Skip to content

Commit a7ce187

Browse files
author
Will Toozs
committed
update variable name
1 parent 6f7b2d6 commit a7ce187

17 files changed

+19
-19
lines changed

lib/api/bucketDelete.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ function bucketDelete(authInfo, request, log, cb) {
3131
request,
3232
};
3333

34-
return metadataValidateBucket(metadataValParams, request.iamAuthzResults, log,
34+
return metadataValidateBucket(metadataValParams, request.actionImplicitDenies, log,
3535
(err, bucketMD) => {
3636
const corsHeaders = collectCorsHeaders(request.headers.origin,
3737
request.method, bucketMD);

lib/api/bucketDeleteCors.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ function bucketDeleteCors(authInfo, request, log, callback) {
3434
log.trace('found bucket in metadata');
3535

3636
if (!isBucketAuthorized(bucket, requestType, canonicalID, authInfo,
37-
request.iamAuthzResults, log, request)) {
37+
request.actionImplicitDenies, log, request)) {
3838
log.debug('access denied for user on bucket', {
3939
requestType,
4040
method: 'bucketDeleteCors',

lib/api/bucketDeleteEncryption.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ function bucketDeleteEncryption(authInfo, request, log, callback) {
2626
};
2727

2828
return async.waterfall([
29-
next => metadataValidateBucket(metadataValParams, request.iamAuthzResults, log, next),
29+
next => metadataValidateBucket(metadataValParams, request.actionImplicitDenies, log, next),
3030
(bucket, next) => checkExpectedBucketOwner(request.headers, bucket, log, err => next(err, bucket)),
3131
(bucket, next) => {
3232
const sseConfig = bucket.getServerSideEncryption();

lib/api/bucketDeleteLifecycle.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ function bucketDeleteLifecycle(authInfo, request, log, callback) {
2020
requestType: 'bucketDeleteLifecycle',
2121
request,
2222
};
23-
return metadataValidateBucket(metadataValParams, request.iamAuthzResults, log, (err, bucket) => {
23+
return metadataValidateBucket(metadataValParams, request.actionImplicitDenies, log, (err, bucket) => {
2424
const corsHeaders = collectCorsHeaders(headers.origin, method, bucket);
2525
if (err) {
2626
log.debug('error processing request', {

lib/api/bucketDeletePolicy.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ function bucketDeletePolicy(authInfo, request, log, callback) {
1919
requestType: 'bucketDeletePolicy',
2020
request,
2121
};
22-
return metadataValidateBucket(metadataValParams, request.iamAuthzResults, log, (err, bucket) => {
22+
return metadataValidateBucket(metadataValParams, request.actionImplicitDenies, log, (err, bucket) => {
2323
const corsHeaders = collectCorsHeaders(headers.origin, method, bucket);
2424
if (err) {
2525
log.debug('error processing request', {

lib/api/bucketDeleteReplication.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ function bucketDeleteReplication(authInfo, request, log, callback) {
2020
requestType: 'bucketDeleteReplication',
2121
request,
2222
};
23-
return metadataValidateBucket(metadataValParams, request.iamAuthzResults, log, (err, bucket) => {
23+
return metadataValidateBucket(metadataValParams, request.actionImplicitDenies, log, (err, bucket) => {
2424
const corsHeaders = collectCorsHeaders(headers.origin, method, bucket);
2525
if (err) {
2626
log.debug('error processing request', {

lib/api/bucketDeleteWebsite.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ function bucketDeleteWebsite(authInfo, request, log, callback) {
2626
log.trace('found bucket in metadata');
2727

2828
if (!isBucketAuthorized(bucket, requestType, canonicalID, authInfo,
29-
request.iamAuthzResults, log, request)) {
29+
request.actionImplicitDenies, log, request)) {
3030
log.debug('access denied for user on bucket', {
3131
requestType,
3232
method: 'bucketDeleteWebsite',

lib/api/multiObjectDelete.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -505,7 +505,7 @@ function multiObjectDelete(authInfo, request, log, callback) {
505505
bucketMD);
506506
}
507507
if (!isBucketAuthorized(bucketMD, 'objectDelete', canonicalID, authInfo,
508-
request.iamAuthzResults, log, request)) {
508+
request.actionImplicitDenies, log, request)) {
509509
log.trace("access denied due to bucket acl's");
510510
// if access denied at the bucket level, no access for
511511
// any of the objects so all results will be error results

lib/api/objectDelete.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ function objectDelete(authInfo, request, log, cb) {
5656
const canonicalID = authInfo.getCanonicalID();
5757
return async.waterfall([
5858
function validateBucketAndObj(next) {
59-
return metadataValidateBucketAndObj(valParams, request.iamAuthzResults, log,
59+
return metadataValidateBucketAndObj(valParams, request.actionImplicitDenies, log,
6060
(err, bucketMD, objMD) => {
6161
if (err) {
6262
return next(err, bucketMD);

lib/api/objectDeleteTagging.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ function objectDeleteTagging(authInfo, request, log, callback) {
4646
};
4747

4848
return async.waterfall([
49-
next => metadataValidateBucketAndObj(metadataValParams, request.iamAuthzResults, log,
49+
next => metadataValidateBucketAndObj(metadataValParams, request.actionImplicitDenies, log,
5050
(err, bucket, objectMD) => {
5151
if (err) {
5252
log.trace('request authorization failed',

0 commit comments

Comments
 (0)