diff --git a/VERSION b/VERSION index 14a8c245..47d04a52 100644 --- a/VERSION +++ b/VERSION @@ -1 +1 @@ -0.17.1 \ No newline at end of file +0.18.0 \ No newline at end of file diff --git a/app/fixtures/custom/assets/access/anonymous/access.yaml b/app/fixtures/custom/assets/access/anonymous/access.yaml new file mode 100644 index 00000000..6ff796c5 --- /dev/null +++ b/app/fixtures/custom/assets/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: d90729ab-d9fe-4634-866b-93f1b1ec0d43 + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/anonymous/permission.yaml b/app/fixtures/custom/assets/access/anonymous/permission.yaml new file mode 100644 index 00000000..8887d079 --- /dev/null +++ b/app/fixtures/custom/assets/access/anonymous/permission.yaml @@ -0,0 +1,22 @@ +objects: + - access: d90729ab-d9fe-4634-866b-93f1b1ec0d43 # Anonymous + scope: + type: session + key: + - asset + - asset_uuid + - asset_title + - asset_data + - asset_association + - asset_association_uuid + - asset_association_entity + - asset_association_entity_uuid + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/individual/access.yaml b/app/fixtures/custom/assets/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/assets/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/individual/permission.yaml b/app/fixtures/custom/assets/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/assets/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/organization/access.yaml b/app/fixtures/custom/assets/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/assets/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/organization/permission.yaml b/app/fixtures/custom/assets/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/assets/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/role/access.yaml b/app/fixtures/custom/assets/access/role/access.yaml new file mode 100644 index 00000000..bb8e39d6 --- /dev/null +++ b/app/fixtures/custom/assets/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: c4fcda7a-601e-4ad9-ad08-69f59630567e + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 081bc44e-ef70-494c-80fd-6f381a034ca7 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: c53208e7-3fbe-44a3-ab37-378bfeaaf97d + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: 0242cef6-d323-4b2a-be1d-33d220c16984 + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 847758a3-10af-4b2a-8862-c3a0207ec0bc + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 8df3f13f-3cd6-4bb9-bc83-77df7d8c91b7 + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: 492bad7f-8ab4-40f5-9153-0f3c059b1afd + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/role/permission.yaml b/app/fixtures/custom/assets/access/role/permission.yaml new file mode 100644 index 00000000..eeaf6256 --- /dev/null +++ b/app/fixtures/custom/assets/access/role/permission.yaml @@ -0,0 +1,128 @@ +objects: + - access: c4fcda7a-601e-4ad9-ad08-69f59630567e # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: c4fcda7a-601e-4ad9-ad08-69f59630567e # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: c4fcda7a-601e-4ad9-ad08-69f59630567e # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 081bc44e-ef70-494c-80fd-6f381a034ca7 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - asset + - asset_association + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 081bc44e-ef70-494c-80fd-6f381a034ca7 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - asset_property + - asset_association_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: c53208e7-3fbe-44a3-ab37-378bfeaaf97d # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - asset + - asset_association + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: c53208e7-3fbe-44a3-ab37-378bfeaaf97d # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - asset_property + - asset_association_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 0242cef6-d323-4b2a-be1d-33d220c16984 # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - asset + - asset_property + - asset_association + - asset_association_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 847758a3-10af-4b2a-8862-c3a0207ec0bc # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - asset + - asset_property + - asset_association + - asset_association_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 8df3f13f-3cd6-4bb9-bc83-77df7d8c91b7 # Individual + scope: + type: session + key: + - asset + - asset_uuid + - asset_title + - asset_data + - asset_association + - asset_association_uuid + - asset_association_entity + - asset_association_entity_uuid + attributes: [BROWSE, READ] + + - access: 492bad7f-8ab4-40f5-9153-0f3c059b1afd # Organization + scope: + type: session + key: + - asset + - asset_uuid + - asset_title + - asset_data + - asset_association + - asset_association_uuid + - asset_association_entity + - asset_association_entity_uuid + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/staff/access.yaml b/app/fixtures/custom/assets/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/assets/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/staff/permission.yaml b/app/fixtures/custom/assets/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/assets/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/system/access.yaml b/app/fixtures/custom/assets/access/system/access.yaml new file mode 100644 index 00000000..01388fb4 --- /dev/null +++ b/app/fixtures/custom/assets/access/system/access.yaml @@ -0,0 +1,16 @@ +objects: + - uuid: ac6b6279-857d-4f02-88d8-322a3168734d + owner_uuid: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + assignee_uuid: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 30bda715-1bdd-4ebf-9fc1-991b90f4dc74 + owner_uuid: 60591cbd-efad-4289-9b7c-a258016e94cb # Bpm + assignee_uuid: 60591cbd-efad-4289-9b7c-a258016e94cb # Bpm + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/system/permission.yaml b/app/fixtures/custom/assets/access/system/permission.yaml new file mode 100644 index 00000000..469f75e2 --- /dev/null +++ b/app/fixtures/custom/assets/access/system/permission.yaml @@ -0,0 +1,32 @@ +objects: + - access: ac6b6279-857d-4f02-88d8-322a3168734d # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: ac6b6279-857d-4f02-88d8-322a3168734d # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: ac6b6279-857d-4f02-88d8-322a3168734d # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 30bda715-1bdd-4ebf-9fc1-991b90f4dc74 # Bpm + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 30bda715-1bdd-4ebf-9fc1-991b90f4dc74 # Bpm + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 30bda715-1bdd-4ebf-9fc1-991b90f4dc74 # Bpm + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/asset.yaml b/app/fixtures/custom/assets/asset.yaml new file mode 100644 index 00000000..0258854f --- /dev/null +++ b/app/fixtures/custom/assets/asset.yaml @@ -0,0 +1,30 @@ +objects: + - uuid: c64bf657-a877-4127-bdcb-449e7e3985b3 + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Animal License + fr: Permis animalier + data: + id: 1 + type: dog + + - uuid: 7ddbae00-20a6-48b8-8ab8-bdf117d26586 + identity: Organization + identity_uuid: 5946a069-95d4-4536-9f78-41ca96316cc5 # Acme + title: + en: Animal License + fr: Permis animalier + data: + id: 2 + type: cat + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: ~ + identity_uuid: ~ + title: {} + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/config.yaml b/app/fixtures/custom/assets/config.yaml new file mode 100644 index 00000000..b8e67f6a --- /dev/null +++ b/app/fixtures/custom/assets/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: c8b9d2cd-b3eb-4dd1-baad-fe985136b97f + key: ds_api.user.username + value: system@system.ds + + - uuid: ed54565b-060e-4f15-9f9d-8f7585d357db + key: ds_api.user.password + value: system + + - uuid: 164e6695-cc40-4028-acd9-3616f0245884 + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: ad905f36-44ac-4ae2-80a8-3fcaabfdd1bd + key: ds_api.user.roles + value: [] + + - uuid: ca5a660f-4ce8-4e20-a2b6-31cd2e508fd3 + key: ds_api.user.identity.roles + value: [] + + - uuid: 446fa498-3106-4fe9-8b29-8811464aa7a7 + key: ds_api.user.identity.type + value: System + + - uuid: d53ad899-5f5d-4d0a-ace3-f0466625cfa6 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 13daece8-213c-417e-86f4-4dea486117f5 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/metadata.yaml b/app/fixtures/custom/assets/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/assets/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/system/parameter.yaml b/app/fixtures/custom/assets/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/assets/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/assets/system/tenant.yaml b/app/fixtures/custom/assets/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/assets/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/authentication/access/anonymous/access.yaml b/app/fixtures/custom/authentication/access/anonymous/access.yaml new file mode 100644 index 00000000..e0da9f60 --- /dev/null +++ b/app/fixtures/custom/authentication/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: 8305bdb8-b932-41e7-b29c-e1f81964b6db + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/anonymous/permission.yaml b/app/fixtures/custom/authentication/access/anonymous/permission.yaml new file mode 100644 index 00000000..2bb7a19d --- /dev/null +++ b/app/fixtures/custom/authentication/access/anonymous/permission.yaml @@ -0,0 +1,31 @@ +objects: + - access: 8305bdb8-b932-41e7-b29c-e1f81964b6db # Anonymous + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: registration + attributes: [ADD] + + - access: 8305bdb8-b932-41e7-b29c-e1f81964b6db # Anonymous + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - registration_owner + - registration_owner_uuid + - registration_identity + - registration_username + - registration_password + - registration_data + - registration_version + attributes: [EDIT] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/individual/access.yaml b/app/fixtures/custom/authentication/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/authentication/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/individual/permission.yaml b/app/fixtures/custom/authentication/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/authentication/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/organization/access.yaml b/app/fixtures/custom/authentication/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/authentication/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/organization/permission.yaml b/app/fixtures/custom/authentication/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/authentication/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/role/access.yaml b/app/fixtures/custom/authentication/access/role/access.yaml new file mode 100644 index 00000000..b4f145a3 --- /dev/null +++ b/app/fixtures/custom/authentication/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: 2232d711-9e8f-4ef0-bd9f-d27a1835518a + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: b36174a8-eb28-4654-8fe8-938ba64ec758 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: 903f2b1e-5df9-48dd-a739-0a757033f835 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: 2c8514ff-b13e-4df1-8036-724916bcef22 + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 4fddbb03-ed65-4a36-a863-91716e19adfd + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: ad2e18be-54c9-4331-8455-e56b058e8b0a + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: ce9add98-00ac-4dec-a860-2218300ebbea + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/role/permission.yaml b/app/fixtures/custom/authentication/access/role/permission.yaml new file mode 100644 index 00000000..186f23dc --- /dev/null +++ b/app/fixtures/custom/authentication/access/role/permission.yaml @@ -0,0 +1,152 @@ +objects: + - access: 2232d711-9e8f-4ef0-bd9f-d27a1835518a # Administrator + scope: + type: owner + entity: BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 2232d711-9e8f-4ef0-bd9f-d27a1835518a # Administrator + scope: + type: owner + entity: BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 2232d711-9e8f-4ef0-bd9f-d27a1835518a # Administrator + scope: + type: generic + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: b36174a8-eb28-4654-8fe8-938ba64ec758 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - user + - registration + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: b36174a8-eb28-4654-8fe8-938ba64ec758 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - user_property + - registration_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 903f2b1e-5df9-48dd-a739-0a757033f835 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - user + - registration + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 903f2b1e-5df9-48dd-a739-0a757033f835 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - user_property + - registration_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 2c8514ff-b13e-4df1-8036-724916bcef22 # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - user + - user_property + - registration + - registration_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 4fddbb03-ed65-4a36-a863-91716e19adfd # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - user + - user_property + - registration + - registration_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: ad2e18be-54c9-4331-8455-e56b058e8b0a # Individual + scope: + type: session + key: user + attributes: [BROWSE, READ, EDIT] + + - access: ad2e18be-54c9-4331-8455-e56b058e8b0a # Individual + scope: + type: session + key: + - user_uuid + - user_created_at + - user_username + - user_email + - user_version + attributes: [BROWSE, READ] + + - access: ad2e18be-54c9-4331-8455-e56b058e8b0a # Individual + scope: + type: session + key: + - user_username + - user_email + - user_version + attributes: [EDIT] + + - access: ce9add98-00ac-4dec-a860-2218300ebbea # Organization + scope: + type: session + key: user + attributes: [BROWSE, READ, EDIT] + + - access: ce9add98-00ac-4dec-a860-2218300ebbea # Organization + scope: + type: session + key: + - user_uuid + - user_created_at + - user_username + - user_email + - user_version + attributes: [BROWSE, READ] + + - access: ce9add98-00ac-4dec-a860-2218300ebbea # Organization + scope: + type: session + key: + - user_username + - user_email + - user_version + attributes: [EDIT] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/staff/access.yaml b/app/fixtures/custom/authentication/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/authentication/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/staff/permission.yaml b/app/fixtures/custom/authentication/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/authentication/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/system/access.yaml b/app/fixtures/custom/authentication/access/system/access.yaml new file mode 100644 index 00000000..61e8349a --- /dev/null +++ b/app/fixtures/custom/authentication/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 1565a59a-687e-464b-89cc-e3e72b6eadaa + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/system/permission.yaml b/app/fixtures/custom/authentication/access/system/permission.yaml new file mode 100644 index 00000000..f79e6ae1 --- /dev/null +++ b/app/fixtures/custom/authentication/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 1565a59a-687e-464b-89cc-e3e72b6eadaa # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 1565a59a-687e-464b-89cc-e3e72b6eadaa # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 1565a59a-687e-464b-89cc-e3e72b6eadaa # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/config.yaml b/app/fixtures/custom/authentication/config.yaml new file mode 100644 index 00000000..87d84ed3 --- /dev/null +++ b/app/fixtures/custom/authentication/config.yaml @@ -0,0 +1,108 @@ +objects: + - uuid: fed82698-e8cc-498a-bf88-ea7c076b690f + key: app.spa.admin + value: http://admin.ds + + - uuid: 0f4a2a6f-5ef7-4281-992c-90e712481b42 + key: app.spa.portal + value: http://portal.ds + + - uuid: 388d89cd-3ed3-401b-8666-31052df05a30 + key: app.registration.individual.owner.type + value: BusinessUnit + + - uuid: c0f29892-4db3-4fdb-b41c-4fe28b799751 + key: app.registration.individual.owner.uuid + value: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + + - uuid: c728b569-8e60-4041-9b90-2458ad1b9029 + key: app.registration.individual.roles + value: [54d82fc6-8ce7-498e-832f-3598664a9d9d] + + - uuid: 435b339e-8281-496e-a5cc-d2fead3473a9 + key: app.registration.individual.enabled + value: true + + - uuid: 89679f58-1256-4985-b98c-186599f659bc + key: app.registration.organization.owner.type + value: BusinessUnit + + - uuid: 7fb6a57f-1a77-499e-96fb-ae35859c5f88 + key: app.registration.organization.owner.uuid + value: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + + - uuid: 55253ea9-177d-4df2-8408-eeaea9f9700f + key: app.registration.organization.roles + value: [777b96e7-e183-44f7-b7e4-dc0cb7591f74] + + - uuid: 650274bd-b889-429c-812b-c0af4bebddf1 + key: app.registration.organization.enabled + value: true + + - uuid: 891e5fea-0331-4ffa-ac52-e877167d74eb + key: app.registration.staff.owner.type + value: BusinessUnit + + - uuid: 653243c7-efca-4d24-b478-a3695f729ab5 + key: app.registration.staff.owner.uuid + value: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + + - uuid: dd5e1d4c-8baa-4ac8-9bc6-9cccb2797a94 + key: app.registration.staff.roles + value: [3e64bbd1-4d00-47e7-a35e-92691f5a6018] + + - uuid: 4780ff40-5bbf-4e25-9a3d-26eef39e2c2d + key: app.registration.staff.enabled + value: false + + - uuid: 25bbaff8-e3c1-4f78-bffd-b8f030672e5c + key: app.resetting.email.subject + value: app.resetting.email.subject + + - uuid: 6ffd25ba-47c9-4bb9-82fb-9cd5b865bb31 + key: app.resetting.email.body.plain + value: app.resetting.email.body.plain + + - uuid: 00d07d5e-e123-47c8-9fc0-980c2d6ca750 + key: app.resetting.email.body.html + value: app.resetting.email.body.html + + - uuid: c59ec23a-6e1b-4fbd-b84f-47311c615e1e + key: ds_api.user.username + value: system@system.ds + + - uuid: 74ae67fa-ae84-4337-bfc4-2346958983a3 + key: ds_api.user.password + value: system + + - uuid: 76211f31-5544-4d38-b11a-44e90f045076 + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 39a63591-0fba-460f-b385-20d5b7fb2661 + key: ds_api.user.roles + value: [] + + - uuid: 1fc71c1f-d089-45b2-a8c9-a5cb4e9ce361 + key: ds_api.user.identity.roles + value: [] + + - uuid: 4c44b547-1ded-40e3-9e64-870305b2e7e4 + key: ds_api.user.identity.type + value: System + + - uuid: 70ef6920-1322-484c-b987-4c1a74af6a84 