Advent of Code is a fun way for programmers to test and improve their problem-solving skills. While solving the puzzles, you might want to automate the fetching of your personalized puzzle input directly using its URL instead of copying the input to a text file that will be available locally. However, trying to access the input URL using a simple HTTP request, results in the message below:
Puzzle inputs differ by user. Please log in to get your puzzle input.
This article explains why this happens and how to correctly fetch your inputs dynamically using Go programming language.
The Problem: Why Can't We Fetch The Input Directly?
Advent of Code requires you to log in to access your personalized puzzle inputs. When you log in through the browser, Advent of Code sets a session cookie in your browser. This cookie is used to identify your account and provide your unique input.
If your HTTP requests don’t include this session cookie, the Advent of Code server cannot recognize you as a logged-in user, hence the error message.
Solution: Using the Session Cookie in HTTP Requests
We must include the session cookie in our HTTP requests to fetch the puzzle input. Here is a step-by-step guideline:
Log in to Advent of Code.
Open your browser's Developer Tools (Press F12 key) and navigate to the Network tab.
Refresh the Advent of Code page and look for the cookie header in the request headers.
NOTE: It's important to keep your session cookie a secret since someone else can access your Advent of Code account if they get access to it.
Code To Fetch The Input
Below is a simple program we will use to fetch our puzzle input dynamically:
We start by defining the base URL for fetching inputs and creating a function to read the input for a specific day.
const baseURL = "https://adventofcode.com/2024/day/%s/input" func readInput(day string) { url := fmt.Sprintf(baseURL, day) fmt.Println(url) }
Next, we create an HTTP request and include the session cookie.
client := &http.Client{} req, err := http.NewRequest("GET", url, nil) if err != nil { fmt.Printf("Error creating HTTP request: %v\n", err) return } // Add the session cookie req.Header.Add("Cookie", "session=[YOUR_SESSION_TOKEN]")
http.NewRequest: Creates an HTTP GET request for the input URL.
req.Header.Add: Adds a header to the request with the session token for authentication. (Replace [YOUR_SESSION_TOKEN] with your actual token).
Now we send the HTTP request and read the server's response.
const baseURL = "https://adventofcode.com/2024/day/%s/input" func readInput(day string) { url := fmt.Sprintf(baseURL, day) fmt.Println(url) }
client.Do(req): Sends the HTTP request and stores the response.
defer resp.Body.Close(): Ensures the response body is closed after reading.
resp.StatusCode: Checks the HTTP status code. A code other than 200 indicates an error.
Finally, we read the response body and print the puzzle input.
client := &http.Client{} req, err := http.NewRequest("GET", url, nil) if err != nil { fmt.Printf("Error creating HTTP request: %v\n", err) return } // Add the session cookie req.Header.Add("Cookie", "session=[YOUR_SESSION_TOKEN]")
io.ReadAll(resp.Body): Reads the response body.
string(body): Converts the body from a slice of bytes to a string for easy display.
We invoke the readInput function from the main function to fetch the input for day 1.
resp, err := client.Do(req) if err != nil { fmt.Printf("Error making HTTP request: %v\n", err) return } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { fmt.Printf("Unexpected HTTP status: %d\n", resp.StatusCode) return }
Enhancing Security
Hardcoding the session token in our code isn’t safe. Instead, we should store it as an environment variable using the steps below:
body, err := io.ReadAll(resp.Body) if err != nil { fmt.Printf("Error reading response body: %v\n", err) return } fmt.Println(string(body))
func main() { readInput("1") // Fetches input puzzle for day 1 }
This helps, the session token stay outside the source code, reducing the risk of accidental exposure.
Here's the complete program for reference:
export AOC_SESSION="[YOUR_SESSION_TOKEN]"
Things To Keep In Mind
Session Expiry: Session tokens may expire after a while. If you encounter issues, log in again and retrieve a fresh token.
Privacy: Never share your session token publicly, including in blog posts or GitHub repositories.
Conclusion
You can dynamically fetch your Advent of Code inputs by including your session cookie in HTTP requests.
Feel free to share your tips or ask questions in the comment section. Happy coding, and good luck with Advent of Code 2024!
The above is the detailed content of FETCHING ADVENT OF CODE INPUTS DYNAMICALLY IN GO. For more information, please follow other related articles on the PHP Chinese website!