mirror of
https://github.com/Rayzggz/server_torii.git
synced 2025-06-17 04:31:22 +08:00
feat: CAPTCHA
This commit is contained in:
83
config/error_page/CAPTCHA.html
Normal file
83
config/error_page/CAPTCHA.html
Normal file
@ -0,0 +1,83 @@
|
||||
<!DOCTYPE html>
|
||||
<html lang="en">
|
||||
<head>
|
||||
<meta charset="UTF-8">
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||||
<title>CAPTCHA - ⛩️Server Torii</title>
|
||||
<style>
|
||||
body {
|
||||
font-family: Arial, sans-serif;
|
||||
display: flex;
|
||||
justify-content: center;
|
||||
align-items: center;
|
||||
height: 100vh;
|
||||
margin: 0;
|
||||
background-color: #f9f9f9;
|
||||
}
|
||||
.container {
|
||||
text-align: left;
|
||||
max-width: 600px;
|
||||
}
|
||||
.icon svg {
|
||||
width: 60px;
|
||||
height: 60px;
|
||||
stroke: #333;
|
||||
}
|
||||
.message {
|
||||
font-size: 24px;
|
||||
font-weight: bold;
|
||||
color: #333;
|
||||
}
|
||||
.description {
|
||||
margin-top: 10px;
|
||||
color: #666;
|
||||
}
|
||||
.footer {
|
||||
margin-top: 30px;
|
||||
font-size: 12px;
|
||||
color: #999;
|
||||
}
|
||||
.footer a {
|
||||
color: red;
|
||||
text-decoration: none;
|
||||
}
|
||||
</style>
|
||||
<script src="https://js.hcaptcha.com/1/api.js" async defer></script>
|
||||
<script>
|
||||
function onSubmit(token) {
|
||||
let reqBody = "h-captcha-response=" + token;
|
||||
let httpRequest = new XMLHttpRequest();
|
||||
httpRequest.open("POST", "/torii/captcha", true);
|
||||
httpRequest.setRequestHeader("Content-Type", "application/x-www-form-urlencoded");
|
||||
httpRequest.send(reqBody);
|
||||
httpRequest.onreadystatechange = () => {
|
||||
if (httpRequest.readyState == 4 && httpRequest.status == 200) {
|
||||
let text = httpRequest.responseText;
|
||||
switch (text) {
|
||||
case "good":
|
||||
window.location.reload();
|
||||
break;
|
||||
case "bad":
|
||||
alert("Bad CAPTCHA, please refresh the page and try again.\n"
|
||||
+ "您未能通过人机验证,请刷新页面后重试。");
|
||||
break;
|
||||
default:
|
||||
alert("Unexpected error occurred, please refresh the page and try again.\n"
|
||||
+ "发生了意料之外的错误,请刷新页面后重试。");
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
</script>
|
||||
</head>
|
||||
<body>
|
||||
<div class="container">
|
||||
<div class="message">Checking that you are not a robot</div>
|
||||
<div class="description"><div class="h-captcha" data-sitekey="" data-callback="onSubmit"></div></div>
|
||||
<div class="footer">
|
||||
Security powered by <a href="https://github.com/Rayzggz/server_torii">⛩️Server Torii</a>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
</body>
|
||||
</html>
|
3
config/rules/CAPTCHA.yml
Normal file
3
config/rules/CAPTCHA.yml
Normal file
@ -0,0 +1,3 @@
|
||||
secret_key: "0378b0f84c4310279918d71a5647ba5d"
|
||||
captcha_validate_time: 60
|
||||
hcaptcha_secret: ""
|
@ -1,8 +1,13 @@
|
||||
port: "25555"
|
||||
web_path: "/torii"
|
||||
rule_path: "/www/dev/server_torii/config/rules"
|
||||
error_page: "/www/dev/server_torii/config/error_page"
|
||||
node_name: "Server Torii"
|
||||
connecting_host_headers:
|
||||
- "Torii-Real-Host"
|
||||
connecting_ip_headers:
|
||||
- "X-Real-IP"
|
||||
- "Torii-Real-IP"
|
||||
connecting_uri_headers:
|
||||
- "X-Original-URI"
|
||||
