Files
server_torii/internal/server/torii.go
2025-06-14 21:11:50 -04:00

209 lines
6.2 KiB
Go

package server
import (
"bytes"
"encoding/json"
"html/template"
"net/http"
"server_torii/internal/action"
"server_torii/internal/check"
"server_torii/internal/config"
"server_torii/internal/dataType"
"server_torii/internal/utils"
"time"
)
func CheckTorii(w http.ResponseWriter, r *http.Request, reqData dataType.UserRequest, ruleSet *config.RuleSet, cfg *config.MainConfig, sharedMem *dataType.SharedMemory) {
decision := action.NewDecision()
decision.SetCode(action.Continue, []byte("403"))
if reqData.Uri == cfg.WebPath+"/captcha" {
check.CheckCaptcha(r, reqData, ruleSet, decision)
} else if reqData.Uri == cfg.WebPath+"/health_check" {
decision.SetResponse(action.Done, []byte("200"), []byte("ok"))
} else if reqData.Uri == cfg.WebPath+"/waiting_room/status" {
handleWaitingRoomStatus(w, r, reqData, ruleSet, sharedMem)
return
} else if reqData.Uri == cfg.WebPath+"/waiting_room/join" {
handleWaitingRoomJoin(w, r, reqData, ruleSet, sharedMem)
return
}
if bytes.Compare(decision.HTTPCode, []byte("200")) == 0 {
if bytes.Compare(decision.ResponseData, []byte("ok")) == 0 {
w.WriteHeader(http.StatusOK)
_, err := w.Write([]byte("ok"))
if err != nil {
utils.LogError(reqData, "Error writing response: "+err.Error(), "CheckTorii")
return
}
return
}
if bytes.Compare(decision.ResponseData, []byte("bad")) == 0 {
w.WriteHeader(http.StatusOK)
_, err := w.Write([]byte("bad"))
if err != nil {
utils.LogError(reqData, "Error writing response: "+err.Error(), "CheckTorii")
return
}
return
} else if bytes.Compare(decision.ResponseData, []byte("badSession")) == 0 {
w.WriteHeader(http.StatusOK)
_, err := w.Write([]byte("badSession"))
if err != nil {
utils.LogError(reqData, "Error writing response: "+err.Error(), "CheckTorii")
return
}
return
} else if bytes.Compare(decision.ResponseData, []byte("good")) == 0 {
w.Header().Set("Set-Cookie", "__torii_clearance="+string(check.GenClearance(reqData, *ruleSet))+"; Path=/; Max-Age=86400; Priority=High; HttpOnly;")
w.WriteHeader(http.StatusOK)
_, err := w.Write(decision.ResponseData)
if err != nil {
utils.LogError(reqData, "Error writing response: "+err.Error(), "CheckTorii")
return
}
} else {
//should not be here
w.WriteHeader(http.StatusInternalServerError)
_, err := w.Write([]byte("500 - Internal Server Error"))
if err != nil {
utils.LogError(reqData, "Error writing response: "+err.Error(), "CheckTorii")
return
}
}
} else {
tpl, err := template.ParseFiles(cfg.ErrorPage + "/403.html")
if err != nil {
http.Error(w, "500 - Internal Server Error", http.StatusInternalServerError)
return
}
data := struct {
EdgeTag string
ConnectIP string
Date string
}{
EdgeTag: cfg.NodeName,
ConnectIP: reqData.RemoteIP,
Date: time.Now().Format("2006-01-02 15:04:05"),
}
w.WriteHeader(http.StatusForbidden)
w.Header().Set("Content-Type", "text/html; charset=utf-8")
if err = tpl.Execute(w, data); err != nil {
http.Error(w, "500 - Internal Server Error", http.StatusInternalServerError)
return
}
}
}
func handleWaitingRoomStatus(w http.ResponseWriter, r *http.Request, reqData dataType.UserRequest, ruleSet *config.RuleSet, sharedMem *dataType.SharedMemory) {
if !ruleSet.WaitingRoomRule.Enabled {
w.WriteHeader(http.StatusNotFound)
err := json.NewEncoder(w).Encode(map[string]interface{}{
"error": "Waiting room not enabled",
})
if err != nil {
return
}
return
}
sessionID := reqData.ToriiSessionID
clearance := reqData.ToriiClearance
userKey := check.GenerateUserKey(reqData)
secretKey := ruleSet.CAPTCHARule.SecretKey
// Check queue status using new core logic
inQueue, position, totalQueue, canEnter := sharedMem.WaitingRoom.GetQueueStatus(sessionID, clearance, userKey, secretKey)
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(http.StatusOK)
err := json.NewEncoder(w).Encode(map[string]interface{}{
"inQueue": inQueue,
"position": position,
"totalQueue": totalQueue,
"canEnter": canEnter,
})
if err != nil {
return
}
}
func handleWaitingRoomJoin(w http.ResponseWriter, r *http.Request, reqData dataType.UserRequest, ruleSet *config.RuleSet, sharedMem *dataType.SharedMemory) {
if !ruleSet.WaitingRoomRule.Enabled {
w.WriteHeader(http.StatusNotFound)
err := json.NewEncoder(w).Encode(map[string]interface{}{
"error": "Waiting room not enabled",
})
if err != nil {
return
}
return
}
if r.Method != http.MethodPost {
w.WriteHeader(http.StatusMethodNotAllowed)
err := json.NewEncoder(w).Encode(map[string]interface{}{
"error": "Method not allowed",
})
if err != nil {
return
}
return
}
sessionID := reqData.ToriiSessionID
userKey := check.GenerateUserKey(reqData)
secretKey := ruleSet.CAPTCHARule.SecretKey
// Join queue using new core logic
success, positiveID, clearance, canEnter := sharedMem.WaitingRoom.JoinQueue(sessionID, userKey, secretKey)
if !success {
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(http.StatusBadRequest)
err := json.NewEncoder(w).Encode(map[string]interface{}{
"success": false,
"message": "Invalid session or unable to join queue",
})
if err != nil {
return
}
return
}
if canEnter {
// User can enter directly
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(http.StatusOK)
err := json.NewEncoder(w).Encode(map[string]interface{}{
"success": true,
"canEnter": true,
"message": "可以进入网站",
})
if err != nil {
return
}
return
}
// User is in queue, set clearance cookie and return position info
inQueue, position, totalQueue, _ := sharedMem.WaitingRoom.GetQueueStatus(sessionID, clearance, userKey, secretKey)
w.Header().Set("Set-Cookie", "__torii_clearance="+clearance+"; Path=/; Max-Age=86400; Priority=High; HttpOnly;")
w.Header().Set("Content-Type", "application/json")
w.WriteHeader(http.StatusOK)
err := json.NewEncoder(w).Encode(map[string]interface{}{
"success": true,
"canEnter": false,
"inQueue": inQueue,
"position": position,
"totalQueue": totalQueue,
"positiveID": positiveID,
"message": "已加入排队",
})
if err != nil {
return
}
}