users.py 9.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352
  1. import logging
  2. from typing import Optional
  3. from open_webui.models.auths import Auths
  4. from open_webui.models.groups import Groups
  5. from open_webui.models.chats import Chats
  6. from open_webui.models.users import (
  7. UserModel,
  8. UserRoleUpdateForm,
  9. Users,
  10. UserSettings,
  11. UserUpdateForm,
  12. )
  13. from open_webui.socket.main import get_active_status_by_user_id
  14. from open_webui.constants import ERROR_MESSAGES
  15. from open_webui.env import SRC_LOG_LEVELS
  16. from fastapi import APIRouter, Depends, HTTPException, Request, status
  17. from pydantic import BaseModel
  18. from open_webui.utils.auth import get_admin_user, get_password_hash, get_verified_user
  19. from open_webui.utils.access_control import get_permissions
  20. log = logging.getLogger(__name__)
  21. log.setLevel(SRC_LOG_LEVELS["MODELS"])
  22. router = APIRouter()
  23. ############################
  24. # GetUsers
  25. ############################
  26. @router.get("/", response_model=list[UserModel])
  27. async def get_users(
  28. skip: Optional[int] = None,
  29. limit: Optional[int] = None,
  30. user=Depends(get_admin_user),
  31. ):
  32. return Users.get_users(skip, limit)
  33. ############################
  34. # User Groups
  35. ############################
  36. @router.get("/groups")
  37. async def get_user_groups(user=Depends(get_verified_user)):
  38. return Groups.get_groups_by_member_id(user.id)
  39. ############################
  40. # User Permissions
  41. ############################
  42. @router.get("/permissions")
  43. async def get_user_permissisions(request: Request, user=Depends(get_verified_user)):
  44. user_permissions = get_permissions(
  45. user.id, request.app.state.config.USER_PERMISSIONS
  46. )
  47. return user_permissions
  48. ############################
  49. # User Default Permissions
  50. ############################
  51. class WorkspacePermissions(BaseModel):
  52. models: bool = False
  53. knowledge: bool = False
  54. prompts: bool = False
  55. tools: bool = False
  56. class SharingPermissions(BaseModel):
  57. public_models: bool = True
  58. public_knowledge: bool = True
  59. public_prompts: bool = True
  60. public_tools: bool = True
  61. class ChatPermissions(BaseModel):
  62. controls: bool = True
  63. file_upload: bool = True
  64. delete: bool = True
  65. edit: bool = True
  66. stt: bool = True
  67. tts: bool = True
  68. call: bool = True
  69. multiple_models: bool = True
  70. temporary: bool = True
  71. temporary_enforced: bool = False
  72. class FeaturesPermissions(BaseModel):
  73. direct_tool_servers: bool = False
  74. web_search: bool = True
  75. image_generation: bool = True
  76. code_interpreter: bool = True
  77. class UserPermissions(BaseModel):
  78. workspace: WorkspacePermissions
  79. sharing: SharingPermissions
  80. chat: ChatPermissions
  81. features: FeaturesPermissions
  82. @router.get("/default/permissions", response_model=UserPermissions)
  83. async def get_default_user_permissions(request: Request, user=Depends(get_admin_user)):
  84. return {
  85. "workspace": WorkspacePermissions(
  86. **request.app.state.config.USER_PERMISSIONS.get("workspace", {})
  87. ),
  88. "sharing": SharingPermissions(
  89. **request.app.state.config.USER_PERMISSIONS.get("sharing", {})
  90. ),
  91. "chat": ChatPermissions(
  92. **request.app.state.config.USER_PERMISSIONS.get("chat", {})
  93. ),
  94. "features": FeaturesPermissions(
  95. **request.app.state.config.USER_PERMISSIONS.get("features", {})
  96. ),
  97. }
  98. @router.post("/default/permissions")
  99. async def update_default_user_permissions(
  100. request: Request, form_data: UserPermissions, user=Depends(get_admin_user)
  101. ):
  102. request.app.state.config.USER_PERMISSIONS = form_data.model_dump()
  103. return request.app.state.config.USER_PERMISSIONS
  104. ############################
  105. # UpdateUserRole
  106. ############################
  107. @router.post("/update/role", response_model=Optional[UserModel])
  108. async def update_user_role(form_data: UserRoleUpdateForm, user=Depends(get_admin_user)):
  109. if user.id != form_data.id and form_data.id != Users.get_first_user().id:
  110. return Users.update_user_role_by_id(form_data.id, form_data.role)
  111. raise HTTPException(
  112. status_code=status.HTTP_403_FORBIDDEN,
  113. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  114. )
  115. ############################
  116. # GetUserSettingsBySessionUser
  117. ############################
  118. @router.get("/user/settings", response_model=Optional[UserSettings])
  119. async def get_user_settings_by_session_user(user=Depends(get_verified_user)):
  120. user = Users.get_user_by_id(user.id)
  121. if user:
  122. return user.settings
  123. else:
  124. raise HTTPException(
  125. status_code=status.HTTP_400_BAD_REQUEST,
  126. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  127. )
  128. ############################
  129. # UpdateUserSettingsBySessionUser
