1
0
Fork 0
mirror of synced 2024-05-19 20:22:33 +12:00
appwrite/app/controllers/api/teams.php

941 lines
42 KiB
PHP
Raw Normal View History

2019-05-09 18:54:39 +12:00
<?php
2021-05-07 10:31:05 +12:00
use Appwrite\Auth\Auth;
use Appwrite\Detector\Detector;
use Appwrite\Event\Delete;
2022-05-03 23:57:26 +12:00
use Appwrite\Event\Event;
use Appwrite\Event\Mail;
2022-05-03 23:57:26 +12:00
use Appwrite\Extend\Exception;
2021-05-07 10:31:05 +12:00
use Appwrite\Network\Validator\Email;
use Appwrite\Network\Validator\Host;
2022-01-19 00:05:04 +13:00
use Appwrite\Template\Template;
use Appwrite\Utopia\Database\Validator\CustomId;
2022-08-24 00:50:52 +12:00
use Appwrite\Utopia\Database\Validator\Queries;
2022-08-25 06:25:15 +12:00
use Appwrite\Utopia\Database\Validator\Queries\Memberships;
2022-08-23 20:56:28 +12:00
use Appwrite\Utopia\Database\Validator\Queries\Teams;
2022-08-24 00:50:52 +12:00
use Appwrite\Utopia\Database\Validator\Query\Limit;
use Appwrite\Utopia\Database\Validator\Query\Offset;
2022-05-03 23:57:26 +12:00
use Appwrite\Utopia\Request;
2022-01-19 00:05:04 +13:00
use Appwrite\Utopia\Response;
2022-05-03 23:57:26 +12:00
use MaxMind\Db\Reader;
2020-06-29 05:31:21 +12:00
use Utopia\App;
2022-04-22 02:07:08 +12:00
use Utopia\Audit\Audit;
2022-07-15 01:12:44 +12:00
use Utopia\CLI\Console;
2020-03-29 01:42:16 +13:00
use Utopia\Config\Config;
use Utopia\Database\Database;
2021-05-07 10:31:05 +12:00
use Utopia\Database\Document;
use Utopia\Database\Exception\Authorization as AuthorizationException;
2021-05-07 10:31:05 +12:00
use Utopia\Database\Exception\Duplicate;
2022-08-14 22:33:36 +12:00
use Utopia\Database\ID;
2022-08-14 17:21:11 +12:00
use Utopia\Database\Permission;
2021-05-07 10:31:05 +12:00
use Utopia\Database\Query;
use Utopia\Database\DateTime;
2022-08-14 17:21:11 +12:00
use Utopia\Database\Role;
2021-05-07 10:31:05 +12:00
use Utopia\Database\Validator\Authorization;
use Utopia\Database\Validator\Key;
2021-07-26 02:47:18 +12:00
use Utopia\Database\Validator\UID;
2022-05-04 21:51:48 +12:00
use Utopia\Locale\Locale;
2022-01-19 00:05:04 +13:00
use Utopia\Validator\Text;
use Utopia\Validator\Range;
use Utopia\Validator\ArrayList;
use Utopia\Validator\WhiteList;
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::post('/v1/teams')
2019-05-09 18:54:39 +12:00
->desc('Create Team')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].create')
2019-05-09 18:54:39 +12:00
->label('scope', 'teams.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'team.create')
2022-08-09 02:32:54 +12:00
->label('audits.resource', 'team/{response.$id}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'create')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/create-team.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TEAM)
2022-10-04 09:22:28 +13:00
->param('teamId', '', new CustomId(), 'Team ID. Choose your own unique ID or pass the string `ID.unique()` to auto generate it. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
2020-09-11 02:40:14 +12:00
->param('name', null, new Text(128), 'Team name. Max length: 128 chars.')
2022-05-01 19:54:58 +12:00
->param('roles', ['owner'], new ArrayList(new Key(), APP_LIMIT_ARRAY_PARAMS_SIZE), 'Array of strings. Use this param to set the roles in the team for the user who created it. The default role is **owner**. A role can be any string. Learn more about [roles and permissions](/docs/permissions). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' roles are allowed, each 32 characters long.', true)
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('user')
->inject('dbForProject')
->inject('events')
2022-08-09 02:32:54 +12:00
->action(function (string $teamId, string $name, array $roles, Response $response, Document $user, Database $dbForProject, Event $events) {
2020-06-30 23:09:28 +12:00
$isPrivilegedUser = Auth::isPrivilegedUser(Authorization::getRoles());
$isAppUser = Auth::isAppUser(Authorization::getRoles());
2022-08-15 02:22:38 +12:00
$teamId = $teamId == 'unique()' ? ID::unique() : $teamId;
$team = Authorization::skip(fn() => $dbForProject->createDocument('teams', new Document([
2022-08-15 02:22:38 +12:00
'$id' => $teamId,
'$permissions' => [
2022-08-15 23:24:31 +12:00
Permission::read(Role::team($teamId)),
2022-08-24 20:26:47 +12:00
Permission::update(Role::team($teamId, 'owner')),
Permission::delete(Role::team($teamId, 'owner')),
],
2020-06-30 23:09:28 +12:00
'name' => $name,
2022-02-27 22:57:09 +13:00
'total' => ($isPrivilegedUser || $isAppUser) ? 0 : 1,
'search' => implode(' ', [$teamId, $name]),
])));
2020-06-30 23:09:28 +12:00
2021-03-02 10:04:53 +13:00
if (!$isPrivilegedUser && !$isAppUser) { // Don't add user on server mode
2022-08-28 11:01:46 +12:00
if (!\in_array('owner', $roles)) {
$roles[] = 'owner';
}
2022-08-15 02:22:38 +12:00
$membershipId = ID::unique();
2020-06-30 23:09:28 +12:00
$membership = new Document([
2022-08-15 02:22:38 +12:00
'$id' => $membershipId,
'$permissions' => [
2022-08-15 23:24:31 +12:00
Permission::read(Role::user($user->getId())),
Permission::read(Role::team($team->getId())),
Permission::update(Role::user($user->getId())),
Permission::update(Role::team($team->getId(), 'owner')),
Permission::delete(Role::user($user->getId())),
Permission::delete(Role::team($team->getId(), 'owner')),
],
2022-08-15 23:24:31 +12:00
'userId' => $user->getId(),
'userInternalId' => $user->getInternalId(),
2022-08-15 23:24:31 +12:00
'teamId' => $team->getId(),
