set_rules
Define granular permission rules using permit/forbid/require syntax to control actions within the Nobulex MCP Compliance Server.
Instructions
Set covenant rules using permit/forbid/require syntax. Each rule is a string like 'forbid delete_user' or 'permit read_data safe to read'.
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| rules | Yes | Array of rule strings, e.g. ['forbid delete_user', 'permit read_data'] |
Implementation Reference
- src/index.ts:18-49 (handler)The MCP tool 'set_rules' implementation, which parses rules and stores them in the local 'rules' variable.
server.tool( "set_rules", "Set covenant rules using permit/forbid/require syntax. Each rule is a string like 'forbid delete_user' or 'permit read_data safe to read'.", { rules: z.array(z.string()).describe( "Array of rule strings, e.g. ['forbid delete_user', 'permit read_data']" ), }, async ({ rules: ruleStrings }) => { try { rules = ruleStrings.map(parseRule); return { content: [ { type: "text" as const, text: JSON.stringify({ ok: true, count: rules.length, rules }, null, 2), }, ], }; } catch (err) { return { content: [ { type: "text" as const, text: JSON.stringify({ ok: false, error: (err as Error).message }), }, ], isError: true, }; } } );