4 * @file src/Model/User.php
5 * @brief This file includes the User class with user related database functions
8 namespace Friendica\Model;
10 use DivineOmega\PasswordExposed;
12 use Friendica\Core\Config;
13 use Friendica\Core\Hook;
14 use Friendica\Core\L10n;
15 use Friendica\Core\Logger;
16 use Friendica\Core\PConfig;
17 use Friendica\Core\Protocol;
18 use Friendica\Core\System;
19 use Friendica\Core\Worker;
20 use Friendica\Database\DBA;
21 use Friendica\Model\Photo;
22 use Friendica\Model\TwoFactor\AppSpecificPassword;
23 use Friendica\Object\Image;
24 use Friendica\Util\Crypto;
25 use Friendica\Util\DateTimeFormat;
26 use Friendica\Util\Network;
27 use Friendica\Util\Strings;
28 use Friendica\Worker\Delivery;
32 * @brief This class handles User related functions
39 * PAGE_FLAGS_NORMAL is a typical personal profile account
40 * PAGE_FLAGS_SOAPBOX automatically approves all friend requests as Contact::SHARING, (readonly)
41 * PAGE_FLAGS_COMMUNITY automatically approves all friend requests as Contact::SHARING, but with
42 * write access to wall and comments (no email and not included in page owner's ACL lists)
43 * PAGE_FLAGS_FREELOVE automatically approves all friend requests as full friends (Contact::FRIEND).
47 const PAGE_FLAGS_NORMAL = 0;
48 const PAGE_FLAGS_SOAPBOX = 1;
49 const PAGE_FLAGS_COMMUNITY = 2;
50 const PAGE_FLAGS_FREELOVE = 3;
51 const PAGE_FLAGS_BLOG = 4;
52 const PAGE_FLAGS_PRVGROUP = 5;
60 * ACCOUNT_TYPE_PERSON - the account belongs to a person
61 * Associated page types: PAGE_FLAGS_NORMAL, PAGE_FLAGS_SOAPBOX, PAGE_FLAGS_FREELOVE
63 * ACCOUNT_TYPE_ORGANISATION - the account belongs to an organisation
64 * Associated page type: PAGE_FLAGS_SOAPBOX
66 * ACCOUNT_TYPE_NEWS - the account is a news reflector
67 * Associated page type: PAGE_FLAGS_SOAPBOX
69 * ACCOUNT_TYPE_COMMUNITY - the account is community forum
70 * Associated page types: PAGE_COMMUNITY, PAGE_FLAGS_PRVGROUP
72 * ACCOUNT_TYPE_RELAY - the account is a relay
73 * This will only be assigned to contacts, not to user accounts
76 const ACCOUNT_TYPE_PERSON = 0;
77 const ACCOUNT_TYPE_ORGANISATION = 1;
78 const ACCOUNT_TYPE_NEWS = 2;
79 const ACCOUNT_TYPE_COMMUNITY = 3;
80 const ACCOUNT_TYPE_RELAY = 4;
86 * Returns true if a user record exists with the provided id
92 public static function exists($uid)
94 return DBA::exists('user', ['uid' => $uid]);
99 * @param array $fields
100 * @return array|boolean User record if it exists, false otherwise
103 public static function getById($uid, array $fields = [])
105 return DBA::selectFirst('user', $fields, ['uid' => $uid]);
109 * @param string $nickname
110 * @param array $fields
111 * @return array|boolean User record if it exists, false otherwise
114 public static function getByNickname($nickname, array $fields = [])
116 return DBA::selectFirst('user', $fields, ['nickname' => $nickname]);
120 * @brief Returns the user id of a given profile URL
124 * @return integer user id
127 public static function getIdForURL($url)
129 $self = DBA::selectFirst('contact', ['uid'], ['nurl' => Strings::normaliseLink($url), 'self' => true]);
130 if (!DBA::isResult($self)) {
138 * Get a user based on its email
140 * @param string $email
141 * @param array $fields
143 * @return array|boolean User record if it exists, false otherwise
147 public static function getByEmail($email, array $fields = [])
149 return DBA::selectFirst('user', $fields, ['email' => $email]);
153 * @brief Get owner data by user id
156 * @param boolean $check_valid Test if data is invalid and correct it
157 * @return boolean|array
160 public static function getOwnerDataById($uid, $check_valid = true)
