package signup import ( "bufio" "context" "encoding/json" "errors" "fmt" "log/slog" "net/http" "net/url" "os" "strings" "github.com/go-chi/chi/v5" "github.com/posthog/posthog-go" "tangled.org/core/appview/config" "tangled.org/core/appview/db" "tangled.org/core/appview/dns" "tangled.org/core/appview/email" "tangled.org/core/appview/models" "tangled.org/core/appview/pages" "tangled.org/core/appview/state/userutil" "tangled.org/core/idresolver" ) type Signup struct { config *config.Config db *db.DB cf *dns.Cloudflare posthog posthog.Client idResolver *idresolver.Resolver pages *pages.Pages l *slog.Logger disallowedNicknames map[string]bool } func New(cfg *config.Config, database *db.DB, pc posthog.Client, idResolver *idresolver.Resolver, pages *pages.Pages, l *slog.Logger) *Signup { var cf *dns.Cloudflare if cfg.Cloudflare.ApiToken != "" && cfg.Cloudflare.ZoneId != "" { var err error cf, err = dns.NewCloudflare(cfg) if err != nil { l.Warn("failed to create cloudflare client, signup will be disabled", "error", err) } } disallowedNicknames := loadDisallowedNicknames(cfg.Core.DisallowedNicknamesFile, l) return &Signup{ config: cfg, db: database, posthog: pc, idResolver: idResolver, cf: cf, pages: pages, l: l, disallowedNicknames: disallowedNicknames, } } func loadDisallowedNicknames(filepath string, logger *slog.Logger) map[string]bool { disallowed := make(map[string]bool) if filepath == "" { logger.Warn("no disallowed nicknames file configured") return disallowed } file, err := os.Open(filepath) if err != nil { logger.Warn("failed to open disallowed nicknames file", "file", filepath, "error", err) return disallowed } defer file.Close() scanner := bufio.NewScanner(file) lineNum := 0 for scanner.Scan() { lineNum++ line := strings.TrimSpace(scanner.Text()) if line == "" || strings.HasPrefix(line, "#") { continue // skip empty lines and comments } nickname := strings.ToLower(line) if userutil.IsValidSubdomain(nickname) { disallowed[nickname] = true } else { logger.Warn("invalid nickname format in disallowed nicknames file", "file", filepath, "line", lineNum, "nickname", nickname) } } if err := scanner.Err(); err != nil { logger.Error("error reading disallowed nicknames file", "file", filepath, "error", err) } logger.Info("loaded disallowed nicknames", "count", len(disallowed), "file", filepath) return disallowed } // isNicknameAllowed checks if a nickname is allowed (not in the disallowed list) func (s *Signup) isNicknameAllowed(nickname string) bool { return !s.disallowedNicknames[strings.ToLower(nickname)] } func (s *Signup) Router() http.Handler { r := chi.NewRouter() r.Get("/", s.signup) r.Post("/", s.signup) r.Get("/complete", s.complete) r.Post("/complete", s.complete) return r } func (s *Signup) signup(w http.ResponseWriter, r *http.Request) { switch r.Method { case http.MethodGet: s.pages.Signup(w, pages.SignupParams{ CloudflareSiteKey: s.config.Cloudflare.TurnstileSiteKey, }) case http.MethodPost: if s.cf == nil { http.Error(w, "signup is disabled", http.StatusFailedDependency) return } emailId := r.FormValue("email") cfToken := r.FormValue("cf-turnstile-response") noticeId := "signup-msg" if err := s.validateCaptcha(cfToken, r); err != nil { s.l.Warn("turnstile validation failed", "error", err, "email", emailId) s.pages.Notice(w, noticeId, "Captcha validation failed.") return } if !email.IsValidEmail(emailId) { s.pages.Notice(w, noticeId, "Invalid email address.") return } exists, err := db.CheckEmailExistsAtAll(s.db, emailId) if err != nil { s.l.Error("failed to check email existence", "error", err) s.pages.Notice(w, noticeId, "Failed to complete signup. Try again later.") return } if exists { s.pages.Notice(w, noticeId, "Email already exists.") return } code, err := s.inviteCodeRequest() if err != nil { s.l.Error("failed to create invite code", "error", err) s.pages.Notice(w, noticeId, "Failed to create invite code.") return } em := email.Email{ APIKey: s.config.Resend.ApiKey, From: s.config.Resend.SentFrom, To: emailId, Subject: "Verify your Tangled account", Text: `Copy and paste this code below to verify your account on Tangled. ` + code, Html: `
Copy and paste this code below to verify your account on Tangled.
` + code + `
%s.tngl.sh.`, username))
// clean up inflight signup asynchronously
go func() {
if err := db.DeleteInflightSignup(s.db, email); err != nil {
s.l.Error("failed to delete inflight signup", "error", err)
}
}()
return nil
}
type turnstileResponse struct {
Success bool `json:"success"`
ErrorCodes []string `json:"error-codes,omitempty"`
ChallengeTs string `json:"challenge_ts,omitempty"`
Hostname string `json:"hostname,omitempty"`
}
func (s *Signup) validateCaptcha(cfToken string, r *http.Request) error {
if cfToken == "" {
return errors.New("captcha token is empty")
}
if s.config.Cloudflare.TurnstileSecretKey == "" {
return errors.New("turnstile secret key not configured")
}
data := url.Values{}
data.Set("secret", s.config.Cloudflare.TurnstileSecretKey)
data.Set("response", cfToken)
// include the client IP if we have it
if remoteIP := r.Header.Get("CF-Connecting-IP"); remoteIP != "" {
data.Set("remoteip", remoteIP)
} else if remoteIP := r.Header.Get("X-Forwarded-For"); remoteIP != "" {
if ips := strings.Split(remoteIP, ","); len(ips) > 0 {
data.Set("remoteip", strings.TrimSpace(ips[0]))
}
} else {
data.Set("remoteip", r.RemoteAddr)
}
resp, err := http.PostForm("https://challenges.cloudflare.com/turnstile/v0/siteverify", data)
if err != nil {
return fmt.Errorf("failed to verify turnstile token: %w", err)
}
defer resp.Body.Close()
var turnstileResp turnstileResponse
if err := json.NewDecoder(resp.Body).Decode(&turnstileResp); err != nil {
return fmt.Errorf("failed to decode turnstile response: %w", err)
}
if !turnstileResp.Success {
s.l.Warn("turnstile validation failed", "error_codes", turnstileResp.ErrorCodes)
return errors.New("turnstile validation failed")
}
return nil
}