diff options
author | Runxi Yu <me@runxiyu.org> | 2025-03-25 00:41:29 +0800 |
---|---|---|
committer | Runxi Yu <me@runxiyu.org> | 2025-03-25 10:13:59 +0800 |
commit | eb1cd520fe4760c500c45a912a68e3e37e991e27 (patch) | |
tree | 82e9699a02f32692783ccf8054756d7d92778498 | |
parent | IRC logging thing (diff) | |
download | powxy-eb1cd520fe4760c500c45a912a68e3e37e991e27.tar.gz powxy-eb1cd520fe4760c500c45a912a68e3e37e991e27.tar.zst powxy-eb1cd520fe4760c500c45a912a68e3e37e991e27.zip |
Weirder handler messages
-rw-r--r-- | handler.go | 18 |
1 files changed, 9 insertions, 9 deletions
@@ -29,7 +29,7 @@ func handler(writer http.ResponseWriter, request *http.Request) { // will be prompted to solve the PoW challenge. cookie, err := request.Cookie("powxy") if err != nil && !errors.Is(err, http.ErrNoCookie) { - slog.Error("error fetching cookie", + slog.Error("ERRCOOKIE", "ip", remoteIP, "uri", uri, "user_agent", userAgent, @@ -46,7 +46,7 @@ func handler(writer http.ResponseWriter, request *http.Request) { // If the cookie exists and is valid, we simply proxy the // request. if validateCookie(cookie, expectedMAC) { - slog.Info("proxying request", + slog.Info("++ PROXY", "ip", remoteIP, "uri", uri, "user_agent", userAgent, @@ -81,7 +81,7 @@ func handler(writer http.ResponseWriter, request *http.Request) { // browesrs. err = request.ParseForm() if err != nil { - slog.Warn("malformed form submission", + slog.Warn("MALFORMED", "ip", remoteIP, "uri", uri, "user_agent", userAgent, @@ -96,7 +96,7 @@ func handler(writer http.ResponseWriter, request *http.Request) { // If there's simply no form value, the user is probably // just visiting the site for the first time or with an // expired cookie. - slog.Info("serving challenge page", + slog.Info("-- POW CHL", "ip", remoteIP, "uri", uri, "user_agent", userAgent, @@ -106,7 +106,7 @@ func handler(writer http.ResponseWriter, request *http.Request) { } else if len(formValues) != 1 { // This should never happen, at least not for web // browsers. - slog.Warn("invalid number of form values", + slog.Warn("FORMNUM", "ip", remoteIP, "uri", uri, "user_agent", userAgent, @@ -119,7 +119,7 @@ func handler(writer http.ResponseWriter, request *http.Request) { // We validate that the length is reasonable before even // decoding it with base64. if len(formValues[0]) > 43 { - slog.Warn("submission too long", + slog.Warn("TOOLONG", "ip", remoteIP, "uri", uri, "user_agent", userAgent, @@ -132,7 +132,7 @@ func handler(writer http.ResponseWriter, request *http.Request) { // Actually decode the base64 value. nonce, err := base64.StdEncoding.DecodeString(formValues[0]) if err != nil { - slog.Warn("base64 decoding failed", + slog.Warn("ERRBASE64", "ip", remoteIP, "uri", uri, "user_agent", userAgent, @@ -145,7 +145,7 @@ func handler(writer http.ResponseWriter, request *http.Request) { // Validate the nonce. if !validateNonce(identifier, nonce) { - slog.Warn("wrong nonce", + slog.Warn("-- POW NAK", "ip", remoteIP, "uri", uri, "user_agent", userAgent, @@ -168,7 +168,7 @@ func handler(writer http.ResponseWriter, request *http.Request) { HttpOnly: true, }) - slog.Info("accepted proof of work", + slog.Info("-- POW ACK", "ip", remoteIP, "uri", uri, "user_agent", userAgent, |