From f71ba9bf4378e06086708827a4a17f0df019cead Mon Sep 17 00:00:00 2001 From: Marco Villeneuve Date: Tue, 5 Nov 2024 12:56:37 -0800 Subject: [PATCH] Adding superintendent and secretary treasurer roles for now. --- .../deploy-to.openshift-dev-and-test.yml | 172 +++++++++--------- .../db/migration/V1.0.57__EDX_API.sql | 167 +++++++++++++++++ 2 files changed, 253 insertions(+), 86 deletions(-) create mode 100644 api/src/main/resources/db/migration/V1.0.57__EDX_API.sql diff --git a/.github/workflows/deploy-to.openshift-dev-and-test.yml b/.github/workflows/deploy-to.openshift-dev-and-test.yml index d65522ea..7e22fd12 100644 --- a/.github/workflows/deploy-to.openshift-dev-and-test.yml +++ b/.github/workflows/deploy-to.openshift-dev-and-test.yml @@ -184,89 +184,89 @@ jobs: with: target: 'https://${{ env.APP_NAME }}-${{ env.OPENSHIFT_NAMESPACE_DEV }}.apps.silver.devops.gov.bc.ca/v3/api-docs' - deploy-test: - name: Deploy to OpenShift TEST - needs: build-and-deploy-dev - runs-on: ubuntu-22.04 - environment: test - - outputs: - ROUTE: ${{ steps.deploy-and-expose.outputs.route }} - SELECTOR: ${{ steps.deploy-and-expose.outputs.selector }} - - steps: - - name: Check for required secrets - uses: actions/github-script@v6 - with: - script: | - const secrets = { - OPENSHIFT_SERVER: `${{ secrets.OPENSHIFT_SERVER }}`, - OPENSHIFT_TOKEN: `${{ secrets.OPENSHIFT_TOKEN }}`, - }; - - const GHCR = "ghcr.io"; - if (`${{ env.IMAGE_REGISTRY }}`.startsWith(GHCR)) { - core.info(`Image registry is ${GHCR} - no registry password required`); - } - else { - core.info("A registry password is required"); - secrets["IMAGE_REGISTRY_PASSWORD"] = `${{ secrets.IMAGE_REGISTRY_PASSWORD }}`; - } - - const missingSecrets = Object.entries(secrets).filter(([ name, value ]) => { - if (value.length === 0) { - core.error(`Secret "${name}" is not set`); - return true; - } - core.info(`✔️ Secret "${name}" is set`); - return false; - }); - - if (missingSecrets.length > 0) { - core.setFailed(`❌ At least one required secret is not set in the repository. \n` + - "You can add it using:\n" + - "GitHub UI: https://docs.github.com/en/actions/reference/encrypted-secrets#creating-encrypted-secrets-for-a-repository \n" + - "GitHub CLI: https://cli.github.com/manual/gh_secret_set \n" + - "Also, refer to https://github.com/redhat-actions/oc-login#getting-started-with-the-action-or-see-example"); - } - else { - core.info(`✅ All the required secrets are set`); - } - - - name: Check out repository - uses: actions/checkout@v3 - - - name: Install oc - uses: redhat-actions/openshift-tools-installer@v1 - with: - oc: 4 - - - name: Deploy API - run: | - set -eu - # Login to OpenShift and select project - oc login --token=${{ env.OPENSHIFT_TOKEN }} --server=${{ env.OPENSHIFT_SERVER }} - oc project ${{ env.OPENSHIFT_NAMESPACE_TEST }} - # Cancel any rollouts in progress - oc rollout cancel dc/${{ env.SPRING_BOOT_IMAGE_NAME }} 2> /dev/null \ - || true && echo "No rollout in progress" - - oc tag ${{ env.NAMESPACE }}-dev/${{ env.REPO_NAME }}-${{ env.BRANCH }}:${{ env.TAG }} ${{ env.NAMESPACE }}-test/${{ env.REPO_NAME }}-${{ env.BRANCH }}:${{ env.TAG }} - - # Process and apply deployment template - oc process -f tools/openshift/api.dc.yaml -p APP_NAME=${{ env.APP_NAME }} -p REPO_NAME=${{ env.REPO_NAME }} -p BRANCH=${{ env.BRANCH }} -p NAMESPACE=${{ env.OPENSHIFT_NAMESPACE_TEST }} -p TAG=${{ env.TAG }} -p MIN_REPLICAS=${{ env.MIN_REPLICAS_TEST }} -p MAX_REPLICAS=${{ env.MAX_REPLICAS_TEST }} -p MIN_CPU=${{ env.MIN_CPU }} -p MAX_CPU=${{ env.MAX_CPU }} -p MIN_MEM=${{ env.MIN_MEM }} -p MAX_MEM=${{ env.MAX_MEM }} \ - | oc apply -f - - - curl -s https://raw.githubusercontent.com/bcgov/${{ env.REPO_NAME }}/master/tools/config/update-configmap.sh | bash /dev/stdin test ${{ env.APP_NAME }} ${{ env.NAMESPACE }} ${{ env.COMMON_NAMESPACE }} ${{ env.DB_JDBC_CONNECT_STRING }} ${{ env.DB_PWD }} ${{ env.DB_USER }} ${{ env.SPLUNK_TOKEN }} ${{ env.CHES_CLIENT_ID }} ${{ env.CHES_CLIENT_SECRET }} ${{ env.CHES_TOKEN_URL }} ${{ env.CHES_ENDPOINT_URL }} ${{ env.SITE_URL }} - - # Start rollout (if necessary) and follow it - oc rollout latest dc/${{ env.SPRING_BOOT_IMAGE_NAME }} 2> /dev/null \ - || true && echo "Rollout in progress" - oc logs -f dc/${{ env.SPRING_BOOT_IMAGE_NAME }} - # Get status, returns 0 if rollout is successful - oc rollout status dc/${{ env.SPRING_BOOT_IMAGE_NAME }} - - - name: ZAP Scan - uses: zaproxy/action-api-scan@v0.7.0 - with: - target: 'https://${{ env.APP_NAME }}-${{ env.OPENSHIFT_NAMESPACE_TEST }}.apps.silver.devops.gov.bc.ca/v3/api-docs' +# deploy-test: +# name: Deploy to OpenShift TEST +# needs: build-and-deploy-dev +# runs-on: ubuntu-22.04 +# environment: test +# +# outputs: +# ROUTE: ${{ steps.deploy-and-expose.outputs.route }} +# SELECTOR: ${{ steps.deploy-and-expose.outputs.selector }} +# +# steps: +# - name: Check for required secrets +# uses: actions/github-script@v6 +# with: +# script: | +# const secrets = { +# OPENSHIFT_SERVER: `${{ secrets.OPENSHIFT_SERVER }}`, +# OPENSHIFT_TOKEN: `${{ secrets.OPENSHIFT_TOKEN }}`, +# }; +# +# const GHCR = "ghcr.io"; +# if (`${{ env.IMAGE_REGISTRY }}`.startsWith(GHCR)) { +# core.info(`Image registry is ${GHCR} - no registry password required`); +# } +# else { +# core.info("A registry password is required"); +# secrets["IMAGE_REGISTRY_PASSWORD"] = `${{ secrets.IMAGE_REGISTRY_PASSWORD }}`; +# } +# +# const missingSecrets = Object.entries(secrets).filter(([ name, value ]) => { +# if (value.length === 0) { +# core.error(`Secret "${name}" is not set`); +# return true; +# } +# core.info(`✔️ Secret "${name}" is set`); +# return false; +# }); +# +# if (missingSecrets.length > 0) { +# core.setFailed(`❌ At least one required secret is not set in the repository. \n` + +# "You can add it using:\n" + +# "GitHub UI: https://docs.github.com/en/actions/reference/encrypted-secrets#creating-encrypted-secrets-for-a-repository \n" + +# "GitHub CLI: https://cli.github.com/manual/gh_secret_set \n" + +# "Also, refer to https://github.com/redhat-actions/oc-login#getting-started-with-the-action-or-see-example"); +# } +# else { +# core.info(`✅ All the required secrets are set`); +# } +# +# - name: Check out repository +# uses: actions/checkout@v3 +# +# - name: Install oc +# uses: redhat-actions/openshift-tools-installer@v1 +# with: +# oc: 4 +# +# - name: Deploy API +# run: | +# set -eu +# # Login to OpenShift and select project +# oc login --token=${{ env.OPENSHIFT_TOKEN }} --server=${{ env.OPENSHIFT_SERVER }} +# oc project ${{ env.OPENSHIFT_NAMESPACE_TEST }} +# # Cancel any rollouts in progress +# oc rollout cancel dc/${{ env.SPRING_BOOT_IMAGE_NAME }} 2> /dev/null \ +# || true && echo "No rollout in progress" +# +# oc tag ${{ env.NAMESPACE }}-dev/${{ env.REPO_NAME }}-${{ env.BRANCH }}:${{ env.TAG }} ${{ env.NAMESPACE }}-test/${{ env.REPO_NAME }}-${{ env.BRANCH }}:${{ env.TAG }} +# +# # Process and apply deployment template +# oc process -f tools/openshift/api.dc.yaml -p APP_NAME=${{ env.APP_NAME }} -p REPO_NAME=${{ env.REPO_NAME }} -p BRANCH=${{ env.BRANCH }} -p NAMESPACE=${{ env.OPENSHIFT_NAMESPACE_TEST }} -p TAG=${{ env.TAG }} -p MIN_REPLICAS=${{ env.MIN_REPLICAS_TEST }} -p MAX_REPLICAS=${{ env.MAX_REPLICAS_TEST }} -p MIN_CPU=${{ env.MIN_CPU }} -p MAX_CPU=${{ env.MAX_CPU }} -p MIN_MEM=${{ env.MIN_MEM }} -p MAX_MEM=${{ env.MAX_MEM }} \ +# | oc apply -f - +# +# curl -s https://raw.githubusercontent.com/bcgov/${{ env.REPO_NAME }}/master/tools/config/update-configmap.sh | bash /dev/stdin test ${{ env.APP_NAME }} ${{ env.NAMESPACE }} ${{ env.COMMON_NAMESPACE }} ${{ env.DB_JDBC_CONNECT_STRING }} ${{ env.DB_PWD }} ${{ env.DB_USER }} ${{ env.SPLUNK_TOKEN }} ${{ env.CHES_CLIENT_ID }} ${{ env.CHES_CLIENT_SECRET }} ${{ env.CHES_TOKEN_URL }} ${{ env.CHES_ENDPOINT_URL }} ${{ env.SITE_URL }} +# +# # Start rollout (if necessary) and follow it +# oc rollout latest dc/${{ env.SPRING_BOOT_IMAGE_NAME }} 2> /dev/null \ +# || true && echo "Rollout in progress" +# oc logs -f dc/${{ env.SPRING_BOOT_IMAGE_NAME }} +# # Get status, returns 0 if rollout is successful +# oc rollout status dc/${{ env.SPRING_BOOT_IMAGE_NAME }} +# +# - name: ZAP Scan +# uses: zaproxy/action-api-scan@v0.7.0 +# with: +# target: 'https://${{ env.APP_NAME }}-${{ env.OPENSHIFT_NAMESPACE_TEST }}.apps.silver.devops.gov.bc.ca/v3/api-docs' diff --git a/api/src/main/resources/db/migration/V1.0.57__EDX_API.sql b/api/src/main/resources/db/migration/V1.0.57__EDX_API.sql new file mode 100644 index 00000000..5c251a97 --- /dev/null +++ b/api/src/main/resources/db/migration/V1.0.57__EDX_API.sql @@ -0,0 +1,167 @@ +DELETE FROM EDX_PERMISSION +WHERE EDX_PERMISSION_CODE = 'DIS_SDC_RO'; + +DELETE FROM EDX_PERMISSION +WHERE EDX_PERMISSION_CODE = 'SCH_SDC_RO'; + +INSERT INTO EDX_ROLE (EDX_ROLE_CODE, LABEL, IS_DISTRICT_ROLE, DESCRIPTION, CREATE_USER, UPDATE_USER) +VALUES ('GRAD_SCH_ADMIN', 'Graduation Administrator', FALSE, 'Graduation Administrator.', 'IDIR/AVSODHI', 'IDIR/AVSODHI'); + +INSERT INTO EDX_ROLE (EDX_ROLE_CODE, LABEL, IS_DISTRICT_ROLE, DESCRIPTION, CREATE_USER, UPDATE_USER) +VALUES ('GRAD_DIS_ADMIN', 'Graduation Administrator', TRUE, 'Graduation Administrator.', 'IDIR/AVSODHI', 'IDIR/AVSODHI'); + +INSERT INTO EDX_PERMISSION (EDX_PERMISSION_CODE, LABEL, DESCRIPTION, CREATE_USER, UPDATE_USER) +VALUES ('GRAD_SCH_EDIT', 'GRAD School Edit', 'GRAD edit permission for School.', 'IDIR/AVSODHI', 'IDIR/AVSODHI'); + +INSERT INTO EDX_PERMISSION (EDX_PERMISSION_CODE, LABEL, DESCRIPTION, CREATE_USER, UPDATE_USER) +VALUES ('GRAD_DIS_EDIT', 'GRAD District Edit', 'GRAD edit permission for District.', 'IDIR/AVSODHI', 'IDIR/AVSODHI'); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'GRAD_SCH_ADMIN', 'GRAD_SCH_EDIT', 'IDIR/AVSODHI', + to_date('2024-10-01', 'YYYY-MM-DD'), 'IDIR/AVSODHI', to_date('2024-10-01', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'GRAD_SCH_ADMIN', 'EDX_SCHOOL_VIEW', 'IDIR/AVSODHI', + to_date('2024-10-01', 'YYYY-MM-DD'), 'IDIR/AVSODHI', to_date('2024-10-01', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'GRAD_DIS_ADMIN', 'GRAD_DIS_EDIT', 'IDIR/AVSODHI', + to_date('2024-10-01', 'YYYY-MM-DD'), 