- "Torii-Original-URI"
|
||||
connecting_captcha_status_headers:
|
||||
- "Torii-Captcha-Status"
|
@ -10,25 +10,32 @@ const (
|
||||
|
||||
// Decision saves the result of the decision
|
||||
type Decision struct {
|
||||
HTTPCode string
|
||||
State checkState
|
||||
JumpIndex int
|
||||
HTTPCode []byte
|
||||
State checkState
|
||||
ResponseData []byte
|
||||
JumpIndex int
|
||||
}
|
||||
|
||||
func NewDecision() *Decision {
|
||||
return &Decision{HTTPCode: "200", State: Continue, JumpIndex: -1}
|
||||
return &Decision{HTTPCode: []byte("200"), State: Continue, ResponseData: nil, JumpIndex: -1}
|
||||
}
|
||||
|
||||
func (d *Decision) Set(state checkState) {
|
||||
d.State = state
|
||||
}
|
||||
|
||||
func (d *Decision) SetCode(state checkState, httpCode string) {
|
||||
func (d *Decision) SetCode(state checkState, httpCode []byte) {
|
||||
d.State = state
|
||||
d.HTTPCode = httpCode
|
||||
}
|
||||
|
||||
func (d *Decision) SetJump(state checkState, httpCode string, jumpIndex int) {
|
||||
func (d *Decision) SetResponse(state checkState, httpCode []byte, responseData []byte) {
|
||||
d.State = state
|
||||
d.HTTPCode = httpCode
|
||||
d.ResponseData = responseData
|
||||
}
|
||||
|
||||
func (d *Decision) SetJump(state checkState, httpCode []byte, jumpIndex int) {
|
||||
d.State = state
|
||||
d.HTTPCode = httpCode
|
||||
d.JumpIndex = jumpIndex
|
||||
|
121
internal/check/Captcha.go
Normal file
121
internal/check/Captcha.go
Normal file
@ -0,0 +1,121 @@
|
||||
package check
|
||||
|
||||
import (
|
||||
"crypto/hmac"
|
||||
"crypto/sha512"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"io"
|
||||
"net/http"
|
||||
"net/url"
|
||||
"server_torii/internal/action"
|
||||
"server_torii/internal/config"
|
||||
"server_torii/internal/dataType"
|
||||
"strconv"
|
||||
"strings"
|
||||
"time"
|
||||
)
|
||||
|
||||
type HCaptchaResponse struct {
|
||||
Success bool `json:"success"`
|
||||
ChallengeTS string `json:"challenge_ts"`
|
||||
Hostname string `json:"hostname"`
|
||||
ErrorCodes []string `json:"error-codes"`
|
||||
}
|
||||
|
||||
func Captcha(reqData dataType.UserRequest, ruleSet *config.RuleSet, decision *action.Decision) {
|
||||
if !reqData.Captcha {
|
||||
decision.Set(action.Continue)
|
||||
return
|
||||
}
|
||||
|
||||
if !verifyClearanceCookie(reqData, *ruleSet) {
|
||||
decision.SetCode(action.Done, []byte("CAPTCHA"))
|
||||
return
|
||||
}
|
||||
|
||||
decision.Set(action.Continue)
|
||||
|
||||
}
|
||||
|
||||
func CheckCaptcha(r *http.Request, reqData dataType.UserRequest, ruleSet *config.RuleSet, decision *action.Decision) {
|
||||
if r.Method != "POST" {
|
||||
decision.SetResponse(action.Done, []byte("403"), nil)
|
||||
return
|
||||
}
|
||||
|
||||
hCaptchaResponse := r.FormValue("h-captcha-response")
|
||||
if hCaptchaResponse == "" {
|
||||
decision.SetResponse(action.Done, []byte("200"), []byte("bad"))
|
||||
return
|
||||
}
|
||||
|
||||
data := url.Values{}
|
||||
data.Set("secret", ruleSet.CAPTCHARule.HCaptchaSecret)
|
||||
data.Set("response", hCaptchaResponse)
|
||||
data.Set("remoteip", reqData.RemoteIP)
|
||||
|
||||
resp, err := http.PostForm("https://api.hcaptcha.com/siteverify", data)
|
||||
if err != nil {
|
||||
