Files
gh-hopeoverture-worldbuildi…/skills/role-permission-table-builder/SKILL.md
2025-11-29 18:46:39 +08:00

15 KiB

name, description
name description
role-permission-table-builder Generates comprehensive role-based permission matrices in markdown or SQL format for pages, components, and data access patterns. This skill should be used when designing authorization systems, documenting permissions, creating RBAC tables, or planning access control. Use for RBAC, role permissions, access control, authorization matrix, permission mapping, or security policies.

Role Permission Table Builder

Generate and maintain comprehensive role-based access control (RBAC) permission matrices for worldbuilding applications.

Overview

To build role permission systems:

  1. Define user roles and hierarchies
  2. Identify protected resources (pages, components, data, actions)
  3. Create permission matrices mapping roles to resources
  4. Generate implementation code for middleware and components
  5. Document permission policies for team reference

Role Definitions

Standard Roles

Define common application roles:

  • Guest: Unauthenticated users (read-only public content)
  • User: Basic authenticated users (read own data, limited writes)
  • Creator: Content creators (create/edit entities, manage own content)
  • Editor: Content editors (edit any content, moderate submissions)
  • Admin: System administrators (full access, user management)
  • Super Admin: Platform owners (all permissions, system configuration)

Custom Roles

To define worldbuilding-specific roles:

  • World Owner: Creator of worldbuilding project
  • Collaborator: Invited contributor to world
  • Viewer: Read-only access to private world
  • Game Master: Special permissions for RPG campaigns
  • Publisher: Can publish worlds publicly

Consult references/role-hierarchy.md for role inheritance patterns.

Permission Matrix

Page-Level Permissions

To define page access:

Page Route Guest User Creator Editor Admin
/ [OK] [OK] [OK] [OK] [OK]
/login [OK] [OK] [OK] [OK] [OK]
/dashboard [ERROR] [OK] [OK] [OK] [OK]
/worlds/create [ERROR] [OK] [OK] [OK] [OK]
/worlds/[id] 🔒 🔒 [OK] [OK] [OK]
/worlds/[id]/edit [ERROR] [ERROR] [OK] [OK] [OK]
/admin/users [ERROR] [ERROR] [ERROR] [ERROR] [OK]
/admin/settings [ERROR] [ERROR] [ERROR] [ERROR] [OK]

Legend:

  • [OK] Full access
  • 🔒 Conditional access (ownership/invitation)
  • [ERROR] No access

Component-Level Permissions

To define component visibility:

Component Guest User Creator Editor Admin
WorldList [OK] Public [OK] All [OK] All [OK] All [OK] All
WorldCreateButton [ERROR] [OK] [OK] [OK] [OK]
EntityEditor [ERROR] [ERROR] [OK] Own [OK] All [OK] All
DeleteButton [ERROR] [ERROR] [OK] Own [OK] All [OK] All
ShareWorldButton [ERROR] [ERROR] [OK] Own [OK] All [OK] All
AdminPanel [ERROR] [ERROR] [ERROR] [ERROR] [OK]
UserManagement [ERROR] [ERROR] [ERROR] [ERROR] [OK]

Data Access Permissions

To define data operations:

Operation Guest User Creator Editor Admin
Read public worlds [OK] [OK] [OK] [OK] [OK]
Read private worlds [ERROR] 🔒 Invited 🔒 Own [OK] [OK]
Create world [ERROR] [OK] [OK] [OK] [OK]
Update own world [ERROR] [OK] [OK] [OK] [OK]
Update any world [ERROR] [ERROR] [ERROR] [OK] [OK]
Delete own world [ERROR] [OK] [OK] [OK] [OK]
Delete any world [ERROR] [ERROR] [ERROR] [ERROR] [OK]
Create entity [ERROR] [ERROR] [OK] [OK] [OK]
Update own entity [ERROR] [ERROR] [OK] [OK] [OK]
Update any entity [ERROR] [ERROR] [ERROR] [OK] [OK]
Delete entity [ERROR] [ERROR] [OK] Own [OK] [OK]
Manage collaborators [ERROR] [ERROR] [OK] Own [OK] [OK]
Publish world [ERROR] [ERROR] [OK] Own [OK] [OK]
Moderate content [ERROR] [ERROR] [ERROR] [OK] [OK]
Manage users [ERROR] [ERROR] [ERROR] [ERROR] [OK]

Action Permissions

To define Server Action permissions:

Server Action Guest User Creator Editor Admin
createWorld [ERROR] [OK] [OK] [OK] [OK]
updateWorld [ERROR] 🔒 🔒 [OK] [OK]
deleteWorld [ERROR] 🔒 🔒 [ERROR] [OK]
createEntity [ERROR] [ERROR] [OK] [OK] [OK]
updateEntity [ERROR] [ERROR] 🔒 [OK] [OK]
deleteEntity [ERROR] [ERROR] 🔒 [OK] [OK]
inviteCollaborator [ERROR] [ERROR] 🔒 [OK] [OK]
publishWorld [ERROR] [ERROR] 🔒 [OK] [OK]
deleteUser [ERROR] [ERROR] [ERROR] [ERROR] [OK]

Use scripts/generate_permission_matrix.py to create customized permission tables.

