/
user_policy.rb
72 lines (57 loc) · 1.48 KB
/
user_policy.rb
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
class Manage::Admin::UserPolicy < ApplicationPolicy
def index?
user.user_permissions
.where(permission_slug: :manage_admins)
.present?
end
def show?
user_has_any_permissions?(
[:manage_admins, nil],
[:manage_admins, record.organization]
)
end
def create?
user_has_any_permissions?(
[:manage_admins, nil],
[:manage_admins, record.organization]
)
end
def new?
user.has_permission?(:manage_admins)
end
def update?
create?
end
def edit?
update?
end
def destroy?
edit?
end
def allowed_access_levels
Permissions::ACCESS_LEVELS.select { |al| (al[:default_permissions] - user_permissions).blank? }
end
def allowed_permissions
Permissions::ALL_PERMISSIONS.slice(*user_permissions).values
end
class Scope < Scope
attr_reader :user, :scope
def initialize(user, scope)
super
@user = user
@scope = scope
end
def resolve
return scope.none unless user.has_permission?(:manage_admins)
admin_scope = scope.joins(:email_authentications).where.not(email_authentications: {id: nil})
required_permissions = user.user_permissions.where(permission_slug: :manage_admins)
resources = required_permissions.map(&:resource).compact
return admin_scope.all unless resources.present?
admin_scope.where(organization: resources)
end
end
private
def user_permissions
user.user_permissions.pluck(:permission_slug).map(&:to_sym)
end
end