appwrite/app/controllers/api/account.php

4984 lines
210 KiB
PHP
Raw Normal View History

2019-05-09 06:54:39 +00:00
<?php
2021-06-12 19:37:19 +00:00
use Ahc\Jwt\JWT;
use Appwrite\Auth\Auth;
2023-06-22 13:35:49 +00:00
use Appwrite\Auth\MFA\Challenge;
2024-03-01 02:07:58 +00:00
use Appwrite\Auth\MFA\Type;
use Appwrite\Auth\MFA\Type\TOTP;
use Appwrite\Auth\OAuth2\Exception as OAuth2Exception;
2024-03-06 17:34:21 +00:00
use Appwrite\Auth\Phrase;
use Appwrite\Auth\Validator\Password;
2024-03-06 17:34:21 +00:00
use Appwrite\Auth\Validator\PasswordDictionary;
use Appwrite\Auth\Validator\PasswordHistory;
use Appwrite\Auth\Validator\PersonalData;
use Appwrite\Auth\Validator\Phone;
2021-02-14 17:28:54 +00:00
use Appwrite\Detector\Detector;
2024-03-06 17:34:21 +00:00
use Appwrite\Event\Delete;
2022-05-18 16:14:21 +00:00
use Appwrite\Event\Event;
use Appwrite\Event\Mail;
2024-03-06 17:34:21 +00:00
use Appwrite\Event\Messaging;
2025-01-30 04:53:53 +00:00
use Appwrite\Event\StatsUsage;
2022-08-11 23:53:52 +00:00
use Appwrite\Extend\Exception;
2024-03-06 17:34:21 +00:00
use Appwrite\Hooks\Hooks;
2021-05-06 22:31:05 +00:00
use Appwrite\Network\Validator\Email;
2025-04-14 11:56:42 +00:00
use Appwrite\Network\Validator\Redirect;
2021-08-05 05:06:38 +00:00
use Appwrite\OpenSSL\OpenSSL;
2025-01-17 04:31:39 +00:00
use Appwrite\SDK\AuthType;
use Appwrite\SDK\ContentType;
use Appwrite\SDK\Method;
use Appwrite\SDK\MethodType;
use Appwrite\SDK\Response as SDKResponse;
2021-08-05 05:06:38 +00:00
use Appwrite\Template\Template;
use Appwrite\URL\URL as URLParser;
2022-08-11 23:53:52 +00:00
use Appwrite\Utopia\Database\Validator\CustomId;
use Appwrite\Utopia\Database\Validator\Queries\Identities;
2022-05-18 16:14:21 +00:00
use Appwrite\Utopia\Request;
2021-08-05 05:06:38 +00:00
use Appwrite\Utopia\Response;
use libphonenumber\PhoneNumberUtil;
2022-05-18 16:14:21 +00:00
use MaxMind\Db\Reader;
use Utopia\Abuse\Abuse;
2021-05-06 22:31:05 +00:00
use Utopia\App;
2022-05-25 13:49:32 +00:00
use Utopia\Audit\Audit as EventAudit;
2021-08-05 05:06:38 +00:00
use Utopia\Config\Config;
2022-05-18 16:14:21 +00:00
use Utopia\Database\Database;
use Utopia\Database\DateTime;
2024-03-06 17:34:21 +00:00
use Utopia\Database\Document;
2021-05-06 22:31:05 +00:00
use Utopia\Database\Exception\Duplicate;
use Utopia\Database\Exception\Order as OrderException;
2024-03-06 17:34:21 +00:00
use Utopia\Database\Exception\Query as QueryException;
2023-05-29 13:58:45 +00:00
use Utopia\Database\Helpers\ID;
use Utopia\Database\Helpers\Permission;
use Utopia\Database\Helpers\Role;
2024-03-06 17:34:21 +00:00
use Utopia\Database\Query;
2021-05-06 22:31:05 +00:00
use Utopia\Database\Validator\Authorization;
2024-03-06 17:34:21 +00:00
use Utopia\Database\Validator\Queries;
use Utopia\Database\Validator\Query\Cursor;
2024-03-06 17:34:21 +00:00
use Utopia\Database\Validator\Query\Limit;
use Utopia\Database\Validator\Query\Offset;
2021-05-06 22:31:05 +00:00
use Utopia\Database\Validator\UID;
2022-05-18 16:14:21 +00:00
use Utopia\Locale\Locale;
2024-04-01 11:08:46 +00:00
use Utopia\System\System;
2021-08-05 05:06:38 +00:00
use Utopia\Validator\ArrayList;
use Utopia\Validator\Assoc;
2024-03-06 17:34:21 +00:00
use Utopia\Validator\Boolean;
2021-08-05 05:06:38 +00:00
use Utopia\Validator\Text;
2024-03-06 17:34:21 +00:00
use Utopia\Validator\URL;
2021-08-05 05:06:38 +00:00
use Utopia\Validator\WhiteList;
2019-05-09 06:54:39 +00:00
2024-08-12 19:59:42 +00:00
$oauthDefaultSuccess = '/console/auth/oauth2/success';
$oauthDefaultFailure = '/console/auth/oauth2/failure';
2020-04-08 13:38:36 +00:00
2024-06-26 14:46:12 +00:00
function sendSessionAlert(Locale $locale, Document $user, Document $project, Document $session, Mail $queueForMails)
2024-06-24 13:12:09 +00:00
{
$subject = $locale->getText("emails.sessionAlert.subject");
2025-07-23 16:34:25 +00:00
$preview = $locale->getText("emails.sessionAlert.preview");
2024-06-24 13:12:09 +00:00
$customTemplate = $project->getAttribute('templates', [])['email.sessionAlert-' . $locale->default] ?? [];
$message = Template::fromFile(__DIR__ . '/../../config/locale/templates/email-session-alert.tpl');
$message
->setParam('{{hello}}', $locale->getText("emails.sessionAlert.hello"))
->setParam('{{body}}', $locale->getText("emails.sessionAlert.body"))
2024-06-26 08:42:01 +00:00
->setParam('{{listDevice}}', $locale->getText("emails.sessionAlert.listDevice"))
->setParam('{{listIpAddress}}', $locale->getText("emails.sessionAlert.listIpAddress"))
->setParam('{{listCountry}}', $locale->getText("emails.sessionAlert.listCountry"))
2024-06-24 13:12:09 +00:00
->setParam('{{footer}}', $locale->getText("emails.sessionAlert.footer"))
2024-06-26 14:46:12 +00:00
->setParam('{{thanks}}', $locale->getText("emails.sessionAlert.thanks"))
2024-06-24 13:12:09 +00:00
->setParam('{{signature}}', $locale->getText("emails.sessionAlert.signature"));
$body = $message->render();
$smtp = $project->getAttribute('smtp', []);
$smtpEnabled = $smtp['enabled'] ?? false;
$senderEmail = System::getEnv('_APP_SYSTEM_EMAIL_ADDRESS', APP_EMAIL_TEAM);
$senderName = System::getEnv('_APP_SYSTEM_EMAIL_NAME', APP_NAME . ' Server');
$replyTo = "";
if ($smtpEnabled) {
if (!empty($smtp['senderEmail'])) {
$senderEmail = $smtp['senderEmail'];
}
if (!empty($smtp['senderName'])) {
$senderName = $smtp['senderName'];
}
if (!empty($smtp['replyTo'])) {
$replyTo = $smtp['replyTo'];
}
$queueForMails
->setSmtpHost($smtp['host'] ?? '')
->setSmtpPort($smtp['port'] ?? '')
->setSmtpUsername($smtp['username'] ?? '')
->setSmtpPassword($smtp['password'] ?? '')
->setSmtpSecure($smtp['secure'] ?? '');
if (!empty($customTemplate)) {
if (!empty($customTemplate['senderEmail'])) {
$senderEmail = $customTemplate['senderEmail'];
}
if (!empty($customTemplate['senderName'])) {
$senderName = $customTemplate['senderName'];
}
if (!empty($customTemplate['replyTo'])) {
$replyTo = $customTemplate['replyTo'];
}
$body = $customTemplate['message'] ?? '';
$subject = $customTemplate['subject'] ?? $subject;
}
$queueForMails
->setSmtpReplyTo($replyTo)
->setSmtpSenderEmail($senderEmail)
->setSmtpSenderName($senderName);
}
2025-07-25 09:00:03 +00:00
// session alerts should always have a client name!
$clientName = $session->getAttribute('clientName');
if (empty($clientName)) {
// fallback to the user agent and then unknown!
$userAgent = $session->getAttribute('userAgent');
$clientName = !empty($userAgent) ? $userAgent : 'UNKNOWN';
$session->setAttribute('clientName', $clientName);
}
2024-06-24 13:12:09 +00:00
$emailVariables = [
'direction' => $locale->getText('settings.direction'),
2024-09-05 14:33:16 +00:00
'date' => (new \DateTime())->format('F j'),
'year' => (new \DateTime())->format('YYYY'),
'time' => (new \DateTime())->format('H:i:s'),
2024-06-24 13:12:09 +00:00
'user' => $user->getAttribute('name'),
'project' => $project->getAttribute('name'),
2024-06-26 14:46:12 +00:00
'device' => $session->getAttribute('clientName'),
'ipAddress' => $session->getAttribute('ip'),
'country' => $locale->getText('countries.' . $session->getAttribute('countryCode'), $locale->getText('locale.country.unknown')),
2024-06-24 13:12:09 +00:00
];
$email = $user->getAttribute('email');
$queueForMails
->setSubject($subject)
2025-07-23 16:34:25 +00:00
->setPreview($preview)
2024-06-24 13:12:09 +00:00
->setBody($body)
->setVariables($emailVariables)
->setRecipient($email)
->trigger();
};
$createSession = function (string $userId, string $secret, Request $request, Response $response, Document $user, Database $dbForProject, Document $project, Locale $locale, Reader $geodb, Event $queueForEvents, Mail $queueForMails) {
2024-03-06 18:07:58 +00:00
/** @var Utopia\Database\Document $user */
$userFromRequest = Authorization::skip(fn () => $dbForProject->getDocument('users', $userId));
if ($userFromRequest->isEmpty()) {
throw new Exception(Exception::USER_INVALID_TOKEN);
}
$verifiedToken = Auth::tokenVerify($userFromRequest->getAttribute('tokens', []), null, $secret);
if (!$verifiedToken) {
throw new Exception(Exception::USER_INVALID_TOKEN);
}
$user->setAttributes($userFromRequest->getArrayCopy());
$duration = $project->getAttribute('auths', [])['duration'] ?? Auth::TOKEN_EXPIRATION_LOGIN_LONG;
$detector = new Detector($request->getUserAgent('UNKNOWN'));
$record = $geodb->get($request->getIP());
$sessionSecret = Auth::tokenGenerator(Auth::TOKEN_LENGTH_SESSION);
$factor = (match ($verifiedToken->getAttribute('type')) {
Auth::TOKEN_TYPE_MAGIC_URL,
Auth::TOKEN_TYPE_OAUTH2,
Auth::TOKEN_TYPE_EMAIL => Type::EMAIL,
Auth::TOKEN_TYPE_PHONE => Type::PHONE,
2024-03-06 18:07:58 +00:00
Auth::TOKEN_TYPE_GENERIC => 'token',
default => throw new Exception(Exception::USER_INVALID_TOKEN)
});
$session = new Document(array_merge(
[
'$id' => ID::unique(),
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
2024-03-06 18:07:58 +00:00
'provider' => Auth::getSessionProviderByTokenType($verifiedToken->getAttribute('type')),
'secret' => Auth::hash($sessionSecret), // One way hash encryption to protect DB leak
'userAgent' => $request->getUserAgent('UNKNOWN'),
'ip' => $request->getIP(),
'factors' => [$factor],
'countryCode' => ($record) ? \strtolower($record['country']['iso_code']) : '--',
'expire' => DateTime::addSeconds(new \DateTime(), $duration)
],
$detector->getOS(),
$detector->getClient(),
$detector->getDevice()
));
Authorization::setRole(Role::user($user->getId())->toString());
$session = $dbForProject->createDocument('sessions', $session
->setAttribute('$permissions', [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]));
Authorization::skip(fn () => $dbForProject->deleteDocument('tokens', $verifiedToken->getId()));
$dbForProject->purgeCachedDocument('users', $user->getId());
2024-05-07 09:01:57 +00:00
// Magic URL + Email OTP
if ($verifiedToken->getAttribute('type') === Auth::TOKEN_TYPE_MAGIC_URL || $verifiedToken->getAttribute('type') === Auth::TOKEN_TYPE_EMAIL) {
2024-03-06 18:07:58 +00:00
$user->setAttribute('emailVerification', true);
}
if ($verifiedToken->getAttribute('type') === Auth::TOKEN_TYPE_PHONE) {
$user->setAttribute('phoneVerification', true);
}
try {
$dbForProject->updateDocument('users', $user->getId(), $user);
} catch (\Throwable $th) {
throw new Exception(Exception::GENERAL_SERVER_ERROR, 'Failed saving user to DB');
}
2024-08-17 11:01:10 +00:00
$isAllowedTokenType = match ($verifiedToken->getAttribute('type')) {
Auth::TOKEN_TYPE_MAGIC_URL,
Auth::TOKEN_TYPE_EMAIL => false,
default => true
};
$hasUserEmail = $user->getAttribute('email', false) !== false;
$isSessionAlertsEnabled = $project->getAttribute('auths', [])['sessionAlerts'] ?? false;
$isNotFirstSession = $dbForProject->count('sessions', [
Query::equal('userId', [$user->getId()]),
]) !== 1;
if ($isAllowedTokenType && $hasUserEmail && $isSessionAlertsEnabled && $isNotFirstSession) {
sendSessionAlert($locale, $user, $project, $session, $queueForMails);
2024-06-24 13:12:09 +00:00
}
2024-03-06 18:07:58 +00:00
$queueForEvents
->setParam('userId', $user->getId())
->setParam('sessionId', $session->getId());
if (!Config::getParam('domainVerification')) {
$response->addHeader('X-Fallback-Cookies', \json_encode([Auth::$cookieName => Auth::encodeSession($user->getId(), $sessionSecret)]));
}
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), $duration));
$protocol = $request->getProtocol();
$response
->addCookie(Auth::$cookieName . '_legacy', Auth::encodeSession($user->getId(), $sessionSecret), (new \DateTime($expire))->getTimestamp(), '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, null)
->addCookie(Auth::$cookieName, Auth::encodeSession($user->getId(), $sessionSecret), (new \DateTime($expire))->getTimestamp(), '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, Config::getParam('cookieSamesite'))
->setStatusCode(Response::STATUS_CODE_CREATED);
$countryName = $locale->getText('countries.' . strtolower($session->getAttribute('countryCode')), $locale->getText('locale.country.unknown'));
$session
->setAttribute('current', true)
->setAttribute('countryName', $countryName)
->setAttribute('expire', $expire)
->setAttribute('secret', Auth::encodeSession($user->getId(), $sessionSecret))
2024-03-06 18:07:58 +00:00
;
$response->dynamic($session, Response::MODEL_SESSION);
};
2020-06-28 17:31:21 +00:00
App::post('/v1/account')
2023-10-03 16:50:48 +00:00
->desc('Create account')
2021-02-28 18:36:13 +00:00
->groups(['api', 'account', 'auth'])
2024-01-17 11:17:03 +00:00
->label('scope', 'sessions.write')
2025-01-10 03:12:10 +00:00
->label('auth.type', 'email-password')
2022-09-08 13:06:16 +00:00
->label('audits.event', 'user.create')
2022-08-08 14:32:54 +00:00
->label('audits.resource', 'user/{response.$id}')
2022-08-16 14:56:05 +00:00
->label('audits.userId', '{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'account',
2025-01-17 04:31:39 +00:00
name: 'create',
description: '/docs/references/account/create.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_USER,
)
],
contentType: ContentType::JSON
))
2020-01-03 21:00:53 +00:00
->label('abuse-limit', 10)
2024-01-12 17:26:01 +00:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
2020-09-10 14:40:14 +00:00
->param('email', '', new Email(), 'User email.')
2024-01-02 10:59:35 +00:00
->param('password', '', fn ($project, $passwordsDictionary) => new PasswordDictionary($passwordsDictionary, $project->getAttribute('auths', [])['passwordDictionary'] ?? false), 'New user password. Must be between 8 and 256 chars.', false, ['project', 'passwordsDictionary'])
2020-09-10 14:40:14 +00:00
->param('name', '', new Text(128), 'User name. Max length: 128 chars.', true)
2020-12-26 14:31:53 +00:00
->inject('request')
->inject('response')
->inject('user')
2020-12-26 14:31:53 +00:00
->inject('project')
->inject('dbForProject')
2023-12-15 22:19:43 +00:00
->inject('hooks')
2024-10-29 10:58:57 +00:00
->action(function (string $userId, string $email, string $password, string $name, Request $request, Response $response, Document $user, Document $project, Database $dbForProject, Hooks $hooks) {
2020-06-29 21:43:34 +00:00
$email = \strtolower($email);
2020-06-29 21:43:34 +00:00
if ('console' === $project->getId()) {
$whitelistEmails = $project->getAttribute('authWhitelistEmails');
$whitelistIPs = $project->getAttribute('authWhitelistIPs');
2020-06-29 21:43:34 +00:00
2023-05-29 13:58:45 +00:00
if (!empty($whitelistEmails) && !\in_array($email, $whitelistEmails) && !\in_array(strtoupper($email), $whitelistEmails)) {
throw new Exception(Exception::USER_EMAIL_NOT_WHITELISTED);
2020-01-03 21:00:53 +00:00
}
if (!empty($whitelistIPs) && !\in_array($request->getIP(), $whitelistIPs)) {
throw new Exception(Exception::USER_IP_NOT_WHITELISTED);
2020-01-03 21:00:53 +00:00
}
2020-06-29 21:43:34 +00:00
}
2020-01-03 21:00:53 +00:00
2021-08-06 08:34:17 +00:00
$limit = $project->getAttribute('auths', [])['limit'] ?? 0;
2021-02-28 18:36:13 +00:00
if ($limit !== 0) {
2022-05-16 09:58:17 +00:00
$total = $dbForProject->count('users', max: APP_LIMIT_USERS);
2021-02-28 18:36:13 +00:00
2022-02-27 09:57:09 +00:00
if ($total >= $limit) {
2024-04-18 21:22:41 +00:00
if ('console' === $project->getId()) {
throw new Exception(Exception::USER_CONSOLE_COUNT_EXCEEDED);
}
throw new Exception(Exception::USER_COUNT_EXCEEDED);
2021-02-28 18:36:13 +00:00
}
}
// Makes sure this email is not already used in another identity
$identityWithMatchingEmail = $dbForProject->findOne('identities', [
Query::equal('providerEmail', [$email]),
]);
if (!$identityWithMatchingEmail->isEmpty()) {
throw new Exception(Exception::GENERAL_BAD_REQUEST); /** Return a generic bad request to prevent exposing existing accounts */
}
2023-07-19 22:24:32 +00:00
if ($project->getAttribute('auths', [])['personalDataCheck'] ?? false) {
$personalDataValidator = new PersonalData($userId, $email, $name, null);
if (!$personalDataValidator->isValid($password)) {
throw new Exception(Exception::USER_PASSWORD_PERSONAL_DATA);
}
}
$hooks->trigger('passwordValidator', [$dbForProject, $project, $password, &$user, true]);
2023-12-15 22:19:43 +00:00
2022-12-18 06:31:14 +00:00
$passwordHistory = $project->getAttribute('auths', [])['passwordHistory'] ?? 0;
2022-12-18 06:27:41 +00:00
$password = Auth::passwordHash($password, Auth::DEFAULT_ALGO, Auth::DEFAULT_ALGO_OPTIONS);
2020-06-29 21:43:34 +00:00
try {
2022-08-14 14:22:38 +00:00
$userId = $userId == 'unique()' ? ID::unique() : $userId;
$user->setAttributes([
2022-08-15 11:24:31 +00:00
'$id' => $userId,
'$permissions' => [
2022-08-14 05:21:11 +00:00
Permission::read(Role::any()),
2022-08-15 11:24:31 +00:00
Permission::update(Role::user($userId)),
Permission::delete(Role::user($userId)),
],
2020-06-29 21:43:34 +00:00
'email' => $email,
'emailVerification' => false,
'status' => true,
2022-12-18 06:27:41 +00:00
'password' => $password,
2023-02-20 01:51:56 +00:00
'passwordHistory' => $passwordHistory > 0 ? [$password] : [],
'passwordUpdate' => DateTime::now(),
'hash' => Auth::DEFAULT_ALGO,
'hashOptions' => Auth::DEFAULT_ALGO_OPTIONS,
2022-07-13 14:02:49 +00:00
'registration' => DateTime::now(),
2020-06-29 21:43:34 +00:00
'reset' => false,
'name' => $name,
2024-01-10 16:22:32 +00:00
'mfa' => false,
2021-12-28 10:48:50 +00:00
'prefs' => new \stdClass(),
2022-04-26 10:36:49 +00:00
'sessions' => null,
2022-04-27 11:06:53 +00:00
'tokens' => null,
2022-04-27 12:44:47 +00:00
'memberships' => null,
2024-02-29 20:59:49 +00:00
'authenticators' => null,
'search' => implode(' ', [$userId, $email, $name]),
'accessedAt' => DateTime::now(),
]);
2025-05-26 05:42:11 +00:00
$user->removeAttribute('$sequence');
2024-03-06 17:34:21 +00:00
$user = Authorization::skip(fn () => $dbForProject->createDocument('users', $user));
try {
2024-03-06 17:34:21 +00:00
$target = Authorization::skip(fn () => $dbForProject->createDocument('targets', new Document([
2024-02-16 04:07:16 +00:00
'$permissions' => [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
],
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
'providerType' => MESSAGE_TYPE_EMAIL,
'identifier' => $email,
])));
$user->setAttribute('targets', [...$user->getAttribute('targets', []), $target]);
} catch (Duplicate) {
$existingTarget = $dbForProject->findOne('targets', [
Query::equal('identifier', [$email]),
]);
2024-10-07 02:40:01 +00:00
if (!$existingTarget->isEmpty()) {
$user->setAttribute('targets', $existingTarget, Document::SET_TYPE_APPEND);
}
}
2023-12-15 05:24:37 +00:00
2023-12-15 04:45:25 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
} catch (Duplicate) {
throw new Exception(Exception::USER_ALREADY_EXISTS);
2020-06-29 21:43:34 +00:00
}
2020-01-03 21:00:53 +00:00
2022-08-19 04:04:33 +00:00
Authorization::unsetRole(Role::guests()->toString());
Authorization::setRole(Role::user($user->getId())->toString());
Authorization::setRole(Role::users()->toString());
2020-11-20 21:02:26 +00:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($user, Response::MODEL_ACCOUNT);
2020-12-26 14:31:53 +00:00
});
2024-03-06 18:07:58 +00:00
App::get('/v1/account')
->desc('Get account')
->groups(['api', 'account'])
->label('scope', 'account')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'account',
2025-01-17 04:31:39 +00:00
name: 'get',
description: '/docs/references/account/get.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_USER,
)
],
contentType: ContentType::JSON
))
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('user')
2024-03-06 18:07:58 +00:00
->action(function (Response $response, Document $user) {
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
2024-03-06 18:07:58 +00:00
$response->dynamic($user, Response::MODEL_ACCOUNT);
});
2020-01-03 21:00:53 +00:00
2024-03-06 18:07:58 +00:00
App::delete('/v1/account')
->desc('Delete account')
->groups(['api', 'account'])
->label('scope', 'account')
->label('audits.event', 'user.delete')
->label('audits.resource', 'user/{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'account',
2025-01-17 04:31:39 +00:00
name: 'delete',
description: '/docs/references/account/delete.md',
auth: [AuthType::ADMIN],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_NOCONTENT,
model: Response::MODEL_NONE,
)
],
contentType: ContentType::NONE
))
2024-03-06 18:07:58 +00:00
->inject('user')
->inject('project')
->inject('response')
->inject('dbForProject')
->inject('queueForEvents')
->inject('queueForDeletes')
->action(function (Document $user, Document $project, Response $response, Database $dbForProject, Event $queueForEvents, Delete $queueForDeletes) {
if ($user->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2022-05-06 08:58:36 +00:00
}
2024-03-06 18:07:58 +00:00
if ($project->getId() === 'console') {
// get all memberships
$memberships = $user->getAttribute('memberships', []);
foreach ($memberships as $membership) {
// prevent deletion if at least one active membership
if ($membership->getAttribute('confirm', false)) {
throw new Exception(Exception::USER_DELETION_PROHIBITED);
}
}
2020-01-03 21:00:53 +00:00
}
2021-08-05 05:06:38 +00:00
2024-03-06 18:07:58 +00:00
$dbForProject->deleteDocument('users', $user->getId());
2021-06-17 09:33:57 +00:00
2024-03-06 18:07:58 +00:00
$queueForDeletes
->setType(DELETE_TYPE_DOCUMENT)
->setDocument($user);
2021-08-05 05:06:38 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents
->setParam('userId', $user->getId())
2024-03-06 18:07:58 +00:00
->setPayload($response->output($user, Response::MODEL_USER));
2022-04-04 06:30:07 +00:00
2024-03-06 18:07:58 +00:00
$response->noContent();
2020-12-26 14:31:53 +00:00
});
2020-01-03 21:00:53 +00:00
2024-03-06 18:07:58 +00:00
App::get('/v1/account/sessions')
->desc('List sessions')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
2024-03-06 18:07:58 +00:00
->label('scope', 'account')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-04-12 06:50:02 +00:00
group: 'sessions',
2025-01-17 04:31:39 +00:00
name: 'listSessions',
description: '/docs/references/account/list-sessions.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_SESSION_LIST,
)
],
contentType: ContentType::JSON,
))
2020-12-26 14:31:53 +00:00
->inject('response')
2024-03-06 18:07:58 +00:00
->inject('user')
->inject('locale')
2020-12-26 14:31:53 +00:00
->inject('project')
2024-03-06 18:07:58 +00:00
->action(function (Response $response, Document $user, Locale $locale, Document $project) {
2020-01-05 11:29:42 +00:00
2022-11-18 13:13:33 +00:00
2024-03-06 18:07:58 +00:00
$sessions = $user->getAttribute('sessions', []);
$current = Auth::sessionVerify($sessions, Auth::$secret);
2023-05-29 13:58:45 +00:00
2024-03-06 18:07:58 +00:00
foreach ($sessions as $key => $session) {/** @var Document $session */
$countryName = $locale->getText('countries.' . strtolower($session->getAttribute('countryCode')), $locale->getText('locale.country.unknown'));
2023-05-29 13:58:45 +00:00
2024-03-06 18:07:58 +00:00
$session->setAttribute('countryName', $countryName);
$session->setAttribute('current', ($current == $session->getId()) ? true : false);
$session->setAttribute('secret', $session->getAttribute('secret', ''));
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
$sessions[$key] = $session;
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
$response->dynamic(new Document([
'sessions' => $sessions,
'total' => count($sessions),
]), Response::MODEL_SESSION_LIST);
});
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
App::delete('/v1/account/sessions')
->desc('Delete sessions')
->groups(['api', 'account'])
->label('scope', 'account')
->label('event', 'users.[userId].sessions.[sessionId].delete')
->label('audits.event', 'session.delete')
->label('audits.resource', 'user/{user.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-04-12 06:50:02 +00:00
group: 'sessions',
2025-01-17 04:31:39 +00:00
name: 'deleteSessions',
description: '/docs/references/account/delete-sessions.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_NOCONTENT,
model: Response::MODEL_NONE,
)
],
contentType: ContentType::NONE
))
2024-03-06 18:07:58 +00:00
->label('abuse-limit', 100)
->inject('request')
->inject('response')
->inject('user')
->inject('dbForProject')
->inject('locale')
->inject('queueForEvents')
->inject('queueForDeletes')
->action(function (Request $request, Response $response, Document $user, Database $dbForProject, Locale $locale, Event $queueForEvents, Delete $queueForDeletes) {
2020-06-29 21:43:34 +00:00
2024-03-06 18:07:58 +00:00
$protocol = $request->getProtocol();
$sessions = $user->getAttribute('sessions', []);
2020-06-29 21:43:34 +00:00
2024-03-06 18:07:58 +00:00
foreach ($sessions as $session) {/** @var Document $session */
$dbForProject->deleteDocument('sessions', $session->getId());
2024-03-06 18:07:58 +00:00
if (!Config::getParam('domainVerification')) {
$response->addHeader('X-Fallback-Cookies', \json_encode([]));
}
$session
->setAttribute('current', false)
->setAttribute('countryName', $locale->getText('countries.' . strtolower($session->getAttribute('countryCode')), $locale->getText('locale.country.unknown')));
if ($session->getAttribute('secret') == Auth::hash(Auth::$secret)) {
$session->setAttribute('current', true);
// If current session delete the cookies too
2024-03-06 18:07:58 +00:00
$response
->addCookie(Auth::$cookieName . '_legacy', '', \time() - 3600, '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, null)
->addCookie(Auth::$cookieName, '', \time() - 3600, '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, Config::getParam('cookieSamesite'));
// Use current session for events.
$queueForEvents
->setPayload($response->output($session, Response::MODEL_SESSION));
$queueForDeletes
->setType(DELETE_TYPE_SESSION_TARGETS)
->setDocument($session)
->trigger();
}
}
2024-03-06 18:07:58 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2020-06-29 21:43:34 +00:00
2024-03-06 18:07:58 +00:00
$queueForEvents
->setParam('userId', $user->getId())
->setParam('sessionId', $session->getId());
$response->noContent();
2020-12-26 14:31:53 +00:00
});
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
App::get('/v1/account/sessions/:sessionId')
->desc('Get session')
->groups(['api', 'account'])
->label('scope', 'account')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-04-12 06:50:02 +00:00
group: 'sessions',
2025-01-17 04:31:39 +00:00
name: 'getSession',
description: '/docs/references/account/get-session.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_SESSION,
)
],
contentType: ContentType::JSON
))
2024-03-06 18:07:58 +00:00
->param('sessionId', '', new UID(), 'Session ID. Use the string \'current\' to get the current device session.')
