TCMS.pm 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491
  1. package TCMS;
  2. use strict;
  3. use warnings;
  4. no warnings 'experimental';
  5. use feature qw{signatures state};
  6. use Clone qw{clone};
  7. use Date::Format qw{strftime};
  8. use Sys::Hostname();
  9. use HTTP::Body ();
  10. use URL::Encode ();
  11. use Text::Xslate ();
  12. use DateTime::Format::HTTP();
  13. use CGI::Cookie ();
  14. use File::Basename();
  15. use IO::Compress::Gzip();
  16. use Time::HiRes qw{gettimeofday tv_interval};
  17. use HTTP::Parser::XS qw{HEADERS_AS_HASHREF};
  18. use List::Util;
  19. use URI();
  20. use Ref::Util qw{is_coderef is_hashref is_arrayref};
  21. #Grab our custom routes
  22. use FindBin::libs;
  23. use Trog::Routes::HTML;
  24. use Trog::Routes::JSON;
  25. use Trog::Log qw{:all};
  26. use Trog::Log::DBI;
  27. use Trog::Auth;
  28. use Trog::Utils;
  29. use Trog::Config;
  30. use Trog::Data;
  31. use Trog::Vars;
  32. use Trog::FileHandler;
  33. # Troglodyne philosophy - simple as possible
  34. # Wrap app to return *our* error handler instead of Plack::Util::run_app's
  35. my $cur_query = {};
  36. sub app {
  37. return eval { _app(@_) } || do {
  38. my $env = shift;
  39. $env->{'psgi.errors'}->print($@);
  40. # Redact the stack trace past line 1, it usually has things which should not be shown
  41. $cur_query->{message} = $@;
  42. $cur_query->{message} =~ s/\n.*//g if $cur_query->{message};
  43. return _error($cur_query);
  44. };
  45. }
  46. =head2 app()
  47. Dispatches requests based on %routes built above.
  48. The dispatcher here does *not* do anything with the authn/authz data. It sets those in the 'user' and 'acls' parameters of the query object passed to routes.
  49. If a path passed is not a defined route (or regex route), but exists as a file under www/, it will be served up immediately.
  50. =cut
  51. sub _app {
  52. # Start the server timing clock
  53. my $start = [gettimeofday];
  54. # Build the routing table
  55. state( $conf, $data, %aliases );
  56. $conf //= Trog::Config::get();
  57. $data //= Trog::Data->new($conf);
  58. my %routes = %{ _routes($data) };
  59. %aliases = $data->aliases() unless %aliases;
  60. # XXX this is built progressively across the forks, leading to inconsistent behavior.
  61. # This should eventually be pre-filled from DB.
  62. my %etags;
  63. # Setup logging
  64. log_init();
  65. my $requestid = Trog::Utils::uuid();
  66. Trog::Log::uuid($requestid);
  67. # Actually start processing the request
  68. my $env = shift;
  69. # Discard the path used in the log, it's too long and enough 4xx error code = ban
  70. return _toolong( { method => $env->{REQUEST_METHOD}, fullpath => '...' } ) if length( $env->{REQUEST_URI} ) > 2048;
  71. # Various stuff important for logging requests
  72. state $domain = $conf->param('general.hostname') || $env->{HTTP_X_FORWARDED_HOST} || $env->{HTTP_HOST} || eval { Sys::Hostname::hostname() };
  73. my $path = $env->{PATH_INFO};
  74. my $port = $env->{HTTP_X_FORWARDED_PORT} // $env->{HTTP_PORT};
  75. my $pport = defined $port ? ":$port" : "";
  76. my $scheme = $env->{'psgi.url_scheme'} // 'http';
  77. my $method = $env->{REQUEST_METHOD};
  78. # It's important that we log what the user ACTUALLY requested rather than the rewritten path later on.
  79. my $fullpath = "$scheme://$domain$pport$path";
  80. # sigdie can now "do the right thing"
  81. $cur_query = { route => $path, fullpath => $path, method => $method };
  82. # Set the IP of the request so we can fail2ban
  83. $Trog::Log::ip = $env->{HTTP_X_FORWARDED_FOR} || $env->{REMOTE_ADDR};
  84. # Set the referer & ua to go into DB logs, but not logs in general.
  85. # The referer/ua largely has no importance beyond being a proto bug report for log messages.
