From 9796f4d10f92fe7f1c58f8b138fc31df7a642f83 Mon Sep 17 00:00:00 2001 From: mario-digitalstate Date: Sun, 1 Mar 2020 07:15:47 -0500 Subject: [PATCH 1/7] Update version file --- VERSION | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/VERSION b/VERSION index 14a8c245..47d04a52 100644 --- a/VERSION +++ b/VERSION @@ -1 +1 @@ -0.17.1 \ No newline at end of file +0.18.0 \ No newline at end of file From 9d9d216215ad02777f09069d8ab07f68458e9174 Mon Sep 17 00:00:00 2001 From: mario-digitalstate Date: Sun, 1 Mar 2020 07:16:03 -0500 Subject: [PATCH 2/7] Update ansible inventory --- platform/ansible/env/dev/vars/app/core.yml | 3 +++ platform/ansible/env/prod/vars/app/assets.yml | 2 +- platform/ansible/env/prod/vars/app/authentication.yml | 2 +- platform/ansible/env/prod/vars/app/cases.yml | 2 +- platform/ansible/env/prod/vars/app/cms.yml | 2 +- platform/ansible/env/prod/vars/app/core.yml | 5 ++++- platform/ansible/env/prod/vars/app/discovery.yml | 2 +- platform/ansible/env/prod/vars/app/documentation.yml | 2 +- platform/ansible/env/prod/vars/app/formio.yml | 2 +- platform/ansible/env/prod/vars/app/forms.yml | 2 +- platform/ansible/env/prod/vars/app/guide.yml | 2 +- platform/ansible/env/prod/vars/app/identities.yml | 2 +- platform/ansible/env/prod/vars/app/microservice.yml | 2 +- platform/ansible/env/prod/vars/app/proxy.yml | 2 +- platform/ansible/env/prod/vars/app/records.yml | 2 +- platform/ansible/env/prod/vars/app/services.yml | 2 +- platform/ansible/env/prod/vars/app/tasks.yml | 2 +- platform/ansible/env/prod/vars/app/tenants.yml | 2 +- platform/ansible/env/prod/vars/app/workflow.yml | 2 +- platform/ansible/env/test/vars/app/core.yml | 3 +++ 20 files changed, 27 insertions(+), 18 deletions(-) diff --git a/platform/ansible/env/dev/vars/app/core.yml b/platform/ansible/env/dev/vars/app/core.yml index 0bdb90b8..b349a976 100644 --- a/platform/ansible/env/dev/vars/app/core.yml +++ b/platform/ansible/env/dev/vars/app/core.yml @@ -3,3 +3,6 @@ core: enabled: true repository: https://github.com/DigitalState/Core.git version: develop + component: + discovery: + adapter: consul diff --git a/platform/ansible/env/prod/vars/app/assets.yml b/platform/ansible/env/prod/vars/app/assets.yml index f75bb574..92f26b22 100644 --- a/platform/ansible/env/prod/vars/app/assets.yml +++ b/platform/ansible/env/prod/vars/app/assets.yml @@ -2,7 +2,7 @@ assets: enabled: true repository: https://github.com/DigitalState/Assets.git - version: 0.17.3 + version: 0.18.0 api: host: api.assets.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/authentication.yml b/platform/ansible/env/prod/vars/app/authentication.yml index 732ccec3..9c9ca9c3 100644 --- a/platform/ansible/env/prod/vars/app/authentication.yml +++ b/platform/ansible/env/prod/vars/app/authentication.yml @@ -2,7 +2,7 @@ authentication: enabled: true repository: https://github.com/DigitalState/Authentication.git - version: 0.17.3 + version: 0.18.0 api: host: api.authentication.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/cases.yml b/platform/ansible/env/prod/vars/app/cases.yml index eaa84756..66652a13 100644 --- a/platform/ansible/env/prod/vars/app/cases.yml +++ b/platform/ansible/env/prod/vars/app/cases.yml @@ -2,7 +2,7 @@ cases: enabled: true repository: https://github.com/DigitalState/Cases.git - version: 0.17.3 + version: 0.18.0 api: host: api.cases.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/cms.yml b/platform/ansible/env/prod/vars/app/cms.yml index b58fb27b..c3ae9196 100644 --- a/platform/ansible/env/prod/vars/app/cms.yml +++ b/platform/ansible/env/prod/vars/app/cms.yml @@ -2,7 +2,7 @@ cms: enabled: true repository: https://github.com/DigitalState/Cms.git - version: 0.17.4 + version: 0.18.0 api: host: api.cms.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/core.yml b/platform/ansible/env/prod/vars/app/core.yml index 6a786a77..c6492951 100644 --- a/platform/ansible/env/prod/vars/app/core.yml +++ b/platform/ansible/env/prod/vars/app/core.yml @@ -2,4 +2,7 @@ core: enabled: true repository: https://github.com/DigitalState/Core.git - version: 0.17.0 + version: 0.18.0 + component: + discovery: + adapter: consul diff --git a/platform/ansible/env/prod/vars/app/discovery.yml b/platform/ansible/env/prod/vars/app/discovery.yml index 8718b605..9b344587 100644 --- a/platform/ansible/env/prod/vars/app/discovery.yml +++ b/platform/ansible/env/prod/vars/app/discovery.yml @@ -3,7 +3,7 @@ discovery: enabled: true order: -20 repository: https://github.com/DigitalState/Discovery.git - version: 0.17.0 + version: 0.18.0 token: master: a0500a68-c736-4e0f-a998-35380cf1791e ui: diff --git a/platform/ansible/env/prod/vars/app/documentation.yml b/platform/ansible/env/prod/vars/app/documentation.yml index d3ac3a5e..b9f455bc 100644 --- a/platform/ansible/env/prod/vars/app/documentation.yml +++ b/platform/ansible/env/prod/vars/app/documentation.yml @@ -2,4 +2,4 @@ documentation: enabled: true repository: https://github.com/DigitalState/Documentation.git - version: 0.17.0 + version: 0.18.0 diff --git a/platform/ansible/env/prod/vars/app/formio.yml b/platform/ansible/env/prod/vars/app/formio.yml index 990509e1..9647af69 100644 --- a/platform/ansible/env/prod/vars/app/formio.yml +++ b/platform/ansible/env/prod/vars/app/formio.yml @@ -3,7 +3,7 @@ formio: enabled: true order: -10 repository: https://github.com/DigitalState/Formio.git - version: 0.17.0 + version: 0.18.0 api: host: api.formio.prod.ds admin: diff --git a/platform/ansible/env/prod/vars/app/forms.yml b/platform/ansible/env/prod/vars/app/forms.yml index 8354297b..82a4e1a8 100644 --- a/platform/ansible/env/prod/vars/app/forms.yml +++ b/platform/ansible/env/prod/vars/app/forms.yml @@ -2,7 +2,7 @@ forms: enabled: true repository: https://github.com/DigitalState/Forms.git - version: 0.17.3 + version: 0.18.0 api: host: api.forms.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/guide.yml b/platform/ansible/env/prod/vars/app/guide.yml index 565ec440..b50e361f 100644 --- a/platform/ansible/env/prod/vars/app/guide.yml +++ b/platform/ansible/env/prod/vars/app/guide.yml @@ -2,4 +2,4 @@ guide: enabled: true repository: https://github.com/DigitalState/Guide.git - version: 0.17.0 + version: 0.18.0 diff --git a/platform/ansible/env/prod/vars/app/identities.yml b/platform/ansible/env/prod/vars/app/identities.yml index 284c16c2..0337fc5a 100644 --- a/platform/ansible/env/prod/vars/app/identities.yml +++ b/platform/ansible/env/prod/vars/app/identities.yml @@ -2,7 +2,7 @@ identities: enabled: true repository: https://github.com/DigitalState/Identities.git - version: 0.17.4 + version: 0.18.0 api: host: api.identities.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/microservice.yml b/platform/ansible/env/prod/vars/app/microservice.yml index 21421adf..3d140429 100644 --- a/platform/ansible/env/prod/vars/app/microservice.yml +++ b/platform/ansible/env/prod/vars/app/microservice.yml @@ -2,7 +2,7 @@ microservice: enabled: true repository: https://github.com/DigitalState/Microservice.git - version: 0.17.3 + version: 0.18.0 api: host: api.microservice.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/proxy.yml b/platform/ansible/env/prod/vars/app/proxy.yml index d707b544..298ac035 100644 --- a/platform/ansible/env/prod/vars/app/proxy.yml +++ b/platform/ansible/env/prod/vars/app/proxy.yml @@ -3,7 +3,7 @@ proxy: enabled: true order: -30 repository: https://github.com/DigitalState/Proxy.git - version: 0.17.0 + version: 0.18.0 port: 80 discovery: token: a0500a68-c736-4e0f-a998-35380cf1791e diff --git a/platform/ansible/env/prod/vars/app/records.yml b/platform/ansible/env/prod/vars/app/records.yml index eed11ab1..d9d57559 100644 --- a/platform/ansible/env/prod/vars/app/records.yml +++ b/platform/ansible/env/prod/vars/app/records.yml @@ -2,7 +2,7 @@ records: enabled: true repository: https://github.com/DigitalState/Records.git - version: 0.17.3 + version: 0.18.0 api: host: api.records.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/services.yml b/platform/ansible/env/prod/vars/app/services.yml index b0c9eede..2997bb39 100644 --- a/platform/ansible/env/prod/vars/app/services.yml +++ b/platform/ansible/env/prod/vars/app/services.yml @@ -2,7 +2,7 @@ services: enabled: true repository: https://github.com/DigitalState/Services.git - version: 0.17.3 + version: 0.18.0 api: host: api.services.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/tasks.yml b/platform/ansible/env/prod/vars/app/tasks.yml index 12d44ef1..f83bef23 100644 --- a/platform/ansible/env/prod/vars/app/tasks.yml +++ b/platform/ansible/env/prod/vars/app/tasks.yml @@ -2,7 +2,7 @@ tasks: enabled: false repository: https://github.com/DigitalState/Tasks.git - version: 0.17.4 + version: 0.18.0 api: host: api.tasks.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/tenants.yml b/platform/ansible/env/prod/vars/app/tenants.yml index 7b915b0e..8dff4a75 100644 --- a/platform/ansible/env/prod/vars/app/tenants.yml +++ b/platform/ansible/env/prod/vars/app/tenants.yml @@ -2,7 +2,7 @@ tenants: enabled: false repository: https://github.com/DigitalState/Tenants.git - version: 0.17.3 + version: 0.18.0 api: host: api.tenants.prod.ds database: diff --git a/platform/ansible/env/prod/vars/app/workflow.yml b/platform/ansible/env/prod/vars/app/workflow.yml index 26d55ab9..73794dbc 100644 --- a/platform/ansible/env/prod/vars/app/workflow.yml +++ b/platform/ansible/env/prod/vars/app/workflow.yml @@ -3,7 +3,7 @@ workflow: enabled: true order: -10 repository: https://github.com/DigitalState/Workflow.git - version: 0.17.0 + version: 0.18.0 api: host: api.workflow.prod.ds admin: diff --git a/platform/ansible/env/test/vars/app/core.yml b/platform/ansible/env/test/vars/app/core.yml index 0bdb90b8..b349a976 100644 --- a/platform/ansible/env/test/vars/app/core.yml +++ b/platform/ansible/env/test/vars/app/core.yml @@ -3,3 +3,6 @@ core: enabled: true repository: https://github.com/DigitalState/Core.git version: develop + component: + discovery: + adapter: consul From c0f601d6f7924d9f5a7a7980272fef63d73ecf3a Mon Sep 17 00:00:00 2001 From: mario-digitalstate Date: Sun, 1 Mar 2020 07:16:24 -0500 Subject: [PATCH 3/7] Add discovery adapter to ansible tasks --- .../app/assets/container/up/tasks/main.yml | 7 +++++-- .../app/assets/container/up/vars/main.yml | 7 +++++-- .../container/up/tasks/main.yml | 7 +++++-- .../authentication/container/up/vars/main.yml | 7 +++++-- .../app/cases/container/up/tasks/main.yml | 7 +++++-- .../role/app/cases/container/up/vars/main.yml | 7 +++++-- .../role/app/cms/container/up/tasks/main.yml | 7 +++++-- .../role/app/cms/container/up/vars/main.yml | 7 +++++-- .../app/forms/container/up/tasks/main.yml | 7 +++++-- .../role/app/forms/container/up/vars/main.yml | 7 +++++-- .../identities/container/up/tasks/main.yml | 7 +++++-- .../app/identities/container/up/vars/main.yml | 7 +++++-- .../microservice/container/up/tasks/main.yml | 7 +++++-- .../microservice/container/up/vars/main.yml | 7 +++++-- .../app/records/container/up/tasks/main.yml | 7 +++++-- .../app/records/container/up/vars/main.yml | 7 +++++-- .../app/services/container/up/tasks/main.yml | 7 +++++-- .../app/services/container/up/vars/main.yml | 7 +++++-- .../app/tasks/container/up/tasks/main.yml | 7 +++++-- .../role/app/tasks/container/up/vars/main.yml | 7 +++++-- .../app/tenants/container/up/tasks/main.yml | 7 +++++-- .../app/tenants/container/up/vars/main.yml | 7 +++++-- .../ansible/task/app/assets/container/up.yml | 9 +++++++-- .../task/app/authentication/container/up.yml | 9 +++++++-- .../ansible/task/app/cases/container/up.yml | 9 +++++++-- .../ansible/task/app/cms/container/up.yml | 9 +++++++-- .../task/app/discovery/adapter/env.yml | 19 +++++++++++++++++++ .../ansible/task/app/forms/container/up.yml | 9 +++++++-- .../task/app/identities/container/up.yml | 9 +++++++-- .../task/app/microservice/container/up.yml | 9 +++++++-- .../ansible/task/app/records/container/up.yml | 9 +++++++-- .../task/app/services/container/up.yml | 9 +++++++-- .../ansible/task/app/tasks/container/up.yml | 9 +++++++-- .../ansible/task/app/tenants/container/up.yml | 9 +++++++-- 34 files changed, 206 insertions(+), 66 deletions(-) create mode 100644 platform/ansible/task/app/discovery/adapter/env.yml diff --git a/platform/ansible/role/app/assets/container/up/tasks/main.yml b/platform/ansible/role/app/assets/container/up/tasks/main.yml index 5fac5aa1..ad303fdf 100644 --- a/platform/ansible/role/app/assets/container/up/tasks/main.yml +++ b/platform/ansible/role/app/assets/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/assets/container/up/vars/main.yml b/platform/ansible/role/app/assets/container/up/vars/main.yml index 88c25d72..7e2660f6 100644 --- a/platform/ansible/role/app/assets/container/up/vars/main.yml +++ b/platform/ansible/role/app/assets/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.assets.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/authentication/container/up/tasks/main.yml b/platform/ansible/role/app/authentication/container/up/tasks/main.yml index 1caff37f..fdb259f3 100644 --- a/platform/ansible/role/app/authentication/container/up/tasks/main.yml +++ b/platform/ansible/role/app/authentication/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/authentication/container/up/vars/main.yml b/platform/ansible/role/app/authentication/container/up/vars/main.yml index c24b20d9..02fea251 100644 --- a/platform/ansible/role/app/authentication/container/up/vars/main.yml +++ b/platform/ansible/role/app/authentication/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.authentication.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/cases/container/up/tasks/main.yml b/platform/ansible/role/app/cases/container/up/tasks/main.yml index 9543fe5b..8d3230e0 100644 --- a/platform/ansible/role/app/cases/container/up/tasks/main.yml +++ b/platform/ansible/role/app/cases/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/cases/container/up/vars/main.yml b/platform/ansible/role/app/cases/container/up/vars/main.yml index e387b042..6e3d93b3 100644 --- a/platform/ansible/role/app/cases/container/up/vars/main.yml +++ b/platform/ansible/role/app/cases/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.cases.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/cms/container/up/tasks/main.yml b/platform/ansible/role/app/cms/container/up/tasks/main.yml index f8e0e40b..042a87ac 100644 --- a/platform/ansible/role/app/cms/container/up/tasks/main.yml +++ b/platform/ansible/role/app/cms/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/cms/container/up/vars/main.yml b/platform/ansible/role/app/cms/container/up/vars/main.yml index 0ea85865..537df5c3 100644 --- a/platform/ansible/role/app/cms/container/up/vars/main.yml +++ b/platform/ansible/role/app/cms/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.cms.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/forms/container/up/tasks/main.yml b/platform/ansible/role/app/forms/container/up/tasks/main.yml index 984c8879..a3a9b710 100644 --- a/platform/ansible/role/app/forms/container/up/tasks/main.yml +++ b/platform/ansible/role/app/forms/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/forms/container/up/vars/main.yml b/platform/ansible/role/app/forms/container/up/vars/main.yml index 2fbe9969..34758529 100644 --- a/platform/ansible/role/app/forms/container/up/vars/main.yml +++ b/platform/ansible/role/app/forms/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.forms.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/identities/container/up/tasks/main.yml b/platform/ansible/role/app/identities/container/up/tasks/main.yml index 78fad3d2..4c30f877 100644 --- a/platform/ansible/role/app/identities/container/up/tasks/main.yml +++ b/platform/ansible/role/app/identities/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/identities/container/up/vars/main.yml b/platform/ansible/role/app/identities/container/up/vars/main.yml index 145e8199..a4787883 100644 --- a/platform/ansible/role/app/identities/container/up/vars/main.yml +++ b/platform/ansible/role/app/identities/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.identities.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/microservice/container/up/tasks/main.yml b/platform/ansible/role/app/microservice/container/up/tasks/main.yml index 4bd37540..22dc486e 100644 --- a/platform/ansible/role/app/microservice/container/up/tasks/main.yml +++ b/platform/ansible/role/app/microservice/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/microservice/container/up/vars/main.yml b/platform/ansible/role/app/microservice/container/up/vars/main.yml index ab8c0269..3f64d239 100644 --- a/platform/ansible/role/app/microservice/container/up/vars/main.yml +++ b/platform/ansible/role/app/microservice/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.microservice.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/records/container/up/tasks/main.yml b/platform/ansible/role/app/records/container/up/tasks/main.yml index 2b1b7b59..a16bd7fe 100644 --- a/platform/ansible/role/app/records/container/up/tasks/main.yml +++ b/platform/ansible/role/app/records/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/records/container/up/vars/main.yml b/platform/ansible/role/app/records/container/up/vars/main.yml index 8e9da295..89d10eb9 100644 --- a/platform/ansible/role/app/records/container/up/vars/main.yml +++ b/platform/ansible/role/app/records/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.records.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/services/container/up/tasks/main.yml b/platform/ansible/role/app/services/container/up/tasks/main.yml index eb806c0f..076a257e 100644 --- a/platform/ansible/role/app/services/container/up/tasks/main.yml +++ b/platform/ansible/role/app/services/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/services/container/up/vars/main.yml b/platform/ansible/role/app/services/container/up/vars/main.yml index 46129b41..8823a0b7 100644 --- a/platform/ansible/role/app/services/container/up/vars/main.yml +++ b/platform/ansible/role/app/services/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.services.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/tasks/container/up/tasks/main.yml b/platform/ansible/role/app/tasks/container/up/tasks/main.yml index 31e546bb..0ef1e088 100644 --- a/platform/ansible/role/app/tasks/container/up/tasks/main.yml +++ b/platform/ansible/role/app/tasks/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/tasks/container/up/vars/main.yml b/platform/ansible/role/app/tasks/container/up/vars/main.yml index d104c372..e7ccc0f0 100644 --- a/platform/ansible/role/app/tasks/container/up/vars/main.yml +++ b/platform/ansible/role/app/tasks/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.tasks.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/role/app/tenants/container/up/tasks/main.yml b/platform/ansible/role/app/tenants/container/up/tasks/main.yml index cfa4e315..00589cbf 100644 --- a/platform/ansible/role/app/tenants/container/up/tasks/main.yml +++ b/platform/ansible/role/app/tenants/container/up/tasks/main.yml @@ -22,8 +22,11 @@ API_NAMESPACE: '{{ _namespace }}' API_DATABASE_URL: 'postgres://{{ _database_user }}:{{ _database_password }}@{{ _database_host }}/{{ _database_name }}' API_JWT_PASS_PHRASE: '{{ _api_jwt_pass_phrase }}' - API_DISCOVERY_HOST: '{{ _api_discovery_host }}' - API_DISCOVERY_CREDENTIAL: '{{ _api_discovery_credential }}' + API_DISCOVERY_ADAPTER: '{{ _api_discovery_adapter }}' + API_DISCOVERY_CONSUL_HOST: '{{ _api_discovery_consul_host }}' + API_DISCOVERY_CONSUL_CREDENTIALS: '{{ _api_discovery_consul_credentials }}' + API_DISCOVERY_ENV_SERVICES: '{{ _api_discovery_env_services }}' + API_DISCOVERY_ENV_CONFIGS: '{{ _api_discovery_env_configs }}' API_ENCRYPTION: '{{ _api_encryption }}' API_SYSTEM_USERNAME: '{{ _api_system_username }}' API_SYSTEM_PASSWORD: '{{ _api_system_password }}' diff --git a/platform/ansible/role/app/tenants/container/up/vars/main.yml b/platform/ansible/role/app/tenants/container/up/vars/main.yml index 7163dd36..a2f62e7e 100644 --- a/platform/ansible/role/app/tenants/container/up/vars/main.yml +++ b/platform/ansible/role/app/tenants/container/up/vars/main.yml @@ -14,8 +14,11 @@ _api_env: prod _api_secret: '' _api_host: api.tenants.ds _api_jwt_pass_phrase: ~ -_api_discovery_host: api.discovery.ds -_api_discovery_credential: ~ +_api_discovery_adapter: consul +_api_discovery_consul_host: api.discovery.ds +_api_discovery_consul_credentials: ~ +_api_discovery_env_services: ~ +_api_discovery_env_configs: ~ _api_encryption: ~ _api_system_username: system _api_system_password: ~ diff --git a/platform/ansible/task/app/assets/container/up.yml b/platform/ansible/task/app/assets/container/up.yml index f8c9135d..81376273 100644 --- a/platform/ansible/task/app/assets/container/up.yml +++ b/platform/ansible/task/app/assets/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up assets container include_role: name: app/assets/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.assets.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "assets_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "assets_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/authentication/container/up.yml b/platform/ansible/task/app/authentication/container/up.yml index 3f79c9e2..f1b7eb5d 100644 --- a/platform/ansible/task/app/authentication/container/up.yml +++ b/platform/ansible/task/app/authentication/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up authentication container include_role: name: app/authentication/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.authentication.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "authentication_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "authentication_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/cases/container/up.yml b/platform/ansible/task/app/cases/container/up.yml index f0226838..c01107e0 100644 --- a/platform/ansible/task/app/cases/container/up.yml +++ b/platform/ansible/task/app/cases/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up cases container include_role: name: app/cases/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.cases.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "cases_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "cases_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/cms/container/up.yml b/platform/ansible/task/app/cms/container/up.yml index 36de9acb..27d9b1b7 100644 --- a/platform/ansible/task/app/cms/container/up.yml +++ b/platform/ansible/task/app/cms/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up cms container include_role: name: app/cms/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.cms.