--liquibase formatted sql -- This code generated was by RbacViewPostgresGenerator, do not amend manually. -- ============================================================================ --changeset RbacObjectGenerator:hs-office-relation-rbac-OBJECT endDelimiter:--// -- ---------------------------------------------------------------------------- call rbac.generateRelatedRbacObject('hs_office.relation'); --// -- ============================================================================ --changeset RbacRoleDescriptorsGenerator:hs-office-relation-rbac-ROLE-DESCRIPTORS endDelimiter:--// -- ---------------------------------------------------------------------------- call rbac.generateRbacRoleDescriptors('hs_office.relation'); --// -- ============================================================================ --changeset RolesGrantsAndPermissionsGenerator:hs-office-relation-rbac-insert-trigger endDelimiter:--// -- ---------------------------------------------------------------------------- /* Creates the roles, grants and permission for the AFTER INSERT TRIGGER. */ create or replace procedure hs_office.relation_build_rbac_system( NEW hs_office.relation ) language plpgsql as $$ declare newHolderPerson hs_office.person; newAnchorPerson hs_office.person; newContact hs_office.contact; begin call rbac.enterTriggerForObjectUuid(NEW.uuid); SELECT * FROM hs_office.person WHERE uuid = NEW.holderUuid INTO newHolderPerson; assert newHolderPerson.uuid is not null, format('newHolderPerson must not be null for NEW.holderUuid = %s of hs_office.relation', NEW.holderUuid); SELECT * FROM hs_office.person WHERE uuid = NEW.anchorUuid INTO newAnchorPerson; assert newAnchorPerson.uuid is not null, format('newAnchorPerson must not be null for NEW.anchorUuid = %s of hs_office.relation', NEW.anchorUuid); SELECT * FROM hs_office.contact WHERE uuid = NEW.contactUuid INTO newContact; assert newContact.uuid is not null, format('newContact must not be null for NEW.contactUuid = %s of hs_office.relation', NEW.contactUuid); perform rbac.defineRoleWithGrants( hs_office.relation_OWNER(NEW), permissions => array['DELETE'], incomingSuperRoles => array[rbac.global_ADMIN()], subjectUuids => array[rbac.currentSubjectUuid()] ); perform rbac.defineRoleWithGrants( hs_office.relation_ADMIN(NEW), permissions => array['UPDATE'], incomingSuperRoles => array[hs_office.relation_OWNER(NEW)] ); perform rbac.defineRoleWithGrants( hs_office.relation_AGENT(NEW), incomingSuperRoles => array[hs_office.relation_ADMIN(NEW)] ); perform rbac.defineRoleWithGrants( hs_office.relation_TENANT(NEW), permissions => array['SELECT'], incomingSuperRoles => array[ hs_office.contact_ADMIN(newContact), hs_office.relation_AGENT(NEW)], outgoingSubRoles => array[ hs_office.contact_REFERRER(newContact), hs_office.person_REFERRER(newAnchorPerson), hs_office.person_REFERRER(newHolderPerson)] ); IF NEW.type = 'REPRESENTATIVE' THEN call rbac.grantRoleToRole(hs_office.person_OWNER(newAnchorPerson), hs_office.relation_ADMIN(NEW)); call rbac.grantRoleToRole(hs_office.relation_AGENT(NEW), hs_office.person_ADMIN(newAnchorPerson)); call rbac.grantRoleToRole(hs_office.relation_OWNER(NEW), hs_office.person_ADMIN(newHolderPerson)); ELSE call rbac.grantRoleToRole(hs_office.relation_AGENT(NEW), hs_office.person_ADMIN(newHolderPerson)); call rbac.grantRoleToRole(hs_office.relation_OWNER(NEW), hs_office.person_ADMIN(newAnchorPerson)); END IF; call rbac.leaveTriggerForObjectUuid(NEW.uuid); end; $$; /* AFTER INSERT TRIGGER to create the role+grant structure for a new hs_office.relation row. */ create or replace function hs_office.relation_build_rbac_system_after_insert_tf() returns trigger language plpgsql strict as $$ begin call hs_office.relation_build_rbac_system(NEW); return NEW; end; $$; create trigger build_rbac_system_after_insert_tg after insert on hs_office.relation for each row execute procedure hs_office.relation_build_rbac_system_after_insert_tf(); --// -- ============================================================================ --changeset RolesGrantsAndPermissionsGenerator:hs-office-relation-rbac-update-trigger endDelimiter:--// -- ---------------------------------------------------------------------------- /* Called from the AFTER UPDATE TRIGGER to re-wire the grants. */ create or replace procedure hs_office.relation_update_rbac_system( OLD hs_office.relation, NEW hs_office.relation ) language plpgsql as $$ begin if NEW.contactUuid is distinct from OLD.contactUuid then delete from rbac.grant g where g.grantedbytriggerof = OLD.uuid; call hs_office.relation_build_rbac_system(NEW); end if; end; $$; /* AFTER UPDATE TRIGGER to re-wire the grant structure for a new hs_office.relation row. */ create or replace function hs_office.relation_update_rbac_system_after_update_tf() returns trigger language plpgsql strict as $$ begin call hs_office.relation_update_rbac_system(OLD, NEW); return NEW; end; $$; create trigger update_rbac_system_after_update_tg after update on hs_office.relation for each row execute procedure hs_office.relation_update_rbac_system_after_update_tf(); --// -- ============================================================================ --changeset InsertTriggerGenerator:hs-office-relation-rbac-GRANTING-INSERT-PERMISSION endDelimiter:--// -- ---------------------------------------------------------------------------- -- granting INSERT permission