4 * @file src/Model/User.php
5 * This file includes the User class with user related database functions
8 namespace Friendica\Model;
10 use DivineOmega\PasswordExposed;
12 use Friendica\Core\Config;
13 use Friendica\Core\Hook;
14 use Friendica\Core\Logger;
15 use Friendica\Core\Protocol;
16 use Friendica\Core\System;
17 use Friendica\Core\Worker;
18 use Friendica\Database\DBA;
20 use Friendica\Model\TwoFactor\AppSpecificPassword;
21 use Friendica\Object\Image;
22 use Friendica\Util\Crypto;
23 use Friendica\Util\DateTimeFormat;
24 use Friendica\Util\Images;
25 use Friendica\Util\Network;
26 use Friendica\Util\Strings;
27 use Friendica\Worker\Delivery;
31 * This class handles User related functions
38 * PAGE_FLAGS_NORMAL is a typical personal profile account
39 * PAGE_FLAGS_SOAPBOX automatically approves all friend requests as Contact::SHARING, (readonly)
40 * PAGE_FLAGS_COMMUNITY automatically approves all friend requests as Contact::SHARING, but with
41 * write access to wall and comments (no email and not included in page owner's ACL lists)
42 * PAGE_FLAGS_FREELOVE automatically approves all friend requests as full friends (Contact::FRIEND).
46 const PAGE_FLAGS_NORMAL = 0;
47 const PAGE_FLAGS_SOAPBOX = 1;
48 const PAGE_FLAGS_COMMUNITY = 2;
49 const PAGE_FLAGS_FREELOVE = 3;
50 const PAGE_FLAGS_BLOG = 4;
51 const PAGE_FLAGS_PRVGROUP = 5;
59 * ACCOUNT_TYPE_PERSON - the account belongs to a person
60 * Associated page types: PAGE_FLAGS_NORMAL, PAGE_FLAGS_SOAPBOX, PAGE_FLAGS_FREELOVE
62 * ACCOUNT_TYPE_ORGANISATION - the account belongs to an organisation
63 * Associated page type: PAGE_FLAGS_SOAPBOX
65 * ACCOUNT_TYPE_NEWS - the account is a news reflector
66 * Associated page type: PAGE_FLAGS_SOAPBOX
68 * ACCOUNT_TYPE_COMMUNITY - the account is community forum
69 * Associated page types: PAGE_COMMUNITY, PAGE_FLAGS_PRVGROUP
71 * ACCOUNT_TYPE_RELAY - the account is a relay
72 * This will only be assigned to contacts, not to user accounts
75 const ACCOUNT_TYPE_PERSON = 0;
76 const ACCOUNT_TYPE_ORGANISATION = 1;
77 const ACCOUNT_TYPE_NEWS = 2;
78 const ACCOUNT_TYPE_COMMUNITY = 3;
79 const ACCOUNT_TYPE_RELAY = 4;
85 * Returns true if a user record exists with the provided id
91 public static function exists($uid)
93 return DBA::exists('user', ['uid' => $uid]);
98 * @param array $fields
99 * @return array|boolean User record if it exists, false otherwise
102 public static function getById($uid, array $fields = [])
104 return DBA::selectFirst('user', $fields, ['uid' => $uid]);
108 * Returns a user record based on it's GUID
110 * @param string $guid The guid of the user
111 * @param array $fields The fields to retrieve
112 * @param bool $active True, if only active records are searched
114 * @return array|boolean User record if it exists, false otherwise
117 public static function getByGuid(string $guid, array $fields = [], bool $active = true)
120 $cond = ['guid' => $guid, 'account_expired' => false, 'account_removed' => false];
122 $cond = ['guid' => $guid];
125 return DBA::selectFirst('user', $fields, $cond);
129 * @param string $nickname
130 * @param array $fields
131 * @return array|boolean User record if it exists, false otherwise
134 public static function getByNickname($nickname, array $fields = [])
136 return DBA::selectFirst('user', $fields, ['nickname' => $nickname]);
140 * Returns the user id of a given profile URL
144 * @return integer user id
147 public static function getIdForURL($url)
149 $self = DBA::selectFirst('contact', ['uid'], ['nurl' => Strings::normaliseLink($url), 'self' => true]);
150 if (!DBA::isResult($self)) {
158 * Get a user based on its email
160 * @param string $email
161 * @param array $fields
163 * @return array|boolean User record if it exists, false otherwise
167 public static function getByEmail($email, array $fields = [])
169 return DBA::selectFirst('user', $fields, ['email' => $email]);
173 * Get owner data by user id
176 * @param boolean $check_valid Test if data is invalid and correct it
177 * @return boolean|array
180 public static function getOwnerDataById($uid, $check_valid = true)
