1
0
Fork 0
mirror of synced 2024-06-02 19:04:49 +12:00
appwrite/app/controllers/api/teams.php

888 lines
41 KiB
PHP
Raw Normal View History

2019-05-09 18:54:39 +12:00
<?php
2021-05-07 10:31:05 +12:00
use Appwrite\Auth\Auth;
use Appwrite\Detector\Detector;
use Appwrite\Event\Audit as EventAudit;
use Appwrite\Event\Delete;
2022-05-03 23:57:26 +12:00
use Appwrite\Event\Event;
use Appwrite\Event\Mail;
2022-05-03 23:57:26 +12:00
use Appwrite\Extend\Exception;
2021-05-07 10:31:05 +12:00
use Appwrite\Network\Validator\Email;
use Appwrite\Network\Validator\Host;
2022-01-19 00:05:04 +13:00
use Appwrite\Template\Template;
use Appwrite\Utopia\Database\Validator\CustomId;
2022-05-03 23:57:26 +12:00
use Appwrite\Utopia\Request;
2022-01-19 00:05:04 +13:00
use Appwrite\Utopia\Response;
2022-05-03 23:57:26 +12:00
use MaxMind\Db\Reader;
2020-06-29 05:31:21 +12:00
use Utopia\App;
2022-04-22 02:07:08 +12:00
use Utopia\Audit\Audit;
2020-03-29 01:42:16 +13:00
use Utopia\Config\Config;
use Utopia\Database\Database;
2021-05-07 10:31:05 +12:00
use Utopia\Database\Document;
use Utopia\Database\Exception\Authorization as AuthorizationException;
2021-05-07 10:31:05 +12:00
use Utopia\Database\Exception\Duplicate;
use Utopia\Database\Query;
use Utopia\Database\Validator\Authorization;
use Utopia\Database\Validator\Key;
2021-07-26 02:47:18 +12:00
use Utopia\Database\Validator\UID;
2022-05-04 21:51:48 +12:00
use Utopia\Locale\Locale;
2022-01-19 00:05:04 +13:00
use Utopia\Validator\Text;
use Utopia\Validator\Range;
use Utopia\Validator\ArrayList;
use Utopia\Validator\WhiteList;
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::post('/v1/teams')
2019-05-09 18:54:39 +12:00
->desc('Create Team')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].create')
2019-05-09 18:54:39 +12:00
->label('scope', 'teams.write')
2022-08-09 02:32:54 +12:00
->label('audits.resource', 'team/{response.$id}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'create')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/create-team.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TEAM)
->param('teamId', '', new CustomId(), 'Team ID. Choose your own unique ID or pass the string "unique()" to auto generate it. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
2020-09-11 02:40:14 +12:00
->param('name', null, new Text(128), 'Team name. Max length: 128 chars.')
2022-05-01 19:54:58 +12:00
->param('roles', ['owner'], new ArrayList(new Key(), APP_LIMIT_ARRAY_PARAMS_SIZE), 'Array of strings. Use this param to set the roles in the team for the user who created it. The default role is **owner**. A role can be any string. Learn more about [roles and permissions](/docs/permissions). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' roles are allowed, each 32 characters long.', true)
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('user')
->inject('dbForProject')
->inject('events')
2022-08-09 02:32:54 +12:00
->action(function (string $teamId, string $name, array $roles, Response $response, Document $user, Database $dbForProject, Event $events) {
2020-06-30 23:09:28 +12:00
$isPrivilegedUser = Auth::isPrivilegedUser(Authorization::getRoles());
$isAppUser = Auth::isAppUser(Authorization::getRoles());
$teamId = $teamId == 'unique()' ? $dbForProject->getId() : $teamId;
$team = Authorization::skip(fn() => $dbForProject->createDocument('teams', new Document([
2021-05-07 10:31:05 +12:00
'$id' => $teamId ,
2022-05-24 02:54:50 +12:00
'$read' => ['team:' . $teamId],
'$write' => ['team:' . $teamId . '/owner'],
2020-06-30 23:09:28 +12:00
'name' => $name,
2022-02-27 22:57:09 +13:00
'total' => ($isPrivilegedUser || $isAppUser) ? 0 : 1,
'search' => implode(' ', [$teamId, $name]),
])));
2020-06-30 23:09:28 +12:00
2021-03-02 10:04:53 +13:00
if (!$isPrivilegedUser && !$isAppUser) { // Don't add user on server mode
2022-02-17 05:26:19 +13:00
$membershipId = $dbForProject->getId();
2020-06-30 23:09:28 +12:00
$membership = new Document([
2022-02-17 05:26:19 +13:00
'$id' => $membershipId,
2022-05-24 02:54:50 +12:00
'$read' => ['user:' . $user->getId(), 'team:' . $team->getId()],
'$write' => ['user:' . $user->getId(), 'team:' . $team->getId() . '/owner'],
2020-06-30 23:09:28 +12:00
'userId' => $user->getId(),
'userInternalId' => $user->getInternalId(),
2020-06-30 23:09:28 +12:00
'teamId' => $team->getId(),
'teamInternalId' => $team->getInternalId(),
2020-06-30 23:09:28 +12:00
'roles' => $roles,
'invited' => \time(),
'joined' => \time(),
'confirm' => true,
'secret' => '',
2022-02-17 05:26:19 +13:00
'search' => implode(' ', [$membershipId, $user->getId()])
2019-05-09 18:54:39 +12:00
]);
$membership = $dbForProject->createDocument('memberships', $membership);
2022-04-28 00:44:47 +12:00
$dbForProject->deleteCachedDocument('users', $user->getId());
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
$events->setParam('teamId', $team->getId());
if (!empty($user->getId())) {
$events->setParam('userId', $user->getId());
}
2021-05-07 10:31:05 +12:00
$response->setStatusCode(Response::STATUS_CODE_CREATED);
2021-07-26 02:47:18 +12:00
$response->dynamic($team, Response::MODEL_TEAM);
2020-12-27 05:48:43 +13:00
});
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::get('/v1/teams')
2020-02-01 11:34:07 +13:00
->desc('List Teams')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
2020-02-01 11:34:07 +13:00
->label('scope', 'teams.read')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2020-02-01 11:34:07 +13:00
->label('sdk.namespace', 'teams')
->label('sdk.method', 'list')
->label('sdk.description', '/docs/references/teams/list-teams.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TEAM_LIST)
