4 * @file src/Model/User.php
5 * This file includes the User class with user related database functions
8 namespace Friendica\Model;
10 use DivineOmega\PasswordExposed;
12 use Friendica\Core\Hook;
13 use Friendica\Core\Logger;
14 use Friendica\Core\Protocol;
15 use Friendica\Core\System;
16 use Friendica\Core\Worker;
17 use Friendica\Database\DBA;
19 use Friendica\Model\TwoFactor\AppSpecificPassword;
20 use Friendica\Object\Image;
21 use Friendica\Util\Crypto;
22 use Friendica\Util\DateTimeFormat;
23 use Friendica\Util\Images;
24 use Friendica\Util\Network;
25 use Friendica\Util\Strings;
26 use Friendica\Worker\Delivery;
30 * This class handles User related functions
37 * PAGE_FLAGS_NORMAL is a typical personal profile account
38 * PAGE_FLAGS_SOAPBOX automatically approves all friend requests as Contact::SHARING, (readonly)
39 * PAGE_FLAGS_COMMUNITY automatically approves all friend requests as Contact::SHARING, but with
40 * write access to wall and comments (no email and not included in page owner's ACL lists)
41 * PAGE_FLAGS_FREELOVE automatically approves all friend requests as full friends (Contact::FRIEND).
45 const PAGE_FLAGS_NORMAL = 0;
46 const PAGE_FLAGS_SOAPBOX = 1;
47 const PAGE_FLAGS_COMMUNITY = 2;
48 const PAGE_FLAGS_FREELOVE = 3;
49 const PAGE_FLAGS_BLOG = 4;
50 const PAGE_FLAGS_PRVGROUP = 5;
58 * ACCOUNT_TYPE_PERSON - the account belongs to a person
59 * Associated page types: PAGE_FLAGS_NORMAL, PAGE_FLAGS_SOAPBOX, PAGE_FLAGS_FREELOVE
61 * ACCOUNT_TYPE_ORGANISATION - the account belongs to an organisation
62 * Associated page type: PAGE_FLAGS_SOAPBOX
64 * ACCOUNT_TYPE_NEWS - the account is a news reflector
65 * Associated page type: PAGE_FLAGS_SOAPBOX
67 * ACCOUNT_TYPE_COMMUNITY - the account is community forum
68 * Associated page types: PAGE_COMMUNITY, PAGE_FLAGS_PRVGROUP
70 * ACCOUNT_TYPE_RELAY - the account is a relay
71 * This will only be assigned to contacts, not to user accounts
74 const ACCOUNT_TYPE_PERSON = 0;
75 const ACCOUNT_TYPE_ORGANISATION = 1;
76 const ACCOUNT_TYPE_NEWS = 2;
77 const ACCOUNT_TYPE_COMMUNITY = 3;
78 const ACCOUNT_TYPE_RELAY = 4;
84 * Returns true if a user record exists with the provided id
90 public static function exists($uid)
92 return DBA::exists('user', ['uid' => $uid]);
97 * @param array $fields
98 * @return array|boolean User record if it exists, false otherwise
101 public static function getById($uid, array $fields = [])
103 return DBA::selectFirst('user', $fields, ['uid' => $uid]);
107 * Returns a user record based on it's GUID
109 * @param string $guid The guid of the user
110 * @param array $fields The fields to retrieve
111 * @param bool $active True, if only active records are searched
113 * @return array|boolean User record if it exists, false otherwise
116 public static function getByGuid(string $guid, array $fields = [], bool $active = true)
119 $cond = ['guid' => $guid, 'account_expired' => false, 'account_removed' => false];
121 $cond = ['guid' => $guid];
124 return DBA::selectFirst('user', $fields, $cond);
128 * @param string $nickname
129 * @param array $fields
130 * @return array|boolean User record if it exists, false otherwise
133 public static function getByNickname($nickname, array $fields = [])
135 return DBA::selectFirst('user', $fields, ['nickname' => $nickname]);
139 * Returns the user id of a given profile URL
143 * @return integer user id
146 public static function getIdForURL($url)
148 $self = DBA::selectFirst('contact', ['uid'], ['nurl' => Strings::normaliseLink($url), 'self' => true]);
149 if (!DBA::isResult($self)) {
157 * Get a user based on its email
159 * @param string $email
160 * @param array $fields
162 * @return array|boolean User record if it exists, false otherwise
166 public static function getByEmail($email, array $fields = [])
168 return DBA::selectFirst('user', $fields, ['email' => $email]);
172 * Get owner data by user id
175 * @param boolean $check_valid Test if data is invalid and correct it
176 * @return boolean|array
179 public static function getOwnerDataById($uid, $check_valid = true)
