226 lines
No EOL
8.1 KiB
PHP
226 lines
No EOL
8.1 KiB
PHP
<?php
|
|
|
|
use Appwrite\Auth\Auth;
|
|
use Utopia\Database\Validator\Authorization;
|
|
use Utopia\App;
|
|
use Utopia\Exception;
|
|
use Utopia\Abuse\Abuse;
|
|
use Utopia\Abuse\Adapters\TimeLimit;
|
|
use Utopia\Storage\Device\Local;
|
|
use Utopia\Storage\Storage;
|
|
|
|
App::init(function ($utopia, $request, $response, $project, $user, $events, $audits, $usage, $deletes, $database, $dbForInternal, $mode) {
|
|
/** @var Utopia\App $utopia */
|
|
/** @var Utopia\Swoole\Request $request */
|
|
/** @var Appwrite\Utopia\Response $response */
|
|
/** @var Utopia\Database\Document $project */
|
|
/** @var Utopia\Database\Document $user */
|
|
/** @var Utopia\Registry\Registry $register */
|
|
/** @var Appwrite\Event\Event $events */
|
|
/** @var Appwrite\Event\Event $audits */
|
|
/** @var Appwrite\Stats\Stats $usage */
|
|
/** @var Appwrite\Event\Event $deletes */
|
|
/** @var Appwrite\Event\Event $database */
|
|
/** @var Appwrite\Event\Event $functions */
|
|
/** @var Utopia\Database\Database $dbForInternal */
|
|
|
|
Storage::setDevice('files', new Local(APP_STORAGE_UPLOADS.'/app-'.$project->getId()));
|
|
Storage::setDevice('functions', new Local(APP_STORAGE_FUNCTIONS.'/app-'.$project->getId()));
|
|
|
|
$route = $utopia->match($request);
|
|
|
|
if ($project->isEmpty() && $route->getLabel('abuse-limit', 0) > 0) { // Abuse limit requires an active project scope
|
|
throw new Exception('Missing or unknown project ID', 400);
|
|
}
|
|
|
|
/*
|
|
* Abuse Check
|
|
*/
|
|
$timeLimit = new TimeLimit($route->getLabel('abuse-key', 'url:{url},ip:{ip}'), $route->getLabel('abuse-limit', 0), $route->getLabel('abuse-time', 3600), $dbForInternal);
|
|
$timeLimit
|
|
->setParam('{userId}', $user->getId())
|
|
->setParam('{userAgent}', $request->getUserAgent(''))
|
|
->setParam('{ip}', $request->getIP())
|
|
->setParam('{url}', $request->getHostname().$route->getPath())
|
|
;
|
|
|
|
// TODO make sure we get array here
|
|
|
|
foreach ($request->getParams() as $key => $value) { // Set request params as potential abuse keys
|
|
if(!empty($value)) {
|
|
$timeLimit->setParam('{param-'.$key.'}', (\is_array($value)) ? \json_encode($value) : $value);
|
|
}
|
|
}
|
|
|
|
$abuse = new Abuse($timeLimit);
|
|
|
|
if ($timeLimit->limit()) {
|
|
$response
|
|
->addHeader('X-RateLimit-Limit', $timeLimit->limit())
|
|
->addHeader('X-RateLimit-Remaining', $timeLimit->remaining())
|
|
->addHeader('X-RateLimit-Reset', $timeLimit->time() + $route->getLabel('abuse-time', 3600))
|
|
;
|
|
}
|
|
|
|
$isPrivilegedUser = Auth::isPrivilegedUser(Authorization::$roles);
|
|
$isAppUser = Auth::isAppUser(Authorization::$roles);
|
|
|
|
if (($abuse->check() // Route is rate-limited
|
|
&& App::getEnv('_APP_OPTIONS_ABUSE', 'enabled') !== 'disabled') // Abuse is not disabled
|
|
&& (!$isAppUser && !$isPrivilegedUser)) // User is not an admin or API key
|
|
{
|
|
throw new Exception('Too many requests', 429);
|
|
}
|
|
|
|
/*
|
|
* Background Jobs
|
|
*/
|
|
$events
|
|
->setParam('projectId', $project->getId())
|
|
->setParam('webhooks', $project->getAttribute('webhooks', []))
|
|
->setParam('userId', $user->getId())
|
|
->setParam('event', $route->getLabel('event', ''))
|
|
->setParam('eventData', [])
|
|
->setParam('functionId', null)
|
|
->setParam('executionId', null)
|
|
->setParam('trigger', 'event')
|
|
;
|
|
|
|
$audits
|
|
->setParam('projectId', $project->getId())
|
|
->setParam('userId', $user->getId())
|
|
->setParam('userEmail', $user->getAttribute('email'))
|
|
->setParam('userName', $user->getAttribute('name'))
|
|
->setParam('mode', $mode)
|
|
->setParam('event', '')
|
|
->setParam('resource', '')
|
|
->setParam('userAgent', $request->getUserAgent(''))
|
|
->setParam('ip', $request->getIP())
|
|
->setParam('data', [])
|
|
;
|
|
|
|
$usage
|
|
->setParam('projectId', $project->getId())
|
|
->setParam('httpRequest', 1)
|
|
->setParam('httpUrl', $request->getHostname().$request->getURI())
