aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRunxi Yu <me@runxiyu.org>2025-03-24 22:10:19 +0800
committerRunxi Yu <me@runxiyu.org>2025-03-24 22:10:19 +0800
commitd5c760736f453b2923252953c726240f787e52f6 (patch)
treee21cce4467666742bbea7c051768120ef5adbc23
parentRefactor (diff)
downloadpowxy-d5c760736f453b2923252953c726240f787e52f6.tar.gz
powxy-d5c760736f453b2923252953c726240f787e52f6.tar.zst
powxy-d5c760736f453b2923252953c726240f787e52f6.zip
Refactor again
-rw-r--r--flags.go14
-rw-r--r--handler.go128
-rw-r--r--main.go127
3 files changed, 150 insertions, 119 deletions
diff --git a/flags.go b/flags.go
index 49bd3ff..1cf8b63 100644
--- a/flags.go
+++ b/flags.go
@@ -6,9 +6,13 @@ package main
import "flag"
var (
- listenAddr string
- destHost string
- secondary bool
+ listenAddr string
+ destHost string
+ secondary bool
+ readTimeout int
+ writeTimeout int
+ idleTimeout int
+ readHeaderTimeout int
)
// This init parses command line flags.
@@ -18,6 +22,10 @@ func init() {
flag.StringVar(&listenAddr, "listen", ":8081", "address to listen on")
flag.StringVar(&destHost, "upstream", "http://127.0.0.1:8080", "destination url base to proxy to")
flag.BoolVar(&secondary, "secondary", false, "trust X-Forwarded-For headers")
+ flag.IntVar(&readTimeout, "read-timeout", 0, "read timeout in seconds, 0 for no timeout")
+ flag.IntVar(&writeTimeout, "write-timeout", 0, "write timeout in seconds, 0 for no timeout")
+ flag.IntVar(&idleTimeout, "idle-timeout", 0, "idle timeout in seconds, 0 for no timeout")
+ flag.IntVar(&readHeaderTimeout, "read-header-timeout", 30, "read header timeout in seconds, 0 for no timeout")
flag.Parse()
global.NeedBitsReverse = 256 - global.NeedBits
}
diff --git a/handler.go b/handler.go
new file mode 100644
index 0000000..2b63dfe
--- /dev/null
+++ b/handler.go
@@ -0,0 +1,128 @@
+// SPDX-License-Identifier: BSD-2-Clause
+// SPDX-FileCopyrightText: Copyright (c) 2025 Runxi Yu <https://runxiyu.org>
+
+package main
+
+import (
+ "encoding/base64"
+ "errors"
+ "log"
+ "net/http"
+ "strings"
+)
+
+// handler handles an incoming HTTP request.
+func handler(writer http.ResponseWriter, request *http.Request) {
+ // Static resources for powxy itself.
+ if strings.HasPrefix(request.URL.Path, "/.powxy/") {
+ http.StripPrefix("/.powxy/", http.FileServer(http.FS(resourcesFS))).ServeHTTP(writer, request)
+ return
+ }
+
+ // We attempt to fetch the powxy cookie. Its non-existence
+ // does not matter here; if the cookie does not exist, it
+ // will be nil, so validation will simply fail and the user
+ // will be prompted to solve the PoW challenge.
+ cookie, err := request.Cookie("powxy")
+ if err != nil && !errors.Is(err, http.ErrNoCookie) {
+ log.Println("COOKIE_ERR", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ http.Error(writer, "error fetching cookie", http.StatusInternalServerError)
+ return
+ }
+
+ // We generate the identifier that identifies the client,
+ // and the expected HMAC that the cookie should include.
+ identifier, expectedMAC := makeIdentifierMAC(request)
+
+ // If the cookie exists and is valid, we simply proxy the
+ // request.
+ if validateCookie(cookie, expectedMAC) {
+ log.Println("PROXY", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ proxyRequest(writer, request)
+ return
+ }
+
+ // A convenience function to render the challenge page,
+ // since all parameters but the message are constant at this
+ // point.
+ challengePage := func(message string) {
+ err := tmpl.Execute(writer, tparams{
+ Identifier: base64.StdEncoding.EncodeToString(identifier),
+ Message: message,
+ Global: global,
+ })
+ if err != nil {
+ log.Println("Error executing template:", err)
+ }
+ }
+
+ // This generally shouldn't happen, at least not for web
+ // browesrs.
+ if request.ParseForm() != nil {
+ log.Println("MALFORMED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("You submitted a malformed form.")
+ return
+ }
+
+ formValues, ok := request.PostForm["powxy"]
+ if !ok {
+ // If there's simply no form value, the user is probably
+ // just visiting the site for the first time or with an
+ // expired cookie.
+ log.Println("CHALLENGE", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("")
+ return
+ } else if len(formValues) != 1 {
+ // This should never happen, at least not for web
+ // browsers.
+ log.Println("FORM_VALUES", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("You submitted an invalid number of form values.")
+ return
+ }
+
+ // We validate that the length is reasonable before even
+ // decoding it with base64.
+ if len(formValues[0]) > 43 {
+ log.Println("TOO_LONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("Your submission was too long.")
+ return
+ }
+
+ // Actually decode the base64 value.
