users.py 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114
  1. from fastapi import Response
  2. from fastapi import Depends, FastAPI, HTTPException, status
  3. from datetime import datetime, timedelta
  4. from typing import List, Union, Optional
  5. from fastapi import APIRouter
  6. from pydantic import BaseModel
  7. import time
  8. import uuid
  9. from apps.web.models.users import UserModel, UserRoleUpdateForm, Users
  10. from utils.utils import (
  11. get_password_hash,
  12. bearer_scheme,
  13. create_token,
  14. )
  15. from constants import ERROR_MESSAGES
  16. router = APIRouter()
  17. ############################
  18. # GetUsers
  19. ############################
  20. @router.get("/", response_model=List[UserModel])
  21. async def get_users(skip: int = 0, limit: int = 50, cred=Depends(bearer_scheme)):
  22. token = cred.credentials
  23. user = Users.get_user_by_token(token)
  24. if user:
  25. if user.role == "admin":
  26. return Users.get_users(skip, limit)
  27. else:
  28. raise HTTPException(
  29. status_code=status.HTTP_403_FORBIDDEN,
  30. detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
  31. )
  32. else:
  33. raise HTTPException(
  34. status_code=status.HTTP_401_UNAUTHORIZED,
  35. detail=ERROR_MESSAGES.INVALID_TOKEN,
  36. )
  37. ############################
  38. # UpdateUserRole
  39. ############################
  40. @router.post("/update/role", response_model=Optional[UserModel])
  41. async def update_user_role(form_data: UserRoleUpdateForm, cred=Depends(bearer_scheme)):
  42. token = cred.credentials
  43. user = Users.get_user_by_token(token)
  44. if user:
  45. if user.role == "admin":
  46. if user.id != form_data.id:
  47. return Users.update_user_role_by_id(form_data.id, form_data.role)
  48. else:
  49. raise HTTPException(
  50. status_code=status.HTTP_403_FORBIDDEN,
  51. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  52. )
  53. else:
  54. raise HTTPException(
  55. status_code=status.HTTP_403_FORBIDDEN,
  56. detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
  57. )
  58. else:
  59. raise HTTPException(
  60. status_code=status.HTTP_401_UNAUTHORIZED,
  61. detail=ERROR_MESSAGES.INVALID_TOKEN,
  62. )
  63. ############################
  64. # DeleteUser
  65. ############################
  66. @router.delete("/{user_id}", response_model=bool)
  67. async def delete_user_by_id(user_id: str, cred=Depends(bearer_scheme)):
  68. token = cred.credentials
  69. user = Users.get_user_by_token(token)
  70. if user:
  71. if user.role == "admin":
  72. if user.id != user_id:
  73. result = Users.delete_user_by_id(user_id)
  74. if result:
  75. return True
  76. else:
  77. raise HTTPException(
  78. status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
  79. detail=ERROR_MESSAGES.DELETE_USER_ERROR,
  80. )
  81. else:
  82. raise HTTPException(
  83. status_code=status.HTTP_403_FORBIDDEN,
  84. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  85. )
  86. else:
  87. raise HTTPException(
  88. status_code=status.HTTP_403_FORBIDDEN,
  89. detail=ERROR_MESSAGES.ACCESS_PROHIBITED,
  90. )
  91. else:
  92. raise HTTPException(
  93. status_code=status.HTTP_401_UNAUTHORIZED,
  94. detail=ERROR_MESSAGES.INVALID_TOKEN,
  95. )