| | import logging |
| | from typing import Optional |
| |
|
| | from open_webui.models.auths import Auths |
| | from open_webui.models.groups import Groups |
| | from open_webui.models.chats import Chats |
| | from open_webui.models.users import ( |
| | UserModel, |
| | UserRoleUpdateForm, |
| | Users, |
| | UserSettings, |
| | UserUpdateForm, |
| | ) |
| |
|
| |
|
| | from open_webui.socket.main import get_active_status_by_user_id |
| | from open_webui.constants import ERROR_MESSAGES |
| | from open_webui.env import SRC_LOG_LEVELS |
| | from fastapi import APIRouter, Depends, HTTPException, Request, status |
| | from pydantic import BaseModel |
| |
|
| | from open_webui.utils.auth import get_admin_user, get_password_hash, get_verified_user |
| | from open_webui.utils.access_control import get_permissions |
| |
|
| |
|
| | log = logging.getLogger(__name__) |
| | log.setLevel(SRC_LOG_LEVELS["MODELS"]) |
| |
|
| | router = APIRouter() |
| |
|
| | |
| | |
| | |
| |
|
| |
|
| | @router.get("/", response_model=list[UserModel]) |
| | async def get_users( |
| | skip: Optional[int] = None, |
| | limit: Optional[int] = None, |
| | user=Depends(get_admin_user), |
| | ): |
| | return Users.get_users(skip, limit) |
| |
|
| |
|
| | |
| | |
| | |
| |
|
| |
|
| | @router.get("/groups") |
| | async def get_user_groups(user=Depends(get_verified_user)): |
| | return Groups.get_groups_by_member_id(user.id) |
| |
|
| |
|
| | |
| | |
| | |
| |
|
| |
|
| | @router.get("/permissions") |
| | async def get_user_permissisions(request: Request, user=Depends(get_verified_user)): |
| | user_permissions = get_permissions( |
| | user.id, request.app.state.config.USER_PERMISSIONS |
| | ) |
| |
|
| | return user_permissions |
| |
|
| |
|
| | |
| | |
| | |
| | class WorkspacePermissions(BaseModel): |
| | models: bool = False |
| | knowledge: bool = False |
| | prompts: bool = False |
| | tools: bool = False |
| |
|
| |
|
| | class SharingPermissions(BaseModel): |
| | public_models: bool = True |
| | public_knowledge: bool = True |
| | public_prompts: bool = True |
| | public_tools: bool = True |
| |
|
| |
|
| | class ChatPermissions(BaseModel): |
| | controls: bool = True |
| | file_upload: bool = True |
| | delete: bool = True |
| | edit: bool = True |
| | share: bool = True |
| | export: bool = True |
| | stt: bool = True |
| | tts: bool = True |
| | call: bool = True |
| | multiple_models: bool = True |
| | temporary: bool = True |
| | temporary_enforced: bool = False |
| |
|
| |
|
| | class FeaturesPermissions(BaseModel): |
| | direct_tool_servers: bool = False |
| | web_search: bool = True |
| | image_generation: bool = True |
| | code_interpreter: bool = True |
| |
|
| |
|
| | class UserPermissions(BaseModel): |
| | workspace: WorkspacePermissions |
| | sharing: SharingPermissions |
| | chat: ChatPermissions |
| | features: FeaturesPermissions |
| |
|
| |
|
| | @router.get("/default/permissions", response_model=UserPermissions) |
| | async def get_default_user_permissions(request: Request, user=Depends(get_admin_user)): |
| | return { |
| | "workspace": WorkspacePermissions( |
| | **request.app.state.config.USER_PERMISSIONS.get("workspace", {}) |
| | ), |
| | "sharing": SharingPermissions( |
| | **request.app.state.config.USER_PERMISSIONS.get("sharing", {}) |
| | ), |
| | "chat": ChatPermissions( |
| | **request.app.state.config.USER_PERMISSIONS.get("chat", {}) |
| | ), |
| | "features": FeaturesPermissions( |
