summaryrefslogtreecommitdiffstats
path: root/api/webhook.go
diff options
context:
space:
mode:
authorChristopher Speller <crspeller@gmail.com>2015-09-30 11:30:11 -0400
committerChristopher Speller <crspeller@gmail.com>2015-09-30 14:26:37 -0400
commit7d31f3a271d933b8c276602d9fb77fd5d22055de (patch)
treeb836506cc084e1907e39ca0d7283a4175a25ba50 /api/webhook.go
parent89b77cc72ffd9dec6242f66277a4aeffe6fb737b (diff)
downloadchat-7d31f3a271d933b8c276602d9fb77fd5d22055de.tar.gz
chat-7d31f3a271d933b8c276602d9fb77fd5d22055de.tar.bz2
chat-7d31f3a271d933b8c276602d9fb77fd5d22055de.zip
Fixing some locations to use the IsTeamAdmin function which properly checks for system admin permissions.
Diffstat (limited to 'api/webhook.go')
-rw-r--r--api/webhook.go2
1 files changed, 1 insertions, 1 deletions
diff --git a/api/webhook.go b/api/webhook.go
index b67655ff5..e694b202c 100644
--- a/api/webhook.go
+++ b/api/webhook.go
@@ -86,7 +86,7 @@ func deleteIncomingHook(c *Context, w http.ResponseWriter, r *http.Request) {
c.Err = result.Err
return
} else {
- if c.Session.UserId != result.Data.(*model.IncomingWebhook).UserId && !model.IsInRole(c.Session.Roles, model.ROLE_TEAM_ADMIN) {
+ if c.Session.UserId != result.Data.(*model.IncomingWebhook).UserId && !c.IsTeamAdmin() {
c.LogAudit("fail - inappropriate conditions")
c.Err = model.NewAppError("deleteIncomingHook", "Inappropriate permissions to delete incoming webhook", "user_id="+c.Session.UserId)
return