2020-09-11 02:40:14 +12:00
->param('search', '', new Text(256), 'Search term to filter your list results. Max length: 256 chars.', true)
2021-12-15 00:21:44 +13:00
->param('limit', 25, new Range(0, 100), 'Maximum number of teams to return in response. By default will return maximum 25 results. Maximum of 100 results allowed per request.', true)
->param('offset', 0, new Range(0, APP_LIMIT_COUNT), 'Offset value. The default value is 0. Use this param to manage pagination. [learn more about pagination](https://appwrite.io/docs/pagination)', true)
->param('cursor', '', new UID(), 'ID of the team used as the starting point for the query, excluding the team itself. Should be used for efficient pagination when working with large sets of data. [learn more about pagination](https://appwrite.io/docs/pagination)', true)
2022-06-28 23:21:28 +12:00
->param('cursorDirection', Database::CURSOR_AFTER, new WhiteList([Database::CURSOR_AFTER, Database::CURSOR_BEFORE]), 'Direction of the cursor, can be either \'before\' or \'after\'.', true)
2020-09-11 02:40:14 +12:00
->param('orderType', 'ASC', new WhiteList(['ASC', 'DESC'], true), 'Order result by ASC or DESC order.', true)
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
2022-05-04 01:21:25 +12:00
->action(function (string $search, int $limit, int $offset, string $cursor, string $cursorDirection, string $orderType, Response $response, Database $dbForProject) {
2021-05-07 10:31:05 +12:00
if (!empty($cursor)) {
$cursorTeam = $dbForProject->getDocument('teams', $cursor);
2021-08-07 00:36:35 +12:00
if ($cursorTeam->isEmpty()) {
2022-02-09 11:56:11 +13:00
throw new Exception("Team '{$cursor}' for the 'cursor' value not found.", 400, Exception::GENERAL_CURSOR_NOT_FOUND);
2021-08-07 00:36:35 +12:00
}
}
2021-08-19 01:42:03 +12:00
$queries = [];
if (!empty($search)) {
$queries[] = new Query('search', Query::TYPE_SEARCH, [$search]);
}
$results = $dbForProject->find('teams', $queries, $limit, $offset, [], [$orderType], $cursorTeam ?? null, $cursorDirection);
2022-02-27 22:57:09 +13:00
$total = $dbForProject->count('teams', $queries, APP_LIMIT_COUNT);
2020-06-30 23:09:28 +12:00
2021-07-26 02:47:18 +12:00
$response->dynamic(new Document([
2021-05-27 22:09:14 +12:00
'teams' => $results,
2022-02-27 22:57:09 +13:00
'total' => $total,
2020-08-07 02:49:29 +12:00
]), Response::MODEL_TEAM_LIST);
2020-12-27 05:48:43 +13:00
});
2020-02-01 11:34:07 +13:00
2020-06-29 05:31:21 +12:00
App::get('/v1/teams/:teamId')
2020-02-01 11:34:07 +13:00
->desc('Get Team')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
2020-02-01 11:34:07 +13:00
->label('scope', 'teams.read')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2020-02-01 11:34:07 +13:00
->label('sdk.namespace', 'teams')
->label('sdk.method', 'get')
->label('sdk.description', '/docs/references/teams/get-team.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TEAM)
->param('teamId', '', new UID(), 'Team ID.')
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
2022-05-04 01:21:25 +12:00
->action(function (string $teamId, Response $response, Database $dbForProject) {
2020-02-01 11:34:07 +13:00
$team = $dbForProject->getDocument('teams', $teamId);
2020-02-01 11:34:07 +13:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception('Team not found', 404, Exception::TEAM_NOT_FOUND);
2020-02-01 11:34:07 +13:00
}
2020-06-30 23:09:28 +12:00
2021-07-26 02:47:18 +12:00
$response->dynamic($team, Response::MODEL_TEAM);
2020-12-27 05:48:43 +13:00
});
2020-02-01 11:34:07 +13:00
2020-06-29 05:31:21 +12:00
App::put('/v1/teams/:teamId')
2019-05-09 18:54:39 +12:00
->desc('Update Team')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].update')
2019-05-09 18:54:39 +12:00
->label('scope', 'teams.write')
2022-08-09 02:32:54 +12:00
->label('audits.resource', 'team/{response.$id}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'update')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/update-team.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_TEAM)
->param('teamId', '', new UID(), 'Team ID.')
2021-12-11 04:44:54 +13:00
->param('name', null, new Text(128), 'New team name. Max length: 128 chars.')
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
->inject('events')
2022-08-09 02:32:54 +12:00
->action(function (string $teamId, string $name, Response $response, Database $dbForProject, Event $events) {
2019-05-09 18:54:39 +12:00
$team = $dbForProject->getDocument('teams', $teamId);
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception('Team not found', 404, Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2022-05-24 02:54:50 +12:00
$team = $dbForProject->updateDocument('teams', $team->getId(), $team
->setAttribute('name', $name)
2022-05-24 02:54:50 +12:00
->setAttribute('search', implode(' ', [$teamId, $name])));
2019-05-09 18:54:39 +12:00
$events->setParam('teamId', $team->getId());
2021-07-26 02:47:18 +12:00
$response->dynamic($team, Response::MODEL_TEAM);
2020-12-27 05:48:43 +13:00
});
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::delete('/v1/teams/:teamId')
2019-05-09 18:54:39 +12:00
->desc('Delete Team')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].delete')
2019-05-09 18:54:39 +12:00
->label('scope', 'teams.write')
2022-08-12 01:19:05 +12:00
->label('audits.resource', 'team/{request.teamId}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'delete')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/delete-team.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_NOCONTENT)
->label('sdk.response.model', Response::MODEL_NONE)
->param('teamId', '', new UID(), 'Team ID.')
