aboutsummaryrefslogtreecommitdiff
path: root/main.go
diff options
context:
space:
mode:
Diffstat (limited to 'main.go')
-rw-r--r--main.go127
1 files changed, 11 insertions, 116 deletions
diff --git a/main.go b/main.go
index 9667841..78237f3 100644
--- a/main.go
+++ b/main.go
@@ -4,125 +4,20 @@
package main
import (
- "encoding/base64"
- "errors"
"log"
"net/http"
- "strings"
+ "time"
)
-type tparams struct {
- Identifier string
- Message string
- Global any
-}
-
func main() {
- log.Fatal(http.ListenAndServe(listenAddr, http.HandlerFunc(func(writer http.ResponseWriter, request *http.Request) {
- // Static resources for powxy itself.
- if strings.HasPrefix(request.URL.Path, "/.powxy/") {
- http.StripPrefix("/.powxy/", http.FileServer(http.FS(resourcesFS))).ServeHTTP(writer, request)
- return
- }
-
- // We attempt to fetch the powxy cookie. Its non-existence
- // does not matter here; if the cookie does not exist, it
- // will be nil, so validation will simply fail and the user
- // will be prompted to solve the PoW challenge.
- cookie, err := request.Cookie("powxy")
- if err != nil && !errors.Is(err, http.ErrNoCookie) {
- log.Println("COOKIE_ERR", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- http.Error(writer, "error fetching cookie", http.StatusInternalServerError)
- return
- }
-
- // We generate the identifier that identifies the client,
- // and the expected HMAC that the cookie should include.
- identifier, expectedMAC := makeIdentifierMAC(request)
-
- // If the cookie exists and is valid, we simply proxy the
- // request.
- if validateCookie(cookie, expectedMAC) {
- log.Println("PROXY", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- proxyRequest(writer, request)
- return
- }
-
- // A convenience function to render the challenge page,
- // since all parameters but the message are constant at this
- // point.
- challengePage := func(message string) {
- err := tmpl.Execute(writer, tparams{
- Identifier: base64.StdEncoding.EncodeToString(identifier),
- Message: message,
- Global: global,
- })
- if err != nil {
- log.Println("Error executing template:", err)
- }
- }
-
- // This generally shouldn't happen, at least not for web
- // browesrs.
- if request.ParseForm() != nil {
- log.Println("MALFORMED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("You submitted a malformed form.")
- return
- }
-
- formValues, ok := request.PostForm["powxy"]
- if !ok {
- // If there's simply no form value, the user is probably
- // just visiting the site for the first time or with an
- // expired cookie.
- log.Println("CHALLENGE", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("")
- return
- } else if len(formValues) != 1 {
- // This should never happen, at least not for web
- // browsers.
- log.Println("FORM_VALUES", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("You submitted an invalid number of form values.")
- return
- }
-
- // We validate that the length is reasonable before even
- // decoding it with base64.
- if len(formValues[0]) > 43 {
- log.Println("TOO_LONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("Your submission was too long.")
- return
- }
-
- // Actually decode the base64 value.
- nonce, err := base64.StdEncoding.DecodeString(formValues[0])
- if err != nil {
- log.Println("BASE64", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("Your submission was improperly encoded.")
- return
- }
-
- // Validate the nonce.
- if !validateNonce(identifier, nonce) {
- log.Println("WRONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- challengePage("Your submission was incorrect, or your session has expired while submitting.")
- return
- }
-
- // Everything starting here: the nonce is valid, and we
- // can set the cookie and redirect them. The redirection is
- // needed as their "normal" request is most definitely
- // different from one to expect after solving the PoW
- // challenge.
-
- http.SetCookie(writer, &http.Cookie{
- Name: "powxy",
- Value: base64.StdEncoding.EncodeToString(expectedMAC),
- Secure: true,
- HttpOnly: true,
- })
-
- log.Println("ACCEPTED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
- http.Redirect(writer, request, "", http.StatusSeeOther)
- })))
+ server := &http.Server{
+ Addr: listenAddr,
+ Handler: http.HandlerFunc(handler),
+ ReadTimeout: time.Duration(readTimeout) * time.Second,
+ WriteTimeout: time.Duration(writeTimeout) * time.Second,
+ IdleTimeout: time.Duration(idleTimeout) * time.Second,
+ ReadHeaderTimeout: time.Duration(readHeaderTimeout) * time.Second,
+ }
+
+ log.Fatal(server.ListenAndServe())
}