From: dbs Date: Fri, 13 Aug 2010 19:08:04 +0000 (+0000) Subject: Grant booking/reservation permissions in a way that is valid SQL X-Git-Url: https://old-git.evergreen-ils.org/?a=commitdiff_plain;h=0dbebaed3a82de2433f423005d76c76d1950feba;p=working%2FEvergreen.git Grant booking/reservation permissions in a way that is valid SQL git-svn-id: svn://svn.open-ils.org/ILS/branches/rel_1_6@17218 dcc99617-32d9-48b4-a31d-7c20da2025e4 --- diff --git a/Open-ILS/src/sql/Pg/1.6.1.1-1.6.1.2-upgrade-db.sql b/Open-ILS/src/sql/Pg/1.6.1.1-1.6.1.2-upgrade-db.sql index d4012433e5..6b7b51303a 100644 --- a/Open-ILS/src/sql/Pg/1.6.1.1-1.6.1.2-upgrade-db.sql +++ b/Open-ILS/src/sql/Pg/1.6.1.1-1.6.1.2-upgrade-db.sql @@ -602,19 +602,19 @@ COMMIT; CREATE INDEX atev_target_def_idx ON action_trigger.event (target,event_def); -- Give circulation staff the ability to handle day-to-day booking/reservation tasks -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (5, 'ADMIN_BOOKING_RESERVATION', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (5, 'RETRIEVE_RESERVATION_PULL_LIST', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (5, 'CAPTURE_RESERVATION', 2, false); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 5, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESERVATION'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 5, id, 2, false FROM permission.perm_list WHERE code = 'RETRIEVE_RESERVATION_PULL_LIST'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 5, id, 2, false FROM permission.perm_list WHERE code = 'CAPTURE_RESERVATION'; -- Give local administrators the ability to handle all booking/reservation tasks -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESOURCE', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESOURCE_TYPE', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESOURCE_ATTR', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESOURCE_ATTR_MAP', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESOURCE_ATTR_VALUE', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESERVATION', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESERVATION_ATTR_VALUE_MAP', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'HOLD_ITEM_CHECKED_OUT.override', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'RETRIEVE_RESERVATION_PULL_LIST', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'CAPTURE_RESERVATION', 2, false); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESOURCE'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESOURCE_TYPE'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESOURCE_ATTR'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESOURCE_ATTR_MAP'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESOURCE_ATTR_VALUE'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESERVATION'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESERVATION_ATTR_VALUE_MAP'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'HOLD_ITEM_CHECKED_OUT.override'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'RETRIEVE_RESERVATION_PULL_LIST'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'CAPTURE_RESERVATION'; diff --git a/Open-ILS/src/sql/Pg/950.data.seed-values.sql b/Open-ILS/src/sql/Pg/950.data.seed-values.sql index bc1559c911..d72ca6d1c7 100644 --- a/Open-ILS/src/sql/Pg/950.data.seed-values.sql +++ b/Open-ILS/src/sql/Pg/950.data.seed-values.sql @@ -1581,21 +1581,21 @@ INSERT INTO permission.perm_list (code, description) VALUES ('ALLOW_ALT_TCN', 'A INSERT INTO permission.perm_list (code, description) VALUES ('MERGE_USERS', 'Allows user records to be merged'); -- Give circulation staff the ability to handle day-to-day booking/reservation tasks -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (5, 'ADMIN_BOOKING_RESERVATION', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (5, 'RETRIEVE_RESERVATION_PULL_LIST', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (5, 'CAPTURE_RESERVATION', 2, false); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 5, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESERVATION'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 5, id, 2, false FROM permission.perm_list WHERE code = 'RETRIEVE_RESERVATION_PULL_LIST'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 5, id, 2, false FROM permission.perm_list WHERE code = 'CAPTURE_RESERVATION'; -- Give local administrators the ability to handle all booking/reservation tasks -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESOURCE', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESOURCE_TYPE', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESOURCE_ATTR', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESOURCE_ATTR_MAP', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESOURCE_ATTR_VALUE', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESERVATION', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'ADMIN_BOOKING_RESERVATION_ATTR_VALUE_MAP', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'HOLD_ITEM_CHECKED_OUT.override', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'RETRIEVE_RESERVATION_PULL_LIST', 2, false); -INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES (10, 'CAPTURE_RESERVATION', 2, false); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESOURCE'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESOURCE_TYPE'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESOURCE_ATTR'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESOURCE_ATTR_MAP'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESOURCE_ATTR_VALUE'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESERVATION'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'ADMIN_BOOKING_RESERVATION_ATTR_VALUE_MAP'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'HOLD_ITEM_CHECKED_OUT.override'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'RETRIEVE_RESERVATION_PULL_LIST'; +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) SELECT 10, id, 2, false FROM permission.perm_list WHERE code = 'CAPTURE_RESERVATION'; -- Trigger event definition permissions INSERT INTO permission.perm_list (code, description) VALUES ('ADMIN_TRIGGER_EVENT_DEF', 'Allow a user to administer trigger event definitions');