TCMS.pm 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490
  1. package TCMS;
  2. use strict;
  3. use warnings;
  4. no warnings 'experimental';
  5. use feature qw{signatures state};
  6. use Clone qw{clone};
  7. use Date::Format qw{strftime};
  8. use Sys::Hostname();
  9. use HTTP::Body ();
  10. use URL::Encode ();
  11. use Text::Xslate ();
  12. use Plack::MIME ();
  13. use Mojo::File ();
  14. use DateTime::Format::HTTP();
  15. use CGI::Cookie ();
  16. use File::Basename();
  17. use IO::Compress::Gzip();
  18. use Time::HiRes qw{gettimeofday tv_interval};
  19. use HTTP::Parser::XS qw{HEADERS_AS_HASHREF};
  20. use List::Util;
  21. use URI();
  22. use Ref::Util qw{is_coderef is_hashref is_arrayref};
  23. #Grab our custom routes
  24. use FindBin::libs;
  25. use Trog::Routes::HTML;
  26. use Trog::Routes::JSON;
  27. use Trog::Log qw{:all};
  28. use Trog::Log::DBI;
  29. use Trog::Auth;
  30. use Trog::Utils;
  31. use Trog::Config;
  32. use Trog::Data;
  33. use Trog::Vars;
  34. use Trog::FileHandler;
  35. # Troglodyne philosophy - simple as possible
  36. # Wrap app to return *our* error handler instead of Plack::Util::run_app's
  37. my $cur_query = {};
  38. sub app {
  39. return eval { _app(@_) } || do {
  40. my $env = shift;
  41. $env->{'psgi.errors'}->print($@);
  42. # Redact the stack trace past line 1, it usually has things which should not be shown
  43. $cur_query->{message} = $@;
  44. $cur_query->{message} =~ s/\n.*//g if $cur_query->{message};
  45. return _error($cur_query);
  46. };
  47. }
  48. =head2 app()
  49. Dispatches requests based on %routes built above.
  50. The dispatcher here does *not* do anything with the authn/authz data. It sets those in the 'user' and 'acls' parameters of the query object passed to routes.
  51. If a path passed is not a defined route (or regex route), but exists as a file under www/, it will be served up immediately.
  52. =cut
  53. sub _app {
  54. # Start the server timing clock
  55. my $start = [gettimeofday];
  56. # Build the routing table
  57. state ($conf, $data, %aliases);
  58. $conf //= Trog::Config::get();
  59. $data //= Trog::Data->new($conf);
  60. my %routes = %{_routes($data)};
  61. %aliases = $data->aliases() unless %aliases;
  62. # XXX this is built progressively across the forks, leading to inconsistent behavior.
  63. # This should eventually be pre-filled from DB.
  64. my %etags;
  65. # Setup logging
  66. log_init();
  67. my $requestid = Trog::Utils::uuid();
  68. Trog::Log::uuid($requestid);
  69. # Actually start processing the request
  70. my $env = shift;
  71. # Discard the path used in the log, it's too long and enough 4xx error code = ban
  72. return _toolong( { method => $env->{REQUEST_METHOD}, fullpath => '...' } ) if length( $env->{REQUEST_URI} ) > 2048;
  73. # Various stuff important for logging requests
  74. state $domain = $conf->param('general.hostname') || $env->{HTTP_X_FORWARDED_HOST} || $env->{HTTP_HOST} || eval { Sys::Hostname::hostname() };
  75. my $path = $env->{PATH_INFO};
  76. my $port = $env->{HTTP_X_FORWARDED_PORT} // $env->{HTTP_PORT};
  77. my $pport = defined $port ? ":$port" : "";
  78. my $scheme = $env->{'psgi.url_scheme'} // 'http';
  79. my $method = $env->{REQUEST_METHOD};
  80. # It's important that we log what the user ACTUALLY requested rather than the rewritten path later on.
  81. my $fullpath = "$scheme://$domain$pport$path";
  82. # sigdie can now "do the right thing"
  83. $cur_query = { route => $path, fullpath => $path, method => $method };
  84. # Set the IP of the request so we can fail2ban
  85. $Trog::Log::ip = $env->{HTTP_X_FORWARDED_FOR} || $env->{REMOTE_ADDR};
  86. # Set the referer & ua to go into DB logs, but not logs in general.
  87. # The referer/ua largely has no importance beyond being a proto bug report for log messages.