182 $r = DBA::fetchFirst(
185 `user`.`prvkey` AS `uprvkey`,
191 `user`.`account-type`,
193 `user`.`account_removed`,
197 ON `user`.`uid` = `contact`.`uid`
198 WHERE `contact`.`uid` = ?
203 if (!DBA::isResult($r)) {
207 if (empty($r['nickname'])) {
215 // Check if the returned data is valid, otherwise fix it. See issue #6122
217 // Check for correct url and normalised nurl
218 $url = DI::baseUrl() . '/profile/' . $r['nickname'];
219 $repair = ($r['url'] != $url) || ($r['nurl'] != Strings::normaliseLink($r['url']));
222 // Check if "addr" is present and correct
223 $addr = $r['nickname'] . '@' . substr(DI::baseUrl(), strpos(DI::baseUrl(), '://') + 3);
224 $repair = ($addr != $r['addr']);
228 // Check if the avatar field is filled and the photo directs to the correct path
229 $avatar = Photo::selectFirst(['resource-id'], ['uid' => $uid, 'profile' => true]);
230 if (DBA::isResult($avatar)) {
231 $repair = empty($r['avatar']) || !strpos($r['photo'], $avatar['resource-id']);
236 Contact::updateSelfFromUserID($uid);
237 // Return the corrected data and avoid a loop
238 $r = self::getOwnerDataById($uid, false);
245 * Get owner data by nick name
248 * @return boolean|array
251 public static function getOwnerDataByNick($nick)
253 $user = DBA::selectFirst('user', ['uid'], ['nickname' => $nick]);
255 if (!DBA::isResult($user)) {
259 return self::getOwnerDataById($user['uid']);
263 * Returns the default group for a given user and network
265 * @param int $uid User id
266 * @param string $network network name
268 * @return int group id
269 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
271 public static function getDefaultGroup($uid, $network = '')
275 if ($network == Protocol::OSTATUS) {
276 $default_group = DI::pConfig()->get($uid, "ostatus", "default_group");
279 if ($default_group != 0) {
280 return $default_group;
283 $user = DBA::selectFirst('user', ['def_gid'], ['uid' => $uid]);
285 if (DBA::isResult($user)) {
286 $default_group = $user["def_gid"];
289 return $default_group;
294 * Authenticate a user with a clear text password
296 * @param mixed $user_info
297 * @param string $password
298 * @param bool $third_party
299 * @return int|boolean
300 * @deprecated since version 3.6
301 * @see User::getIdFromPasswordAuthentication()
303 public static function authenticate($user_info, $password, $third_party = false)
306 return self::getIdFromPasswordAuthentication($user_info, $password, $third_party);
307 } catch (Exception $ex) {
313 * Authenticate a user with a clear text password
315 * Returns the user id associated with a successful password authentication
317 * @param mixed $user_info
318 * @param string $password
319 * @param bool $third_party
320 * @return int User Id if authentication is successful
323 public static function getIdFromPasswordAuthentication($user_info, $password, $third_party = false)
325 $user = self::getAuthenticationInfo($user_info);
327 if ($third_party && DI::pConfig()->get($user['uid'], '2fa', 'verified')) {
328 // Third-party apps can't verify two-factor authentication, we use app-specific passwords instead
329 if (AppSpecificPassword::authenticateUser($user['uid'], $password)) {
332 } elseif (strpos($user['password'], '$') === false) {
333 //Legacy hash that has not been replaced by a new hash yet
334 if (self::hashPasswordLegacy($password) === $user['password']) {
335 self::updatePasswordHashed($user['uid'], self::hashPassword($password));
339 } elseif (!empty($user['legacy_password'])) {
340 //Legacy hash that has been double-hashed and not replaced by a new hash yet
341 //Warning: `legacy_password` is not necessary in sync with the content of `password`
342 if (password_verify(self::hashPasswordLegacy($password), $user['password'])) {
343 self::updatePasswordHashed($user['uid'], self::hashPassword($password));
