mirror of
https://github.com/BookStackApp/BookStack.git
synced 2026-02-15 19:06:40 +03:00
Privileges in Bookstack #5267
Closed
opened 2026-02-05 09:52:34 +03:00 by OVERLORD
·
4 comments
No Branch/Tag Specified
development
l10n_development
release
v25-12
llm_only
vectors
v25-11
docker_env
drawio_rendering
user_permissions
ldap_host_failover
svg_image
prosemirror
captcha_example
fix/video-export
v25.12.3
v25.12.2
v25.12.1
v25.12
v25.11.6
v25.11.5
v25.11.4
v24.11.4
v25.11.3
v25.11.2
v25.11.1
v25.11
v25.07.3
v25.07.2
v25.07.1
v25.07
v25.05.2
v25.05.1
v25.05
v25.02.5
v25.02.4
v25.02.3
v25.02.2
v25.02.1
v25.02
v24.12.1
v24.12
v24.10.3
v24.10.2
v24.10.1
v24.10
v24.05.4
v24.05.3
v24.05.2
v24.05.1
v24.05
v24.02.3
v24.02.2
v24.02.1
v24.02
v23.12.3
v23.12.2
v23.12.1
v23.12
v23.10.4
v23.10.3
v23.10.2
v23.10.1
v23.10
v23.08.3
v23.08.2
v23.08.1
v23.08
v23.06.2
v23.06.1
v23.06
v23.05.2
v23.05.1
v23.05
v23.02.3
v23.02.2
v23.02.1
v23.02
v23.01.1
v23.01
v22.11.1
v22.11
v22.10.2
v22.10.1
v22.10
v22.09.1
v22.09
v22.07.3
v22.07.2
v22.07.1
v22.07
v22.06.2
v22.06.1
v22.06
v22.04.2
v22.04.1
v22.04
v22.03.1
v22.03
v22.02.3
v22.02.2
v22.02.1
v22.02
v21.12.5
v21.12.4
v21.12.3
v21.12.2
v21.12.1
v21.12
v21.11.3
v21.11.2
v21.11.1
v21.11
v21.10.3
v21.10.2
v21.10.1
v21.10
v21.08.6
v21.08.5
v21.08.4
v21.08.3
v21.08.2
v21.08.1
v21.08
v21.05.4
v21.05.3
v21.05.2
v21.05.1
v21.05
v21.04.6
v21.04.5
v21.04.4
v21.04.3
v21.04.2
v21.04.1
v21.04
v0.31.8
v0.31.7
v0.31.6
v0.31.5
v0.31.4
v0.31.3
v0.31.2
v0.31.1
v0.31.0
v0.30.7
v0.30.6
v0.30.5
v0.30.4
v0.30.3
v0.30.2
v0.30.1
v0.30.0
v0.29.3
v0.29.2
v0.29.1
v0.29.0
v0.28.3
v0.28.2
v0.28.1
v0.28.0
v0.27.5
v0.27.4
v0.27.3
v0.27.2
v0.27.1
v0.27
v0.26.4
v0.26.3
v0.26.2
v0.26.1
v0.26.0
v0.25.5
v0.25.4
v0.25.3
v0.25.2
v0.25.1
v0.25.0
v0.24.3
v0.24.2
v0.24.1
v0.24.0
v0.23.2
v0.23.1
v0.23.0
v0.22.0
v0.21.0
v0.20.3
v0.20.2
v0.20.1
v0.20.0
v0.19.0
v0.18.5
v0.18.4
v0.18.3
v0.18.2
v0.18.1
v0.18.0
v0.17.4
v0.17.3
v0.17.2
v0.17.1
v0.17.0
v0.16.3
v0.16.2
v0.16.1
v0.16.0
v0.15.3
v0.15.2
v0.15.1
v0.15.0
v0.14.3
v0.14.2
v0.14.1
v0.14.0
v0.13.1
v0.13.0
v0.12.2
v0.12.1
v0.12.0
v0.11.2
v0.11.1
v0.11.0
v0.10.0
v0.9.3
v0.9.2
v0.9.1
v0.9.0
v0.8.2
v0.8.1
v0.8.0
v0.7.6
v0.7.5
v0.7.4
v0.7.3
0.7.2
v.0.7.1
v0.7.0
v0.6.3
v0.6.2
v0.6.1
v0.6.0
v0.5.0
Labels
Clear labels
🎨 Design
📖 Docs Update
🐛 Bug
🐛 Bug
:cat2:🐈 Possible duplicate
💿 Database
☕ Open to discussion
💻 Front-End
🐕 Support
🚪 Authentication
🌍 Translations
🔌 API Task
🏭 Back-End
⛲ Upstream
🔨 Feature Request
🛠️ Enhancement
🛠️ Enhancement
🛠️ Enhancement
❤️ Happy feedback
🔒 Security
🔍 Pending Validation
💆 UX
📝 WYSIWYG Editor
🌔 Out of scope
🔩 API Request
:octocat: Admin/Meta
🖌️ View Customization
❓ Question
🚀 Priority
🛡️ Blocked
🚚 Export System
♿ A11y
🔧 Maintenance
> Markdown Editor
pull-request
Mirrored from GitHub Pull Request
No Label
🐕 Support
Milestone
No items
No Milestone
Projects
Clear projects
No project
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: starred/BookStack#5267
Reference in New Issue
Block a user
Blocking a user prevents them from interacting with repositories, such as opening or commenting on pull requests or issues. Learn more about blocking a user.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @qu1dam on GitHub (Apr 23, 2025).
