Closed simonw closed 4 years ago
I'm going to fix this in the view_graphql
and view_graphql_schema
view functions:
First check view-database
- if that says False
then disallow access, if it says True
then allow access. If it says None
check view-instance
.
This plugin currently ignores permissions when constructing the schema. This doesn't lead to any information leakage, since the actual calls to resolve GraphQL queries dispatch to
TableView
which respects permissions - but it does mean that the GraphQL endpoint can "leak" the schema structure of a database even when that database should not be visible according toview-instance
orview-database
permissions.