3 SELECT evergreen.upgrade_deps_block_check('0542', :eg_version); -- phasefx
5 INSERT INTO permission.perm_list VALUES
6 (485, 'CREATE_VOLUME_SUFFIX', oils_i18n_gettext(485, 'Create suffix label definition.', 'ppl', 'description'))
7 ,(486, 'UPDATE_VOLUME_SUFFIX', oils_i18n_gettext(486, 'Update suffix label definition.', 'ppl', 'description'))
8 ,(487, 'DELETE_VOLUME_SUFFIX', oils_i18n_gettext(487, 'Delete suffix label definition.', 'ppl', 'description'))
9 ,(488, 'CREATE_VOLUME_PREFIX', oils_i18n_gettext(488, 'Create prefix label definition.', 'ppl', 'description'))
10 ,(489, 'UPDATE_VOLUME_PREFIX', oils_i18n_gettext(489, 'Update prefix label definition.', 'ppl', 'description'))
11 ,(490, 'DELETE_VOLUME_PREFIX', oils_i18n_gettext(490, 'Delete prefix label definition.', 'ppl', 'description'))
12 ,(491, 'CREATE_MONOGRAPH_PART', oils_i18n_gettext(491, 'Create monograph part definition.', 'ppl', 'description'))
13 ,(492, 'UPDATE_MONOGRAPH_PART', oils_i18n_gettext(492, 'Update monograph part definition.', 'ppl', 'description'))
14 ,(493, 'DELETE_MONOGRAPH_PART', oils_i18n_gettext(493, 'Delete monograph part definition.', 'ppl', 'description'))
15 ,(494, 'ADMIN_CODED_VALUE', oils_i18n_gettext(494, 'Create/Update/Delete SVF Record Attribute Coded Value Map', 'ppl', 'description'))
16 ,(495, 'ADMIN_SERIAL_ITEM', oils_i18n_gettext(495, 'Create/Retrieve/Update/Delete Serial Item', 'ppl', 'description'))
17 ,(496, 'ADMIN_SVF', oils_i18n_gettext(496, 'Create/Update/Delete SVF Record Attribute Defintion', 'ppl', 'description'))
18 ,(497, 'CREATE_BIB_PTYPE', oils_i18n_gettext(497, 'Create Bibliographic Record Peer Type', 'ppl', 'description'))
19 ,(498, 'CREATE_PURCHASE_REQUEST', oils_i18n_gettext(498, 'Create User Purchase Request', 'ppl', 'description'))
20 ,(499, 'DELETE_BIB_PTYPE', oils_i18n_gettext(499, 'Delete Bibliographic Record Peer Type', 'ppl', 'description'))
21 ,(500, 'MAP_MONOGRAPH_PART', oils_i18n_gettext(500, 'Create/Update/Delete Copy Monograph Part Map', 'ppl', 'description'))
22 ,(501, 'MARK_ITEM_MISSING_PIECES', oils_i18n_gettext(501, 'Allows the Mark Item Missing Pieces action.', 'ppl', 'description'))
23 ,(502, 'UPDATE_BIB_PTYPE', oils_i18n_gettext(502, 'Update Bibliographic Record Peer Type', 'ppl', 'description'))
24 ,(503, 'UPDATE_HOLD_REQUEST_TIME', oils_i18n_gettext(503, 'Allows editing of a hold''s request time, and/or its Cut-in-line/Top-of-queue flag.', 'ppl', 'description'))
25 ,(504, 'UPDATE_PICKLIST', oils_i18n_gettext(504, 'Allows update/re-use of an acquisitions pick/selection list.', 'ppl', 'description'))
26 ,(505, 'UPDATE_WORKSTATION', oils_i18n_gettext(505, 'Allows update of a workstation during workstation registration override.', 'ppl', 'description'))
27 ,(506, 'VIEW_USER_SETTING_TYPE', oils_i18n_gettext(506, 'Allows viewing of configurable user setting types.', 'ppl', 'description'))
31 -- add new perms AND catch up on some missed upgrade data, if needed