| | **request.app.state.config.USER_PERMISSIONS.get("features", {}) |
| | ), |
| | } |
| |
|
| |
|
| | @router.post("/default/permissions") |
| | async def update_default_user_permissions( |
| | request: Request, form_data: UserPermissions, user=Depends(get_admin_user) |
| | ): |
| | request.app.state.config.USER_PERMISSIONS = form_data.model_dump() |
| | return request.app.state.config.USER_PERMISSIONS |
| |
|
| |
|
| | |
| | |
| | |
| |
|
| |
|
| | @router.post("/update/role", response_model=Optional[UserModel]) |
| | async def update_user_role(form_data: UserRoleUpdateForm, user=Depends(get_admin_user)): |
| | if user.id != form_data.id and form_data.id != Users.get_first_user().id: |
| | return Users.update_user_role_by_id(form_data.id, form_data.role) |
| |
|
| | raise HTTPException( |
| | status_code=status.HTTP_403_FORBIDDEN, |
| | detail=ERROR_MESSAGES.ACTION_PROHIBITED, |
| | ) |
| |
|
| |
|
| | |
| | |
| | |
| |
|
| |
|
| | @router.get("/user/settings", response_model=Optional[UserSettings]) |
| | async def get_user_settings_by_session_user(user=Depends(get_verified_user)): |
| | user = Users.get_user_by_id(user.id) |
| | if user: |
| | return user.settings |
| | else: |
| | raise HTTPException( |
| | status_code=status.HTTP_400_BAD_REQUEST, |
| | detail=ERROR_MESSAGES.USER_NOT_FOUND, |
| | ) |
| |
|
| |
|
| | |
| | |
| | |
| |
|
| |
|
| | @router.post("/user/settings/update", response_model=UserSettings) |
| | async def update_user_settings_by_session_user( |
| | form_data: UserSettings, user=Depends(get_verified_user) |
| | ): |
| | user = Users.update_user_settings_by_id(user.id, form_data.model_dump()) |
| | if user: |
| | return user.settings |
| | else: |
| | raise HTTPException( |
| | status_code=status.HTTP_400_BAD_REQUEST, |
| | detail=ERROR_MESSAGES.USER_NOT_FOUND, |
| | ) |
| |
|
| |
|
| | |
| | |
| | |
| |
|
| |
|
| | @router.get("/user/info", response_model=Optional[dict]) |
| | async def get_user_info_by_session_user(user=Depends(get_verified_user)): |
| | user = Users.get_user_by_id(user.id) |
| | if user: |
| | return user.info |
| | else: |
| | raise HTTPException( |
| | status_code=status.HTTP_400_BAD_REQUEST, |
| | detail=ERROR_MESSAGES.USER_NOT_FOUND, |
| | ) |
| |
|
| |
|
| | |
| | |
| | |
| |
|
| |
|
| | @router.post("/user/info/update", response_model=Optional[dict]) |
| | async def update_user_info_by_session_user( |
| | form_data: dict, user=Depends(get_verified_user) |
| | ): |
| | user = Users.get_user_by_id(user.id) |
| | if user: |
| | if user.info is None: |
| | user.info = {} |
| |
|
| | user = Users.update_user_by_id(user.id, {"info": {**user.info, **form_data}}) |
| | if user: |
| | return user.info |
| | else: |
| | raise HTTPException( |
| | status_code=status.HTTP_400_BAD_REQUEST, |
| | detail=ERROR_MESSAGES.USER_NOT_FOUND, |
| | ) |
| | else: |
| | raise HTTPException( |
| | status_code=status.HTTP_400_BAD_REQUEST, |
| | detail=ERROR_MESSAGES.USER_NOT_FOUND, |
| | ) |
| |
|
| |
|
| | |
| | |
| | |
| |
|
| |
|
| | class UserResponse(BaseModel): |
| | name: str |
| | profile_image_url: str |
| | active: Optional[bool] = None |
| |
|
| |
|
| | @router.get("/{user_id}", response_model=UserResponse) |
| | async def get_user_by_id(user_id: str, user=Depends(get_verified_user)): |
| | |
| | |
| | if user_id.startswith("shared-"): |
| | chat_id = user_id.replace("shared-", "") |
| | chat = Chats.get_chat_by_id(chat_id) |
| | if chat: |
| | user_id = chat.user_id |
| | else: |