SQL Schema

To implement permissions in database:

-- Roles table
CREATE TABLE roles (
  id SERIAL PRIMARY KEY,
  name VARCHAR(50) UNIQUE NOT NULL,
  description TEXT,
  created_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP
);

-- Permissions table
CREATE TABLE permissions (
  id SERIAL PRIMARY KEY,
  resource VARCHAR(100) NOT NULL,
  action VARCHAR(50) NOT NULL,
  description TEXT,
  UNIQUE(resource, action)
);

-- Role permissions mapping
CREATE TABLE role_permissions (
  id SERIAL PRIMARY KEY,
  role_id INTEGER REFERENCES roles(id) ON DELETE CASCADE,
  permission_id INTEGER REFERENCES permissions(id) ON DELETE CASCADE,
  UNIQUE(role_id, permission_id)
);

-- User roles
CREATE TABLE user_roles (
  id SERIAL PRIMARY KEY,
  user_id INTEGER REFERENCES users(id) ON DELETE CASCADE,
  role_id INTEGER REFERENCES roles(id) ON DELETE CASCADE,
  assigned_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
  UNIQUE(user_id, role_id)
);

-- Resource ownership
CREATE TABLE resource_ownership (
  id SERIAL PRIMARY KEY,
  user_id INTEGER REFERENCES users(id) ON DELETE CASCADE,
  resource_type VARCHAR(50) NOT NULL,
  resource_id INTEGER NOT NULL,
  created_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
  UNIQUE(resource_type, resource_id)
);

-- Collaborators (for conditional access)
CREATE TABLE collaborators (
  id SERIAL PRIMARY KEY,
  world_id INTEGER REFERENCES worlds(id) ON DELETE CASCADE,
  user_id INTEGER REFERENCES users(id) ON DELETE CASCADE,
  role VARCHAR(50) NOT NULL,
  invited_at TIMESTAMP DEFAULT CURRENT_TIMESTAMP,
  UNIQUE(world_id, user_id)
);

Use scripts/generate_rbac_schema.py to generate database schema with seed data.

Reference assets/rbac-schema.sql for complete schema with indexes and constraints.

Implementation

Middleware Protection

To protect routes with middleware:

// middleware.ts
import { NextResponse } from 'next/server';
import type { NextRequest } from 'next/server';
import { getSession } from '@/lib/auth';
import { checkPermission } from '@/lib/permissions';

const protectedRoutes = {
  '/dashboard': ['user', 'creator', 'editor', 'admin'],
  '/worlds/create': ['user', 'creator', 'editor', 'admin'],
  '/admin': ['admin'],
};

export async function middleware(request: NextRequest) {
  const session = await getSession(request);
  const path = request.nextUrl.pathname;

  // Check if route requires authentication
  for (const [route, allowedRoles] of Object.entries(protectedRoutes)) {
    if (path.startsWith(route)) {
      if (!session) {
        return NextResponse.redirect(new URL('/login', request.url));
      }

      if (!allowedRoles.includes(session.user.role)) {
        return NextResponse.redirect(new URL('/unauthorized', request.url));
      }
    }
  }

  return NextResponse.next();
}

export const config = {
  matcher: ['/((?!api|_next/static|_next/image|favicon.ico).*)'],
};

Component-Level Checks

To conditionally render components:

// components/ProtectedComponent.tsx
import { useSession } from '@/lib/auth';
import { hasPermission } from '@/lib/permissions';

interface Props {
  requiredRole?: string[];
  requiredPermission?: string;
  fallback?: React.ReactNode;
  children: React.ReactNode;
}

export function ProtectedComponent({
  requiredRole,
  requiredPermission,
  fallback = null,
  children,
}: Props) {
  const { session } = useSession();

  if (!session) {
    return <>{fallback}</>;
  }

  if (requiredRole && !requiredRole.includes(session.user.role)) {
    return <>{fallback}</>;
  }

  if (requiredPermission && !hasPermission(session.user, requiredPermission)) {
    return <>{fallback}</>;
  }

  return <>{children}</>;
}

Usage:

<ProtectedComponent requiredRole={['creator', 'editor', 'admin']}>
  <EntityEditor entity={entity} />
</ProtectedComponent>

Reference assets/protected-component.tsx for complete implementation.

