2022-04-13 04:24:06 +02:00
|
|
|
from fastapi import Depends, FastAPI, HTTPException, status
|
2022-04-17 01:20:14 +02:00
|
|
|
from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm, OAuth2AuthorizationCodeBearer
|
2022-04-14 06:16:28 +02:00
|
|
|
from fastapi.security.api_key import APIKey
|
2022-03-06 14:13:50 +01:00
|
|
|
from sqlalchemy.orm import Session
|
|
|
|
|
2022-04-13 04:24:06 +02:00
|
|
|
from . import crud, models, schemas, auth_helper
|
2022-03-06 14:13:50 +01:00
|
|
|
from .database import SessionLocal, engine
|
|
|
|
|
2022-04-03 13:54:16 +02:00
|
|
|
from typing import List
|
2022-05-23 12:46:09 +02:00
|
|
|
from datetime import timedelta, datetime
|
2022-04-13 04:24:06 +02:00
|
|
|
import jwt
|
2022-04-03 13:54:16 +02:00
|
|
|
|
2022-03-06 14:13:50 +01:00
|
|
|
models.Base.metadata.create_all(bind=engine)
|
2022-04-13 04:24:06 +02:00
|
|
|
oauth = OAuth2PasswordBearer(tokenUrl="tkn")
|
2022-03-06 14:13:50 +01:00
|
|
|
|
|
|
|
app = FastAPI()
|
|
|
|
|
|
|
|
|
|
|
|
# Dependency
|
|
|
|
def get_db():
|
|
|
|
db = SessionLocal()
|
|
|
|
try:
|
|
|
|
yield db
|
|
|
|
finally:
|
|
|
|
db.close()
|
|
|
|
|
2022-04-13 22:23:42 +02:00
|
|
|
def get_current_user(token: str = Depends(oauth), db: Session = Depends(get_db)):
|
2022-04-13 04:24:06 +02:00
|
|
|
credentials_exception = HTTPException(
|
|
|
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
|
|
|
detail="Could not validate credentials",
|
|
|
|
headers={"WWW-Authenticate": "Bearer"},
|
|
|
|
)
|
|
|
|
try:
|
|
|
|
payload = jwt.decode(token, auth_helper.JWT_SECRET, algorithms=[auth_helper.JWT_ALGO])
|
|
|
|
username: str = payload.get("sub")
|
|
|
|
if username is None:
|
|
|
|
raise credentials_exception
|
|
|
|
token_data = schemas.TokenData(username=username)
|
|
|
|
except jwt.PyJWTError:
|
|
|
|
raise credentials_exception
|
|
|
|
user = crud.get_user_by_username(db, username=token_data.username)
|
|
|
|
if user is None:
|
|
|
|
raise credentials_exception
|
|
|
|
return user
|
|
|
|
|
2022-04-13 22:23:42 +02:00
|
|
|
def get_current_active_user(current_user: schemas.User = Depends(get_current_user)):
|
2022-04-13 04:24:06 +02:00
|
|
|
if not current_user.is_active:
|
|
|
|
raise HTTPException(status_code=400, detail="Inactive user")
|
|
|
|
return current_user
|
2022-03-06 14:13:50 +01:00
|
|
|
|
2022-04-17 20:20:45 +02:00
|
|
|
def get_current_iot_device(current_device: schemas.IotBluetoothMac = Depends(),
|
|
|
|
db: Session = Depends(get_db)):
|
|
|
|
credentials_exception = HTTPException(
|
|
|
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
|
|
|
detail="Could not validate credentials",
|
|
|
|
headers={"WWW-Authenticate": "Bearer"},
|
|
|
|
)
|
|
|
|
payload = jwt.decode(token, auth_helper.JWT_SECRET, algorithms=[auth_helper.JWT_ALGO])
|
|
|
|
mac_signed = payload.get("bluetooth_mac")
|
2022-04-17 20:34:50 +02:00
|
|
|
if (mac_signed != current_device): raise credentials_exception
|
|
|
|
device = crud.get_iot_entity_by_bluetooth_mac(db, mac_signed)
|
|
|
|
return device
|
2022-04-17 20:20:45 +02:00
|
|
|
|
2022-04-13 06:05:44 +02:00
|
|
|
@app.post("/users/reg", response_model=schemas.User, tags=['Users'])
|
2022-03-06 14:13:50 +01:00
|
|
|
def create_user(user: schemas.UserCreate, db: Session = Depends(get_db)):
|
|
|
|
db_user = crud.get_user_by_email(db, email=user.email)
|
|
|
|
