diff options
Diffstat (limited to 'handler.go')
-rw-r--r-- | handler.go | 128 |
1 files changed, 128 insertions, 0 deletions
diff --git a/handler.go b/handler.go new file mode 100644 index 0000000..2b63dfe --- /dev/null +++ b/handler.go @@ -0,0 +1,128 @@ +// SPDX-License-Identifier: BSD-2-Clause +// SPDX-FileCopyrightText: Copyright (c) 2025 Runxi Yu <https://runxiyu.org> + +package main + +import ( + "encoding/base64" + "errors" + "log" + "net/http" + "strings" +) + +// handler handles an incoming HTTP request. +func handler(writer http.ResponseWriter, request *http.Request) { + // Static resources for powxy itself. + if strings.HasPrefix(request.URL.Path, "/.powxy/") { + http.StripPrefix("/.powxy/", http.FileServer(http.FS(resourcesFS))).ServeHTTP(writer, request) + return + } + + // We attempt to fetch the powxy cookie. Its non-existence + // does not matter here; if the cookie does not exist, it + // will be nil, so validation will simply fail and the user + // will be prompted to solve the PoW challenge. + cookie, err := request.Cookie("powxy") + if err != nil && !errors.Is(err, http.ErrNoCookie) { + log.Println("COOKIE_ERR", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) + http.Error(writer, "error fetching cookie", http.StatusInternalServerError) + return + } + + // We generate the identifier that identifies the client, + // and the expected HMAC that the cookie should include. + identifier, expectedMAC := makeIdentifierMAC(request) + + // If the cookie exists and is valid, we simply proxy the + // request. + if validateCookie(cookie, expectedMAC) { + log.Println("PROXY", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) + proxyRequest(writer, request) + return + } + + // A convenience function to render the challenge page, + // since all parameters but the message are constant at this + // point. + challengePage := func(message string) { + err := tmpl.Execute(writer, tparams{ + Identifier: base64.StdEncoding.EncodeToString(identifier), + Message: message, + Global: global, + }) + if err != nil { + log.Println("Error executing template:", err) + } + } + + // This generally shouldn't happen, at least not for web + // browesrs. + if request.ParseForm() != nil { + log.Println("MALFORMED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) + challengePage("You submitted a malformed form.") + return + } + + formValues, ok := request.PostForm["powxy"] + if !ok { + // If there's simply no form value, the user is probably + // just visiting the site for the first time or with an + // expired cookie. + log.Println("CHALLENGE", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) + challengePage("") + return + } else if len(formValues) != 1 { + // This should never happen, at least not for web + // browsers. + log.Println("FORM_VALUES", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) + challengePage("You submitted an invalid number of form values.") + return + } + + // We validate that the length is reasonable before even + // decoding it with base64. + if len(formValues[0]) > 43 { + log.Println("TOO_LONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) + challengePage("Your submission was too long.") + return + } + + // Actually decode the base64 value. + nonce, err := base64.StdEncoding.DecodeString(formValues[0]) + if err != nil { + log.Println("BASE64", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) + challengePage("Your submission was improperly encoded.") + return + } + + // Validate the nonce. + if !validateNonce(identifier, nonce) { + log.Println("WRONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) + challengePage("Your submission was incorrect, or your session has expired while submitting.") + return + } + + // Everything starting here: the nonce is valid, and we + // can set the cookie and redirect them. The redirection is + // needed as their "normal" request is most definitely + // different from one to expect after solving the PoW + // challenge. + + http.SetCookie(writer, &http.Cookie{ + Name: "powxy", + Value: base64.StdEncoding.EncodeToString(expectedMAC), + Secure: true, + HttpOnly: true, + }) + + log.Println("ACCEPTED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) + http.Redirect(writer, request, "", http.StatusSeeOther) +} + +// tparams holds paramters for the template. +type tparams struct { + Identifier string + Message string + Global any +} |