All files / libs/kernel/auth/shared/src/abilities/statement-reviews definitions.ts

100% Statements 60/60
100% Branches 7/7
35% Functions 7/20
100% Lines 60/60

Press n or j to go to the next uncovered block, b, p or k for the previous block.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 611x 1x 1x 1x 1x 1x 1x 1x 135x 135x 135x 1x 1x 1x 45x 45x 45x 1x 1x 1x 28x 28x 28x 1x 1x 1x 50x 50x 50x 50x 50x 50x 50x 1x 1x 1x 43x 43x 43x 43x 43x 43x 43x 1x 1x 1x 64x 64x 64x 64x 64x 64x 1x 1x 1x 1x 1x 1x 1x 1x  
import { SubjectsEnum, type DefinePermissions, type UserRoleForAccessControl } from '../../types';
import { employeeCanAccessStatement, managerCanAccessStatement } from '../statements/definitions';
import { type StatementSubject } from '../statements/subjects';
 
import { StatementReviewsActions } from './actions';
 
export const statementReviewsAbilityDefinitions = {
  ADMIN(_, { can }) {
    can(StatementReviewsActions.view, SubjectsEnum.StatementReviews);
    can(StatementReviewsActions.notify, SubjectsEnum.StatementReviews, { predicate: () => true });
    can(StatementReviewsActions.listReviewers, SubjectsEnum.StatementReviews, { predicate: () => true });
  },
 
  READ_ONLY_ADMIN(_, { can }) {
    can(StatementReviewsActions.view, SubjectsEnum.StatementReviews);
    can(StatementReviewsActions.notify, SubjectsEnum.StatementReviews, { predicate: () => true });
    can(StatementReviewsActions.listReviewers, SubjectsEnum.StatementReviews, { predicate: () => true });
  },
 
  FINANCE(_, { can }) {
    can(StatementReviewsActions.view, SubjectsEnum.StatementReviews);
    can(StatementReviewsActions.notify, SubjectsEnum.StatementReviews, { predicate: () => true });
    can(StatementReviewsActions.listReviewers, SubjectsEnum.StatementReviews, { predicate: () => true });
  },
 
  MANAGER(authenticatedContext, { can }) {
    can(StatementReviewsActions.view, SubjectsEnum.StatementReviews);
    can(StatementReviewsActions.notify, SubjectsEnum.StatementReviews, {
      predicate: (statement: StatementSubject) => managerCanAccessStatement(authenticatedContext, statement),
    });
    can(StatementReviewsActions.listReviewers, SubjectsEnum.StatementReviews, {
      predicate: (statement: StatementSubject) => managerCanAccessStatement(authenticatedContext, statement),
    });
  },
 
  READ_ONLY_MANAGER(authenticatedContext, { can }) {
    can(StatementReviewsActions.view, SubjectsEnum.StatementReviews);
    can(StatementReviewsActions.notify, SubjectsEnum.StatementReviews, {
      predicate: (statement: StatementSubject) => managerCanAccessStatement(authenticatedContext, statement),
    });
    can(StatementReviewsActions.listReviewers, SubjectsEnum.StatementReviews, {
      predicate: (statement: StatementSubject) => managerCanAccessStatement(authenticatedContext, statement),
    });
  },
 
  EMPLOYEE(authenticatedContext, { can }) {
    can(StatementReviewsActions.listReviewers, SubjectsEnum.StatementReviews, {
      predicate: (statement: StatementSubject) => employeeCanAccessStatement(authenticatedContext, statement),
    });
    can(StatementReviewsActions.notify, SubjectsEnum.StatementReviews, {
      predicate: (statement: StatementSubject) => employeeCanAccessStatement(authenticatedContext, statement),
    });
  },
 
  READ_ONLY_EMPLOYEE(authenticatedContext, { can }) {
    can(StatementReviewsActions.listReviewers, SubjectsEnum.StatementReviews, {
      predicate: (statement: StatementSubject) => employeeCanAccessStatement(authenticatedContext, statement),
    });
  },
} as const satisfies Partial<Record<UserRoleForAccessControl, DefinePermissions>>;