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "cms_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "cms_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/discovery/adapter/env.yml b/platform/ansible/task/app/discovery/adapter/env.yml new file mode 100644 index 00000000..380adb9c --- /dev/null +++ b/platform/ansible/task/app/discovery/adapter/env.yml @@ -0,0 +1,19 @@ +--- +- name: Assemble discovery env services + set_fact: + discovery_env_services: > + { + "{{ namespace }}_assets_api_http": "{{ app.assets.api.host }}", + "{{ namespace }}_authentication_api_http": "{{ app.authentication.api.host }}", + "{{ namespace }}_cases_api_http": "{{ app.cases.api.host }}", + "{{ namespace }}_cms_api_http": "{{ app.cms.api.host }}", + "{{ namespace }}_formio_api_http": "{{ app.formio.api.host }}", + "{{ namespace }}_forms_api_http": "{{ app.forms.api.host }}", + "{{ namespace }}_identities_api_http": "{{ app.identities.api.host }}", + "{{ namespace }}_microservice_api_http": "{{ app.microservice.api.host }}", + "{{ namespace }}_records_api_http": "{{ app.records.api.host }}", + "{{ namespace }}_services_api_http": "{{ app.services.api.host }}", + "{{ namespace }}_tasks_api_http": "{{ app.tasks.api.host }}", + "{{ namespace }}_tenants_api_http": "{{ app.tenants.api.host }}", + "{{ namespace }}_workflow_api_http": "{{ app.workflow.api.host }}" + } diff --git a/platform/ansible/task/app/forms/container/up.yml b/platform/ansible/task/app/forms/container/up.yml index 249355cd..5c2be394 100644 --- a/platform/ansible/task/app/forms/container/up.yml +++ b/platform/ansible/task/app/forms/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up forms container include_role: name: app/forms/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.forms.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "forms_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "forms_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/identities/container/up.yml b/platform/ansible/task/app/identities/container/up.yml index 85d5b897..5c1367f4 100644 --- a/platform/ansible/task/app/identities/container/up.yml +++ b/platform/ansible/task/app/identities/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up identities container include_role: name: app/identities/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.identities.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "identities_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "identities_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/microservice/container/up.yml b/platform/ansible/task/app/microservice/container/up.yml index 6bd5ff75..4ac9cdde 100644 --- a/platform/ansible/task/app/microservice/container/up.yml +++ b/platform/ansible/task/app/microservice/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up microservice container include_role: name: app/microservice/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.microservice.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "microservice_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "microservice_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/records/container/up.yml b/platform/ansible/task/app/records/container/up.yml index 80e31d7e..e7736c9e 100644 --- a/platform/ansible/task/app/records/container/up.yml +++ b/platform/ansible/task/app/records/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up records container include_role: name: app/records/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.records.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "records_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "records_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/services/container/up.yml b/platform/ansible/task/app/services/container/up.yml index e34d7a66..01a21aab 100644 --- a/platform/ansible/task/app/services/container/up.yml +++ b/platform/ansible/task/app/services/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up services container include_role: name: app/services/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.services.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "services_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "services_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/tasks/container/up.yml b/platform/ansible/task/app/tasks/container/up.yml index a2d3d45c..e42e28e6 100644 --- a/platform/ansible/task/app/tasks/container/up.yml +++ b/platform/ansible/task/app/tasks/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up tasks container include_role: name: app/tasks/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.tasks.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "tasks_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "tasks_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' diff --git a/platform/ansible/task/app/tenants/container/up.yml b/platform/ansible/task/app/tenants/container/up.yml index 7f52354c..fa3acb52 100644 --- a/platform/ansible/task/app/tenants/container/up.yml +++ b/platform/ansible/task/app/tenants/container/up.yml @@ -4,6 +4,8 @@ include_tasks: /etc/ansible/task/app/proxy/container/property/ip.yml - name: Retrieve discovery container ip include_tasks: /etc/ansible/task/app/discovery/container/property/ip.yml + - name: Assemble discovery env variables + include_tasks: /etc/ansible/task/app/discovery/adapter/env.yml - name: Up tenants container include_role: name: app/tenants/container/up @@ -22,8 +24,11 @@ _api_secret: '{{ encryption.secret }}' _api_host: '{{ app.tenants.api.host }}' _api_jwt_pass_phrase: '{{ jwt.pass_phrase }}' - _api_discovery_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "tenants_mock_discovery:8080" }}' - _api_discovery_credential: '{{ app.discovery.token.master }}' + _api_discovery_adapter: '{{ core.component.discovery.adapter }}' + _api_discovery_consul_host: '{{ discovery_container_ip.stdout + ":8500" if integrated == "yes" else "tenants_mock_discovery:8080" }}' + _api_discovery_consul_credentials: '{{ app.discovery.token.master }}' + _api_discovery_env_services: '{{ discovery_env_services|to_json }}' + _api_discovery_env_configs: '' _api_encryption: '{{ encryption.encryption }}' _api_system_username: '{{ system.username }}' _api_system_password: '{{ system.password }}' From 18d5de0bdc843077923b2c7fb055a2ea84bb866e Mon Sep 17 00:00:00 2001 From: mario-digitalstate Date: Sun, 1 Mar 2020 12:46:24 -0500 Subject: [PATCH 4/7] Update discovery adapter tasks --- .../task/app/discovery/adapter/env.yml | 26 +++++++++---------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/platform/ansible/task/app/discovery/adapter/env.yml b/platform/ansible/task/app/discovery/adapter/env.yml index 380adb9c..cf2e9e06 100644 --- a/platform/ansible/task/app/discovery/adapter/env.yml +++ b/platform/ansible/task/app/discovery/adapter/env.yml @@ -3,17 +3,17 @@ set_fact: discovery_env_services: > { - "{{ namespace }}_assets_api_http": "{{ app.assets.api.host }}", - "{{ namespace }}_authentication_api_http": "{{ app.authentication.api.host }}", - "{{ namespace }}_cases_api_http": "{{ app.cases.api.host }}", - "{{ namespace }}_cms_api_http": "{{ app.cms.api.host }}", - "{{ namespace }}_formio_api_http": "{{ app.formio.api.host }}", - "{{ namespace }}_forms_api_http": "{{ app.forms.api.host }}", - "{{ namespace }}_identities_api_http": "{{ app.identities.api.host }}", - "{{ namespace }}_microservice_api_http": "{{ app.microservice.api.host }}", - "{{ namespace }}_records_api_http": "{{ app.records.api.host }}", - "{{ namespace }}_services_api_http": "{{ app.services.api.host }}", - "{{ namespace }}_tasks_api_http": "{{ app.tasks.api.host }}", - "{{ namespace }}_tenants_api_http": "{{ app.tenants.api.host }}", - "{{ namespace }}_workflow_api_http": "{{ app.workflow.api.host }}" + "{{ namespace }}_assets_api_http": "{{ app.assets.api.host if app.assets.enabled else "" }}", + "{{ namespace }}_authentication_api_http": "{{ app.authentication.api.host if app.authentication.enabled else "" }}", + "{{ namespace }}_cases_api_http": "{{ app.cases.api.host if app.cases.enabled else "" }}", + "{{ namespace }}_cms_api_http": "{{ app.cms.api.host if app.cms.enabled else "" }}", + "{{ namespace }}_formio_api_http": "{{ app.formio.api.host if app.formio.enabled else "" }}", + "{{ namespace }}_forms_api_http": "{{ app.forms.api.host if app.forms.enabled else "" }}", + "{{ namespace }}_identities_api_http": "{{ app.identities.api.host if app.identities.enabled else "" }}", + "{{ namespace }}_microservice_api_http": "{{ app.microservice.api.host if app.microservice.enabled else "" }}", + "{{ namespace }}_records_api_http": "{{ app.records.api.host if app.records.enabled else "" }}", + "{{ namespace }}_services_api_http": "{{ app.services.api.host if app.services.enabled else "" }}", + "{{ namespace }}_tasks_api_http": "{{ app.tasks.api.host if app.tasks.enabled else "" }}", + "{{ namespace }}_tenants_api_http": "{{ app.tenants.api.host if app.tenants.enabled else "" }}", + "{{ namespace }}_workflow_api_http": "{{ app.workflow.api.host if app.workflow.enabled else "" }}" } From e77e985ebb157007d69d92f154b56d6730bbcc4e Mon Sep 17 00:00:00 2001 From: mario-digitalstate Date: Sun, 15 Mar 2020 20:47:50 -0400 Subject: [PATCH 5/7] Add custom fixtures --- .../assets/access/anonymous/access.yaml | 10 + .../assets/access/anonymous/permission.yaml | 22 ++ .../assets/access/individual/access.yaml | 9 + .../assets/access/individual/permission.yaml | 9 + .../assets/access/organization/access.yaml | 9 + .../access/organization/permission.yaml | 9 + .../custom/assets/access/role/access.yaml | 29 +++ .../custom/assets/access/role/permission.yaml | 128 +++++++++++ .../custom/assets/access/staff/access.yaml | 9 + .../assets/access/staff/permission.yaml | 9 + .../custom/assets/access/system/access.yaml | 16 ++ .../assets/access/system/permission.yaml | 32 +++ app/fixtures/custom/assets/asset.yaml | 30 +++ app/fixtures/custom/assets/config.yaml | 40 ++++ app/fixtures/custom/assets/metadata.yaml | 11 + .../custom/assets/system/parameter.yaml | 13 ++ app/fixtures/custom/assets/system/tenant.yaml | 6 + .../access/anonymous/access.yaml | 10 + .../access/anonymous/permission.yaml | 31 +++ .../access/individual/access.yaml | 9 + .../access/individual/permission.yaml | 9 + .../access/organization/access.yaml | 9 + .../access/organization/permission.yaml | 9 + .../authentication/access/role/access.yaml | 29 +++ .../access/role/permission.yaml | 152 +++++++++++++ .../authentication/access/staff/access.yaml | 9 + .../access/staff/permission.yaml | 9 + .../authentication/access/system/access.yaml | 12 + .../access/system/permission.yaml | 20 ++ .../custom/authentication/config.yaml | 108 +++++++++ .../custom/authentication/metadata.yaml | 11 + .../authentication/system/parameter.yaml | 13 ++ .../custom/authentication/system/tenant.yaml | 6 + .../user/anonymous/registration.yaml | 10 + .../authentication/user/anonymous/user.yaml | 20 ++ .../user/individual/registration.yaml | 10 + .../authentication/user/individual/user.yaml | 19 ++ .../user/organization/registration.yaml | 10 + .../user/organization/user.yaml | 19 ++ .../authentication/user/staff/user.yaml | 31 +++ .../authentication/user/system/user.yaml | 27 +++ .../custom/cases/access/anonymous/access.yaml | 9 + .../cases/access/anonymous/permission.yaml | 9 + .../cases/access/individual/access.yaml | 9 + .../cases/access/individual/permission.yaml | 9 + .../cases/access/organization/access.yaml | 9 + .../cases/access/organization/permission.yaml | 9 + .../custom/cases/access/role/access.yaml | 29 +++ .../custom/cases/access/role/permission.yaml | 146 ++++++++++++ .../custom/cases/access/staff/access.yaml | 9 + .../custom/cases/access/staff/permission.yaml | 9 + .../custom/cases/access/system/access.yaml | 12 + .../cases/access/system/permission.yaml | 20 ++ app/fixtures/custom/cases/case.yaml | 33 +++ app/fixtures/custom/cases/case_status.yaml | 84 +++++++ app/fixtures/custom/cases/config.yaml | 40 ++++ app/fixtures/custom/cases/metadata.yaml | 21 ++ .../custom/cases/system/parameter.yaml | 13 ++ app/fixtures/custom/cases/system/tenant.yaml | 6 + .../custom/cms/access/anonymous/access.yaml | 10 + .../cms/access/anonymous/permission.yaml | 39 ++++ .../custom/cms/access/individual/access.yaml | 9 + .../cms/access/individual/permission.yaml | 9 + .../cms/access/organization/access.yaml | 9 + .../cms/access/organization/permission.yaml | 9 + .../custom/cms/access/role/access.yaml | 29 +++ .../custom/cms/access/role/permission.yaml | 180 +++++++++++++++ .../custom/cms/access/staff/access.yaml | 9 + .../custom/cms/access/staff/permission.yaml | 9 + .../custom/cms/access/system/access.yaml | 12 + .../custom/cms/access/system/permission.yaml | 20 ++ app/fixtures/custom/cms/config.yaml | 40 ++++ app/fixtures/custom/cms/data.yaml | 27 +++ app/fixtures/custom/cms/file.yaml | 25 ++ app/fixtures/custom/cms/metadata.yaml | 11 + app/fixtures/custom/cms/system/parameter.yaml | 13 ++ app/fixtures/custom/cms/system/tenant.yaml | 6 + app/fixtures/custom/cms/text.yaml | 29 +++ .../custom/forms/access/anonymous/access.yaml | 9 + .../forms/access/anonymous/permission.yaml | 9 + .../forms/access/individual/access.yaml | 9 + .../forms/access/individual/permission.yaml | 9 + .../forms/access/organization/access.yaml | 9 + .../forms/access/organization/permission.yaml | 9 + .../custom/forms/access/role/access.yaml | 29 +++ .../custom/forms/access/role/permission.yaml | 118 ++++++++++ .../custom/forms/access/staff/access.yaml | 9 + .../custom/forms/access/staff/permission.yaml | 9 + .../custom/forms/access/system/access.yaml | 12 + .../forms/access/system/permission.yaml | 20 ++ app/fixtures/custom/forms/config.yaml | 40 ++++ app/fixtures/custom/forms/form.yaml | 47 ++++ .../components/pothole-report-review.json | 88 +++++++ .../formio/components/pothole-report.json | 53 +++++ .../formio/submission_access/anonymous.json | 36 +++ app/fixtures/custom/forms/metadata.yaml | 11 + .../custom/forms/system/parameter.yaml | 13 ++ app/fixtures/custom/forms/system/tenant.yaml | 6 + .../identities/access/anonymous/access.yaml | 9 + .../access/anonymous/permission.yaml | 9 + .../identities/access/individual/access.yaml | 9 + .../access/individual/permission.yaml | 9 + .../access/organization/access.yaml | 9 + .../access/organization/permission.yaml | 9 + .../custom/identities/access/role/access.yaml | 29 +++ .../identities/access/role/permission.yaml | 214 ++++++++++++++++++ .../identities/access/staff/access.yaml | 9 + .../identities/access/staff/permission.yaml | 9 + .../identities/access/system/access.yaml | 12 + .../identities/access/system/permission.yaml | 20 ++ .../custom/identities/business_unit.yaml | 22 ++ app/fixtures/custom/identities/config.yaml | 40 ++++ .../identity/anonymous/identity.yaml | 7 + .../identity/anonymous/persona.yaml | 12 + .../identities/identity/anonymous/role.yaml | 10 + .../identity/individual/identity.yaml | 8 + .../identity/individual/persona.yaml | 28 +++ .../identities/identity/individual/role.yaml | 12 + .../identity/organization/identity.yaml | 8 + .../identity/organization/persona.yaml | 28 +++ .../identity/organization/role.yaml | 12 + .../identities/identity/staff/identity.yaml | 32 +++ .../identities/identity/staff/persona.yaml | 27 +++ .../identities/identity/staff/role.yaml | 36 +++ .../identities/identity/system/identity.yaml | 9 + .../identities/identity/system/role.yaml | 10 + app/fixtures/custom/identities/metadata.yaml | 11 + app/fixtures/custom/identities/role.yaml | 51 +++++ .../custom/identities/system/parameter.yaml | 13 ++ .../custom/identities/system/tenant.yaml | 6 + .../microservice/access/anonymous/access.yaml | 9 + .../access/anonymous/permission.yaml | 9 + .../access/individual/access.yaml | 9 + .../access/individual/permission.yaml | 9 + .../access/organization/access.yaml | 9 + .../access/organization/permission.yaml | 9 + .../microservice/access/role/access.yaml | 9 + .../microservice/access/role/permission.yaml | 9 + .../microservice/access/staff/access.yaml | 9 + .../microservice/access/staff/permission.yaml | 9 + .../microservice/access/system/access.yaml | 12 + .../access/system/permission.yaml | 20 ++ app/fixtures/custom/microservice/config.yaml | 40 ++++ .../custom/microservice/metadata.yaml | 11 + .../custom/microservice/system/parameter.yaml | 13 ++ .../custom/microservice/system/tenant.yaml | 6 + .../records/access/anonymous/access.yaml | 10 + .../records/access/anonymous/permission.yaml | 22 ++ .../records/access/individual/access.yaml | 9 + .../records/access/individual/permission.yaml | 9 + .../records/access/organization/access.yaml | 9 + .../access/organization/permission.yaml | 9 + .../custom/records/access/role/access.yaml | 29 +++ .../records/access/role/permission.yaml | 128 +++++++++++ .../custom/records/access/staff/access.yaml | 9 + .../records/access/staff/permission.yaml | 9 + .../custom/records/access/system/access.yaml | 12 + .../records/access/system/permission.yaml | 20 ++ app/fixtures/custom/records/config.yaml | 40 ++++ app/fixtures/custom/records/metadata.yaml | 11 + app/fixtures/custom/records/record.yaml | 28 +++ .../custom/records/system/parameter.yaml | 13 ++ .../custom/records/system/tenant.yaml | 6 + .../services/access/anonymous/access.yaml | 10 + .../services/access/anonymous/permission.yaml | 45 ++++ .../services/access/individual/access.yaml | 9 + .../access/individual/permission.yaml | 9 + .../services/access/organization/access.yaml | 9 + .../access/organization/permission.yaml | 9 + .../custom/services/access/role/access.yaml | 29 +++ .../services/access/role/permission.yaml | 194 ++++++++++++++++ .../custom/services/access/staff/access.yaml | 9 + .../services/access/staff/permission.yaml | 9 + .../custom/services/access/system/access.yaml | 12 + .../services/access/system/permission.yaml | 20 ++ app/fixtures/custom/services/category.yaml | 45 ++++ app/fixtures/custom/services/config.yaml | 80 +++++++ app/fixtures/custom/services/metadata.yaml | 11 + app/fixtures/custom/services/scenario.yaml | 104 +++++++++ app/fixtures/custom/services/service.yaml | 52 +++++ .../custom/services/system/parameter.yaml | 13 ++ .../custom/services/system/tenant.yaml | 6 + .../workflow/bpmn/pothole-report.bpmn | 49 ++++ .../custom/services/workflow/deployment.yaml | 10 + .../custom/tasks/access/anonymous/access.yaml | 10 + .../tasks/access/anonymous/permission.yaml | 30 +++ .../tasks/access/individual/access.yaml | 9 + .../tasks/access/individual/permission.yaml | 9 + .../tasks/access/organization/access.yaml | 9 + .../tasks/access/organization/permission.yaml | 9 + .../custom/tasks/access/role/access.yaml | 29 +++ .../custom/tasks/access/role/permission.yaml | 144 ++++++++++++ .../custom/tasks/access/staff/access.yaml | 9 + .../custom/tasks/access/staff/permission.yaml | 9 + .../custom/tasks/access/system/access.yaml | 12 + .../tasks/access/system/permission.yaml | 20 ++ app/fixtures/custom/tasks/config.yaml | 44 ++++ app/fixtures/custom/tasks/metadata.yaml | 11 + .../custom/tasks/system/parameter.yaml | 13 ++ app/fixtures/custom/tasks/system/tenant.yaml | 6 + .../tenants/access/anonymous/access.yaml | 9 + .../tenants/access/anonymous/permission.yaml | 9 + .../tenants/access/individual/access.yaml | 9 + .../tenants/access/individual/permission.yaml | 9 + .../tenants/access/organization/access.yaml | 9 + .../access/organization/permission.yaml | 9 + .../custom/tenants/access/role/access.yaml | 9 + .../tenants/access/role/permission.yaml | 9 + .../custom/tenants/access/staff/access.yaml | 9 + .../tenants/access/staff/permission.yaml | 9 + .../custom/tenants/access/system/access.yaml | 12 + .../tenants/access/system/permission.yaml | 20 ++ app/fixtures/custom/tenants/config.yaml | 40 ++++ app/fixtures/custom/tenants/metadata.yaml | 11 + app/fixtures/custom/tenants/plan.yaml | 20 ++ .../custom/tenants/system/parameter.yaml | 13 ++ .../custom/tenants/system/tenant.yaml | 6 + app/fixtures/custom/tenants/tenant.yaml | 12 + 218 files changed, 5124 insertions(+) create mode 100644 app/fixtures/custom/assets/access/anonymous/access.yaml create mode 100644 app/fixtures/custom/assets/access/anonymous/permission.yaml create mode 100644 app/fixtures/custom/assets/access/individual/access.yaml create mode 100644 app/fixtures/custom/assets/access/individual/permission.yaml create mode 100644 app/fixtures/custom/assets/access/organization/access.yaml create mode 100644 app/fixtures/custom/assets/access/organization/permission.yaml create mode 100644 app/fixtures/custom/assets/access/role/access.yaml create mode 100644 app/fixtures/custom/assets/access/role/permission.yaml create mode 100644 app/fixtures/custom/assets/access/staff/access.yaml create mode 100644 app/fixtures/custom/assets/access/staff/permission.yaml create mode 100644 app/fixtures/custom/assets/access/system/access.yaml create mode 100644 app/fixtures/custom/assets/access/system/permission.yaml create mode 100644 app/fixtures/custom/assets/asset.yaml create mode 100644 app/fixtures/custom/assets/config.yaml create mode 100644 app/fixtures/custom/assets/metadata.yaml create mode 100644 app/fixtures/custom/assets/system/parameter.yaml create mode 100644 app/fixtures/custom/assets/system/tenant.yaml create mode 100644 app/fixtures/custom/authentication/access/anonymous/access.yaml create mode 100644 app/fixtures/custom/authentication/access/anonymous/permission.yaml create mode 100644 app/fixtures/custom/authentication/access/individual/access.yaml create mode 100644 app/fixtures/custom/authentication/access/individual/permission.yaml create mode 100644 app/fixtures/custom/authentication/access/organization/access.yaml create mode 100644 app/fixtures/custom/authentication/access/organization/permission.yaml create mode 100644 app/fixtures/custom/authentication/access/role/access.yaml create mode 100644 app/fixtures/custom/authentication/access/role/permission.yaml create mode 100644 app/fixtures/custom/authentication/access/staff/access.yaml create mode 100644 app/fixtures/custom/authentication/access/staff/permission.yaml create mode 100644 app/fixtures/custom/authentication/access/system/access.yaml create mode 100644 app/fixtures/custom/authentication/access/system/permission.yaml create mode 100644 app/fixtures/custom/authentication/config.yaml create mode 100644 app/fixtures/custom/authentication/metadata.yaml create mode 100644 app/fixtures/custom/authentication/system/parameter.yaml create mode 100644 app/fixtures/custom/authentication/system/tenant.yaml create mode 100644 app/fixtures/custom/authentication/user/anonymous/registration.yaml create mode 100644 app/fixtures/custom/authentication/user/anonymous/user.yaml create mode 100644 app/fixtures/custom/authentication/user/individual/registration.yaml create mode 100644 app/fixtures/custom/authentication/user/individual/user.yaml create mode 100644 app/fixtures/custom/authentication/user/organization/registration.yaml create mode 100644 app/fixtures/custom/authentication/user/organization/user.yaml create mode 100644 app/fixtures/custom/authentication/user/staff/user.yaml create mode 100644 app/fixtures/custom/authentication/user/system/user.yaml create mode 100644 app/fixtures/custom/cases/access/anonymous/access.yaml create mode 100644 app/fixtures/custom/cases/access/anonymous/permission.yaml create mode 100644 app/fixtures/custom/cases/access/individual/access.yaml create mode 100644 app/fixtures/custom/cases/access/individual/permission.yaml create mode 100644 app/fixtures/custom/cases/access/organization/access.yaml create mode 100644 app/fixtures/custom/cases/access/organization/permission.yaml create mode 100644 app/fixtures/custom/cases/access/role/access.yaml create mode 100644 app/fixtures/custom/cases/access/role/permission.yaml create mode 100644 app/fixtures/custom/cases/access/staff/access.yaml create mode 100644 app/fixtures/custom/cases/access/staff/permission.yaml create mode 100644 app/fixtures/custom/cases/access/system/access.yaml create mode 100644 app/fixtures/custom/cases/access/system/permission.yaml create mode 100644 app/fixtures/custom/cases/case.yaml create mode 100644 app/fixtures/custom/cases/case_status.yaml create mode 100644 app/fixtures/custom/cases/config.yaml create mode 100644 app/fixtures/custom/cases/metadata.yaml create mode 100644 