1- import { UserRoleEnum } from "@/../../models/dist/types/types" ;
21import { IUser , Types } from "@codrjs/models" ;
32
43const permissions : Types . Permissions < IUser > = {
@@ -7,16 +6,16 @@ const permissions: Types.Permissions<IUser> = {
76 */
87 "codr:system" : ( _user , { can, cannot } ) => {
98 can ( "manage" , "User" ) ;
10- cannot ( "update" , "User" , { role : { $eq : UserRoleEnum . SYSTEM } } ) ;
11- cannot ( "delete" , "User" , { role : { $eq : UserRoleEnum . SYSTEM } } ) ;
9+ cannot ( "update" , "User" , { role : { $eq : Types . UserRoleEnum . SYSTEM } } ) ;
10+ cannot ( "delete" , "User" , { role : { $eq : Types . UserRoleEnum . SYSTEM } } ) ;
1211 } ,
1312 /**
1413 * @TODO find a way to disallow admin from creating system users.
1514 */
1615 "codr:admin" : ( _user , { can, cannot } ) => {
1716 can ( "manage" , "User" ) ;
18- cannot ( "update" , "User" , { role : { $eq : UserRoleEnum . SYSTEM } } ) ;
19- cannot ( "delete" , "User" , { role : { $eq : UserRoleEnum . SYSTEM } } ) ;
17+ cannot ( "update" , "User" , { role : { $eq : Types . UserRoleEnum . SYSTEM } } ) ;
18+ cannot ( "delete" , "User" , { role : { $eq : Types . UserRoleEnum . SYSTEM } } ) ;
2019 } ,
2120 "codr:researcher" : ( user , { can } ) => {
2221 // can only read it's own user
0 commit comments