2020-12-26 14:31:53 +00:00
->inject('response')
2024-03-06 18:07:58 +00:00
->inject('user')
->inject('locale')
->inject('project')
->action(function (?string $sessionId, Response $response, Document $user, Locale $locale, Document $project) {
2020-06-30 11:09:28 +00:00
2024-03-06 18:07:58 +00:00
$sessions = $user->getAttribute('sessions', []);
$sessionId = ($sessionId === 'current')
? Auth::sessionVerify($user->getAttribute('sessions'), Auth::$secret)
: $sessionId;
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
foreach ($sessions as $session) {/** @var Document $session */
if ($sessionId === $session->getId()) {
$countryName = $locale->getText('countries.' . strtolower($session->getAttribute('countryCode')), $locale->getText('locale.country.unknown'));
2020-06-30 11:09:28 +00:00
2024-03-06 18:07:58 +00:00
$session
->setAttribute('current', ($session->getAttribute('secret') == Auth::hash(Auth::$secret)))
->setAttribute('countryName', $countryName)
->setAttribute('secret', $session->getAttribute('secret', ''))
2024-03-06 18:07:58 +00:00
;
2021-08-05 05:06:38 +00:00
2024-03-06 18:07:58 +00:00
return $response->dynamic($session, Response::MODEL_SESSION);
}
}
throw new Exception(Exception::USER_SESSION_NOT_FOUND);
2020-12-26 14:31:53 +00:00
});
2024-03-06 18:07:58 +00:00
App::delete('/v1/account/sessions/:sessionId')
->desc('Delete session')
->groups(['api', 'account', 'mfa'])
->label('scope', 'account')
->label('event', 'users.[userId].sessions.[sessionId].delete')
->label('audits.event', 'session.delete')
2022-08-15 17:04:23 +00:00
->label('audits.resource', 'user/{user.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-04-12 06:50:02 +00:00
group: 'sessions',
2025-01-17 04:31:39 +00:00
name: 'deleteSession',
description: '/docs/references/account/delete-session.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_NOCONTENT,
model: Response::MODEL_NONE,
)
],
contentType: ContentType::NONE
))
2024-03-06 18:07:58 +00:00
->label('abuse-limit', 100)
->param('sessionId', '', new UID(), 'Session ID. Use the string \'current\' to delete the current device session.')
->inject('requestTimestamp')
2020-12-26 14:31:53 +00:00
->inject('request')
->inject('response')
->inject('user')
->inject('dbForProject')
2024-03-06 18:07:58 +00:00
->inject('locale')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2024-03-06 18:07:58 +00:00
->inject('queueForDeletes')
->inject('project')
->action(function (?string $sessionId, ?\DateTime $requestTimestamp, Request $request, Response $response, Document $user, Database $dbForProject, Locale $locale, Event $queueForEvents, Delete $queueForDeletes, Document $project) {
2021-08-05 05:06:38 +00:00
2020-06-30 11:09:28 +00:00
$protocol = $request->getProtocol();
2024-03-06 18:07:58 +00:00
$sessionId = ($sessionId === 'current')
? Auth::sessionVerify($user->getAttribute('sessions'), Auth::$secret)
: $sessionId;
2023-05-29 13:58:45 +00:00
2024-03-06 18:07:58 +00:00
$sessions = $user->getAttribute('sessions', []);
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
foreach ($sessions as $key => $session) {
/** @var Document $session */
if ($sessionId !== $session->getId()) {
continue;
}
2020-01-05 11:29:42 +00:00
2025-04-30 05:40:47 +00:00
$dbForProject->deleteDocument('sessions', $session->getId());
2024-03-06 18:07:58 +00:00
unset($sessions[$key]);
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
$session->setAttribute('current', false);
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
if ($session->getAttribute('secret') == Auth::hash(Auth::$secret)) { // If current session delete the cookies too
$session
->setAttribute('current', true)
->setAttribute('countryName', $locale->getText('countries.' . strtolower($session->getAttribute('countryCode')), $locale->getText('locale.country.unknown')));
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
if (!Config::getParam('domainVerification')) {
$response->addHeader('X-Fallback-Cookies', \json_encode([]));
}
$response
->addCookie(Auth::$cookieName . '_legacy', '', \time() - 3600, '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, null)
->addCookie(Auth::$cookieName, '', \time() - 3600, '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, Config::getParam('cookieSamesite'));
}
2021-08-05 05:06:38 +00:00
2024-03-06 18:07:58 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2021-08-05 05:06:38 +00:00
2024-03-06 18:07:58 +00:00
$queueForEvents
->setParam('userId', $user->getId())
->setParam('sessionId', $session->getId())
->setPayload($response->output($session, Response::MODEL_SESSION));
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
$queueForDeletes
->setType(DELETE_TYPE_SESSION_TARGETS)
->setDocument($session)
->trigger();
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
$response->noContent();
return;
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
throw new Exception(Exception::USER_SESSION_NOT_FOUND);
});
App::patch('/v1/account/sessions/:sessionId')
->desc('Update session')
->groups(['api', 'account'])
->label('scope', 'account')
->label('event', 'users.[userId].sessions.[sessionId].update')
->label('audits.event', 'session.update')
->label('audits.resource', 'user/{response.userId}')
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-04-12 06:50:02 +00:00
group: 'sessions',
2025-01-17 04:31:39 +00:00
name: 'updateSession',
description: '/docs/references/account/update-session.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_SESSION,
)
],
contentType: ContentType::JSON
))
2024-03-06 18:07:58 +00:00
->label('abuse-limit', 10)
->param('sessionId', '', new UID(), 'Session ID. Use the string \'current\' to update the current device session.')
->inject('response')
->inject('user')
->inject('dbForProject')
->inject('project')
->inject('queueForEvents')
->action(function (?string $sessionId, Response $response, Document $user, Database $dbForProject, Document $project, Event $queueForEvents) {
$sessionId = ($sessionId === 'current')
? Auth::sessionVerify($user->getAttribute('sessions'), Auth::$secret)
: $sessionId;
$sessions = $user->getAttribute('sessions', []);
$session = null;
foreach ($sessions as $key => $value) {
if ($sessionId === $value->getId()) {
$session = $value;
break;
}
}
if ($session === null) {
throw new Exception(Exception::USER_SESSION_NOT_FOUND);
}
// Extend session
$authDuration = $project->getAttribute('auths', [])['duration'] ?? Auth::TOKEN_EXPIRATION_LOGIN_LONG;
$session->setAttribute('expire', DateTime::addSeconds(new \DateTime(), $authDuration));
// Refresh OAuth access token
$provider = $session->getAttribute('provider', '');
$refreshToken = $session->getAttribute('providerRefreshToken', '');
$className = 'Appwrite\\Auth\\OAuth2\\' . \ucfirst($provider);
if (!empty($provider) && \class_exists($className)) {
$appId = $project->getAttribute('oAuthProviders', [])[$provider . 'Appid'] ?? '';
$appSecret = $project->getAttribute('oAuthProviders', [])[$provider . 'Secret'] ?? '{}';
$oauth2 = new $className($appId, $appSecret, '', [], []);
$oauth2->refreshTokens($refreshToken);
$session
->setAttribute('providerAccessToken', $oauth2->getAccessToken(''))
->setAttribute('providerRefreshToken', $oauth2->getRefreshToken(''))
->setAttribute('providerAccessTokenExpiry', DateTime::addSeconds(new \DateTime(), (int)$oauth2->getAccessTokenExpiry('')));
}
// Save changes
$dbForProject->updateDocument('sessions', $sessionId, $session);
$dbForProject->purgeCachedDocument('users', $user->getId());
$queueForEvents
->setParam('userId', $user->getId())
->setParam('sessionId', $session->getId())
->setPayload($response->output($session, Response::MODEL_SESSION))
;
return $response->dynamic($session, Response::MODEL_SESSION);
2020-12-26 14:31:53 +00:00
});
2022-06-14 08:17:50 +00:00
App::post('/v1/account/sessions/email')
->alias('/v1/account/sessions')
->desc('Create email password session')
->groups(['api', 'account', 'auth', 'session'])
2022-04-04 06:30:07 +00:00
->label('event', 'users.[userId].sessions.[sessionId].create')
2024-01-17 11:17:03 +00:00
->label('scope', 'sessions.write')
2025-01-10 03:12:10 +00:00
->label('auth.type', 'email-password')
2022-09-05 08:00:08 +00:00
->label('audits.event', 'session.create')
2022-08-12 13:21:32 +00:00
->label('audits.resource', 'user/{response.userId}')
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-04-12 06:50:02 +00:00
group: 'sessions',
2025-01-17 04:31:39 +00:00
name: 'createEmailPasswordSession',
description: '/docs/references/account/create-session-email-password.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_SESSION,
)
],
contentType: ContentType::JSON
))
->label('abuse-limit', 10)
->label('abuse-key', 'url:{url},email:{param-email}')
2020-09-10 14:40:14 +00:00
->param('email', '', new Email(), 'User email.')
->param('password', '', new Password(), 'User password. Must be at least 8 chars.')
2020-12-26 14:31:53 +00:00
->inject('request')
->inject('response')
->inject('user')
->inject('dbForProject')
2022-10-31 14:54:15 +00:00
->inject('project')
2020-12-26 14:31:53 +00:00
->inject('locale')
->inject('geodb')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2024-06-24 13:12:09 +00:00
->inject('queueForMails')
->inject('hooks')
2024-06-24 13:12:09 +00:00
->action(function (string $email, string $password, Request $request, Response $response, Document $user, Database $dbForProject, Document $project, Locale $locale, Reader $geodb, Event $queueForEvents, Mail $queueForMails, Hooks $hooks) {
$email = \strtolower($email);
2020-06-30 11:09:28 +00:00
$protocol = $request->getProtocol();
2021-08-05 05:06:38 +00:00
2022-05-12 16:25:36 +00:00
$profile = $dbForProject->findOne('users', [
2022-08-11 23:53:52 +00:00
Query::equal('email', [$email]),
]);
2020-06-29 21:43:34 +00:00
2024-10-07 02:40:01 +00:00
if ($profile->isEmpty() || empty($profile->getAttribute('passwordUpdate')) || !Auth::passwordVerify($password, $profile->getAttribute('password'), $profile->getAttribute('hash'), $profile->getAttribute('hashOptions'))) {
throw new Exception(Exception::USER_INVALID_CREDENTIALS);
2020-06-29 21:43:34 +00:00
}
2020-01-03 21:00:53 +00:00
if (false === $profile->getAttribute('status')) { // Account is blocked
throw new Exception(Exception::USER_BLOCKED); // User is in status blocked
}
$user->setAttributes($profile->getArrayCopy());
$hooks->trigger('passwordValidator', [$dbForProject, $project, $password, &$user, false]);
2022-10-31 14:54:15 +00:00
2022-11-14 09:42:18 +00:00
$duration = $project->getAttribute('auths', [])['duration'] ?? Auth::TOKEN_EXPIRATION_LOGIN_LONG;
2021-02-14 17:28:54 +00:00
$detector = new Detector($request->getUserAgent('UNKNOWN'));
$record = $geodb->get($request->getIP());
$secret = Auth::tokenGenerator(Auth::TOKEN_LENGTH_SESSION);
2021-02-14 17:28:54 +00:00
$session = new Document(array_merge(
[
2022-08-14 14:22:38 +00:00
'$id' => ID::unique(),
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
2021-02-19 12:12:47 +00:00
'provider' => Auth::SESSION_PROVIDER_EMAIL,
2021-02-19 10:02:02 +00:00
'providerUid' => $email,
2021-02-14 17:28:54 +00:00
'secret' => Auth::hash($secret), // One way hash encryption to protect DB leak
'userAgent' => $request->getUserAgent('UNKNOWN'),
'ip' => $request->getIP(),
'factors' => ['password'],
2021-02-14 17:28:54 +00:00
'countryCode' => ($record) ? \strtolower($record['country']['iso_code']) : '--',
2024-01-15 13:43:21 +00:00
'expire' => DateTime::addSeconds(new \DateTime(), $duration)
2022-05-23 14:54:50 +00:00
],
$detector->getOS(),
$detector->getClient(),
$detector->getDevice()
2021-02-14 17:28:54 +00:00
));
2020-10-30 19:53:27 +00:00
Authorization::setRole(Role::user($user->getId())->toString());
2020-01-03 21:00:53 +00:00
2022-05-06 08:58:36 +00:00
// Re-hash if not using recommended algo
if ($user->getAttribute('hash') !== Auth::DEFAULT_ALGO) {
$user
2022-05-06 08:58:36 +00:00
->setAttribute('password', Auth::passwordHash($password, Auth::DEFAULT_ALGO, Auth::DEFAULT_ALGO_OPTIONS))
->setAttribute('hash', Auth::DEFAULT_ALGO)
->setAttribute('hashOptions', Auth::DEFAULT_ALGO_OPTIONS);
$dbForProject->updateDocument('users', $user->getId(), $user);
2022-05-06 08:58:36 +00:00
}
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
$session = $dbForProject->createDocument('sessions', $session->setAttribute('$permissions', [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]));
2020-01-11 13:58:02 +00:00
2020-06-29 21:43:34 +00:00
if (!Config::getParam('domainVerification')) {
2020-01-03 21:00:53 +00:00
$response
->addHeader('X-Fallback-Cookies', \json_encode([Auth::$cookieName => Auth::encodeSession($user->getId(), $secret)]))
2020-01-11 13:58:02 +00:00
;
2020-01-03 21:00:53 +00:00
}
2021-08-05 05:06:38 +00:00
2024-01-17 13:20:47 +00:00
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), $duration));
2020-06-29 21:43:34 +00:00
$response
->addCookie(Auth::$cookieName . '_legacy', Auth::encodeSession($user->getId(), $secret), (new \DateTime($expire))->getTimestamp(), '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, null)
->addCookie(Auth::$cookieName, Auth::encodeSession($user->getId(), $secret), (new \DateTime($expire))->getTimestamp(), '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, Config::getParam('cookieSamesite'))
2020-06-29 21:43:34 +00:00
->setStatusCode(Response::STATUS_CODE_CREATED)
2020-07-02 21:48:02 +00:00
;
2020-10-30 19:53:27 +00:00
2022-05-23 14:54:50 +00:00
$countryName = $locale->getText('countries.' . strtolower($session->getAttribute('countryCode')), $locale->getText('locale.country.unknown'));
2021-06-17 09:33:57 +00:00
2020-10-30 19:53:27 +00:00
$session
->setAttribute('current', true)
2021-06-17 09:33:57 +00:00
->setAttribute('countryName', $countryName)
->setAttribute('secret', Auth::encodeSession($user->getId(), $secret))
2020-10-30 19:53:27 +00:00
;
2021-08-05 05:06:38 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents
->setParam('userId', $user->getId())
2022-04-04 06:30:07 +00:00
->setParam('sessionId', $session->getId())
;
2024-07-16 13:42:46 +00:00
if ($project->getAttribute('auths', [])['sessionAlerts'] ?? false) {
2024-07-16 12:03:26 +00:00
if ($dbForProject->count('sessions', [
Query::equal('userId', [$user->getId()]),
]) !== 1) {
sendSessionAlert($locale, $user, $project, $session, $queueForMails);
}
2024-06-24 13:12:09 +00:00
}
2021-07-25 14:47:18 +00:00
$response->dynamic($session, Response::MODEL_SESSION);
2020-12-26 14:31:53 +00:00
});
2020-01-03 21:00:53 +00:00
2024-03-06 18:07:58 +00:00
App::post('/v1/account/sessions/anonymous')
->desc('Create anonymous session')
->groups(['api', 'account', 'auth', 'session'])
->label('event', 'users.[userId].sessions.[sessionId].create')
2024-01-17 11:17:03 +00:00
->label('scope', 'sessions.write')
2024-03-06 18:07:58 +00:00
->label('auth.type', 'anonymous')
->label('audits.event', 'session.create')
->label('audits.resource', 'user/{response.userId}')
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-04-12 06:50:02 +00:00
group: 'sessions',
2025-01-17 04:31:39 +00:00
name: 'createAnonymousSession',
description: '/docs/references/account/create-session-anonymous.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_SESSION,
)
],
contentType: ContentType::JSON
))
2020-01-05 11:29:42 +00:00
->label('abuse-limit', 50)
->label('abuse-key', 'ip:{ip}')
2020-12-26 14:31:53 +00:00
->inject('request')
->inject('response')
2024-03-06 18:07:58 +00:00
->inject('locale')
->inject('user')
2020-12-26 14:31:53 +00:00
->inject('project')
2024-03-06 18:07:58 +00:00
->inject('dbForProject')
->inject('geodb')
->inject('queueForEvents')
->action(function (Request $request, Response $response, Locale $locale, Document $user, Document $project, Database $dbForProject, Reader $geodb, Event $queueForEvents) {
2024-02-20 11:45:11 +00:00
$protocol = $request->getProtocol();
2024-03-06 18:07:58 +00:00
if ('console' === $project->getId()) {
throw new Exception(Exception::USER_ANONYMOUS_CONSOLE_PROHIBITED, 'Failed to create anonymous user');
2024-02-20 11:45:11 +00:00
}
2024-03-06 18:07:58 +00:00
$limit = $project->getAttribute('auths', [])['limit'] ?? 0;
2024-02-20 11:45:11 +00:00
2024-03-06 18:07:58 +00:00
if ($limit !== 0) {
$total = $dbForProject->count('users', max: APP_LIMIT_USERS);
2020-01-05 11:29:42 +00:00
2024-03-06 18:07:58 +00:00
if ($total >= $limit) {
throw new Exception(Exception::USER_COUNT_EXCEEDED);
}
2024-02-20 11:45:11 +00:00
}
2024-03-06 18:07:58 +00:00
$userId = ID::unique();
$user->setAttributes([
'$id' => $userId,
'$permissions' => [
Permission::read(Role::any()),
Permission::update(Role::user($userId)),
Permission::delete(Role::user($userId)),
],
'email' => null,
'emailVerification' => false,
'status' => true,
'password' => null,
'hash' => Auth::DEFAULT_ALGO,
'hashOptions' => Auth::DEFAULT_ALGO_OPTIONS,
'passwordUpdate' => null,
'registration' => DateTime::now(),
'reset' => false,
'name' => null,
'mfa' => false,
'prefs' => new \stdClass(),
'sessions' => null,
'tokens' => null,
'memberships' => null,
'authenticators' => null,
'search' => $userId,
'accessedAt' => DateTime::now(),
]);
2025-05-26 05:42:11 +00:00
$user->removeAttribute('$sequence');
Authorization::skip(fn () => $dbForProject->createDocument('users', $user));
2024-02-20 11:45:11 +00:00
2024-03-06 18:07:58 +00:00
// Create session token
$duration = $project->getAttribute('auths', [])['duration'] ?? Auth::TOKEN_EXPIRATION_LOGIN_LONG;
$detector = new Detector($request->getUserAgent('UNKNOWN'));
$record = $geodb->get($request->getIP());
$secret = Auth::tokenGenerator(Auth::TOKEN_LENGTH_SESSION);
2024-02-20 11:45:11 +00:00
2024-03-06 18:07:58 +00:00
$session = new Document(array_merge(
[
'$id' => ID::unique(),
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
2024-03-06 18:07:58 +00:00
'provider' => Auth::SESSION_PROVIDER_ANONYMOUS,
'secret' => Auth::hash($secret), // One way hash encryption to protect DB leak
'userAgent' => $request->getUserAgent('UNKNOWN'),
'ip' => $request->getIP(),
'factors' => ['anonymous'],
'countryCode' => ($record) ? \strtolower($record['country']['iso_code']) : '--',
'expire' => DateTime::addSeconds(new \DateTime(), $duration)
],
$detector->getOS(),
$detector->getClient(),
$detector->getDevice()
));
2024-02-20 11:45:11 +00:00
2024-03-06 18:07:58 +00:00
Authorization::setRole(Role::user($user->getId())->toString());
$session = $dbForProject->createDocument('sessions', $session-> setAttribute('$permissions', [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]));
2024-03-06 18:07:58 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
$queueForEvents
->setParam('userId', $user->getId())
->setParam('sessionId', $session->getId())
;
if (!Config::getParam('domainVerification')) {
$response->addHeader('X-Fallback-Cookies', \json_encode([Auth::$cookieName => Auth::encodeSession($user->getId(), $secret)]));
2024-02-20 11:45:11 +00:00
}
2024-03-06 18:07:58 +00:00
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), $duration));
2024-02-20 11:45:11 +00:00
$response
2024-03-06 18:07:58 +00:00
->addCookie(Auth::$cookieName . '_legacy', Auth::encodeSession($user->getId(), $secret), (new \DateTime($expire))->getTimestamp(), '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, null)
->addCookie(Auth::$cookieName, Auth::encodeSession($user->getId(), $secret), (new \DateTime($expire))->getTimestamp(), '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, Config::getParam('cookieSamesite'))
->setStatusCode(Response::STATUS_CODE_CREATED)
;
$countryName = $locale->getText('countries.' . strtolower($session->getAttribute('countryCode')), $locale->getText('locale.country.unknown'));
$session
->setAttribute('current', true)
->setAttribute('countryName', $countryName)
->setAttribute('secret', Auth::encodeSession($user->getId(), $secret))
2024-03-06 18:07:58 +00:00
;
$response->dynamic($session, Response::MODEL_SESSION);
2024-02-20 11:45:11 +00:00
});
2024-03-06 18:07:58 +00:00
App::post('/v1/account/sessions/token')
->desc('Create session')
->label('event', 'users.[userId].sessions.[sessionId].create')
->groups(['api', 'account', 'session'])
->label('scope', 'sessions.write')
->label('audits.event', 'session.create')
->label('audits.resource', 'user/{response.userId}')
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-04-12 06:50:02 +00:00
group: 'sessions',
2025-01-17 04:31:39 +00:00
name: 'createSession',
description: '/docs/references/account/create-session.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_SESSION,
)
],
contentType: ContentType::JSON
))
2024-03-06 18:07:58 +00:00
->label('abuse-limit', 10)
->label('abuse-key', 'ip:{ip},userId:{param-userId}')
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('secret', '', new Text(256), 'Secret of a token generated by login methods. For example, the `createMagicURLToken` or `createPhoneToken` methods.')
->inject('request')
->inject('response')
->inject('user')
->inject('dbForProject')
->inject('project')
->inject('locale')
->inject('geodb')
->inject('queueForEvents')
2024-06-24 13:12:09 +00:00
->inject('queueForMails')
2024-03-06 18:07:58 +00:00
->action($createSession);
App::get('/v1/account/sessions/oauth2/:provider')
->desc('Create OAuth2 session')
2024-02-20 11:45:11 +00:00
->groups(['api', 'account'])
->label('error', __DIR__ . '/../../views/general/error.phtml')
->label('scope', 'sessions.write')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-04-12 06:50:02 +00:00
group: 'sessions',
2025-01-17 04:31:39 +00:00
name: 'createOAuth2Session',
description: '/docs/references/account/create-session-oauth2.md',
type: MethodType::WEBAUTH,
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_MOVED_PERMANENTLY,
model: Response::MODEL_NONE,
)
],
contentType: ContentType::HTML,
hide: [APP_PLATFORM_SERVER],
))
2024-02-20 11:45:11 +00:00
->label('abuse-limit', 50)
->label('abuse-key', 'ip:{ip}')
2024-03-06 17:34:21 +00:00
->param('provider', '', new WhiteList(\array_keys(Config::getParam('oAuthProviders')), true), 'OAuth2 Provider. Currently, supported providers are: ' . \implode(', ', \array_keys(\array_filter(Config::getParam('oAuthProviders'), fn ($node) => (!$node['mock'])))) . '.')
->param('success', '', fn ($platforms, $devKey) => $devKey->isEmpty() ? new Redirect($platforms) : new URL(), 'URL to redirect back to your app after a successful login attempt. Only URLs from hostnames in your project\'s platform list are allowed. This requirement helps to prevent an [open redirect](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) attack against your project API.', true, ['platforms', 'devKey'])
->param('failure', '', fn ($platforms, $devKey) => $devKey->isEmpty() ? new Redirect($platforms) : new URL(), 'URL to redirect back to your app after a failed login attempt. Only URLs from hostnames in your project\'s platform list are allowed. This requirement helps to prevent an [open redirect](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) attack against your project API.', true, ['platforms', 'devKey'])
2024-02-20 11:45:11 +00:00
->param('scopes', [], new ArrayList(new Text(APP_LIMIT_ARRAY_ELEMENT_SIZE), APP_LIMIT_ARRAY_PARAMS_SIZE), 'A list of custom OAuth2 scopes. Check each provider internal docs for a list of supported scopes. Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' scopes are allowed, each ' . APP_LIMIT_ARRAY_ELEMENT_SIZE . ' characters long.', true)
->inject('request')
->inject('response')
->inject('project')
->action(function (string $provider, string $success, string $failure, array $scopes, Request $request, Response $response, Document $project) use ($oauthDefaultSuccess, $oauthDefaultFailure) {
$protocol = System::getEnv('_APP_OPTIONS_FORCE_HTTPS') === 'disabled' ? 'http' : 'https';
$port = $request->getPort();
$callbackBase = $protocol . '://' . $request->getHostname();
if ($protocol === 'https' && $port !== '443') {
$callbackBase .= ':' . $port;
} elseif ($protocol === 'http' && $port !== '80') {
$callbackBase .= ':' . $port;
}
2022-11-18 13:13:33 +00:00
$callback = $callbackBase . '/v1/account/sessions/oauth2/callback/' . $provider . '/' . $project->getId();
2023-10-25 17:33:23 +00:00
$providerEnabled = $project->getAttribute('oAuthProviders', [])[$provider . 'Enabled'] ?? false;
2023-01-09 10:44:28 +00:00
2023-01-09 10:35:03 +00:00
if (!$providerEnabled) {
throw new Exception(Exception::PROJECT_PROVIDER_DISABLED, 'This provider is disabled. Please enable the provider from your ' . APP_NAME . ' console to continue.');
}
2023-01-09 10:44:28 +00:00
2023-10-25 17:33:23 +00:00
$appId = $project->getAttribute('oAuthProviders', [])[$provider . 'Appid'] ?? '';
$appSecret = $project->getAttribute('oAuthProviders', [])[$provider . 'Secret'] ?? '{}';
2020-01-05 11:29:42 +00:00
2020-06-29 21:43:34 +00:00
if (!empty($appSecret) && isset($appSecret['version'])) {
2024-04-01 11:02:47 +00:00
$key = System::getEnv('_APP_OPENSSL_KEY_V' . $appSecret['version']);
2020-06-29 21:43:34 +00:00
$appSecret = OpenSSL::decrypt($appSecret['data'], $appSecret['method'], $key, 0, \hex2bin($appSecret['iv']), \hex2bin($appSecret['tag']));
}
2020-01-05 11:29:42 +00:00
2020-06-29 21:43:34 +00:00
if (empty($appId) || empty($appSecret)) {
throw new Exception(Exception::PROJECT_PROVIDER_DISABLED, 'This provider is disabled. Please configure the provider app ID and app secret key from your ' . APP_NAME . ' console to continue.');
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
$oAuthProviders = Config::getParam('oAuthProviders');
2025-05-09 10:57:45 +00:00
$className = $oAuthProviders[$provider]['class'];
2021-08-06 10:48:50 +00:00
if (!\class_exists($className)) {
throw new Exception(Exception::PROJECT_PROVIDER_UNSUPPORTED);
2020-01-05 11:29:42 +00:00
}
2020-06-29 21:43:34 +00:00
$host = System::getEnv('_APP_CONSOLE_DOMAIN', System::getEnv('_APP_DOMAIN', ''));
$redirectBase = $protocol . '://' . $host;
if ($protocol === 'https' && $port !== '443') {
$redirectBase .= ':' . $port;
} elseif ($protocol === 'http' && $port !== '80') {
$redirectBase .= ':' . $port;
}
2022-05-23 14:54:50 +00:00
if (empty($success)) {
$success = $redirectBase . $oauthDefaultSuccess;
}
2022-05-23 14:54:50 +00:00
if (empty($failure)) {
$failure = $redirectBase . $oauthDefaultFailure;
}
2024-01-09 16:38:29 +00:00
$oauth2 = new $className($appId, $appSecret, $callback, [
'success' => $success,
'failure' => $failure,
2024-03-06 18:07:58 +00:00
'token' => false,
2024-01-09 16:38:29 +00:00
], $scopes);
2020-06-29 21:43:34 +00:00
$response
->addHeader('Cache-Control', 'no-store, no-cache, must-revalidate, max-age=0')
->addHeader('Pragma', 'no-cache')
->redirect($oauth2->getLoginURL());
2020-12-26 14:31:53 +00:00
});
2020-01-05 11:29:42 +00:00
2020-06-28 17:31:21 +00:00
App::get('/v1/account/sessions/oauth2/callback/:provider/:projectId')
->desc('Get OAuth2 callback')
->groups(['account'])
2021-08-05 05:06:38 +00:00
->label('error', __DIR__ . '/../../views/general/error.phtml')
2020-01-05 11:29:42 +00:00
->label('scope', 'public')
->label('docs', false)
->param('projectId', '', new Text(1024), 'Project ID.')
2023-10-25 17:33:23 +00:00
->param('provider', '', new WhiteList(\array_keys(Config::getParam('oAuthProviders')), true), 'OAuth2 provider.')
