1
- import { UserRoleEnum } from "@/../../models/dist/types/types" ;
2
1
import { IUser , Types } from "@codrjs/models" ;
3
2
4
3
const permissions : Types . Permissions < IUser > = {
@@ -7,16 +6,16 @@ const permissions: Types.Permissions<IUser> = {
7
6
*/
8
7
"codr:system" : ( _user , { can, cannot } ) => {
9
8
can ( "manage" , "User" ) ;
10
- cannot ( "update" , "User" , { role : { $eq : UserRoleEnum . SYSTEM } } ) ;
11
- cannot ( "delete" , "User" , { role : { $eq : UserRoleEnum . SYSTEM } } ) ;
9
+ cannot ( "update" , "User" , { role : { $eq : Types . UserRoleEnum . SYSTEM } } ) ;
10
+ cannot ( "delete" , "User" , { role : { $eq : Types . UserRoleEnum . SYSTEM } } ) ;
12
11
} ,
13
12
/**
14
13
* @TODO find a way to disallow admin from creating system users.
15
14
*/
16
15
"codr:admin" : ( _user , { can, cannot } ) => {
17
16
can ( "manage" , "User" ) ;
18
- cannot ( "update" , "User" , { role : { $eq : UserRoleEnum . SYSTEM } } ) ;
19
- cannot ( "delete" , "User" , { role : { $eq : UserRoleEnum . SYSTEM } } ) ;
17
+ cannot ( "update" , "User" , { role : { $eq : Types . UserRoleEnum . SYSTEM } } ) ;
18
+ cannot ( "delete" , "User" , { role : { $eq : Types . UserRoleEnum . SYSTEM } } ) ;
20
19
} ,
21
20
"codr:researcher" : ( user , { can } ) => {
22
21
// can only read it's own user
0 commit comments