1. SET FOREIGN_KEY_CHECKS=0;
  2. -- ----------------------------
  3. -- Table structure for `rbac_account_groups`
  4. -- ----------------------------
  5. DROP TABLE IF EXISTS `rbac_account_groups`;
  6. CREATE TABLE `rbac_account_groups` (
  7. `accountId` int(10) unsigned NOT NULL COMMENT 'Account id',
  8. `groupId` int(10) unsigned NOT NULL COMMENT 'Group id',
  9. `realmId` int(11) NOT NULL DEFAULT '-1' COMMENT 'Realm Id, -1 means all',
  10. PRIMARY KEY (`accountId`,`groupId`,`realmId`),
  11. KEY `fk__rbac_account_groups__rbac_groups` (`groupId`),
  12. CONSTRAINT `fk__rbac_account_groups__account` FOREIGN KEY (`accountId`) REFERENCES `account` (`id`) ON DELETE CASCADE,
  13. CONSTRAINT `fk__rbac_account_groups__rbac_groups` FOREIGN KEY (`groupId`) REFERENCES `rbac_groups` (`id`) ON DELETE CASCADE
  14. ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='Account-Group relation';
  15. -- ----------------------------
  16. -- Table structure for `rbac_account_permissions`
  17. -- ----------------------------
  18. DROP TABLE IF EXISTS `rbac_account_permissions`;
  19. CREATE TABLE `rbac_account_permissions` (
  20. `accountId` int(10) unsigned NOT NULL COMMENT 'Account id',
  21. `permissionId` int(10) unsigned NOT NULL COMMENT 'Permission id',
  22. `granted` tinyint(1) NOT NULL DEFAULT '1' COMMENT 'Granted = 1, Denied = 0',
  23. `realmId` int(11) NOT NULL DEFAULT '-1' COMMENT 'Realm Id, -1 means all',
  24. PRIMARY KEY (`accountId`,`permissionId`,`realmId`),
  25. KEY `fk__rbac_account_roles__rbac_permissions` (`permissionId`),
  26. CONSTRAINT `fk__rbac_account_permissions__account` FOREIGN KEY (`accountId`) REFERENCES `account` (`id`) ON DELETE CASCADE,
  27. CONSTRAINT `fk__rbac_account_roles__rbac_permissions` FOREIGN KEY (`permissionId`) REFERENCES `rbac_permissions` (`id`) ON DELETE CASCADE
  28. ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='Account-Permission relation';
  29. -- ----------------------------
  30. -- Table structure for `rbac_account_roles`
  31. -- ----------------------------
  32. DROP TABLE IF EXISTS `rbac_account_roles`;
  33. CREATE TABLE `rbac_account_roles` (
  34. `accountId` int(10) unsigned NOT NULL COMMENT 'Account id',
  35. `roleId` int(10) unsigned NOT NULL COMMENT 'Role id',
  36. `granted` tinyint(1) NOT NULL DEFAULT '1' COMMENT 'Granted = 1, Denied = 0',
  37. `realmId` int(11) NOT NULL DEFAULT '-1' COMMENT 'Realm Id, -1 means all',
  38. PRIMARY KEY (`accountId`,`roleId`,`realmId`),
  39. KEY `fk__rbac_account_roles__rbac_roles` (`roleId`),
  40. CONSTRAINT `fk__rbac_account_roles__account` FOREIGN KEY (`accountId`) REFERENCES `account` (`id`) ON DELETE CASCADE,
  41. CONSTRAINT `fk__rbac_account_roles__rbac_roles` FOREIGN KEY (`roleId`) REFERENCES `rbac_roles` (`id`) ON DELETE CASCADE
  42. ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='Account-Role relation';
  43. -- ----------------------------
  44. -- Table structure for `rbac_group_roles`
  45. -- ----------------------------
  46. DROP TABLE IF EXISTS `rbac_group_roles`;
