quivr/backend/routes/authorizations/brain_authorization.py

76 lines
2.4 KiB
Python
Raw Normal View History

from typing import List, Optional, Union
from uuid import UUID
2023-07-13 18:54:23 +03:00
from auth.auth_bearer import get_current_user
from fastapi import Depends, HTTPException, status
from models import UserIdentity
from repository.brain import get_brain_for_user
from repository.brain.get_brain_details import get_brain_details
from routes.authorizations.types import RoleEnum
def has_brain_authorization(
required_roles: Optional[Union[RoleEnum, List[RoleEnum]]] = RoleEnum.Owner
):
2023-07-13 18:54:23 +03:00
"""
Decorator to check if the user has the required role(s) for the brain
param: required_roles: The role(s) required to access the brain
2023-07-13 18:54:23 +03:00
return: A wrapper function that checks the authorization
"""
async def wrapper(
brain_id: UUID, current_user: UserIdentity = Depends(get_current_user)
):
nonlocal required_roles
if isinstance(required_roles, str):
required_roles = [required_roles] # Convert single role to a list
2023-07-13 18:54:23 +03:00
validate_brain_authorization(
brain_id=brain_id, user_id=current_user.id, required_roles=required_roles
2023-07-13 18:54:23 +03:00
)
2023-07-13 18:54:23 +03:00
return wrapper
def validate_brain_authorization(
brain_id: UUID,
user_id: UUID,
required_roles: Optional[Union[RoleEnum, List[RoleEnum]]] = RoleEnum.Owner,
):
2023-07-13 18:54:23 +03:00
"""
Function to check if the user has the required role(s) for the brain
2023-07-13 18:54:23 +03:00
param: brain_id: The id of the brain
param: user_id: The id of the user
param: required_roles: The role(s) required to access the brain
2023-07-13 18:54:23 +03:00
return: None
"""
brain = get_brain_details(brain_id)
if brain and brain.status == "public":
return
if required_roles is None:
raise HTTPException(
status_code=status.HTTP_400_BAD_REQUEST,
detail="Missing required role",
)
user_brain = get_brain_for_user(user_id, brain_id)
if user_brain is None:
raise HTTPException(
status_code=status.HTTP_403_FORBIDDEN,
detail="You don't have permission for this brain",
)
# Convert single role to a list to handle both cases
if isinstance(required_roles, str):
required_roles = [required_roles]
# Check if the user has at least one of the required roles
if user_brain.rights not in required_roles:
raise HTTPException(
status_code=status.HTTP_403_FORBIDDEN,
detail="You don't have the required role(s) for this brain",
)