  86. $Trog::Log::DBI::referer = $env->{HTTP_REFERER};
  87. $Trog::Log::DBI::ua = $env->{HTTP_UA};
  88. # Check eTags. If we don't know about it, just assume it's good and lazily fill the cache
  89. # XXX yes, this allows cache poisoning...but only for logged in users!
  90. if ( $env->{HTTP_IF_NONE_MATCH} ) {
  91. INFO("$env->{REQUEST_METHOD} 304 $fullpath");
  92. return [ 304, [], [''] ] if $env->{HTTP_IF_NONE_MATCH} eq ( $etags{ $env->{REQUEST_URI} } || '' );
  93. $etags{ $env->{REQUEST_URI} } = $env->{HTTP_IF_NONE_MATCH} unless exists $etags{ $env->{REQUEST_URI} };
  94. }
  95. # TODO: Actually do something with the language passed to the renderer
  96. my $lang = $env->{HTTP_ACCEPT_LANGUAGE};
  97. #TODO: Actually do something with the acceptable output formats in the renderer
  98. my $accept = $env->{HTTP_ACCEPT};
  99. # Figure out if we want compression or not
  100. my $alist = $env->{HTTP_ACCEPT_ENCODING} || '';
  101. $alist =~ s/\s//g;
  102. my @accept_encodings;
  103. @accept_encodings = split( /,/, $alist );
  104. my $deflate = grep { 'gzip' eq $_ } @accept_encodings;
  105. # NOTE These two parameters are entirely academic, as we don't use ad tracking cookies, but the UTM parameters.
  106. # UTMs are actually fully sufficient to get you what you want -- e.g. keywords, audience groups, a/b testing, etc.
  107. # and you need to put up cookie consent banners if you bother using tracking cookies, which are horrific UX.
  108. #my $no_track = $env->{HTTP_DNT};
  109. #my $no_sell_info = $env->{HTTP_SEC_GPC};
  110. # We generally prefer this to be handled at the reverse proxy level.
  111. #my $prefer_ssl = $env->{HTTP_UPGRADE_INSECURE_REQUESTS};
  112. my $last_fetch = 0;
  113. if ( $env->{HTTP_IF_MODIFIED_SINCE} ) {
  114. $last_fetch = DateTime::Format::HTTP->parse_datetime( $env->{HTTP_IF_MODIFIED_SINCE} )->epoch();
  115. }
  116. #XXX Don't use statics anything that has a search query
  117. # On one hand, I don't want to DOS the disk, but I'd also like some like ?rss...
  118. # Should probably turn those into aliases.
  119. my $has_query = !!$env->{QUERY_STRING};
  120. my $query = {};
  121. $query = URL::Encode::url_params_mixed( $env->{QUERY_STRING} ) if $env->{QUERY_STRING};
  122. #Actually parse the POSTDATA and dump it into the QUERY object if this is a POST
  123. if ( $env->{REQUEST_METHOD} eq 'POST' ) {
  124. my $body = HTTP::Body->new( $env->{CONTENT_TYPE}, $env->{CONTENT_LENGTH} );
  125. while ( $env->{'psgi.input'}->read( my $buf, $Trog::Vars::CHUNK_SIZE ) ) {
  126. $body->add($buf);
  127. }
  128. @$query{ keys( %{ $body->param } ) } = values( %{ $body->param } );
  129. @$query{ keys( %{ $body->upload } ) } = values( %{ $body->upload } );
  130. }
  131. # It's mod_rewrite!
  132. $path = '/index' if $path eq '/';
  133. #XXX this is hardcoded in browsers, so just rewrite the path
  134. $path = '/img/icon/favicon.ico' if $path eq '/favicon.ico';
  135. # Translate alias paths into their actual path
  136. $path = $aliases{$path} if exists $aliases{$path};
  137. # Collapse multiple slashes in the path
  138. $path =~ s/[\/]+/\//g;
  139. #Handle regex/capture routes
  140. if ( !exists $routes{$path} ) {
  141. my @captures;
  142. # XXX maybe this should all just go into $query?
  143. # TODO can optimize by having separate hashes for capture/non-capture routes
  144. foreach my $pattern ( keys(%routes) ) {
  145. @captures = $path =~ m/^$pattern$/;
  146. if (@captures) {
  147. $path = $pattern;
  148. foreach my $field ( @{ $routes{$path}{captures} } ) {
  149. $routes{$path}{data} //= {};
  150. $routes{$path}{data}{$field} = shift @captures;
  151. }
  152. last;
  153. }
  154. }
  155. }
  156. # Set the 'data' in the query that the route specifically overrides, which we are also using for the catpured data
  157. # This also means you have to validate both of them via parameters if you set that up.