->param('code', '', new Text(2048, 0), 'OAuth2 code. This is a temporary code that the will be later exchanged for an access token.', true)
2020-09-10 14:40:14 +00:00
->param('state', '', new Text(2048), 'Login state params.', true)
->param('error', '', new Text(2048, 0), 'Error code returned from the OAuth2 provider.', true)
->param('error_description', '', new Text(2048, 0), 'Human-readable text providing additional information about the error returned from the OAuth2 provider.', true)
2020-12-26 14:31:53 +00:00
->inject('request')
->inject('response')
->action(function (string $projectId, string $provider, string $code, string $state, string $error, string $error_description, Request $request, Response $response) {
$protocol = System::getEnv('_APP_OPTIONS_FORCE_HTTPS') === 'disabled' ? 'http' : 'https';
$port = $request->getPort();
$callbackBase = $protocol . '://' . $request->getHostname();
if ($protocol === 'https' && $port !== '443') {
$callbackBase .= ':' . $port;
} elseif ($protocol === 'http' && $port !== '80') {
$callbackBase .= ':' . $port;
}
2021-08-05 05:06:38 +00:00
$params = $request->getParams();
$params['project'] = $projectId;
unset($params['projectId']);
2020-06-29 21:43:34 +00:00
$response
->addHeader('Cache-Control', 'no-store, no-cache, must-revalidate, max-age=0')
->addHeader('Pragma', 'no-cache')
->redirect($callbackBase . '/v1/account/sessions/oauth2/' . $provider . '/redirect?'
. \http_build_query($params));
2020-12-26 14:31:53 +00:00
});
2020-01-05 11:29:42 +00:00
2020-06-28 17:31:21 +00:00
App::post('/v1/account/sessions/oauth2/callback/:provider/:projectId')
->desc('Create OAuth2 callback')
->groups(['account'])
2021-08-05 05:06:38 +00:00
->label('error', __DIR__ . '/../../views/general/error.phtml')
->label('scope', 'public')
->label('origin', '*')
->label('docs', false)
->param('projectId', '', new Text(1024), 'Project ID.')
2023-10-25 17:33:23 +00:00
->param('provider', '', new WhiteList(\array_keys(Config::getParam('oAuthProviders')), true), 'OAuth2 provider.')
->param('code', '', new Text(2048, 0), 'OAuth2 code. This is a temporary code that the will be later exchanged for an access token.', true)
2020-09-10 14:40:14 +00:00
->param('state', '', new Text(2048), 'Login state params.', true)
->param('error', '', new Text(2048, 0), 'Error code returned from the OAuth2 provider.', true)
->param('error_description', '', new Text(2048, 0), 'Human-readable text providing additional information about the error returned from the OAuth2 provider.', true)
2020-12-26 14:31:53 +00:00
->inject('request')
->inject('response')
->action(function (string $projectId, string $provider, string $code, string $state, string $error, string $error_description, Request $request, Response $response) {
$protocol = System::getEnv('_APP_OPTIONS_FORCE_HTTPS') === 'disabled' ? 'http' : 'https';
$port = $request->getPort();
$callbackBase = $protocol . '://' . $request->getHostname();
if ($protocol === 'https' && $port !== '443') {
$callbackBase .= ':' . $port;
} elseif ($protocol === 'http' && $port !== '80') {
$callbackBase .= ':' . $port;
}
2021-08-05 05:06:38 +00:00
$params = $request->getParams();
$params['project'] = $projectId;
unset($params['projectId']);
2020-06-29 21:43:34 +00:00
$response
->addHeader('Cache-Control', 'no-store, no-cache, must-revalidate, max-age=0')
->addHeader('Pragma', 'no-cache')
->redirect($callbackBase . '/v1/account/sessions/oauth2/' . $provider . '/redirect?'
. \http_build_query($params));
2020-12-26 14:31:53 +00:00
});
2020-06-28 17:31:21 +00:00
App::get('/v1/account/sessions/oauth2/:provider/redirect')
->desc('Get OAuth2 redirect')
->groups(['api', 'account', 'session'])
2021-08-05 05:06:38 +00:00
->label('error', __DIR__ . '/../../views/general/error.phtml')
2022-04-04 06:30:07 +00:00
->label('event', 'users.[userId].sessions.[sessionId].create')
2020-01-05 11:29:42 +00:00
->label('scope', 'public')
2022-09-05 08:00:08 +00:00
->label('audits.event', 'session.create')
2022-08-15 17:04:23 +00:00
->label('audits.resource', 'user/{user.$id}')
2023-02-05 07:02:56 +00:00
->label('audits.userId', '{user.$id}')
2020-01-05 11:29:42 +00:00
->label('abuse-limit', 50)
->label('abuse-key', 'ip:{ip}')
->label('docs', false)
2023-10-25 17:33:23 +00:00
->param('provider', '', new WhiteList(\array_keys(Config::getParam('oAuthProviders')), true), 'OAuth2 provider.')
->param('code', '', new Text(2048, 0), 'OAuth2 code. This is a temporary code that the will be later exchanged for an access token.', true)
2020-09-10 14:40:14 +00:00
->param('state', '', new Text(2048), 'OAuth2 state params.', true)
->param('error', '', new Text(2048, 0), 'Error code returned from the OAuth2 provider.', true)
->param('error_description', '', new Text(2048, 0), 'Human-readable text providing additional information about the error returned from the OAuth2 provider.', true)
2020-12-26 14:31:53 +00:00
->inject('request')
->inject('response')
->inject('project')
->inject('platforms')
->inject('devKey')
2020-12-26 14:31:53 +00:00
->inject('user')
->inject('dbForProject')
2020-12-26 14:31:53 +00:00
->inject('geodb')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
->action(function (string $provider, string $code, string $state, string $error, string $error_description, Request $request, Response $response, Document $project, array $platforms, Document $devKey, Document $user, Database $dbForProject, Reader $geodb, Event $queueForEvents) use ($oauthDefaultSuccess) {
$protocol = System::getEnv('_APP_OPTIONS_FORCE_HTTPS') === 'disabled' ? 'http' : 'https';
$port = $request->getPort();
$callbackBase = $protocol . '://' . $request->getHostname();
if ($protocol === 'https' && $port !== '443') {
$callbackBase .= ':' . $port;
} elseif ($protocol === 'http' && $port !== '80') {
$callbackBase .= ':' . $port;
}
$callback = $callbackBase . '/v1/account/sessions/oauth2/callback/' . $provider . '/' . $project->getId();
2020-06-29 21:43:34 +00:00
$defaultState = ['success' => $project->getAttribute('url', ''), 'failure' => ''];
$redirect = new Redirect($platforms);
2023-10-25 17:33:23 +00:00
$appId = $project->getAttribute('oAuthProviders', [])[$provider . 'Appid'] ?? '';
$appSecret = $project->getAttribute('oAuthProviders', [])[$provider . 'Secret'] ?? '{}';
$providerEnabled = $project->getAttribute('oAuthProviders', [])[$provider . 'Enabled'] ?? false;
2021-08-06 12:30:56 +00:00
$className = 'Appwrite\\Auth\\OAuth2\\' . \ucfirst($provider);
2020-01-05 11:29:42 +00:00
2021-08-06 10:48:50 +00:00
if (!\class_exists($className)) {
throw new Exception(Exception::PROJECT_PROVIDER_UNSUPPORTED);
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
2023-10-25 17:33:23 +00:00
$providers = Config::getParam('oAuthProviders');
$providerName = $providers[$provider]['name'] ?? '';
/** @var Appwrite\Auth\OAuth2 $oauth2 */
2021-08-06 10:48:50 +00:00
$oauth2 = new $className($appId, $appSecret, $callback);
2020-01-05 11:29:42 +00:00
2020-06-29 21:43:34 +00:00
if (!empty($state)) {
try {
$state = \array_merge($defaultState, $oauth2->parseState($state));
} catch (\Throwable $exception) {
throw new Exception(Exception::GENERAL_SERVER_ERROR, 'Failed to parse login state params as passed from OAuth2 provider');
2020-01-05 11:29:42 +00:00
}
2020-06-29 21:43:34 +00:00
} else {
$state = $defaultState;
}
2020-01-05 11:29:42 +00:00
if ($devKey->isEmpty() && !$redirect->isValid($state['success'])) {
throw new Exception(Exception::PROJECT_INVALID_SUCCESS_URL);
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
if ($devKey->isEmpty() && !empty($state['failure']) && !$redirect->isValid($state['failure'])) {
throw new Exception(Exception::PROJECT_INVALID_FAILURE_URL);
2020-06-29 21:43:34 +00:00
}
$failure = [];
if (!empty($state['failure'])) {
$failure = URLParser::parse($state['failure']);
}
$failureRedirect = (function (string $type, ?string $message = null, ?int $code = null) use ($failure, $response) {
$exception = new Exception($type, $message, $code);
if (!empty($failure)) {
$query = URLParser::parseQuery($failure['query']);
$query['error'] = json_encode([
'message' => $exception->getMessage(),
'type' => $exception->getType(),
'code' => !\is_null($code) ? $code : $exception->getCode(),
]);
$failure['query'] = URLParser::unparseQuery($query);
$response->redirect(URLParser::unparse($failure), 301);
}
2021-08-05 05:06:38 +00:00
throw $exception;
});
2020-01-05 11:29:42 +00:00
if (!$providerEnabled) {
$failureRedirect(Exception::PROJECT_PROVIDER_DISABLED, 'This provider is disabled. Please enable the provider from your ' . APP_NAME . ' console to continue.');
}
2020-01-05 11:29:42 +00:00
if (!empty($error)) {
$message = 'The ' . $providerName . ' OAuth2 provider returned an error: ' . $error;
if (!empty($error_description)) {
$message .= ': ' . $error_description;
2020-01-05 11:29:42 +00:00
}
$failureRedirect(Exception::USER_OAUTH2_PROVIDER_ERROR, $message);
}
2020-01-05 11:29:42 +00:00
if (empty($code)) {
$failureRedirect(Exception::USER_OAUTH2_PROVIDER_ERROR, 'Missing OAuth2 code. Please contact the Appwrite team for additional support.');
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
if (!empty($appSecret) && isset($appSecret['version'])) {
2024-04-01 11:02:47 +00:00
$key = System::getEnv('_APP_OPENSSL_KEY_V' . $appSecret['version']);
$appSecret = OpenSSL::decrypt($appSecret['data'], $appSecret['method'], $key, 0, \hex2bin($appSecret['iv']), \hex2bin($appSecret['tag']));
2020-06-29 21:43:34 +00:00
}
2021-08-05 05:06:38 +00:00
$accessToken = '';
$refreshToken = '';
$accessTokenExpiry = 0;
2020-01-05 11:29:42 +00:00
try {
$accessToken = $oauth2->getAccessToken($code);
$refreshToken = $oauth2->getRefreshToken($code);
$accessTokenExpiry = $oauth2->getAccessTokenExpiry($code);
} catch (OAuth2Exception $ex) {
$failureRedirect(
$ex->getType(),
'Failed to obtain access token. The ' . $providerName . ' OAuth2 provider returned an error: ' . $ex->getMessage(),
$ex->getCode(),
);
}
2020-01-05 11:29:42 +00:00
$oauth2ID = $oauth2->getUserID($accessToken);
if (empty($oauth2ID)) {
$failureRedirect(Exception::USER_MISSING_ID);
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
$name = '';
$nameOAuth = $oauth2->getUserName($accessToken);
$userParam = $request->getParam('user');
if (!empty($nameOAuth)) {
$name = $nameOAuth;
} elseif ($userParam !== null) {
$userDecoded = \json_decode($userParam, true);
if (isset($userDecoded['name']['firstName']) && isset($userDecoded['name']['lastName'])) {
$name = $userDecoded['name']['firstName'] . ' ' . $userDecoded['name']['lastName'];
}
}
$email = $oauth2->getUserEmail($accessToken);
// Check if this identity is connected to a different user
if (!$user->isEmpty()) {
$userId = $user->getId();
$identityWithMatchingEmail = $dbForProject->findOne('identities', [
Query::equal('providerEmail', [$email]),
2025-05-26 05:42:11 +00:00
Query::notEqual('userInternalId', $user->getSequence()),
]);
2024-10-07 02:40:01 +00:00
if (!$identityWithMatchingEmail->isEmpty()) {
$failureRedirect(Exception::USER_ALREADY_EXISTS);
}
$userWithMatchingEmail = $dbForProject->find('users', [
Query::equal('email', [$email]),
Query::notEqual('$id', $userId),
]);
if (!empty($userWithMatchingEmail)) {
$failureRedirect(Exception::USER_ALREADY_EXISTS);
}
$sessionUpgrade = true;
}
2021-05-06 22:31:05 +00:00
$sessions = $user->getAttribute('sessions', []);
2024-01-15 14:37:47 +00:00
$current = Auth::sessionVerify($sessions, Auth::$secret);
2020-01-05 11:29:42 +00:00
2021-08-05 05:06:38 +00:00
if ($current) { // Delete current session of new one.
2022-04-04 09:59:32 +00:00
$currentDocument = $dbForProject->getDocument('sessions', $current);
2022-05-23 14:54:50 +00:00
if (!$currentDocument->isEmpty()) {
2022-04-04 09:59:32 +00:00
$dbForProject->deleteDocument('sessions', $currentDocument->getId());
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2021-05-06 22:31:05 +00:00
}
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
if ($user->isEmpty()) {
$session = $dbForProject->findOne('sessions', [ // Get user by provider id
Query::equal('provider', [$provider]),
Query::equal('providerUid', [$oauth2ID]),
]);
if (!$session->isEmpty()) {
$user->setAttributes($dbForProject->getDocument('users', $session->getAttribute('userId'))->getArrayCopy());
}
}
2020-01-05 11:29:42 +00:00
2021-07-17 21:21:33 +00:00
if ($user === false || $user->isEmpty()) { // No user logged in or with OAuth2 provider ID, create new one or connect with account with same email
2023-05-01 15:51:31 +00:00
if (empty($email)) {
$failureRedirect(Exception::USER_UNAUTHORIZED, 'OAuth provider failed to return email.');
2023-05-01 13:54:33 +00:00
}
2022-05-16 09:34:00 +00:00
/**
* Is verified is not used yet, since we don't know after an account is created anymore if it was verified or not.
2022-05-16 09:34:00 +00:00
*/
$isVerified = $oauth2->isEmailVerified($accessToken);
2020-01-05 11:29:42 +00:00
$userWithEmail = $dbForProject->findOne('users', [
2022-08-11 23:53:52 +00:00
Query::equal('email', [$email]),
]);
if (!$userWithEmail->isEmpty()) {
$user->setAttributes($userWithEmail->getArrayCopy());
}
2020-01-05 11:29:42 +00:00
// If user is not found, check if there is an identity with the same provider user ID
if ($user === false || $user->isEmpty()) {
$identity = $dbForProject->findOne('identities', [
Query::equal('provider', [$provider]),
Query::equal('providerUid', [$oauth2ID]),
]);
2021-08-05 05:06:38 +00:00
if (!$identity->isEmpty()) {
$user = $dbForProject->getDocument('users', $identity->getAttribute('userId'));
}
}
if ($user === false || $user->isEmpty()) { // Last option -> create the user
2021-08-06 08:34:17 +00:00
$limit = $project->getAttribute('auths', [])['limit'] ?? 0;
2021-08-05 05:06:38 +00:00
2021-02-28 18:36:13 +00:00
if ($limit !== 0) {
2022-05-16 09:58:17 +00:00
$total = $dbForProject->count('users', max: APP_LIMIT_USERS);
2021-07-17 21:21:33 +00:00
2022-02-27 09:57:09 +00:00
if ($total >= $limit) {
$failureRedirect(Exception::USER_COUNT_EXCEEDED);
2021-02-28 18:36:13 +00:00
}
}
2021-08-05 05:06:38 +00:00
// Makes sure this email is not already used in another identity
$identityWithMatchingEmail = $dbForProject->findOne('identities', [
Query::equal('providerEmail', [$email]),
]);
if (!$identityWithMatchingEmail->isEmpty()) {
$failureRedirect(Exception::GENERAL_BAD_REQUEST); /** Return a generic bad request to prevent exposing existing accounts */
}
2020-06-29 21:43:34 +00:00
try {
2022-08-14 14:22:38 +00:00
$userId = ID::unique();
$user->setAttributes([
2022-08-14 14:22:38 +00:00
'$id' => $userId,
'$permissions' => [
2022-08-14 05:21:11 +00:00
Permission::read(Role::any()),
2022-08-14 14:22:38 +00:00
Permission::update(Role::user($userId)),
Permission::delete(Role::user($userId)),
],
2020-06-29 21:43:34 +00:00
'email' => $email,
2022-05-16 09:34:00 +00:00
'emailVerification' => true,
'status' => true, // Email should already be authenticated by OAuth2 provider
'password' => null,
2022-05-04 14:37:37 +00:00
'hash' => Auth::DEFAULT_ALGO,
'hashOptions' => Auth::DEFAULT_ALGO_OPTIONS,
2022-07-04 09:55:11 +00:00
'passwordUpdate' => null,
2022-07-13 14:02:49 +00:00
'registration' => DateTime::now(),
2020-06-29 21:43:34 +00:00
'reset' => false,
'name' => $name,
2024-01-10 16:22:32 +00:00
'mfa' => false,
2021-12-28 10:48:50 +00:00
'prefs' => new \stdClass(),
2022-04-26 10:36:49 +00:00
'sessions' => null,
2022-04-27 11:06:53 +00:00
'tokens' => null,
2022-04-27 12:44:47 +00:00
'memberships' => null,
2024-02-29 20:59:49 +00:00
'authenticators' => null,
'search' => implode(' ', [$userId, $email, $name]),
'accessedAt' => DateTime::now(),
]);
2025-05-26 05:42:11 +00:00
$user->removeAttribute('$sequence');
2024-03-06 17:34:21 +00:00
$userDoc = Authorization::skip(fn () => $dbForProject->createDocument('users', $user));
2023-11-14 19:54:55 +00:00
$dbForProject->createDocument('targets', new Document([
'$permissions' => [
2024-02-16 04:07:16 +00:00
Permission::read(Role::user($user->getId())),
2023-11-14 19:54:55 +00:00
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
],
'userId' => $userDoc->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $userDoc->getSequence(),
2023-11-29 04:05:37 +00:00
'providerType' => MESSAGE_TYPE_EMAIL,
2023-11-14 19:54:55 +00:00
'identifier' => $email,
]));
2024-09-25 09:39:11 +00:00
} catch (Duplicate) {
$failureRedirect(Exception::USER_ALREADY_EXISTS);
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
}
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
Authorization::setRole(Role::user($user->getId())->toString());
Authorization::setRole(Role::users()->toString());
if (false === $user->getAttribute('status')) { // Account is blocked
$failureRedirect(Exception::USER_BLOCKED); // User is in status blocked
}
$identity = $dbForProject->findOne('identities', [
2025-05-26 05:42:11 +00:00
Query::equal('userInternalId', [$user->getSequence()]),
Query::equal('provider', [$provider]),
Query::equal('providerUid', [$oauth2ID]),
]);
if ($identity->isEmpty()) {
// Before creating the identity, check if the email is already associated with another user
$userId = $user->getId();
$identitiesWithMatchingEmail = $dbForProject->find('identities', [
Query::equal('providerEmail', [$email]),
2025-05-26 05:42:11 +00:00
Query::notEqual('userInternalId', $user->getSequence()),
]);
if (!empty($identitiesWithMatchingEmail)) {
$failureRedirect(Exception::GENERAL_BAD_REQUEST); /** Return a generic bad request to prevent exposing existing accounts */
}
$dbForProject->createDocument('identities', new Document([
'$id' => ID::unique(),
'$permissions' => [
Permission::read(Role::any()),
Permission::update(Role::user($userId)),
Permission::delete(Role::user($userId)),
],
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
'userId' => $userId,
'provider' => $provider,
'providerUid' => $oauth2ID,
'providerEmail' => $email,
'providerAccessToken' => $accessToken,
'providerRefreshToken' => $refreshToken,
'providerAccessTokenExpiry' => DateTime::addSeconds(new \DateTime(), (int)$accessTokenExpiry),
]));
} else {
$identity
->setAttribute('providerAccessToken', $accessToken)
->setAttribute('providerRefreshToken', $refreshToken)
->setAttribute('providerAccessTokenExpiry', DateTime::addSeconds(new \DateTime(), (int)$accessTokenExpiry));
$dbForProject->updateDocument('identities', $identity->getId(), $identity);
}
if (empty($user->getAttribute('email'))) {
$user->setAttribute('email', $oauth2->getUserEmail($accessToken));
}
2021-02-16 15:51:08 +00:00
if (empty($user->getAttribute('name'))) {
$user->setAttribute('name', $oauth2->getUserName($accessToken));
2021-02-16 15:51:08 +00:00
}
2024-01-09 16:38:29 +00:00
$user->setAttribute('status', true);
2020-06-29 21:43:34 +00:00
2022-04-26 10:46:35 +00:00
$dbForProject->updateDocument('users', $user->getId(), $user);
2020-06-29 21:43:34 +00:00
2022-08-19 04:04:33 +00:00
Authorization::setRole(Role::user($user->getId())->toString());
2020-06-29 21:43:34 +00:00
2024-01-09 16:38:29 +00:00
$state['success'] = URLParser::parse($state['success']);
$query = URLParser::parseQuery($state['success']['query']);
2022-04-26 10:46:35 +00:00
2024-01-09 16:38:29 +00:00
$duration = $project->getAttribute('auths', [])['duration'] ?? Auth::TOKEN_EXPIRATION_LOGIN_LONG;
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), $duration));
2021-07-17 21:21:33 +00:00
2024-01-09 16:38:29 +00:00
// If the `token` param is set, we will return the token in the query string
if ($state['token']) {
2024-01-11 10:51:26 +00:00
$secret = Auth::tokenGenerator(Auth::TOKEN_LENGTH_OAUTH2);
2024-01-09 16:38:29 +00:00
$token = new Document([
'$id' => ID::unique(),
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
2024-01-09 16:38:29 +00:00
'type' => Auth::TOKEN_TYPE_OAUTH2,
'secret' => Auth::hash($secret), // One way hash encryption to protect DB leak
'expire' => $expire,
'userAgent' => $request->getUserAgent('UNKNOWN'),
'ip' => $request->getIP(),
]);
2020-06-29 21:43:34 +00:00
2024-01-09 16:38:29 +00:00
Authorization::setRole(Role::user($user->getId())->toString());
2022-11-03 15:03:39 +00:00
2024-01-09 16:38:29 +00:00
$token = $dbForProject->createDocument('tokens', $token
->setAttribute('$permissions', [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]));
2022-04-04 06:30:07 +00:00
2024-01-09 16:38:29 +00:00
$queueForEvents
->setEvent('users.[userId].tokens.[tokenId].create')
->setParam('userId', $user->getId())
->setParam('tokenId', $token->getId())
;
2021-08-05 05:06:38 +00:00
2024-01-09 16:38:29 +00:00
$query['secret'] = $secret;
$query['userId'] = $user->getId();
2023-09-28 12:45:52 +00:00
2024-03-06 17:34:21 +00:00
// If the `token` param is not set, we persist the session in a cookie
2024-01-09 16:38:29 +00:00
} else {
$detector = new Detector($request->getUserAgent('UNKNOWN'));
$record = $geodb->get($request->getIP());
$secret = Auth::tokenGenerator(Auth::TOKEN_LENGTH_SESSION);
2024-01-09 16:41:42 +00:00
2024-01-09 16:38:29 +00:00
$session = new Document(array_merge([
'$id' => ID::unique(),
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
2024-01-09 16:38:29 +00:00
'provider' => $provider,
'providerUid' => $oauth2ID,
'providerAccessToken' => $accessToken,
'providerRefreshToken' => $refreshToken,
'providerAccessTokenExpiry' => DateTime::addSeconds(new \DateTime(), (int)$accessTokenExpiry),
'secret' => Auth::hash($secret), // One way hash encryption to protect DB leak
'userAgent' => $request->getUserAgent('UNKNOWN'),
'ip' => $request->getIP(),
'factors' => [TYPE::EMAIL, 'oauth2'], // include a special oauth2 factor to bypass MFA checks
2024-01-09 16:38:29 +00:00
'countryCode' => ($record) ? \strtolower($record['country']['iso_code']) : '--',
2024-01-22 11:20:33 +00:00
'expire' => DateTime::addSeconds(new \DateTime(), $duration)
2024-01-09 16:38:29 +00:00
], $detector->getOS(), $detector->getClient(), $detector->getDevice()));
2023-09-28 12:45:52 +00:00
2024-01-09 16:38:29 +00:00
$session = $dbForProject->createDocument('sessions', $session->setAttribute('$permissions', [
2023-09-28 12:45:52 +00:00
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]));
2024-01-09 16:38:29 +00:00
$session->setAttribute('expire', $expire);
2023-09-28 12:45:52 +00:00
2024-01-09 16:38:29 +00:00
if (!Config::getParam('domainVerification')) {
$response->addHeader('X-Fallback-Cookies', \json_encode([Auth::$cookieName => Auth::encodeSession($user->getId(), $secret)]));
}
$queueForEvents
->setParam('userId', $user->getId())
->setParam('sessionId', $session->getId())
->setPayload($response->output($session, Response::MODEL_SESSION))
;
2021-08-05 05:06:38 +00:00
2024-02-28 23:50:40 +00:00
// TODO: Remove this deprecated workaround - support only token
2024-01-09 16:38:29 +00:00
if ($state['success']['path'] == $oauthDefaultSuccess) {
$query['project'] = $project->getId();
$query['domain'] = Config::getParam('cookieDomain');
$query['key'] = Auth::$cookieName;
2024-02-28 23:50:40 +00:00
$query['secret'] = Auth::encodeSession($user->getId(), $secret);
2024-01-09 16:38:29 +00:00
}
$response
->addCookie(Auth::$cookieName . '_legacy', Auth::encodeSession($user->getId(), $secret), (new \DateTime($expire))->getTimestamp(), '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, null)
->addCookie(Auth::$cookieName, Auth::encodeSession($user->getId(), $secret), (new \DateTime($expire))->getTimestamp(), '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, Config::getParam('cookieSamesite'));
2020-06-29 21:43:34 +00:00
}
if (isset($sessionUpgrade) && $sessionUpgrade) {
foreach ($user->getAttribute('targets', []) as $target) {
if ($target->getAttribute('providerType') !== MESSAGE_TYPE_PUSH) {
continue;
2024-03-06 18:07:58 +00:00
}
2024-03-06 18:07:58 +00:00
$target
->setAttribute('sessionId', $session->getId())
2025-05-26 05:42:11 +00:00
->setAttribute('sessionInternalId', $session->getSequence());
2024-03-06 18:07:58 +00:00
$dbForProject->updateDocument('targets', $target->getId(), $target);
}
}
2024-03-06 18:07:58 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2024-03-06 18:07:58 +00:00
$state['success']['query'] = URLParser::unparseQuery($query);
$state['success'] = URLParser::unparse($state['success']);
2024-03-06 18:07:58 +00:00
$response
->addHeader('Cache-Control', 'no-store, no-cache, must-revalidate, max-age=0')
->addHeader('Pragma', 'no-cache')
->redirect($state['success'])
;
});
2024-03-06 18:07:58 +00:00
App::get('/v1/account/tokens/oauth2/:provider')
->desc('Create OAuth2 token')
->groups(['api', 'account'])
2024-03-06 18:07:58 +00:00
->label('error', __DIR__ . '/../../views/general/error.phtml')
->label('scope', 'sessions.write')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
group: 'tokens',
2025-01-17 04:31:39 +00:00
name: 'createOAuth2Token',
description: '/docs/references/account/create-token-oauth2.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_MOVED_PERMANENTLY,
model: Response::MODEL_NONE,
)
],
contentType: ContentType::HTML,
type: MethodType::WEBAUTH,
))
2024-03-06 18:07:58 +00:00
->label('abuse-limit', 50)
->label('abuse-key', 'ip:{ip}')
->param('provider', '', new WhiteList(\array_keys(Config::getParam('oAuthProviders')), true), 'OAuth2 Provider. Currently, supported providers are: ' . \implode(', ', \array_keys(\array_filter(Config::getParam('oAuthProviders'), fn ($node) => (!$node['mock'])))) . '.')