347 } elseif (password_verify($password, $user['password'])) {
349 if (password_needs_rehash($user['password'], PASSWORD_DEFAULT)) {
350 self::updatePasswordHashed($user['uid'], self::hashPassword($password));
356 throw new Exception(DI::l10n()->t('Login failed'));
360 * Returns authentication info from various parameters types
362 * User info can be any of the following:
365 * - User email or username or nickname
366 * - User array with at least the uid and the hashed password
368 * @param mixed $user_info
372 private static function getAuthenticationInfo($user_info)
376 if (is_object($user_info) || is_array($user_info)) {
377 if (is_object($user_info)) {
378 $user = (array) $user_info;
385 || !isset($user['password'])
386 || !isset($user['legacy_password'])
388 throw new Exception(DI::l10n()->t('Not enough information to authenticate'));
390 } elseif (is_int($user_info) || is_string($user_info)) {
391 if (is_int($user_info)) {
392 $user = DBA::selectFirst(
394 ['uid', 'password', 'legacy_password'],
398 'account_expired' => 0,
399 'account_removed' => 0,
404 $fields = ['uid', 'password', 'legacy_password'];
406 "(`email` = ? OR `username` = ? OR `nickname` = ?)
407 AND NOT `blocked` AND NOT `account_expired` AND NOT `account_removed` AND `verified`",
408 $user_info, $user_info, $user_info
410 $user = DBA::selectFirst('user', $fields, $condition);
413 if (!DBA::isResult($user)) {
414 throw new Exception(DI::l10n()->t('User not found'));
422 * Generates a human-readable random password
426 public static function generateNewPassword()
428 return ucfirst(Strings::getRandomName(8)) . random_int(1000, 9999);
432 * Checks if the provided plaintext password has been exposed or not
434 * @param string $password
438 public static function isPasswordExposed($password)
440 $cache = new \DivineOmega\DOFileCachePSR6\CacheItemPool();
441 $cache->changeConfig([
442 'cacheDirectory' => get_temppath() . '/password-exposed-cache/',
446 $passwordExposedChecker = new PasswordExposed\PasswordExposedChecker(null, $cache);
448 return $passwordExposedChecker->passwordExposed($password) === PasswordExposed\PasswordStatus::EXPOSED;
449 } catch (\Exception $e) {
450 Logger::error('Password Exposed Exception: ' . $e->getMessage(), [
451 'code' => $e->getCode(),
452 'file' => $e->getFile(),
453 'line' => $e->getLine(),
454 'trace' => $e->getTraceAsString()
462 * Legacy hashing function, kept for password migration purposes
464 * @param string $password
467 private static function hashPasswordLegacy($password)
469 return hash('whirlpool', $password);
473 * Global user password hashing function
475 * @param string $password
479 public static function hashPassword($password)
481 if (!trim($password)) {
482 throw new Exception(DI::l10n()->t('Password can\'t be empty'));
485 return password_hash($password, PASSWORD_DEFAULT);
489 * Updates a user row with a new plaintext password
492 * @param string $password
496 public static function updatePassword($uid, $password)
498 $password = trim($password);
500 if (empty($password)) {
501 throw new Exception(DI::l10n()->t('Empty passwords are not allowed.'));
504 if (!DI::config()->get('system', 'disable_password_exposed', false) && self::isPasswordExposed($password)) {
505 throw new Exception(DI::l10n()->t('The new password has been exposed in a public data dump, please choose another.'));
508 $allowed_characters = '!"#$%&\'()*+,-./;<=>?@[\]^_`{|}~';
510 if (!preg_match('/^[a-z0-9' . preg_quote($allowed_characters, '/') . ']+$/i', $password)) {
511 throw new Exception(DI::l10n()->t('The password can\'t contain accentuated letters, white spaces or colons (:)'));
514 return self::updatePasswordHashed($uid, self::hashPassword($password));
518 * Updates a user row with a new hashed password.
