From 2954cecb802f1ef01f005fd2f17e826a954b9913 Mon Sep 17 00:00:00 2001
From: Bolke de Bruin <bolke@xs4all.nl>
Date: Tue, 21 Jul 2020 22:20:05 +0200
Subject: [PATCH] Deleted unused files

---
 download.go | 112 ----------------------------------------------------
 1 file changed, 112 deletions(-)
 delete mode 100644 download.go

diff --git a/download.go b/download.go
deleted file mode 100644
index bfd5e25..0000000
--- a/download.go
+++ /dev/null
@@ -1,112 +0,0 @@
-package main
-
-import (
-	"encoding/hex"
-	"encoding/json"
-	"github.com/patrickmn/go-cache"
-	"golang.org/x/oauth2"
-	"log"
-	"math/rand"
-	"net/http"
-	"strings"
-	"time"
-)
-
-const state = "thisismystatebutshouldberandom"
-
-func handleRdpDownload(w http.ResponseWriter, r *http.Request) {
-	cookie, err := r.Cookie("RDPGWSESSIONV1")
-	if err != nil {
-		http.Redirect(w, r, oauthConfig.AuthCodeURL(state), http.StatusFound)
-		return
-	}
-
-	data, found := tokens.Get(cookie.Value)
-	if found == false {
-		log.Printf("Found expired or non existent session: %s", cookie.Value)
-		http.Redirect(w, r, oauthConfig.AuthCodeURL(state), http.StatusFound)
-		return
-	}
-
-	// do a round robin selection for now
-	rand.Seed(time.Now().Unix())
-	var host = conf.Server.Hosts[rand.Intn(len(conf.Server.Hosts))]
-	for k, v := range data.(map[string]interface{}) {
-		if val, ok := v.(string); ok == true {
-			host = strings.Replace(host, "{{ " + k + " }}", val, 1)
-		}
-	}
-
-	// authenticated
-	seed := make([]byte, 16)
-	rand.Read(seed)
-	fn := hex.EncodeToString(seed) + ".rdp"
-
-	w.Header().Set("Content-Disposition", "attachment; filename="+fn)
-	w.Header().Set("Content-Type", "application/x-rdp")
-	http.ServeContent(w, r, fn, time.Now(), strings.NewReader(
-		"full address:s:" + host + "\r\n"+
-			"gatewayhostname:s:" + conf.Server.GatewayAddress +"\r\n"+
-			"gatewaycredentialssource:i:5\r\n"+
-			"gatewayusagemethod:i:1\r\n"+
-			"gatewayprofileusagemethod:i:1\r\n"+
-			"gatewayaccesstoken:s:" + cookie.Value + "\r\n"))
-}
-
-func handleCallback(w http.ResponseWriter, r *http.Request) {
-	if r.URL.Query().Get("state") != state {
-		http.Error(w, "state did not match", http.StatusBadRequest)
-		return
-	}
-
-	oauthToken, err := oauthConfig.Exchange(ctx, r.URL.Query().Get("code"))
-	if err != nil {
-		http.Error(w, "Failed to exchange token: "+err.Error(), http.StatusInternalServerError)
-		return
-	}
-
-	rawIDToken, ok := oauthToken.Extra("id_token").(string)
-	if !ok {
-		http.Error(w, "No id_token field in oauth2 token.", http.StatusInternalServerError)
-		return
-	}
-	idToken, err := verifier.Verify(ctx, rawIDToken)
-	if err != nil {
-		http.Error(w, "Failed to verify ID Token: "+err.Error(), http.StatusInternalServerError)
-		return
-	}
-
-	resp := struct {
-		OAuth2Token   *oauth2.Token
-		IDTokenClaims *json.RawMessage // ID Token payload is just JSON.
-	}{oauthToken, new(json.RawMessage)}
-
-	if err := idToken.Claims(&resp.IDTokenClaims); err != nil {
-		http.Error(w, err.Error(), http.StatusInternalServerError)
-		return
-	}
-
-	var data map[string]interface{}
-	if err := json.Unmarshal(*resp.IDTokenClaims, &data); err != nil {
-		http.Error(w, err.Error(), http.StatusInternalServerError)
-		return
-	}
-
-	seed := make([]byte, 16)
-	rand.Read(seed)
-	token := hex.EncodeToString(seed)
-
-	cookie := http.Cookie{
-		Name: "RDPGWSESSIONV1",
-		Value: token,
-		Path: "/",
-		Secure: true,
-		HttpOnly: true,
-	}
-
-	// TODO: make dynamic
-	tokens.Set(token, data, cache.DefaultExpiration)
-
-	http.SetCookie(w, &cookie)
-	http.Redirect(w, r, "/connect", http.StatusFound)
-}
\ No newline at end of file
-- 
GitLab