decision.SetResponse(action.Done, []byte("500"), []byte("bad"))
|
||||
}
|
||||
defer resp.Body.Close()
|
||||
|
||||
body, err := io.ReadAll(resp.Body)
|
||||
if err != nil {
|
||||
decision.SetResponse(action.Done, []byte("500"), []byte("bad"))
|
||||
return
|
||||
}
|
||||
|
||||
var hCaptchaResp HCaptchaResponse
|
||||
err = json.Unmarshal(body, &hCaptchaResp)
|
||||
if err != nil {
|
||||
decision.SetResponse(action.Done, []byte("500"), []byte("bad"))
|
||||
return
|
||||
}
|
||||
|
||||
if !hCaptchaResp.Success {
|
||||
decision.SetResponse(action.Done, []byte("200"), []byte("bad4"))
|
||||
return
|
||||
}
|
||||
|
||||
decision.SetResponse(action.Done, []byte("200"), []byte("good"))
|
||||
return
|
||||
|
||||
}
|
||||
|
||||
func GenClearance(reqData dataType.UserRequest, ruleSet config.RuleSet) []byte {
|
||||
timeNow := time.Now().Unix()
|
||||
mac := hmac.New(sha512.New, []byte(ruleSet.CAPTCHARule.SecretKey))
|
||||
mac.Write([]byte(fmt.Sprintf("%d%s%s", timeNow, reqData.Host, reqData.UserAgent)))
|
||||
return []byte(fmt.Sprintf("%s:%s", fmt.Sprintf("%d", time.Now().Unix()), fmt.Sprintf("%x", mac.Sum(nil))))
|
||||
}
|
||||
|
||||
func verifyClearanceCookie(reqData dataType.UserRequest, ruleSet config.RuleSet) bool {
|
||||
if reqData.ToriiClearance == "" {
|
||||
return false
|
||||
}
|
||||
parts := strings.Split(reqData.ToriiClearance, ":")
|
||||
if len(parts) != 2 {
|
||||
return false
|
||||
}
|
||||
timestamp := parts[0]
|
||||
expectedHash := parts[1]
|
||||
|
||||
timeNow := time.Now().Unix()
|
||||
parsedTimestamp, err := strconv.ParseInt(timestamp, 10, 64)
|
||||
if err != nil {
|
||||
return false
|
||||
}
|
||||
|
||||
if timeNow-parsedTimestamp > ruleSet.CAPTCHARule.CaptchaValidateTime {
|
||||
return false
|
||||
}
|
||||
|
||||
mac := hmac.New(sha512.New, []byte(ruleSet.CAPTCHARule.SecretKey))
|
||||
mac.Write([]byte(fmt.Sprintf("%d%s%s", parsedTimestamp, reqData.Host, reqData.UserAgent)))
|
||||
computedHash := fmt.Sprintf("%x", mac.Sum(nil))
|
||||
|
||||
return hmac.Equal([]byte(computedHash), []byte(expectedHash))
|
||||
|
||||
}
|
@ -16,7 +16,7 @@ func IPAllowList(reqData dataType.UserRequest, ruleSet *config.RuleSet, decision
|
||||
return
|
||||
}
|
||||
if trie.Search(ip) {
|
||||
decision.SetCode(action.Done, "200")
|
||||
decision.SetCode(action.Done, []byte("200"))
|
||||
} else {
|
||||
decision.Set(action.Continue)
|
||||
}
|
||||
|
@ -15,7 +15,7 @@ func IPBlockList(reqData dataType.UserRequest, ruleSet *config.RuleSet, decision
|
||||
return
|
||||
}
|
||||
if trie.Search(ip) {
|
||||
decision.SetCode(action.Done, "403")
|
||||
decision.SetCode(action.Done, []byte("403"))
|
||||
} else {
|
||||
decision.Set(action.Continue)
|
||||
}
|
||||
|
@ -10,7 +10,7 @@ func URLAllowList(reqData dataType.UserRequest, ruleSet *config.RuleSet, decisio
|
||||
url := reqData.Uri
|
||||
list := ruleSet.URLAllowList
|
||||
if list.Match(url) {
|
||||
decision.SetCode(action.Done, "200")
|
||||
decision.SetCode(action.Done, []byte("200"))
|
||||
} else {
|
||||
decision.Set(action.Continue)
|
||||
}
|
||||
|
@ -10,7 +10,7 @@ func URLBlockList(reqData dataType.UserRequest, ruleSet *config.RuleSet, decisio
|
||||
url := reqData.Uri
|
||||
list := ruleSet.URLBlockList
|
||||
if list.Match(url) {