181 $r = DBA::fetchFirst(
184 `user`.`prvkey` AS `uprvkey`,
190 `user`.`account-type`,
192 `user`.`account_removed`,
196 ON `user`.`uid` = `contact`.`uid`
197 WHERE `contact`.`uid` = ?
202 if (!DBA::isResult($r)) {
206 if (empty($r['nickname'])) {
214 // Check if the returned data is valid, otherwise fix it. See issue #6122
216 // Check for correct url and normalised nurl
217 $url = DI::baseUrl() . '/profile/' . $r['nickname'];
218 $repair = ($r['url'] != $url) || ($r['nurl'] != Strings::normaliseLink($r['url']));
221 // Check if "addr" is present and correct
222 $addr = $r['nickname'] . '@' . substr(DI::baseUrl(), strpos(DI::baseUrl(), '://') + 3);
223 $repair = ($addr != $r['addr']);
227 // Check if the avatar field is filled and the photo directs to the correct path
228 $avatar = Photo::selectFirst(['resource-id'], ['uid' => $uid, 'profile' => true]);
229 if (DBA::isResult($avatar)) {
230 $repair = empty($r['avatar']) || !strpos($r['photo'], $avatar['resource-id']);
235 Contact::updateSelfFromUserID($uid);
236 // Return the corrected data and avoid a loop
237 $r = self::getOwnerDataById($uid, false);
244 * Get owner data by nick name
247 * @return boolean|array
250 public static function getOwnerDataByNick($nick)
252 $user = DBA::selectFirst('user', ['uid'], ['nickname' => $nick]);
254 if (!DBA::isResult($user)) {
258 return self::getOwnerDataById($user['uid']);
262 * Returns the default group for a given user and network
264 * @param int $uid User id
265 * @param string $network network name
267 * @return int group id
268 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
270 public static function getDefaultGroup($uid, $network = '')
274 if ($network == Protocol::OSTATUS) {
275 $default_group = DI::pConfig()->get($uid, "ostatus", "default_group");
278 if ($default_group != 0) {
279 return $default_group;
282 $user = DBA::selectFirst('user', ['def_gid'], ['uid' => $uid]);
284 if (DBA::isResult($user)) {
285 $default_group = $user["def_gid"];
288 return $default_group;
293 * Authenticate a user with a clear text password
295 * @param mixed $user_info
296 * @param string $password
297 * @param bool $third_party
298 * @return int|boolean
299 * @deprecated since version 3.6
300 * @see User::getIdFromPasswordAuthentication()
302 public static function authenticate($user_info, $password, $third_party = false)
305 return self::getIdFromPasswordAuthentication($user_info, $password, $third_party);
306 } catch (Exception $ex) {
312 * Authenticate a user with a clear text password
314 * Returns the user id associated with a successful password authentication
316 * @param mixed $user_info
317 * @param string $password
318 * @param bool $third_party
319 * @return int User Id if authentication is successful
322 public static function getIdFromPasswordAuthentication($user_info, $password, $third_party = false)
324 $user = self::getAuthenticationInfo($user_info);
326 if ($third_party && DI::pConfig()->get($user['uid'], '2fa', 'verified')) {
327 // Third-party apps can't verify two-factor authentication, we use app-specific passwords instead
328 if (AppSpecificPassword::authenticateUser($user['uid'], $password)) {
331 } elseif (strpos($user['password'], '$') === false) {
332 //Legacy hash that has not been replaced by a new hash yet
333 if (self::hashPasswordLegacy($password) === $user['password']) {
334 self::updatePasswordHashed($user['uid'], self::hashPassword($password));
338 } elseif (!empty($user['legacy_password'])) {
339 //Legacy hash that has been double-hashed and not replaced by a new hash yet
340 //Warning: `legacy_password` is not necessary in sync with the content of `password`
341 if (password_verify(self::hashPasswordLegacy($password), $user['password'])) {
342 self::updatePasswordHashed($user['uid'], self::hashPassword($password));
