1
0
Fork 0
mirror of synced 2024-06-14 08:44:49 +12:00
appwrite/app/controllers/api/users.php

2175 lines
94 KiB
PHP
Raw Normal View History

2019-05-09 18:54:39 +12:00
<?php
2021-05-07 10:31:05 +12:00
use Appwrite\Auth\Auth;
2024-03-01 15:07:58 +13:00
use Appwrite\Auth\MFA\Type;
use Appwrite\Auth\MFA\Type\TOTP;
2021-05-07 10:31:05 +12:00
use Appwrite\Auth\Validator\Password;
use Appwrite\Auth\Validator\Phone;
2022-01-19 00:05:04 +13:00
use Appwrite\Detector\Detector;
2022-05-26 01:36:25 +12:00
use Appwrite\Event\Delete;
use Appwrite\Event\Event;
2022-01-19 00:05:04 +13:00
use Appwrite\Network\Validator\Email;
use Appwrite\Utopia\Database\Validator\CustomId;
use Appwrite\Utopia\Database\Validator\Queries\Identities;
2023-11-03 01:30:17 +13:00
use Appwrite\Utopia\Database\Validator\Queries\Targets;
2024-02-13 05:02:04 +13:00
use Utopia\Database\Exception\Query as QueryException;
2023-04-25 23:35:49 +12:00
use Utopia\Database\Validator\Queries;
use Appwrite\Utopia\Database\Validator\Queries\Users;
2023-04-25 23:35:49 +12:00
use Utopia\Database\Validator\Query\Limit;
use Utopia\Database\Validator\Query\Offset;
2023-12-12 05:24:24 +13:00
use Appwrite\Utopia\Request;
2021-05-07 10:31:05 +12:00
use Appwrite\Utopia\Response;
2020-06-29 05:31:21 +12:00
use Utopia\App;
use Utopia\Audit\Audit;
2022-01-19 00:05:04 +13:00
use Utopia\Config\Config;
2022-12-15 04:42:25 +13:00
use Utopia\Database\Helpers\ID;
2022-12-15 05:04:06 +13:00
use Utopia\Database\Helpers\Permission;
use Utopia\Database\Helpers\Role;
2022-05-26 01:36:25 +12:00
use Utopia\Locale\Locale;
use Appwrite\Extend\Exception;
2021-05-07 10:31:05 +12:00
use Utopia\Database\Document;
use Utopia\Database\DateTime;
2021-05-07 10:31:05 +12:00
use Utopia\Database\Exception\Duplicate;
use Utopia\Database\Validator\UID;
use Utopia\Database\Database;
use Utopia\Database\Query;
use Utopia\Database\Validator\Authorization;
2023-05-27 12:23:01 +12:00
use Utopia\Validator\ArrayList;
2022-01-19 00:05:04 +13:00
use Utopia\Validator\Assoc;
use Utopia\Validator\WhiteList;
use Utopia\Validator\Text;
use Utopia\Validator\Boolean;
use Utopia\Validator\Range;
2022-05-26 01:36:25 +12:00
use MaxMind\Db\Reader;
use Utopia\Validator\Integer;
2022-12-18 22:08:51 +13:00
use Appwrite\Auth\Validator\PasswordHistory;
2022-12-26 23:22:49 +13:00
use Appwrite\Auth\Validator\PasswordDictionary;
use Appwrite\Auth\Validator\PersonalData;
2024-01-05 04:26:15 +13:00
use Appwrite\Hooks\Hooks;
2019-05-09 18:54:39 +12:00
2022-08-13 04:01:25 +12:00
/** TODO: Remove function when we move to using utopia/platform */
2024-01-05 04:26:15 +13:00
function createUser(string $hash, mixed $hashOptions, string $userId, ?string $email, ?string $password, ?string $phone, string $name, Document $project, Database $dbForProject, Event $queueForEvents, Hooks $hooks): Document
2022-06-14 23:08:54 +12:00
{
2024-01-08 01:40:45 +13:00
$plaintextPassword = $password;
2022-06-14 03:11:31 +12:00
$hashOptionsObject = (\is_string($hashOptions)) ? \json_decode($hashOptions, true) : $hashOptions; // Cast to JSON array
$passwordHistory = $project->getAttribute('auths', [])['passwordHistory'] ?? 0;
2022-08-17 01:03:38 +12:00
if (!empty($email)) {
$email = \strtolower($email);
// Makes sure this email is not already used in another identity
$identityWithMatchingEmail = $dbForProject->findOne('identities', [
Query::equal('providerEmail', [$email]),
]);
if ($identityWithMatchingEmail !== false && !$identityWithMatchingEmail->isEmpty()) {
throw new Exception(Exception::USER_EMAIL_ALREADY_EXISTS);
}
}
2022-06-14 03:11:31 +12:00
try {
$userId = $userId == 'unique()'
? ID::unique()
: ID::custom($userId);
2022-08-17 01:03:38 +12:00
2023-07-20 10:24:32 +12:00
if ($project->getAttribute('auths', [])['personalDataCheck'] ?? false) {
2024-02-26 17:50:52 +13:00
$personalDataValidator = new PersonalData(
$userId,
$email,
$name,
$phone,
strict: false,
allowEmpty: true
);
2024-01-08 01:40:45 +13:00
if (!$personalDataValidator->isValid($plaintextPassword)) {
throw new Exception(Exception::USER_PASSWORD_PERSONAL_DATA);
}
}
2022-12-16 23:29:20 +13:00
$password = (!empty($password)) ? ($hash === 'plaintext' ? Auth::passwordHash($password, $hash, $hashOptionsObject) : $password) : null;
2024-01-05 04:26:15 +13:00
$user = new Document([
2022-06-14 03:11:31 +12:00
'$id' => $userId,
'$permissions' => [
Permission::read(Role::any()),
Permission::update(Role::user($userId)),
Permission::delete(Role::user($userId)),
],
2022-06-14 03:11:31 +12:00
'email' => $email,
'emailVerification' => false,
'phone' => $phone,
'phoneVerification' => false,
2022-06-14 03:11:31 +12:00
'status' => true,
2023-05-27 12:23:01 +12:00
'labels' => [],
2022-12-16 23:29:20 +13:00
'password' => $password,
'passwordHistory' => is_null($password) || $passwordHistory === 0 ? [] : [$password],
2023-02-20 14:51:56 +13:00
'passwordUpdate' => (!empty($password)) ? DateTime::now() : null,
2022-06-14 03:11:31 +12:00
'hash' => $hash === 'plaintext' ? Auth::DEFAULT_ALGO : $hash,
'hashOptions' => $hash === 'plaintext' ? Auth::DEFAULT_ALGO_OPTIONS : $hashOptionsObject + ['type' => $hash],
'registration' => DateTime::now(),
2022-06-14 03:11:31 +12:00
'reset' => false,
'name' => $name,
'prefs' => new \stdClass(),
'sessions' => null,
'tokens' => null,
'memberships' => null,
'search' => implode(' ', [$userId, $email, $phone, $name]),
2024-01-05 04:26:15 +13:00
]);
if ($hash === 'plaintext') {
2024-01-08 01:40:45 +13:00
$hooks->trigger('passwordValidator', [$dbForProject, $project, $plaintextPassword, &$user, true]);
}
$user = $dbForProject->createDocument('users', $user);
if ($email) {
try {
$target = $dbForProject->createDocument('targets', new Document([
2024-02-16 17:07:16 +13:00
'$permissions' => [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
],
'userId' => $user->getId(),
'userInternalId' => $user->getInternalId(),
'providerType' => 'email',
'identifier' => $email,
]));
$user->setAttribute('targets', [...$user->getAttribute('targets', []), $target]);
} catch (Duplicate) {
$existingTarget = $dbForProject->findOne('targets', [
Query::equal('identifier', [$email]),
]);
$user->setAttribute('targets', [...$user->getAttribute('targets', []), $existingTarget]);
}
}
if ($phone) {
try {
$target = $dbForProject->createDocument('targets', new Document([
2024-02-16 17:07:16 +13:00
'$permissions' => [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
],
'userId' => $user->getId(),
'userInternalId' => $user->getInternalId(),
'providerType' => 'sms',
'identifier' => $phone,
]));
$user->setAttribute('targets', [...$user->getAttribute('targets', []), $target]);
} catch (Duplicate) {
$existingTarget = $dbForProject->findOne('targets', [
Query::equal('identifier', [$phone]),
]);
$user->setAttribute('targets', [...$user->getAttribute('targets', []), $existingTarget]);
}
}
2023-12-15 02:32:06 +13:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2022-06-14 03:11:31 +12:00
} catch (Duplicate $th) {
throw new Exception(Exception::USER_ALREADY_EXISTS);
2022-06-14 03:11:31 +12:00
}
2022-12-21 05:11:30 +13:00
$queueForEvents->setParam('userId', $user->getId());
2022-06-14 03:11:31 +12:00
return $user;
}
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::post('/v1/users')
2023-08-02 03:26:48 +12:00
->desc('Create user')
2020-06-26 06:32:12 +12:00
->groups(['api', 'users'])
2022-04-04 18:30:07 +12:00
->label('event', 'users.[userId].create')
2020-02-05 19:31:34 +13:00
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.create')
2022-08-14 02:55:27 +12:00
->label('audits.resource', 'user/{response.$id}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
2020-02-05 19:31:34 +13:00
->label('sdk.namespace', 'users')
->label('sdk.method', 'create')
->label('sdk.description', '/docs/references/users/create-user.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
2023-01-21 11:22:16 +13:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('email', null, new Email(), 'User email.', true)
->param('phone', null, new Phone(), 'Phone number. Format this number with a leading \'+\' and a country code, e.g., +16175551212.', true)
2023-02-20 20:08:27 +13:00
->param('password', '', fn ($project, $passwordsDictionary) => new PasswordDictionary($passwordsDictionary, $project->getAttribute('auths', [])['passwordDictionary'] ?? false), 'Plain text user password. Must be at least 8 chars.', true, ['project', 'passwordsDictionary'])
2020-09-11 02:40:14 +12:00
->param('name', '', new Text(128), 'User name. Max length: 128 chars.', true)
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('project')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
2024-01-05 04:26:15 +13:00
->inject('hooks')
->action(function (string $userId, ?string $email, ?string $phone, ?string $password, string $name, Response $response, Document $project, Database $dbForProject, Event $queueForEvents, Hooks $hooks) {
$user = createUser('plaintext', '{}', $userId, $email, $password, $phone, $name, $project, $dbForProject, $queueForEvents, $hooks);
2022-09-07 23:11:10 +12:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($user, Response::MODEL_USER);
2020-12-27 05:54:42 +13:00
});
2020-02-05 19:31:34 +13:00
App::post('/v1/users/bcrypt')
2023-08-02 03:26:48 +12:00
->desc('Create user with bcrypt password')
->groups(['api', 'users'])
->label('event', 'users.[userId].create')
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.create')
2022-08-17 22:01:16 +12:00
->label('audits.resource', 'user/{response.$id}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'createBcryptUser')
->label('sdk.description', '/docs/references/users/create-bcrypt-user.md')
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
2023-01-21 11:22:16 +13:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
2020-09-11 02:40:14 +12:00
->param('email', '', new Email(), 'User email.')
2022-06-17 21:25:28 +12:00
->param('password', '', new Password(), 'User password hashed using Bcrypt.')
