users.py 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309
  1. import logging
  2. from typing import Optional
  3. from open_webui.models.auths import Auths
  4. from open_webui.models.chats import Chats
  5. from open_webui.models.users import (
  6. UserModel,
  7. UserRoleUpdateForm,
  8. Users,
  9. UserSettings,
  10. UserUpdateForm,
  11. )
  12. from open_webui.socket.main import get_active_status_by_user_id
  13. from open_webui.constants import ERROR_MESSAGES
  14. from open_webui.env import SRC_LOG_LEVELS
  15. from fastapi import APIRouter, Depends, HTTPException, Request, status
  16. from pydantic import BaseModel
  17. from open_webui.utils.auth import get_admin_user, get_password_hash, get_verified_user
  18. log = logging.getLogger(__name__)
  19. log.setLevel(SRC_LOG_LEVELS["MODELS"])
  20. router = APIRouter()
  21. ############################
  22. # GetUsers
  23. ############################
  24. @router.get("/", response_model=list[UserModel])
  25. async def get_users(
  26. skip: Optional[int] = None,
  27. limit: Optional[int] = None,
  28. user=Depends(get_admin_user),
  29. ):
  30. return Users.get_users(skip, limit)
  31. ############################
  32. # User Groups
  33. ############################
  34. @router.get("/groups")
  35. async def get_user_groups(user=Depends(get_verified_user)):
  36. return Users.get_user_groups(user.id)
  37. ############################
  38. # User Permissions
  39. ############################
  40. @router.get("/permissions")
  41. async def get_user_permissisions(user=Depends(get_verified_user)):
  42. return Users.get_user_groups(user.id)
  43. ############################
  44. # User Default Permissions
  45. ############################
  46. class WorkspacePermissions(BaseModel):
  47. models: bool
  48. knowledge: bool
  49. prompts: bool
  50. tools: bool
  51. class ChatPermissions(BaseModel):
  52. file_upload: bool
  53. delete: bool
  54. edit: bool
  55. temporary: bool
  56. class UserPermissions(BaseModel):
  57. workspace: WorkspacePermissions
  58. chat: ChatPermissions
  59. @router.get("/default/permissions")
  60. async def get_user_permissions(request: Request, user=Depends(get_admin_user)):
  61. return request.app.state.config.USER_PERMISSIONS
  62. @router.post("/default/permissions")
  63. async def update_user_permissions(
  64. request: Request, form_data: UserPermissions, user=Depends(get_admin_user)
  65. ):
  66. request.app.state.config.USER_PERMISSIONS = form_data.model_dump()
  67. return request.app.state.config.USER_PERMISSIONS
  68. ############################
  69. # UpdateUserRole
  70. ############################
  71. @router.post("/update/role", response_model=Optional[UserModel])
  72. async def update_user_role(form_data: UserRoleUpdateForm, user=Depends(get_admin_user)):
  73. if user.id != form_data.id and form_data.id != Users.get_first_user().id:
  74. return Users.update_user_role_by_id(form_data.id, form_data.role)
  75. raise HTTPException(
  76. status_code=status.HTTP_403_FORBIDDEN,
  77. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  78. )
  79. ############################
  80. # GetUserSettingsBySessionUser
  81. ############################
  82. @router.get("/user/settings", response_model=Optional[UserSettings])
  83. async def get_user_settings_by_session_user(user=Depends(get_verified_user)):
  84. user = Users.get_user_by_id(user.id)
  85. if user:
  86. return user.settings
  87. else:
  88. raise HTTPException(
  89. status_code=status.HTTP_400_BAD_REQUEST,
  90. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  91. )
  92. ############################
  93. # UpdateUserSettingsBySessionUser
  94. ############################
  95. @router.post("/user/settings/update", response_model=UserSettings)
  96. async def update_user_settings_by_session_user(
  97. form_data: UserSettings, user=Depends(get_verified_user)
  98. ):
  99. user = Users.update_user_by_id(user.id, {"settings": form_data.model_dump()})
  100. if user:
  101. return user.settings
  102. else:
  103. raise HTTPException(
  104. status_code=status.HTTP_400_BAD_REQUEST,
  105. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  106. )
  107. ############################
  108. # GetUserInfoBySessionUser
  109. ############################
  110. @router.get("/user/info", response_model=Optional[dict])
