--liquibase formatted sql -- This code generated was by RbacViewPostgresGenerator, do not amend manually. -- ============================================================================ --changeset RbacObjectGenerator:hs-office-coopsharetx-rbac-OBJECT endDelimiter:--// -- ---------------------------------------------------------------------------- call rbac.generateRelatedRbacObject('hs_office.coopsharetx'); --// -- ============================================================================ --changeset RbacRoleDescriptorsGenerator:hs-office-coopsharetx-rbac-ROLE-DESCRIPTORS endDelimiter:--// -- ---------------------------------------------------------------------------- call rbac.generateRbacRoleDescriptors('hs_office.coopsharetx'); --// -- ============================================================================ --changeset RolesGrantsAndPermissionsGenerator:hs-office-coopsharetx-rbac-insert-trigger endDelimiter:--// -- ---------------------------------------------------------------------------- /* Creates the roles, grants and permission for the AFTER INSERT TRIGGER. */ create or replace procedure hs_office.coopsharetx_build_rbac_system( NEW hs_office.coopsharetx ) language plpgsql as $$ declare newMembership hs_office.membership; begin call rbac.enterTriggerForObjectUuid(NEW.uuid); SELECT * FROM hs_office.membership WHERE uuid = NEW.membershipUuid INTO newMembership; assert newMembership.uuid is not null, format('newMembership must not be null for NEW.membershipUuid = %s', NEW.membershipUuid); call rbac.grantPermissionToRole(rbac.createPermission(NEW.uuid, 'SELECT'), hs_office.membership_AGENT(newMembership)); call rbac.grantPermissionToRole(rbac.createPermission(NEW.uuid, 'UPDATE'), hs_office.membership_ADMIN(newMembership)); call rbac.leaveTriggerForObjectUuid(NEW.uuid); end; $$; /* AFTER INSERT TRIGGER to create the role+grant structure for a new hs_office.coopsharetx row. */ create or replace function hs_office.coopsharetx_build_rbac_system_after_insert_tf() returns trigger language plpgsql strict as $$ begin call hs_office.coopsharetx_build_rbac_system(NEW); return NEW; end; $$; create trigger build_rbac_system_after_insert_tg after insert on hs_office.coopsharetx for each row execute procedure hs_office.coopsharetx_build_rbac_system_after_insert_tf(); --// -- ============================================================================ --changeset InsertTriggerGenerator:hs-office-coopsharetx-rbac-GRANTING-INSERT-PERMISSION endDelimiter:--// -- ---------------------------------------------------------------------------- -- granting INSERT permission to hs_office.membership ---------------------------- /* Grants INSERT INTO hs_office.coopsharetx permissions to specified role of pre-existing hs_office.membership rows. */ do language plpgsql $$ declare row hs_office.membership; begin call base.defineContext('create INSERT INTO hs_office.coopsharetx permissions for pre-exising hs_office.membership rows'); FOR row IN SELECT * FROM hs_office.membership -- unconditional for all rows in that table LOOP call rbac.grantPermissionToRole( rbac.createPermission(row.uuid, 'INSERT', 'hs_office.coopsharetx'), hs_office.membership_ADMIN(row)); END LOOP; end; $$; /** Grants hs_office.coopsharetx INSERT permission to specified role of new membership rows. */ create or replace function hs_office.coopsharetx_grants_insert_to_membership_tf() returns trigger language plpgsql strict as $$ begin -- unconditional for all rows in that table call rbac.grantPermissionToRole( rbac.createPermission(NEW.uuid, 'INSERT', 'hs_office.coopsharetx'), hs_office.membership_ADMIN(NEW)); -- end. return NEW; end; $$; -- ..._z_... is to put it at the end of after insert triggers, to make sure the roles exist create trigger coopsharetx_z_grants_after_insert_tg after insert on hs_office.membership for each row execute procedure hs_office.coopsharetx_grants_insert_to_membership_tf(); -- ============================================================================ --changeset InsertTriggerGenerator:hs-office-coopsharetx-rbac-CHECKING-INSERT-PERMISSION endDelimiter:--// -- ---------------------------------------------------------------------------- /** Checks if the user respectively the assumed roles are allowed to insert a row to hs_office.coopsharetx. */ create or replace function hs_office.coopsharetx_insert_permission_check_tf() returns trigger language plpgsql as $$ declare superObjectUuid uuid; begin -- check INSERT permission via direct foreign key: NEW.membershipUuid if rbac.hasInsertPermission(NEW.membershipUuid, 'hs_office.coopsharetx') then return NEW; end if; raise exception '[403] insert into hs_office.coopsharetx values(%) not allowed for current subjects % (%)', NEW, base.currentSubjects(), rbac.currentSubjectOrAssumedRolesUuids(); end; $$; create trigger coopsharetx_insert_permission_check_tg before insert on hs_office.coopsharetx for each row execute procedure hs_office.coopsharetx_insert_permission_check_tf(); --// -- ============================================================================ --changeset RbacIdentityViewGenerator:hs-office-coopsharetx-rbac-IDENTITY-VIEW endDelimiter:--// -- ---------------------------------------------------------------------------- call rbac.generateRbacIdentityViewFromProjection('hs_office.coopsharetx', $idName$ reference $idName$); --// -- ============================================================================ --changeset RbacRestrictedViewGenerator:hs-office-coopsharetx-rbac-RESTRICTED-VIEW endDelimiter:--// -- ---------------------------------------------------------------------------- call rbac.generateRbacRestrictedView('hs_office.coopsharetx', $orderBy$ reference $orderBy$, $updates$ comment = new.comment $updates$); --//