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 1cb0c6c5-96ab-4437-b396-217309b92be0 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/metadata.yaml b/app/fixtures/custom/authentication/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/authentication/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/system/parameter.yaml b/app/fixtures/custom/authentication/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/authentication/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/authentication/system/tenant.yaml b/app/fixtures/custom/authentication/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/authentication/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/authentication/user/anonymous/registration.yaml b/app/fixtures/custom/authentication/user/anonymous/registration.yaml new file mode 100644 index 00000000..3ea18e2a --- /dev/null +++ b/app/fixtures/custom/authentication/user/anonymous/registration.yaml @@ -0,0 +1,10 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + username: ~ + password: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/anonymous/user.yaml b/app/fixtures/custom/authentication/user/anonymous/user.yaml new file mode 100644 index 00000000..23f3b779 --- /dev/null +++ b/app/fixtures/custom/authentication/user/anonymous/user.yaml @@ -0,0 +1,20 @@ +objects: + - uuid: 945824f2-3099-442d-ac4f-6c867a1692e6 + username: anonymous@anonymous.ds + email: anonymous@anonymous.ds + password: anonymous + owner: System + owner_uuid: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + +prototype: + uuid: ~ + username: ~ + email: ~ + password: ~ + enabled: true + roles: [] + owner: BusinessUnit + owner_uuid: ~ + identity: Anonymous + identity_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/individual/registration.yaml b/app/fixtures/custom/authentication/user/individual/registration.yaml new file mode 100644 index 00000000..3ea18e2a --- /dev/null +++ b/app/fixtures/custom/authentication/user/individual/registration.yaml @@ -0,0 +1,10 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + username: ~ + password: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/individual/user.yaml b/app/fixtures/custom/authentication/user/individual/user.yaml new file mode 100644 index 00000000..2b96cd89 --- /dev/null +++ b/app/fixtures/custom/authentication/user/individual/user.yaml @@ -0,0 +1,19 @@ +objects: + - uuid: 42182fd0-9665-4ba4-9f5c-ec290e23814e + username: morgan@individual.ds + email: morgan@individual.ds + password: morgan + identity_uuid: d0daa7e4-07d1-47e6-93f2-0629adaa3b49 # Morgan + +prototype: + uuid: ~ + username: ~ + email: ~ + password: ~ + enabled: true + roles: [] + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/organization/registration.yaml b/app/fixtures/custom/authentication/user/organization/registration.yaml new file mode 100644 index 00000000..3ea18e2a --- /dev/null +++ b/app/fixtures/custom/authentication/user/organization/registration.yaml @@ -0,0 +1,10 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + username: ~ + password: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/organization/user.yaml b/app/fixtures/custom/authentication/user/organization/user.yaml new file mode 100644 index 00000000..da12bb37 --- /dev/null +++ b/app/fixtures/custom/authentication/user/organization/user.yaml @@ -0,0 +1,19 @@ +objects: + - uuid: 336dcc1c-d7dc-46de-9640-e19dc567bd3f + username: acme@organization.ds + email: acme@organization.ds + password: acme + identity_uuid: c9599da5-35a8-494c-9181-975d78be9694 # Acme + +prototype: + uuid: ~ + username: ~ + email: ~ + password: ~ + enabled: true + roles: [] + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Organization + identity_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/staff/user.yaml b/app/fixtures/custom/authentication/user/staff/user.yaml new file mode 100644 index 00000000..cdf83257 --- /dev/null +++ b/app/fixtures/custom/authentication/user/staff/user.yaml @@ -0,0 +1,31 @@ +objects: + - uuid: 40759f94-3e8b-41a1-8a3c-dd84393da5b9 + username: admin@staff.ds + email: admin@staff.ds + password: admin + identity_uuid: e32f09b7-e1cf-4a91-a0e1-6822bf47a662 # Admin + + - uuid: 03f8c569-9c5d-43a8-83bb-9cf6c9249e63 + username: manager@staff.ds + email: manager@staff.ds + password: manager + identity_uuid: 47a5a9cb-496f-4db7-8999-489ec404887f # Manager + + - uuid: 6fc979ec-c210-4b10-b344-600f7ecb2aeb + username: agent@staff.ds + email: agent@staff.ds + password: agent + identity_uuid: 5449ce65-5df0-440d-aead-21a77907e59a # Agent + +prototype: + uuid: ~ + username: ~ + email: ~ + password: ~ + enabled: true + roles: [] + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Staff + identity_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/system/user.yaml b/app/fixtures/custom/authentication/user/system/user.yaml new file mode 100644 index 00000000..a41502eb --- /dev/null +++ b/app/fixtures/custom/authentication/user/system/user.yaml @@ -0,0 +1,27 @@ +objects: + - uuid: 4b0237d1-0917-4d8b-af6d-2aa89be336de + username: system@system.ds + email: system@system.ds + password: system + owner_uuid: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + identity_uuid: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 178fb5a4-2da3-4546-9dc4-f37748bf5652 + username: bpm@system.ds + email: bpm@system.ds + password: bpm + owner_uuid: 60591cbd-efad-4289-9b7c-a258016e94cb # Bpm + identity_uuid: 60591cbd-efad-4289-9b7c-a258016e94cb # Bpm + +prototype: + uuid: ~ + username: ~ + email: ~ + password: ~ + enabled: true + roles: [] + owner: System + owner_uuid: ~ + identity: System + identity_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/anonymous/access.yaml b/app/fixtures/custom/cases/access/anonymous/access.yaml new file mode 100644 index 00000000..6b899c0b --- /dev/null +++ b/app/fixtures/custom/cases/access/anonymous/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/anonymous/permission.yaml b/app/fixtures/custom/cases/access/anonymous/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cases/access/anonymous/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/individual/access.yaml b/app/fixtures/custom/cases/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/cases/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/individual/permission.yaml b/app/fixtures/custom/cases/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cases/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/organization/access.yaml b/app/fixtures/custom/cases/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/cases/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/organization/permission.yaml b/app/fixtures/custom/cases/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cases/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/role/access.yaml b/app/fixtures/custom/cases/access/role/access.yaml new file mode 100644 index 00000000..8c3c8cda --- /dev/null +++ b/app/fixtures/custom/cases/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: e5aec3bf-c524-4f39-b69a-37a4fad9fac5 + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: aaf58d8b-c3b2-4354-9b9f-39e9fbfc1dfb + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: 4ab2f639-724d-49e0-ba75-c3ce36f72c36 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: f0300ff1-4d81-4721-8e5d-4c14e89ffceb + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 12fb8b17-ba00-465b-86fa-21dacb81a13e + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: b5803f52-ed62-4d1f-8e29-c00770613c0c + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: ae8ec633-125a-4a24-b31d-2ef568c5a1ee + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/role/permission.yaml b/app/fixtures/custom/cases/access/role/permission.yaml new file mode 100644 index 00000000..b65837eb --- /dev/null +++ b/app/fixtures/custom/cases/access/role/permission.yaml @@ -0,0 +1,146 @@ +objects: + - access: e5aec3bf-c524-4f39-b69a-37a4fad9fac5 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: e5aec3bf-c524-4f39-b69a-37a4fad9fac5 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: e5aec3bf-c524-4f39-b69a-37a4fad9fac5 # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: aaf58d8b-c3b2-4354-9b9f-39e9fbfc1dfb # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - case + - case_status + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: aaf58d8b-c3b2-4354-9b9f-39e9fbfc1dfb # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - case_property + - case_status_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 4ab2f639-724d-49e0-ba75-c3ce36f72c36 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - case + - case_status + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 4ab2f639-724d-49e0-ba75-c3ce36f72c36 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - case_property + - case_status_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: f0300ff1-4d81-4721-8e5d-4c14e89ffceb # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - case + - case_property + - case_status + - case_status_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 12fb8b17-ba00-465b-86fa-21dacb81a13e # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - case + - case_property + - case_status + - case_status_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: b5803f52-ed62-4d1f-8e29-c00770613c0c # Individual + scope: + type: session + key: + - case + - case_uuid + - case_custom_id + - case_created_at + - case_title + - case_data + - case_state + - case_statuses + - case_version + - case_status + - case_status_uuid + - case_status_created_at + - case_status_case + - case_status_title + - case_status_description + - case_status_data + - case_status_version + attributes: [BROWSE, READ] + + - access: ae8ec633-125a-4a24-b31d-2ef568c5a1ee # Organization + scope: + type: session + key: + - case + - case_uuid + - case_custom_id + - case_created_at + - case_title + - case_data + - case_state + - case_statuses + - case_version + - case_status + - case_status_uuid + - case_status_created_at + - case_status_case + - case_status_title + - case_status_description + - case_status_data + - case_status_version + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/staff/access.yaml b/app/fixtures/custom/cases/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/cases/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/staff/permission.yaml b/app/fixtures/custom/cases/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cases/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/system/access.yaml b/app/fixtures/custom/cases/access/system/access.yaml new file mode 100644 index 00000000..e73240cd --- /dev/null +++ b/app/fixtures/custom/cases/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 71c827d2-f29a-4d6b-8b76-5e6ad4142474 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/system/permission.yaml b/app/fixtures/custom/cases/access/system/permission.yaml new file mode 100644 index 00000000..261cd0de --- /dev/null +++ b/app/fixtures/custom/cases/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 71c827d2-f29a-4d6b-8b76-5e6ad4142474 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 71c827d2-f29a-4d6b-8b76-5e6ad4142474 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 71c827d2-f29a-4d6b-8b76-5e6ad4142474 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/case.yaml b/app/fixtures/custom/cases/case.yaml new file mode 100644 index 00000000..925a6f51 --- /dev/null +++ b/app/fixtures/custom/cases/case.yaml @@ -0,0 +1,33 @@ +objects: + - uuid: ddec212d-3512-45b6-af39-20910db4720b + custom_id: GOV-82184661 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Pothole - 123 Street - Urgent + fr: Nid-de-poule - 123 rue - urgent + state: 1 # open + + - uuid: 78e00b3a-a386-48da-9373-5bcb7d9fbea2 + custom_id: GOV-788e4c03 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Staff + identity_uuid: 38bf092a-b807-438f-8cc9-009fc12924cb # Remy + title: + en: Pothole - Quality Review + fr: Nid-de-poule - Examen de la qualité + state: 1 # open + +prototype: + uuid: ~ + custom_id: ~ + owner: BusinessUnit + owner_uuid: ~ + identity: ~ + identity_uuid: ~ + title: {} + data: {} + state: ~ + priority: 0 + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/case_status.yaml b/app/fixtures/custom/cases/case_status.yaml new file mode 100644 index 00000000..270c34e2 --- /dev/null +++ b/app/fixtures/custom/cases/case_status.yaml @@ -0,0 +1,84 @@ +objects: + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 21b3b72a-bd1b-4d87-9b28-7768aaea8ae6 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request submitted + fr: Demande soumise + description: + en: Description ... + fr: Description ... + + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 1739b92f-9ce9-4f7d-92ff-6314171794b4 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request accepted + fr: Demande acceptée + description: + en: Description ... + fr: Description ... + + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 5a438bff-afa9-489d-953f-4524ca0905cb + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request under review + fr: Demande à l'étude + description: + en: Description ... + fr: Description ... + + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 0a42016c-c625-4025-becf-b7dc98db44f8 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request approved + fr: Demande approuvée + description: + en: Description ... + fr: Description ... + + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 02a74181-c59d-459a-acaf-64c7a597f6b7 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request resolved + fr: Demande résolue + description: + en: Description ... + fr: Description ... + + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 40f6af60-b55b-4eee-a8db-71eec55fc8f5 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request closed + fr: Demande fermée + description: + en: Description ... + fr: Description ... + +prototype: + case: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + identity: ~ + identity_uuid: ~ + title: {} + description: {} + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/config.yaml b/app/fixtures/custom/cases/config.yaml new file mode 100644 index 00000000..4211289e --- /dev/null +++ b/app/fixtures/custom/cases/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 53d9deff-41a7-4c6c-a0c4-3e665d4bd29e + key: ds_api.user.username + value: system@system.ds + + - uuid: f130e85a-58c1-4526-acdb-8fb3d1698fde + key: ds_api.user.password + value: system + + - uuid: d3ca875c-c06f-4d10-a873-a9a2d0808f8c + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 72c96499-8311-40d9-a4a6-9b036fbe7a60 + key: ds_api.user.roles + value: [] + + - uuid: 42f12a81-9fd3-496c-8747-aa8b0be88271 + key: ds_api.user.identity.roles + value: [] + + - uuid: 364af5eb-6940-40bd-9056-447242d1a611 + key: ds_api.user.identity.type + value: System + + - uuid: 22cbae5e-3fd3-4c82-b6f2-6342f74b0666 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 33cb72c3-2788-4da5-a5f5-b49e233ba6d9 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/metadata.yaml b/app/fixtures/custom/cases/metadata.yaml new file mode 100644 index 00000000..323f4621 --- /dev/null +++ b/app/fixtures/custom/cases/metadata.yaml @@ -0,0 +1,21 @@ +objects: + - uuid: cbe162a4-e3c9-41fe-9fd9-8032e22d309b + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + title: + en: Case States + fr: États de cas + slug: case-states + type: case + data: + 1: Open + 2: Closed + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/system/parameter.yaml b/app/fixtures/custom/cases/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/cases/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/cases/system/tenant.yaml b/app/fixtures/custom/cases/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/cases/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/cms/access/anonymous/access.yaml b/app/fixtures/custom/cms/access/anonymous/access.yaml new file mode 100644 index 00000000..55ba1c16 --- /dev/null +++ b/app/fixtures/custom/cms/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: a7dc662e-bd68-4f93-ab9c-a11f087cdf61 + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/anonymous/permission.yaml b/app/fixtures/custom/cms/access/anonymous/permission.yaml new file mode 100644 index 00000000..340ab70d --- /dev/null +++ b/app/fixtures/custom/cms/access/anonymous/permission.yaml @@ -0,0 +1,39 @@ +objects: + - access: a7dc662e-bd68-4f93-ab9c-a11f087cdf61 # Anonymous + scope: + type: owner + entity: BusinessUnit + entity_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + key: + - data + - data_uuid + - data_slug + - data_title + - data_data + - file + - file_uuid + - file_slug + - file_title + - file_description + - file_presentation + - file_type + - text + - text_uuid + - text_slug + - text_title + - text_value + - page + - page_uuid + - page_slug + - page_title + - page_description + - content + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/individual/access.yaml b/app/fixtures/custom/cms/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/cms/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/individual/permission.yaml b/app/fixtures/custom/cms/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cms/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/organization/access.yaml b/app/fixtures/custom/cms/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/cms/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/organization/permission.yaml b/app/fixtures/custom/cms/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cms/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/role/access.yaml b/app/fixtures/custom/cms/access/role/access.yaml new file mode 100644 index 00000000..965bb203 --- /dev/null +++ b/app/fixtures/custom/cms/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: ddcaa3b8-ecce-41be-be45-1669c6748d63 + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 70368994-823b-4096-9776-675253d224a2 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: f32d6396-9c64-4f5c-822b-180661e4d640 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: b9efd3b4-8318-43d0-81c5-a4727fd9e583 + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: b2b4adf7-c2a4-4cc4-a5f4-1f36184eb93b + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 16c36983-7bdc-47aa-b5ac-a8be10f2e882 + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: 1058ba1f-d01c-4c4b-a3e9-e0c5d3f6ae28 + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/role/permission.yaml b/app/fixtures/custom/cms/access/role/permission.yaml new file mode 100644 index 00000000..a85de422 --- /dev/null +++ b/app/fixtures/custom/cms/access/role/permission.yaml @@ -0,0 +1,180 @@ +objects: + - access: ddcaa3b8-ecce-41be-be45-1669c6748d63 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: ddcaa3b8-ecce-41be-be45-1669c6748d63 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: ddcaa3b8-ecce-41be-be45-1669c6748d63 # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 70368994-823b-4096-9776-675253d224a2 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - data + - file + - text + - page + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 70368994-823b-4096-9776-675253d224a2 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - data_property + - file_property + - text_property + - page_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: f32d6396-9c64-4f5c-822b-180661e4d640 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - data + - file + - text + - page + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: f32d6396-9c64-4f5c-822b-180661e4d640 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - data_property + - file_property + - text_property + - page_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: b9efd3b4-8318-43d0-81c5-a4727fd9e583 # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - data + - data_property + - file + - file_property + - text + - text_property + - page + - page_property + - metadata + - metadata_property + - content + attributes: [BROWSE, READ] + + - access: b2b4adf7-c2a4-4cc4-a5f4-1f36184eb93b # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - data + - data_property + - file + - file_property + - text + - text_property + - page + - page_property + - metadata + - metadata_property + - content + attributes: [BROWSE, READ] + + - access: 16c36983-7bdc-47aa-b5ac-a8be10f2e882 # Individual + scope: + type: owner + entity: BusinessUnit + entity_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + key: + - data + - data_uuid + - data_slug + - data_title + - data_data + - file + - file_uuid + - file_slug + - file_title + - file_description + - file_presentation + - file_type + - text + - text_uuid + - text_slug + - text_title + - text_value + - page + - page_uuid + - page_slug + - page_title + - page_description + - content + attributes: [BROWSE, READ] + + - access: 1058ba1f-d01c-4c4b-a3e9-e0c5d3f6ae28 # Organization + scope: + type: owner + entity: BusinessUnit + entity_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + key: + - data + - data_uuid + - data_slug + - data_title + - data_data + - file + - file_uuid + - file_slug + - file_title + - file_description + - file_presentation + - file_type + - text + - text_uuid + - text_slug + - text_title + - text_value + - page + - page_uuid + - page_slug + - page_title + - page_description + - content + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/staff/access.yaml b/app/fixtures/custom/cms/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/cms/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/staff/permission.yaml b/app/fixtures/custom/cms/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cms/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/system/access.yaml b/app/fixtures/custom/cms/access/system/access.yaml new file mode 100644 index 00000000..0126f122 --- /dev/null +++ b/app/fixtures/custom/cms/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: bf4c9046-2107-4fc7-859d-955f5c1605e4 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/system/permission.yaml b/app/fixtures/custom/cms/access/system/permission.yaml new file mode 100644 index 00000000..08f42805 --- /dev/null +++ b/app/fixtures/custom/cms/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: bf4c9046-2107-4fc7-859d-955f5c1605e4 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: bf4c9046-2107-4fc7-859d-955f5c1605e4 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: bf4c9046-2107-4fc7-859d-955f5c1605e4 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/config.yaml b/app/fixtures/custom/cms/config.yaml new file mode 100644 index 00000000..68ea7baf --- /dev/null +++ b/app/fixtures/custom/cms/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: a69a3398-804f-4749-9a76-0e06a76104c8 + key: ds_api.user.username + value: system@system.ds + + - uuid: a2a5a136-28c8-4650-9063-d58b4b197d15 + key: ds_api.user.password + value: system + + - uuid: c7c9e520-528e-4b2f-b6cc-9e3222fad426 + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 1b99b4b7-9e80-4407-841f-412b466c145e + key: ds_api.user.roles + value: [] + + - uuid: 84a5b4f1-3085-4c1d-971e-944d2d6bdebd + key: ds_api.user.identity.roles + value: [] + + - uuid: 7dba20cd-34ae-4cee-9e66-6bf5c1dbb8b9 + key: ds_api.user.identity.type + value: System + + - uuid: 737d3810-de37-4b42-8189-106757216f0b + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 945f863d-dd5d-4775-8c86-74ee2593c4cb + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/data.yaml b/app/fixtures/custom/cms/data.yaml new file mode 100644 index 00000000..4f131c4e --- /dev/null +++ b/app/fixtures/custom/cms/data.yaml @@ -0,0 +1,27 @@ +objects: + - uuid: 0eaffe4d-f62b-4514-b16c-11925ed3c996 + owner_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + slug: road-classifications + title: + en: Road Classifications + fr: Classifications routières + data: + en: + city-freeway: City Freeway + arterial-roads: Arterial Roads + major-collector-and-collector-roads: Major Collector and Collector Roads + local-roads: Local Roads + fr: + city-freeway: Autoroute de ville + arterial-roads: Artères + collector-roads: Routes collectrices et routes collectrices principales + local-roads: Rues locales + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + slug: ~ + title: {} + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/file.yaml b/app/fixtures/custom/cms/file.yaml new file mode 100644 index 00000000..53b59ef0 --- /dev/null +++ b/app/fixtures/custom/cms/file.yaml @@ -0,0 +1,25 @@ +objects: + - uuid: 19566a70-72d3-4f3b-92ec-df5c84e66a19 + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + slug: admin-logo + title: + en: Logo + fr: Logo + description: + en: The Admin logo. + fr: Le logo du Admin. + presentation: + en: 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 + fr: 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 + type: image/png + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + slug: ~ + title: {} + description: {} + presentation: {} + type: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/metadata.yaml b/app/fixtures/custom/cms/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/cms/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/system/parameter.yaml b/app/fixtures/custom/cms/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/cms/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/cms/system/tenant.yaml b/app/fixtures/custom/cms/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/cms/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/cms/text.yaml b/app/fixtures/custom/cms/text.yaml new file mode 100644 index 00000000..36a90f91 --- /dev/null +++ b/app/fixtures/custom/cms/text.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: 890d5e21-a06e-4e85-950c-1ca6ab4dd693 + owner_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + slug: portal-title + title: + en: Portal Title + fr: Titre du portail + value: + en: Merrimill + fr: Merrimill + + - uuid: 2dd97844-ccb9-4797-a6f7-0e2929e7ed06 + owner_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + slug: portal-description + title: + en: Portal Description + fr: Description du portail + value: + en: Merrimill Public Services + fr: Services publics Merrimill + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + slug: ~ + title: {} + value: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/anonymous/access.yaml b/app/fixtures/custom/forms/access/anonymous/access.yaml new file mode 100644 index 00000000..6b899c0b --- /dev/null +++ b/app/fixtures/custom/forms/access/anonymous/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/anonymous/permission.yaml b/app/fixtures/custom/forms/access/anonymous/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/forms/access/anonymous/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/individual/access.yaml b/app/fixtures/custom/forms/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/forms/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/individual/permission.yaml b/app/fixtures/custom/forms/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/forms/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/organization/access.yaml b/app/fixtures/custom/forms/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/forms/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/organization/permission.yaml b/app/fixtures/custom/forms/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/forms/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/role/access.yaml b/app/fixtures/custom/forms/access/role/access.yaml new file mode 100644 index 00000000..54d08244 --- /dev/null +++ b/app/fixtures/custom/forms/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: 7f697307-5b58-42e9-970f-b85e8b02cd7c + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 0b865e5d-f454-4755-a449-65c4a6e20d85 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: a0a66a10-bf97-4abb-bde1-3f5dd6a99e21 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: 61c40554-df09-4053-a778-25bc6e2093c5 + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: b23d13bf-8132-46d9-a616-e22f1e42fe13 + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 7fca09bc-6378-4b82-be9c-14f73c1d367a + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: eaf0f806-2f51-4351-89a6-02d0bc8d0ad8 + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/role/permission.yaml b/app/fixtures/custom/forms/access/role/permission.yaml new file mode 100644 index 00000000..8282f040 --- /dev/null +++ b/app/fixtures/custom/forms/access/role/permission.yaml @@ -0,0 +1,118 @@ +objects: + - access: 7f697307-5b58-42e9-970f-b85e8b02cd7c # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 7f697307-5b58-42e9-970f-b85e8b02cd7c # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 7f697307-5b58-42e9-970f-b85e8b02cd7c # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 0b865e5d-f454-4755-a449-65c4a6e20d85 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - form + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 0b865e5d-f454-4755-a449-65c4a6e20d85 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - form_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: a0a66a10-bf97-4abb-bde1-3f5dd6a99e21 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - form + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: a0a66a10-bf97-4abb-bde1-3f5dd6a99e21 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - form_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 61c40554-df09-4053-a778-25bc6e2093c5 # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - form + - form_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: b23d13bf-8132-46d9-a616-e22f1e42fe13 # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - form + - form_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 7fca09bc-6378-4b82-be9c-14f73c1d367a # Individual + scope: + type: session + key: + - form + - form_uuid + - form_type + - form_config + - form_title + - form_description + - form_data + attributes: [BROWSE, READ] + + - access: eaf0f806-2f51-4351-89a6-02d0bc8d0ad8 # Organization + scope: + type: session + key: + - form + - form_uuid + - form_type + - form_config + - form_title + - form_description + - form_data + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/staff/access.yaml b/app/fixtures/custom/forms/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/forms/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/staff/permission.yaml b/app/fixtures/custom/forms/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/forms/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/system/access.yaml b/app/fixtures/custom/forms/access/system/access.yaml new file mode 100644 index 00000000..4e5a2a43 --- /dev/null +++ b/app/fixtures/custom/forms/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 6012d86d-ff87-41db-afe2-315877039105 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/system/permission.yaml b/app/fixtures/custom/forms/access/system/permission.yaml new file mode 100644 index 00000000..1c840621 --- /dev/null +++ b/app/fixtures/custom/forms/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 6012d86d-ff87-41db-afe2-315877039105 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 6012d86d-ff87-41db-afe2-315877039105 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 6012d86d-ff87-41db-afe2-315877039105 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/config.yaml b/app/fixtures/custom/forms/config.yaml new file mode 100644 index 00000000..dc3a106c --- /dev/null +++ b/app/fixtures/custom/forms/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 77744749-6ad4-48d5-93dc-f0be996ee1e6 + key: ds_api.user.username + value: system@system.ds + + - uuid: 06e376ec-9c8e-4597-aefc-a495520952d7 + key: ds_api.user.password + value: system + + - uuid: 9b91116e-0b13-4163-965d-80fdb3b2c50d + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: c617dd89-1e2f-4bd7-aabe-816cfa629fdf + key: ds_api.user.roles + value: [] + + - uuid: 82712f0b-3ef2-480c-a66a-02d40e89c2b4 + key: ds_api.user.identity.roles + value: [] + + - uuid: a98b5683-c356-46db-891b-4e1adde45afd + key: ds_api.user.identity.type + value: System + + - uuid: 90787877-951c-4175-9503-7556d6ada287 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 269a6593-0f9a-4efb-82a1-e000972cf994 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/form.yaml b/app/fixtures/custom/forms/form.yaml new file mode 100644 index 00000000..d6656ea0 --- /dev/null +++ b/app/fixtures/custom/forms/form.yaml @@ -0,0 +1,47 @@ +objects: + - uuid: b27e13a7-7820-41fd-a7ff-50eaefd3b028 + type: formio + config: + title: Pothole Report + display: form + type: form + name: pothole-report + path: pothole-report + tags: [pothole] + components: forms/formio/components/pothole-report.json + submissionAccess: forms/formio/submission_access/anonymous.json + title: + en: Pothole Report + fr: Signaler un nids de poule + description: + en: Description ... + fr: Description ... + + - uuid: 53e1e95f-0c81-4a1f-b502-bec3084202e8 + type: formio + config: + title: Pothole Report Review + display: form + type: form + name: pothole-report-review + path: pothole-report-review + tags: [pothole] + components: forms/formio/components/pothole-report-review.json + submissionAccess: forms/formio/submission_access/anonymous.json + title: + en: Pothole Report Review + fr: Examen du signalement d'un nids de poule + description: + en: Description ... + fr: Description ... + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + type: ~ + config: {} + title: {} + description: {} + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/forms/formio/components/pothole-report-review.json b/app/fixtures/custom/forms/forms/formio/components/pothole-report-review.json new file mode 100644 index 00000000..5676628f --- /dev/null +++ b/app/fixtures/custom/forms/forms/formio/components/pothole-report-review.json @@ -0,0 +1,88 @@ +[ + { + "properties": {}, + "tags": [], + "labelPosition": "top", + "hideLabel": false, + "type": "textfield", + "conditional": { + "eq": "", + "when": null, + "show": "" + }, + "validate": { + "customPrivate": false, + "custom": "", + "pattern": "", + "maxLength": "", + "minLength": "", + "required": false + }, + "clearOnHide": true, + "hidden": false, + "persistent": true, + "unique": false, + "protected": false, + "defaultValue": "", + "multiple": false, + "suffix": "", + "prefix": "", + "placeholder": "", + "key": "description", + "label": "Description", + "inputMask": "", + "inputType": "text", + "tableView": true, + "input": true + }, + { + "conditional": { + "eq": "", + "when": null, + "show": "" + }, + "optionsLabelPosition": "right", + "labelPosition": "top", + "hideLabel": false, + "type": "selectboxes", + "validate": { + "required": true + }, + "clearOnHide": true, + "hidden": false, + "persistent": true, + "protected": false, + "inline": false, + "values": [ + { + "shortcut": "", + "label": "yes", + "value": "yes" + }, + { + "shortcut": "", + "label": "no", + "value": "no" + } + ], + "key": "approved", + "label": "Approved", + "tableView": true, + "input": true + }, + { + "hideLabel": false, + "type": "button", + "theme": "primary", + "disableOnInvalid": false, + "action": "submit", + "block": false, + "rightIcon": "", + "leftIcon": "", + "size": "md", + "key": "submit", + "tableView": false, + "label": "Submit", + "input": true + } +] \ No newline at end of file diff --git a/app/fixtures/custom/forms/forms/formio/components/pothole-report.json b/app/fixtures/custom/forms/forms/formio/components/pothole-report.json new file mode 100644 index 00000000..4f663d6c --- /dev/null +++ b/app/fixtures/custom/forms/forms/formio/components/pothole-report.json @@ -0,0 +1,53 @@ +[ + { + "input": true, + "tableView": true, + "inputType": "text", + "inputMask": "", + "label": "Description", + "key": "description", + "placeholder": "", + "prefix": "", + "suffix": "", + "multiple": false, + "defaultValue": "", + "protected": false, + "unique": false, + "persistent": true, + "hidden": false, + "clearOnHide": true, + "validate": { + "required": true, + "minLength": "", + "maxLength": "", + "pattern": "", + "custom": "", + "customPrivate": false + }, + "conditional": { + "show": "", + "when": null, + "eq": "" + }, + "type": "textfield", + "hideLabel": false, + "labelPosition": "top", + "tags": [], + "properties": {} + }, + { + "input": true, + "label": "Submit", + "tableView": false, + "key": "submit", + "size": "md", + "leftIcon": "", + "rightIcon": "", + "block": false, + "action": "submit", + "disableOnInvalid": false, + "theme": "primary", + "type": "button", + "hideLabel": false + } +] \ No newline at end of file diff --git a/app/fixtures/custom/forms/forms/formio/submission_access/anonymous.json b/app/fixtures/custom/forms/forms/formio/submission_access/anonymous.json new file mode 100644 index 00000000..5261b633 --- /dev/null +++ b/app/fixtures/custom/forms/forms/formio/submission_access/anonymous.json @@ -0,0 +1,36 @@ +[ + { + "type": "create_all", + "roles": [] + }, + { + "type": "read_all", + "roles": [] + }, + { + "type": "update_all", + "roles": [] + }, + { + "type": "delete_all", + "roles": [] + }, + { + "type": "create_own", + "roles": [ + "anonymous" + ] + }, + { + "type": "read_own", + "roles": [] + }, + { + "type": "update_own", + "roles": [] + }, + { + "type": "delete_own", + "roles": [] + } +] \ No newline at end of file diff --git a/app/fixtures/custom/forms/metadata.yaml b/app/fixtures/custom/forms/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/forms/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/system/parameter.yaml b/app/fixtures/custom/forms/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/forms/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/forms/system/tenant.yaml b/app/fixtures/custom/forms/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/forms/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/identities/access/anonymous/access.yaml b/app/fixtures/custom/identities/access/anonymous/access.yaml new file mode 100644 index 00000000..6b899c0b --- /dev/null +++ b/app/fixtures/custom/identities/access/anonymous/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/anonymous/permission.yaml b/app/fixtures/custom/identities/access/anonymous/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/identities/access/anonymous/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/individual/access.yaml b/app/fixtures/custom/identities/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/identities/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/individual/permission.yaml b/app/fixtures/custom/identities/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/identities/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/organization/access.yaml b/app/fixtures/custom/identities/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/identities/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/organization/permission.yaml b/app/fixtures/custom/identities/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/identities/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/role/access.yaml b/app/fixtures/custom/identities/access/role/access.yaml new file mode 100644 index 00000000..ac09450e --- /dev/null +++ b/app/fixtures/custom/identities/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: 10269f62-8ffa-4c0b-9693-0971a8fced15 + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 71b0c940-3b9b-4bc1-bdbc-e9ac9ad709b4 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: 7111354b-a59c-4415-90bb-3e22ba15b3b9 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: a1e7a267-763b-4b7d-b8ee-5a73d5e7adee + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 9bae5401-a9ac-4813-a23f-42eb16928d87 + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 197231a2-1ad7-4527-8d4e-e78e4ad0efa3 + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: 62d2fa06-88c9-45b3-a8da-105ae7cf21cc + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/role/permission.yaml b/app/fixtures/custom/identities/access/role/permission.yaml new file mode 100644 index 00000000..a3bf6c93 --- /dev/null +++ b/app/fixtures/custom/identities/access/role/permission.yaml @@ -0,0 +1,214 @@ +objects: + - access: 10269f62-8ffa-4c0b-9693-0971a8fced15 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 10269f62-8ffa-4c0b-9693-0971a8fced15 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 10269f62-8ffa-4c0b-9693-0971a8fced15 # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 71b0c940-3b9b-4bc1-bdbc-e9ac9ad709b4 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - anonymous + - anonymous_persona + - individual + - individual_persona + - organization + - organization_persona + - staff + - staff_persona + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 71b0c940-3b9b-4bc1-bdbc-e9ac9ad709b4 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - anonymous_property + - anonymous_persona_property + - individual_property + - individual_persona_property + - organization_property + - organization_persona_property + - staff_property + - staff_persona_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 7111354b-a59c-4415-90bb-3e22ba15b3b9 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - anonymous + - anonymous_persona + - individual + - individual_persona + - organization + - organization_persona + - staff + - staff_persona + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 7111354b-a59c-4415-90bb-3e22ba15b3b9 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - anonymous_property + - anonymous_persona_property + - individual_property + - individual_persona_property + - organization_property + - organization_persona_property + - staff_property + - staff_persona_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: a1e7a267-763b-4b7d-b8ee-5a73d5e7adee # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - anonymous + - anonymous_property + - anonymous_persona + - anonymous_persona_property + - individual + - individual_property + - individual_persona + - individual_persona_property + - organization + - organization_property + - organization_persona + - organization_persona_property + - staff + - staff_property + - staff_persona + - staff_persona_property + - business_unit + - business_unit_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 9bae5401-a9ac-4813-a23f-42eb16928d87 # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - anonymous + - anonymous_property + - anonymous_persona + - anonymous_persona_property + - individual + - individual_property + - individual_persona + - individual_persona_property + - organization + - organization_property + - organization_persona + - organization_persona_property + - staff + - staff_property + - staff_persona + - staff_persona_property + - business_unit + - business_unit_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 197231a2-1ad7-4527-8d4e-e78e4ad0efa3 # Individual + scope: + type: session + key: + - individual + - individual_uuid + - individual_created_at + - individual_persona + - individual_persona_uuid + - individual_persona_created_at + - individual_persona_title + - individual_persona_data + - individual_persona_version + attributes: [BROWSE, READ] + + - access: 197231a2-1ad7-4527-8d4e-e78e4ad0efa3 # Individual + scope: + type: session + key: + - individual_persona + attributes: [EDIT, ADD] + + - access: 197231a2-1ad7-4527-8d4e-e78e4ad0efa3 # Individual + scope: + type: session + key: + - individual_persona_title + - individual_persona_data + - individual_persona_version + attributes: [EDIT] + + - access: 62d2fa06-88c9-45b3-a8da-105ae7cf21cc # Organization + scope: + type: session + key: + - organization + - organization_uuid + - organization_created_at + - organization_persona + - organization_persona_uuid + - organization_persona_created_at + - organization_persona_title + - organization_persona_data + - organization_persona_version + attributes: [BROWSE, READ] + + - access: 62d2fa06-88c9-45b3-a8da-105ae7cf21cc # Organization + scope: + type: session + key: + - organization_persona + attributes: [EDIT, ADD] + + - access: 62d2fa06-88c9-45b3-a8da-105ae7cf21cc # Organization + scope: + type: session + key: + - organization_persona_title + - organization_persona_data + - organization_persona_version + attributes: [EDIT] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/staff/access.yaml b/app/fixtures/custom/identities/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/identities/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/staff/permission.yaml b/app/fixtures/custom/identities/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/identities/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/system/access.yaml b/app/fixtures/custom/identities/access/system/access.yaml new file mode 100644 index 00000000..969453d1 --- /dev/null +++ b/app/fixtures/custom/identities/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: cfe91139-68e7-4ae9-87f7-df480fd18edb + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/system/permission.yaml b/app/fixtures/custom/identities/access/system/permission.yaml new file mode 100644 index 00000000..304523fb --- /dev/null +++ b/app/fixtures/custom/identities/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: cfe91139-68e7-4ae9-87f7-df480fd18edb # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: cfe91139-68e7-4ae9-87f7-df480fd18edb # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: cfe91139-68e7-4ae9-87f7-df480fd18edb # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/business_unit.yaml b/app/fixtures/custom/identities/business_unit.yaml new file mode 100644 index 00000000..842b3aaa --- /dev/null +++ b/app/fixtures/custom/identities/business_unit.yaml @@ -0,0 +1,22 @@ +objects: + - uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: + en: Administration + fr: Administration + + - uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + title: + en: Backoffice + fr: Bureau + + - uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + title: + en: Portal + fr: Portail + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/config.yaml b/app/fixtures/custom/identities/config.yaml new file mode 100644 index 00000000..3fe6e8fd --- /dev/null +++ b/app/fixtures/custom/identities/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 1f866749-6d4b-4986-82a1-5d903643ff51 + key: ds_api.user.username + value: system@system.ds + + - uuid: 732051e5-95bf-46a9-8559-200212ea97da + key: ds_api.user.password + value: system + + - uuid: 5396d36b-89b4-4dce-a51c-a908ae1c2286 + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: c28242ab-2075-40a6-8ddd-b2b28b86cc25 + key: ds_api.user.roles + value: [] + + - uuid: 200f32a8-60c5-4c92-b1dc-7683ce2115bb + key: ds_api.user.identity.roles + value: [] + + - uuid: 88de736c-72f0-43b9-9aaa-19704962ad36 + key: ds_api.user.identity.type + value: System + + - uuid: 27ba4b08-d7b0-44ce-97bb-b4e049eadf3c + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 0ab21b15-0700-418d-9071-4da680200027 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/anonymous/identity.yaml b/app/fixtures/custom/identities/identity/anonymous/identity.yaml new file mode 100644 index 00000000..e53052c7 --- /dev/null +++ b/app/fixtures/custom/identities/identity/anonymous/identity.yaml @@ -0,0 +1,7 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/anonymous/persona.yaml b/app/fixtures/custom/identities/identity/anonymous/persona.yaml new file mode 100644 index 00000000..8f880cc0 --- /dev/null +++ b/app/fixtures/custom/identities/identity/anonymous/persona.yaml @@ -0,0 +1,12 @@ +objects: [] + +prototype: + anonymous: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + title: + en: Default + fr: Défaut + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/anonymous/role.yaml b/app/fixtures/custom/identities/identity/anonymous/role.yaml new file mode 100644 index 00000000..58cc6dac --- /dev/null +++ b/app/fixtures/custom/identities/identity/anonymous/role.yaml @@ -0,0 +1,10 @@ +objects: [] + +prototype: + anonymous: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + role: ~ + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/individual/identity.yaml b/app/fixtures/custom/identities/identity/individual/identity.yaml new file mode 100644 index 00000000..cf6965d9 --- /dev/null +++ b/app/fixtures/custom/identities/identity/individual/identity.yaml @@ -0,0 +1,8 @@ +objects: + - uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/individual/persona.yaml b/app/fixtures/custom/identities/identity/individual/persona.yaml new file mode 100644 index 00000000..5b1b7b16 --- /dev/null +++ b/app/fixtures/custom/identities/identity/individual/persona.yaml @@ -0,0 +1,28 @@ +objects: + - individual: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + uuid: 39fe9947-f75a-4103-a49c-7ece3602bb84 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + data: + suffix: Mr + firstName: Morgan + lastName: Cole + address: + street: 111 Wellington St + city: Ottawa + province: Ontario + country: Canada + postalCode: K1A 0A4 + phone: 1-888-111-2222 + email: morgan@individual.ds + birthDate: 1972-01-08 + +prototype: + individual: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + title: + en: Default + fr: Défaut + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/individual/role.yaml b/app/fixtures/custom/identities/identity/individual/role.yaml new file mode 100644 index 00000000..64160120 --- /dev/null +++ b/app/fixtures/custom/identities/identity/individual/role.yaml @@ -0,0 +1,12 @@ +objects: + - individual: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + uuid: e5e08d06-553f-4477-b998-0adcc9b3f9ac + +prototype: + individual: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + role: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/organization/identity.yaml b/app/fixtures/custom/identities/identity/organization/identity.yaml new file mode 100644 index 00000000..b282da40 --- /dev/null +++ b/app/fixtures/custom/identities/identity/organization/identity.yaml @@ -0,0 +1,8 @@ +objects: + - uuid: 5946a069-95d4-4536-9f78-41ca96316cc5 # Acme + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/organization/persona.yaml b/app/fixtures/custom/identities/identity/organization/persona.yaml new file mode 100644 index 00000000..46d9a124 --- /dev/null +++ b/app/fixtures/custom/identities/identity/organization/persona.yaml @@ -0,0 +1,28 @@ +objects: + - organization: 5946a069-95d4-4536-9f78-41ca96316cc5 # Acme + uuid: 393ee599-f2ac-42b5-b1d8-9c062fac490d + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + data: + name: Acme Corporation + description: The Acme Corporation is a fictional corporation. + businessNumber: 123456 + anniversary: 1999-01-01 + address: + street: 90 Wellington St + city: Ottawa + province: Ontario + country: Canada + postalCode: K1A 0A4 + phone: 1-888-111-2222 + email: acme@organization.ds + +prototype: + individual: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + title: + en: Default + fr: Défaut + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/organization/role.yaml b/app/fixtures/custom/identities/identity/organization/role.yaml new file mode 100644 index 00000000..a9454bb8 --- /dev/null +++ b/app/fixtures/custom/identities/identity/organization/role.yaml @@ -0,0 +1,12 @@ +objects: + - organization: 5946a069-95d4-4536-9f78-41ca96316cc5 # Acme + uuid: 1c8e635a-6b32-4941-9ee9-9756a6ad0931 + +prototype: + organization: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + role: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/staff/identity.yaml b/app/fixtures/custom/identities/identity/staff/identity.yaml new file mode 100644 index 00000000..f8bbaf61 --- /dev/null +++ b/app/fixtures/custom/identities/identity/staff/identity.yaml @@ -0,0 +1,32 @@ +objects: + - uuid: 6c344b4b-78d3-47c4-9d8b-e67217f46569 # Admin + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + business_units: + - 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + - 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + + - uuid: e9f3a831-048f-4cd3-92bf-2c77e6d34d1d # Elliot + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + - 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + + - uuid: 7281ef76-be00-42e4-ab67-fc7e0cc2e7ef # Devon + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + + - uuid: 38bf092a-b807-438f-8cc9-009fc12924cb # Remy + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + - 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + + - uuid: 3e94c60b-34c8-4355-91c9-4b246504f110 # Blair + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/staff/persona.yaml b/app/fixtures/custom/identities/identity/staff/persona.yaml new file mode 100644 index 00000000..d44e1b6c --- /dev/null +++ b/app/fixtures/custom/identities/identity/staff/persona.yaml @@ -0,0 +1,27 @@ +objects: + - staff: 6c344b4b-78d3-47c4-9d8b-e67217f46569 # Admin + uuid: 665da880-294d-41b8-9d05-3993e22c388d + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + + - staff: e9f3a831-048f-4cd3-92bf-2c77e6d34d1d # Elliot + uuid: b2ec9ff8-ac84-4bed-bbd6-521e30ac7b84 + + - staff: 7281ef76-be00-42e4-ab67-fc7e0cc2e7ef # Devon + uuid: 3a190a4a-7a1e-4f06-83b4-4811e8b2dc2d + + - staff: 38bf092a-b807-438f-8cc9-009fc12924cb # Remy + uuid: b94c2809-e9f6-418b-8acf-902c3dbbf6a8 + + - staff: 3e94c60b-34c8-4355-91c9-4b246504f110 # Blair + uuid: 70e0618c-f0d3-442a-9212-6ca10b52e9e9 + +prototype: + staff: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + title: + en: Default + fr: Défaut + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/staff/role.yaml b/app/fixtures/custom/identities/identity/staff/role.yaml new file mode 100644 index 00000000..737c0709 --- /dev/null +++ b/app/fixtures/custom/identities/identity/staff/role.yaml @@ -0,0 +1,36 @@ +objects: + - staff: 6c344b4b-78d3-47c4-9d8b-e67217f46569 # Admin + uuid: 06101454-9d73-4280-b059-e487d8de287f + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + role: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - staff: e9f3a831-048f-4cd3-92bf-2c77e6d34d1d # Elliot + uuid: 52005969-938a-48ce-a4ca-a24c18acd474 + role: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + - 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + + - staff: 7281ef76-be00-42e4-ab67-fc7e0cc2e7ef # Devon + uuid: fdc4afcd-457c-43d8-8d13-20e2ae291468 + role: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - staff: 38bf092a-b807-438f-8cc9-009fc12924cb # Remy + uuid: 27e82c4a-4f85-46d2-8785-5cee36aa9769 + role: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + - 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + + - staff: 3e94c60b-34c8-4355-91c9-4b246504f110 # Blair + uuid: 4fad6529-ec83-4e05-8218-91447cafeafc + role: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + +prototype: + staff: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + role: ~ + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/system/identity.yaml b/app/fixtures/custom/identities/identity/system/identity.yaml new file mode 100644 index 00000000..713cdc10 --- /dev/null +++ b/app/fixtures/custom/identities/identity/system/identity.yaml @@ -0,0 +1,9 @@ +objects: + - uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/system/role.yaml b/app/fixtures/custom/identities/identity/system/role.yaml new file mode 100644 index 00000000..9aa5c465 --- /dev/null +++ b/app/fixtures/custom/identities/identity/system/role.yaml @@ -0,0 +1,10 @@ +objects: [] + +prototype: + system: ~ + uuid: ~ + owner: System + owner_uuid: ~ + role: ~ + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/metadata.yaml b/app/fixtures/custom/identities/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/identities/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/role.yaml b/app/fixtures/custom/identities/role.yaml new file mode 100644 index 00000000..d6af516f --- /dev/null +++ b/app/fixtures/custom/identities/role.yaml @@ -0,0 +1,51 @@ +objects: + - uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee + title: + en: Administrator + fr: Administrateur + slug: administrator + + - uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 + title: + en: Manager + fr: Gérant + slug: manager + + - uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 + title: + en: Backoffice Manager + fr: Gérant d'office + slug: backoffice-manager + + - uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d + title: + en: Staff + fr: Personnel + slug: staff + + - uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e + title: + en: Backoffice Staff + fr: Personnel d'office + slug: backoffice-staff + + - uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 + title: + en: Individual + fr: Individuel + slug: individual + + - uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 + title: + en: Organization + fr: Organisation + slug: organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + permissions: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/system/parameter.yaml b/app/fixtures/custom/identities/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/identities/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/identities/system/tenant.yaml b/app/fixtures/custom/identities/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/identities/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/index.md b/app/fixtures/custom/index.md new file mode 100644 index 00000000..5fe3f136 --- /dev/null +++ b/app/fixtures/custom/index.md @@ -0,0 +1,128 @@ +# General + +A set of custom fixtures has been added to the Platform repository and can be found at `https://github.com/DigitalState/Platform/tree/release/0.18.0/app/fixtures`. In this particular example, the fixtures directory was named `custom`, but could be named whatever fits the context. + +These fixtures contains a complete set data for each entities, including each possible states, found in the DigitalState architecture. + + +# Using Custom Fixtures + +The custom fixtures can be loaded into each microservice databases by configuring the Ansible inventory correctly and running a couple of Ansible commands. + +## Inventory Configuration + +In order to indicate Ansible to use the custom fixtures instead of the dev fixtures, a configuration named `fixture` found in the inventory file `ansible/env/dev/vars/app.yml#11` should be set to `custom`. + +## Copy Fixtures + +After indicating Ansible to use the custom fixtures, an Ansible command needs to be ran to copy the custom fixtures directories to each microservices. + +`ansible-playbook -i inventory.yml app/database/fixture/create.yml` + +This command will copy each custom fixtures subdirectories (`custom/assets/*`, `custom/authentication/*`, `...