->param('success', '', fn ($platforms, $devKey) => $devKey->isEmpty() ? new Redirect($platforms) : new URL(), 'URL to redirect back to your app after a successful login attempt. Only URLs from hostnames in your project\'s platform list are allowed. This requirement helps to prevent an [open redirect](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) attack against your project API.', true, ['platforms', 'devKey'])
->param('failure', '', fn ($platforms, $devKey) => $devKey->isEmpty() ? new Redirect($platforms) : new URL(), 'URL to redirect back to your app after a failed login attempt. Only URLs from hostnames in your project\'s platform list are allowed. This requirement helps to prevent an [open redirect](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) attack against your project API.', true, ['platforms', 'devKey'])
2024-03-06 18:07:58 +00:00
->param('scopes', [], new ArrayList(new Text(APP_LIMIT_ARRAY_ELEMENT_SIZE), APP_LIMIT_ARRAY_PARAMS_SIZE), 'A list of custom OAuth2 scopes. Check each provider internal docs for a list of supported scopes. Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' scopes are allowed, each ' . APP_LIMIT_ARRAY_ELEMENT_SIZE . ' characters long.', true)
->inject('request')
->inject('response')
2024-03-06 18:07:58 +00:00
->inject('project')
->action(function (string $provider, string $success, string $failure, array $scopes, Request $request, Response $response, Document $project) use ($oauthDefaultSuccess, $oauthDefaultFailure) {
$protocol = System::getEnv('_APP_OPTIONS_FORCE_HTTPS') === 'disabled' ? 'http' : 'https';
$port = $request->getPort();
$callbackBase = $protocol . '://' . $request->getHostname();
if ($protocol === 'https' && $port !== '443') {
$callbackBase .= ':' . $port;
} elseif ($protocol === 'http' && $port !== '80') {
$callbackBase .= ':' . $port;
}
$callback = $callbackBase . '/v1/account/sessions/oauth2/callback/' . $provider . '/' . $project->getId();
2024-03-06 18:07:58 +00:00
$providerEnabled = $project->getAttribute('oAuthProviders', [])[$provider . 'Enabled'] ?? false;
2024-03-06 18:07:58 +00:00
if (!$providerEnabled) {
throw new Exception(Exception::PROJECT_PROVIDER_DISABLED, 'This provider is disabled. Please enable the provider from your ' . APP_NAME . ' console to continue.');
}
2024-03-06 18:07:58 +00:00
$appId = $project->getAttribute('oAuthProviders', [])[$provider . 'Appid'] ?? '';
$appSecret = $project->getAttribute('oAuthProviders', [])[$provider . 'Secret'] ?? '{}';
2024-03-06 18:07:58 +00:00
if (!empty($appSecret) && isset($appSecret['version'])) {
2024-04-01 11:02:47 +00:00
$key = System::getEnv('_APP_OPENSSL_KEY_V' . $appSecret['version']);
2024-03-06 18:07:58 +00:00
$appSecret = OpenSSL::decrypt($appSecret['data'], $appSecret['method'], $key, 0, \hex2bin($appSecret['iv']), \hex2bin($appSecret['tag']));
}
2024-03-06 18:07:58 +00:00
if (empty($appId) || empty($appSecret)) {
throw new Exception(Exception::PROJECT_PROVIDER_DISABLED, 'This provider is disabled. Please configure the provider app ID and app secret key from your ' . APP_NAME . ' console to continue.');
}
$className = 'Appwrite\\Auth\\OAuth2\\' . \ucfirst($provider);
if (!\class_exists($className)) {
throw new Exception(Exception::PROJECT_PROVIDER_UNSUPPORTED);
}
$host = System::getEnv('_APP_CONSOLE_DOMAIN', System::getEnv('_APP_DOMAIN', ''));
$redirectBase = $protocol . '://' . $host;
if ($protocol === 'https' && $port !== '443') {
$redirectBase .= ':' . $port;
} elseif ($protocol === 'http' && $port !== '80') {
$redirectBase .= ':' . $port;
}
2024-03-06 18:07:58 +00:00
if (empty($success)) {
$success = $redirectBase . $oauthDefaultSuccess;
2024-03-06 18:07:58 +00:00
}
if (empty($failure)) {
$failure = $redirectBase . $oauthDefaultFailure;
2024-03-06 18:07:58 +00:00
}
$oauth2 = new $className($appId, $appSecret, $callback, [
'success' => $success,
'failure' => $failure,
'token' => true,
], $scopes);
$response
->addHeader('Cache-Control', 'no-store, no-cache, must-revalidate, max-age=0')
->addHeader('Pragma', 'no-cache')
->redirect($oauth2->getLoginURL());
});
2023-11-30 11:35:52 +00:00
App::post('/v1/account/tokens/magic-url')
->alias('/v1/account/sessions/magic-url')
->desc('Create magic URL token')
2024-02-12 01:18:19 +00:00
->groups(['api', 'account', 'auth'])
2024-01-17 11:17:03 +00:00
->label('scope', 'sessions.write')
->label('auth.type', 'magic-url')
2022-09-05 08:00:08 +00:00
->label('audits.event', 'session.create')
2022-08-11 13:19:05 +00:00
->label('audits.resource', 'user/{response.userId}')
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
group: 'tokens',
2025-01-17 04:31:39 +00:00
name: 'createMagicURLToken',
description: '/docs/references/account/create-token-magic-url.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_TOKEN,
)
],
contentType: ContentType::JSON,
))
2024-02-12 01:18:19 +00:00
->label('abuse-limit', 60)
->label('abuse-key', ['url:{url},email:{param-email}', 'url:{url},ip:{ip}'])
->param('userId', '', new CustomId(), 'Unique Id. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
2021-08-30 10:44:52 +00:00
->param('email', '', new Email(), 'User email.')
->param('url', '', fn ($platforms, $devKey) => $devKey->isEmpty() ? new Redirect($platforms) : new URL(), 'URL to redirect the user back to your app from the magic URL login. Only URLs from hostnames in your project platform list are allowed. This requirement helps to prevent an [open redirect](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) attack against your project API.', true, ['platforms', 'devKey'])
2024-02-01 14:13:30 +00:00
->param('phrase', false, new Boolean(), 'Toggle for security phrase. If enabled, email will be send with a randomly generated phrase and the phrase will also be included in the response. Confirming phrases match increases the security of your authentication flow.', true)
2021-08-30 10:44:52 +00:00
->inject('request')
->inject('response')
->inject('user')
2021-08-30 10:44:52 +00:00
->inject('project')
->inject('dbForProject')
2021-08-30 10:44:52 +00:00
->inject('locale')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2023-06-11 14:08:48 +00:00
->inject('queueForMails')
2024-02-01 10:41:01 +00:00
->action(function (string $userId, string $email, string $url, bool $phrase, Request $request, Response $response, Document $user, Document $project, Database $dbForProject, Locale $locale, Event $queueForEvents, Mail $queueForMails) {
2024-04-01 11:02:47 +00:00
if (empty(System::getEnv('_APP_SMTP_HOST'))) {
2022-08-16 06:59:03 +00:00
throw new Exception(Exception::GENERAL_SMTP_DISABLED, 'SMTP disabled');
}
2024-07-22 13:37:28 +00:00
$url = htmlentities($url);
2021-08-05 05:06:38 +00:00
2024-02-01 10:41:01 +00:00
if ($phrase === true) {
2024-02-01 14:13:30 +00:00
$phrase = Phrase::generate();
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
$result = $dbForProject->findOne('users', [Query::equal('email', [$email])]);
if (!$result->isEmpty()) {
$user->setAttributes($result->getArrayCopy());
} else {
2021-10-07 19:10:43 +00:00
$limit = $project->getAttribute('auths', [])['limit'] ?? 0;
2021-08-30 10:44:52 +00:00
if ($limit !== 0) {
2022-05-16 09:58:17 +00:00
$total = $dbForProject->count('users', max: APP_LIMIT_USERS);
2021-08-30 10:44:52 +00:00
2022-02-27 09:57:09 +00:00
if ($total >= $limit) {
2022-08-16 06:59:03 +00:00
throw new Exception(Exception::USER_COUNT_EXCEEDED);
2021-08-30 10:44:52 +00:00
}
}
// Makes sure this email is not already used in another identity
$identityWithMatchingEmail = $dbForProject->findOne('identities', [
Query::equal('providerEmail', [$email]),
]);
if (!$identityWithMatchingEmail->isEmpty()) {
throw new Exception(Exception::USER_EMAIL_ALREADY_EXISTS);
}
2023-04-11 23:01:50 +00:00
$userId = $userId === 'unique()' ? ID::unique() : $userId;
2021-08-30 10:44:52 +00:00
$user->setAttributes([
2022-08-14 14:22:38 +00:00
'$id' => $userId,
'$permissions' => [
2022-08-14 05:21:11 +00:00
Permission::read(Role::any()),
2022-08-15 11:24:31 +00:00
Permission::update(Role::user($userId)),
Permission::delete(Role::user($userId)),
],
'email' => $email,
'emailVerification' => false,
'status' => true,
'password' => null,
2022-05-04 14:37:37 +00:00
'hash' => Auth::DEFAULT_ALGO,
'hashOptions' => Auth::DEFAULT_ALGO_OPTIONS,
2022-07-04 09:55:11 +00:00
'passwordUpdate' => null,
2022-07-13 14:02:49 +00:00
'registration' => DateTime::now(),
'reset' => false,
2024-01-10 16:22:32 +00:00
'mfa' => false,
2021-12-28 10:48:50 +00:00
'prefs' => new \stdClass(),
2022-04-26 10:36:49 +00:00
'sessions' => null,
2022-04-27 11:06:53 +00:00
'tokens' => null,
2022-04-27 12:44:47 +00:00
'memberships' => null,
2024-02-29 20:59:49 +00:00
'authenticators' => null,
'search' => implode(' ', [$userId, $email]),
'accessedAt' => DateTime::now(),
]);
2025-05-26 05:42:11 +00:00
$user->removeAttribute('$sequence');
Authorization::skip(fn () => $dbForProject->createDocument('users', $user));
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
2024-01-11 10:51:26 +00:00
$tokenSecret = Auth::tokenGenerator(Auth::TOKEN_LENGTH_MAGIC_URL);
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), Auth::TOKEN_EXPIRATION_CONFIRM));
2020-01-05 11:29:42 +00:00
2021-08-30 10:44:52 +00:00
$token = new Document([
2022-08-14 14:22:38 +00:00
'$id' => ID::unique(),
2021-08-30 10:44:52 +00:00
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
2021-08-30 10:44:52 +00:00
'type' => Auth::TOKEN_TYPE_MAGIC_URL,
2023-10-10 12:30:42 +00:00
'secret' => Auth::hash($tokenSecret), // One way hash encryption to protect DB leak
2022-11-04 14:48:29 +00:00
'expire' => $expire,
2021-08-30 10:44:52 +00:00
'userAgent' => $request->getUserAgent('UNKNOWN'),
'ip' => $request->getIP(),
]);
2022-08-19 04:04:33 +00:00
Authorization::setRole(Role::user($user->getId())->toString());
2021-08-30 10:44:52 +00:00
2022-04-27 11:06:53 +00:00
$token = $dbForProject->createDocument('tokens', $token
->setAttribute('$permissions', [
2022-08-15 11:24:31 +00:00
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]));
2021-08-30 10:44:52 +00:00
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2021-08-30 10:44:52 +00:00
2022-05-23 14:54:50 +00:00
if (empty($url)) {
$protocol = System::getEnv('_APP_OPTIONS_FORCE_HTTPS') === 'disabled' ? 'http' : 'https';
$host = System::getEnv('_APP_CONSOLE_DOMAIN', System::getEnv('_APP_DOMAIN', ''));
$port = $request->getPort();
$callbackBase = $protocol . '://' . $host;
if ($protocol === 'https' && $port !== '443') {
$callbackBase .= ':' . $port;
} elseif ($protocol === 'http' && $port !== '80') {
$callbackBase .= ':' . $port;
}
$url = $callbackBase . '/console/auth/magic-url';
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
2021-08-30 10:44:52 +00:00
$url = Template::parseURL($url);
2023-10-10 13:36:53 +00:00
$url['query'] = Template::mergeQuery(((isset($url['query'])) ? $url['query'] : ''), ['userId' => $user->getId(), 'secret' => $tokenSecret, 'expire' => $expire, 'project' => $project->getId()]);
2021-08-30 10:44:52 +00:00
$url = Template::unParseURL($url);
$subject = $locale->getText("emails.magicSession.subject");
2025-07-23 16:34:25 +00:00
$preview = $locale->getText("emails.magicSession.preview");
$customTemplate = $project->getAttribute('templates', [])['email.magicSession-' . $locale->default] ?? [];
2023-08-25 15:13:25 +00:00
2024-01-09 12:23:13 +00:00
$detector = new Detector($request->getUserAgent('UNKNOWN'));
$agentOs = $detector->getOS();
$agentClient = $detector->getClient();
$agentDevice = $detector->getDevice();
$message = Template::fromFile(__DIR__ . '/../../config/locale/templates/email-magic-url.tpl');
$message
->setParam('{{hello}}', $locale->getText("emails.magicSession.hello"))
2024-01-09 12:23:13 +00:00
->setParam('{{optionButton}}', $locale->getText("emails.magicSession.optionButton"))
->setParam('{{buttonText}}', $locale->getText("emails.magicSession.buttonText"))
->setParam('{{optionUrl}}', $locale->getText("emails.magicSession.optionUrl"))
->setParam('{{clientInfo}}', $locale->getText("emails.magicSession.clientInfo"))
->setParam('{{thanks}}', $locale->getText("emails.magicSession.thanks"))
->setParam('{{signature}}', $locale->getText("emails.magicSession.signature"));
2024-01-10 14:52:32 +00:00
2024-02-01 10:41:01 +00:00
if (!empty($phrase)) {
2024-01-10 14:52:32 +00:00
$message->setParam('{{securityPhrase}}', $locale->getText("emails.magicSession.securityPhrase"));
} else {
$message->setParam('{{securityPhrase}}', '');
}
2020-01-05 11:29:42 +00:00
2023-08-29 09:40:30 +00:00
$body = $message->render();
2022-05-16 09:34:00 +00:00
2023-08-29 09:40:30 +00:00
$smtp = $project->getAttribute('smtp', []);
$smtpEnabled = $smtp['enabled'] ?? false;
2020-01-05 11:29:42 +00:00
2024-04-01 11:02:47 +00:00
$senderEmail = System::getEnv('_APP_SYSTEM_EMAIL_ADDRESS', APP_EMAIL_TEAM);
$senderName = System::getEnv('_APP_SYSTEM_EMAIL_NAME', APP_NAME . ' Server');
2025-01-14 09:09:37 +00:00
2023-08-29 09:40:30 +00:00
$replyTo = "";
2023-08-29 09:40:30 +00:00
if ($smtpEnabled) {
if (!empty($smtp['senderEmail'])) {
$senderEmail = $smtp['senderEmail'];
}
if (!empty($smtp['senderName'])) {
$senderName = $smtp['senderName'];
}
if (!empty($smtp['replyTo'])) {
$replyTo = $smtp['replyTo'];
}
2020-01-05 11:29:42 +00:00
2023-09-27 17:10:21 +00:00
$queueForMails
2023-08-25 15:13:25 +00:00
->setSmtpHost($smtp['host'] ?? '')
->setSmtpPort($smtp['port'] ?? '')
->setSmtpUsername($smtp['username'] ?? '')
->setSmtpPassword($smtp['password'] ?? '')
2023-08-29 09:40:30 +00:00
->setSmtpSecure($smtp['secure'] ?? '');
2023-08-30 04:30:44 +00:00
if (!empty($customTemplate)) {
if (!empty($customTemplate['senderEmail'])) {
$senderEmail = $customTemplate['senderEmail'];
}
2023-08-30 04:30:44 +00:00
if (!empty($customTemplate['senderName'])) {
$senderName = $customTemplate['senderName'];
}
if (!empty($customTemplate['replyTo'])) {
$replyTo = $customTemplate['replyTo'];
}
$body = $customTemplate['message'] ?? '';
$subject = $customTemplate['subject'] ?? $subject;
}
2023-09-27 17:10:21 +00:00
$queueForMails
2023-08-30 04:30:44 +00:00
->setSmtpReplyTo($replyTo)
->setSmtpSenderEmail($senderEmail)
->setSmtpSenderName($senderName);
}
2021-08-05 05:06:38 +00:00
2023-08-27 22:45:37 +00:00
$emailVariables = [
'direction' => $locale->getText('settings.direction'),
// {{user}}, {{redirect}} and {{project}} are required in default and custom templates
2024-02-22 12:47:01 +00:00
'user' => $user->getAttribute('name'),
'project' => $project->getAttribute('name'),
2024-01-09 12:23:13 +00:00
'redirect' => $url,
2024-02-22 12:47:01 +00:00
'agentDevice' => $agentDevice['deviceBrand'] ?? $agentDevice['deviceBrand'] ?? 'UNKNOWN',
'agentClient' => $agentClient['clientName'] ?? 'UNKNOWN',
'agentOs' => $agentOs['osName'] ?? 'UNKNOWN',
'phrase' => !empty($phrase) ? $phrase : '',
// TODO: remove unnecessary team variable from this email
'team' => '',
2023-08-27 22:45:37 +00:00
];
2021-07-17 21:21:33 +00:00
2023-06-11 14:08:48 +00:00
$queueForMails
->setSubject($subject)
2025-07-23 16:34:25 +00:00
->setPreview($preview)
->setBody($body)
2023-08-27 22:45:37 +00:00
->setVariables($emailVariables)
2023-08-30 04:30:44 +00:00
->setRecipient($email)
->trigger();
2021-08-05 05:06:38 +00:00
2024-05-22 02:11:06 +00:00
$token->setAttribute('secret', $tokenSecret);
$queueForEvents
->setPayload($response->output($token, Response::MODEL_TOKEN), sensitive: ['secret']);
2021-08-30 10:44:52 +00:00
2024-02-01 10:41:01 +00:00
if (!empty($phrase)) {
$token->setAttribute('phrase', $phrase);
2020-06-29 21:43:34 +00:00
}
2020-01-05 11:29:42 +00:00
2021-08-30 10:44:52 +00:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($token, Response::MODEL_TOKEN);
2021-08-30 10:44:52 +00:00
});
2024-01-19 13:42:26 +00:00
App::post('/v1/account/tokens/email')
->desc('Create email token (OTP)')
->groups(['api', 'account', 'auth'])
2024-01-19 13:42:26 +00:00
->label('scope', 'sessions.write')
->label('auth.type', 'email-otp')
2024-01-19 13:42:26 +00:00
->label('audits.event', 'session.create')
2022-08-11 13:19:05 +00:00
->label('audits.resource', 'user/{response.userId}')
2022-08-12 11:01:12 +00:00
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
group: 'tokens',
2025-01-17 04:31:39 +00:00
name: 'createEmailToken',
description: '/docs/references/account/create-token-email.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_TOKEN,
)
],
contentType: ContentType::JSON,
))
2021-08-30 10:44:52 +00:00
->label('abuse-limit', 10)
->label('abuse-key', ['url:{url},email:{param-email}', 'url:{url},ip:{ip}'])
2024-01-19 13:42:26 +00:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('email', '', new Email(), 'User email.')
2024-02-01 14:13:30 +00:00
->param('phrase', false, new Boolean(), 'Toggle for security phrase. If enabled, email will be send with a randomly generated phrase and the phrase will also be included in the response. Confirming phrases match increases the security of your authentication flow.', true)
2021-08-30 10:44:52 +00:00
->inject('request')
->inject('response')
->inject('user')
2022-10-31 14:54:15 +00:00
->inject('project')
2024-01-19 13:42:26 +00:00
->inject('dbForProject')
2021-08-30 10:44:52 +00:00
->inject('locale')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2024-01-19 13:42:26 +00:00
->inject('queueForMails')
2024-02-01 10:41:01 +00:00
->action(function (string $userId, string $email, bool $phrase, Request $request, Response $response, Document $user, Document $project, Database $dbForProject, Locale $locale, Event $queueForEvents, Mail $queueForMails) {
2024-04-01 11:02:47 +00:00
if (empty(System::getEnv('_APP_SMTP_HOST'))) {
2024-01-19 13:42:26 +00:00
throw new Exception(Exception::GENERAL_SMTP_DISABLED, 'SMTP disabled');
}
2024-02-01 10:41:01 +00:00
if ($phrase === true) {
2024-02-01 14:13:30 +00:00
$phrase = Phrase::generate();
}
2024-01-19 13:42:26 +00:00
$result = $dbForProject->findOne('users', [Query::equal('email', [$email])]);
if (!$result->isEmpty()) {
2024-01-19 13:42:26 +00:00
$user->setAttributes($result->getArrayCopy());
} else {
$limit = $project->getAttribute('auths', [])['limit'] ?? 0;
2021-08-30 10:44:52 +00:00
2024-01-19 13:42:26 +00:00
if ($limit !== 0) {
$total = $dbForProject->count('users', max: APP_LIMIT_USERS);
2021-08-30 10:44:52 +00:00
2024-01-19 13:42:26 +00:00
if ($total >= $limit) {
throw new Exception(Exception::USER_COUNT_EXCEEDED);
}
}
2021-08-30 10:44:52 +00:00
2024-01-19 13:42:26 +00:00
// Makes sure this email is not already used in another identity
$identityWithMatchingEmail = $dbForProject->findOne('identities', [
Query::equal('providerEmail', [$email]),
]);
if (!$identityWithMatchingEmail->isEmpty()) {
throw new Exception(Exception::GENERAL_BAD_REQUEST); /** Return a generic bad request to prevent exposing existing accounts */
}
2024-01-19 13:42:26 +00:00
$userId = $userId === 'unique()' ? ID::unique() : $userId;
2022-07-05 10:59:03 +00:00
2024-01-19 13:42:26 +00:00
$user->setAttributes([
'$id' => $userId,
'$permissions' => [
Permission::read(Role::any()),
Permission::update(Role::user($userId)),
Permission::delete(Role::user($userId)),
],
2024-01-19 13:42:26 +00:00
'email' => $email,
'emailVerification' => false,
'status' => true,
'password' => null,
'hash' => Auth::DEFAULT_ALGO,
'hashOptions' => Auth::DEFAULT_ALGO_OPTIONS,
'passwordUpdate' => null,
'registration' => DateTime::now(),
'reset' => false,
'prefs' => new \stdClass(),
'sessions' => null,
'tokens' => null,
'memberships' => null,
'search' => implode(' ', [$userId, $email]),
'accessedAt' => DateTime::now(),
]);
2025-05-26 05:42:11 +00:00
$user->removeAttribute('$sequence');
$user = Authorization::skip(fn () => $dbForProject->createDocument('users', $user));
try {
$target = Authorization::skip(fn () => $dbForProject->createDocument('targets', new Document([
'$permissions' => [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
],
'userId' => $user->getId(),
'userInternalId' => $user->getSequence(),
'providerType' => MESSAGE_TYPE_EMAIL,
'identifier' => $email,
])));
$user->setAttribute('targets', [...$user->getAttribute('targets', []), $target]);
} catch (Duplicate) {
$existingTarget = $dbForProject->findOne('targets', [
Query::equal('identifier', [$email]),
]);
if (!$existingTarget->isEmpty()) {
$user->setAttribute('targets', $existingTarget, Document::SET_TYPE_APPEND);
}
}
$dbForProject->purgeCachedDocument('users', $user->getId());
}
2024-01-19 13:42:26 +00:00
$tokenSecret = Auth::codeGenerator(6);
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), Auth::TOKEN_EXPIRATION_OTP));
2022-07-05 10:59:03 +00:00
2024-01-19 13:42:26 +00:00
$token = new Document([
2022-08-14 14:22:38 +00:00
'$id' => ID::unique(),
2022-08-15 11:24:31 +00:00
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
2024-01-19 13:42:26 +00:00
'type' => Auth::TOKEN_TYPE_EMAIL,
'secret' => Auth::hash($tokenSecret), // One way hash encryption to protect DB leak
'expire' => $expire,
2020-07-03 15:14:51 +00:00
'userAgent' => $request->getUserAgent('UNKNOWN'),
2020-06-29 21:43:34 +00:00
'ip' => $request->getIP(),
2024-01-19 13:42:26 +00:00
]);
2020-06-29 21:43:34 +00:00
2022-08-19 04:04:33 +00:00
Authorization::setRole(Role::user($user->getId())->toString());
2020-06-29 21:43:34 +00:00
2024-01-19 13:42:26 +00:00
$token = $dbForProject->createDocument('tokens', $token
->setAttribute('$permissions', [
2022-08-15 11:24:31 +00:00
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]));
2021-07-17 21:21:33 +00:00
2024-01-25 16:53:51 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2020-06-29 21:43:34 +00:00
2024-01-19 13:42:26 +00:00
$subject = $locale->getText("emails.otpSession.subject");
$preview = $locale->getText("emails.otpSession.preview");
2024-01-19 13:42:26 +00:00
$customTemplate = $project->getAttribute('templates', [])['email.otpSession-' . $locale->default] ?? [];
2022-11-03 15:03:39 +00:00
2024-01-19 13:42:26 +00:00
$detector = new Detector($request->getUserAgent('UNKNOWN'));
$agentOs = $detector->getOS();
$agentClient = $detector->getClient();
$agentDevice = $detector->getDevice();
2022-04-04 06:30:07 +00:00
2024-01-19 13:42:26 +00:00
$message = Template::fromFile(__DIR__ . '/../../config/locale/templates/email-otp.tpl');
$message
->setParam('{{hello}}', $locale->getText("emails.otpSession.hello"))
->setParam('{{description}}', $locale->getText("emails.otpSession.description"))
->setParam('{{clientInfo}}', $locale->getText("emails.otpSession.clientInfo"))
->setParam('{{thanks}}', $locale->getText("emails.otpSession.thanks"))
->setParam('{{signature}}', $locale->getText("emails.otpSession.signature"));
2024-02-01 10:41:01 +00:00
if (!empty($phrase)) {
2024-01-19 13:42:26 +00:00
$message->setParam('{{securityPhrase}}', $locale->getText("emails.otpSession.securityPhrase"));
} else {
$message->setParam('{{securityPhrase}}', '');
2020-01-05 11:29:42 +00:00
}
2021-08-05 05:06:38 +00:00
2024-01-19 13:42:26 +00:00
$body = $message->render();
2020-06-29 21:43:34 +00:00
2024-01-19 13:42:26 +00:00
$smtp = $project->getAttribute('smtp', []);
$smtpEnabled = $smtp['enabled'] ?? false;
2020-01-05 11:29:42 +00:00
2024-04-01 11:02:47 +00:00
$senderEmail = System::getEnv('_APP_SYSTEM_EMAIL_ADDRESS', APP_EMAIL_TEAM);
$senderName = System::getEnv('_APP_SYSTEM_EMAIL_NAME', APP_NAME . ' Server');
2024-01-19 13:42:26 +00:00
$replyTo = "";
2024-01-19 13:42:26 +00:00
if ($smtpEnabled) {
if (!empty($smtp['senderEmail'])) {
$senderEmail = $smtp['senderEmail'];
}
if (!empty($smtp['senderName'])) {
$senderName = $smtp['senderName'];
}
if (!empty($smtp['replyTo'])) {
$replyTo = $smtp['replyTo'];
}
2024-01-19 13:42:26 +00:00
$queueForMails
->setSmtpHost($smtp['host'] ?? '')
->setSmtpPort($smtp['port'] ?? '')
->setSmtpUsername($smtp['username'] ?? '')
->setSmtpPassword($smtp['password'] ?? '')
->setSmtpSecure($smtp['secure'] ?? '');
2024-01-19 13:42:26 +00:00
if (!empty($customTemplate)) {
if (!empty($customTemplate['senderEmail'])) {
$senderEmail = $customTemplate['senderEmail'];
}
if (!empty($customTemplate['senderName'])) {
$senderName = $customTemplate['senderName'];
}
if (!empty($customTemplate['replyTo'])) {
$replyTo = $customTemplate['replyTo'];
}
2024-01-19 13:42:26 +00:00
$body = $customTemplate['message'] ?? '';
$subject = $customTemplate['subject'] ?? $subject;
}
2024-01-19 13:42:26 +00:00
$queueForMails
->setSmtpReplyTo($replyTo)
->setSmtpSenderEmail($senderEmail)
->setSmtpSenderName($senderName);
}
2024-01-19 13:42:26 +00:00
$emailVariables = [
'direction' => $locale->getText('settings.direction'),
// {{user}}, {{project}} and {{otp}} are required in the templates
2024-02-22 12:47:01 +00:00
'user' => $user->getAttribute('name'),
2024-01-19 13:42:26 +00:00
'project' => $project->getAttribute('name'),
'otp' => $tokenSecret,
2024-02-22 12:47:01 +00:00
'agentDevice' => $agentDevice['deviceBrand'] ?? $agentDevice['deviceBrand'] ?? 'UNKNOWN',
'agentClient' => $agentClient['clientName'] ?? 'UNKNOWN',
'agentOs' => $agentOs['osName'] ?? 'UNKNOWN',
'phrase' => !empty($phrase) ? $phrase : '',
// TODO: remove unnecessary team variable from this email
'team' => '',
2023-08-27 22:45:37 +00:00
];
2023-06-11 14:08:48 +00:00
$queueForMails
->setSubject($subject)
->setPreview($preview)
->setBody($body)
2023-08-27 22:45:37 +00:00
->setVariables($emailVariables)
2023-08-30 04:30:44 +00:00
->setRecipient($email)
->trigger();
2024-05-22 02:11:06 +00:00
$token->setAttribute('secret', $tokenSecret);
$queueForEvents
->setPayload($response->output($token, Response::MODEL_TOKEN), sensitive: ['secret']);
2021-08-30 10:44:52 +00:00
2024-02-01 10:41:01 +00:00
if (!empty($phrase)) {
$token->setAttribute('phrase', $phrase);
2024-01-10 14:52:32 +00:00
}
2021-08-30 10:44:52 +00:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($token, Response::MODEL_TOKEN);
});
App::put('/v1/account/sessions/magic-url')
2024-02-24 12:53:47 +00:00
->desc('Update magic URL session')
2023-11-30 11:35:52 +00:00
->label('event', 'users.[userId].sessions.[sessionId].create')
->groups(['api', 'account', 'session'])
2024-01-17 11:17:03 +00:00
->label('scope', 'sessions.write')
2023-09-28 12:45:52 +00:00
->label('audits.event', 'session.create')
->label('audits.resource', 'user/{response.userId}')
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-04-12 06:50:02 +00:00
group: 'sessions',
2025-01-17 04:31:39 +00:00
name: 'updateMagicURLSession',
description: '/docs/references/account/create-session.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_SESSION,
)
],
contentType: ContentType::JSON,
deprecated: true,
))
2024-02-24 12:53:47 +00:00
->label('abuse-limit', 10)
->label('abuse-key', 'ip:{ip},userId:{param-userId}')
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('secret', '', new Text(256), 'Valid verification token.')
->inject('request')
->inject('response')
2024-02-24 12:53:47 +00:00
->inject('user')
->inject('dbForProject')
2024-02-24 12:53:47 +00:00
->inject('project')
->inject('locale')
->inject('geodb')
->inject('queueForEvents')
2024-06-24 13:12:09 +00:00
->inject('queueForMails')
2024-02-24 12:53:47 +00:00
->action($createSession);
2024-02-24 12:53:47 +00:00
App::put('/v1/account/sessions/phone')
->desc('Update phone session')
->label('event', 'users.[userId].sessions.[sessionId].create')
->groups(['api', 'account', 'session'])
2024-02-24 12:53:47 +00:00
->label('scope', 'sessions.write')
->label('audits.event', 'session.create')
->label('audits.resource', 'user/{response.userId}')
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-04-12 06:50:02 +00:00
group: 'sessions',
2025-01-17 04:31:39 +00:00
name: 'updatePhoneSession',
description: '/docs/references/account/create-session.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_SESSION,
)
],
contentType: ContentType::JSON,
deprecated: true,
))
2023-09-28 12:45:52 +00:00
->label('abuse-limit', 10)
->label('abuse-key', 'ip:{ip},userId:{param-userId}')
2024-01-12 17:26:01 +00:00
->param('userId', '', new CustomId(), 'User ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
2024-03-06 18:07:58 +00:00
->param('secret', '', new Text(256), 'Valid verification token.')
