diff options
Diffstat (limited to 'main.go')
-rw-r--r-- | main.go | 127 |
1 files changed, 11 insertions, 116 deletions
@@ -4,125 +4,20 @@ package main import ( - "encoding/base64" - "errors" "log" "net/http" - "strings" + "time" ) -type tparams struct { - Identifier string - Message string - Global any -} - func main() { - log.Fatal(http.ListenAndServe(listenAddr, http.HandlerFunc(func(writer http.ResponseWriter, request *http.Request) { - // Static resources for powxy itself. - if strings.HasPrefix(request.URL.Path, "/.powxy/") { - http.StripPrefix("/.powxy/", http.FileServer(http.FS(resourcesFS))).ServeHTTP(writer, request) - return - } - - // We attempt to fetch the powxy cookie. Its non-existence - // does not matter here; if the cookie does not exist, it - // will be nil, so validation will simply fail and the user - // will be prompted to solve the PoW challenge. - cookie, err := request.Cookie("powxy") - if err != nil && !errors.Is(err, http.ErrNoCookie) { - log.Println("COOKIE_ERR", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) - http.Error(writer, "error fetching cookie", http.StatusInternalServerError) - return - } - - // We generate the identifier that identifies the client, - // and the expected HMAC that the cookie should include. - identifier, expectedMAC := makeIdentifierMAC(request) - - // If the cookie exists and is valid, we simply proxy the - // request. - if validateCookie(cookie, expectedMAC) { - log.Println("PROXY", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) - proxyRequest(writer, request) - return - } - - // A convenience function to render the challenge page, - // since all parameters but the message are constant at this - // point. - challengePage := func(message string) { - err := tmpl.Execute(writer, tparams{ - Identifier: base64.StdEncoding.EncodeToString(identifier), - Message: message, - Global: global, - }) - if err != nil { - log.Println("Error executing template:", err) - } - } - - // This generally shouldn't happen, at least not for web - // browesrs. - if request.ParseForm() != nil { - log.Println("MALFORMED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) - challengePage("You submitted a malformed form.") - return - } - - formValues, ok := request.PostForm["powxy"] - if !ok { - // If there's simply no form value, the user is probably - // just visiting the site for the first time or with an - // expired cookie. - log.Println("CHALLENGE", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) - challengePage("") - return - } else if len(formValues) != 1 { - // This should never happen, at least not for web - // browsers. - log.Println("FORM_VALUES", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) - challengePage("You submitted an invalid number of form values.") - return - } - - // We validate that the length is reasonable before even - // decoding it with base64. - if len(formValues[0]) > 43 { - log.Println("TOO_LONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) - challengePage("Your submission was too long.") - return - } - - // Actually decode the base64 value. - nonce, err := base64.StdEncoding.DecodeString(formValues[0]) - if err != nil { - log.Println("BASE64", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) - challengePage("Your submission was improperly encoded.") - return - } - - // Validate the nonce. - if !validateNonce(identifier, nonce) { - log.Println("WRONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) - challengePage("Your submission was incorrect, or your session has expired while submitting.") - return - } - - // Everything starting here: the nonce is valid, and we - // can set the cookie and redirect them. The redirection is - // needed as their "normal" request is most definitely - // different from one to expect after solving the PoW - // challenge. - - http.SetCookie(writer, &http.Cookie{ - Name: "powxy", - Value: base64.StdEncoding.EncodeToString(expectedMAC), - Secure: true, - HttpOnly: true, - }) - - log.Println("ACCEPTED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent")) - http.Redirect(writer, request, "", http.StatusSeeOther) - }))) + server := &http.Server{ + Addr: listenAddr, + Handler: http.HandlerFunc(handler), + ReadTimeout: time.Duration(readTimeout) * time.Second, + WriteTimeout: time.Duration(writeTimeout) * time.Second, + IdleTimeout: time.Duration(idleTimeout) * time.Second, + ReadHeaderTimeout: time.Duration(readHeaderTimeout) * time.Second, + } + + log.Fatal(server.ListenAndServe()) } |