123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116 |
- from fastapi import Response
- from fastapi import Depends, FastAPI, HTTPException, status
- from datetime import datetime, timedelta
- from typing import List, Union, Optional
- from fastapi import APIRouter
- from pydantic import BaseModel
- import time
- import uuid
- from apps.web.models.users import UserModel, UserRoleUpdateForm, Users
- from apps.web.models.auths import Auths
- from utils.utils import (
- get_password_hash,
- bearer_scheme,
- create_token,
- )
- from constants import ERROR_MESSAGES
- router = APIRouter()
- ############################
- # GetUsers
- ############################
- @router.get("/", response_model=List[UserModel])
- async def get_users(skip: int = 0, limit: int = 50, cred=Depends(bearer_scheme)):
- token = cred.credentials
- user = Users.get_user_by_token(token)
- if user:
- if user.role == "admin":
- return Users.get_users(skip, limit)
- else:
- raise HTTPException(
- status_code=status.HTTP_403_FORBIDDEN,
- detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
- )
- else:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.INVALID_TOKEN,
- )
- ############################
- # UpdateUserRole
- ############################
- @router.post("/update/role", response_model=Optional[UserModel])
- async def update_user_role(form_data: UserRoleUpdateForm, cred=Depends(bearer_scheme)):
- token = cred.credentials
- user = Users.get_user_by_token(token)
- if user:
- if user.role == "admin":
- if user.id != form_data.id:
- return Users.update_user_role_by_id(form_data.id, form_data.role)
- else:
- raise HTTPException(
- status_code=status.HTTP_403_FORBIDDEN,
- detail=ERROR_MESSAGES.ACTION_PROHIBITED,
- )
- else:
- raise HTTPException(
- status_code=status.HTTP_403_FORBIDDEN,
- detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
- )
- else:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.INVALID_TOKEN,
- )
- ############################
- # DeleteUserById
- ############################
- @router.delete("/{user_id}", response_model=bool)
- async def delete_user_by_id(user_id: str, cred=Depends(bearer_scheme)):
- token = cred.credentials
- user = Users.get_user_by_token(token)
- if user:
- if user.role == "admin":
- if user.id != user_id:
- result = Auths.delete_auth_by_id(user_id)
- if result:
- return True
- else:
- raise HTTPException(
- status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
- detail=ERROR_MESSAGES.DELETE_USER_ERROR,
- )
- else:
- raise HTTPException(
- status_code=status.HTTP_403_FORBIDDEN,
- detail=ERROR_MESSAGES.ACTION_PROHIBITED,
- )
- else:
- raise HTTPException(
- status_code=status.HTTP_403_FORBIDDEN,
- detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
- )
- else:
- raise HTTPException(
- status_code=status.HTTP_401_UNAUTHORIZED,
- detail=ERROR_MESSAGES.INVALID_TOKEN,
- )
|