`) to each microservices fixtures designated directory (`/app/srv/assets/api/config/fixtures/custom/*`, `...`) + +## Load Fixtures + +Once the custom fixtures are present in each microservices, an Ansible command can be ran to actually load the yaml-based fixtures into each microservices databases. + +`ansible-playbook -i inventory.yml app/database/fixture/load.yml` + +Since the `fixture` configuration is set to `custom`, Ansible will use the `custom` directory of fixtures found at `/app/srv/assets/api/config/fixtures/custom`, instead of the default `dev` directory found at `/app/srv/assets/api/config/fixtures/dev`. + + +# Data Summary + +This section contains a summary and description of the important data found in the custom fixtures. + +## Tenants + +Tenant (5a5dc71c-8f08-476f-b192-106637717974) + +The default tenant. + +## Business Units + +Administration (9df65eca-1e81-475b-8584-df6c357edf30) + +The Administration is a business unit meant to own administrative-level data. Such data includes configurations, metadata, access and permissions, business units, roles, etc. + +Only priviledged users such as administrators have full access to data owned by the Administration business unit. + +Backoffice (1efc9d23-111a-4f9a-b703-29df95e38a7e) + +The Backoffice is a business unit meant to own general-purpose data. Such data includes individuals and organizations, services, scenarios, submissions and any derived data such as cases, records, tasks, etc. + +Only priviledged users such as staff members have full access to data owned by the Backoffice business unit. Some users such as individuals and organizations may have read access. + +Technically, the Backoffice business unit could be divided into a more refined collection of business units, such as Environment, Construction, etc. However, to keep fixtures simple, only a wide Backoffice business unit is included. + +Portal (3709635c-5ab1-487b-84ea-23b6e282cc4d) + +The Portal is a business unit meant to own website-related data. Such data includes pages, texts, etc. This business unit is a perfect example of a more fine-grained categorization of owned data. + +Only priviledged useds such as staff members have full access to data owned by the Portal business unit. Some users such as anonymous, individuals and organizations have read access. + +# Roles + +Administrator (df31fa91-26d9-4ed8-a0f4-6aecc4252c57) + +The Administrator role gives read-write permissions to data owned by any business units. + +Manager (81330e07-6bdd-46a3-af8b-85553537c1fd) + +The Manager role gives read-write permissions to data owned by the Backoffice and Portal business units. The roles permissions are inherited from dynamic access cards with the Backoffice and Portal business units associated. + +Backoffice Manager (d8bb8807-4a64-4515-b16a-198c2e63cafc) + +The Backoffice Manager role gives read-write permissions to data owned by the Backoffice business unit. The roles permissions are inherited from static access cards with the Backoffice business unit hardcoded. + +Staff (ea27f3ad-8dec-4d5c-880a-758c7fbafd66) + +The Staff role gives read permissions to data owned by the Backoffice and Portal business units. The roles permissions are inherited from dynamic access cards with the Backoffice and Portal business units associated. + +Backoffice Agent (2217da69-b489-4938-b5f9-91fafda30f9f) + +The Backoffice Agent role gives read permissions to data owned by the Backoffice business unit. The roles permissions are inherited from static access cards with the Backoffice business unit hardcoded. + +Individual (344e62b9-d797-4285-ad49-ad95f93654e1) + +The Individual role gives read-write permissions to certain data owned by the Backoffice and Portal business units. The roles permissions are inherited from static access cards with the Backoffice and Portal business units associated. + +Organization (185330d2-9209-4714-92ee-60cdf29d1745) + +The Organization role gives read-write permissions to certain data owned by the Backoffice and Portal business units. The roles permissions are inherited from static access cards with the Backoffice and Portal business units associated. + +# Identities + +System (1d14cd3f-72cc-444b-8dc7-bbdba4815536) + +The System identity has direct access and permissions assigned. Its purpose is for cross-microservice communications. Login is disabled and its jwt token is only generated internally. + +Admin (6c344b4b-78d3-47c4-9d8b-e67217f46569) + +The Admin identity has the Admin role. It's purpose is to manage system configurations, business units, roles, etc. + +Elliot (e9f3a831-048f-4cd3-92bf-2c77e6d34d1d) + +Elliot holds a manager position and has the Manager role. His purpose is to manage users, services, scenarios across business units. + +Devon (7281ef76-be00-42e4-ab67-fc7e0cc2e7ef) + +Devon holds a manager position and has the Backoffice Manager role. His purpose is to manage users, services, scenarios from the Backoffice business unit. + +Remy (38bf092a-b807-438f-8cc9-009fc12924cb) + +Remy holds a staff position and has the Staff role. His purpose is to review submissions, cases, records across business units. + +Blair (3e94c60b-34c8-4355-91c9-4b246504f110) + +Blair holds an staff position and has the Backoffice Staff role. His purpose is to review submissions, cases, records from the Backoffice business unit. + +Morgan (2af16e03-bbce-4ec9-b73f-8f0468a93f4b) + +Morgan is an invidivual and has the Individual role. His purpose is to browse services and submit scenario submissions. + +Acme (5946a069-95d4-4536-9f78-41ca96316cc5) + +Acme is an organization and has the Organization role. Its purpose is to browse services and submit scenario submissions. + diff --git a/app/fixtures/custom/json.md b/app/fixtures/custom/json.md new file mode 100644 index 00000000..c5237ae7 --- /dev/null +++ b/app/fixtures/custom/json.md @@ -0,0 +1,68 @@ +Create a role that has Read permission on case and case status entities that belongs to Business units. + +`POST {identities}/roles` + +``` +{ + "owner": "BusinessUnit", + "ownerUuid": "c11c546e-bd01-47cf-97da-e25388357b5a", + "title": { + "en": "Auditor", + "fr": "Auditeur" + }, + "slug": "auditor", + "permissions": { + "cases": [ + { + "scope": { + "type": "owner", + "entity": "BusinessUnit", + "entityUuid": "*" + }, + "permissions": [ + { + "key": "case", + "attributes": ["BROWSE", "READ"] + }, + { + "key": "case_property", + "attributes": ["BROWSE", "READ"] + }, + { + "key": "case_status", + "attributes": ["BROWSE", "READ"] + }, + { + "key": "case_status_property", + "attributes": ["BROWSE", "READ"] + } + ] + } + ] + }, + "version": 1 +} +``` + +The role `b5ebefe1-b5fa-4b74-9c32-2563f56b99ff` created above is considered dynamic (`"entityUuid": "*"`). + +This means the role itself doesn't grant any Read access on cases just yet because it requires a role<->business_unit relation as well. + +This dynamic mechanism is what enables reusability of roles without having to define hard-coded access permissions (``"entityUuid": "a9d68bf7-5000-49fe-8b00-33dde235b327"`). + +Create a role<->business_unit relation. This grants the individual Morgan the Auditor role on business unit `Administration`. + +`POST {identities}/individual_roles` + +``` +{ + "owner": "BusinessUnit", + "ownerUuid": "a9d68bf7-5000-49fe-8b00-33dde235b327", + "individual": "/individuals/d0daa7e4-07d1-47e6-93f2-0629adaa3b49", + "role": "/roles/b5ebefe1-b5fa-4b74-9c32-2563f56b99ff", + "businessUnits": [ + "/business_units/a9d68bf7-5000-49fe-8b00-33dde235b327" + ], + "version": 1 +} +``` diff --git a/app/fixtures/custom/microservice/access/anonymous/access.yaml b/app/fixtures/custom/microservice/access/anonymous/access.yaml new file mode 100644 index 00000000..6b899c0b --- /dev/null +++ b/app/fixtures/custom/microservice/access/anonymous/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/anonymous/permission.yaml b/app/fixtures/custom/microservice/access/anonymous/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/microservice/access/anonymous/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/individual/access.yaml b/app/fixtures/custom/microservice/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/microservice/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/individual/permission.yaml b/app/fixtures/custom/microservice/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/microservice/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/organization/access.yaml b/app/fixtures/custom/microservice/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/microservice/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/organization/permission.yaml b/app/fixtures/custom/microservice/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/microservice/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/role/access.yaml b/app/fixtures/custom/microservice/access/role/access.yaml new file mode 100644 index 00000000..e08f6e0d --- /dev/null +++ b/app/fixtures/custom/microservice/access/role/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/role/permission.yaml b/app/fixtures/custom/microservice/access/role/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/microservice/access/role/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/staff/access.yaml b/app/fixtures/custom/microservice/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/microservice/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/staff/permission.yaml b/app/fixtures/custom/microservice/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/microservice/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/system/access.yaml b/app/fixtures/custom/microservice/access/system/access.yaml new file mode 100644 index 00000000..0b614dd9 --- /dev/null +++ b/app/fixtures/custom/microservice/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: f6ec046e-60bd-4136-bcdd-78dfc0bc0515 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/system/permission.yaml b/app/fixtures/custom/microservice/access/system/permission.yaml new file mode 100644 index 00000000..7d647c87 --- /dev/null +++ b/app/fixtures/custom/microservice/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: f6ec046e-60bd-4136-bcdd-78dfc0bc0515 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: f6ec046e-60bd-4136-bcdd-78dfc0bc0515 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: f6ec046e-60bd-4136-bcdd-78dfc0bc0515 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/config.yaml b/app/fixtures/custom/microservice/config.yaml new file mode 100644 index 00000000..8bf5bc5b --- /dev/null +++ b/app/fixtures/custom/microservice/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 0d2657d2-6d6b-4d58-9553-660919bff6e3 + key: ds_api.user.username + value: system@system.ds + + - uuid: 2b570527-9ec0-4f96-b940-f1142f2d86bf + key: ds_api.user.password + value: system + + - uuid: 4d460f83-608a-41a2-828f-98536045bbc8 + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: a2d4db9a-4d49-4252-9950-d6f991f557e1 + key: ds_api.user.roles + value: [] + + - uuid: f150b855-abca-407d-a2d0-c4351101bff5 + key: ds_api.user.identity.roles + value: [] + + - uuid: 389ac69d-8004-4590-9004-7c7877d7e378 + key: ds_api.user.identity.type + value: System + + - uuid: 5f5bf9d0-9fa2-4355-9210-6391e81bd4be + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 1b524353-d485-4fb3-9a84-1c3b67739517 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/metadata.yaml b/app/fixtures/custom/microservice/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/microservice/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/system/parameter.yaml b/app/fixtures/custom/microservice/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/microservice/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/microservice/system/tenant.yaml b/app/fixtures/custom/microservice/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/microservice/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/records/access/anonymous/access.yaml b/app/fixtures/custom/records/access/anonymous/access.yaml new file mode 100644 index 00000000..ace097cf --- /dev/null +++ b/app/fixtures/custom/records/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: f0ea347d-1503-46c5-825d-747c43a4936d + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/anonymous/permission.yaml b/app/fixtures/custom/records/access/anonymous/permission.yaml new file mode 100644 index 00000000..45daad8c --- /dev/null +++ b/app/fixtures/custom/records/access/anonymous/permission.yaml @@ -0,0 +1,22 @@ +objects: + - access: f0ea347d-1503-46c5-825d-747c43a4936d # Anonymous + scope: + type: session + key: + - record + - record_uuid + - record_title + - record_data + - record_association + - record_association_uuid + - record_association_entity + - record_association_entity_uuid + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/individual/access.yaml b/app/fixtures/custom/records/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/records/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/individual/permission.yaml b/app/fixtures/custom/records/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/records/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/organization/access.yaml b/app/fixtures/custom/records/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/records/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/organization/permission.yaml b/app/fixtures/custom/records/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/records/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/role/access.yaml b/app/fixtures/custom/records/access/role/access.yaml new file mode 100644 index 00000000..ffade870 --- /dev/null +++ b/app/fixtures/custom/records/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: d04bd8a2-b01a-4d9a-9f76-2f96676aa1b0 + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: ed608546-2ecf-4ff8-b5fb-624a9307b9c1 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: 60c514c0-d70b-4ffa-a59b-d7476429b735 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: b967ccf0-cddf-4106-962a-bc0dabaf53be + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 45dad085-8260-4c8f-ae6c-041300c544df + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 0e3b13f3-b074-4b8f-9401-b647ff9da9dd + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: 8345edce-381f-4121-9e64-68e96e025af0 + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/role/permission.yaml b/app/fixtures/custom/records/access/role/permission.yaml new file mode 100644 index 00000000..85430dd9 --- /dev/null +++ b/app/fixtures/custom/records/access/role/permission.yaml @@ -0,0 +1,128 @@ +objects: + - access: d04bd8a2-b01a-4d9a-9f76-2f96676aa1b0 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: d04bd8a2-b01a-4d9a-9f76-2f96676aa1b0 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: d04bd8a2-b01a-4d9a-9f76-2f96676aa1b0 # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: ed608546-2ecf-4ff8-b5fb-624a9307b9c1 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - record + - record_association + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: ed608546-2ecf-4ff8-b5fb-624a9307b9c1 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - record_property + - record_association_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 60c514c0-d70b-4ffa-a59b-d7476429b735 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - record + - record_association + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 60c514c0-d70b-4ffa-a59b-d7476429b735 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - record_property + - record_association_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: b967ccf0-cddf-4106-962a-bc0dabaf53be # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - record + - record_property + - record_association + - record_association_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 45dad085-8260-4c8f-ae6c-041300c544df # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - record + - record_property + - record_association + - record_association_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 0e3b13f3-b074-4b8f-9401-b647ff9da9dd # Individual + scope: + type: session + key: + - record + - record_uuid + - record_title + - record_data + - record_association + - record_association_uuid + - record_association_entity + - record_association_entity_uuid + attributes: [BROWSE, READ] + + - access: 8345edce-381f-4121-9e64-68e96e025af0 # Organization + scope: + type: session + key: + - record + - record_uuid + - record_title + - record_data + - record_association + - record_association_uuid + - record_association_entity + - record_association_entity_uuid + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/staff/access.yaml b/app/fixtures/custom/records/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/records/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/staff/permission.yaml b/app/fixtures/custom/records/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/records/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/system/access.yaml b/app/fixtures/custom/records/access/system/access.yaml new file mode 100644 index 00000000..95851cae --- /dev/null +++ b/app/fixtures/custom/records/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 78daddec-031a-416f-8494-43cec7552d18 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/system/permission.yaml b/app/fixtures/custom/records/access/system/permission.yaml new file mode 100644 index 00000000..a5e28fde --- /dev/null +++ b/app/fixtures/custom/records/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 78daddec-031a-416f-8494-43cec7552d18 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 78daddec-031a-416f-8494-43cec7552d18 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 78daddec-031a-416f-8494-43cec7552d18 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/config.yaml b/app/fixtures/custom/records/config.yaml new file mode 100644 index 00000000..cea04ad9 --- /dev/null +++ b/app/fixtures/custom/records/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 9d1f3611-be68-41d4-bdf4-3f402597f435 + key: ds_api.user.username + value: system@system.ds + + - uuid: 163ebbdf-efb2-4e24-b578-28f213160ce0 + key: ds_api.user.password + value: system + + - uuid: dec475d8-37c7-42a5-92d2-6ba4bcaa501b + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: dfeff874-1d3a-4a6b-8294-51f1761b2d05 + key: ds_api.user.roles + value: [] + + - uuid: 0c991ef4-2446-4633-bdbb-0fff85c368d5 + key: ds_api.user.identity.roles + value: [] + + - uuid: 6830ba7f-191e-49cf-a66c-b957bf612e9b + key: ds_api.user.identity.type + value: System + + - uuid: 1673d062-eb35-4f4d-8d08-d17306cc1c38 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 36be6508-5dd6-4ea3-b57a-6b598cc4e5ac + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/metadata.yaml b/app/fixtures/custom/records/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/records/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/record.yaml b/app/fixtures/custom/records/record.yaml new file mode 100644 index 00000000..c7e3acb8 --- /dev/null +++ b/app/fixtures/custom/records/record.yaml @@ -0,0 +1,28 @@ +objects: + - uuid: 38ca28f3-8e0f-452f-9546-cf45e1148d7e + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Animal License Form Submission + fr: Formulaire de soumission pour permis animalier + data: + type: dog + + - uuid: a9d92a4a-2de1-45ba-adf1-9b8b2a723512 + identity: Organization + identity_uuid: 5946a069-95d4-4536-9f78-41ca96316cc5 # Acme + title: + en: Animal License Form Submission + fr: Formulaire de soumission pour permis animalier + data: + type: cat + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: ~ + identity_uuid: ~ + title: {} + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/system/parameter.yaml b/app/fixtures/custom/records/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/records/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/records/system/tenant.yaml b/app/fixtures/custom/records/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/records/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/services/access/anonymous/access.yaml b/app/fixtures/custom/services/access/anonymous/access.yaml new file mode 100644 index 00000000..4d5a44b5 --- /dev/null +++ b/app/fixtures/custom/services/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: 6cc946b7-2ff1-4def-b203-aa361d128f9a + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/anonymous/permission.yaml b/app/fixtures/custom/services/access/anonymous/permission.yaml new file mode 100644 index 00000000..4e355623 --- /dev/null +++ b/app/fixtures/custom/services/access/anonymous/permission.yaml @@ -0,0 +1,45 @@ +objects: + - access: 6cc946b7-2ff1-4def-b203-aa361d128f9a # Anonymous + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category + - category_uuid + - category_title + - category_description + - category_presentation + - category_data + - service + - service_uuid + - service_title + - service_description + - service_presentation + - service_data + - scenario + - scenario_uuid + - scenario_title + - scenario_description + - scenario_presentation + - scenario_data + attributes: [BROWSE, READ] + + - access: 6cc946b7-2ff1-4def-b203-aa361d128f9a # Anonymous + scope: + type: session + key: + - submission + - submission_uuid + - submission_created_at + - submission_scenario + - submission_data + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/individual/access.yaml b/app/fixtures/custom/services/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/services/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/individual/permission.yaml b/app/fixtures/custom/services/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/services/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/organization/access.yaml b/app/fixtures/custom/services/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/services/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/organization/permission.yaml b/app/fixtures/custom/services/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/services/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/role/access.yaml b/app/fixtures/custom/services/access/role/access.yaml new file mode 100644 index 00000000..4ec3bbb6 --- /dev/null +++ b/app/fixtures/custom/services/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: de1a56b6-3da7-42a6-bea4-0f7d3e3e77d0 + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 1b842b28-dc35-4c87-b08e-96407b2ee939 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: 96aad66e-0dba-4829-b626-9540f97fdad9 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: d8c12375-afe5-4523-a46b-3ef5630d566e + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: f4d7dcce-870e-4290-8d13-99cb273f90bc + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 7e7b7c0b-1a20-4deb-92ff-bd7a7117e730 + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: fcb10ed4-b6b9-4542-95be-bad277569cb1 + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/role/permission.yaml b/app/fixtures/custom/services/access/role/permission.yaml new file mode 100644 index 00000000..862aadd3 --- /dev/null +++ b/app/fixtures/custom/services/access/role/permission.yaml @@ -0,0 +1,194 @@ +objects: + - access: de1a56b6-3da7-42a6-bea4-0f7d3e3e77d0 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: de1a56b6-3da7-42a6-bea4-0f7d3e3e77d0 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: de1a56b6-3da7-42a6-bea4-0f7d3e3e77d0 # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 1b842b28-dc35-4c87-b08e-96407b2ee939 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - category + - service + - scenario + - submission + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 1b842b28-dc35-4c87-b08e-96407b2ee939 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - category_property + - service_property + - scenario_property + - submission_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 96aad66e-0dba-4829-b626-9540f97fdad9 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category + - service + - scenario + - submission + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 96aad66e-0dba-4829-b626-9540f97fdad9 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category_property + - service_property + - scenario_property + - submission_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: d8c12375-afe5-4523-a46b-3ef5630d566e # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - category + - category_property + - service + - service_property + - scenario + - scenario_property + - submission + - submission_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: f4d7dcce-870e-4290-8d13-99cb273f90bc # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category + - category_property + - service + - service_property + - scenario + - scenario_property + - submission + - submission_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 7e7b7c0b-1a20-4deb-92ff-bd7a7117e730 # Individual + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category + - category_uuid + - category_title + - category_description + - category_presentation + - category_data + - service + - service_uuid + - service_title + - service_description + - service_presentation + - service_data + - scenario + - scenario_uuid + - scenario_title + - scenario_description + - scenario_presentation + - scenario_data + - scenario_type + - scenario_data + attributes: [BROWSE, READ] + + - access: 7e7b7c0b-1a20-4deb-92ff-bd7a7117e730 # Individual + scope: + type: session + key: + - submission + - submission_uuid + - submission_created_at + - submission_scenario + - submission_data + attributes: [BROWSE, READ] + + - access: fcb10ed4-b6b9-4542-95be-bad277569cb1 # Organization + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category + - category_uuid + - category_title + - category_description + - category_presentation + - category_data + - service + - service_uuid + - service_title + - service_description + - service_presentation + - service_data + - scenario + - scenario_uuid + - scenario_title + - scenario_description + - scenario_presentation + - scenario_data + - scenario_type + - scenario_data + attributes: [BROWSE, READ] + + - access: fcb10ed4-b6b9-4542-95be-bad277569cb1 # Organization + scope: + type: session + key: + - submission + - submission_uuid + - submission_created_at + - submission_scenario + - submission_data + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/staff/access.yaml b/app/fixtures/custom/services/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/services/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/staff/permission.yaml b/app/fixtures/custom/services/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/services/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/system/access.yaml b/app/fixtures/custom/services/access/system/access.yaml new file mode 100644 index 00000000..f8a9bd52 --- /dev/null +++ b/app/fixtures/custom/services/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: d2cc6206-d3e4-40ef-96b7-621c7b6d0a11 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/system/permission.yaml b/app/fixtures/custom/services/access/system/permission.yaml new file mode 100644 index 00000000..e5aee355 --- /dev/null +++ b/app/fixtures/custom/services/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: d2cc6206-d3e4-40ef-96b7-621c7b6d0a11 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: d2cc6206-d3e4-40ef-96b7-621c7b6d0a11 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: d2cc6206-d3e4-40ef-96b7-621c7b6d0a11 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/category.yaml b/app/fixtures/custom/services/category.yaml new file mode 100644 index 00000000..69755716 --- /dev/null +++ b/app/fixtures/custom/services/category.yaml @@ -0,0 +1,45 @@ +objects: + - uuid: 843aa477-4c0d-4505-a53c-a3a642646a9b + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + slug: infrastructure + title: + en: Infrastructure + fr: Infrastructure + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Presentation ... + services: + - 4a06ea0c-705a-4481-bb9e-befe7ca0ce47 # Report a Pothole + - e73b1d83-b660-4617-8c94-e00eea5df9db # Report a Graffiti + + - uuid: 499b9d3d-9604-49cb-ac3f-b70e505c0f80 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + slug: environment + title: + en: Environment + fr: Environnement + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Presentation ... + services: + - 851dee3d-9c56-46ac-96de-1397484f7679 # Recycle Bin Query + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + slug: ~ + title: {} + description: {} + presentation: {} + data: {} + enabled: true + weight: 0 + services: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/config.yaml b/app/fixtures/custom/services/config.yaml new file mode 100644 index 00000000..962f9a11 --- /dev/null +++ b/app/fixtures/custom/services/config.yaml @@ -0,0 +1,80 @@ +objects: + - uuid: 1a8dd057-1681-46ad-927e-0fd4898d4ffc + key: app.bpm.variables.api_url + value: api_url + + - uuid: e27b69a2-b79a-41f1-8385-13f2b3b2c00b + key: app.bpm.variables.api_user + value: api_user + + - uuid: a4130f75-6a0d-421f-a6ed-e283af003cce + key: app.bpm.variables.api_key + value: api_key + + - uuid: f1ff61a9-14b9-4550-8ff7-a4eb1f20ce87 + key: app.bpm.variables.service_uuid + value: service_uuid + + - uuid: d344f887-210d-4b64-aab0-b56df4bcf33f + key: app.bpm.variables.scenario_uuid + value: scenario_uuid + + - uuid: dc2e88d8-2b55-49a0-8a23-8f8e6a95e553 + key: app.bpm.variables.scenario_custom_data + value: scenario_custom_data + + - uuid: df52bff5-7091-48cb-bafb-e0a529e50e23 + key: app.bpm.variables.identity + value: identity + + - uuid: b340d880-92a1-455e-b5ba-f849501f28df + key: app.bpm.variables.identity_uuid + value: identity_uuid + + - uuid: bb029150-8b10-4778-8f0c-17d058382f03 + key: app.bpm.variables.submission_uuid + value: submission_uuid + + - uuid: 460e0882-a34d-4d43-abb5-6b0e6b144ac0 + key: app.bpm.variables.start_data + value: start_data + + - uuid: 134eae03-f89a-4dee-8710-af3ccdd103bd + key: ds_api.user.username + value: system@system.ds + + - uuid: 11bcfb34-baf5-4838-979c-b14add030fb3 + key: ds_api.user.password + value: system + + - uuid: 0341c60a-3c29-43ab-88c5-3a0b5297acbd + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 6c30bfbd-fcd7-479a-b20e-fadf14d06a4e + key: ds_api.user.roles + value: [] + + - uuid: 56127c8e-68a9-4c34-8875-578b4cd61172 + key: ds_api.user.identity.roles + value: [] + + - uuid: d5a5716c-3117-447e-b5d5-345063072062 + key: ds_api.user.identity.type + value: System + + - uuid: 797b3d2f-ea67-41c5-9818-177d71f9e809 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: e442ee0f-f089-4e92-8771-a089a0e06679 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/metadata.yaml b/app/fixtures/custom/services/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/services/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/scenario.yaml b/app/fixtures/custom/services/scenario.yaml new file mode 100644 index 00000000..c332a2c9 --- /dev/null +++ b/app/fixtures/custom/services/scenario.yaml @@ -0,0 +1,104 @@ +objects: + - uuid: 1ab18cea-0930-432a-99f1-beeb55a26b14 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + service: 4a06ea0c-705a-4481-bb9e-befe7ca0ce47 # Report a Pothole + type: bpm + config: + bpm: camunda + process_definition_key: pothole-report + slug: online + title: + en: Report a Pothole Online + fr: Signaler un nids de poule en-ligne + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Présentation ... + data: + en: + button_text: Activate + fr: + button_text: Activer + weight: 0 + + - uuid: 320c0e14-2965-4c19-8f33-68bbac206e6b + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + service: e73b1d83-b660-4617-8c94-e00eea5df9db # Report a Graffiti + type: bpm + config: + bpm: camunda + process_definition_key: graffiti-report + slug: online + title: + en: Report a Graffiti Online + fr: Signaler un graffiti en-ligne + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Présentation ... + data: + en: + button_text: Activate + fr: + button_text: Activer + weight: 0 + + - uuid: 67412965-28a2-48aa-8d1c-9bec7f91645f + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + service: 851dee3d-9c56-46ac-96de-1397484f7679 # Recycle Bin Query + type: bpm + config: + bpm: camunda + process_definition_key: recycle-bin-query + slug: online + title: + en: Recycle Bin Query Online + fr: Requête pour bac de recyclage en-ligne + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Présentation ... + data: + en: + button_text: Activate + fr: + button_text: Activer + weight: 0 + + - uuid: 81a75204-9547-45f9-92f7-44d7d1d0eec3 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + service: 851dee3d-9c56-46ac-96de-1397484f7679 # Recycle Bin Query + type: info + slug: info + title: + en: Recycle Bin Query By Mail + fr: Requête pour bac de recyclage par courrier + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Présentation ... + weight: 1 + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + service: ~ + type: ~ + config: {} + slug: ~ + title: {} + description: {} + presentation: {} + data: {} + enabled: true + weight: 0 + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/service.yaml b/app/fixtures/custom/services/service.yaml new file mode 100644 index 00000000..3d2f12d6 --- /dev/null +++ b/app/fixtures/custom/services/service.yaml @@ -0,0 +1,52 @@ +objects: + - uuid: 4a06ea0c-705a-4481-bb9e-befe7ca0ce47 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + slug: report-pothole + title: + en: Report a Pothole + fr: Signaler un nids de poule + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Presentation ... + + - uuid: e73b1d83-b660-4617-8c94-e00eea5df9db + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + slug: report-graffiti + title: + en: Report a Graffiti + fr: Signaler un graffiti + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Presentation ... + + - uuid: 851dee3d-9c56-46ac-96de-1397484f7679 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + slug: recycle-bin-query + title: + en: Recycle Bin Query + fr: Requête pour bac de recyclage + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Presentation ... + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + slug: ~ + title: {} + description: {} + presentation: {} + data: {} + enabled: true + weight: 0 + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/system/parameter.yaml b/app/fixtures/custom/services/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/services/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/services/system/tenant.yaml b/app/fixtures/custom/services/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/services/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/services/workflow/bpmn/pothole-report.bpmn b/app/fixtures/custom/services/workflow/bpmn/pothole-report.bpmn new file mode 100644 index 00000000..44b6a31c --- /dev/null +++ b/app/fixtures/custom/services/workflow/bpmn/pothole-report.bpmn @@ -0,0 +1,49 @@ + + + + + SequenceFlow_1q8gf6i + + + + SequenceFlow_1q8gf6i + SequenceFlow_0wplinc + + + SequenceFlow_0wplinc + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/app/fixtures/custom/services/workflow/deployment.yaml b/app/fixtures/custom/services/workflow/deployment.yaml new file mode 100644 index 00000000..aca402d7 --- /dev/null +++ b/app/fixtures/custom/services/workflow/deployment.yaml @@ -0,0 +1,10 @@ +objects: + - name: Pothole Report + files: + - bpmn/pothole-report.bpmn + +prototype: + name: ~ + source: ~ + files: [] + tenant_id: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/anonymous/access.yaml b/app/fixtures/custom/tasks/access/anonymous/access.yaml new file mode 100644 index 00000000..837764d4 --- /dev/null +++ b/app/fixtures/custom/tasks/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: 3e7300a8-8ebc-42e8-b229-96e56f26ead4 + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/anonymous/permission.yaml b/app/fixtures/custom/tasks/access/anonymous/permission.yaml new file mode 100644 index 00000000..eda9a1b0 --- /dev/null +++ b/app/fixtures/custom/tasks/access/anonymous/permission.yaml @@ -0,0 +1,30 @@ +objects: + - access: 3e7300a8-8ebc-42e8-b229-96e56f26ead4 # Anonymous + scope: + type: session + key: + - task + - task_uuid + - task_created_at + - task_due_at + - task_follow_up_at + - task_title + - task_description + - task_priority + - task_form + - submission + - submission_uuid + - submission_created_at + - submission_task + - submission_data + - submission_state + - submission_version + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/individual/access.yaml b/app/fixtures/custom/tasks/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/tasks/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/individual/permission.yaml b/app/fixtures/custom/tasks/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tasks/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/organization/access.yaml b/app/fixtures/custom/tasks/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/tasks/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/organization/permission.yaml b/app/fixtures/custom/tasks/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tasks/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/role/access.yaml b/app/fixtures/custom/tasks/access/role/access.yaml new file mode 100644 index 00000000..b38aec81 --- /dev/null +++ b/app/fixtures/custom/tasks/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: 2386a1f2-4dc6-4078-b42d-109db7258a4b + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 1a770d5c-13a4-4304-a328-f898ded37f49 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: f3f22d87-9edb-4b27-a6f2-a30181acf38f + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: 45bafff4-dae1-4cb1-bdcf-e71f347092f2 + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 7ce80f25-dfb5-4c12-ac8d-f04562403530 + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 785bd0d9-6b03-4d18-b6aa-914f268b5479 + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: 2ea1271a-fa3d-4448-a0d4-0a890bb3aeba + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/role/permission.yaml b/app/fixtures/custom/tasks/access/role/permission.yaml new file mode 100644 index 00000000..a1e01e19 --- /dev/null +++ b/app/fixtures/custom/tasks/access/role/permission.yaml @@ -0,0 +1,144 @@ +objects: + - access: 2386a1f2-4dc6-4078-b42d-109db7258a4b # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 2386a1f2-4dc6-4078-b42d-109db7258a4b # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 2386a1f2-4dc6-4078-b42d-109db7258a4b # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 1a770d5c-13a4-4304-a328-f898ded37f49 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - task + - submission + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 1a770d5c-13a4-4304-a328-f898ded37f49 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - task_property + - submission_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: f3f22d87-9edb-4b27-a6f2-a30181acf38f # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - task + - submission + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: f3f22d87-9edb-4b27-a6f2-a30181acf38f # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - task_property + - submission_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 45bafff4-dae1-4cb1-bdcf-e71f347092f2 # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - task + - task_property + - submission + - submission_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 7ce80f25-dfb5-4c12-ac8d-f04562403530 # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - task + - task_property + - submission + - submission_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 785bd0d9-6b03-4d18-b6aa-914f268b5479 # Individual + scope: + type: session + key: + - task + - task_uuid + - task_created_at + - task_due_at + - task_follow_up_at + - task_title + - task_description + - task_priority + - task_form + - submission + - submission_uuid + - submission_created_at + - submission_task + - submission_data + - submission_state + - submission_version + attributes: [BROWSE, READ] + + - access: 2ea1271a-fa3d-4448-a0d4-0a890bb3aeba # Organization + scope: + type: session + key: + - task + - task_uuid + - task_created_at + - task_due_at + - task_follow_up_at + - task_title + - task_description + - task_priority + - task_form + - submission + - submission_uuid + - submission_created_at + - submission_task + - submission_data + - submission_state + - submission_version + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/staff/access.yaml b/app/fixtures/custom/tasks/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/tasks/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/staff/permission.yaml b/app/fixtures/custom/tasks/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tasks/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/system/access.yaml b/app/fixtures/custom/tasks/access/system/access.yaml new file mode 100644 index 00000000..1d39591c --- /dev/null +++ b/app/fixtures/custom/tasks/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 11ad7c1a-b484-4b40-b839-c4c8d500e05e + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/system/permission.yaml b/app/fixtures/custom/tasks/access/system/permission.yaml new file mode 100644 index 00000000..ac2273c5 --- /dev/null +++ b/app/fixtures/custom/tasks/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 11ad7c1a-b484-4b40-b839-c4c8d500e05e # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 11ad7c1a-b484-4b40-b839-c4c8d500e05e # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 11ad7c1a-b484-4b40-b839-c4c8d500e05e # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/config.yaml b/app/fixtures/custom/tasks/config.yaml new file mode 100644 index 00000000..94114c1d --- /dev/null +++ b/app/fixtures/custom/tasks/config.yaml @@ -0,0 +1,44 @@ +objects: + - uuid: 9e2b73be-bd4d-46d8-a3b1-23cd2eb2c495 + key: app.bpm.variables.task_data + value: '{id}' + + - uuid: 133c9b1f-b98d-4afe-a7d0-09dbedfbff66 + key: ds_api.user.username + value: system@system.ds + + - uuid: f9831c74-0d86-4de5-950c-dab981c719e1 + key: ds_api.user.password + value: system + + - uuid: 8246021b-ca2c-4d48-9d87-376129cf42dc + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 29373695-c6cd-4d2f-bf33-07f724915332 + key: ds_api.user.roles + value: [] + + - uuid: 1bd3238b-8c70-41ea-bb95-578311957745 + key: ds_api.user.identity.roles + value: [] + + - uuid: 4d2eb433-a8c6-4531-b966-0ab8d658f963 + key: ds_api.user.identity.type + value: System + + - uuid: 5474b4e8-60e6-4ba5-a873-34f97fe73aed + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 307162c7-9f07-4c0b-a534-c22817703b3c + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/metadata.yaml b/app/fixtures/custom/tasks/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/tasks/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/system/parameter.yaml b/app/fixtures/custom/tasks/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/tasks/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/tasks/system/tenant.yaml b/app/fixtures/custom/tasks/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/tasks/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/tenants/access/anonymous/access.yaml b/app/fixtures/custom/tenants/access/anonymous/access.yaml new file mode 100644 index 00000000..6b899c0b --- /dev/null +++ b/app/fixtures/custom/tenants/access/anonymous/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/anonymous/permission.yaml b/app/fixtures/custom/tenants/access/anonymous/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tenants/access/anonymous/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/individual/access.yaml b/app/fixtures/custom/tenants/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/tenants/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/individual/permission.yaml b/app/fixtures/custom/tenants/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tenants/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/organization/access.yaml b/app/fixtures/custom/tenants/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/tenants/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/organization/permission.yaml b/app/fixtures/custom/tenants/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tenants/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/role/access.yaml b/app/fixtures/custom/tenants/access/role/access.yaml new file mode 100644 index 00000000..e08f6e0d --- /dev/null +++ b/app/fixtures/custom/tenants/access/role/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/role/permission.yaml b/app/fixtures/custom/tenants/access/role/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tenants/access/role/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/staff/access.yaml b/app/fixtures/custom/tenants/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/tenants/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/staff/permission.yaml b/app/fixtures/custom/tenants/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tenants/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/system/access.yaml b/app/fixtures/custom/tenants/access/system/access.yaml new file mode 100644 index 00000000..04c9fc10 --- /dev/null +++ b/app/fixtures/custom/tenants/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 13ae389f-bfd6-4c61-b26a-da599743c058 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/system/permission.yaml b/app/fixtures/custom/tenants/access/system/permission.yaml new file mode 100644 index 00000000..2b35f0fe --- /dev/null +++ b/app/fixtures/custom/tenants/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 13ae389f-bfd6-4c61-b26a-da599743c058 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 13ae389f-bfd6-4c61-b26a-da599743c058 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 13ae389f-bfd6-4c61-b26a-da599743c058 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/config.yaml b/app/fixtures/custom/tenants/config.yaml new file mode 100644 index 00000000..237cbe68 --- /dev/null +++ b/app/fixtures/custom/tenants/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 1f43ff37-b000-428f-9f18-e2676b12fae5 + key: ds_api.user.username + value: system@system.ds + + - uuid: cb26b146-98a4-4df3-a1c3-df5d3bb35d99 + key: ds_api.user.password + value: system + + - uuid: dc7b922f-746a-40d0-a8d2-dcfb305c7dea + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 1030f501-3860-4bf2-8c6f-5b2eea8e0997 + key: ds_api.user.roles + value: [] + + - uuid: c1c6d36b-5a21-46bd-882c-fde10a8d2b5c + key: ds_api.user.identity.roles + value: [] + + - uuid: 399b593b-b87c-4fa0-969b-f94860a4b70d + key: ds_api.user.identity.type + value: System + + - uuid: dc1014f9-26b0-424a-8fcc-0b3476287a5d + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: f7723b36-a82a-4535-9321-a8e2d6298f9f + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/metadata.yaml b/app/fixtures/custom/tenants/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/tenants/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/plan.yaml b/app/fixtures/custom/tenants/plan.yaml new file mode 100644 index 00000000..5cd8f67e --- /dev/null +++ b/app/fixtures/custom/tenants/plan.yaml @@ -0,0 +1,20 @@ +objects: + - uuid: 83f5c0df-7daf-430e-87b2-2747b3f1ee91 + title: + en: Bronze Plan + fr: Plan Bronze + + - uuid: 09dc0162-6478-43c6-84ec-4847b0c825cd + title: + en: Silver Plan + fr: Plan Argent + + - uuid: dc2ba5ed-229d-4127-9061-6d18b5e0deb8 + title: + en: Gold Plan + fr: Plan d'or + +prototype: + uuid: ~ + title: {} + data: {} diff --git a/app/fixtures/custom/tenants/system/parameter.yaml b/app/fixtures/custom/tenants/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/tenants/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/tenants/system/tenant.yaml b/app/fixtures/custom/tenants/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/tenants/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/tenants/tenant.yaml b/app/fixtures/custom/tenants/tenant.yaml new file mode 100644 index 00000000..5393915c --- /dev/null +++ b/app/fixtures/custom/tenants/tenant.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 83f5c0df-7daf-430e-87b2-2747b3f1ee91 + title: + en: Tenant 1 + fr: Tenant 1 + plan: d66089d2-a1df-45e3-8959-990e8d0f3335 # Bronze + +prototype: + uuid: ~ + title: {} + data: {} + plan: ~ diff --git a/platform/ansible/env/dev/vars/app/core.yml b/platform/ansible/env/dev/vars/app/core.yml index 0bdb90b8..b349a976 100644 --- a/platform/ansible/env/dev/vars/app/core.yml +++ b/platform/ansible/env/dev/vars/app/core.yml @@ -3,3 +3,6 @@ core: enabled: true repository: https://github.com/DigitalState/Core.git version: develop + component: + discovery: + adapter: consul diff --git a/platform/ansible/env/prod/vars/app/assets.yml b/platform/ansible/env/prod/vars/app/assets.yml index f75bb574..92f26b22 100644 --- a/platform/ansible/env/prod/vars/app/assets.yml +++ b/platform/ansible/env/prod/vars/app/assets.yml @@ -2,7 +2,7 @@ assets: enabled: true repository: https://github.com/DigitalState/Assets.git - version: 0.17.3 + version: 0.18.0 api: host: api.assets.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/authentication.yml b/platform/ansible/env/prod/vars/app/authentication.yml index 732ccec3..9c9ca9c3 100644 --- a/platform/ansible/env/prod/vars/app/authentication.yml +++ b/platform/ansible/env/prod/vars/app/authentication.yml @@ -2,7 +2,7 @@ authentication: enabled: true repository: https://github.com/DigitalState/Authentication.git - version: 0.17.3 + version: 0.18.0 api: host: api.authentication.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/cases.yml b/platform/ansible/env/prod/vars/app/cases.yml index eaa84756..66652a13 100644 --- a/platform/ansible/env/prod/vars/app/cases.yml +++ b/platform/ansible/env/prod/vars/app/cases.yml @@ -2,7 +2,7 @@ cases: enabled: true repository: https://github.com/DigitalState/Cases.git - version: 0.17.3 + version: 0.18.0 api: host: api.cases.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/cms.yml b/platform/ansible/env/prod/vars/app/cms.yml index b58fb27b..c3ae9196 100644 --- a/platform/ansible/env/prod/vars/app/cms.yml +++ b/platform/ansible/env/prod/vars/app/cms.yml @@ -2,7 +2,7 @@ cms: enabled: true repository: https://github.com/DigitalState/Cms.git - version: 0.17.4 + version: 0.18.0 api: host: api.cms.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/core.yml b/platform/ansible/env/prod/vars/app/core.yml index 6a786a77..c6492951 100644 --- a/platform/ansible/env/prod/vars/app/core.yml +++ b/platform/ansible/env/prod/vars/app/core.yml @@ -2,4 +2,7 @@ core: enabled: true repository: https://github.com/DigitalState/Core.git - version: 0.17.0 + version: 0.18.0 + component: + discovery: + adapter: consul diff --git a/platform/ansible/env/prod/vars/app/discovery.yml b/platform/ansible/env/prod/vars/app/discovery.yml index 8718b605..9b344587 100644 --- a/platform/ansible/env/prod/vars/app/discovery.yml +++ b/platform/ansible/env/prod/vars/app/discovery.yml @@ -3,7 +3,7 @@ discovery: enabled: true order: -20 repository: https://github.com/DigitalState/Discovery.git - version: 0.17.0 + version: 0.18.0 token: master: a0500a68-c736-4e0f-a998-35380cf1791e ui: diff --git a/platform/ansible/env/prod/vars/app/documentation.yml b/platform/ansible/env/prod/vars/app/documentation.yml index d3ac3a5e..b9f455bc 100644 --- a/platform/ansible/env/prod/vars/app/documentation.yml +++ b/platform/ansible/env/prod/vars/app/documentation.yml @@ -2,4 +2,4 @@ documentation: enabled: true repository: https://github.com/DigitalState/Documentation.git - version: 0.17.0 + version: 0.18.0 diff --git a/platform/ansible/env/prod/vars/app/formio.yml b/platform/ansible/env/prod/vars/app/formio.yml index 990509e1..9647af69 100644 --- a/platform/ansible/env/prod/vars/app/formio.yml +++ b/platform/ansible/env/prod/vars/app/formio.yml @@ -3,7 +3,7 @@ formio: enabled: true order: -10 repository: https://github.com/DigitalState/Formio.git - version: 0.17.0 + version: 0.18.0 api: host: api.formio.prod.ds admin: diff --git a/platform/ansible/env/prod/vars/app/forms.yml b/platform/ansible/env/prod/vars/app/forms.yml index 8354297b..82a4e1a8 100644 --- a/platform/ansible/env/prod/vars/app/forms.yml +++ b/platform/ansible/env/prod/vars/app/forms.yml @@ -2,7 +2,7 @@ forms: enabled: true repository: https://github.com/DigitalState/Forms.git - version: 0.17.3 + version: 0.18.0 api: host: api.forms.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/guide.yml b/platform/ansible/env/prod/vars/app/guide.yml index 565ec440..b50e361f 100644 --- a/platform/ansible/env/prod/vars/app/guide.yml +++ b/platform/ansible/env/prod/vars/app/guide.yml @@ -2,4 +2,4 @@ guide: enabled: true repository: https://github.com/DigitalState/Guide.git - version: 0.17.0 + version: 0.18.0 diff --git a/platform/ansible/env/prod/vars/app/identities.yml b/platform/ansible/env/prod/vars/app/identities.yml index 284c16c2..0337fc5a 100644 --- a/platform/ansible/env/prod/vars/app/identities.yml +++ b/platform/ansible/env/prod/vars/app/identities.yml @@ -2,7 +2,7 @@ identities: enabled: true repository: https://github.com/DigitalState/Identities.git - version: 0.17.4 + version: 0.18.0 api: host: api.identities.