Monorepo for Tangled
at master 379 lines 11 kB view raw
1package signup 2 3import ( 4 "bufio" 5 "context" 6 "encoding/json" 7 "errors" 8 "fmt" 9 "log/slog" 10 "net/http" 11 "net/url" 12 "os" 13 "strings" 14 15 "github.com/go-chi/chi/v5" 16 "github.com/posthog/posthog-go" 17 "tangled.org/core/appview/config" 18 "tangled.org/core/appview/db" 19 "tangled.org/core/appview/dns" 20 "tangled.org/core/appview/email" 21 "tangled.org/core/appview/models" 22 "tangled.org/core/appview/pages" 23 "tangled.org/core/appview/state/userutil" 24 "tangled.org/core/idresolver" 25) 26 27type Signup struct { 28 config *config.Config 29 db *db.DB 30 cf *dns.Cloudflare 31 posthog posthog.Client 32 idResolver *idresolver.Resolver 33 pages *pages.Pages 34 l *slog.Logger 35 disallowedNicknames map[string]bool 36} 37 38func New(cfg *config.Config, database *db.DB, pc posthog.Client, idResolver *idresolver.Resolver, pages *pages.Pages, l *slog.Logger) *Signup { 39 var cf *dns.Cloudflare 40 if cfg.Cloudflare.ApiToken != "" && cfg.Cloudflare.ZoneId != "" { 41 var err error 42 cf, err = dns.NewCloudflare(cfg) 43 if err != nil { 44 l.Warn("failed to create cloudflare client, signup will be disabled", "error", err) 45 } 46 } 47 48 disallowedNicknames := loadDisallowedNicknames(cfg.Core.DisallowedNicknamesFile, l) 49 50 return &Signup{ 51 config: cfg, 52 db: database, 53 posthog: pc, 54 idResolver: idResolver, 55 cf: cf, 56 pages: pages, 57 l: l, 58 disallowedNicknames: disallowedNicknames, 59 } 60} 61 62func loadDisallowedNicknames(filepath string, logger *slog.Logger) map[string]bool { 63 disallowed := make(map[string]bool) 64 65 if filepath == "" { 66 logger.Warn("no disallowed nicknames file configured") 67 return disallowed 68 } 69 70 file, err := os.Open(filepath) 71 if err != nil { 72 logger.Warn("failed to open disallowed nicknames file", "file", filepath, "error", err) 73 return disallowed 74 } 75 defer file.Close() 76 77 scanner := bufio.NewScanner(file) 78 lineNum := 0 79 for scanner.Scan() { 80 lineNum++ 81 line := strings.TrimSpace(scanner.Text()) 82 if line == "" || strings.HasPrefix(line, "#") { 83 continue // skip empty lines and comments 84 } 85 86 nickname := strings.ToLower(line) 87 if userutil.IsValidSubdomain(nickname) { 88 disallowed[nickname] = true 89 } else { 90 logger.Warn("invalid nickname format in disallowed nicknames file", 91 "file", filepath, "line", lineNum, "nickname", nickname) 92 } 93 } 94 95 if err := scanner.Err(); err != nil { 96 logger.Error("error reading disallowed nicknames file", "file", filepath, "error", err) 97 } 98 99 logger.Info("loaded disallowed nicknames", "count", len(disallowed), "file", filepath) 100 return disallowed 101} 102 103// isNicknameAllowed checks if a nickname is allowed (not in the disallowed list) 104func (s *Signup) isNicknameAllowed(nickname string) bool { 105 return !s.disallowedNicknames[strings.ToLower(nickname)] 106} 107 108func (s *Signup) Router() http.Handler { 109 r := chi.NewRouter() 110 r.Get("/", s.signup) 111 r.Post("/", s.signup) 112 r.Get("/complete", s.complete) 113 r.Post("/complete", s.complete) 114 115 return r 116} 117 118func (s *Signup) signup(w http.ResponseWriter, r *http.Request) { 119 switch r.Method { 120 case http.MethodGet: 121 emailId := r.URL.Query().Get("id") 122 s.pages.Signup(w, pages.SignupParams{ 123 CloudflareSiteKey: s.config.Cloudflare.TurnstileSiteKey, 124 EmailId: emailId, 125 }) 126 case http.MethodPost: 127 if s.cf == nil { 128 http.Error(w, "signup is disabled", http.StatusFailedDependency) 129 return 130 } 131 emailId := r.FormValue("email") 132 cfToken := r.FormValue("cf-turnstile-response") 133 134 noticeId := "signup-msg" 135 136 if err := s.validateCaptcha(cfToken, r); err != nil { 137 s.l.Warn("turnstile validation failed", "error", err, "email", emailId) 138 s.pages.Notice(w, noticeId, "Captcha validation failed.") 