Spaces:
Paused
Paused
| import logging | |
| from typing import Optional | |
| from open_webui.models.auths import Auths | |
| from open_webui.models.groups import Groups | |
| from open_webui.models.chats import Chats | |
| from open_webui.models.users import ( | |
| UserModel, | |
| UserRoleUpdateForm, | |
| Users, | |
| UserSettings, | |
| UserUpdateForm, | |
| ) | |
| from open_webui.socket.main import get_active_status_by_user_id | |
| from open_webui.constants import ERROR_MESSAGES | |
| from open_webui.env import SRC_LOG_LEVELS | |
| from fastapi import APIRouter, Depends, HTTPException, Request, status | |
| from pydantic import BaseModel | |
| from open_webui.utils.auth import get_admin_user, get_password_hash, get_verified_user | |
| from open_webui.utils.access_control import get_permissions | |
| log = logging.getLogger(__name__) | |
| log.setLevel(SRC_LOG_LEVELS["MODELS"]) | |
| router = APIRouter() | |
| ############################ | |
| # GetUsers | |
| ############################ | |
| async def get_users( | |
| skip: Optional[int] = None, | |
| limit: Optional[int] = None, | |
| user=Depends(get_admin_user), | |
| ): | |
| return Users.get_users(skip, limit) | |
| ############################ | |
| # User Groups | |
| ############################ | |
| async def get_user_groups(user=Depends(get_verified_user)): | |
| return Groups.get_groups_by_member_id(user.id) | |
| ############################ | |
| # User Permissions | |
| ############################ | |
| async def get_user_permissisions(request: Request, user=Depends(get_verified_user)): | |
| user_permissions = get_permissions( | |
| user.id, request.app.state.config.USER_PERMISSIONS | |
| ) | |
| return user_permissions | |
| ############################ | |
| # User Default Permissions | |
| ############################ | |
| class WorkspacePermissions(BaseModel): | |
| models: bool = False | |
| knowledge: bool = False | |
| prompts: bool = False | |
| tools: bool = False | |
| class SharingPermissions(BaseModel): | |
| public_models: bool = True | |
| public_knowledge: bool = True | |
| public_prompts: bool = True | |
| public_tools: bool = True | |
| class ChatPermissions(BaseModel): | |
| controls: bool = True | |
| file_upload: bool = True | |
| delete: bool = True | |
| edit: bool = True | |
| share: bool = True | |
| export: bool = True | |
| stt: bool = True | |
| tts: bool = True | |
| call: bool = True | |
| multiple_models: bool = True | |
| temporary: bool = True | |
| temporary_enforced: bool = False | |
| class FeaturesPermissions(BaseModel): | |
| direct_tool_servers: bool = False | |
| web_search: bool = True | |
| image_generation: bool = True | |
| code_interpreter: bool = True | |
| class UserPermissions(BaseModel): | |
| workspace: WorkspacePermissions | |
| sharing: SharingPermissions | |
| chat: ChatPermissions | |
| features: FeaturesPermissions | |
| async def get_default_user_permissions(request: Request, user=Depends(get_admin_user)): | |
| return { | |
| "workspace": WorkspacePermissions( | |
| **request.app.state.config.USER_PERMISSIONS.get("workspace", {}) | |
| ), | |
| "sharing": SharingPermissions( | |
| **request.app.state.config.USER_PERMISSIONS.get("sharing", {}) | |
| ), | |
| "chat": ChatPermissions( | |
| **request.app.state.config.USER_PERMISSIONS.get("chat", {}) | |
| ), | |
| "features": FeaturesPermissions( | |
| **request.app.state.config.USER_PERMISSIONS.get("features", {}) | |
| ), | |
| } | |
| async def update_default_user_permissions( | |
| request: Request, form_data: UserPermissions, user=Depends(get_admin_user) | |
| ): | |
| request.app.state.config.USER_PERMISSIONS = form_data.model_dump() | |
| return request.app.state.config.USER_PERMISSIONS | |
| ############################ | |
| # UpdateUserRole | |
| ############################ | |
| async def update_user_role(form_data: UserRoleUpdateForm, user=Depends(get_admin_user)): | |
| if user.id != form_data.id and form_data.id != Users.get_first_user().id: | |
| return Users.update_user_role_by_id(form_data.id, form_data.role) | |
| raise HTTPException( | |
| status_code=status.HTTP_403_FORBIDDEN, | |
| detail=ERROR_MESSAGES.ACTION_PROHIBITED, | |
| ) | |
| ############################ | |
| # GetUserSettingsBySessionUser | |
| ############################ | |
| async def get_user_settings_by_session_user(user=Depends(get_verified_user)): | |
| user = Users.get_user_by_id(user.id) | |
| if user: | |
| return user.settings | |
| else: | |
| raise HTTPException( | |
| status_code=status.HTTP_400_BAD_REQUEST, | |
| detail=ERROR_MESSAGES.USER_NOT_FOUND, | |
| ) | |
| ############################ | |
| # UpdateUserSettingsBySessionUser | |
| ############################ | |
| async def update_user_settings_by_session_user( | |
| form_data: UserSettings, user=Depends(get_verified_user) | |
| ): | |
| user = Users.update_user_settings_by_id(user.id, form_data.model_dump()) | |
| if user: | |
| return user.settings | |
| else: | |
| raise HTTPException( | |
| status_code=status.HTTP_400_BAD_REQUEST, | |
| detail=ERROR_MESSAGES.USER_NOT_FOUND, | |
| ) | |
| ############################ | |
