#!/usr/bin/perl -w
use v5.14;
+no if $] >= 5.017011, warnings => 'experimental::smartmatch';
-use Apache2::Authen::Passphrase qw/pwcheck/;
-use Apache2::AuthzCaps qw/hascaps/;
use Gruntmaster::Data;
use Plack::App::Gruntmaster;
use Plack::Builder;
use Plack::Request;
+use Plack::Util;
use Digest::SHA qw/sha256/;
use Log::Log4perl;
+use Tie::Hash::Expire;
+use constant AUTH_TIMEOUT => 5 * 60;
use constant ACCESSLOG_FORMAT => '%{X-Forwarded-For}i|%h %u "%r" %>s %b "%{Referer}i" "%{User-agent}i"';
+use constant CONTENT_SECURITY_POLICY => q,default-src 'none'; script-src 'self' www.google-analytics.com; style-src 'self'; img-src 'self' www.google-analytics.com; connect-src 'self',;
-$Apache2::AuthzCaps::rootdir = $Apache2::Authen::Passphrase::rootdir;
-my $word = qr,(\w+),a;
+our $db //= Gruntmaster::Data->connect($ENV{GRUNTMASTER_DSN} // 'dbi:Pg:');
-sub debug {
- local $Log::Log4perl::caller_depth = $Log::Log4perl::caller_depth + 1;
- $_[0]->{'psgix.logger'}->({qw/level debug message/ => $_[1]})
-}
-
-sub some_auth_required {
- my $r = Plack::Request->new($_[0]);
- return 1 if $_[0]->{'gruntmaster.reqadmin'} || $r->path eq '/action/passwd' || $r->path =~ m,/pb/$word/submit$,;
- 0
-}
+tie my %auth, 'Tie::Hash::Expire', {expire_seconds => AUTH_TIMEOUT};
-sub admin_required {
- local $_ = $_[0];
- return 1 if m,^/pb/$word, && problem_private $1;
- return 1 if m,^/log/(?:job|src)/$word, && job_private $1;
- return 1 if m,^/ct/$word/(?:pb|log), && time < contest_start $1;
- return 1 if m,^/ct/$word/log/src, && time < contest_end $1;
- 0
+sub authenticate {
+ my ($user, $pass, $env) = @_;
+ my $key = sha256 "$user:$pass";
+ $env->{'gruntmaster.user'} = $user;
+ return 1 if exists $auth{$key};
+ return unless $db->user($user) && $db->user($user)->check_passphrase($pass);
+ $auth{key} = 1;
}
-sub require_admin {
+sub add_headers {
my $app = $_[0];
sub {
- *__ANON__ = "require_admin_middleware";
- my $env = $_[0];
- my $r = Plack::Request->new($env);
- $env->{'gruntmaster.reqadmin'} = 1 if admin_required $r->path;
- $app->($env)
+ my $resp = $app->($_[0]);
+ my $hdrs = Plack::Util::headers($resp->[1]);
+ $hdrs->set('Content-Security-Policy', CONTENT_SECURITY_POLICY);
+ $hdrs->set('Cache-Control', 'public, max-age=604800') if $_[0]->{PATH_INFO} =~ qr,^/static/,;
+ $resp->[1] = $hdrs->headers;
+ $resp;
}
}
-my %authen_cache;
-
-sub authenticate {
- my ($user, $pass, $env) = @_;
- my $cache_key = sha256 "$user:$pass";
- my $time = $authen_cache{$cache_key} // 0;
- if ($time >= time - 300) {
- return 1;
- } else {
- delete $authen_cache{$cache_key};
- }
-
- return unless eval {
- pwcheck $user, $pass;
- 1
- };
- $authen_cache{$cache_key} = time;
-
- return if $env->{'gruntmaster.reqadmin'} && !hascaps $user, 'gmadm';
- 1
-}
-
-Log::Log4perl->init('log.conf');
+Log::Log4perl->init_once('log.conf');
my $access_logger = Log::Log4perl->get_logger('access');
+$ENV{DBIC_NULLABLE_KEY_NOWARN} = 1;
builder {
enable_if { $_[0]->{PATH_INFO} eq '/ok' } sub { sub{ [200, [], []] }};
enable 'AccessLog', format => ACCESSLOG_FORMAT, logger => sub { $access_logger->info(@_) };
enable 'ContentLength';
- enable_if { $_[0]->{PATH_INFO} =~ qr,^/static/,} Header => set => ['Cache-Control', 'public, max-age=604800'];
+ enable \&add_headers;
enable 'Static', path => qr,^/static/,;
enable 'Log4perl', category => 'plack';
- enable \&require_admin;
- enable_if \&some_auth_required, 'Auth::Basic', authenticator => \&authenticate, realm => 'Gruntmaster 6000';
- Plack::App::Gruntmaster->to_app
+ enable_if { shift->{HTTP_AUTHORIZATION} } 'Auth::Basic', authenticator => \&authenticate, realm => 'Gruntmaster 6000';
+ enable sub { my $app = $_[0]; sub { $_[0]->{'gruntmaster.dbic'} = $db; $app->($_[0]) } };
+ Plack::App::Gruntmaster->run_if_script
}