'teamInternalId' => $team->getInternalId(),
2020-06-30 23:09:28 +12:00
'roles' => $roles,
2022-07-14 02:02:49 +12:00
'invited' => DateTime::now(),
'joined' => DateTime::now(),
2020-06-30 23:09:28 +12:00
'confirm' => true,
'secret' => '',
2022-02-17 05:26:19 +13:00
'search' => implode(' ', [$membershipId, $user->getId()])
2019-05-09 18:54:39 +12:00
]);
$membership = $dbForProject->createDocument('memberships', $membership);
2022-04-28 00:44:47 +12:00
$dbForProject->deleteCachedDocument('users', $user->getId());
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
$events->setParam('teamId', $team->getId());
if (!empty($user->getId())) {
$events->setParam('userId', $user->getId());
}
2022-09-07 23:11:10 +12:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($team, Response::MODEL_TEAM);
2020-12-27 05:48:43 +13:00
});
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::get('/v1/teams')
2020-02-01 11:34:07 +13:00
->desc('List Teams')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
2020-02-01 11:34:07 +13:00
->label('scope', 'teams.read')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2020-02-01 11:34:07 +13:00
->label('sdk.namespace', 'teams')
->label('sdk.method', 'list')
->label('sdk.description', '/docs/references/teams/list-teams.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TEAM_LIST)
2022-08-23 20:56:28 +12:00
->param('queries', [], new Teams(), 'Array of query strings generated using the Query class provided by the SDK. [Learn more about queries](https://appwrite.io/docs/databases#querying-documents). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' queries are allowed, each ' . APP_LIMIT_ARRAY_ELEMENT_SIZE . ' characters long. You may filter on the following attributes: ' . implode(', ', Teams::ALLOWED_ATTRIBUTES), true)
2020-09-11 02:40:14 +12:00
->param('search', '', new Text(256), 'Search term to filter your list results. Max length: 256 chars.', true)
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
2022-08-23 20:56:28 +12:00
->action(function (array $queries, string $search, Response $response, Database $dbForProject) {
2021-05-07 10:31:05 +12:00
2022-08-23 20:56:28 +12:00
$queries = Query::parseQueries($queries);
2021-08-07 00:36:35 +12:00
2022-08-12 11:53:52 +12:00
if (!empty($search)) {
2022-08-23 20:56:28 +12:00
$queries[] = Query::search('search', $search);
2021-08-07 00:36:35 +12:00
}
2022-08-23 20:56:28 +12:00
// Get cursor document if there was a cursor query
$cursor = Query::getByType($queries, Query::TYPE_CURSORAFTER, Query::TYPE_CURSORBEFORE);
$cursor = reset($cursor);
2022-08-30 23:55:23 +12:00
if ($cursor) {
2022-08-23 20:56:28 +12:00
/** @var Query $cursor */
$teamId = $cursor->getValue();
$cursorDocument = $dbForProject->getDocument('teams', $teamId);
2021-08-19 01:42:03 +12:00
2022-08-12 11:53:52 +12:00
if ($cursorDocument->isEmpty()) {
2022-08-23 20:56:28 +12:00
throw new Exception(Exception::GENERAL_CURSOR_NOT_FOUND, "Team '{$teamId}' for the 'cursor' value not found.");
2022-08-12 11:53:52 +12:00
}
2022-08-23 20:56:28 +12:00
$cursor->setValue($cursorDocument);
2021-08-19 01:42:03 +12:00
}
2022-08-23 20:56:28 +12:00
$filterQueries = Query::groupByType($queries)['filters'];
$results = $dbForProject->find('teams', $queries);
2022-08-12 11:53:52 +12:00
$total = $dbForProject->count('teams', $filterQueries, APP_LIMIT_COUNT);
2020-06-30 23:09:28 +12:00
2021-07-26 02:47:18 +12:00
$response->dynamic(new Document([
2021-05-27 22:09:14 +12:00
'teams' => $results,
2022-02-27 22:57:09 +13:00
'total' => $total,
2020-08-07 02:49:29 +12:00
]), Response::MODEL_TEAM_LIST);
2020-12-27 05:48:43 +13:00
});
2020-02-01 11:34:07 +13:00
2020-06-29 05:31:21 +12:00
App::get('/v1/teams/:teamId')
2020-02-01 11:34:07 +13:00
->desc('Get Team')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
2020-02-01 11:34:07 +13:00
->label('scope', 'teams.read')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2020-02-01 11:34:07 +13:00
->label('sdk.namespace', 'teams')
->label('sdk.method', 'get')
->label('sdk.description', '/docs/references/teams/get-team.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TEAM)
->param('teamId', '', new UID(), 'Team ID.')
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
2022-05-04 01:21:25 +12:00
->action(function (string $teamId, Response $response, Database $dbForProject) {
2020-02-01 11:34:07 +13:00
$team = $dbForProject->getDocument('teams', $teamId);
2020-02-01 11:34:07 +13:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception(Exception::TEAM_NOT_FOUND);
2020-02-01 11:34:07 +13:00
}
2020-06-30 23:09:28 +12:00
2021-07-26 02:47:18 +12:00
$response->dynamic($team, Response::MODEL_TEAM);
2020-12-27 05:48:43 +13:00
});
2020-02-01 11:34:07 +13:00
2020-06-29 05:31:21 +12:00
App::put('/v1/teams/:teamId')
2019-05-09 18:54:39 +12:00
->desc('Update Team')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].update')
2019-05-09 18:54:39 +12:00
->label('scope', 'teams.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'team.update')
2022-08-09 02:32:54 +12:00
->label('audits.resource', 'team/{response.$id}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'update')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/update-team.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TEAM)
->param('teamId', '', new UID(), 'Team ID.')
2021-12-11 04:44:54 +13:00
->param('name', null, new Text(128), 'New team name. Max length: 128 chars.')
