aboutsummaryrefslogtreecommitdiff
path: root/handler.go
diff options
context:
space:
mode:
Diffstat (limited to 'handler.go')
-rw-r--r--handler.go128
1 files changed, 128 insertions, 0 deletions
diff --git a/handler.go b/handler.go
new file mode 100644
index 0000000..2b63dfe
--- /dev/null
+++ b/handler.go
@@ -0,0 +1,128 @@
+// SPDX-License-Identifier: BSD-2-Clause
+// SPDX-FileCopyrightText: Copyright (c) 2025 Runxi Yu <https://runxiyu.org>
+
+package main
+
+import (
+ "encoding/base64"
+ "errors"
+ "log"
+ "net/http"
+ "strings"
+)
+
+// handler handles an incoming HTTP request.
+func handler(writer http.ResponseWriter, request *http.Request) {
+ // Static resources for powxy itself.
+ if strings.HasPrefix(request.URL.Path, "/.powxy/") {
+ http.StripPrefix("/.powxy/", http.FileServer(http.FS(resourcesFS))).ServeHTTP(writer, request)
+ return
+ }
+
+ // We attempt to fetch the powxy cookie. Its non-existence
+ // does not matter here; if the cookie does not exist, it
+ // will be nil, so validation will simply fail and the user
+ // will be prompted to solve the PoW challenge.
+ cookie, err := request.Cookie("powxy")
+ if err != nil && !errors.Is(err, http.ErrNoCookie) {
+ log.Println("COOKIE_ERR", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ http.Error(writer, "error fetching cookie", http.StatusInternalServerError)
+ return
+ }
+
+ // We generate the identifier that identifies the client,
+ // and the expected HMAC that the cookie should include.
+ identifier, expectedMAC := makeIdentifierMAC(request)
+
+ // If the cookie exists and is valid, we simply proxy the
+ // request.
+ if validateCookie(cookie, expectedMAC) {
+ log.Println("PROXY", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ proxyRequest(writer, request)
+ return
+ }
+
+ // A convenience function to render the challenge page,
+ // since all parameters but the message are constant at this
+ // point.
+ challengePage := func(message string) {
+ err := tmpl.Execute(writer, tparams{
+ Identifier: base64.StdEncoding.EncodeToString(identifier),
+ Message: message,
+ Global: global,
+ })
+ if err != nil {
+ log.Println("Error executing template:", err)
+ }
+ }
+
+ // This generally shouldn't happen, at least not for web
+ // browesrs.
+ if request.ParseForm() != nil {
+ log.Println("MALFORMED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("You submitted a malformed form.")
+ return
+ }
+
+ formValues, ok := request.PostForm["powxy"]
+ if !ok {
+ // If there's simply no form value, the user is probably
+ // just visiting the site for the first time or with an
+ // expired cookie.
+ log.Println("CHALLENGE", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("")
+ return
+ } else if len(formValues) != 1 {
+ // This should never happen, at least not for web
+ // browsers.
+ log.Println("FORM_VALUES", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("You submitted an invalid number of form values.")
+ return
+ }
+
+ // We validate that the length is reasonable before even
+ // decoding it with base64.
+ if len(formValues[0]) > 43 {
+ log.Println("TOO_LONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("Your submission was too long.")
+ return
+ }
+
+ // Actually decode the base64 value.
+ nonce, err := base64.StdEncoding.DecodeString(formValues[0])
+ if err != nil {
+ log.Println("BASE64", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("Your submission was improperly encoded.")
+ return
+ }
+
+ // Validate the nonce.
+ if !validateNonce(identifier, nonce) {
+ log.Println("WRONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ challengePage("Your submission was incorrect, or your session has expired while submitting.")
+ return
+ }
+
+ // Everything starting here: the nonce is valid, and we
+ // can set the cookie and redirect them. The redirection is
+ // needed as their "normal" request is most definitely
+ // different from one to expect after solving the PoW
+ // challenge.
+
+ http.SetCookie(writer, &http.Cookie{
+ Name: "powxy",
+ Value: base64.StdEncoding.EncodeToString(expectedMAC),
+ Secure: true,
+ HttpOnly: true,
+ })
+
+ log.Println("ACCEPTED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
+ http.Redirect(writer, request, "", http.StatusSeeOther)
+}
+
+// tparams holds paramters for the template.
+type tparams struct {
+ Identifier string
+ Message string
+ Global any
+}