33 -- we could get away from these fixed-id inserts here, but then this
34 -- upgrade would be ahead of the mainline, I think
36 INSERT INTO permission.grp_tree (id, name, parent, description, perm_interval, usergroup, application_perm)
37 SELECT 8, oils_i18n_gettext(8, 'Cataloging Administrator', 'pgt', 'name'), 3, NULL, '3 years', TRUE, 'group_application.user.staff.cat_admin'
40 FROM permission.grp_tree
45 INSERT INTO permission.grp_tree (id, name, parent, description, perm_interval, usergroup, application_perm)
46 SELECT 9, oils_i18n_gettext(9, 'Circulation Administrator', 'pgt', 'name'), 3, NULL, '3 years', TRUE, 'group_application.user.staff.circ_admin'
49 FROM permission.grp_tree
54 UPDATE permission.grp_tree SET description = oils_i18n_gettext(10, 'Can do anything at the Branch level', 'pgt', 'description') WHERE id = 10;
56 INSERT INTO permission.grp_tree (id, name, parent, description, perm_interval, usergroup, application_perm)
57 SELECT 11, oils_i18n_gettext(11, 'Serials', 'pgt', 'name'), 3, oils_i18n_gettext(11, 'Serials (includes admin features)', 'pgt', 'description'), '3 years', TRUE, 'group_application.user.staff.serials'
60 FROM permission.grp_tree
65 INSERT INTO permission.grp_tree (id, name, parent, description, perm_interval, usergroup, application_perm)
66 SELECT 12, oils_i18n_gettext(12, 'System Administrator', 'pgt', 'name'), 3, oils_i18n_gettext(12, 'Can do anything at the System level', 'pgt', 'description'), '3 years', TRUE, 'group_application.user.staff.admin.system_admin'
69 FROM permission.grp_tree
74 INSERT INTO permission.grp_tree (id, name, parent, description, perm_interval, usergroup, application_perm)
75 SELECT 13, oils_i18n_gettext(13, 'Global Administrator', 'pgt', 'name'), 3, oils_i18n_gettext(13, 'Can do anything at the Consortium level', 'pgt', 'description'), '3 years', TRUE, 'group_application.user.staff.admin.global_admin'
78 FROM permission.grp_tree
83 INSERT INTO permission.grp_tree (id, name, parent, description, perm_interval, usergroup, application_perm)
84 SELECT 14, oils_i18n_gettext(14, 'Data Review', 'pgt', 'name'), 3, NULL, '3 years', TRUE, 'group_application.user.staff.data_review'
87 FROM permission.grp_tree
92 INSERT INTO permission.grp_tree (id, name, parent, description, perm_interval, usergroup, application_perm)
93 SELECT 15, oils_i18n_gettext(15, 'Volunteers', 'pgt', 'name'), 3, NULL, '3 years', TRUE, 'group_application.user.staff.volunteers'
96 FROM permission.grp_tree
103 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
105 pgt.id, perm.id, aout.depth, TRUE
107 permission.grp_tree pgt,
108 permission.perm_list perm,
109 actor.org_unit_type aout
111 pgt.name = 'Cataloging Administrator' AND
112 aout.name = 'Consortium' AND
114 'ADMIN_IMPORT_ITEM_ATTR_DEF',
115 'ADMIN_MERGE_PROFILE',
116 'CREATE_AUTHORITY_IMPORT_IMPORT_DEF',
117 'CREATE_BIB_IMPORT_FIELD_DEF',
120 'CREATE_IMPORT_ITEM_ATTR_DEF',
121 'CREATE_IMPORT_TRASH_FIELD',
122 'CREATE_MERGE_PROFILE',