app/fixtures/custom/cases/system/parameter.yaml create mode 100644 app/fixtures/custom/cases/system/tenant.yaml create mode 100644 app/fixtures/custom/cms/access/anonymous/access.yaml create mode 100644 app/fixtures/custom/cms/access/anonymous/permission.yaml create mode 100644 app/fixtures/custom/cms/access/individual/access.yaml create mode 100644 app/fixtures/custom/cms/access/individual/permission.yaml create mode 100644 app/fixtures/custom/cms/access/organization/access.yaml create mode 100644 app/fixtures/custom/cms/access/organization/permission.yaml create mode 100644 app/fixtures/custom/cms/access/role/access.yaml create mode 100644 app/fixtures/custom/cms/access/role/permission.yaml create mode 100644 app/fixtures/custom/cms/access/staff/access.yaml create mode 100644 app/fixtures/custom/cms/access/staff/permission.yaml create mode 100644 app/fixtures/custom/cms/access/system/access.yaml create mode 100644 app/fixtures/custom/cms/access/system/permission.yaml create mode 100644 app/fixtures/custom/cms/config.yaml create mode 100644 app/fixtures/custom/cms/data.yaml create mode 100644 app/fixtures/custom/cms/file.yaml create mode 100644 app/fixtures/custom/cms/metadata.yaml create mode 100644 app/fixtures/custom/cms/system/parameter.yaml create mode 100644 app/fixtures/custom/cms/system/tenant.yaml create mode 100644 app/fixtures/custom/cms/text.yaml create mode 100644 app/fixtures/custom/forms/access/anonymous/access.yaml create mode 100644 app/fixtures/custom/forms/access/anonymous/permission.yaml create mode 100644 app/fixtures/custom/forms/access/individual/access.yaml create mode 100644 app/fixtures/custom/forms/access/individual/permission.yaml create mode 100644 app/fixtures/custom/forms/access/organization/access.yaml create mode 100644 app/fixtures/custom/forms/access/organization/permission.yaml create mode 100644 app/fixtures/custom/forms/access/role/access.yaml create mode 100644 app/fixtures/custom/forms/access/role/permission.yaml create mode 100644 app/fixtures/custom/forms/access/staff/access.yaml create mode 100644 app/fixtures/custom/forms/access/staff/permission.yaml create mode 100644 app/fixtures/custom/forms/access/system/access.yaml create mode 100644 app/fixtures/custom/forms/access/system/permission.yaml create mode 100644 app/fixtures/custom/forms/config.yaml create mode 100644 app/fixtures/custom/forms/form.yaml create mode 100644 app/fixtures/custom/forms/forms/formio/components/pothole-report-review.json create mode 100644 app/fixtures/custom/forms/forms/formio/components/pothole-report.json create mode 100644 app/fixtures/custom/forms/forms/formio/submission_access/anonymous.json create mode 100644 app/fixtures/custom/forms/metadata.yaml create mode 100644 app/fixtures/custom/forms/system/parameter.yaml create mode 100644 app/fixtures/custom/forms/system/tenant.yaml create mode 100644 app/fixtures/custom/identities/access/anonymous/access.yaml create mode 100644 app/fixtures/custom/identities/access/anonymous/permission.yaml create mode 100644 app/fixtures/custom/identities/access/individual/access.yaml create mode 100644 app/fixtures/custom/identities/access/individual/permission.yaml create mode 100644 app/fixtures/custom/identities/access/organization/access.yaml create mode 100644 app/fixtures/custom/identities/access/organization/permission.yaml create mode 100644 app/fixtures/custom/identities/access/role/access.yaml create mode 100644 app/fixtures/custom/identities/access/role/permission.yaml create mode 100644 app/fixtures/custom/identities/access/staff/access.yaml create mode 100644 app/fixtures/custom/identities/access/staff/permission.yaml create mode 100644 app/fixtures/custom/identities/access/system/access.yaml create mode 100644 app/fixtures/custom/identities/access/system/permission.yaml create mode 100644 app/fixtures/custom/identities/business_unit.yaml create mode 100644 app/fixtures/custom/identities/config.yaml create mode 100644 app/fixtures/custom/identities/identity/anonymous/identity.yaml create mode 100644 app/fixtures/custom/identities/identity/anonymous/persona.yaml create mode 100644 app/fixtures/custom/identities/identity/anonymous/role.yaml create mode 100644 app/fixtures/custom/identities/identity/individual/identity.yaml create mode 100644 app/fixtures/custom/identities/identity/individual/persona.yaml create mode 100644 app/fixtures/custom/identities/identity/individual/role.yaml create mode 100644 app/fixtures/custom/identities/identity/organization/identity.yaml create mode 100644 app/fixtures/custom/identities/identity/organization/persona.yaml create mode 100644 app/fixtures/custom/identities/identity/organization/role.yaml create mode 100644 app/fixtures/custom/identities/identity/staff/identity.yaml create mode 100644 app/fixtures/custom/identities/identity/staff/persona.yaml create mode 100644 app/fixtures/custom/identities/identity/staff/role.yaml create mode 100644 app/fixtures/custom/identities/identity/system/identity.yaml create mode 100644 app/fixtures/custom/identities/identity/system/role.yaml create mode 100644 app/fixtures/custom/identities/metadata.yaml create mode 100644 app/fixtures/custom/identities/role.yaml create mode 100644 app/fixtures/custom/identities/system/parameter.yaml create mode 100644 app/fixtures/custom/identities/system/tenant.yaml create mode 100644 app/fixtures/custom/microservice/access/anonymous/access.yaml create mode 100644 app/fixtures/custom/microservice/access/anonymous/permission.yaml create mode 100644 app/fixtures/custom/microservice/access/individual/access.yaml create mode 100644 app/fixtures/custom/microservice/access/individual/permission.yaml create mode 100644 app/fixtures/custom/microservice/access/organization/access.yaml create mode 100644 app/fixtures/custom/microservice/access/organization/permission.yaml create mode 100644 app/fixtures/custom/microservice/access/role/access.yaml create mode 100644 app/fixtures/custom/microservice/access/role/permission.yaml create mode 100644 app/fixtures/custom/microservice/access/staff/access.yaml create mode 100644 app/fixtures/custom/microservice/access/staff/permission.yaml create mode 100644 app/fixtures/custom/microservice/access/system/access.yaml create mode 100644 app/fixtures/custom/microservice/access/system/permission.yaml create mode 100644 app/fixtures/custom/microservice/config.yaml create mode 100644 app/fixtures/custom/microservice/metadata.yaml create mode 100644 app/fixtures/custom/microservice/system/parameter.yaml create mode 100644 app/fixtures/custom/microservice/system/tenant.yaml create mode 100644 app/fixtures/custom/records/access/anonymous/access.yaml create mode 100644 app/fixtures/custom/records/access/anonymous/permission.yaml create mode 100644 app/fixtures/custom/records/access/individual/access.yaml create mode 100644 app/fixtures/custom/records/access/individual/permission.yaml create mode 100644 app/fixtures/custom/records/access/organization/access.yaml create mode 100644 app/fixtures/custom/records/access/organization/permission.yaml create mode 100644 app/fixtures/custom/records/access/role/access.yaml create mode 100644 app/fixtures/custom/records/access/role/permission.yaml create mode 100644 app/fixtures/custom/records/access/staff/access.yaml create mode 100644 app/fixtures/custom/records/access/staff/permission.yaml create mode 100644 app/fixtures/custom/records/access/system/access.yaml create mode 100644 app/fixtures/custom/records/access/system/permission.yaml create mode 100644 app/fixtures/custom/records/config.yaml create mode 100644 app/fixtures/custom/records/metadata.yaml create mode 100644 app/fixtures/custom/records/record.yaml create mode 100644 app/fixtures/custom/records/system/parameter.yaml create mode 100644 app/fixtures/custom/records/system/tenant.yaml create mode 100644 app/fixtures/custom/services/access/anonymous/access.yaml create mode 100644 app/fixtures/custom/services/access/anonymous/permission.yaml create mode 100644 app/fixtures/custom/services/access/individual/access.yaml create mode 100644 app/fixtures/custom/services/access/individual/permission.yaml create mode 100644 app/fixtures/custom/services/access/organization/access.yaml create mode 100644 app/fixtures/custom/services/access/organization/permission.yaml create mode 100644 app/fixtures/custom/services/access/role/access.yaml create mode 100644 app/fixtures/custom/services/access/role/permission.yaml create mode 100644 app/fixtures/custom/services/access/staff/access.yaml create mode 100644 app/fixtures/custom/services/access/staff/permission.yaml create mode 100644 app/fixtures/custom/services/access/system/access.yaml create mode 100644 app/fixtures/custom/services/access/system/permission.yaml create mode 100644 app/fixtures/custom/services/category.yaml create mode 100644 app/fixtures/custom/services/config.yaml create mode 100644 app/fixtures/custom/services/metadata.yaml create mode 100644 app/fixtures/custom/services/scenario.yaml create mode 100644 app/fixtures/custom/services/service.yaml create mode 100644 app/fixtures/custom/services/system/parameter.yaml create mode 100644 app/fixtures/custom/services/system/tenant.yaml create mode 100644 app/fixtures/custom/services/workflow/bpmn/pothole-report.bpmn create mode 100644 app/fixtures/custom/services/workflow/deployment.yaml create mode 100644 app/fixtures/custom/tasks/access/anonymous/access.yaml create mode 100644 app/fixtures/custom/tasks/access/anonymous/permission.yaml create mode 100644 app/fixtures/custom/tasks/access/individual/access.yaml create mode 100644 app/fixtures/custom/tasks/access/individual/permission.yaml create mode 100644 app/fixtures/custom/tasks/access/organization/access.yaml create mode 100644 app/fixtures/custom/tasks/access/organization/permission.yaml create mode 100644 app/fixtures/custom/tasks/access/role/access.yaml create mode 100644 app/fixtures/custom/tasks/access/role/permission.yaml create mode 100644 app/fixtures/custom/tasks/access/staff/access.yaml create mode 100644 app/fixtures/custom/tasks/access/staff/permission.yaml create mode 100644 app/fixtures/custom/tasks/access/system/access.yaml create mode 100644 app/fixtures/custom/tasks/access/system/permission.yaml create mode 100644 app/fixtures/custom/tasks/config.yaml create mode 100644 app/fixtures/custom/tasks/metadata.yaml create mode 100644 app/fixtures/custom/tasks/system/parameter.yaml create mode 100644 app/fixtures/custom/tasks/system/tenant.yaml create mode 100644 app/fixtures/custom/tenants/access/anonymous/access.yaml create mode 100644 app/fixtures/custom/tenants/access/anonymous/permission.yaml create mode 100644 app/fixtures/custom/tenants/access/individual/access.yaml create mode 100644 app/fixtures/custom/tenants/access/individual/permission.yaml create mode 100644 app/fixtures/custom/tenants/access/organization/access.yaml create mode 100644 app/fixtures/custom/tenants/access/organization/permission.yaml create mode 100644 app/fixtures/custom/tenants/access/role/access.yaml create mode 100644 app/fixtures/custom/tenants/access/role/permission.yaml create mode 100644 app/fixtures/custom/tenants/access/staff/access.yaml create mode 100644 app/fixtures/custom/tenants/access/staff/permission.yaml create mode 100644 app/fixtures/custom/tenants/access/system/access.yaml create mode 100644 app/fixtures/custom/tenants/access/system/permission.yaml create mode 100644 app/fixtures/custom/tenants/config.yaml create mode 100644 app/fixtures/custom/tenants/metadata.yaml create mode 100644 app/fixtures/custom/tenants/plan.yaml create mode 100644 app/fixtures/custom/tenants/system/parameter.yaml create mode 100644 app/fixtures/custom/tenants/system/tenant.yaml create mode 100644 app/fixtures/custom/tenants/tenant.yaml diff --git a/app/fixtures/custom/assets/access/anonymous/access.yaml b/app/fixtures/custom/assets/access/anonymous/access.yaml new file mode 100644 index 00000000..6ff796c5 --- /dev/null +++ b/app/fixtures/custom/assets/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: d90729ab-d9fe-4634-866b-93f1b1ec0d43 + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/anonymous/permission.yaml b/app/fixtures/custom/assets/access/anonymous/permission.yaml new file mode 100644 index 00000000..8887d079 --- /dev/null +++ b/app/fixtures/custom/assets/access/anonymous/permission.yaml @@ -0,0 +1,22 @@ +objects: + - access: d90729ab-d9fe-4634-866b-93f1b1ec0d43 # Anonymous + scope: + type: session + key: + - asset + - asset_uuid + - asset_title + - asset_data + - asset_association + - asset_association_uuid + - asset_association_entity + - asset_association_entity_uuid + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/individual/access.yaml b/app/fixtures/custom/assets/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/assets/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/individual/permission.yaml b/app/fixtures/custom/assets/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/assets/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/organization/access.yaml b/app/fixtures/custom/assets/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/assets/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/organization/permission.yaml b/app/fixtures/custom/assets/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/assets/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/role/access.yaml b/app/fixtures/custom/assets/access/role/access.yaml new file mode 100644 index 00000000..bb8e39d6 --- /dev/null +++ b/app/fixtures/custom/assets/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: c4fcda7a-601e-4ad9-ad08-69f59630567e + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 081bc44e-ef70-494c-80fd-6f381a034ca7 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: c53208e7-3fbe-44a3-ab37-378bfeaaf97d + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: 0242cef6-d323-4b2a-be1d-33d220c16984 + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 847758a3-10af-4b2a-8862-c3a0207ec0bc + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 8df3f13f-3cd6-4bb9-bc83-77df7d8c91b7 + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: 492bad7f-8ab4-40f5-9153-0f3c059b1afd + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/role/permission.yaml b/app/fixtures/custom/assets/access/role/permission.yaml new file mode 100644 index 00000000..eeaf6256 --- /dev/null +++ b/app/fixtures/custom/assets/access/role/permission.yaml @@ -0,0 +1,128 @@ +objects: + - access: c4fcda7a-601e-4ad9-ad08-69f59630567e # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: c4fcda7a-601e-4ad9-ad08-69f59630567e # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: c4fcda7a-601e-4ad9-ad08-69f59630567e # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 081bc44e-ef70-494c-80fd-6f381a034ca7 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - asset + - asset_association + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 081bc44e-ef70-494c-80fd-6f381a034ca7 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - asset_property + - asset_association_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: c53208e7-3fbe-44a3-ab37-378bfeaaf97d # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - asset + - asset_association + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: c53208e7-3fbe-44a3-ab37-378bfeaaf97d # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - asset_property + - asset_association_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 0242cef6-d323-4b2a-be1d-33d220c16984 # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - asset + - asset_property + - asset_association + - asset_association_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 847758a3-10af-4b2a-8862-c3a0207ec0bc # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - asset + - asset_property + - asset_association + - asset_association_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 8df3f13f-3cd6-4bb9-bc83-77df7d8c91b7 # Individual + scope: + type: session + key: + - asset + - asset_uuid + - asset_title + - asset_data + - asset_association + - asset_association_uuid + - asset_association_entity + - asset_association_entity_uuid + attributes: [BROWSE, READ] + + - access: 492bad7f-8ab4-40f5-9153-0f3c059b1afd # Organization + scope: + type: session + key: + - asset + - asset_uuid + - asset_title + - asset_data + - asset_association + - asset_association_uuid + - asset_association_entity + - asset_association_entity_uuid + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/staff/access.yaml b/app/fixtures/custom/assets/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/assets/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/staff/permission.yaml b/app/fixtures/custom/assets/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/assets/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/system/access.yaml b/app/fixtures/custom/assets/access/system/access.yaml new file mode 100644 index 00000000..01388fb4 --- /dev/null +++ b/app/fixtures/custom/assets/access/system/access.yaml @@ -0,0 +1,16 @@ +objects: + - uuid: ac6b6279-857d-4f02-88d8-322a3168734d + owner_uuid: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + assignee_uuid: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 30bda715-1bdd-4ebf-9fc1-991b90f4dc74 + owner_uuid: 60591cbd-efad-4289-9b7c-a258016e94cb # Bpm + assignee_uuid: 60591cbd-efad-4289-9b7c-a258016e94cb # Bpm + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/access/system/permission.yaml b/app/fixtures/custom/assets/access/system/permission.yaml new file mode 100644 index 00000000..469f75e2 --- /dev/null +++ b/app/fixtures/custom/assets/access/system/permission.yaml @@ -0,0 +1,32 @@ +objects: + - access: ac6b6279-857d-4f02-88d8-322a3168734d # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: ac6b6279-857d-4f02-88d8-322a3168734d # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: ac6b6279-857d-4f02-88d8-322a3168734d # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 30bda715-1bdd-4ebf-9fc1-991b90f4dc74 # Bpm + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 30bda715-1bdd-4ebf-9fc1-991b90f4dc74 # Bpm + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 30bda715-1bdd-4ebf-9fc1-991b90f4dc74 # Bpm + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/asset.yaml b/app/fixtures/custom/assets/asset.yaml new file mode 100644 index 00000000..0258854f --- /dev/null +++ b/app/fixtures/custom/assets/asset.yaml @@ -0,0 +1,30 @@ +objects: + - uuid: c64bf657-a877-4127-bdcb-449e7e3985b3 + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Animal License + fr: Permis animalier + data: + id: 1 + type: dog + + - uuid: 7ddbae00-20a6-48b8-8ab8-bdf117d26586 + identity: Organization + identity_uuid: 5946a069-95d4-4536-9f78-41ca96316cc5 # Acme + title: + en: Animal License + fr: Permis animalier + data: + id: 2 + type: cat + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: ~ + identity_uuid: ~ + title: {} + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/config.yaml b/app/fixtures/custom/assets/config.yaml new file mode 100644 index 00000000..b8e67f6a --- /dev/null +++ b/app/fixtures/custom/assets/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: c8b9d2cd-b3eb-4dd1-baad-fe985136b97f + key: ds_api.user.username + value: system@system.ds + + - uuid: ed54565b-060e-4f15-9f9d-8f7585d357db + key: ds_api.user.password + value: system + + - uuid: 164e6695-cc40-4028-acd9-3616f0245884 + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: ad905f36-44ac-4ae2-80a8-3fcaabfdd1bd + key: ds_api.user.roles + value: [] + + - uuid: ca5a660f-4ce8-4e20-a2b6-31cd2e508fd3 + key: ds_api.user.identity.roles + value: [] + + - uuid: 446fa498-3106-4fe9-8b29-8811464aa7a7 + key: ds_api.user.identity.type + value: System + + - uuid: d53ad899-5f5d-4d0a-ace3-f0466625cfa6 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 13daece8-213c-417e-86f4-4dea486117f5 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/metadata.yaml b/app/fixtures/custom/assets/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/assets/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/assets/system/parameter.yaml b/app/fixtures/custom/assets/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/assets/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/assets/system/tenant.yaml b/app/fixtures/custom/assets/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/assets/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/authentication/access/anonymous/access.yaml b/app/fixtures/custom/authentication/access/anonymous/access.yaml new file mode 100644 index 00000000..e0da9f60 --- /dev/null +++ b/app/fixtures/custom/authentication/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: 8305bdb8-b932-41e7-b29c-e1f81964b6db + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/anonymous/permission.yaml b/app/fixtures/custom/authentication/access/anonymous/permission.yaml new file mode 100644 index 00000000..2bb7a19d --- /dev/null +++ b/app/fixtures/custom/authentication/access/anonymous/permission.yaml @@ -0,0 +1,31 @@ +objects: + - access: 8305bdb8-b932-41e7-b29c-e1f81964b6db # Anonymous + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: registration + attributes: [ADD] + + - access: 8305bdb8-b932-41e7-b29c-e1f81964b6db # Anonymous + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - registration_owner + - registration_owner_uuid + - registration_identity + - registration_username + - registration_password + - registration_data + - registration_version + attributes: [EDIT] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/individual/access.yaml b/app/fixtures/custom/authentication/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/authentication/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/individual/permission.yaml b/app/fixtures/custom/authentication/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/authentication/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/organization/access.yaml b/app/fixtures/custom/authentication/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/authentication/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/organization/permission.yaml b/app/fixtures/custom/authentication/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/authentication/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/role/access.yaml b/app/fixtures/custom/authentication/access/role/access.yaml new file mode 100644 index 00000000..b4f145a3 --- /dev/null +++ b/app/fixtures/custom/authentication/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: 2232d711-9e8f-4ef0-bd9f-d27a1835518a + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: b36174a8-eb28-4654-8fe8-938ba64ec758 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: 903f2b1e-5df9-48dd-a739-0a757033f835 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: 2c8514ff-b13e-4df1-8036-724916bcef22 + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 4fddbb03-ed65-4a36-a863-91716e19adfd + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: ad2e18be-54c9-4331-8455-e56b058e8b0a + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: ce9add98-00ac-4dec-a860-2218300ebbea + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/role/permission.yaml b/app/fixtures/custom/authentication/access/role/permission.yaml new file mode 100644 index 00000000..186f23dc --- /dev/null +++ b/app/fixtures/custom/authentication/access/role/permission.yaml @@ -0,0 +1,152 @@ +objects: + - access: 