->inject('request')
->inject('response')
->inject('user')
->inject('dbForProject')
->inject('project')
->inject('locale')
->inject('geodb')
->inject('queueForEvents')
2024-06-24 13:12:09 +00:00
->inject('queueForMails')
->action($createSession);
2023-11-30 11:35:52 +00:00
App::post('/v1/account/tokens/phone')
->alias('/v1/account/sessions/phone')
->desc('Create phone token')
->groups(['api', 'account', 'auth'])
2024-01-17 11:17:03 +00:00
->label('scope', 'sessions.write')
2022-06-08 09:00:38 +00:00
->label('auth.type', 'phone')
2022-09-05 08:00:08 +00:00
->label('audits.event', 'session.create')
2022-08-11 13:19:05 +00:00
->label('audits.resource', 'user/{response.userId}')
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
group: 'tokens',
2025-01-17 04:31:39 +00:00
name: 'createPhoneToken',
description: '/docs/references/account/create-token-phone.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_TOKEN,
)
],
contentType: ContentType::JSON,
))
2022-06-08 09:00:38 +00:00
->label('abuse-limit', 10)
2024-02-12 01:18:19 +00:00
->label('abuse-key', ['url:{url},phone:{param-phone}', 'url:{url},ip:{ip}'])
2023-05-29 13:58:45 +00:00
->param('userId', '', new CustomId(), 'Unique Id. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('phone', '', new Phone(), 'Phone number. Format this number with a leading \'+\' and a country code, e.g., +16175551212.')
2021-08-30 10:44:52 +00:00
->inject('request')
->inject('response')
->inject('user')
2021-08-30 10:44:52 +00:00
->inject('project')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
->inject('queueForMessaging')
->inject('locale')
->inject('timelimit')
2025-01-30 04:53:53 +00:00
->inject('queueForStatsUsage')
->inject('plan')
2025-01-30 04:53:53 +00:00
->action(function (string $userId, string $phone, Request $request, Response $response, Document $user, Document $project, Database $dbForProject, Event $queueForEvents, Messaging $queueForMessaging, Locale $locale, callable $timelimit, StatsUsage $queueForStatsUsage, array $plan) {
2024-04-01 11:02:47 +00:00
if (empty(System::getEnv('_APP_SMS_PROVIDER'))) {
2022-08-16 06:59:03 +00:00
throw new Exception(Exception::GENERAL_PHONE_DISABLED, 'Phone provider not configured');
}
$result = $dbForProject->findOne('users', [Query::equal('phone', [$phone])]);
if (!$result->isEmpty()) {
$user->setAttributes($result->getArrayCopy());
} else {
2021-10-07 19:10:43 +00:00
$limit = $project->getAttribute('auths', [])['limit'] ?? 0;
2021-08-30 10:44:52 +00:00
if ($limit !== 0) {
2022-05-16 09:58:17 +00:00
$total = $dbForProject->count('users', max: APP_LIMIT_USERS);
2021-08-30 10:44:52 +00:00
2022-02-27 09:57:09 +00:00
if ($total >= $limit) {
2022-08-16 06:59:03 +00:00
throw new Exception(Exception::USER_COUNT_EXCEEDED);
2021-08-30 10:44:52 +00:00
}
}
2022-08-14 14:22:38 +00:00
$userId = $userId == 'unique()' ? ID::unique() : $userId;
$user->setAttributes([
2022-08-14 14:22:38 +00:00
'$id' => $userId,
'$permissions' => [
2022-08-14 05:21:11 +00:00
Permission::read(Role::any()),
2022-08-15 11:24:31 +00:00
Permission::update(Role::user($userId)),
Permission::delete(Role::user($userId)),
],
2022-06-08 09:00:38 +00:00
'email' => null,
'phone' => $phone,
'emailVerification' => false,
2022-06-08 09:00:38 +00:00
'phoneVerification' => false,
'status' => true,
'password' => null,
2022-07-04 09:55:11 +00:00
'passwordUpdate' => null,
2022-07-13 14:02:49 +00:00
'registration' => DateTime::now(),
'reset' => false,
2021-12-28 10:48:50 +00:00
'prefs' => new \stdClass(),
2022-04-26 10:36:49 +00:00
'sessions' => null,
2022-04-27 11:06:53 +00:00
'tokens' => null,
2022-04-27 12:44:47 +00:00
'memberships' => null,
'search' => implode(' ', [$userId, $phone]),
'accessedAt' => DateTime::now(),
]);
2025-05-26 05:42:11 +00:00
$user->removeAttribute('$sequence');
Authorization::skip(fn () => $dbForProject->createDocument('users', $user));
try {
2024-03-06 17:34:21 +00:00
$target = Authorization::skip(fn () => $dbForProject->createDocument('targets', new Document([
2024-02-16 04:07:16 +00:00
'$permissions' => [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
],
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
'providerType' => MESSAGE_TYPE_SMS,
'identifier' => $phone,
])));
$user->setAttribute('targets', [...$user->getAttribute('targets', []), $target]);
} catch (Duplicate) {
$existingTarget = $dbForProject->findOne('targets', [
Query::equal('identifier', [$phone]),
]);
2024-10-07 02:40:01 +00:00
$user->setAttribute('targets', [...$user->getAttribute('targets', []), $existingTarget->isEmpty() ? false : $existingTarget]);
}
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2021-08-30 10:44:52 +00:00
}
$secret = null;
$sendSMS = true;
$mockNumbers = $project->getAttribute('auths', [])['mockNumbers'] ?? [];
foreach ($mockNumbers as $mockNumber) {
if ($mockNumber['phone'] === $phone) {
$secret = $mockNumber['otp'];
$sendSMS = false;
break;
}
}
$secret ??= Auth::codeGenerator();
2024-06-20 14:49:56 +00:00
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), Auth::TOKEN_EXPIRATION_OTP));
2021-10-07 19:10:43 +00:00
2021-08-30 10:44:52 +00:00
$token = new Document([
2022-08-14 14:22:38 +00:00
'$id' => ID::unique(),
2021-08-30 10:44:52 +00:00
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
2022-06-08 09:00:38 +00:00
'type' => Auth::TOKEN_TYPE_PHONE,
2022-09-22 22:25:17 +00:00
'secret' => Auth::hash($secret),
2022-11-04 14:48:29 +00:00
'expire' => $expire,
2021-08-30 10:44:52 +00:00
'userAgent' => $request->getUserAgent('UNKNOWN'),
'ip' => $request->getIP(),
]);
2022-08-19 04:04:33 +00:00
Authorization::setRole(Role::user($user->getId())->toString());
2021-08-30 10:44:52 +00:00
2022-04-27 11:06:53 +00:00
$token = $dbForProject->createDocument('tokens', $token
->setAttribute('$permissions', [
2022-08-15 11:24:31 +00:00
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]));
2021-08-30 10:44:52 +00:00
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2021-08-30 10:44:52 +00:00
if ($sendSMS) {
$message = Template::fromFile(__DIR__ . '/../../config/locale/templates/sms-base.tpl');
2023-04-19 08:44:22 +00:00
$customTemplate = $project->getAttribute('templates', [])['sms.login-' . $locale->default] ?? [];
if (!empty($customTemplate)) {
$message = $customTemplate['message'] ?? $message;
}
2024-06-20 15:01:20 +00:00
$messageContent = Template::fromString($locale->getText("sms.verification.body"));
$messageContent
->setParam('{{project}}', $project->getAttribute('name'))
->setParam('{{secret}}', $secret);
$messageContent = \strip_tags($messageContent->render());
$message = $message->setParam('{{token}}', $messageContent);
$message = $message->render();
2024-06-20 15:01:20 +00:00
$messageDoc = new Document([
'$id' => $token->getId(),
'data' => [
'content' => $message,
],
]);
$queueForMessaging
2024-06-20 15:01:20 +00:00
->setType(MESSAGE_SEND_TYPE_INTERNAL)
->setMessage($messageDoc)
->setRecipients([$phone])
->setProviderType(MESSAGE_TYPE_SMS);
if (isset($plan['authPhone'])) {
$timelimit = $timelimit('organization:{organizationId}', $plan['authPhone'], 30 * 24 * 60 * 60); // 30 days
$timelimit
2025-01-08 11:44:07 +00:00
->setParam('{organizationId}', $project->getAttribute('teamId'));
$abuse = new Abuse($timelimit);
if ($abuse->check() && System::getEnv('_APP_OPTIONS_ABUSE', 'enabled') === 'enabled') {
$helper = PhoneNumberUtil::getInstance();
$countryCode = $helper->parse($phone)->getCountryCode();
if (!empty($countryCode)) {
2025-01-30 04:53:53 +00:00
$queueForStatsUsage
->addMetric(str_replace('{countryCode}', $countryCode, METRIC_AUTH_METHOD_PHONE_COUNTRY_CODE), 1);
}
}
2025-01-30 04:53:53 +00:00
$queueForStatsUsage
->addMetric(METRIC_AUTH_METHOD_PHONE, 1)
->setProject($project)
->trigger();
}
}
2024-05-22 02:11:06 +00:00
$token->setAttribute('secret', $secret);
$queueForEvents
->setPayload($response->output($token, Response::MODEL_TOKEN), sensitive: ['secret']);
// Encode secret for clients
$token->setAttribute('secret', Auth::encodeSession($user->getId(), $secret));
2022-06-08 09:00:38 +00:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($token, Response::MODEL_TOKEN);
2022-06-08 09:00:38 +00:00
});
2024-05-27 20:04:50 +00:00
App::post('/v1/account/jwts')
->alias('/v1/account/jwt')
2022-11-03 15:24:32 +00:00
->desc('Create JWT')
2021-02-28 18:36:13 +00:00
->groups(['api', 'account', 'auth'])
2024-02-20 11:45:11 +00:00
->label('scope', 'account')
2021-02-28 18:36:13 +00:00
->label('auth.type', 'jwt')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
group: 'tokens',
2025-01-17 04:31:39 +00:00
name: 'createJWT',
description: '/docs/references/account/create-jwt.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_JWT,
)
],
contentType: ContentType::JSON,
))
2022-06-06 20:57:37 +00:00
->label('abuse-limit', 100)
2021-07-27 11:07:39 +00:00
->label('abuse-key', 'url:{url},userId:{userId}')
2020-12-28 17:03:27 +00:00
->inject('response')
->inject('user')
2022-04-04 09:59:32 +00:00
->inject('dbForProject')
2022-05-18 16:14:21 +00:00
->action(function (Response $response, Document $user, Database $dbForProject) {
2021-08-05 05:06:38 +00:00
2020-10-17 17:49:09 +00:00
2022-04-26 08:52:59 +00:00
$sessions = $user->getAttribute('sessions', []);
$current = new Document();
foreach ($sessions as $session) { /** @var Utopia\Database\Document $session */
if ($session->getAttribute('secret') == Auth::hash(Auth::$secret)) { // If current session delete the cookies too
$current = $session;
2023-08-29 09:40:30 +00:00
}
2022-04-26 08:52:59 +00:00
}
if ($current->isEmpty()) {
2022-08-16 06:59:03 +00:00
throw new Exception(Exception::USER_SESSION_NOT_FOUND);
2020-12-28 17:03:27 +00:00
}
2021-08-05 05:06:38 +00:00
2024-05-29 07:51:51 +00:00
$jwt = new JWT(System::getEnv('_APP_OPENSSL_KEY_V1'), 'HS256', 900, 0);
2020-12-28 17:03:27 +00:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic(new Document(['jwt' => $jwt->encode([
2024-03-06 17:34:21 +00:00
'userId' => $user->getId(),
'sessionId' => $current->getId(),
])]), Response::MODEL_JWT);
2020-12-28 17:03:27 +00:00
});
2020-01-05 11:29:42 +00:00
2020-06-28 17:31:21 +00:00
App::get('/v1/account/prefs')
2023-08-01 15:26:48 +00:00
->desc('Get account preferences')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
2024-02-20 11:45:11 +00:00
->label('scope', 'account')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'account',
2025-01-17 04:31:39 +00:00
name: 'getPrefs',
description: '/docs/references/account/get-prefs.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_PREFERENCES,
)
],
contentType: ContentType::JSON
))
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('user')
2022-08-10 08:45:10 +00:00
->action(function (Response $response, Document $user) {
2020-01-31 22:34:07 +00:00
$prefs = $user->getAttribute('prefs', []);
2020-06-29 21:43:34 +00:00
2021-07-25 14:47:18 +00:00
$response->dynamic(new Document($prefs), Response::MODEL_PREFERENCES);
2020-12-26 14:31:53 +00:00
});
2020-01-31 22:34:07 +00:00
2020-06-28 17:31:21 +00:00
App::get('/v1/account/logs')
2023-08-01 15:26:48 +00:00
->desc('List logs')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
2024-02-20 11:45:11 +00:00
->label('scope', 'account')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'logs',
2025-01-17 04:31:39 +00:00
name: 'listLogs',
description: '/docs/references/account/list-logs.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_LOG_LIST,
)
],
contentType: ContentType::JSON,
))
2023-05-16 12:56:20 +00:00
->param('queries', [], new Queries([new Limit(), new Offset()]), 'Array of query strings generated using the Query class provided by the SDK. [Learn more about queries](https://appwrite.io/docs/queries). Only supported methods are limit and offset', true)
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('user')
->inject('locale')
->inject('geodb')
->inject('dbForProject')
2022-08-25 09:59:28 +00:00
->action(function (array $queries, Response $response, Document $user, Locale $locale, Reader $geodb, Database $dbForProject) {
2020-06-29 21:43:34 +00:00
2024-02-12 16:02:04 +00:00
try {
$queries = Query::parseQueries($queries);
} catch (QueryException $e) {
throw new Exception(Exception::GENERAL_QUERY_INVALID, $e->getMessage());
}
2025-02-25 08:03:37 +00:00
// Temp fix for logs
$queries[] = Query::or([
2025-02-26 01:00:16 +00:00
Query::greaterThan('$createdAt', DateTime::format(new \DateTime('2025-02-26T01:30+00:00'))),
2025-02-25 08:03:37 +00:00
Query::lessThan('$createdAt', DateTime::format(new \DateTime('2025-02-13T00:00+00:00'))),
]);
2025-02-25 05:51:11 +00:00
2022-05-25 13:49:32 +00:00
$audit = new EventAudit($dbForProject);
2022-04-04 06:30:07 +00:00
2025-05-26 05:42:11 +00:00
$logs = $audit->getLogsByUser($user->getSequence(), $queries);
2020-06-29 21:43:34 +00:00
$output = [];
2020-06-29 21:43:34 +00:00
foreach ($logs as $i => &$log) {
$log['userAgent'] = (!empty($log['userAgent'])) ? $log['userAgent'] : 'UNKNOWN';
2021-02-14 17:28:54 +00:00
$detector = new Detector($log['userAgent']);
2023-08-30 04:30:44 +00:00
2021-11-18 10:33:42 +00:00
$output[$i] = new Document(array_merge(
$log->getArrayCopy(),
$log['data'],
$detector->getOS(),
2024-03-06 18:07:58 +00:00
$detector->getClient(),
$detector->getDevice()
));
2023-08-29 09:40:30 +00:00
2024-03-06 18:07:58 +00:00
$record = $geodb->get($log['ip']);
2021-08-05 05:06:38 +00:00
2024-03-06 18:07:58 +00:00
if ($record) {
$output[$i]['countryCode'] = $locale->getText('countries.' . strtolower($record['country']['iso_code']), false) ? \strtolower($record['country']['iso_code']) : '--';
$output[$i]['countryName'] = $locale->getText('countries.' . strtolower($record['country']['iso_code']), $locale->getText('locale.country.unknown'));
} else {
$output[$i]['countryCode'] = '--';
$output[$i]['countryName'] = $locale->getText('locale.country.unknown');
}
}
2024-03-06 18:07:58 +00:00
$response->dynamic(new Document([
2025-05-26 05:42:11 +00:00
'total' => $audit->countLogsByUser($user->getSequence(), $queries),
'logs' => $output,
2024-03-06 18:07:58 +00:00
]), Response::MODEL_LOG_LIST);
2021-06-16 10:14:08 +00:00
});
2023-05-29 13:58:45 +00:00
2020-06-28 17:31:21 +00:00
App::patch('/v1/account/name')
2023-08-01 15:26:48 +00:00
->desc('Update name')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
2022-04-04 06:30:07 +00:00
->label('event', 'users.[userId].update.name')
2024-02-20 11:45:11 +00:00
->label('scope', 'account')
2022-09-08 13:06:16 +00:00
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'account',
2025-01-17 04:31:39 +00:00
name: 'updateName',
description: '/docs/references/account/update-name.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_USER,
)
],
contentType: ContentType::JSON
))
2020-09-10 14:40:14 +00:00
->param('name', '', new Text(128), 'User name. Max length: 128 chars.')
->inject('requestTimestamp')
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('user')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2023-10-03 16:50:48 +00:00
->action(function (string $name, ?\DateTime $requestTimestamp, Response $response, Document $user, Database $dbForProject, Event $queueForEvents) {
2021-08-30 10:44:52 +00:00
2023-05-30 20:55:33 +00:00
$user->setAttribute('name', $name);
2021-08-30 10:44:52 +00:00
2025-04-30 05:40:47 +00:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
2021-08-30 10:44:52 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents->setParam('userId', $user->getId());
2021-08-16 08:53:34 +00:00
2022-05-06 08:58:36 +00:00
$response->dynamic($user, Response::MODEL_ACCOUNT);
2021-08-30 10:44:52 +00:00
});
2020-06-28 17:31:21 +00:00
App::patch('/v1/account/password')
2023-08-01 15:26:48 +00:00
->desc('Update password')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
2022-04-04 06:30:07 +00:00
->label('event', 'users.[userId].update.password')
2024-02-20 11:45:11 +00:00
->label('scope', 'account')
2022-09-08 13:06:16 +00:00
->label('audits.event', 'user.update')
2022-08-08 14:32:54 +00:00
->label('audits.resource', 'user/{response.$id}')
2022-08-16 14:56:05 +00:00
->label('audits.userId', '{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'account',
2025-01-17 04:31:39 +00:00
name: 'updatePassword',
description: '/docs/references/account/update-password.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_USER,
)
],
contentType: ContentType::JSON
))
2024-06-10 06:09:30 +00:00
->label('abuse-limit', 10)
->param('password', '', fn ($project, $passwordsDictionary) => new PasswordDictionary($passwordsDictionary, $project->getAttribute('auths', [])['passwordDictionary'] ?? false), 'New user password. Must be at least 8 chars.', false, ['project', 'passwordsDictionary'])
->param('oldPassword', '', new Password(), 'Current user password. Must be at least 8 chars.', true)
->inject('requestTimestamp')
2021-08-30 10:44:52 +00:00
->inject('response')
->inject('user')
2022-10-31 14:54:15 +00:00
->inject('project')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2024-01-04 15:26:15 +00:00
->inject('hooks')
->action(function (string $password, string $oldPassword, ?\DateTime $requestTimestamp, Response $response, Document $user, Document $project, Database $dbForProject, Event $queueForEvents, Hooks $hooks) {
2021-08-30 10:44:52 +00:00
// Check old password only if its an existing user.
2022-08-27 03:17:48 +00:00
if (!empty($user->getAttribute('passwordUpdate')) && !Auth::passwordVerify($oldPassword, $user->getAttribute('password'), $user->getAttribute('hash'), $user->getAttribute('hashOptions'))) { // Double check user password
2022-08-16 06:59:03 +00:00
throw new Exception(Exception::USER_INVALID_CREDENTIALS);
2020-06-29 21:43:34 +00:00
}
$newPassword = Auth::passwordHash($password, Auth::DEFAULT_ALGO, Auth::DEFAULT_ALGO_OPTIONS);
2022-12-18 06:27:41 +00:00
$historyLimit = $project->getAttribute('auths', [])['passwordHistory'] ?? 0;
2023-07-19 21:34:27 +00:00
$history = $user->getAttribute('passwordHistory', []);
2022-12-18 06:31:14 +00:00
if ($historyLimit > 0) {
2022-12-18 09:08:51 +00:00
$validator = new PasswordHistory($history, $user->getAttribute('hash'), $user->getAttribute('hashOptions'));
if (!$validator->isValid($password)) {
throw new Exception(Exception::USER_PASSWORD_RECENTLY_USED);
2022-12-16 10:47:08 +00:00
}
2021-08-30 10:44:52 +00:00
2022-12-16 10:47:08 +00:00
$history[] = $newPassword;
2023-07-19 21:34:27 +00:00
$history = array_slice($history, (count($history) - $historyLimit), $historyLimit);
2021-08-30 10:44:52 +00:00
}
2023-07-19 22:24:32 +00:00
if ($project->getAttribute('auths', [])['personalDataCheck'] ?? false) {
$personalDataValidator = new PersonalData($user->getId(), $user->getAttribute('email'), $user->getAttribute('name'), $user->getAttribute('phone'));
if (!$personalDataValidator->isValid($password)) {
throw new Exception(Exception::USER_PASSWORD_PERSONAL_DATA);
}
2021-08-30 10:44:52 +00:00
}
$hooks->trigger('passwordValidator', [$dbForProject, $project, $password, &$user, true]);
$user
->setAttribute('password', $newPassword)
->setAttribute('passwordHistory', $history)
->setAttribute('passwordUpdate', DateTime::now())
->setAttribute('hash', Auth::DEFAULT_ALGO)
->setAttribute('hashOptions', Auth::DEFAULT_ALGO_OPTIONS);
2022-07-05 10:59:03 +00:00
2025-04-30 05:40:47 +00:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
2021-08-30 10:44:52 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents->setParam('userId', $user->getId());
2021-08-30 10:44:52 +00:00
2022-05-06 08:58:36 +00:00
$response->dynamic($user, Response::MODEL_ACCOUNT);
2020-12-26 14:31:53 +00:00
});
2019-05-09 06:54:39 +00:00
2020-06-28 17:31:21 +00:00
App::patch('/v1/account/email')
2023-08-01 15:26:48 +00:00
->desc('Update email')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
2022-04-04 06:30:07 +00:00
->label('event', 'users.[userId].update.email')
2024-02-20 11:45:11 +00:00
->label('scope', 'account')
2022-09-08 13:06:16 +00:00
->label('audits.event', 'user.update')
2022-08-08 14:32:54 +00:00
->label('audits.resource', 'user/{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'account',
2025-01-17 04:31:39 +00:00
name: 'updateEmail',
description: '/docs/references/account/update-email.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_USER,
)
],
contentType: ContentType::JSON
))
2020-09-10 14:40:14 +00:00
->param('email', '', new Email(), 'User email.')
->param('password', '', new Password(), 'User password. Must be at least 8 chars.')
->inject('requestTimestamp')
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('user')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
->inject('project')
->inject('hooks')
->action(function (string $email, string $password, ?\DateTime $requestTimestamp, Response $response, Document $user, Database $dbForProject, Event $queueForEvents, Document $project, Hooks $hooks) {
// passwordUpdate will be empty if the user has never set a password
$passwordUpdate = $user->getAttribute('passwordUpdate');
2021-08-30 10:44:52 +00:00
2021-02-16 13:46:30 +00:00
if (
!empty($passwordUpdate) &&
2022-05-05 11:21:31 +00:00
!Auth::passwordVerify($password, $user->getAttribute('password'), $user->getAttribute('hash'), $user->getAttribute('hashOptions'))
2021-02-16 13:46:30 +00:00
) { // Double check user password
2022-08-16 06:59:03 +00:00
throw new Exception(Exception::USER_INVALID_CREDENTIALS);
2020-06-29 21:43:34 +00:00
}
2022-04-04 09:59:32 +00:00
$hooks->trigger('passwordValidator', [$dbForProject, $project, $password, &$user, false]);
2021-10-07 19:10:43 +00:00
$oldEmail = $user->getAttribute('email');
2021-08-30 10:44:52 +00:00
$email = \strtolower($email);
2021-08-30 10:44:52 +00:00
// Makes sure this email is not already used in another identity
$identityWithMatchingEmail = $dbForProject->findOne('identities', [
Query::equal('providerEmail', [$email]),
2025-05-26 05:42:11 +00:00
Query::notEqual('userInternalId', $user->getSequence()),
]);
if (!$identityWithMatchingEmail->isEmpty()) {
throw new Exception(Exception::GENERAL_BAD_REQUEST); /** Return a generic bad request to prevent exposing existing accounts */
2021-08-30 10:44:52 +00:00
}
$user
->setAttribute('email', $email)
->setAttribute('emailVerification', false) // After this user needs to confirm mail again
2023-05-30 20:55:33 +00:00
;
2021-08-30 10:44:52 +00:00
if (empty($passwordUpdate)) {
$user
->setAttribute('password', Auth::passwordHash($password, Auth::DEFAULT_ALGO, Auth::DEFAULT_ALGO_OPTIONS))
->setAttribute('hash', Auth::DEFAULT_ALGO)
->setAttribute('hashOptions', Auth::DEFAULT_ALGO_OPTIONS)
->setAttribute('passwordUpdate', DateTime::now());
2021-08-30 10:44:52 +00:00
}
$target = Authorization::skip(fn () => $dbForProject->findOne('targets', [
Query::equal('identifier', [$email]),
]));
2021-08-30 10:44:52 +00:00
if (!$target->isEmpty()) {
throw new Exception(Exception::USER_TARGET_ALREADY_EXISTS);
}
try {
2025-04-30 05:40:47 +00:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
/**
* @var Document $oldTarget
*/
$oldTarget = $user->find('identifier', $oldEmail, 'targets');
2021-08-30 10:44:52 +00:00
if ($oldTarget instanceof Document && !$oldTarget->isEmpty()) {
Authorization::skip(fn () => $dbForProject->updateDocument('targets', $oldTarget->getId(), $oldTarget->setAttribute('identifier', $email)));
}
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2023-06-16 02:16:19 +00:00
} catch (Duplicate) {
throw new Exception(Exception::GENERAL_BAD_REQUEST); /** Return a generic bad request to prevent exposing existing accounts */
}
2021-08-30 10:44:52 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents->setParam('userId', $user->getId());
2021-08-30 10:44:52 +00:00
2022-05-06 08:58:36 +00:00
$response->dynamic($user, Response::MODEL_ACCOUNT);
2021-08-30 10:44:52 +00:00
});
App::patch('/v1/account/phone')
2023-08-01 15:26:48 +00:00
->desc('Update phone')
->groups(['api', 'account'])
->label('event', 'users.[userId].update.phone')
2024-02-20 11:45:11 +00:00
->label('scope', 'account')
2022-09-08 13:06:16 +00:00
->label('audits.event', 'user.update')
2022-08-08 14:32:54 +00:00
->label('audits.resource', 'user/{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'account',
2025-01-17 04:31:39 +00:00
name: 'updatePhone',
description: '/docs/references/account/update-phone.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_USER,
)
],
contentType: ContentType::JSON
))
->param('phone', '', new Phone(), 'Phone number. Format this number with a leading \'+\' and a country code, e.g., +16175551212.')
->param('password', '', new Password(), 'User password. Must be at least 8 chars.')
->inject('requestTimestamp')
2022-06-08 09:00:38 +00:00
->inject('response')
->inject('user')
2022-06-08 09:00:38 +00:00
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
->inject('project')
->inject('hooks')
->action(function (string $phone, string $password, ?\DateTime $requestTimestamp, Response $response, Document $user, Database $dbForProject, Event $queueForEvents, Document $project, Hooks $hooks) {
// passwordUpdate will be empty if the user has never set a password
$passwordUpdate = $user->getAttribute('passwordUpdate');
2022-08-17 07:32:42 +00:00
if (
!empty($passwordUpdate) &&
2022-06-22 08:00:12 +00:00
!Auth::passwordVerify($password, $user->getAttribute('password'), $user->getAttribute('hash'), $user->getAttribute('hashOptions'))
) { // Double check user password
2022-08-16 06:59:03 +00:00
throw new Exception(Exception::USER_INVALID_CREDENTIALS);
2022-06-08 09:00:38 +00:00
}
$hooks->trigger('passwordValidator', [$dbForProject, $project, $password, &$user, false]);
2022-06-08 09:00:38 +00:00
$target = Authorization::skip(fn () => $dbForProject->findOne('targets', [
Query::equal('identifier', [$phone]),
]));
2022-06-08 09:00:38 +00:00
if (!$target->isEmpty()) {
throw new Exception(Exception::USER_TARGET_ALREADY_EXISTS);
}
2022-06-08 09:00:38 +00:00
$oldPhone = $user->getAttribute('phone');
2022-06-08 09:00:38 +00:00
$user
->setAttribute('phone', $phone)
->setAttribute('phoneVerification', false) // After this user needs to confirm phone number again
2023-05-30 20:55:33 +00:00
;
if (empty($passwordUpdate)) {
$user
->setAttribute('password', Auth::passwordHash($password, Auth::DEFAULT_ALGO, Auth::DEFAULT_ALGO_OPTIONS))
->setAttribute('hash', Auth::DEFAULT_ALGO)
->setAttribute('hashOptions', Auth::DEFAULT_ALGO_OPTIONS)
->setAttribute('passwordUpdate', DateTime::now());
2022-06-08 09:00:38 +00:00
}
try {
2025-04-30 05:40:47 +00:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
/**
2024-03-06 18:07:58 +00:00
* @var Document $oldTarget
*/
$oldTarget = $user->find('identifier', $oldPhone, 'targets');
2022-11-03 15:03:39 +00:00
2024-03-06 18:07:58 +00:00
if ($oldTarget instanceof Document && !$oldTarget->isEmpty()) {
Authorization::skip(fn () => $dbForProject->updateDocument('targets', $oldTarget->getId(), $oldTarget->setAttribute('identifier', $phone)));
2024-02-11 14:51:19 +00:00
}
2024-03-06 18:07:58 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
} catch (Duplicate $th) {
throw new Exception(Exception::USER_PHONE_ALREADY_EXISTS);
2024-02-11 14:51:19 +00:00
}
2024-02-11 14:58:05 +00:00
2024-03-06 18:07:58 +00:00
$queueForEvents->setParam('userId', $user->getId());
2022-06-08 09:00:38 +00:00
2024-03-06 18:07:58 +00:00
$response->dynamic($user, Response::MODEL_ACCOUNT);
2022-02-01 15:54:20 +00:00
});
2022-06-08 09:00:38 +00:00
2024-03-06 18:07:58 +00:00
App::patch('/v1/account/prefs')
->desc('Update preferences')
2020-06-29 21:43:34 +00:00
->groups(['api', 'account'])
2024-03-06 18:07:58 +00:00
->label('event', 'users.[userId].update.prefs')
2024-02-20 11:45:11 +00:00
->label('scope', 'account')
2024-03-06 18:07:58 +00:00
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'account',
2025-01-17 04:31:39 +00:00
name: 'updatePrefs',
description: '/docs/references/account/update-prefs.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_USER,
)
],
contentType: ContentType::JSON
))
2024-03-06 18:07:58 +00:00
->param('prefs', [], new Assoc(), 'Prefs key-value JSON object.')
