mirror of
https://github.com/superseriousbusiness/gotosocial
synced 2025-06-05 21:59:39 +02:00
This adds a proof-of-work based scraper deterrence to GoToSocial's middleware stack on profile and status web pages. Heavily inspired by https://github.com/TecharoHQ/anubis, but massively stripped back for our own usecase. Todo: - ~~add configuration option so this is disabled by default~~ - ~~fix whatever weirdness is preventing this working with CSP (even in debug)~~ - ~~use our standard templating mechanism going through apiutil helper func~~ - ~~probably some absurdly small performance improvements to be made in pooling re-used hex encode / hash encode buffers~~ the web endpoints aren't as hot a path as API / ActivityPub, will leave as-is for now as it is already very minimal and well optimized - ~~verify the cryptographic assumptions re: using a portion of token as challenge data~~ this isn't a serious application of cryptography, if it turns out to be a problem we'll fix it, but it definitely should not be easily possible to guess a SHA256 hash from the first 1/4 of it even if mathematically it might make it a bit easier - ~~theme / make look nice??~~ - ~~add a spinner~~ - ~~add entry in example configuration~~ - ~~add documentation~~ Verification page originally based on https://github.com/LucienV1/powtect Co-authored-by: tobi <tobi.smethurst@protonmail.com> Reviewed-on: https://codeberg.org/superseriousbusiness/gotosocial/pulls/4043 Reviewed-by: tobi <tsmethurst@noreply.codeberg.org> Co-authored-by: kim <grufwub@gmail.com> Co-committed-by: kim <grufwub@gmail.com>
220 lines
5.2 KiB
Go
220 lines
5.2 KiB
Go
// GoToSocial
|
|
// Copyright (C) GoToSocial Authors admin@gotosocial.org
|
|
// SPDX-License-Identifier: AGPL-3.0-or-later
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package middleware
|
|
|
|
import (
|
|
"errors"
|
|
|
|
"code.superseriousbusiness.org/gotosocial/internal/config"
|
|
"code.superseriousbusiness.org/gotosocial/internal/gtserror"
|
|
"code.superseriousbusiness.org/gotosocial/internal/headerfilter"
|
|
"code.superseriousbusiness.org/gotosocial/internal/log"
|
|
"code.superseriousbusiness.org/gotosocial/internal/state"
|
|
"github.com/gin-gonic/gin"
|
|
)
|
|
|
|
var (
|
|
// errors set on gin context by header filter middleware.
|
|
errHeaderNotAllowed = errors.New("header did not match allow filter")
|
|
errHeaderBlocked = errors.New("header matched block filter")
|
|
)
|
|
|
|
// HeaderFilter returns a gin middleware handler that provides HTTP
|
|
// request blocking (filtering) based on database allow / block filters.
|
|
func HeaderFilter(state *state.State) gin.HandlerFunc {
|
|
switch mode := config.GetAdvancedHeaderFilterMode(); mode {
|
|
case config.RequestHeaderFilterModeDisabled:
|
|
return func(ctx *gin.Context) {}
|
|
|
|
case config.RequestHeaderFilterModeAllow:
|
|
return headerFilterAllowMode(state)
|
|
|
|
case config.RequestHeaderFilterModeBlock:
|
|
return headerFilterBlockMode(state)
|
|
|
|
default:
|
|
panic("unrecognized filter mode: " + mode)
|
|
}
|
|
}
|
|
|
|
func headerFilterAllowMode(state *state.State) func(c *gin.Context) {
|
|
_ = *state //nolint
|
|
// Allowlist mode: explicit block takes
|
|
// precedence over explicit allow.
|
|
//
|
|
// Headers that have neither block
|
|
// or allow entries are blocked.
|
|
return func(c *gin.Context) {
|
|
|
|
// Check if header is explicitly blocked.
|
|
block, err := isHeaderBlocked(state, c)
|
|
if err != nil {
|
|
respondInternalServerError(c, err)
|
|
return
|
|
}
|
|
|
|
if block {
|
|
_ = c.Error(errHeaderBlocked)
|
|
respondBlocked(c)
|
|
return
|
|
}
|
|
|
|
// Check if header is missing explicit allow.