346 } elseif (password_verify($password, $user['password'])) {
348 if (password_needs_rehash($user['password'], PASSWORD_DEFAULT)) {
349 self::updatePasswordHashed($user['uid'], self::hashPassword($password));
355 throw new Exception(DI::l10n()->t('Login failed'));
359 * Returns authentication info from various parameters types
361 * User info can be any of the following:
364 * - User email or username or nickname
365 * - User array with at least the uid and the hashed password
367 * @param mixed $user_info
371 private static function getAuthenticationInfo($user_info)
375 if (is_object($user_info) || is_array($user_info)) {
376 if (is_object($user_info)) {
377 $user = (array) $user_info;
384 || !isset($user['password'])
385 || !isset($user['legacy_password'])
387 throw new Exception(DI::l10n()->t('Not enough information to authenticate'));
389 } elseif (is_int($user_info) || is_string($user_info)) {
390 if (is_int($user_info)) {
391 $user = DBA::selectFirst(
393 ['uid', 'password', 'legacy_password'],
397 'account_expired' => 0,
398 'account_removed' => 0,
403 $fields = ['uid', 'password', 'legacy_password'];
405 "(`email` = ? OR `username` = ? OR `nickname` = ?)
406 AND NOT `blocked` AND NOT `account_expired` AND NOT `account_removed` AND `verified`",
407 $user_info, $user_info, $user_info
409 $user = DBA::selectFirst('user', $fields, $condition);
412 if (!DBA::isResult($user)) {
413 throw new Exception(DI::l10n()->t('User not found'));
421 * Generates a human-readable random password
425 public static function generateNewPassword()
427 return ucfirst(Strings::getRandomName(8)) . random_int(1000, 9999);
431 * Checks if the provided plaintext password has been exposed or not
433 * @param string $password
437 public static function isPasswordExposed($password)
439 $cache = new \DivineOmega\DOFileCachePSR6\CacheItemPool();
440 $cache->changeConfig([
441 'cacheDirectory' => get_temppath() . '/password-exposed-cache/',
445 $passwordExposedChecker = new PasswordExposed\PasswordExposedChecker(null, $cache);
447 return $passwordExposedChecker->passwordExposed($password) === PasswordExposed\PasswordStatus::EXPOSED;
448 } catch (\Exception $e) {
449 Logger::error('Password Exposed Exception: ' . $e->getMessage(), [
450 'code' => $e->getCode(),
451 'file' => $e->getFile(),
452 'line' => $e->getLine(),
453 'trace' => $e->getTraceAsString()
461 * Legacy hashing function, kept for password migration purposes
463 * @param string $password
466 private static function hashPasswordLegacy($password)
468 return hash('whirlpool', $password);
472 * Global user password hashing function
474 * @param string $password
478 public static function hashPassword($password)
480 if (!trim($password)) {
481 throw new Exception(DI::l10n()->t('Password can\'t be empty'));
484 return password_hash($password, PASSWORD_DEFAULT);
488 * Updates a user row with a new plaintext password
491 * @param string $password
495 public static function updatePassword($uid, $password)
497 $password = trim($password);
499 if (empty($password)) {
500 throw new Exception(DI::l10n()->t('Empty passwords are not allowed.'));
503 if (!DI::config()->get('system', 'disable_password_exposed', false) && self::isPasswordExposed($password)) {
504 throw new Exception(DI::l10n()->t('The new password has been exposed in a public data dump, please choose another.'));
507 $allowed_characters = '!"#$%&\'()*+,-./;<=>?@[\]^_`{|}~';
509 if (!preg_match('/^[a-z0-9' . preg_quote($allowed_characters, '/') . ']+$/i', $password)) {
510 throw new Exception(DI::l10n()->t('The password can\'t contain accentuated letters, white spaces or colons (:)'));
513 return self::updatePasswordHashed($uid, self::hashPassword($password));
517 * Updates a user row with a new hashed password.
