$match) { $find = $matches[0][$pos]; $parts = explode('.', $match); if (count($parts) !== 2) { throw new Exception('Too less or too many parts', 400, Exception::GENERAL_ARGUMENT_INVALID); } $namespace = $parts[0] ?? ''; $replace = $parts[1] ?? ''; $params = match ($namespace) { 'user' => (array)$user, 'request' => $requestParams, default => $responsePayload, }; if (array_key_exists($replace, $params)) { $label = \str_replace($find, $params[$replace], $label); } } return $label; }; $databaseListener = function (string $event, Document $document, Stats $usage) { $multiplier = 1; if ($event === Database::EVENT_DOCUMENT_DELETE) { $multiplier = -1; } $collection = $document->getCollection(); switch ($collection) { case 'users': $usage->setParam('users.{scope}.count.total', 1 * $multiplier); break; case 'databases': $usage->setParam('databases.{scope}.count.total', 1 * $multiplier); break; case 'buckets': $usage->setParam('buckets.{scope}.count.total', 1 * $multiplier); break; case 'deployments': $usage->setParam('deployments.{scope}.storage.size', $document->getAttribute('size') * $multiplier); break; default: if (strpos($collection, 'bucket_') === 0) { $usage ->setParam('bucketId', $document->getAttribute('bucketId')) ->setParam('files.{scope}.storage.size', $document->getAttribute('sizeOriginal') * $multiplier) ->setParam('files.{scope}.count.total', 1 * $multiplier); } elseif (strpos($collection, 'database_') === 0) { $usage ->setParam('databaseId', $document->getAttribute('databaseId')); if (strpos($collection, '_collection_') !== false) { $usage ->setParam('collectionId', $document->getAttribute('$collectionId')) ->setParam('documents.{scope}.count.total', 1 * $multiplier); } else { $usage->setParam('collections.{scope}.count.total', 1 * $multiplier); } } break; } }; App::init() ->groups(['api']) ->inject('utopia') ->inject('request') ->inject('response') ->inject('project') ->inject('user') ->inject('events') ->inject('audits') ->inject('mails') ->inject('usage') ->inject('deletes') ->inject('database') ->inject('dbForProject') ->inject('mode') ->action(function (App $utopia, Request $request, Response $response, Document $project, Document $user, Event $events, Audit $audits, Mail $mails, Stats $usage, Delete $deletes, EventDatabase $database, Database $dbForProject, string $mode) use ($databaseListener) { $route = $utopia->match($request); if ($project->isEmpty() && $route->getLabel('abuse-limit', 0) > 0) { // Abuse limit requires an active project scope throw new Exception(Exception::PROJECT_UNKNOWN); } /* * Abuse Check */ $abuseKeyLabel = $route->getLabel('abuse-key', 'url:{url},ip:{ip}'); $timeLimitArray = []; $abuseKeyLabel = (!is_array($abuseKeyLabel)) ? [$abuseKeyLabel] : $abuseKeyLabel; foreach ($abuseKeyLabel as $abuseKey) { $timeLimit = new TimeLimit($abuseKey, $route->getLabel('abuse-limit', 0), $route->getLabel('abuse-time', 3600), $dbForProject); $timeLimit ->setParam('{userId}', $user->getId()) ->setParam('{userAgent}', $request->getUserAgent('')) ->setParam('{ip}', $request->getIP()) ->setParam('{url}', $request->getHostname() . $route->getPath()) ->setParam('{method}', $request->getMethod()); $timeLimitArray[] = $timeLimit; } $closestLimit = null; $roles = Authorization::getRoles(); $isPrivilegedUser = Auth::isPrivilegedUser($roles); $isAppUser = Auth::isAppUser($roles); foreach ($timeLimitArray as $timeLimit) { foreach ($request->getParams() as $key => $value) { // Set request params as potential abuse keys if (!empty($value)) { $timeLimit->setParam('{param-' . $key . '}', (\is_array($value)) ? \json_encode($value) : $value); } } $abuse = new Abuse($timeLimit); $remaining = $timeLimit->remaining(); $limit = $timeLimit->limit(); $time = (new \DateTime($timeLimit->time()))->getTimestamp() + $route->getLabel('abuse-time', 3600); if ($limit && ($remaining < $closestLimit || is_null($closestLimit))) { $closestLimit = $remaining; $response ->addHeader('X-RateLimit-Limit', $limit) ->addHeader('X-RateLimit-Remaining', $remaining) ->addHeader('X-RateLimit-Reset', $time) ; } $enabled = App::getEnv('_APP_OPTIONS_ABUSE', 'enabled') !== 'disabled'; if ( $enabled // Abuse is enabled && !$isAppUser // User is not API key && !$isPrivilegedUser // User is not an admin && $abuse->check() // Route is rate-limited ) { throw new Exception(Exception::GENERAL_RATE_LIMIT_EXCEEDED); } } /* * Background Jobs */ $events ->setEvent($route->getLabel('event', '')) ->setProject($project) ->setUser($user); $mails ->setProject($project) ->setUser($user); $audits ->setMode($mode) ->setUserAgent($request->getUserAgent('')) ->setIP($request->getIP()) ->setEvent($route->getLabel('audits.event', '')) ->setProject($project) ->setUser($user); $usage ->setParam('projectInternalId', $project->getInternalId()) ->setParam('projectId', $project->getId()) ->setParam('project.{scope}.network.requests', 1) ->setParam('httpMethod', $request->getMethod()) ->setParam('project.{scope}.network.inbound', 0) ->setParam('project.{scope}.network.outbound', 0); $deletes->setProject($project); $database->setProject($project); $dbForProject->on(Database::EVENT_DOCUMENT_CREATE, fn ($event, Document $document) => $databaseListener($event, $document, $usage)); $dbForProject->on(Database::EVENT_DOCUMENT_DELETE, fn ($event, Document $document) => $databaseListener($event, $document, $usage)); $useCache = $route->getLabel('cache', false); if ($useCache) { $key = md5($request->getURI() . implode('*', $request->getParams())) . '*' . APP_CACHE_BUSTER; $cache = new Cache( new Filesystem(APP_STORAGE_CACHE . DIRECTORY_SEPARATOR . 'app-' . $project->getId()) ); $timestamp = 60 * 60 * 24 * 30; $data = $cache->load($key, $timestamp); if (!empty($data)) { $data = json_decode($data, true); $parts = explode('/', $data['resourceType']); $type = $parts[0] ?? null; if ($type === 'bucket') { $bucketId = $parts[1] ?? null; $bucket = Authorization::skip(fn () => $dbForProject->getDocument('buckets', $bucketId)); if ($bucket->isEmpty() || (!$bucket->getAttribute('enabled') && $mode !== APP_MODE_ADMIN)) { throw new Exception(Exception::STORAGE_BUCKET_NOT_FOUND); } $fileSecurity = $bucket->getAttribute('fileSecurity', false); $validator = new Authorization(Database::PERMISSION_READ); $valid = $validator->isValid($bucket->getRead()); if (!$fileSecurity && !$valid) { throw new Exception(Exception::USER_UNAUTHORIZED); } $parts = explode('/', $data['resource']); $fileId = $parts[1] ?? null; if ($fileSecurity && !$valid) { $file = $dbForProject->getDocument('bucket_' . $bucket->getInternalId(), $fileId); } else { $file = Authorization::skip(fn() => $dbForProject->getDocument('bucket_' . $bucket->getInternalId(), $fileId)); } if ($file->isEmpty()) { throw new Exception(Exception::STORAGE_FILE_NOT_FOUND); } } $response ->addHeader('Expires', \date('D, d M Y H:i:s', \time() + $timestamp) . ' GMT') ->addHeader('X-Appwrite-Cache', 'hit') ->setContentType($data['contentType']) ->send(base64_decode($data['payload'])) ; $route->setIsActive(false); } else { $response->addHeader('X-Appwrite-Cache', 'miss'); } } }); App::init() ->groups(['auth']) ->inject('utopia') ->inject('request') ->inject('project') ->action(function (App $utopia, Request $request, Document $project) { $route = $utopia->match($request); $isPrivilegedUser = Auth::isPrivilegedUser(Authorization::getRoles()); $isAppUser = Auth::isAppUser(Authorization::getRoles()); if ($isAppUser || $isPrivilegedUser) { // Skip limits for app and console devs return; } $auths = $project->getAttribute('auths', []); switch ($route->getLabel('auth.type', '')) { case 'emailPassword': if (($auths['emailPassword'] ?? true) === false) { throw new Exception(Exception::USER_AUTH_METHOD_UNSUPPORTED, 'Email / Password authentication is disabled for this project'); } break; case 'magic-url': if ($project->getAttribute('usersAuthMagicURL', true) === false) { throw new Exception(Exception::USER_AUTH_METHOD_UNSUPPORTED, 'Magic URL authentication is disabled for this project'); } break; case 'anonymous': if (($auths['anonymous'] ?? true) === false) { throw new Exception(Exception::USER_AUTH_METHOD_UNSUPPORTED, 'Anonymous authentication is disabled for this project'); } break; case 'invites': if (($auths['invites'] ?? true) === false) { throw new Exception(Exception::USER_AUTH_METHOD_UNSUPPORTED, 'Invites authentication is disabled for this project'); } break; case 'jwt': if (($auths['JWT'] ?? true) === false) { throw new Exception(Exception::USER_AUTH_METHOD_UNSUPPORTED, 'JWT authentication is disabled for this project'); } break; default: throw new Exception(Exception::USER_AUTH_METHOD_UNSUPPORTED, 'Unsupported authentication route'); break; } }); App::shutdown() ->groups(['api']) ->inject('utopia') ->inject('request') ->inject('response') ->inject('project') ->inject('events') ->inject('audits') ->inject('usage') ->inject('deletes') ->inject('database') ->inject('mode') ->inject('dbForProject') ->action(function (App $utopia, Request $request, Response $response, Document $project, Event $events, Audit $audits, Stats $usage, Delete $deletes, EventDatabase $database, string $mode, Database $dbForProject) use ($parseLabel) { $responsePayload = $response->getPayload(); if (!empty($events->getEvent())) { if (empty($events->getPayload())) { $events->setPayload($responsePayload); } /** * Trigger functions. */ $events ->setClass(Event::FUNCTIONS_CLASS_NAME) ->setQueue(Event::FUNCTIONS_QUEUE_NAME) ->trigger(); /** * Trigger webhooks. */ $events ->setClass(Event::WEBHOOK_CLASS_NAME) ->setQueue(Event::WEBHOOK_QUEUE_NAME) ->trigger(); /** * Trigger realtime. */ if ($project->getId() !== 'console') { $allEvents = Event::generateEvents($events->getEvent(), $events->getParams()); $payload = new Document($events->getPayload()); $db = $events->getContext('database'); $collection = $events->getContext('collection'); $bucket = $events->getContext('bucket'); $target = Realtime::fromPayload( // Pass first, most verbose event pattern event: $allEvents[0], payload: $payload, project: $project, database: $db, collection: $collection, bucket: $bucket, ); Realtime::send( projectId: $target['projectId'] ?? $project->getId(), payload: $events->getPayload(), events: $allEvents, channels: $target['channels'], roles: $target['roles'], options: [ 'permissionsChanged' => $target['permissionsChanged'], 'userId' => $events->getParam('userId') ] ); } } $route = $utopia->match($request); $requestParams = $route->getParamsValues(); $user = $audits->getUser(); /** * Audit labels */ $pattern = $route->getLabel('audits.resource', null); if (!empty($pattern)) { $resource = $parseLabel($pattern, $responsePayload, $requestParams, $user); if (!empty($resource) && $resource !