All files / libs/kernel/auth/shared/src/abilities/plans definitions.ts

70.45% Statements 62/88
100% Branches 8/8
42.1% Functions 8/19
70.45% Lines 62/88

Press n or j to go to the next uncovered block, b, p or k for the previous block.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 891x 1x 1x 1x 1x 1x 1x 1x 1x 1x 135x 135x 135x 135x 135x 1x 1x 1x 45x 45x 45x 1x 1x 1x                           1x 1x 1x                           1x 1x 1x 28x 28x 1x 1x 1x 50x 50x 50x 50x 1x 1x 1x 43x 43x 43x 43x 1x 1x 1x 64x 64x 64x 64x 1x 1x 1x 1x 1x 1x 1x 1x 1x  
import { SubsetAccessEnum } from '../../subsets/enums';
import { SubjectsEnum, type DefinePermissions, type UserRoleForAccessControl } from '../../types';
 
import { PlansActions } from './actions';
import { type ViewPlanSubject, type ViewPlanTokenSubject } from './subjects';
 
export const nonAdminCanAccessPlan = (plan: ViewPlanSubject) => plan.isHidden === false;
 
export const plansAbilityDefinitions = {
  ADMIN(_, { can }) {
    can(PlansActions.view, SubjectsEnum.Plan, { predicate: () => true, subset: SubsetAccessEnum.EVERYTHING });
    can(PlansActions.view_tokens, SubjectsEnum.Plan, { predicate: () => true, subset: SubsetAccessEnum.EVERYTHING });
    can(PlansActions.view_hidden, SubjectsEnum.Plan);
    can(PlansActions.modify, SubjectsEnum.Plan);
    can(PlansActions.modify_metrics_from, SubjectsEnum.Plan);
  },
 
  READ_ONLY_ADMIN(_, { can }) {
    can(PlansActions.view, SubjectsEnum.Plan, { predicate: () => true, subset: SubsetAccessEnum.EVERYTHING });
    can(PlansActions.view_tokens, SubjectsEnum.Plan, { predicate: () => true, subset: SubsetAccessEnum.EVERYTHING });
    can(PlansActions.view_hidden, SubjectsEnum.Plan);
  },
 
  SCOPED_ADMIN({ adminScopesContainer }, { can }) {
    can(PlansActions.view, SubjectsEnum.Plan, {
      predicate: (plan: ViewPlanSubject) => !!plan.id && adminScopesContainer?.listPlansInMyScope().includes(plan.id),
      subset: SubsetAccessEnum.IN_MY_SCOPE,
    });

    can(PlansActions.view_tokens, SubjectsEnum.Plan, {
      // Scoped admins can see global tokens, or those that are scoped in their plans.
      predicate: (subject: ViewPlanTokenSubject) =>
        subject.planId === null || adminScopesContainer?.listPlansInMyScope().includes(subject.planId),
      subset: SubsetAccessEnum.IN_MY_SCOPE,
    });

    can(PlansActions.view_hidden, SubjectsEnum.Plan);
  },
 
  SCOPED_READ_ONLY_ADMIN({ adminScopesContainer }, { can }) {
    can(PlansActions.view, SubjectsEnum.Plan, {
      predicate: (plan: ViewPlanSubject) => !!plan.id && adminScopesContainer?.listPlansInMyScope().includes(plan.id),
      subset: SubsetAccessEnum.IN_MY_SCOPE,
    });

    can(PlansActions.view_tokens, SubjectsEnum.Plan, {
      // Scoped admins can see global tokens, or those that are scoped in their plans.
      predicate: (subject: ViewPlanTokenSubject) =>
        subject.planId === null || adminScopesContainer?.listPlansInMyScope().includes(subject.planId),
      subset: SubsetAccessEnum.IN_MY_SCOPE,
    });

    can(PlansActions.view_hidden, SubjectsEnum.Plan);
  },
 
  FINANCE(_, { can }) {
    can(PlansActions.view, SubjectsEnum.Plan, { predicate: () => true, subset: SubsetAccessEnum.EVERYTHING });
    can(PlansActions.view_hidden, SubjectsEnum.Plan);
  },
 
  MANAGER(_, { can }) {
    can(PlansActions.view, SubjectsEnum.Plan, {
      predicate: (plan: ViewPlanSubject) => nonAdminCanAccessPlan(plan),
      subset: SubsetAccessEnum.MATCH_MANAGEES,
    });
  },
 
  READ_ONLY_MANAGER(_, { can }) {
    can(PlansActions.view, SubjectsEnum.Plan, {
      predicate: (plan: ViewPlanSubject) => nonAdminCanAccessPlan(plan),
      subset: SubsetAccessEnum.MATCH_MANAGEES,
    });
  },
 
  EMPLOYEE(_, { can }) {
    can(PlansActions.view, SubjectsEnum.Plan, {
      predicate: (plan: ViewPlanSubject) => nonAdminCanAccessPlan(plan),
      subset: SubsetAccessEnum.MATCH_MANAGEES,
    });
  },
 
  READ_ONLY_EMPLOYEE(_, { can }) {
    can(PlansActions.view, SubjectsEnum.Plan, {
      predicate: (plan: ViewPlanSubject) => nonAdminCanAccessPlan(plan),
      subset: SubsetAccessEnum.MATCH_MANAGEES,
    });
  },
} as const satisfies Partial<Record<UserRoleForAccessControl, DefinePermissions>>;