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
2020-12-27 05:48:43 +13:00
->inject('events')
->inject('deletes')
2022-04-22 02:07:08 +12:00
->inject('audits')
->action(function (string $teamId, Response $response, Database $dbForProject, Event $events, Delete $deletes, EventAudit $audits) {
2019-05-09 18:54:39 +12:00
$team = $dbForProject->getDocument('teams', $teamId);
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception('Team not found', 404, Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
$memberships = $dbForProject->find('memberships', [
2021-05-07 10:31:05 +12:00
new Query('teamId', Query::TYPE_EQUAL, [$teamId]),
], 2000, 0); // TODO fix members limit
// TODO delete all members individually from the user object
2021-05-10 06:37:47 +12:00
foreach ($memberships as $membership) {
if (!$dbForProject->deleteDocument('memberships', $membership->getId())) {
throw new Exception('Failed to remove membership for team from DB', 500, Exception::GENERAL_SERVER_ERROR);
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
if (!$dbForProject->deleteDocument('teams', $teamId)) {
throw new Exception('Failed to remove team from DB', 500, Exception::GENERAL_SERVER_ERROR);
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
$deletes
2022-04-18 08:34:32 +12:00
->setType(DELETE_TYPE_DOCUMENT)
->setDocument($team);
2020-12-07 11:14:57 +13:00
$events
->setParam('teamId', $team->getId())
->setPayload($response->output($team, Response::MODEL_TEAM))
2020-12-03 11:15:20 +13:00
;
2022-08-12 01:19:05 +12:00
$audits->setParam('data', $team->getArrayCopy());
2022-04-22 02:07:08 +12:00
2020-06-30 23:09:28 +12:00
$response->noContent();
2020-12-27 05:48:43 +13:00
});
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::post('/v1/teams/:teamId/memberships')
2019-05-09 18:54:39 +12:00
->desc('Create Team Membership')
2021-03-01 07:36:13 +13:00
->groups(['api', 'teams', 'auth'])
->label('event', 'teams.[teamId].memberships.[membershipId].create')
2020-02-10 05:53:33 +13:00
->label('scope', 'teams.write')
2021-03-01 07:36:13 +13:00
->label('auth.type', 'invites')
2022-08-12 01:19:05 +12:00
->label('audits.resource', 'team/{request.teamId}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'createMembership')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/create-team-membership.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_CREATED)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MEMBERSHIP)
2021-04-13 21:38:40 +12:00
->label('abuse-limit', 10)
->param('teamId', '', new UID(), 'Team ID.')
->param('email', '', new Email(), 'Email of the new team member.')
2022-05-01 19:54:58 +12:00
->param('roles', [], new ArrayList(new Key(), APP_LIMIT_ARRAY_PARAMS_SIZE), 'Array of strings. Use this param to set the user roles in the team. A role can be any string. Learn more about [roles and permissions](/docs/permissions). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' roles are allowed, each 32 characters long.')
2022-05-24 04:42:27 +12:00
->param('url', '', fn($clients) => new Host($clients), 'URL to redirect the user back to your app from the invitation email. Only URLs from hostnames in your project platform list are allowed. This requirement helps to prevent an [open redirect](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) attack against your project API.', false, ['clients']) // TODO add our own built-in confirm page
2021-12-11 04:44:54 +13:00
->param('name', '', new Text(128), 'Name of the new team member. Max length: 128 chars.', true)
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('project')
->inject('user')
->inject('dbForProject')
2020-12-27 05:48:43 +13:00
->inject('locale')
->inject('mails')
->inject('events')
2022-08-09 02:32:54 +12:00
->action(function (string $teamId, string $email, array $roles, string $url, string $name, Response $response, Document $project, Document $user, Database $dbForProject, Locale $locale, Mail $mails, Event $events) {
$isPrivilegedUser = Auth::isPrivilegedUser(Authorization::getRoles());
$isAppUser = Auth::isAppUser(Authorization::getRoles());
if (!$isPrivilegedUser && !$isAppUser && empty(App::getEnv('_APP_SMTP_HOST'))) {
throw new Exception('SMTP Disabled', 503, Exception::GENERAL_SMTP_DISABLED);
}
2021-06-04 07:05:11 +12:00
$email = \strtolower($email);
2020-06-30 23:09:28 +12:00
$name = (empty($name)) ? $email : $name;
$team = $dbForProject->getDocument('teams', $teamId);
2020-06-30 23:09:28 +12:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception('Team not found', 404, Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
$invitee = $dbForProject->findOne('users', [new Query('email', Query::TYPE_EQUAL, [$email])]); // Get user by email address
2020-06-30 23:09:28 +12:00
if (empty($invitee)) { // Create new user if no user with same email found
2021-08-06 20:34:17 +12:00
$limit = $project->getAttribute('auths', [])['limit'] ?? 0;
2021-03-01 07:36:13 +13:00
if ($limit !== 0 && $project->getId() !== 'console') { // check users limit, console invites are allways allowed.
