=========== Controllers =========== .. sectionauthor:: Bernhard Posselt Controllers are used to connect :doc:`routes ` with app logic. Think of it as callbacks that are executed once a request has come in. Controllers are defined inside the **lib/Controller/** directory. To create a controller, simply extend the Controller class and create a method that should be executed on a request: .. code-block:: php $id = 3 // $doMore = false // $value = 3.5 } } The following types will be cast: * **bool** or **boolean** * **float** * **int** or **integer** JSON parameters ^^^^^^^^^^^^^^^ It is possible to pass JSON using a POST, PUT or PATCH request. To do that the **Content-Type** header has to be set to **application/json**. The JSON is being parsed as an array and the first level keys will be used to pass in the arguments, e.g.:: POST /index.php/apps/myapp/authors Content-Type: application/json { "name": "test", "number": 3, "publisher": true, "customFields": { "mail": "test@example.com", "address": "Somewhere" } } .. code-block:: php "test@example.com", "address" => "Somewhere") } } Reading headers, files, cookies and environment variables ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Headers, files, cookies and environment variables can be accessed directly from the request object: .. code-block:: php request->getHeader('Content-Type'); // $_SERVER['HTTP_CONTENT_TYPE'] $cookie = $this->request->getCookie('myCookie'); // $_COOKIES['myCookie'] $file = $this->request->getUploadedFile('myfile'); // $_FILES['myfile'] $env = $this->request->getEnv('SOME_VAR'); // $_ENV['SOME_VAR'] } } Why should those values be accessed from the request object and not from the global array like $_FILES? Simple: `because it's bad practice `_ and will make testing harder. .. _controller-use-session: Reading and writing session variables ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ To set, get or modify session variables, the ISession object has to be injected into the controller. Nextcloud will read existing session data at the beginning of the request lifecycle and close the session afterwards. This means that in order to write to the session, the session has to be opened first. This is done implicitly when calling the set method, but would close immediately afterwards. To prevent this, the session has to be explicitly opened by calling the reopen method. Alternatively, you can use the ``#[UseSession]`` attribute to automatically open and close the session for you. .. code-block:: php :emphasize-lines: 2,7 use OCP\AppFramework\Controller; use OCP\AppFramework\Http\Attribute\UseSession; use OCP\AppFramework\Http\Response; class PageController extends Controller { #[UseSession] public function writeASessionVariable(): Response { // ... } } .. note:: The ``#[UseSession]`` was added in Nextcloud 26 and requires PHP 8.0 or later. If your app targets older releases and PHP 7.x then use the deprecated ``@UseSession`` annotation. .. code-block:: php :emphasize-lines: 2 /** * @UseSession */ public function writeASessionVariable(): Response { // .... } In case the session may be read and written by concurrent requests of your application, keeping the session open during your controller method execution may be required to ensure that the session is locked and no other request can write to the session at the same time. When reopening the session, the session data will also get updated with the latest changes from other requests. Using the annotation will keep the session lock for the whole duration of the controller method execution. For additional information on how session locking works in PHP see the article about `PHP Session Locking: How To Prevent Sessions Blocking in PHP requests `_. Then session variables can be accessed like this: .. note:: The session is closed automatically for writing, unless you add the ``#[UseSession]`` attribute! .. code-block:: php session = $session; } #[UseSession] public function writeASessionVariable(): Response { // read a session variable $value = $this->session['value']; // write a session variable $this->session['value'] = 'new value'; } } Setting cookies ^^^^^^^^^^^^^^^ Cookies can be set or modified directly on the response class: .. code-block:: php addCookie('foo', 'bar'); $response->addCookie('bar', 'foo', new DateTime('2015-01-01 00:00')); return $response; } /** * Invalidates the cookie "foo" * Invalidates the cookie "bar" and "bazinga" */ public function invalidateCookie(): TemplateResponse { $response = new TemplateResponse(...); $response->invalidateCookie('foo'); $response->invalidateCookies(array('bar', 'bazinga')); return $response; } } Responses --------- Similar to how every controller receives a request object, every controller method has to return a Response. This can be