518 * Empties the password reset token field just in case.
521 * @param string $pasword_hashed
525 private static function updatePasswordHashed($uid, $pasword_hashed)
528 'password' => $pasword_hashed,
530 'pwdreset_time' => null,
531 'legacy_password' => false
533 return DBA::update('user', $fields, ['uid' => $uid]);
537 * Checks if a nickname is in the list of the forbidden nicknames
539 * Check if a nickname is forbidden from registration on the node by the
540 * admin. Forbidden nicknames (e.g. role namess) can be configured in the
543 * @param string $nickname The nickname that should be checked
544 * @return boolean True is the nickname is blocked on the node
545 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
547 public static function isNicknameBlocked($nickname)
549 $forbidden_nicknames = DI::config()->get('system', 'forbidden_nicknames', '');
551 // if the config variable is empty return false
552 if (empty($forbidden_nicknames)) {
556 // check if the nickname is in the list of blocked nicknames
557 $forbidden = explode(',', $forbidden_nicknames);
558 $forbidden = array_map('trim', $forbidden);
559 if (in_array(strtolower($nickname), $forbidden)) {
568 * Catch-all user creation function
570 * Creates a user from the provided data array, either form fields or OpenID.
571 * Required: { username, nickname, email } or { openid_url }
573 * Performs the following:
574 * - Sends to the OpenId auth URL (if relevant)
575 * - Creates new key pairs for crypto
576 * - Create self-contact
577 * - Create profile image
581 * @throws \ErrorException
582 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
583 * @throws \ImagickException
586 public static function create(array $data)
588 $return = ['user' => null, 'password' => ''];
590 $using_invites = DI::config()->get('system', 'invitation_only');
592 $invite_id = !empty($data['invite_id']) ? Strings::escapeTags(trim($data['invite_id'])) : '';
593 $username = !empty($data['username']) ? Strings::escapeTags(trim($data['username'])) : '';
594 $nickname = !empty($data['nickname']) ? Strings::escapeTags(trim($data['nickname'])) : '';
595 $email = !empty($data['email']) ? Strings::escapeTags(trim($data['email'])) : '';
596 $openid_url = !empty($data['openid_url']) ? Strings::escapeTags(trim($data['openid_url'])) : '';
597 $photo = !empty($data['photo']) ? Strings::escapeTags(trim($data['photo'])) : '';
598 $password = !empty($data['password']) ? trim($data['password']) : '';
599 $password1 = !empty($data['password1']) ? trim($data['password1']) : '';
600 $confirm = !empty($data['confirm']) ? trim($data['confirm']) : '';
601 $blocked = !empty($data['blocked']);
602 $verified = !empty($data['verified']);
603 $language = !empty($data['language']) ? Strings::escapeTags(trim($data['language'])) : 'en';
605 $publish = !empty($data['profile_publish_reg']);
606 $netpublish = $publish && DI::config()->get('system', 'directory');
608 if ($password1 != $confirm) {
609 throw new Exception(DI::l10n()->t('Passwords do not match. Password unchanged.'));
610 } elseif ($password1 != '') {
611 $password = $password1;
614 if ($using_invites) {
616 throw new Exception(DI::l10n()->t('An invitation is required.'));
619 if (!Register::existsByHash($invite_id)) {
620 throw new Exception(DI::l10n()->t('Invitation could not be verified.'));
624 /// @todo Check if this part is really needed. We should have fetched all this data in advance
625 if (empty($username) || empty($email) || empty($nickname)) {
627 if (!Network::isUrlValid($openid_url)) {
628 throw new Exception(DI::l10n()->t('Invalid OpenID url'));
630 $_SESSION['register'] = 1;
631 $_SESSION['openid'] = $openid_url;