+ nonce, err := base64.StdEncoding.DecodeString(formValues[0])
+ if err != nil {
+ log.Println("BASE64", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("Your submission was improperly encoded.")
+ return
+ }
+
+ // Validate the nonce.
+ if !validateNonce(identifier, nonce) {
+ log.Println("WRONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("Your submission was incorrect, or your session has expired while submitting.")
+ return
+ }
+
+ // Everything starting here: the nonce is valid, and we
+ // can set the cookie and redirect them. The redirection is
+ // needed as their "normal" request is most definitely
+ // different from one to expect after solving the PoW
+ // challenge.
+
+ http.SetCookie(writer, &http.Cookie{
+ Name: "powxy",
+ Value: base64.StdEncoding.EncodeToString(expectedMAC),
+ Secure: true,
+ HttpOnly: true,
+ })
+
+ log.Println("ACCEPTED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ http.Redirect(writer, request, "", http.StatusSeeOther)
+}
+
+// tparams holds paramters for the template.
+type tparams struct {
+ Identifier string
+ Message string
+ Global any
+}
diff --git a/main.go b/main.go
index 9667841..78237f3 100644
--- a/main.go
+++ b/main.go
@@ -4,125 +4,20 @@
package main
import (
- "encoding/base64"
- "errors"
"log"
"net/http"
- "strings"
+ "time"
)
-type tparams struct {
- Identifier string
- Message string
- Global any
-}
-
func main() {
- log.Fatal(http.ListenAndServe(listenAddr, http.HandlerFunc(func(writer http.ResponseWriter, request *http.Request) {
- // Static resources for powxy itself.
- if strings.HasPrefix(request.URL.Path, "/.powxy/") {
- http.StripPrefix("/.powxy/", http.FileServer(http.FS(resourcesFS))).ServeHTTP(writer, request)
- return
- }
-
- // We attempt to fetch the powxy cookie. Its non-existence
- // does not matter here; if the cookie does not exist, it
- // will be nil, so validation will simply fail and the user
- // will be prompted to solve the PoW challenge.
- cookie, err := request.Cookie("powxy")
- if err != nil && !errors.Is(err, http.ErrNoCookie) {
- log.Println("COOKIE_ERR", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- http.Error(writer, "error fetching cookie", http.StatusInternalServerError)
- return
- }
-
- // We generate the identifier that identifies the client,
- // and the expected HMAC that the cookie should include.
- identifier, expectedMAC := makeIdentifierMAC(request)
-
- // If the cookie exists and is valid, we simply proxy the
- // request.
- if validateCookie(cookie, expectedMAC) {
- log.Println("PROXY", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- proxyRequest(writer, request)
- return
- }
-
- // A convenience function to render the challenge page,
- // since all parameters but the message are constant at this
- // point.
- challengePage := func(message string) {
- err := tmpl.Execute(writer, tparams{
- Identifier: base64.StdEncoding.EncodeToString(identifier),
- Message: message,
- Global: global,
- })
- if err != nil {
- log.Println("Error executing template:", err)
- }
- }
-
- // This generally shouldn't happen, at least not for web
- // browesrs.
- if request.ParseForm() != nil {
- log.Println("MALFORMED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("You submitted a malformed form.")
- return
- }
-
- formValues, ok := request.PostForm["powxy"]
- if !ok {
- // If there's simply no form value, the user is probably
- // just visiting the site for the first time or with an
- // expired cookie.
- log.Println("CHALLENGE", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("")
- return
- } else if len(formValues) != 1 {
- // This should never happen, at least not for web
- // browsers.
- log.Println("FORM_VALUES", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("You submitted an invalid number of form values.")
- return
- }
-
- // We validate that the length is reasonable before even
- // decoding it with base64.
- if len(formValues[0]) > 43 {
- log.Println("TOO_LONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("Your submission was too long.")
- return
- }
-
- // Actually decode the base64 value.
- nonce, err := base64.StdEncoding.DecodeString(formValues[0])
- if err != nil {
- log.Println("BASE64", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("Your submission was improperly encoded.")
- return
- }
-
- // Validate the nonce.
- if !validateNonce(identifier, nonce) {
- log.Println("WRONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("Your submission was incorrect, or your session has expired while submitting.")
- return
- }
-
- // Everything starting here: the nonce is valid, and we
- // can set the cookie and redirect them. The redirection is
- // needed as their "normal" request is most definitely
- // different from one to expect after solving the PoW
- // challenge.
-
- http.SetCookie(writer, &http.Cookie{
- Name: "powxy",
- Value: base64.StdEncoding.EncodeToString(expectedMAC),
- Secure: true,
- HttpOnly: true,
- })
-
- log.Println("ACCEPTED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- http.Redirect(writer, request, "", http.StatusSeeOther)
- })))
+ server := &http.Server{
+ Addr: listenAddr,
+ Handler: http.HandlerFunc(handler),
+ ReadTimeout: time.Duration(readTimeout) * time.Second,
+ WriteTimeout: time.Duration(writeTimeout) * time.Second,
+ IdleTimeout: time.Duration(idleTimeout) * time.Second,
+ ReadHeaderTimeout: time.Duration(readHeaderTimeout) * time.Second,
+ }
+
+ log.Fatal(server.ListenAndServe())
}