2020-12-02 08:09:08 +00:00
|
|
|
#!/usr/bin/env python
|
|
|
|
#
|
|
|
|
# Copyright (C) 2020 GNS3 Technologies Inc.
|
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
"""
|
|
|
|
API routes for users.
|
|
|
|
"""
|
|
|
|
|
2021-08-10 12:23:21 +00:00
|
|
|
from fastapi import APIRouter, Depends, HTTPException, Response, status
|
2020-12-07 06:22:36 +00:00
|
|
|
from fastapi.security import OAuth2PasswordRequestForm
|
2020-12-02 08:09:08 +00:00
|
|
|
from uuid import UUID
|
|
|
|
from typing import List
|
|
|
|
|
|
|
|
from gns3server import schemas
|
2020-12-16 07:54:21 +00:00
|
|
|
from gns3server.controller.controller_error import (
|
2021-06-06 07:22:47 +00:00
|
|
|
ControllerError,
|
2020-12-16 07:54:21 +00:00
|
|
|
ControllerBadRequestError,
|
|
|
|
ControllerNotFoundError,
|
2021-04-18 08:09:47 +00:00
|
|
|
ControllerForbiddenError,
|
2020-12-16 07:54:21 +00:00
|
|
|
)
|
|
|
|
|
2020-12-02 08:09:08 +00:00
|
|
|
from gns3server.db.repositories.users import UsersRepository
|
2021-06-03 06:10:12 +00:00
|
|
|
from gns3server.db.repositories.rbac import RbacRepository
|
2020-12-02 08:09:08 +00:00
|
|
|
from gns3server.services import auth_service
|
|
|
|
|
|
|
|
from .dependencies.authentication import get_current_active_user
|
2020-12-07 06:22:36 +00:00
|
|
|
from .dependencies.database import get_repository
|
2020-12-02 08:09:08 +00:00
|
|
|
|
|
|
|
import logging
|
2021-04-13 09:16:50 +00:00
|
|
|
|
2020-12-02 08:09:08 +00:00
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
|
|
router = APIRouter()
|
|
|
|
|
|
|
|
|
2021-04-20 02:29:02 +00:00
|
|
|
@router.post("/login", response_model=schemas.Token)
|
|
|
|
async def login(
|
|
|
|
users_repo: UsersRepository = Depends(get_repository(UsersRepository)),
|
|
|
|
form_data: OAuth2PasswordRequestForm = Depends(),
|
|
|
|
) -> schemas.Token:
|
|
|
|
"""
|
|
|
|
Default user login method using forms (x-www-form-urlencoded).
|
|
|
|
Example: curl http://host:port/v3/users/login -H "Content-Type: application/x-www-form-urlencoded" -d "username=admin&password=admin"
|
|
|
|
"""
|
|
|
|
|
|
|
|
user = await users_repo.authenticate_user(username=form_data.username, password=form_data.password)
|
|
|
|
if not user:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
|
|
|
detail="Authentication was unsuccessful.",
|
|
|
|
headers={"WWW-Authenticate": "Bearer"},
|
|
|
|
)
|
|
|
|
|
|
|
|
token = schemas.Token(access_token=auth_service.create_access_token(user.username), token_type="bearer")
|
|
|
|
return token
|
|
|
|
|
|
|
|
|
|
|
|
@router.post("/authenticate", response_model=schemas.Token)
|
|
|
|
async def authenticate(
|
|
|
|
user_credentials: schemas.Credentials,
|
|
|
|
users_repo: UsersRepository = Depends(get_repository(UsersRepository)),
|
|
|
|
) -> schemas.Token:
|
|
|
|
"""
|
|
|
|
Alternative authentication method using json.
|
2022-04-07 08:21:47 +00:00
|
|
|
Example: curl http://host:port/v3/users/authenticate -d '{"username": "admin", "password": "admin"}' -H "Content-Type: application/json"
|
2021-04-20 02:29:02 +00:00
|
|
|
"""
|
|
|
|
|
|
|
|
user = await users_repo.authenticate_user(username=user_credentials.username, password=user_credentials.password)
|
|
|
|
if not user:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
|
|
|
detail="Authentication was unsuccessful.",
|
|
|
|
headers={"WWW-Authenticate": "Bearer"},
|
|
|
|
)
|
|
|
|
|
|
|
|
token = schemas.Token(access_token=auth_service.create_access_token(user.username), token_type="bearer")
|
|
|
|
return token
|
|
|
|
|
|
|
|
|
2021-05-27 07:58:44 +00:00
|
|
|
@router.get("/me", response_model=schemas.User)
|
|
|
|
async def get_logged_in_user(current_user: schemas.User = Depends(get_current_active_user)) -> schemas.User:
|
|
|
|
"""
|
|
|
|
Get the current active user.