->inject('requestTimestamp')
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('user')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2024-03-06 18:07:58 +00:00
->action(function (array $prefs, ?\DateTime $requestTimestamp, Response $response, Document $user, Database $dbForProject, Event $queueForEvents) {
2022-06-08 09:00:38 +00:00
2024-03-06 18:07:58 +00:00
$user->setAttribute('prefs', $prefs);
2022-06-08 09:00:38 +00:00
2025-04-30 05:40:47 +00:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
2022-06-08 09:00:38 +00:00
2024-03-06 18:07:58 +00:00
$queueForEvents->setParam('userId', $user->getId());
2023-04-19 08:44:22 +00:00
2024-03-06 18:07:58 +00:00
$response->dynamic($user, Response::MODEL_ACCOUNT);
});
2024-03-06 18:07:58 +00:00
App::patch('/v1/account/status')
->desc('Update status')
->groups(['api', 'account'])
->label('event', 'users.[userId].update.status')
->label('scope', 'account')
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'account',
2025-01-17 04:31:39 +00:00
name: 'updateStatus',
description: '/docs/references/account/update-status.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_USER,
)
],
contentType: ContentType::JSON,
))
2024-03-06 18:07:58 +00:00
->inject('requestTimestamp')
->inject('request')
->inject('response')
->inject('user')
->inject('dbForProject')
->inject('queueForEvents')
->action(function (?\DateTime $requestTimestamp, Request $request, Response $response, Document $user, Database $dbForProject, Event $queueForEvents) {
2023-03-14 09:07:42 +00:00
2024-03-06 18:07:58 +00:00
$user->setAttribute('status', false);
2022-06-08 09:00:38 +00:00
2025-04-30 05:40:47 +00:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
2022-06-08 09:00:38 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents
->setParam('userId', $user->getId())
2024-03-06 18:07:58 +00:00
->setPayload($response->output($user, Response::MODEL_ACCOUNT));
2020-06-29 21:43:34 +00:00
2024-03-06 18:07:58 +00:00
if (!Config::getParam('domainVerification')) {
$response->addHeader('X-Fallback-Cookies', \json_encode([]));
}
2022-06-08 09:00:38 +00:00
2024-03-06 18:07:58 +00:00
$protocol = $request->getProtocol();
2022-06-08 09:00:38 +00:00
$response
2024-03-06 18:07:58 +00:00
->addCookie(Auth::$cookieName . '_legacy', '', \time() - 3600, '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, null)
->addCookie(Auth::$cookieName, '', \time() - 3600, '/', Config::getParam('cookieDomain'), ('https' == $protocol), true, Config::getParam('cookieSamesite'))
2022-06-08 09:00:38 +00:00
;
2024-03-06 18:07:58 +00:00
$response->dynamic($user, Response::MODEL_ACCOUNT);
2022-06-08 09:00:38 +00:00
});
2020-06-28 17:31:21 +00:00
App::post('/v1/account/recovery')
2023-08-01 15:26:48 +00:00
->desc('Create password recovery')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
2024-01-17 11:17:03 +00:00
->label('scope', 'sessions.write')
2022-04-04 06:30:07 +00:00
->label('event', 'users.[userId].recovery.[tokenId].create')
2022-09-05 08:00:08 +00:00
->label('audits.event', 'recovery.create')
2022-08-11 13:19:05 +00:00
->label('audits.resource', 'user/{response.userId}')
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'recovery',
2025-01-17 04:31:39 +00:00
name: 'createRecovery',
description: '/docs/references/account/create-recovery.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_TOKEN,
)
],
contentType: ContentType::JSON,
))
2022-06-08 09:00:38 +00:00
->label('abuse-limit', 10)
2024-02-12 01:18:19 +00:00
->label('abuse-key', ['url:{url},email:{param-email}', 'url:{url},ip:{ip}'])
2020-09-10 14:40:14 +00:00
->param('email', '', new Email(), 'User email.')
->param('url', '', fn ($platforms, $devKey) => $devKey->isEmpty() ? new Redirect($platforms) : new URL(), 'URL to redirect the user back to your app from the recovery email. Only URLs from hostnames in your project platform list are allowed. This requirement helps to prevent an [open redirect](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) attack against your project API.', false, ['platforms', 'devKey'])
2022-06-08 09:00:38 +00:00
->inject('request')
->inject('response')
->inject('user')
2022-06-08 09:00:38 +00:00
->inject('dbForProject')
2022-10-31 14:54:15 +00:00
->inject('project')
2022-06-08 09:00:38 +00:00
->inject('locale')
2023-06-11 14:08:48 +00:00
->inject('queueForMails')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2023-09-27 17:10:21 +00:00
->action(function (string $email, string $url, Request $request, Response $response, Document $user, Database $dbForProject, Document $project, Locale $locale, Mail $queueForMails, Event $queueForEvents) {
2020-11-20 12:35:16 +00:00
2024-04-01 11:02:47 +00:00
if (empty(System::getEnv('_APP_SMTP_HOST'))) {
throw new Exception(Exception::GENERAL_SMTP_DISABLED, 'SMTP Disabled');
}
2024-07-22 13:37:28 +00:00
$url = htmlentities($url);
$email = \strtolower($email);
2022-06-08 09:00:38 +00:00
2022-05-12 16:25:36 +00:00
$profile = $dbForProject->findOne('users', [
2022-08-11 23:53:52 +00:00
Query::equal('email', [$email]),
2022-05-12 16:25:36 +00:00
]);
2022-06-08 09:00:38 +00:00
2024-10-07 02:40:01 +00:00
if ($profile->isEmpty()) {
2022-08-15 07:54:54 +00:00
throw new Exception(Exception::USER_NOT_FOUND);
2022-06-08 09:00:38 +00:00
}
$user->setAttributes($profile->getArrayCopy());
2022-06-08 09:00:38 +00:00
if (false === $profile->getAttribute('status')) { // Account is blocked
throw new Exception(Exception::USER_BLOCKED);
2022-06-08 09:00:38 +00:00
}
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), Auth::TOKEN_EXPIRATION_RECOVERY));
2022-07-05 10:59:03 +00:00
$secret = Auth::tokenGenerator(Auth::TOKEN_LENGTH_RECOVERY);
2020-06-29 21:43:34 +00:00
$recovery = new Document([
2022-08-14 14:22:38 +00:00
'$id' => ID::unique(),
2021-06-12 20:44:25 +00:00
'userId' => $profile->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $profile->getSequence(),
2020-06-29 21:43:34 +00:00
'type' => Auth::TOKEN_TYPE_RECOVERY,
2020-11-12 11:54:16 +00:00
'secret' => Auth::hash($secret), // One way hash encryption to protect DB leak
2021-07-06 12:18:55 +00:00
'expire' => $expire,
2020-07-03 15:14:51 +00:00
'userAgent' => $request->getUserAgent('UNKNOWN'),
2020-06-29 21:43:34 +00:00
'ip' => $request->getIP(),
]);
2022-06-08 09:00:38 +00:00
2022-08-19 04:04:33 +00:00
Authorization::setRole(Role::user($profile->getId())->toString());
2022-06-08 09:00:38 +00:00
2022-04-27 11:06:53 +00:00
$recovery = $dbForProject->createDocument('tokens', $recovery
->setAttribute('$permissions', [
2022-08-15 11:24:31 +00:00
Permission::read(Role::user($profile->getId())),
Permission::update(Role::user($profile->getId())),
Permission::delete(Role::user($profile->getId())),
]));
2022-06-08 09:00:38 +00:00
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $profile->getId());
2022-06-08 09:00:38 +00:00
2020-06-29 21:43:34 +00:00
$url = Template::parseURL($url);
2021-07-06 12:18:55 +00:00
$url['query'] = Template::mergeQuery(((isset($url['query'])) ? $url['query'] : ''), ['userId' => $profile->getId(), 'secret' => $secret, 'expire' => $expire]);
2020-06-29 21:43:34 +00:00
$url = Template::unParseURL($url);
2022-06-08 09:00:38 +00:00
2022-12-15 09:22:05 +00:00
$projectName = $project->isEmpty() ? 'Console' : $project->getAttribute('name', '[APP-NAME]');
2023-08-27 22:45:37 +00:00
$body = $locale->getText("emails.recovery.body");
2022-12-15 09:22:05 +00:00
$subject = $locale->getText("emails.recovery.subject");
2025-07-23 16:34:25 +00:00
$preview = $locale->getText("emails.recovery.preview");
$customTemplate = $project->getAttribute('templates', [])['email.recovery-' . $locale->default] ?? [];
2022-06-08 09:00:38 +00:00
2023-08-29 09:40:30 +00:00
$message = Template::fromFile(__DIR__ . '/../../config/locale/templates/email-inner-base.tpl');
$message
->setParam('{{body}}', $body, escapeHtml: false)
->setParam('{{hello}}', $locale->getText("emails.recovery.hello"))
->setParam('{{footer}}', $locale->getText("emails.recovery.footer"))
->setParam('{{thanks}}', $locale->getText("emails.recovery.thanks"))
->setParam('{{buttonText}}', $locale->getText("emails.recovery.buttonText"))
->setParam('{{signature}}', $locale->getText("emails.recovery.signature"));
2023-08-29 09:40:30 +00:00
$body = $message->render();
2022-06-08 09:00:38 +00:00
2023-08-29 09:40:30 +00:00
$smtp = $project->getAttribute('smtp', []);
$smtpEnabled = $smtp['enabled'] ?? false;
2022-06-08 09:00:38 +00:00
2024-04-01 11:02:47 +00:00
$senderEmail = System::getEnv('_APP_SYSTEM_EMAIL_ADDRESS', APP_EMAIL_TEAM);
$senderName = System::getEnv('_APP_SYSTEM_EMAIL_NAME', APP_NAME . ' Server');
2023-08-29 09:40:30 +00:00
$replyTo = "";
2022-06-08 09:00:38 +00:00
2023-08-29 09:40:30 +00:00
if ($smtpEnabled) {
if (!empty($smtp['senderEmail'])) {
$senderEmail = $smtp['senderEmail'];
}
if (!empty($smtp['senderName'])) {
$senderName = $smtp['senderName'];
}
if (!empty($smtp['replyTo'])) {
$replyTo = $smtp['replyTo'];
}
$queueForMails
2023-08-25 15:13:25 +00:00
->setSmtpHost($smtp['host'] ?? '')
->setSmtpPort($smtp['port'] ?? '')
->setSmtpUsername($smtp['username'] ?? '')
->setSmtpPassword($smtp['password'] ?? '')
2023-08-29 09:40:30 +00:00
->setSmtpSecure($smtp['secure'] ?? '');
2023-08-30 04:30:44 +00:00
if (!empty($customTemplate)) {
if (!empty($customTemplate['senderEmail'])) {
$senderEmail = $customTemplate['senderEmail'];
}
if (!empty($customTemplate['senderName'])) {
$senderName = $customTemplate['senderName'];
}
if (!empty($customTemplate['replyTo'])) {
$replyTo = $customTemplate['replyTo'];
}
$body = $customTemplate['message'] ?? '';
$subject = $customTemplate['subject'] ?? $subject;
2023-08-29 09:40:30 +00:00
}
$queueForMails
2023-08-30 04:30:44 +00:00
->setSmtpReplyTo($replyTo)
->setSmtpSenderEmail($senderEmail)
->setSmtpSenderName($senderName);
2022-06-08 09:00:38 +00:00
}
2023-08-27 22:45:37 +00:00
$emailVariables = [
'direction' => $locale->getText('settings.direction'),
// {{user}}, {{redirect}} and {{project}} are required in default and custom templates
2023-08-30 21:54:26 +00:00
'user' => $profile->getAttribute('name'),
'redirect' => $url,
'project' => $projectName,
// TODO: remove unnecessary team variable from this email
'team' => ''
2023-08-27 22:45:37 +00:00
];
2022-06-08 09:00:38 +00:00
2023-06-11 14:08:48 +00:00
$queueForMails
->setRecipient($profile->getAttribute('email', ''))
2024-02-24 13:21:00 +00:00
->setName($profile->getAttribute('name', ''))
2022-12-15 09:22:05 +00:00
->setBody($body)
2023-08-27 22:45:37 +00:00
->setVariables($emailVariables)
2022-12-15 09:22:05 +00:00
->setSubject($subject)
2025-07-23 16:34:25 +00:00
->setPreview($preview)
2020-06-29 21:43:34 +00:00
->trigger();
2022-06-08 09:00:38 +00:00
2024-05-22 02:11:06 +00:00
$recovery->setAttribute('secret', $secret);
2022-06-08 09:00:38 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents
->setParam('userId', $profile->getId())
->setParam('tokenId', $recovery->getId())
2022-04-18 16:21:45 +00:00
->setUser($profile)
->setPayload(Response::showSensitive(fn () => $response->output($recovery, Response::MODEL_TOKEN)), sensitive: ['secret']);
2020-11-18 19:38:31 +00:00
2022-09-07 11:11:10 +00:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($recovery, Response::MODEL_TOKEN);
2022-06-08 09:00:38 +00:00
});
2020-06-28 17:31:21 +00:00
App::put('/v1/account/recovery')
->desc('Update password recovery (confirmation)')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
2024-01-17 11:17:03 +00:00
->label('scope', 'sessions.write')
2022-04-04 06:30:07 +00:00
->label('event', 'users.[userId].recovery.[tokenId].update')
2022-09-05 08:00:08 +00:00
->label('audits.event', 'recovery.update')
2022-08-11 13:19:05 +00:00
->label('audits.resource', 'user/{response.userId}')
2022-08-16 09:00:28 +00:00
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'recovery',
2025-01-17 04:31:39 +00:00
name: 'updateRecovery',
description: '/docs/references/account/update-recovery.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_TOKEN,
)
],
contentType: ContentType::JSON
))
2020-01-05 23:07:41 +00:00
->label('abuse-limit', 10)
->label('abuse-key', 'url:{url},userId:{param-userId}')
->param('userId', '', new UID(), 'User ID.')
2020-09-10 14:40:14 +00:00
->param('secret', '', new Text(256), 'Valid reset token.')
2024-01-02 10:59:35 +00:00
->param('password', '', fn ($project, $passwordsDictionary) => new PasswordDictionary($passwordsDictionary, $project->getAttribute('auths', [])['passwordDictionary'] ?? false), 'New user password. Must be between 8 and 256 chars.', false, ['project', 'passwordsDictionary'])
2021-02-16 13:46:30 +00:00
->inject('response')
->inject('user')
->inject('dbForProject')
2023-07-19 21:34:27 +00:00
->inject('project')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
->inject('hooks')
->action(function (string $userId, string $secret, string $password, Response $response, Document $user, Database $dbForProject, Document $project, Event $queueForEvents, Hooks $hooks) {
$profile = $dbForProject->getDocument('users', $userId);
2021-04-03 08:56:32 +00:00
2022-05-16 09:58:17 +00:00
if ($profile->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2021-04-03 08:56:32 +00:00
}
2021-05-06 22:31:05 +00:00
$tokens = $profile->getAttribute('tokens', []);
2023-10-05 10:18:19 +00:00
$verifiedToken = Auth::tokenVerify($tokens, Auth::TOKEN_TYPE_RECOVERY, $secret);
2021-02-16 13:46:30 +00:00
2023-10-05 10:18:19 +00:00
if (!$verifiedToken) {
throw new Exception(Exception::USER_INVALID_TOKEN);
2020-06-29 21:43:34 +00:00
}
2021-07-17 10:04:43 +00:00
2022-08-19 04:04:33 +00:00
Authorization::setRole(Role::user($profile->getId())->toString());
2021-02-16 13:46:30 +00:00
2023-07-19 21:34:27 +00:00
$newPassword = Auth::passwordHash($password, Auth::DEFAULT_ALGO, Auth::DEFAULT_ALGO_OPTIONS);
2022-04-04 06:30:07 +00:00
2023-07-19 21:34:27 +00:00
$historyLimit = $project->getAttribute('auths', [])['passwordHistory'] ?? 0;
$history = $profile->getAttribute('passwordHistory', []);
if ($historyLimit > 0) {
$validator = new PasswordHistory($history, $profile->getAttribute('hash'), $profile->getAttribute('hashOptions'));
if (!$validator->isValid($password)) {
throw new Exception(Exception::USER_PASSWORD_RECENTLY_USED);
}
$history[] = $newPassword;
$history = array_slice($history, (count($history) - $historyLimit), $historyLimit);
2021-02-16 13:46:30 +00:00
}
$hooks->trigger('passwordValidator', [$dbForProject, $project, $password, &$user, true]);
2021-02-16 13:46:30 +00:00
$profile = $dbForProject->updateDocument('users', $profile->getId(), $profile
2023-07-19 21:34:27 +00:00
->setAttribute('password', $newPassword)
->setAttribute('passwordHistory', $history)
2023-02-20 01:51:56 +00:00
->setAttribute('passwordUpdate', DateTime::now())
->setAttribute('hash', Auth::DEFAULT_ALGO)
->setAttribute('hashOptions', Auth::DEFAULT_ALGO_OPTIONS)
2022-05-23 14:54:50 +00:00
->setAttribute('emailVerification', true));
2021-06-17 09:33:57 +00:00
$user->setAttributes($profile->getArrayCopy());
2023-10-05 10:18:19 +00:00
$recoveryDocument = $dbForProject->getDocument('tokens', $verifiedToken->getId());
2022-04-27 11:06:53 +00:00
2020-06-29 21:43:34 +00:00
/**
* We act like we're updating and validating
* the recovery token but actually we don't need it anymore.
*/
2023-10-05 10:18:19 +00:00
$dbForProject->deleteDocument('tokens', $verifiedToken->getId());
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $profile->getId());
2021-05-06 22:31:05 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents
2020-06-29 21:43:34 +00:00
->setParam('userId', $profile->getId())
2022-05-08 15:49:17 +00:00
->setParam('tokenId', $recoveryDocument->getId())
->setPayload(Response::showSensitive(fn () => $response->output($recoveryDocument, Response::MODEL_TOKEN)), sensitive: ['secret']);
2021-02-16 13:46:30 +00:00
2022-04-27 11:06:53 +00:00
$response->dynamic($recoveryDocument, Response::MODEL_TOKEN);
2021-02-16 13:46:30 +00:00
});
2020-06-28 17:31:21 +00:00
App::post('/v1/account/verification')
2023-08-01 15:26:48 +00:00
->desc('Create email verification')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
2020-10-17 17:49:09 +00:00
->label('scope', 'account')
2022-04-04 06:30:07 +00:00
->label('event', 'users.[userId].verification.[tokenId].create')
2022-09-05 08:00:08 +00:00
->label('audits.event', 'verification.create')
2022-08-11 13:19:05 +00:00
->label('audits.resource', 'user/{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'verification',
2025-01-17 04:31:39 +00:00
name: 'createVerification',
description: '/docs/references/account/create-email-verification.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_TOKEN,
)
],
contentType: ContentType::JSON,
))
2020-01-12 00:20:35 +00:00
->label('abuse-limit', 10)
2021-07-27 11:07:39 +00:00
->label('abuse-key', 'url:{url},userId:{userId}')
->param('url', '', fn ($platforms, $devKey) => $devKey->isEmpty() ? new Redirect($platforms) : new URL(), 'URL to redirect the user back to your app from the verification email. Only URLs from hostnames in your project platform list are allowed. This requirement helps to prevent an [open redirect](https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html) attack against your project API.', false, ['platforms', 'devKey']) // TODO add built-in confirm page
2020-12-26 14:31:53 +00:00
->inject('request')
2020-12-28 17:03:27 +00:00
->inject('response')
2020-12-26 14:31:53 +00:00
->inject('project')
2020-12-28 17:03:27 +00:00
->inject('user')
2022-04-04 09:59:32 +00:00
->inject('dbForProject')
2020-12-26 14:31:53 +00:00
->inject('locale')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2023-06-11 14:08:48 +00:00
->inject('queueForMails')
->action(function (string $url, Request $request, Response $response, Document $project, Document $user, Database $dbForProject, Locale $locale, Event $queueForEvents, Mail $queueForMails) {
2022-04-26 08:52:59 +00:00
2024-04-01 11:02:47 +00:00
if (empty(System::getEnv('_APP_SMTP_HOST'))) {
throw new Exception(Exception::GENERAL_SMTP_DISABLED, 'SMTP Disabled');
2022-04-26 08:52:59 +00:00
}
2024-07-22 13:37:28 +00:00
$url = htmlentities($url);
2023-09-22 17:26:07 +00:00
if ($user->getAttribute('emailVerification')) {
2023-09-22 17:23:41 +00:00
throw new Exception(Exception::USER_EMAIL_ALREADY_VERIFIED);
2020-12-28 17:03:27 +00:00
}
2021-08-05 05:06:38 +00:00
$verificationSecret = Auth::tokenGenerator(Auth::TOKEN_LENGTH_VERIFICATION);
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), Auth::TOKEN_EXPIRATION_CONFIRM));
2020-12-28 17:03:27 +00:00
2020-06-29 21:43:34 +00:00
$verification = new Document([
2022-08-14 14:22:38 +00:00
'$id' => ID::unique(),
2021-05-06 22:31:05 +00:00
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
2020-06-29 21:43:34 +00:00
'type' => Auth::TOKEN_TYPE_VERIFICATION,
2020-11-12 11:54:16 +00:00
'secret' => Auth::hash($verificationSecret), // One way hash encryption to protect DB leak
2021-07-06 12:18:55 +00:00
'expire' => $expire,
2020-07-03 15:14:51 +00:00
'userAgent' => $request->getUserAgent('UNKNOWN'),
2020-06-29 21:43:34 +00:00
'ip' => $request->getIP(),
]);
2020-01-31 22:34:07 +00:00
2022-08-19 04:04:33 +00:00
Authorization::setRole(Role::user($user->getId())->toString());
2020-01-31 22:34:07 +00:00
2022-04-27 11:06:53 +00:00
$verification = $dbForProject->createDocument('tokens', $verification
->setAttribute('$permissions', [
2022-08-15 11:24:31 +00:00
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]));
2020-06-29 21:43:34 +00:00
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2020-01-31 22:34:07 +00:00
2020-06-29 21:43:34 +00:00
$url = Template::parseURL($url);
2021-07-06 12:18:55 +00:00
$url['query'] = Template::mergeQuery(((isset($url['query'])) ? $url['query'] : ''), ['userId' => $user->getId(), 'secret' => $verificationSecret, 'expire' => $expire]);
2020-06-29 21:43:34 +00:00
$url = Template::unParseURL($url);
2022-12-15 09:22:05 +00:00
$projectName = $project->isEmpty() ? 'Console' : $project->getAttribute('name', '[APP-NAME]');
2023-08-28 05:09:28 +00:00
$body = $locale->getText("emails.verification.body");
2025-07-23 16:34:25 +00:00
$preview = $locale->getText("emails.verification.preview");
2022-12-15 09:22:05 +00:00
$subject = $locale->getText("emails.verification.subject");
$customTemplate = $project->getAttribute('templates', [])['email.verification-' . $locale->default] ?? [];
2020-06-29 21:43:34 +00:00
2023-08-29 09:40:30 +00:00
$message = Template::fromFile(__DIR__ . '/../../config/locale/templates/email-inner-base.tpl');
$message
->setParam('{{body}}', $body, escapeHtml: false)
->setParam('{{hello}}', $locale->getText("emails.verification.hello"))
->setParam('{{footer}}', $locale->getText("emails.verification.footer"))
->setParam('{{thanks}}', $locale->getText("emails.verification.thanks"))
->setParam('{{buttonText}}', $locale->getText("emails.verification.buttonText"))
->setParam('{{signature}}', $locale->getText("emails.verification.signature"));
2021-06-17 09:08:01 +00:00
2023-08-29 09:40:30 +00:00
$body = $message->render();
2020-01-31 22:34:07 +00:00
2023-08-29 09:40:30 +00:00
$smtp = $project->getAttribute('smtp', []);
$smtpEnabled = $smtp['enabled'] ?? false;
2020-06-29 21:43:34 +00:00
2024-04-01 11:02:47 +00:00
$senderEmail = System::getEnv('_APP_SYSTEM_EMAIL_ADDRESS', APP_EMAIL_TEAM);
$senderName = System::getEnv('_APP_SYSTEM_EMAIL_NAME', APP_NAME . ' Server');
2023-08-29 09:40:30 +00:00
$replyTo = "";
2020-01-31 22:34:07 +00:00
2023-08-29 09:40:30 +00:00
if ($smtpEnabled) {
if (!empty($smtp['senderEmail'])) {
$senderEmail = $smtp['senderEmail'];
}
if (!empty($smtp['senderName'])) {
$senderName = $smtp['senderName'];
}
if (!empty($smtp['replyTo'])) {
$replyTo = $smtp['replyTo'];
}
2020-06-29 21:43:34 +00:00
$queueForMails
2023-08-25 15:13:25 +00:00
->setSmtpHost($smtp['host'] ?? '')
->setSmtpPort($smtp['port'] ?? '')
->setSmtpUsername($smtp['username'] ?? '')
->setSmtpPassword($smtp['password'] ?? '')
2023-08-29 09:40:30 +00:00
->setSmtpSecure($smtp['secure'] ?? '');
2022-08-23 13:10:27 +00:00
2023-08-30 04:30:44 +00:00
if (!empty($customTemplate)) {
if (!empty($customTemplate['senderEmail'])) {
$senderEmail = $customTemplate['senderEmail'];
}
if (!empty($customTemplate['senderName'])) {
$senderName = $customTemplate['senderName'];
}
if (!empty($customTemplate['replyTo'])) {
$replyTo = $customTemplate['replyTo'];
}
2022-04-04 06:30:07 +00:00
2023-08-30 04:30:44 +00:00
$body = $customTemplate['message'] ?? '';
$subject = $customTemplate['subject'] ?? $subject;
2023-08-29 09:40:30 +00:00
}
2020-06-29 21:43:34 +00:00
$queueForMails
2023-08-30 04:30:44 +00:00
->setSmtpReplyTo($replyTo)
->setSmtpSenderEmail($senderEmail)
->setSmtpSenderName($senderName);
}
2020-06-29 21:43:34 +00:00
2023-08-28 05:09:28 +00:00
$emailVariables = [
'direction' => $locale->getText('settings.direction'),
// {{user}}, {{redirect}} and {{project}} are required in default and custom templates
'user' => $user->getAttribute('name'),
'redirect' => $url,
'project' => $projectName,
// TODO: remove unnecessary team variable from this email
'team' => '',
2023-08-28 05:09:28 +00:00
];
2020-06-29 21:43:34 +00:00
2023-06-11 14:08:48 +00:00
$queueForMails
->setSubject($subject)
2025-07-23 16:34:25 +00:00
->setPreview($preview)
->setBody($body)
2023-08-28 05:09:28 +00:00
->setVariables($emailVariables)
->setRecipient($user->getAttribute('email'))
->setName($user->getAttribute('name') ?? '')
2023-08-30 04:30:44 +00:00
->trigger();
2020-06-29 21:43:34 +00:00
2024-05-22 02:11:06 +00:00
$verification->setAttribute('secret', $verificationSecret);
2020-10-30 19:53:27 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents
2022-04-04 06:30:07 +00:00
->setParam('userId', $user->getId())
->setParam('tokenId', $verification->getId())
->setPayload(Response::showSensitive(fn () => $response->output($verification, Response::MODEL_TOKEN)), sensitive: ['secret']);
2020-06-29 21:43:34 +00:00
2022-09-07 11:11:10 +00:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($verification, Response::MODEL_TOKEN);
2020-12-26 14:31:53 +00:00
});
2020-01-31 22:34:07 +00:00
2020-06-28 17:31:21 +00:00
App::put('/v1/account/verification')
->desc('Update email verification (confirmation)')
2021-06-16 10:14:08 +00:00
->groups(['api', 'account'])
2020-01-12 00:20:35 +00:00
->label('scope', 'public')
2022-04-04 06:30:07 +00:00
->label('event', 'users.[userId].verification.[tokenId].update')
2022-09-05 08:00:08 +00:00
->label('audits.event', 'verification.update')
2022-08-11 13:19:05 +00:00
->label('audits.resource', 'user/{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'verification',
2025-01-17 04:31:39 +00:00
name: 'updateVerification',
description: '/docs/references/account/update-email-verification.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_TOKEN,
)
],
contentType: ContentType::JSON
))
2020-01-12 00:20:35 +00:00
->label('abuse-limit', 10)
->label('abuse-key', 'url:{url},userId:{param-userId}')
->param('userId', '', new UID(), 'User ID.')
2020-09-10 14:40:14 +00:00
->param('secret', '', new Text(256), 'Valid verification token.')
