-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Adding superintendent and secretary treasurer roles for now.
- Loading branch information
1 parent
8a22d9b
commit f71ba9b
Showing
2 changed files
with
253 additions
and
86 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -184,89 +184,89 @@ jobs: | |
with: | ||
target: 'https://${{ env.APP_NAME }}-${{ env.OPENSHIFT_NAMESPACE_DEV }}.apps.silver.devops.gov.bc.ca/v3/api-docs' | ||
|
||
deploy-test: | ||
name: Deploy to OpenShift TEST | ||
needs: build-and-deploy-dev | ||
runs-on: ubuntu-22.04 | ||
environment: test | ||
|
||
outputs: | ||
ROUTE: ${{ steps.deploy-and-expose.outputs.route }} | ||
SELECTOR: ${{ steps.deploy-and-expose.outputs.selector }} | ||
|
||
steps: | ||
- name: Check for required secrets | ||
uses: actions/github-script@v6 | ||
with: | ||
script: | | ||
const secrets = { | ||
OPENSHIFT_SERVER: `${{ secrets.OPENSHIFT_SERVER }}`, | ||
OPENSHIFT_TOKEN: `${{ secrets.OPENSHIFT_TOKEN }}`, | ||
}; | ||
const GHCR = "ghcr.io"; | ||
if (`${{ env.IMAGE_REGISTRY }}`.startsWith(GHCR)) { | ||
core.info(`Image registry is ${GHCR} - no registry password required`); | ||
} | ||
else { | ||
core.info("A registry password is required"); | ||
secrets["IMAGE_REGISTRY_PASSWORD"] = `${{ secrets.IMAGE_REGISTRY_PASSWORD }}`; | ||
} | ||
const missingSecrets = Object.entries(secrets).filter(([ name, value ]) => { | ||
if (value.length === 0) { | ||
core.error(`Secret "${name}" is not set`); | ||
return true; | ||
} | ||
core.info(`✔️ Secret "${name}" is set`); | ||
return false; | ||
}); | ||
if (missingSecrets.length > 0) { | ||
core.setFailed(`❌ At least one required secret is not set in the repository. \n` + | ||
"You can add it using:\n" + | ||
"GitHub UI: https://docs.github.com/en/actions/reference/encrypted-secrets#creating-encrypted-secrets-for-a-repository \n" + | ||
"GitHub CLI: https://cli.github.com/manual/gh_secret_set \n" + | ||
"Also, refer to https://github.com/redhat-actions/oc-login#getting-started-with-the-action-or-see-example"); | ||
} | ||
else { | ||
core.info(`✅ All the required secrets are set`); | ||
} | ||
- name: Check out repository | ||
uses: actions/checkout@v3 | ||
|
||
- name: Install oc | ||
uses: redhat-actions/openshift-tools-installer@v1 | ||
with: | ||
oc: 4 | ||
|
||
- name: Deploy API | ||
run: | | ||
set -eu | ||
# Login to OpenShift and select project | ||
oc login --token=${{ env.OPENSHIFT_TOKEN }} --server=${{ env.OPENSHIFT_SERVER }} | ||
oc project ${{ env.OPENSHIFT_NAMESPACE_TEST }} | ||
# Cancel any rollouts in progress | ||
oc rollout cancel dc/${{ env.SPRING_BOOT_IMAGE_NAME }} 2> /dev/null \ | ||
|| true && echo "No rollout in progress" | ||
oc tag ${{ env.NAMESPACE }}-dev/${{ env.REPO_NAME }}-${{ env.BRANCH }}:${{ env.TAG }} ${{ env.NAMESPACE }}-test/${{ env.REPO_NAME }}-${{ env.BRANCH }}:${{ env.TAG }} | ||
# Process and apply deployment template | ||
oc process -f tools/openshift/api.dc.yaml -p APP_NAME=${{ env.APP_NAME }} -p REPO_NAME=${{ env.REPO_NAME }} -p BRANCH=${{ env.BRANCH }} -p NAMESPACE=${{ env.OPENSHIFT_NAMESPACE_TEST }} -p TAG=${{ env.TAG }} -p MIN_REPLICAS=${{ env.MIN_REPLICAS_TEST }} -p MAX_REPLICAS=${{ env.MAX_REPLICAS_TEST }} -p MIN_CPU=${{ env.MIN_CPU }} -p MAX_CPU=${{ env.MAX_CPU }} -p MIN_MEM=${{ env.MIN_MEM }} -p MAX_MEM=${{ env.MAX_MEM }} \ | ||
| oc apply -f - | ||