139 return 140 } 141 142 if !email.IsValidEmail(emailId) { 143 s.pages.Notice(w, noticeId, "Invalid email address.") 144 return 145 } 146 147 exists, err := db.CheckEmailExistsAtAll(s.db, emailId) 148 if err != nil { 149 s.l.Error("failed to check email existence", "error", err) 150 s.pages.Notice(w, noticeId, "Failed to complete signup. Try again later.") 151 return 152 } 153 if exists { 154 s.pages.Notice(w, noticeId, "Email already exists.") 155 return 156 } 157 158 code, err := s.inviteCodeRequest() 159 if err != nil { 160 s.l.Error("failed to create invite code", "error", err) 161 s.pages.Notice(w, noticeId, "Failed to create invite code.") 162 return 163 } 164 165 em := email.Email{ 166 APIKey: s.config.Resend.ApiKey, 167 From: s.config.Resend.SentFrom, 168 To: emailId, 169 Subject: "Verify your Tangled account", 170 Text: `Copy and paste this code below to verify your account on Tangled. 171 ` + code, 172 Html: `<p>Copy and paste this code below to verify your account on Tangled.</p> 173<p><code>` + code + `</code></p>`, 174 } 175 176 err = email.SendEmail(em) 177 if err != nil { 178 s.l.Error("failed to send email", "error", err) 179 s.pages.Notice(w, noticeId, "Failed to send email.") 180 return 181 } 182 err = db.AddInflightSignup(s.db, models.InflightSignup{ 183 Email: emailId, 184 InviteCode: code, 185 }) 186 if err != nil { 187 s.l.Error("failed to add inflight signup", "error", err) 188 s.pages.Notice(w, noticeId, "Failed to complete sign up. Try again later.") 189 return 190 } 191 192 s.pages.HxRedirect(w, "/signup/complete") 193 } 194} 195 196func (s *Signup) complete(w http.ResponseWriter, r *http.Request) { 197 switch r.Method { 198 case http.MethodGet: 199 s.pages.CompleteSignup(w) 200 case http.MethodPost: 201 username := r.FormValue("username") 202 password := r.FormValue("password") 203 code := r.FormValue("code") 204 205 if !userutil.IsValidSubdomain(username) { 206 s.pages.Notice(w, "signup-error", "Invalid username. Username must be 4–63 characters, lowercase letters, digits, or hyphens, and can't start or end with a hyphen.") 207 return 208 } 209 210 if !s.isNicknameAllowed(username) { 211 s.pages.Notice(w, "signup-error", "This username is not available. Please choose a different one.") 212 return 213 } 214 215 email, err := db.GetEmailForCode(s.db, code) 216 if err != nil { 217 s.l.Error("failed to get email for code", "error", err) 218 s.pages.Notice(w, "signup-error", "Failed to complete sign up. Try again later.") 219 return 220 } 221 222 if s.cf == nil { 223 s.l.Error("cloudflare client is nil", "error", "Cloudflare integration is not enabled in configuration") 224 s.pages.Notice(w, "signup-error", "Account signup is currently disabled. DNS record creation is not available. Please contact support.") 225 return 226 } 227 228 // Execute signup transactionally with rollback capability 229 err = s.executeSignupTransaction(r.Context(), username, password, email, code, w) 230 if err != nil { 231 // Error already logged and notice already sent 232 return 233 } 234 } 235} 236 237// executeSignupTransaction performs the signup process transactionally with rollback 238func (s *Signup) executeSignupTransaction(ctx context.Context, username, password, email, code string, w http.ResponseWriter) error { 239 // var recordID string 240 var did string 241 var emailAdded bool 242 243 success := false 244 defer func() { 245 if !success { 246 s.l.Info("rolling back signup transaction", "username", username, "did", did) 247 248 // Rollback DNS record 249 // if recordID != "" { 250 // if err := s.cf.DeleteDNSRecord(ctx, recordID); err != nil { 251 // s.l.Error("failed to rollback DNS record", "error", err, "recordID", recordID) 252 // } else { 253 // s.l.Info("successfully rolled back DNS record", "recordID", recordID) 254 // } 255 // } 256 257 // Rollback PDS account 258 if did != "" { 259 if err := s.deleteAccountRequest(did); err != nil { 260 s.l.Error("failed to rollback PDS account", "error", err, "did", did) 261 } else { 262 s.l.Info("successfully rolled back PDS account", "did", did) 263 } 264 } 265 266 // Rollback email from database 267 if emailAdded { 268 if err := db.DeleteEmail(s.db, did, email); err != nil { 269 s.l.Error("failed to rollback email from database", "error", err, "email", email) 270 } else { 271 s.l.Info("successfully rolled back email from database", "email", email) 272 } 273 } 274 } 275 }() 276 277 // step 1: create account in PDS 278 did, err := s.createAccountRequest(username, password, email, code) 279 if err != nil { 280 s.l.Error("failed to create account", "error", err) 281 s.pages.Notice(w, "signup-error", err.Error()) 282 return err 283 } 284 285 // XXX: we have a wildcard *.tngl.sh record now 286 // step 2: create DNS record with actual DID 287 // recordID, err = s.cf.CreateDNSRecord(ctx, dns.Record{ 288 // Type: "TXT", 289 // Name: "_atproto." + username, 290 // Content: fmt.Sprintf(`"did=%s"`, did), 291 // TTL: 6400, 292 // Proxied: false, 293 // }) 294 // if err != nil { 295 // s.l.Error("failed to create DNS record", "error", err) 296 // s.pages.Notice(w, "signup-error", "Failed to create DNS record for your handle. Please contact support.") 297 // return err 298 // } 299 300 // step 3: add email to database 301 err = db.AddEmail(s.db, models.Email{ 302 Did: did, 303 Address: email, 304 Verified: true, 305 Primary: true, 306 }) 307 if err != nil { 308 s.l.Error("failed to add email", "error", err) 309 s.pages.Notice(w, "signup-error", "Failed to complete sign up. Try again later.") 310 return err 311 } 312 emailAdded = true 313 314 // if we get here, we've successfully created the account and added the email 315 success = true 316 317 s.pages.Notice(w, "signup-msg", fmt.Sprintf(`Account created successfully. You can now 318 <a class="underline text-black dark:text-white" href="/login">login</a> 319 with <code>%s.tngl.sh</code>.`, username)) 320 321 // clean up inflight signup asynchronously 322 go func() { 323 if err := db.DeleteInflightSignup(s.db, email); err != nil { 324 s.l.Error("failed to delete inflight signup", "error", err) 325 } 326 }() 327 328 return nil 329} 330 331type turnstileResponse struct { 332 Success bool `json:"success"` 333 ErrorCodes []string `json:"error-codes,omitempty"` 334 ChallengeTs string `json:"challenge_ts,omitempty"` 335 Hostname string `json:"hostname,omitempty"` 336} 337 338func (s *Signup) validateCaptcha(cfToken string, r *http.Request) error { 339 if cfToken == "" { 340 return errors.New("captcha token is empty") 341 } 342 343 if s.config.Cloudflare.TurnstileSecretKey == "" { 344 return errors.New("turnstile secret key not configured") 345 } 346 347 data := url.Values{} 348 data.Set("secret", s.config.Cloudflare.TurnstileSecretKey) 349 data.Set("response", cfToken) 350 351 // include the client IP if we have it 352 if remoteIP := r.Header.Get("CF-Connecting-IP"); remoteIP != "" { 353 data.Set("remoteip", remoteIP) 354 } else if remoteIP := r.Header.Get("X-Forwarded-For"); remoteIP != "" { 355 if ips := strings.Split(remoteIP, ","); len(ips) > 0 { 356 data.Set("remoteip", strings.TrimSpace(ips[0])) 357 } 358 } else { 359 data.Set("remoteip", r.RemoteAddr) 360 } 361 362 resp, err := http.PostForm("https://challenges.cloudflare.com/turnstile/v0/siteverify", data) 363 if err != nil { 364 return fmt.Errorf("failed to verify turnstile token: %w", err) 365 } 366 defer resp.Body.Close() 367 368 var turnstileResp turnstileResponse 369 if err := json.NewDecoder(resp.Body).Decode(&turnstileResp); err != nil { 370 return fmt.Errorf("failed to decode turnstile response: %w", err) 371 } 372 373 if !turnstileResp.Success { 374 s.l.Warn("turnstile validation failed", "error_codes", turnstileResp.ErrorCodes) 375 return errors.New("turnstile validation failed") 376 } 377 378 return nil 379}