123 'CREATE_MONOGRAPH_PART',
124 'CREATE_VOLUME_PREFIX',
125 'CREATE_VOLUME_SUFFIX',
126 'DELETE_AUTHORITY_IMPORT_IMPORT_FIELD_DEF',
129 'DELETE_IMPORT_ITEM_ATTR_DEF',
130 'DELETE_IMPORT_TRASH_FIELD',
131 'DELETE_MERGE_PROFILE',
132 'DELETE_MONOGRAPH_PART',
133 'DELETE_VOLUME_PREFIX',
134 'DELETE_VOLUME_SUFFIX',
135 'MAP_MONOGRAPH_PART',
136 'UPDATE_AUTHORITY_IMPORT_IMPORT_FIELD_DEF',
137 'UPDATE_BIB_IMPORT_IMPORT_FIELD_DEF',
139 'UPDATE_IMPORT_ITEM_ATTR_DEF',
140 'UPDATE_IMPORT_TRASH_FIELD',
141 'UPDATE_MERGE_PROFILE',
142 'UPDATE_MONOGRAPH_PART',
143 'UPDATE_VOLUME_PREFIX',
144 'UPDATE_VOLUME_SUFFIX'
147 FROM permission.grp_perm_map AS map
150 AND map.perm = perm.id
153 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
155 pgt.id, perm.id, aout.depth, TRUE
157 permission.grp_tree pgt,
158 permission.perm_list perm,
159 actor.org_unit_type aout
161 pgt.name = 'Circulation Administrator' AND
162 aout.name = 'Branch' AND
167 FROM permission.grp_perm_map AS map
170 AND map.perm = perm.id
173 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
175 pgt.id, perm.id, aout.depth, TRUE
177 permission.grp_tree pgt,
178 permission.perm_list perm,
179 actor.org_unit_type aout
181 pgt.name = 'Circulation Administrator' AND
182 aout.name = 'Consortium' AND
184 'ADMIN_MAX_FINE_RULE',
185 'CREATE_CIRC_DURATION',
186 'DELETE_CIRC_DURATION',
187 'MARK_ITEM_MISSING_PIECES',
188 'UPDATE_CIRC_DURATION',
189 'UPDATE_HOLD_REQUEST_TIME',
190 'UPDATE_NET_ACCESS_LEVEL',
191 'VIEW_CIRC_MATRIX_MATCHPOINT',
192 'VIEW_HOLD_MATRIX_MATCHPOINT'
195 FROM permission.grp_perm_map AS map
198 AND map.perm = perm.id
201 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
203 pgt.id, perm.id, aout.depth, TRUE
205 permission.grp_tree pgt,
206 permission.perm_list perm,
207 actor.org_unit_type aout
209 pgt.name = 'Circulation Administrator' AND
210 aout.name = 'System' AND
212 'ADMIN_BOOKING_RESERVATION',
213 'ADMIN_BOOKING_RESERVATION_ATTR_MAP',
214 'ADMIN_BOOKING_RESERVATION_ATTR_VALUE_MAP',
215 'ADMIN_BOOKING_RESOURCE',
216 'ADMIN_BOOKING_RESOURCE_ATTR',
217 'ADMIN_BOOKING_RESOURCE_ATTR_MAP',
218 'ADMIN_BOOKING_RESOURCE_ATTR_VALUE',
219 'ADMIN_BOOKING_RESOURCE_TYPE',
220 'ADMIN_COPY_LOCATION_ORDER',
221 'ADMIN_HOLD_CANCEL_CAUSE',
225 'COPY_TRANSIT_RECEIVE',
227 'CREATE_BILLING_TYPE',
228 'CREATE_NON_CAT_TYPE',
229 'CREATE_PATRON_STAT_CAT',
230 'CREATE_PATRON_STAT_CAT_ENTRY',
231 'CREATE_PATRON_STAT_CAT_ENTRY_MAP',
232 'CREATE_USER_GROUP_LINK',
233 'DELETE_BILLING_TYPE',
234 'DELETE_NON_CAT_TYPE',
235 'DELETE_PATRON_STAT_CAT',
236 'DELETE_PATRON_STAT_CAT_ENTRY',
237 'DELETE_PATRON_STAT_CAT_ENTRY_MAP',
239 'group_application.user.staff',
241 'MARK_ITEM_AVAILABLE',
243 'MARK_ITEM_CHECKED_OUT',
245 'MARK_ITEM_IN_PROCESS',
246 'MARK_ITEM_IN_TRANSIT',
249 'MARK_ITEM_ON_HOLDS_SHELF',
250 'MARK_ITEM_ON_ORDER',
251 'MARK_ITEM_RESHELVING',
253 'money.collections_tracker.create',
254 'money.collections_tracker.delete',
258 'REMOVE_USER_GROUP_LINK',
