diff --git a/app/routers/events.py b/app/routers/events.py index e69de29..1705703 100644 --- a/app/routers/events.py +++ b/app/routers/events.py @@ -0,0 +1,241 @@ +from fastapi import APIRouter, Depends, HTTPException, status, Response +from fastapi.responses import JSONResponse +from datetime import datetime +from ..dependencies import users_token, permissions_checker, database +from ..models import events +from pydantic import EmailStr +from typing import Annotated +from bson import ObjectId +router = APIRouter() + + + +@router.get("/events", tags=["events"], response_model=list[events.EventOut]) +async def read_users(authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))], skip: int = 0, limit: int = 20, id_event: str | None = None, status: int | None = None): + if limit < 1 or skip < 0 or limit < skip: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="skip should be greater than 0 and limit should be greater than 1. Limit should be greater than skip" + ) + limit = limit + skip + listEvents = [] + event_repository = events.EventRepository(database=database.database) + object_search = {} + if status is not None: + object_search = {"status":{"$eq": status}} + if id_event is not None: + eventid = ObjectId(id_event) + object_search = {"id": {"$regex": userid}} + if status is not None: + object_search = {"$and":[{"id":{"$regex": eventid}}, {"status":{"$eq":status}}]} + + + for event_index in event_repository.find_by(object_search, limit=limit, skip=skip): + event = users.UserOut(id=event_index.id, name=event_index.name, place=event_index.place, status=event_index.status, start_date=event_index.start_date, end_date=event_index.end_date) + listEvents.append(event) + return listEvents + +@router.get("/users/search", tags=["users"], response_model=list[users.UserOut]) +async def read_users_search(authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin", "User"]))], skip: int = 0, limit: int = 20): + if limit < 1 or skip < 0 or limit < skip: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="skip should be greater than 0 and limit should be greater than 1. Limit should be greater than skip" + ) + if key is None or value is None: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="Key or/and value parameter is empty" + ) + limit = limit + skip + listUsers = [] + user_repository = users.UserRepository(database=database.database) + for user_index in user_repository.find_by({key: {'$regex': value}}, limit=limit, skip=skip): + user = users.UserOut(id=user_index.id, username=user_index.username, status=user_index.status, roles=user_index.roles, email=user_index.email, firstName=user_index.firstName, name=user_index.name) + listUsers.append(user) + return listUsers + + +@router.get("/users/me",tags=["users"], response_model=users.User, response_model_exclude=["id", "password", "roles", "status"]) +async def read_users_me(current_user: Annotated[users.User, Depends(users_token.get_current_active_user)], authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin", "User"]))]): + return current_user + +@router.get("/users/count", tags=["users"]) +async def read_users_count(authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))]): + count = database.database.get_collection("users").estimated_document_count() + content = {"count":count} + response = JSONResponse(content=content) + return response + + +@router.get("/users/{item_id}", tags=["users"], response_model=users.User) +async def read_users_id(item_id : str, authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))]): + user_repository = users.UserRepository(database=database.database) + user = user_repository.find_one_by_id(ObjectId(item_id)) + return user + + +@router.delete("/users/me",tags=["users"]) +async def delete_users_me(current_user: Annotated[users.User, Depends(users_token.get_current_active_user)], authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin", "User"]))], remove: bool = False): + user_repository = users.UserRepository(database=database.database) + + if remove is True: + current_user.deleted_at = datetime.today() + current_user.status = -1 + content = {"message": "users are deleted"} + else: + current_user.status = 0 + current_user.deleted_at = datetime.today() + content = {"message": "users are disabled"} + user_repository.save(current_user) + response = JSONResponse(content=content) + return response + +@router.delete("/users/groups",tags=["users"]) +async def delete_users_groups(authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))], remove: bool = False, userids: users.UserIDS | None = None): + if len(userids.ids) == 0: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="userids should be greater than 0" + ) + + user_repository = users.UserRepository(database=database.database) + for i in userids.ids: + user = user_repository.find_one_by_id(ObjectId(i)) + if remove is True: + user.status = -1 + user.deleted_at = datetime.today() + content = {"message": "users are deleted "} + else: + user.status = 0 + user.disabled_at = datetime.today() + content = {"message": "users are disabled"} + user_repository.save(user) + + response = JSONResponse(content=content) + return response + +@router.delete("/users/{item_id}", tags=["users"]) +async def delete_users_id(item_id : str, authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))], remove : bool = False): + user_repository = users.UserRepository(database=database.database) + user = user_repository.find_one_by_id(ObjectId(item_id)) + if remove is True: + user.status = -1 + user.deleted_at = datetime.today() + content = {"message": "users are deleted"} + else: + user.status = 0 + user.disabled_at = datetime.today() + content = {"message": "users are disabled"} + user_repository.save(user) + response = JSONResponse(content=content) + return response + +@router.put("/users/me",tags=["users"]) +async def update_users_me(current_user: Annotated[users.User, Depends(users_token.get_current_active_user)], authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin", "User"]))], userSingle: users.UserIn | None = None): + user_repository = users.UserRepository(database=database.database) + current_user.username = userSingle.username + current_user.password = user_token.get_password_hash(userSingle.password) + current_user.roles = userSingle.roles + current_user.email = userSingle.email + user_repository.save(current_user) + content = {"message": "user is updated"} + response = JSONResponse(content=content) + return current_user + +@router.put("/users", tags=["users"], status_code=status.HTTP_201_CREATED) +async def update_users(authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))], userSingle: users.UserIn | None = None): + if userSingle is None: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="Body request is empty" + ) + user_repository = users.UserRepository(database=database.database) + + user = user_repository.find_one_by({"$or":[{"username": {'$eq': userSingle.username}}, {"email": {"$eq": userSingle.email}}]}) + if user is not None: + if user.username == userSingle.username: + raise HTTPException( + status_code=status.HTTP_204_NO_CONTENT, + detail="username" + ) + if user.email == userSingle.email: + raise HTTPException( + status_code=status.HTTP_204_NO_CONTENT, + detail="email" + ) + + user = users.User(username=userSingle.username, password=users_token.get_password_hash(userSingle.password), email=userSingle.email) + user.roles = userSingle.roles + user.firstName = userSingle.firstName + user.name = userSingle.name + user.birth = userSingle.birth + user.created_at = datetime.today() + user_repository.save(user) + content = {"message": "user is created"} + response = JSONResponse(content=content, status_code=status.HTTP_201_CREATED) + return response + + +@router.put("/users/{item_id}", tags=["users"], status_code=status.HTTP_200_OK) +async def update_users_id(item_id: str, authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))], userSingle: users.UserIn | None = None, response: Response = Response): + if userSingle is None: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="Body request is empty" + ) + user_repository = users.UserRepository(database=database.database) + + user = user_repository.find_one_by({"id": {'$eq': ObjectId(item_id)}}) + if user is None: + raise HTTPException( + status_code=status.HTTP_404_NOT_FOUND, + detail="User not found" + ) + + user.username = userSingle.username + user.password = users_token.get_password_hash(userSingle.password) + user.roles = userSingle.roles + user.email = userSingle.email + user.firstName = userSingle.firstName + user.name = userSingle.name + user.birth = userSingle.birth + user.updated_at = datetime.today() + user_repository.save(user) + content = {"message": "user is updated"} + response = JSONResponse(content=content) + return response + + +@router.patch("/users/groups",tags=["users"]) +async def patch_users_groups(authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))], userids: users.UserIDS | None = None): + if len(userids.ids) == 0: + raise HTTPException( + status_code=status.HTTP_400_BAD_REQUEST, + detail="userids should be greater than 0" + ) + + user_repository = users.UserRepository(database=database.database) + content = {"message": "users are enabled"} + for i in userids.ids: + user = user_repository.find_one_by_id(ObjectId(i)) + user.status = 1 + user.disabled_at = None + user.deleted_at = None + user_repository.save(user) + + + response = JSONResponse(content=content) + return response + +@router.patch("/users/{item_id}", tags=["users"], response_model=users.User) +async def patch_users_id(item_id : str, authorize: Annotated[bool, Depends(permissions_checker.PermissionChecker(roles=["Admin"]))]): + user_repository = users.UserRepository(database=database.database) + user = user_repository.find_one_by_id(ObjectId(item_id)) + user.status = 1 + user.disabled_at = None + user.deleted_at = None + user_repository.save(user) + content = {"message": "user is enabled"} + response = JSONResponse(content=content) + return response \ No newline at end of file