/permissions command provides an interactive interface to configure role-based access control for admin commands and raid signups.
Requires Manage Server permission or a configured admin role.
Command Signature
Permission Types
RaidBot uses a flexible permission system:- Global Admin Roles - Can use all admin commands
- Per-Command Roles - Can use specific admin commands
- Signup Roles - Can sign up for raids/museums
- Special Permissions - Stats viewing, etc.
Always Allowed
These always bypass role checks:- Server Owner - Full access to everything
- Manage Server Permission - Full access to admin commands
Interactive Panel
The panel shows:- Current global admin roles
- Selected command and its configured roles
- Controls to add/remove roles
Panel Workflow
- Select a command/permission type from dropdown
- View currently configured roles
- Use role selector to add roles
- Click “Clear roles” to remove all
Configurable Commands
- Global Admin
- Raid Management
- Server Setup
- Recurring & Polls
- Raid Signups
- Stats Viewing
Roles that can use all admin commands.Grants access to:
- All commands listed below
- All admin-only features
Permission Inheritance
Hierarchy:- Server Owner (always allowed)
- Manage Server permission (always allowed for admin commands)
- Global admin roles
- Per-command roles
- “Officer” role (in Global admin)
- No per-command roles
- “Raid Leader” role (in
/createpermissions only) - No global admin role
/create.
Configuration Examples
Example 1: Simple Setup
- Officers can use all admin commands
- Everyone can sign up for raids and museums
Example 2: Restricted Signups
- Officers can use all admin commands
- Only Guild Members can sign up for raids
- Guild Members and Trial Members can sign up for museums
Example 3: Delegated Permissions
- Officers can use all admin commands
- Raid Leaders can create and manage raids
- Event Coordinators can create polls
- Everyone can sign up
Example 4: Stats Access
- Officers have full admin access
- Recruiters can view member stats but not manage raids
Using the Panel
Best Practices
Global Admin:- Keep this limited to trusted leadership
- Use per-command roles for delegation
- Only restrict if you have verification/onboarding
- Consider separate museum permissions (lower barrier)
- Test with an alt account to verify
- Give
/createto experienced raiders - Keep
/raidmanagement more restricted /permissionsshould stay admin-only
- Consider allowing officers to view stats
- Helps with recruitment and activity tracking
- Doesn’t grant raid management powers
Troubleshooting
“Missing Access” error:- Check if user has Manage Server permission (bypasses roles)
- Check if user has global admin role
- Check if user has the specific command role
- Verify roles are still valid (not deleted)
- Check if signup roles are configured
- Verify user has one of the allowed roles
- Clear signup roles to allow everyone
Related Commands
- /settings - Other bot configuration
- /setchannel - Configure channels
- /templates - Manage templates