|
||||
decision.SetCode(action.Done, "403")
|
||||
decision.SetCode(action.Done, []byte("403"))
|
||||
} else {
|
||||
decision.Set(action.Continue)
|
||||
}
|
||||
|
@ -12,12 +12,15 @@ import (
|
||||
)
|
||||
|
||||
type MainConfig struct {
|
||||
Port string `yaml:"port"`
|
||||
RulePath string `yaml:"rule_path"`
|
||||
ErrorPage string `yaml:"error_page"`
|
||||
NodeName string `yaml:"node_name"`
|
||||
ConnectingIPHeaders []string `yaml:"connecting_ip_headers"`
|
||||
ConnectingURIHeaders []string `yaml:"connecting_uri_headers"`
|
||||
Port string `yaml:"port"`
|
||||
WebPath string `yaml:"web_path"`
|
||||
RulePath string `yaml:"rule_path"`
|
||||
ErrorPage string `yaml:"error_page"`
|
||||
NodeName string `yaml:"node_name"`
|
||||
ConnectingHostHeaders []string `yaml:"connecting_host_headers"`
|
||||
ConnectingIPHeaders []string `yaml:"connecting_ip_headers"`
|
||||
ConnectingURIHeaders []string `yaml:"connecting_uri_headers"`
|
||||
ConnectingCaptchaStatusHeaders []string `yaml:"connecting_captcha_status_headers"`
|
||||
}
|
||||
|
||||
// LoadMainConfig Read the configuration file and return the configuration object
|
||||
@ -50,6 +53,7 @@ type RuleSet struct {
|
||||
IPBlockTrie *dataType.TrieNode
|
||||
URLAllowList *dataType.URLRuleList
|
||||
URLBlockList *dataType.URLRuleList
|
||||
CAPTCHARule *dataType.CaptchaRule
|
||||
}
|
||||
|
||||
// LoadRules Load all rules from the specified path
|
||||
@ -59,6 +63,7 @@ func LoadRules(rulePath string) (*RuleSet, error) {
|
||||
IPBlockTrie: &dataType.TrieNode{},
|
||||
URLAllowList: &dataType.URLRuleList{},
|
||||
URLBlockList: &dataType.URLRuleList{},
|
||||
CAPTCHARule: &dataType.CaptchaRule{},
|
||||
}
|
||||
|
||||
// Load IP Allow List
|
||||
@ -85,9 +90,29 @@ func LoadRules(rulePath string) (*RuleSet, error) {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// Load CAPTCHA Rule
|
||||
captchaFile := rulePath + "/CAPTCHA.yml"
|
||||
if err := loadCAPTCHARule(captchaFile, rs.CAPTCHARule); err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
return &rs, nil
|
||||
}
|
||||
|
||||
func loadCAPTCHARule(file string, rule *dataType.CaptchaRule) error {
|
||||
data, err := os.ReadFile(file)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
if err := yaml.Unmarshal(data, &rule); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return nil
|
||||
|
||||
}
|
||||
|
||||
// loadIPRules read the IP rule file and insert the rules into the trie
|
||||
func loadIPRules(filePath string, trie *dataType.TrieNode) error {
|
||||
file, err := os.Open(filePath)
|
||||
|
@ -1,6 +1,17 @@
|
||||
package dataType
|
||||
|
||||
type UserRequest struct {
|
||||
RemoteIP string
|
||||
Uri string
|
||||
RemoteIP string
|
||||
Uri string
|
||||
Captcha bool
|
||||
ToriiClearance string
|
||||
ToriiSessionID string
|
||||
UserAgent string
|
||||
Host string
|
||||
}
|
||||
|
||||
type CaptchaRule struct {
|
||||
SecretKey string `yaml:"secret_key"`
|
||||
CaptchaValidateTime int64 `yaml:"captcha_validate_time"`
|
||||
HCaptchaSecret string `yaml:"hcaptcha_secret"`
|
||||
}
|
||||
|
77
internal/server/checker.go
Normal file
77
internal/server/checker.go
Normal file
@ -0,0 +1,77 @@
|
||||
package server
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"html/template"