if db_user:
|
|
|
|
raise HTTPException(status_code=400, detail="Email already registered")
|
2022-04-04 01:02:29 +02:00
|
|
|
|
|
|
|
db_user = crud.get_user_by_username(db, username=user.username)
|
|
|
|
if db_user:
|
|
|
|
raise HTTPException(status_code=400, detail="Username already registerd")
|
|
|
|
|
2022-03-06 14:13:50 +01:00
|
|
|
return crud.create_user(db=db, user=user)
|
|
|
|
|
2022-04-13 06:07:00 +02:00
|
|
|
@app.get("/users/me/", response_model=schemas.User, tags=['Users'])
|
2022-04-13 22:23:42 +02:00
|
|
|
def get_user_details(current_user: schemas.User = Depends(get_current_active_user)):
|
2022-04-13 06:07:00 +02:00
|
|
|
return current_user
|
2022-03-06 14:13:50 +01:00
|
|
|
|
2022-04-13 06:05:44 +02:00
|
|
|
@app.get("/admin/users/", response_model=List[schemas.User], tags=['Admin'])
|
2022-04-18 00:55:06 +02:00
|
|
|
def read_users(skip: int = 0, limit: int = 100, db: Session = Depends(get_db)):
|
2022-03-06 14:13:50 +01:00
|
|
|
users = crud.get_users(db, skip=skip, limit=limit)
|
|
|
|
return users
|
|
|
|
|
2022-04-13 06:05:44 +02:00
|
|
|
@app.get("/admin/iotentities/", response_model=List[schemas.IotEntity], tags=['Admin'])
|
2022-04-18 00:55:06 +02:00
|
|
|
def read_iot_entities(skip: int = 0, limit: int = 100, db: Session = Depends(get_db)):
|
2022-04-13 06:05:44 +02:00
|
|
|
iot_entities = crud.get_iot_entities(db, skip=skip, limit=limit)
|
|
|
|
return iot_entities
|
2022-03-06 14:13:50 +01:00
|
|
|
|
2022-04-14 00:37:30 +02:00
|
|
|
# TODO: Can duplicate
|
2022-04-13 07:34:12 +02:00
|
|
|
@app.post("/admin/iotentities/create", response_model=schemas.IotEntity, tags=['Admin'])
|
2022-04-18 00:55:06 +02:00
|
|
|
def create_iot_entities(iot_entity: schemas.IotEntityCreate, db: Session = Depends(get_db)):
|
2022-04-13 07:34:12 +02:00
|
|
|
iot_entities = crud.create_iot_entity(db, iot_entity)
|
|
|
|
return iot_entities
|
|
|
|
|
2022-04-13 06:05:44 +02:00
|
|
|
@app.get("/admin/users/{user_id}", response_model=schemas.User, tags=['Admin'])
|
2022-04-18 00:55:06 +02:00
|
|
|
def read_user(user_id: int, db: Session = Depends(get_db)):
|
2022-03-06 14:13:50 +01:00
|
|
|
db_user = crud.get_user(db, user_id=user_id)
|
|
|
|
if db_user is None:
|
|
|
|
raise HTTPException(status_code=404, detail="User not found")
|
|
|
|
return db_user
|
|
|
|
|
2022-04-14 00:37:30 +02:00
|
|
|
@app.post("/admin/users/allowdevice/id", tags=['Admin'])
|
2022-04-18 00:55:06 +02:00
|
|
|
def allow_user_for_iot_entity_by_id(request: schemas.UserAllowForIotEntityRequestByID, db: Session = Depends(get_db)):
|
2022-04-13 07:34:12 +02:00
|
|
|
user = crud.get_user(db, request.user_id)
|
|
|
|
if not user:
|
|
|
|
raise HTTPException(status_code=404, detail="User not found")
|
2022-04-13 08:57:48 +02:00
|
|
|
|
2022-04-13 07:34:12 +02:00
|
|
|
iot_entity = crud.get_iot_entity(db, request.iot_entity_id)
|
|
|
|
if not iot_entity:
|
|
|
|
raise HTTPException(status_code=404, detail="Iot Entity not found")
|
2022-04-13 08:57:48 +02:00
|
|
|
|
2022-04-13 07:34:12 +02:00
|
|
|
res = crud.create_user_link_to_iot(db, request.user_id, request.iot_entity_id)
|
|
|
|
if not res:
|
|
|
|
raise HTTPException(status_code=500, detail="Could not complete operation")
|
|
|
|
|
2022-04-18 01:39:45 +02:00
|
|
|
return
|
2022-03-06 14:13:50 +01:00
|
|
|
|
2022-04-14 00:37:30 +02:00
|
|
|