Attempted Debugging
Searched GitHub Issues
Describe the Scenario
Hello everyone,
I have the following situation: I would like to allow access to the Bookstack application within our internal environment so that it is available to everyone without the need to log in.
However, if a user chooses to log in, they should be able to see an additional shelf, which is also accessible to other users, but each user should only see their own book.
I can see that this should be possible through permission settings, but I can’t seem to get it to work properly.
If I create a separate group and grant that group view permissions so that a user added to it can see it, and then I set it so that the user should only see their own content — the permission settings don’t seem to apply as expected.
I would appreciate any help or guidance on how to achieve this, if it is even possible. Thank you!
Exact BookStack Version
v25.02
Log Content
No response
Hosting Environment
PHP 8.3.6, Ubuntu 24.04.2 LTS
@ssddanbrown commented on GitHub (Apr 23, 2025):
Hi @qu1dam,
"Own" permissions are only really relevant to single users (the assigned owner in the item permission view), not groups.
For your scenario, it sounds like you need to set role-specific permissions on the content (book, chapter,page,shelf), by setting just "View" permissions (and other permissions) for just the allows roles, then uncheck "Inherit defaults" on the "Everyone Else" option to prevent default view permissions allowing view access.
Alternatively, you can add specific permissions for the "Public" role (assuming this is still assigned to the guest user), providing no permissions. This method specifically prevents view to non-logged-in users, rather than limiting access to specific other roles.
Lastly: Shelf permissions don't auto-apply to child content, you'd have to copy the permissions to child books (which there is a button for on the permission pages). Book (and chapter) permissions auto-cascade unless overridden below.
It's generally easier to manage things at a book-level when it comes to scenarios where permissions are in play.
@qu1dam commented on GitHub (Apr 23, 2025):
Thanks for the response.
For example, I would like to ask if the following scenario is possible, because I have set it up this way, but the privileges still aren't being restricted as expected.
Currently, view privileges are enabled for everyone who visits the site, and all users have access to books and shelves.
I created an additional Shelf and added a group called "Employees" to it, who have view-only access, while everyone else is denied access.
In the "Employees" group, I assigned privileges to view only their own content.
There are currently two users in that group, but when they log in, both can see each other's books, even though user1 should only see their own book, and user2 likewise should only see their own.
Right now, logged-in users who belong to the "Employees" group can see books created by each other.
@ssddanbrown commented on GitHub (Apr 24, 2025):
Again, it's hard to understand your scenario or your desire, since permissions can be complex.
Do the books have book-level permissions set upon them? (Permissions view when looking at the book). Maybe copied from the shelf?
If the
Employeeshave a book-level permission there, then that will override any role-level "Own" permissions, since it's more specific, and I'd expect that anyone in theEmployeesrole can see any book with book-level permissions which allow theEmployeesview permission.The
Ownpermissions don't really work well with item-level permissions, since any item-level permission will take precedence.@ssddanbrown commented on GitHub (Jun 23, 2025):
Since there's been no further follow-up on this I'll go ahead and close it off.