162 $r = DBA::fetchFirst(
165 `user`.`prvkey` AS `uprvkey`,
171 `user`.`account-type`,
173 `user`.`account_removed`
176 ON `user`.`uid` = `contact`.`uid`
177 WHERE `contact`.`uid` = ?
182 if (!DBA::isResult($r)) {
186 if (empty($r['nickname'])) {
194 // Check if the returned data is valid, otherwise fix it. See issue #6122
196 // Check for correct url and normalised nurl
197 $url = System::baseUrl() . '/profile/' . $r['nickname'];
198 $repair = ($r['url'] != $url) || ($r['nurl'] != Strings::normaliseLink($r['url']));
201 // Check if "addr" is present and correct
202 $addr = $r['nickname'] . '@' . substr(System::baseUrl(), strpos(System::baseUrl(), '://') + 3);
203 $repair = ($addr != $r['addr']);
207 // Check if the avatar field is filled and the photo directs to the correct path
208 $avatar = Photo::selectFirst(['resource-id'], ['uid' => $uid, 'profile' => true]);
209 if (DBA::isResult($avatar)) {
210 $repair = empty($r['avatar']) || !strpos($r['photo'], $avatar['resource-id']);
215 Contact::updateSelfFromUserID($uid);
216 // Return the corrected data and avoid a loop
217 $r = self::getOwnerDataById($uid, false);
224 * @brief Get owner data by nick name
227 * @return boolean|array
230 public static function getOwnerDataByNick($nick)
232 $user = DBA::selectFirst('user', ['uid'], ['nickname' => $nick]);
234 if (!DBA::isResult($user)) {
238 return self::getOwnerDataById($user['uid']);
242 * @brief Returns the default group for a given user and network
244 * @param int $uid User id
245 * @param string $network network name
247 * @return int group id
248 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
250 public static function getDefaultGroup($uid, $network = '')
254 if ($network == Protocol::OSTATUS) {
255 $default_group = PConfig::get($uid, "ostatus", "default_group");
258 if ($default_group != 0) {
259 return $default_group;
262 $user = DBA::selectFirst('user', ['def_gid'], ['uid' => $uid]);
264 if (DBA::isResult($user)) {
265 $default_group = $user["def_gid"];
268 return $default_group;
273 * Authenticate a user with a clear text password
275 * @brief Authenticate a user with a clear text password
276 * @param mixed $user_info
277 * @param string $password
278 * @param bool $third_party
279 * @return int|boolean
280 * @deprecated since version 3.6
281 * @see User::getIdFromPasswordAuthentication()
283 public static function authenticate($user_info, $password, $third_party = false)
286 return self::getIdFromPasswordAuthentication($user_info, $password, $third_party);
287 } catch (Exception $ex) {
293 * Returns the user id associated with a successful password authentication
295 * @brief Authenticate a user with a clear text password
296 * @param mixed $user_info
297 * @param string $password
298 * @param bool $third_party
299 * @return int User Id if authentication is successful
302 public static function getIdFromPasswordAuthentication($user_info, $password, $third_party = false)
304 $user = self::getAuthenticationInfo($user_info);
306 if ($third_party && PConfig::get($user['uid'], '2fa', 'verified')) {
307 // Third-party apps can't verify two-factor authentication, we use app-specific passwords instead
308 if (AppSpecificPassword::authenticateUser($user['uid'], $password)) {
311 } elseif (strpos($user['password'], '$') === false) {
312 //Legacy hash that has not been replaced by a new hash yet
313 if (self::hashPasswordLegacy($password) === $user['password']) {
314 self::updatePasswordHashed($user['uid'], self::hashPassword($password));
318 } elseif (!empty($user['legacy_password'])) {
319 //Legacy hash that has been double-hashed and not replaced by a new hash yet
320 //Warning: `legacy_password` is not necessary in sync with the content of `password`
321 if (password_verify(self::hashPasswordLegacy($password), $user['password'])) {
322 self::updatePasswordHashed($user['uid'], self::hashPassword($password));
326 } elseif (password_verify($password, $user['password'])) {
328 if (password_needs_rehash($user['password'], PASSWORD_DEFAULT)) {
329 self::updatePasswordHashed($user['uid'], self::hashPassword($password));
335 throw new Exception(L10n::t('Login failed'));
339 * Returns authentication info from various parameters types
341 * User info can be any of the following:
344 * - User email or username or nickname
345 * - User array with at least the uid and the hashed password
347 * @param mixed $user_info
351 private static function getAuthenticationInfo($user_info)
355 if (is_object($user_info) || is_array($user_info)) {
356 if (is_object($user_info)) {
357 $user = (array) $user_info;
364 || !isset($user['password'])
365 || !isset($user['legacy_password'])
367 throw new Exception(L10n::t('Not enough information to authenticate'));
369 } elseif (is_int($user_info) || is_string($user_info)) {
370 if (is_int($user_info)) {
371 $user = DBA::selectFirst(
373 ['uid', 'password', 'legacy_password'],
377 'account_expired' => 0,
378 'account_removed' => 0,
383 $fields = ['uid', 'password', 'legacy_password'];
385 "(`email` = ? OR `username` = ? OR `nickname` = ?)