2022-02-27 22:57:09 +13:00
$total = $dbForProject->count('users', [], APP_LIMIT_USERS);
2022-05-24 02:54:50 +12:00
if ($total >= $limit) {
throw new Exception('Project registration is restricted. Contact your administrator for more information.', 501, Exception::USER_COUNT_EXCEEDED);
2021-03-01 07:36:13 +13:00
}
}
2020-06-30 23:09:28 +12:00
try {
$userId = $dbForProject->getId();
$invitee = Authorization::skip(fn() => $dbForProject->createDocument('users', new Document([
2021-05-07 10:31:05 +12:00
'$id' => $userId,
2022-05-24 02:54:50 +12:00
'$read' => ['user:' . $userId, 'role:all'],
'$write' => ['user:' . $userId],
2020-06-30 23:09:28 +12:00
'email' => $email,
'emailVerification' => false,
'status' => true,
2020-06-30 23:09:28 +12:00
'password' => Auth::passwordHash(Auth::passwordGenerator()),
2022-05-24 02:54:50 +12:00
/**
* Set the password update time to 0 for users created using
* team invite and OAuth to allow password updates without an
* old password
*/
'passwordUpdate' => 0,
2020-06-30 23:09:28 +12:00
'registration' => \time(),
'reset' => false,
'name' => $name,
2021-12-28 23:48:50 +13:00
'prefs' => new \stdClass(),
2022-04-26 20:52:59 +12:00
'sessions' => null,
2022-04-27 23:06:53 +12:00
'tokens' => null,
2022-04-28 00:44:47 +12:00
'memberships' => null,
2022-05-16 21:58:17 +12:00
'search' => implode(' ', [$userId, $email, $name])
])));
2020-06-30 23:09:28 +12:00
} catch (Duplicate $th) {
throw new Exception('Account already exists', 409, Exception::USER_ALREADY_EXISTS);
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2022-05-24 02:54:50 +12:00
$isOwner = Authorization::isRole('team:' . $team->getId() . '/owner');
2019-05-09 18:54:39 +12:00
2021-03-02 10:04:53 +13:00
if (!$isOwner && !$isPrivilegedUser && !$isAppUser) { // Not owner, not admin, not app (server)
throw new Exception('User is not allowed to send invitations for this team', 401, Exception::USER_UNAUTHORIZED);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
$secret = Auth::tokenGenerator();
2022-02-17 05:26:19 +13:00
$membershipId = $dbForProject->getId();
2020-06-30 23:09:28 +12:00
$membership = new Document([
2022-02-17 05:26:19 +13:00
'$id' => $membershipId,
2021-06-12 06:23:16 +12:00
'$read' => ['role:all'],
2022-05-24 02:54:50 +12:00
'$write' => ['user:' . $invitee->getId(), 'team:' . $team->getId() . '/owner'],
2020-06-30 23:09:28 +12:00
'userId' => $invitee->getId(),
'userInternalId' => $invitee->getInternalId(),
2020-06-30 23:09:28 +12:00
'teamId' => $team->getId(),
'teamInternalId' => $team->getInternalId(),
2020-06-30 23:09:28 +12:00
'roles' => $roles,
'invited' => \time(),
2021-03-02 10:04:53 +13:00
'joined' => ($isPrivilegedUser || $isAppUser) ? \time() : 0,
'confirm' => ($isPrivilegedUser || $isAppUser),
2020-06-30 23:09:28 +12:00
'secret' => Auth::hash($secret),
2022-02-17 05:26:19 +13:00
'search' => implode(' ', [$membershipId, $invitee->getId()])
2020-06-30 23:09:28 +12:00
]);
2021-03-02 10:04:53 +13:00
if ($isPrivilegedUser || $isAppUser) { // Allow admin to create membership
2021-05-10 06:37:47 +12:00
try {
$membership = Authorization::skip(fn() => $dbForProject->createDocument('memberships', $membership));
2021-05-10 06:37:47 +12:00
} catch (Duplicate $th) {
throw new Exception('User is already a member of this team', 409, Exception::TEAM_INVITE_ALREADY_EXISTS);
2021-05-10 06:37:47 +12:00
}
2022-02-27 22:57:09 +13:00
$team->setAttribute('total', $team->getAttribute('total', 0) + 1);
$team = Authorization::skip(fn() => $dbForProject->updateDocument('teams', $team->getId(), $team));
2019-05-09 18:54:39 +12:00
2022-04-28 00:44:47 +12:00
$dbForProject->deleteCachedDocument('users', $invitee->getId());
2020-06-30 23:09:28 +12:00
} else {
2021-05-10 06:37:47 +12:00
try {
$membership = $dbForProject->createDocument('memberships', $membership);
2021-05-10 06:37:47 +12:00
} catch (Duplicate $th) {
throw new Exception('User has already been invited or is already a member of this team', 409, Exception::TEAM_INVITE_ALREADY_EXISTS);
2021-05-10 06:37:47 +12:00
}
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
$url = Template::parseURL($url);
2021-09-10 02:24:57 +12:00
$url['query'] = Template::mergeQuery(((isset($url['query'])) ? $url['query'] : ''), ['membershipId' => $membership->getId(), 'userId' => $invitee->getId(), 'secret' => $secret, 'teamId' => $teamId]);
2020-06-30 23:09:28 +12:00
$url = Template::unParseURL($url);
2021-05-13 01:44:41 +12:00
if (!$isPrivilegedUser && !$isAppUser) { // No need of confirmation when in admin or app mode
2020-07-06 02:19:59 +12:00
$mails
->setType(MAIL_TYPE_INVITATION)
->setRecipient($email)
->setUrl($url)
->setName($name)
->setLocale($locale->default)
->setTeam($team)
->setUser($user)
2021-02-09 22:25:09 +13:00
->trigger()
2019-05-09 18:54:39 +12:00
;
}
$events
->setParam('teamId', $team->getId())
->setParam('membershipId', $membership->getId())
2020-06-30 23:09:28 +12:00
;
2021-05-07 10:31:05 +12:00
$response->setStatusCode(Response::STATUS_CODE_CREATED);
2022-05-24 02:54:50 +12:00
$response->dynamic(
$membership
2022-05-13 01:20:06 +12:00
->setAttribute('teamName', $team->getAttribute('name'))
->setAttribute('userName', $invitee->getAttribute('name'))
->setAttribute('userEmail', $invitee->getAttribute('email')),
2022-05-24 02:54:50 +12:00
Response::MODEL_MEMBERSHIP
);
2020-12-27 05:48:43 +13:00
});
2019-05-09 18:54:39 +12:00
2020-06-29 05:31:21 +12:00
App::get('/v1/teams/:teamId/memberships')
2020-02-01 11:34:07 +13:00
->desc('Get Team Memberships')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
2020-02-01 11:34:07 +13:00
->label('scope', 'teams.read')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2020-02-01 11:34:07 +13:00
->label('sdk.namespace', 'teams')
->label('sdk.method', 'getMemberships')
->label('sdk.description', '/docs/references/teams/get-team-members.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MEMBERSHIP_LIST)
->param('teamId', '', new UID(), 'Team ID.')