|
||||
"net/http"
|
||||
"server_torii/internal/action"
|
||||
"server_torii/internal/check"
|
||||
"server_torii/internal/config"
|
||||
"server_torii/internal/dataType"
|
||||
"time"
|
||||
)
|
||||
|
||||
type CheckFunc func(dataType.UserRequest, *config.RuleSet, *action.Decision)
|
||||
|
||||
func CheckMain(w http.ResponseWriter, userRequestData dataType.UserRequest, ruleSet *config.RuleSet, cfg *config.MainConfig) {
|
||||
decision := action.NewDecision()
|
||||
|
||||
checkFuncs := make([]CheckFunc, 0)
|
||||
checkFuncs = append(checkFuncs, check.IPAllowList)
|
||||
checkFuncs = append(checkFuncs, check.IPBlockList)
|
||||
checkFuncs = append(checkFuncs, check.URLAllowList)
|
||||
checkFuncs = append(checkFuncs, check.URLBlockList)
|
||||
checkFuncs = append(checkFuncs, check.Captcha)
|
||||
|
||||
for _, checkFunc := range checkFuncs {
|
||||
checkFunc(userRequestData, ruleSet, decision)
|
||||
if decision.State == action.Done {
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
if bytes.Compare(decision.HTTPCode, []byte("200")) == 0 {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
w.Write([]byte("OK"))
|
||||
} else if bytes.Compare(decision.HTTPCode, []byte("403")) == 0 {
|
||||
tpl, err := template.ParseFiles(cfg.ErrorPage + "/403.html")
|
||||
if err != nil {
|
||||
http.Error(w, "500 - Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
data := struct {
|
||||
EdgeTag string
|
||||
ConnectIP string
|
||||
Date string
|
||||
}{
|
||||
EdgeTag: cfg.NodeName,
|
||||
ConnectIP: userRequestData.RemoteIP,
|
||||
Date: time.Now().Format("2006-01-02 15:04:05"),
|
||||
}
|
||||
w.WriteHeader(http.StatusForbidden)
|
||||
w.Header().Set("Content-Type", "text/html; charset=utf-8")
|
||||
if err = tpl.Execute(w, data); err != nil {
|
||||
http.Error(w, "500 - Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
} else if bytes.Compare(decision.HTTPCode, []byte("CAPTCHA")) == 0 {
|
||||
tpl, err := template.ParseFiles(cfg.ErrorPage + "/CAPTCHA.html")
|
||||
if err != nil {
|
||||
http.Error(w, "500 - Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
w.WriteHeader(http.StatusServiceUnavailable)
|
||||
w.Header().Set("Content-Type", "text/html; charset=utf-8")
|
||||
if err = tpl.Execute(w, nil); err != nil {
|
||||
http.Error(w, "500 - Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
} else {
|
||||
//should never happen
|
||||
http.Error(w, "500 - Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
}
|
@ -1,71 +1,26 @@
|
||||
package server
|
||||
|
||||
import (
|
||||
"html/template"
|
||||
"log"
|
||||
"net"
|
||||
"net/http"
|
||||
"server_torii/internal/action"
|
||||
"server_torii/internal/check"
|
||||
"server_torii/internal/config"
|
||||
"server_torii/internal/dataType"
|
||||
"strings"
|
||||
"time"
|
||||
)
|
||||
|
||||
type CheckFunc func(dataType.UserRequest, *config.RuleSet, *action.Decision)
|
||||
|
||||
// StartServer starts the HTTP server
|
||||
func StartServer(cfg *config.MainConfig, ruleSet *config.RuleSet) error {
|
||||
http.HandleFunc("/", func(w http.ResponseWriter, r *http.Request) {
|
||||
|
||||
userRequestData := processRequestData(cfg, r)
|
||||
|
||||
decision := action.NewDecision()
|
||||
|
||||
