From 5b26d41034c8face7f63653489fb9c015aba051a Mon Sep 17 00:00:00 2001 From: Chris Sharp Date: Tue, 13 Dec 2011 12:21:01 -0500 Subject: [PATCH] adding permissions groups --- Open-ILS/src/sql/Pg/pines-2.1-updates.sql | 249 ++++++++++++++++++++++++++---- 1 file changed, 217 insertions(+), 32 deletions(-) diff --git a/Open-ILS/src/sql/Pg/pines-2.1-updates.sql b/Open-ILS/src/sql/Pg/pines-2.1-updates.sql index b2e8eb28fe..9700e5a78d 100644 --- a/Open-ILS/src/sql/Pg/pines-2.1-updates.sql +++ b/Open-ILS/src/sql/Pg/pines-2.1-updates.sql @@ -1,32 +1,217 @@ -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.margin', $$ );0$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.height', $$ );9$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.width', $$ );8$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.family', $$ );"monospace"$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.size', $$ );10$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.weight', $$ );"normal"$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.default_classification_scheme', $$ );"2"$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.dob.require', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.registration.require_address', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.default_country', $$ );"USA"$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.default_ident_type', $$ );"1"$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.staff.require_initials', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.alert_message.show', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.alias.show', $$ );false$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.barred.show', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.dob.calendar', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.claims_returned_count.show', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.bib.delete_on_no_copy_via_acq_lineitem_cancel', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.checkout_fills_related_hold', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.holds.expired_patron_block', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.block_renews_for_holds', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.holds.uncancel.reset_request_time', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.patron_invalid_address_apply_penalty', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.obscure_dob', $$ );false$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.circ.show_billing_tab_on_bills', $$ );true$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.email.example', $$ );"address@example.com"$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.evening_phone.example', $$ );"XXX-XXX-XXXX"$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.day_phone.example', $$ );"XXX-XXX-XXXX"$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.other_phone.example', $$ );"XXX-XXX-XXXX"$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.email.regex', $$ );"[^@<> ]+@[^@<> ]+\\.[^@.*<> ]{2,}"$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.phone.regex', $$ );"\\d{3}-\\d{3}-\\d{4}"$$ ); -INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.aua.post_code.regex', $$ );"\\d{5}(-\\d{4})?"$$ ); +-- insert the PINES org_unit_settings that have been created in test environment + +BEGIN; +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.margin', $$0$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.height', $$9$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.spine.line.width', $$8$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.family', $$"monospace"$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.size', $$10$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.label.font.weight', $$"normal"$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.default_classification_scheme', $$"2"$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.dob.require', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.registration.require_address', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.default_country', $$"USA"$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.default_ident_type', $$"1"$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.staff.require_initials', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.alert_message.show', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.alias.show', $$false$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.barred.show', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.dob.calendar', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.claims_returned_count.show', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'cat.bib.delete_on_no_copy_via_acq_lineitem_cancel', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.checkout_fills_related_hold', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.holds.expired_patron_block', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.block_renews_for_holds', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.holds.uncancel.reset_request_time', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.patron_invalid_address_apply_penalty', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'circ.obscure_dob', $$false$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.circ.show_billing_tab_on_bills', $$true$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.email.example', $$"address@example.com"$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.evening_phone.example', $$"XXX-XXX-XXXX"$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.day_phone.example', $$"XXX-XXX-XXXX"$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.other_phone.example', $$"XXX-XXX-XXXX"$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.au.email.regex', $$"[^@<> ]+@[^@<> ]+\\.[^@.*<> ]{2,}"$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.phone.regex', $$"\\d{3}-\\d{3}-\\d{4}"$$ ); +INSERT INTO actor.org_unit_setting (org_unit, name, value) VALUES ( 1, 'ui.patron.edit.aua.post_code.regex', $$"\\d{5}(-\\d{4})?"$$ ); +COMMIT; + +-- insert the new permission groups and assign them their perms. + +BEGIN; + +-- first, change the name and perm_interval of the existing ACQADMIN user: +UPDATE permission.grp_tree SET ( name = 'ACQADMIN', perm_interval = '2 years' ) WHERE id = 44; + +-- next, add the application_perms to the perm list + +INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.acq_fin', 'Allows a user to add/remove/edit users in the "ACQFIN" group' ); +INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.acq_sel', 'Allows a user to add/remove/edit users in the "ACQSEL" group' ); +INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.acq_list', 'Allows a user to add/remove/edit users in the "ACQLIST" group' ); +INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.acq_rec', 'Allows a user to add/remove/edit users in the "ACQREC" group' ); +INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.acq_cat', 'Allows a user to add/remove/edit users in the "ACQCAT" group' ); +INSERT INTO permission.perm_list ( code, description ) VALUES ( 'group_application.user.staff.global_acq_admin', 'Allows a user to add/remove/edit users in the "GLOBAL-ACQADMIN" group' ); + +-- then insert the newly-created perm groups + +INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 46, 'ACQFIN', 43, t, '2 years', 'responsible for all financial transactions, maintaining funds and funding sources, ordering, claiming', 'group_application.user.staff.acq_fin', 0 ); +INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 47, 'ACQSEL', 43, t, '2 years', 'administers selection lists across library systems, checks for accuracy', 'group_application.user.staff.acq_sel', 0 ); +INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 48, 'ACQLIST', 43, t, '2 years', 'Library or subject selectors, creates selection lists', 'group_application.user.staff.acq_list', 0 ); +INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 49, 'ACQREC', 43, t, '2 years', 'receives orders for system', 'group_application.user.staff.acq_rec', 0 ); +INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 50, 'ACQCAT', 43, t, '2 years', 'administers cataloging functions within acquisitions, links line items to PINES catalog, monitors brief records for accuracy, loads MARC records into catalog', 'group_application.user.staff.acq_cat', 0 ); +INSERT INTO permission.grp_tree ( id, name, parent, usergroup, perm_interval, description, application_perm, hold_priority ) VALUES ( 51, 'GLOBAL-ACQADMIN', 43, t, '2 years', 'Consortium-level Acq administrator', 'group_application.user.staff.global_acq_admin', 0 ); + +-- then assign permissions to the groups + +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 27, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_MONOGRAPH_PART' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 27, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_MONOGRAPH_PART' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 27, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_MONOGRAPH_PART' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_HOLD_MATRIX_MATCHPOINT' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CIRC_MOD' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_CIRC_MOD' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_CIRC_MOD' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CIRC_MATRIX_MATCHPOINT' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_fin' ), 0, 't' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_sel' ), 0, 't' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_cat' ), 0, 't' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_CIRC_MOD' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_rec' ), 0, 't' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_CIRC_DURATION' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_CIRC_DURATION' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_admin' ), 0, 't' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq' ), 0, 't' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_list' ), 0, 't' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 32, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_USER' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND_TAG' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_FUND_ALLOCATION' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND_ALLOCATION_PERCENT' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PROVIDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_PROVIDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_LINEITEM_ALERT_TEXT' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_USER_GROUP_LINK' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CANCEL_CAUSE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ASSIGN_GROUP_PERM' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_fin' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_rec' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_INVOICE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'RECEIVE_PURCHASE_ORDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'IMPORT_ACQ_LINEITEM_BIB_RECORD' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_LINEITEM_MARC_ATTR_DEF' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_DISTRIB_FORMULA' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ASSIGN_WORK_ORG_UNIT' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PURCHASE_ORDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PURCHASE_ORDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_INVOICE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_sel' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_list' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CLAIM_POLICY' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ACQ_XFER_MANUAL_DFUND_AMOUNT' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_FUND_ALLOCATION' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PROVIDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_PROVIDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CLAIM' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'RUN_REPORTS' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 44, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_REPORT_OUTPUT' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_FUNDING_SOURCE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ACQ_XFER_MANUAL_DFUND_AMOUNT' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PROVIDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_PROVIDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CLAIM_TYPE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE_PAYMENT_METHOD' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_LINEITEM_MARC_ATTR_DEF' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_PROVIDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_INVOICE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'RECEIVE_PURCHASE_ORDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'IMPORT_ACQ_LINEITEM_BIB_RECORD' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_FUND' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PURCHASE_ORDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PURCHASE_ORDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CURRENCY_TYPE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND_TAG' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_FUND' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PROVIDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_PROVIDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CLAIM' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CLAIM_POLICY' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CLAIM_EVENT_TYPE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_INVOICE_ITEM_TYPE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_DISTRIB_FORMULA' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_FUNDING_SOURCE' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CANCEL_CAUSE' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_REPORT_OUTPUT' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'RUN_REPORTS' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 46, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 47, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 47, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 47, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 48, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 48, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 48, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 49, ( SELECT id FROM permission.perm_list WHERE CODE = 'RECEIVE_PURCHASE_ORDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'IMPORT_MARC' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_MARC' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_MARC' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 50, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PURCHASE_ORDER' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE_PAYMENT_METHOD' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CURRENCY_TYPE' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND_TAG' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ACQ_XFER_MANUAL_DFUND_AMOUNT' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_FUND_ALLOCATION' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PROVIDER' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_PROVIDER' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CLAIM' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_DISTRIB_FORMULA' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_LINEITEM_MARC_ATTR_DEF' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_cat' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_list' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_sel' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_PROVIDER' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ASSIGN_GROUP_PERM' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_INVOICE' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'RECEIVE_PURCHASE_ORDER' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'IMPORT_ACQ_LINEITEM_BIB_RECORD' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PICKLIST' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_INVOICE_ITEM_TYPE' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_INVOICE_ITEM_TYPE' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ASSIGN_WORK_ORG_UNIT' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_INVOICE_ITEM_TYPE' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_FUNDING_SOURCE' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_CLAIM_POLICY' ), 1, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_FUNDING_SOURCE' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_FUND' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'DELETE_FUND_ALLOCATION' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_FUND_ALLOCATION_PERCENT' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'UPDATE_PROVIDER' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'MANAGE_PROVIDER' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_LINEITEM_ALERT_TEXT' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_ACQ_CANCEL_CAUSE' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_admin' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_fin' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.acq_rec' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'group_application.user.staff.global_acq_admin' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_INVOICE' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PURCHASE_ORDER' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PURCHASE_ORDER' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'CREATE_PICKLIST' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_PICKLIST' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'DEBUG_CLIENT' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'ADMIN_INVOICE_METHOD' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'RUN_REPORTS' ), 0, 'f' ); +INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable) VALUES ( 51, ( SELECT id FROM permission.perm_list WHERE CODE = 'VIEW_REPORT_OUTPUT' ), 0, 'f' ); + +COMMIT; -- 2.11.0