users.py 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. from fastapi import Response
  2. from fastapi import Depends, FastAPI, HTTPException, status
  3. from datetime import datetime, timedelta
  4. from typing import List, Union, Optional
  5. from fastapi import APIRouter
  6. from pydantic import BaseModel
  7. import time
  8. import uuid
  9. from apps.web.models.users import UserModel, UserRoleUpdateForm, Users
  10. from apps.web.models.auths import Auths
  11. from utils.utils import (
  12. get_password_hash,
  13. bearer_scheme,
  14. create_token,
  15. )
  16. from constants import ERROR_MESSAGES
  17. router = APIRouter()
  18. ############################
  19. # GetUsers
  20. ############################
  21. @router.get("/", response_model=List[UserModel])
  22. async def get_users(skip: int = 0, limit: int = 50, cred=Depends(bearer_scheme)):
  23. token = cred.credentials
  24. user = Users.get_user_by_token(token)
  25. if user:
  26. if user.role == "admin":
  27. return Users.get_users(skip, limit)
  28. else:
  29. raise HTTPException(
  30. status_code=status.HTTP_403_FORBIDDEN,
  31. detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
  32. )
  33. else:
  34. raise HTTPException(
  35. status_code=status.HTTP_401_UNAUTHORIZED,
  36. detail=ERROR_MESSAGES.INVALID_TOKEN,
  37. )
  38. ############################
  39. # UpdateUserRole
  40. ############################
  41. @router.post("/update/role", response_model=Optional[UserModel])
  42. async def update_user_role(form_data: UserRoleUpdateForm, cred=Depends(bearer_scheme)):
  43. token = cred.credentials
  44. user = Users.get_user_by_token(token)
  45. if user:
  46. if user.role == "admin":
  47. if user.id != form_data.id:
  48. return Users.update_user_role_by_id(form_data.id, form_data.role)
  49. else:
  50. raise HTTPException(
  51. status_code=status.HTTP_403_FORBIDDEN,
  52. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  53. )
  54. else:
  55. raise HTTPException(
  56. status_code=status.HTTP_403_FORBIDDEN,
  57. detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
  58. )
  59. else:
  60. raise HTTPException(
  61. status_code=status.HTTP_401_UNAUTHORIZED,
  62. detail=ERROR_MESSAGES.INVALID_TOKEN,
  63. )
  64. ############################
  65. # DeleteUserById
  66. ############################
  67. @router.delete("/{user_id}", response_model=bool)
  68. async def delete_user_by_id(user_id: str, cred=Depends(bearer_scheme)):
  69. token = cred.credentials
  70. user = Users.get_user_by_token(token)
  71. if user:
  72. if user.role == "admin":
  73. if user.id != user_id:
  74. result = Auths.delete_auth_by_id(user_id)
  75. if result:
  76. return True
  77. else:
  78. raise HTTPException(
  79. status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
  80. detail=ERROR_MESSAGES.DELETE_USER_ERROR,
  81. )
  82. else:
  83. raise HTTPException(
  84. status_code=status.HTTP_403_FORBIDDEN,
  85. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  86. )
  87. else:
  88. raise HTTPException(
  89. status_code=status.HTTP_403_FORBIDDEN,
  90. detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
  91. )
  92. else:
  93. raise HTTPException(
  94. status_code=status.HTTP_401_UNAUTHORIZED,
  95. detail=ERROR_MESSAGES.INVALID_TOKEN,
  96. )