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
->inject('events')
2022-08-09 02:32:54 +12:00
->action(function (string $teamId, string $name, Response $response, Database $dbForProject, Event $events) {
2019-05-09 18:54:39 +12:00
$team = $dbForProject->getDocument('teams', $teamId);
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception(Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2022-05-24 02:54:50 +12:00
$team = $dbForProject->updateDocument('teams', $team->getId(), $team
->setAttribute('name', $name)
2022-05-24 02:54:50 +12:00
->setAttribute('search', implode(' ', [$teamId, $name])));
2019-05-09 18:54:39 +12:00
$events->setParam('teamId', $team->getId());
2021-07-26 02:47:18 +12:00
$response->dynamic($team, Response::MODEL_TEAM);
2020-12-27 05:48:43 +13:00
});
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::delete('/v1/teams/:teamId')
2019-05-09 18:54:39 +12:00
->desc('Delete Team')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].delete')
2019-05-09 18:54:39 +12:00
->label('scope', 'teams.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'team.delete')
2022-08-12 01:19:05 +12:00
->label('audits.resource', 'team/{request.teamId}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'delete')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/delete-team.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_NOCONTENT)
->label('sdk.response.model', Response::MODEL_NONE)
->param('teamId', '', new UID(), 'Team ID.')
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
2020-12-27 05:48:43 +13:00
->inject('events')
->inject('deletes')
2022-08-13 01:21:32 +12:00
->action(function (string $teamId, Response $response, Database $dbForProject, Event $events, Delete $deletes) {
2019-05-09 18:54:39 +12:00
$team = $dbForProject->getDocument('teams', $teamId);
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception(Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
$memberships = $dbForProject->find('memberships', [
2022-08-12 11:53:52 +12:00
Query::equal('teamId', [$teamId]),
Query::limit(2000), // TODO fix members limit
]);
2021-05-07 10:31:05 +12:00
// TODO delete all members individually from the user object
2021-05-10 06:37:47 +12:00
foreach ($memberships as $membership) {
if (!$dbForProject->deleteDocument('memberships', $membership->getId())) {
throw new Exception(Exception::GENERAL_SERVER_ERROR, 'Failed to remove membership for team from DB');
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
if (!$dbForProject->deleteDocument('teams', $teamId)) {
throw new Exception(Exception::GENERAL_SERVER_ERROR, 'Failed to remove team from DB');
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
$deletes
2022-04-18 08:34:32 +12:00
->setType(DELETE_TYPE_DOCUMENT)
->setDocument($team);
2020-12-07 11:14:57 +13:00
$events
->setParam('teamId', $team->getId())
->setPayload($response->output($team, Response::MODEL_TEAM))
2020-12-03 11:15:20 +13:00
;
2020-06-30 23:09:28 +12:00
$response->noContent();
2020-12-27 05:48:43 +13:00
});
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::post('/v1/teams/:teamId/memberships')
2019-05-09 18:54:39 +12:00
->desc('Create Team Membership')
2021-03-01 07:36:13 +13:00
->groups(['api', 'teams', 'auth'])
->label('event', 'teams.[teamId].memberships.[membershipId].create')
2020-02-10 05:53:33 +13:00
->label('scope', 'teams.write')
2021-03-01 07:36:13 +13:00
->label('auth.type', 'invites')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'membership.create')
2022-08-12 01:19:05 +12:00
->label('audits.resource', 'team/{request.teamId}')
2022-08-12 23:01:12 +12:00
->label('audits.userId', '{request.userId}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'createMembership')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/create-team-membership.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MEMBERSHIP)
2021-04-13 21:38:40 +12:00
->label('abuse-limit', 10)
->param('teamId', '', new UID(), 'Team ID.')
->param('email', '', new Email(), 'Email of the new team member.')
2022-05-01 19:54:58 +12:00
->param('roles', [], new ArrayList(new Key(), APP_LIMIT_ARRAY_PARAMS_SIZE), 'Array of strings. Use this param to set the user roles in the team. A role can be any string. Learn more about [roles and permissions](/docs/permissions). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' roles are allowed, each 32 characters long.')
2022-05-24 04:42:27 +12:00
->param('url', '', fn($clients) => new Host($clients), 'URL to redirect the user back to your app from the invitation email. Only URLs from hostnames in your project platform list are allowed. This requirement helps to prevent an [open redirect](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) attack against your project API.', false, ['clients']) // TODO add our own built-in confirm page
2021-12-11 04:44:54 +13:00
->param('name', '', new Text(128), 'Name of the new team member. Max length: 128 chars.', true)
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('project')
->inject('user')
->inject('dbForProject')
2020-12-27 05:48:43 +13:00
->inject('locale')
->inject('mails')
->inject('events')
2022-08-09 02:32:54 +12:00
->action(function (string $teamId, string $email, array $roles, string $url, string $name, Response $response, Document $project, Document $user, Database $dbForProject, Locale $locale, Mail $mails, Event $events) {
$isPrivilegedUser = Auth::isPrivilegedUser(Authorization::getRoles());
$isAppUser = Auth::isAppUser(Authorization::getRoles());
if (!$isPrivilegedUser && !$isAppUser && empty(App::getEnv('_APP_SMTP_HOST'))) {
throw new Exception(Exception::GENERAL_SMTP_DISABLED);
}
2021-06-04 07:05:11 +12:00
$email = \strtolower($email);
2020-06-30 23:09:28 +12:00
$name = (empty($name)) ? $email : $name;
$team = $dbForProject->getDocument('teams', $teamId);
2020-06-30 23:09:28 +12:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception(Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2022-08-12 11:53:52 +12:00
$invitee = $dbForProject->findOne('users', [Query::equal('email', [$email])]); // Get user by email address
2020-06-30 23:09:28 +12:00
if (empty($invitee)) { // Create new user if no user with same email found
2021-08-06 20:34:17 +12:00
$limit = $project->getAttribute('auths', [])['limit'] ?? 0;
2021-03-01 07:36:13 +13:00
if ($limit !== 0 && $project->getId() !== 'console') { // check users limit, console invites are allways allowed.