2232d711-9e8f-4ef0-bd9f-d27a1835518a # Administrator + scope: + type: owner + entity: BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 2232d711-9e8f-4ef0-bd9f-d27a1835518a # Administrator + scope: + type: owner + entity: BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 2232d711-9e8f-4ef0-bd9f-d27a1835518a # Administrator + scope: + type: generic + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: b36174a8-eb28-4654-8fe8-938ba64ec758 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - user + - registration + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: b36174a8-eb28-4654-8fe8-938ba64ec758 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - user_property + - registration_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 903f2b1e-5df9-48dd-a739-0a757033f835 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - user + - registration + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 903f2b1e-5df9-48dd-a739-0a757033f835 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - user_property + - registration_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 2c8514ff-b13e-4df1-8036-724916bcef22 # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - user + - user_property + - registration + - registration_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 4fddbb03-ed65-4a36-a863-91716e19adfd # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - user + - user_property + - registration + - registration_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: ad2e18be-54c9-4331-8455-e56b058e8b0a # Individual + scope: + type: session + key: user + attributes: [BROWSE, READ, EDIT] + + - access: ad2e18be-54c9-4331-8455-e56b058e8b0a # Individual + scope: + type: session + key: + - user_uuid + - user_created_at + - user_username + - user_email + - user_version + attributes: [BROWSE, READ] + + - access: ad2e18be-54c9-4331-8455-e56b058e8b0a # Individual + scope: + type: session + key: + - user_username + - user_email + - user_version + attributes: [EDIT] + + - access: ce9add98-00ac-4dec-a860-2218300ebbea # Organization + scope: + type: session + key: user + attributes: [BROWSE, READ, EDIT] + + - access: ce9add98-00ac-4dec-a860-2218300ebbea # Organization + scope: + type: session + key: + - user_uuid + - user_created_at + - user_username + - user_email + - user_version + attributes: [BROWSE, READ] + + - access: ce9add98-00ac-4dec-a860-2218300ebbea # Organization + scope: + type: session + key: + - user_username + - user_email + - user_version + attributes: [EDIT] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/staff/access.yaml b/app/fixtures/custom/authentication/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/authentication/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/staff/permission.yaml b/app/fixtures/custom/authentication/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/authentication/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/system/access.yaml b/app/fixtures/custom/authentication/access/system/access.yaml new file mode 100644 index 00000000..61e8349a --- /dev/null +++ b/app/fixtures/custom/authentication/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 1565a59a-687e-464b-89cc-e3e72b6eadaa + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/access/system/permission.yaml b/app/fixtures/custom/authentication/access/system/permission.yaml new file mode 100644 index 00000000..f79e6ae1 --- /dev/null +++ b/app/fixtures/custom/authentication/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 1565a59a-687e-464b-89cc-e3e72b6eadaa # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 1565a59a-687e-464b-89cc-e3e72b6eadaa # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 1565a59a-687e-464b-89cc-e3e72b6eadaa # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/config.yaml b/app/fixtures/custom/authentication/config.yaml new file mode 100644 index 00000000..87d84ed3 --- /dev/null +++ b/app/fixtures/custom/authentication/config.yaml @@ -0,0 +1,108 @@ +objects: + - uuid: fed82698-e8cc-498a-bf88-ea7c076b690f + key: app.spa.admin + value: http://admin.ds + + - uuid: 0f4a2a6f-5ef7-4281-992c-90e712481b42 + key: app.spa.portal + value: http://portal.ds + + - uuid: 388d89cd-3ed3-401b-8666-31052df05a30 + key: app.registration.individual.owner.type + value: BusinessUnit + + - uuid: c0f29892-4db3-4fdb-b41c-4fe28b799751 + key: app.registration.individual.owner.uuid + value: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + + - uuid: c728b569-8e60-4041-9b90-2458ad1b9029 + key: app.registration.individual.roles + value: [54d82fc6-8ce7-498e-832f-3598664a9d9d] + + - uuid: 435b339e-8281-496e-a5cc-d2fead3473a9 + key: app.registration.individual.enabled + value: true + + - uuid: 89679f58-1256-4985-b98c-186599f659bc + key: app.registration.organization.owner.type + value: BusinessUnit + + - uuid: 7fb6a57f-1a77-499e-96fb-ae35859c5f88 + key: app.registration.organization.owner.uuid + value: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + + - uuid: 55253ea9-177d-4df2-8408-eeaea9f9700f + key: app.registration.organization.roles + value: [777b96e7-e183-44f7-b7e4-dc0cb7591f74] + + - uuid: 650274bd-b889-429c-812b-c0af4bebddf1 + key: app.registration.organization.enabled + value: true + + - uuid: 891e5fea-0331-4ffa-ac52-e877167d74eb + key: app.registration.staff.owner.type + value: BusinessUnit + + - uuid: 653243c7-efca-4d24-b478-a3695f729ab5 + key: app.registration.staff.owner.uuid + value: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + + - uuid: dd5e1d4c-8baa-4ac8-9bc6-9cccb2797a94 + key: app.registration.staff.roles + value: [3e64bbd1-4d00-47e7-a35e-92691f5a6018] + + - uuid: 4780ff40-5bbf-4e25-9a3d-26eef39e2c2d + key: app.registration.staff.enabled + value: false + + - uuid: 25bbaff8-e3c1-4f78-bffd-b8f030672e5c + key: app.resetting.email.subject + value: app.resetting.email.subject + + - uuid: 6ffd25ba-47c9-4bb9-82fb-9cd5b865bb31 + key: app.resetting.email.body.plain + value: app.resetting.email.body.plain + + - uuid: 00d07d5e-e123-47c8-9fc0-980c2d6ca750 + key: app.resetting.email.body.html + value: app.resetting.email.body.html + + - uuid: c59ec23a-6e1b-4fbd-b84f-47311c615e1e + key: ds_api.user.username + value: system@system.ds + + - uuid: 74ae67fa-ae84-4337-bfc4-2346958983a3 + key: ds_api.user.password + value: system + + - uuid: 76211f31-5544-4d38-b11a-44e90f045076 + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 39a63591-0fba-460f-b385-20d5b7fb2661 + key: ds_api.user.roles + value: [] + + - uuid: 1fc71c1f-d089-45b2-a8c9-a5cb4e9ce361 + key: ds_api.user.identity.roles + value: [] + + - uuid: 4c44b547-1ded-40e3-9e64-870305b2e7e4 + key: ds_api.user.identity.type + value: System + + - uuid: 70ef6920-1322-484c-b987-4c1a74af6a84 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 1cb0c6c5-96ab-4437-b396-217309b92be0 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/metadata.yaml b/app/fixtures/custom/authentication/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/authentication/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/system/parameter.yaml b/app/fixtures/custom/authentication/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/authentication/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/authentication/system/tenant.yaml b/app/fixtures/custom/authentication/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/authentication/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/authentication/user/anonymous/registration.yaml b/app/fixtures/custom/authentication/user/anonymous/registration.yaml new file mode 100644 index 00000000..3ea18e2a --- /dev/null +++ b/app/fixtures/custom/authentication/user/anonymous/registration.yaml @@ -0,0 +1,10 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + username: ~ + password: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/anonymous/user.yaml b/app/fixtures/custom/authentication/user/anonymous/user.yaml new file mode 100644 index 00000000..23f3b779 --- /dev/null +++ b/app/fixtures/custom/authentication/user/anonymous/user.yaml @@ -0,0 +1,20 @@ +objects: + - uuid: 945824f2-3099-442d-ac4f-6c867a1692e6 + username: anonymous@anonymous.ds + email: anonymous@anonymous.ds + password: anonymous + owner: System + owner_uuid: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + +prototype: + uuid: ~ + username: ~ + email: ~ + password: ~ + enabled: true + roles: [] + owner: BusinessUnit + owner_uuid: ~ + identity: Anonymous + identity_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/individual/registration.yaml b/app/fixtures/custom/authentication/user/individual/registration.yaml new file mode 100644 index 00000000..3ea18e2a --- /dev/null +++ b/app/fixtures/custom/authentication/user/individual/registration.yaml @@ -0,0 +1,10 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + username: ~ + password: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/individual/user.yaml b/app/fixtures/custom/authentication/user/individual/user.yaml new file mode 100644 index 00000000..2b96cd89 --- /dev/null +++ b/app/fixtures/custom/authentication/user/individual/user.yaml @@ -0,0 +1,19 @@ +objects: + - uuid: 42182fd0-9665-4ba4-9f5c-ec290e23814e + username: morgan@individual.ds + email: morgan@individual.ds + password: morgan + identity_uuid: d0daa7e4-07d1-47e6-93f2-0629adaa3b49 # Morgan + +prototype: + uuid: ~ + username: ~ + email: ~ + password: ~ + enabled: true + roles: [] + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/organization/registration.yaml b/app/fixtures/custom/authentication/user/organization/registration.yaml new file mode 100644 index 00000000..3ea18e2a --- /dev/null +++ b/app/fixtures/custom/authentication/user/organization/registration.yaml @@ -0,0 +1,10 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + username: ~ + password: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/organization/user.yaml b/app/fixtures/custom/authentication/user/organization/user.yaml new file mode 100644 index 00000000..da12bb37 --- /dev/null +++ b/app/fixtures/custom/authentication/user/organization/user.yaml @@ -0,0 +1,19 @@ +objects: + - uuid: 336dcc1c-d7dc-46de-9640-e19dc567bd3f + username: acme@organization.ds + email: acme@organization.ds + password: acme + identity_uuid: c9599da5-35a8-494c-9181-975d78be9694 # Acme + +prototype: + uuid: ~ + username: ~ + email: ~ + password: ~ + enabled: true + roles: [] + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Organization + identity_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/staff/user.yaml b/app/fixtures/custom/authentication/user/staff/user.yaml new file mode 100644 index 00000000..cdf83257 --- /dev/null +++ b/app/fixtures/custom/authentication/user/staff/user.yaml @@ -0,0 +1,31 @@ +objects: + - uuid: 40759f94-3e8b-41a1-8a3c-dd84393da5b9 + username: admin@staff.ds + email: admin@staff.ds + password: admin + identity_uuid: e32f09b7-e1cf-4a91-a0e1-6822bf47a662 # Admin + + - uuid: 03f8c569-9c5d-43a8-83bb-9cf6c9249e63 + username: manager@staff.ds + email: manager@staff.ds + password: manager + identity_uuid: 47a5a9cb-496f-4db7-8999-489ec404887f # Manager + + - uuid: 6fc979ec-c210-4b10-b344-600f7ecb2aeb + username: agent@staff.ds + email: agent@staff.ds + password: agent + identity_uuid: 5449ce65-5df0-440d-aead-21a77907e59a # Agent + +prototype: + uuid: ~ + username: ~ + email: ~ + password: ~ + enabled: true + roles: [] + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Staff + identity_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/authentication/user/system/user.yaml b/app/fixtures/custom/authentication/user/system/user.yaml new file mode 100644 index 00000000..a41502eb --- /dev/null +++ b/app/fixtures/custom/authentication/user/system/user.yaml @@ -0,0 +1,27 @@ +objects: + - uuid: 4b0237d1-0917-4d8b-af6d-2aa89be336de + username: system@system.ds + email: system@system.ds + password: system + owner_uuid: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + identity_uuid: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 178fb5a4-2da3-4546-9dc4-f37748bf5652 + username: bpm@system.ds + email: bpm@system.ds + password: bpm + owner_uuid: 60591cbd-efad-4289-9b7c-a258016e94cb # Bpm + identity_uuid: 60591cbd-efad-4289-9b7c-a258016e94cb # Bpm + +prototype: + uuid: ~ + username: ~ + email: ~ + password: ~ + enabled: true + roles: [] + owner: System + owner_uuid: ~ + identity: System + identity_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/anonymous/access.yaml b/app/fixtures/custom/cases/access/anonymous/access.yaml new file mode 100644 index 00000000..6b899c0b --- /dev/null +++ b/app/fixtures/custom/cases/access/anonymous/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/anonymous/permission.yaml b/app/fixtures/custom/cases/access/anonymous/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cases/access/anonymous/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/individual/access.yaml b/app/fixtures/custom/cases/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/cases/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/individual/permission.yaml b/app/fixtures/custom/cases/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cases/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/organization/access.yaml b/app/fixtures/custom/cases/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/cases/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/organization/permission.yaml b/app/fixtures/custom/cases/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cases/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/role/access.yaml b/app/fixtures/custom/cases/access/role/access.yaml new file mode 100644 index 00000000..8c3c8cda --- /dev/null +++ b/app/fixtures/custom/cases/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: e5aec3bf-c524-4f39-b69a-37a4fad9fac5 + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: aaf58d8b-c3b2-4354-9b9f-39e9fbfc1dfb + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: 4ab2f639-724d-49e0-ba75-c3ce36f72c36 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: f0300ff1-4d81-4721-8e5d-4c14e89ffceb + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 12fb8b17-ba00-465b-86fa-21dacb81a13e + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: b5803f52-ed62-4d1f-8e29-c00770613c0c + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: ae8ec633-125a-4a24-b31d-2ef568c5a1ee + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/role/permission.yaml b/app/fixtures/custom/cases/access/role/permission.yaml new file mode 100644 index 00000000..b65837eb --- /dev/null +++ b/app/fixtures/custom/cases/access/role/permission.yaml @@ -0,0 +1,146 @@ +objects: + - access: e5aec3bf-c524-4f39-b69a-37a4fad9fac5 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: e5aec3bf-c524-4f39-b69a-37a4fad9fac5 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: e5aec3bf-c524-4f39-b69a-37a4fad9fac5 # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: aaf58d8b-c3b2-4354-9b9f-39e9fbfc1dfb # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - case + - case_status + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: aaf58d8b-c3b2-4354-9b9f-39e9fbfc1dfb # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - case_property + - case_status_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 4ab2f639-724d-49e0-ba75-c3ce36f72c36 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - case + - case_status + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 4ab2f639-724d-49e0-ba75-c3ce36f72c36 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - case_property + - case_status_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: f0300ff1-4d81-4721-8e5d-4c14e89ffceb # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - case + - case_property + - case_status + - case_status_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 12fb8b17-ba00-465b-86fa-21dacb81a13e # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - case + - case_property + - case_status + - case_status_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: b5803f52-ed62-4d1f-8e29-c00770613c0c # Individual + scope: + type: session + key: + - case + - case_uuid + - case_custom_id + - case_created_at + - case_title + - case_data + - case_state + - case_statuses + - case_version + - case_status + - case_status_uuid + - case_status_created_at + - case_status_case + - case_status_title + - case_status_description + - case_status_data + - case_status_version + attributes: [BROWSE, READ] + + - access: ae8ec633-125a-4a24-b31d-2ef568c5a1ee # Organization + scope: + type: session + key: + - case + - case_uuid + - case_custom_id + - case_created_at + - case_title + - case_data + - case_state + - case_statuses + - case_version + - case_status + - case_status_uuid + - case_status_created_at + - case_status_case + - case_status_title + - case_status_description + - case_status_data + - case_status_version + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/staff/access.yaml b/app/fixtures/custom/cases/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/cases/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/staff/permission.yaml b/app/fixtures/custom/cases/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cases/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/system/access.yaml b/app/fixtures/custom/cases/access/system/access.yaml new file mode 100644 index 00000000..e73240cd --- /dev/null +++ b/app/fixtures/custom/cases/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 71c827d2-f29a-4d6b-8b76-5e6ad4142474 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/access/system/permission.yaml b/app/fixtures/custom/cases/access/system/permission.yaml new file mode 100644 index 00000000..261cd0de --- /dev/null +++ b/app/fixtures/custom/cases/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 71c827d2-f29a-4d6b-8b76-5e6ad4142474 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 71c827d2-f29a-4d6b-8b76-5e6ad4142474 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 71c827d2-f29a-4d6b-8b76-5e6ad4142474 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/case.yaml b/app/fixtures/custom/cases/case.yaml new file mode 100644 index 00000000..925a6f51 --- /dev/null +++ b/app/fixtures/custom/cases/case.yaml @@ -0,0 +1,33 @@ +objects: + - uuid: ddec212d-3512-45b6-af39-20910db4720b + custom_id: GOV-82184661 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Pothole - 123 Street - Urgent + fr: Nid-de-poule - 123 rue - urgent + state: 1 # open + + - uuid: 78e00b3a-a386-48da-9373-5bcb7d9fbea2 + custom_id: GOV-788e4c03 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Staff + identity_uuid: 38bf092a-b807-438f-8cc9-009fc12924cb # Remy + title: + en: Pothole - Quality Review + fr: Nid-de-poule - Examen de la qualité + state: 1 # open + +prototype: + uuid: ~ + custom_id: ~ + owner: BusinessUnit + owner_uuid: ~ + identity: ~ + identity_uuid: ~ + title: {} + data: {} + state: ~ + priority: 0 + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/case_status.yaml b/app/fixtures/custom/cases/case_status.yaml new file mode 100644 index 00000000..270c34e2 --- /dev/null +++ b/app/fixtures/custom/cases/case_status.yaml @@ -0,0 +1,84 @@ +objects: + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 21b3b72a-bd1b-4d87-9b28-7768aaea8ae6 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request submitted + fr: Demande soumise + description: + en: Description ... + fr: Description ... + + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 1739b92f-9ce9-4f7d-92ff-6314171794b4 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request accepted + fr: Demande acceptée + description: + en: Description ... + fr: Description ... + + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 5a438bff-afa9-489d-953f-4524ca0905cb + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request under review + fr: Demande à l'étude + description: + en: Description ... + fr: Description ... + + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 0a42016c-c625-4025-becf-b7dc98db44f8 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request approved + fr: Demande approuvée + description: + en: Description ... + fr: Description ... + + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 02a74181-c59d-459a-acaf-64c7a597f6b7 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request resolved + fr: Demande résolue + description: + en: Description ... + fr: Description ... + + - case: ddec212d-3512-45b6-af39-20910db4720b # Pothole - 123 Street - Urgent + uuid: 40f6af60-b55b-4eee-a8db-71eec55fc8f5 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Request closed + fr: Demande fermée + description: + en: Description ... + fr: Description ... + +prototype: + case: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + identity: ~ + identity_uuid: ~ + title: {} + description: {} + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/config.yaml b/app/fixtures/custom/cases/config.yaml new file mode 100644 index 00000000..4211289e --- /dev/null +++ b/app/fixtures/custom/cases/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 53d9deff-41a7-4c6c-a0c4-3e665d4bd29e + key: ds_api.user.username + value: system@system.ds + + - uuid: f130e85a-58c1-4526-acdb-8fb3d1698fde + key: ds_api.user.password + value: system + + - uuid: d3ca875c-c06f-4d10-a873-a9a2d0808f8c + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 72c96499-8311-40d9-a4a6-9b036fbe7a60 + key: ds_api.user.roles + value: [] + + - uuid: 42f12a81-9fd3-496c-8747-aa8b0be88271 + key: ds_api.user.identity.roles + value: [] + + - uuid: 364af5eb-6940-40bd-9056-447242d1a611 + key: ds_api.user.identity.type + value: System + + - uuid: 22cbae5e-3fd3-4c82-b6f2-6342f74b0666 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 33cb72c3-2788-4da5-a5f5-b49e233ba6d9 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/metadata.yaml b/app/fixtures/custom/cases/metadata.yaml new file mode 100644 index 00000000..323f4621 --- /dev/null +++ b/app/fixtures/custom/cases/metadata.yaml @@ -0,0 +1,21 @@ +objects: + - uuid: cbe162a4-e3c9-41fe-9fd9-8032e22d309b + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + title: + en: Case States + fr: États de cas + slug: case-states + type: case + data: + 1: Open + 2: Closed + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cases/system/parameter.yaml b/app/fixtures/custom/cases/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/cases/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/cases/system/tenant.yaml b/app/fixtures/custom/cases/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/cases/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/cms/access/anonymous/access.yaml b/app/fixtures/custom/cms/access/anonymous/access.yaml new file mode 100644 index 00000000..55ba1c16 --- /dev/null +++ b/app/fixtures/custom/cms/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: a7dc662e-bd68-4f93-ab9c-a11f087cdf61 + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/anonymous/permission.yaml b/app/fixtures/custom/cms/access/anonymous/permission.yaml new file mode 100644 index 00000000..340ab70d --- /dev/null +++ b/app/fixtures/custom/cms/access/anonymous/permission.yaml @@ -0,0 +1,39 @@ +objects: + - access: a7dc662e-bd68-4f93-ab9c-a11f087cdf61 # Anonymous + scope: + type: owner + entity: BusinessUnit + entity_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + key: + - data + - data_uuid + - data_slug + - data_title + - data_data + - file + - file_uuid + - file_slug + - file_title + - file_description + - file_presentation + - file_type + - text + - text_uuid + - text_slug + - text_title + - text_value + - page + - page_uuid + - page_slug + - page_title + - page_description + - content + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/individual/access.yaml b/app/fixtures/custom/cms/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/cms/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/individual/permission.yaml b/app/fixtures/custom/cms/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cms/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/organization/access.yaml b/app/fixtures/custom/cms/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/cms/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/organization/permission.yaml b/app/fixtures/custom/cms/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cms/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/role/access.yaml b/app/fixtures/custom/cms/access/role/access.yaml new file mode 100644 index 00000000..965bb203 --- /dev/null +++ b/app/fixtures/custom/cms/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: ddcaa3b8-ecce-41be-be45-1669c6748d63 + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 70368994-823b-4096-9776-675253d224a2 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: f32d6396-9c64-4f5c-822b-180661e4d640 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: b9efd3b4-8318-43d0-81c5-a4727fd9e583 + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: b2b4adf7-c2a4-4cc4-a5f4-1f36184eb93b + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 16c36983-7bdc-47aa-b5ac-a8be10f2e882 + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: 1058ba1f-d01c-4c4b-a3e9-e0c5d3f6ae28 + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/role/permission.yaml b/app/fixtures/custom/cms/access/role/permission.yaml new file mode 100644 index 00000000..a85de422 --- /dev/null +++ b/app/fixtures/custom/cms/access/role/permission.yaml @@ -0,0 +1,180 @@ +objects: + - access: ddcaa3b8-ecce-41be-be45-1669c6748d63 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: ddcaa3b8-ecce-41be-be45-1669c6748d63 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: ddcaa3b8-ecce-41be-be45-1669c6748d63 # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 70368994-823b-4096-9776-675253d224a2 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - data + - file + - text + - page + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 70368994-823b-4096-9776-675253d224a2 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - data_property + - file_property + - text_property + - page_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: f32d6396-9c64-4f5c-822b-180661e4d640 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - data + - file + - text + - page + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: f32d6396-9c64-4f5c-822b-180661e4d640 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - data_property + - file_property + - text_property + - page_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: b9efd3b4-8318-43d0-81c5-a4727fd9e583 # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - data + - data_property + - file + - file_property + - text + - text_property + - page + - page_property + - metadata + - metadata_property + - content + attributes: [BROWSE, READ] + + - access: b2b4adf7-c2a4-4cc4-a5f4-1f36184eb93b # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - data + - data_property + - file + - file_property + - text + - text_property + - page + - page_property + - metadata + - metadata_property + - content + attributes: [BROWSE, READ] + + - access: 16c36983-7bdc-47aa-b5ac-a8be10f2e882 # Individual + scope: + type: owner + entity: BusinessUnit + entity_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + key: + - data + - data_uuid + - data_slug + - data_title + - data_data + - file + - file_uuid + - file_slug + - file_title + - file_description + - file_presentation + - file_type + - text + - text_uuid + - text_slug + - text_title + - text_value + - page + - page_uuid + - page_slug + - page_title + - page_description + - content + attributes: [BROWSE, READ] + + - access: 1058ba1f-d01c-4c4b-a3e9-e0c5d3f6ae28 # Organization + scope: + type: owner + entity: BusinessUnit + entity_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + key: + - data + - data_uuid + - data_slug + - data_title + - data_data + - file + - file_uuid + - file_slug + - file_title + - file_description + - file_presentation + - file_type + - text + - text_uuid + - text_slug + - text_title + - text_value + - page + - page_uuid + - page_slug + - page_title + - page_description + - content + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/staff/access.yaml b/app/fixtures/custom/cms/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/cms/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/staff/permission.yaml b/app/fixtures/custom/cms/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/cms/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/system/access.yaml b/app/fixtures/custom/cms/access/system/access.yaml new file mode 100644 index 00000000..0126f122 --- /dev/null +++ b/app/fixtures/custom/cms/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: bf4c9046-2107-4fc7-859d-955f5c1605e4 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/access/system/permission.yaml b/app/fixtures/custom/cms/access/system/permission.yaml new file mode 100644 index 00000000..08f42805 --- /dev/null +++ b/app/fixtures/custom/cms/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: bf4c9046-2107-4fc7-859d-955f5c1605e4 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: bf4c9046-2107-4fc7-859d-955f5c1605e4 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: bf4c9046-2107-4fc7-859d-955f5c1605e4 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/config.yaml b/app/fixtures/custom/cms/config.yaml new file mode 100644 index 00000000..68ea7baf --- /dev/null +++ b/app/fixtures/custom/cms/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: a69a3398-804f-4749-9a76-0e06a76104c8 + key: ds_api.user.username + value: system@system.ds + + - uuid: a2a5a136-28c8-4650-9063-d58b4b197d15 + key: ds_api.user.password + value: system + + - uuid: c7c9e520-528e-4b2f-b6cc-9e3222fad426 + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 1b99b4b7-9e80-4407-841f-412b466c145e + key: ds_api.user.roles + value: [] + + - uuid: 84a5b4f1-3085-4c1d-971e-944d2d6bdebd + key: ds_api.user.identity.roles + value: [] + + - uuid: 7dba20cd-34ae-4cee-9e66-6bf5c1dbb8b9 + key: ds_api.user.identity.type + value: System + + - uuid: 737d3810-de37-4b42-8189-106757216f0b + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 945f863d-dd5d-4775-8c86-74ee2593c4cb + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/data.yaml b/app/fixtures/custom/cms/data.yaml new file mode 100644 index 00000000..4f131c4e --- /dev/null +++ b/app/fixtures/custom/cms/data.yaml @@ -0,0 +1,27 @@ +objects: + - uuid: 0eaffe4d-f62b-4514-b16c-11925ed3c996 + owner_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + slug: road-classifications + title: + en: Road Classifications + fr: Classifications routières + data: + en: + city-freeway: City Freeway + arterial-roads: Arterial Roads + major-collector-and-collector-roads: Major Collector and Collector Roads + local-roads: Local Roads + fr: + city-freeway: Autoroute de ville + arterial-roads: Artères + collector-roads: Routes collectrices et routes collectrices principales + local-roads: Rues locales + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + slug: ~ + title: {} + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/file.yaml b/app/fixtures/custom/cms/file.yaml new file mode 100644 index 00000000..53b59ef0 --- /dev/null +++ b/app/fixtures/custom/cms/file.yaml @@ -0,0 +1,25 @@ +objects: + - uuid: 19566a70-72d3-4f3b-92ec-df5c84e66a19 + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + slug: admin-logo + title: + en: Logo + fr: Logo + description: + en: The Admin logo. + fr: Le logo du Admin. + presentation: + en: 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 + fr: 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 + type: image/png + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + slug: ~ + title: {} + description: {} + presentation: {} + type: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/metadata.yaml b/app/fixtures/custom/cms/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/cms/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/cms/system/parameter.yaml b/app/fixtures/custom/cms/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/cms/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/cms/system/tenant.yaml b/app/fixtures/custom/cms/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/cms/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/cms/text.yaml b/app/fixtures/custom/cms/text.yaml new file mode 100644 index 00000000..36a90f91 --- /dev/null +++ b/app/fixtures/custom/cms/text.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: 890d5e21-a06e-4e85-950c-1ca6ab4dd693 + owner_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + slug: portal-title + title: + en: Portal Title + fr: Titre du portail + value: + en: Merrimill + fr: Merrimill + + - uuid: 2dd97844-ccb9-4797-a6f7-0e2929e7ed06 + owner_uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + slug: portal-description + title: + en: Portal Description + fr: Description du portail + value: + en: Merrimill Public Services + fr: Services publics Merrimill + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + slug: ~ + title: {} + value: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/anonymous/access.yaml b/app/fixtures/custom/forms/access/anonymous/access.yaml new file mode 100644 index 00000000..6b899c0b --- /dev/null +++ b/app/fixtures/custom/forms/access/anonymous/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/anonymous/permission.yaml b/app/fixtures/custom/forms/access/anonymous/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/forms/access/anonymous/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/individual/access.yaml b/app/fixtures/custom/forms/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/forms/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/individual/permission.yaml b/app/fixtures/custom/forms/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/forms/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/organization/access.yaml b/app/fixtures/custom/forms/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/forms/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/organization/permission.yaml b/app/fixtures/custom/forms/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/forms/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/role/access.yaml b/app/fixtures/custom/forms/access/role/access.yaml new file mode 100644 index 00000000..54d08244 --- /dev/null +++ b/app/fixtures/custom/forms/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: 7f697307-5b58-42e9-970f-b85e8b02cd7c + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 0b865e5d-f454-4755-a449-65c4a6e20d85 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: a0a66a10-bf97-4abb-bde1-3f5dd6a99e21 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: 61c40554-df09-4053-a778-25bc6e2093c5 + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: b23d13bf-8132-46d9-a616-e22f1e42fe13 + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 7fca09bc-6378-4b82-be9c-14f73c1d367a + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: eaf0f806-2f51-4351-89a6-02d0bc8d0ad8 + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/role/permission.yaml b/app/fixtures/custom/forms/access/role/permission.yaml new file mode 100644 index 00000000..8282f040 --- /dev/null +++ b/app/fixtures/custom/forms/access/role/permission.yaml @@ -0,0 +1,118 @@ +objects: + - access: 7f697307-5b58-42e9-970f-b85e8b02cd7c # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 7f697307-5b58-42e9-970f-b85e8b02cd7c # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 7f697307-5b58-42e9-970f-b85e8b02cd7c # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 0b865e5d-f454-4755-a449-65c4a6e20d85 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - form + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 0b865e5d-f454-4755-a449-65c4a6e20d85 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - form_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: a0a66a10-bf97-4abb-bde1-3f5dd6a99e21 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - form + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: a0a66a10-bf97-4abb-bde1-3f5dd6a99e21 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - form_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 61c40554-df09-4053-a778-25bc6e2093c5 # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - form + - form_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: b23d13bf-8132-46d9-a616-e22f1e42fe13 # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - form + - form_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 7fca09bc-6378-4b82-be9c-14f73c1d367a # Individual + scope: + type: session + key: + - form + - form_uuid + - form_type + - form_config + - form_title + - form_description + - form_data + attributes: [BROWSE, READ] + + - access: eaf0f806-2f51-4351-89a6-02d0bc8d0ad8 # Organization + scope: + type: session + key: + - form + - form_uuid + - form_type + - form_config + - form_title + - form_description + - form_data + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/staff/access.yaml b/app/fixtures/custom/forms/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/forms/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/staff/permission.yaml b/app/fixtures/custom/forms/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/forms/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/system/access.yaml b/app/fixtures/custom/forms/access/system/access.yaml new file mode 100644 index 00000000..4e5a2a43 --- /dev/null +++ b/app/fixtures/custom/forms/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 6012d86d-ff87-41db-afe2-315877039105 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/access/system/permission.yaml b/app/fixtures/custom/forms/access/system/permission.yaml new file mode 100644 index 00000000..1c840621 --- /dev/null +++ b/app/fixtures/custom/forms/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 6012d86d-ff87-41db-afe2-315877039105 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 6012d86d-ff87-41db-afe2-315877039105 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 6012d86d-ff87-41db-afe2-315877039105 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/config.yaml b/app/fixtures/custom/forms/config.yaml new file mode 100644 index 00000000..dc3a106c --- /dev/null +++ b/app/fixtures/custom/forms/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 77744749-6ad4-48d5-93dc-f0be996ee1e6 + key: ds_api.user.username + value: system@system.ds + + - uuid: 06e376ec-9c8e-4597-aefc-a495520952d7 + key: ds_api.user.password + value: system + + - uuid: 9b91116e-0b13-4163-965d-80fdb3b2c50d + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: c617dd89-1e2f-4bd7-aabe-816cfa629fdf + key: ds_api.user.roles + value: [] + + - uuid: 82712f0b-3ef2-480c-a66a-02d40e89c2b4 + key: ds_api.user.identity.roles + value: [] + + - uuid: a98b5683-c356-46db-891b-4e1adde45afd + key: ds_api.user.identity.type + value: System + + - uuid: 90787877-951c-4175-9503-7556d6ada287 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 269a6593-0f9a-4efb-82a1-e000972cf994 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/form.yaml b/app/fixtures/custom/forms/form.yaml new file mode 100644 index 00000000..d6656ea0 --- /dev/null +++ b/app/fixtures/custom/forms/form.yaml @@ -0,0 +1,47 @@ +objects: + - uuid: b27e13a7-7820-41fd-a7ff-50eaefd3b028 + type: formio + config: + title: Pothole Report + display: form + type: form + name: pothole-report + path: pothole-report + tags: [pothole] + components: forms/formio/components/pothole-report.json + submissionAccess: forms/formio/submission_access/anonymous.json + title: + en: Pothole Report + fr: Signaler un nids de poule + description: + en: Description ... + fr: Description ... + + - uuid: 53e1e95f-0c81-4a1f-b502-bec3084202e8 + type: formio + config: + title: Pothole Report Review + display: form + type: form + name: pothole-report-review + path: pothole-report-review + tags: [pothole] + components: forms/formio/components/pothole-report-review.json + submissionAccess: forms/formio/submission_access/anonymous.json + title: + en: Pothole Report Review + fr: Examen du signalement d'un nids de poule + description: + en: Description ... + fr: Description ... + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + type: ~ + config: {} + title: {} + description: {} + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/forms/formio/components/pothole-report-review.json b/app/fixtures/custom/forms/forms/formio/components/pothole-report-review.json new file mode 100644 index 00000000..5676628f --- /dev/null +++ b/app/fixtures/custom/forms/forms/formio/components/pothole-report-review.json @@ -0,0 +1,88 @@ +[ + { + "properties": {}, + "tags": [], + "labelPosition": "top", + "hideLabel": false, + "type": "textfield", + "conditional": { + "eq": "", + "when": null, + "show": "" + }, + "validate": { + "customPrivate": false, + "custom": "", + "pattern": "", + "maxLength": "", + "minLength": "", + "required": false + }, + "clearOnHide": true, + "hidden": false, + "persistent": true, + "unique": false, + "protected": false, + "defaultValue": "", + "multiple": false, + "suffix": "", + "prefix": "", + "placeholder": "", + "key": "description", + "label": "Description", + "inputMask": "", + "inputType": "text", + "tableView": true, + "input": true + }, + { + "conditional": { + "eq": "", + "when": null, + "show": "" + }, + "optionsLabelPosition": "right", + "labelPosition": "top", + "hideLabel": false, + "type": "selectboxes", + "validate": { + "required": true + }, + "clearOnHide": true, + "hidden": false, + "persistent": true, + "protected": false, + "inline": false, + "values": [ + { + "shortcut": "", + "label": "yes", + "value": "yes" + }, + { + "shortcut": "", + "label": "no", + "value": "no" + } + ], + "key": "approved", + "label": "Approved", + "tableView": true, + "input": true + }, + { + "hideLabel": false, + "type": "button", + "theme": "primary", + "disableOnInvalid": false, + "action": "submit", + "block": false, + "rightIcon": "", + "leftIcon": "", + "size": "md", + "key": "submit", + "tableView": false, + "label": "Submit", + "input": true + } +] \ No newline at end of file diff --git a/app/fixtures/custom/forms/forms/formio/components/pothole-report.json b/app/fixtures/custom/forms/forms/formio/components/pothole-report.json new file mode 100644 index 00000000..4f663d6c --- /dev/null +++ b/app/fixtures/custom/forms/forms/formio/components/pothole-report.json @@ -0,0 +1,53 @@ +[ + { + "input": true, + "tableView": true, + "inputType": "text", + "inputMask": "", + "label": "Description", + "key": "description", + "placeholder": "", + "prefix": "", + "suffix": "", + "multiple": false, + "defaultValue": "", + "protected": false, + "unique": false, + "persistent": true, + "hidden": false, + "clearOnHide": true, + "validate": { + "required": true, + "minLength": "", + "maxLength": "", + "pattern": "", + "custom": "", + "customPrivate": false + }, + "conditional": { + "show": "", + "when": null, + "eq": "" + }, + "type": "textfield", + "hideLabel": false, + "labelPosition": "top", + "tags": [], + "properties": {} + }, + { + "input": true, + "label": "Submit", + "tableView": false, + "key": "submit", + "size": "md", + "leftIcon": "", + "rightIcon": "", + "block": false, + "action": "submit", + "disableOnInvalid": false, + "theme": "primary", + "type": "button", + "hideLabel": false + } +] \ No newline at end of file diff --git a/app/fixtures/custom/forms/forms/formio/submission_access/anonymous.json b/app/fixtures/custom/forms/forms/formio/submission_access/anonymous.json new file mode 100644 index 00000000..5261b633 --- /dev/null +++ b/app/fixtures/custom/forms/forms/formio/submission_access/anonymous.json @@ -0,0 +1,36 @@ +[ + { + "type": "create_all", + "roles": [] + }, + { + "type": "read_all", + "roles": [] + }, + { + "type": "update_all", + "roles": [] + }, + { + "type": "delete_all", + "roles": [] + }, + { + "type": "create_own", + "roles": [ + "anonymous" + ] + }, + { + "type": "read_own", + "roles": [] + }, + { + "type": "update_own", + "roles": [] + }, + { + "type": "delete_own", + "roles": [] + } +] \ No newline at end of file diff --git a/app/fixtures/custom/forms/metadata.yaml b/app/fixtures/custom/forms/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/forms/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/forms/system/parameter.yaml b/app/fixtures/custom/forms/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/forms/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/forms/system/tenant.yaml b/app/fixtures/custom/forms/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/forms/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/identities/access/anonymous/access.yaml b/app/fixtures/custom/identities/access/anonymous/access.yaml new file mode 100644 index 00000000..6b899c0b --- /dev/null +++ b/app/fixtures/custom/identities/access/anonymous/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/anonymous/permission.yaml b/app/fixtures/custom/identities/access/anonymous/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/identities/access/anonymous/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/individual/access.yaml b/app/fixtures/custom/identities/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/identities/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/individual/permission.yaml b/app/fixtures/custom/identities/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/identities/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/organization/access.yaml b/app/fixtures/custom/identities/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/identities/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/organization/permission.yaml b/app/fixtures/custom/identities/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/identities/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/role/access.yaml b/app/fixtures/custom/identities/access/role/access.yaml new file mode 100644 index 00000000..ac09450e --- /dev/null +++ b/app/fixtures/custom/identities/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: 10269f62-8ffa-4c0b-9693-0971a8fced15 + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 71b0c940-3b9b-4bc1-bdbc-e9ac9ad709b4 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: 7111354b-a59c-4415-90bb-3e22ba15b3b9 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: a1e7a267-763b-4b7d-b8ee-5a73d5e7adee + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 9bae5401-a9ac-4813-a23f-42eb16928d87 + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 197231a2-1ad7-4527-8d4e-e78e4ad0efa3 + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: 62d2fa06-88c9-45b3-a8da-105ae7cf21cc + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/role/permission.yaml b/app/fixtures/custom/identities/access/role/permission.yaml new file mode 100644 index 00000000..a3bf6c93 --- /dev/null +++ b/app/fixtures/custom/identities/access/role/permission.yaml @@ -0,0 +1,214 @@ +objects: + - access: 10269f62-8ffa-4c0b-9693-0971a8fced15 