633 $openid = new LightOpenID(DI::baseUrl()->getHostname());
634 $openid->identity = $openid_url;
635 $openid->returnUrl = DI::baseUrl() . '/openid';
636 $openid->required = ['namePerson/friendly', 'contact/email', 'namePerson'];
637 $openid->optional = ['namePerson/first', 'media/image/aspect11', 'media/image/default'];
639 $authurl = $openid->authUrl();
640 } catch (Exception $e) {
641 throw new Exception(DI::l10n()->t('We encountered a problem while logging in with the OpenID you provided. Please check the correct spelling of the ID.') . EOL . EOL . DI::l10n()->t('The error message was:') . $e->getMessage(), 0, $e);
643 System::externalRedirect($authurl);
647 throw new Exception(DI::l10n()->t('Please enter the required information.'));
650 if (!Network::isUrlValid($openid_url)) {
654 // collapse multiple spaces in name
655 $username = preg_replace('/ +/', ' ', $username);
657 $username_min_length = max(1, min(64, intval(DI::config()->get('system', 'username_min_length', 3))));
658 $username_max_length = max(1, min(64, intval(DI::config()->get('system', 'username_max_length', 48))));
660 if ($username_min_length > $username_max_length) {
661 Logger::log(DI::l10n()->t('system.username_min_length (%s) and system.username_max_length (%s) are excluding each other, swapping values.', $username_min_length, $username_max_length), Logger::WARNING);
662 $tmp = $username_min_length;
663 $username_min_length = $username_max_length;
664 $username_max_length = $tmp;
667 if (mb_strlen($username) < $username_min_length) {
668 throw new Exception(DI::l10n()->tt('Username should be at least %s character.', 'Username should be at least %s characters.', $username_min_length));
671 if (mb_strlen($username) > $username_max_length) {
672 throw new Exception(DI::l10n()->tt('Username should be at most %s character.', 'Username should be at most %s characters.', $username_max_length));
675 // So now we are just looking for a space in the full name.
676 $loose_reg = DI::config()->get('system', 'no_regfullname');
678 $username = mb_convert_case($username, MB_CASE_TITLE, 'UTF-8');
679 if (strpos($username, ' ') === false) {
680 throw new Exception(DI::l10n()->t("That doesn't appear to be your full (First Last) name."));
684 if (!Network::isEmailDomainAllowed($email)) {
685 throw new Exception(DI::l10n()->t('Your email domain is not among those allowed on this site.'));
688 if (!filter_var($email, FILTER_VALIDATE_EMAIL) || !Network::isEmailDomainValid($email)) {
689 throw new Exception(DI::l10n()->t('Not a valid email address.'));
691 if (self::isNicknameBlocked($nickname)) {
692 throw new Exception(DI::l10n()->t('The nickname was blocked from registration by the nodes admin.'));
695 if (DI::config()->get('system', 'block_extended_register', false) && DBA::exists('user', ['email' => $email])) {
696 throw new Exception(DI::l10n()->t('Cannot use that email.'));
699 // Disallow somebody creating an account using openid that uses the admin email address,
700 // since openid bypasses email verification. We'll allow it if there is not yet an admin account.
701 if (DI::config()->get('config', 'admin_email') && strlen($openid_url)) {
702 $adminlist = explode(',', str_replace(' ', '', strtolower(DI::config()->get('config', 'admin_email'))));
703 if (in_array(strtolower($email), $adminlist)) {
704 throw new Exception(DI::l10n()->t('Cannot use that email.'));
708 $nickname = $data['nickname'] = strtolower($nickname);
710 if (!preg_match('/^[a-z0-9][a-z0-9\_]*$/', $nickname)) {
711 throw new Exception(DI::l10n()->t('Your nickname can only contain a-z, 0-9 and _.'));
714 // Check existing and deleted accounts for this nickname.
