fix: bad jwt return pattern

This commit is contained in:
GareArc 2025-05-29 14:48:17 +08:00
parent dc79ec52ea
commit 38097a75da
No known key found for this signature in database
5 changed files with 21 additions and 19 deletions

View File

@ -1,11 +1,11 @@
from flask import request
from flask_restful import Resource, marshal_with, reqparse
from controllers.common import fields from controllers.common import fields
from controllers.web import api from controllers.web import api
from controllers.web.error import AppUnavailableError from controllers.web.error import AppUnavailableError
from controllers.web.wraps import WebApiResource from controllers.web.wraps import WebApiResource
from core.app.app_config.common.parameters_mapping import \ from core.app.app_config.common.parameters_mapping import get_parameters_from_feature_dict
get_parameters_from_feature_dict
from flask import request
from flask_restful import Resource, marshal_with, reqparse
from libs.passport import PassportService from libs.passport import PassportService
from models.model import App, AppMode from models.model import App, AppMode
from services.app_service import AppService from services.app_service import AppService

View File

@ -34,7 +34,7 @@ class LoginApi(Resource):
raise AccountNotFound() raise AccountNotFound()
token = WebAppAuthService.login(account=account) token = WebAppAuthService.login(account=account)
return {"result": "success", "token": token} return {"result": "success", "access_token": token}
# class LogoutApi(Resource): # class LogoutApi(Resource):
@ -99,7 +99,7 @@ class EmailCodeLoginApi(Resource):
token = WebAppAuthService.login(account=account) token = WebAppAuthService.login(account=account)
AccountService.reset_login_error_rate_limit(args["email"]) AccountService.reset_login_error_rate_limit(args["email"])
return {"result": "success", "token": token} return {"result": "success", "access_token": token}
api.add_resource(LoginApi, "/login") api.add_resource(LoginApi, "/login")

View File

@ -1,17 +1,18 @@
import uuid import uuid
from datetime import UTC, datetime, timedelta from datetime import UTC, datetime, timedelta
from flask import request
from flask_restful import Resource
from werkzeug.exceptions import NotFound, Unauthorized
from configs import dify_config from configs import dify_config
from controllers.web import api from controllers.web import api
from controllers.web.error import WebAppAuthRequiredError from controllers.web.error import WebAppAuthRequiredError
from extensions.ext_database import db from extensions.ext_database import db
from flask import request
from flask_restful import Resource
from libs.passport import PassportService from libs.passport import PassportService
from models.model import App, EndUser, Site from models.model import App, EndUser, Site
from services.enterprise.enterprise_service import EnterpriseService from services.enterprise.enterprise_service import EnterpriseService
from services.feature_service import FeatureService from services.feature_service import FeatureService
from werkzeug.exceptions import NotFound, Unauthorized
class PassportResource(Resource): class PassportResource(Resource):

View File

@ -1,17 +1,16 @@
from functools import wraps from functools import wraps
from controllers.web.error import (WebAppAuthAccessDeniedError,
WebAppAuthRequiredError)
from extensions.ext_database import db
from flask import request from flask import request
from flask_restful import Resource from flask_restful import Resource
from werkzeug.exceptions import BadRequest, NotFound, Unauthorized
from controllers.web.error import WebAppAuthAccessDeniedError, WebAppAuthRequiredError
from extensions.ext_database import db
from libs.passport import PassportService from libs.passport import PassportService
from models.model import App, EndUser, Site from models.model import App, EndUser, Site
from services.enterprise.enterprise_service import (EnterpriseService, from services.enterprise.enterprise_service import EnterpriseService, WebAppSettings
WebAppSettings)
from services.feature_service import FeatureService from services.feature_service import FeatureService
from services.webapp_auth_service import WebAppAuthService from services.webapp_auth_service import WebAppAuthService
from werkzeug.exceptions import BadRequest, NotFound, Unauthorized
def validate_jwt_token(view=None): def validate_jwt_token(view=None):

View File

@ -2,6 +2,8 @@ import random
from datetime import UTC, datetime, timedelta from datetime import UTC, datetime, timedelta
from typing import Any, Optional, cast from typing import Any, Optional, cast
from werkzeug.exceptions import NotFound, Unauthorized
from configs import dify_config from configs import dify_config
from extensions.ext_database import db from extensions.ext_database import db
from libs.helper import TokenManager from libs.helper import TokenManager
@ -11,10 +13,8 @@ from models.account import Account, AccountStatus
from models.model import App, EndUser, Site from models.model import App, EndUser, Site
from services.app_service import AppService from services.app_service import AppService
from services.enterprise.enterprise_service import EnterpriseService from services.enterprise.enterprise_service import EnterpriseService
from services.errors.account import (AccountLoginError, AccountNotFoundError, from services.errors.account import AccountLoginError, AccountNotFoundError, AccountPasswordError
AccountPasswordError)
from tasks.mail_email_code_login import send_email_code_login_mail_task from tasks.mail_email_code_login import send_email_code_login_mail_task
from werkzeug.exceptions import NotFound, Unauthorized
class WebAppAuthService: class WebAppAuthService:
@ -118,7 +118,9 @@ class WebAppAuthService:
return token return token
@classmethod @classmethod
def is_app_require_permission_check(cls, app_code: str = None, app_id: str = None, access_mode: str = None) -> bool: def is_app_require_permission_check(
cls, app_code: Optional[str] = None, app_id: Optional[str] = None, access_mode: Optional[str] = None
) -> bool:
""" """
Check if the app requires permission check based on its access mode. Check if the app requires permission check based on its access mode.
""" """