diff options
author | Christopher Speller <crspeller@gmail.com> | 2015-09-30 11:30:11 -0400 |
---|---|---|
committer | Christopher Speller <crspeller@gmail.com> | 2015-09-30 14:26:37 -0400 |
commit | 7d31f3a271d933b8c276602d9fb77fd5d22055de (patch) | |
tree | b836506cc084e1907e39ca0d7283a4175a25ba50 /api/webhook.go | |
parent | 89b77cc72ffd9dec6242f66277a4aeffe6fb737b (diff) | |
download | chat-7d31f3a271d933b8c276602d9fb77fd5d22055de.tar.gz chat-7d31f3a271d933b8c276602d9fb77fd5d22055de.tar.bz2 chat-7d31f3a271d933b8c276602d9fb77fd5d22055de.zip |
Fixing some locations to use the IsTeamAdmin function which properly checks for system admin permissions.
Diffstat (limited to 'api/webhook.go')
-rw-r--r-- | api/webhook.go | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/api/webhook.go b/api/webhook.go index b67655ff5..e694b202c 100644 --- a/api/webhook.go +++ b/api/webhook.go @@ -86,7 +86,7 @@ func deleteIncomingHook(c *Context, w http.ResponseWriter, r *http.Request) { c.Err = result.Err return } else { - if c.Session.UserId != result.Data.(*model.IncomingWebhook).UserId && !model.IsInRole(c.Session.Roles, model.ROLE_TEAM_ADMIN) { + if c.Session.UserId != result.Data.(*model.IncomingWebhook).UserId && !c.IsTeamAdmin() { c.LogAudit("fail - inappropriate conditions") c.Err = model.NewAppError("deleteIncomingHook", "Inappropriate permissions to delete incoming webhook", "user_id="+c.Session.UserId) return |