Open nskartoredjo opened 2 days ago
Oh interesting. This issue is the cause of #24063 and the observed problem is limited to system collections that have "minimal app permissions" and can get additional permissions.
The reason is that the "additional permissions" don't include the app minimal permission fields, but just the additional fields. This seems like an oversight on the app side we will have to look in to.
Describe the Bug
Add the policy collection, you have two options:
all access
anduse custom
.What I expect is that,
all access
to be a shortcut to enabling all fields without any filters.However if I enable all fields, the behaviour still differs from if I opted for the
all access
option.To Reproduce
A
under this roleB
A
; you should see userB
token
field from the user read policyA
, you can't see any user now (this is another issue)token
field to the policyA
, things are still brokenall access
option nowA
, you can now see user B againDirectus Version
v11.1.1
Hosting Strategy
Self-Hosted (Docker Image)
Database
PostgreSQL 16