  47. CREATE TABLE `rbac_group_roles` (
  48. `groupId` int(10) unsigned NOT NULL COMMENT 'group id',
  49. `roleId` int(10) unsigned NOT NULL COMMENT 'Role id',
  50. PRIMARY KEY (`groupId`,`roleId`),
  51. KEY `fk__rbac_group_roles__rbac_roles` (`roleId`),
  52. CONSTRAINT `fk__rbac_group_roles__rbac_groups` FOREIGN KEY (`groupId`) REFERENCES `rbac_groups` (`id`) ON DELETE CASCADE,
  53. CONSTRAINT `fk__rbac_group_roles__rbac_roles` FOREIGN KEY (`roleId`) REFERENCES `rbac_roles` (`id`) ON DELETE CASCADE
  54. ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='Group Role relation';
  55. -- ----------------------------
  56. -- Records of rbac_group_roles
  57. -- ----------------------------
  58. INSERT INTO `rbac_group_roles` VALUES ('1', '1');
  59. INSERT INTO `rbac_group_roles` VALUES ('2', '2');
  60. INSERT INTO `rbac_group_roles` VALUES ('3', '3');
  61. INSERT INTO `rbac_group_roles` VALUES ('4', '4');
  62. INSERT INTO `rbac_group_roles` VALUES ('2', '5');
  63. INSERT INTO `rbac_group_roles` VALUES ('1', '6');
  64. INSERT INTO `rbac_group_roles` VALUES ('1', '7');
  65. INSERT INTO `rbac_group_roles` VALUES ('2', '8');
  66. INSERT INTO `rbac_group_roles` VALUES ('3', '8');
  67. INSERT INTO `rbac_group_roles` VALUES ('4', '8');
  68. INSERT INTO `rbac_group_roles` VALUES ('2', '9');
  69. INSERT INTO `rbac_group_roles` VALUES ('3', '9');
  70. INSERT INTO `rbac_group_roles` VALUES ('4', '9');
  71. INSERT INTO `rbac_group_roles` VALUES ('2', '10');
  72. INSERT INTO `rbac_group_roles` VALUES ('3', '10');
  73. INSERT INTO `rbac_group_roles` VALUES ('4', '10');
  74. INSERT INTO `rbac_group_roles` VALUES ('2', '11');
  75. INSERT INTO `rbac_group_roles` VALUES ('3', '11');
  76. INSERT INTO `rbac_group_roles` VALUES ('4', '11');
  77. INSERT INTO `rbac_group_roles` VALUES ('2', '12');
  78. INSERT INTO `rbac_group_roles` VALUES ('3', '12');
  79. INSERT INTO `rbac_group_roles` VALUES ('4', '12');
  80. INSERT INTO `rbac_group_roles` VALUES ('2', '13');
  81. INSERT INTO `rbac_group_roles` VALUES ('3', '13');
  82. INSERT INTO `rbac_group_roles` VALUES ('4', '13');
  83. INSERT INTO `rbac_group_roles` VALUES ('2', '14');
  84. INSERT INTO `rbac_group_roles` VALUES ('3', '14');
  85. INSERT INTO `rbac_group_roles` VALUES ('4', '14');
  86. INSERT INTO `rbac_group_roles` VALUES ('2', '15');
  87. INSERT INTO `rbac_group_roles` VALUES ('3', '15');
  88. INSERT INTO `rbac_group_roles` VALUES ('4', '15');
  89. INSERT INTO `rbac_group_roles` VALUES ('2', '16');
  90. INSERT INTO `rbac_group_roles` VALUES ('3', '16');
  91. INSERT INTO `rbac_group_roles` VALUES ('4', '16');
  92. INSERT INTO `rbac_group_roles` VALUES ('2', '17');
  93. INSERT INTO `rbac_group_roles` VALUES ('3', '17');
  94. INSERT INTO `rbac_group_roles` VALUES ('4', '17');
  95. INSERT INTO `rbac_group_roles` VALUES ('4', '18');
  96. INSERT INTO `rbac_group_roles` VALUES ('1', '19');
  97. INSERT INTO `rbac_group_roles` VALUES ('2', '19');
  98. INSERT INTO `rbac_group_roles` VALUES ('3', '19');
