You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/06-data-model-delta.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@
66
66
-**Webhooks:** Store delivery payloads for 30 days for debugging, then purge.
67
67
68
68
## 4. Migration Approach
69
-
1.**Feature-flag gated migrations:** Introduce new tables with `enabled` flags default false; ensure down migrations exist.
69
+
1.**Feature-flag gated migrations:** Introduce new tables with `enabled` flags default false; ensure down migrations exist.`0017_create_feature_flags.down.sql` and `0018_expand_role_matrix.down.sql` provide rollback paths for GOV-000 and SEC-001 respectively.
70
70
2.**Backfill Strategy:** Use Supabase functions or background workers to populate new tables (e.g., `reputation_aggregates`) with resume tokens.
71
71
3.**Incremental rollout:** Deploy schema changes in small batches (spaces, then content, then commerce) to minimize lock times.
72
72
4.**Testing:** Integration tests validating RLS and referential integrity must run in CI before enabling flags.
Copy file name to clipboardExpand all lines: docs/09-test-strategy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@
34
34
- Tests must run with flags ON and OFF to ensure fallback behavior.
35
35
- Provide helper to set flag context in tests (`withFeatureFlag('spaces_v1', true)`).
36
36
- CI includes matrix builds for critical flags (Spaces, Commerce, Events).
37
-
- Added Vitest coverage for the feature flag SDK (caching, invalidation, telemetry) as part of GOV-000; extend coverage to admin API routes in upcoming iterations.
37
+
- Added Vitest coverage for the feature flag SDK (caching, invalidation, telemetry) as part of GOV-000; admin route guard tests (`tests/unit/feature-flags-admin-route.test.ts`) now verify unauthorized flows and cache purge protections.
38
38
- SEC-001 adds Vitest coverage for role slug normalization and observability counters, plus a Supabase RBAC harness (`tests/security/rbac-policies.test.ts`) that runs when credentials are provided.
Copy file name to clipboardExpand all lines: docs/10-release-plan.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@
45
45
46
46
## 6. Rollback Procedures
47
47
-**Feature-level:** Toggle flag OFF, clear caches, notify stakeholders.
48
-
-**Database-level:** Execute down migration scripts; for irreversible data changes, restore from Supabase point-in-time recovery.
48
+
-**Database-level:** Execute down migration scripts (`0017_create_feature_flags.down.sql`, `0018_expand_role_matrix.down.sql`); for irreversible data changes, restore from Supabase point-in-time recovery.
Copy file name to clipboardExpand all lines: docs/assumptions.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,3 +12,4 @@
12
12
| A-008 | 2025-02-14 | Legal/compliance resources available before Phase 3 commerce rollout. | Necessary for payments, KYC, events. | Open |
13
13
| A-009 | 2025-10-10 | Feature flag ownership stored as free-text owner label until RBAC revamp in SEC-001. | Allows governance UI to launch without expanded role matrix; revisit once role hierarchy finalized. | Closed (2025-10-17) |
14
14
| A-010 | 2025-02-18 | Despite cutover directive, execution continues ticket-by-ticket under feature flags to avoid destabilizing one-shot release until all prerequisites validated. | Aligns with risk register and roadmap gating; supports rehearsed cutover later without skipping validation. | Open |
15
+
| A-011 | 2025-02-19 | Supabase migration runner respects paired `.down.sql` files for rollback in staging/production. | Verified locally; staging rehearsal scheduled before enabling GOV-000 for pilot use. | Open |
Copy file name to clipboardExpand all lines: docs/progress/weekly-2025-10-17.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,7 @@
1
1
# Weekly Progress — 2025-10-17
2
2
3
3
## Highlights
4
+
- Hardened GOV-000 governance tooling with admin guard telemetry, cache purge protection, and reversible migrations for feature flags/RBAC.
4
5
- Delivered SEC-001 RBAC hardening: refreshed Supabase `roles`/`profile_roles`, migrated legacy slugs, and rewrote taxonomy/community policies for the new member → admin ladder.
5
6
- Gated admin role management behind the new `rbac_hardening_v1` flag, surfaced highest-role badges in the console sidebar, and mapped legacy editor/author selections.
6
7
- Instrumented `authz_denied_count` counter plus console telemetry for admin/community APIs; added Vitest coverage for role slug normalization and metrics emission.
@@ -21,6 +22,7 @@
21
22
22
23
## Metrics Snapshot
23
24
-`authz_denied_count`: 0 during admin API smoke tests post-migration (baseline logging now available).
25
+
- Added `context`/`reason` tags to `authz_denied_count` to differentiate governance vs. RBAC denials in dashboards.
24
26
-`flag_evaluation_latency_ms` remains stable at ~4ms p95 (no regression after RBAC changes share the metrics adapter).
0 commit comments