2020-09-11 02:40:14 +12:00
->param('search', '', new Text(256), 'Search term to filter your list results. Max length: 256 chars.', true)
2021-12-15 00:21:44 +13:00
->param('limit', 25, new Range(0, 100), 'Maximum number of memberships to return in response. By default will return maximum 25 results. Maximum of 100 results allowed per request.', true)
->param('offset', 0, new Range(0, APP_LIMIT_COUNT), 'Offset value. The default value is 0. Use this value to manage pagination. [learn more about pagination](https://appwrite.io/docs/pagination)', true)
->param('cursor', '', new UID(), 'ID of the membership used as the starting point for the query, excluding the membership itself. Should be used for efficient pagination when working with large sets of data. [learn more about pagination](https://appwrite.io/docs/pagination)', true)
2022-06-28 23:21:28 +12:00
->param('cursorDirection', Database::CURSOR_AFTER, new WhiteList([Database::CURSOR_AFTER, Database::CURSOR_BEFORE]), 'Direction of the cursor, can be either \'before\' or \'after\'.', true)
2020-09-11 02:40:14 +12:00
->param('orderType', 'ASC', new WhiteList(['ASC', 'DESC'], true), 'Order result by ASC or DESC order.', true)
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
2022-05-04 01:21:25 +12:00
->action(function (string $teamId, string $search, int $limit, int $offset, string $cursor, string $cursorDirection, string $orderType, Response $response, Database $dbForProject) {
2020-02-01 11:34:07 +13:00
$team = $dbForProject->getDocument('teams', $teamId);
2020-02-01 11:34:07 +13:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception('Team not found', 404, Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2020-02-01 11:34:07 +13:00
if (!empty($cursor)) {
$cursorMembership = $dbForProject->getDocument('memberships', $cursor);
2021-08-07 00:36:35 +12:00
if ($cursorMembership->isEmpty()) {
2022-02-09 11:56:11 +13:00
throw new Exception("Membership '{$cursor}' for the 'cursor' value not found.", 400, Exception::GENERAL_CURSOR_NOT_FOUND);
2021-08-07 00:36:35 +12:00
}
}
2022-02-17 05:26:19 +13:00
$queries = [new Query('teamId', Query::TYPE_EQUAL, [$teamId])];
if (!empty($search)) {
$queries[] = new Query('search', Query::TYPE_SEARCH, [$search]);
}
$memberships = $dbForProject->find(
collection: 'memberships',
queries: $queries,
limit: $limit,
offset: $offset,
orderTypes: [$orderType],
cursor: $cursorMembership ?? null,
cursorDirection: $cursorDirection
);
2022-02-27 22:57:09 +13:00
$total = $dbForProject->count(
2022-02-17 05:26:19 +13:00
collection:'memberships',
queries: $queries,
max: APP_LIMIT_COUNT
);
2020-06-30 23:09:28 +12:00
$memberships = array_filter($memberships, fn(Document $membership) => !empty($membership->getAttribute('userId')));
2020-06-30 23:09:28 +12:00
2022-05-24 02:54:50 +12:00
$memberships = array_map(function ($membership) use ($dbForProject, $team) {
$user = $dbForProject->getDocument('users', $membership->getAttribute('userId'));
2020-06-30 23:09:28 +12:00
$membership
2022-05-13 01:20:06 +12:00
->setAttribute('teamName', $team->getAttribute('name'))
->setAttribute('userName', $user->getAttribute('name'))
->setAttribute('userEmail', $user->getAttribute('email'))
;
return $membership;
}, $memberships);
2020-06-30 23:09:28 +12:00
2021-07-26 02:47:18 +12:00
$response->dynamic(new Document([
'memberships' => $memberships,
2022-02-27 22:57:09 +13:00
'total' => $total,
2021-05-07 10:31:05 +12:00
]), Response::MODEL_MEMBERSHIP_LIST);
2020-12-27 05:48:43 +13:00
});
2020-02-01 11:34:07 +13:00
2021-08-04 18:57:30 +12:00
App::get('/v1/teams/:teamId/memberships/:membershipId')
->desc('Get Team Membership')
->groups(['api', 'teams'])
->label('scope', 'teams.read')
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
->label('sdk.namespace', 'teams')
->label('sdk.method', 'getMembership')
2021-08-04 19:29:10 +12:00
->label('sdk.description', '/docs/references/teams/get-team-member.md')
2021-08-04 18:57:30 +12:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MEMBERSHIP_LIST)
->param('teamId', '', new UID(), 'Team ID.')
->param('membershipId', '', new UID(), 'Membership ID.')
2021-08-04 18:57:30 +12:00
->inject('response')
->inject('dbForProject')
2022-05-04 01:21:25 +12:00
->action(function (string $teamId, string $membershipId, Response $response, Database $dbForProject) {
2021-08-04 18:57:30 +12:00
$team = $dbForProject->getDocument('teams', $teamId);
2021-08-04 18:57:30 +12:00
if ($team->isEmpty()) {
throw new Exception('Team not found', 404, Exception::TEAM_NOT_FOUND);
2021-08-04 18:57:30 +12:00
}
$membership = $dbForProject->getDocument('memberships', $membershipId);
2021-08-04 18:57:30 +12:00
2022-05-24 02:54:50 +12:00
if ($membership->isEmpty() || empty($membership->getAttribute('userId'))) {
throw new Exception('Membership not found', 404, Exception::MEMBERSHIP_NOT_FOUND);
2021-08-04 18:57:30 +12:00
}
$user = $dbForProject->getDocument('users', $membership->getAttribute('userId'));
$membership
2022-05-13 01:20:06 +12:00
->setAttribute('teamName', $team->getAttribute('name'))
->setAttribute('userName', $user->getAttribute('name'))
->setAttribute('userEmail', $user->getAttribute('email'))
2020-10-31 21:42:41 +13:00
;
2021-08-04 18:57:30 +12:00
2022-05-24 02:54:50 +12:00
$response->dynamic($membership, Response::MODEL_MEMBERSHIP);
2021-08-04 18:57:30 +12:00
});
2021-05-13 01:44:41 +12:00
App::patch('/v1/teams/:teamId/memberships/:membershipId')
->desc('Update Membership Roles')
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].memberships.[membershipId].update')
2021-05-14 02:47:35 +12:00
->label('scope', 'teams.write')
2022-08-12 01:19:05 +12:00
->label('audits.resource', 'team/{request.teamId}')
2021-05-14 02:47:35 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2021-05-13 01:44:41 +12:00
->label('sdk.namespace', 'teams')
->label('sdk.method', 'updateMembershipRoles')
->label('sdk.description', '/docs/references/teams/update-team-membership-roles.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MEMBERSHIP)
->param('teamId', '', new UID(), 'Team ID.')
