Skip to content

Commit f9aade3

Browse files
committed
change text
1 parent f78911a commit f9aade3

File tree

2 files changed

+4
-3
lines changed

2 files changed

+4
-3
lines changed

src/Options/index.js

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -247,7 +247,6 @@ export interface ParseServerOptions {
247247
:DEFAULT: {} */
248248
security: ?SecurityOptions;
249249
/* Set to true if new users should be created without public read and write access.
250-
:ENV: PARSE_SERVER_ENFORCE_PRIVATE_USERS
251250
:DEFAULT: false */
252251
enforcePrivateUsers: ?boolean;
253252
}

src/Security/CheckGroups/CheckGroupServerConfig.js

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,8 @@ class CheckGroupServerConfig extends CheckGroup {
4141
}),
4242
new Check({
4343
title: 'Security log disabled',
44-
warning: 'Security checks in logs may expose vulnerabilities to anyone access to logs.',
44+
warning:
45+
'Security checks in logs may expose vulnerabilities to anyone with access to logs.',
4546
solution: "Change Parse Server configuration to 'security.enableCheckLog: false'.",
4647
check: () => {
4748
if (config.security && config.security.enableCheckLog) {
@@ -62,7 +63,8 @@ class CheckGroupServerConfig extends CheckGroup {
6263
}),
6364
new Check({
6465
title: 'Users are created without public access',
65-
warning: 'Users are created with public read access.',
66+
warning:
67+
'Users with public read access are exposed to anyone who knows their object IDs, or to anyone who can query the Parse.User class.',
6668
solution: "Change Parse Server configuration to 'enforcePrivateUsers: true'.",
6769
check: () => {
6870
if (!config.enforcePrivateUsers) {

0 commit comments

Comments
 (0)