Skip to content

Instantly share code, notes, and snippets.

View AurelianSpodarec's full-sized avatar
🎨
Building cool stuff. Woop!

Aurelian Spodarec AurelianSpodarec

🎨
Building cool stuff. Woop!
View GitHub Profile
@conartist6
conartist6 / resume.md
Last active March 1, 2023 15:02
Conrad Buck - A resume for humans

This is my resume for humans! It is meant to be read, not parsed, and that is on purpose. My goal here is to start conversations, so you are welcome to email me any questions or comments.

Conrad Buck

[email protected]
https://github.com/conartist6
https://burningpotato.com
Remote, Eastern Time

I consider myself to be foremost a linguist and a champion of developer experience. I am always considering how it should be possible to express technical concepts with readable code, how to uphold and combine the fundamental principles of development, and what the next step is on the path to much larger goals. I hope that you will read the code I have written and find it unremarkable, but I hope that you understand also that this reflects what I believe is an exceptional ability to reach into many, many different projects, languages, and disciplines to triage and fix bugs, build missing functionality, and most importantly to make the right

@ThingEngineer
ThingEngineer / Dynamic Multi-Tenant RBAC with Route Authorization.sql
Last active April 28, 2025 17:40
Dynamic multi-tenant SQL-based RBAC with JWT enhancement, route authorization, and permission management using Supabase.
-- Role-Based Access Control (RBAC)
-- With live propagation of roles to JWT token in a multi-tenant application using Supabase refreshSession and custom_access_token_hook
-- A method of restricting table and route access to authorized users based on their role or permission level.
-- This SQL implements a dynamic, multi-tenant role-based access control (RBAC) system with route authorization. It includes:
-- A custom access token hook that enriches JWT claims with role and company data.
-- Functions to authorize actions, check route access, and retrieve authorized routes based on user roles.