Fix privilege check logic by inverting conditionals

- Inverted conditional in `publisher.go` to correctly skip unprivileged events
- Inverted conditional in `handleReq.go` to filter out unprivileged events properly
- Added fallback logic in `check-privilege.go` to mark as privileged if no conditions match
This commit is contained in:
2025-07-21 15:05:07 +01:00
parent 53e8e160dd
commit 4dafab3fd6
3 changed files with 4 additions and 2 deletions

View File

@@ -36,6 +36,8 @@ func CheckPrivilege(authedPubkey []byte, ev *event.E) (privileged bool) {
}
}
}
} else {
privileged = true
}
return
}

View File

@@ -89,7 +89,7 @@ func (a *A) HandleReq(
if srv.AuthRequired() {
var tmp event.S
for _, ev := range events {
if auth.CheckPrivilege(a.Listener.AuthedPubkey(), ev) {
if !auth.CheckPrivilege(a.Listener.AuthedPubkey(), ev) {
log.W.F(
"not privileged %0x ev pubkey %0x",
a.Listener.AuthedPubkey(), ev.Pubkey,

View File

@@ -147,7 +147,7 @@ func (p *S) Deliver(ev *event.E) {
continue
}
if p.Server.AuthRequired() {
if auth.CheckPrivilege(w.AuthedPubkey(), ev) {
if !auth.CheckPrivilege(w.AuthedPubkey(), ev) {
continue
}
var res *eventenvelope.Result