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 10269f62-8ffa-4c0b-9693-0971a8fced15 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 10269f62-8ffa-4c0b-9693-0971a8fced15 # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 71b0c940-3b9b-4bc1-bdbc-e9ac9ad709b4 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - anonymous + - anonymous_persona + - individual + - individual_persona + - organization + - organization_persona + - staff + - staff_persona + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 71b0c940-3b9b-4bc1-bdbc-e9ac9ad709b4 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - anonymous_property + - anonymous_persona_property + - individual_property + - individual_persona_property + - organization_property + - organization_persona_property + - staff_property + - staff_persona_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 7111354b-a59c-4415-90bb-3e22ba15b3b9 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - anonymous + - anonymous_persona + - individual + - individual_persona + - organization + - organization_persona + - staff + - staff_persona + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 7111354b-a59c-4415-90bb-3e22ba15b3b9 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - anonymous_property + - anonymous_persona_property + - individual_property + - individual_persona_property + - organization_property + - organization_persona_property + - staff_property + - staff_persona_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: a1e7a267-763b-4b7d-b8ee-5a73d5e7adee # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - anonymous + - anonymous_property + - anonymous_persona + - anonymous_persona_property + - individual + - individual_property + - individual_persona + - individual_persona_property + - organization + - organization_property + - organization_persona + - organization_persona_property + - staff + - staff_property + - staff_persona + - staff_persona_property + - business_unit + - business_unit_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 9bae5401-a9ac-4813-a23f-42eb16928d87 # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - anonymous + - anonymous_property + - anonymous_persona + - anonymous_persona_property + - individual + - individual_property + - individual_persona + - individual_persona_property + - organization + - organization_property + - organization_persona + - organization_persona_property + - staff + - staff_property + - staff_persona + - staff_persona_property + - business_unit + - business_unit_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 197231a2-1ad7-4527-8d4e-e78e4ad0efa3 # Individual + scope: + type: session + key: + - individual + - individual_uuid + - individual_created_at + - individual_persona + - individual_persona_uuid + - individual_persona_created_at + - individual_persona_title + - individual_persona_data + - individual_persona_version + attributes: [BROWSE, READ] + + - access: 197231a2-1ad7-4527-8d4e-e78e4ad0efa3 # Individual + scope: + type: session + key: + - individual_persona + attributes: [EDIT, ADD] + + - access: 197231a2-1ad7-4527-8d4e-e78e4ad0efa3 # Individual + scope: + type: session + key: + - individual_persona_title + - individual_persona_data + - individual_persona_version + attributes: [EDIT] + + - access: 62d2fa06-88c9-45b3-a8da-105ae7cf21cc # Organization + scope: + type: session + key: + - organization + - organization_uuid + - organization_created_at + - organization_persona + - organization_persona_uuid + - organization_persona_created_at + - organization_persona_title + - organization_persona_data + - organization_persona_version + attributes: [BROWSE, READ] + + - access: 62d2fa06-88c9-45b3-a8da-105ae7cf21cc # Organization + scope: + type: session + key: + - organization_persona + attributes: [EDIT, ADD] + + - access: 62d2fa06-88c9-45b3-a8da-105ae7cf21cc # Organization + scope: + type: session + key: + - organization_persona_title + - organization_persona_data + - organization_persona_version + attributes: [EDIT] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/staff/access.yaml b/app/fixtures/custom/identities/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/identities/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/staff/permission.yaml b/app/fixtures/custom/identities/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/identities/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/system/access.yaml b/app/fixtures/custom/identities/access/system/access.yaml new file mode 100644 index 00000000..969453d1 --- /dev/null +++ b/app/fixtures/custom/identities/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: cfe91139-68e7-4ae9-87f7-df480fd18edb + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/access/system/permission.yaml b/app/fixtures/custom/identities/access/system/permission.yaml new file mode 100644 index 00000000..304523fb --- /dev/null +++ b/app/fixtures/custom/identities/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: cfe91139-68e7-4ae9-87f7-df480fd18edb # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: cfe91139-68e7-4ae9-87f7-df480fd18edb # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: cfe91139-68e7-4ae9-87f7-df480fd18edb # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/business_unit.yaml b/app/fixtures/custom/identities/business_unit.yaml new file mode 100644 index 00000000..842b3aaa --- /dev/null +++ b/app/fixtures/custom/identities/business_unit.yaml @@ -0,0 +1,22 @@ +objects: + - uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: + en: Administration + fr: Administration + + - uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + title: + en: Backoffice + fr: Bureau + + - uuid: 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + title: + en: Portal + fr: Portail + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/config.yaml b/app/fixtures/custom/identities/config.yaml new file mode 100644 index 00000000..3fe6e8fd --- /dev/null +++ b/app/fixtures/custom/identities/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 1f866749-6d4b-4986-82a1-5d903643ff51 + key: ds_api.user.username + value: system@system.ds + + - uuid: 732051e5-95bf-46a9-8559-200212ea97da + key: ds_api.user.password + value: system + + - uuid: 5396d36b-89b4-4dce-a51c-a908ae1c2286 + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: c28242ab-2075-40a6-8ddd-b2b28b86cc25 + key: ds_api.user.roles + value: [] + + - uuid: 200f32a8-60c5-4c92-b1dc-7683ce2115bb + key: ds_api.user.identity.roles + value: [] + + - uuid: 88de736c-72f0-43b9-9aaa-19704962ad36 + key: ds_api.user.identity.type + value: System + + - uuid: 27ba4b08-d7b0-44ce-97bb-b4e049eadf3c + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 0ab21b15-0700-418d-9071-4da680200027 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/anonymous/identity.yaml b/app/fixtures/custom/identities/identity/anonymous/identity.yaml new file mode 100644 index 00000000..e53052c7 --- /dev/null +++ b/app/fixtures/custom/identities/identity/anonymous/identity.yaml @@ -0,0 +1,7 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/anonymous/persona.yaml b/app/fixtures/custom/identities/identity/anonymous/persona.yaml new file mode 100644 index 00000000..8f880cc0 --- /dev/null +++ b/app/fixtures/custom/identities/identity/anonymous/persona.yaml @@ -0,0 +1,12 @@ +objects: [] + +prototype: + anonymous: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + title: + en: Default + fr: Défaut + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/anonymous/role.yaml b/app/fixtures/custom/identities/identity/anonymous/role.yaml new file mode 100644 index 00000000..58cc6dac --- /dev/null +++ b/app/fixtures/custom/identities/identity/anonymous/role.yaml @@ -0,0 +1,10 @@ +objects: [] + +prototype: + anonymous: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + role: ~ + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/individual/identity.yaml b/app/fixtures/custom/identities/identity/individual/identity.yaml new file mode 100644 index 00000000..cf6965d9 --- /dev/null +++ b/app/fixtures/custom/identities/identity/individual/identity.yaml @@ -0,0 +1,8 @@ +objects: + - uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/individual/persona.yaml b/app/fixtures/custom/identities/identity/individual/persona.yaml new file mode 100644 index 00000000..5b1b7b16 --- /dev/null +++ b/app/fixtures/custom/identities/identity/individual/persona.yaml @@ -0,0 +1,28 @@ +objects: + - individual: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + uuid: 39fe9947-f75a-4103-a49c-7ece3602bb84 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + data: + suffix: Mr + firstName: Morgan + lastName: Cole + address: + street: 111 Wellington St + city: Ottawa + province: Ontario + country: Canada + postalCode: K1A 0A4 + phone: 1-888-111-2222 + email: morgan@individual.ds + birthDate: 1972-01-08 + +prototype: + individual: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + title: + en: Default + fr: Défaut + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/individual/role.yaml b/app/fixtures/custom/identities/identity/individual/role.yaml new file mode 100644 index 00000000..64160120 --- /dev/null +++ b/app/fixtures/custom/identities/identity/individual/role.yaml @@ -0,0 +1,12 @@ +objects: + - individual: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + uuid: e5e08d06-553f-4477-b998-0adcc9b3f9ac + +prototype: + individual: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + role: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/organization/identity.yaml b/app/fixtures/custom/identities/identity/organization/identity.yaml new file mode 100644 index 00000000..b282da40 --- /dev/null +++ b/app/fixtures/custom/identities/identity/organization/identity.yaml @@ -0,0 +1,8 @@ +objects: + - uuid: 5946a069-95d4-4536-9f78-41ca96316cc5 # Acme + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/organization/persona.yaml b/app/fixtures/custom/identities/identity/organization/persona.yaml new file mode 100644 index 00000000..46d9a124 --- /dev/null +++ b/app/fixtures/custom/identities/identity/organization/persona.yaml @@ -0,0 +1,28 @@ +objects: + - organization: 5946a069-95d4-4536-9f78-41ca96316cc5 # Acme + uuid: 393ee599-f2ac-42b5-b1d8-9c062fac490d + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + data: + name: Acme Corporation + description: The Acme Corporation is a fictional corporation. + businessNumber: 123456 + anniversary: 1999-01-01 + address: + street: 90 Wellington St + city: Ottawa + province: Ontario + country: Canada + postalCode: K1A 0A4 + phone: 1-888-111-2222 + email: acme@organization.ds + +prototype: + individual: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + title: + en: Default + fr: Défaut + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/organization/role.yaml b/app/fixtures/custom/identities/identity/organization/role.yaml new file mode 100644 index 00000000..a9454bb8 --- /dev/null +++ b/app/fixtures/custom/identities/identity/organization/role.yaml @@ -0,0 +1,12 @@ +objects: + - organization: 5946a069-95d4-4536-9f78-41ca96316cc5 # Acme + uuid: 1c8e635a-6b32-4941-9ee9-9756a6ad0931 + +prototype: + organization: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + role: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/staff/identity.yaml b/app/fixtures/custom/identities/identity/staff/identity.yaml new file mode 100644 index 00000000..f8bbaf61 --- /dev/null +++ b/app/fixtures/custom/identities/identity/staff/identity.yaml @@ -0,0 +1,32 @@ +objects: + - uuid: 6c344b4b-78d3-47c4-9d8b-e67217f46569 # Admin + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + business_units: + - 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + - 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + + - uuid: e9f3a831-048f-4cd3-92bf-2c77e6d34d1d # Elliot + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + - 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + + - uuid: 7281ef76-be00-42e4-ab67-fc7e0cc2e7ef # Devon + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + + - uuid: 38bf092a-b807-438f-8cc9-009fc12924cb # Remy + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + - 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + + - uuid: 3e94c60b-34c8-4355-91c9-4b246504f110 # Blair + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/staff/persona.yaml b/app/fixtures/custom/identities/identity/staff/persona.yaml new file mode 100644 index 00000000..d44e1b6c --- /dev/null +++ b/app/fixtures/custom/identities/identity/staff/persona.yaml @@ -0,0 +1,27 @@ +objects: + - staff: 6c344b4b-78d3-47c4-9d8b-e67217f46569 # Admin + uuid: 665da880-294d-41b8-9d05-3993e22c388d + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + + - staff: e9f3a831-048f-4cd3-92bf-2c77e6d34d1d # Elliot + uuid: b2ec9ff8-ac84-4bed-bbd6-521e30ac7b84 + + - staff: 7281ef76-be00-42e4-ab67-fc7e0cc2e7ef # Devon + uuid: 3a190a4a-7a1e-4f06-83b4-4811e8b2dc2d + + - staff: 38bf092a-b807-438f-8cc9-009fc12924cb # Remy + uuid: b94c2809-e9f6-418b-8acf-902c3dbbf6a8 + + - staff: 3e94c60b-34c8-4355-91c9-4b246504f110 # Blair + uuid: 70e0618c-f0d3-442a-9212-6ca10b52e9e9 + +prototype: + staff: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + title: + en: Default + fr: Défaut + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/staff/role.yaml b/app/fixtures/custom/identities/identity/staff/role.yaml new file mode 100644 index 00000000..737c0709 --- /dev/null +++ b/app/fixtures/custom/identities/identity/staff/role.yaml @@ -0,0 +1,36 @@ +objects: + - staff: 6c344b4b-78d3-47c4-9d8b-e67217f46569 # Admin + uuid: 06101454-9d73-4280-b059-e487d8de287f + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + role: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - staff: e9f3a831-048f-4cd3-92bf-2c77e6d34d1d # Elliot + uuid: 52005969-938a-48ce-a4ca-a24c18acd474 + role: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + - 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + + - staff: 7281ef76-be00-42e4-ab67-fc7e0cc2e7ef # Devon + uuid: fdc4afcd-457c-43d8-8d13-20e2ae291468 + role: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - staff: 38bf092a-b807-438f-8cc9-009fc12924cb # Remy + uuid: 27e82c4a-4f85-46d2-8785-5cee36aa9769 + role: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + business_units: + - 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + - 3709635c-5ab1-487b-84ea-23b6e282cc4d # Portal + + - staff: 3e94c60b-34c8-4355-91c9-4b246504f110 # Blair + uuid: 4fad6529-ec83-4e05-8218-91447cafeafc + role: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + +prototype: + staff: ~ + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + role: ~ + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/system/identity.yaml b/app/fixtures/custom/identities/identity/system/identity.yaml new file mode 100644 index 00000000..713cdc10 --- /dev/null +++ b/app/fixtures/custom/identities/identity/system/identity.yaml @@ -0,0 +1,9 @@ +objects: + - uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/identity/system/role.yaml b/app/fixtures/custom/identities/identity/system/role.yaml new file mode 100644 index 00000000..9aa5c465 --- /dev/null +++ b/app/fixtures/custom/identities/identity/system/role.yaml @@ -0,0 +1,10 @@ +objects: [] + +prototype: + system: ~ + uuid: ~ + owner: System + owner_uuid: ~ + role: ~ + business_units: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/metadata.yaml b/app/fixtures/custom/identities/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/identities/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/role.yaml b/app/fixtures/custom/identities/role.yaml new file mode 100644 index 00000000..d6af516f --- /dev/null +++ b/app/fixtures/custom/identities/role.yaml @@ -0,0 +1,51 @@ +objects: + - uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee + title: + en: Administrator + fr: Administrateur + slug: administrator + + - uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 + title: + en: Manager + fr: Gérant + slug: manager + + - uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 + title: + en: Backoffice Manager + fr: Gérant d'office + slug: backoffice-manager + + - uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d + title: + en: Staff + fr: Personnel + slug: staff + + - uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e + title: + en: Backoffice Staff + fr: Personnel d'office + slug: backoffice-staff + + - uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 + title: + en: Individual + fr: Individuel + slug: individual + + - uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 + title: + en: Organization + fr: Organisation + slug: organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + permissions: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/identities/system/parameter.yaml b/app/fixtures/custom/identities/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/identities/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/identities/system/tenant.yaml b/app/fixtures/custom/identities/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/identities/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/microservice/access/anonymous/access.yaml b/app/fixtures/custom/microservice/access/anonymous/access.yaml new file mode 100644 index 00000000..6b899c0b --- /dev/null +++ b/app/fixtures/custom/microservice/access/anonymous/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/anonymous/permission.yaml b/app/fixtures/custom/microservice/access/anonymous/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/microservice/access/anonymous/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/individual/access.yaml b/app/fixtures/custom/microservice/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/microservice/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/individual/permission.yaml b/app/fixtures/custom/microservice/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/microservice/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/organization/access.yaml b/app/fixtures/custom/microservice/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/microservice/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/organization/permission.yaml b/app/fixtures/custom/microservice/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/microservice/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/role/access.yaml b/app/fixtures/custom/microservice/access/role/access.yaml new file mode 100644 index 00000000..e08f6e0d --- /dev/null +++ b/app/fixtures/custom/microservice/access/role/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/role/permission.yaml b/app/fixtures/custom/microservice/access/role/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/microservice/access/role/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/staff/access.yaml b/app/fixtures/custom/microservice/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/microservice/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/staff/permission.yaml b/app/fixtures/custom/microservice/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/microservice/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/system/access.yaml b/app/fixtures/custom/microservice/access/system/access.yaml new file mode 100644 index 00000000..0b614dd9 --- /dev/null +++ b/app/fixtures/custom/microservice/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: f6ec046e-60bd-4136-bcdd-78dfc0bc0515 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/access/system/permission.yaml b/app/fixtures/custom/microservice/access/system/permission.yaml new file mode 100644 index 00000000..7d647c87 --- /dev/null +++ b/app/fixtures/custom/microservice/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: f6ec046e-60bd-4136-bcdd-78dfc0bc0515 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: f6ec046e-60bd-4136-bcdd-78dfc0bc0515 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: f6ec046e-60bd-4136-bcdd-78dfc0bc0515 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/config.yaml b/app/fixtures/custom/microservice/config.yaml new file mode 100644 index 00000000..8bf5bc5b --- /dev/null +++ b/app/fixtures/custom/microservice/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 0d2657d2-6d6b-4d58-9553-660919bff6e3 + key: ds_api.user.username + value: system@system.ds + + - uuid: 2b570527-9ec0-4f96-b940-f1142f2d86bf + key: ds_api.user.password + value: system + + - uuid: 4d460f83-608a-41a2-828f-98536045bbc8 + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: a2d4db9a-4d49-4252-9950-d6f991f557e1 + key: ds_api.user.roles + value: [] + + - uuid: f150b855-abca-407d-a2d0-c4351101bff5 + key: ds_api.user.identity.roles + value: [] + + - uuid: 389ac69d-8004-4590-9004-7c7877d7e378 + key: ds_api.user.identity.type + value: System + + - uuid: 5f5bf9d0-9fa2-4355-9210-6391e81bd4be + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 1b524353-d485-4fb3-9a84-1c3b67739517 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/metadata.yaml b/app/fixtures/custom/microservice/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/microservice/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/microservice/system/parameter.yaml b/app/fixtures/custom/microservice/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/microservice/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/microservice/system/tenant.yaml b/app/fixtures/custom/microservice/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/microservice/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/records/access/anonymous/access.yaml b/app/fixtures/custom/records/access/anonymous/access.yaml new file mode 100644 index 00000000..ace097cf --- /dev/null +++ b/app/fixtures/custom/records/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: f0ea347d-1503-46c5-825d-747c43a4936d + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/anonymous/permission.yaml b/app/fixtures/custom/records/access/anonymous/permission.yaml new file mode 100644 index 00000000..45daad8c --- /dev/null +++ b/app/fixtures/custom/records/access/anonymous/permission.yaml @@ -0,0 +1,22 @@ +objects: + - access: f0ea347d-1503-46c5-825d-747c43a4936d # Anonymous + scope: + type: session + key: + - record + - record_uuid + - record_title + - record_data + - record_association + - record_association_uuid + - record_association_entity + - record_association_entity_uuid + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/individual/access.yaml b/app/fixtures/custom/records/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/records/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/individual/permission.yaml b/app/fixtures/custom/records/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/records/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/organization/access.yaml b/app/fixtures/custom/records/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/records/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/organization/permission.yaml b/app/fixtures/custom/records/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/records/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/role/access.yaml b/app/fixtures/custom/records/access/role/access.yaml new file mode 100644 index 00000000..ffade870 --- /dev/null +++ b/app/fixtures/custom/records/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: d04bd8a2-b01a-4d9a-9f76-2f96676aa1b0 + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: ed608546-2ecf-4ff8-b5fb-624a9307b9c1 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: 