@app.post("/admin/users/disallowdevice/id", tags=['Admin'])
|
2022-04-18 00:55:06 +02:00
|
|
|
def disallow_user_for_iot_entity_by_id(request: schemas.UserAllowForIotEntityRequestByID, db: Session = Depends(get_db)):
|
2022-04-13 08:57:48 +02:00
|
|
|
user = crud.get_user(db, request.user_id)
|
|
|
|
if not user:
|
|
|
|
raise HTTPException(status_code=404, detail="User not found")
|
|
|
|
|
|
|
|
iot_entity = crud.get_iot_entity(db, request.iot_entity_id)
|
|
|
|
if not iot_entity:
|
|
|
|
raise HTTPException(status_code=404, detail="Iot Entity not found")
|
|
|
|
|
2022-04-18 01:39:45 +02:00
|
|
|
res = crud.remove_user_link_to_iot(db, request.user_id, request.iot_entity_id)
|
2022-04-13 08:57:48 +02:00
|
|
|
if not res:
|
|
|
|
raise HTTPException(status_code=500, detail="Could not complete operation")
|
|
|
|
|
|
|
|
return
|
|
|
|
|
2022-04-14 00:37:30 +02:00
|
|
|
@app.post("/admin/users/allowdevice/name", tags=['Admin'])
|
2022-04-18 00:55:06 +02:00
|
|
|
def allow_user_for_iot_entity_by_name(request: schemas.UserAllowForIotEntityRequestByUsername, db: Session = Depends(get_db)):
|
2022-04-14 00:37:30 +02:00
|
|
|
user = crud.get_user_by_username(db, request.username)
|
|
|
|
if not user:
|
|
|
|
raise HTTPException(status_code=404, detail="User not found")
|
|
|
|
|
|
|
|
iot_entity = crud.get_iot_entity_by_description(db, request.description)
|
|
|
|
if not iot_entity:
|
|
|
|
raise HTTPException(status_code=404, detail="Iot Entity not found")
|
|
|
|
|
|
|
|
res = crud.create_user_link_to_iot(db, user.id, iot_entity.id)
|
|
|
|
if not res:
|
|
|
|
raise HTTPException(status_code=500, detail="Could not complete operation")
|
|
|
|
|
|
|
|
return
|
|
|
|
|
2022-04-13 08:57:48 +02:00
|
|
|
@app.post("/admin/users/{user_id}/deactiveate", tags=['Admin'])
|
2022-04-18 00:55:06 +02:00
|
|
|
def deactiveate_user(user_id: int, db:Session = Depends(get_db)):
|
2022-04-13 08:57:48 +02:00
|
|
|
return
|
|
|
|
|
|
|
|
@app.post("/admin/users/{user_id}/activeate", tags=['Admin'])
|
2022-04-18 00:55:06 +02:00
|
|
|
def deactiveate_user(user_id: int, db:Session = Depends(get_db)):
|
2022-04-13 08:57:48 +02:00
|
|
|
return
|
|
|
|
|
2022-04-17 20:20:45 +02:00
|
|
|
@app.post("/admin/iotdevice/gentoken/", response_model=schemas.Token, tags=['Admin'])
|
|
|
|
def generate_token_for_iot_device(bluetooth_mac : schemas.IotBluetoothMac,
|
|
|
|
api_key: APIKey = Depends(auth_helper.valid_api_key)):
|
|
|
|
# We get here after a valid admin key, so send back permenant token
|
|
|
|
data = {"bluetooth_mac": bluetooth_mac.bluetooth_mac}
|
|
|
|
tkn = auth_helper.create_iot_dev_token(data)
|
|
|
|
return {"access_token": tkn, "token_type": "bearer"}
|
|
|
|
|
2022-04-13 06:05:44 +02:00
|
|
|
@app.get("/users/acesslist/", response_model=List[schemas.IotEntity], tags=['Users'])
|
|
|
|
def get_iot_access_list_for_user(db: Session = Depends(get_db), current_user: schemas.User = Depends(get_current_active_user)):
|
|
|
|
user = crud.get_user_by_username(db, current_user.username)
|
|
|
|
return user.authorized_devices
|
2022-03-06 14:13:50 +01:00
|
|
|
|
2022-04-18 01:39:45 +02:00
|
|
|
@app.post("/users/open", tags=['Users'])
|
2022-05-23 13:58:30 +02:00
|
|
|
def issue_open_door_command(command: schemas.OpenDoorRequestTime,
|
2022-04-18 00:43:12 +02:00
|
|
|
db: Session = Depends(get_db),
|
|
|
|