to hs_office.person ---------------------------- /* Grants INSERT INTO hs_office.relation permissions to specified role of pre-existing hs_office.person rows. */ do language plpgsql $$ declare row hs_office.person; begin call base.defineContext('create INSERT INTO hs_office.relation permissions for pre-exising hs_office.person rows'); FOR row IN SELECT * FROM hs_office.person -- unconditional for all rows in that table LOOP call rbac.grantPermissionToRole( rbac.createPermission(row.uuid, 'INSERT', 'hs_office.relation'), hs_office.person_ADMIN(row)); END LOOP; end; $$; /** Grants hs_office.relation INSERT permission to specified role of new person rows. */ create or replace function hs_office.relation_grants_insert_to_person_tf() returns trigger language plpgsql strict as $$ begin -- unconditional for all rows in that table call rbac.grantPermissionToRole( rbac.createPermission(NEW.uuid, 'INSERT', 'hs_office.relation'), hs_office.person_ADMIN(NEW)); -- end. return NEW; end; $$; -- ..._z_... is to put it at the end of after insert triggers, to make sure the roles exist create trigger relation_z_grants_after_insert_tg after insert on hs_office.person for each row execute procedure hs_office.relation_grants_insert_to_person_tf(); -- ============================================================================ --changeset InsertTriggerGenerator:hs-office-relation-rbac-CHECKING-INSERT-PERMISSION endDelimiter:--// -- ---------------------------------------------------------------------------- /** Checks if the user respectively the assumed roles are allowed to insert a row to hs_office.relation. */ create or replace function hs_office.relation_insert_permission_check_tf() returns trigger language plpgsql as $$ declare superObjectUuid uuid; begin -- check INSERT permission via direct foreign key: NEW.anchorUuid if rbac.hasInsertPermission(NEW.anchorUuid, 'hs_office.relation') then return NEW; end if; raise exception '[403] insert into hs_office.relation values(%) not allowed for current subjects % (%)', NEW, base.currentSubjects(), rbac.currentSubjectOrAssumedRolesUuids(); end; $$; create trigger relation_insert_permission_check_tg before insert on hs_office.relation for each row execute procedure hs_office.relation_insert_permission_check_tf(); --// -- ============================================================================ --changeset RbacIdentityViewGenerator:hs-office-relation-rbac-IDENTITY-VIEW endDelimiter:--// -- ---------------------------------------------------------------------------- call rbac.generateRbacIdentityViewFromProjection('hs_office.relation', $idName$ (select idName from hs_office.person_iv p where p.uuid = anchorUuid) || '-with-' || target.type || '-' || (select idName from hs_office.person_iv p where p.uuid = holderUuid) $idName$); --// -- ============================================================================ --changeset RbacRestrictedViewGenerator:hs-office-relation-rbac-RESTRICTED-VIEW endDelimiter:--// -- ---------------------------------------------------------------------------- call rbac.generateRbacRestrictedView('hs_office.relation', $orderBy$ (select idName from hs_office.person_iv p where p.uuid = target.holderUuid) $orderBy$, $updates$ contactUuid = new.contactUuid $updates$); --// -- ============================================================================ --changeset RbacRbacSystemRebuildGenerator:hs-office-relation-rbac-rebuild endDelimiter:--// -- ---------------------------------------------------------------------------- -- HOWTO: Rebuild RBAC-system for table hs_office.relation after changing its RBAC specification. -- -- begin transaction; -- call base.defineContext('re-creating RBAC for table hs_office.relation', null, <>); -- call hs_office.relation_rebuild_rbac_system(); -- commit; -- -- How it works: -- 1. All grants previously created from the RBAC specification of this table will be deleted. -- These grants are identified by `hs_office.relation.grantedByTriggerOf IS NOT NULL`. -- User-induced grants (`hs_office.relation.grantedByTriggerOf IS NULL`) are NOT deleted. -- 2. New role types will be created, but existing role types which are not specified anymore, -- will NOT be deleted! -- 3. All newly specified grants will be created. -- -- IMPORTANT: -- Make sure not to skip any previously defined role-types or you might break indirect grants! -- E.g. If, in an updated version of the RBAC system for a table, you remove the AGENT role type -- and now directly grant the TENANT role to the ADMIN role, all external grants to the AGENT role -- of this table would be in a dead end. create or replace procedure hs_office.relation_rebuild_rbac_system() language plpgsql as $$ DECLARE DECLARE row hs_office.relation; grantsAfter numeric; grantsBefore numeric; BEGIN SELECT count(*) INTO grantsBefore FROM rbac.grant; FOR row IN SELECT * FROM hs_office.relation LOOP -- first delete all generated grants for this row from the previously defined RBAC system DELETE FROM rbac.grant g WHERE g.grantedbytriggerof = row.uuid; -- then build the grants according to the currently defined RBAC rules CALL hs_office.relation_build_rbac_system(row); END LOOP; select count(*) into grantsAfter from rbac.grant; -- print how the total count of grants has changed raise notice 'total grant count before -> after: % -> %', grantsBefore, grantsAfter; END; $$; --//