Plugin: signinview
Author: ?jcflack
Included in ikiwiki: no
Enabled by default: no
Included in goodstuff: no
Currently enabled: no
This plugin is one implementation approach to a zoned ikiwiki. It is named
like signinedit, which requires users to sign in before editing pages.
Similarly, this plugin requires users to sign in before viewing certain pages.
Unlike signinedit, which only checks that any user is signed in,
this plugin is also similar to lockedit in that it checks the user's
identity and a PageSpec to determine which pages may be viewed.
It works with any auth methods ikiwiki supports, not only those the http
server
also understands.
How to configure
This plugin adds a new function, do=view
, to ikiwiki's CGI wrapper. It is intended
to be called by the http
server as an ErrorDocument
for the 403
(forbidden) error response.
In order to be usable even in shared-hosting situations without full access to
the http
server configuration files, this plugin requires nothing more than
.htaccess
files, as long as the server is configured to honor ErrorDocument
and
Deny
or Require
directives in them.
To divide the wiki into a public zone and one or more private zone(s), simply place
Require all denied
(Apache 2.4), Deny from All
(Apache 2.2), or the equivalent
directive for the server and version in use, on the topmost directory of any private
zone, either in an .htaccess
file, or in the server configuration file if possible.
Any location outside of these will continue to be served as normal public static
ikiwiki content.
Then, if the {$cgiurl}
is, for example, /cgi-bin/ikiwiki.cgi
, add the directive
ErrorDocument 403 /cgi-bin/ikiwiki.cgi?do=view
at the private locations or any ancestor up to the documentroot itself, again either
in a .htaccess
file or in the server configuration file.
That's it for the server configuration. The server will now punt every request for private content to the ikiwiki wrapper. Everything else about the authorization decision--what auth method to use, whether there is just one private zone or different zones for different users--is handled by ikiwiki using a PageSpec.
viewable_pages config option
This option in ikiwiki.setup
is a PageSpec defining which pages can be viewed.
Because one predicate that can be used in a PageSpec is user
, this is enough
to define interesting access rules. For example:
viewable_pages: >
((user(astolfo) or user(basilio)) and team1/*)
or
((user(clotaldo) or user(estrella)) and team2/*)
Note that this defines the conditions to allow viewing, which is opposite the sense of the lockedit plugin, where you define the conditions to deny editing.
If there are more than a few users in a group, or the specification for accessible pages is more complex, the pagespec alias plugin can be useful to factor things out. Note it currently must be patched for this to work:
pagespec_aliases:
team1: >
user(astolfo)
or user(basilio)
team2: >
user(clotaldo)
or user(estrella)
team1stuff: team1/* or common/*
team2stuff: team2/* or common/*
viewable_pages: >
(team1() and team1stuff())
or (team2() and team2stuff())
mime_types config option
Normally, when serving the static pages of an ordinary public site,
the http
server itself is responsible for identifying the Content-Type
of each file. However, for any page that is served by this plugin instead
of directly, the CGI specification makes it plugin's job,
not the server's, to identify the Content-Type
.
In the current version, this plugin does that in a dead-simple way. For any page that ikiwiki htmlized
(that is, for which the pagetype
plugin API function returns a value),
the type text/html
is assigned. For anything else, a simple collection of content types and PageSpec
s
must be configured in the ikiwiki.setup
file:
mime_types:
image/png: '*.png'
application/pdf: '*.pdf'
text/css: '*.css'
Anything without a matching rule gets served as application/octet-stream
, which is
probably not what you want, but a clear sign of what rule needs to be added.
Other considerations
Leakage of non-content files
Any CGI code that does what this plugin does, and can serve requested files under the
document root, needs to be careful not to allow viewing of certain sensitive files
that may also be found there, such as .htaccess
, .htpasswd
, etc. Instead of trying
to think of all the possible files that should not be served, this plugin takes an
absolutely strict approach: every requested file is looked up in the %destsources
hash,
containing all the files ikiwiki has generated or placed in the web root.
Any file that ikiwiki didn't put there, this plugin won't touch. Otherwise, its page
name is now known, and must satisfy the viewable_pages
PageSpec
.
This policy is also what allows this plugin to work back through %pagesources
to
the original source name, needed for the content-type rules described above.
Cache control
The purpose of a non-public zone can be defeated if there are caching proxies or other non-private caches that might retain the content this plugin returns.
Caching of the response is automatically forbidden by the HTTP specification
if there was an Authorization
header in the request.
However, this plugin works with any auth method ikiwiki supports, not all of which require
that header, so this plugin always emits response headers to explicitly forbid caching.
Note that nothing precludes an evil caching agent that ignores the rules.
Other ways to handle Content-Type
While it is simple enough to supply a mime_types
map in ikiwiki.setup
, it also
duplicates logic that has already been done to death in other places. Another approach
would be to use File::MimeInfo::Magic
, which is already present if the filecheck
plugin is in use.
In a wiki compiler, it would be natural to do that content-type determination
at compile time and save it in page state, so this plugin would simply output
the stored type. On the other hand, saving the type for every (non-htmlized?) page
would enlarge the state Storable
that has to be loaded, and so might not be
faster than typing the file on the fly.
Obtaining and installing
The signinview
plugin is not in github yet
(horroars! vaporware!). What is in github at the moment is a preliminary patch I have
proposed,
giving plugins some control over the environment variables that a generated wrapper will preserve.
Depending on the ultimate fate of that patch, I will adjust/rebase and then push the signinview
branch itself.