CONTENT_SECURITY_POLICY => q,default-src 'none'; script-src 'self' www.google-analytics.com; style-src 'self'; img-src 'self' www.google-analytics.com; connect-src 'self',; | |
15 | ||
16 | $Apache2::AuthzCaps::rootdir = $Apache2::Authen::Passphrase::rootdir; | |
17 | my $word = qr,(\w+),a; | |
18 | ||
19 | sub debug { | |
20 | local $Log::Log4perl::caller_depth = $Log::Log4perl::caller_depth + 1; | |
21 | $_[0]->{'psgix.logger'}->({qw/level debug message/ => $_[1]}) | |
22 | } | |
23 | ||
24 | sub some_auth_required { | |
25 | my $r = Plack::Request->new($_[0]); | |
26 | return 1 if $_[0]->{'gruntmaster.reqadmin'} || $r->path eq '/action/passwd' || $r->path =~ m,/pb/$word/submit$,; | |
27 | return 1 if $r->path =~ m,^/ct/$word/pb/$word, && time < contest_end $1; | |
28 | 0 | |
29 | } | |
30 | ||
31 | sub admin_required { | |
32 | local $_ = $_[0]; | |
33 | return problem_owner $1 if m,^/pb/$word, && problem_private $1; | |
34 | return job_user $1 if m,^/log/(?:job|src)/$word, && job_private $1; | |
35 | return contest_owner $1 if m,^/ct/$word/(?:pb|log), && time < contest_start $1; | |
36 | if (m,^/ct/$word/log/(?:job|src)/$word, && time < contest_end $1){ | |
37 | local $Gruntmaster::Data::contest = $1; | |
38 | return job_user $2; | |
39 | } | |
40 | 0 | |
41 | } | |
42 | ||
43 | sub require_admin { | |
44 | my $app = $_[0]; | |
45 | sub { | |
46 | local *__ANON__ = "require_admin_middleware"; | |
47 | my $env = $_[0]; | |
48 | my $r = Plack::Request->new($env); | |
49 | $env->{'gruntmaster.reqadmin'} = admin_required $r->path; | |
50 | $app->($env) | |
51 | } | |
52 | } | |
53 | ||
54 | my %authen_cache; | |
55 | ||
56 | sub authenticate { | |
57 | my ($user, $pass, $env) = @_; | |
58 | my $cache_key = sha256 "$user:$pass"; | |
59 | my $time = $authen_cache{$cache_key} // 0; | |
60 | if ($time >= time - 300) { | |
61 | return 1; | |
62 | } else { | |
63 | delete $authen_cache{$cache_key}; | |
64 | } | |
65 | ||
66 | return unless eval { | |
67 | pwcheck $user, $pass; | |
68 | 1 | |
69 | }; | |
70 | $authen_cache{$cache_key} = time; | |
71 | ||
72 | return if $env->{'gruntmaster.reqadmin'} && $env->{'gruntmaster.reqadmin'} ne $user && !hascaps $user, 'gmadm'; | |
73 | 1 | |
74 | } | |
75 | ||
76 | Log::Log4perl->init('log.conf'); | |
77 | my $access_logger = Log::Log4perl->get_logger('access'); | |
78 | ||
79 | builder { | |
80 | enable_if { $_[0]->{PATH_INFO} eq '/ok' } sub { sub{ [200, [], []] }}; | |
81 | enable 'AccessLog', format => ACCESSLOG_FORMAT, logger => sub { $access_logger->info(@_) }; | |
82 | enable 'ContentLength'; | |
83 | enable Header => set => ['Content-Security-Policy', CONTENT_SECURITY_POLICY]; | |
84 | enable_if { $_[0]->{PATH_INFO} =~ qr,^/static/,} Header => set => ['Cache-Control', 'public, max-age=604800']; | |
85 | enable 'Static', path => qr,^/static/,; | |
86 | enable 'Log4perl', category => 'plack'; | |
87 | enable \&require_admin; | |
88 | enable_if \&some_auth_required, 'Auth::Basic', authenticator => \&authenticate, realm => 'Gruntmaster 6000'; | |
89 | Plack::App::Gruntmaster->to_app | |
90 | } |