2021-05-13 01:44:41 +12:00
->param('membershipId', '', new UID(), 'Membership ID.')
2022-05-01 19:54:58 +12:00
->param('roles', [], new ArrayList(new Key(), APP_LIMIT_ARRAY_PARAMS_SIZE), 'An array of strings. Use this param to set the user\'s roles in the team. A role can be any string. Learn more about [roles and permissions](https://appwrite.io/docs/permissions). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' roles are allowed, each 32 characters long.')
2021-05-13 01:44:41 +12:00
->inject('request')
->inject('response')
->inject('user')
->inject('dbForProject')
->inject('events')
2022-08-09 02:32:54 +12:00
->action(function (string $teamId, string $membershipId, array $roles, Request $request, Response $response, Document $user, Database $dbForProject, Event $events) {
2021-05-13 01:44:41 +12:00
$team = $dbForProject->getDocument('teams', $teamId);
if ($team->isEmpty()) {
throw new Exception('Team not found', 404, Exception::TEAM_NOT_FOUND);
2021-05-13 02:47:56 +12:00
}
$membership = $dbForProject->getDocument('memberships', $membershipId);
if ($membership->isEmpty()) {
throw new Exception('Membership not found', 404, Exception::MEMBERSHIP_NOT_FOUND);
2021-05-13 01:44:41 +12:00
}
$profile = $dbForProject->getDocument('users', $membership->getAttribute('userId'));
if ($profile->isEmpty()) {
throw new Exception('User not found', 404, Exception::USER_NOT_FOUND);
}
2021-05-13 01:44:41 +12:00
$isPrivilegedUser = Auth::isPrivilegedUser(Authorization::getRoles());
$isAppUser = Auth::isAppUser(Authorization::getRoles());
2022-05-24 02:54:50 +12:00
$isOwner = Authorization::isRole('team:' . $team->getId() . '/owner');
if (!$isOwner && !$isPrivilegedUser && !$isAppUser) { // Not owner, not admin, not app (server)
throw new Exception('User is not allowed to modify roles', 401, Exception::USER_UNAUTHORIZED);
}
2021-05-13 01:44:41 +12:00
2022-02-17 05:26:19 +13:00
/**
* Update the roles
*/
$membership->setAttribute('roles', $roles);
$membership = $dbForProject->updateDocument('memberships', $membership->getId(), $membership);
2021-05-13 01:44:41 +12:00
2022-02-17 05:26:19 +13:00
/**
* Replace membership on profile
*/
2022-04-28 00:44:47 +12:00
$dbForProject->deleteCachedDocument('users', $profile->getId());
2021-05-13 01:44:41 +12:00
$events
->setParam('teamId', $team->getId())
->setParam('membershipId', $membership->getId());
2021-05-13 01:44:41 +12:00
2022-02-17 05:26:19 +13:00
$response->dynamic(
$membership
2022-05-13 01:20:06 +12:00
->setAttribute('teamName', $team->getAttribute('name'))
->setAttribute('userName', $profile->getAttribute('name'))
->setAttribute('userEmail', $profile->getAttribute('email')),
2022-02-17 05:26:19 +13:00
Response::MODEL_MEMBERSHIP
);
2020-12-27 05:48:43 +13:00
});
2020-02-01 11:34:07 +13:00
App::patch('/v1/teams/:teamId/memberships/:membershipId/status')
2019-05-09 18:54:39 +12:00
->desc('Update Team Membership Status')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].memberships.[membershipId].update.status')
2020-01-20 01:22:54 +13:00
->label('scope', 'public')
2022-08-12 01:19:05 +12:00
->label('audits.resource', 'team/{request.teamId}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'updateMembershipStatus')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/update-team-membership-status.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_MEMBERSHIP)
->param('teamId', '', new UID(), 'Team ID.')
->param('membershipId', '', new UID(), 'Membership ID.')
->param('userId', '', new UID(), 'User ID.')
2020-09-11 02:40:14 +12:00
->param('secret', '', new Text(256), 'Secret key.')
2020-12-27 05:48:43 +13:00
->inject('request')
->inject('response')
->inject('user')
->inject('dbForProject')
2020-12-27 05:48:43 +13:00
->inject('geodb')
->inject('events')
2022-08-09 02:32:54 +12:00
->action(function (string $teamId, string $membershipId, string $userId, string $secret, Request $request, Response $response, Document $user, Database $dbForProject, Reader $geodb, Event $events) {
2020-06-30 23:09:28 +12:00
$protocol = $request->getProtocol();
$membership = $dbForProject->getDocument('memberships', $membershipId);
2020-06-30 23:09:28 +12:00
2021-06-21 01:59:36 +12:00
if ($membership->isEmpty()) {
throw new Exception('Membership not found', 404, Exception::MEMBERSHIP_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
if ($membership->getAttribute('teamId') !== $teamId) {
throw new Exception('Team IDs don\'t match', 404, Exception::TEAM_MEMBERSHIP_MISMATCH);
2020-06-30 23:09:28 +12:00
}
2020-01-20 01:22:54 +13:00
$team = Authorization::skip(fn() => $dbForProject->getDocument('teams', $teamId));
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception('Team not found', 404, Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
if (Auth::hash($secret) !== $membership->getAttribute('secret')) {
throw new Exception('Secret key not valid', 401, Exception::TEAM_INVALID_SECRET);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
if ($userId !== $membership->getAttribute('userId')) {
2022-05-24 02:54:50 +12:00
throw new Exception('Invite does not belong to current user (' . $user->getAttribute('email') . ')', 401, Exception::TEAM_INVITE_MISMATCH);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($user->isEmpty()) {