519 * Empties the password reset token field just in case.
522 * @param string $pasword_hashed
526 private static function updatePasswordHashed($uid, $pasword_hashed)
529 'password' => $pasword_hashed,
531 'pwdreset_time' => null,
532 'legacy_password' => false
534 return DBA::update('user', $fields, ['uid' => $uid]);
538 * Checks if a nickname is in the list of the forbidden nicknames
540 * Check if a nickname is forbidden from registration on the node by the
541 * admin. Forbidden nicknames (e.g. role namess) can be configured in the
544 * @param string $nickname The nickname that should be checked
545 * @return boolean True is the nickname is blocked on the node
546 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
548 public static function isNicknameBlocked($nickname)
550 $forbidden_nicknames = DI::config()->get('system', 'forbidden_nicknames', '');
552 // if the config variable is empty return false
553 if (empty($forbidden_nicknames)) {
557 // check if the nickname is in the list of blocked nicknames
558 $forbidden = explode(',', $forbidden_nicknames);
559 $forbidden = array_map('trim', $forbidden);
560 if (in_array(strtolower($nickname), $forbidden)) {
569 * Catch-all user creation function
571 * Creates a user from the provided data array, either form fields or OpenID.
572 * Required: { username, nickname, email } or { openid_url }
574 * Performs the following:
575 * - Sends to the OpenId auth URL (if relevant)
576 * - Creates new key pairs for crypto
577 * - Create self-contact
578 * - Create profile image
582 * @throws \ErrorException
583 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
584 * @throws \ImagickException
587 public static function create(array $data)
589 $return = ['user' => null, 'password' => ''];
591 $using_invites = DI::config()->get('system', 'invitation_only');
593 $invite_id = !empty($data['invite_id']) ? Strings::escapeTags(trim($data['invite_id'])) : '';
594 $username = !empty($data['username']) ? Strings::escapeTags(trim($data['username'])) : '';
595 $nickname = !empty($data['nickname']) ? Strings::escapeTags(trim($data['nickname'])) : '';
596 $email = !empty($data['email']) ? Strings::escapeTags(trim($data['email'])) : '';
597 $openid_url = !empty($data['openid_url']) ? Strings::escapeTags(trim($data['openid_url'])) : '';
598 $photo = !empty($data['photo']) ? Strings::escapeTags(trim($data['photo'])) : '';
599 $password = !empty($data['password']) ? trim($data['password']) : '';
600 $password1 = !empty($data['password1']) ? trim($data['password1']) : '';
601 $confirm = !empty($data['confirm']) ? trim($data['confirm']) : '';
602 $blocked = !empty($data['blocked']);
603 $verified = !empty($data['verified']);
604 $language = !empty($data['language']) ? Strings::escapeTags(trim($data['language'])) : 'en';
606 $publish = !empty($data['profile_publish_reg']);
607 $netpublish = $publish && DI::config()->get('system', 'directory');
609 if ($password1 != $confirm) {
610 throw new Exception(DI::l10n()->t('Passwords do not match. Password unchanged.'));
611 } elseif ($password1 != '') {
612 $password = $password1;
615 if ($using_invites) {
617 throw new Exception(DI::l10n()->t('An invitation is required.'));
620 if (!Register::existsByHash($invite_id)) {
621 throw new Exception(DI::l10n()->t('Invitation could not be verified.'));
625 /// @todo Check if this part is really needed. We should have fetched all this data in advance
626 if (empty($username) || empty($email) || empty($nickname)) {
628 if (!Network::isUrlValid($openid_url)) {
629 throw new Exception(DI::l10n()->t('Invalid OpenID url'));
631 $_SESSION['register'] = 1;
632 $_SESSION['openid'] = $openid_url;