|
|
|
|
"""
|
|
|
|
|
|
|
|
return current_user
|
|
|
|
|
|
|
|
|
2021-08-09 07:06:18 +00:00
|
|
|
@router.put("/me", response_model=schemas.User)
|
|
|
|
async def update_logged_in_user(
|
|
|
|
user_update: schemas.LoggedInUserUpdate,
|
|
|
|
current_user: schemas.User = Depends(get_current_active_user),
|
|
|
|
users_repo: UsersRepository = Depends(get_repository(UsersRepository))
|
|
|
|
) -> schemas.User:
|
2021-05-27 07:58:44 +00:00
|
|
|
"""
|
2021-08-09 07:06:18 +00:00
|
|
|
Update the current active user.
|
2021-05-27 07:58:44 +00:00
|
|
|
"""
|
|
|
|
|
2021-08-09 07:06:18 +00:00
|
|
|
if user_update.email and await users_repo.get_user_by_email(user_update.email):
|
|
|
|
raise ControllerBadRequestError(f"Email '{user_update.email}' is already registered")
|
|
|
|
|
|
|
|
return await users_repo.update_user(current_user.user_id, user_update)
|
2021-05-27 07:58:44 +00:00
|
|
|
|
|
|
|
|
2021-04-20 02:29:02 +00:00
|
|
|
@router.get("", response_model=List[schemas.User], dependencies=[Depends(get_current_active_user)])
|
2021-04-19 00:10:04 +00:00
|
|
|
async def get_users(
|
2021-04-20 02:29:02 +00:00
|
|
|
users_repo: UsersRepository = Depends(get_repository(UsersRepository))
|
2021-04-19 00:10:04 +00:00
|
|
|
) -> List[schemas.User]:
|
2020-12-02 08:09:08 +00:00
|
|
|
"""
|
|
|
|
Get all users.
|
|
|
|
"""
|
|
|
|
|
2021-04-05 04:51:41 +00:00
|
|
|
return await users_repo.get_users()
|
2020-12-02 08:09:08 +00:00
|
|
|
|
|
|
|
|
2021-04-20 02:29:02 +00:00
|
|
|
@router.post(
|
|
|
|
"",
|
|
|
|
response_model=schemas.User,
|
|
|
|
dependencies=[Depends(get_current_active_user)],
|
|
|
|
status_code=status.HTTP_201_CREATED
|
|
|
|
)
|
2020-12-07 06:22:36 +00:00
|
|
|
async def create_user(
|
2021-04-19 00:10:04 +00:00
|
|
|
user_create: schemas.UserCreate,
|
2021-04-20 02:29:02 +00:00
|
|
|
users_repo: UsersRepository = Depends(get_repository(UsersRepository))
|
2020-12-07 06:22:36 +00:00
|
|
|
) -> schemas.User:
|
2020-12-02 08:09:08 +00:00
|
|
|
"""
|
|
|
|
Create a new user.
|
|
|
|
"""
|
|
|
|
|
2021-04-05 04:51:41 +00:00
|
|
|
if await users_repo.get_user_by_username(user_create.username):
|
|
|
|
raise ControllerBadRequestError(f"Username '{user_create.username}' is already registered")
|
2020-12-02 08:09:08 +00:00
|
|
|
|
2021-04-05 04:51:41 +00:00
|
|
|
if user_create.email and await users_repo.get_user_by_email(user_create.email):
|
|
|
|
raise ControllerBadRequestError(f"Email '{user_create.email}' is already registered")
|
2020-12-02 08:09:08 +00:00
|
|
|
|
2021-04-05 04:51:41 +00:00
|
|
|
return await users_repo.create_user(user_create)
|
2020-12-02 08:09:08 +00:00
|
|
|
|
|
|
|
|
2021-04-20 02:29:02 +00:00
|
|
|
@router.get("/{user_id}", dependencies=[Depends(get_current_active_user)], response_model=schemas.User)
|
2020-12-07 06:22:36 +00:00
|
|
|
async def get_user(
|
2021-04-19 00:10:04 +00:00
|
|
|
user_id: UUID,
|
|
|
|
users_repo: UsersRepository = Depends(get_repository(UsersRepository)),
|
2020-12-07 06:22:36 +00:00
|
|
|
) -> schemas.User:
|
2020-12-02 08:09:08 +00:00
|
|
|
"""
|
|
|
|
Get an user.