|
|
notAllow, err := isHeaderNotAllowed(state, c)
|
|
if err != nil {
|
|
respondInternalServerError(c, err)
|
|
return
|
|
}
|
|
|
|
if notAllow {
|
|
_ = c.Error(errHeaderNotAllowed)
|
|
respondBlocked(c)
|
|
return
|
|
}
|
|
|
|
// Allowed!
|
|
c.Next()
|
|
}
|
|
}
|
|
|
|
func headerFilterBlockMode(state *state.State) func(c *gin.Context) {
|
|
_ = *state //nolint
|
|
// Blocklist/default mode: explicit allow
|
|
// takes precedence over explicit block.
|
|
//
|
|
// Headers that have neither block
|
|
// or allow entries are allowed.
|
|
return func(c *gin.Context) {
|
|
|
|
// Check if header is explicitly allowed.
|
|
allow, err := isHeaderAllowed(state, c)
|
|
if err != nil {
|
|
respondInternalServerError(c, err)
|
|
return
|
|
}
|
|
|
|
if !allow {
|
|
// Check if header is explicitly blocked.
|
|
block, err := isHeaderBlocked(state, c)
|
|
if err != nil {
|
|
respondInternalServerError(c, err)
|
|
return
|
|
}
|
|
|
|
if block {
|
|
_ = c.Error(errHeaderBlocked)
|
|
respondBlocked(c)
|
|
return
|
|
}
|
|
}
|
|
|
|
// Allowed!
|
|
c.Next()
|
|
}
|
|
}
|
|
|
|
func isHeaderBlocked(state *state.State, c *gin.Context) (bool, error) {
|
|
var (
|
|
ctx = c.Request.Context()
|
|
hdr = c.Request.Header
|
|
)
|
|
|
|
// Perform an explicit is-blocked check on request header.
|
|
key, _, err := state.DB.BlockHeaderRegularMatch(ctx, hdr)
|
|
switch err {
|
|
case nil:
|
|
break
|
|
|
|
case headerfilter.ErrLargeHeaderValue:
|
|
log.Warn(ctx, "large header value")
|
|
key = "*" // block large headers
|
|
|
|
default:
|
|
err := gtserror.Newf("error checking header: %w", err)
|
|
return false, err
|
|
}
|
|
|
|
if key != "" {
|
|
// A header was matched against!
|
|
// i.e. this request is blocked.
|
|
return true, nil
|
|
}
|
|
|
|
return false, nil
|
|
}
|
|
|
|
func isHeaderAllowed(state *state.State, c *gin.Context) (bool, error) {
|
|
var (
|
|
ctx = c.Request.Context()
|
|
hdr = c.Request.Header
|
|
)
|
|
|
|
// Perform an explicit is-allowed check on request header.
|
|
key, _, err := state.DB.AllowHeaderRegularMatch(ctx, hdr)
|
|
switch err {
|
|
case nil:
|
|
break
|
|
|
|
case headerfilter.ErrLargeHeaderValue:
|
|
log.Warn(ctx, "large header value")
|
|
key = "" // block large headers
|
|
|
|
default:
|
|
err := gtserror.Newf("error checking header: %w", err)
|
|
return false, err
|
|
}
|
|
|
|
if key != "" {
|
|
// A header was matched against!
|
|
// i.e. this request is allowed.
|
|
return true, nil
|
|
}
|
|
|
|
return false, nil
|
|
}
|
|
|
|
func isHeaderNotAllowed(state *state.State, c *gin.Context) (bool, error) {
|
|
var (
|
|
ctx = c.Request.Context()
|
|
hdr = c.Request.Header
|
|
)
|
|
|
|
// Perform an explicit is-NOT-allowed check on request header.
|
|
key, _, err := state.DB.AllowHeaderInverseMatch(ctx, hdr)
|
|
switch err {
|
|
case nil:
|
|
break
|
|
|
|
case headerfilter.ErrLargeHeaderValue:
|
|
log.Warn(ctx, "large header value")
|
|
key = "*" // block large headers
|
|
|
|
default:
|
|
err := gtserror.Newf("error checking header: %w", err)
|
|
return false, err
|
|
}
|
|
|
|
if key != "" {
|
|
// A header was matched against!
|
|
// i.e. request is NOT allowed.
|
|
return true, nil
|
|
}
|
|
|
|
return false, nil
|
|
}
|