| # GetUserInfoBySessionUser | |
| ############################ | |
| async def get_user_info_by_session_user(user=Depends(get_verified_user)): | |
| user = Users.get_user_by_id(user.id) | |
| if user: | |
| return user.info | |
| else: | |
| raise HTTPException( | |
| status_code=status.HTTP_400_BAD_REQUEST, | |
| detail=ERROR_MESSAGES.USER_NOT_FOUND, | |
| ) | |
| ############################ | |
| # UpdateUserInfoBySessionUser | |
| ############################ | |
| async def update_user_info_by_session_user( | |
| form_data: dict, user=Depends(get_verified_user) | |
| ): | |
| user = Users.get_user_by_id(user.id) | |
| if user: | |
| if user.info is None: | |
| user.info = {} | |
| user = Users.update_user_by_id(user.id, {"info": {**user.info, **form_data}}) | |
| if user: | |
| return user.info | |
| else: | |
| raise HTTPException( | |
| status_code=status.HTTP_400_BAD_REQUEST, | |
| detail=ERROR_MESSAGES.USER_NOT_FOUND, | |
| ) | |
| else: | |
| raise HTTPException( | |
| status_code=status.HTTP_400_BAD_REQUEST, | |
| detail=ERROR_MESSAGES.USER_NOT_FOUND, | |
| ) | |
| ############################ | |
| # GetUserById | |
| ############################ | |
| class UserResponse(BaseModel): | |
| name: str | |
| profile_image_url: str | |
| active: Optional[bool] = None | |
| async def get_user_by_id(user_id: str, user=Depends(get_verified_user)): | |
| # Check if user_id is a shared chat | |
| # If it is, get the user_id from the chat | |
| if user_id.startswith("shared-"): | |
| chat_id = user_id.replace("shared-", "") | |
| chat = Chats.get_chat_by_id(chat_id) | |
| if chat: | |
| user_id = chat.user_id | |
| else: | |
| raise HTTPException( | |
| status_code=status.HTTP_400_BAD_REQUEST, | |
| detail=ERROR_MESSAGES.USER_NOT_FOUND, | |
| ) | |
| user = Users.get_user_by_id(user_id) | |
| if user: | |
| return UserResponse( | |
| **{ | |
| "name": user.name, | |
| "profile_image_url": user.profile_image_url, | |
| "active": get_active_status_by_user_id(user_id), | |
| } | |
| ) | |
| else: | |
| raise HTTPException( | |
| status_code=status.HTTP_400_BAD_REQUEST, | |
| detail=ERROR_MESSAGES.USER_NOT_FOUND, | |
| ) | |
| ############################ | |
| # UpdateUserById | |
| ############################ | |
| async def update_user_by_id( | |
| user_id: str, | |
| form_data: UserUpdateForm, | |
| session_user=Depends(get_admin_user), | |
| ): | |
| # Prevent modification of the primary admin user by other admins | |
| try: | |
| first_user = Users.get_first_user() | |
| if first_user and user_id == first_user.id and session_user.id != user_id: | |
| raise HTTPException( | |
| status_code=status.HTTP_403_FORBIDDEN, | |
| detail=ERROR_MESSAGES.ACTION_PROHIBITED, | |
| ) | |
| except Exception as e: | |
| log.error(f"Error checking primary admin status: {e}") | |
| raise HTTPException( | |
| status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, | |
| detail="Could not verify primary admin status.", | |
| ) | |
| user = Users.get_user_by_id(user_id) | |
| if user: | |
| if form_data.email.lower() != user.email: | |
| email_user = Users.get_user_by_email(form_data.email.lower()) | |
| if email_user: | |
| raise HTTPException( | |
| status_code=status.HTTP_400_BAD_REQUEST, | |
| detail=ERROR_MESSAGES.EMAIL_TAKEN, | |
| ) | |
| if form_data.password: | |
| hashed = get_password_hash(form_data.password) | |
| log.debug(f"hashed: {hashed}") | |
| Auths.update_user_password_by_id(user_id, hashed) | |
| Auths.update_email_by_id(user_id, form_data.email.lower()) | |
| updated_user = Users.update_user_by_id( | |
| user_id, | |
| { | |
| "name": form_data.name, | |
| "email": form_data.email.lower(), | |
| "profile_image_url": form_data.profile_image_url, | |
| }, | |
| ) | |
| if updated_user: | |
| return updated_user | |
| raise HTTPException( | |
| status_code=status.HTTP_400_BAD_REQUEST, | |
| detail=ERROR_MESSAGES.DEFAULT(), | |
| ) | |
| raise HTTPException( | |
| status_code=status.HTTP_400_BAD_REQUEST, | |
| detail=ERROR_MESSAGES.USER_NOT_FOUND, | |
| ) | |
| ############################ | |
| # DeleteUserById | |
| ############################ | |
| async def delete_user_by_id(user_id: str, user=Depends(get_admin_user)): | |
| # Prevent deletion of the primary admin user | |
| try: | |
| first_user = Users.get_first_user() | |
| if first_user and user_id == first_user.id: | |
| raise HTTPException( | |
| status_code=status.HTTP_403_FORBIDDEN, | |
| detail=ERROR_MESSAGES.ACTION_PROHIBITED, | |
| ) | |
| except Exception as e: | |
| log.error(f"Error checking primary admin status: {e}") | |
| raise HTTPException( | |
| status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, | |
| detail="Could not verify primary admin status.", | |
| ) | |
| if user.id != user_id: | |
| result = Auths.delete_auth_by_id(user_id) | |
| if result: | |
| return True | |
| raise HTTPException( | |
| status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, | |
| detail=ERROR_MESSAGES.DELETE_USER_ERROR, | |
| ) | |
| # Prevent self-deletion | |
| raise HTTPException( | |
| status_code=status.HTTP_403_FORBIDDEN, | |
| detail=ERROR_MESSAGES.ACTION_PROHIBITED, | |
| ) | |