  88. $Trog::Log::DBI::referer = $env->{HTTP_REFERER};
  89. $Trog::Log::DBI::ua = $env->{HTTP_UA};
  90. # Check eTags. If we don't know about it, just assume it's good and lazily fill the cache
  91. # XXX yes, this allows cache poisoning...but only for logged in users!
  92. if ( $env->{HTTP_IF_NONE_MATCH} ) {
  93. INFO("$env->{REQUEST_METHOD} 304 $fullpath");
  94. return [ 304, [], [''] ] if $env->{HTTP_IF_NONE_MATCH} eq ( $etags{ $env->{REQUEST_URI} } || '' );
  95. $etags{ $env->{REQUEST_URI} } = $env->{HTTP_IF_NONE_MATCH} unless exists $etags{ $env->{REQUEST_URI} };
  96. }
  97. # TODO: Actually do something with the language passed to the renderer
  98. my $lang = $env->{HTTP_ACCEPT_LANGUAGE};
  99. #TODO: Actually do something with the acceptable output formats in the renderer
  100. my $accept = $env->{HTTP_ACCEPT};
  101. # Figure out if we want compression or not
  102. my $alist = $env->{HTTP_ACCEPT_ENCODING} || '';
  103. $alist =~ s/\s//g;
  104. my @accept_encodings;
  105. @accept_encodings = split( /,/, $alist );
  106. my $deflate = grep { 'gzip' eq $_ } @accept_encodings;
  107. # NOTE These two parameters are entirely academic, as we don't use ad tracking cookies, but the UTM parameters.
  108. # UTMs are actually fully sufficient to get you what you want -- e.g. keywords, audience groups, a/b testing, etc.
  109. # and you need to put up cookie consent banners if you bother using tracking cookies, which are horrific UX.
  110. #my $no_track = $env->{HTTP_DNT};
  111. #my $no_sell_info = $env->{HTTP_SEC_GPC};
  112. # We generally prefer this to be handled at the reverse proxy level.
  113. #my $prefer_ssl = $env->{HTTP_UPGRADE_INSECURE_REQUESTS};
  114. my $last_fetch = 0;
  115. if ( $env->{HTTP_IF_MODIFIED_SINCE} ) {
  116. $last_fetch = DateTime::Format::HTTP->parse_datetime( $env->{HTTP_IF_MODIFIED_SINCE} )->epoch();
  117. }
  118. #XXX Don't use statics anything that has a search query
  119. # On one hand, I don't want to DOS the disk, but I'd also like some like ?rss...
  120. # Should probably turn those into aliases.
  121. my $has_query = !!$env->{QUERY_STRING};
  122. my $query = {};
  123. $query = URL::Encode::url_params_mixed( $env->{QUERY_STRING} ) if $env->{QUERY_STRING};
  124. #Actually parse the POSTDATA and dump it into the QUERY object if this is a POST
  125. if ( $env->{REQUEST_METHOD} eq 'POST' ) {
  126. my $body = HTTP::Body->new( $env->{CONTENT_TYPE}, $env->{CONTENT_LENGTH} );
  127. while ( $env->{'psgi.input'}->read( my $buf, $Trog::Vars::CHUNK_SIZE ) ) {
  128. $body->add($buf);
  129. }
  130. @$query{ keys( %{ $body->param } ) } = values( %{ $body->param } );
  131. @$query{ keys( %{ $body->upload } ) } = values( %{ $body->upload } );
  132. }
  133. # It's mod_rewrite!
  134. $path = '/index' if $path eq '/';
  135. #XXX this is hardcoded in browsers, so just rewrite the path
  136. $path = '/img/icon/favicon.ico' if $path eq '/favicon.ico';
  137. # Translate alias paths into their actual path
  138. $path = $aliases{$path} if exists $aliases{$path};
  139. # Collapse multiple slashes in the path
  140. $path =~ s/[\/]+/\//g;
  141. #Handle regex/capture routes
  142. if ( !exists $routes{$path} ) {
  143. my @captures;
  144. # XXX maybe this should all just go into $query?
