aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRunxi Yu <me@runxiyu.org>2025-03-25 00:41:29 +0800
committerRunxi Yu <me@runxiyu.org>2025-03-25 10:13:59 +0800
commiteb1cd520fe4760c500c45a912a68e3e37e991e27 (patch)
tree82e9699a02f32692783ccf8054756d7d92778498
parentIRC logging thing (diff)
downloadpowxy-eb1cd520fe4760c500c45a912a68e3e37e991e27.tar.gz
powxy-eb1cd520fe4760c500c45a912a68e3e37e991e27.tar.zst
powxy-eb1cd520fe4760c500c45a912a68e3e37e991e27.zip
Weirder handler messages
-rw-r--r--handler.go18
1 files changed, 9 insertions, 9 deletions
diff --git a/handler.go b/handler.go
index 85dbdc5..fcdae0c 100644
--- a/handler.go
+++ b/handler.go
@@ -29,7 +29,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// will be prompted to solve the PoW challenge.
cookie, err := request.Cookie("powxy")
if err != nil && !errors.Is(err, http.ErrNoCookie) {
- slog.Error("error fetching cookie",
+ slog.Error("ERRCOOKIE",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -46,7 +46,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// If the cookie exists and is valid, we simply proxy the
// request.
if validateCookie(cookie, expectedMAC) {
- slog.Info("proxying request",
+ slog.Info("++ PROXY",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -81,7 +81,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// browesrs.
err = request.ParseForm()
if err != nil {
- slog.Warn("malformed form submission",
+ slog.Warn("MALFORMED",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -96,7 +96,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// If there's simply no form value, the user is probably
// just visiting the site for the first time or with an
// expired cookie.
- slog.Info("serving challenge page",
+ slog.Info("-- POW CHL",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -106,7 +106,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
} else if len(formValues) != 1 {
// This should never happen, at least not for web
// browsers.
- slog.Warn("invalid number of form values",
+ slog.Warn("FORMNUM",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -119,7 +119,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// We validate that the length is reasonable before even
// decoding it with base64.
if len(formValues[0]) > 43 {
- slog.Warn("submission too long",
+ slog.Warn("TOOLONG",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -132,7 +132,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// Actually decode the base64 value.
nonce, err := base64.StdEncoding.DecodeString(formValues[0])
if err != nil {
- slog.Warn("base64 decoding failed",
+ slog.Warn("ERRBASE64",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -145,7 +145,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// Validate the nonce.
if !validateNonce(identifier, nonce) {
- slog.Warn("wrong nonce",
+ slog.Warn("-- POW NAK",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -168,7 +168,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
HttpOnly: true,
})
- slog.Info("accepted proof of work",
+ slog.Info("-- POW ACK",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,