2024-04-16 11:21:34 +02:00
|
|
|
--liquibase formatted sql
|
|
|
|
-- This code generated was by RbacViewPostgresGenerator, do not amend manually.
|
|
|
|
|
|
|
|
|
|
|
|
-- ============================================================================
|
2024-06-03 14:45:28 +02:00
|
|
|
--changeset hs-booking-project-rbac-OBJECT:1 endDelimiter:--//
|
2024-04-16 11:21:34 +02:00
|
|
|
-- ----------------------------------------------------------------------------
|
2024-06-03 14:45:28 +02:00
|
|
|
call generateRelatedRbacObject('hs_booking_project');
|
2024-04-16 11:21:34 +02:00
|
|
|
--//
|
|
|
|
|
|
|
|
|
|
|
|
-- ============================================================================
|
2024-06-03 14:45:28 +02:00
|
|
|
--changeset hs-booking-project-rbac-ROLE-DESCRIPTORS:1 endDelimiter:--//
|
2024-04-16 11:21:34 +02:00
|
|
|
-- ----------------------------------------------------------------------------
|
2024-06-03 14:45:28 +02:00
|
|
|
call generateRbacRoleDescriptors('hsBookingProject', 'hs_booking_project');
|
2024-04-16 11:21:34 +02:00
|
|
|
--//
|
|
|
|
|
|
|
|
|
|
|
|
-- ============================================================================
|
2024-06-03 14:45:28 +02:00
|
|
|
--changeset hs-booking-project-rbac-insert-trigger:1 endDelimiter:--//
|
2024-04-16 11:21:34 +02:00
|
|
|
-- ----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
/*
|
|
|
|
Creates the roles, grants and permission for the AFTER INSERT TRIGGER.
|
|
|
|
*/
|
|
|
|
|
2024-06-03 14:45:28 +02:00
|
|
|
create or replace procedure buildRbacSystemForHsBookingProject(
|
|
|
|
NEW hs_booking_project
|
2024-04-16 11:21:34 +02:00
|
|
|
)
|
|
|
|
language plpgsql as $$
|
|
|
|
|
|
|
|
declare
|
|
|
|
newDebitor hs_office_debitor;
|
|
|
|
newDebitorRel hs_office_relation;
|
|
|
|
|
|
|
|
begin
|
|
|
|
call enterTriggerForObjectUuid(NEW.uuid);
|
|
|
|
|
|
|
|
SELECT * FROM hs_office_debitor WHERE uuid = NEW.debitorUuid INTO newDebitor;
|
|
|
|
assert newDebitor.uuid is not null, format('newDebitor must not be null for NEW.debitorUuid = %s', NEW.debitorUuid);
|
|
|
|
|
|
|
|
SELECT debitorRel.*
|
|
|
|
FROM hs_office_relation debitorRel
|
|
|
|
JOIN hs_office_debitor debitor ON debitor.debitorRelUuid = debitorRel.uuid
|
|
|
|
WHERE debitor.uuid = NEW.debitorUuid
|
|
|
|
INTO newDebitorRel;
|
|
|
|
assert newDebitorRel.uuid is not null, format('newDebitorRel must not be null for NEW.debitorUuid = %s', NEW.debitorUuid);
|
|
|
|
|
|
|
|
|
|
|
|
perform createRoleWithGrants(
|
2024-06-03 14:45:28 +02:00
|
|
|
hsBookingProjectOWNER(NEW),
|
2024-04-16 11:21:34 +02:00
|
|
|
incomingSuperRoles => array[hsOfficeRelationAGENT(newDebitorRel)]