  99. INSERT INTO `rbac_group_roles` VALUES ('4', '19');
  100. INSERT INTO `rbac_group_roles` VALUES ('2', '20');
  101. INSERT INTO `rbac_group_roles` VALUES ('3', '20');
  102. INSERT INTO `rbac_group_roles` VALUES ('4', '20');
  103. INSERT INTO `rbac_group_roles` VALUES ('2', '21');
  104. INSERT INTO `rbac_group_roles` VALUES ('3', '21');
  105. INSERT INTO `rbac_group_roles` VALUES ('4', '21');
  106. INSERT INTO `rbac_group_roles` VALUES ('2', '22');
  107. INSERT INTO `rbac_group_roles` VALUES ('3', '22');
  108. INSERT INTO `rbac_group_roles` VALUES ('4', '22');
  109. INSERT INTO `rbac_group_roles` VALUES ('4', '23');
  110. INSERT INTO `rbac_group_roles` VALUES ('2', '24');
  111. INSERT INTO `rbac_group_roles` VALUES ('3', '24');
  112. INSERT INTO `rbac_group_roles` VALUES ('4', '24');
  113. INSERT INTO `rbac_group_roles` VALUES ('2', '25');
  114. INSERT INTO `rbac_group_roles` VALUES ('3', '25');
  115. INSERT INTO `rbac_group_roles` VALUES ('4', '25');
  116. INSERT INTO `rbac_group_roles` VALUES ('2', '26');
  117. INSERT INTO `rbac_group_roles` VALUES ('3', '26');
  118. INSERT INTO `rbac_group_roles` VALUES ('4', '26');
  119. INSERT INTO `rbac_group_roles` VALUES ('2', '27');
  120. INSERT INTO `rbac_group_roles` VALUES ('3', '27');
  121. INSERT INTO `rbac_group_roles` VALUES ('4', '27');
  122. INSERT INTO `rbac_group_roles` VALUES ('1', '28');
  123. INSERT INTO `rbac_group_roles` VALUES ('2', '28');
  124. INSERT INTO `rbac_group_roles` VALUES ('3', '28');
  125. INSERT INTO `rbac_group_roles` VALUES ('4', '28');
  126. INSERT INTO `rbac_group_roles` VALUES ('2', '29');
  127. INSERT INTO `rbac_group_roles` VALUES ('3', '29');
  128. INSERT INTO `rbac_group_roles` VALUES ('4', '29');
  129. INSERT INTO `rbac_group_roles` VALUES ('1', '30');
  130. INSERT INTO `rbac_group_roles` VALUES ('2', '30');
  131. INSERT INTO `rbac_group_roles` VALUES ('3', '30');
  132. INSERT INTO `rbac_group_roles` VALUES ('4', '30');
  133. INSERT INTO `rbac_group_roles` VALUES ('2', '31');
  134. INSERT INTO `rbac_group_roles` VALUES ('3', '31');
  135. INSERT INTO `rbac_group_roles` VALUES ('4', '31');
  136. INSERT INTO `rbac_group_roles` VALUES ('2', '32');
  137. INSERT INTO `rbac_group_roles` VALUES ('3', '32');
  138. INSERT INTO `rbac_group_roles` VALUES ('4', '32');
  139. INSERT INTO `rbac_group_roles` VALUES ('2', '33');
  140. INSERT INTO `rbac_group_roles` VALUES ('3', '33');
  141. INSERT INTO `rbac_group_roles` VALUES ('4', '33');
  142. INSERT INTO `rbac_group_roles` VALUES ('2', '34');
  143. INSERT INTO `rbac_group_roles` VALUES ('3', '34');
  144. INSERT INTO `rbac_group_roles` VALUES ('4', '34');
  145. INSERT INTO `rbac_group_roles` VALUES ('2', '35');
  146. INSERT INTO `rbac_group_roles` VALUES ('3', '35');
  147. INSERT INTO `rbac_group_roles` VALUES ('4', '35');
  148. INSERT INTO `rbac_group_roles` VALUES ('2', '36');
  149. INSERT INTO `rbac_group_roles` VALUES ('3', '36');
  150. INSERT INTO `rbac_group_roles` VALUES ('4', '36');
  151. INSERT INTO `rbac_group_roles` VALUES ('2', '37');