curl -s https://raw.githubusercontent.com/bcgov/${{ env.REPO_NAME }}/master/tools/config/update-configmap.sh | bash /dev/stdin test ${{ env.APP_NAME }} ${{ env.NAMESPACE }} ${{ env.COMMON_NAMESPACE }} ${{ env.DB_JDBC_CONNECT_STRING }} ${{ env.DB_PWD }} ${{ env.DB_USER }} ${{ env.SPLUNK_TOKEN }} ${{ env.CHES_CLIENT_ID }} ${{ env.CHES_CLIENT_SECRET }} ${{ env.CHES_TOKEN_URL }} ${{ env.CHES_ENDPOINT_URL }} ${{ env.SITE_URL }} | ||
# Start rollout (if necessary) and follow it | ||
oc rollout latest dc/${{ env.SPRING_BOOT_IMAGE_NAME }} 2> /dev/null \ | ||
|| true && echo "Rollout in progress" | ||
oc logs -f dc/${{ env.SPRING_BOOT_IMAGE_NAME }} | ||
# Get status, returns 0 if rollout is successful | ||
oc rollout status dc/${{ env.SPRING_BOOT_IMAGE_NAME }} | ||
- name: ZAP Scan | ||
uses: zaproxy/[email protected] | ||
with: | ||
target: 'https://${{ env.APP_NAME }}-${{ env.OPENSHIFT_NAMESPACE_TEST }}.apps.silver.devops.gov.bc.ca/v3/api-docs' | ||
# deploy-test: | ||
# name: Deploy to OpenShift TEST | ||
# needs: build-and-deploy-dev | ||
# runs-on: ubuntu-22.04 | ||
# environment: test | ||
# | ||
# outputs: | ||
# ROUTE: ${{ steps.deploy-and-expose.outputs.route }} | ||
# SELECTOR: ${{ steps.deploy-and-expose.outputs.selector }} | ||
# | ||
# steps: | ||
# - name: Check for required secrets | ||
# uses: actions/github-script@v6 | ||
# with: | ||
# script: | | ||
# const secrets = { | ||
# OPENSHIFT_SERVER: `${{ secrets.OPENSHIFT_SERVER }}`, | ||
# OPENSHIFT_TOKEN: `${{ secrets.OPENSHIFT_TOKEN }}`, | ||
# }; | ||
# | ||
# const GHCR = "ghcr.io"; | ||
# if (`${{ env.IMAGE_REGISTRY }}`.startsWith(GHCR)) { | ||
# core.info(`Image registry is ${GHCR} - no registry password required`); | ||
# } | ||
# else { | ||
# core.info("A registry password is required"); | ||
# secrets["IMAGE_REGISTRY_PASSWORD"] = `${{ secrets.IMAGE_REGISTRY_PASSWORD }}`; | ||
# } | ||
# | ||
# const missingSecrets = Object.entries(secrets).filter(([ name, value ]) => { | ||
# if (value.length === 0) { | ||
# core.error(`Secret "${name}" is not set`); | ||
# return true; | ||
# } | ||
# core.info(`✔️ Secret "${name}" is set`); | ||
# return false; | ||
# }); | ||
# | ||
# if (missingSecrets.length > 0) { | ||
# core.setFailed(`❌ At least one required secret is not set in the repository. \n` + | ||
# "You can add it using:\n" + | ||
# "GitHub UI: https://docs.github.com/en/actions/reference/encrypted-secrets#creating-encrypted-secrets-for-a-repository \n" + | ||
# "GitHub CLI: https://cli.github.com/manual/gh_secret_set \n" + | ||
# "Also, refer to https://github.com/redhat-actions/oc-login#getting-started-with-the-action-or-see-example"); | ||
# } | ||
# else { | ||
# core.info(`✅ All the required secrets are set`); | ||
# } | ||
# | ||
# - name: Check out repository | ||
# uses: actions/checkout@v3 | ||
# | ||
# - name: Install oc | ||
# uses: redhat-actions/openshift-tools-installer@v1 | ||
# with: | ||
# oc: 4 | ||
# | ||
# - name: Deploy API | ||
# run: | | ||
# set -eu | ||
# # Login to OpenShift and select project | ||
# oc login --token=${{ env.OPENSHIFT_TOKEN }} --server=${{ env.OPENSHIFT_SERVER }} | ||
# oc project ${{ env.OPENSHIFT_NAMESPACE_TEST }} | ||
# # Cancel any rollouts in progress | ||
# oc rollout cancel dc/${{ env.SPRING_BOOT_IMAGE_NAME }} 2> /dev/null \ | ||
# || true && echo "No rollout in progress" | ||
# | ||
# oc tag ${{ env.NAMESPACE }}-dev/${{ env.REPO_NAME }}-${{ env.BRANCH }}:${{ env.TAG }} ${{ env.NAMESPACE }}-test/${{ env.REPO_NAME }}-${{ env.BRANCH }}:${{ env.TAG }} | ||
# | ||
# # Process and apply deployment template | ||
# oc process -f tools/openshift/api.dc.yaml -p APP_NAME=${{ env.APP_NAME }} -p REPO_NAME=${{ env.REPO_NAME }} -p BRANCH=${{ env.BRANCH }} -p NAMESPACE=${{ env.OPENSHIFT_NAMESPACE_TEST }} -p TAG=${{ env.TAG }} -p MIN_REPLICAS=${{ env.MIN_REPLICAS_TEST }} -p MAX_REPLICAS=${{ env.MAX_REPLICAS_TEST }} -p MIN_CPU=${{ env.MIN_CPU }} -p MAX_CPU=${{ env.MAX_CPU }} -p MIN_MEM=${{ env.MIN_MEM }} -p MAX_MEM=${{ env.MAX_MEM }} \ | ||
# | oc apply -f - | ||
# | ||
# curl -s https://raw.githubusercontent.com/bcgov/${{ env.REPO_NAME }}/master/tools/config/update-configmap.sh | bash /dev/stdin test ${{ env.APP_NAME }} ${{ env.NAMESPACE }} ${{ env.COMMON_NAMESPACE }} ${{ env.DB_JDBC_CONNECT_STRING }} ${{ env.DB_PWD }} ${{ env.DB_USER }} ${{ env.SPLUNK_TOKEN }} ${{ env.CHES_CLIENT_ID }} ${{ env.CHES_CLIENT_SECRET }} ${{ env.CHES_TOKEN_URL }} ${{ env.CHES_ENDPOINT_URL }} ${{ env.SITE_URL }} | ||
# | ||
# # Start rollout (if necessary) and follow it | ||
# oc rollout latest dc/${{ env.SPRING_BOOT_IMAGE_NAME }} 2> /dev/null \ | ||
# || true && echo "Rollout in progress" | ||
# oc logs -f dc/${{ env.SPRING_BOOT_IMAGE_NAME }} | ||
# # Get status, returns 0 if rollout is successful | ||
# oc rollout status dc/${{ env.SPRING_BOOT_IMAGE_NAME }} | ||
# | ||
# - name: ZAP Scan | ||
# uses: zaproxy/[email protected] | ||
# with: | ||
# target: 'https://${{ env.APP_NAME }}-${{ env.OPENSHIFT_NAMESPACE_TEST }}.apps.silver.devops.gov.bc.ca/v3/api-docs' |
167 changes: 167 additions & 0 deletions
167
api/src/main/resources/db/migration/V1.0.57__EDX_API.sql
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,167 @@ | ||
DELETE FROM EDX_PERMISSION | ||
WHERE EDX_PERMISSION_CODE = 'DIS_SDC_RO'; | ||
|
||
DELETE FROM EDX_PERMISSION | ||
WHERE EDX_PERMISSION_CODE = 'SCH_SDC_RO'; | ||
|
||
INSERT INTO EDX_ROLE (EDX_ROLE_CODE, LABEL, IS_DISTRICT_ROLE, DESCRIPTION, CREATE_USER, UPDATE_USER) | ||
VALUES ('GRAD_SCH_ADMIN', 'Graduation Administrator', FALSE, 'Graduation Administrator.', 'IDIR/AVSODHI', 'IDIR/AVSODHI'); | ||
|
||
INSERT INTO EDX_ROLE (EDX_ROLE_CODE, LABEL, IS_DISTRICT_ROLE, DESCRIPTION, CREATE_USER, UPDATE_USER) | ||
VALUES ('GRAD_DIS_ADMIN', 'Graduation Administrator', TRUE, 'Graduation Administrator.', 'IDIR/AVSODHI', 'IDIR/AVSODHI'); | ||
|
||
INSERT INTO EDX_PERMISSION (EDX_PERMISSION_CODE, LABEL, DESCRIPTION, CREATE_USER, UPDATE_USER) | ||
VALUES ('GRAD_SCH_EDIT', 'GRAD School Edit', 'GRAD edit permission for School.', 'IDIR/AVSODHI', 'IDIR/AVSODHI'); | ||
|
||
INSERT INTO EDX_PERMISSION (EDX_PERMISSION_CODE, LABEL, DESCRIPTION, CREATE_USER, UPDATE_USER) | ||
VALUES ('GRAD_DIS_EDIT', 'GRAD District Edit', 'GRAD edit permission for District.', 'IDIR/AVSODHI', 'IDIR/AVSODHI'); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'GRAD_SCH_ADMIN', 'GRAD_SCH_EDIT', 'IDIR/AVSODHI', | ||
to_date('2024-10-01', 'YYYY-MM-DD'), 'IDIR/AVSODHI', to_date('2024-10-01', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'GRAD_SCH_ADMIN', 'EDX_SCHOOL_VIEW', 'IDIR/AVSODHI', | ||
to_date('2024-10-01', 'YYYY-MM-DD'), 'IDIR/AVSODHI', to_date('2024-10-01', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'GRAD_DIS_ADMIN', 'GRAD_DIS_EDIT', 'IDIR/AVSODHI', | ||
