+;;
+;; This script is written with the expectation that it is an embedded
+;; newlisp executable invked via .cgi links from within the
+;; subdirectory www
+;;
+;; Its (main-args 0) has a final path component X.cgi that links to
+;; this file as a packnl embedding that will use that X part of its
+;; name to determine th actual script. That lookup will also use the
+;; "role base" as declared in "roles.txt"
+
+(unless (ends-with (main-args 0) ".cgi")
+ (if (exists file? (list (main-args 1)
+ (string (main-args 1) ".lsp")))
+ (load $it)
+ (write-line 2 (string "Unknown command " (main-args 1))))
+ (exit 0))
+
+;; This script is executed in (protected) subdirectory www
+(change-dir "..")
+
+;; Needs an HTTP_AUTHORIZATION environment variable
+(unless (setf AUTH (env "HTTP_AUTHORIZATION"))
+ (write-line 2 (read-file "tmpl/unauthorized.http"))
+ (exit 0))
+
+;; Must find that value in .htpasswd
+(unless (ref (6 AUTH) (parse (read-file ".htpasswd") "\n"))
+ (write-line 1 (read-file "tmpl/unauthorized.http"))
+ (exit 0))
+
+(setf
+ ROLES (map (fn (x) (parse x ":")) (parse (read-file "roles.txt") "\n"))
+ REMOTE_USER (and (regex "([^:]+):" (base64-dec (6 AUTH)) 0) $1)
+ ROLE (or (lookup REMOTE_USER ROLSE) "child")
+ SCRIPT (format "%s/%s" ROLE (main-args 1))
+ )
+(env "REMOTE_USER" REMOTE_USER)
+(env "ROLE" ROLE)
+
+(unless (file? SCRIPT)
+ (write 1 "\nBroken.\n")
+ (exit 0))
+
+(load SCRIPT)
+(exit 0)