2020-09-11 02:40:14 +12:00
->param('name', '', new Text(128), 'User name. Max length: 128 chars.', true)
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('project')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
2024-01-05 04:26:15 +13:00
->inject('hooks')
->action(function (string $userId, string $email, string $password, string $name, Response $response, Document $project, Database $dbForProject, Event $queueForEvents, Hooks $hooks) {
$user = createUser('bcrypt', '{}', $userId, $email, $password, null, $name, $project, $dbForProject, $queueForEvents, $hooks);
2020-02-05 19:31:34 +13:00
2022-09-07 23:11:10 +12:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($user, Response::MODEL_USER);
});
2020-02-05 19:31:34 +13:00
2022-08-15 04:29:07 +12:00
App::post('/v1/users/md5')
2023-08-02 03:26:48 +12:00
->desc('Create user with MD5 password')
->groups(['api', 'users'])
->label('event', 'users.[userId].create')
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.create')
2022-08-17 22:01:16 +12:00
->label('audits.resource', 'user/{response.$id}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'createMD5User')
->label('sdk.description', '/docs/references/users/create-md5-user.md')
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
2023-01-21 11:22:16 +13:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('email', '', new Email(), 'User email.')
->param('password', '', new Password(), 'User password hashed using MD5.')
->param('name', '', new Text(128), 'User name. Max length: 128 chars.', true)
->inject('response')
->inject('project')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
2024-01-05 04:26:15 +13:00
->inject('hooks')
->action(function (string $userId, string $email, string $password, string $name, Response $response, Document $project, Database $dbForProject, Event $queueForEvents, Hooks $hooks) {
$user = createUser('md5', '{}', $userId, $email, $password, null, $name, $project, $dbForProject, $queueForEvents, $hooks);
2022-09-07 23:11:10 +12:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($user, Response::MODEL_USER);
});
2022-08-15 04:29:07 +12:00
App::post('/v1/users/argon2')
2023-08-02 03:26:48 +12:00
->desc('Create user with Argon2 password')
->groups(['api', 'users'])
->label('event', 'users.[userId].create')
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.create')
2022-08-17 22:01:16 +12:00
->label('audits.resource', 'user/{response.$id}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'createArgon2User')
->label('sdk.description', '/docs/references/users/create-argon2-user.md')
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
2023-01-21 11:22:16 +13:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('email', '', new Email(), 'User email.')
->param('password', '', new Password(), 'User password hashed using Argon2.')
->param('name', '', new Text(128), 'User name. Max length: 128 chars.', true)
->inject('response')
->inject('project')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
2024-01-05 04:26:15 +13:00
->inject('hooks')
->action(function (string $userId, string $email, string $password, string $name, Response $response, Document $project, Database $dbForProject, Event $queueForEvents, Hooks $hooks) {
$user = createUser('argon2', '{}', $userId, $email, $password, null, $name, $project, $dbForProject, $queueForEvents, $hooks);
2022-09-07 23:11:10 +12:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($user, Response::MODEL_USER);
});
2022-08-15 04:29:07 +12:00
App::post('/v1/users/sha')
2023-08-02 03:26:48 +12:00
->desc('Create user with SHA password')
->groups(['api', 'users'])
->label('event', 'users.[userId].create')
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.create')
2022-08-17 22:01:16 +12:00
->label('audits.resource', 'user/{response.$id}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'createSHAUser')
->label('sdk.description', '/docs/references/users/create-sha-user.md')
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
2023-01-21 11:22:16 +13:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('email', '', new Email(), 'User email.')
->param('password', '', new Password(), 'User password hashed using SHA.')
2022-06-14 22:40:51 +12:00
->param('passwordVersion', '', new WhiteList(['sha1', 'sha224', 'sha256', 'sha384', 'sha512/224', 'sha512/256', 'sha512', 'sha3-224', 'sha3-256', 'sha3-384', 'sha3-512']), "Optional SHA version used to hash password. Allowed values are: 'sha1', 'sha224', 'sha256', 'sha384', 'sha512/224', 'sha512/256', 'sha512', 'sha3-224', 'sha3-256', 'sha3-384', 'sha3-512'", true)
->param('name', '', new Text(128), 'User name. Max length: 128 chars.', true)
->inject('response')
->inject('project')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
2024-01-05 04:26:15 +13:00
->inject('hooks')
->action(function (string $userId, string $email, string $password, string $passwordVersion, string $name, Response $response, Document $project, Database $dbForProject, Event $queueForEvents, Hooks $hooks) {
$options = '{}';
2022-06-14 23:08:54 +12:00
if (!empty($passwordVersion)) {
2022-06-14 22:40:51 +12:00
$options = '{"version":"' . $passwordVersion . '"}';
2020-06-30 23:09:28 +12:00
}
2020-02-05 19:31:34 +13:00
2024-01-05 04:26:15 +13:00
$user = createUser('sha', $options, $userId, $email, $password, null, $name, $project, $dbForProject, $queueForEvents, $hooks);
2021-08-16 19:56:18 +12:00
2022-09-07 23:11:10 +12:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($user, Response::MODEL_USER);
});
2022-08-15 04:29:07 +12:00
App::post('/v1/users/phpass')
2023-08-02 03:26:48 +12:00
->desc('Create user with PHPass password')
->groups(['api', 'users'])
->label('event', 'users.[userId].create')
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.create')
2022-08-17 22:01:16 +12:00
->label('audits.resource', 'user/{response.$id}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'createPHPassUser')
->label('sdk.description', '/docs/references/users/create-phpass-user.md')
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
2023-01-21 11:22:16 +13:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or pass the string `ID.unique()`to auto generate it. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('email', '', new Email(), 'User email.')
->param('password', '', new Password(), 'User password hashed using PHPass.')
->param('name', '', new Text(128), 'User name. Max length: 128 chars.', true)
->inject('response')
->inject('project')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
2024-01-05 04:26:15 +13:00
->inject('hooks')
->action(function (string $userId, string $email, string $password, string $name, Response $response, Document $project, Database $dbForProject, Event $queueForEvents, Hooks $hooks) {
$user = createUser('phpass', '{}', $userId, $email, $password, null, $name, $project, $dbForProject, $queueForEvents, $hooks);
2022-09-07 23:11:10 +12:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($user, Response::MODEL_USER);
});
2022-08-15 04:29:07 +12:00
App::post('/v1/users/scrypt')
2023-08-02 03:26:48 +12:00
->desc('Create user with Scrypt password')
->groups(['api', 'users'])
->label('event', 'users.[userId].create')
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.create')
2022-08-17 22:01:16 +12:00
->label('audits.resource', 'user/{response.$id}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
2022-06-17 21:25:28 +12:00
->label('sdk.method', 'createScryptUser')
->label('sdk.description', '/docs/references/users/create-scrypt-user.md')
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
2023-01-21 11:22:16 +13:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('email', '', new Email(), 'User email.')
2022-06-17 21:25:28 +12:00
->param('password', '', new Password(), 'User password hashed using Scrypt.')
2022-06-25 00:30:39 +12:00
->param('passwordSalt', '', new Text(128), 'Optional salt used to hash password.')
->param('passwordCpu', 8, new Integer(), 'Optional CPU cost used to hash password.')
->param('passwordMemory', 14, new Integer(), 'Optional memory cost used to hash password.')
->param('passwordParallel', 1, new Integer(), 'Optional parallelization cost used to hash password.')
->param('passwordLength', 64, new Integer(), 'Optional hash length used to hash password.')
->param('name', '', new Text(128), 'User name. Max length: 128 chars.', true)
->inject('response')
->inject('project')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
2024-01-05 04:26:15 +13:00
->inject('hooks')
->action(function (string $userId, string $email, string $password, string $passwordSalt, int $passwordCpu, int $passwordMemory, int $passwordParallel, int $passwordLength, string $name, Response $response, Document $project, Database $dbForProject, Event $queueForEvents, Hooks $hooks) {
2022-06-25 00:30:39 +12:00
$options = [
'salt' => $passwordSalt,
'costCpu' => $passwordCpu,
'costMemory' => $passwordMemory,
'costParallel' => $passwordParallel,
'length' => $passwordLength
];
2022-06-14 23:08:54 +12:00
2024-01-05 04:26:15 +13:00
$user = createUser('scrypt', \json_encode($options), $userId, $email, $password, null, $name, $project, $dbForProject, $queueForEvents, $hooks);
2022-09-07 23:11:10 +12:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($user, Response::MODEL_USER);
});
2022-08-15 04:29:07 +12:00
App::post('/v1/users/scrypt-modified')
2023-08-02 03:26:48 +12:00
->desc('Create user with Scrypt modified password')
->groups(['api', 'users'])
->label('event', 'users.[userId].create')
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.create')
2022-08-17 22:01:16 +12:00
->label('audits.resource', 'user/{response.$id}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
2022-06-17 21:25:28 +12:00
->label('sdk.method', 'createScryptModifiedUser')
2022-06-14 22:40:51 +12:00
->label('sdk.description', '/docs/references/users/create-scrypt-modified-user.md')
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
2023-01-21 11:22:16 +13:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('email', '', new Email(), 'User email.')
2022-06-17 21:25:28 +12:00
->param('password', '', new Password(), 'User password hashed using Scrypt Modified.')
->param('passwordSalt', '', new Text(128), 'Salt used to hash password.')
->param('passwordSaltSeparator', '', new Text(128), 'Salt separator used to hash password.')
->param('passwordSignerKey', '', new Text(128), 'Signer key used to hash password.')
->param('name', '', new Text(128), 'User name. Max length: 128 chars.', true)
->inject('response')
->inject('project')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
2024-01-05 04:26:15 +13:00
->inject('hooks')
->action(function (string $userId, string $email, string $password, string $passwordSalt, string $passwordSaltSeparator, string $passwordSignerKey, string $name, Response $response, Document $project, Database $dbForProject, Event $queueForEvents, Hooks $hooks) {
$user = createUser('scryptMod', '{"signerKey":"' . $passwordSignerKey . '","saltSeparator":"' . $passwordSaltSeparator . '","salt":"' . $passwordSalt . '"}', $userId, $email, $password, null, $name, $project, $dbForProject, $queueForEvents, $hooks);
2022-04-04 18:30:07 +12:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($user, Response::MODEL_USER);
2020-12-27 05:54:42 +13:00
});
2020-02-05 19:31:34 +13:00
App::post('/v1/users/:userId/targets')
->desc('Create User Target')
->groups(['api', 'users'])
2023-10-26 06:33:23 +13:00
->label('audits.event', 'target.create')
2023-09-21 06:07:10 +12:00
->label('audits.resource', 'target/response.$id')
->label('event', 'users.[userId].targets.[targetId].create')
->label('scope', 'targets.write')
->label('sdk.auth', [APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_ADMIN])
->label('sdk.namespace', 'users')
->label('sdk.method', 'createTarget')
->label('sdk.description', '/docs/references/users/create-target.md')
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TARGET)
2023-11-15 01:44:07 +13:00
->param('targetId', '', new CustomId(), 'Target ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
2023-08-24 08:24:25 +12:00
->param('userId', '', new UID(), 'User ID.')
2023-11-29 17:05:37 +13:00
->param('providerType', '', new WhiteList([MESSAGE_TYPE_EMAIL, MESSAGE_TYPE_SMS, MESSAGE_TYPE_PUSH]), 'The target provider type. Can be one of the following: `email`, `sms` or `push`.')
2023-08-24 08:24:25 +12:00
->param('identifier', '', new Text(Database::LENGTH_KEY), 'The target identifier (token, email, phone etc.)')
2023-11-15 01:44:07 +13:00
->param('providerId', '', new UID(), 'Provider ID. Message will be sent to this target from the specified provider ID. If no provider ID is set the first setup provider will be used.', true)
->param('name', '', new Text(128), 'Target name. Max length: 128 chars. For example: My Awesome App Galaxy S23.', true)
->inject('queueForEvents')
->inject('response')
->inject('dbForProject')
->action(function (string $targetId, string $userId, string $providerType, string $identifier, string $providerId, string $name, Event $queueForEvents, Response $response, Database $dbForProject) {
2023-11-15 01:44:07 +13:00
$targetId = $targetId == 'unique()' ? ID::unique() : $targetId;
$provider = new Document();
2023-11-29 17:05:37 +13:00
if ($providerType === MESSAGE_TYPE_PUSH) {
2023-11-15 01:44:07 +13:00
$provider = $dbForProject->getDocument('providers', $providerId);
2023-11-15 01:44:07 +13:00
if ($provider->isEmpty()) {
throw new Exception(Exception::PROVIDER_NOT_FOUND);
}
}
2023-11-21 22:41:09 +13:00
switch ($providerType) {
case 'email':
$validator = new Email();
if (!$validator->isValid($identifier)) {
throw new Exception(Exception::GENERAL_INVALID_EMAIL);
}
break;
2023-11-29 17:05:37 +13:00
case MESSAGE_TYPE_SMS:
2023-11-21 22:41:09 +13:00
$validator = new Phone();
if (!$validator->isValid($identifier)) {
throw new Exception(Exception::GENERAL_INVALID_PHONE);
}
break;
2023-11-29 17:05:37 +13:00
case MESSAGE_TYPE_PUSH:
2023-11-21 22:49:19 +13:00
break;
2023-11-21 22:41:09 +13:00
default:
throw new Exception(Exception::PROVIDER_INCORRECT_TYPE);
}
$user = $dbForProject->getDocument('users', $userId);
2023-08-18 01:32:07 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
$target = $dbForProject->getDocument('targets', $targetId);
if (!$target->isEmpty()) {
throw new Exception(Exception::USER_TARGET_ALREADY_EXISTS);
}
2023-10-07 02:53:46 +13:00
try {
$target = $dbForProject->createDocument('targets', new Document([
'$id' => $targetId,
2024-02-16 17:07:16 +13:00
'$permissions' => [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
],
2023-11-15 01:44:07 +13:00
'providerId' => $providerId ?? null,
2024-02-21 22:43:04 +13:00
'providerInternalId' => $provider->isEmpty() ? null : $provider->getInternalId(),
2023-11-15 01:44:07 +13:00
'providerType' => $providerType,
2023-10-07 02:53:46 +13:00
'userId' => $userId,
'userInternalId' => $user->getInternalId(),
'identifier' => $identifier,
'name' => ($name !== '') ? $name : null,
2023-10-07 02:53:46 +13:00
]));
} catch (Duplicate) {
throw new Exception(Exception::USER_TARGET_ALREADY_EXISTS);
}
2023-12-15 02:32:06 +13:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2023-10-06 00:27:48 +13:00
$queueForEvents
->setParam('userId', $user->getId())
->setParam('targetId', $target->getId());
$response
2023-10-06 00:27:48 +13:00
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($target, Response::MODEL_TARGET);
});
2020-06-29 05:31:21 +12:00
App::get('/v1/users')
2023-08-02 03:26:48 +12:00
->desc('List users')
2020-06-26 06:32:12 +12:00
->groups(['api', 'users'])
2019-05-09 18:54:39 +12:00
->label('scope', 'users.read')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'users')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'list')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/users/list-users.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER_LIST)
2023-03-30 08:38:39 +13:00
->param('queries', [], new Users(), 'Array of query strings generated using the Query class provided by the SDK. [Learn more about queries](https://appwrite.io/docs/queries). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' queries are allowed, each ' . APP_LIMIT_ARRAY_ELEMENT_SIZE . ' characters long. You may filter on the following attributes: ' . implode(', ', Users::ALLOWED_ATTRIBUTES), true)
2020-09-11 02:40:14 +12:00
->param('search', '', new Text(256), 'Search term to filter your list results. Max length: 256 chars.', true)
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('dbForProject')
2022-08-25 22:28:13 +12:00
->action(function (array $queries, string $search, Response $response, Database $dbForProject) {
2021-05-07 10:31:05 +12:00
2024-02-13 05:02:04 +13:00
try {
$queries = Query::parseQueries($queries);
} catch (QueryException $e) {
throw new Exception(Exception::GENERAL_QUERY_INVALID, $e->getMessage());
}
2021-08-07 00:36:48 +12:00
2022-08-12 11:53:52 +12:00
if (!empty($search)) {
$queries[] = Query::search('search', $search);
2021-08-07 00:36:48 +12:00
}
2024-02-12 22:55:45 +13:00
/**
2024-02-12 23:03:31 +13:00
* Get cursor document if there was a cursor query, we use array_filter and reset for reference $cursor to $queries
2024-02-12 22:55:45 +13:00
*/
2023-08-22 15:25:55 +12:00
$cursor = \array_filter($queries, function ($query) {
2023-12-07 03:10:40 +13:00
return \in_array($query->getMethod(), [Query::TYPE_CURSOR_AFTER, Query::TYPE_CURSOR_BEFORE]);
2023-08-22 15:25:55 +12:00
});
$cursor = reset($cursor);
2022-08-30 23:55:23 +12:00
if ($cursor) {
/** @var Query $cursor */
$userId = $cursor->getValue();
$cursorDocument = $dbForProject->getDocument('users', $userId);
2022-08-12 11:53:52 +12:00
if ($cursorDocument->isEmpty()) {
throw new Exception(Exception::GENERAL_CURSOR_NOT_FOUND, "User '{$userId}' for the 'cursor' value not found.");
2022-08-12 11:53:52 +12:00
}
$cursor->setValue($cursorDocument);
}
$filterQueries = Query::groupByType($queries)['filters'];
2021-07-26 02:47:18 +12:00
$response->dynamic(new Document([
'users' => $dbForProject->find('users', $queries),
2022-08-12 11:53:52 +12:00
'total' => $dbForProject->count('users', $filterQueries, APP_LIMIT_COUNT),
2020-10-31 08:53:27 +13:00
]), Response::MODEL_USER_LIST);
2020-12-27 05:54:42 +13:00
});
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::get('/v1/users/:userId')
2023-08-02 03:26:48 +12:00
->desc('Get user')
->groups(['api', 'users'])
2019-05-09 18:54:39 +12:00
->label('scope', 'users.read')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'get')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/users/get-user.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
->param('userId', '', new UID(), 'User ID.')
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('dbForProject')
2022-08-17 14:35:55 +12:00
->action(function (string $userId, Response $response, Database $dbForProject) {
2022-08-16 05:33:44 +12:00
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
2022-10-15 05:17:00 +13:00
throw new Exception(Exception::USER_NOT_FOUND);
2022-08-16 05:33:44 +12:00
}
2021-07-26 02:47:18 +12:00
$response->dynamic($user, Response::MODEL_USER);
2022-08-16 05:33:44 +12:00
});
2020-06-29 05:31:21 +12:00
App::get('/v1/users/:userId/prefs')
2023-08-02 03:26:48 +12:00
->desc('Get user preferences')
2020-06-26 06:32:12 +12:00
->groups(['api', 'users'])
2019-05-09 18:54:39 +12:00
->label('scope', 'users.read')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'users')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'getPrefs')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/users/get-user-prefs.md')
2020-11-13 00:54:16 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
2021-04-22 01:37:51 +12:00
->label('sdk.response.model', Response::MODEL_PREFERENCES)
->param('userId', '', new UID(), 'User ID.')
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('dbForProject')
2022-08-11 13:43:02 +12:00
->action(function (string $userId, Response $response, Database $dbForProject) {
2019-05-09 18:54:39 +12:00
$user = $dbForProject->getDocument('users', $userId);
2019-05-09 18:54:39 +12:00
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
$prefs = $user->getAttribute('prefs', []);
2019-05-09 18:54:39 +12:00
2021-07-26 02:47:18 +12:00
$response->dynamic(new Document($prefs), Response::MODEL_PREFERENCES);
2020-12-27 05:54:42 +13:00
});
2019-05-09 18:54:39 +12:00
App::get('/v1/users/:userId/targets/:targetId')
->desc('Get User Target')
->groups(['api', 'users'])
2023-08-24 08:24:25 +12:00
->label('scope', 'targets.read')
->label('sdk.auth', [APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_ADMIN])
->label('sdk.namespace', 'users')
->label('sdk.method', 'getTarget')
->label('sdk.description', '/docs/references/users/get-user-target.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TARGET)
->param('userId', '', new UID(), 'User ID.')
->param('targetId', '', new UID(), 'Target ID.')
->inject('response')
->inject('dbForProject')
->action(function (string $userId, string $targetId, Response $response, Database $dbForProject) {
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
2023-08-17 02:47:36 +12:00
$target = $user->find('$id', $targetId, 'targets');
if (empty($target)) {
throw new Exception(Exception::USER_TARGET_NOT_FOUND);
}
$response->dynamic($target, Response::MODEL_TARGET);
2023-08-17 02:47:36 +12:00
});
2020-06-29 05:31:21 +12:00
App::get('/v1/users/:userId/sessions')
2023-08-02 03:26:48 +12:00
->desc('List user sessions')
2020-06-26 06:32:12 +12:00
->groups(['api', 'users'])
2019-05-09 18:54:39 +12:00
->label('scope', 'users.read')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'users')
->label('sdk.method', 'listSessions')
->label('sdk.description', '/docs/references/users/list-user-sessions.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_SESSION_LIST)
->param('userId', '', new UID(), 'User ID.')
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('dbForProject')
2020-12-27 05:54:42 +13:00
->inject('locale')
2022-08-11 13:43:02 +12:00
->action(function (string $userId, Response $response, Database $dbForProject, Locale $locale) {
2019-05-09 18:54:39 +12:00
$user = $dbForProject->getDocument('users', $userId);
2020-06-30 23:09:28 +12:00
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2021-02-20 01:12:47 +13:00
$sessions = $user->getAttribute('sessions', []);
2020-06-30 23:09:28 +12:00
2022-05-24 02:54:50 +12:00
foreach ($sessions as $key => $session) {
2021-02-20 01:12:47 +13:00
/** @var Document $session */
2019-05-09 18:54:39 +12:00
2022-05-24 02:54:50 +12:00
$countryName = $locale->getText('countries.' . strtolower($session->getAttribute('countryCode')), $locale->getText('locale.country.unknown'));
2021-07-23 08:15:01 +12:00
$session->setAttribute('countryName', $countryName);
2021-02-20 01:12:47 +13:00
$session->setAttribute('current', false);
2019-05-09 18:54:39 +12:00
2021-02-20 01:12:47 +13:00
$sessions[$key] = $session;
2019-05-09 18:54:39 +12:00
}
2021-07-26 02:47:18 +12:00
$response->dynamic(new Document([
2021-05-27 22:09:14 +12:00
'sessions' => $sessions,
2022-02-27 22:57:09 +13:00
'total' => count($sessions),
2020-10-31 08:53:27 +13:00
]), Response::MODEL_SESSION_LIST);
});
2019-05-09 18:54:39 +12:00
2022-05-13 01:20:06 +12:00
App::get('/v1/users/:userId/memberships')
2023-08-02 03:26:48 +12:00
->desc('List user memberships')
2022-05-13 01:20:06 +12:00
->groups(['api', 'users'])
->label('scope', 'users.read')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'listMemberships')
->label('sdk.description', '/docs/references/users/list-user-memberships.md')
2022-05-13 01:20:06 +12:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MEMBERSHIP_LIST)
->param('userId', '', new UID(), 'User ID.')
->inject('response')
->inject('dbForProject')
2022-05-26 01:36:25 +12:00
->action(function (string $userId, Response $response, Database $dbForProject) {
2022-05-13 01:20:06 +12:00
$user = $dbForProject->getDocument('users', $userId);
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2022-05-13 01:20:06 +12:00
}
2022-05-24 02:54:50 +12:00
$memberships = array_map(function ($membership) use ($dbForProject, $user) {
2022-05-13 01:20:06 +12:00
$team = $dbForProject->getDocument('teams', $membership->getAttribute('teamId'));
$membership
->setAttribute('teamName', $team->getAttribute('name'))
->setAttribute('userName', $user->getAttribute('name'))
2022-05-13 02:26:12 +12:00
->setAttribute('userEmail', $user->getAttribute('email'));
2022-05-13 01:20:06 +12:00
return $membership;
}, $user->getAttribute('memberships', []));
$response->dynamic(new Document([
'memberships' => $memberships,
'total' => count($memberships),
]), Response::MODEL_MEMBERSHIP_LIST);
});
2020-06-29 05:31:21 +12:00
App::get('/v1/users/:userId/logs')
2023-08-02 03:26:48 +12:00
->desc('List user logs')
2020-06-26 06:32:12 +12:00
->groups(['api', 'users'])
2019-05-09 18:54:39 +12:00
->label('scope', 'users.read')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'users')
->label('sdk.method', 'listLogs')
->label('sdk.description', '/docs/references/users/list-user-logs.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_LOG_LIST)
->param('userId', '', new UID(), 'User ID.')