== $pattern) { $audits->setResource($resource); } } $pattern = $route->getLabel('audits.userId', null); if (!empty($pattern)) { $userId = $parseLabel($pattern, $responsePayload, $requestParams, $user); $user = $dbForProject->getDocument('users', $userId); $audits->setUser($user); } if (!empty($audits->getResource()) && !empty($audits->getUser()->getId())) { /** * audits.payload is switched to default true * in order to auto audit payload for all endpoints */ $pattern = $route->getLabel('audits.payload', true); if (!empty($pattern)) { $audits->setPayload($responsePayload); } foreach ($events->getParams() as $key => $value) { $audits->setParam($key, $value); } $audits->trigger(); } if (!empty($deletes->getType())) { $deletes->trigger(); } if (!empty($database->getType())) { $database->trigger(); } /** * Cache label */ $useCache = $route->getLabel('cache', false); if ($useCache) { $resource = $resourceType = null; $data = $response->getPayload(); if (!empty($data['payload'])) { $pattern = $route->getLabel('cache.resource', null); if (!empty($pattern)) { $resource = $parseLabel($pattern, $responsePayload, $requestParams, $user); } $pattern = $route->getLabel('cache.resourceType', null); if (!empty($pattern)) { $resourceType = $parseLabel($pattern, $responsePayload, $requestParams, $user); } $key = md5($request->getURI() . implode('*', $request->getParams())) . '*' . APP_CACHE_BUSTER; $data = json_encode([ 'resourceType' => $resourceType, 'resource' => $resource, 'contentType' => $response->getContentType(), 'payload' => base64_encode($data['payload']), ]) ; $signature = md5($data); $cacheLog = $dbForProject->getDocument('cache', $key); $accessedAt = $cacheLog->getAttribute('accessedAt', ''); $now = DateTime::now(); if ($cacheLog->isEmpty()) { Authorization::skip(fn () => $dbForProject->createDocument('cache', new Document([ '$id' => $key, 'resource' => $resource, 'accessedAt' => $now, 'signature' => $signature, ]))); } elseif (DateTime::formatTz(DateTime::addSeconds(new \DateTime(), -APP_CACHE_UPDATE)) > $accessedAt) { $cacheLog->setAttribute('accessedAt', $now); Authorization::skip(fn () => $dbForProject->updateDocument('cache', $cacheLog->getId(), $cacheLog)); } if ($signature !== $cacheLog->getAttribute('signature')) { $cache = new Cache( new Filesystem(APP_STORAGE_CACHE . DIRECTORY_SEPARATOR . 'app-' . $project->getId()) ); $cache->save($key, $data); } } } if ( App::getEnv('_APP_USAGE_STATS', 'enabled') == 'enabled' && $project->getId() && !empty($route->getLabel('sdk.namespace', null)) ) { // Don't calculate console usage on admin mode $metric = $route->getLabel('usage.metric', ''); $usageParams = $route->getLabel('usage.params', []); if (!empty($metric)) { $usage->setParam($metric, 1); foreach ($usageParams as $param) { $param = $parseLabel($param, $responsePayload, $requestParams, $user); $parts = explode(':', $param); if (count($parts) != 2) { throw new Exception(Exception::GENERAL_SERVER_ERROR, 'Usage params not properly set'); } $usage->setParam($parts[0], $parts[1]); } } $fileSize = 0; $file = $request->getFiles('file'); if (!empty($file)) { $fileSize = (\is_array($file['size']) && isset($file['size'][0])) ? $file['size'][0] : $file['size']; } $usage ->setParam('project.{scope}.network.inbound', $request->getSize() + $fileSize) ->setParam('project.{scope}.network.outbound', $response->getSize()) ->submit(); } });