  152. INSERT INTO `rbac_group_roles` VALUES ('3', '37');
  153. INSERT INTO `rbac_group_roles` VALUES ('4', '37');
  154. INSERT INTO `rbac_group_roles` VALUES ('2', '38');
  155. INSERT INTO `rbac_group_roles` VALUES ('3', '38');
  156. INSERT INTO `rbac_group_roles` VALUES ('4', '38');
  157. -- ----------------------------
  158. -- Table structure for `rbac_groups`
  159. -- ----------------------------
  160. DROP TABLE IF EXISTS `rbac_groups`;
  161. CREATE TABLE `rbac_groups` (
  162. `id` int(10) unsigned NOT NULL DEFAULT '0' COMMENT 'Group id',
  163. `name` varchar(100) NOT NULL COMMENT 'Group name',
  164. PRIMARY KEY (`id`)
  165. ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='Group List';
  166. -- ----------------------------
  167. -- Records of rbac_groups
  168. -- ----------------------------
  169. INSERT INTO `rbac_groups` VALUES ('1', 'Player');
  170. INSERT INTO `rbac_groups` VALUES ('2', 'Moderator');
  171. INSERT INTO `rbac_groups` VALUES ('3', 'GameMaster');
  172. INSERT INTO `rbac_groups` VALUES ('4', 'Administrator');
  173. -- ----------------------------
  174. -- Table structure for `rbac_permissions`
  175. -- ----------------------------
  176. DROP TABLE IF EXISTS `rbac_permissions`;
  177. CREATE TABLE `rbac_permissions` (
  178. `id` int(10) unsigned NOT NULL DEFAULT '0' COMMENT 'Permission id',
  179. `name` varchar(100) NOT NULL COMMENT 'Permission name',
  180. PRIMARY KEY (`id`)
  181. ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='Permission List';
  182. -- ----------------------------
  183. -- Records of rbac_permissions
  184. -- ----------------------------
  185. INSERT INTO `rbac_permissions` VALUES ('1', 'Instant logout');
  186. INSERT INTO `rbac_permissions` VALUES ('2', 'Skip Queue');
  187. INSERT INTO `rbac_permissions` VALUES ('3', 'Join Normal Battleground');
  188. INSERT INTO `rbac_permissions` VALUES ('4', 'Join Random Battleground');
  189. INSERT INTO `rbac_permissions` VALUES ('5', 'Join Arenas');
  190. INSERT INTO `rbac_permissions` VALUES ('6', 'Join Dungeon Finder');
  191. INSERT INTO `rbac_permissions` VALUES ('7', 'Player Commands (Temporal till commands moved to rbac)');
  192. INSERT INTO `rbac_permissions` VALUES ('8', 'Moderator Commands (Temporal till commands moved to rbac)');
  193. INSERT INTO `rbac_permissions` VALUES ('9', 'GameMaster Commands (Temporal till commands moved to rbac)');
  194. INSERT INTO `rbac_permissions` VALUES ('10', 'Administrator Commands (Temporal till commands moved to rbac)');
  195. INSERT INTO `rbac_permissions` VALUES ('11', 'Log GM trades');
  196. INSERT INTO `rbac_permissions` VALUES ('13', 'Skip Instance required bosses check');
  197. INSERT INTO `rbac_permissions` VALUES ('14', 'Skip character creation team mask check');
  198. INSERT INTO `rbac_permissions` VALUES ('15', 'Skip character creation class mask check');
  199. INSERT INTO `rbac_permissions` VALUES ('16', 'Skip character creation race mask check');
  200. INSERT INTO `rbac_permissions` VALUES ('17', 'Skip character creation reserved name check');
