@@ -86,17 +86,17 @@ export default createTRPCRouter({
8686 const adder = q . find ( ( e ) => e . userId === input . adderId )
8787 const existing = q . find ( ( e ) => e . userId === input . userId )
8888
89- // // check if adder is not in permission table or doesn't have permissions
90- // if (!adder || !adder.roles.some((a) => CAN_ASSIGN.includes(a))) return { error: "UNAUTHORIZED" }
91- //
92- // // if adder is self-assigning roles, he must be president or owner (ref CAN_SELF_ASSIGN)
93- // if (adder.userId === input.userId && !adder.roles.some((a) => CAN_SELF_ASSIGN.includes(a)))
94- // return { error: "UNAUTHORIZED_SELF_ASSIGN" }
95- //
96- // // president and owner are special role
97- // // only owners can perform this role update
98- // if ((input.role === "president" || input.role === "owner") && !adder.roles.includes("owner"))
99- // return { error: "UNAUTHORIZED" }
89+ // check if adder is not in permission table or doesn't have permissions
90+ if ( ! adder || ! adder . roles . some ( ( a ) => CAN_ASSIGN . includes ( a ) ) ) return { error : "UNAUTHORIZED" }
91+
92+ // if adder is self-assigning roles, he must be president or owner (ref CAN_SELF_ASSIGN)
93+ if ( adder . userId === input . userId && ! adder . roles . some ( ( a ) => CAN_SELF_ASSIGN . includes ( a ) ) )
94+ return { error : "UNAUTHORIZED_SELF_ASSIGN" }
95+
96+ // president and owner are special role
97+ // only owners can perform this role update
98+ if ( ( input . role === "president" || input . role === "owner" ) && ! adder . roles . includes ( "owner" ) )
99+ return { error : "UNAUTHORIZED" }
100100
101101 // check if it's the first time the target is added to permissions table
102102 if ( ! existing ) {
0 commit comments