2023-05-17 00:56:20 +12:00
->param('queries', [], new Queries([new Limit(), new Offset()]), 'Array of query strings generated using the Query class provided by the SDK. [Learn more about queries](https://appwrite.io/docs/queries). Only supported methods are limit and offset', true)
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('dbForProject')
2020-12-27 05:54:42 +13:00
->inject('locale')
->inject('geodb')
2022-08-25 22:28:13 +12:00
->action(function (string $userId, array $queries, Response $response, Database $dbForProject, Locale $locale, Reader $geodb) {
2020-06-30 23:09:28 +12:00
$user = $dbForProject->getDocument('users', $userId);
2020-06-30 23:09:28 +12:00
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2024-02-13 05:02:04 +13:00
try {
$queries = Query::parseQueries($queries);
} catch (QueryException $e) {
throw new Exception(Exception::GENERAL_QUERY_INVALID, $e->getMessage());
}
$grouped = Query::groupByType($queries);
2022-08-30 23:55:23 +12:00
$limit = $grouped['limit'] ?? APP_LIMIT_COUNT;
$offset = $grouped['offset'] ?? 0;
$audit = new Audit($dbForProject);
2021-11-17 03:54:29 +13:00
$logs = $audit->getLogsByUser($user->getInternalId(), $limit, $offset);
2020-06-30 23:09:28 +12:00
$output = [];
foreach ($logs as $i => &$log) {
$log['userAgent'] = (!empty($log['userAgent'])) ? $log['userAgent'] : 'UNKNOWN';
$detector = new Detector($log['userAgent']);
$detector->skipBotDetection(); // OPTIONAL: If called, bot detection will completely be skipped (bots will be detected as regular devices then)
2020-06-30 23:09:28 +12:00
$os = $detector->getOS();
$client = $detector->getClient();
$device = $detector->getDevice();
2020-10-31 08:53:27 +13:00
$output[$i] = new Document([
2020-06-30 23:09:28 +12:00
'event' => $log['event'],
'ip' => $log['ip'],
2021-06-13 06:39:59 +12:00
'time' => $log['time'],
'osCode' => $os['osCode'],
'osName' => $os['osName'],
'osVersion' => $os['osVersion'],
'clientType' => $client['clientType'],
'clientCode' => $client['clientCode'],
'clientName' => $client['clientName'],
'clientVersion' => $client['clientVersion'],
'clientEngine' => $client['clientEngine'],
'clientEngineVersion' => $client['clientEngineVersion'],
'deviceName' => $device['deviceName'],
'deviceBrand' => $device['deviceBrand'],
'deviceModel' => $device['deviceModel']
2020-10-31 08:53:27 +13:00
]);
$record = $geodb->get($log['ip']);
if ($record) {
2022-05-24 02:54:50 +12:00
$output[$i]['countryCode'] = $locale->getText('countries.' . strtolower($record['country']['iso_code']), false) ? \strtolower($record['country']['iso_code']) : '--';
$output[$i]['countryName'] = $locale->getText('countries.' . strtolower($record['country']['iso_code']), $locale->getText('locale.country.unknown'));
2020-10-31 08:53:27 +13:00
} else {
$output[$i]['countryCode'] = '--';
$output[$i]['countryName'] = $locale->getText('locale.country.unknown');
2019-05-09 18:54:39 +12:00
}
}
2021-11-17 03:54:29 +13:00
$response->dynamic(new Document([
'total' => $audit->countLogsByUser($user->getId()),
2021-11-17 03:54:29 +13:00
'logs' => $output,
]), Response::MODEL_LOG_LIST);
2020-12-27 05:54:42 +13:00
});
2019-05-09 18:54:39 +12:00
App::get('/v1/users/:userId/targets')
->desc('List User Targets')
->groups(['api', 'users'])
2023-08-24 08:24:25 +12:00
->label('scope', 'targets.read')
->label('sdk.auth', [APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_ADMIN])
->label('sdk.namespace', 'users')
->label('sdk.method', 'listTargets')
->label('sdk.description', '/docs/references/users/list-user-targets.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TARGET_LIST)
->param('userId', '', new UID(), 'User ID.')
2023-11-03 01:30:17 +13:00
->param('queries', [], new Targets(), 'Array of query strings generated using the Query class provided by the SDK. [Learn more about queries](https://appwrite.io/docs/queries). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' queries are allowed, each ' . APP_LIMIT_ARRAY_ELEMENT_SIZE . ' characters long. You may filter on the following attributes: ' . implode(', ', Users::ALLOWED_ATTRIBUTES), true)
->inject('response')
->inject('dbForProject')
2023-11-03 01:30:17 +13:00
->action(function (string $userId, array $queries, Response $response, Database $dbForProject) {
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
2023-08-17 02:47:36 +12:00
2024-02-13 05:02:04 +13:00
try {
$queries = Query::parseQueries($queries);
} catch (QueryException $e) {
throw new Exception(Exception::GENERAL_QUERY_INVALID, $e->getMessage());
}
2023-11-03 01:30:17 +13:00
$queries[] = Query::equal('userId', [$userId]);
2024-02-12 22:55:45 +13:00
/**
2024-02-12 23:03:31 +13:00
* Get cursor document if there was a cursor query, we use array_filter and reset for reference $cursor to $queries
2024-02-12 22:55:45 +13:00
*/
$cursor = \array_filter($queries, function ($query) {
return \in_array($query->getMethod(), [Query::TYPE_CURSOR_AFTER, Query::TYPE_CURSOR_BEFORE]);
});
$cursor = reset($cursor);
2023-11-03 01:30:17 +13:00
if ($cursor) {
$targetId = $cursor->getValue();
$cursorDocument = $dbForProject->getDocument('targets', $targetId);
2023-11-03 01:30:17 +13:00
if ($cursorDocument->isEmpty()) {
throw new Exception(Exception::GENERAL_CURSOR_NOT_FOUND, "Target '{$targetId}' for the 'cursor' value not found.");
}
$cursor->setValue($cursorDocument);
}
$response->dynamic(new Document([
2023-11-03 01:30:17 +13:00
'targets' => $dbForProject->find('targets', $queries),
'total' => $dbForProject->count('targets', $queries, APP_LIMIT_COUNT),
]), Response::MODEL_TARGET_LIST);
});
App::get('/v1/users/identities')
->desc('List Identities')
->groups(['api', 'users'])
->label('scope', 'users.read')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'listIdentities')
->label('sdk.description', '/docs/references/users/list-identities.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_IDENTITY_LIST)
->param('queries', [], new Identities(), 'Array of query strings generated using the Query class provided by the SDK. [Learn more about queries](https://appwrite.io/docs/queries). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' queries are allowed, each ' . APP_LIMIT_ARRAY_ELEMENT_SIZE . ' characters long. You may filter on the following attributes: ' . implode(', ', Identities::ALLOWED_ATTRIBUTES), true)
->param('search', '', new Text(256), 'Search term to filter your list results. Max length: 256 chars.', true)
->inject('response')
->inject('dbForProject')
->action(function (array $queries, string $search, Response $response, Database $dbForProject) {
2024-02-13 05:02:04 +13:00
try {
$queries = Query::parseQueries($queries);
} catch (QueryException $e) {
throw new Exception(Exception::GENERAL_QUERY_INVALID, $e->getMessage());
}
if (!empty($search)) {
$queries[] = Query::search('search', $search);
}
2024-02-12 22:55:45 +13:00
/**
2024-02-12 23:03:31 +13:00
* Get cursor document if there was a cursor query, we use array_filter and reset for reference $cursor to $queries
2024-02-12 22:55:45 +13:00
*/
2023-08-22 15:25:55 +12:00
$cursor = \array_filter($queries, function ($query) {
2023-12-07 03:10:40 +13:00
return \in_array($query->getMethod(), [Query::TYPE_CURSOR_AFTER, Query::TYPE_CURSOR_BEFORE]);
2023-08-22 15:25:55 +12:00
});
$cursor = reset($cursor);
if ($cursor) {
/** @var Query $cursor */
$identityId = $cursor->getValue();
$cursorDocument = $dbForProject->getDocument('identities', $identityId);
if ($cursorDocument->isEmpty()) {
throw new Exception(Exception::GENERAL_CURSOR_NOT_FOUND, "User '{$identityId}' for the 'cursor' value not found.");
}
$cursor->setValue($cursorDocument);
}
$filterQueries = Query::groupByType($queries)['filters'];
$response->dynamic(new Document([
'identities' => $dbForProject->find('identities', $queries),
'total' => $dbForProject->count('identities', $filterQueries, APP_LIMIT_COUNT),
]), Response::MODEL_IDENTITY_LIST);
});
2020-06-29 05:31:21 +12:00
App::patch('/v1/users/:userId/status')
2023-08-02 03:26:48 +12:00
->desc('Update user status')
2020-06-26 06:32:12 +12:00
->groups(['api', 'users'])
2022-04-04 18:30:07 +12:00
->label('event', 'users.[userId].update.status')
2019-05-09 18:54:39 +12:00
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.update')
2022-08-13 21:59:34 +12:00
->label('audits.resource', 'user/{response.$id}')
2022-08-16 21:00:28 +12:00
->label('audits.userId', '{response.$id}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'users')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'updateStatus')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/users/update-user-status.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
->param('userId', '', new UID(), 'User ID.')
->param('status', null, new Boolean(true), 'User Status. To activate the user pass `true` and to block the user pass `false`.')
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
->action(function (string $userId, bool $status, Response $response, Database $dbForProject, Event $queueForEvents) {
2019-05-09 18:54:39 +12:00
$user = $dbForProject->getDocument('users', $userId);
2019-05-09 18:54:39 +12:00
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user->setAttribute('status', (bool) $status));
2019-10-21 19:01:07 +13:00
2022-12-21 05:11:30 +13:00
$queueForEvents
->setParam('userId', $user->getId());
2022-04-04 18:30:07 +12:00
2021-07-26 02:47:18 +12:00
$response->dynamic($user, Response::MODEL_USER);
2020-12-27 05:54:42 +13:00
});
2019-05-09 18:54:39 +12:00
2023-05-27 12:23:01 +12:00
App::put('/v1/users/:userId/labels')
->desc('Update user labels')
->groups(['api', 'users'])
2023-05-27 12:23:01 +12:00
->label('event', 'users.[userId].update.labels')
->label('scope', 'users.write')
2023-05-27 12:23:01 +12:00
->label('audits.event', 'user.update')
2022-08-13 21:59:34 +12:00
->label('audits.resource', 'user/{response.$id}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
2023-05-27 12:23:01 +12:00
->label('sdk.method', 'updateLabels')
->label('sdk.description', '/docs/references/users/update-user-labels.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
->param('userId', '', new UID(), 'User ID.')
2024-01-28 23:51:05 +13:00
->param('labels', [], new ArrayList(new Text(36, allowList: [...Text::NUMBERS, ...Text::ALPHABET_UPPER, ...Text::ALPHABET_LOWER]), APP_LIMIT_ARRAY_LABELS_SIZE), 'Array of user labels. Replaces the previous labels. Maximum of ' . APP_LIMIT_ARRAY_LABELS_SIZE . ' labels are allowed, each up to 36 alphanumeric characters long.')