checkFuncs := make([]CheckFunc, 0)
|
||||
checkFuncs = append(checkFuncs, check.IPAllowList)
|
||||
checkFuncs = append(checkFuncs, check.IPBlockList)
|
||||
checkFuncs = append(checkFuncs, check.URLAllowList)
|
||||
checkFuncs = append(checkFuncs, check.URLBlockList)
|
||||
|
||||
for _, checkFunc := range checkFuncs {
|
||||
checkFunc(userRequestData, ruleSet, decision)
|
||||
if decision.State == action.Done {
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
if decision.HTTPCode == "200" {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
w.Write([]byte("OK"))
|
||||
} else if decision.HTTPCode == "403" {
|
||||
tpl, err := template.ParseFiles(cfg.ErrorPage + "/" + decision.HTTPCode + ".html")
|
||||
if err != nil {
|
||||
http.Error(w, "500 - Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
data := struct {
|
||||
EdgeTag string
|
||||
ConnectIP string
|
||||
Date string
|
||||
}{
|
||||
EdgeTag: cfg.NodeName,
|
||||
ConnectIP: userRequestData.RemoteIP,
|
||||
Date: time.Now().Format("2006-01-02 15:04:05"),
|
||||
}
|
||||
w.WriteHeader(http.StatusForbidden)
|
||||
w.Header().Set("Content-Type", "text/html; charset=utf-8")
|
||||
if err = tpl.Execute(w, data); err != nil {
|
||||
http.Error(w, "500 - Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
if strings.HasPrefix(userRequestData.Uri, cfg.WebPath) {
|
||||
CheckTorii(w, r, userRequestData, ruleSet, cfg)
|
||||
} else {
|
||||
// should not reach here
|
||||
w.WriteHeader(http.StatusInternalServerError)
|
||||
CheckMain(w, userRequestData, ruleSet, cfg)
|
||||
}
|
||||
|
||||
})
|
||||
|
||||
log.Printf("HTTP Server listening on :%s ...", cfg.Port)
|
||||
@ -74,6 +29,55 @@ func StartServer(cfg *config.MainConfig, ruleSet *config.RuleSet) error {
|
||||
|
||||
func processRequestData(cfg *config.MainConfig, r *http.Request) dataType.UserRequest {
|
||||
|
||||
userRequest := dataType.UserRequest{
|
||||
RemoteIP: getClientIP(cfg, r),
|
||||
Uri: getReqURI(cfg, r),
|
||||
Captcha: getCaptchaStatus(cfg, r),
|
||||
ToriiClearance: getHeader(r, "__torii_clearance"),
|
||||
ToriiSessionID: getHeader(r, "__torii_session_id"),
|
||||
UserAgent: r.UserAgent(),
|
||||
Host: getReqHost(cfg, r),
|
||||
}
|
||||
return userRequest
|
||||
}
|
||||
|
||||
func getHeader(r *http.Request, headerName string) string {
|
||||
cookie, err := r.Cookie(headerName)
|
||||
if err != nil {
|
||||
return ""
|
||||
}
|
||||
return cookie.Value
|
||||
}
|
||||
|
||||
func getCaptchaStatus(cfg *config.MainConfig, r *http.Request) bool {
|
||||
captchaStatus := false
|
||||
for _, headerName := range cfg.ConnectingCaptchaStatusHeaders {
|
||||
if captchaVal := r.Header.Get(headerName); captchaVal != "" {
|
||||
if captchaVal == "on" {
|
||||
captchaStatus = true
|
||||
}
|
||||
break
|
||||
}
|
||||
}
|
||||
return captchaStatus
|
||||
|
||||
}
|
||||
|
||||
func getReqURI(cfg *config.MainConfig, r *http.Request) string {
|
||||
var clientURI string
|
||||
for _, headerName := range cfg.ConnectingURIHeaders {
|
||||
if uriVal := r.Header.Get(headerName); uriVal != "" {
|
||||
clientURI = uriVal
|
||||
break
|
||||
}
|
||||
}
|
||||
if clientURI == "" {
|
||||
clientURI = r.RequestURI
|
||||
}
|
||||
return clientURI
|
||||
}
|
||||
|
||||
