Toi
12/03/2025, 7:49 PMNikhil
12/03/2025, 10:25 PMPerseus
12/04/2025, 9:19 AMpablo
12/05/2025, 9:20 AMjs
โ issue:23246 view (220.908873ms)
โโโ โจ issue:23246 n_cc (2.714128ms)
โโโ โ portfolio:2 view (170.977547ms)
โโโ โ portfolio:2 admin (162.245418ms)
โโโ โ tenant:1 is_admin (149.084628ms)
โโโ โ tenant:1 super_admin (139.782078ms)
โโโ โ role:super_admin_1 neighbour (23.867279ms)
โโโ neighbour:15Kurt
12/05/2025, 7:55 PMJoey
12/05/2025, 8:38 PMKurt
12/05/2025, 8:39 PMmagec
12/09/2025, 8:54 AMcustom_role, where I define the organization relationship, and also 'self relationships' one per 'permissions' in apps. With this in-place I just need to add these custom_org permissions from orgs to the calculation of app permissions, is this correct?Sohan
12/09/2025, 7:03 PMspicedb-parser-js . We also have Atikur who will demo a UI he built for SpiceDB called Lens.
This will be right here in Discord: https://discord.gg/RGCKZQQz?event=1443309664275136785frekw
12/10/2025, 9:59 AMKolt
12/10/2025, 5:44 PMAtikur Rahman
12/10/2025, 6:07 PMdystopiandev
12/12/2025, 7:22 PM<type> with expiration delegates value of now to the underlying data store.
About this:
> It requires clients to provide the now timestamp. This is additional complexity for clients.
Conversely, client-side provision of that value is crucial to our systems.
We use TimeProvider abstraction in .NET that serves as the central source of truth for time, meaning we always override data stores' internal clocks by explicitly setting time columns/fields.
Our TimeProvider is backed by different sources across projects, but what's important is that the app decides what now is, not any of the data stores or other infra.
So we've skimmed and weren't able to find any notes on this: if specifying now for <type> with expiration is planned, unplanned or outright technically impossible to implement even in the future.
If anyone could advise please. Thanks.StanFyr
12/15/2025, 4:11 PMdefinition workspace {
relation parent: workspace
permission secured = parent->secured & other_irrelevant_perm
permission other_irrelevant_perm = <the other permission checked at each level>
}
is there a way to ignore the `parent->secured`if parent has no relations ?Joey
12/15/2025, 5:10 PMparent->secured to something like "all users" or a wildcard on the "root" workspaceJoey
12/15/2025, 5:10 PMStanFyr
12/15/2025, 5:12 PMStanFyr
12/15/2025, 5:12 PMJoey
12/15/2025, 6:20 PMponyloky
12/17/2025, 10:37 AMCharlie
12/17/2025, 7:47 PMFratt
12/17/2025, 8:50 PMYash
12/18/2025, 8:19 AMSaumeel
12/18/2025, 3:04 PMdefinition example/channel {
relation admin_members: example/admins
relation user_members: example/users
}
definition example/admins {
relation channel: example/channel
}
definition example/users {
relation channel: example/channel
}
definition example/skus {
relation allowlisted_channel_members: example/channel#admin_members | example/channel#user_members
permission view_sku = allowlisted_channel_members
}
Is there any issue with having a cyclical relationship like user->channel and channel->user?
Is there maybe another way to structure this to avoid having the channel->user & channel->admin relations?Maria Ines Parnisari
12/18/2025, 5:39 PMben
12/19/2025, 10:16 PMben
12/19/2025, 10:32 PMben
12/19/2025, 11:40 PMRimoniv
12/21/2025, 3:06 PMStanFyr
12/24/2025, 7:59 AM/ (definition docs/document {}). in our current schema, we use prefixes with a _ seperator (so definition docs_document {}).
is there any actual difference to that ? and should I migrate before the schema is too widely spread to allow that ? (currently, one application uses it in a prod environment, and one is currently being worked on, we expect to have at least 5 different apps using the same schema in the future.)