2022-02-27 22:57:09 +13:00
$total = $dbForProject->count('users', [], APP_LIMIT_USERS);
2022-05-24 02:54:50 +12:00
if ($total >= $limit) {
2022-08-14 18:56:12 +12:00
throw new Exception(Exception::USER_COUNT_EXCEEDED, 'Project registration is restricted. Contact your administrator for more information.');
2021-03-01 07:36:13 +13:00
}
}
2020-06-30 23:09:28 +12:00
try {
2022-08-15 02:22:38 +12:00
$userId = ID::unique();
$invitee = Authorization::skip(fn() => $dbForProject->createDocument('users', new Document([
2022-08-15 02:22:38 +12:00
'$id' => $userId,
'$permissions' => [
2022-08-14 17:21:11 +12:00
Permission::read(Role::any()),
2022-08-15 02:22:38 +12:00
Permission::read(Role::user($userId)),
Permission::update(Role::user($userId)),
Permission::delete(Role::user($userId)),
],
2020-06-30 23:09:28 +12:00
'email' => $email,
'emailVerification' => false,
'status' => true,
2022-05-05 23:21:31 +12:00
'password' => Auth::passwordHash(Auth::passwordGenerator(), Auth::DEFAULT_ALGO, Auth::DEFAULT_ALGO_OPTIONS),
'hash' => Auth::DEFAULT_ALGO,
'hashOptions' => Auth::DEFAULT_ALGO_OPTIONS,
2022-05-24 02:54:50 +12:00
/**
* Set the password update time to 0 for users created using
* team invite and OAuth to allow password updates without an
* old password
*/
2022-07-04 21:55:11 +12:00
'passwordUpdate' => null,
2022-07-14 02:02:49 +12:00
'registration' => DateTime::now(),
2020-06-30 23:09:28 +12:00
'reset' => false,
'name' => $name,
2021-12-28 23:48:50 +13:00
'prefs' => new \stdClass(),
2022-04-26 20:52:59 +12:00
'sessions' => null,
2022-04-27 23:06:53 +12:00
'tokens' => null,
2022-04-28 00:44:47 +12:00
'memberships' => null,
2022-05-16 21:58:17 +12:00
'search' => implode(' ', [$userId, $email, $name])
])));
2020-06-30 23:09:28 +12:00
} catch (Duplicate $th) {
throw new Exception(Exception::USER_ALREADY_EXISTS);
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2022-05-24 02:54:50 +12:00
$isOwner = Authorization::isRole('team:' . $team->getId() . '/owner');
2019-05-09 18:54:39 +12:00
2021-03-02 10:04:53 +13:00
if (!$isOwner && !$isPrivilegedUser && !$isAppUser) { // Not owner, not admin, not app (server)
throw new Exception(Exception::USER_UNAUTHORIZED, 'User is not allowed to send invitations for this team');
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
$secret = Auth::tokenGenerator();
2022-08-15 02:22:38 +12:00
$membershipId = ID::unique();
2020-06-30 23:09:28 +12:00
$membership = new Document([
2022-08-15 02:22:38 +12:00
'$id' => $membershipId,
'$permissions' => [
2022-08-14 17:21:11 +12:00
Permission::read(Role::any()),
2022-08-15 23:24:31 +12:00
Permission::update(Role::user($invitee->getId())),
Permission::update(Role::team($team->getId(), 'owner')),
Permission::delete(Role::user($invitee->getId())),
Permission::delete(Role::team($team->getId(), 'owner')),
],
2022-08-15 23:24:31 +12:00
'userId' => $invitee->getId(),
'userInternalId' => $invitee->getInternalId(),
'teamId' => $team->getId(),
'teamInternalId' => $team->getInternalId(),
2020-06-30 23:09:28 +12:00
'roles' => $roles,
2022-07-14 02:02:49 +12:00
'invited' => DateTime::now(),
'joined' => ($isPrivilegedUser || $isAppUser) ? DateTime::now() : null,
2021-03-02 10:04:53 +13:00
'confirm' => ($isPrivilegedUser || $isAppUser),
2020-06-30 23:09:28 +12:00
'secret' => Auth::hash($secret),
2022-02-17 05:26:19 +13:00
'search' => implode(' ', [$membershipId, $invitee->getId()])
2020-06-30 23:09:28 +12:00
]);
2021-03-02 10:04:53 +13:00
if ($isPrivilegedUser || $isAppUser) { // Allow admin to create membership
2021-05-10 06:37:47 +12:00
try {
$membership = Authorization::skip(fn() => $dbForProject->createDocument('memberships', $membership));
2021-05-10 06:37:47 +12:00
} catch (Duplicate $th) {
throw new Exception(Exception::TEAM_INVITE_ALREADY_EXISTS);
2021-05-10 06:37:47 +12:00
}
2022-02-27 22:57:09 +13:00
$team->setAttribute('total', $team->getAttribute('total', 0) + 1);
$team = Authorization::skip(fn() => $dbForProject->updateDocument('teams', $team->getId(), $team));
2019-05-09 18:54:39 +12:00
2022-04-28 00:44:47 +12:00
$dbForProject->deleteCachedDocument('users', $invitee->getId());
2020-06-30 23:09:28 +12:00
} else {
2021-05-10 06:37:47 +12:00
try {
$membership = $dbForProject->createDocument('memberships', $membership);
2021-05-10 06:37:47 +12:00
} catch (Duplicate $th) {
throw new Exception(Exception::TEAM_INVITE_ALREADY_EXISTS);
2021-05-10 06:37:47 +12:00
}
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
$url = Template::parseURL($url);
2021-09-10 02:24:57 +12:00
$url['query'] = Template::mergeQuery(((isset($url['query'])) ? $url['query'] : ''), ['membershipId' => $membership->getId(), 'userId' => $invitee->getId(), 'secret' => $secret, 'teamId' => $teamId]);
2020-06-30 23:09:28 +12:00
$url = Template::unParseURL($url);
2021-05-13 01:44:41 +12:00
if (!$isPrivilegedUser && !$isAppUser) { // No need of confirmation when in admin or app mode
2020-07-06 02:19:59 +12:00
$mails
->setType(MAIL_TYPE_INVITATION)
->setRecipient($email)
->setUrl($url)
->setName($name)
->setLocale($locale->default)
->setTeam($team)
->setUser($user)
2021-02-09 22:25:09 +13:00
->trigger()
2019-05-09 18:54:39 +12:00
;
}
$events
->setParam('teamId', $team->getId())
->setParam('membershipId', $membership->getId())
2020-06-30 23:09:28 +12:00
;
2022-09-07 23:11:10 +12:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic(
$membership
->setAttribute('teamName', $team->getAttribute('name'))
->setAttribute('userName', $invitee->getAttribute('name'))
2022-09-07 23:23:57 +12:00
->setAttribute('userEmail', $invitee->getAttribute('email')),
2022-09-07 23:14:53 +12:00
Response::MODEL_MEMBERSHIP
);
2020-12-27 05:48:43 +13:00
});
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::get('/v1/teams/:teamId/memberships')
->desc('List Team Memberships')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
2020-02-01 11:34:07 +13:00
->label('scope', 'teams.read')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2020-02-01 11:34:07 +13:00
->label('sdk.namespace', 'teams')
->label('sdk.method', 'listMemberships')
->label('sdk.description', '/docs/references/teams/list-team-members.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MEMBERSHIP_LIST)
->param('teamId', '', new UID(), 'Team ID.')
2022-08-25 06:25:15 +12:00
->param('queries', [], new Memberships(), 'Array of query strings generated using the Query class provided by the SDK. [Learn more about queries](https://appwrite.io/docs/databases#querying-documents). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' queries are allowed, each ' . APP_LIMIT_ARRAY_ELEMENT_SIZE . ' characters long. You may filter on the following attributes: ' . implode(', ', Memberships::ALLOWED_ATTRIBUTES), true)
2020-09-11 02:40:14 +12:00
->param('search', '', new Text(256), 'Search term to filter your list results. Max length: 256 chars.', true)
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
2022-08-24 01:16:46 +12:00
->action(function (string $teamId, array $queries, string $search, Response $response, Database $dbForProject) {
2020-02-01 11:34:07 +13:00
$team = $dbForProject->getDocument('teams', $teamId);
2020-02-01 11:34:07 +13:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception(Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2020-02-01 11:34:07 +13:00
2022-08-24 01:16:46 +12:00
$queries = Query::parseQueries($queries);
2022-08-12 11:53:52 +12:00
if (!empty($search)) {
2022-08-24 01:16:46 +12:00
$queries[] = Query::search('search', $search);
2022-08-12 11:53:52 +12:00
}
2022-08-24 01:16:46 +12:00
// Set internal queries
$queries[] = Query::equal('teamId', [$teamId]);
// Get cursor document if there was a cursor query
$cursor = Query::getByType($queries, Query::TYPE_CURSORAFTER, Query::TYPE_CURSORBEFORE);
$cursor = reset($cursor);
2022-08-30 23:55:23 +12:00
if ($cursor) {
2022-08-24 01:16:46 +12:00
/** @var Query $cursor */
$membershipId = $cursor->getValue();
$cursorDocument = $dbForProject->getDocument('memberships', $membershipId);
2021-08-07 00:36:35 +12:00
2022-08-12 11:53:52 +12:00
if ($cursorDocument->isEmpty()) {
2022-08-24 01:16:46 +12:00
throw new Exception(Exception::GENERAL_CURSOR_NOT_FOUND, "Membership '{$membershipId}' for the 'cursor' value not found.");
2021-08-07 00:36:35 +12:00
}
2022-02-17 05:26:19 +13:00
2022-08-24 01:16:46 +12:00
$cursor->setValue($cursorDocument);
2022-02-17 05:26:19 +13:00
}
2022-08-24 01:16:46 +12:00
$filterQueries = Query::groupByType($queries)['filters'];
2022-02-17 05:26:19 +13:00
$memberships = $dbForProject->find(
collection: 'memberships',
2022-08-24 01:16:46 +12:00
queries: $queries,
2022-02-17 05:26:19 +13:00
);
2022-02-27 22:57:09 +13:00
$total = $dbForProject->count(
2022-08-12 11:53:52 +12:00
collection: 'memberships',
queries: $filterQueries,
2022-02-17 05:26:19 +13:00
max: APP_LIMIT_COUNT
);
2020-06-30 23:09:28 +12:00
$memberships = array_filter($memberships, fn(Document $membership) => !empty($membership->getAttribute('userId')));
2020-06-30 23:09:28 +12:00
2022-05-24 02:54:50 +12:00
$memberships = array_map(function ($membership) use ($dbForProject, $team) {
$user = $dbForProject->getDocument('users', $membership->getAttribute('userId'));
2020-06-30 23:09:28 +12:00
$membership
2022-05-13 01:20:06 +12:00
->setAttribute('teamName', $team->getAttribute('name'))
->setAttribute('userName', $user->getAttribute('name'))
->setAttribute('userEmail', $user->getAttribute('email'))
;
return $membership;
}, $memberships);
2020-06-30 23:09:28 +12:00
2021-07-26 02:47:18 +12:00
$response->dynamic(new Document([
'memberships' => $memberships,
2022-02-27 22:57:09 +13:00
'total' => $total,
2021-05-07 10:31:05 +12:00
]), Response::MODEL_MEMBERSHIP_LIST);
2020-12-27 05:48:43 +13:00
});
2020-02-01 11:34:07 +13:00
2021-08-04 18:57:30 +12:00
App::get('/v1/teams/:teamId/memberships/:membershipId')
->desc('Get Team Membership')
->groups(['api', 'teams'])
->label('scope', 'teams.read')
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
->label('sdk.namespace', 'teams')
->label('sdk.method', 'getMembership')
2021-08-04 19:29:10 +12:00
->label('sdk.description', '/docs/references/teams/get-team-member.md')
2021-08-04 18:57:30 +12:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
2022-09-19 23:43:21 +12:00
->label('sdk.response.model', Response::MODEL_MEMBERSHIP)
->param('teamId', '', new UID(), 'Team ID.')
->param('membershipId', '', new UID(), 'Membership ID.')