716 DBA::exists('user', ['nickname' => $nickname])
717 || DBA::exists('userd', ['username' => $nickname])
719 throw new Exception(DI::l10n()->t('Nickname is already registered. Please choose another.'));
722 $new_password = strlen($password) ? $password : User::generateNewPassword();
723 $new_password_encoded = self::hashPassword($new_password);
725 $return['password'] = $new_password;
727 $keys = Crypto::newKeypair(4096);
728 if ($keys === false) {
729 throw new Exception(DI::l10n()->t('SERIOUS ERROR: Generation of security keys failed.'));
732 $prvkey = $keys['prvkey'];
733 $pubkey = $keys['pubkey'];
735 // Create another keypair for signing/verifying salmon protocol messages.
736 $sres = Crypto::newKeypair(512);
737 $sprvkey = $sres['prvkey'];
738 $spubkey = $sres['pubkey'];
740 $insert_result = DBA::insert('user', [
741 'guid' => System::createUUID(),
742 'username' => $username,
743 'password' => $new_password_encoded,
745 'openid' => $openid_url,
746 'nickname' => $nickname,
749 'spubkey' => $spubkey,
750 'sprvkey' => $sprvkey,
751 'verified' => $verified,
752 'blocked' => $blocked,
753 'language' => $language,
755 'register_date' => DateTimeFormat::utcNow(),
756 'default-location' => ''
759 if ($insert_result) {
760 $uid = DBA::lastInsertId();
761 $user = DBA::selectFirst('user', [], ['uid' => $uid]);
763 throw new Exception(DI::l10n()->t('An error occurred during registration. Please try again.'));
767 throw new Exception(DI::l10n()->t('An error occurred during registration. Please try again.'));
770 // if somebody clicked submit twice very quickly, they could end up with two accounts
771 // due to race condition. Remove this one.
772 $user_count = DBA::count('user', ['nickname' => $nickname]);
773 if ($user_count > 1) {
774 DBA::delete('user', ['uid' => $uid]);
776 throw new Exception(DI::l10n()->t('Nickname is already registered. Please choose another.'));
779 $insert_result = DBA::insert('profile', [
782 'photo' => DI::baseUrl() . "/photo/profile/{$uid}.jpg",
783 'thumb' => DI::baseUrl() . "/photo/avatar/{$uid}.jpg",
784 'publish' => $publish,
786 'net-publish' => $netpublish,
787 'profile-name' => DI::l10n()->t('default')
789 if (!$insert_result) {
790 DBA::delete('user', ['uid' => $uid]);
792 throw new Exception(DI::l10n()->t('An error occurred creating your default profile. Please try again.'));
795 // Create the self contact
796 if (!Contact::createSelfFromUserId($uid)) {
797 DBA::delete('user', ['uid' => $uid]);
799 throw new Exception(DI::l10n()->t('An error occurred creating your self contact. Please try again.'));
802 // Create a group with no members. This allows somebody to use it
803 // right away as a default group for new contacts.