  158. @{$query}{ keys( %{ $routes{$path}{'data'} } ) } = values( %{ $routes{$path}{'data'} } ) if ref $routes{$path}{'data'} eq 'HASH' && %{ $routes{$path}{'data'} };
  159. # Ensure any short-circuit routes can log the request, and return the server-timing headers properly
  160. $query->{method} = $method;
  161. $query->{route} = $path;
  162. $query->{fullpath} = $fullpath;
  163. $query->{start} = $start;
  164. # Handle HTTP range/streaming requests
  165. my $range = $env->{HTTP_RANGE} || "bytes=0-" if $env->{HTTP_RANGE} || $env->{HTTP_IF_RANGE};
  166. my $streaming = $env->{'psgi.streaming'};
  167. $query->{streaming} = $streaming;
  168. my @ranges;
  169. if ($range) {
  170. $range =~ s/bytes=//g;
  171. push(
  172. @ranges,
  173. map {
  174. [ split( /-/, $_ ) ];
  175. #$tuples[1] //= $tuples[0] + $Trog::Vars::CHUNK_SIZE;
  176. #\@tuples
  177. } split( /,/, $range )
  178. );
  179. }
  180. # If it's a file, just serve it
  181. return Trog::FileHandler::serve( $fullpath, "www/$path", $start, $streaming, \@ranges, $last_fetch, $deflate ) if -f "www/$path";
  182. # Figure out if we have a logged in user, so we can serve them user-specific files
  183. my $cookies = {};
  184. if ( $env->{HTTP_COOKIE} ) {
  185. $cookies = CGI::Cookie->parse( $env->{HTTP_COOKIE} );
  186. }
  187. my $active_user = '';
  188. $Trog::Log::user = 'nobody';
  189. if ( exists $cookies->{tcmslogin} ) {
  190. $active_user = Trog::Auth::session2user( $cookies->{tcmslogin}->value );
  191. $Trog::Log::user = $active_user if $active_user;
  192. }
  193. return Trog::FileHandler::serve( $fullpath, "totp/$path", $start, $streaming, \@ranges, $last_fetch, $deflate ) if -f "totp/$path" && $active_user;
  194. # Now that we have firmed up the actual routing, let's validate.
  195. return _forbidden($query) if exists $routes{$path}{auth} && !$active_user;
  196. return _notfound($query) unless exists $routes{$path} && ref $routes{$path} eq 'HASH' && keys( %{ $routes{$path} } );
  197. return _badrequest($query) unless grep { $env->{REQUEST_METHOD} eq $_ } ( $routes{$path}{method} || '', 'HEAD' );
  198. # Disallow any paths that are naughty ( starman auto-removes .. up-traversal)
  199. if ( index( $path, '/templates' ) == 0 || index( $path, '/statics' ) == 0 || $path =~ m/.*(\.psgi|\.pm)$/i ) {
  200. return _forbidden($query);
  201. }
  202. # Set the urchin parameters if necessary.
  203. %$Trog::Log::DBI::urchin = map { $_ => delete $query->{$_} } qw{utm_source utm_medium utm_campaign utm_term utm_content};
  204. # Now that we've parsed the query and know where we want to go, we should murder everything the route does not explicitly want, and validate what it does
  205. my $parameters = $routes{$path}{parameters};
  206. if ($parameters) {
  207. die "invalid route definition for $path: bad parameters" unless is_hashref($parameters);
  208. my @known_params = keys(%$parameters);
  209. for my $param (@known_params) {
  210. die "Invalid route definition for $path: parameter $param must correspond to a validation CODEREF." unless is_coderef( $parameters->{$param} );
  211. # A missing parameter is not necessarily a problem.
  212. next unless $query->{$param};
  213. # But if we have it, and it's bad, nack it, so that scanners get fail2banned.