2021-08-04 18:57:30 +12:00
->inject('response')
->inject('dbForProject')
2022-05-04 01:21:25 +12:00
->action(function (string $teamId, string $membershipId, Response $response, Database $dbForProject) {
2021-08-04 18:57:30 +12:00
$team = $dbForProject->getDocument('teams', $teamId);
2021-08-04 18:57:30 +12:00
if ($team->isEmpty()) {
throw new Exception(Exception::TEAM_NOT_FOUND);
2021-08-04 18:57:30 +12:00
}
$membership = $dbForProject->getDocument('memberships', $membershipId);
2021-08-04 18:57:30 +12:00
2022-05-24 02:54:50 +12:00
if ($membership->isEmpty() || empty($membership->getAttribute('userId'))) {
throw new Exception(Exception::MEMBERSHIP_NOT_FOUND);
2021-08-04 18:57:30 +12:00
}
$user = $dbForProject->getDocument('users', $membership->getAttribute('userId'));
$membership
2022-05-13 01:20:06 +12:00
->setAttribute('teamName', $team->getAttribute('name'))
->setAttribute('userName', $user->getAttribute('name'))
->setAttribute('userEmail', $user->getAttribute('email'))
2020-10-31 21:42:41 +13:00
;
2021-08-04 18:57:30 +12:00
2022-05-24 02:54:50 +12:00
$response->dynamic($membership, Response::MODEL_MEMBERSHIP);
2021-08-04 18:57:30 +12:00
});
2021-05-13 01:44:41 +12:00
App::patch('/v1/teams/:teamId/memberships/:membershipId')
->desc('Update Membership Roles')
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].memberships.[membershipId].update')
2021-05-14 02:47:35 +12:00
->label('scope', 'teams.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'membership.update')
2022-08-12 01:19:05 +12:00
->label('audits.resource', 'team/{request.teamId}')
2021-05-14 02:47:35 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2021-05-13 01:44:41 +12:00
->label('sdk.namespace', 'teams')
->label('sdk.method', 'updateMembershipRoles')
->label('sdk.description', '/docs/references/teams/update-team-membership-roles.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MEMBERSHIP)
->param('teamId', '', new UID(), 'Team ID.')
2021-05-13 01:44:41 +12:00
->param('membershipId', '', new UID(), 'Membership ID.')
2022-05-01 19:54:58 +12:00
->param('roles', [], new ArrayList(new Key(), APP_LIMIT_ARRAY_PARAMS_SIZE), 'An array of strings. Use this param to set the user\'s roles in the team. A role can be any string. Learn more about [roles and permissions](https://appwrite.io/docs/permissions). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' roles are allowed, each 32 characters long.')
2021-05-13 01:44:41 +12:00
->inject('request')
->inject('response')
->inject('user')
->inject('dbForProject')
->inject('events')
2022-08-09 02:32:54 +12:00
->action(function (string $teamId, string $membershipId, array $roles, Request $request, Response $response, Document $user, Database $dbForProject, Event $events) {
2021-05-13 01:44:41 +12:00
$team = $dbForProject->getDocument('teams', $teamId);
if ($team->isEmpty()) {
throw new Exception(Exception::TEAM_NOT_FOUND);
2021-05-13 02:47:56 +12:00
}
$membership = $dbForProject->getDocument('memberships', $membershipId);
if ($membership->isEmpty()) {
throw new Exception(Exception::MEMBERSHIP_NOT_FOUND);
2021-05-13 01:44:41 +12:00
}
$profile = $dbForProject->getDocument('users', $membership->getAttribute('userId'));
if ($profile->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
2021-05-13 01:44:41 +12:00
$isPrivilegedUser = Auth::isPrivilegedUser(Authorization::getRoles());
$isAppUser = Auth::isAppUser(Authorization::getRoles());
2022-05-24 02:54:50 +12:00
$isOwner = Authorization::isRole('team:' . $team->getId() . '/owner');
if (!$isOwner && !$isPrivilegedUser && !$isAppUser) { // Not owner, not admin, not app (server)
2022-08-14 20:55:59 +12:00
throw new Exception(Exception::USER_UNAUTHORIZED, 'User is not allowed to modify roles');
}
2021-05-13 01:44:41 +12:00
2022-02-17 05:26:19 +13:00
/**
* Update the roles
*/
$membership->setAttribute('roles', $roles);
$membership = $dbForProject->updateDocument('memberships', $membership->getId(), $membership);
2021-05-13 01:44:41 +12:00
2022-02-17 05:26:19 +13:00
/**
* Replace membership on profile
*/
2022-04-28 00:44:47 +12:00
$dbForProject->deleteCachedDocument('users', $profile->getId());
2021-05-13 01:44:41 +12:00
$events
->setParam('teamId', $team->getId())
->setParam('membershipId', $membership->getId());
2021-05-13 01:44:41 +12:00
2022-02-17 05:26:19 +13:00
$response->dynamic(
$membership
2022-05-13 01:20:06 +12:00
->setAttribute('teamName', $team->getAttribute('name'))
->setAttribute('userName', $profile->getAttribute('name'))
->setAttribute('userEmail', $profile->getAttribute('email')),
2022-02-17 05:26:19 +13:00
Response::MODEL_MEMBERSHIP
);
2020-12-27 05:48:43 +13:00
});
2020-02-01 11:34:07 +13:00
App::patch('/v1/teams/:teamId/memberships/:membershipId/status')
2019-05-09 18:54:39 +12:00
->desc('Update Team Membership Status')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].memberships.[membershipId].update.status')
2020-01-20 01:22:54 +13:00
->label('scope', 'public')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'membership.update')
2022-08-12 01:19:05 +12:00
->label('audits.resource', 'team/{request.teamId}')
2022-08-12 23:01:12 +12:00
->label('audits.userId', '{request.userId}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'updateMembershipStatus')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/update-team-membership-status.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MEMBERSHIP)
->param('teamId', '', new UID(), 'Team ID.')
->param('membershipId', '', new UID(), 'Membership ID.')
->param('userId', '', new UID(), 'User ID.')
2020-09-11 02:40:14 +12:00
->param('secret', '', new Text(256), 'Secret key.')