->inject('response')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
2023-10-11 07:02:24 +13:00
->action(function (string $userId, array $labels, Response $response, Database $dbForProject, Event $queueForEvents) {
$user = $dbForProject->getDocument('users', $userId);
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
2023-05-27 12:23:01 +12:00
$user->setAttribute('labels', (array) \array_values(\array_unique($labels)));
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
2019-05-09 18:54:39 +12:00
2022-12-21 05:11:30 +13:00
$queueForEvents
->setParam('userId', $user->getId());
2022-04-04 18:30:07 +12:00
2021-07-26 02:47:18 +12:00
$response->dynamic($user, Response::MODEL_USER);
2020-12-27 05:54:42 +13:00
});
2019-05-09 18:54:39 +12:00
App::patch('/v1/users/:userId/verification/phone')
2023-08-02 03:26:48 +12:00
->desc('Update phone verification')
->groups(['api', 'users'])
->label('event', 'users.[userId].update.verification')
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'verification.update')
2022-08-13 21:59:34 +12:00
->label('audits.resource', 'user/{response.$id}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'updatePhoneVerification')
->label('sdk.description', '/docs/references/users/update-user-phone-verification.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
->param('userId', '', new UID(), 'User ID.')
->param('phoneVerification', false, new Boolean(), 'User phone verification status.')
->inject('response')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
->action(function (string $userId, bool $phoneVerification, Response $response, Database $dbForProject, Event $queueForEvents) {
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
$user = $dbForProject->updateDocument('users', $user->getId(), $user->setAttribute('phoneVerification', $phoneVerification));
2022-12-21 05:11:30 +13:00
$queueForEvents
->setParam('userId', $user->getId());
$response->dynamic($user, Response::MODEL_USER);
});
2021-08-29 23:13:58 +12:00
App::patch('/v1/users/:userId/name')
2023-08-02 03:26:48 +12:00
->desc('Update name')
2021-08-29 23:13:58 +12:00
->groups(['api', 'users'])
2022-04-04 18:30:07 +12:00
->label('event', 'users.[userId].update.name')
2021-08-29 23:13:58 +12:00
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.update')
2022-08-09 02:32:54 +12:00
->label('audits.resource', 'user/{response.$id}')
2022-08-16 21:00:28 +12:00
->label('audits.userId', '{response.$id}')
2021-08-29 23:13:58 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'updateName')
->label('sdk.description', '/docs/references/users/update-user-name.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
->param('userId', '', new UID(), 'User ID.')
->param('name', '', new Text(128, 0), 'User name. Max length: 128 chars.')
2021-08-29 23:13:58 +12:00
->inject('response')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
->action(function (string $userId, string $name, Response $response, Database $dbForProject, Event $queueForEvents) {
2021-10-08 21:39:37 +13:00
$user = $dbForProject->getDocument('users', $userId);
2021-08-29 23:13:58 +12:00
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2021-08-29 23:13:58 +12:00
}
2023-05-31 08:55:33 +12:00
$user->setAttribute('name', $name);
2022-04-26 22:07:33 +12:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
2021-08-29 23:13:58 +12:00
2022-12-21 05:11:30 +13:00
$queueForEvents->setParam('userId', $user->getId());
2021-08-29 23:13:58 +12:00
$response->dynamic($user, Response::MODEL_USER);
});
App::patch('/v1/users/:userId/password')
2023-08-02 03:26:48 +12:00
->desc('Update password')
2021-08-29 23:13:58 +12:00
->groups(['api', 'users'])
2022-04-04 18:30:07 +12:00
->label('event', 'users.[userId].update.password')
2021-08-29 23:13:58 +12:00
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.update')
2022-08-09 02:32:54 +12:00
->label('audits.resource', 'user/{response.$id}')
2022-08-16 21:00:28 +12:00
->label('audits.userId', '{response.$id}')
2021-08-29 23:13:58 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'updatePassword')
->label('sdk.description', '/docs/references/users/update-user-password.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
->param('userId', '', new UID(), 'User ID.')
->param('password', '', fn ($project, $passwordsDictionary) => new PasswordDictionary($passwordsDictionary, enabled: $project->getAttribute('auths', [])['passwordDictionary'] ?? false, allowEmpty: true), 'New user password. Must be at least 8 chars.', false, ['project', 'passwordsDictionary'])
2021-08-29 23:13:58 +12:00
->inject('response')
2022-12-16 23:47:08 +13:00
->inject('project')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
2024-01-05 04:26:15 +13:00
->inject('hooks')
->action(function (string $userId, string $password, Response $response, Document $project, Database $dbForProject, Event $queueForEvents, Hooks $hooks) {
2021-08-29 23:13:58 +12:00
$user = $dbForProject->getDocument('users', $userId);
2021-08-29 23:13:58 +12:00
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2021-08-29 23:13:58 +12:00
}
2023-07-20 10:24:32 +12:00
if ($project->getAttribute('auths', [])['personalDataCheck'] ?? false) {
$personalDataValidator = new PersonalData($userId, $user->getAttribute('email'), $user->getAttribute('name'), $user->getAttribute('phone'));
if (!$personalDataValidator->isValid($password)) {
throw new Exception(Exception::USER_PASSWORD_PERSONAL_DATA);
}
}
if (\strlen($password) === 0) {
$user
->setAttribute('password', '')
->setAttribute('passwordUpdate', DateTime::now());
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
$queueForEvents->setParam('userId', $user->getId());
$response->dynamic($user, Response::MODEL_USER);
}
2024-02-05 23:40:53 +13:00
$hooks->trigger('passwordValidator', [$dbForProject, $project, $password, &$user, true]);
$newPassword = Auth::passwordHash($password, Auth::DEFAULT_ALGO, Auth::DEFAULT_ALGO_OPTIONS);
2022-12-16 23:47:08 +13:00
$historyLimit = $project->getAttribute('auths', [])['passwordHistory'] ?? 0;
2023-07-20 09:34:27 +12:00
$history = $user->getAttribute('passwordHistory', []);
2022-12-18 19:31:14 +13:00
if ($historyLimit > 0) {
2022-12-18 22:08:51 +13:00
$validator = new PasswordHistory($history, $user->getAttribute('hash'), $user->getAttribute('hashOptions'));
if (!$validator->isValid($password)) {
throw new Exception(Exception::USER_PASSWORD_RECENTLY_USED);
2022-12-16 23:47:08 +13:00
}
2022-12-18 19:28:19 +13:00
2022-12-16 23:47:08 +13:00
$history[] = $newPassword;
2023-07-20 09:34:27 +12:00
$history = array_slice($history, (count($history) - $historyLimit), $historyLimit);
2022-12-16 23:22:39 +13:00
}
2021-10-08 21:39:37 +13:00
$user
2022-12-16 23:29:20 +13:00
->setAttribute('password', $newPassword)
2023-02-20 14:51:56 +13:00
->setAttribute('passwordHistory', $history)
->setAttribute('passwordUpdate', DateTime::now())
->setAttribute('hash', Auth::DEFAULT_ALGO)
2023-02-20 14:51:56 +13:00
->setAttribute('hashOptions', Auth::DEFAULT_ALGO_OPTIONS);
2021-10-08 21:39:37 +13:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
2021-08-29 23:13:58 +12:00
2022-12-21 05:11:30 +13:00
$queueForEvents->setParam('userId', $user->getId());
2021-08-29 23:13:58 +12:00
$response->dynamic($user, Response::MODEL_USER);
});
App::patch('/v1/users/:userId/email')
2023-08-02 03:26:48 +12:00
->desc('Update email')
2021-08-29 23:13:58 +12:00
->groups(['api', 'users'])
2022-04-04 18:30:07 +12:00
->label('event', 'users.[userId].update.email')
2021-08-29 23:13:58 +12:00
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.update')
2022-08-09 02:32:54 +12:00
->label('audits.resource', 'user/{response.$id}')
2022-08-16 21:00:28 +12:00
->label('audits.userId', '{response.$id}')
2021-08-29 23:13:58 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'updateEmail')
->label('sdk.description', '/docs/references/users/update-user-email.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
->param('userId', '', new UID(), 'User ID.')
->param('email', '', new Email(allowEmpty: true), 'User email.')
2021-08-29 23:13:58 +12:00
->inject('response')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
->action(function (string $userId, string $email, Response $response, Database $dbForProject, Event $queueForEvents) {
2021-08-29 23:13:58 +12:00
$user = $dbForProject->getDocument('users', $userId);
2021-08-29 23:13:58 +12:00
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2021-08-29 23:13:58 +12:00
}
2021-10-08 06:57:23 +13:00
$email = \strtolower($email);
2024-01-20 23:06:30 +13:00
if (\strlen($email) !== 0) {
// Makes sure this email is not already used in another identity
$identityWithMatchingEmail = $dbForProject->findOne('identities', [
Query::equal('providerEmail', [$email]),
Query::notEqual('userId', $user->getId()),
]);
if ($identityWithMatchingEmail !== false && !$identityWithMatchingEmail->isEmpty()) {
throw new Exception(Exception::USER_EMAIL_ALREADY_EXISTS);
}
2024-01-20 23:06:30 +13:00
$target = $dbForProject->findOne('targets', [
Query::equal('identifier', [$email]),
]);
2024-01-20 23:06:30 +13:00
if ($target instanceof Document && !$target->isEmpty()) {
throw new Exception(Exception::USER_TARGET_ALREADY_EXISTS);
}
}
$oldEmail = $user->getAttribute('email');
2022-04-26 22:07:33 +12:00
$user
->setAttribute('email', $email)
->setAttribute('emailVerification', false)
2023-05-31 08:55:33 +12:00
;
try {
2022-04-26 22:07:33 +12:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
/**
* @var Document $oldTarget
*/
$oldTarget = $user->find('identifier', $oldEmail, 'targets');
if ($oldTarget instanceof Document && !$oldTarget->isEmpty()) {
2024-01-20 23:06:30 +13:00
if (\strlen($email) !== 0) {
$dbForProject->updateDocument('targets', $oldTarget->getId(), $oldTarget->setAttribute('identifier', $email));
} else {
$dbForProject->deleteDocument('targets', $oldTarget->getId());
}
2024-01-21 02:07:53 +13:00
} else {
if (\strlen($email) !== 0) {
$target = $dbForProject->createDocument('targets', new Document([
2024-02-16 17:07:16 +13:00
'$permissions' => [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
],
2024-01-21 02:07:53 +13:00
'userId' => $user->getId(),
'userInternalId' => $user->getInternalId(),
'providerType' => 'email',
'identifier' => $email,
]));
$user->setAttribute('targets', [...$user->getAttribute('targets', []), $target]);
}
}
2023-12-15 02:32:06 +13:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2022-05-24 02:54:50 +12:00
} catch (Duplicate $th) {
throw new Exception(Exception::USER_EMAIL_ALREADY_EXISTS);
2021-08-29 23:13:58 +12:00
}
2022-12-21 05:11:30 +13:00
$queueForEvents->setParam('userId', $user->getId());
$response->dynamic($user, Response::MODEL_USER);
});
2022-06-14 00:43:17 +12:00
App::patch('/v1/users/:userId/phone')
2023-08-02 03:26:48 +12:00
->desc('Update phone')
->groups(['api', 'users'])
->label('event', 'users.[userId].update.phone')
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.update')
2022-08-09 02:32:54 +12:00
->label('audits.resource', 'user/{response.$id}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'updatePhone')
->label('sdk.description', '/docs/references/users/update-user-phone.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
->param('userId', '', new UID(), 'User ID.')
->param('number', '', new Phone(allowEmpty: true), 'User phone number.')
