aboutsummaryrefslogtreecommitdiff
path: root/handler.go
blob: 2b63dfeda06c43a6196e10d524569ea8286dc31c (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128

// SPDX-License-Identifier: BSD-2-Clause
// SPDX-FileCopyrightText: Copyright (c) 2025 Runxi Yu <https://runxiyu.org>

package main

import (
	"encoding/base64"
	"errors"
	"log"
	"net/http"
	"strings"
)

// handler handles an incoming HTTP request.
func handler(writer http.ResponseWriter, request *http.Request) {
	// Static resources for powxy itself.
	if strings.HasPrefix(request.URL.Path, "/.powxy/") {
		http.StripPrefix("/.powxy/", http.FileServer(http.FS(resourcesFS))).ServeHTTP(writer, request)
		return
	}

	// We attempt to fetch the powxy cookie. Its non-existence
	// does not matter here; if the cookie does not exist, it
	// will be nil, so validation will simply fail and the user
	// will be prompted to solve the PoW challenge.
	cookie, err := request.Cookie("powxy")
	if err != nil && !errors.Is(err, http.ErrNoCookie) {
		log.Println("COOKIE_ERR", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
		http.Error(writer, "error fetching cookie", http.StatusInternalServerError)
		return
	}

	// We generate the identifier that identifies the client,
	// and the expected HMAC that the cookie should include.
	identifier, expectedMAC := makeIdentifierMAC(request)

	// If the cookie exists and is valid, we simply proxy the
	// request.
	if validateCookie(cookie, expectedMAC) {
		log.Println("PROXY", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
		proxyRequest(writer, request)
		return
	}

	// A convenience function to render the challenge page,
	// since all parameters but the message are constant at this
	// point.
	challengePage := func(message string) {
		err := tmpl.Execute(writer, tparams{
			Identifier: base64.StdEncoding.EncodeToString(identifier),
			Message:    message,
			Global:     global,
		})
		if err != nil {
			log.Println("Error executing template:", err)
		}
	}

	// This generally shouldn't happen, at least not for web
	// browesrs.
	if request.ParseForm() != nil {
		log.Println("MALFORMED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
		challengePage("You submitted a malformed form.")
		return
	}

	formValues, ok := request.PostForm["powxy"]
	if !ok {
		// If there's simply no form value, the user is probably
		// just visiting the site for the first time or with an
		// expired cookie.
		log.Println("CHALLENGE", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
		challengePage("")
		return
	} else if len(formValues) != 1 {
		// This should never happen, at least not for web
		// browsers.
		log.Println("FORM_VALUES", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
		challengePage("You submitted an invalid number of form values.")
		return
	}

	// We validate that the length is reasonable before even
	// decoding it with base64.
	if len(formValues[0]) > 43 {
		log.Println("TOO_LONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
		challengePage("Your submission was too long.")
		return
	}

	// Actually decode the base64 value.
	nonce, err := base64.StdEncoding.DecodeString(formValues[0])
	if err != nil {
		log.Println("BASE64", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
		challengePage("Your submission was improperly encoded.")
		return
	}

	// Validate the nonce.
	if !validateNonce(identifier, nonce) {
		log.Println("WRONG", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
		challengePage("Your submission was incorrect, or your session has expired while submitting.")
		return
	}

	// Everything starting here: the nonce is valid, and we
	// can set the cookie and redirect them. The redirection is
	// needed as their "normal" request is most definitely
	// different from one to expect after solving the PoW
	// challenge.

	http.SetCookie(writer, &http.Cookie{
		Name:     "powxy",
		Value:    base64.StdEncoding.EncodeToString(expectedMAC),
		Secure:   true,
		HttpOnly: true,
	})

	log.Println("ACCEPTED", getRemoteIP(request), request.RequestURI, request.Header.Get("User-Agent"))
	http.Redirect(writer, request, "", http.StatusSeeOther)
}

// tparams holds paramters for the template.
type tparams struct {
	Identifier string
	Message    string
	Global     any
}