aboutsummaryrefslogtreecommitdiff
path: root/handler.go
diff options
context:
space:
mode:
Diffstat (limited to 'handler.go')
-rw-r--r--handler.go20
1 files changed, 10 insertions, 10 deletions
diff --git a/handler.go b/handler.go
index 2cbd225..9e5a679 100644
--- a/handler.go
+++ b/handler.go
@@ -29,7 +29,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// will be prompted to solve the PoW challenge.
cookie, err := request.Cookie("powxy")
if err != nil && !errors.Is(err, http.ErrNoCookie) {
- slog.Error("error fetching cookie",
+ slog.Error("\x0304ERRCOOKIE",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -46,7 +46,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// If the cookie exists and is valid, we simply proxy the
// request.
if validateCookie(cookie, expectedMAC) {
- slog.Info("proxying request",
+ slog.Info("\x0302PROXY",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -68,7 +68,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
Global: global,
})
if err != nil {
- slog.Error("template execution failed",
+ slog.Error("\x0304template execution failed",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -81,7 +81,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// browesrs.
err = request.ParseForm()
if err != nil {
- slog.Warn("malformed form submission",
+ slog.Warn("\x0304MALFORMED",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -96,7 +96,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// If there's simply no form value, the user is probably
// just visiting the site for the first time or with an
// expired cookie.
- slog.Info("serving challenge page",
+ slog.Info("\x0301POW CHL",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -106,7 +106,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
} else if len(formValues) != 1 {
// This should never happen, at least not for web
// browsers.
- slog.Warn("invalid number of form values",
+ slog.Warn("\x0304FORMNUM",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -119,7 +119,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// We validate that the length is reasonable before even
// decoding it with base64.
if len(formValues[0]) > 44 {
- slog.Warn("submission too long",
+ slog.Warn("\x0304TOOLONG",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -132,7 +132,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// Actually decode the base64 value.
nonce, err := base64.StdEncoding.DecodeString(formValues[0])
if err != nil {
- slog.Warn("base64 decoding failed",
+ slog.Warn("\x0304ERRBASE64",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -145,7 +145,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
// Validate the nonce.
if !validateNonce(identifier, nonce) {
- slog.Warn("wrong nonce",
+ slog.Warn("\x0304",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,
@@ -169,7 +169,7 @@ func handler(writer http.ResponseWriter, request *http.Request) {
Path: "/",
})
- slog.Info("accepted proof of work",
+ slog.Info("\x0303POW ACK",
"ip", remoteIP,
"uri", uri,
"user_agent", userAgent,