to_date('2024-10-01', 'YYYY-MM-DD'), 'IDIR/AVSODHI', to_date('2024-10-01', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'GRAD_DIS_ADMIN', 'EDX_SCHOOL_VIEW', 'IDIR/AVSODHI', | ||
to_date('2024-10-01', 'YYYY-MM-DD'), 'IDIR/AVSODHI', to_date('2024-10-01', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'GRAD_DIS_ADMIN', 'EDX_DISTRICT_VIEW', 'IDIR/AVSODHI', | ||
to_date('2024-10-01', 'YYYY-MM-DD'), 'IDIR/AVSODHI', to_date('2024-10-01', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_PERMISSION (EDX_PERMISSION_CODE, LABEL, DESCRIPTION, CREATE_USER, UPDATE_USER) | ||
VALUES ('SUPERINT', 'Superintendent Permission', 'Permission to act as superintendent.', 'IDIR/MVILLENE', 'IDIR/MVILLENE'); | ||
|
||
INSERT INTO EDX_PERMISSION (EDX_PERMISSION_CODE, LABEL, DESCRIPTION, CREATE_USER, UPDATE_USER) | ||
VALUES ('SECR_TRES', 'Secretary Treasurer Permission', 'Permission to act as secretary treasurer.', 'IDIR/MVILLENE', 'IDIR/MVILLENE'); | ||
|
||
INSERT INTO EDX_ROLE (EDX_ROLE_CODE, LABEL, IS_DISTRICT_ROLE, DESCRIPTION, CREATE_USER, UPDATE_USER) | ||
VALUES ('SUPERINT', 'Superintendent Role', TRUE, 'Superintendent role for District.', 'IDIR/MVILLENE', 'IDIR/MVILLENE'); | ||
|
||
INSERT INTO EDX_ROLE (EDX_ROLE_CODE, LABEL, IS_DISTRICT_ROLE, DESCRIPTION, CREATE_USER, UPDATE_USER) | ||
VALUES ('SECR_TRES', 'Secretary Treasurer Role', TRUE, 'Secretary treasurer role for District.', 'IDIR/MVILLENE', 'IDIR/MVILLENE'); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SECR_TRES', 'SECR_TRES', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SECR_TRES', 'EDX_SCHOOL_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SECR_TRES', 'EDX_DISTRICT_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SUPERINT', 'SUPERINT', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SUPERINT', 'EDX_SCHOOL_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SUPERINT', 'EDX_DISTRICT_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SECR_TRES', 'DIS_SDC_RO', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SECR_TRES', 'SCH_SDC_RO', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SUPERINT', 'SCH_SDC_RO', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SUPERINT', 'DIS_SDC_RO', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
UPDATE EDX_ROLE | ||
SET label = 'Superintendent' | ||
WHERE EDX_ROLE_CODE = 'SUPERINT'; | ||
|
||
UPDATE EDX_ROLE | ||
SET label = 'Secretary Treasurer' | ||
WHERE EDX_ROLE_CODE = 'SECR_TRES'; | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SECR_TRES', 'DIS_SDC_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SECR_TRES', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SUPERINT', 'DIS_SDC_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SUPERINT', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'DIS_SDC_RO', 'DIS_SDC_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'DIS_SDC_RO', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SCH_SDC_RO', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'DISTRICT_SDC', 'DIS_SDC_EDIT', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'DISTRICT_SDC', 'DIS_SDC_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'DISTRICT_SDC', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); | ||
|
||
INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, | ||
UPDATE_USER, UPDATE_DATE) | ||
VALUES (gen_random_uuid(), 'SCHOOL_SDC', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', | ||
to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); |