  145. # TODO can optimize by having separate hashes for capture/non-capture routes
  146. foreach my $pattern ( keys(%routes) ) {
  147. @captures = $path =~ m/^$pattern$/;
  148. if (@captures) {
  149. $path = $pattern;
  150. foreach my $field ( @{ $routes{$path}{captures} } ) {
  151. $routes{$path}{data} //= {};
  152. $routes{$path}{data}{$field} = shift @captures;
  153. }
  154. last;
  155. }
  156. }
  157. }
  158. # Set the 'data' in the query that the route specifically overrides, which we are also using for the catpured data
  159. # This also means you have to validate both of them via parameters if you set that up.
  160. @{$query}{ keys( %{ $routes{$path}{'data'} } ) } = values( %{ $routes{$path}{'data'} } ) if ref $routes{$path}{'data'} eq 'HASH' && %{ $routes{$path}{'data'} };
  161. # Ensure any short-circuit routes can log the request, and return the server-timing headers properly
  162. $query->{method} = $method;
  163. $query->{route} = $path;
  164. $query->{fullpath} = $fullpath;
  165. $query->{start} = $start;
  166. # Handle HTTP range/streaming requests
  167. my $range = $env->{HTTP_RANGE} || "bytes=0-" if $env->{HTTP_RANGE} || $env->{HTTP_IF_RANGE};
  168. my $streaming = $env->{'psgi.streaming'};
  169. $query->{streaming} = $streaming;
  170. my @ranges;
  171. if ($range) {
  172. $range =~ s/bytes=//g;
  173. push(
  174. @ranges,
  175. map {
  176. [ split( /-/, $_ ) ];
  177. #$tuples[1] //= $tuples[0] + $Trog::Vars::CHUNK_SIZE;
  178. #\@tuples
  179. } split( /,/, $range )
  180. );
  181. }
  182. # If it's a file, just serve it
  183. return Trog::FileHandler::serve( $fullpath, "www/$path", $start, $streaming, \@ranges, $last_fetch, $deflate ) if -f "www/$path";
  184. # Figure out if we have a logged in user, so we can serve them user-specific files
  185. my $cookies = {};
  186. if ( $env->{HTTP_COOKIE} ) {
  187. $cookies = CGI::Cookie->parse( $env->{HTTP_COOKIE} );
  188. }
  189. my $active_user = '';
  190. $Trog::Log::user = 'nobody';
  191. if ( exists $cookies->{tcmslogin} ) {
  192. $active_user = Trog::Auth::session2user( $cookies->{tcmslogin}->value );
  193. $Trog::Log::user = $active_user if $active_user;
  194. }
  195. return Trog::FileHandler::serve( $fullpath, "totp/$path", $start, $streaming, \@ranges, $last_fetch, $deflate ) if -f "totp/$path" && $active_user;
  196. # Now that we have firmed up the actual routing, let's validate.
  197. return _forbidden($query) if exists $routes{$path}{auth} && !$active_user;
  198. return _notfound($query) unless exists $routes{$path} && ref $routes{$path} eq 'HASH' && keys( %{ $routes{$path} } );
  199. return _badrequest($query) unless grep { $env->{REQUEST_METHOD} eq $_ } ( $routes{$path}{method} || '', 'HEAD' );
  200. # Disallow any paths that are naughty ( starman auto-removes .. up-traversal)
  201. if ( index( $path, '/templates' ) == 0 || index( $path, '/statics' ) == 0 || $path =~ m/.*(\.psgi|\.pm)$/i ) {
  202. return _forbidden($query);
  203. }
  204. # Set the urchin parameters if necessary.
  205. %$Trog::Log::DBI::urchin = map { $_ => delete $query->{$_} } qw{utm_source utm_medium utm_campaign utm_term utm_content};
  206. # Now that we've parsed the query and know where we want to go, we should murder everything the route does not explicitly want, and validate what it does
  207. my $parameters = $routes{$path}{parameters};
  208. if ($parameters) {
  209. die "invalid route definition for $path: bad parameters" unless is_hashref($parameters);
  210. my @known_params = keys(%$parameters);
  211. for my $param (@known_params) {
  212. die "Invalid route definition for $path: parameter $param must correspond to a validation CODEREF." unless is_coderef($parameters->{$param});
  213. # A missing parameter is not necessarily a problem.
  214. next unless $query->{$param};
  215. # But if we have it, and it's bad, nack it, so that scanners get fail2banned.