634 $openid = new LightOpenID(DI::baseUrl()->getHostname());
635 $openid->identity = $openid_url;
636 $openid->returnUrl = DI::baseUrl() . '/openid';
637 $openid->required = ['namePerson/friendly', 'contact/email', 'namePerson'];
638 $openid->optional = ['namePerson/first', 'media/image/aspect11', 'media/image/default'];
640 $authurl = $openid->authUrl();
641 } catch (Exception $e) {
642 throw new Exception(DI::l10n()->t('We encountered a problem while logging in with the OpenID you provided. Please check the correct spelling of the ID.') . EOL . EOL . DI::l10n()->t('The error message was:') . $e->getMessage(), 0, $e);
644 System::externalRedirect($authurl);
648 throw new Exception(DI::l10n()->t('Please enter the required information.'));
651 if (!Network::isUrlValid($openid_url)) {
655 // collapse multiple spaces in name
656 $username = preg_replace('/ +/', ' ', $username);
658 $username_min_length = max(1, min(64, intval(DI::config()->get('system', 'username_min_length', 3))));
659 $username_max_length = max(1, min(64, intval(DI::config()->get('system', 'username_max_length', 48))));
661 if ($username_min_length > $username_max_length) {
662 Logger::log(DI::l10n()->t('system.username_min_length (%s) and system.username_max_length (%s) are excluding each other, swapping values.', $username_min_length, $username_max_length), Logger::WARNING);
663 $tmp = $username_min_length;
664 $username_min_length = $username_max_length;
665 $username_max_length = $tmp;
668 if (mb_strlen($username) < $username_min_length) {
669 throw new Exception(DI::l10n()->tt('Username should be at least %s character.', 'Username should be at least %s characters.', $username_min_length));
672 if (mb_strlen($username) > $username_max_length) {
673 throw new Exception(DI::l10n()->tt('Username should be at most %s character.', 'Username should be at most %s characters.', $username_max_length));
676 // So now we are just looking for a space in the full name.
677 $loose_reg = DI::config()->get('system', 'no_regfullname');
679 $username = mb_convert_case($username, MB_CASE_TITLE, 'UTF-8');
680 if (strpos($username, ' ') === false) {
681 throw new Exception(DI::l10n()->t("That doesn't appear to be your full (First Last) name."));
685 if (!Network::isEmailDomainAllowed($email)) {
686 throw new Exception(DI::l10n()->t('Your email domain is not among those allowed on this site.'));
689 if (!filter_var($email, FILTER_VALIDATE_EMAIL) || !Network::isEmailDomainValid($email)) {
690 throw new Exception(DI::l10n()->t('Not a valid email address.'));
692 if (self::isNicknameBlocked($nickname)) {
693 throw new Exception(DI::l10n()->t('The nickname was blocked from registration by the nodes admin.'));
696 if (DI::config()->get('system', 'block_extended_register', false) && DBA::exists('user', ['email' => $email])) {
697 throw new Exception(DI::l10n()->t('Cannot use that email.'));
700 // Disallow somebody creating an account using openid that uses the admin email address,
701 // since openid bypasses email verification. We'll allow it if there is not yet an admin account.
702 if (DI::config()->get('config', 'admin_email') && strlen($openid_url)) {
703 $adminlist = explode(',', str_replace(' ', '', strtolower(DI::config()->get('config', 'admin_email'))));
704 if (in_array(strtolower($email), $adminlist)) {
705 throw new Exception(DI::l10n()->t('Cannot use that email.'));
709 $nickname = $data['nickname'] = strtolower($nickname);
711 if (!preg_match('/^[a-z0-9][a-z0-9\_]*$/', $nickname)) {
712 throw new Exception(DI::l10n()->t('Your nickname can only contain a-z, 0-9 and _.'));
715 // Check existing and deleted accounts for this nickname.
