---
name: role-permission-table-builder
description: Generates comprehensive role-based permission matrices in markdown or SQL format for pages, components, and data access patterns. This skill should be used when designing authorization systems, documenting permissions, creating RBAC tables, or planning access control. Use for RBAC, role permissions, access control, authorization matrix, permission mapping, or security policies.
---
# Role Permission Table Builder
Generate and maintain comprehensive role-based access control (RBAC) permission matrices for worldbuilding applications.
## Overview
To build role permission systems:
1. Define user roles and hierarchies
2. Identify protected resources (pages, components, data, actions)
3. Create permission matrices mapping roles to resources
4. Generate implementation code for middleware and components
5. Document permission policies for team reference
## Role Definitions
### Standard Roles
Define common application roles:
- **Guest**: Unauthenticated users (read-only public content)
- **User**: Basic authenticated users (read own data, limited writes)
- **Creator**: Content creators (create/edit entities, manage own content)
- **Editor**: Content editors (edit any content, moderate submissions)
- **Admin**: System administrators (full access, user management)
- **Super Admin**: Platform owners (all permissions, system configuration)
### Custom Roles
To define worldbuilding-specific roles:
- **World Owner**: Creator of worldbuilding project
- **Collaborator**: Invited contributor to world
- **Viewer**: Read-only access to private world
- **Game Master**: Special permissions for RPG campaigns
- **Publisher**: Can publish worlds publicly
Consult `references/role-hierarchy.md` for role inheritance patterns.
## Permission Matrix
### Page-Level Permissions
To define page access:
| Page Route | Guest | User | Creator | Editor | Admin |
| --------------------- | ----- | ---- | ------- | ------ | ----- |
| / | [OK] | [OK] | [OK] | [OK] | [OK] |
| /login | [OK] | [OK] | [OK] | [OK] | [OK] |
| /dashboard | [ERROR] | [OK] | [OK] | [OK] | [OK] |
| /worlds/create | [ERROR] | [OK] | [OK] | [OK] | [OK] |
| /worlds/[id] | 🔒 | 🔒 | [OK] | [OK] | [OK] |
| /worlds/[id]/edit | [ERROR] | [ERROR] | [OK] | [OK] | [OK] |
| /admin/users | [ERROR] | [ERROR] | [ERROR] | [ERROR] | [OK] |
| /admin/settings | [ERROR] | [ERROR] | [ERROR] | [ERROR] | [OK] |
Legend:
- [OK] Full access
- 🔒 Conditional access (ownership/invitation)
- [ERROR] No access
### Component-Level Permissions
To define component visibility:
| Component | Guest | User | Creator | Editor | Admin |
| ---------------------- | ----- | ---- | ------- | ------ | ----- |
| WorldList | [OK] Public | [OK] All | [OK] All | [OK] All | [OK] All |
| WorldCreateButton | [ERROR] | [OK] | [OK] | [OK] | [OK] |
| EntityEditor | [ERROR] | [ERROR] | [OK] Own | [OK] All | [OK] All |
| DeleteButton | [ERROR] | [ERROR] | [OK] Own | [OK] All | [OK] All |
| ShareWorldButton | [ERROR] | [ERROR] | [OK] Own | [OK] All | [OK] All |
| AdminPanel | [ERROR] | [ERROR] | [ERROR] | [ERROR] | [OK] |
| UserManagement | [ERROR] | [ERROR] | [ERROR] | [ERROR] | [OK] |
### Data Access Permissions
To define data operations:
| Operation | Guest | User | Creator | Editor | Admin |
| --------------------------- | ----- | -------- | -------- | ------ | ----- |
| Read public worlds | [OK] | [OK] | [OK] | [OK] | [OK] |
| Read private worlds | [ERROR] | 🔒 Invited | 🔒 Own | [OK] | [OK] |
| Create world | [ERROR] | [OK] | [OK] | [OK] | [OK] |
| Update own world | [ERROR] | [OK] | [OK] | [OK] | [OK] |
| Update any world | [ERROR] | [ERROR] | [ERROR] | [OK] | [OK] |
| Delete own world | [ERROR] | [OK] | [OK] | [OK] | [OK] |
| Delete any world | [ERROR] | [ERROR] | [ERROR] | [ERROR] | [OK] |
| Create entity | [ERROR] | [ERROR] | [OK] | [OK] | [OK] |
| Update own entity | [ERROR] | [ERROR] | [OK] | [OK] | [OK] |
| Update any entity | [ERROR] | [ERROR] | [ERROR] | [OK] | [OK] |
| Delete entity | [ERROR] | [ERROR] | [OK] Own | [OK] | [OK] |
| Manage collaborators | [ERROR] | [ERROR] | [OK] Own | [OK] | [OK] |
| Publish world | [ERROR] | [ERROR] | [OK] Own | [OK] | [OK] |
| Moderate content | [ERROR] | [ERROR] | [ERROR] | [OK] | [OK] |
| Manage users | [ERROR] | [ERROR] | [ERROR] | [ERROR] | [OK] |
### Action Permissions
To define Server Action permissions:
| Server Action | Guest | User | Creator | Editor | Admin |
| ---------------------- | ----- | ---- | ------- | ------ | ----- |
| createWorld | [ERROR] | [OK] | [OK] | [OK] | [OK] |
| updateWorld | [ERROR] | 🔒 | 🔒 | [OK] | [OK] |
| deleteWorld | [ERROR] | 🔒 | 🔒 | [ERROR] | [OK] |
| createEntity | [ERROR] | [ERROR] | [OK] | [OK] | [OK] |
| updateEntity | [ERROR] | [ERROR] | 🔒 | [OK] | [OK] |
| deleteEntity | [ERROR] | [ERROR] | 🔒 | [OK] | [OK] |
| inviteCollaborator | [ERROR] | [ERROR] | 🔒 | [OK] | [OK] |
| publishWorld | [ERROR] | [ERROR] | 🔒 | [OK] | [OK] |
| deleteUser | [ERROR] | [ERROR] | [ERROR] | [ERROR] | [OK] |
Use `scripts/generate_permission_matrix.py` to create customized permission tables.