|
|
->setParam('httpMethod', $request->getMethod())
|
|
->setParam('httpPath', $route->getPath())
|
|
->setParam('networkRequestSize', 0)
|
|
->setParam('networkResponseSize', 0)
|
|
->setParam('storage', 0)
|
|
;
|
|
|
|
$deletes
|
|
->setParam('projectId', $project->getId())
|
|
;
|
|
|
|
$database
|
|
->setParam('projectId', $project->getId())
|
|
;
|
|
}, ['utopia', 'request', 'response', 'project', 'user', 'events', 'audits', 'usage', 'deletes', 'database', 'dbForInternal', 'mode'], 'api');
|
|
|
|
App::init(function ($utopia, $request, $project) {
|
|
/** @var Utopia\App $utopia */
|
|
/** @var Utopia\Swoole\Request $request */
|
|
/** @var Utopia\Database\Document $project */
|
|
|
|
$route = $utopia->match($request);
|
|
|
|
$isPrivilegedUser = Auth::isPrivilegedUser(Authorization::$roles);
|
|
$isAppUser = Auth::isAppUser(Authorization::$roles);
|
|
|
|
if($isAppUser || $isPrivilegedUser) { // Skip limits for app and console devs
|
|
return;
|
|
}
|
|
|
|
$auths = $project->getAttribute('auths', []);
|
|
switch ($route->getLabel('auth.type', '')) {
|
|
case 'emailPassword':
|
|
if(($auths['emailPassword'] ?? true) === false) {
|
|
throw new Exception('Email / Password authentication is disabled for this project', 501);
|
|
}
|
|
break;
|
|
|
|
case 'anonymous':
|
|
if(($auths['anonymous'] ?? true) === false) {
|
|
throw new Exception('Anonymous authentication is disabled for this project', 501);
|
|
}
|
|
break;
|
|
|
|
case 'invites':
|
|
if(($auths['invites'] ?? true) === false) {
|
|
throw new Exception('Invites authentication is disabled for this project', 501);
|
|
}
|
|
break;
|
|
|
|
case 'jwt':
|
|
if(($auths['JWT'] ?? true) === false) {
|
|
throw new Exception('JWT authentication is disabled for this project', 501);
|
|
}
|
|
break;
|
|
|
|
default:
|
|
throw new Exception('Unsupported authentication route');
|
|
break;
|
|
}
|
|
|
|
}, ['utopia', 'request', 'project'], 'auth');
|
|
|
|
App::shutdown(function ($utopia, $request, $response, $project, $register, $events, $audits, $usage, $deletes, $database, $mode) {
|
|
/** @var Utopia\App $utopia */
|
|
/** @var Utopia\Swoole\Request $request */
|
|
/** @var Appwrite\Utopia\Response $response */
|
|
/** @var Utopia\Database\Document $project */
|
|
/** @var Appwrite\Event\Event $events */
|
|
/** @var Appwrite\Event\Event $audits */
|
|
/** @var Appwrite\Stats\Stats $usage */
|
|
/** @var Appwrite\Event\Event $deletes */
|
|
/** @var Appwrite\Event\Event $database */
|
|
/** @var Appwrite\Event\Event $functions */
|
|
/** @var bool $mode */
|
|
|
|
if (!empty($events->getParam('event'))) {
|
|
if(empty($events->getParam('eventData'))) {
|
|
$events->setParam('eventData', $response->getPayload());
|
|
}
|
|
|
|
$webhooks = clone $events;
|
|
$functions = clone $events;
|
|
|
|
$webhooks
|
|
->setQueue('v1-webhooks')
|
|
->setClass('WebhooksV1')
|
|
->trigger();
|
|
|
|
$functions
|
|
->setQueue('v1-functions')
|
|
->setClass('FunctionsV1')
|
|
->trigger();
|
|
}
|
|
|
|
if (!empty($audits->getParam('event'))) {
|
|
$audits->trigger();
|
|
}
|
|
|
|
if (!empty($deletes->getParam('type')) && !empty($deletes->getParam('document'))) {
|
|
$deletes->trigger();
|
|
}
|
|
|
|
if (!empty($database->getParam('type')) && !empty($database->getParam('document'))) {
|
|
$database->trigger();
|
|
}
|
|
|
|
$route = $utopia->match($request);
|
|
if (App::getEnv('_APP_USAGE_STATS', 'enabled') == 'enabled'
|
|
&& $project->getId()
|
|
&& $mode !== APP_MODE_ADMIN // TODO: add check to make sure user is admin
|
|
&& !empty($route->getLabel('sdk.namespace', null))) { // Don't calculate console usage on admin mode
|
|
|
|
$usage
|
|
->setParam('networkRequestSize', $request->getSize() + $usage->getParam('storage'))
|
|
->setParam('networkResponseSize', $response->getSize())
|
|
->submit()
|
|
;
|
|
}
|
|
|
|
}, ['utopia', 'request', 'response', 'project', 'register', 'events', 'audits', 'usage', 'deletes', 'database', 'mode'], 'api'); |