| | raise HTTPException( |
| | status_code=status.HTTP_400_BAD_REQUEST, |
| | detail=ERROR_MESSAGES.USER_NOT_FOUND, |
| | ) |
| |
|
| | user = Users.get_user_by_id(user_id) |
| |
|
| | if user: |
| | return UserResponse( |
| | **{ |
| | "name": user.name, |
| | "profile_image_url": user.profile_image_url, |
| | "active": get_active_status_by_user_id(user_id), |
| | } |
| | ) |
| | else: |
| | raise HTTPException( |
| | status_code=status.HTTP_400_BAD_REQUEST, |
| | detail=ERROR_MESSAGES.USER_NOT_FOUND, |
| | ) |
| |
|
| |
|
| | |
| | |
| | |
| |
|
| |
|
| | @router.post("/{user_id}/update", response_model=Optional[UserModel]) |
| | async def update_user_by_id( |
| | user_id: str, |
| | form_data: UserUpdateForm, |
| | session_user=Depends(get_admin_user), |
| | ): |
| | |
| | try: |
| | first_user = Users.get_first_user() |
| | if first_user and user_id == first_user.id and session_user.id != user_id: |
| | raise HTTPException( |
| | status_code=status.HTTP_403_FORBIDDEN, |
| | detail=ERROR_MESSAGES.ACTION_PROHIBITED, |
| | ) |
| | except Exception as e: |
| | log.error(f"Error checking primary admin status: {e}") |
| | raise HTTPException( |
| | status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, |
| | detail="Could not verify primary admin status.", |
| | ) |
| |
|
| | user = Users.get_user_by_id(user_id) |
| |
|
| | if user: |
| | if form_data.email.lower() != user.email: |
| | email_user = Users.get_user_by_email(form_data.email.lower()) |
| | if email_user: |
| | raise HTTPException( |
| | status_code=status.HTTP_400_BAD_REQUEST, |
| | detail=ERROR_MESSAGES.EMAIL_TAKEN, |
| | ) |
| |
|
| | if form_data.password: |
| | hashed = get_password_hash(form_data.password) |
| | log.debug(f"hashed: {hashed}") |
| | Auths.update_user_password_by_id(user_id, hashed) |
| |
|
| | Auths.update_email_by_id(user_id, form_data.email.lower()) |
| | updated_user = Users.update_user_by_id( |
| | user_id, |
| | { |
| | "name": form_data.name, |
| | "email": form_data.email.lower(), |
| | "profile_image_url": form_data.profile_image_url, |
| | }, |
| | ) |
| |
|
| | if updated_user: |
| | return updated_user |
| |
|
| | raise HTTPException( |
| | status_code=status.HTTP_400_BAD_REQUEST, |
| | detail=ERROR_MESSAGES.DEFAULT(), |
| | ) |
| |
|
| | raise HTTPException( |
| | status_code=status.HTTP_400_BAD_REQUEST, |
| | detail=ERROR_MESSAGES.USER_NOT_FOUND, |
| | ) |
| |
|
| |
|
| | |
| | |
| | |
| |
|
| |
|
| | @router.delete("/{user_id}", response_model=bool) |
| | async def delete_user_by_id(user_id: str, user=Depends(get_admin_user)): |
| | |
| | try: |
| | first_user = Users.get_first_user() |
| | if first_user and user_id == first_user.id: |
| | raise HTTPException( |
| | status_code=status.HTTP_403_FORBIDDEN, |
| | detail=ERROR_MESSAGES.ACTION_PROHIBITED, |
| | ) |
| | except Exception as e: |
| | log.error(f"Error checking primary admin status: {e}") |
| | raise HTTPException( |
| | status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, |
| | detail="Could not verify primary admin status.", |
| | ) |
| |
|
| | if user.id != user_id: |
| | result = Auths.delete_auth_by_id(user_id) |
| |
|
| | if result: |
| | return True |
| |
|
| | raise HTTPException( |
| | status_code=status.HTTP_500_INTERNAL_SERVER_ERROR, |
| | detail=ERROR_MESSAGES.DELETE_USER_ERROR, |
| | ) |
| |
|
| | |
| | raise HTTPException( |
| | status_code=status.HTTP_403_FORBIDDEN, |
| | detail=ERROR_MESSAGES.ACTION_PROHIBITED, |
| | ) |
| |
|