2021-06-16 10:14:08 +00:00
->inject('response')
->inject('user')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
->action(function (string $userId, string $secret, Response $response, Document $user, Database $dbForProject, Event $queueForEvents) {
2021-06-16 10:14:08 +00:00
2024-03-06 17:34:21 +00:00
$profile = Authorization::skip(fn () => $dbForProject->getDocument('users', $userId));
2021-06-16 10:14:08 +00:00
2021-05-06 22:31:05 +00:00
if ($profile->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
2020-06-29 21:43:34 +00:00
}
2021-06-17 09:33:57 +00:00
2021-05-06 22:31:05 +00:00
$tokens = $profile->getAttribute('tokens', []);
2023-10-05 10:18:19 +00:00
$verifiedToken = Auth::tokenVerify($tokens, Auth::TOKEN_TYPE_VERIFICATION, $secret);
2021-08-05 05:06:38 +00:00
2023-10-05 10:18:19 +00:00
if (!$verifiedToken) {
throw new Exception(Exception::USER_INVALID_TOKEN);
}
2021-06-16 10:48:12 +00:00
2022-08-19 04:04:33 +00:00
Authorization::setRole(Role::user($profile->getId())->toString());
2021-06-16 10:14:08 +00:00
$profile = $dbForProject->updateDocument('users', $profile->getId(), $profile->setAttribute('emailVerification', true));
2020-06-29 21:43:34 +00:00
$user->setAttributes($profile->getArrayCopy());
$verification = $dbForProject->getDocument('tokens', $verifiedToken->getId());
2020-06-29 21:43:34 +00:00
/**
* We act like we're updating and validating
* the verification token but actually we don't need it anymore.
*/
2023-10-05 10:18:19 +00:00
$dbForProject->deleteDocument('tokens', $verifiedToken->getId());
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $profile->getId());
2021-08-16 08:53:34 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents
->setParam('userId', $userId)
2025-03-24 14:06:36 +00:00
->setParam('tokenId', $verification->getId())
->setPayload(Response::showSensitive(fn () => $response->output($verification, Response::MODEL_TOKEN)), sensitive: ['secret']);
2022-04-04 06:30:07 +00:00
$response->dynamic($verification, Response::MODEL_TOKEN);
2020-12-26 14:31:53 +00:00
});
2019-05-09 06:54:39 +00:00
App::post('/v1/account/verification/phone')
2023-08-01 15:26:48 +00:00
->desc('Create phone verification')
2024-02-12 01:18:19 +00:00
->groups(['api', 'account', 'auth'])
2019-05-09 06:54:39 +00:00
->label('scope', 'account')
2024-02-12 01:18:19 +00:00
->label('auth.type', 'phone')
->label('event', 'users.[userId].verification.[tokenId].create')
2022-09-05 08:00:08 +00:00
->label('audits.event', 'verification.create')
2022-08-11 13:19:05 +00:00
->label('audits.resource', 'user/{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'verification',
2025-01-17 04:31:39 +00:00
name: 'createPhoneVerification',
description: '/docs/references/account/create-phone-verification.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_TOKEN,
)
],
contentType: ContentType::JSON,
))
->label('abuse-limit', 10)
2024-02-12 01:18:19 +00:00
->label('abuse-key', ['url:{url},userId:{userId}', 'url:{url},ip:{ip}'])
->inject('request')
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('user')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
->inject('queueForMessaging')
->inject('project')
->inject('locale')
->inject('timelimit')
2025-01-30 04:53:53 +00:00
->inject('queueForStatsUsage')
->inject('plan')
2025-01-30 04:53:53 +00:00
->action(function (Request $request, Response $response, Document $user, Database $dbForProject, Event $queueForEvents, Messaging $queueForMessaging, Document $project, Locale $locale, callable $timelimit, StatsUsage $queueForStatsUsage, array $plan) {
2024-04-01 11:02:47 +00:00
if (empty(System::getEnv('_APP_SMS_PROVIDER'))) {
throw new Exception(Exception::GENERAL_PHONE_DISABLED, 'Phone provider not configured');
2020-06-29 21:43:34 +00:00
}
2019-05-09 06:54:39 +00:00
$phone = $user->getAttribute('phone');
2024-07-03 09:35:56 +00:00
if (empty($phone)) {
throw new Exception(Exception::USER_PHONE_NOT_FOUND);
2022-12-16 10:22:39 +00:00
}
2023-09-22 17:26:07 +00:00
if ($user->getAttribute('phoneVerification')) {
2023-09-22 17:23:41 +00:00
throw new Exception(Exception::USER_PHONE_ALREADY_VERIFIED);
2022-12-16 10:22:39 +00:00
}
$secret = null;
$sendSMS = true;
$mockNumbers = $project->getAttribute('auths', [])['mockNumbers'] ?? [];
foreach ($mockNumbers as $mockNumber) {
if ($mockNumber['phone'] === $phone) {
$secret = $mockNumber['otp'];
$sendSMS = false;
break;
}
}
2022-04-04 06:30:07 +00:00
$secret ??= Auth::codeGenerator();
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), Auth::TOKEN_EXPIRATION_CONFIRM));
2019-05-09 06:54:39 +00:00
$verification = new Document([
2022-08-14 14:22:38 +00:00
'$id' => ID::unique(),
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
'type' => Auth::TOKEN_TYPE_PHONE,
2022-09-22 22:25:17 +00:00
'secret' => Auth::hash($secret),
'expire' => $expire,
'userAgent' => $request->getUserAgent('UNKNOWN'),
'ip' => $request->getIP(),
]);
2021-02-16 13:46:30 +00:00
2022-08-19 04:04:33 +00:00
Authorization::setRole(Role::user($user->getId())->toString());
$verification = $dbForProject->createDocument('tokens', $verification
->setAttribute('$permissions', [
2022-08-15 11:24:31 +00:00
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]));
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
if ($sendSMS) {
$message = Template::fromFile(__DIR__ . '/../../config/locale/templates/sms-base.tpl');
$customTemplate = $project->getAttribute('templates', [])['sms.verification-' . $locale->default] ?? [];
if (!empty($customTemplate)) {
$message = $customTemplate['message'] ?? $message;
}
2024-06-20 15:01:20 +00:00
$messageContent = Template::fromString($locale->getText("sms.verification.body"));
$messageContent
->setParam('{{project}}', $project->getAttribute('name'))
->setParam('{{secret}}', $secret);
$messageContent = \strip_tags($messageContent->render());
$message = $message->setParam('{{token}}', $messageContent);
$message = $message->render();
2024-06-20 15:01:20 +00:00
$messageDoc = new Document([
'$id' => $verification->getId(),
'data' => [
'content' => $message,
],
]);
$queueForMessaging
2024-06-20 15:01:20 +00:00
->setType(MESSAGE_SEND_TYPE_INTERNAL)
->setMessage($messageDoc)
->setRecipients([$user->getAttribute('phone')])
->setProviderType(MESSAGE_TYPE_SMS);
if (isset($plan['authPhone'])) {
$timelimit = $timelimit('organization:{organizationId}', $plan['authPhone'], 30 * 24 * 60 * 60); // 30 days
$timelimit
2025-01-08 11:44:07 +00:00
->setParam('{organizationId}', $project->getAttribute('teamId'));
$abuse = new Abuse($timelimit);
if ($abuse->check() && System::getEnv('_APP_OPTIONS_ABUSE', 'enabled') === 'enabled') {
$helper = PhoneNumberUtil::getInstance();
$countryCode = $helper->parse($phone)->getCountryCode();
if (!empty($countryCode)) {
2025-01-30 04:53:53 +00:00
$queueForStatsUsage
->addMetric(str_replace('{countryCode}', $countryCode, METRIC_AUTH_METHOD_PHONE_COUNTRY_CODE), 1);
}
}
2025-01-30 04:53:53 +00:00
$queueForStatsUsage
->addMetric(METRIC_AUTH_METHOD_PHONE, 1)
->setProject($project)
->trigger();
}
2020-06-29 21:43:34 +00:00
}
2019-07-21 11:43:06 +00:00
2024-05-22 02:11:06 +00:00
$verification->setAttribute('secret', $secret);
2019-05-09 06:54:39 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents
->setParam('userId', $user->getId())
->setParam('tokenId', $verification->getId())
->setPayload($response->output($verification, Response::MODEL_TOKEN), sensitive: ['secret']);
2019-05-09 06:54:39 +00:00
2022-09-07 11:11:10 +00:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($verification, Response::MODEL_TOKEN);
2020-12-26 14:31:53 +00:00
});
2019-05-09 06:54:39 +00:00
App::put('/v1/account/verification/phone')
2024-06-21 14:41:46 +00:00
->desc('Update phone verification (confirmation)')
->groups(['api', 'account'])
->label('scope', 'public')
->label('event', 'users.[userId].verification.[tokenId].update')
2022-09-05 08:00:08 +00:00
->label('audits.event', 'verification.update')
2022-08-11 13:19:05 +00:00
->label('audits.resource', 'user/{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'verification',
2025-01-17 04:31:39 +00:00
name: 'updatePhoneVerification',
description: '/docs/references/account/update-phone-verification.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_TOKEN,
)
],
contentType: ContentType::JSON
))
->label('abuse-limit', 10)
->label('abuse-key', 'userId:{param-userId}')
->param('userId', '', new UID(), 'User ID.')
->param('secret', '', new Text(256), 'Valid verification token.')
->inject('response')
->inject('user')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
->action(function (string $userId, string $secret, Response $response, Document $user, Database $dbForProject, Event $queueForEvents) {
2024-03-06 17:34:21 +00:00
$profile = Authorization::skip(fn () => $dbForProject->getDocument('users', $userId));
if ($profile->isEmpty()) {
throw new Exception(Exception::USER_NOT_FOUND);
}
2023-10-05 10:18:19 +00:00
$verifiedToken = Auth::tokenVerify($user->getAttribute('tokens', []), Auth::TOKEN_TYPE_PHONE, $secret);
2023-10-05 10:18:19 +00:00
if (!$verifiedToken) {
throw new Exception(Exception::USER_INVALID_TOKEN);
}
2022-08-19 04:04:33 +00:00
Authorization::setRole(Role::user($profile->getId())->toString());
$profile = $dbForProject->updateDocument('users', $profile->getId(), $profile->setAttribute('phoneVerification', true));
$user->setAttributes($profile->getArrayCopy());
2019-05-09 06:54:39 +00:00
2023-10-05 10:18:19 +00:00
$verificationDocument = $dbForProject->getDocument('tokens', $verifiedToken->getId());
2019-05-09 06:54:39 +00:00
/**
* We act like we're updating and validating the verification token but actually we don't need it anymore.
*/
2023-10-05 10:18:19 +00:00
$dbForProject->deleteDocument('tokens', $verifiedToken->getId());
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $profile->getId());
2019-05-09 06:54:39 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents
->setParam('userId', $user->getId())
->setParam('tokenId', $verificationDocument->getId())
;
2020-01-11 13:58:02 +00:00
$response->dynamic($verificationDocument, Response::MODEL_TOKEN);
2020-12-26 14:31:53 +00:00
});
2019-05-09 06:54:39 +00:00
2023-06-22 13:35:49 +00:00
App::patch('/v1/account/mfa')
->desc('Update MFA')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
2023-06-22 13:35:49 +00:00
->label('event', 'users.[userId].update.mfa')
2019-05-09 06:54:39 +00:00
->label('scope', 'account')
2022-09-08 13:06:16 +00:00
->label('audits.event', 'user.update')
2022-08-08 14:32:54 +00:00
->label('audits.resource', 'user/{response.$id}')
2023-06-22 13:35:49 +00:00
->label('audits.userId', '{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'mfa',
2025-01-17 04:31:39 +00:00
name: 'updateMFA',
description: '/docs/references/account/update-mfa.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_USER,
)
],
contentType: ContentType::JSON
))
2024-01-18 13:56:58 +00:00
->param('mfa', null, new Boolean(), 'Enable or disable MFA.')
->inject('requestTimestamp')
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('user')
->inject('session')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
->action(function (bool $mfa, ?\DateTime $requestTimestamp, Response $response, Document $user, Document $session, Database $dbForProject, Event $queueForEvents) {
2020-06-29 21:43:34 +00:00
2023-06-22 13:35:49 +00:00
$user->setAttribute('mfa', $mfa);
2020-06-29 21:43:34 +00:00
2025-04-30 05:40:47 +00:00
$user = $dbForProject->updateDocument('users', $user->getId(), $user);
2021-05-06 22:31:05 +00:00
if ($mfa) {
$factors = $session->getAttribute('factors', []);
$totp = TOTP::getAuthenticatorFromUser($user);
if ($totp !== null && $totp->getAttribute('verified', false)) {
$factors[] = Type::TOTP;
}
if ($user->getAttribute('email', false) && $user->getAttribute('emailVerification', false)) {
$factors[] = Type::EMAIL;
}
if ($user->getAttribute('phone', false) && $user->getAttribute('phoneVerification', false)) {
$factors[] = Type::PHONE;
}
$factors = \array_values(\array_unique($factors));
2020-06-29 21:43:34 +00:00
$session->setAttribute('factors', $factors);
$dbForProject->updateDocument('sessions', $session->getId(), $session);
2019-05-09 06:54:39 +00:00
}
2020-06-29 21:43:34 +00:00
2024-01-09 15:30:18 +00:00
$queueForEvents->setParam('userId', $user->getId());
$response->dynamic($user, Response::MODEL_ACCOUNT);
2020-12-26 14:31:53 +00:00
});
2020-01-05 11:29:42 +00:00
2024-02-02 12:42:15 +00:00
App::get('/v1/account/mfa/factors')
->desc('List factors')
2023-06-22 13:35:49 +00:00
->groups(['api', 'account', 'mfa'])
2020-01-05 11:29:42 +00:00
->label('scope', 'account')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'mfa',
2025-01-17 04:31:39 +00:00
name: 'listMfaFactors',
description: '/docs/references/account/list-mfa-factors.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_MFA_FACTORS,
)
],
contentType: ContentType::JSON
))
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('user')
2023-06-22 13:35:49 +00:00
->action(function (Response $response, Document $user) {
2020-11-20 21:02:26 +00:00
2024-04-11 07:52:54 +00:00
$mfaRecoveryCodes = $user->getAttribute('mfaRecoveryCodes', []);
$recoveryCodeEnabled = \is_array($mfaRecoveryCodes) && \count($mfaRecoveryCodes) > 0;
2022-05-23 14:54:50 +00:00
2024-02-29 20:59:49 +00:00
$totp = TOTP::getAuthenticatorFromUser($user);
2021-05-06 22:31:05 +00:00
2024-02-29 20:59:49 +00:00
$factors = new Document([
2024-03-01 02:07:58 +00:00
Type::TOTP => $totp !== null && $totp->getAttribute('verified', false),
Type::EMAIL => $user->getAttribute('email', false) && $user->getAttribute('emailVerification', false),
2024-04-10 13:57:36 +00:00
Type::PHONE => $user->getAttribute('phone', false) && $user->getAttribute('phoneVerification', false),
2024-04-11 07:52:54 +00:00
Type::RECOVERY_CODE => $recoveryCodeEnabled
2023-06-22 13:35:49 +00:00
]);
2020-06-29 21:43:34 +00:00
2024-02-29 20:59:49 +00:00
$response->dynamic($factors, Response::MODEL_MFA_FACTORS);
2020-12-26 14:31:53 +00:00
});
2020-06-29 21:43:34 +00:00
2024-03-01 16:22:51 +00:00
App::post('/v1/account/mfa/authenticators/:type')
->desc('Create authenticator')
2022-02-01 15:54:20 +00:00
->groups(['api', 'account'])
2023-06-22 13:35:49 +00:00
->label('event', 'users.[userId].update.mfa')
2022-02-01 15:54:20 +00:00
->label('scope', 'account')
2023-06-22 13:35:49 +00:00
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
->label('audits.userId', '{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'mfa',
2025-01-17 04:31:39 +00:00
name: 'createMfaAuthenticator',
description: '/docs/references/account/create-mfa-authenticator.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_MFA_TYPE,
)
],
contentType: ContentType::JSON
))
2024-03-01 12:30:33 +00:00
->param('type', null, new WhiteList([Type::TOTP]), 'Type of authenticator. Must be `' . Type::TOTP . '`')
2023-06-22 13:35:49 +00:00
->inject('requestTimestamp')
2022-02-01 15:54:20 +00:00
->inject('response')
2023-06-22 13:35:49 +00:00
->inject('project')
2022-02-01 15:54:20 +00:00
->inject('user')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2024-02-15 11:26:34 +00:00
->action(function (string $type, ?\DateTime $requestTimestamp, Response $response, Document $project, Document $user, Database $dbForProject, Event $queueForEvents) {
2024-03-01 12:36:38 +00:00
$otp = (match ($type) {
2024-03-01 02:07:58 +00:00
Type::TOTP => new TOTP(),
2024-03-01 17:04:09 +00:00
default => throw new Exception(Exception::GENERAL_ARGUMENT_INVALID, 'Unknown type.') // Ideally never happens if param validator stays always in sync
2024-03-01 12:36:38 +00:00
});
2022-02-01 15:54:20 +00:00
2023-06-22 13:35:49 +00:00
$otp->setLabel($user->getAttribute('email'));
$otp->setIssuer($project->getAttribute('name'));
2022-02-01 15:54:20 +00:00
2024-02-29 20:59:49 +00:00
$authenticator = TOTP::getAuthenticatorFromUser($user);
2022-02-01 16:30:49 +00:00
2024-03-01 12:36:38 +00:00
if ($authenticator) {
if ($authenticator->getAttribute('verified')) {
2024-03-02 09:49:56 +00:00
throw new Exception(Exception::USER_AUTHENTICATOR_ALREADY_VERIFIED);
2024-03-01 12:36:38 +00:00
}
$dbForProject->deleteDocument('authenticators', $authenticator->getId());
2024-02-29 21:05:19 +00:00
}
2022-02-01 15:54:20 +00:00
2024-02-29 20:59:49 +00:00
$authenticator = new Document([
'$id' => ID::unique(),
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
'type' => Type::TOTP,
2024-02-29 20:59:49 +00:00
'verified' => false,
'data' => [
'secret' => $otp->getSecret(),
],
'$permissions' => [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
]
]);
2022-11-04 14:48:29 +00:00
2024-02-29 20:59:49 +00:00
$model = new Document([
'secret' => $otp->getSecret(),
'uri' => $otp->getProvisioningUri()
]);
2022-11-03 15:03:39 +00:00
2024-02-29 20:59:49 +00:00
$authenticator = $dbForProject->createDocument('authenticators', $authenticator);
$dbForProject->purgeCachedDocument('users', $user->getId());
2022-02-01 15:54:20 +00:00
2024-01-09 15:30:18 +00:00
$queueForEvents->setParam('userId', $user->getId());
2022-02-01 15:54:20 +00:00
2024-02-15 11:26:34 +00:00
$response->dynamic($model, Response::MODEL_MFA_TYPE);
2022-02-01 15:54:20 +00:00
});
2024-03-01 16:22:51 +00:00
App::put('/v1/account/mfa/authenticators/:type')
->desc('Update authenticator (confirmation)')
2020-06-29 21:43:34 +00:00
->groups(['api', 'account'])
2023-06-22 13:35:49 +00:00
->label('event', 'users.[userId].update.mfa')
2020-06-29 21:43:34 +00:00
->label('scope', 'account')
2023-06-22 13:35:49 +00:00
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
->label('audits.userId', '{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'mfa',
2025-01-17 04:31:39 +00:00
name: 'updateMfaAuthenticator',
description: '/docs/references/account/update-mfa-authenticator.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_USER,
)
],
contentType: ContentType::JSON
))
2024-03-01 02:07:58 +00:00
->param('type', null, new WhiteList([Type::TOTP]), 'Type of authenticator.')
2023-06-22 13:35:49 +00:00
->param('otp', '', new Text(256), 'Valid verification token.')
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('user')
->inject('session')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
->action(function (string $type, string $otp, Response $response, Document $user, Document $session, Database $dbForProject, Event $queueForEvents) {
2020-06-29 21:43:34 +00:00
2024-03-01 12:36:38 +00:00
$authenticator = (match ($type) {
2024-03-01 02:07:58 +00:00
Type::TOTP => TOTP::getAuthenticatorFromUser($user),
2024-02-29 20:59:49 +00:00
default => null
2024-03-01 12:36:38 +00:00
});
2020-06-29 21:43:34 +00:00
2024-03-01 12:36:38 +00:00
if ($authenticator === null) {
2024-03-01 17:04:09 +00:00
throw new Exception(Exception::USER_AUTHENTICATOR_NOT_FOUND);
2024-03-01 12:36:38 +00:00
}
2020-06-29 21:43:34 +00:00
2024-03-01 12:36:38 +00:00
if ($authenticator->getAttribute('verified')) {
2024-03-01 17:04:09 +00:00
throw new Exception(Exception::USER_AUTHENTICATOR_ALREADY_VERIFIED);
2024-03-01 12:36:38 +00:00
}
2020-06-29 21:43:34 +00:00
2024-03-01 12:36:38 +00:00
$success = (match ($type) {
Type::TOTP => Challenge\TOTP::verify($user, $otp),
default => false
});
2020-11-20 21:02:26 +00:00
2024-03-01 12:36:38 +00:00
if (!$success) {
throw new Exception(Exception::USER_INVALID_TOKEN);
}
2022-05-12 19:31:15 +00:00
2024-02-29 20:59:49 +00:00
$authenticator->setAttribute('verified', true);
2022-05-12 19:31:15 +00:00
2024-02-29 20:59:49 +00:00
$dbForProject->updateDocument('authenticators', $authenticator->getId(), $authenticator);
$dbForProject->purgeCachedDocument('users', $user->getId());
2021-05-06 22:31:05 +00:00
$factors = $session->getAttribute('factors', []);
$factors[] = $type;
$factors = \array_values(\array_unique($factors));
2021-08-05 05:06:38 +00:00
$session->setAttribute('factors', $factors);
$dbForProject->updateDocument('sessions', $session->getId(), $session);
2020-06-29 21:43:34 +00:00
2024-01-09 15:30:18 +00:00
$queueForEvents->setParam('userId', $user->getId());
2023-06-22 13:35:49 +00:00
$response->dynamic($user, Response::MODEL_ACCOUNT);
2020-12-26 14:31:53 +00:00
});
2020-01-23 22:33:44 +00:00
2024-03-01 16:22:51 +00:00
App::post('/v1/account/mfa/recovery-codes')
->desc('Create MFA recovery codes')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
2024-03-01 16:22:51 +00:00
->label('event', 'users.[userId].update.mfa')
->label('scope', 'account')
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
->label('audits.userId', '{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'mfa',
2025-01-17 04:31:39 +00:00
name: 'createMfaRecoveryCodes',
description: '/docs/references/account/create-mfa-recovery-codes.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_MFA_RECOVERY_CODES,
)
],
contentType: ContentType::JSON
))
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('user')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2024-03-02 13:05:22 +00:00
->action(function (Response $response, Document $user, Database $dbForProject, Event $queueForEvents) {
2020-11-20 12:35:16 +00:00
2024-03-01 16:22:51 +00:00
$mfaRecoveryCodes = $user->getAttribute('mfaRecoveryCodes', []);
if (!empty($mfaRecoveryCodes)) {
throw new Exception(Exception::USER_RECOVERY_CODES_ALREADY_EXISTS);
}
2024-03-01 16:22:51 +00:00
$mfaRecoveryCodes = Type::generateBackupCodes();
$user->setAttribute('mfaRecoveryCodes', $mfaRecoveryCodes);
$dbForProject->updateDocument('users', $user->getId(), $user);
2020-06-29 21:43:34 +00:00
2024-03-01 16:22:51 +00:00
$queueForEvents->setParam('userId', $user->getId());
2022-05-12 16:25:36 +00:00
2024-03-01 16:22:51 +00:00
$document = new Document([
'recoveryCodes' => $mfaRecoveryCodes
2022-05-12 16:25:36 +00:00
]);
2020-06-29 21:43:34 +00:00
2024-03-01 16:22:51 +00:00
$response->dynamic($document, Response::MODEL_MFA_RECOVERY_CODES);
});
2020-01-11 13:58:02 +00:00
2024-03-03 18:11:55 +00:00
App::patch('/v1/account/mfa/recovery-codes')
->desc('Update MFA recovery codes (regenerate)')
2024-03-03 14:18:09 +00:00
->groups(['api', 'account', 'mfaProtected'])
2024-03-02 13:05:22 +00:00
->label('event', 'users.[userId].update.mfa')
->label('scope', 'account')
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
->label('audits.userId', '{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'mfa',
2025-01-17 04:31:39 +00:00
name: 'updateMfaRecoveryCodes',
description: '/docs/references/account/update-mfa-recovery-codes.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_MFA_RECOVERY_CODES,
)
],
contentType: ContentType::JSON
))
2024-03-02 13:05:22 +00:00
->inject('dbForProject')
->inject('response')
->inject('user')
->inject('queueForEvents')
2024-03-03 14:18:09 +00:00
->action(function (Database $dbForProject, Response $response, Document $user, Event $queueForEvents) {
2024-03-03 15:17:38 +00:00
$mfaRecoveryCodes = $user->getAttribute('mfaRecoveryCodes', []);
if (empty($mfaRecoveryCodes)) {
throw new Exception(Exception::USER_RECOVERY_CODES_NOT_FOUND);
}
2024-03-02 13:05:22 +00:00
$mfaRecoveryCodes = Type::generateBackupCodes();
$user->setAttribute('mfaRecoveryCodes', $mfaRecoveryCodes);
$dbForProject->updateDocument('users', $user->getId(), $user);
2024-03-02 13:05:22 +00:00
$queueForEvents->setParam('userId', $user->getId());
$document = new Document([
2024-03-04 08:50:50 +00:00
'recoveryCodes' => $mfaRecoveryCodes
2020-06-29 21:43:34 +00:00
]);
2021-08-05 05:06:38 +00:00
2024-03-02 13:05:22 +00:00
$response->dynamic($document, Response::MODEL_MFA_RECOVERY_CODES);
});
2020-01-11 13:58:02 +00:00
2024-03-02 13:05:22 +00:00
App::get('/v1/account/mfa/recovery-codes')
->desc('List MFA recovery codes')
2024-03-03 14:18:09 +00:00
->groups(['api', 'account', 'mfaProtected'])
2024-03-02 13:05:22 +00:00
->label('scope', 'account')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'mfa',
2025-01-17 04:31:39 +00:00
name: 'getMfaRecoveryCodes',
description: '/docs/references/account/get-mfa-recovery-codes.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_MFA_RECOVERY_CODES,
)
],
contentType: ContentType::JSON
))
2024-03-02 13:05:22 +00:00
->inject('response')
->inject('user')
2024-03-03 14:18:09 +00:00
->action(function (Response $response, Document $user) {
2020-01-05 23:07:41 +00:00
2024-03-02 13:05:22 +00:00
$mfaRecoveryCodes = $user->getAttribute('mfaRecoveryCodes', []);
2020-06-29 21:43:34 +00:00
2024-03-02 13:05:22 +00:00
if (empty($mfaRecoveryCodes)) {
throw new Exception(Exception::USER_RECOVERY_CODES_NOT_FOUND);
}
2020-06-29 21:43:34 +00:00
2024-03-02 13:05:22 +00:00
$document = new Document([
'recoveryCodes' => $mfaRecoveryCodes
]);
2023-08-25 15:13:25 +00:00
2024-03-02 13:05:22 +00:00
$response->dynamic($document, Response::MODEL_MFA_RECOVERY_CODES);
});
2023-05-29 13:58:45 +00:00
2024-03-01 16:22:51 +00:00
App::delete('/v1/account/mfa/authenticators/:type')
->desc('Delete authenticator')
->groups(['api', 'account', 'mfaProtected'])
2024-01-10 16:22:32 +00:00
->label('event', 'users.[userId].delete.mfa')
2024-02-20 11:45:11 +00:00
->label('scope', 'account')
2024-01-10 16:22:32 +00:00
->label('audits.event', 'user.update')
->label('audits.resource', 'user/{response.$id}')
->label('audits.userId', '{response.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'mfa',
2025-01-17 04:31:39 +00:00
name: 'deleteMfaAuthenticator',
description: '/docs/references/account/delete-mfa-authenticator.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_NOCONTENT,
model: Response::MODEL_NONE,
)
],
contentType: ContentType::NONE
))
2024-03-01 02:07:58 +00:00
->param('type', null, new WhiteList([Type::TOTP]), 'Type of authenticator.')
2024-01-10 16:22:32 +00:00
->inject('response')
->inject('user')
->inject('dbForProject')
->inject('queueForEvents')
->action(function (string $type, Response $response, Document $user, Database $dbForProject, Event $queueForEvents) {
2024-03-01 12:36:38 +00:00
$authenticator = (match ($type) {
2024-03-01 02:07:58 +00:00
Type::TOTP => TOTP::getAuthenticatorFromUser($user),
2024-02-29 20:59:49 +00:00
default => null
2024-03-01 12:36:38 +00:00
});
2023-08-29 09:40:30 +00:00
2024-03-01 12:36:38 +00:00
if (!$authenticator) {
2024-03-01 17:04:09 +00:00
throw new Exception(Exception::USER_AUTHENTICATOR_NOT_FOUND);
2024-03-01 12:36:38 +00:00
}
2023-05-29 13:58:45 +00:00
2024-02-29 20:59:49 +00:00
$dbForProject->deleteDocument('authenticators', $authenticator->getId());
$dbForProject->purgeCachedDocument('users', $user->getId());
2020-11-18 19:38:31 +00:00
2024-01-10 16:22:32 +00:00
$queueForEvents->setParam('userId', $user->getId());
2020-11-18 19:38:31 +00:00
2024-01-10 16:22:32 +00:00
$response->noContent();
2020-12-26 14:31:53 +00:00
});
2020-01-05 23:07:41 +00:00
2023-06-22 13:35:49 +00:00
App::post('/v1/account/mfa/challenge')
->desc('Create MFA challenge')
2023-06-22 13:35:49 +00:00
->groups(['api', 'account', 'mfa'])
2024-02-20 11:45:11 +00:00
->label('scope', 'account')
2023-06-22 13:35:49 +00:00
->label('event', 'users.[userId].challenges.[challengeId].create')
->label('audits.event', 'challenge.create')
2022-08-11 13:19:05 +00:00
->label('audits.resource', 'user/{response.userId}')
2022-08-12 11:01:12 +00:00
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'mfa',
2025-01-17 04:31:39 +00:00
name: 'createMfaChallenge',
description: '/docs/references/account/create-mfa-challenge.md',
auth: [],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_MFA_CHALLENGE,
)
],
contentType: ContentType::JSON,
))
2020-01-05 23:07:41 +00:00
->label('abuse-limit', 10)
->label('abuse-key', 'url:{url},userId:{userId}')
2024-03-01 16:22:51 +00:00
->param('factor', '', new WhiteList([Type::EMAIL, Type::PHONE, Type::TOTP, Type::RECOVERY_CODE]), 'Factor used for verification. Must be one of following: `' . Type::EMAIL . '`, `' . Type::PHONE . '`, `' . Type::TOTP . '`, `' . Type::RECOVERY_CODE . '`.')
