2023-10-14 15:16:38 +02:00
|
|
|
from fastapi import APIRouter, Depends, HTTPException, status
|
2023-10-21 10:10:02 +02:00
|
|
|
from fastapi.responses import JSONResponse
|
2023-10-25 23:42:34 +02:00
|
|
|
from datetime import datetime
|
2023-10-15 16:17:37 +02:00
|
|
|
from ..dependencies import users_token, permissions_checker, database
|
|
|
|
from ..models import users
|
2023-10-12 00:14:50 +02:00
|
|
|
from typing import Annotated
|
2023-10-14 15:48:45 +02:00
|
|
|
from bson import ObjectId
|
2023-10-10 22:13:47 +02:00
|
|
|
router = APIRouter()
|
|
|
|
|
2023-10-14 17:41:34 +02:00
|
|
|
|
|
|
|
|
2023-10-13 22:35:04 +02:00
|
|
|
@router.get("/users", tags=["users"], response_model=list[users.UserOut])
|
2023-10-14 15:16:38 +02:00
|
|
|
async def read_users(authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))], skip: int = 0, limit: int = 20):
|
|
|
|
if limit < 1 or skip < 0 or limit < skip:
|
2023-10-14 11:53:31 +02:00
|
|
|
raise HTTPException(
|
|
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
2023-10-14 15:16:38 +02:00
|
|
|
detail="skip should be greater than 0 and limit should be greater than 1. Limit should be greater than skip"
|
2023-10-14 11:53:31 +02:00
|
|
|
)
|
|
|
|
limit = limit + skip
|
2023-10-13 14:59:57 +02:00
|
|
|
listUsers = []
|
2023-10-13 22:55:52 +02:00
|
|
|
user_repository = users.UserRepository(database=database.database)
|
2023-10-14 11:53:31 +02:00
|
|
|
for user_index in user_repository.find_by({}, limit=limit, skip=skip):
|
2023-10-25 23:42:34 +02:00
|
|
|
user = users.UserOut(id=user_index.id, username=user_index.username, email=user_index.email, status=user_index.status, roles=user_index.roles, firstName=user_index.firstName, name=user_index.name)
|
2023-10-13 14:59:57 +02:00
|
|
|
listUsers.append(user)
|
|
|
|
return listUsers
|
2023-10-12 00:14:50 +02:00
|
|
|
|
2023-10-14 15:48:45 +02:00
|
|
|
@router.get("/users/search", tags=["users"], response_model=list[users.UserOut])
|
|
|
|
async def read_users_id(authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin", "User"]))], skip: int = 0, limit: int = 20, key: str | None = None, value: str | None= None):
|
|
|
|
if limit < 1 or skip < 0 or limit < skip:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
|
|
detail="skip should be greater than 0 and limit should be greater than 1. Limit should be greater than skip"
|
|
|
|
)
|
|
|
|
if key is None or value is None:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
|
|
detail="Key or/and value parameter is empty"
|
|
|
|
)
|
|
|
|
limit = limit + skip
|
|
|
|
listUsers = []
|
|
|
|
user_repository = users.UserRepository(database=database.database)
|
|
|
|
for user_index in user_repository.find_by({key: {'$regex': value}}, limit=limit, skip=skip):
|
2023-10-25 23:42:34 +02:00
|
|
|
user = users.UserOut(id=user_index.id, username=user_index.username, status=user_index.status, roles=user_index.roles, email=user_index.email, firstName=user_index.firstName, name=user_index.name)
|
2023-10-14 15:48:45 +02:00
|
|
|
listUsers.append(user)
|
|
|
|
return listUsers
|
|
|
|
|
|
|
|
|
2023-10-22 18:58:35 +02:00
|
|
|
@router.get("/users/me",tags=["users"], response_model=users.User, response_model_exclude=["id", "password", "roles", "status"])
|
2023-10-14 17:34:34 +02:00
|
|
|
async def read_users_me(current_user: Annotated[users.User, Depends(users_token.get_current_active_user)], authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin", "User"]))]):
|
2023-10-14 15:48:45 +02:00
|
|
|
return current_user
|
|
|
|
|
2023-10-21 10:10:02 +02:00
|
|
|
@router.get("/users/count", tags=["users"])
|
|
|
|
async def read_users_count(authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))]):
|
|
|
|
count = database.database.get_collection("users").estimated_document_count()
|
|
|
|
content = {"count":count}
|
|
|
|
response = JSONResponse(content=content)
|
|
|
|
return response
|
|
|
|
|
|
|
|
|
2023-10-14 15:48:45 +02:00
|
|
|
@router.get("/users/{item_id}", tags=["users"], response_model=users.User)