|
|
|
|
"""
|
|
|
|
|
2021-04-05 04:51:41 +00:00
|
|
|
user = await users_repo.get_user(user_id)
|
2020-12-02 08:09:08 +00:00
|
|
|
if not user:
|
|
|
|
raise ControllerNotFoundError(f"User '{user_id}' not found")
|
|
|
|
return user
|
|
|
|
|
|
|
|
|
2021-04-20 02:29:02 +00:00
|
|
|
@router.put("/{user_id}", dependencies=[Depends(get_current_active_user)], response_model=schemas.User)
|
2020-12-07 06:22:36 +00:00
|
|
|
async def update_user(
|
2021-04-19 00:10:04 +00:00
|
|
|
user_id: UUID,
|
|
|
|
user_update: schemas.UserUpdate,
|
2021-04-20 02:29:02 +00:00
|
|
|
users_repo: UsersRepository = Depends(get_repository(UsersRepository))
|
2020-12-07 06:22:36 +00:00
|
|
|
) -> schemas.User:
|
2020-12-02 08:09:08 +00:00
|
|
|
"""
|
|
|
|
Update an user.
|
|
|
|
"""
|
|
|
|
|
2021-08-09 07:06:18 +00:00
|
|
|
if user_update.username and await users_repo.get_user_by_username(user_update.username):
|
|
|
|
raise ControllerBadRequestError(f"Username '{user_update.username}' is already registered")
|
|
|
|
|
|
|
|
if user_update.email and await users_repo.get_user_by_email(user_update.email):
|
|
|
|
raise ControllerBadRequestError(f"Email '{user_update.email}' is already registered")
|
|
|
|
|
2021-04-05 04:51:41 +00:00
|
|
|
user = await users_repo.update_user(user_id, user_update)
|
2020-12-02 08:09:08 +00:00
|
|
|
if not user:
|
|
|
|
raise ControllerNotFoundError(f"User '{user_id}' not found")
|
|
|
|
return user
|
|
|
|
|
|
|
|
|
2021-04-26 06:51:16 +00:00
|
|
|
@router.delete(
|
|
|
|
"/{user_id}",
|
|
|
|
dependencies=[Depends(get_current_active_user)],
|
|
|
|
status_code=status.HTTP_204_NO_CONTENT
|
|
|
|
)
|
2020-12-16 07:54:21 +00:00
|
|
|
async def delete_user(
|
2021-04-13 09:16:50 +00:00
|
|
|
user_id: UUID,
|
|
|
|
users_repo: UsersRepository = Depends(get_repository(UsersRepository)),
|
2021-08-10 12:23:21 +00:00
|
|
|
) -> Response:
|
2020-12-02 08:09:08 +00:00
|
|
|
"""
|
|
|
|
Delete an user.
|
|
|
|
"""
|
|
|
|
|
2021-04-26 06:51:16 +00:00
|
|
|
user = await users_repo.get_user(user_id)
|
|
|
|
if not user:
|
|
|
|
raise ControllerNotFoundError(f"User '{user_id}' not found")
|
|
|
|
|
|
|
|
if user.is_superadmin:
|
2021-04-19 00:10:04 +00:00
|
|
|
raise ControllerForbiddenError("The super admin cannot be deleted")
|
2020-12-16 07:54:21 +00:00
|
|
|
|
2021-04-05 04:51:41 +00:00
|
|
|
success = await users_repo.delete_user(user_id)
|
2020-12-02 08:09:08 +00:00
|
|
|
if not success:
|
2021-06-06 07:22:47 +00:00
|
|
|
raise ControllerError(f"User '{user_id}' could not be deleted")
|
2020-12-02 08:09:08 +00:00
|
|
|
|
2021-08-10 12:23:21 +00:00
|
|
|
return Response(status_code=status.HTTP_204_NO_CONTENT)
|
|
|
|
|
2020-12-02 08:09:08 +00:00
|
|
|
|
2021-05-16 07:36:23 +00:00
|
|
|
@router.get(
|
|
|
|
"/{user_id}/groups",
|
|
|
|
dependencies=[Depends(get_current_active_user)],
|
|
|
|
response_model=List[schemas.UserGroup]
|
|
|
|
)
|
2021-05-15 05:40:02 +00:00
|
|
|
async def get_user_memberships(
|
|
|
|
user_id: UUID,
|
|
|
|
users_repo: UsersRepository = Depends(get_repository(UsersRepository))
|
|
|
|
) -> List[schemas.UserGroup]:
|
|
|
|
"""
|
|
|
|
Get user memberships.