2020-12-26 14:31:53 +00:00
->inject('response')
->inject('dbForProject')
2023-06-22 13:35:49 +00:00
->inject('user')
2024-02-22 12:03:56 +00:00
->inject('locale')
2023-07-19 21:34:27 +00:00
->inject('project')
2024-02-22 12:03:56 +00:00
->inject('request')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
2024-01-11 19:24:37 +00:00
->inject('queueForMessaging')
->inject('queueForMails')
->inject('timelimit')
2025-01-30 04:53:53 +00:00
->inject('queueForStatsUsage')
->inject('plan')
2025-01-30 04:53:53 +00:00
->action(function (string $factor, Response $response, Database $dbForProject, Document $user, Locale $locale, Document $project, Request $request, Event $queueForEvents, Messaging $queueForMessaging, Mail $queueForMails, callable $timelimit, StatsUsage $queueForStatsUsage, array $plan) {
2020-01-05 23:07:41 +00:00
$expire = DateTime::formatTz(DateTime::addSeconds(new \DateTime(), Auth::TOKEN_EXPIRATION_CONFIRM));
2024-01-30 15:09:58 +00:00
$code = Auth::codeGenerator();
2023-06-22 13:35:49 +00:00
$challenge = new Document([
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
2024-02-29 20:59:49 +00:00
'type' => $factor,
2023-06-22 13:35:49 +00:00
'token' => Auth::tokenGenerator(),
2024-01-30 15:09:58 +00:00
'code' => $code,
2023-06-22 13:35:49 +00:00
'expire' => $expire,
'$permissions' => [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
],
]);
2020-01-05 23:07:41 +00:00
2024-01-30 15:09:58 +00:00
$challenge = $dbForProject->createDocument('challenges', $challenge);
2020-01-05 23:07:41 +00:00
2024-02-15 11:26:34 +00:00
switch ($factor) {
2024-03-01 02:07:58 +00:00
case Type::PHONE:
2024-04-01 11:02:47 +00:00
if (empty(System::getEnv('_APP_SMS_PROVIDER'))) {
2023-06-22 13:35:49 +00:00
throw new Exception(Exception::GENERAL_PHONE_DISABLED, 'Phone provider not configured');
}
if (empty($user->getAttribute('phone'))) {
throw new Exception(Exception::USER_PHONE_NOT_FOUND);
}
if (!$user->getAttribute('phoneVerification')) {
throw new Exception(Exception::USER_PHONE_NOT_VERIFIED);
}
2020-01-05 23:07:41 +00:00
2024-02-22 12:47:01 +00:00
$message = Template::fromFile(__DIR__ . '/../../config/locale/templates/sms-base.tpl');
2020-01-05 23:07:41 +00:00
$customTemplate = $project->getAttribute('templates', [])['sms.mfaChallenge-' . $locale->default] ?? [];
2024-02-22 12:47:01 +00:00
if (!empty($customTemplate)) {
$message = $customTemplate['message'] ?? $message;
}
2020-01-05 23:07:41 +00:00
2024-02-22 12:47:01 +00:00
$messageContent = Template::fromString($locale->getText("sms.verification.body"));
$messageContent
->setParam('{{project}}', $project->getAttribute('name'))
->setParam('{{secret}}', $code);
$messageContent = \strip_tags($messageContent->render());
$message = $message->setParam('{{token}}', $messageContent);
$message = $message->render();
$phone = $user->getAttribute('phone');
2024-01-30 15:09:58 +00:00
$queueForMessaging
2024-02-20 12:06:35 +00:00
->setType(MESSAGE_SEND_TYPE_INTERNAL)
2024-01-30 15:09:58 +00:00
->setMessage(new Document([
'$id' => $challenge->getId(),
'data' => [
'content' => $code,
],
]))
->setRecipients([$phone])
2024-02-22 12:47:01 +00:00
->setProviderType(MESSAGE_TYPE_SMS);
if (isset($plan['authPhone'])) {
$timelimit = $timelimit('organization:{organizationId}', $plan['authPhone'], 30 * 24 * 60 * 60); // 30 days
$timelimit
2025-01-08 11:44:07 +00:00
->setParam('{organizationId}', $project->getAttribute('teamId'));
$abuse = new Abuse($timelimit);
if ($abuse->check() && System::getEnv('_APP_OPTIONS_ABUSE', 'enabled') === 'enabled') {
$helper = PhoneNumberUtil::getInstance();
$countryCode = $helper->parse($phone)->getCountryCode();
if (!empty($countryCode)) {
2025-01-30 04:53:53 +00:00
$queueForStatsUsage
->addMetric(str_replace('{countryCode}', $countryCode, METRIC_AUTH_METHOD_PHONE_COUNTRY_CODE), 1);
}
}
2025-01-30 04:53:53 +00:00
$queueForStatsUsage
->addMetric(METRIC_AUTH_METHOD_PHONE, 1)
->setProject($project)
->trigger();
}
2023-06-22 13:35:49 +00:00
break;
2024-03-01 02:07:58 +00:00
case Type::EMAIL:
2024-04-01 11:02:47 +00:00
if (empty(System::getEnv('_APP_SMTP_HOST'))) {
2023-06-22 13:35:49 +00:00
throw new Exception(Exception::GENERAL_SMTP_DISABLED, 'SMTP disabled');
}
if (empty($user->getAttribute('email'))) {
throw new Exception(Exception::USER_EMAIL_NOT_FOUND);
}
if (!$user->getAttribute('emailVerification')) {
throw new Exception(Exception::USER_EMAIL_NOT_VERIFIED);
}
2023-07-19 21:34:27 +00:00
2024-02-22 12:03:56 +00:00
$subject = $locale->getText("emails.mfaChallenge.subject");
2025-07-23 16:34:25 +00:00
$preview = $locale->getText("emails.mfaChallenge.preview");
2024-02-22 12:03:56 +00:00
$customTemplate = $project->getAttribute('templates', [])['email.mfaChallenge-' . $locale->default] ?? [];
2023-07-19 21:34:27 +00:00
2024-02-22 12:03:56 +00:00
$detector = new Detector($request->getUserAgent('UNKNOWN'));
$agentOs = $detector->getOS();
$agentClient = $detector->getClient();
$agentDevice = $detector->getDevice();
2023-07-19 21:34:27 +00:00
2024-02-22 12:03:56 +00:00
$message = Template::fromFile(__DIR__ . '/../../config/locale/templates/email-mfa-challenge.tpl');
$message
->setParam('{{hello}}', $locale->getText("emails.mfaChallenge.hello"))
->setParam('{{description}}', $locale->getText("emails.mfaChallenge.description"))
->setParam('{{clientInfo}}', $locale->getText("emails.mfaChallenge.clientInfo"))
->setParam('{{thanks}}', $locale->getText("emails.mfaChallenge.thanks"))
->setParam('{{signature}}', $locale->getText("emails.mfaChallenge.signature"));
2024-02-22 12:03:56 +00:00
$body = $message->render();
2020-01-05 23:07:41 +00:00
2024-02-22 12:03:56 +00:00
$smtp = $project->getAttribute('smtp', []);
$smtpEnabled = $smtp['enabled'] ?? false;
2024-04-01 11:02:47 +00:00
$senderEmail = System::getEnv('_APP_SYSTEM_EMAIL_ADDRESS', APP_EMAIL_TEAM);
$senderName = System::getEnv('_APP_SYSTEM_EMAIL_NAME', APP_NAME . ' Server');
2024-02-22 12:03:56 +00:00
$replyTo = "";
2022-04-27 11:06:53 +00:00
2024-02-22 12:03:56 +00:00
if ($smtpEnabled) {
if (!empty($smtp['senderEmail'])) {
$senderEmail = $smtp['senderEmail'];
}
if (!empty($smtp['senderName'])) {
$senderName = $smtp['senderName'];
}
if (!empty($smtp['replyTo'])) {
$replyTo = $smtp['replyTo'];
}
$queueForMails
->setSmtpHost($smtp['host'] ?? '')
->setSmtpPort($smtp['port'] ?? '')
->setSmtpUsername($smtp['username'] ?? '')
->setSmtpPassword($smtp['password'] ?? '')
->setSmtpSecure($smtp['secure'] ?? '');
if (!empty($customTemplate)) {
if (!empty($customTemplate['senderEmail'])) {
$senderEmail = $customTemplate['senderEmail'];
}
if (!empty($customTemplate['senderName'])) {
$senderName = $customTemplate['senderName'];
}
if (!empty($customTemplate['replyTo'])) {
$replyTo = $customTemplate['replyTo'];
}
$body = $customTemplate['message'] ?? '';
$subject = $customTemplate['subject'] ?? $subject;
}
$queueForMails
->setSmtpReplyTo($replyTo)
->setSmtpSenderEmail($senderEmail)
->setSmtpSenderName($senderName);
}
$emailVariables = [
'direction' => $locale->getText('settings.direction'),
// {{user}}, {{project}} and {{otp}} are required in the templates
2024-02-22 12:03:56 +00:00
'user' => $user->getAttribute('name'),
'project' => $project->getAttribute('name'),
'otp' => $code,
'agentDevice' => $agentDevice['deviceBrand'] ?? $agentDevice['deviceBrand'] ?? 'UNKNOWN',
'agentClient' => $agentClient['clientName'] ?? 'UNKNOWN',
'agentOs' => $agentOs['osName'] ?? 'UNKNOWN'
];
2024-01-30 15:09:58 +00:00
$queueForMails
2024-02-22 12:03:56 +00:00
->setSubject($subject)
2025-07-23 16:34:25 +00:00
->setPreview($preview)
2024-02-22 12:03:56 +00:00
->setBody($body)
->setVariables($emailVariables)
2023-06-22 13:35:49 +00:00
->setRecipient($user->getAttribute('email'))
->trigger();
break;
}
2021-05-06 22:31:05 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents
2023-06-22 13:35:49 +00:00
->setParam('userId', $user->getId())
->setParam('challengeId', $challenge->getId());
2020-01-05 23:07:41 +00:00
2023-06-22 13:35:49 +00:00
$response->dynamic($challenge, Response::MODEL_MFA_CHALLENGE);
2020-12-26 14:31:53 +00:00
});
2020-01-12 00:20:35 +00:00
2023-06-22 13:35:49 +00:00
App::put('/v1/account/mfa/challenge')
->desc('Update MFA challenge (confirmation)')
2023-06-22 13:35:49 +00:00
->groups(['api', 'account', 'mfa'])
2020-01-12 00:20:35 +00:00
->label('scope', 'account')
2024-03-01 12:36:38 +00:00
->label('event', 'users.[userId].sessions.[sessionId].create')
2023-06-22 13:35:49 +00:00
->label('audits.event', 'challenges.update')
2022-08-11 13:19:05 +00:00
->label('audits.resource', 'user/{response.userId}')
2023-06-22 13:35:49 +00:00
->label('audits.userId', '{response.userId}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'mfa',
2025-01-17 04:31:39 +00:00
name: 'updateMfaChallenge',
description: '/docs/references/account/update-mfa-challenge.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_SESSION,
)
],
contentType: ContentType::JSON
))
2020-01-12 00:20:35 +00:00
->label('abuse-limit', 10)
->label('abuse-key', 'url:{url},challengeId:{param-challengeId}')
2024-02-15 11:26:34 +00:00
->param('challengeId', '', new Text(256), 'ID of the challenge.')
2023-06-22 13:35:49 +00:00
->param('otp', '', new Text(256), 'Valid verification token.')
2020-12-26 14:31:53 +00:00
->inject('project')
2023-06-22 13:35:49 +00:00
->inject('response')
2020-12-26 14:31:53 +00:00
->inject('user')
->inject('session')
->inject('dbForProject')
2022-12-20 16:11:30 +00:00
->inject('queueForEvents')
->action(function (string $challengeId, string $otp, Document $project, Response $response, Document $user, Document $session, Database $dbForProject, Event $queueForEvents) {
2020-11-20 12:35:16 +00:00
2023-06-22 13:35:49 +00:00
$challenge = $dbForProject->getDocument('challenges', $challengeId);
2024-02-02 12:42:15 +00:00
if ($challenge->isEmpty()) {
2023-06-22 13:35:49 +00:00
throw new Exception(Exception::USER_INVALID_TOKEN);
2023-09-22 17:23:41 +00:00
}
2024-02-29 20:59:49 +00:00
$type = $challenge->getAttribute('type');
2024-03-01 16:22:51 +00:00
$recoveryCodeChallenge = function (Document $challenge, Document $user, string $otp) use ($dbForProject) {
if (
$challenge->isSet('type') &&
$challenge->getAttribute('type') === \strtolower(Type::RECOVERY_CODE)
2024-03-01 16:22:51 +00:00
) {
$mfaRecoveryCodes = $user->getAttribute('mfaRecoveryCodes', []);
if (in_array($otp, $mfaRecoveryCodes)) {
$mfaRecoveryCodes = array_diff($mfaRecoveryCodes, [$otp]);
2024-04-10 14:01:25 +00:00
$mfaRecoveryCodes = array_values($mfaRecoveryCodes);
2024-03-01 16:22:51 +00:00
$user->setAttribute('mfaRecoveryCodes', $mfaRecoveryCodes);
$dbForProject->updateDocument('users', $user->getId(), $user);
return true;
}
2021-08-05 05:06:38 +00:00
2024-03-01 16:22:51 +00:00
return false;
}
2021-08-05 05:06:38 +00:00
2024-03-01 16:22:51 +00:00
return false;
2023-06-22 13:35:49 +00:00
};
2020-01-12 00:20:35 +00:00
$success = (match ($type) {
2024-03-01 02:07:58 +00:00
Type::TOTP => Challenge\TOTP::challenge($challenge, $user, $otp),
Type::PHONE => Challenge\Phone::challenge($challenge, $user, $otp),
Type::EMAIL => Challenge\Email::challenge($challenge, $user, $otp),
\strtolower(Type::RECOVERY_CODE) => $recoveryCodeChallenge($challenge, $user, $otp),
2023-06-22 13:35:49 +00:00
default => false
});
2020-01-12 00:20:35 +00:00
2024-03-01 12:36:38 +00:00
if (!$success) {
throw new Exception(Exception::USER_INVALID_TOKEN);
}
2023-06-22 13:35:49 +00:00
$dbForProject->deleteDocument('challenges', $challengeId);
2024-02-02 12:42:15 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2020-06-29 21:43:34 +00:00
$factors = $session->getAttribute('factors', []);
$factors[] = $type;
$factors = \array_values(\array_unique($factors));
2023-08-25 15:13:25 +00:00
$session
->setAttribute('factors', $factors)
2024-03-02 13:05:22 +00:00
->setAttribute('mfaUpdatedAt', DateTime::now());
2023-08-29 09:40:30 +00:00
$dbForProject->updateDocument('sessions', $session->getId(), $session);
2024-02-24 13:21:33 +00:00
$queueForEvents
2024-03-01 12:36:38 +00:00
->setParam('userId', $user->getId())
->setParam('sessionId', $session->getId());
2023-12-07 09:05:37 +00:00
$response->dynamic($session, Response::MODEL_SESSION);
2023-06-22 13:35:49 +00:00
});
App::post('/v1/account/targets/push')
2024-02-26 02:25:45 +00:00
->desc('Create push target')
->groups(['api', 'account'])
->label('scope', 'targets.write')
->label('audits.event', 'target.create')
->label('audits.resource', 'target/response.$id')
->label('event', 'users.[userId].targets.[targetId].create')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'pushTargets',
2025-01-17 04:31:39 +00:00
name: 'createPushTarget',
description: '/docs/references/account/create-push-target.md',
2025-01-17 04:31:39 +00:00
auth: [AuthType::SESSION],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_CREATED,
model: Response::MODEL_TARGET,
)
],
contentType: ContentType::JSON
))
->param('targetId', '', new CustomId(), 'Target ID. Choose a custom ID or generate a random ID with `ID.unique()`. Valid chars are a-z, A-Z, 0-9, period, hyphen, and underscore. Can\'t start with a special char. Max length is 36 chars.')
->param('identifier', '', new Text(Database::LENGTH_KEY), 'The target identifier (token, email, phone etc.)')
->param('providerId', '', new UID(), 'Provider ID. Message will be sent to this target from the specified provider ID. If no provider ID is set the first setup provider will be used.', true)
->inject('queueForEvents')
->inject('user')
->inject('request')
->inject('response')
->inject('dbForProject')
->action(function (string $targetId, string $identifier, string $providerId, Event $queueForEvents, Document $user, Request $request, Response $response, Database $dbForProject) {
$targetId = $targetId == 'unique()' ? ID::unique() : $targetId;
$provider = Authorization::skip(fn () => $dbForProject->getDocument('providers', $providerId));
2023-08-30 04:30:44 +00:00
$target = Authorization::skip(fn () => $dbForProject->getDocument('targets', $targetId));
2023-08-29 09:40:30 +00:00
if (!$target->isEmpty()) {
throw new Exception(Exception::USER_TARGET_ALREADY_EXISTS);
}
$detector = new Detector($request->getUserAgent());
$detector->skipBotDetection(); // OPTIONAL: If called, bot detection will completely be skipped (bots will be detected as regular devices then)
2023-05-29 13:58:45 +00:00
$device = $detector->getDevice();
2020-06-29 21:43:34 +00:00
2024-10-22 01:54:34 +00:00
$sessionId = Auth::sessionVerify($user->getAttribute('sessions', []), Auth::$secret);
$session = $dbForProject->getDocument('sessions', $sessionId);
try {
$target = $dbForProject->createDocument('targets', new Document([
'$id' => $targetId,
'$permissions' => [
Permission::read(Role::user($user->getId())),
Permission::update(Role::user($user->getId())),
Permission::delete(Role::user($user->getId())),
],
'providerId' => !empty($providerId) ? $providerId : null,
2025-05-26 05:42:11 +00:00
'providerInternalId' => !empty($providerId) ? $provider->getSequence() : null,
'providerType' => MESSAGE_TYPE_PUSH,
'userId' => $user->getId(),
2025-05-26 05:42:11 +00:00
'userInternalId' => $user->getSequence(),
'sessionId' => $session->getId(),
2025-05-26 05:42:11 +00:00
'sessionInternalId' => $session->getSequence(),
'identifier' => $identifier,
'name' => "{$device['deviceBrand']} {$device['deviceModel']}"
]));
} catch (Duplicate) {
throw new Exception(Exception::USER_TARGET_ALREADY_EXISTS);
}
$dbForProject->purgeCachedDocument('users', $user->getId());
2020-11-18 19:38:31 +00:00
$queueForEvents
->setParam('userId', $user->getId())
->setParam('targetId', $target->getId());
2020-11-18 19:38:31 +00:00
2022-09-07 11:11:10 +00:00
$response
->setStatusCode(Response::STATUS_CODE_CREATED)
->dynamic($target, Response::MODEL_TARGET);
2020-12-26 14:31:53 +00:00
});
2020-01-12 00:20:35 +00:00
2023-11-16 10:56:36 +00:00
App::put('/v1/account/targets/:targetId/push')
2024-02-26 02:25:45 +00:00
->desc('Update push target')
2020-06-25 18:32:12 +00:00
->groups(['api', 'account'])
->label('scope', 'targets.write')
->label('audits.event', 'target.update')
->label('audits.resource', 'target/response.$id')
2023-11-16 11:17:36 +00:00
->label('event', 'users.[userId].targets.[targetId].update')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'pushTargets',
2025-01-17 04:31:39 +00:00
name: 'updatePushTarget',
description: '/docs/references/account/update-push-target.md',
2025-01-17 04:31:39 +00:00
auth: [AuthType::SESSION],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_TARGET,
)
],
contentType: ContentType::JSON
))
->param('targetId', '', new UID(), 'Target ID.')
2023-11-16 11:39:08 +00:00
->param('identifier', '', new Text(Database::LENGTH_KEY), 'The target identifier (token, email, phone etc.)')
->inject('queueForEvents')
2020-12-26 14:31:53 +00:00
->inject('user')
->inject('request')
->inject('response')
->inject('dbForProject')
2023-11-16 11:17:36 +00:00
->action(function (string $targetId, string $identifier, Event $queueForEvents, Document $user, Request $request, Response $response, Database $dbForProject) {
2020-06-29 21:43:34 +00:00
$target = Authorization::skip(fn () => $dbForProject->getDocument('targets', $targetId));
2020-06-29 21:43:34 +00:00
if ($target->isEmpty()) {
throw new Exception(Exception::USER_TARGET_NOT_FOUND);
2020-06-29 21:43:34 +00:00
}
2020-01-12 00:20:35 +00:00
if ($user->getId() !== $target->getAttribute('userId')) {
throw new Exception(Exception::USER_TARGET_NOT_FOUND);
}
2020-01-12 00:20:35 +00:00
if ($identifier) {
$target
->setAttribute('identifier', $identifier)
2024-10-22 01:54:34 +00:00
->setAttribute('expired', false);
2020-06-29 21:43:34 +00:00
}
2020-01-12 00:20:35 +00:00
2023-11-16 10:56:36 +00:00
$detector = new Detector($request->getUserAgent());
$detector->skipBotDetection(); // OPTIONAL: If called, bot detection will completely be skipped (bots will be detected as regular devices then)
2020-01-12 00:20:35 +00:00
2023-11-16 10:56:36 +00:00
$device = $detector->getDevice();
2020-01-12 00:20:35 +00:00
2023-11-16 11:17:36 +00:00
$target->setAttribute('name', "{$device['deviceBrand']} {$device['deviceModel']}");
$target = $dbForProject->updateDocument('targets', $target->getId(), $target);
2020-01-12 00:20:35 +00:00
2023-12-14 13:32:06 +00:00
$dbForProject->purgeCachedDocument('users', $user->getId());
2021-05-06 22:31:05 +00:00
2022-12-20 16:11:30 +00:00
$queueForEvents
->setParam('userId', $user->getId())
->setParam('targetId', $target->getId());
2022-04-04 06:30:07 +00:00
$response
->dynamic($target, Response::MODEL_TARGET);
});
App::delete('/v1/account/targets/:targetId/push')
2024-02-26 02:25:45 +00:00
->desc('Delete push target')
->groups(['api', 'account'])
->label('scope', 'targets.write')
->label('audits.event', 'target.delete')
->label('audits.resource', 'target/response.$id')
->label('event', 'users.[userId].targets.[targetId].delete')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'pushTargets',
2025-01-17 04:31:39 +00:00
name: 'deletePushTarget',
description: '/docs/references/account/delete-push-target.md',
2025-01-17 04:31:39 +00:00
auth: [AuthType::SESSION],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_NOCONTENT,
model: Response::MODEL_NONE,
)
],
contentType: ContentType::NONE
))
->param('targetId', '', new UID(), 'Target ID.')
->inject('queueForEvents')
->inject('queueForDeletes')
->inject('user')
->inject('request')
->inject('response')
->inject('dbForProject')
->action(function (string $targetId, Event $queueForEvents, Delete $queueForDeletes, Document $user, Request $request, Response $response, Database $dbForProject) {
2024-03-06 17:34:21 +00:00
$target = Authorization::skip(fn () => $dbForProject->getDocument('targets', $targetId));
if ($target->isEmpty()) {
throw new Exception(Exception::USER_TARGET_NOT_FOUND);
2023-09-22 17:23:41 +00:00
}
2025-05-26 05:42:11 +00:00
if ($user->getSequence() !== $target->getAttribute('userInternalId')) {
throw new Exception(Exception::USER_TARGET_NOT_FOUND);
2024-02-11 14:51:19 +00:00
}
2024-02-11 14:58:05 +00:00
$dbForProject->deleteDocument('targets', $target->getId());
$dbForProject->purgeCachedDocument('users', $user->getId());
$queueForDeletes
->setType(DELETE_TYPE_TARGET)
->setDocument($target);
2022-12-20 16:11:30 +00:00
$queueForEvents
->setParam('userId', $user->getId())
->setParam('targetId', $target->getId())
->setPayload($response->output($target, Response::MODEL_TARGET));
$response->noContent();
});
2024-03-06 18:07:58 +00:00
App::get('/v1/account/identities')
->desc('List identities')
->groups(['api', 'account'])
2024-03-06 18:07:58 +00:00
->label('scope', 'account')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'identities',
2025-01-17 04:31:39 +00:00
name: 'listIdentities',
description: '/docs/references/account/list-identities.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_OK,
model: Response::MODEL_IDENTITY_LIST,
)
],
contentType: ContentType::JSON
))
2024-03-06 18:07:58 +00:00
->param('queries', [], new Identities(), 'Array of query strings generated using the Query class provided by the SDK. [Learn more about queries](https://appwrite.io/docs/queries). Maximum of ' . APP_LIMIT_ARRAY_PARAMS_SIZE . ' queries are allowed, each ' . APP_LIMIT_ARRAY_ELEMENT_SIZE . ' characters long. You may filter on the following attributes: ' . implode(', ', Identities::ALLOWED_ATTRIBUTES), true)
->inject('response')
->inject('user')
->inject('dbForProject')
2024-03-06 18:07:58 +00:00
->action(function (array $queries, Response $response, Document $user, Database $dbForProject) {
2024-03-06 18:07:58 +00:00
try {
$queries = Query::parseQueries($queries);
} catch (QueryException $e) {
throw new Exception(Exception::GENERAL_QUERY_INVALID, $e->getMessage());
}
2025-05-26 05:42:11 +00:00
$queries[] = Query::equal('userInternalId', [$user->getSequence()]);
2024-03-06 18:07:58 +00:00
/**
* Get cursor document if there was a cursor query, we use array_filter and reset for reference $cursor to $queries
*/
$cursor = \array_filter($queries, function ($query) {
return \in_array($query->getMethod(), [Query::TYPE_CURSOR_AFTER, Query::TYPE_CURSOR_BEFORE]);
});
$cursor = reset($cursor);
if ($cursor) {
/** @var Query $cursor */
$validator = new Cursor();
if (!$validator->isValid($cursor)) {
throw new Exception(Exception::GENERAL_QUERY_INVALID, $validator->getDescription());
}
2024-03-06 18:07:58 +00:00
$identityId = $cursor->getValue();
$cursorDocument = $dbForProject->getDocument('identities', $identityId);
2024-03-06 18:07:58 +00:00
if ($cursorDocument->isEmpty()) {
throw new Exception(Exception::GENERAL_CURSOR_NOT_FOUND, "Identity '{$identityId}' for the 'cursor' value not found.");
}
2024-03-06 18:07:58 +00:00
$cursor->setValue($cursorDocument);
}
2024-03-06 18:07:58 +00:00
$filterQueries = Query::groupByType($queries)['filters'];
try {
$results = $dbForProject->find('identities', $queries);
} catch (OrderException $e) {
throw new Exception(Exception::DATABASE_QUERY_ORDER_NULL, "The order attribute '{$e->getAttribute()}' had a null value. Cursor pagination requires all documents order attribute values are non-null.");
}
2024-03-06 18:07:58 +00:00
$total = $dbForProject->count('identities', $filterQueries, APP_LIMIT_COUNT);
2024-03-06 18:07:58 +00:00
$response->dynamic(new Document([
'identities' => $results,
'total' => $total,
]), Response::MODEL_IDENTITY_LIST);
});
2024-03-06 18:07:58 +00:00
App::delete('/v1/account/identities/:identityId')
->desc('Delete identity')
->groups(['api', 'account'])
->label('scope', 'account')
2024-03-06 18:07:58 +00:00
->label('event', 'users.[userId].identities.[identityId].delete')
->label('audits.event', 'identity.delete')
->label('audits.resource', 'identity/{request.$identityId}')
->label('audits.userId', '{user.$id}')
2025-01-17 04:31:39 +00:00
->label('sdk', new Method(
namespace: 'account',
2025-03-31 05:48:17 +00:00
group: 'identities',
2025-01-17 04:31:39 +00:00
name: 'deleteIdentity',
description: '/docs/references/account/delete-identity.md',
auth: [AuthType::SESSION, AuthType::JWT],
responses: [
new SDKResponse(
code: Response::STATUS_CODE_NOCONTENT,
model: Response::MODEL_NONE,
)
],
contentType: ContentType::NONE
))
2024-03-06 18:07:58 +00:00
->param('identityId', '', new UID(), 'Identity ID.')
->inject('response')
->inject('dbForProject')
->inject('queueForEvents')
2024-03-06 18:07:58 +00:00
->action(function (string $identityId, Response $response, Database $dbForProject, Event $queueForEvents) {
2024-03-06 18:07:58 +00:00
$identity = $dbForProject->getDocument('identities', $identityId);
2024-03-06 18:07:58 +00:00
if ($identity->isEmpty()) {
throw new Exception(Exception::USER_IDENTITY_NOT_FOUND);
}
2024-03-06 18:07:58 +00:00
$dbForProject->deleteDocument('identities', $identityId);
$queueForEvents
2024-03-06 18:07:58 +00:00
->setParam('userId', $identity->getAttribute('userId'))
->setParam('identityId', $identity->getId())
->setPayload($response->output($identity, Response::MODEL_IDENTITY));
2024-03-06 18:07:58 +00:00
return $response->noContent();
2025-01-17 04:39:16 +00:00
});