# Conflicts: # src/main/java/net/hostsharing/hsadminng/hs/office/debitor/HsOfficeDebitorEntity.java # src/main/java/net/hostsharing/hsadminng/hs/office/partner/HsOfficePartnerEntity.java # src/main/resources/db/changelog/050-rbac-base.sql # src/main/resources/db/changelog/058-rbac-generators.sql # src/main/resources/db/changelog/113-test-customer-rbac.sql # src/main/resources/db/changelog/123-test-package-rbac.sql # src/main/resources/db/changelog/133-test-domain-rbac.sql # src/main/resources/db/changelog/203-hs-office-contact-rbac.sql # src/main/resources/db/changelog/213-hs-office-person-rbac.sql # src/main/resources/db/changelog/223-hs-office-relationship-rbac.md # src/main/resources/db/changelog/223-hs-office-relationship-rbac.sql # src/main/resources/db/changelog/233-hs-office-partner-rbac.sql # src/main/resources/db/changelog/243-hs-office-bankaccount-rbac.md # src/main/resources/db/changelog/243-hs-office-bankaccount-rbac.sql # src/main/resources/db/changelog/253-hs-office-sepamandate-rbac.sql # src/main/resources/db/changelog/273-hs-office-debitor-rbac.sql # src/main/resources/db/changelog/303-hs-office-membership-rbac.sql # src/test/java/net/hostsharing/hsadminng/hs/office/contact/HsOfficeContactRepositoryIntegrationTest.java # src/test/java/net/hostsharing/hsadminng/hs/office/debitor/HsOfficeDebitorRepositoryIntegrationTest.java # src/test/java/net/hostsharing/hsadminng/hs/office/migration/ImportOfficeData.java # src/test/java/net/hostsharing/hsadminng/hs/office/partner/HsOfficePartnerRepositoryIntegrationTest.java # src/test/java/net/hostsharing/hsadminng/hs/office/person/HsOfficePersonRepositoryIntegrationTest.java # src/test/java/net/hostsharing/hsadminng/hs/office/relationship/HsOfficeRelationshipRepositoryIntegrationTest.java
137 lines
4.5 KiB
PL/PgSQL
137 lines
4.5 KiB
PL/PgSQL
--liquibase formatted sql
|
|
|
|
-- ============================================================================
|
|
--changeset hs-office-contact-rbac-OBJECT:1 endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
call generateRelatedRbacObject('hs_office_contact');
|
|
--//
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset hs-office-contact-rbac-ROLE-DESCRIPTORS:1 endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
call generateRbacRoleDescriptors('hsOfficeContact', 'hs_office_contact');
|
|
--//
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset hs-office-contact-rbac-ROLES-CREATION:1 endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
|
|
/*
|
|
Creates the roles and their assignments for a new contact for the AFTER INSERT TRIGGER.
|
|
*/
|
|
|
|
create or replace function createRbacRolesForHsOfficeContact()
|
|
returns trigger
|
|
language plpgsql
|
|
strict as $$
|
|
begin
|
|
if TG_OP <> 'INSERT' then
|
|
raise exception 'invalid usage of TRIGGER AFTER INSERT';
|
|
end if;
|
|
|
|
perform createRoleWithGrants(
|
|
hsOfficeContactOwner(NEW),
|
|
permissions => array['DELETE'],
|
|
incomingSuperRoles => array[globalAdmin()],
|
|
userUuids => array[currentUserUuid()],
|
|
grantedByRole => globalAdmin()
|
|
);
|
|
|
|
perform createRoleWithGrants(
|
|
hsOfficeContactAdmin(NEW),
|
|
permissions => array['UPDATE'],
|
|
incomingSuperRoles => array[hsOfficeContactOwner(NEW)]
|
|
);
|
|
|
|
perform createRoleWithGrants(
|
|
hsOfficeContactReferrer(NEW),
|
|
permissions => array['SELECT'],
|
|
incomingSuperRoles => array[hsOfficeContactAdmin(NEW)]
|
|
);
|
|
|
|
return NEW;
|
|
end; $$;
|
|
|
|
/*
|
|
An AFTER INSERT TRIGGER which creates the role structure for a new customer.
|
|
*/
|
|
|
|
create trigger createRbacRolesForHsOfficeContact_Trigger
|
|
after insert
|
|
on hs_office_contact
|
|
for each row
|
|
execute procedure createRbacRolesForHsOfficeContact();
|
|
--//
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset hs-office-contact-rbac-IDENTITY-VIEW:1 endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
|
|
call generateRbacIdentityViewFromProjection('hs_office_contact', $idName$
|
|
target.label
|
|
$idName$);
|
|
--//
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset hs-office-contact-rbac-RESTRICTED-VIEW:1 endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
call generateRbacRestrictedView('hs_office_contact', 'target.label',
|
|
$updates$
|
|
label = new.label,
|
|
postalAddress = new.postalAddress,
|
|
emailAddresses = new.emailAddresses,
|
|
phoneNumbers = new.phoneNumbers
|
|
$updates$);
|
|
--/
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset hs-office-contact-rbac-NEW-CONTACT:1 endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
/*
|
|
Creates a global permission for new-contact and assigns it to the hostsharing admins role.
|
|
*/
|
|
do language plpgsql $$
|
|
declare
|
|
addCustomerPermissions uuid[];
|
|
globalObjectUuid uuid;
|
|
globalAdminRoleUuid uuid;
|
|
begin
|
|
call defineContext('granting global new-contact permission to global admin role', null, null, null);
|
|
|
|
globalAdminRoleUuid := findRoleId(globalAdmin());
|
|
globalObjectUuid := (select uuid from global);
|
|
addCustomerPermissions := createPermissions(globalObjectUuid, array ['new-contact']);
|
|
call grantPermissionsToRole(globalAdminRoleUuid, addCustomerPermissions);
|
|
end;
|
|
$$;
|
|
|
|
/**
|
|
Used by the trigger to prevent the add-customer to current user respectively assumed roles.
|
|
*/
|
|
create or replace function addHsOfficeContactNotAllowedForCurrentSubjects()
|
|
returns trigger
|
|
language PLPGSQL
|
|
as $$
|
|
begin
|
|
raise exception '[403] new-contact not permitted for %',
|
|
array_to_string(currentSubjects(), ';', 'null');
|
|
end; $$;
|
|
|
|
/**
|
|
Checks if the user or assumed roles are allowed to create a new customer.
|
|
*/
|
|
create trigger hs_office_contact_insert_trigger
|
|
before insert
|
|
on hs_office_contact
|
|
for each row
|
|
-- TODO.spec: who is allowed to create new contacts
|
|
when ( not hasAssumedRole() )
|
|
execute procedure addHsOfficeContactNotAllowedForCurrentSubjects();
|
|
--//
|
|
|