From 07dda36d6ec8fd73ad0019cf0936dad456a95cd4 Mon Sep 17 00:00:00 2001 From: Ahmed Darrazi Date: Wed, 28 Jan 2026 23:22:54 +0100 Subject: [PATCH] spec: clarify 066 rbac ui enforcement defaults --- specs/066-rbac-ui-enforcement-helper/spec.md | 14 ++++++++++++-- 1 file changed, 12 insertions(+), 2 deletions(-) diff --git a/specs/066-rbac-ui-enforcement-helper/spec.md b/specs/066-rbac-ui-enforcement-helper/spec.md index 0015978..8226d05 100644 --- a/specs/066-rbac-ui-enforcement-helper/spec.md +++ b/specs/066-rbac-ui-enforcement-helper/spec.md @@ -5,6 +5,14 @@ # Feature Specification: RBAC UI Enforcement Helper v1 **Status**: Draft **Input**: Provide a suite-wide, consistent way to enforce tenant RBAC for admin UI actions (buttons/actions in lists, records, and bulk actions) without copy/paste authorization logic. +## Clarifications + +### Session 2026-01-28 + +- Q: For Bulk Actions with mixed-permission records (some authorized, some not), what should the default behavior be? → A: All-or-nothing (if any selected record would be unauthorized, the bulk action is disabled for members and execution fails with 403 for members / 404 for non-members). +- Q: Should the helper render actions at all for non-members (in case a tenant page is reachable via misrouting), or always hide them? → A: Hide for non-members in UI, but still enforce 404 server-side for any execution attempt. +- Q: How strict should the “no ad-hoc authorization patterns in app/Filament/**” guard be in v1? → A: CI-failing (new ad-hoc patterns fail tests/CI). + ## User Scenarios & Testing *(mandatory)*