  214. DEBUG("Rejected $fullpath for bad query param $param");
  215. return _badrequest($query) unless $parameters->{$param}->( $query->{$param} );
  216. }
  217. # Smack down passing of unnecessary fields
  218. foreach my $field ( keys(%$query) ) {
  219. next if List::Util::any { $field eq $_ } @known_params;
  220. next if List::Util::any { $field eq $_ } qw{start route streaming method fullpath};
  221. DEBUG("Rejected $fullpath for query param $field");
  222. return _badrequest($query);
  223. }
  224. }
  225. # Let's open up our default route before we bother thinking about routing any harder
  226. return $routes{default}{callback}->($query) unless -f "config/setup";
  227. $query->{user_acls} = [];
  228. $query->{user_acls} = Trog::Auth::acls4user($active_user) // [] if $active_user;
  229. # Grab the list of ACLs we want to add to a post, if any.
  230. $query->{acls} = [ $query->{acls} ] if ( $query->{acls} && ref $query->{acls} ne 'ARRAY' );
  231. # Filter out passed ACLs which are naughty
  232. my $is_admin = grep { $_ eq 'admin' } @{ $query->{user_acls} };
  233. @{ $query->{acls} } = grep { $_ ne 'admin' } @{ $query->{acls} } unless $is_admin;
  234. # If we have a static render, just use it instead (These will ALWAYS be correct, data saves invalidate this)
  235. # TODO: make this key on admin INSTEAD of active user when we add non-admin users.
  236. if ( !$active_user && !$has_query ) {
  237. return _static( $fullpath, "$path.z", $start, $streaming ) if -f "www/statics/$path.z" && $deflate;
  238. return _static( $fullpath, $path, $start, $streaming ) if -f "www/statics/$path";
  239. }
  240. $query->{deflate} = $deflate;
  241. $query->{user} = $active_user;
  242. #Set various things we don't want overridden
  243. $query->{body} = '';
  244. $query->{dnt} = $env->{HTTP_DNT};
  245. $query->{user} = $active_user;
  246. $query->{domain} = $domain;
  247. $query->{route} = $path;
  248. $query->{scheme} = $scheme;
  249. $query->{social_meta} = 1;
  250. $query->{primary_post} = {};
  251. $query->{has_query} = $has_query;
  252. $query->{port} = $port;
  253. $query->{lang} = $lang;
  254. $query->{accept} = $accept;
  255. # Redirecting somewhere naughty not allow
  256. $query->{to} = URI->new( $query->{to} // '' )->path() || $query->{to} if $query->{to};
  257. DEBUG("DISPATCH $path to $routes{$path}{callback}");
  258. #XXX there is a trick to now use strict refs, but I don't remember it right at the moment
  259. {
  260. no strict 'refs';
  261. my $output = $routes{$path}{callback}->($query);
  262. die "$path returned no data!" unless ref $output eq 'ARRAY' && @$output == 3;
  263. my $pport = defined $query->{port} ? ":$query->{port}" : "";
  264. INFO("$env->{REQUEST_METHOD} $output->[0] $fullpath");
  265. # Append server-timing headers if they aren't present
  266. my $tot = tv_interval($start) * 1000;
  267. push( @{ $output->[1] }, 'Server-Timing' => "app;dur=$tot" ) unless List::Util::any { $_ eq 'Server-Timing' } @{ $output->[1] };
  268. return $output;
  269. }
  270. }
  271. #XXX Return a clone of the routing table ref, because code modifies it later
  272. sub _routes ( $data = {} ) {
  273. state %routes;
  274. return clone( \%routes ) if %routes;
  275. if ( !$data ) {
  276. my $conf = Trog::Config::get();
  277. $data = Trog::Data->new($conf);
  278. }
  279. my %roots = $data->routes();
  280. %routes = %Trog::Routes::HTML::routes;
  281. @routes{ keys(%Trog::Routes::JSON::routes) } = values(%Trog::Routes::JSON::routes);
  282. @routes{ keys(%roots) } = values(%roots);
  283. # Add in global routes, here because they *must* know about all other routes
  284. # Also, nobody should ever override these.
  285. $routes{'/robots.txt'} = {
  286. method => 'GET',
  287. callback => \&robots,
  288. };
  289. return clone( \%routes );
  290. }
  291. =head2 robots
  292. Return an appropriate robots.txt
  293. This is a "special" route as it needs to know about all the routes in order to disallow noindex=1 routes.
  294. =cut
  295. sub robots ($query) {
  296. state $etag = "robots-" . time();
  297. my $routes = _routes();
  298. # If there's a 'capture' route, we need to format it correctly.