## SQL Schema
To implement permissions in database:
```sql
-- Roles table
CREATE TABLE roles (
id SERIAL PRIMARY KEY,
name VARCHAR(50) UNIQUE NOT NULL,
description TEXT,
created_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP
);
-- Permissions table
CREATE TABLE permissions (
id SERIAL PRIMARY KEY,
resource VARCHAR(100) NOT NULL,
action VARCHAR(50) NOT NULL,
description TEXT,
UNIQUE(resource, action)
);
-- Role permissions mapping
CREATE TABLE role_permissions (
id SERIAL PRIMARY KEY,
role_id INTEGER REFERENCES roles(id) ON DELETE CASCADE,
permission_id INTEGER REFERENCES permissions(id) ON DELETE CASCADE,
UNIQUE(role_id, permission_id)
);
-- User roles
CREATE TABLE user_roles (
id SERIAL PRIMARY KEY,
user_id INTEGER REFERENCES users(id) ON DELETE CASCADE,
role_id INTEGER REFERENCES roles(id) ON DELETE CASCADE,
assigned_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
UNIQUE(user_id, role_id)
);
-- Resource ownership
CREATE TABLE resource_ownership (
id SERIAL PRIMARY KEY,
user_id INTEGER REFERENCES users(id) ON DELETE CASCADE,
resource_type VARCHAR(50) NOT NULL,
resource_id INTEGER NOT NULL,
created_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
UNIQUE(resource_type, resource_id)
);
-- Collaborators (for conditional access)
CREATE TABLE collaborators (
id SERIAL PRIMARY KEY,
world_id INTEGER REFERENCES worlds(id) ON DELETE CASCADE,
user_id INTEGER REFERENCES users(id) ON DELETE CASCADE,
role VARCHAR(50) NOT NULL,
invited_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
UNIQUE(world_id, user_id)
);
```
Use `scripts/generate_rbac_schema.py` to generate database schema with seed data.
Reference `assets/rbac-schema.sql` for complete schema with indexes and constraints.
## Implementation
### Middleware Protection
To protect routes with middleware:
```typescript
// middleware.ts
import { NextResponse } from 'next/server';
import type { NextRequest } from 'next/server';
import { getSession } from '@/lib/auth';
import { checkPermission } from '@/lib/permissions';
const protectedRoutes = {
'/dashboard': ['user', 'creator', 'editor', 'admin'],
'/worlds/create': ['user', 'creator', 'editor', 'admin'],
'/admin': ['admin'],
};
export async function middleware(request: NextRequest) {
const session = await getSession(request);
const path = request.nextUrl.pathname;
// Check if route requires authentication
for (const [route, allowedRoles] of Object.entries(protectedRoutes)) {
if (path.startsWith(route)) {
if (!session) {
return NextResponse.redirect(new URL('/login', request.url));
}
if (!allowedRoles.includes(session.user.role)) {
return NextResponse.redirect(new URL('/unauthorized', request.url));
}
}
}
return NextResponse.next();
}
export const config = {
matcher: ['/((?!api|_next/static|_next/image|favicon.ico).*)'],
};
```
### Component-Level Checks
To conditionally render components:
```typescript
// components/ProtectedComponent.tsx
import { useSession } from '@/lib/auth';
import { hasPermission } from '@/lib/permissions';
interface Props {
requiredRole?: string[];
requiredPermission?: string;
fallback?: React.ReactNode;
children: React.ReactNode;
}
export function ProtectedComponent({
requiredRole,
requiredPermission,
fallback = null,
children,
}: Props) {
const { session } = useSession();
if (!session) {
return <>{fallback}>;
}
if (requiredRole && !requiredRole.includes(session.user.role)) {
return <>{fallback}>;
}
if (requiredPermission && !hasPermission(session.user, requiredPermission)) {
return <>{fallback}>;
}
return <>{children}>;
}
```
Usage:
```typescript
```
Reference `assets/protected-component.tsx` for complete implementation.