386 AND NOT `blocked` AND NOT `account_expired` AND NOT `account_removed` AND `verified`",
387 $user_info, $user_info, $user_info
389 $user = DBA::selectFirst('user', $fields, $condition);
392 if (!DBA::isResult($user)) {
393 throw new Exception(L10n::t('User not found'));
401 * Generates a human-readable random password
405 public static function generateNewPassword()
407 return ucfirst(Strings::getRandomName(8)) . random_int(1000, 9999);
411 * Checks if the provided plaintext password has been exposed or not
413 * @param string $password
417 public static function isPasswordExposed($password)
419 $cache = new \DivineOmega\DOFileCachePSR6\CacheItemPool();
420 $cache->changeConfig([
421 'cacheDirectory' => get_temppath() . '/password-exposed-cache/',
425 $passwordExposedChecker = new PasswordExposed\PasswordExposedChecker(null, $cache);
427 return $passwordExposedChecker->passwordExposed($password) === PasswordExposed\PasswordStatus::EXPOSED;
428 } catch (\Exception $e) {
429 Logger::error('Password Exposed Exception: ' . $e->getMessage(), [
430 'code' => $e->getCode(),
431 'file' => $e->getFile(),
432 'line' => $e->getLine(),
433 'trace' => $e->getTraceAsString()
441 * Legacy hashing function, kept for password migration purposes
443 * @param string $password
446 private static function hashPasswordLegacy($password)
448 return hash('whirlpool', $password);
452 * Global user password hashing function
454 * @param string $password
458 public static function hashPassword($password)
460 if (!trim($password)) {
461 throw new Exception(L10n::t('Password can\'t be empty'));
464 return password_hash($password, PASSWORD_DEFAULT);
468 * Updates a user row with a new plaintext password
471 * @param string $password
475 public static function updatePassword($uid, $password)
477 $password = trim($password);
479 if (empty($password)) {
480 throw new Exception(L10n::t('Empty passwords are not allowed.'));
483 if (!Config::get('system', 'disable_password_exposed', false) && self::isPasswordExposed($password)) {
484 throw new Exception(L10n::t('The new password has been exposed in a public data dump, please choose another.'));
487 $allowed_characters = '!"#$%&\'()*+,-./;<=>?@[\]^_`{|}~';
489 if (!preg_match('/^[a-z0-9' . preg_quote($allowed_characters, '/') . ']+$/i', $password)) {
490 throw new Exception(L10n::t('The password can\'t contain accentuated letters, white spaces or colons (:)'));
493 return self::updatePasswordHashed($uid, self::hashPassword($password));
497 * Updates a user row with a new hashed password.
498 * Empties the password reset token field just in case.
501 * @param string $pasword_hashed
505 private static function updatePasswordHashed($uid, $pasword_hashed)
508 'password' => $pasword_hashed,
510 'pwdreset_time' => null,
511 'legacy_password' => false
513 return DBA::update('user', $fields, ['uid' => $uid]);
517 * @brief Checks if a nickname is in the list of the forbidden nicknames
519 * Check if a nickname is forbidden from registration on the node by the
520 * admin. Forbidden nicknames (e.g. role namess) can be configured in the
523 * @param string $nickname The nickname that should be checked
524 * @return boolean True is the nickname is blocked on the node
525 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
527 public static function isNicknameBlocked($nickname)
529 $forbidden_nicknames = Config::get('system', 'forbidden_nicknames', '');
531 // if the config variable is empty return false
532 if (empty($forbidden_nicknames)) {
536 // check if the nickname is in the list of blocked nicknames
537 $forbidden = explode(',', $forbidden_nicknames);
538 $forbidden = array_map('trim', $forbidden);
539 if (in_array(strtolower($nickname), $forbidden)) {
548 * @brief Catch-all user creation function
550 * Creates a user from the provided data array, either form fields or OpenID.
