]> iEval git - gruntmaster-page.git/blob - app.psgi
a9eb098d7672832589be3158ea37414aa510d1a1
[gruntmaster-page.git] / app.psgi
1 #!/usr/bin/perl -w
2 use v5.14;
3
4 use Apache2::Authen::Passphrase qw/pwcheck/;
5 use Apache2::AuthzCaps qw/hascaps/;
6 use Gruntmaster::Data;
7 use Plack::App::Gruntmaster;
8 use Plack::Builder;
9 use Plack::Request;
10 use Digest::SHA qw/sha256/;
11 use Log::Log4perl;
12
13 use constant ACCESSLOG_FORMAT => '%{X-Forwarded-For}i|%h %u "%r" %>s %b "%{Referer}i" "%{User-agent}i"';
14 use constant CONTENT_SECURITY_POLICY => q,default-src 'none'; script-src 'self' www.google-analytics.com; style-src 'self'; img-src 'self' www.google-analytics.com; connect-src 'self',;
15
16 $Apache2::AuthzCaps::rootdir = $Apache2::Authen::Passphrase::rootdir;
17 my $word = qr,(\w+),a;
18
19 sub debug {
20 local $Log::Log4perl::caller_depth = $Log::Log4perl::caller_depth + 1;
21 $_[0]->{'psgix.logger'}->({qw/level debug message/ => $_[1]})
22 }
23
24 sub some_auth_required {
25 my $r = Plack::Request->new($_[0]);
26 return 1 if $_[0]->{'gruntmaster.reqadmin'} || $r->path eq '/action/passwd' || $r->path =~ m,/pb/$word/submit$,;
27 return 1 if $r->path =~ m,^/ct/$word/pb/$word, && time < contest_end $1;
28 0
29 }
30
31 sub admin_required {
32 local $_ = $_[0];
33 return problem_owner $1 if m,^/pb/$word, && problem_private $1;
34 return job_user $1 if m,^/log/(?:job|src)/$word, && job_private $1;
35 return contest_owner $1 if m,^/ct/$word/(?:pb|log), && time < contest_start $1;
36 if (m,^/ct/$word/log/(?:job|src)/$word, && time < contest_end $1){
37 local $Gruntmaster::Data::contest = $1;
38 return job_user $2;
39 }
40 0
41 }
42
43 sub require_admin {
44 my $app = $_[0];
45 sub {
46 local *__ANON__ = "require_admin_middleware";
47 my $env = $_[0];
48 my $r = Plack::Request->new($env);
49 $env->{'gruntmaster.reqadmin'} = admin_required $r->path;
50 $app->($env)
51 }
52 }
53
54 my %authen_cache;
55
56 sub authenticate {
57 my ($user, $pass, $env) = @_;
58 my $cache_key = sha256 "$user:$pass";
59 my $time = $authen_cache{$cache_key} // 0;
60 if ($time >= time - 300) {
61 return 1;
62 } else {
63 delete $authen_cache{$cache_key};
64 }
65
66 return unless eval {
67 pwcheck $user, $pass;
68 1
69 };
70 $authen_cache{$cache_key} = time;
71
72 return if $env->{'gruntmaster.reqadmin'} && $env->{'gruntmaster.reqadmin'} ne $user && !hascaps $user, 'gmadm';
73 1
74 }
75
76 Log::Log4perl->init('log.conf');
77 my $access_logger = Log::Log4perl->get_logger('access');
78
79 builder {
80 enable_if { $_[0]->{PATH_INFO} eq '/ok' } sub { sub{ [200, [], []] }};
81 enable 'AccessLog', format => ACCESSLOG_FORMAT, logger => sub { $access_logger->info(@_) };
82 enable 'ContentLength';
83 enable Header => set => ['Content-Security-Policy', CONTENT_SECURITY_POLICY];
84 enable_if { $_[0]->{PATH_INFO} =~ qr,^/static/,} Header => set => ['Cache-Control', 'public, max-age=604800'];
85 enable 'Static', path => qr,^/static/,;
86 enable 'Log4perl', category => 'plack';
87 enable \&require_admin;
88 enable_if \&some_auth_required, 'Auth::Basic', authenticator => \&authenticate, realm => 'Gruntmaster 6000';
89 Plack::App::Gruntmaster->to_app
90 }
This page took 0.066954 seconds and 4 git commands to generate.