'IDIR/AVSODHI', to_date('2024-10-01', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'GRAD_DIS_ADMIN', 'EDX_SCHOOL_VIEW', 'IDIR/AVSODHI', + to_date('2024-10-01', 'YYYY-MM-DD'), 'IDIR/AVSODHI', to_date('2024-10-01', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'GRAD_DIS_ADMIN', 'EDX_DISTRICT_VIEW', 'IDIR/AVSODHI', + to_date('2024-10-01', 'YYYY-MM-DD'), 'IDIR/AVSODHI', to_date('2024-10-01', 'YYYY-MM-DD')); + +INSERT INTO EDX_PERMISSION (EDX_PERMISSION_CODE, LABEL, DESCRIPTION, CREATE_USER, UPDATE_USER) +VALUES ('SUPERINT', 'Superintendent Permission', 'Permission to act as superintendent.', 'IDIR/MVILLENE', 'IDIR/MVILLENE'); + +INSERT INTO EDX_PERMISSION (EDX_PERMISSION_CODE, LABEL, DESCRIPTION, CREATE_USER, UPDATE_USER) +VALUES ('SECR_TRES', 'Secretary Treasurer Permission', 'Permission to act as secretary treasurer.', 'IDIR/MVILLENE', 'IDIR/MVILLENE'); + +INSERT INTO EDX_ROLE (EDX_ROLE_CODE, LABEL, IS_DISTRICT_ROLE, DESCRIPTION, CREATE_USER, UPDATE_USER) +VALUES ('SUPERINT', 'Superintendent Role', TRUE, 'Superintendent role for District.', 'IDIR/MVILLENE', 'IDIR/MVILLENE'); + +INSERT INTO EDX_ROLE (EDX_ROLE_CODE, LABEL, IS_DISTRICT_ROLE, DESCRIPTION, CREATE_USER, UPDATE_USER) +VALUES ('SECR_TRES', 'Secretary Treasurer Role', TRUE, 'Secretary treasurer role for District.', 'IDIR/MVILLENE', 'IDIR/MVILLENE'); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SECR_TRES', 'SECR_TRES', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SECR_TRES', 'EDX_SCHOOL_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SECR_TRES', 'EDX_DISTRICT_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SUPERINT', 'SUPERINT', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SUPERINT', 'EDX_SCHOOL_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SUPERINT', 'EDX_DISTRICT_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SECR_TRES', 'DIS_SDC_RO', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SECR_TRES', 'SCH_SDC_RO', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SUPERINT', 'SCH_SDC_RO', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SUPERINT', 'DIS_SDC_RO', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +UPDATE EDX_ROLE +SET label = 'Superintendent' +WHERE EDX_ROLE_CODE = 'SUPERINT'; + +UPDATE EDX_ROLE +SET label = 'Secretary Treasurer' +WHERE EDX_ROLE_CODE = 'SECR_TRES'; + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SECR_TRES', 'DIS_SDC_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SECR_TRES', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SUPERINT', 'DIS_SDC_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SUPERINT', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'DIS_SDC_RO', 'DIS_SDC_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'DIS_SDC_RO', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SCH_SDC_RO', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'DISTRICT_SDC', 'DIS_SDC_EDIT', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'DISTRICT_SDC', 'DIS_SDC_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'DISTRICT_SDC', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD')); + +INSERT INTO EDX_ROLE_PERMISSION (EDX_ROLE_PERMISSION_ID, EDX_ROLE_CODE, EDX_PERMISSION_CODE, CREATE_USER, CREATE_DATE, + UPDATE_USER, UPDATE_DATE) +VALUES (gen_random_uuid(), 'SCHOOL_SDC', 'SCH_SDC_VIEW', 'IDIR/MVILLENE', + to_date('2019-11-07', 'YYYY-MM-DD'), 'IDIR/MVILLENE', to_date('2019-11-07', 'YYYY-MM-DD'));