717 DBA::exists('user', ['nickname' => $nickname])
718 || DBA::exists('userd', ['username' => $nickname])
720 throw new Exception(DI::l10n()->t('Nickname is already registered. Please choose another.'));
723 $new_password = strlen($password) ? $password : User::generateNewPassword();
724 $new_password_encoded = self::hashPassword($new_password);
726 $return['password'] = $new_password;
728 $keys = Crypto::newKeypair(4096);
729 if ($keys === false) {
730 throw new Exception(DI::l10n()->t('SERIOUS ERROR: Generation of security keys failed.'));
733 $prvkey = $keys['prvkey'];
734 $pubkey = $keys['pubkey'];
736 // Create another keypair for signing/verifying salmon protocol messages.
737 $sres = Crypto::newKeypair(512);
738 $sprvkey = $sres['prvkey'];
739 $spubkey = $sres['pubkey'];
741 $insert_result = DBA::insert('user', [
742 'guid' => System::createUUID(),
743 'username' => $username,
744 'password' => $new_password_encoded,
746 'openid' => $openid_url,
747 'nickname' => $nickname,
750 'spubkey' => $spubkey,
751 'sprvkey' => $sprvkey,
752 'verified' => $verified,
753 'blocked' => $blocked,
754 'language' => $language,
756 'register_date' => DateTimeFormat::utcNow(),
757 'default-location' => ''
760 if ($insert_result) {
761 $uid = DBA::lastInsertId();
762 $user = DBA::selectFirst('user', [], ['uid' => $uid]);
764 throw new Exception(DI::l10n()->t('An error occurred during registration. Please try again.'));
768 throw new Exception(DI::l10n()->t('An error occurred during registration. Please try again.'));
771 // if somebody clicked submit twice very quickly, they could end up with two accounts
772 // due to race condition. Remove this one.
773 $user_count = DBA::count('user', ['nickname' => $nickname]);
774 if ($user_count > 1) {
775 DBA::delete('user', ['uid' => $uid]);
777 throw new Exception(DI::l10n()->t('Nickname is already registered. Please choose another.'));
780 $insert_result = DBA::insert('profile', [
783 'photo' => DI::baseUrl() . "/photo/profile/{$uid}.jpg",
784 'thumb' => DI::baseUrl() . "/photo/avatar/{$uid}.jpg",
785 'publish' => $publish,
787 'net-publish' => $netpublish,
788 'profile-name' => DI::l10n()->t('default')
790 if (!$insert_result) {
791 DBA::delete('user', ['uid' => $uid]);
793 throw new Exception(DI::l10n()->t('An error occurred creating your default profile. Please try again.'));
796 // Create the self contact
797 if (!Contact::createSelfFromUserId($uid)) {
798 DBA::delete('user', ['uid' => $uid]);
800 throw new Exception(DI::l10n()->t('An error occurred creating your self contact. Please try again.'));
803 // Create a group with no members. This allows somebody to use it
804 // right away as a default group for new contacts.