60c514c0-d70b-4ffa-a59b-d7476429b735 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: b967ccf0-cddf-4106-962a-bc0dabaf53be + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 45dad085-8260-4c8f-ae6c-041300c544df + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 0e3b13f3-b074-4b8f-9401-b647ff9da9dd + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: 8345edce-381f-4121-9e64-68e96e025af0 + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/role/permission.yaml b/app/fixtures/custom/records/access/role/permission.yaml new file mode 100644 index 00000000..85430dd9 --- /dev/null +++ b/app/fixtures/custom/records/access/role/permission.yaml @@ -0,0 +1,128 @@ +objects: + - access: d04bd8a2-b01a-4d9a-9f76-2f96676aa1b0 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: d04bd8a2-b01a-4d9a-9f76-2f96676aa1b0 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: d04bd8a2-b01a-4d9a-9f76-2f96676aa1b0 # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: ed608546-2ecf-4ff8-b5fb-624a9307b9c1 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - record + - record_association + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: ed608546-2ecf-4ff8-b5fb-624a9307b9c1 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - record_property + - record_association_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 60c514c0-d70b-4ffa-a59b-d7476429b735 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - record + - record_association + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 60c514c0-d70b-4ffa-a59b-d7476429b735 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - record_property + - record_association_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: b967ccf0-cddf-4106-962a-bc0dabaf53be # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - record + - record_property + - record_association + - record_association_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 45dad085-8260-4c8f-ae6c-041300c544df # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - record + - record_property + - record_association + - record_association_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 0e3b13f3-b074-4b8f-9401-b647ff9da9dd # Individual + scope: + type: session + key: + - record + - record_uuid + - record_title + - record_data + - record_association + - record_association_uuid + - record_association_entity + - record_association_entity_uuid + attributes: [BROWSE, READ] + + - access: 8345edce-381f-4121-9e64-68e96e025af0 # Organization + scope: + type: session + key: + - record + - record_uuid + - record_title + - record_data + - record_association + - record_association_uuid + - record_association_entity + - record_association_entity_uuid + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/staff/access.yaml b/app/fixtures/custom/records/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/records/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/staff/permission.yaml b/app/fixtures/custom/records/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/records/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/system/access.yaml b/app/fixtures/custom/records/access/system/access.yaml new file mode 100644 index 00000000..95851cae --- /dev/null +++ b/app/fixtures/custom/records/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 78daddec-031a-416f-8494-43cec7552d18 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/access/system/permission.yaml b/app/fixtures/custom/records/access/system/permission.yaml new file mode 100644 index 00000000..a5e28fde --- /dev/null +++ b/app/fixtures/custom/records/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 78daddec-031a-416f-8494-43cec7552d18 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 78daddec-031a-416f-8494-43cec7552d18 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 78daddec-031a-416f-8494-43cec7552d18 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/config.yaml b/app/fixtures/custom/records/config.yaml new file mode 100644 index 00000000..cea04ad9 --- /dev/null +++ b/app/fixtures/custom/records/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 9d1f3611-be68-41d4-bdf4-3f402597f435 + key: ds_api.user.username + value: system@system.ds + + - uuid: 163ebbdf-efb2-4e24-b578-28f213160ce0 + key: ds_api.user.password + value: system + + - uuid: dec475d8-37c7-42a5-92d2-6ba4bcaa501b + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: dfeff874-1d3a-4a6b-8294-51f1761b2d05 + key: ds_api.user.roles + value: [] + + - uuid: 0c991ef4-2446-4633-bdbb-0fff85c368d5 + key: ds_api.user.identity.roles + value: [] + + - uuid: 6830ba7f-191e-49cf-a66c-b957bf612e9b + key: ds_api.user.identity.type + value: System + + - uuid: 1673d062-eb35-4f4d-8d08-d17306cc1c38 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 36be6508-5dd6-4ea3-b57a-6b598cc4e5ac + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/metadata.yaml b/app/fixtures/custom/records/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/records/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/record.yaml b/app/fixtures/custom/records/record.yaml new file mode 100644 index 00000000..c7e3acb8 --- /dev/null +++ b/app/fixtures/custom/records/record.yaml @@ -0,0 +1,28 @@ +objects: + - uuid: 38ca28f3-8e0f-452f-9546-cf45e1148d7e + identity: Individual + identity_uuid: 2af16e03-bbce-4ec9-b73f-8f0468a93f4b # Morgan + title: + en: Animal License Form Submission + fr: Formulaire de soumission pour permis animalier + data: + type: dog + + - uuid: a9d92a4a-2de1-45ba-adf1-9b8b2a723512 + identity: Organization + identity_uuid: 5946a069-95d4-4536-9f78-41ca96316cc5 # Acme + title: + en: Animal License Form Submission + fr: Formulaire de soumission pour permis animalier + data: + type: cat + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + identity: ~ + identity_uuid: ~ + title: {} + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/records/system/parameter.yaml b/app/fixtures/custom/records/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/records/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/records/system/tenant.yaml b/app/fixtures/custom/records/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/records/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/services/access/anonymous/access.yaml b/app/fixtures/custom/services/access/anonymous/access.yaml new file mode 100644 index 00000000..4d5a44b5 --- /dev/null +++ b/app/fixtures/custom/services/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: 6cc946b7-2ff1-4def-b203-aa361d128f9a + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/anonymous/permission.yaml b/app/fixtures/custom/services/access/anonymous/permission.yaml new file mode 100644 index 00000000..4e355623 --- /dev/null +++ b/app/fixtures/custom/services/access/anonymous/permission.yaml @@ -0,0 +1,45 @@ +objects: + - access: 6cc946b7-2ff1-4def-b203-aa361d128f9a # Anonymous + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category + - category_uuid + - category_title + - category_description + - category_presentation + - category_data + - service + - service_uuid + - service_title + - service_description + - service_presentation + - service_data + - scenario + - scenario_uuid + - scenario_title + - scenario_description + - scenario_presentation + - scenario_data + attributes: [BROWSE, READ] + + - access: 6cc946b7-2ff1-4def-b203-aa361d128f9a # Anonymous + scope: + type: session + key: + - submission + - submission_uuid + - submission_created_at + - submission_scenario + - submission_data + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/individual/access.yaml b/app/fixtures/custom/services/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/services/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/individual/permission.yaml b/app/fixtures/custom/services/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/services/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/organization/access.yaml b/app/fixtures/custom/services/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/services/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/organization/permission.yaml b/app/fixtures/custom/services/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/services/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/role/access.yaml b/app/fixtures/custom/services/access/role/access.yaml new file mode 100644 index 00000000..4ec3bbb6 --- /dev/null +++ b/app/fixtures/custom/services/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: de1a56b6-3da7-42a6-bea4-0f7d3e3e77d0 + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 1b842b28-dc35-4c87-b08e-96407b2ee939 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: 96aad66e-0dba-4829-b626-9540f97fdad9 + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: d8c12375-afe5-4523-a46b-3ef5630d566e + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: f4d7dcce-870e-4290-8d13-99cb273f90bc + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 7e7b7c0b-1a20-4deb-92ff-bd7a7117e730 + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: fcb10ed4-b6b9-4542-95be-bad277569cb1 + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/role/permission.yaml b/app/fixtures/custom/services/access/role/permission.yaml new file mode 100644 index 00000000..862aadd3 --- /dev/null +++ b/app/fixtures/custom/services/access/role/permission.yaml @@ -0,0 +1,194 @@ +objects: + - access: de1a56b6-3da7-42a6-bea4-0f7d3e3e77d0 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: de1a56b6-3da7-42a6-bea4-0f7d3e3e77d0 # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: de1a56b6-3da7-42a6-bea4-0f7d3e3e77d0 # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 1b842b28-dc35-4c87-b08e-96407b2ee939 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - category + - service + - scenario + - submission + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 1b842b28-dc35-4c87-b08e-96407b2ee939 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - category_property + - service_property + - scenario_property + - submission_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 96aad66e-0dba-4829-b626-9540f97fdad9 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category + - service + - scenario + - submission + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 96aad66e-0dba-4829-b626-9540f97fdad9 # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category_property + - service_property + - scenario_property + - submission_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: d8c12375-afe5-4523-a46b-3ef5630d566e # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - category + - category_property + - service + - service_property + - scenario + - scenario_property + - submission + - submission_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: f4d7dcce-870e-4290-8d13-99cb273f90bc # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category + - category_property + - service + - service_property + - scenario + - scenario_property + - submission + - submission_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 7e7b7c0b-1a20-4deb-92ff-bd7a7117e730 # Individual + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category + - category_uuid + - category_title + - category_description + - category_presentation + - category_data + - service + - service_uuid + - service_title + - service_description + - service_presentation + - service_data + - scenario + - scenario_uuid + - scenario_title + - scenario_description + - scenario_presentation + - scenario_data + - scenario_type + - scenario_data + attributes: [BROWSE, READ] + + - access: 7e7b7c0b-1a20-4deb-92ff-bd7a7117e730 # Individual + scope: + type: session + key: + - submission + - submission_uuid + - submission_created_at + - submission_scenario + - submission_data + attributes: [BROWSE, READ] + + - access: fcb10ed4-b6b9-4542-95be-bad277569cb1 # Organization + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - category + - category_uuid + - category_title + - category_description + - category_presentation + - category_data + - service + - service_uuid + - service_title + - service_description + - service_presentation + - service_data + - scenario + - scenario_uuid + - scenario_title + - scenario_description + - scenario_presentation + - scenario_data + - scenario_type + - scenario_data + attributes: [BROWSE, READ] + + - access: fcb10ed4-b6b9-4542-95be-bad277569cb1 # Organization + scope: + type: session + key: + - submission + - submission_uuid + - submission_created_at + - submission_scenario + - submission_data + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/staff/access.yaml b/app/fixtures/custom/services/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/services/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/staff/permission.yaml b/app/fixtures/custom/services/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/services/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/system/access.yaml b/app/fixtures/custom/services/access/system/access.yaml new file mode 100644 index 00000000..f8a9bd52 --- /dev/null +++ b/app/fixtures/custom/services/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: d2cc6206-d3e4-40ef-96b7-621c7b6d0a11 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/access/system/permission.yaml b/app/fixtures/custom/services/access/system/permission.yaml new file mode 100644 index 00000000..e5aee355 --- /dev/null +++ b/app/fixtures/custom/services/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: d2cc6206-d3e4-40ef-96b7-621c7b6d0a11 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: d2cc6206-d3e4-40ef-96b7-621c7b6d0a11 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: d2cc6206-d3e4-40ef-96b7-621c7b6d0a11 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/category.yaml b/app/fixtures/custom/services/category.yaml new file mode 100644 index 00000000..69755716 --- /dev/null +++ b/app/fixtures/custom/services/category.yaml @@ -0,0 +1,45 @@ +objects: + - uuid: 843aa477-4c0d-4505-a53c-a3a642646a9b + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + slug: infrastructure + title: + en: Infrastructure + fr: Infrastructure + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Presentation ... + services: + - 4a06ea0c-705a-4481-bb9e-befe7ca0ce47 # Report a Pothole + - e73b1d83-b660-4617-8c94-e00eea5df9db # Report a Graffiti + + - uuid: 499b9d3d-9604-49cb-ac3f-b70e505c0f80 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + slug: environment + title: + en: Environment + fr: Environnement + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Presentation ... + services: + - 851dee3d-9c56-46ac-96de-1397484f7679 # Recycle Bin Query + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + slug: ~ + title: {} + description: {} + presentation: {} + data: {} + enabled: true + weight: 0 + services: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/config.yaml b/app/fixtures/custom/services/config.yaml new file mode 100644 index 00000000..962f9a11 --- /dev/null +++ b/app/fixtures/custom/services/config.yaml @@ -0,0 +1,80 @@ +objects: + - uuid: 1a8dd057-1681-46ad-927e-0fd4898d4ffc + key: app.bpm.variables.api_url + value: api_url + + - uuid: e27b69a2-b79a-41f1-8385-13f2b3b2c00b + key: app.bpm.variables.api_user + value: api_user + + - uuid: a4130f75-6a0d-421f-a6ed-e283af003cce + key: app.bpm.variables.api_key + value: api_key + + - uuid: f1ff61a9-14b9-4550-8ff7-a4eb1f20ce87 + key: app.bpm.variables.service_uuid + value: service_uuid + + - uuid: d344f887-210d-4b64-aab0-b56df4bcf33f + key: app.bpm.variables.scenario_uuid + value: scenario_uuid + + - uuid: dc2e88d8-2b55-49a0-8a23-8f8e6a95e553 + key: app.bpm.variables.scenario_custom_data + value: scenario_custom_data + + - uuid: df52bff5-7091-48cb-bafb-e0a529e50e23 + key: app.bpm.variables.identity + value: identity + + - uuid: b340d880-92a1-455e-b5ba-f849501f28df + key: app.bpm.variables.identity_uuid + value: identity_uuid + + - uuid: bb029150-8b10-4778-8f0c-17d058382f03 + key: app.bpm.variables.submission_uuid + value: submission_uuid + + - uuid: 460e0882-a34d-4d43-abb5-6b0e6b144ac0 + key: app.bpm.variables.start_data + value: start_data + + - uuid: 134eae03-f89a-4dee-8710-af3ccdd103bd + key: ds_api.user.username + value: system@system.ds + + - uuid: 11bcfb34-baf5-4838-979c-b14add030fb3 + key: ds_api.user.password + value: system + + - uuid: 0341c60a-3c29-43ab-88c5-3a0b5297acbd + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 6c30bfbd-fcd7-479a-b20e-fadf14d06a4e + key: ds_api.user.roles + value: [] + + - uuid: 56127c8e-68a9-4c34-8875-578b4cd61172 + key: ds_api.user.identity.roles + value: [] + + - uuid: d5a5716c-3117-447e-b5d5-345063072062 + key: ds_api.user.identity.type + value: System + + - uuid: 797b3d2f-ea67-41c5-9818-177d71f9e809 + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: e442ee0f-f089-4e92-8771-a089a0e06679 + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/metadata.yaml b/app/fixtures/custom/services/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/services/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/scenario.yaml b/app/fixtures/custom/services/scenario.yaml new file mode 100644 index 00000000..c332a2c9 --- /dev/null +++ b/app/fixtures/custom/services/scenario.yaml @@ -0,0 +1,104 @@ +objects: + - uuid: 1ab18cea-0930-432a-99f1-beeb55a26b14 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + service: 4a06ea0c-705a-4481-bb9e-befe7ca0ce47 # Report a Pothole + type: bpm + config: + bpm: camunda + process_definition_key: pothole-report + slug: online + title: + en: Report a Pothole Online + fr: Signaler un nids de poule en-ligne + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Présentation ... + data: + en: + button_text: Activate + fr: + button_text: Activer + weight: 0 + + - uuid: 320c0e14-2965-4c19-8f33-68bbac206e6b + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + service: e73b1d83-b660-4617-8c94-e00eea5df9db # Report a Graffiti + type: bpm + config: + bpm: camunda + process_definition_key: graffiti-report + slug: online + title: + en: Report a Graffiti Online + fr: Signaler un graffiti en-ligne + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Présentation ... + data: + en: + button_text: Activate + fr: + button_text: Activer + weight: 0 + + - uuid: 67412965-28a2-48aa-8d1c-9bec7f91645f + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + service: 851dee3d-9c56-46ac-96de-1397484f7679 # Recycle Bin Query + type: bpm + config: + bpm: camunda + process_definition_key: recycle-bin-query + slug: online + title: + en: Recycle Bin Query Online + fr: Requête pour bac de recyclage en-ligne + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Présentation ... + data: + en: + button_text: Activate + fr: + button_text: Activer + weight: 0 + + - uuid: 81a75204-9547-45f9-92f7-44d7d1d0eec3 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + service: 851dee3d-9c56-46ac-96de-1397484f7679 # Recycle Bin Query + type: info + slug: info + title: + en: Recycle Bin Query By Mail + fr: Requête pour bac de recyclage par courrier + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Présentation ... + weight: 1 + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + service: ~ + type: ~ + config: {} + slug: ~ + title: {} + description: {} + presentation: {} + data: {} + enabled: true + weight: 0 + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/service.yaml b/app/fixtures/custom/services/service.yaml new file mode 100644 index 00000000..3d2f12d6 --- /dev/null +++ b/app/fixtures/custom/services/service.yaml @@ -0,0 +1,52 @@ +objects: + - uuid: 4a06ea0c-705a-4481-bb9e-befe7ca0ce47 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + slug: report-pothole + title: + en: Report a Pothole + fr: Signaler un nids de poule + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Presentation ... + + - uuid: e73b1d83-b660-4617-8c94-e00eea5df9db + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + slug: report-graffiti + title: + en: Report a Graffiti + fr: Signaler un graffiti + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Presentation ... + + - uuid: 851dee3d-9c56-46ac-96de-1397484f7679 + owner_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + slug: recycle-bin-query + title: + en: Recycle Bin Query + fr: Requête pour bac de recyclage + description: + en: Description ... + fr: Description ... + presentation: + en: Presentation ... + fr: Presentation ... + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: ~ + slug: ~ + title: {} + description: {} + presentation: {} + data: {} + enabled: true + weight: 0 + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/services/system/parameter.yaml b/app/fixtures/custom/services/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/services/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/services/system/tenant.yaml b/app/fixtures/custom/services/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/services/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/services/workflow/bpmn/pothole-report.bpmn b/app/fixtures/custom/services/workflow/bpmn/pothole-report.bpmn new file mode 100644 index 00000000..44b6a31c --- /dev/null +++ b/app/fixtures/custom/services/workflow/bpmn/pothole-report.bpmn @@ -0,0 +1,49 @@ + + + + + SequenceFlow_1q8gf6i + + + + SequenceFlow_1q8gf6i + SequenceFlow_0wplinc + + + SequenceFlow_0wplinc + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/app/fixtures/custom/services/workflow/deployment.yaml b/app/fixtures/custom/services/workflow/deployment.yaml new file mode 100644 index 00000000..aca402d7 --- /dev/null +++ b/app/fixtures/custom/services/workflow/deployment.yaml @@ -0,0 +1,10 @@ +objects: + - name: Pothole Report + files: + - bpmn/pothole-report.bpmn + +prototype: + name: ~ + source: ~ + files: [] + tenant_id: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/anonymous/access.yaml b/app/fixtures/custom/tasks/access/anonymous/access.yaml new file mode 100644 index 00000000..837764d4 --- /dev/null +++ b/app/fixtures/custom/tasks/access/anonymous/access.yaml @@ -0,0 +1,10 @@ +objects: + - uuid: 3e7300a8-8ebc-42e8-b229-96e56f26ead4 + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/anonymous/permission.yaml b/app/fixtures/custom/tasks/access/anonymous/permission.yaml new file mode 100644 index 00000000..eda9a1b0 --- /dev/null +++ b/app/fixtures/custom/tasks/access/anonymous/permission.yaml @@ -0,0 +1,30 @@ +objects: + - access: 3e7300a8-8ebc-42e8-b229-96e56f26ead4 # Anonymous + scope: + type: session + key: + - task + - task_uuid + - task_created_at + - task_due_at + - task_follow_up_at + - task_title + - task_description + - task_priority + - task_form + - submission + - submission_uuid + - submission_created_at + - submission_task + - submission_data + - submission_state + - submission_version + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/individual/access.yaml b/app/fixtures/custom/tasks/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/tasks/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/individual/permission.yaml b/app/fixtures/custom/tasks/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tasks/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/organization/access.yaml b/app/fixtures/custom/tasks/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/tasks/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/organization/permission.yaml b/app/fixtures/custom/tasks/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tasks/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/role/access.yaml