in the form of a Response subclass or in the form of a value that can be handled by a registered responder. There are different kinds of responses available, like HTML-based responses, data responses, or other. The app decides of which kind the response is, by returning an appropriate ``Response`` object in the corresponding controller method. The following sections give an overview over the various kinds and how to implement them. .. _controller_html_responses: HTML-based Responses -------------------- HTML pages are typically served using template responses. This is typically used as a starting point to load the website. This code linked by the template is by default encapsulated by the server to provide some common styling (e.g. the header row). The code then uses JavaScript to load further components (see :ref:`Frontend building in Vue`) and the actual data. This section only focuses on the actual HTML content, not the data to fill into the dynamic pages. .. _controller_template: Templates ^^^^^^^^^ A :doc:`template ` can be rendered by returning a TemplateResponse. A TemplateResponse takes the following parameters: * **appName**: tells the template engine in which app the template should be located * **templateName**: the name of the template inside the templates/ folder without the .php extension * **parameters**: optional array parameters that are available in the template through $_, e.g.:: array('key' => 'something') can be accessed through:: $_['key'] * **renderAs**: defaults to *user*, tells Nextcloud if it should include it in the web interface, or in case *blank* is passed solely render the template .. code-block:: php 'hi'); return new TemplateResponse($this->appName, $templateName, $parameters); } } Showing a template is the only exception to the rule to :ref:`not disable CSRF checks `: The user might type the URL directly (or use a browser bookmark or similar) to navigate to a HTML template. Therefore, usage of the ``#[NoCSRFRequired]`` attribute (see :ref:`below`) is acceptable in this context. Public page templates ^^^^^^^^^^^^^^^^^^^^^ For public pages, that are rendered to users who are not logged in to the Nextcloud instance, a ``OCP\\AppFramework\\Http\\Template\\PublicTemplateResponse`` should be used, to load the correct base template. It also allows adding an optional set of actions that will be shown in the top right corner of the public page. .. code-block:: php appName, 'main', []); $template->setHeaderTitle('Public page'); $template->setHeaderDetails('some details'); $template->setHeaderActions([ new SimpleMenuAction('download', 'Label 1', 'icon-css-class1', 'link-url', 0), new SimpleMenuAction('share', 'Label 2', 'icon-css-class2', 'link-url', 10), ]); return $template; } } The header title and subtitle will be rendered in the header, next to the logo. The action with the highest priority (lowest number) will be used as the primary action, others will shown in the popover menu on demand. A ``OCP\\AppFramework\\Http\\Template\\SimpleMenuAction`` will be a link with an icon added to the menu. App developers can implement their own types of menu renderings by adding a custom class implementing the ``OCP\\AppFramework\\Http\\Template\\IMenuAction`` interface. As the public template is also some HTML template, the same argumentation as for :ref:`regular templates` regarding the CSRF checks hold true: The usage of ``#[NoCSRFRequired]`` for public pages is considered acceptable for some pages: Each page that the user should be able to directly access (by typing/pastig the URL in the browser or clicking on a link in a mail) should have this attribute set. For multi-page forms in the second and later stages, this should **not** be set as the user should follow the series of pages. Data-based responses -------------------- In contrast to the HTML template responses, the data responses return some user-data in packed form. There are different encodings thinkable like JSON, XML, or other formats. The main point is that the data is requested by the browser using JavaScript on behalf of the shown website. The user only indirectly requested the data by user interaction with the frontend. .. _ocscontroller: OCS ^^^ In order to simplify exchange of data between the Nextcloud backend and any client (be it the web frontend or whatever else), the OCS API has been introduced. Here, JSON and XML responders have been prepared and are installed without additional effort. .. note:: The usage of OCS is closely related to the usage of :doc:`../digging_deeper/rest_apis`. Unless you have a clear use-case, it is advised to use OCS over pure REST. A more detailed description can be found in :ref:`ocs-vs-rest`. To use OCS in your API you can use the **OCP\\AppFramework\\OCSController** base class and return