805 $def_gid = Group::create($uid, DI::l10n()->t('Friends'));
807 DBA::delete('user', ['uid' => $uid]);
809 throw new Exception(DI::l10n()->t('An error occurred creating your default contact group. Please try again.'));
812 $fields = ['def_gid' => $def_gid];
813 if (DI::config()->get('system', 'newuser_private') && $def_gid) {
814 $fields['allow_gid'] = '<' . $def_gid . '>';
817 DBA::update('user', $fields, ['uid' => $uid]);
819 // if we have no OpenID photo try to look up an avatar
820 if (!strlen($photo)) {
821 $photo = Network::lookupAvatarByEmail($email);
824 // unless there is no avatar-addon loaded
825 if (strlen($photo)) {
826 $photo_failure = false;
828 $filename = basename($photo);
829 $img_str = Network::fetchUrl($photo, true);
830 // guess mimetype from headers or filename
831 $type = Images::guessType($photo, true);
833 $Image = new Image($img_str, $type);
834 if ($Image->isValid()) {
835 $Image->scaleToSquare(300);
837 $resource_id = Photo::newResource();
839 $r = Photo::store($Image, $uid, 0, $resource_id, $filename, DI::l10n()->t('Profile Photos'), 4);
842 $photo_failure = true;
845 $Image->scaleDown(80);
847 $r = Photo::store($Image, $uid, 0, $resource_id, $filename, DI::l10n()->t('Profile Photos'), 5);
850 $photo_failure = true;
853 $Image->scaleDown(48);
855 $r = Photo::store($Image, $uid, 0, $resource_id, $filename, DI::l10n()->t('Profile Photos'), 6);
858 $photo_failure = true;
861 if (!$photo_failure) {
862 Photo::update(['profile' => 1], ['resource-id' => $resource_id]);
867 Hook::callAll('register_account', $uid);
869 $return['user'] = $user;
874 * Sends pending registration confirmation email
876 * @param array $user User record array
877 * @param string $sitename
878 * @param string $siteurl
879 * @param string $password Plaintext password
880 * @return NULL|boolean from notification() and email() inherited
881 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
883 public static function sendRegisterPendingEmail($user, $sitename, $siteurl, $password)
885 $body = Strings::deindent(DI::l10n()->t(
888 Thank you for registering at %2$s. Your account is pending for approval by the administrator.
890 Your login details are as follows:
903 return notification([
904 'type' => SYSTEM_EMAIL,
905 'uid' => $user['uid'],
906 'to_email' => $user['email'],
907 'subject' => DI::l10n()->t('Registration at %s', $sitename),
913 * Sends registration confirmation
915 * It's here as a function because the mail is sent from different parts
917 * @param \Friendica\Core\L10n $l10n The used language
918 * @param array $user User record array
919 * @param string $sitename
920 * @param string $siteurl
921 * @param string $password Plaintext password
923 * @return NULL|boolean from notification() and email() inherited
924 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
926 public static function sendRegisterOpenEmail(\Friendica\Core\L10n $l10n, $user, $sitename, $siteurl, $password)
928 $preamble = Strings::deindent($l10n->t(
931 Thank you for registering at %2$s. Your account has been created.
936 $body = Strings::deindent($l10n->t(
938 The login details are as follows:
944 You may change your password from your account "Settings" page after logging
947 Please take a few moments to review the other account settings on that page.
949 You may also wish to add some basic information to your default profile
950 ' . "\x28" . 'on the "Profiles" page' . "\x29" . ' so that other people can easily find you.
952 We recommend setting your full name, adding a profile photo,
953 adding some profile "keywords" ' . "\x28" . 'very useful in making new friends' . "\x29" . ' - and
954 perhaps what country you live in; if you do not wish to be more specific
957 We fully respect your right to privacy, and none of these items are necessary.
958 If you are new and do not know anybody here, they may help
959 you to make some new and interesting friends.
961 If you ever want to delete your account, you can do so at %3$s/removeme
963 Thank you and welcome to %2$s.',
971 return notification([
972 'uid' => $user['uid'],
973 'language' => $user['language'],
974 'type' => SYSTEM_EMAIL,
975 'to_email' => $user['email'],
976 'subject' => DI::l10n()->t('Registration details for %s', $sitename),
977 'preamble' => $preamble,
983 * @param object $uid user to remove
985 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
987 public static function remove($uid)
993 Logger::log('Removing user: ' . $uid);
995 $user = DBA::selectFirst('user', [], ['uid' => $uid]);
997 Hook::callAll('remove_user', $user);
999 // save username (actually the nickname as it is guaranteed
1000 // unique), so it cannot be re-registered in the future.
