hs.hsadmin.ng/src/main/resources/db/changelog/5-hs-office/505-bankaccount/5053-hs-office-bankaccount-rbac.sql

104 lines
3.3 KiB
MySQL
Raw Normal View History

2022-10-04 19:09:37 +02:00
--liquibase formatted sql
-- This code generated was by RbacViewPostgresGenerator, do not amend manually.
2022-10-04 19:09:37 +02:00
-- ============================================================================
--changeset RbacObjectGenerator:hs-office-bankaccount-rbac-OBJECT endDelimiter:--//
2022-10-04 19:09:37 +02:00
-- ----------------------------------------------------------------------------
call rbac.generateRelatedRbacObject('hs_office.bankaccount');
2022-10-04 19:09:37 +02:00
--//
-- ============================================================================
--changeset RbacRoleDescriptorsGenerator:hs-office-bankaccount-rbac-ROLE-DESCRIPTORS endDelimiter:--//
2022-10-04 19:09:37 +02:00
-- ----------------------------------------------------------------------------
call rbac.generateRbacRoleDescriptors('hs_office.bankaccount');
2022-10-04 19:09:37 +02:00
--//
-- ============================================================================
--changeset RolesGrantsAndPermissionsGenerator:hs-office-bankaccount-rbac-insert-trigger endDelimiter:--//
2022-10-04 19:09:37 +02:00
-- ----------------------------------------------------------------------------
/*
Creates the roles, grants and permission for the AFTER INSERT TRIGGER.
2022-10-04 19:09:37 +02:00
*/
create or replace procedure hs_office.bankaccount_build_rbac_system(
NEW hs_office.bankaccount
)
language plpgsql as $$
declare
2022-10-04 19:09:37 +02:00
begin
call rbac.enterTriggerForObjectUuid(NEW.uuid);
2022-10-04 19:09:37 +02:00
perform rbac.defineRoleWithGrants(
hs_office.bankaccount_OWNER(NEW),
permissions => array['DELETE'],
incomingSuperRoles => array[rbac.global_ADMIN()],
subjectUuids => array[rbac.currentSubjectUuid()]
);
2022-10-04 19:09:37 +02:00
perform rbac.defineRoleWithGrants(
hs_office.bankaccount_ADMIN(NEW),
permissions => array['UPDATE'],
incomingSuperRoles => array[hs_office.bankaccount_OWNER(NEW)]
);
perform rbac.defineRoleWithGrants(
hs_office.bankaccount_REFERRER(NEW),
permissions => array['SELECT'],
incomingSuperRoles => array[hs_office.bankaccount_ADMIN(NEW)]
);
2022-10-04 19:09:37 +02:00
call rbac.leaveTriggerForObjectUuid(NEW.uuid);
2022-10-04 19:09:37 +02:00
end; $$;
/*
AFTER INSERT TRIGGER to create the role+grant structure for a new hs_office.bankaccount row.
2022-10-04 19:09:37 +02:00
*/
create or replace function hs_office.bankaccount_build_rbac_system_after_insert_tf()
returns trigger
language plpgsql
strict as $$
begin
call hs_office.bankaccount_build_rbac_system(NEW);
return NEW;
end; $$;
create trigger build_rbac_system_after_insert_tg
after insert on hs_office.bankaccount
2022-10-04 19:09:37 +02:00
for each row
execute procedure hs_office.bankaccount_build_rbac_system_after_insert_tf();
2022-10-04 19:09:37 +02:00
--//
-- ============================================================================
--changeset RbacIdentityViewGenerator:hs-office-bankaccount-rbac-IDENTITY-VIEW endDelimiter:--//
-- ----------------------------------------------------------------------------
call rbac.generateRbacIdentityViewFromProjection('hs_office.bankaccount',
$idName$
iban
$idName$);
--//
-- ============================================================================
--changeset RbacRestrictedViewGenerator:hs-office-bankaccount-rbac-RESTRICTED-VIEW endDelimiter:--//
-- ----------------------------------------------------------------------------
call rbac.generateRbacRestrictedView('hs_office.bankaccount',
$orderBy$
iban
$orderBy$,
$updates$
holder = new.holder,
iban = new.iban,
bic = new.bic
$updates$);
2022-10-04 19:09:37 +02:00
--//