551 * Required: { username, nickname, email } or { openid_url }
553 * Performs the following:
554 * - Sends to the OpenId auth URL (if relevant)
555 * - Creates new key pairs for crypto
556 * - Create self-contact
557 * - Create profile image
561 * @throws \ErrorException
562 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
563 * @throws \ImagickException
566 public static function create(array $data)
569 $return = ['user' => null, 'password' => ''];
571 $using_invites = Config::get('system', 'invitation_only');
573 $invite_id = !empty($data['invite_id']) ? Strings::escapeTags(trim($data['invite_id'])) : '';
574 $username = !empty($data['username']) ? Strings::escapeTags(trim($data['username'])) : '';
575 $nickname = !empty($data['nickname']) ? Strings::escapeTags(trim($data['nickname'])) : '';
576 $email = !empty($data['email']) ? Strings::escapeTags(trim($data['email'])) : '';
577 $openid_url = !empty($data['openid_url']) ? Strings::escapeTags(trim($data['openid_url'])) : '';
578 $photo = !empty($data['photo']) ? Strings::escapeTags(trim($data['photo'])) : '';
579 $password = !empty($data['password']) ? trim($data['password']) : '';
580 $password1 = !empty($data['password1']) ? trim($data['password1']) : '';
581 $confirm = !empty($data['confirm']) ? trim($data['confirm']) : '';
582 $blocked = !empty($data['blocked']);
583 $verified = !empty($data['verified']);
584 $language = !empty($data['language']) ? Strings::escapeTags(trim($data['language'])) : 'en';
586 $publish = !empty($data['profile_publish_reg']);
587 $netpublish = $publish && Config::get('system', 'directory');
589 if ($password1 != $confirm) {
590 throw new Exception(L10n::t('Passwords do not match. Password unchanged.'));
591 } elseif ($password1 != '') {
592 $password = $password1;
595 if ($using_invites) {
597 throw new Exception(L10n::t('An invitation is required.'));
600 if (!Register::existsByHash($invite_id)) {
601 throw new Exception(L10n::t('Invitation could not be verified.'));
605 if (empty($username) || empty($email) || empty($nickname)) {
607 if (!Network::isUrlValid($openid_url)) {
608 throw new Exception(L10n::t('Invalid OpenID url'));
610 $_SESSION['register'] = 1;
611 $_SESSION['openid'] = $openid_url;
613 $openid = new LightOpenID($a->getHostName());
614 $openid->identity = $openid_url;
615 $openid->returnUrl = System::baseUrl() . '/openid';
616 $openid->required = ['namePerson/friendly', 'contact/email', 'namePerson'];
617 $openid->optional = ['namePerson/first', 'media/image/aspect11', 'media/image/default'];
619 $authurl = $openid->authUrl();
620 } catch (Exception $e) {
621 throw new Exception(L10n::t('We encountered a problem while logging in with the OpenID you provided. Please check the correct spelling of the ID.') . EOL . EOL . L10n::t('The error message was:') . $e->getMessage(), 0, $e);
623 System::externalRedirect($authurl);
627 throw new Exception(L10n::t('Please enter the required information.'));
630 if (!Network::isUrlValid($openid_url)) {
634 // collapse multiple spaces in name
635 $username = preg_replace('/ +/', ' ', $username);
637 $username_min_length = max(1, min(64, intval(Config::get('system', 'username_min_length', 3))));
638 $username_max_length = max(1, min(64, intval(Config::get('system', 'username_max_length', 48))));
640 if ($username_min_length > $username_max_length) {
641 Logger::log(L10n::t('system.username_min_length (%s) and system.username_max_length (%s) are excluding each other, swapping values.', $username_min_length, $username_max_length), Logger::WARNING);
642 $tmp = $username_min_length;
643 $username_min_length = $username_max_length;
644 $username_max_length = $tmp;
647 if (mb_strlen($username) < $username_min_length) {
648 throw new Exception(L10n::tt('Username should be at least %s character.', 'Username should be at least %s characters.', $username_min_length));
651 if (mb_strlen($username) > $username_max_length) {
652 throw new Exception(L10n::tt('Username should be at most %s character.', 'Username should be at most %s characters.', $username_max_length));
655 // So now we are just looking for a space in the full name.
