Co-authored-by: Michael Hoennig <michael@hoennig.de> Reviewed-on: https://dev.hostsharing.net/hostsharing/hs.hsadmin.ng/pulls/104 Reviewed-by: Marc Sandlus <marc.sandlus@hostsharing.net>
245 lines
8.2 KiB
PL/PgSQL
245 lines
8.2 KiB
PL/PgSQL
--liquibase formatted sql
|
|
-- This code generated was by RbacViewPostgresGenerator, do not amend manually.
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset RbacObjectGenerator:rbactest-domain-rbac-OBJECT endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
call rbac.generateRelatedRbacObject('rbactest.domain');
|
|
--//
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset RbacRoleDescriptorsGenerator:rbactest-domain-rbac-ROLE-DESCRIPTORS endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
call rbac.generateRbacRoleDescriptors('testDomain', 'rbactest.domain');
|
|
--//
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset RolesGrantsAndPermissionsGenerator:rbactest-domain-rbac-insert-trigger endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
|
|
/*
|
|
Creates the roles, grants and permission for the AFTER INSERT TRIGGER.
|
|
*/
|
|
|
|
create or replace procedure buildRbacSystemForTestDomain(
|
|
NEW rbactest.domain
|
|
)
|
|
language plpgsql as $$
|
|
|
|
declare
|
|
newPackage rbactest.package;
|
|
|
|
begin
|
|
call rbac.enterTriggerForObjectUuid(NEW.uuid);
|
|
|
|
SELECT * FROM rbactest.package WHERE uuid = NEW.packageUuid INTO newPackage;
|
|
assert newPackage.uuid is not null, format('newPackage must not be null for NEW.packageUuid = %s', NEW.packageUuid);
|
|
|
|
|
|
perform rbac.defineRoleWithGrants(
|
|
testDomainOWNER(NEW),
|
|
permissions => array['DELETE', 'UPDATE'],
|
|
incomingSuperRoles => array[testPackageADMIN(newPackage)],
|
|
outgoingSubRoles => array[testPackageTENANT(newPackage)]
|
|
);
|
|
|
|
perform rbac.defineRoleWithGrants(
|
|
testDomainADMIN(NEW),
|
|
permissions => array['SELECT'],
|
|
incomingSuperRoles => array[testDomainOWNER(NEW)],
|
|
outgoingSubRoles => array[testPackageTENANT(newPackage)]
|
|
);
|
|
|
|
call rbac.leaveTriggerForObjectUuid(NEW.uuid);
|
|
end; $$;
|
|
|
|
/*
|
|
AFTER INSERT TRIGGER to create the role+grant structure for a new rbactest.domain row.
|
|
*/
|
|
|
|
create or replace function insertTriggerForTestDomain_tf()
|
|
returns trigger
|
|
language plpgsql
|
|
strict as $$
|
|
begin
|
|
call buildRbacSystemForTestDomain(NEW);
|
|
return NEW;
|
|
end; $$;
|
|
|
|
create trigger insertTriggerForTestDomain_tg
|
|
after insert on rbactest.domain
|
|
for each row
|
|
execute procedure insertTriggerForTestDomain_tf();
|
|
--//
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset RolesGrantsAndPermissionsGenerator:rbactest-domain-rbac-update-trigger endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
|
|
/*
|
|
Called from the AFTER UPDATE TRIGGER to re-wire the grants.
|
|
*/
|
|
|
|
create or replace procedure updateRbacRulesForTestDomain(
|
|
OLD rbactest.domain,
|
|
NEW rbactest.domain
|
|
)
|
|
language plpgsql as $$
|
|
|
|
declare
|
|
oldPackage rbactest.package;
|
|
newPackage rbactest.package;
|
|
|
|
begin
|
|
call rbac.enterTriggerForObjectUuid(NEW.uuid);
|
|
|
|
SELECT * FROM rbactest.package WHERE uuid = OLD.packageUuid INTO oldPackage;
|
|
assert oldPackage.uuid is not null, format('oldPackage must not be null for OLD.packageUuid = %s', OLD.packageUuid);
|
|
|
|
SELECT * FROM rbactest.package WHERE uuid = NEW.packageUuid INTO newPackage;
|
|
assert newPackage.uuid is not null, format('newPackage must not be null for NEW.packageUuid = %s', NEW.packageUuid);
|
|
|
|
|
|
if NEW.packageUuid <> OLD.packageUuid then
|
|
|
|
call rbac.revokeRoleFromRole(testDomainOWNER(OLD), testPackageADMIN(oldPackage));
|
|
call rbac.grantRoleToRole(testDomainOWNER(NEW), testPackageADMIN(newPackage));
|
|
|
|
call rbac.revokeRoleFromRole(testPackageTENANT(oldPackage), testDomainOWNER(OLD));
|
|
call rbac.grantRoleToRole(testPackageTENANT(newPackage), testDomainOWNER(NEW));
|
|
|
|
call rbac.revokeRoleFromRole(testPackageTENANT(oldPackage), testDomainADMIN(OLD));
|
|
call rbac.grantRoleToRole(testPackageTENANT(newPackage), testDomainADMIN(NEW));
|
|
|
|
end if;
|
|
|
|
call rbac.leaveTriggerForObjectUuid(NEW.uuid);
|
|
end; $$;
|
|
|
|
/*
|
|
AFTER INSERT TRIGGER to re-wire the grant structure for a new rbactest.domain row.