  130. ############################
  131. @router.post("/user/settings/update", response_model=UserSettings)
  132. async def update_user_settings_by_session_user(
  133. form_data: UserSettings, user=Depends(get_verified_user)
  134. ):
  135. user = Users.update_user_settings_by_id(user.id, form_data.model_dump())
  136. if user:
  137. return user.settings
  138. else:
  139. raise HTTPException(
  140. status_code=status.HTTP_400_BAD_REQUEST,
  141. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  142. )
  143. ############################
  144. # GetUserInfoBySessionUser
  145. ############################
  146. @router.get("/user/info", response_model=Optional[dict])
  147. async def get_user_info_by_session_user(user=Depends(get_verified_user)):
  148. user = Users.get_user_by_id(user.id)
  149. if user:
  150. return user.info
  151. else:
  152. raise HTTPException(
  153. status_code=status.HTTP_400_BAD_REQUEST,
  154. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  155. )
  156. ############################
  157. # UpdateUserInfoBySessionUser
  158. ############################
  159. @router.post("/user/info/update", response_model=Optional[dict])
  160. async def update_user_info_by_session_user(
  161. form_data: dict, user=Depends(get_verified_user)
  162. ):
  163. user = Users.get_user_by_id(user.id)
  164. if user:
  165. if user.info is None:
  166. user.info = {}
  167. user = Users.update_user_by_id(user.id, {"info": {**user.info, **form_data}})
  168. if user:
  169. return user.info
  170. else:
  171. raise HTTPException(
  172. status_code=status.HTTP_400_BAD_REQUEST,
  173. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  174. )
  175. else:
  176. raise HTTPException(
  177. status_code=status.HTTP_400_BAD_REQUEST,
  178. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  179. )
  180. ############################
  181. # GetUserById
  182. ############################
  183. class UserResponse(BaseModel):
  184. name: str
  185. profile_image_url: str
  186. active: Optional[bool] = None
  187. @router.get("/{user_id}", response_model=UserResponse)
  188. async def get_user_by_id(user_id: str, user=Depends(get_verified_user)):
  189. # Check if user_id is a shared chat
  190. # If it is, get the user_id from the chat
  191. if user_id.startswith("shared-"):
  192. chat_id = user_id.replace("shared-", "")
  193. chat = Chats.get_chat_by_id(chat_id)
  194. if chat:
  195. user_id = chat.user_id
  196. else:
  197. raise HTTPException(
  198. status_code=status.HTTP_400_BAD_REQUEST,
  199. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  200. )
  201. user = Users.get_user_by_id(user_id)
  202. if user:
  203. return UserResponse(
  204. **{
  205. "name": user.name,
  206. "profile_image_url": user.profile_image_url,
  207. "active": get_active_status_by_user_id(user_id),
  208. }
  209. )
  210. else:
  211. raise HTTPException(
  212. status_code=status.HTTP_400_BAD_REQUEST,
  213. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  214. )
  215. ############################
  216. # UpdateUserById
  217. ############################
  218. @router.post("/{user_id}/update", response_model=Optional[UserModel])
  219. async def update_user_by_id(
  220. user_id: str,
  221. form_data: UserUpdateForm,
  222. session_user=Depends(get_admin_user),
  223. ):
  224. user = Users.get_user_by_id(user_id)
  225. if user:
  226. if form_data.email.lower() != user.email:
  227. email_user = Users.get_user_by_email(form_data.email.lower())
  228. if email_user:
  229. raise HTTPException(
  230. status_code=status.HTTP_400_BAD_REQUEST,
  231. detail=ERROR_MESSAGES.EMAIL_TAKEN,
  232. )
  233. if form_data.password:
  234. hashed = get_password_hash(form_data.password)
  235. log.debug(f"hashed: {hashed}")
  236. Auths.update_user_password_by_id(user_id, hashed)
  237. Auths.update_email_by_id(user_id, form_data.email.lower())
  238. updated_user = Users.update_user_by_id(
  239. user_id,
  240. {
  241. "name": form_data.name,
  242. "email": form_data.email.lower(),
  243. "profile_image_url": form_data.profile_image_url,
  244. },
  245. )
  246. if updated_user:
  247. return updated_user
  248. raise HTTPException(
  249. status_code=status.HTTP_400_BAD_REQUEST,
  250. detail=ERROR_MESSAGES.DEFAULT(),
  251. )
  252. raise HTTPException(
  253. status_code=status.HTTP_400_BAD_REQUEST,
  254. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  255. )
  256. ############################
  257. # DeleteUserById
  258. ############################
  259. @router.delete("/{user_id}", response_model=bool)
  260. async def delete_user_by_id(user_id: str, user=Depends(get_admin_user)):
  261. if user.id != user_id:
  262. result = Auths.delete_auth_by_id(user_id)
  263. if result:
  264. return True
  265. raise HTTPException(
  266. status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
  267. detail=ERROR_MESSAGES.DELETE_USER_ERROR,
  268. )
  269. raise HTTPException(
  270. status_code=status.HTTP_403_FORBIDDEN,
  271. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  272. )