your data in the form of a **DataResponse** in the following way: .. code-block:: php ` can be registered as with any other ``Controller`` method. The ``OCSController`` class have however automatically two responders pre-installed: Both JSON (``application/json``) and XML (``text/xml``) are generated on-the-fly depending on the request by the browser/user. To select the output format, the ``?format=`` query parameter or the ``Accept`` header of the request work out of the box, no intervention is required. It is advised to prefer the header generally, as this is the more standardized way. To make routing work for OCS, the route must be registered in the core. This can be done in two ways: You can add an attribute `#[ApiRoute]` to the controller method. Alternatively, you can add :ref:`a separate 'ocs' entry` to the routing table in ``appinfo/routes.php`` of your app. Inside these, there are the same information as there are for normal routes. .. code-block:: php [ [ 'name' => 'Share#getShares', 'url' => '/api/v1/shares', 'verb' => 'GET', ], ], ]; Now your method will be reachable via ``/ocs/v2.php/apps//api/v1/shares`` .. versionadded:: 29 You can use the attribute ``ApiRoute`` as described in :doc:`Routing ` instead of the entry in ``appinfo/routes.php`` as an alternative. JSON ^^^^ .. warning:: The usage of standard controller to access content data like JSON (no HTML) is considered legacy. Better use :ref:`OCS ` for this type of requests. Returning JSON is simple, just pass an array to a JSONResponse: .. code-block:: php 'hi'); return new JSONResponse($params); } } Because returning JSON is such a common task, there's even a shorter way to do this: .. code-block:: php 'hi'); } } Why does this work? Because the dispatcher sees that the controller did not return a subclass of a Response and asks the controller to turn the value into a Response. That's where responders come in. .. deprecated:: 30 Usage of "index.php"-controllers for data transmission should be avoided. Use OCS instead. Handling errors ^^^^^^^^^^^^^^^ Sometimes a request should fail, for instance if an author with id 1 is requested but does not exist. In that case use an appropriate `HTTP error code `_ to signal the client that an error occurred. Each response subclass has access to the **setStatus** method which lets you set an HTTP status code. To return a JSONResponse signaling that the author with id 1 has not been found, use the following code: .. code-block:: php registerResponder('xml', function($value) { if ($value instanceof DataResponse) { return new XMLResponse( $value->getData(), $value->getStatus(), $value->getHeaders() ); } else { return new XMLResponse($value); } }); return array('test' => 'hi'); } } .. note:: The above example would only return XML if the **format** parameter was *xml*. If you want to return an XMLResponse regardless of the format parameter, extend the Response class and return a new instance of it from the controller method instead. Because returning values works fine in case of a success but not in case of failure that requires a custom HTTP error code, you can always wrap the value in a **DataResponse**. This works for both normal responses and error responses. .. code-block:: php 'not found!'), Http::STATUS_NOT_FOUND); } } } Miscellaneous responses ----------------------- Some special responses are available as well. These are discussed here. Redirects ^^^^^^^^^ A redirect can be achieved by returning a RedirectResponse: .. code-block:: php addHeader('Content-Type', 'application/xml'); $this->xml = $xml; } public function render(): string { $root = new SimpleXMLElement(''); array_walk_recursive($this->xml, array ($root, 'addChild')); return $xml->asXML(); } } Streamed and lazily rendered responses ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ By default all responses are rendered at once and sent as a string through middleware. In certain cases this is not a desirable behavior, for instance if you want to stream a file in order to save memory. To do that use the now available **OCP\\AppFramework\\Http\\StreamResponse** class: .. code-block:: php index()`` method should not check the CSRF token because it has not yet been sent to the client and because of that can't work. To turn off checks the following *Attributes* can be added before the controller: * ``#[NoAdminRequired]``: Also users that are not admins can access the page * ``#[PublicPage]``: Everyone can access the page without having to log in * ``#[NoTwoFactorRequired]``: A user can access the page before the two-factor challenge has been passed (use this wisely and only in two-factor auth apps, e.g. to allow setup during login) * ``#[NoCSRFRequired]``: Don't check the CSRF token (use this wisely since you might create a security hole; to