current_user: schemas.User = Depends(get_current_active_user)):
|
|
|
|
err = HTTPException(status_code=status.HTTP_401_UNAUTHORIZED,
|
|
|
|
detail="Unauthrized to open")
|
|
|
|
device = crud.get_iot_entity_by_bluetooth_mac(db, command.bluetooth_mac)
|
|
|
|
if not device: raise err
|
|
|
|
# TODO: Use database search rather then this linear search
|
|
|
|
user = crud.get_user(db, current_user.id)
|
|
|
|
for dev in user.authorized_devices:
|
|
|
|
if dev.bluetooth_mac == device.bluetooth_mac:
|
2022-05-23 13:58:30 +02:00
|
|
|
crud.set_open_door_request(db, device.id, command.time_seconds)
|
2022-05-23 12:46:09 +02:00
|
|
|
log_entry = schemas.DoorAccessLog(user_id=current_user.id,
|
|
|
|
door_bluetooth_mac=command.bluetooth_mac,
|
|
|
|
time=datetime.now())
|
|
|
|
crud.record_door_access_log(db, log_entry)
|
2022-04-18 00:43:12 +02:00
|
|
|
return device
|
|
|
|
raise err
|
|
|
|
|
2022-04-17 20:35:26 +02:00
|
|
|
@app.post("/users/tkn", response_model=schemas.Token, tags=['Users'])
|
2022-04-13 06:05:44 +02:00
|
|
|
@app.post("/tkn", response_model=schemas.Token, tags=['Users'])
|
2022-04-13 22:23:42 +02:00
|
|
|
def login_for_access_token(form_data: OAuth2PasswordRequestForm = Depends(), db: Session = Depends(get_db)):
|
2022-04-13 04:24:06 +02:00
|
|
|
user = auth_helper.authenticate_user(db, form_data.username, form_data.password)
|
|
|
|
if not user:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
|
|
|
detail="Incorrect username or password",
|
|
|
|
headers={"WWW-Authenticate": "Bearer"},
|
|
|
|
)
|
|
|
|
#access_token_expires = timedelta(minutes=ACCESS_TOKEN_EXPIRE_MINUTES)
|
|
|
|
access_token = auth_helper.create_access_token(
|
|
|
|
data={"sub": form_data.username}, expires_delta=timedelta(minutes=15)
|
|
|
|
)
|
|
|
|
return {"access_token": access_token, "token_type": "bearer"}
|
|
|
|
|
|
|
|
|
2022-05-08 21:09:06 +02:00
|
|
|
@app.post("/iotdevice/door/status", response_model=schemas.IotDoorPollingResponse, tags=['Iot'])
|
|
|
|
def polling_method_for_iot_entity(request: schemas.IotDoorPollingRequest,
|
|
|
|
db: Session = Depends(get_db)):
|
2022-05-23 13:36:29 +02:00
|
|
|
|
2022-05-08 21:09:06 +02:00
|
|
|
device: schemas.IotEntity = auth_helper.valid_iot_token(request.token, db)
|
|
|
|
if not device:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
|
|
|
detail="Could not validate credentials")
|
|
|
|
|
2022-05-23 13:36:29 +02:00
|
|
|
response : schemas.IotDoorPollingResponse = schemas.IotDoorPollingResponse(
|
|
|
|
open_command=device.open_request,
|
2022-05-23 13:58:30 +02:00
|
|
|
acces_list_counter=0,
|
|
|
|
time_seconds=device.time_seconds)
|
2022-05-23 13:36:29 +02:00
|
|
|
# Reset open_request to False
|
|
|
|
crud.clear_open_door_request(db, device.id)
|
2022-05-08 21:09:06 +02:00
|
|
|
return response
|
|
|
|
|
|
|
|
@app.post("/iotdevice/monitor/status", tags=['Iot'])
|
|
|
|
def polling_method_for_room_monitor(request: schemas.IotMonitorRoomInfo,
|
|
|
|
db: Session = Depends(get_db)):
|
|
|
|
device : schemas.IotEntity = auth_helper.valid_iot_token(request.token, db)
|
2022-05-23 12:46:09 +02:00
|
|
|
if not device:
|
|
|
|
raise HTTPException(
|
|
|
|
status_code=status.HTTP_401_UNAUTHORIZED,
|
|
|
|
detail="Could not validate credentials")
|
|
|
|
crud.record_room_sensor_data(db, request)
|
2022-05-08 21:09:06 +02:00
|
|
|
return request
|