->inject('response')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
->action(function (string $userId, string $number, Response $response, Database $dbForProject, Event $queueForEvents) {
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
$oldPhone = $user->getAttribute('phone');
$user
->setAttribute('phone', $number)
->setAttribute('phoneVerification', false)
2022-08-25 21:34:36 +12:00
;
2024-01-20 23:06:30 +13:00
if (\strlen($number) !== 0) {
$target = $dbForProject->findOne('targets', [
Query::equal('identifier', [$number]),
]);
2024-01-20 23:06:30 +13:00
if ($target instanceof Document && !$target->isEmpty()) {
throw new Exception(Exception::USER_TARGET_ALREADY_EXISTS);
}
}
try {
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
/**
* @var Document $oldTarget
*/
$oldTarget = $user->find('identifier', $oldPhone, 'targets');
if ($oldTarget instanceof Document && !$oldTarget->isEmpty()) {
2024-01-20 23:06:30 +13:00
if (\strlen($number) !== 0) {
$dbForProject->updateDocument('targets', $oldTarget->getId(), $oldTarget->setAttribute('identifier', $number));
} else {
$dbForProject->deleteDocument('targets', $oldTarget->getId());
}
2024-01-21 02:07:53 +13:00
} else {
if (\strlen($number) !== 0) {
$target = $dbForProject->createDocument('targets', new Document([
2024-02-16 17:07:16 +13:00
'$permissions' => [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
],
2024-01-21 02:07:53 +13:00
'userId' => $user->getId(),
'userInternalId' => $user->getInternalId(),
'providerType' => 'sms',
'identifier' => $number,
]));
$user->setAttribute('targets', [...$user->getAttribute('targets', []), $target]);
}
}
2023-12-15 02:32:06 +13:00
$dbForProject->purgeCachedDocument('users', $user->getId());
} catch (Duplicate $th) {
throw new Exception(Exception::USER_PHONE_ALREADY_EXISTS);
}
2022-12-21 05:11:30 +13:00
$queueForEvents->setParam('userId', $user->getId());
2021-08-29 23:13:58 +12:00
$response->dynamic($user, Response::MODEL_USER);
});
2022-04-04 18:30:07 +12:00
2022-08-13 02:10:41 +12:00
App::patch('/v1/users/:userId/verification')
2023-08-02 03:26:48 +12:00
->desc('Update email verification')
2020-06-26 06:32:12 +12:00
->groups(['api', 'users'])
2022-08-13 02:10:41 +12:00
->label('event', 'users.[userId].update.verification')
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'verification.update')
2022-08-13 21:59:34 +12:00
->label('audits.resource', 'user/{request.userId}')
2022-08-16 21:00:28 +12:00
->label('audits.userId', '{request.userId}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
2022-08-13 02:10:41 +12:00
->label('sdk.method', 'updateEmailVerification')
->label('sdk.description', '/docs/references/users/update-user-email-verification.md')
2020-11-13 00:54:16 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
->param('userId', '', new UID(), 'User ID.')
2022-08-13 02:10:41 +12:00
->param('emailVerification', false, new Boolean(), 'User email verification status.')
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
->action(function (string $userId, bool $emailVerification, Response $response, Database $dbForProject, Event $queueForEvents) {
$user = $dbForProject->getDocument('users', $userId);
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2020-01-20 09:38:00 +13:00
2022-08-13 02:10:41 +12:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user->setAttribute('emailVerification', $emailVerification));
2019-10-21 19:01:07 +13:00
2022-12-21 05:11:30 +13:00
$queueForEvents->setParam('userId', $user->getId());
2021-08-29 23:13:58 +12:00
$response->dynamic($user, Response::MODEL_USER);
});
2020-06-29 05:31:21 +12:00
App::patch('/v1/users/:userId/prefs')
2023-08-02 03:26:48 +12:00
->desc('Update user preferences')
2020-06-26 06:32:12 +12:00
->groups(['api', 'users'])
2022-04-04 18:30:07 +12:00
->label('event', 'users.[userId].update.prefs')
->label('scope', 'users.write')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'updatePrefs')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/users/update-user-prefs.md')
2020-11-13 00:54:16 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
2021-04-22 01:37:51 +12:00
->label('sdk.response.model', Response::MODEL_PREFERENCES)
->param('userId', '', new UID(), 'User ID.')
2020-09-11 02:40:14 +12:00
->param('prefs', '', new Assoc(), 'Prefs key-value JSON object.')
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
->action(function (string $userId, array $prefs, Response $response, Database $dbForProject, Event $queueForEvents) {
$user = $dbForProject->getDocument('users', $userId);
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2020-01-20 09:38:00 +13:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user->setAttribute('prefs', $prefs));
2019-10-21 19:01:07 +13:00
2022-12-21 05:11:30 +13:00
$queueForEvents
->setParam('userId', $user->getId());
2022-04-04 18:30:07 +12:00
2021-07-26 02:47:18 +12:00
$response->dynamic(new Document($prefs), Response::MODEL_PREFERENCES);
2020-12-27 05:54:42 +13:00
});
2023-11-15 01:44:07 +13:00
App::patch('/v1/users/:userId/targets/:targetId')
->desc('Update User target')
->groups(['api', 'users'])
2023-10-26 06:33:23 +13:00
->label('audits.event', 'target.update')
2023-09-21 06:07:10 +12:00
->label('audits.resource', 'target/{response.$id}')
->label('event', 'users.[userId].targets.[targetId].update')
->label('scope', 'targets.write')
->label('sdk.auth', [APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_ADMIN])
->label('sdk.namespace', 'users')
2023-11-15 01:44:07 +13:00
->label('sdk.method', 'updateTarget')
->label('sdk.description', '/docs/references/users/update-target.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TARGET)
2023-08-24 08:24:25 +12:00
->param('userId', '', new UID(), 'User ID.')
->param('targetId', '', new UID(), 'Target ID.')
2023-11-15 01:44:07 +13:00
->param('identifier', '', new Text(Database::LENGTH_KEY), 'The target identifier (token, email, phone etc.)', true)
->param('providerId', '', new UID(), 'Provider ID. Message will be sent to this target from the specified provider ID. If no provider ID is set the first setup provider will be used.', true)
->param('name', '', new Text(128), 'Target name. Max length: 128 chars. For example: My Awesome App Galaxy S23.', true)
->inject('queueForEvents')
->inject('response')
->inject('dbForProject')
->action(function (string $userId, string $targetId, string $identifier, string $providerId, string $name, Event $queueForEvents, Response $response, Database $dbForProject) {
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
$target = $dbForProject->getDocument('targets', $targetId);
if ($target->isEmpty()) {
throw new Exception(Exception::USER_TARGET_NOT_FOUND);
}
2023-10-07 02:53:46 +13:00
if ($user->getId() !== $target->getAttribute('userId')) {
throw new Exception(Exception::USER_TARGET_NOT_FOUND);
}
2023-11-15 01:44:07 +13:00
if ($identifier) {
$providerType = $target->getAttribute('providerType');
2023-11-21 22:41:09 +13:00
switch ($providerType) {
case 'email':
$validator = new Email();
if (!$validator->isValid($identifier)) {
throw new Exception(Exception::GENERAL_INVALID_EMAIL);
}
break;
2023-11-29 17:05:37 +13:00
case MESSAGE_TYPE_SMS:
2023-11-21 22:41:09 +13:00
$validator = new Phone();
if (!$validator->isValid($identifier)) {
throw new Exception(Exception::GENERAL_INVALID_PHONE);
}
break;
2023-11-29 17:05:37 +13:00
case MESSAGE_TYPE_PUSH:
2023-11-21 22:49:19 +13:00
break;
2023-11-21 22:41:09 +13:00
default:
throw new Exception(Exception::PROVIDER_INCORRECT_TYPE);
}
2023-11-15 01:44:07 +13:00
$target->setAttribute('identifier', $identifier);
}
if ($providerId) {
$provider = $dbForProject->getDocument('providers', $providerId);
if ($provider->isEmpty()) {
throw new Exception(Exception::PROVIDER_NOT_FOUND);
}
if ($provider->getAttribute('type') !== $target->getAttribute('providerType')) {
throw new Exception(Exception::PROVIDER_INCORRECT_TYPE);
}
2023-11-15 01:44:07 +13:00
$target->setAttribute('providerId', $provider->getId());
$target->setAttribute('providerInternalId', $provider->getInternalId());
}
if ($name) {
$target->setAttribute('name', $name);
}
$target = $dbForProject->updateDocument('targets', $target->getId(), $target);
2023-12-15 02:32:06 +13:00
$dbForProject->purgeCachedDocument('users', $user->getId());
$queueForEvents
->setParam('userId', $user->getId())
->setParam('targetId', $target->getId());
$response
2023-10-06 00:27:48 +13:00
->dynamic($target, Response::MODEL_TARGET);
});
2024-01-19 02:56:58 +13:00
App::patch('/v1/users/:userId/mfa')
->desc('Update MFA')
->groups(['api', 'users'])
->label('event', 'users.[userId].update.mfa')
->label('scope', 'users.write')
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
->label('audits.userId', '{response.$id}')
->label('usage.metric', 'users.{scope}.requests.update')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'updateMfa')
->label('sdk.description', '/docs/references/users/update-user-mfa.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
->param('userId', '', new UID(), 'User ID.')
->param('mfa', null, new Boolean(), 'Enable or disable MFA.')
->inject('response')
->inject('dbForProject')
->inject('queueForEvents')
->action(function (string $userId, bool $mfa, Response $response, Database $dbForProject, Event $queueForEvents) {
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
$user->setAttribute('mfa', $mfa);
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
$queueForEvents->setParam('userId', $user->getId());
$response->dynamic($user, Response::MODEL_USER);
});
2024-02-16 00:26:34 +13:00
App::get('/v1/users/:userId/mfa/factors')
->desc('List Factors')
2024-01-19 02:56:58 +13:00
->groups(['api', 'users'])
->label('scope', 'users.read')
->label('usage.metric', 'users.{scope}.requests.read')
2024-02-07 18:08:51 +13:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
2024-01-19 02:56:58 +13:00
->label('sdk.namespace', 'users')
2024-03-02 05:22:51 +13:00
->label('sdk.method', 'listMfaFactors')
->label('sdk.description', '/docs/references/users/list-mfa-factors.md')
2024-01-19 02:56:58 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
2024-02-16 00:26:34 +13:00
->label('sdk.response.model', Response::MODEL_MFA_FACTORS)
2024-01-19 02:56:58 +13:00
->param('userId', '', new UID(), 'User ID.')
->inject('response')
->inject('dbForProject')
->action(function (string $userId, Response $response, Database $dbForProject) {
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
2024-03-01 09:59:49 +13:00
$totp = TOTP::getAuthenticatorFromUser($user);
$factors = new Document([
2024-03-01 15:07:58 +13:00
Type::TOTP => $totp !== null && $totp->getAttribute('verified', false),
Type::EMAIL => $user->getAttribute('email', false) && $user->getAttribute('emailVerification', false),
Type::PHONE => $user->getAttribute('phone', false) && $user->getAttribute('phoneVerification', false)
2024-01-19 02:56:58 +13:00
]);
2024-03-01 09:59:49 +13:00
$response->dynamic($factors, Response::MODEL_MFA_FACTORS);
2024-01-19 02:56:58 +13:00
});
2024-03-04 04:17:38 +13:00
App::get('/v1/users/:userId/mfa/recovery-codes')
->desc('Get MFA Recovery Codes')
->groups(['api', 'users'])
->label('scope', 'users.read')
->label('usage.metric', 'users.{scope}.requests.read')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'getMfaRecoveryCodes')
->label('sdk.description', '/docs/references/users/get-mfa-recovery-codes.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MFA_RECOVERY_CODES)
->param('userId', '', new UID(), 'User ID.')