|
|
|
|
);
|
|
|
|
|
|
|
|
perform createRoleWithGrants(
|
2024-06-03 14:45:28 +02:00
|
|
|
hsBookingProjectADMIN(NEW),
|
2024-04-19 10:06:57 +02:00
|
|
|
permissions => array['UPDATE'],
|
2024-06-03 14:45:28 +02:00
|
|
|
incomingSuperRoles => array[hsBookingProjectOWNER(NEW)]
|
2024-04-19 10:06:57 +02:00
|
|
|
);
|
|
|
|
|
|
|
|
perform createRoleWithGrants(
|
2024-06-03 14:45:28 +02:00
|
|
|
hsBookingProjectAGENT(NEW),
|
|
|
|
incomingSuperRoles => array[hsBookingProjectADMIN(NEW)]
|
2024-04-16 11:21:34 +02:00
|
|
|
);
|
|
|
|
|
|
|
|
perform createRoleWithGrants(
|
2024-06-03 14:45:28 +02:00
|
|
|
hsBookingProjectTENANT(NEW),
|
2024-04-16 11:21:34 +02:00
|
|
|
permissions => array['SELECT'],
|
2024-06-03 14:45:28 +02:00
|
|
|
incomingSuperRoles => array[hsBookingProjectAGENT(NEW)],
|
2024-04-16 11:21:34 +02:00
|
|
|
outgoingSubRoles => array[hsOfficeRelationTENANT(newDebitorRel)]
|
|
|
|
);
|
|
|
|
|
|
|
|
call grantPermissionToRole(createPermission(NEW.uuid, 'DELETE'), globalAdmin());
|
|
|
|
|
|
|
|
call leaveTriggerForObjectUuid(NEW.uuid);
|
|
|
|
end; $$;
|
|
|
|
|
|
|
|
/*
|
2024-06-03 14:45:28 +02:00
|
|
|
AFTER INSERT TRIGGER to create the role+grant structure for a new hs_booking_project row.
|
2024-04-16 11:21:34 +02:00
|
|
|
*/
|
|
|
|
|
2024-06-03 14:45:28 +02:00
|
|
|
create or replace function insertTriggerForHsBookingProject_tf()
|
2024-04-16 11:21:34 +02:00
|
|
|
returns trigger
|
|
|
|
language plpgsql
|
|
|
|
strict as $$
|
|
|
|
begin
|
2024-06-03 14:45:28 +02:00
|
|
|
call buildRbacSystemForHsBookingProject(NEW);
|
2024-04-16 11:21:34 +02:00
|
|
|
return NEW;
|
|
|
|
end; $$;
|
|
|
|
|
2024-06-03 14:45:28 +02:00
|
|
|
create trigger insertTriggerForHsBookingProject_tg
|
|
|
|
after insert on hs_booking_project
|
2024-04-16 11:21:34 +02:00
|
|
|
for each row
|
2024-06-03 14:45:28 +02:00
|
|
|
execute procedure insertTriggerForHsBookingProject_tf();
|
2024-04-16 11:21:34 +02:00
|
|
|
--//
|
|
|
|
|
|
|
|
|
|
|
|
-- ============================================================================
|
2024-06-03 14:45:28 +02:00
|
|
|
--changeset hs-booking-project-rbac-GRANTING-INSERT-PERMISSION:1 endDelimiter:--//
|
2024-04-16 11:21:34 +02:00
|
|
|
-- ----------------------------------------------------------------------------
|
|
|
|
|
2024-04-29 11:43:49 +02:00
|
|
|
-- granting INSERT permission to hs_office_relation ----------------------------
|
|
|
|
|
2024-04-16 11:21:34 +02:00
|
|
|
/*
|
2024-06-03 14:45:28 +02:00
|
|
|
Grants INSERT INTO hs_booking_project permissions to specified role of pre-existing hs_office_relation rows.