656 $loose_reg = Config::get('system', 'no_regfullname');
658 $username = mb_convert_case($username, MB_CASE_TITLE, 'UTF-8');
659 if (strpos($username, ' ') === false) {
660 throw new Exception(L10n::t("That doesn't appear to be your full (First Last) name."));
664 if (!Network::isEmailDomainAllowed($email)) {
665 throw new Exception(L10n::t('Your email domain is not among those allowed on this site.'));
668 if (!filter_var($email, FILTER_VALIDATE_EMAIL) || !Network::isEmailDomainValid($email)) {
669 throw new Exception(L10n::t('Not a valid email address.'));
671 if (self::isNicknameBlocked($nickname)) {
672 throw new Exception(L10n::t('The nickname was blocked from registration by the nodes admin.'));
675 if (Config::get('system', 'block_extended_register', false) && DBA::exists('user', ['email' => $email])) {
676 throw new Exception(L10n::t('Cannot use that email.'));
679 // Disallow somebody creating an account using openid that uses the admin email address,
680 // since openid bypasses email verification. We'll allow it if there is not yet an admin account.
681 if (Config::get('config', 'admin_email') && strlen($openid_url)) {
682 $adminlist = explode(',', str_replace(' ', '', strtolower(Config::get('config', 'admin_email'))));
683 if (in_array(strtolower($email), $adminlist)) {
684 throw new Exception(L10n::t('Cannot use that email.'));
688 $nickname = $data['nickname'] = strtolower($nickname);
690 if (!preg_match('/^[a-z0-9][a-z0-9\_]*$/', $nickname)) {
691 throw new Exception(L10n::t('Your nickname can only contain a-z, 0-9 and _.'));
694 // Check existing and deleted accounts for this nickname.
696 DBA::exists('user', ['nickname' => $nickname])
697 || DBA::exists('userd', ['username' => $nickname])
699 throw new Exception(L10n::t('Nickname is already registered. Please choose another.'));
702 $new_password = strlen($password) ? $password : User::generateNewPassword();
703 $new_password_encoded = self::hashPassword($new_password);
705 $return['password'] = $new_password;
707 $keys = Crypto::newKeypair(4096);
708 if ($keys === false) {
709 throw new Exception(L10n::t('SERIOUS ERROR: Generation of security keys failed.'));
712 $prvkey = $keys['prvkey'];
713 $pubkey = $keys['pubkey'];
715 // Create another keypair for signing/verifying salmon protocol messages.
716 $sres = Crypto::newKeypair(512);
717 $sprvkey = $sres['prvkey'];
718 $spubkey = $sres['pubkey'];
720 $insert_result = DBA::insert('user', [
721 'guid' => System::createUUID(),
722 'username' => $username,
723 'password' => $new_password_encoded,
725 'openid' => $openid_url,
726 'nickname' => $nickname,
729 'spubkey' => $spubkey,
730 'sprvkey' => $sprvkey,
731 'verified' => $verified,
732 'blocked' => $blocked,
733 'language' => $language,
735 'register_date' => DateTimeFormat::utcNow(),
736 'default-location' => ''
739 if ($insert_result) {
740 $uid = DBA::lastInsertId();
741 $user = DBA::selectFirst('user', [], ['uid' => $uid]);
743 throw new Exception(L10n::t('An error occurred during registration. Please try again.'));
747 throw new Exception(L10n::t('An error occurred during registration. Please try again.'));
750 // if somebody clicked submit twice very quickly, they could end up with two accounts
751 // due to race condition. Remove this one.
752 $user_count = DBA::count('user', ['nickname' => $nickname]);
753 if ($user_count > 1) {
754 DBA::delete('user', ['uid' => $uid]);
756 throw new Exception(L10n::t('Nickname is already registered. Please choose another.'));
759 $insert_result = DBA::insert('profile', [
762 'photo' => System::baseUrl() . "/photo/profile/{$uid}.jpg",
763 'thumb' => System::baseUrl() . "/photo/avatar/{$uid}.jpg",
764 'publish' => $publish,
766 'net-publish' => $netpublish,
767 'profile-name' => L10n::t('default')
769 if (!$insert_result) {
770 DBA::delete('user', ['uid' => $uid]);
772 throw new Exception(L10n::t('An error occurred creating your default profile. Please try again.'));
775 // Create the self contact
776 if (!Contact::createSelfFromUserId($uid)) {
777 DBA::delete('user', ['uid' => $uid]);
779 throw new Exception(L10n::t('An error occurred creating your self contact. Please try again.'));
782 // Create a group with no members. This allows somebody to use it
783 // right away as a default group for new contacts.