->inject('response')
->inject('dbForProject')
->action(function (string $userId, Response $response, Database $dbForProject) {
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
$mfaRecoveryCodes = $user->getAttribute('mfaRecoveryCodes', []);
if (empty($mfaRecoveryCodes)) {
throw new Exception(Exception::USER_RECOVERY_CODES_NOT_FOUND);
}
$document = new Document([
'recoveryCodes' => $mfaRecoveryCodes
]);
$response->dynamic($document, Response::MODEL_MFA_RECOVERY_CODES);
});
2024-03-04 07:11:55 +13:00
App::patch('/v1/users/:userId/mfa/recovery-codes')
2024-03-04 04:17:38 +13:00
->desc('Create MFA Recovery Codes')
->groups(['api', 'users'])
->label('event', 'users.[userId].create.mfa.recovery-codes')
->label('scope', 'users.write')
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
->label('audits.userId', '{response.$id}')
->label('usage.metric', 'users.{scope}.requests.update')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'createMfaRecoveryCodes')
->label('sdk.description', '/docs/references/users/create-mfa-recovery-codes.md')
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MFA_RECOVERY_CODES)
->param('userId', '', new UID(), 'User ID.')
->inject('response')
->inject('dbForProject')
->inject('queueForEvents')
2024-03-04 07:11:55 +13:00
->action(function (string $userId, Response $response, Database $dbForProject, Event $queueForEvents) {
2024-03-04 04:17:38 +13:00
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
$mfaRecoveryCodes = $user->getAttribute('mfaRecoveryCodes', []);
if (!empty($mfaRecoveryCodes)) {
throw new Exception(Exception::USER_RECOVERY_CODES_ALREADY_EXISTS);
}
$mfaRecoveryCodes = Type::generateBackupCodes();
$user->setAttribute('mfaRecoveryCodes', $mfaRecoveryCodes);
$dbForProject->updateDocument('users', $user->getId(), $user);
$queueForEvents->setParam('userId', $user->getId());
$document = new Document([
'recoveryCodes' => $mfaRecoveryCodes
]);
$response->dynamic($document, Response::MODEL_MFA_RECOVERY_CODES);
});
App::put('/v1/users/:userId/mfa/recovery-codes')
->desc('Regenerate MFA Recovery Codes')
->groups(['api', 'users'])
->label('event', 'users.[userId].update.mfa.recovery-codes')
->label('scope', 'users.write')
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
->label('audits.userId', '{response.$id}')
->label('usage.metric', 'users.{scope}.requests.update')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'updateMfaRecoveryCodes')
->label('sdk.description', '/docs/references/users/update-mfa-recovery-codes.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MFA_RECOVERY_CODES)
->param('userId', '', new UID(), 'User ID.')
->inject('response')
->inject('dbForProject')
->inject('queueForEvents')
2024-03-04 07:11:55 +13:00
->action(function (string $userId, Response $response, Database $dbForProject, Event $queueForEvents) {
2024-03-04 04:17:38 +13:00
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
$mfaRecoveryCodes = $user->getAttribute('mfaRecoveryCodes', []);
if (empty($mfaRecoveryCodes)) {
throw new Exception(Exception::USER_RECOVERY_CODES_NOT_FOUND);
}
$mfaRecoveryCodes = Type::generateBackupCodes();
$user->setAttribute('mfaRecoveryCodes', $mfaRecoveryCodes);
$dbForProject->updateDocument('users', $user->getId(), $user);
$queueForEvents->setParam('userId', $user->getId());
$document = new Document([
2024-03-04 21:50:50 +13:00
'recoveryCodes' => $mfaRecoveryCodes
2024-03-04 04:17:38 +13:00
]);
$response->dynamic($document, Response::MODEL_MFA_RECOVERY_CODES);
});
2024-03-02 05:22:51 +13:00
App::delete('/v1/users/:userId/mfa/authenticators/:type')
2024-01-19 02:56:58 +13:00
->desc('Delete Authenticator')
->groups(['api', 'users'])
->label('event', 'users.[userId].delete.mfa')
->label('scope', 'users.write')
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
->label('audits.userId', '{response.$id}')
->label('usage.metric', 'users.{scope}.requests.update')
2024-02-07 18:08:51 +13:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
2024-01-19 02:56:58 +13:00
->label('sdk.namespace', 'users')
2024-03-02 05:22:51 +13:00
->label('sdk.method', 'deleteMfaAuthenticator')
->label('sdk.description', '/docs/references/users/delete-mfa-authenticator.md')
2024-01-19 02:56:58 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USER)
->param('userId', '', new UID(), 'User ID.')
2024-03-01 15:07:58 +13:00
->param('type', null, new WhiteList([Type::TOTP]), 'Type of authenticator.')
2024-01-19 02:56:58 +13:00
->inject('response')
->inject('dbForProject')
->inject('queueForEvents')
2024-03-01 09:59:49 +13:00
->action(function (string $userId, string $type, Response $response, Database $dbForProject, Event $queueForEvents) {
2024-01-19 02:56:58 +13:00
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
2024-03-01 09:59:49 +13:00
$authenticator = TOTP::getAuthenticatorFromUser($user);
if ($authenticator === null) {
2024-03-02 06:04:09 +13:00
throw new Exception(Exception::USER_AUTHENTICATOR_NOT_FOUND);
2024-02-25 23:21:56 +13:00
}
2024-01-19 02:56:58 +13:00
2024-03-01 09:59:49 +13:00
$dbForProject->deleteDocument('authenticators', $authenticator->getId());
$dbForProject->purgeCachedDocument('users', $user->getId());
2024-01-19 02:56:58 +13:00
$queueForEvents->setParam('userId', $user->getId());
$response->noContent();
});
2024-01-10 08:04:47 +13:00
App::post('/v1/users/:userId/sessions')
2023-12-12 05:24:24 +13:00
->desc('Create session')
->groups(['api', 'users'])
2024-01-17 00:13:42 +13:00
->label('event', 'users.[userId].sessions.[sessionId].create')
2023-12-12 05:24:24 +13:00
->label('scope', 'users.write')
->label('audits.event', 'session.create')
->label('audits.resource', 'user/{request.userId}')
->label('usage.metric', 'sessions.{scope}.requests.create')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'createSession')
2024-01-13 06:10:23 +13:00
->label('sdk.description', '/docs/references/users/create-session.md')
2023-12-12 05:24:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_SESSION)
2024-01-13 06:26:01 +13:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
2023-12-12 05:24:24 +13:00
->inject('request')
->inject('response')
->inject('dbForProject')
->inject('project')
->inject('locale')
->inject('geodb')
->inject('queueForEvents')
->action(function (string $userId, Request $request, Response $response, Database $dbForProject, Document $project, Locale $locale, Reader $geodb, Event $queueForEvents) {
$user = $dbForProject->getDocument('users', $userId);
2024-02-21 22:48:16 +13:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2023-12-12 05:24:24 +13:00
}
$secret = Auth::codeGenerator();
$detector = new Detector($request->getUserAgent('UNKNOWN'));
$record = $geodb->get($request->getIP());
$duration = $project->getAttribute('auths', [])['duration'] ?? Auth::TOKEN_EXPIRATION_LOGIN_LONG;
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), $duration));
$session = new Document(array_merge(
[
'$id' => ID::unique(),
'userId' => $user->getId(),
'userInternalId' => $user->getInternalId(),
'provider' => Auth::SESSION_PROVIDER_SERVER,
'secret' => Auth::hash($secret), // One way hash encryption to protect DB leak
'userAgent' => $request->getUserAgent('UNKNOWN'),
'ip' => $request->getIP(),
'countryCode' => ($record) ? \strtolower($record['country']['iso_code']) : '--',
],
$detector->getOS(),
$detector->getClient(),
$detector->getDevice()
));
$countryName = $locale->getText('countries.' . strtolower($session->getAttribute('countryCode')), $locale->getText('locale.country.unknown'));
$session = $dbForProject->createDocument('sessions', $session);
$session
->setAttribute('secret', $secret)
->setAttribute('expire', $expire)
->setAttribute('countryName', $countryName);
$queueForEvents
->setParam('userId', $user->getId())
->setParam('sessionId', $session->getId())
->setPayload($response->output($session, Response::MODEL_SESSION));
return $response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($session, Response::MODEL_SESSION);
});
2023-12-01 00:35:52 +13:00
App::post('/v1/users/:userId/tokens')
->desc('Create token')
2023-09-29 01:45:52 +13:00
->groups(['api', 'users'])
2024-01-16 23:40:49 +13:00
->label('event', 'users.[userId].tokens.[tokenId].create')
2023-09-29 01:45:52 +13:00
->label('scope', 'users.write')
2023-10-05 23:18:19 +13:00
->label('audits.event', 'tokens.create')
2023-09-29 01:45:52 +13:00
->label('audits.resource', 'user/{request.userId}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
2023-12-01 00:35:52 +13:00
->label('sdk.method', 'createToken')
->label('sdk.description', '/docs/references/users/create-token.md')
2023-09-29 01:45:52 +13:00
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TOKEN)
->param('userId', '', new UID(), 'User ID.')
->param('length', 6, new Range(4, 128), 'Token length in characters. The default length is 6 characters', true)
->param('expire', Auth::TOKEN_EXPIRATION_GENERIC, new Range(60, Auth::TOKEN_EXPIRATION_LOGIN_LONG), 'Token expiration period in seconds. The default expiration is 15 minutes.', true)
2023-12-12 05:24:24 +13:00
->inject('request')
2023-09-29 01:45:52 +13:00
->inject('response')
->inject('dbForProject')
2023-10-23 23:32:09 +13:00
->inject('queueForEvents')
->action(function (string $userId, int $length, int $expire, Request $request, Response $response, Database $dbForProject, Event $queueForEvents) {
2023-10-12 01:20:25 +13:00
$user = $dbForProject->getDocument('users', $userId);
2023-09-29 01:45:52 +13:00
2024-02-21 22:48:16 +13:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2023-09-29 01:45:52 +13:00
}
2023-12-12 05:24:24 +13:00
$secret = Auth::tokenGenerator($length);
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), $expire));
2023-09-29 01:45:52 +13:00
$token = new Document([
'$id' => ID::unique(),
'userId' => $user->getId(),
'userInternalId' => $user->getInternalId(),
2023-12-12 05:24:24 +13:00
'type' => Auth::TOKEN_TYPE_GENERIC,
2023-12-12 08:41:58 +13:00
'secret' => Auth::hash($secret),
2023-09-29 01:45:52 +13:00
'expire' => $expire,
2023-12-12 08:41:58 +13:00
'userAgent' => $request->getUserAgent('UNKNOWN'),
2023-12-12 05:24:24 +13:00
'ip' => $request->getIP()
2023-09-29 01:45:52 +13:00
]);
$token = $dbForProject->createDocument('tokens', $token);
2024-01-26 05:53:51 +13:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2023-10-10 02:49:07 +13:00
$token->setAttribute('secret', $secret);
2023-09-29 01:45:52 +13:00
2023-10-23 23:32:09 +13:00
$queueForEvents
2023-10-05 23:18:19 +13:00
->setParam('userId', $user->getId())
->setParam('tokenId', $token->getId())
->setPayload($response->output($token, Response::MODEL_TOKEN));
2023-09-29 01:45:52 +13:00
return $response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($token, Response::MODEL_TOKEN);
});
2020-06-29 05:31:21 +12:00
App::delete('/v1/users/:userId/sessions/:sessionId')
2023-08-02 03:26:48 +12:00
->desc('Delete user session')
2020-06-26 06:32:12 +12:00
->groups(['api', 'users'])
2022-04-04 18:30:07 +12:00
->label('event', 'users.[userId].sessions.[sessionId].delete')
2019-05-09 18:54:39 +12:00
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'session.delete')
2022-08-13 21:59:34 +12:00
->label('audits.resource', 'user/{request.userId}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'users')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'deleteSession')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/users/delete-user-session.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_NOCONTENT)
->label('sdk.response.model', Response::MODEL_NONE)
->param('userId', '', new UID(), 'User ID.')