$user = $dbForProject->getDocument('users', $userId); // Get user
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
if ($membership->getAttribute('userId') !== $user->getId()) {
2022-05-24 02:54:50 +12:00
throw new Exception('Invite does not belong to current user (' . $user->getAttribute('email') . ')', 401, Exception::TEAM_INVITE_MISMATCH);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
if ($membership->getAttribute('confirm') === true) {
throw new Exception('Membership already confirmed', 409);
}
2020-06-30 23:09:28 +12:00
$membership // Attach user to team
->setAttribute('joined', \time())
->setAttribute('confirm', true)
;
2019-05-09 18:54:39 +12:00
2022-08-12 01:19:05 +12:00
$user->setAttribute('emailVerification', true);
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
// Log user in
2020-08-12 02:28:51 +12:00
2022-05-24 02:54:50 +12:00
Authorization::setRole('user:' . $user->getId());
2021-07-17 22:04:43 +12:00
2021-02-15 06:28:54 +13:00
$detector = new Detector($request->getUserAgent('UNKNOWN'));
$record = $geodb->get($request->getIP());
2020-06-30 23:09:28 +12:00
$expiry = \time() + Auth::TOKEN_EXPIRATION_LOGIN_LONG;
$secret = Auth::tokenGenerator();
2021-02-15 06:28:54 +13:00
$session = new Document(array_merge([
'$id' => $dbForProject->getId(),
'userId' => $user->getId(),
'userInternalId' => $user->getInternalId(),
2021-02-20 01:12:47 +13:00
'provider' => Auth::SESSION_PROVIDER_EMAIL,
2021-02-19 23:02:02 +13:00
'providerUid' => $user->getAttribute('email'),
2020-11-13 00:54:16 +13:00
'secret' => Auth::hash($secret), // One way hash encryption to protect DB leak
2020-06-30 23:09:28 +12:00
'expire' => $expiry,
2020-07-04 03:14:51 +12:00
'userAgent' => $request->getUserAgent('UNKNOWN'),
2020-06-30 23:09:28 +12:00
'ip' => $request->getIP(),
2021-02-15 06:28:54 +13:00
'countryCode' => ($record) ? \strtolower($record['country']['iso_code']) : '--',
], $detector->getOS(), $detector->getClient(), $detector->getDevice()));
2020-08-12 02:28:51 +12:00
$session = $dbForProject->createDocument('sessions', $session
2022-05-24 02:54:50 +12:00
->setAttribute('$read', ['user:' . $user->getId()])
->setAttribute('$write', ['user:' . $user->getId()]));
2022-04-26 20:52:59 +12:00
$dbForProject->deleteCachedDocument('users', $user->getId());
2019-05-09 18:54:39 +12:00
2022-05-24 02:54:50 +12:00
Authorization::setRole('user:' . $userId);
2019-05-09 18:54:39 +12:00
$membership = $dbForProject->updateDocument('memberships', $membership->getId(), $membership);
2022-05-13 01:20:06 +12:00
2022-04-28 00:44:47 +12:00
$dbForProject->deleteCachedDocument('users', $user->getId());
2020-01-20 01:22:54 +13:00
2022-02-27 22:57:09 +13:00
$team = Authorization::skip(fn() => $dbForProject->updateDocument('teams', $team->getId(), $team->setAttribute('total', $team->getAttribute('total', 0) + 1)));
2019-05-09 18:54:39 +12:00
$events
->setParam('teamId', $team->getId())
->setParam('membershipId', $membership->getId())
2020-06-30 23:09:28 +12:00
;
2020-06-30 23:09:28 +12:00
if (!Config::getParam('domainVerification')) {
$response
2020-06-30 23:09:28 +12:00
->addHeader('X-Fallback-Cookies', \json_encode([Auth::$cookieName => Auth::encodeSession($user->getId(), $secret)]))
;
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
$response
2022-05-24 02:54:50 +12:00
->addCookie(Auth::$cookieName . '_legacy', Auth::encodeSession($user->getId(), $secret), $expiry, '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, null)
2020-07-01 18:35:57 +12:00
->addCookie(Auth::$cookieName, Auth::encodeSession($user->getId(), $secret), $expiry, '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, Config::getParam('cookieSamesite'))
2020-06-30 23:09:28 +12:00
;
2020-07-03 09:48:02 +12:00
2022-05-24 02:54:50 +12:00
$response->dynamic(
$membership
2022-05-13 01:20:06 +12:00
->setAttribute('teamName', $team->getAttribute('name'))
->setAttribute('userName', $user->getAttribute('name'))
2022-05-24 02:54:50 +12:00
->setAttribute('userEmail', $user->getAttribute('email')),
Response::MODEL_MEMBERSHIP
);
2020-12-27 05:48:43 +13:00
});
2019-05-09 18:54:39 +12:00
App::delete('/v1/teams/:teamId/memberships/:membershipId')
2019-05-09 18:54:39 +12:00
->desc('Delete Team Membership')
2020-06-26 06:32:12 +12:00
->groups(['api', 'teams'])
->label('event', 'teams.[teamId].memberships.[membershipId].delete')
2020-02-10 05:53:33 +13:00
->label('scope', 'teams.write')
2022-08-09 02:32:54 +12:00
->label('audits.resource', 'team/{request.teamId}')
2021-04-16 19:22:17 +12:00
->label('sdk.auth', [APP_AUTH_TYPE_SESSION, APP_AUTH_TYPE_KEY, APP_AUTH_TYPE_JWT])
2019-05-09 18:54:39 +12:00
->label('sdk.namespace', 'teams')
2020-01-31 05:18:46 +13:00
->label('sdk.method', 'deleteMembership')
2019-10-08 20:09:35 +13:00
->label('sdk.description', '/docs/references/teams/delete-team-membership.md')
2020-11-12 10:02:24 +13:00
->label('sdk.response.code', Response::STATUS_CODE_NOCONTENT)
->label('sdk.response.model', Response::MODEL_NONE)
->param('teamId', '', new UID(), 'Team ID.')
->param('membershipId', '', new UID(), 'Membership ID.')