259 'SET_CIRC_CLAIMS_RETURNED',
260 'SET_CIRC_CLAIMS_RETURNED.override',
265 'UPDATE_NON_CAT_TYPE',
266 'UPDATE_PATRON_CLAIM_NEVER_CHECKED_OUT_COUNT',
267 'UPDATE_PATRON_CLAIM_RETURN_COUNT',
268 'UPDATE_PICKUP_LIB_FROM_HOLDS_SHELF',
269 'UPDATE_PICKUP_LIB_FROM_TRANSIT',
271 'VIEW_REPORT_OUTPUT',
272 'VIEW_STANDING_PENALTY',
277 FROM permission.grp_perm_map AS map
280 AND map.perm = perm.id
283 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
285 pgt.id, perm.id, aout.depth, TRUE
287 permission.grp_tree pgt,
288 permission.perm_list perm,
289 actor.org_unit_type aout
291 pgt.name = 'Local Administrator' AND
292 aout.name = 'Branch' AND
297 FROM permission.grp_perm_map AS map
300 AND map.perm = perm.id
303 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
305 pgt.id, perm.id, aout.depth, FALSE
307 permission.grp_tree pgt,
308 permission.perm_list perm,
309 actor.org_unit_type aout
311 pgt.name = 'Serials' AND
312 aout.name = 'System' AND
314 'ADMIN_ASSET_COPY_TEMPLATE',
315 'ADMIN_SERIAL_CAPTION_PATTERN',
316 'ADMIN_SERIAL_DISTRIBUTION',
318 'ADMIN_SERIAL_STREAM',
319 'ADMIN_SERIAL_SUBSCRIPTION',
324 FROM permission.grp_perm_map AS map
327 AND map.perm = perm.id
330 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
332 pgt.id, perm.id, aout.depth, TRUE
334 permission.grp_tree pgt,
335 permission.perm_list perm,
336 actor.org_unit_type aout
338 pgt.name = 'System Administrator' AND
339 aout.name = 'System' AND
344 FROM permission.grp_perm_map AS map
347 AND map.perm = perm.id
350 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
352 pgt.id, perm.id, aout.depth, FALSE
354 permission.grp_tree pgt,
355 permission.perm_list perm,
356 actor.org_unit_type aout
358 pgt.name = 'System Administrator' AND
359 aout.name = 'Consortium' AND
360 perm.code ~ '^VIEW_TRIGGER'
363 FROM permission.grp_perm_map AS map
366 AND map.perm = perm.id
369 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
371 pgt.id, perm.id, aout.depth, TRUE
373 permission.grp_tree pgt,
374 permission.perm_list perm,
375 actor.org_unit_type aout
377 pgt.name = 'Global Administrator' AND
378 aout.name = 'Consortium' AND
383 FROM permission.grp_perm_map AS map
386 AND map.perm = perm.id
389 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
391 pgt.id, perm.id, aout.depth, FALSE
393 permission.grp_tree pgt,
394 permission.perm_list perm,
395 actor.org_unit_type aout
397 pgt.name = 'Data Review' AND
398 aout.name = 'Consortium' AND
400 'CREATE_COPY_TRANSIT',
409 'VIEW_USER_FINES_SUMMARY',
410 'VIEW_USER_TRANSACTIONS',
415 FROM permission.grp_perm_map AS map
418 AND map.perm = perm.id
421 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
423 pgt.id, perm.id, aout.depth, FALSE
425 permission.grp_tree pgt,
426 permission.perm_list perm,
427 actor.org_unit_type aout
429 pgt.name = 'Data Review' AND
430 aout.name = 'System' AND
434 'CREATE_IN_HOUSE_USE',
435 'CREATE_TRANSACTION',
442 FROM permission.grp_perm_map AS map
