Skip to content

Commit d62c9b7

Browse files
author
DylanBulmer
committed
fix build issue
1 parent 6c61888 commit d62c9b7

File tree

2 files changed

+4
-6
lines changed

2 files changed

+4
-6
lines changed

src/abilities/Profile.ability.ts

-1
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
// import { ProfileDocument } from "@/schemas/Profile";
21
import { IProfile, Types } from "@codrjs/models";
32

43
const permissions: Types.Permissions<IProfile> = {

src/abilities/User.ability.ts

+4-5
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
import { UserRoleEnum } from "@/../../models/dist/types/types";
21
import { IUser, Types } from "@codrjs/models";
32

43
const permissions: Types.Permissions<IUser> = {
@@ -7,16 +6,16 @@ const permissions: Types.Permissions<IUser> = {
76
*/
87
"codr:system": (_user, { can, cannot }) => {
98
can("manage", "User");
10-
cannot("update", "User", { role: { $eq: UserRoleEnum.SYSTEM } });
11-
cannot("delete", "User", { role: { $eq: UserRoleEnum.SYSTEM } });
9+
cannot("update", "User", { role: { $eq: Types.UserRoleEnum.SYSTEM } });
10+
cannot("delete", "User", { role: { $eq: Types.UserRoleEnum.SYSTEM } });
1211
},
1312
/**
1413
* @TODO find a way to disallow admin from creating system users.
1514
*/
1615
"codr:admin": (_user, { can, cannot }) => {
1716
can("manage", "User");
18-
cannot("update", "User", { role: { $eq: UserRoleEnum.SYSTEM } });
19-
cannot("delete", "User", { role: { $eq: UserRoleEnum.SYSTEM } });
17+
cannot("update", "User", { role: { $eq: Types.UserRoleEnum.SYSTEM } });
18+
cannot("delete", "User", { role: { $eq: Types.UserRoleEnum.SYSTEM } });
2019
},
2120
"codr:researcher": (user, { can }) => {
2221
// can only read it's own user

0 commit comments

Comments
 (0)