users.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385
  1. import logging
  2. from typing import Optional
  3. from open_webui.models.auths import Auths
  4. from open_webui.models.groups import Groups
  5. from open_webui.models.chats import Chats
  6. from open_webui.models.users import (
  7. UserModel,
  8. UserRoleUpdateForm,
  9. Users,
  10. UserSettings,
  11. UserUpdateForm,
  12. )
  13. from open_webui.socket.main import get_active_status_by_user_id
  14. from open_webui.constants import ERROR_MESSAGES
  15. from open_webui.env import SRC_LOG_LEVELS
  16. from fastapi import APIRouter, Depends, HTTPException, Request, status
  17. from pydantic import BaseModel
  18. from open_webui.utils.auth import get_admin_user, get_password_hash, get_verified_user
  19. from open_webui.utils.access_control import get_permissions
  20. log = logging.getLogger(__name__)
  21. log.setLevel(SRC_LOG_LEVELS["MODELS"])
  22. router = APIRouter()
  23. ############################
  24. # GetUsers
  25. ############################
  26. @router.get("/", response_model=list[UserModel])
  27. async def get_users(
  28. skip: Optional[int] = None,
  29. limit: Optional[int] = None,
  30. user=Depends(get_admin_user),
  31. ):
  32. return Users.get_users(skip, limit)
  33. ############################
  34. # User Groups
  35. ############################
  36. @router.get("/groups")
  37. async def get_user_groups(user=Depends(get_verified_user)):
  38. return Groups.get_groups_by_member_id(user.id)
  39. ############################
  40. # User Permissions
  41. ############################
  42. @router.get("/permissions")
  43. async def get_user_permissisions(request: Request, user=Depends(get_verified_user)):
  44. user_permissions = get_permissions(
  45. user.id, request.app.state.config.USER_PERMISSIONS
  46. )
  47. return user_permissions
  48. ############################
  49. # User Default Permissions
  50. ############################
  51. class WorkspacePermissions(BaseModel):
  52. models: bool = False
  53. knowledge: bool = False
  54. prompts: bool = False
  55. tools: bool = False
  56. class SharingPermissions(BaseModel):
  57. public_models: bool = True
  58. public_knowledge: bool = True
  59. public_prompts: bool = True
  60. public_tools: bool = True
  61. class ChatPermissions(BaseModel):
  62. controls: bool = True
  63. file_upload: bool = True
  64. delete: bool = True
  65. edit: bool = True
  66. share: bool = True
  67. export: bool = True
  68. stt: bool = True
  69. tts: bool = True
  70. call: bool = True
  71. multiple_models: bool = True
  72. temporary: bool = True
  73. temporary_enforced: bool = False
  74. class FeaturesPermissions(BaseModel):
  75. direct_tool_servers: bool = False
  76. web_search: bool = True
  77. image_generation: bool = True
  78. code_interpreter: bool = True
  79. class UserPermissions(BaseModel):
  80. workspace: WorkspacePermissions
  81. sharing: SharingPermissions
  82. chat: ChatPermissions
  83. features: FeaturesPermissions
  84. @router.get("/default/permissions", response_model=UserPermissions)
  85. async def get_default_user_permissions(request: Request, user=Depends(get_admin_user)):
  86. return {
  87. "workspace": WorkspacePermissions(
  88. **request.app.state.config.USER_PERMISSIONS.get("workspace", {})
  89. ),
  90. "sharing": SharingPermissions(
  91. **request.app.state.config.USER_PERMISSIONS.get("sharing", {})
  92. ),
  93. "chat": ChatPermissions(
  94. **request.app.state.config.USER_PERMISSIONS.get("chat", {})
  95. ),
  96. "features": FeaturesPermissions(
  97. **request.app.state.config.USER_PERMISSIONS.get("features", {})
  98. ),
  99. }
  100. @router.post("/default/permissions")
  101. async def update_default_user_permissions(
  102. request: Request, form_data: UserPermissions, user=Depends(get_admin_user)
  103. ):
  104. request.app.state.config.USER_PERMISSIONS = form_data.model_dump()
  105. return request.app.state.config.USER_PERMISSIONS
  106. ############################
  107. # UpdateUserRole
  108. ############################
  109. @router.post("/update/role", response_model=Optional[UserModel])
  110. async def update_user_role(form_data: UserRoleUpdateForm, user=Depends(get_admin_user)):
  111. if user.id != form_data.id and form_data.id != Users.get_first_user().id:
  112. return Users.update_user_role_by_id(form_data.id, form_data.role)
  113. raise HTTPException(
  114. status_code=status.HTTP_403_FORBIDDEN,
  115. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  116. )
  117. ############################
  118. # GetUserSettingsBySessionUser
  119. ############################
  120. @router.get("/user/settings", response_model=Optional[UserSettings])
  121. async def get_user_settings_by_session_user(user=Depends(get_verified_user)):
  122. user = Users.get_user_by_id(user.id)
  123. if user:
  124. return user.settings
  125. else:
  126. raise HTTPException(
  127. status_code=status.HTTP_400_BAD_REQUEST,
  128. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  129. )
  130. ############################
  131. # UpdateUserSettingsBySessionUser
  132. ############################
  133. @router.post("/user/settings/update", response_model=UserSettings)
  134. async def update_user_settings_by_session_user(
  135. form_data: UserSettings, user=Depends(get_verified_user)
  136. ):
  137. user = Users.update_user_settings_by_id(user.id, form_data.model_dump())
  138. if user:
  139. return user.settings
  140. else:
  141. raise HTTPException(
  142. status_code=status.HTTP_400_BAD_REQUEST,
  143. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  144. )
  145. ############################
