diff --git a/cmd/spop/frontend.go b/cmd/spop/frontend.go index e8c06ed..195da8e 100644 --- a/cmd/spop/frontend.go +++ b/cmd/spop/frontend.go @@ -84,7 +84,7 @@ func (f *frontend) HandleSPOEValidate(_ context.Context, w *encoding.ActionWrite readExpectedKVEntry(m, k, "cookie") err := f.bh.IsValidCookie(ri, k.ValueBytes()) if err != nil && debug { - log.Println(fmt.Sprintf("IsValidCookie: %v", err)) + log.Printf("IsValidCookie: %v", err) } isValidCookie := err == nil diff --git a/cmd/spop/main.go b/cmd/spop/main.go index 7c03817..8b1830c 100644 --- a/cmd/spop/main.go +++ b/cmd/spop/main.go @@ -127,7 +127,7 @@ func (i *instance) HandleSPOE(ctx context.Context, w *encoding.ActionWriter, m * panic(fmt.Sprintf("error while reading KV: %v", err)) } - panic(fmt.Sprintf("failed reading fronted argument")) + panic("failed reading fronted argument") } if !k.NameEquals("frontend") { diff --git a/random/hetzner.html b/random/hetzner.html deleted file mode 100644 index a364325..0000000 --- a/random/hetzner.html +++ /dev/null @@ -1,427 +0,0 @@ - - - - - - - - Request on Hold - - - - - -
-
-
-
-
-
- - - - - - - - - - - - - - - - - - - -
- Potential unusual behavior -
-

- Request on Hold -

-

- Please wait - 99s - -

-

If you suspect that you are being blocked by mistake, make sure that you have the - latest browser version installed and disable all active browser plugins. -

-
-
- - - - - - - - - - - - - - - - - - - -
-
-
-
- - - - - diff --git a/random/index.html b/random/index.html deleted file mode 100644 index 947bc94..0000000 --- a/random/index.html +++ /dev/null @@ -1,199 +0,0 @@ - - - - Enodia Verification - - - - - -Rate-Limit exceeded. Verifying your browser before accessing the site. / Rate-Limit wurde überschritten. Ihr -Browser wird verifiziert, bevor Sie auf die Seite geleitet werden. - - - - - - \ No newline at end of file diff --git a/validator_pow.go b/validator_pow.go index 925a24d..5fa315e 100644 --- a/validator_pow.go +++ b/validator_pow.go @@ -121,12 +121,7 @@ func (powValidator) isValid(b *Berghain, req *ValidatorRequest, resp *ValidatorR sha.Write(solArea) sum := sha.Sum(nil) - if !bytes.HasPrefix(sum, []byte{0x00, 0x00}) { - // invalid solution - return false - } - - return true + return bytes.HasPrefix(sum, []byte{0x00, 0x00}) } var errInvalidSolution = fmt.Errorf("invalid solution")