Server Action Protection

To protect Server Actions:

// lib/permissions.ts
'use server';

import { getSession } from '@/lib/auth';
import { checkPermission } from '@/lib/rbac';

export async function requirePermission(permission: string) {
  const session = await getSession();

  if (!session) {
    throw new Error('Unauthorized');
  }

  const hasAccess = await checkPermission(session.user, permission);

  if (!hasAccess) {
    throw new Error('Forbidden');
  }

  return session;
}

export async function requireOwnership(resourceType: string, resourceId: number) {
  const session = await getSession();

  if (!session) {
    throw new Error('Unauthorized');
  }

  const isOwner = await checkOwnership(session.user.id, resourceType, resourceId);

  if (!isOwner && session.user.role !== 'admin') {
    throw new Error('Forbidden');
  }

  return session;
}

Usage in Server Actions:

'use server';

import { requirePermission, requireOwnership } from '@/lib/permissions';

export async function updateEntity(entityId: number, data: EntityData) {
  await requireOwnership('entity', entityId);

  // Proceed with update
  return updateEntityInDB(entityId, data);
}

export async function deleteWorld(worldId: number) {
  const session = await requirePermission('world:delete');

  if (session.user.role !== 'admin') {
    await requireOwnership('world', worldId);
  }

  return deleteWorldFromDB(worldId);
}

Dynamic Permission Checks

To implement complex permission logic:

// lib/rbac.ts
export async function checkPermission(
  user: User,
  resource: string,
  action: string,
  context?: { resourceId?: number; ownerId?: number }
): Promise<boolean> {
  // Admin has all permissions
  if (user.role === 'admin') {
    return true;
  }

  // Check role-based permission
  const hasRolePermission = await hasRolePermission(user.role, resource, action);

  if (!hasRolePermission) {
    return false;
  }

  // Check ownership if required
  if (context?.resourceId) {
    const isOwner = await checkOwnership(user.id, resource, context.resourceId);
    return isOwner;
  }

  return true;
}

Consult references/permission-check-patterns.md for advanced patterns.

Permission Utilities

Use scripts/permission_utils.py for common operations:

# Check user permissions
python scripts/permission_utils.py check --user-id 123 --permission "world:update"

# List role permissions
python scripts/permission_utils.py list-role --role creator

# Grant permission to role
python scripts/permission_utils.py grant --role editor --permission "entity:delete"

# Revoke permission from role
python scripts/permission_utils.py revoke --role user --permission "world:delete"

Testing Permissions

To test authorization:

// tests/permissions.test.ts
import { checkPermission } from '@/lib/rbac';

describe('RBAC', () => {
  it('admin can delete any world', async () => {
    const admin = { id: 1, role: 'admin' };
    const canDelete = await checkPermission(admin, 'world', 'delete');
    expect(canDelete).toBe(true);
  });

  it('creator can only delete own world', async () => {
    const creator = { id: 2, role: 'creator' };
    const ownWorld = { id: 10, ownerId: 2 };

    const canDeleteOwn = await checkPermission(creator, 'world', 'delete', {
      resourceId: ownWorld.id,
      ownerId: ownWorld.ownerId,
    });
    expect(canDeleteOwn).toBe(true);

    const othersWorld = { id: 11, ownerId: 3 };
    const canDeleteOthers = await checkPermission(creator, 'world', 'delete', {
      resourceId: othersWorld.id,
      ownerId: othersWorld.ownerId,
    });
    expect(canDeleteOthers).toBe(false);
  });
});

Documentation Generation

Use scripts/generate_permission_docs.py to create permission documentation:

# Generate markdown documentation
python scripts/generate_permission_docs.py --format markdown --output docs/permissions.md

# Generate SQL seed data
python scripts/generate_permission_docs.py --format sql --output db/seeds/permissions.sql

# Generate TypeScript types
python scripts/generate_permission_docs.py --format typescript --output lib/types/permissions.ts

Output includes:

  • Complete permission matrix tables
  • Role hierarchy diagrams
  • Implementation examples
  • API documentation

Reference assets/permission-docs-template.md for documentation structure.

Best Practices

  1. Principle of Least Privilege: Grant minimum required permissions
  2. Role Hierarchy: Implement role inheritance for simpler management
  3. Audit Logging: Track permission checks and access attempts
  4. Regular Reviews: Periodically audit and update permissions
  5. Clear Naming: Use consistent, descriptive permission names
  6. Documentation: Maintain up-to-date permission documentation
  7. Testing: Test authorization for all roles and edge cases
  8. Graceful Degradation: Show appropriate UI for unauthorized users

Troubleshooting

Common issues:

  • Permission Denied Unexpectedly: Check role assignments and ownership
  • Middleware Not Applied: Verify middleware matcher configuration
  • Cached Permissions: Clear session cache after permission changes
  • Inconsistent Checks: Ensure same logic in middleware, components, and actions
  • Performance Issues: Cache permission checks, use database indexes