  146. # GetUserInfoBySessionUser
  147. ############################
  148. @router.get("/user/info", response_model=Optional[dict])
  149. async def get_user_info_by_session_user(user=Depends(get_verified_user)):
  150. user = Users.get_user_by_id(user.id)
  151. if user:
  152. return user.info
  153. else:
  154. raise HTTPException(
  155. status_code=status.HTTP_400_BAD_REQUEST,
  156. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  157. )
  158. ############################
  159. # UpdateUserInfoBySessionUser
  160. ############################
  161. @router.post("/user/info/update", response_model=Optional[dict])
  162. async def update_user_info_by_session_user(
  163. form_data: dict, user=Depends(get_verified_user)
  164. ):
  165. user = Users.get_user_by_id(user.id)
  166. if user:
  167. if user.info is None:
  168. user.info = {}
  169. user = Users.update_user_by_id(user.id, {"info": {**user.info, **form_data}})
  170. if user:
  171. return user.info
  172. else:
  173. raise HTTPException(
  174. status_code=status.HTTP_400_BAD_REQUEST,
  175. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  176. )
  177. else:
  178. raise HTTPException(
  179. status_code=status.HTTP_400_BAD_REQUEST,
  180. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  181. )
  182. ############################
  183. # GetUserById
  184. ############################
  185. class UserResponse(BaseModel):
  186. name: str
  187. profile_image_url: str
  188. active: Optional[bool] = None
  189. @router.get("/{user_id}", response_model=UserResponse)
  190. async def get_user_by_id(user_id: str, user=Depends(get_verified_user)):
  191. # Check if user_id is a shared chat
  192. # If it is, get the user_id from the chat
  193. if user_id.startswith("shared-"):
  194. chat_id = user_id.replace("shared-", "")
  195. chat = Chats.get_chat_by_id(chat_id)
  196. if chat:
  197. user_id = chat.user_id
  198. else:
  199. raise HTTPException(
  200. status_code=status.HTTP_400_BAD_REQUEST,
  201. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  202. )
  203. user = Users.get_user_by_id(user_id)
  204. if user:
  205. return UserResponse(
  206. **{
  207. "name": user.name,
  208. "profile_image_url": user.profile_image_url,
  209. "active": get_active_status_by_user_id(user_id),
  210. }
  211. )
  212. else:
  213. raise HTTPException(
  214. status_code=status.HTTP_400_BAD_REQUEST,
  215. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  216. )
  217. ############################
  218. # UpdateUserById
  219. ############################
  220. @router.post("/{user_id}/update", response_model=Optional[UserModel])
  221. async def update_user_by_id(
  222. user_id: str,
  223. form_data: UserUpdateForm,
  224. session_user=Depends(get_admin_user),
  225. ):
  226. # Prevent modification of the primary admin user by other admins
  227. try:
  228. first_user = Users.get_first_user()
  229. if first_user and user_id == first_user.id and session_user.id != user_id:
  230. raise HTTPException(
  231. status_code=status.HTTP_403_FORBIDDEN,
  232. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  233. )
  234. except Exception as e:
  235. log.error(f"Error checking primary admin status: {e}")
  236. raise HTTPException(
  237. status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
  238. detail="Could not verify primary admin status.",
  239. )
  240. user = Users.get_user_by_id(user_id)
  241. if user:
  242. if form_data.email.lower() != user.email:
  243. email_user = Users.get_user_by_email(form_data.email.lower())
  244. if email_user:
  245. raise HTTPException(
  246. status_code=status.HTTP_400_BAD_REQUEST,
  247. detail=ERROR_MESSAGES.EMAIL_TAKEN,
  248. )
  249. if form_data.password:
  250. hashed = get_password_hash(form_data.password)
  251. log.debug(f"hashed: {hashed}")
  252. Auths.update_user_password_by_id(user_id, hashed)
  253. Auths.update_email_by_id(user_id, form_data.email.lower())
  254. updated_user = Users.update_user_by_id(
  255. user_id,
  256. {
  257. "name": form_data.name,
  258. "email": form_data.email.lower(),
  259. "profile_image_url": form_data.profile_image_url,
  260. },
  261. )
  262. if updated_user:
  263. return updated_user
  264. raise HTTPException(
  265. status_code=status.HTTP_400_BAD_REQUEST,
  266. detail=ERROR_MESSAGES.DEFAULT(),
  267. )
  268. raise HTTPException(
  269. status_code=status.HTTP_400_BAD_REQUEST,
  270. detail=ERROR_MESSAGES.USER_NOT_FOUND,
  271. )
  272. ############################
  273. # DeleteUserById
  274. ############################
  275. @router.delete("/{user_id}", response_model=bool)
  276. async def delete_user_by_id(user_id: str, user=Depends(get_admin_user)):
  277. # Prevent deletion of the primary admin user
  278. try:
  279. first_user = Users.get_first_user()
  280. if first_user and user_id == first_user.id:
  281. raise HTTPException(
  282. status_code=status.HTTP_403_FORBIDDEN,
  283. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  284. )
  285. except Exception as e:
  286. log.error(f"Error checking primary admin status: {e}")
  287. raise HTTPException(
  288. status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
  289. detail="Could not verify primary admin status.",
  290. )
  291. if user.id != user_id:
  292. result = Auths.delete_auth_by_id(user_id)
  293. if result:
  294. return True
  295. raise HTTPException(
  296. status_code=status.HTTP_500_INTERNAL_SERVER_ERROR,
  297. detail=ERROR_MESSAGES.DELETE_USER_ERROR,
  298. )
  299. # Prevent self-deletion
  300. raise HTTPException(
  301. status_code=status.HTTP_403_FORBIDDEN,
  302. detail=ERROR_MESSAGES.ACTION_PROHIBITED,
  303. )