Skip to content

FOUR-31092 Military >> Unauthorized error with user TCO in tasks init…#8826

Open
gproly wants to merge 1 commit into
developfrom
bugfix/FOUR-31092
Open

FOUR-31092 Military >> Unauthorized error with user TCO in tasks init…#8826
gproly wants to merge 1 commit into
developfrom
bugfix/FOUR-31092

Conversation

@gproly
Copy link
Copy Markdown
Contributor

@gproly gproly commented May 13, 2026

…iated by SFTP

Description:
When a user can claim an active self-service task, they can still see the task but receive 403 from /broadcasting/auth when subscribing to private-ProcessMaker.Models.ProcessRequest.{id>. The previous channel authorization only allowed request owner, participants, and process managers, so valid self-service users were excluded from request-level permission checks.

Changes Updated routes/channels.phpto add a null-safe guard for missing requests and to include self-service task access in the ProcessRequest channel authorization check by usingcanUserClaimASelfServiceTask($user).

Details This aligns broadcast authorization with existing task-level authorization behavior and prevents false-negative access denials for valid self-service flows while keeping admin/owner/participant logic intact.

Related tickets:
https://processmaker.atlassian.net/browse/FOUR-31092

ci:deploy

…iated by SFTP

Description:
When a user can claim an active self-service task, they can still see the task but receive 403 from /broadcasting/auth when subscribing to private-ProcessMaker.Models.ProcessRequest.{id>. The previous channel authorization only allowed request owner, participants, and process managers, so valid self-service users were excluded from request-level permission checks.

Changes Updated routes/channels.phpto add a null-safe guard for missing requests and to include self-service task access in the ProcessRequest channel authorization check by usingcanUserClaimASelfServiceTask($user).

Details This aligns broadcast authorization with existing task-level authorization behavior and prevents false-negative access denials for valid self-service flows while keeping admin/owner/participant logic intact.

Related tickets:
https://processmaker.atlassian.net/browse/FOUR-31092
@processmaker-sonarqube
Copy link
Copy Markdown

Quality Gate passed Quality Gate passed

Issues
0 New issues
0 Fixed issues
0 Accepted issues

Measures
0 Security Hotspots
No data about Coverage
No data about Duplication

See analysis details on SonarQube

@Kookster310
Copy link
Copy Markdown
Contributor

QA server K8S was successfully deployed https://ci-bb7954ad49.engk8s.processmaker.net

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants