users.py 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176
  1. from fastapi import Response, Request
  2. from fastapi import Depends, FastAPI, HTTPException, status
  3. from datetime import datetime, timedelta
  4. from typing import List, Union, Optional
  5. from fastapi import APIRouter
  6. from pydantic import BaseModel
  7. import time
  8. import uuid
  9. import logging
  10. from apps.web.models.users import UserModel, UserUpdateForm, UserRoleUpdateForm, Users
  11. from apps.web.models.auths import Auths
  12. from apps.web.models.chats import Chats
  13. from utils.utils import get_verified_user, get_password_hash, get_admin_user
  14. from constants import ERROR_MESSAGES
  15. from config import SRC_LOG_LEVELS
  16. log = logging.getLogger(__name__)
  17. log.setLevel(SRC_LOG_LEVELS["MODELS"])
  18. router = APIRouter()
  19. ############################
  20. # GetUsers
  21. ############################
  22. @router.get("/", response_model=List[UserModel])
  23. async def get_users(skip: int = 0, limit: int = 50, user=Depends(get_admin_user)):
  24. return Users.get_users(skip, limit)
  25. ############################
  26. # User Permissions
  27. ############################
  28. @router.get("/permissions/user")
  29. async def get_user_permissions(request: Request, user=Depends(get_admin_user)):
  30. return request.app.state.config.USER_PERMISSIONS
  31. @router.post("/permissions/user")
  32. async def update_user_permissions(
  33. request: Request, form_data: dict, user=Depends(get_admin_user)
  34. ):
  35. request.app.state.config.USER_PERMISSIONS = form_data
  36. return request.app.state.config.USER_PERMISSIONS
  37. ############################
  38. # UpdateUserRole
  39. ############################
  40. @router.post("/update/role", response_model=Optional[UserModel])
  41. async def update_user_role(form_data: UserRoleUpdateForm, user=Depends(get_admin_user)):
  42. if user.id != form_data.id and form_data.id != Users.get_first_user().id:
  43. return Users.update_user_role_by_id(form_data.id, form_data.role)
  44. raise HTTPException(
  45. status_code=status.HTTP_403_FORBIDDEN,
  46. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  47. )
  48. ############################
  49. # GetUserById
  50. ############################
  51. class UserResponse(BaseModel):
  52. name: str
  53. profile_image_url: str
  54. @router.get("/{user_id}", response_model=UserResponse)
  55. async def get_user_by_id(user_id: str, user=Depends(get_verified_user)):
  56. if user_id.startswith("shared-"):
  57. chat_id = user_id.replace("shared-", "")
  58. chat = Chats.get_chat_by_id(chat_id)
  59. if chat:
  60. user_id = chat.user_id
  61. else:
  62. raise HTTPException(
  63. status_code=status.HTTP_400_BAD_REQUEST,
  64. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  65. )
  66. user = Users.get_user_by_id(user_id)
  67. if user:
  68. return UserResponse(name=user.name, profile_image_url=user.profile_image_url)
  69. else:
  70. raise HTTPException(
  71. status_code=status.HTTP_400_BAD_REQUEST,
  72. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  73. )
  74. ############################
  75. # UpdateUserById
  76. ############################
  77. @router.post("/{user_id}/update", response_model=Optional[UserModel])
  78. async def update_user_by_id(
  79. user_id: str, form_data: UserUpdateForm, session_user=Depends(get_admin_user)
  80. ):
  81. user = Users.get_user_by_id(user_id)
  82. if user:
  83. if form_data.email.lower() != user.email:
  84. email_user = Users.get_user_by_email(form_data.email.lower())
  85. if email_user:
  86. raise HTTPException(
  87. status_code=status.HTTP_400_BAD_REQUEST,
  88. detail=ERROR_MESSAGES.EMAIL_TAKEN,
  89. )
  90. if form_data.password:
  91. hashed = get_password_hash(form_data.password)
  92. log.debug(f"hashed: {hashed}")
  93. Auths.update_user_password_by_id(user_id, hashed)
  94. Auths.update_email_by_id(user_id, form_data.email.lower())
  95. updated_user = Users.update_user_by_id(
  96. user_id,
  97. {
  98. "name": form_data.name,
  99. "email": form_data.email.lower(),
  100. "profile_image_url": form_data.profile_image_url,
  101. },
  102. )
  103. if updated_user:
  104. return updated_user
  105. raise HTTPException(
  106. status_code=status.HTTP_400_BAD_REQUEST,
  107. detail=ERROR_MESSAGES.DEFAULT(),
  108. )
  109. raise HTTPException(
  110. status_code=status.HTTP_400_BAD_REQUEST,
  111. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  112. )
  113. ############################
  114. # DeleteUserById
  115. ############################
  116. @router.delete("/{user_id}", response_model=bool)
  117. async def delete_user_by_id(user_id: str, user=Depends(get_admin_user)):
  118. if user.id != user_id:
  119. result = Auths.delete_auth_by_id(user_id)
  120. if result:
  121. return True
  122. raise HTTPException(
  123. status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
  124. detail=ERROR_MESSAGES.DELETE_USER_ERROR,
  125. )
  126. raise HTTPException(
  127. status_code=status.HTTP_403_FORBIDDEN,
  128. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  129. )