diff --git a/apiserver/plane/app/permissions/base.py b/apiserver/plane/app/permissions/base.py index bb4f867a7..300bc364f 100644 --- a/apiserver/plane/app/permissions/base.py +++ b/apiserver/plane/app/permissions/base.py @@ -53,7 +53,7 @@ def allow_permission(allowed_roles, level="PROJECT", creator=False, model=None): # Return permission denied if no conditions are met return Response( {"error": "You don't have the required permissions."}, - status=status.HTTP_401_UNAUTHORIZED, + status=status.HTTP_403_FORBIDDEN, ) return _wrapped_view diff --git a/apiserver/plane/app/views/exporter/base.py b/apiserver/plane/app/views/exporter/base.py index 50f9870d0..39255bd1e 100644 --- a/apiserver/plane/app/views/exporter/base.py +++ b/apiserver/plane/app/views/exporter/base.py @@ -15,7 +15,7 @@ class ExportIssuesEndpoint(BaseAPIView): model = ExporterHistory serializer_class = ExporterHistorySerializer - @allow_permission(allowed_roles=[ROLE.ADMIN], level="WORKSPACE") + @allow_permission(allowed_roles=[ROLE.ADMIN, ROLE.MEMBER], level="WORKSPACE") def post(self, request, slug): # Get the workspace workspace = Workspace.objects.get(slug=slug) @@ -62,7 +62,9 @@ class ExportIssuesEndpoint(BaseAPIView): status=status.HTTP_400_BAD_REQUEST, ) - @allow_permission(allowed_roles=[ROLE.ADMIN], level="WORKSPACE") + @allow_permission( + allowed_roles=[ROLE.ADMIN, ROLE.MEMBER], level="WORKSPACE" + ) def get(self, request, slug): exporter_history = ExporterHistory.objects.filter( workspace__slug=slug,