diff --git a/packages/datastore/__tests__/subscription.test.ts b/packages/datastore/__tests__/subscription.test.ts index a0c4bdedb03..8ce1ef5ebd3 100644 --- a/packages/datastore/__tests__/subscription.test.ts +++ b/packages/datastore/__tests__/subscription.test.ts @@ -171,7 +171,7 @@ describe('sync engine subscription module', () => { ) ).toEqual(authInfo); }); - test('group authorization', () => { + test('groups authorization', () => { const model: SchemaModel = { syncable: true, name: 'Post', @@ -185,7 +185,7 @@ describe('sync engine subscription module', () => { { provider: 'userPools', ownerField: 'owner', - allow: 'group', + allow: 'groups', groups: ['mygroup'], identityClaim: 'cognito:username', operations: ['create', 'update', 'delete'], diff --git a/packages/datastore/src/sync/processors/subscription.ts b/packages/datastore/src/sync/processors/subscription.ts index a3ee0d69bec..3b8cfb2fce4 100644 --- a/packages/datastore/src/sync/processors/subscription.ts +++ b/packages/datastore/src/sync/processors/subscription.ts @@ -127,7 +127,7 @@ class SubscriptionProcessor { // if not check if has groups authorization and token has groupClaim allowed for cognito token let groupAuthRules = rules.filter( - rule => rule.authStrategy === 'group' && rule.provider === 'userPools' + rule => rule.authStrategy === 'groups' && rule.provider === 'userPools' ); const validCognitoGroup = groupAuthRules.find(groupAuthRule => { @@ -149,7 +149,7 @@ class SubscriptionProcessor { // if not check if has groups authorization and token has groupClaim allowed for oidc token groupAuthRules = rules.filter( - rule => rule.authStrategy === 'group' && rule.provider === 'oidc' + rule => rule.authStrategy === 'groups' && rule.provider === 'oidc' ); const validOidcGroup = groupAuthRules.find(groupAuthRule => { diff --git a/packages/datastore/src/types.ts b/packages/datastore/src/types.ts index e261292ce8e..5797095badd 100644 --- a/packages/datastore/src/types.ts +++ b/packages/datastore/src/types.ts @@ -116,7 +116,7 @@ export type AuthorizationRule = { provider: 'userPools' | 'oidc' | 'iam' | 'apiKey'; groupClaim: string; groups: [string]; - authStrategy: 'owner' | 'group' | 'private' | 'public'; + authStrategy: 'owner' | 'groups' | 'private' | 'public'; areSubscriptionsPublic: boolean; };