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/microservice.yml b/platform/ansible/env/prod/vars/app/microservice.yml index 21421adf..3d140429 100644 --- a/platform/ansible/env/prod/vars/app/microservice.yml +++ b/platform/ansible/env/prod/vars/app/microservice.yml @@ -2,7 +2,7 @@ microservice: enabled: true repository: https://github.com/DigitalState/Microservice.git - version: 0.17.3 + version: 0.18.0 api: host: api.microservice.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/proxy.yml b/platform/ansible/env/prod/vars/app/proxy.yml index d707b544..298ac035 100644 --- a/platform/ansible/env/prod/vars/app/proxy.yml +++ b/platform/ansible/env/prod/vars/app/proxy.yml @@ -3,7 +3,7 @@ proxy: enabled: true order: -30 repository: https://github.com/DigitalState/Proxy.git - version: 0.17.0 + version: 0.18.0 port: 80 discovery: token: a0500a68-c736-4e0f-a998-35380cf1791e diff --git a/platform/ansible/env/prod/vars/app/records.yml b/platform/ansible/env/prod/vars/app/records.yml index eed11ab1..d9d57559 100644 --- a/platform/ansible/env/prod/vars/app/records.yml +++ b/platform/ansible/env/prod/vars/app/records.yml @@ -2,7 +2,7 @@ records: enabled: true repository: https://github.com/DigitalState/Records.git - version: 0.17.3 + version: 0.18.0 api: host: api.records.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/services.yml b/platform/ansible/env/prod/vars/app/services.yml index b0c9eede..2997bb39 100644 --- a/platform/ansible/env/prod/vars/app/services.yml +++ b/platform/ansible/env/prod/vars/app/services.yml @@ -2,7 +2,7 @@ services: enabled: true repository: https://github.com/DigitalState/Services.git - version: 0.17.3 + version: 0.18.0 api: host: api.services.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/tasks.yml b/platform/ansible/env/prod/vars/app/tasks.yml index 12d44ef1..f83bef23 100644 --- a/platform/ansible/env/prod/vars/app/tasks.yml +++ b/platform/ansible/env/prod/vars/app/tasks.yml @@ -2,7 +2,7 @@ tasks: enabled: false repository: https://github.com/DigitalState/Tasks.git - version: 0.17.4 + version: 0.18.0 api: host: api.tasks.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/tenants.yml b/platform/ansible/env/prod/vars/app/tenants.yml index 7b915b0e..8dff4a75 100644 --- a/platform/ansible/env/prod/vars/app/tenants.yml +++ b/platform/ansible/env/prod/vars/app/tenants.yml @@ -2,7 +2,7 @@ tenants: enabled: false repository: https://github.com/DigitalState/Tenants.git - version: 0.17.3 + version: 0.18.0 api: host: api.tenants.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/workflow.yml b/platform/ansible/env/prod/vars/app/workflow.yml index 26d55ab9..73794dbc 100644 --- a/platform/ansible/env/prod/vars/app/workflow.yml +++ b/platform/ansible/env/prod/vars/app/workflow.yml @@ -3,7 +3,7 @@ workflow: enabled: true order: -10 repository: https://github.com/DigitalState/Workflow.git - version: 0.17.0 + version: 0.18.0 api: host: api.workflow.prod.ds admin: diff --git a/platform/ansible/env/test/vars/app/core.yml b/platform/ansible/env/test/vars/app/core.yml index 0bdb90b8..b349a976 100644 --- a/platform/ansible/env/test/vars/app/core.yml +++ b/platform/ansible/env/test/vars/app/core.yml @@ -3,3 +3,6 @@ core: enabled: true repository: https://github.com/DigitalState/Core.git version: develop + component: + discovery: + adapter: consul diff --git a/platform/ansible/role/app/assets/container/up/tasks/main.yml b/platform/ansible/role/app/assets/container/up/tasks/main.yml index 5fac5aa1..ad303fdf 100644 --- a/platform/ansible/role/app/assets/container/up/tasks/main.yml +++ b/platform/ansible/role/app/assets/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/assets/container/up/vars/main.yml b/platform/ansible/role/app/assets/container/up/vars/main.yml index 88c25d72..7e2660f6 100644 --- a/platform/ansible/role/app/assets/container/up/vars/main.yml +++ b/platform/ansible/role/app/assets/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.assets.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/authentication/container/up/tasks/main.yml b/platform/ansible/role/app/authentication/container/up/tasks/main.yml index 1caff37f..fdb259f3 100644 --- a/platform/ansible/role/app/authentication/container/up/tasks/main.yml +++ b/platform/ansible/role/app/authentication/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/authentication/container/up/vars/main.yml b/platform/ansible/role/app/authentication/container/up/vars/main.yml index c24b20d9..02fea251 100644 --- a/platform/ansible/role/app/authentication/container/up/vars/main.yml +++ b/platform/ansible/role/app/authentication/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.authentication.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/cases/container/up/tasks/main.yml b/platform/ansible/role/app/cases/container/up/tasks/main.yml index 9543fe5b..8d3230e0 100644 --- a/platform/ansible/role/app/cases/container/up/tasks/main.yml +++ b/platform/ansible/role/app/cases/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/cases/container/up/vars/main.yml b/platform/ansible/role/app/cases/container/up/vars/main.yml index e387b042..6e3d93b3 100644 --- a/platform/ansible/role/app/cases/container/up/vars/main.yml +++ b/platform/ansible/role/app/cases/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.cases.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/cms/container/up/tasks/main.yml b/platform/ansible/role/app/cms/container/up/tasks/main.yml index f8e0e40b..042a87ac 100644 --- a/platform/ansible/role/app/cms/container/up/tasks/main.yml +++ b/platform/ansible/role/app/cms/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/cms/container/up/vars/main.yml b/platform/ansible/role/app/cms/container/up/vars/main.yml index 0ea85865..537df5c3 100644 --- a/platform/ansible/role/app/cms/container/up/vars/main.yml +++ b/platform/ansible/role/app/cms/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.cms.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/forms/container/up/tasks/main.yml b/platform/ansible/role/app/forms/container/up/tasks/main.yml index 984c8879..a3a9b710 100644 --- a/platform/ansible/role/app/forms/container/up/tasks/main.yml +++ b/platform/ansible/role/app/forms/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/forms/container/up/vars/main.yml b/platform/ansible/role/app/forms/container/up/vars/main.yml index 2fbe9969..34758529 100644 --- a/platform/ansible/role/app/forms/container/up/vars/main.yml +++ b/platform/ansible/role/app/forms/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.forms.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/identities/container/up/tasks/main.yml b/platform/ansible/role/app/identities/container/up/tasks/main.yml index 78fad3d2..4c30f877 100644 --- a/platform/ansible/role/app/identities/container/up/tasks/main.yml +++ b/platform/ansible/role/app/identities/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/identities/container/up/vars/main.yml b/platform/ansible/role/app/identities/container/up/vars/main.yml index 145e8199..a4787883 100644 --- a/platform/ansible/role/app/identities/container/up/vars/main.yml +++ b/platform/ansible/role/app/identities/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.identities.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/microservice/container/up/tasks/main.yml b/platform/ansible/role/app/microservice/container/up/tasks/main.yml index 4bd37540..22dc486e 100644 --- a/platform/ansible/role/app/microservice/container/up/tasks/main.yml +++ b/platform/ansible/role/app/microservice/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/microservice/container/up/vars/main.yml b/platform/ansible/role/app/microservice/container/up/vars/main.yml index ab8c0269..3f64d239 100644 --- a/platform/ansible/role/app/microservice/container/up/vars/main.yml +++ b/platform/ansible/role/app/microservice/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.microservice.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/records/container/up/tasks/main.yml b/platform/ansible/role/app/records/container/up/tasks/main.yml index 2b1b7b59..a16bd7fe 100644 --- a/platform/ansible/role/app/records/container/up/tasks/main.yml +++ b/platform/ansible/role/app/records/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/records/container/up/vars/main.yml b/platform/ansible/role/app/records/container/up/vars/main.yml index 8e9da295..89d10eb9 100644 --- a/platform/ansible/role/app/records/container/up/vars/main.yml +++ b/platform/ansible/role/app/records/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.records.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/services/container/up/tasks/main.yml b/platform/ansible/role/app/services/container/up/tasks/main.yml index eb806c0f..076a257e 100644 --- a/platform/ansible/role/app/services/container/up/tasks/main.yml +++ b/platform/ansible/role/app/services/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/services/container/up/vars/main.yml b/platform/ansible/role/app/services/container/up/vars/main.yml index 46129b41..8823a0b7 100644 --- a/platform/ansible/role/app/services/container/up/vars/main.yml +++ b/platform/ansible/role/app/services/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.services.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/tasks/container/up/tasks/main.yml b/platform/ansible/role/app/tasks/container/up/tasks/main.yml index 31e546bb..0ef1e088 100644 --- a/platform/ansible/role/app/tasks/container/up/tasks/main.yml +++ b/platform/ansible/role/app/tasks/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/tasks/container/up/vars/main.yml b/platform/ansible/role/app/tasks/container/up/vars/main.yml index d104c372..e7ccc0f0 100644 --- a/platform/ansible/role/app/tasks/container/up/vars/main.yml +++ b/platform/ansible/role/app/tasks/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.tasks.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/tenants/container/up/tasks/main.yml b/platform/ansible/role/app/tenants/container/up/tasks/main.yml index cfa4e315..00589cbf 100644 --- a/platform/ansible/role/app/tenants/container/up/tasks/main.yml +++ b/platform/ansible/role/app/tenants/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/tenants/container/up/vars/main.yml b/platform/ansible/role/app/tenants/container/up/vars/main.yml index 7163dd36..a2f62e7e 100644 --- a/platform/ansible/role/app/tenants/container/up/vars/main.yml +++ b/platform/ansible/role/app/tenants/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.tenants.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/task/app/assets/container/up.yml b/platform/ansible/task/app/assets/container/up.yml index f8c9135d..81376273 100644 --- a/platform/ansible/task/app/assets/container/up.yml +++ b/platform/ansible/task/app/assets/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up assets container include_role: name: app/assets/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.assets.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "assets_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "assets_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/authentication/container/up.yml b/platform/ansible/task/app/authentication/container/up.yml index 3f79c9e2..f1b7eb5d 100644 --- a/platform/ansible/task/app/authentication/container/up.yml +++ b/platform/ansible/task/app/authentication/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up authentication container include_role: name: app/authentication/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.authentication.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "authentication_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "authentication_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/cases/container/up.yml b/platform/ansible/task/app/cases/container/up.yml index f0226838..c01107e0 100644 --- a/platform/ansible/task/app/cases/container/up.yml +++ b/platform/ansible/task/app/cases/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up cases container include_role: name: app/cases/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.cases.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "cases_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "cases_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/cms/container/up.yml b/platform/ansible/task/app/cms/container/up.yml index 36de9acb..27d9b1b7 100644 --- a/platform/ansible/task/app/cms/container/up.yml +++ b/platform/ansible/task/app/cms/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up cms container include_role: name: app/cms/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.cms.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "cms_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "cms_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/discovery/adapter/env.yml b/platform/ansible/task/app/discovery/adapter/env.yml new file mode 100644 index 00000000..cf2e9e06 --- /dev/null +++ b/platform/ansible/task/app/discovery/adapter/env.yml @@ -0,0 +1,19 @@ +--- +- name: Assemble discovery env services + set_fact: + discovery_env_services: > + { + "{{ namespace }}_assets_api_http": "{{ app.assets.api.host if app.assets.enabled else "" }}", + "{{ namespace }}_authentication_api_http": "{{ app.authentication.api.host if app.authentication.enabled else "" }}", + "{{ namespace }}_cases_api_http": "{{ app.cases.api.host if app.cases.enabled else "" }}", + "{{ namespace }}_cms_api_http": "{{ app.cms.api.host if app.cms.enabled else "" }}", + "{{ namespace }}_formio_api_http": "{{ app.formio.api.host if app.formio.enabled else "" }}", + "{{ namespace }}_forms_api_http": "{{ app.forms.api.host if app.forms.enabled else "" }}", + "{{ namespace }}_identities_api_http": "{{ app.identities.api.host if app.identities.enabled else "" }}", + "{{ namespace }}_microservice_api_http": "{{ app.microservice.api.host if app.microservice.enabled else "" }}", + "{{ namespace }}_records_api_http": "{{ app.records.api.host if app.records.enabled else "" }}", + "{{ namespace }}_services_api_http": "{{ app.services.api.host if app.services.enabled else "" }}", + "{{ namespace }}_tasks_api_http": "{{ app.tasks.api.host if app.tasks.enabled else "" }}", + "{{ namespace }}_tenants_api_http": "{{ app.tenants.api.host if app.tenants.enabled else "" }}", + "{{ namespace }}_workflow_api_http": "{{ app.workflow.api.host if app.workflow.enabled else "" }}" + } diff --git a/platform/ansible/task/app/forms/container/up.yml b/platform/ansible/task/app/forms/container/up.yml index 249355cd..5c2be394 100644 --- a/platform/ansible/task/app/forms/container/up.yml +++ b/platform/ansible/task/app/forms/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up forms container include_role: name: app/forms/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.forms.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "forms_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "forms_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/identities/container/up.yml b/platform/ansible/task/app/identities/container/up.yml index 85d5b897..5c1367f4 100644 --- a/platform/ansible/task/app/identities/container/up.yml +++ b/platform/ansible/task/app/identities/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up identities container include_role: name: app/identities/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.identities.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "identities_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "identities_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/microservice/container/up.yml b/platform/ansible/task/app/microservice/container/up.yml index 6bd5ff75..4ac9cdde 100644 --- a/platform/ansible/task/app/microservice/container/up.yml +++ b/platform/ansible/task/app/microservice/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up microservice container include_role: name: app/microservice/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.microservice.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "microservice_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "microservice_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/records/container/up.yml b/platform/ansible/task/app/records/container/up.yml index 80e31d7e..e7736c9e 100644 --- a/platform/ansible/task/app/records/container/up.yml +++ b/platform/ansible/task/app/records/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up records container include_role: name: app/records/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.records.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "records_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "records_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/services/container/up.yml b/platform/ansible/task/app/services/container/up.yml index e34d7a66..01a21aab 100644 --- a/platform/ansible/task/app/services/container/up.yml +++ b/platform/ansible/task/app/services/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up services container include_role: name: app/services/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.services.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "services_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "services_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/tasks/container/up.yml b/platform/ansible/task/app/tasks/container/up.yml index a2d3d45c..e42e28e6 100644 --- a/platform/ansible/task/app/tasks/container/up.yml +++ b/platform/ansible/task/app/tasks/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up tasks container include_role: name: app/tasks/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.tasks.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "tasks_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "tasks_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/tenants/container/up.yml b/platform/ansible/task/app/tenants/container/up.yml index 7f52354c..fa3acb52 100644 --- a/platform/ansible/task/app/tenants/container/up.yml +++ b/platform/ansible/task/app/tenants/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up tenants container include_role: name: app/tenants/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.tenants.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "tenants_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "tenants_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}'