804 $def_gid = Group::create($uid, DI::l10n()->t('Friends'));
806 DBA::delete('user', ['uid' => $uid]);
808 throw new Exception(DI::l10n()->t('An error occurred creating your default contact group. Please try again.'));
811 $fields = ['def_gid' => $def_gid];
812 if (DI::config()->get('system', 'newuser_private') && $def_gid) {
813 $fields['allow_gid'] = '<' . $def_gid . '>';
816 DBA::update('user', $fields, ['uid' => $uid]);
818 // if we have no OpenID photo try to look up an avatar
819 if (!strlen($photo)) {
820 $photo = Network::lookupAvatarByEmail($email);
823 // unless there is no avatar-addon loaded
824 if (strlen($photo)) {
825 $photo_failure = false;
827 $filename = basename($photo);
828 $img_str = Network::fetchUrl($photo, true);
829 // guess mimetype from headers or filename
830 $type = Images::guessType($photo, true);
832 $Image = new Image($img_str, $type);
833 if ($Image->isValid()) {
834 $Image->scaleToSquare(300);
836 $resource_id = Photo::newResource();
838 $r = Photo::store($Image, $uid, 0, $resource_id, $filename, DI::l10n()->t('Profile Photos'), 4);
841 $photo_failure = true;
844 $Image->scaleDown(80);
846 $r = Photo::store($Image, $uid, 0, $resource_id, $filename, DI::l10n()->t('Profile Photos'), 5);
849 $photo_failure = true;
852 $Image->scaleDown(48);
854 $r = Photo::store($Image, $uid, 0, $resource_id, $filename, DI::l10n()->t('Profile Photos'), 6);
857 $photo_failure = true;
860 if (!$photo_failure) {
861 Photo::update(['profile' => 1], ['resource-id' => $resource_id]);
866 Hook::callAll('register_account', $uid);
868 $return['user'] = $user;
873 * Sends pending registration confirmation email
875 * @param array $user User record array
876 * @param string $sitename
877 * @param string $siteurl
878 * @param string $password Plaintext password
879 * @return NULL|boolean from notification() and email() inherited
880 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
882 public static function sendRegisterPendingEmail($user, $sitename, $siteurl, $password)
884 $body = Strings::deindent(DI::l10n()->t(
887 Thank you for registering at %2$s. Your account is pending for approval by the administrator.
889 Your login details are as follows:
902 return notification([
903 'type' => SYSTEM_EMAIL,
904 'uid' => $user['uid'],
905 'to_email' => $user['email'],
906 'subject' => DI::l10n()->t('Registration at %s', $sitename),
912 * Sends registration confirmation
914 * It's here as a function because the mail is sent from different parts
916 * @param \Friendica\Core\L10n $l10n The used language
917 * @param array $user User record array
918 * @param string $sitename
919 * @param string $siteurl
920 * @param string $password Plaintext password
922 * @return NULL|boolean from notification() and email() inherited
923 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
925 public static function sendRegisterOpenEmail(\Friendica\Core\L10n $l10n, $user, $sitename, $siteurl, $password)
927 $preamble = Strings::deindent($l10n->t(
930 Thank you for registering at %2$s. Your account has been created.
935 $body = Strings::deindent($l10n->t(
937 The login details are as follows:
943 You may change your password from your account "Settings" page after logging
946 Please take a few moments to review the other account settings on that page.
948 You may also wish to add some basic information to your default profile
949 ' . "\x28" . 'on the "Profiles" page' . "\x29" . ' so that other people can easily find you.
951 We recommend setting your full name, adding a profile photo,
952 adding some profile "keywords" ' . "\x28" . 'very useful in making new friends' . "\x29" . ' - and
953 perhaps what country you live in; if you do not wish to be more specific
956 We fully respect your right to privacy, and none of these items are necessary.
957 If you are new and do not know anybody here, they may help
958 you to make some new and interesting friends.
960 If you ever want to delete your account, you can do so at %3$s/removeme
962 Thank you and welcome to %2$s.',
970 return notification([
971 'uid' => $user['uid'],
972 'language' => $user['language'],
973 'type' => SYSTEM_EMAIL,
974 'to_email' => $user['email'],
975 'subject' => DI::l10n()->t('Registration details for %s', $sitename),
976 'preamble' => $preamble,
982 * @param object $uid user to remove
984 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
986 public static function remove($uid)
992 Logger::log('Removing user: ' . $uid);
994 $user = DBA::selectFirst('user', [], ['uid' => $uid]);
996 Hook::callAll('remove_user', $user);
998 // save username (actually the nickname as it is guaranteed
999 // unique), so it cannot be re-registered in the future.