|
|
|
|
async def read_users_id(item_id : str, authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))]):
|
|
|
|
user_repository = users.UserRepository(database=database.database)
|
|
|
|
user = user_repository.find_one_by_id(ObjectId(item_id))
|
|
|
|
return user
|
2023-10-14 18:20:08 +02:00
|
|
|
|
|
|
|
|
2023-10-22 18:58:35 +02:00
|
|
|
@router.delete("/users/me",tags=["users"], response_model=users.User, response_model_exclude=["id", "password", "roles", "status"])
|
2023-10-14 18:20:08 +02:00
|
|
|
async def read_users_me(current_user: Annotated[users.User, Depends(users_token.get_current_active_user)], authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin", "User"]))], remove: bool = False):
|
|
|
|
user_repository = users.UserRepository(database=database.database)
|
2023-10-22 18:58:35 +02:00
|
|
|
current_user.status = 0
|
2023-10-14 18:20:08 +02:00
|
|
|
if remove is True:
|
2023-10-22 18:58:35 +02:00
|
|
|
current_user.status = -1
|
2023-10-14 18:29:07 +02:00
|
|
|
user_repository.save(current_user)
|
2023-10-14 18:20:08 +02:00
|
|
|
return current_user
|
|
|
|
|
|
|
|
@router.delete("/users/{item_id}", tags=["users"], response_model=users.User)
|
|
|
|
async def read_users_id(item_id : str, authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))], remove : bool = False):
|
|
|
|
user_repository = users.UserRepository(database=database.database)
|
|
|
|
user = user_repository.find_one_by_id(ObjectId(item_id))
|
2023-10-22 18:58:35 +02:00
|
|
|
user.status = 0
|
2023-10-14 18:20:08 +02:00
|
|
|
if remove is True:
|
2023-10-22 18:58:35 +02:00
|
|
|
user.status = -1
|
2023-10-14 18:29:07 +02:00
|
|
|
user_repository.save(user)
|
2023-10-14 18:20:08 +02:00
|
|
|
return user
|
2023-10-14 21:28:21 +02:00
|
|
|
|
2023-10-22 18:58:35 +02:00
|
|
|
@router.put("/users/me",tags=["users"], response_model=users.User, response_model_exclude=["id", "password", "roles", "status"])
|
2023-10-14 21:28:21 +02:00
|
|
|
async def read_users_me(current_user: Annotated[users.User, Depends(users_token.get_current_active_user)], authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin", "User"]))], userSingle: users.UserIn | None = None):
|
|
|
|
user_repository = users.UserRepository(database=database.database)
|
|
|
|
current_user.username = userSingle.username
|
2023-10-14 22:14:29 +02:00
|
|
|
current_user.password = user_token.get_password_hash(userSingle.password)
|
2023-10-14 21:28:21 +02:00
|
|
|
current_user.roles = userSingle.roles
|
2023-10-14 23:04:19 +02:00
|
|
|
current_user.email = userSingle.email
|
2023-10-14 21:28:21 +02:00
|
|
|
user_repository.save(current_user)
|
|
|
|
return current_user
|
|
|
|
|
|
|
|
@router.put("/users", tags=["users"], response_model=users.User, status_code=status.HTTP_200_OK)
|
|
|
|
async def read_users_id(authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))], userSingle: users.UserIn | None = None):
|
|
|
|
if userSingle is None:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=status.HTTP_400_BAD_REQUEST,
|
|
|
|
detail="Body request is empty"
|
2023-10-14 22:14:29 +02:00
|
|
|
)
|
|
|
|
user_repository = users.UserRepository(database=database.database)
|
|
|
|
|
2023-10-14 21:28:21 +02:00
|
|
|
user = user_repository.find_one_by({"username": {'$eq': userSingle.username}})
|
|
|
|
if user is None:
|
|
|
|
response.status_code = status.HTTP_201_CREATED
|
|
|
|
user = users.User()
|
|
|
|
user.username = userSingle.username
|
2023-10-25 23:42:34 +02:00
|
|
|
user.password = users_token.get_password_hash(userSingle.password)
|
2023-10-14 21:28:21 +02:00
|
|
|
user.roles = userSingle.roles
|
2023-10-14 23:04:19 +02:00
|
|
|
user.email = userSingle.email
|
2023-10-25 23:42:34 +02:00
|
|
|
user.firstName = userSingle.firstName
|
|
|
|
user.name = userSingle.name
|
|
|
|
user.birth = userSingle.birth
|
|
|
|
user.updated_at = datetime.today()
|
2023-10-14 21:28:21 +02:00
|
|
|
user_repository.save(user)
|
2023-10-15 16:17:37 +02:00
|
|
|
return user
|