|
2024-04-16 11:21:34 +02:00
|
|
|
*/
|
|
|
|
do language plpgsql $$
|
|
|
|
declare
|
|
|
|
row hs_office_relation;
|
|
|
|
begin
|
2024-06-03 14:45:28 +02:00
|
|
|
call defineContext('create INSERT INTO hs_booking_project permissions for pre-exising hs_office_relation rows');
|
2024-04-16 11:21:34 +02:00
|
|
|
|
|
|
|
FOR row IN SELECT * FROM hs_office_relation
|
2024-04-29 11:43:49 +02:00
|
|
|
WHERE type = 'DEBITOR'
|
2024-04-16 11:21:34 +02:00
|
|
|
LOOP
|
|
|
|
call grantPermissionToRole(
|
2024-06-03 14:45:28 +02:00
|
|
|
createPermission(row.uuid, 'INSERT', 'hs_booking_project'),
|
2024-04-29 11:43:49 +02:00
|
|
|
hsOfficeRelationADMIN(row));
|
2024-04-16 11:21:34 +02:00
|
|
|
END LOOP;
|
2024-04-29 11:43:49 +02:00
|
|
|
end;
|
2024-04-16 11:21:34 +02:00
|
|
|
$$;
|
|
|
|
|
|
|
|
/**
|
2024-06-03 14:45:28 +02:00
|
|
|
Grants hs_booking_project INSERT permission to specified role of new hs_office_relation rows.
|
2024-04-16 11:21:34 +02:00
|
|
|
*/
|
2024-06-03 14:45:28 +02:00
|
|
|
create or replace function new_hs_booking_project_grants_insert_to_hs_office_relation_tf()
|
2024-04-16 11:21:34 +02:00
|
|
|
returns trigger
|
|
|
|
language plpgsql
|
|
|
|
strict as $$
|
|
|
|
begin
|
2024-04-23 10:42:24 +02:00
|
|
|
if NEW.type = 'DEBITOR' then
|
2024-04-29 11:43:49 +02:00
|
|
|
call grantPermissionToRole(
|
2024-06-03 14:45:28 +02:00
|
|
|
createPermission(NEW.uuid, 'INSERT', 'hs_booking_project'),
|
2024-04-16 11:21:34 +02:00
|
|
|
hsOfficeRelationADMIN(NEW));
|
2024-04-29 11:43:49 +02:00
|
|
|
end if;
|
2024-04-16 11:21:34 +02:00
|
|
|
return NEW;
|
|
|
|
end; $$;
|
|
|
|
|
|
|
|
-- z_... is to put it at the end of after insert triggers, to make sure the roles exist
|
2024-06-03 14:45:28 +02:00
|
|
|
create trigger z_new_hs_booking_project_grants_insert_to_hs_office_relation_tg
|
2024-04-16 11:21:34 +02:00
|
|
|
after insert on hs_office_relation
|
|
|
|
for each row
|
2024-06-03 14:45:28 +02:00
|
|
|
execute procedure new_hs_booking_project_grants_insert_to_hs_office_relation_tf();
|
2024-04-16 11:21:34 +02:00
|
|
|
|
|
|
|
|
2024-04-29 11:43:49 +02:00
|
|
|
-- ============================================================================
|
2024-06-03 14:45:28 +02:00
|
|
|
--changeset hs_booking_project-rbac-CHECKING-INSERT-PERMISSION:1 endDelimiter:--//
|
2024-04-29 11:43:49 +02:00
|
|
|
-- ----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
/**
|
2024-06-03 14:45:28 +02:00
|
|
|
Checks if the user respectively the assumed roles are allowed to insert a row to hs_booking_project.