1000 DBA::insert('userd', ['username' => $user['nickname']]);
1002 // The user and related data will be deleted in "cron_expire_and_remove_users" (cronjobs.php)
1003 DBA::update('user', ['account_removed' => true, 'account_expires_on' => DateTimeFormat::utc('now + 7 day')], ['uid' => $uid]);
1004 Worker::add(PRIORITY_HIGH, 'Notifier', Delivery::REMOVAL, $uid);
1006 // Send an update to the directory
1007 $self = DBA::selectFirst('contact', ['url'], ['uid' => $uid, 'self' => true]);
1008 Worker::add(PRIORITY_LOW, 'Directory', $self['url']);
1010 // Remove the user relevant data
1011 Worker::add(PRIORITY_NEGLIGIBLE, 'RemoveUser', $uid);
1017 * Return all identities to a user
1019 * @param int $uid The user id
1020 * @return array All identities for this user
1022 * Example for a return:
1026 * 'username' => 'maxmuster',
1027 * 'nickname' => 'Max Mustermann'
1031 * 'username' => 'johndoe',
1032 * 'nickname' => 'John Doe'
1037 public static function identities($uid)
1041 $user = DBA::selectFirst('user', ['uid', 'nickname', 'username', 'parent-uid'], ['uid' => $uid]);
1042 if (!DBA::isResult($user)) {
1046 if ($user['parent-uid'] == 0) {
1047 // First add our own entry
1049 'uid' => $user['uid'],
1050 'username' => $user['username'],
1051 'nickname' => $user['nickname']
1054 // Then add all the children
1057 ['uid', 'username', 'nickname'],
1058 ['parent-uid' => $user['uid'], 'account_removed' => false]
1060 if (DBA::isResult($r)) {
1061 $identities = array_merge($identities, DBA::toArray($r));
1064 // First entry is our parent
1067 ['uid', 'username', 'nickname'],
1068 ['uid' => $user['parent-uid'], 'account_removed' => false]
1070 if (DBA::isResult($r)) {
1071 $identities = DBA::toArray($r);
1074 // Then add all siblings
1077 ['uid', 'username', 'nickname'],
1078 ['parent-uid' => $user['parent-uid'], 'account_removed' => false]
1080 if (DBA::isResult($r)) {
1081 $identities = array_merge($identities, DBA::toArray($r));
1086 "SELECT `user`.`uid`, `user`.`username`, `user`.`nickname`
1088 INNER JOIN `user` ON `manage`.`mid` = `user`.`uid`
1089 WHERE `user`.`account_removed` = 0 AND `manage`.`uid` = ?",
1092 if (DBA::isResult($r)) {
1093 $identities = array_merge($identities, DBA::toArray($r));
1100 * Returns statistical information about the current users of this node
1106 public static function getStatistics()
1110 'active_users_halfyear' => 0,
1111 'active_users_monthly' => 0,
1114 $userStmt = DBA::p("SELECT `user`.`uid`, `user`.`login_date`, `contact`.`last-item`
1116 INNER JOIN `profile` ON `profile`.`uid` = `user`.`uid` AND `profile`.`is-default`
1117 INNER JOIN `contact` ON `contact`.`uid` = `user`.`uid` AND `contact`.`self`
1118 WHERE (`profile`.`publish` OR `profile`.`net-publish`) AND `user`.`verified`
1119 AND NOT `user`.`blocked` AND NOT `user`.`account_removed`
1120 AND NOT `user`.`account_expired`");
1122 if (!DBA::isResult($userStmt)) {
1126 $halfyear = time() - (180 * 24 * 60 * 60);
1127 $month = time() - (30 * 24 * 60 * 60);
1129 while ($user = DBA::fetch($userStmt)) {
1130 $statistics['total_users']++;
1132 if ((strtotime($user['login_date']) > $halfyear) || (strtotime($user['last-item']) > $halfyear)
1134 $statistics['active_users_halfyear']++;
1137 if ((strtotime($user['login_date']) > $month) || (strtotime($user['last-item']) > $month)
1139 $statistics['active_users_monthly']++;