mirror of
https://github.com/jmagar/unraid-mcp.git
synced 2026-03-01 16:04:24 -08:00
Comprehensive fixes across Python code, shell scripts, and documentation addressing all remaining MEDIUM and LOW priority review comments. Python Code Fixes (27 fixes): - tools/info.py: Simplified dispatch with lookup tables, defensive guards, CPU fallback formatting, !s conversion flags, module-level sync assertion - tools/docker.py: Case-insensitive container ID regex, keyword-only confirm, module-level ALL_ACTIONS constant - tools/virtualization.py: Normalized single-VM dict responses, unified list/details queries - core/client.py: Fixed HTTP client singleton race condition, compound key substring matching for sensitive data redaction - subscriptions/: Extracted SSL context creation to shared helper in utils.py, replaced deprecated ssl._create_unverified_context API - tools/array.py: Renamed parity_history to parity_status, hoisted ALL_ACTIONS - tools/storage.py: Fixed dict(None) risks, temperature 0 falsiness bug - tools/notifications.py, keys.py, rclone.py: Fixed dict(None) TypeError risks - tests/: Fixed generator type annotations, added coverage for compound keys Shell Script Fixes (13 fixes): - dashboard.sh: Dynamic server discovery, conditional debug output, null-safe jq, notification count guard order, removed unused variables - unraid-query.sh: Proper JSON escaping via jq, --ignore-errors and --insecure CLI flags, TLS verification now on by default - validate-marketplace.sh: Removed unused YELLOW variable, defensive jq, simplified repository URL output Documentation Fixes (24+ fixes): - Version consistency: Updated all references to v0.2.0 across pyproject.toml, plugin.json, marketplace.json, MARKETPLACE.md, __init__.py, README files - Tool count updates: Changed all "26 tools" references to "10 tools, 90 actions" - Markdown lint: Fixed MD022, MD031, MD047 issues across multiple files - Research docs: Fixed auth headers, removed web artifacts, corrected stale info - Skills docs: Fixed query examples, endpoint counts, env var references All 227 tests pass, ruff and ty checks clean.
165 lines
5.2 KiB
Python
165 lines
5.2 KiB
Python
"""User management.
|
|
|
|
Provides the `unraid_users` tool with 8 actions for managing users,
|
|
cloud access, remote access settings, and allowed origins.
|
|
"""
|
|
|
|
from typing import Any, Literal
|
|
|
|
from fastmcp import FastMCP
|
|
|
|
from ..config.logging import logger
|
|
from ..core.client import make_graphql_request
|
|
from ..core.exceptions import ToolError
|
|
|
|
|
|
QUERIES: dict[str, str] = {
|
|
"me": """
|
|
query GetMe {
|
|
me { id name description roles }
|
|
}
|
|
""",
|
|
"list": """
|
|
query ListUsers {
|
|
users { id name description roles }
|
|
}
|
|
""",
|
|
"get": """
|
|
query GetUser($id: ID!) {
|
|
user(id: $id) { id name description roles }
|
|
}
|
|
""",
|
|
"cloud": """
|
|
query GetCloud {
|
|
cloud { status error }
|
|
}
|
|
""",
|
|
"remote_access": """
|
|
query GetRemoteAccess {
|
|
remoteAccess { enabled url }
|
|
}
|
|
""",
|
|
"origins": """
|
|
query GetAllowedOrigins {
|
|
allowedOrigins
|
|
}
|
|
""",
|
|
}
|
|
|
|
MUTATIONS: dict[str, str] = {
|
|
"add": """
|
|
mutation AddUser($input: addUserInput!) {
|
|
addUser(input: $input) { id name description roles }
|
|
}
|
|
""",
|
|
"delete": """
|
|
mutation DeleteUser($input: deleteUserInput!) {
|
|
deleteUser(input: $input) { id name }
|
|
}
|
|
""",
|
|
}
|
|
|
|
DESTRUCTIVE_ACTIONS = {"delete"}
|
|
|
|
USER_ACTIONS = Literal[
|
|
"me", "list", "get", "add", "delete", "cloud", "remote_access", "origins",
|
|
]
|
|
|
|
|
|
def register_users_tool(mcp: FastMCP) -> None:
|
|
"""Register the unraid_users tool with the FastMCP instance."""
