Fix issue with determining when to hide sensitive fields from query definitions and never delete the query schema

This commit is contained in:
Andrew Kingston 2021-11-25 11:21:54 +00:00
parent e4e29ce1b2
commit 38219f0ea3
1 changed files with 6 additions and 3 deletions

View File

@ -1,6 +1,10 @@
const { processString } = require("@budibase/string-templates")
const CouchDB = require("../../db")
const { generateQueryID, getQueryParams } = require("../../db/utils")
const {
generateQueryID,
getQueryParams,
isProdAppID,
} = require("../../db/utils")
const { BaseQueryVerbs } = require("../../constants")
const env = require("../../environment")
const { Thread, ThreadType } = require("../../threads")
@ -90,10 +94,9 @@ exports.find = async function (ctx) {
const db = new CouchDB(ctx.appId)
const query = enrichQueries(await db.get(ctx.params.queryId))
// remove properties that could be dangerous in real app
if (env.isProd()) {
if (isProdAppID(ctx.appId)) {
delete query.fields
delete query.parameters
delete query.schema
}
ctx.body = query
}