2020-12-27 05:48:43 +13:00
->inject('request')
->inject('response')
->inject('user')
->inject('dbForProject')
2022-11-01 03:54:15 +13:00
->inject('project')
2020-12-27 05:48:43 +13:00
->inject('geodb')
->inject('events')
2022-11-01 03:54:15 +13:00
->action(function (string $teamId, string $membershipId, string $userId, string $secret, Request $request, Response $response, Document $user, Database $dbForProject, Document $project, Reader $geodb, Event $events) {
2020-06-30 23:09:28 +12:00
$protocol = $request->getProtocol();
$membership = $dbForProject->getDocument('memberships', $membershipId);
2020-06-30 23:09:28 +12:00
2021-06-21 01:59:36 +12:00
if ($membership->isEmpty()) {
throw new Exception(Exception::MEMBERSHIP_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
if ($membership->getAttribute('teamId') !== $teamId) {
throw new Exception(Exception::TEAM_MEMBERSHIP_MISMATCH);
2020-06-30 23:09:28 +12:00
}
2020-01-20 01:22:54 +13:00
$team = Authorization::skip(fn() => $dbForProject->getDocument('teams', $teamId));
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception(Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
if (Auth::hash($secret) !== $membership->getAttribute('secret')) {
throw new Exception(Exception::TEAM_INVALID_SECRET);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
if ($userId !== $membership->getAttribute('userId')) {
throw new Exception(Exception::TEAM_INVITE_MISMATCH, 'Invite does not belong to current user (' . $user->getAttribute('email') . ')');
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($user->isEmpty()) {
$user = $dbForProject->getDocument('users', $userId); // Get user
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
if ($membership->getAttribute('userId') !== $user->getId()) {
throw new Exception(Exception::TEAM_INVITE_MISMATCH, 'Invite does not belong to current user (' . $user->getAttribute('email') . ')');
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
if ($membership->getAttribute('confirm') === true) {
throw new Exception(Exception::MEMBERSHIP_ALREADY_CONFIRMED);
}
2020-06-30 23:09:28 +12:00
$membership // Attach user to team
2022-07-14 02:02:49 +12:00
->setAttribute('joined', DateTime::now())
2020-06-30 23:09:28 +12:00
->setAttribute('confirm', true)
;
2019-05-09 18:54:39 +12:00
2022-11-25 00:55:49 +13:00
$user = Authorization::skip(fn() => $dbForProject->updateDocument('users', $user->getId(), $user->setAttribute('emailVerification', true)));
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
// Log user in
2020-08-12 02:28:51 +12:00
2022-08-19 16:04:33 +12:00
Authorization::setRole(Role::user($user->getId())->toString());
2021-07-17 22:04:43 +12:00
2021-02-15 06:28:54 +13:00
$detector = new Detector($request->getUserAgent('UNKNOWN'));
$record = $geodb->get($request->getIP());
2022-11-14 22:42:18 +13:00
$authDuration = $project->getAttribute('auths', [])['duration'] ?? Auth::TOKEN_EXPIRATION_LOGIN_LONG;
2022-11-02 03:43:18 +13:00
$expire = DateTime::addSeconds(new \DateTime(), $authDuration);
2020-06-30 23:09:28 +12:00
$secret = Auth::tokenGenerator();
2021-02-15 06:28:54 +13:00
$session = new Document(array_merge([
2022-08-15 02:22:38 +12:00
'$id' => ID::unique(),
2022-08-15 23:24:31 +12:00
'userId' => $user->getId(),
'userInternalId' => $user->getInternalId(),
2021-02-20 01:12:47 +13:00
'provider' => Auth::SESSION_PROVIDER_EMAIL,
2021-02-19 23:02:02 +13:00
'providerUid' => $user->getAttribute('email'),
2020-11-13 00:54:16 +13:00
'secret' => Auth::hash($secret), // One way hash encryption to protect DB leak
2020-07-04 03:14:51 +12:00
'userAgent' => $request->getUserAgent('UNKNOWN'),
2020-06-30 23:09:28 +12:00
'ip' => $request->getIP(),
2021-02-15 06:28:54 +13:00
'countryCode' => ($record) ? \strtolower($record['country']['iso_code']) : '--',
], $detector->getOS(), $detector->getClient(), $detector->getDevice()));
2020-08-12 02:28:51 +12:00
$session = $dbForProject->createDocument('sessions', $session
->setAttribute('$permissions', [
2022-08-15 23:24:31 +12:00
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]));
2022-04-26 20:52:59 +12:00
$dbForProject->deleteCachedDocument('users', $user->getId());
2019-05-09 18:54:39 +12:00
2022-08-19 16:04:33 +12:00
Authorization::setRole(Role::user($userId)->toString());
2019-05-09 18:54:39 +12:00
$membership = $dbForProject->updateDocument('memberships', $membership->getId(), $membership);
2022-05-13 01:20:06 +12:00
2022-04-28 00:44:47 +12:00
$dbForProject->deleteCachedDocument('users', $user->getId());
2020-01-20 01:22:54 +13:00
2022-02-27 22:57:09 +13:00
$team = Authorization::skip(fn() => $dbForProject->updateDocument('teams', $team->getId(), $team->setAttribute('total', $team->getAttribute('total', 0) + 1)));
2019-05-09 18:54:39 +12:00
$events
->setParam('teamId', $team->getId())
->setParam('membershipId', $membership->getId())
2020-06-30 23:09:28 +12:00
;
2020-06-30 23:09:28 +12:00
if (!Config::getParam('domainVerification')) {
$response
2020-06-30 23:09:28 +12:00
->addHeader('X-Fallback-Cookies', \json_encode([Auth::$cookieName => Auth::encodeSession($user->getId(), $secret)]))
;
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
$response
->addCookie(Auth::$cookieName . '_legacy', Auth::encodeSession($user->getId(), $secret), (new \DateTime($expire))->getTimestamp(), '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, null)
->addCookie(Auth::$cookieName, Auth::encodeSession($user->getId(), $secret), (new \DateTime($expire))->getTimestamp(), '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, Config::getParam('cookieSamesite'))
2020-06-30 23:09:28 +12:00
;
2020-07-03 09:48:02 +12:00
2022-05-24 02:54:50 +12:00
$response->dynamic(
$membership
2022-05-13 01:20:06 +12:00
->setAttribute('teamName', $team->getAttribute('name'))
->setAttribute('userName', $user->getAttribute('name'))
2022-05-24 02:54:50 +12:00
->setAttribute('userEmail', $user->getAttribute('email')),
Response::MODEL_MEMBERSHIP
);
2020-12-27 05:48:43 +13:00
});
2019-05-09 18:54:39 +12:00
App::delete('/v1/teams/:teamId/memberships/:membershipId')
2019-05-09 18:54:39 +12:00
->desc('Delete Team Membership')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].memberships.[membershipId].delete')
2020-02-10 05:53:33 +13:00
->label('scope', 'teams.write')
2022-09-05 20:00:08 +12:00
->label('audits.event', 'membership.delete')
2022-08-09 02:32:54 +12:00
->label('audits.resource', 'team/{request.teamId}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'deleteMembership')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/delete-team-membership.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_NOCONTENT)
->label('sdk.response.model', Response::MODEL_NONE)
->param('teamId', '', new UID(), 'Team ID.')