|
|
|
|
@mcp.tool()
|
|
async def unraid_users(
|
|
action: USER_ACTIONS,
|
|
confirm: bool = False,
|
|
user_id: str | None = None,
|
|
name: str | None = None,
|
|
password: str | None = None,
|
|
role: str | None = None,
|
|
) -> dict[str, Any]:
|
|
"""Manage Unraid users and access settings.
|
|
|
|
Actions:
|
|
me - Get current authenticated user info
|
|
list - List all users
|
|
get - Get a specific user (requires user_id)
|
|
add - Add a new user (requires name, password; optional role)
|
|
delete - Delete a user (requires user_id, confirm=True)
|
|
cloud - Get Unraid Connect cloud status
|
|
remote_access - Get remote access settings
|
|
origins - Get allowed origins
|
|
"""
|
|
all_actions = set(QUERIES) | set(MUTATIONS)
|
|
if action not in all_actions:
|
|
raise ToolError(f"Invalid action '{action}'. Must be one of: {sorted(all_actions)}")
|
|
|
|
if action in DESTRUCTIVE_ACTIONS and not confirm:
|
|
raise ToolError(f"Action '{action}' is destructive. Set confirm=True to proceed.")
|
|
|
|
try:
|
|
logger.info(f"Executing unraid_users action={action}")
|
|
|
|
if action == "me":
|
|
data = await make_graphql_request(QUERIES["me"])
|
|
return data.get("me") or {}
|
|
|
|
if action == "list":
|
|
data = await make_graphql_request(QUERIES["list"])
|
|
users = data.get("users", [])
|
|
return {"users": list(users) if isinstance(users, list) else []}
|
|
|
|
if action == "get":
|
|
if not user_id:
|
|
raise ToolError("user_id is required for 'get' action")
|
|
data = await make_graphql_request(QUERIES["get"], {"id": user_id})
|
|
return data.get("user") or {}
|
|
|
|
if action == "add":
|
|
if not name or not password:
|
|
raise ToolError("add requires name and password")
|
|
input_data: dict[str, Any] = {"name": name, "password": password}
|
|
if role:
|
|
input_data["role"] = role.upper()
|
|
data = await make_graphql_request(
|
|
MUTATIONS["add"], {"input": input_data}
|
|
)
|
|
return {
|
|
"success": True,
|
|
"user": data.get("addUser", {}),
|
|
}
|
|
|
|
if action == "delete":
|
|
if not user_id:
|
|
raise ToolError("user_id is required for 'delete' action")
|
|
data = await make_graphql_request(
|
|
MUTATIONS["delete"], {"input": {"id": user_id}}
|
|
)
|
|
return {
|
|
"success": True,
|
|
"message": f"User '{user_id}' deleted",
|
|
}
|
|
|
|
if action == "cloud":
|
|
data = await make_graphql_request(QUERIES["cloud"])
|
|
return data.get("cloud") or {}
|
|
|
|
if action == "remote_access":
|
|
data = await make_graphql_request(QUERIES["remote_access"])
|
|
return data.get("remoteAccess") or {}
|
|
|
|
if action == "origins":
|
|
data = await make_graphql_request(QUERIES["origins"])
|
|
origins = data.get("allowedOrigins", [])
|
|
return {"origins": list(origins) if isinstance(origins, list) else []}
|
|
|
|
raise ToolError(f"Unhandled action '{action}' — this is a bug")
|
|
|
|
except ToolError:
|
|
raise
|
|
except Exception as e:
|
|
logger.error(f"Error in unraid_users action={action}: {e}", exc_info=True)
|
|
raise ToolError(f"Failed to execute users/{action}: {e!s}") from e
|
|
|
|
logger.info("Users tool registered successfully")
|