784 $def_gid = Group::create($uid, L10n::t('Friends'));
786 DBA::delete('user', ['uid' => $uid]);
788 throw new Exception(L10n::t('An error occurred creating your default contact group. Please try again.'));
791 $fields = ['def_gid' => $def_gid];
792 if (Config::get('system', 'newuser_private') && $def_gid) {
793 $fields['allow_gid'] = '<' . $def_gid . '>';
796 DBA::update('user', $fields, ['uid' => $uid]);
798 // if we have no OpenID photo try to look up an avatar
799 if (!strlen($photo)) {
800 $photo = Network::lookupAvatarByEmail($email);
803 // unless there is no avatar-addon loaded
804 if (strlen($photo)) {
805 $photo_failure = false;
807 $filename = basename($photo);
808 $img_str = Network::fetchUrl($photo, true);
809 // guess mimetype from headers or filename
810 $type = Image::guessType($photo, true);
812 $Image = new Image($img_str, $type);
813 if ($Image->isValid()) {
814 $Image->scaleToSquare(300);
816 $hash = Photo::newResource();
818 $r = Photo::store($Image, $uid, 0, $hash, $filename, L10n::t('Profile Photos'), 4);
821 $photo_failure = true;
824 $Image->scaleDown(80);
826 $r = Photo::store($Image, $uid, 0, $hash, $filename, L10n::t('Profile Photos'), 5);
829 $photo_failure = true;
832 $Image->scaleDown(48);
834 $r = Photo::store($Image, $uid, 0, $hash, $filename, L10n::t('Profile Photos'), 6);
837 $photo_failure = true;
840 if (!$photo_failure) {
841 Photo::update(['profile' => 1], ['resource-id' => $hash]);
846 Hook::callAll('register_account', $uid);
848 $return['user'] = $user;
853 * @brief Sends pending registration confirmation email
855 * @param array $user User record array
856 * @param string $sitename
857 * @param string $siteurl
858 * @param string $password Plaintext password
859 * @return NULL|boolean from notification() and email() inherited
860 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
862 public static function sendRegisterPendingEmail($user, $sitename, $siteurl, $password)
864 $body = Strings::deindent(L10n::t(
867 Thank you for registering at %2$s. Your account is pending for approval by the administrator.
869 Your login details are as follows:
882 return notification([
883 'type' => SYSTEM_EMAIL,
884 'uid' => $user['uid'],
885 'to_email' => $user['email'],
886 'subject' => L10n::t('Registration at %s', $sitename),
892 * @brief Sends registration confirmation
894 * It's here as a function because the mail is sent from different parts
896 * @param array $user User record array
897 * @param string $sitename
898 * @param string $siteurl
899 * @param string $password Plaintext password
900 * @return NULL|boolean from notification() and email() inherited
901 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
903 public static function sendRegisterOpenEmail($user, $sitename, $siteurl, $password)
905 $preamble = Strings::deindent(L10n::t(
908 Thank you for registering at %2$s. Your account has been created.
913 $body = Strings::deindent(L10n::t(
915 The login details are as follows:
921 You may change your password from your account "Settings" page after logging
924 Please take a few moments to review the other account settings on that page.
926 You may also wish to add some basic information to your default profile
927 ' . "\x28" . 'on the "Profiles" page' . "\x29" . ' so that other people can easily find you.
929 We recommend setting your full name, adding a profile photo,
930 adding some profile "keywords" ' . "\x28" . 'very useful in making new friends' . "\x29" . ' - and
931 perhaps what country you live in; if you do not wish to be more specific
934 We fully respect your right to privacy, and none of these items are necessary.
935 If you are new and do not know anybody here, they may help
936 you to make some new and interesting friends.
938 If you ever want to delete your account, you can do so at %3$s/removeme
940 Thank you and welcome to %2$s.',
948 return notification([
949 'uid' => $user['uid'],
950 'language' => $user['language'],
951 'type' => SYSTEM_EMAIL,
952 'to_email' => $user['email'],
953 'subject' => L10n::t('Registration details for %s', $sitename),
954 'preamble' => $preamble,
960 * @param object $uid user to remove
962 * @throws \Friendica\Network\HTTPException\InternalServerErrorException
964 public static function remove($uid)
970 Logger::log('Removing user: ' . $uid);
972 $user = DBA::selectFirst('user', [], ['uid' => $uid]);
974 Hook::callAll('remove_user', $user);
976 // save username (actually the nickname as it is guaranteed
977 // unique), so it cannot be re-registered in the future.