445 AND map.perm = perm.id
448 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
450 pgt.id, perm.id, aout.depth, FALSE
452 permission.grp_tree pgt,
453 permission.perm_list perm,
454 actor.org_unit_type aout
456 pgt.name = 'Volunteers' AND
457 aout.name = 'Branch' AND
461 'CREATE_IN_HOUSE_USE',
465 'VIEW_COPY_CHECKOUT',
470 'VIEW_USER_FINES_SUMMARY',
471 'VIEW_USER_TRANSACTIONS'
474 FROM permission.grp_perm_map AS map
477 AND map.perm = perm.id
480 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
482 pgt.id, perm.id, aout.depth, FALSE
484 permission.grp_tree pgt,
485 permission.perm_list perm,
486 actor.org_unit_type aout
488 pgt.name = 'Volunteers' AND
489 aout.name = 'Consortium' AND
491 'CREATE_COPY_TRANSIT',
492 'CREATE_TRANSACTION',
499 FROM permission.grp_perm_map AS map
502 AND map.perm = perm.id
507 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
509 pgt.id, perm.id, aout.depth, FALSE
511 permission.grp_tree pgt,
512 permission.perm_list perm,
513 actor.org_unit_type aout
515 pgt.name = 'Users' AND
516 aout.name = 'Consortium' AND
518 'CREATE_PURCHASE_REQUEST'
521 FROM permission.grp_perm_map AS map
524 AND map.perm = perm.id
528 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
530 pgt.id, perm.id, aout.depth, FALSE
532 permission.grp_tree pgt,
533 permission.perm_list perm,
534 actor.org_unit_type aout
536 pgt.name = 'Staff' AND
537 aout.name = 'Consortium' AND
539 'VIEW_USER_SETTING_TYPE'
542 FROM permission.grp_perm_map AS map
545 AND map.perm = perm.id
548 -- stock Circulators group
549 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
551 pgt.id, perm.id, aout.depth, FALSE
553 permission.grp_tree pgt,
554 permission.perm_list perm,
555 actor.org_unit_type aout
557 pgt.name = 'Circulators' AND
558 aout.name = 'Branch' AND
560 'MARK_ITEM_MISSING_PIECES'
563 FROM permission.grp_perm_map AS map
566 AND map.perm = perm.id
569 -- stock Catalogers group
570 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
572 pgt.id, perm.id, aout.depth, FALSE
574 permission.grp_tree pgt,
575 permission.perm_list perm,
576 actor.org_unit_type aout
578 pgt.name = 'Catalogers' AND
579 aout.name = 'System' AND
584 FROM permission.grp_perm_map AS map
587 AND map.perm = perm.id
590 -- stock Acquisitions group
591 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
593 pgt.id, perm.id, aout.depth, FALSE
595 permission.grp_tree pgt,
596 permission.perm_list perm,
597 actor.org_unit_type aout
599 pgt.name = 'Acquisitions' AND
600 aout.name = 'Consortium' AND
605 FROM permission.grp_perm_map AS map
608 AND map.perm = perm.id
611 -- stock Acq Admin group
612 INSERT INTO permission.grp_perm_map (grp, perm, depth, grantable)
614 pgt.id, perm.id, aout.depth, TRUE
616 permission.grp_tree pgt,
617 permission.perm_list perm,
618 actor.org_unit_type aout
620 pgt.name = 'Acquisitions Administrator' AND
621 aout.name = 'Consortium' AND
626 FROM permission.grp_perm_map AS map
629 AND map.perm = perm.id