b/app/fixtures/custom/tasks/access/role/access.yaml new file mode 100644 index 00000000..b38aec81 --- /dev/null +++ b/app/fixtures/custom/tasks/access/role/access.yaml @@ -0,0 +1,29 @@ +objects: + - uuid: 2386a1f2-4dc6-4078-b42d-109db7258a4b + assignee_uuid: 0c1228d5-63fb-4615-ada2-2b184cd753ee # Administrator + + - uuid: 1a770d5c-13a4-4304-a328-f898ded37f49 + assignee_uuid: 81596e69-f75e-4eaa-b429-0599d181cca7 # Manager + + - uuid: f3f22d87-9edb-4b27-a6f2-a30181acf38f + assignee_uuid: 2f0bfe5d-74cb-4d74-89b6-7272c20aca35 # Backoffice Manager + + - uuid: 45bafff4-dae1-4cb1-bdcf-e71f347092f2 + assignee_uuid: ab7ac1fa-62f4-4732-8c48-0e1785fb086d # Staff + + - uuid: 7ce80f25-dfb5-4c12-ac8d-f04562403530 + assignee_uuid: c2c4a4db-e3db-4019-ac0e-73edb8aa789e # Backoffice Staff + + - uuid: 785bd0d9-6b03-4d18-b6aa-914f268b5479 + assignee_uuid: 0da2f74f-a8f8-44c0-a63c-8d51db55afa9 # Individual + + - uuid: 2ea1271a-fa3d-4448-a0d4-0a890bb3aeba + assignee_uuid: b3ddab01-141c-465b-bc3b-dfc22d5db631 # Organization + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/role/permission.yaml b/app/fixtures/custom/tasks/access/role/permission.yaml new file mode 100644 index 00000000..a1e01e19 --- /dev/null +++ b/app/fixtures/custom/tasks/access/role/permission.yaml @@ -0,0 +1,144 @@ +objects: + - access: 2386a1f2-4dc6-4078-b42d-109db7258a4b # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 2386a1f2-4dc6-4078-b42d-109db7258a4b # Administrator + scope: + type: owner + entity: BusinessUnit + entity_uuid: ~ # Any BusinessUnit + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 2386a1f2-4dc6-4078-b42d-109db7258a4b # Administrator + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + + - access: 1a770d5c-13a4-4304-a328-f898ded37f49 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - task + - submission + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 1a770d5c-13a4-4304-a328-f898ded37f49 # Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - task_property + - submission_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: f3f22d87-9edb-4b27-a6f2-a30181acf38f # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - task + - submission + - metadata + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: f3f22d87-9edb-4b27-a6f2-a30181acf38f # Backoffice Manager + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - task_property + - submission_property + - metadata_property + attributes: [BROWSE, READ, EDIT] + + - access: 45bafff4-dae1-4cb1-bdcf-e71f347092f2 # Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: '*' + key: + - task + - task_property + - submission + - submission_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 7ce80f25-dfb5-4c12-ac8d-f04562403530 # Backoffice Staff + scope: + type: owner + entity: BusinessUnit + entity_uuid: 1efc9d23-111a-4f9a-b703-29df95e38a7e # Backoffice + key: + - task + - task_property + - submission + - submission_property + - metadata + - metadata_property + attributes: [BROWSE, READ] + + - access: 785bd0d9-6b03-4d18-b6aa-914f268b5479 # Individual + scope: + type: session + key: + - task + - task_uuid + - task_created_at + - task_due_at + - task_follow_up_at + - task_title + - task_description + - task_priority + - task_form + - submission + - submission_uuid + - submission_created_at + - submission_task + - submission_data + - submission_state + - submission_version + attributes: [BROWSE, READ] + + - access: 2ea1271a-fa3d-4448-a0d4-0a890bb3aeba # Organization + scope: + type: session + key: + - task + - task_uuid + - task_created_at + - task_due_at + - task_follow_up_at + - task_title + - task_description + - task_priority + - task_form + - submission + - submission_uuid + - submission_created_at + - submission_task + - submission_data + - submission_state + - submission_version + attributes: [BROWSE, READ] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/staff/access.yaml b/app/fixtures/custom/tasks/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/tasks/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/staff/permission.yaml b/app/fixtures/custom/tasks/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tasks/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/system/access.yaml b/app/fixtures/custom/tasks/access/system/access.yaml new file mode 100644 index 00000000..1d39591c --- /dev/null +++ b/app/fixtures/custom/tasks/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 11ad7c1a-b484-4b40-b839-c4c8d500e05e + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/access/system/permission.yaml b/app/fixtures/custom/tasks/access/system/permission.yaml new file mode 100644 index 00000000..ac2273c5 --- /dev/null +++ b/app/fixtures/custom/tasks/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 11ad7c1a-b484-4b40-b839-c4c8d500e05e # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 11ad7c1a-b484-4b40-b839-c4c8d500e05e # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 11ad7c1a-b484-4b40-b839-c4c8d500e05e # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/config.yaml b/app/fixtures/custom/tasks/config.yaml new file mode 100644 index 00000000..94114c1d --- /dev/null +++ b/app/fixtures/custom/tasks/config.yaml @@ -0,0 +1,44 @@ +objects: + - uuid: 9e2b73be-bd4d-46d8-a3b1-23cd2eb2c495 + key: app.bpm.variables.task_data + value: '{id}' + + - uuid: 133c9b1f-b98d-4afe-a7d0-09dbedfbff66 + key: ds_api.user.username + value: system@system.ds + + - uuid: f9831c74-0d86-4de5-950c-dab981c719e1 + key: ds_api.user.password + value: system + + - uuid: 8246021b-ca2c-4d48-9d87-376129cf42dc + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 29373695-c6cd-4d2f-bf33-07f724915332 + key: ds_api.user.roles + value: [] + + - uuid: 1bd3238b-8c70-41ea-bb95-578311957745 + key: ds_api.user.identity.roles + value: [] + + - uuid: 4d2eb433-a8c6-4531-b966-0ab8d658f963 + key: ds_api.user.identity.type + value: System + + - uuid: 5474b4e8-60e6-4ba5-a873-34f97fe73aed + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: 307162c7-9f07-4c0b-a534-c22817703b3c + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/metadata.yaml b/app/fixtures/custom/tasks/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/tasks/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tasks/system/parameter.yaml b/app/fixtures/custom/tasks/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/tasks/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/tasks/system/tenant.yaml b/app/fixtures/custom/tasks/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/tasks/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/tenants/access/anonymous/access.yaml b/app/fixtures/custom/tenants/access/anonymous/access.yaml new file mode 100644 index 00000000..6b899c0b --- /dev/null +++ b/app/fixtures/custom/tenants/access/anonymous/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Anonymous + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/anonymous/permission.yaml b/app/fixtures/custom/tenants/access/anonymous/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tenants/access/anonymous/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/individual/access.yaml b/app/fixtures/custom/tenants/access/individual/access.yaml new file mode 100644 index 00000000..3b86b0f7 --- /dev/null +++ b/app/fixtures/custom/tenants/access/individual/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Individual + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/individual/permission.yaml b/app/fixtures/custom/tenants/access/individual/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tenants/access/individual/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/organization/access.yaml b/app/fixtures/custom/tenants/access/organization/access.yaml new file mode 100644 index 00000000..38f3b816 --- /dev/null +++ b/app/fixtures/custom/tenants/access/organization/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Organization + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/organization/permission.yaml b/app/fixtures/custom/tenants/access/organization/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tenants/access/organization/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/role/access.yaml b/app/fixtures/custom/tenants/access/role/access.yaml new file mode 100644 index 00000000..e08f6e0d --- /dev/null +++ b/app/fixtures/custom/tenants/access/role/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Role + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/role/permission.yaml b/app/fixtures/custom/tenants/access/role/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tenants/access/role/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/staff/access.yaml b/app/fixtures/custom/tenants/access/staff/access.yaml new file mode 100644 index 00000000..4fd72673 --- /dev/null +++ b/app/fixtures/custom/tenants/access/staff/access.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + assignee: Staff + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/staff/permission.yaml b/app/fixtures/custom/tenants/access/staff/permission.yaml new file mode 100644 index 00000000..7945fcde --- /dev/null +++ b/app/fixtures/custom/tenants/access/staff/permission.yaml @@ -0,0 +1,9 @@ +objects: [] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/system/access.yaml b/app/fixtures/custom/tenants/access/system/access.yaml new file mode 100644 index 00000000..04c9fc10 --- /dev/null +++ b/app/fixtures/custom/tenants/access/system/access.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 13ae389f-bfd6-4c61-b26a-da599743c058 + owner_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + assignee_uuid: 1d14cd3f-72cc-444b-8dc7-bbdba4815536 # System + +prototype: + uuid: ~ + owner: System + owner_uuid: ~ + assignee: System + assignee_uuid: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/access/system/permission.yaml b/app/fixtures/custom/tenants/access/system/permission.yaml new file mode 100644 index 00000000..2b35f0fe --- /dev/null +++ b/app/fixtures/custom/tenants/access/system/permission.yaml @@ -0,0 +1,20 @@ +objects: + - access: 13ae389f-bfd6-4c61-b26a-da599743c058 # System + key: entity + attributes: [BROWSE, READ, EDIT, ADD, DELETE] + + - access: 13ae389f-bfd6-4c61-b26a-da599743c058 # System + key: property + attributes: [BROWSE, READ, EDIT] + + - access: 13ae389f-bfd6-4c61-b26a-da599743c058 # System + key: generic + attributes: [BROWSE, READ, EDIT, ADD, DELETE, EXECUTE] + +prototype: + access: ~ + scope: + type: generic + key: ~ + attributes: [] + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/config.yaml b/app/fixtures/custom/tenants/config.yaml new file mode 100644 index 00000000..237cbe68 --- /dev/null +++ b/app/fixtures/custom/tenants/config.yaml @@ -0,0 +1,40 @@ +objects: + - uuid: 1f43ff37-b000-428f-9f18-e2676b12fae5 + key: ds_api.user.username + value: system@system.ds + + - uuid: cb26b146-98a4-4df3-a1c3-df5d3bb35d99 + key: ds_api.user.password + value: system + + - uuid: dc7b922f-746a-40d0-a8d2-dcfb305c7dea + key: ds_api.user.uuid + value: 4b0237d1-0917-4d8b-af6d-2aa89be336de # System + + - uuid: 1030f501-3860-4bf2-8c6f-5b2eea8e0997 + key: ds_api.user.roles + value: [] + + - uuid: c1c6d36b-5a21-46bd-882c-fde10a8d2b5c + key: ds_api.user.identity.roles + value: [] + + - uuid: 399b593b-b87c-4fa0-969b-f94860a4b70d + key: ds_api.user.identity.type + value: System + + - uuid: dc1014f9-26b0-424a-8fcc-0b3476287a5d + key: ds_api.user.identity.uuid + value: fe1b94ed-783a-48d7-8bf2-2f9cea89f11e # System + + - uuid: f7723b36-a82a-4535-9321-a8e2d6298f9f + key: ds_api.user.tenant + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + key: ~ + value: ~ + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/metadata.yaml b/app/fixtures/custom/tenants/metadata.yaml new file mode 100644 index 00000000..c0bcb5af --- /dev/null +++ b/app/fixtures/custom/tenants/metadata.yaml @@ -0,0 +1,11 @@ +objects: [] + +prototype: + uuid: ~ + owner: BusinessUnit + owner_uuid: 9df65eca-1e81-475b-8584-df6c357edf30 # Administration + title: {} + slug: ~ + type: ~ + data: {} + tenant: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant diff --git a/app/fixtures/custom/tenants/plan.yaml b/app/fixtures/custom/tenants/plan.yaml new file mode 100644 index 00000000..5cd8f67e --- /dev/null +++ b/app/fixtures/custom/tenants/plan.yaml @@ -0,0 +1,20 @@ +objects: + - uuid: 83f5c0df-7daf-430e-87b2-2747b3f1ee91 + title: + en: Bronze Plan + fr: Plan Bronze + + - uuid: 09dc0162-6478-43c6-84ec-4847b0c825cd + title: + en: Silver Plan + fr: Plan Argent + + - uuid: dc2ba5ed-229d-4127-9061-6d18b5e0deb8 + title: + en: Gold Plan + fr: Plan d'or + +prototype: + uuid: ~ + title: {} + data: {} diff --git a/app/fixtures/custom/tenants/system/parameter.yaml b/app/fixtures/custom/tenants/system/parameter.yaml new file mode 100644 index 00000000..9ea29572 --- /dev/null +++ b/app/fixtures/custom/tenants/system/parameter.yaml @@ -0,0 +1,13 @@ +objects: + - key: ds_system.user.username + value: system + + - key: ds_system.user.password + value: system + + - key: ds_tenant.tenant.default + value: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + key: ~ + value: ~ diff --git a/app/fixtures/custom/tenants/system/tenant.yaml b/app/fixtures/custom/tenants/system/tenant.yaml new file mode 100644 index 00000000..74538e6f --- /dev/null +++ b/app/fixtures/custom/tenants/system/tenant.yaml @@ -0,0 +1,6 @@ +objects: + - uuid: 5a5dc71c-8f08-476f-b192-106637717974 # Tenant + +prototype: + uuid: ~ + data: {} diff --git a/app/fixtures/custom/tenants/tenant.yaml b/app/fixtures/custom/tenants/tenant.yaml new file mode 100644 index 00000000..5393915c --- /dev/null +++ b/app/fixtures/custom/tenants/tenant.yaml @@ -0,0 +1,12 @@ +objects: + - uuid: 83f5c0df-7daf-430e-87b2-2747b3f1ee91 + title: + en: Tenant 1 + fr: Tenant 1 + plan: d66089d2-a1df-45e3-8959-990e8d0f3335 # Bronze + +prototype: + uuid: ~ + title: {} + data: {} + plan: ~ From 8caae23e84ef3409454306dfc06b09a8db121672 Mon Sep 17 00:00:00 2001 From: mario-digitalstate Date: Sun, 15 Mar 2020 20:51:36 -0400 Subject: [PATCH 6/7] Add documentation to custom fixtures --- app/fixtures/custom/index.md | 128 +++++++++++++++++++++++++++++++++++ 1 file changed, 128 insertions(+) create mode 100644 app/fixtures/custom/index.md diff --git a/app/fixtures/custom/index.md b/app/fixtures/custom/index.md new file mode 100644 index 00000000..5fe3f136 --- /dev/null +++ b/app/fixtures/custom/index.md @@ -0,0 +1,128 @@ +# General + +A set of custom fixtures has been added to the Platform repository and can be found at `https://github.com/DigitalState/Platform/tree/release/0.18.0/app/fixtures`. In this particular example, the fixtures directory was named `custom`, but could be named whatever fits the context. + +These fixtures contains a complete set data for each entities, including each possible states, found in the DigitalState architecture. + + +# Using Custom Fixtures + +The custom fixtures can be loaded into each microservice databases by configuring the Ansible inventory correctly and running a couple of Ansible commands. + +## Inventory Configuration + +In order to indicate Ansible to use the custom fixtures instead of the dev fixtures, a configuration named `fixture` found in the inventory file `ansible/env/dev/vars/app.yml#11` should be set to `custom`. + +## Copy Fixtures + +After indicating Ansible to use the custom fixtures, an Ansible command needs to be ran to copy the custom fixtures directories to each microservices. + +`ansible-playbook -i inventory.yml app/database/fixture/create.yml` + +This command will copy each custom fixtures subdirectories (`custom/assets/*`, `custom/authentication/*`, `...`) to each microservices fixtures designated directory (`/app/srv/assets/api/config/fixtures/custom/*`, `...`) + +## Load Fixtures + +Once the custom fixtures are present in each microservices, an Ansible command can be ran to actually load the yaml-based fixtures into each microservices databases. + +`ansible-playbook -i inventory.yml app/database/fixture/load.yml` + +Since the `fixture` configuration is set to `custom`, Ansible will use the `custom` directory of fixtures found at `/app/srv/assets/api/config/fixtures/custom`, instead of the default `dev` directory found at `/app/srv/assets/api/config/fixtures/dev`. + + +# Data Summary + +This section contains a summary and description of the important data found in the custom fixtures. + +## Tenants + +Tenant (5a5dc71c-8f08-476f-b192-106637717974) + +The default tenant. + +## Business Units + +Administration (9df65eca-1e81-475b-8584-df6c357edf30) + +The Administration is a business unit meant to own administrative-level data. Such data includes configurations, metadata, access and permissions, business units, roles, etc. + +Only priviledged users such as administrators have full access to data owned by the Administration business unit. + +Backoffice (1efc9d23-111a-4f9a-b703-29df95e38a7e) + +The Backoffice is a business unit meant to own general-purpose data. Such data includes individuals and organizations, services, scenarios, submissions and any derived data such as cases, records, tasks, etc. + +Only priviledged users such as staff members have full access to data owned by the Backoffice business unit. Some users such as individuals and organizations may have read access. + +Technically, the Backoffice business unit could be divided into a more refined collection of business units, such as Environment, Construction, etc. However, to keep fixtures simple, only a wide Backoffice business unit is included. + +Portal (3709635c-5ab1-487b-84ea-23b6e282cc4d) + +The Portal is a business unit meant to own website-related data. Such data includes pages, texts, etc. This business unit is a perfect example of a more fine-grained categorization of owned data. + +Only priviledged useds such as staff members have full access to data owned by the Portal business unit. Some users such as anonymous, individuals and organizations have read access. + +# Roles + +Administrator (df31fa91-26d9-4ed8-a0f4-6aecc4252c57) + +The Administrator role gives read-write permissions to data owned by any business units. + +Manager (81330e07-6bdd-46a3-af8b-85553537c1fd) + +The Manager role gives read-write permissions to data owned by the Backoffice and Portal business units. The roles permissions are inherited from dynamic access cards with the Backoffice and Portal business units associated. + +Backoffice Manager (d8bb8807-4a64-4515-b16a-198c2e63cafc) + +The Backoffice Manager role gives read-write permissions to data owned by the Backoffice business unit. The roles permissions are inherited from static access cards with the Backoffice business unit hardcoded. + +Staff (ea27f3ad-8dec-4d5c-880a-758c7fbafd66) + +The Staff role gives read permissions to data owned by the Backoffice and Portal business units. The roles permissions are inherited from dynamic access cards with the Backoffice and Portal business units associated. + +Backoffice Agent (2217da69-b489-4938-b5f9-91fafda30f9f) + +The Backoffice Agent role gives read permissions to data owned by the Backoffice business unit. The roles permissions are inherited from static access cards with the Backoffice business unit hardcoded. + +Individual (344e62b9-d797-4285-ad49-ad95f93654e1) + +The Individual role gives read-write permissions to certain data owned by the Backoffice and Portal business units. The roles permissions are inherited from static access cards with the Backoffice and Portal business units associated. + +Organization (185330d2-9209-4714-92ee-60cdf29d1745) + +The Organization role gives read-write permissions to certain data owned by the Backoffice and Portal business units. The roles permissions are inherited from static access cards with the Backoffice and Portal business units associated. + +# Identities + +System (1d14cd3f-72cc-444b-8dc7-bbdba4815536) + +The System identity has direct access and permissions assigned. Its purpose is for cross-microservice communications. Login is disabled and its jwt token is only generated internally. + +Admin (6c344b4b-78d3-47c4-9d8b-e67217f46569) + +The Admin identity has the Admin role. It's purpose is to manage system configurations, business units, roles, etc. + +Elliot (e9f3a831-048f-4cd3-92bf-2c77e6d34d1d) + +Elliot holds a manager position and has the Manager role. His purpose is to manage users, services, scenarios across business units. + +Devon (7281ef76-be00-42e4-ab67-fc7e0cc2e7ef) + +Devon holds a manager position and has the Backoffice Manager role. His purpose is to manage users, services, scenarios from the Backoffice business unit. + +Remy (38bf092a-b807-438f-8cc9-009fc12924cb) + +Remy holds a staff position and has the Staff role. His purpose is to review submissions, cases, records across business units. + +Blair (3e94c60b-34c8-4355-91c9-4b246504f110) + +Blair holds an staff position and has the Backoffice Staff role. His purpose is to review submissions, cases, records from the Backoffice business unit. + +Morgan (2af16e03-bbce-4ec9-b73f-8f0468a93f4b) + +Morgan is an invidivual and has the Individual role. His purpose is to browse services and submit scenario submissions. + +Acme (5946a069-95d4-4536-9f78-41ca96316cc5) + +Acme is an organization and has the Organization role. Its purpose is to browse services and submit scenario submissions. + From ad41a034e12a543cafe7294e8d31c3a7b588708b Mon Sep 17 00:00:00 2001 From: mario-digitalstate Date: Sun, 5 Apr 2020 14:57:36 -0400 Subject: [PATCH 7/7] Add json examples for custom fixtures --- app/fixtures/custom/json.md | 68 +++++++++++++++++++++++++++++++++++++ 1 file changed, 68 insertions(+) create mode 100644 app/fixtures/custom/json.md diff --git a/app/fixtures/custom/json.md b/app/fixtures/custom/json.md new file mode 100644 index 00000000..c5237ae7 --- /dev/null +++ b/app/fixtures/custom/json.md @@ -0,0 +1,68 @@ +Create a role that has Read permission on case and case status entities that belongs to Business units. + +`POST {identities}/roles` + +``` +{ + "owner": "BusinessUnit", + "ownerUuid": "c11c546e-bd01-47cf-97da-e25388357b5a", + "title": { + "en": "Auditor", + "fr": "Auditeur" + }, + "slug": "auditor", + "permissions": { + "cases": [ + { + "scope": { + "type": "owner", + "entity": "BusinessUnit", + "entityUuid": "*" + }, + "permissions": [ + { + "key": "case", + "attributes": ["BROWSE", "READ"] + }, + { + "key": "case_property", + "attributes": ["BROWSE", "READ"] + }, + { + "key": "case_status", + "attributes": ["BROWSE", "READ"] + }, + { + "key": "case_status_property", + "attributes": ["BROWSE", "READ"] + } + ] + } + ] + }, + "version": 1 +} +``` + +The role `b5ebefe1-b5fa-4b74-9c32-2563f56b99ff` created above is considered dynamic (`"entityUuid": "*"`). + +This means the role itself doesn't grant any Read access on cases just yet because it requires a role<->business_unit relation as well. + +This dynamic mechanism is what enables reusability of roles without having to define hard-coded access permissions (``"entityUuid": "a9d68bf7-5000-49fe-8b00-33dde235b327"`). + +Create a role<->business_unit relation. This grants the individual Morgan the Auditor role on business unit `Administration`. + +`POST {identities}/individual_roles` + +``` +{ + "owner": "BusinessUnit", + "ownerUuid": "a9d68bf7-5000-49fe-8b00-33dde235b327", + "individual": "/individuals/d0daa7e4-07d1-47e6-93f2-0629adaa3b49", + "role": "/roles/b5ebefe1-b5fa-4b74-9c32-2563f56b99ff", + "businessUnits": [ + "/business_units/a9d68bf7-5000-49fe-8b00-33dde235b327" + ], + "version": 1 +} +```