|
|
*/
|
|
|
|
create or replace function updateTriggerForTestDomain_tf()
|
|
returns trigger
|
|
language plpgsql
|
|
strict as $$
|
|
begin
|
|
call updateRbacRulesForTestDomain(OLD, NEW);
|
|
return NEW;
|
|
end; $$;
|
|
|
|
create trigger updateTriggerForTestDomain_tg
|
|
after update on rbactest.domain
|
|
for each row
|
|
execute procedure updateTriggerForTestDomain_tf();
|
|
--//
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset InsertTriggerGenerator:rbactest-domain-rbac-GRANTING-INSERT-PERMISSION endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
|
|
-- granting INSERT permission to rbactest.package ----------------------------
|
|
|
|
/*
|
|
Grants INSERT INTO rbactest.domain permissions to specified role of pre-existing rbactest.package rows.
|
|
*/
|
|
do language plpgsql $$
|
|
declare
|
|
row rbactest.package;
|
|
begin
|
|
call base.defineContext('create INSERT INTO rbactest.domain permissions for pre-exising rbactest.package rows');
|
|
|
|
FOR row IN SELECT * FROM rbactest.package
|
|
-- unconditional for all rows in that table
|
|
LOOP
|
|
call rbac.grantPermissionToRole(
|
|
rbac.createPermission(row.uuid, 'INSERT', 'rbactest.domain'),
|
|
testPackageADMIN(row));
|
|
END LOOP;
|
|
end;
|
|
$$;
|
|
|
|
/**
|
|
Grants rbactest.domain INSERT permission to specified role of new package rows.
|
|
*/
|
|
create or replace function rbactest.new_domain_grants_insert_to_package_tf()
|
|
returns trigger
|
|
language plpgsql
|
|
strict as $$
|
|
begin
|
|
-- unconditional for all rows in that table
|
|
call rbac.grantPermissionToRole(
|
|
rbac.createPermission(NEW.uuid, 'INSERT', 'rbactest.domain'),
|
|
testPackageADMIN(NEW));
|
|
-- end.
|
|
return NEW;
|
|
end; $$;
|
|
|
|
-- z_... is to put it at the end of after insert triggers, to make sure the roles exist
|
|
create trigger z_new_domain_grants_after_insert_tg
|
|
after insert on rbactest.package
|
|
for each row
|
|
execute procedure rbactest.new_domain_grants_insert_to_package_tf();
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset InsertTriggerGenerator:rbactest-domain-rbac-CHECKING-INSERT-PERMISSION endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
|
|
/**
|
|
Checks if the user respectively the assumed roles are allowed to insert a row to rbactest.domain.
|
|
*/
|
|
create or replace function rbactest.domain_insert_permission_check_tf()
|
|
returns trigger
|
|
language plpgsql as $$
|
|
declare
|
|
superObjectUuid uuid;
|
|
begin
|
|
-- check INSERT permission via direct foreign key: NEW.packageUuid
|
|
if rbac.hasInsertPermission(NEW.packageUuid, 'rbactest.domain') then
|
|
return NEW;
|
|
end if;
|
|
|
|
raise exception '[403] insert into rbactest.domain values(%) not allowed for current subjects % (%)',
|
|
NEW, base.currentSubjects(), rbac.currentSubjectOrAssumedRolesUuids();
|
|
end; $$;
|
|
|
|
create trigger domain_insert_permission_check_tg
|
|
before insert on rbactest.domain
|
|
for each row
|
|
execute procedure rbactest.domain_insert_permission_check_tf();
|
|
--//
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset RbacIdentityViewGenerator:rbactest-domain-rbac-IDENTITY-VIEW endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
|
|
call rbac.generateRbacIdentityViewFromProjection('rbactest.domain',
|
|
$idName$
|
|
name
|
|
$idName$);
|
|
--//
|
|
|
|
|
|
-- ============================================================================
|
|
--changeset RbacRestrictedViewGenerator:rbactest-domain-rbac-RESTRICTED-VIEW endDelimiter:--//
|
|
-- ----------------------------------------------------------------------------
|
|
call rbac.generateRbacRestrictedView('rbactest.domain',
|
|
$orderBy$
|
|
name
|
|
$orderBy$,
|
|
$updates$
|
|
version = new.version,
|
|
packageUuid = new.packageUuid,
|
|
description = new.description
|
|
$updates$);
|
|
--//
|
|
|