|
|
|
|
"""
|
|
|
|
|
|
|
|
return await users_repo.get_user_memberships(user_id)
|
2021-06-03 06:10:12 +00:00
|
|
|
|
|
|
|
|
|
|
|
@router.get(
|
|
|
|
"/{user_id}/permissions",
|
|
|
|
dependencies=[Depends(get_current_active_user)],
|
|
|
|
response_model=List[schemas.Permission]
|
|
|
|
)
|
|
|
|
async def get_user_permissions(
|
|
|
|
user_id: UUID,
|
|
|
|
rbac_repo: RbacRepository = Depends(get_repository(RbacRepository))
|
|
|
|
) -> List[schemas.Permission]:
|
|
|
|
"""
|
|
|
|
Get user permissions.
|
|
|
|
"""
|
|
|
|
|
|
|
|
return await rbac_repo.get_user_permissions(user_id)
|
|
|
|
|
|
|
|
|
|
|
|
@router.put(
|
|
|
|
"/{user_id}/permissions/{permission_id}",
|
|
|
|
dependencies=[Depends(get_current_active_user)],
|
|
|
|
status_code=status.HTTP_204_NO_CONTENT
|
|
|
|
)
|
|
|
|
async def add_permission_to_user(
|
|
|
|
user_id: UUID,
|
|
|
|
permission_id: UUID,
|
|
|
|
rbac_repo: RbacRepository = Depends(get_repository(RbacRepository))
|
2021-08-10 12:23:21 +00:00
|
|
|
) -> Response:
|
2021-06-03 06:10:12 +00:00
|
|
|
"""
|
|
|
|
Add a permission to an user.
|
|
|
|
"""
|
|
|
|
|
|
|
|
permission = await rbac_repo.get_permission(permission_id)
|
|
|
|
if not permission:
|
|
|
|
raise ControllerNotFoundError(f"Permission '{permission_id}' not found")
|
|
|
|
|
|
|
|
user = await rbac_repo.add_permission_to_user(user_id, permission)
|
|
|
|
if not user:
|
|
|
|
raise ControllerNotFoundError(f"User '{user_id}' not found")
|
|
|
|
|
2021-08-10 12:23:21 +00:00
|
|
|
return Response(status_code=status.HTTP_204_NO_CONTENT)
|
|
|
|
|
2021-06-03 06:10:12 +00:00
|
|
|
|
|
|
|
@router.delete(
|
|
|
|
"/{user_id}/permissions/{permission_id}",
|
|
|
|
dependencies=[Depends(get_current_active_user)],
|
|
|
|
status_code=status.HTTP_204_NO_CONTENT
|
|
|
|
)
|
|
|
|
async def remove_permission_from_user(
|
|
|
|
user_id: UUID,
|
|
|
|
permission_id: UUID,
|
|
|
|
rbac_repo: RbacRepository = Depends(get_repository(RbacRepository)),
|
2021-08-10 12:23:21 +00:00
|
|
|
) -> Response:
|
2021-06-03 06:10:12 +00:00
|
|
|
"""
|
|
|
|
Remove permission from an user.
|
|
|
|
"""
|
|
|
|
|
|
|
|
permission = await rbac_repo.get_permission(permission_id)
|
|
|
|
if not permission:
|
|
|
|
raise ControllerNotFoundError(f"Permission '{permission_id}' not found")
|
|
|
|
|
|
|
|
user = await rbac_repo.remove_permission_from_user(user_id, permission)
|
|
|
|
if not user:
|
|
|
|
raise ControllerNotFoundError(f"User '{user_id}' not found")
|
2021-08-10 12:23:21 +00:00
|
|
|
|
|
|
|
return Response(status_code=status.HTTP_204_NO_CONTENT)
|