->param('membershipId', '', new UID(), 'Membership ID.')
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
2020-12-27 05:48:43 +13:00
->inject('events')
2022-08-09 02:32:54 +12:00
->action(function (string $teamId, string $membershipId, Response $response, Database $dbForProject, Event $events) {
2019-05-09 18:54:39 +12:00
$membership = $dbForProject->getDocument('memberships', $membershipId);
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($membership->isEmpty()) {
throw new Exception(Exception::TEAM_INVITE_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
if ($membership->getAttribute('teamId') !== $teamId) {
2022-08-14 18:56:12 +12:00
throw new Exception(Exception::TEAM_MEMBERSHIP_MISMATCH);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
$user = $dbForProject->getDocument('users', $membership->getAttribute('userId'));
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
$team = $dbForProject->getDocument('teams', $teamId);
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception(Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
try {
$dbForProject->deleteDocument('memberships', $membership->getId());
} catch (AuthorizationException $exception) {
throw new Exception(Exception::USER_UNAUTHORIZED);
} catch (\Exception $exception) {
throw new Exception(Exception::GENERAL_SERVER_ERROR, 'Failed to remove membership from DB');
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2022-04-28 00:44:47 +12:00
$dbForProject->deleteCachedDocument('users', $user->getId());
2020-06-30 23:09:28 +12:00
if ($membership->getAttribute('confirm')) { // Count only confirmed members
2022-02-27 22:57:09 +13:00
$team->setAttribute('total', \max($team->getAttribute('total', 0) - 1, 0));
Authorization::skip(fn() => $dbForProject->updateDocument('teams', $team->getId(), $team));
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
2020-12-07 11:14:57 +13:00
$events
->setParam('teamId', $team->getId())
->setParam('membershipId', $membership->getId())
->setPayload($response->output($membership, Response::MODEL_MEMBERSHIP))
2020-12-03 11:15:20 +13:00
;
2020-06-30 23:09:28 +12:00
$response->noContent();
2020-12-27 05:48:43 +13:00
});
2022-04-22 02:07:08 +12:00
App::get('/v1/teams/:teamId/logs')
->desc('List Team Logs')
->groups(['api', 'teams'])
->label('scope', 'teams.read')
->label('sdk.auth', [APP_AUTH_TYPE_ADMIN])
->label('sdk.namespace', 'teams')
->label('sdk.method', 'listLogs')
->label('sdk.description', '/docs/references/teams/get-team-logs.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_LOG_LIST)
2022-09-19 22:05:42 +12:00
->param('teamId', '', new UID(), 'Team ID.')
2022-08-24 00:50:52 +12:00
->param('queries', [], new Queries(new Limit(), new Offset()), 'Array of query strings generated using the Query class provided by the SDK. [Learn more about queries](https://appwrite.io/docs/databases#querying-documents). Only supported methods are limit and offset', true)
2022-04-22 02:07:08 +12:00
->inject('response')
->inject('dbForProject')
->inject('locale')
->inject('geodb')
2022-08-24 00:50:52 +12:00
->action(function (string $teamId, array $queries, Response $response, Database $dbForProject, Locale $locale, Reader $geodb) {
2022-04-22 02:07:08 +12:00
$team = $dbForProject->getDocument('teams', $teamId);
if ($team->isEmpty()) {
throw new Exception(Exception::TEAM_NOT_FOUND);
2022-04-22 02:07:08 +12:00
}
2022-08-24 00:50:52 +12:00
$queries = Query::parseQueries($queries);
$grouped = Query::groupByType($queries);
2022-08-30 23:55:23 +12:00
$limit = $grouped['limit'] ?? APP_LIMIT_COUNT;
2022-08-24 00:50:52 +12:00
$offset = $grouped['offset'] ?? 0;
2022-08-24 01:10:27 +12:00
2022-04-22 02:07:08 +12:00
$audit = new Audit($dbForProject);
2022-05-24 02:54:50 +12:00
$resource = 'team/' . $team->getId();
2022-04-22 02:07:08 +12:00
$logs = $audit->getLogsByResource($resource, $limit, $offset);
$output = [];
foreach ($logs as $i => &$log) {
$log['userAgent'] = (!empty($log['userAgent'])) ? $log['userAgent'] : 'UNKNOWN';
$detector = new Detector($log['userAgent']);
$detector->skipBotDetection(); // OPTIONAL: If called, bot detection will completely be skipped (bots will be detected as regular devices then)
$os = $detector->getOS();
$client = $detector->getClient();
$device = $detector->getDevice();
$output[$i] = new Document([
'event' => $log['event'],
2022-08-15 23:24:31 +12:00
'userId' => $log['userId'],
2022-04-22 02:07:08 +12:00
'userEmail' => $log['data']['userEmail'] ?? null,
'userName' => $log['data']['userName'] ?? null,
'mode' => $log['data']['mode'] ?? null,
'ip' => $log['ip'],
'time' => $log['time'],
'osCode' => $os['osCode'],
'osName' => $os['osName'],
'osVersion' => $os['osVersion'],
'clientType' => $client['clientType'],
'clientCode' => $client['clientCode'],
'clientName' => $client['clientName'],
'clientVersion' => $client['clientVersion'],
'clientEngine' => $client['clientEngine'],
'clientEngineVersion' => $client['clientEngineVersion'],
'deviceName' => $device['deviceName'],
'deviceBrand' => $device['deviceBrand'],
'deviceModel' => $device['deviceModel']
]);
$record = $geodb->get($log['ip']);
if ($record) {
2022-05-24 02:54:50 +12:00
$output[$i]['countryCode'] = $locale->getText('countries.' . strtolower($record['country']['iso_code']), false) ? \strtolower($record['country']['iso_code']) : '--';
$output[$i]['countryName'] = $locale->getText('countries.' . strtolower($record['country']['iso_code']), $locale->getText('locale.country.unknown'));
2022-04-22 02:07:08 +12:00
} else {
$output[$i]['countryCode'] = '--';
$output[$i]['countryName'] = $locale->getText('locale.country.unknown');
}
}
$response->dynamic(new Document([
'total' => $audit->countLogsByResource($resource),
'logs' => $output,
]), Response::MODEL_LOG_LIST);
});