  111. async def get_user_info_by_session_user(user=Depends(get_verified_user)):
  112. user = Users.get_user_by_id(user.id)
  113. if user:
  114. return user.info
  115. else:
  116. raise HTTPException(
  117. status_code=status.HTTP_400_BAD_REQUEST,
  118. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  119. )
  120. ############################
  121. # UpdateUserInfoBySessionUser
  122. ############################
  123. @router.post("/user/info/update", response_model=Optional[dict])
  124. async def update_user_info_by_session_user(
  125. form_data: dict, user=Depends(get_verified_user)
  126. ):
  127. user = Users.get_user_by_id(user.id)
  128. if user:
  129. if user.info is None:
  130. user.info = {}
  131. user = Users.update_user_by_id(user.id, {"info": {**user.info, **form_data}})
  132. if user:
  133. return user.info
  134. else:
  135. raise HTTPException(
  136. status_code=status.HTTP_400_BAD_REQUEST,
  137. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  138. )
  139. else:
  140. raise HTTPException(
  141. status_code=status.HTTP_400_BAD_REQUEST,
  142. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  143. )
  144. ############################
  145. # GetUserById
  146. ############################
  147. class UserResponse(BaseModel):
  148. name: str
  149. profile_image_url: str
  150. active: Optional[bool] = None
  151. @router.get("/{user_id}", response_model=UserResponse)
  152. async def get_user_by_id(user_id: str, user=Depends(get_verified_user)):
  153. # Check if user_id is a shared chat
  154. # If it is, get the user_id from the chat
  155. if user_id.startswith("shared-"):
  156. chat_id = user_id.replace("shared-", "")
  157. chat = Chats.get_chat_by_id(chat_id)
  158. if chat:
  159. user_id = chat.user_id
  160. else:
  161. raise HTTPException(
  162. status_code=status.HTTP_400_BAD_REQUEST,
  163. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  164. )
  165. user = Users.get_user_by_id(user_id)
  166. if user:
  167. return UserResponse(
  168. **{
  169. "name": user.name,
  170. "profile_image_url": user.profile_image_url,
  171. "active": get_active_status_by_user_id(user_id),
  172. }
  173. )
  174. else:
  175. raise HTTPException(
  176. status_code=status.HTTP_400_BAD_REQUEST,
  177. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  178. )
  179. ############################
  180. # UpdateUserById
  181. ############################
  182. @router.post("/{user_id}/update", response_model=Optional[UserModel])
  183. async def update_user_by_id(
  184. user_id: str,
  185. form_data: UserUpdateForm,
  186. session_user=Depends(get_admin_user),
  187. ):
  188. user = Users.get_user_by_id(user_id)
  189. if user:
  190. if form_data.email.lower() != user.email:
  191. email_user = Users.get_user_by_email(form_data.email.lower())
  192. if email_user:
  193. raise HTTPException(
  194. status_code=status.HTTP_400_BAD_REQUEST,
  195. detail=ERROR_MESSAGES.EMAIL_TAKEN,
  196. )
  197. if form_data.password:
  198. hashed = get_password_hash(form_data.password)
  199. log.debug(f"hashed: {hashed}")
  200. Auths.update_user_password_by_id(user_id, hashed)
  201. Auths.update_email_by_id(user_id, form_data.email.lower())
  202. updated_user = Users.update_user_by_id(
  203. user_id,
  204. {
  205. "name": form_data.name,
  206. "email": form_data.email.lower(),
  207. "profile_image_url": form_data.profile_image_url,
  208. },
  209. )
  210. if updated_user:
  211. return updated_user
  212. raise HTTPException(
  213. status_code=status.HTTP_400_BAD_REQUEST,
  214. detail=ERROR_MESSAGES.DEFAULT(),
  215. )
  216. raise HTTPException(
  217. status_code=status.HTTP_400_BAD_REQUEST,
  218. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  219. )
  220. ############################
  221. # DeleteUserById
  222. ############################
  223. @router.delete("/{user_id}", response_model=bool)
  224. async def delete_user_by_id(user_id: str, user=Depends(get_admin_user)):
  225. if user.id != user_id:
  226. result = Auths.delete_auth_by_id(user_id)
  227. if result:
  228. return True
  229. raise HTTPException(
  230. status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
  231. detail=ERROR_MESSAGES.DELETE_USER_ERROR,
  232. )
  233. raise HTTPException(
  234. status_code=status.HTTP_403_FORBIDDEN,
  235. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  236. )