1001 DBA::insert('userd', ['username' => $user['nickname']]);
1003 // The user and related data will be deleted in "cron_expire_and_remove_users" (cronjobs.php)
1004 DBA::update('user', ['account_removed' => true, 'account_expires_on' => DateTimeFormat::utc('now + 7 day')], ['uid' => $uid]);
1005 Worker::add(PRIORITY_HIGH, 'Notifier', Delivery::REMOVAL, $uid);
1007 // Send an update to the directory
1008 $self = DBA::selectFirst('contact', ['url'], ['uid' => $uid, 'self' => true]);
1009 Worker::add(PRIORITY_LOW, 'Directory', $self['url']);
1011 // Remove the user relevant data
1012 Worker::add(PRIORITY_NEGLIGIBLE, 'RemoveUser', $uid);
1018 * Return all identities to a user
1020 * @param int $uid The user id
1021 * @return array All identities for this user
1023 * Example for a return:
1027 * 'username' => 'maxmuster',
1028 * 'nickname' => 'Max Mustermann'
1032 * 'username' => 'johndoe',
1033 * 'nickname' => 'John Doe'
1038 public static function identities($uid)
1042 $user = DBA::selectFirst('user', ['uid', 'nickname', 'username', 'parent-uid'], ['uid' => $uid]);
1043 if (!DBA::isResult($user)) {
1047 if ($user['parent-uid'] == 0) {
1048 // First add our own entry
1050 'uid' => $user['uid'],
1051 'username' => $user['username'],
1052 'nickname' => $user['nickname']
1055 // Then add all the children
1058 ['uid', 'username', 'nickname'],
1059 ['parent-uid' => $user['uid'], 'account_removed' => false]
1061 if (DBA::isResult($r)) {
1062 $identities = array_merge($identities, DBA::toArray($r));
1065 // First entry is our parent
1068 ['uid', 'username', 'nickname'],
1069 ['uid' => $user['parent-uid'], 'account_removed' => false]
1071 if (DBA::isResult($r)) {
1072 $identities = DBA::toArray($r);
1075 // Then add all siblings
1078 ['uid', 'username', 'nickname'],
1079 ['parent-uid' => $user['parent-uid'], 'account_removed' => false]
1081 if (DBA::isResult($r)) {
1082 $identities = array_merge($identities, DBA::toArray($r));
1087 "SELECT `user`.`uid`, `user`.`username`, `user`.`nickname`
1089 INNER JOIN `user` ON `manage`.`mid` = `user`.`uid`
1090 WHERE `user`.`account_removed` = 0 AND `manage`.`uid` = ?",
1093 if (DBA::isResult($r)) {
1094 $identities = array_merge($identities, DBA::toArray($r));
1101 * Returns statistical information about the current users of this node
1107 public static function getStatistics()
1111 'active_users_halfyear' => 0,
1112 'active_users_monthly' => 0,
1115 $userStmt = DBA::p("SELECT `user`.`uid`, `user`.`login_date`, `contact`.`last-item`
1117 INNER JOIN `profile` ON `profile`.`uid` = `user`.`uid` AND `profile`.`is-default`
1118 INNER JOIN `contact` ON `contact`.`uid` = `user`.`uid` AND `contact`.`self`
1119 WHERE (`profile`.`publish` OR `profile`.`net-publish`) AND `user`.`verified`
1120 AND NOT `user`.`blocked` AND NOT `user`.`account_removed`
1121 AND NOT `user`.`account_expired`");
1123 if (!DBA::isResult($userStmt)) {
1127 $halfyear = time() - (180 * 24 * 60 * 60);
1128 $month = time() - (30 * 24 * 60 * 60);
1130 while ($user = DBA::fetch($userStmt)) {
1131 $statistics['total_users']++;
1133 if ((strtotime($user['login_date']) > $halfyear) || (strtotime($user['last-item']) > $halfyear)
1135 $statistics['active_users_halfyear']++;
1138 if ((strtotime($user['login_date']) > $month) || (strtotime($user['last-item']) > $month)
1140 $statistics['active_users_monthly']++;