Skip to content

Commit 0d21b70

Browse files
committed
removed todos since I added questions in the PR
1 parent 3743df6 commit 0d21b70

File tree

1 file changed

+0
-8
lines changed

1 file changed

+0
-8
lines changed

docs/getting-started/modeling.mdx

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -86,10 +86,8 @@ Use the keyword `relation` to create an entity relation with the `name` and `typ
8686

8787
**Relation Attributes:**
8888

89-
TODO, can it include _ or any other character
9089
- **name:** the name of the relation, which can be any alphanumeric string
9190
- **type:** the type of the related object, which must be defined in this schema previously
92-
TODO is that accurate
9391

9492
Here's an example of a relation.
9593

@@ -241,7 +239,6 @@ entity repository {
241239
```
242240

243241
→ Looking at the `read` action, you can see the `read` permission is limited to a user that is an `organization admin` and also has one of the following relations: `owner` of the repository, or `maintainer`, or `member` of the organization which repository belongs to.
244-
TODO
245242

246243
<Note>
247244
The same `read` can also be defined using the **permission** keyword, as follows:
@@ -254,12 +251,10 @@ Using the `action` or `permission` keywords yields the same authorization logic.
254251
</Note>
255252

256253
The `and` operation creates an intersection between relations but is not tied to specific entities.
257-
TODO is there a way to tie it to specific entities?
258254

259255
For example, in the following model, users can see a repository if they are a member or admin of any organization.
260256

261257
Let's say `user:1` is a member of `organization:1` and an admin of `organization:2`. If `repository:1` belongs to `organization:1`, then `user:1` has access to view `repository:1`.
262-
TODO
263258

264259
```perm
265260
entity user {}
@@ -366,7 +361,6 @@ double
366361
double[]
367362
```
368363

369-
TODO where are
370364
### Defining Rules
371365

372366
Rules allow you to write conditions for the model. These are similar to functions that every software language has. They accept parameters and, based on conditions, return either a true or a false value.
@@ -395,12 +389,10 @@ rule check_ip_range(ip_range string[]) {
395389
<Info>
396390
This feature is currently in beta and available upon request. Let us know, and we’ll give you early access!
397391
</Info>
398-
TODO is this still true
399392

400393
You can use attributes across entities with rules. Rules can also be written inside entities to create entity-specific conditionals.
401394

402395
Below, the `check_confidentiality` rule is defined inside the `organization` entity. This rule compares the specific organization's authority level with the authority level associated with the repository.
403-
TODO
404396

405397
If the organization's authority is higher than the repository's authority, the rule returns true.
406398

0 commit comments

Comments
 (0)