From a321d39cb4d84ac4ec1f191b4baf16f8fe2a27ae Mon Sep 17 00:00:00 2001 From: GareArc Date: Thu, 29 May 2025 09:57:07 +0800 Subject: [PATCH] fix: remove app code check in web api --- api/controllers/web/passport.py | 7 ++++--- api/controllers/web/wraps.py | 4 +--- 2 files changed, 5 insertions(+), 6 deletions(-) diff --git a/api/controllers/web/passport.py b/api/controllers/web/passport.py index 185c26a61a..b5e8e3fff1 100644 --- a/api/controllers/web/passport.py +++ b/api/controllers/web/passport.py @@ -1,17 +1,18 @@ import uuid from datetime import UTC, datetime, timedelta +from flask import request +from flask_restful import Resource +from werkzeug.exceptions import NotFound, Unauthorized + from configs import dify_config from controllers.web import api from controllers.web.error import WebAppAuthRequiredError from extensions.ext_database import db -from flask import request -from flask_restful import Resource from libs.passport import PassportService from models.model import App, EndUser, Site from services.enterprise.enterprise_service import EnterpriseService from services.feature_service import FeatureService -from werkzeug.exceptions import NotFound, Unauthorized class PassportResource(Resource): diff --git a/api/controllers/web/wraps.py b/api/controllers/web/wraps.py index 933b8ae228..9c1c7b4e2a 100644 --- a/api/controllers/web/wraps.py +++ b/api/controllers/web/wraps.py @@ -44,9 +44,7 @@ def decode_jwt_token(): if auth_scheme != "bearer": raise Unauthorized("Invalid Authorization header format. Expected 'Bearer ' format.") decoded = PassportService().verify(tk) - decoded_app_code = decoded.get("app_code") - if not decoded_app_code or decoded_app_code != app_code: - raise Unauthorized("Invalid app code in token.") + app_code = decoded.get("app_code") app_model = db.session.query(App).filter(App.id == decoded["app_id"]).first() site = db.session.query(Site).filter(Site.code == app_code).first() if not app_model: