X-Git-Url: http://source.bookstackapp.com/bookstack/blobdiff_plain/a6633642232efd164d4708967ab59e498fbff896..refs/pull/5280/head:/app/Http/Middleware/ApiAuthenticate.php diff --git a/app/Http/Middleware/ApiAuthenticate.php b/app/Http/Middleware/ApiAuthenticate.php index 728057bed..5f3ad3168 100644 --- a/app/Http/Middleware/ApiAuthenticate.php +++ b/app/Http/Middleware/ApiAuthenticate.php @@ -3,25 +3,20 @@ namespace BookStack\Http\Middleware; use BookStack\Exceptions\ApiAuthException; -use BookStack\Exceptions\UnauthorizedException; use Closure; use Illuminate\Http\Request; class ApiAuthenticate { - use ChecksForEmailConfirmation; - /** * Handle an incoming request. + * + * @throws ApiAuthException */ public function handle(Request $request, Closure $next) { // Validate the token and it's users API access - try { - $this->ensureAuthorizedBySessionOrToken(); - } catch (UnauthorizedException $exception) { - return $this->unauthorisedResponse($exception->getMessage(), $exception->getCode()); - } + $this->ensureAuthorizedBySessionOrToken(); return $next($request); } @@ -29,17 +24,18 @@ class ApiAuthenticate /** * Ensure the current user can access authenticated API routes, either via existing session * authentication or via API Token authentication. - * @throws UnauthorizedException + * + * @throws ApiAuthException */ protected function ensureAuthorizedBySessionOrToken(): void { // Return if the user is already found to be signed in via session-based auth. // This is to make it easy to browser the API via browser after just logging into the system. - if (signedInUser() || session()->isStarted()) { - $this->ensureEmailConfirmedIfRequested(); - if (!user()->can('access-api')) { + if (!user()->isGuest() || session()->isStarted()) { + if (!$this->sessionUserHasApiAccess()) { throw new ApiAuthException(trans('errors.api_user_no_api_permission'), 403); } + return; } @@ -48,19 +44,15 @@ class ApiAuthenticate // Validate the token and it's users API access auth()->authenticate(); - $this->ensureEmailConfirmedIfRequested(); } /** - * Provide a standard API unauthorised response. + * Check if the active session user has API access. */ - protected function unauthorisedResponse(string $message, int $code) + protected function sessionUserHasApiAccess(): bool { - return response()->json([ - 'error' => [ - 'code' => $code, - 'message' => $message, - ] - ], $code); + $hasApiPermission = user()->can('access-api'); + + return $hasApiPermission && user()->hasAppAccess(); } }