  216. DEBUG("Rejected $fullpath for bad query param $param");
  217. return _badrequest($query) unless $parameters->{$param}->($query->{$param});
  218. }
  219. # Smack down passing of unnecessary fields
  220. foreach my $field (keys(%$query)) {
  221. next if List::Util::any { $field eq $_ } @known_params;
  222. next if List::Util::any { $field eq $_ } qw{start route streaming method fullpath};
  223. DEBUG("Rejected $fullpath for query param $field");
  224. return _badrequest($query);
  225. }
  226. }
  227. # Let's open up our default route before we bother thinking about routing any harder
  228. return $routes{default}{callback}->($query) unless -f "config/setup";
  229. $query->{user_acls} = [];
  230. $query->{user_acls} = Trog::Auth::acls4user($active_user) // [] if $active_user;
  231. # Grab the list of ACLs we want to add to a post, if any.
  232. $query->{acls} = [ $query->{acls} ] if ( $query->{acls} && ref $query->{acls} ne 'ARRAY' );
  233. # Filter out passed ACLs which are naughty
  234. my $is_admin = grep { $_ eq 'admin' } @{ $query->{user_acls} };
  235. @{ $query->{acls} } = grep { $_ ne 'admin' } @{ $query->{acls} } unless $is_admin;
  236. # If we have a static render, just use it instead (These will ALWAYS be correct, data saves invalidate this)
  237. # TODO: make this key on admin INSTEAD of active user when we add non-admin users.
  238. if ( !$active_user && !$has_query ) {
  239. return _static( $fullpath, "$path.z", $start, $streaming ) if -f "www/statics/$path.z" && $deflate;
  240. return _static( $fullpath, $path, $start, $streaming ) if -f "www/statics/$path";
  241. }
  242. $query->{deflate} = $deflate;
  243. $query->{user} = $active_user;
  244. #Set various things we don't want overridden
  245. $query->{body} = '';
  246. $query->{dnt} = $env->{HTTP_DNT};
  247. $query->{user} = $active_user;
  248. $query->{domain} = $domain;
  249. $query->{route} = $path;
  250. $query->{scheme} = $scheme;
  251. $query->{social_meta} = 1;
  252. $query->{primary_post} = {};
  253. $query->{has_query} = $has_query;
  254. $query->{port} = $port;
  255. $query->{lang} = $lang;
  256. $query->{accept} = $accept;
  257. # Redirecting somewhere naughty not allow
  258. $query->{to} = URI->new( $query->{to} // '' )->path() || $query->{to} if $query->{to};
  259. DEBUG("DISPATCH $path to $routes{$path}{callback}");
  260. #XXX there is a trick to now use strict refs, but I don't remember it right at the moment
  261. {
  262. no strict 'refs';
  263. my $output = $routes{$path}{callback}->($query);
  264. die "$path returned no data!" unless ref $output eq 'ARRAY' && @$output == 3;
  265. my $pport = defined $query->{port} ? ":$query->{port}" : "";
  266. INFO("$env->{REQUEST_METHOD} $output->[0] $fullpath");
  267. # Append server-timing headers
  268. my $tot = tv_interval($start) * 1000;
  269. push( @{ $output->[1] }, 'Server-Timing' => "app;dur=$tot" );
  270. return $output;
  271. }
  272. }
  273. #XXX Return a clone of the routing table ref, because code modifies it later
  274. sub _routes ($data={}) {
  275. state %routes;
  276. return clone(\%routes) if %routes;
  277. if (!$data) {
  278. my $conf = Trog::Config::get();
  279. $data = Trog::Data->new($conf);
  280. }
  281. my %roots = $data->routes();
  282. %routes = %Trog::Routes::HTML::routes;
  283. @routes{ keys(%Trog::Routes::JSON::routes) } = values(%Trog::Routes::JSON::routes);
  284. @routes{ keys(%roots) } = values(%roots);
  285. # Add in global routes, here because they *must* know about all other routes
  286. # Also, nobody should ever override these.
  287. $routes{'/robots.txt'} = {
  288. method => 'GET',
  289. callback => \&robots,
  290. };
  291. return clone(\%routes);
  292. }
  293. =head2 robots
  294. Return an appropriate robots.txt
  295. This is a "special" route as it needs to know about all the routes in order to disallow noindex=1 routes.
  296. =cut
  297. sub robots ($query) {
  298. state $etag = "robots-" . time();
  299. my $routes = _routes();
  300. # If there's a 'capture' route, we need to format it correctly.
  301. state @banned = map { exists $routes->{$_}{robot_name} ? $routes->{$_}{robot_name} : $_ } grep { $routes->{$_}{noindex} } sort keys(%$routes);
  302. return Trog::Renderer->render(
  303. contenttype => 'text/plain',
  304. template => 'robots.tx',
  305. data => {
  306. etag => $etag,
  307. banned => \@banned,
  308. %$query,
  309. },
  310. code => 200,
  311. );
  312. }
  313. sub _generic ( $type, $query ) {
  314. return _static( "$type.z", $query->{start}, $query->{streaming} ) if -f "www/statics/$type.z";
  315. return _static( $type, $query->{start}, $query->{streaming} ) if -f "www/statics/$type";
  316. my %lookup = (
  317. notfound => \&Trog::Routes::HTML::notfound,
  318. forbidden => \&Trog::Routes::HTML::forbidden,
  319. badrequest => \&Trog::Routes::HTML::badrequest,
  320. toolong => \&Trog::Routes::HTML::toolong,
  321. error => \&Trog::Routes::HTML::error,
  322. );
  323. return $lookup{$type}->($query);
  324. }
  325. sub _notfound ($query) {
  326. INFO("$query->{method} 404 $query->{fullpath}");
  327. return _generic( 'notfound', $query );
  328. }
  329. sub _forbidden ($query) {
  330. INFO("$query->{method} 403 $query->{fullpath}");
  331. return _generic( 'forbidden', $query );
  332. }
  333. sub _badrequest ($query) {
  334. INFO("$query->{method} 400 $query->{fullpath}");
  335. return _generic( 'badrequest', $query );
  336. }
  337. sub _toolong ($query) {
  338. INFO("$query->{method} 419 $query->{fullpath}");
  339. return _generic( 'toolong', {} );
  340. }
  341. sub _error ($query) {
  342. $query->{method} //= "UNKNOWN";
  343. $query->{fullpath} //= $query->{route} // '/?';
  344. INFO("$query->{method} 500 $query->{fullpath}");
  345. return _generic( 'error', $query );
  346. }
  347. sub _static ( $fullpath, $path, $start, $streaming, $last_fetch = 0 ) {
  348. DEBUG("Rendering static for $path");
  349. # XXX because of psgi I can't just vomit the file directly
  350. if ( open( my $fh, '<', "www/statics/$path" ) ) {
  351. my $headers = '';
  352. # NOTE: this is relying on while advancing the file pointer
  353. while (<$fh>) {
  354. last if $_ eq "\n";
  355. $headers .= $_;
  356. }
  357. my ( undef, undef, $status, undef, $headers_parsed ) = HTTP::Parser::XS::parse_http_response( "$headers\n", HEADERS_AS_HASHREF );
  358. #XXX need to put this into the file itself
  359. my $mt = ( stat($fh) )[9];
  360. my @gm = gmtime($mt);
  361. my $now_string = strftime( "%a, %d %b %Y %H:%M:%S GMT", @gm );
  362. my $code = $mt > $last_fetch ? $status : 304;
  363. $headers_parsed->{"Last-Modified"} = $now_string;
  364. # Append server-timing headers
  365. my $tot = tv_interval($start) * 1000;
  366. $headers_parsed->{'Server-Timing'} = "static;dur=$tot";
  367. #XXX uwsgi just opens the file *again* when we already have a filehandle if it has a path.
  368. # starman by comparison doesn't violate the principle of least astonishment here.
  369. # This is probably a performance optimization, but makes the kind of micromanagement I need to do inconvenient.
  370. # As such, we will just return a stream.
  371. INFO("GET 200 $fullpath");
  372. return sub {
  373. my $responder = shift;
  374. #push(@headers, 'Content-Length' => $sz);
  375. my $writer = $responder->( [ $code, [%$headers_parsed] ] );
  376. while ( $fh->read( my $buf, $Trog::Vars::CHUNK_SIZE ) ) {
  377. $writer->write($buf);
  378. }
  379. close $fh;
  380. $writer->close;
  381. }
  382. if $streaming;
  383. return [ $code, [%$headers_parsed], $fh ];
  384. }
  385. INFO("GET 403 $fullpath");
  386. return [ 403, [ 'Content-Type' => $Trog::Vars::content_types{text} ], ["STAY OUT YOU RED MENACE"] ];
  387. }
  388. 1;