|
2024-04-16 11:21:34 +02:00
|
|
|
*/
|
2024-06-03 14:45:28 +02:00
|
|
|
create or replace function hs_booking_project_insert_permission_check_tf()
|
2024-04-16 11:21:34 +02:00
|
|
|
returns trigger
|
|
|
|
language plpgsql as $$
|
|
|
|
declare
|
2024-04-29 11:43:49 +02:00
|
|
|
superObjectUuid uuid;
|
2024-04-16 11:21:34 +02:00
|
|
|
begin
|
2024-04-29 11:43:49 +02:00
|
|
|
-- check INSERT permission via indirect foreign key: NEW.debitorUuid
|
|
|
|
superObjectUuid := (SELECT debitorRel.uuid
|
|
|
|
FROM hs_office_relation debitorRel
|
|
|
|
JOIN hs_office_debitor debitor ON debitor.debitorRelUuid = debitorRel.uuid
|
|
|
|
WHERE debitor.uuid = NEW.debitorUuid
|
|
|
|
);
|
2024-06-03 14:45:28 +02:00
|
|
|
assert superObjectUuid is not null, 'object uuid fetched depending on hs_booking_project.debitorUuid must not be null, also check fetchSql in RBAC DSL';
|
|
|
|
if hasInsertPermission(superObjectUuid, 'hs_booking_project') then
|
2024-04-29 11:43:49 +02:00
|
|
|
return NEW;
|
2024-04-16 11:21:34 +02:00
|
|
|
end if;
|
2024-04-29 11:43:49 +02:00
|
|
|
|
2024-06-03 14:45:28 +02:00
|
|
|
raise exception '[403] insert into hs_booking_project values(%) not allowed for current subjects % (%)',
|
|
|
|
NEW, currentSubjects(), currentSubjectsUuids();
|
2024-04-16 11:21:34 +02:00
|
|
|
end; $$;
|
|
|
|
|
2024-06-03 14:45:28 +02:00
|
|
|
create trigger hs_booking_project_insert_permission_check_tg
|
|
|
|
before insert on hs_booking_project
|
2024-04-16 11:21:34 +02:00
|
|
|
for each row
|
2024-06-03 14:45:28 +02:00
|
|
|
execute procedure hs_booking_project_insert_permission_check_tf();
|
2024-04-16 11:21:34 +02:00
|
|
|
--//
|
|
|
|
|
2024-04-29 11:43:49 +02:00
|
|
|
|
2024-04-16 11:21:34 +02:00
|
|
|
-- ============================================================================
|
2024-06-03 14:45:28 +02:00
|
|
|
--changeset hs-booking-project-rbac-IDENTITY-VIEW:1 endDelimiter:--//
|
2024-04-16 11:21:34 +02:00
|
|
|
-- ----------------------------------------------------------------------------
|
|
|
|
|
2024-06-03 14:45:28 +02:00
|
|
|
call generateRbacIdentityViewFromQuery('hs_booking_project',
|
2024-04-29 11:43:49 +02:00
|
|
|
$idName$
|
2024-06-03 14:45:28 +02:00
|
|
|
SELECT bookingProject.uuid as uuid, debitorIV.idName || '-' || cleanIdentifier(bookingProject.caption) as idName
|
|
|
|
FROM hs_booking_project bookingProject
|
|
|
|
JOIN hs_office_debitor_iv debitorIV ON debitorIV.uuid = bookingProject.debitorUuid
|
2024-04-29 11:43:49 +02:00
|
|
|
$idName$);
|
2024-04-16 11:21:34 +02:00
|
|
|
--//
|
|
|
|
|
2024-04-29 11:43:49 +02:00
|
|
|
|
2024-04-16 11:21:34 +02:00
|
|
|
-- ============================================================================
|
2024-06-03 14:45:28 +02:00
|
|
|
--changeset hs-booking-project-rbac-RESTRICTED-VIEW:1 endDelimiter:--//
|
2024-04-16 11:21:34 +02:00
|
|
|
-- ----------------------------------------------------------------------------
|
2024-06-03 14:45:28 +02:00
|
|
|
call generateRbacRestrictedView('hs_booking_project',
|
2024-04-16 11:21:34 +02:00
|
|
|
$orderBy$
|
2024-06-03 14:45:28 +02:00
|
|
|
caption
|
2024-04-16 11:21:34 +02:00
|
|
|
$orderBy$,
|
|
|
|
$updates$
|
|
|
|
version = new.version,
|
2024-06-03 14:45:28 +02:00
|
|
|
caption = new.caption
|
2024-04-16 11:21:34 +02:00
|
|
|
$updates$);
|
|
|
|
--//
|
|
|
|
|