2020-12-27 05:48:43 +13:00
->inject('response')
->inject('dbForProject')
2020-12-27 05:48:43 +13:00
->inject('events')
2022-08-09 02:32:54 +12:00
->action(function (string $teamId, string $membershipId, Response $response, Database $dbForProject, Event $events) {
2019-05-09 18:54:39 +12:00
$membership = $dbForProject->getDocument('memberships', $membershipId);
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($membership->isEmpty()) {
throw new Exception('Invite not found', 404, Exception::TEAM_INVITE_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2020-06-30 23:09:28 +12:00
if ($membership->getAttribute('teamId') !== $teamId) {
throw new Exception('Team IDs don\'t match', 404);
}
2019-05-09 18:54:39 +12:00
$user = $dbForProject->getDocument('users', $membership->getAttribute('userId'));
if ($user->isEmpty()) {
throw new Exception('User not found', 404, Exception::USER_NOT_FOUND);
}
$team = $dbForProject->getDocument('teams', $teamId);
2019-05-09 18:54:39 +12:00
2021-06-21 01:59:36 +12:00
if ($team->isEmpty()) {
throw new Exception('Team not found', 404, Exception::TEAM_NOT_FOUND);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
try {
$dbForProject->deleteDocument('memberships', $membership->getId());
} catch (AuthorizationException $exception) {
throw new Exception('Unauthorized permissions', 401, Exception::USER_UNAUTHORIZED);
} catch (\Exception $exception) {
throw new Exception('Failed to remove membership from DB', 500, Exception::GENERAL_SERVER_ERROR);
2020-06-30 23:09:28 +12:00
}
2019-05-09 18:54:39 +12:00
2022-04-28 00:44:47 +12:00
$dbForProject->deleteCachedDocument('users', $user->getId());
2020-06-30 23:09:28 +12:00
if ($membership->getAttribute('confirm')) { // Count only confirmed members
2022-02-27 22:57:09 +13:00
$team->setAttribute('total', \max($team->getAttribute('total', 0) - 1, 0));
Authorization::skip(fn() => $dbForProject->updateDocument('teams', $team->getId(), $team));
2019-05-09 18:54:39 +12:00
}
2020-06-30 23:09:28 +12:00
2020-12-07 11:14:57 +13:00
$events
->setParam('teamId', $team->getId())
->setParam('membershipId', $membership->getId())
->setPayload($response->output($membership, Response::MODEL_MEMBERSHIP))
2020-12-03 11:15:20 +13:00
;
2020-06-30 23:09:28 +12:00
$response->noContent();
2020-12-27 05:48:43 +13:00
});
2022-04-22 02:07:08 +12:00
App::get('/v1/teams/:teamId/logs')
->desc('List Team Logs')
->groups(['api', 'teams'])
->label('scope', 'teams.read')
->label('sdk.auth', [APP_AUTH_TYPE_ADMIN])
->label('sdk.namespace', 'teams')
->label('sdk.method', 'listLogs')
->label('sdk.description', '/docs/references/teams/get-team-logs.md')
->label('sdk.response.code', Response::STATUS_CODE_OK)
->label('sdk.response.type', Response::CONTENT_TYPE_JSON)
->label('sdk.response.model', Response::MODEL_LOG_LIST)
->param('teamId', null, new UID(), 'Team ID.')
->param('limit', 25, new Range(0, 100), 'Maximum number of logs to return in response. By default will return maximum 25 results. Maximum of 100 results allowed per request.', true)
->param('offset', 0, new Range(0, APP_LIMIT_COUNT), 'Offset value. The default value is 0. Use this value to manage pagination. [learn more about pagination](https://appwrite.io/docs/pagination)', true)
->inject('response')
->inject('dbForProject')
->inject('locale')
->inject('geodb')
->action(function ($teamId, $limit, $offset, $response, $dbForProject, $locale, $geodb) {
/** @var Appwrite\Utopia\Response $response */
/** @var Utopia\Database\Document $project */
/** @var Utopia\Database\Database $dbForProject */
/** @var Utopia\Locale\Locale $locale */
/** @var MaxMind\Db\Reader $geodb */
$team = $dbForProject->getDocument('teams', $teamId);
if ($team->isEmpty()) {
throw new Exception('Team not found', 404, Exception::TEAM_NOT_FOUND);
}
$audit = new Audit($dbForProject);
2022-05-24 02:54:50 +12:00
$resource = 'team/' . $team->getId();
2022-04-22 02:07:08 +12:00
$logs = $audit->getLogsByResource($resource, $limit, $offset);
$output = [];
foreach ($logs as $i => &$log) {
$log['userAgent'] = (!empty($log['userAgent'])) ? $log['userAgent'] : 'UNKNOWN';
$detector = new Detector($log['userAgent']);
$detector->skipBotDetection(); // OPTIONAL: If called, bot detection will completely be skipped (bots will be detected as regular devices then)
$os = $detector->getOS();
$client = $detector->getClient();
$device = $detector->getDevice();
$output[$i] = new Document([
'event' => $log['event'],
'userId' => $log['userId'],
'userEmail' => $log['data']['userEmail'] ?? null,
'userName' => $log['data']['userName'] ?? null,
'mode' => $log['data']['mode'] ?? null,
'ip' => $log['ip'],
'time' => $log['time'],
'osCode' => $os['osCode'],
'osName' => $os['osName'],
'osVersion' => $os['osVersion'],
'clientType' => $client['clientType'],
'clientCode' => $client['clientCode'],
'clientName' => $client['clientName'],
'clientVersion' => $client['clientVersion'],
'clientEngine' => $client['clientEngine'],
'clientEngineVersion' => $client['clientEngineVersion'],
'deviceName' => $device['deviceName'],
'deviceBrand' => $device['deviceBrand'],
'deviceModel' => $device['deviceModel']
]);
$record = $geodb->get($log['ip']);
if ($record) {
2022-05-24 02:54:50 +12:00
$output[$i]['countryCode'] = $locale->getText('countries.' . strtolower($record['country']['iso_code']), false) ? \strtolower($record['country']['iso_code']) : '--';
$output[$i]['countryName'] = $locale->getText('countries.' . strtolower($record['country']['iso_code']), $locale->getText('locale.country.unknown'));
2022-04-22 02:07:08 +12:00
} else {
$output[$i]['countryCode'] = '--';
$output[$i]['countryName'] = $locale->getText('locale.country.unknown');
}
}
$response->dynamic(new Document([
'total' => $audit->countLogsByResource($resource),
'logs' => $output,
]), Response::MODEL_LOG_LIST);
});