978 DBA::insert('userd', ['username' => $user['nickname']]);
980 // The user and related data will be deleted in "cron_expire_and_remove_users" (cronjobs.php)
981 DBA::update('user', ['account_removed' => true, 'account_expires_on' => DateTimeFormat::utc('now + 7 day')], ['uid' => $uid]);
982 Worker::add(PRIORITY_HIGH, 'Notifier', Delivery::REMOVAL, $uid);
984 // Send an update to the directory
985 $self = DBA::selectFirst('contact', ['url'], ['uid' => $uid, 'self' => true]);
986 Worker::add(PRIORITY_LOW, 'Directory', $self['url']);
988 // Remove the user relevant data
989 Worker::add(PRIORITY_NEGLIGIBLE, 'RemoveUser', $uid);
995 * Return all identities to a user
997 * @param int $uid The user id
998 * @return array All identities for this user
1000 * Example for a return:
1004 * 'username' => 'maxmuster',
1005 * 'nickname' => 'Max Mustermann'
1009 * 'username' => 'johndoe',
1010 * 'nickname' => 'John Doe'
1015 public static function identities($uid)
1019 $user = DBA::selectFirst('user', ['uid', 'nickname', 'username', 'parent-uid'], ['uid' => $uid]);
1020 if (!DBA::isResult($user)) {
1024 if ($user['parent-uid'] == 0) {
1025 // First add our own entry
1027 'uid' => $user['uid'],
1028 'username' => $user['username'],
1029 'nickname' => $user['nickname']
1032 // Then add all the children
1035 ['uid', 'username', 'nickname'],
1036 ['parent-uid' => $user['uid'], 'account_removed' => false]
1038 if (DBA::isResult($r)) {
1039 $identities = array_merge($identities, DBA::toArray($r));
1042 // First entry is our parent
1045 ['uid', 'username', 'nickname'],
1046 ['uid' => $user['parent-uid'], 'account_removed' => false]
1048 if (DBA::isResult($r)) {
1049 $identities = DBA::toArray($r);
1052 // Then add all siblings
1055 ['uid', 'username', 'nickname'],
1056 ['parent-uid' => $user['parent-uid'], 'account_removed' => false]
1058 if (DBA::isResult($r)) {
1059 $identities = array_merge($identities, DBA::toArray($r));
1064 "SELECT `user`.`uid`, `user`.`username`, `user`.`nickname`
1066 INNER JOIN `user` ON `manage`.`mid` = `user`.`uid`
1067 WHERE `user`.`account_removed` = 0 AND `manage`.`uid` = ?",
1070 if (DBA::isResult($r)) {
1071 $identities = array_merge($identities, DBA::toArray($r));
1078 * Returns statistical information about the current users of this node
1084 public static function getStatistics()
1088 'active_users_halfyear' => 0,
1089 'active_users_monthly' => 0,
1092 $userStmt = DBA::p("SELECT `user`.`uid`, `user`.`login_date`, `contact`.`last-item`
1094 INNER JOIN `profile` ON `profile`.`uid` = `user`.`uid` AND `profile`.`is-default`
1095 INNER JOIN `contact` ON `contact`.`uid` = `user`.`uid` AND `contact`.`self`
1096 WHERE (`profile`.`publish` OR `profile`.`net-publish`) AND `user`.`verified`
1097 AND NOT `user`.`blocked` AND NOT `user`.`account_removed`
1098 AND NOT `user`.`account_expired`");
1100 if (!DBA::isResult($userStmt)) {
1104 $halfyear = time() - (180 * 24 * 60 * 60);
1105 $month = time() - (30 * 24 * 60 * 60);
1107 while ($user = DBA::fetch($userStmt)) {
1108 $statistics['total_users']++;
1110 if ((strtotime($user['login_date']) > $halfyear) || (strtotime($user['last-item']) > $halfyear)
1112 $statistics['active_users_halfyear']++;
1115 if ((strtotime($user['login_date']) > $month) || (strtotime($user['last-item']) > $month)
1117 $statistics['active_users_monthly']++;