  299. state @banned = map { exists $routes->{$_}{robot_name} ? $routes->{$_}{robot_name} : $_ } grep { $routes->{$_}{noindex} } sort keys(%$routes);
  300. return Trog::Renderer->render(
  301. contenttype => 'text/plain',
  302. template => 'robots.tx',
  303. data => {
  304. etag => $etag,
  305. banned => \@banned,
  306. %$query,
  307. },
  308. code => 200,
  309. );
  310. }
  311. sub _generic ( $type, $query ) {
  312. return _static( "$type.z", $query->{start}, $query->{streaming} ) if -f "www/statics/$type.z";
  313. return _static( $type, $query->{start}, $query->{streaming} ) if -f "www/statics/$type";
  314. my %lookup = (
  315. notfound => \&Trog::Routes::HTML::notfound,
  316. forbidden => \&Trog::Routes::HTML::forbidden,
  317. badrequest => \&Trog::Routes::HTML::badrequest,
  318. toolong => \&Trog::Routes::HTML::toolong,
  319. error => \&Trog::Routes::HTML::error,
  320. );
  321. return $lookup{$type}->($query);
  322. }
  323. sub _notfound ($query) {
  324. INFO("$query->{method} 404 $query->{fullpath}");
  325. return _generic( 'notfound', $query );
  326. }
  327. sub _forbidden ($query) {
  328. INFO("$query->{method} 403 $query->{fullpath}");
  329. return _generic( 'forbidden', $query );
  330. }
  331. sub _badrequest ($query) {
  332. INFO("$query->{method} 400 $query->{fullpath}");
  333. return _generic( 'badrequest', $query );
  334. }
  335. sub _toolong ($query) {
  336. INFO("$query->{method} 419 $query->{fullpath}");
  337. return _generic( 'toolong', {} );
  338. }
  339. sub _error ($query) {
  340. $query->{method} //= "UNKNOWN";
  341. $query->{fullpath} //= $query->{route} // '/?';
  342. INFO("$query->{method} 500 $query->{fullpath}");
  343. return _generic( 'error', $query );
  344. }
  345. sub _static ( $fullpath, $path, $start, $streaming, $last_fetch = 0 ) {
  346. DEBUG("Rendering static for $path");
  347. # XXX because of psgi I can't just vomit the file directly
  348. if ( open( my $fh, '<', "www/statics/$path" ) ) {
  349. my $headers = '';
  350. # NOTE: this is relying on while advancing the file pointer
  351. while (<$fh>) {
  352. last if $_ eq "\n";
  353. $headers .= $_;
  354. }
  355. my ( undef, undef, $status, undef, $headers_parsed ) = HTTP::Parser::XS::parse_http_response( "$headers\n", HEADERS_AS_HASHREF );
  356. #XXX need to put this into the file itself
  357. my $mt = ( stat($fh) )[9];
  358. my @gm = gmtime($mt);
  359. my $now_string = strftime( "%a, %d %b %Y %H:%M:%S GMT", @gm );
  360. my $code = $mt > $last_fetch ? $status : 304;
  361. $headers_parsed->{"Last-Modified"} = $now_string;
  362. # Append server-timing headers
  363. my $tot = tv_interval($start) * 1000;
  364. $headers_parsed->{'Server-Timing'} = "static;dur=$tot";
  365. #XXX uwsgi just opens the file *again* when we already have a filehandle if it has a path.
  366. # starman by comparison doesn't violate the principle of least astonishment here.
  367. # This is probably a performance optimization, but makes the kind of micromanagement I need to do inconvenient.
  368. # As such, we will just return a stream.
  369. INFO("GET 200 $fullpath");
  370. return sub {
  371. my $responder = shift;
  372. #push(@headers, 'Content-Length' => $sz);
  373. my $writer = $responder->( [ $code, [%$headers_parsed] ] );
  374. while ( $fh->read( my $buf, $Trog::Vars::CHUNK_SIZE ) ) {
  375. $writer->write($buf);
  376. }
  377. close $fh;
  378. $writer->close;
  379. }
  380. if $streaming;
  381. return [ $code, [%$headers_parsed], $fh ];
  382. }
  383. INFO("GET 403 $fullpath");
  384. return [ 403, [ 'Content-Type' => $Trog::Vars::content_types{text} ], ["STAY OUT YOU RED MENACE"] ];
  385. }
  386. 1;