understand what it does see `CSRF in the security section <../prologue/security.html#cross-site-request-forgery>`__) .. note:: The attributes are only available in Nextcloud 27 or later. In older versions annotations with the same names exist: * ``@NoAdminRequired`` instead of ``#[NoAdminRequired]`` * ``@PublicPage``` instead of ``#[PublicPage]`` * ``@NoTwoFactorRequired``` instead of ``#[NoTwoFactorRequired]`` * ``@NoCSRFRequired``` instead of ``#[NoCSRFRequired]`` In the following some examples of configurations are given. Showing an HTML page by the user ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ A typical app needs an ``index.html`` page to show all content within. This page should be visible by all users in the instance. Therefore, you need to loosen the restriction from admins only (``#[NoAdminRequired]``). Additionally, as the user might not have a CSRF checker cookie set yet, the CSRF checks should be disabled (which is fine as this is a template response). .. code-block:: php appName, 'main'); } } If the page should only be visible to the admin, you can keep the restrictive default by omitting the attribute ``#[NoAdminRequired]``. Getting data from the backend using AJAX requests ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Data for the frontend needs to be made available from the backend. Here, OCS is the suggested way to go. Here is the example from :ref:`OCS controllers `: .. code-block:: php `. By default controller methods are not rate limited. Rate limiting should be used on expensive or security sensitive functions (e.g. password resets) to increase the overall security of your application. The native rate limiting will return a 429 status code to clients when the limit is reached and a default Nextcloud error page. When implementing rate limiting in your application, you should thus consider handling error situations where a 429 is returned by Nextcloud. To enable rate limiting the following *Attributes* can be added to the controller: * ``#[UserRateLimit(limit: int, period: int)]``: The rate limiting that is applied to logged-in users. If not specified Nextcloud will fallback to ``AnonRateLimit`` if available. * ``#[AnonRateLimit(limit: int, period: int)]``: The rate limiting that is applied to guests. .. note:: The attributes are only available in Nextcloud 27 or later. In older versions the ``@UserRateThrottle(limit=int, period=int)`` and ``@AnonRateThrottle(limit=int, period=int)`` annotation can be used. If both are present, the attribute will be considered first. A controller method that would allow five requests for logged-in users and one request for anonymous users within the last 100 seconds would look as following: .. code-block:: php :emphasize-lines: 14-15 auth->isSuccessful here is just an // example. if (!$this->auth->isSuccessful()) { $templateResponse->throttle(); } return $templateResponse; } } A controller can also have multiple factors to brute force against. In this case you can specify multiple attributes and then in the throttle you specify the action which was violated. This is especially useful when a secret, in the sample below token, could be guessed on multiple endpoints e.g. a share token on the API level, preview endpoint, frontend controller, etc. while another secret (password), is specific to this one controller method. .. code-block:: php :emphasize-lines: 11-12,16,20 shareManager->getByToken($token)) { $templateResponse->throttle(['action' => 'token']); } // … if (!$share->verifyPassword($password)) { $templateResponse->throttle(['action' => 'password']); } return $templateResponse; } } Modifying the content security policy ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ By default Nextcloud disables all resources which are not served on the same domain, forbids cross domain requests and disables inline CSS and JavaScript by setting a `Content Security Policy `_. However if an app relies on third-party media or other features which are forbidden by the current policy the policy can be relaxed. .. note:: Double check your content and edge cases before you relax the policy! Also read the `documentation provided by MDN `_ To relax the policy pass an instance of the ContentSecurityPolicy class to your response. The methods on the class can be chained. The following methods turn off security features by passing in **true** as the **$isAllowed** parameter * **allowInlineScript** (bool $isAllowed) * **allowInlineStyle** (bool $isAllowed) * **allowEvalScript** (bool $isAllowed) * **useStrictDynamic** (bool $isAllowed) Trust all scripts that are loaded by a trusted script, see 'script-src' and 'strict-dynamic' * **useStrictDynamicOnScripts** (bool $isAllowed) Trust all scripts that are loaded by a trusted script which was loaded using a ``