func getClientIP(cfg *config.MainConfig, r *http.Request) string {
|
||||
var clientIP string
|
||||
for _, headerName := range cfg.ConnectingIPHeaders {
|
||||
if ipVal := r.Header.Get(headerName); ipVal != "" {
|
||||
@ -96,21 +100,16 @@ func processRequestData(cfg *config.MainConfig, r *http.Request) dataType.UserRe
|
||||
clientIP = ipStr
|
||||
}
|
||||
}
|
||||
return clientIP
|
||||
}
|
||||
|
||||
var clientURI string
|
||||
for _, headerName := range cfg.ConnectingURIHeaders {
|
||||
if uriVal := r.Header.Get(headerName); uriVal != "" {
|
||||
clientURI = uriVal
|
||||
func getReqHost(cfg *config.MainConfig, r *http.Request) string {
|
||||
var clientHost = ""
|
||||
for _, headerName := range cfg.ConnectingHostHeaders {
|
||||
if hostVal := r.Header.Get(headerName); hostVal != "" {
|
||||
clientHost = hostVal
|
||||
break
|
||||
}
|
||||
}
|
||||
if clientURI == "" {
|
||||
clientURI = r.RequestURI
|
||||
}
|
||||
|
||||
userRequest := dataType.UserRequest{
|
||||
RemoteIP: clientIP,
|
||||
Uri: clientURI,
|
||||
}
|
||||
return userRequest
|
||||
return clientHost
|
||||
}
|
||||
|
58
internal/server/torii.go
Normal file
58
internal/server/torii.go
Normal file
@ -0,0 +1,58 @@
|
||||
package server
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"html/template"
|
||||
"net/http"
|
||||
"server_torii/internal/action"
|
||||
"server_torii/internal/check"
|
||||
"server_torii/internal/config"
|
||||
"server_torii/internal/dataType"
|
||||
"time"
|
||||
)
|
||||
|
||||
func CheckTorii(w http.ResponseWriter, r *http.Request, reqData dataType.UserRequest, ruleSet *config.RuleSet, cfg *config.MainConfig) {
|
||||
decision := action.NewDecision()
|
||||
|
||||
decision.SetCode(action.Continue, []byte("403"))
|
||||
if reqData.Uri == cfg.WebPath+"/captcha" {
|
||||
check.CheckCaptcha(r, reqData, ruleSet, decision)
|
||||
}
|
||||
if bytes.Compare(decision.HTTPCode, []byte("200")) == 0 {
|
||||
if bytes.Compare(decision.ResponseData, []byte("bad")) == 0 {
|
||||
w.WriteHeader(http.StatusOK)
|
||||
w.Write([]byte("bad"))
|
||||
return
|
||||
} else if bytes.Compare(decision.ResponseData, []byte("good")) == 0 {
|
||||
w.Header().Set("Set-Cookie", "__torii_clearance="+string(check.GenClearance(reqData, *ruleSet))+"; Path=/; HttpOnly")
|
||||
w.WriteHeader(http.StatusOK)
|
||||
w.Write(decision.ResponseData)
|
||||
} else {
|
||||
//should not be here
|
||||
w.WriteHeader(http.StatusInternalServerError)
|
||||
w.Write([]byte("500 - Internal Server Error"))
|
||||
}
|
||||
} else {
|
||||
tpl, err := template.ParseFiles(cfg.ErrorPage + "/403.html")
|
||||
if err != nil {
|
||||
http.Error(w, "500 - Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
|
||||
data := struct {
|
||||
EdgeTag string
|
||||
ConnectIP string
|
||||
Date string
|
||||
}{
|
||||
EdgeTag: cfg.NodeName,
|
||||
ConnectIP: reqData.RemoteIP,
|
||||
Date: time.Now().Format("2006-01-02 15:04:05"),
|
||||
}
|
||||
w.WriteHeader(http.StatusForbidden)
|
||||
w.Header().Set("Content-Type", "text/html; charset=utf-8")
|
||||
if err = tpl.Execute(w, data); err != nil {
|
||||
http.Error(w, "500 - Internal Server Error", http.StatusInternalServerError)
|
||||
return
|
||||
}
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user