So I was doing some tests on permissions and I noticed a bug.
I created a user and gave no permission on that user. And I tested if I could see it’s permission.
I called the API on browser
'api/resource/Delivery Note Item?fields="*"
and it returned all the data. I tried with all child tables and it returns all the data. This is risky because users can see the data, even if you have not given them permission.
If I interpret your changes in commit 807a300 correctly, then the api for childtables is now completely disabled. Does it make sense? There are certainly cases in which I need the api for childtables …
Thanks @rmehta ! Bugfix seems to close the exploit.
In some use cases, it might be required to use the API child table function, which should be possible provided access rights. Now, it is completely locked. This is good for a security fix. In the long run, access management should be applied (allow child tables for all logged in users, or define access rules on child table and honor them).