### Server Action Protection
To protect Server Actions:
```typescript
// lib/permissions.ts
'use server';
import { getSession } from '@/lib/auth';
import { checkPermission } from '@/lib/rbac';
export async function requirePermission(permission: string) {
const session = await getSession();
if (!session) {
throw new Error('Unauthorized');
}
const hasAccess = await checkPermission(session.user, permission);
if (!hasAccess) {
throw new Error('Forbidden');
}
return session;
}
export async function requireOwnership(resourceType: string, resourceId: number) {
const session = await getSession();
if (!session) {
throw new Error('Unauthorized');
}
const isOwner = await checkOwnership(session.user.id, resourceType, resourceId);
if (!isOwner && session.user.role !== 'admin') {
throw new Error('Forbidden');
}
return session;
}
```
Usage in Server Actions:
```typescript
'use server';
import { requirePermission, requireOwnership } from '@/lib/permissions';
export async function updateEntity(entityId: number, data: EntityData) {
await requireOwnership('entity', entityId);
// Proceed with update
return updateEntityInDB(entityId, data);
}
export async function deleteWorld(worldId: number) {
const session = await requirePermission('world:delete');
if (session.user.role !== 'admin') {
await requireOwnership('world', worldId);
}
return deleteWorldFromDB(worldId);
}
```
### Dynamic Permission Checks
To implement complex permission logic:
```typescript
// lib/rbac.ts
export async function checkPermission(
user: User,
resource: string,
action: string,
context?: { resourceId?: number; ownerId?: number }
): Promise {
// Admin has all permissions
if (user.role === 'admin') {
return true;
}
// Check role-based permission
const hasRolePermission = await hasRolePermission(user.role, resource, action);
if (!hasRolePermission) {
return false;
}
// Check ownership if required
if (context?.resourceId) {
const isOwner = await checkOwnership(user.id, resource, context.resourceId);
return isOwner;
}
return true;
}
```
Consult `references/permission-check-patterns.md` for advanced patterns.
## Permission Utilities
Use `scripts/permission_utils.py` for common operations:
```bash
# Check user permissions
python scripts/permission_utils.py check --user-id 123 --permission "world:update"
# List role permissions
python scripts/permission_utils.py list-role --role creator
# Grant permission to role
python scripts/permission_utils.py grant --role editor --permission "entity:delete"
# Revoke permission from role
python scripts/permission_utils.py revoke --role user --permission "world:delete"
```
## Testing Permissions
To test authorization:
```typescript
// tests/permissions.test.ts
import { checkPermission } from '@/lib/rbac';
describe('RBAC', () => {
it('admin can delete any world', async () => {
const admin = { id: 1, role: 'admin' };
const canDelete = await checkPermission(admin, 'world', 'delete');
expect(canDelete).toBe(true);
});
it('creator can only delete own world', async () => {
const creator = { id: 2, role: 'creator' };
const ownWorld = { id: 10, ownerId: 2 };
const canDeleteOwn = await checkPermission(creator, 'world', 'delete', {
resourceId: ownWorld.id,
ownerId: ownWorld.ownerId,
});
expect(canDeleteOwn).toBe(true);
const othersWorld = { id: 11, ownerId: 3 };
const canDeleteOthers = await checkPermission(creator, 'world', 'delete', {
resourceId: othersWorld.id,
ownerId: othersWorld.ownerId,
});
expect(canDeleteOthers).toBe(false);
});
});
```
## Documentation Generation
Use `scripts/generate_permission_docs.py` to create permission documentation:
```bash
# Generate markdown documentation
python scripts/generate_permission_docs.py --format markdown --output docs/permissions.md
# Generate SQL seed data
python scripts/generate_permission_docs.py --format sql --output db/seeds/permissions.sql
# Generate TypeScript types
python scripts/generate_permission_docs.py --format typescript --output lib/types/permissions.ts
```
Output includes:
- Complete permission matrix tables
- Role hierarchy diagrams
- Implementation examples
- API documentation
Reference `assets/permission-docs-template.md` for documentation structure.
## Best Practices
1. **Principle of Least Privilege**: Grant minimum required permissions
2. **Role Hierarchy**: Implement role inheritance for simpler management
3. **Audit Logging**: Track permission checks and access attempts
4. **Regular Reviews**: Periodically audit and update permissions
5. **Clear Naming**: Use consistent, descriptive permission names
6. **Documentation**: Maintain up-to-date permission documentation
7. **Testing**: Test authorization for all roles and edge cases
8. **Graceful Degradation**: Show appropriate UI for unauthorized users
## Troubleshooting
Common issues:
- **Permission Denied Unexpectedly**: Check role assignments and ownership
- **Middleware Not Applied**: Verify middleware matcher configuration
- **Cached Permissions**: Clear session cache after permission changes
- **Inconsistent Checks**: Ensure same logic in middleware, components, and actions
- **Performance Issues**: Cache permission checks, use database indexes