Merge pull request #14133 from Budibase/return-unauthorized-instead-of-forbidden
Return 401 instead of 403
This commit is contained in:
commit
578281fb2e
|
@ -203,7 +203,7 @@ describe("/permission", () => {
|
||||||
// replicate changes before checking permissions
|
// replicate changes before checking permissions
|
||||||
await config.publish()
|
await config.publish()
|
||||||
|
|
||||||
await config.api.viewV2.publicSearch(view.id, undefined, { status: 403 })
|
await config.api.viewV2.publicSearch(view.id, undefined, { status: 401 })
|
||||||
})
|
})
|
||||||
|
|
||||||
it("should ignore the view permissions if the flag is not on", async () => {
|
it("should ignore the view permissions if the flag is not on", async () => {
|
||||||
|
@ -221,7 +221,7 @@ describe("/permission", () => {
|
||||||
await config.publish()
|
await config.publish()
|
||||||
|
|
||||||
await config.api.viewV2.publicSearch(view.id, undefined, {
|
await config.api.viewV2.publicSearch(view.id, undefined, {
|
||||||
status: 403,
|
status: 401,
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -250,8 +250,8 @@ describe("/permission", () => {
|
||||||
.send(basicRow(table._id))
|
.send(basicRow(table._id))
|
||||||
.set(config.publicHeaders())
|
.set(config.publicHeaders())
|
||||||
.expect("Content-Type", /json/)
|
.expect("Content-Type", /json/)
|
||||||
.expect(403)
|
.expect(401)
|
||||||
expect(res.status).toEqual(403)
|
expect(res.status).toEqual(401)
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
|
|
@ -151,7 +151,7 @@ export const checkPermissionsEndpoint = async ({
|
||||||
await exports
|
await exports
|
||||||
.createRequest(config.request, method, url, body)
|
.createRequest(config.request, method, url, body)
|
||||||
.set(failHeader)
|
.set(failHeader)
|
||||||
.expect(403)
|
.expect(401)
|
||||||
}
|
}
|
||||||
|
|
||||||
export const getDB = () => {
|
export const getDB = () => {
|
||||||
|
|
|
@ -1490,7 +1490,7 @@ describe.each([
|
||||||
it("does not allow public users to fetch by default", async () => {
|
it("does not allow public users to fetch by default", async () => {
|
||||||
await config.publish()
|
await config.publish()
|
||||||
await config.api.viewV2.publicSearch(view.id, undefined, {
|
await config.api.viewV2.publicSearch(view.id, undefined, {
|
||||||
status: 403,
|
status: 401,
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
||||||
|
@ -1534,7 +1534,7 @@ describe.each([
|
||||||
await config.publish()
|
await config.publish()
|
||||||
|
|
||||||
await config.api.viewV2.publicSearch(view.id, undefined, {
|
await config.api.viewV2.publicSearch(view.id, undefined, {
|
||||||
status: 403,
|
status: 401,
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
})
|
})
|
||||||
|
|
|
@ -96,7 +96,7 @@ const authorized =
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!ctx.user) {
|
if (!ctx.user) {
|
||||||
return ctx.throw(403, "No user info found")
|
return ctx.throw(401, "No user info found")
|
||||||
}
|
}
|
||||||
|
|
||||||
// get the resource roles
|
// get the resource roles
|
||||||
|
@ -148,7 +148,7 @@ const authorized =
|
||||||
|
|
||||||
// check authenticated
|
// check authenticated
|
||||||
if (!ctx.isAuthenticated) {
|
if (!ctx.isAuthenticated) {
|
||||||
return ctx.throw(403, "Session not authenticated")
|
return ctx.throw(401, "Session not authenticated")
|
||||||
}
|
}
|
||||||
|
|
||||||
// check general builder stuff, this middleware is a good way
|
// check general builder stuff, this middleware is a good way
|
||||||
|
|
|
@ -105,7 +105,7 @@ describe("Authorization middleware", () => {
|
||||||
it("throws when no user data is present in context", async () => {
|
it("throws when no user data is present in context", async () => {
|
||||||
await config.executeMiddleware()
|
await config.executeMiddleware()
|
||||||
|
|
||||||
expect(config.throw).toHaveBeenCalledWith(403, "No user info found")
|
expect(config.throw).toHaveBeenCalledWith(401, "No user info found")
|
||||||
})
|
})
|
||||||
|
|
||||||
it("passes on to next() middleware if user is an admin", async () => {
|
it("passes on to next() middleware if user is an admin", async () => {
|
||||||
|
@ -157,7 +157,7 @@ describe("Authorization middleware", () => {
|
||||||
|
|
||||||
await config.executeMiddleware()
|
await config.executeMiddleware()
|
||||||
expect(config.throw).toHaveBeenCalledWith(
|
expect(config.throw).toHaveBeenCalledWith(
|
||||||
403,
|
401,
|
||||||
"Session not authenticated"
|
"Session not authenticated"
|
||||||
)
|
)
|
||||||
})
|
})
|
||||||
|
|
Loading…
Reference in New Issue