2022-09-19 22:05:42 +12:00
->param('sessionId', '', new UID(), 'Session ID.')
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
->action(function (string $userId, string $sessionId, Response $response, Database $dbForProject, Event $queueForEvents) {
2019-05-09 18:54:39 +12:00
$user = $dbForProject->getDocument('users', $userId);
2019-05-09 18:54:39 +12:00
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2022-04-04 21:59:32 +12:00
$session = $dbForProject->getDocument('sessions', $sessionId);
2021-02-20 02:59:36 +13:00
2022-05-24 02:54:50 +12:00
if ($session->isEmpty()) {
throw new Exception(Exception::USER_SESSION_NOT_FOUND);
2019-05-09 18:54:39 +12:00
}
2022-04-04 21:59:32 +12:00
$dbForProject->deleteDocument('sessions', $session->getId());
2023-12-15 02:32:06 +13:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2022-04-26 22:36:49 +12:00
2022-12-21 05:11:30 +13:00
$queueForEvents
2022-04-04 18:30:07 +12:00
->setParam('userId', $user->getId())
->setParam('sessionId', $sessionId)
->setPayload($response->output($session, Response::MODEL_SESSION));
2022-04-04 18:30:07 +12:00
2020-10-31 08:53:27 +13:00
$response->noContent();
2020-12-27 05:54:42 +13:00
});
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::delete('/v1/users/:userId/sessions')
2023-08-02 03:26:48 +12:00
->desc('Delete user sessions')
2020-06-26 06:32:12 +12:00
->groups(['api', 'users'])
2023-11-07 04:06:56 +13:00
->label('event', 'users.[userId].sessions.delete')
2019-05-09 18:54:39 +12:00
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'session.delete')
2022-08-13 21:59:34 +12:00
->label('audits.resource', 'user/{user.$id}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'users')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'deleteSessions')
2019-10-09 21:31:51 +13:00
->label('sdk.description', '/docs/references/users/delete-user-sessions.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_NOCONTENT)
->label('sdk.response.model', Response::MODEL_NONE)
->param('userId', '', new UID(), 'User ID.')
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
->action(function (string $userId, Response $response, Database $dbForProject, Event $queueForEvents) {
2019-05-09 18:54:39 +12:00
$user = $dbForProject->getDocument('users', $userId);
2019-05-09 18:54:39 +12:00
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2021-07-17 22:04:43 +12:00
$sessions = $user->getAttribute('sessions', []);
foreach ($sessions as $key => $session) {
/** @var Document $session */
$dbForProject->deleteDocument('sessions', $session->getId());
//TODO: fix this
2021-07-17 22:04:43 +12:00
}
2023-12-15 02:32:06 +13:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2019-05-09 18:54:39 +12:00
2022-12-21 05:11:30 +13:00
$queueForEvents
2022-04-04 18:30:07 +12:00
->setParam('userId', $user->getId())
->setPayload($response->output($user, Response::MODEL_USER));
2022-04-04 18:30:07 +12:00
2020-10-31 08:53:27 +13:00
$response->noContent();
2020-12-27 05:54:42 +13:00
});
App::delete('/v1/users/:userId')
2023-08-02 03:26:48 +12:00
->desc('Delete user')
->groups(['api', 'users'])
2022-04-04 18:30:07 +12:00
->label('event', 'users.[userId].delete')
->label('scope', 'users.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'user.delete')
2022-08-13 21:59:34 +12:00
->label('audits.resource', 'user/{request.userId}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
2021-04-13 23:01:33 +12:00
->label('sdk.method', 'delete')
->label('sdk.description', '/docs/references/users/delete.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_NOCONTENT)
->label('sdk.response.model', Response::MODEL_NONE)
2022-06-01 02:24:01 +12:00
->param('userId', '', new UID(), 'User ID.')
2020-12-27 05:54:42 +13:00
->inject('response')
->inject('dbForProject')
2022-12-21 05:11:30 +13:00
->inject('queueForEvents')
->inject('queueForDeletes')
->action(function (string $userId, Response $response, Database $dbForProject, Event $queueForEvents, Delete $queueForDeletes) {
2022-04-04 18:30:07 +12:00
$user = $dbForProject->getDocument('users', $userId);
2022-05-16 21:58:17 +12:00
if ($user->isEmpty()) {
2022-08-16 18:59:03 +12:00
throw new Exception(Exception::USER_NOT_FOUND);
}
// clone user object to send to workers
$clone = clone $user;
2022-05-16 21:58:17 +12:00
$dbForProject->deleteDocument('users', $userId);
2022-12-21 05:11:30 +13:00
$queueForDeletes
2022-04-18 08:34:32 +12:00
->setType(DELETE_TYPE_DOCUMENT)
->setDocument($clone);
2020-10-31 08:53:27 +13:00
2022-12-21 05:11:30 +13:00
$queueForEvents
2022-04-04 18:30:07 +12:00
->setParam('userId', $user->getId())
->setPayload($response->output($clone, Response::MODEL_USER));
$response->noContent();
2020-12-27 05:54:42 +13:00
});
App::delete('/v1/users/:userId/targets/:targetId')
->desc('Delete user target')
->groups(['api', 'users'])
2023-10-26 06:33:23 +13:00
->label('audits.event', 'target.delete')
2023-09-21 06:07:10 +12:00
->label('audits.resource', 'target/{request.$targetId}')
->label('event', 'users.[userId].targets.[targetId].delete')
->label('scope', 'targets.write')
->label('sdk.auth', [APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_ADMIN])
->label('sdk.namespace', 'users')
->label('sdk.method', 'deleteTarget')
->label('sdk.description', '/docs/references/users/delete-target.md')
2023-08-24 08:24:25 +12:00
->label('sdk.response.code', Response::STATUS_CODE_NOCONTENT)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_NONE)
2023-08-24 08:24:25 +12:00
->param('userId', '', new UID(), 'User ID.')
->param('targetId', '', new UID(), 'Target ID.')
->inject('queueForEvents')
->inject('queueForDeletes')
->inject('response')
->inject('dbForProject')
->action(function (string $userId, string $targetId, Event $queueForEvents, Delete $queueForDeletes, Response $response, Database $dbForProject) {
$user = $dbForProject->getDocument('users', $userId);
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
$target = $dbForProject->getDocument('targets', $targetId);
if ($target->isEmpty()) {
throw new Exception(Exception::USER_TARGET_NOT_FOUND);
2023-10-07 02:53:46 +13:00
}
if ($user->getId() !== $target->getAttribute('userId')) {
throw new Exception(Exception::USER_TARGET_NOT_FOUND);
}
$dbForProject->deleteDocument('targets', $target->getId());
2023-12-15 02:32:06 +13:00
$dbForProject->purgeCachedDocument('users', $user->getId());
$queueForDeletes
->setType(DELETE_TYPE_TARGET)
->setDocument($target);
$queueForEvents
->setParam('userId', $user->getId())
->setParam('targetId', $target->getId());
$response->noContent();
});
App::delete('/v1/users/identities/:identityId')
->desc('Delete identity')
->groups(['api', 'users'])
->label('event', 'users.[userId].identities.[identityId].delete')
->label('scope', 'users.write')
->label('audits.event', 'identity.delete')
->label('audits.resource', 'identity/{request.$identityId}')
->label('sdk.auth', [APP_AUTH_TYPE_KEY])
->label('sdk.namespace', 'users')
->label('sdk.method', 'deleteIdentity')
->label('sdk.description', '/docs/references/users/delete-identity.md')
->label('sdk.response.code', Response::STATUS_CODE_NOCONTENT)
->label('sdk.response.model', Response::MODEL_NONE)
->param('identityId', '', new UID(), 'Identity ID.')
->inject('response')
->inject('dbForProject')
->inject('queueForEvents')
->action(function (string $identityId, Response $response, Database $dbForProject, Event $queueForEvents) {
$identity = $dbForProject->getDocument('identities', $identityId);
if ($identity->isEmpty()) {
throw new Exception(Exception::USER_IDENTITY_NOT_FOUND);
}
$dbForProject->deleteDocument('identities', $identityId);
$queueForEvents
->setParam('userId', $identity->getAttribute('userId'))
->setParam('identityId', $identity->getId())
->setPayload($response->output($identity, Response::MODEL_IDENTITY));
return $response->noContent();
});
App::get('/v1/users/usage')
2024-02-26 15:44:20 +13:00
->desc('Get users usage stats')
2023-10-25 20:39:59 +13:00
->groups(['api', 'users'])
->label('scope', 'users.read')
->label('sdk.auth', [APP_AUTH_TYPE_ADMIN])
->label('sdk.namespace', 'users')
->label('sdk.method', 'getUsage')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_USAGE_USERS)
2023-11-08 22:09:32 +13:00
->param('range', '30d', new WhiteList(['24h', '30d', '90d'], true), 'Date range.', true)
->inject('response')
->inject('dbForProject')
->inject('register')
2023-10-25 20:39:59 +13:00
->action(function (string $range, Response $response, Database $dbForProject) {
$periods = Config::getParam('usage', []);
$stats = $usage = [];
$days = $periods[$range];
$metrics = [
METRIC_USERS,
METRIC_SESSIONS,
];
2023-11-08 22:09:32 +13:00
Authorization::skip(function () use ($dbForProject, $days, $metrics, &$stats) {
foreach ($metrics as $count => $metric) {
$result = $dbForProject->findOne('stats_v2', [
Query::equal('metric', [$metric]),
Query::equal('period', ['inf'])
]);
2023-11-08 22:09:32 +13:00
$stats[$metric]['total'] = $result['value'] ?? 0;
2023-10-25 20:39:59 +13:00
$limit = $days['limit'];
$period = $days['period'];
$results = $dbForProject->find('stats_v2', [
2023-10-25 20:39:59 +13:00
Query::equal('metric', [$metric]),
2023-10-26 01:06:54 +13:00
Query::equal('period', [$period]),
2023-10-25 20:39:59 +13:00
Query::limit($limit),
Query::orderDesc('time'),
]);
2023-11-08 22:09:32 +13:00
$stats[$metric]['data'] = [];
2023-10-25 20:39:59 +13:00
foreach ($results as $result) {
2023-11-08 22:09:32 +13:00
$stats[$metric]['data'][$result->getAttribute('time')] = [
'value' => $result->getAttribute('value'),
2023-10-25 20:39:59 +13:00
];
2022-05-24 02:54:50 +12:00
}
2023-10-25 20:39:59 +13:00
}
});
$format = match ($days['period']) {
'1h' => 'Y-m-d\TH:00:00.000P',
'1d' => 'Y-m-d\T00:00:00.000P',
};
foreach ($metrics as $metric) {
2023-11-08 22:09:32 +13:00
$usage[$metric]['total'] = $stats[$metric]['total'];
$usage[$metric]['data'] = [];
2023-10-25 20:39:59 +13:00
$leap = time() - ($days['limit'] * $days['factor']);
while ($leap < time()) {
$leap += $days['factor'];
$formatDate = date($format, $leap);
2023-11-08 22:09:32 +13:00
$usage[$metric]['data'][] = [
'value' => $stats[$metric]['data'][$formatDate]['value'] ?? 0,
2023-10-25 20:39:59 +13:00
'date' => $formatDate,
];
}
2023-10-25 20:39:59 +13:00
}
2023-10-25 20:39:59 +13:00
$response->dynamic(new Document([
'range' => $range,
2023-11-08 22:09:32 +13:00
'usersTotal' => $usage[$metrics[0]]['total'],
'sessionsTotal' => $usage[$metrics[1]]['total'],
'users' => $usage[$metrics[0]]['data'],
'sessions' => $usage[$metrics[1]]['data'],
2023-10-25 20:39:59 +13:00
]), Response::MODEL_USAGE_USERS);
2022-05-24 02:54:50 +12:00
});