  201. INSERT INTO `rbac_permissions` VALUES ('18', 'Skip character creation heroic min level check');
  202. INSERT INTO `rbac_permissions` VALUES ('19', 'Skip needed requirements to use channel check');
  203. INSERT INTO `rbac_permissions` VALUES ('20', 'Skip disable map check');
  204. INSERT INTO `rbac_permissions` VALUES ('21', 'Skip reset talents when used more than allowed check');
  205. INSERT INTO `rbac_permissions` VALUES ('22', 'Skip spam chat check');
  206. INSERT INTO `rbac_permissions` VALUES ('23', 'Skip over-speed ping check');
  207. INSERT INTO `rbac_permissions` VALUES ('24', 'Two side faction characters on the same account');
  208. INSERT INTO `rbac_permissions` VALUES ('25', 'Allow say chat between factions');
  209. INSERT INTO `rbac_permissions` VALUES ('26', 'Allow channel chat between factions');
  210. INSERT INTO `rbac_permissions` VALUES ('27', 'Two side mail interaction');
  211. INSERT INTO `rbac_permissions` VALUES ('28', 'See two side who list');
  212. INSERT INTO `rbac_permissions` VALUES ('29', 'Add friends of other faction');
  213. INSERT INTO `rbac_permissions` VALUES ('30', 'Save character without delay with .save command');
  214. INSERT INTO `rbac_permissions` VALUES ('31', 'Use params with .unstuck command');
  215. INSERT INTO `rbac_permissions` VALUES ('32', 'Can be assigned tickets with .assign ticket command');
  216. INSERT INTO `rbac_permissions` VALUES ('33', 'Notify if a command was not found');
  217. INSERT INTO `rbac_permissions` VALUES ('34', 'Check if should appear in list using .gm ingame command');
  218. INSERT INTO `rbac_permissions` VALUES ('35', 'See all security levels with who command');
  219. INSERT INTO `rbac_permissions` VALUES ('36', 'Filter whispers');
  220. INSERT INTO `rbac_permissions` VALUES ('37', 'Use staff badge in chat');
  221. INSERT INTO `rbac_permissions` VALUES ('38', 'Resurrect with full Health Points');
  222. INSERT INTO `rbac_permissions` VALUES ('39', 'Restore saved gm setting states');
  223. INSERT INTO `rbac_permissions` VALUES ('40', 'Allows to add a gm to friend list');
  224. INSERT INTO `rbac_permissions` VALUES ('41', 'Use Config option START_GM_LEVEL to assign new character level');
  225. INSERT INTO `rbac_permissions` VALUES ('42', 'Allows to use CMSG_WORLD_TELEPORT opcode');
  226. INSERT INTO `rbac_permissions` VALUES ('43', 'Allows to use CMSG_WHOIS opcode');
  227. INSERT INTO `rbac_permissions` VALUES ('44', 'Receive global GM messages/texts');
  228. INSERT INTO `rbac_permissions` VALUES ('45', 'Join channels without announce');
  229. INSERT INTO `rbac_permissions` VALUES ('46', 'Change channel settings without being channel moderator');
  230. INSERT INTO `rbac_permissions` VALUES ('47', 'Enables lower security than target check');
  231. -- ----------------------------
  232. -- Table structure for `rbac_role_permissions`
  233. -- ----------------------------
  234. DROP TABLE IF EXISTS `rbac_role_permissions`;
  235. CREATE TABLE `rbac_role_permissions` (
  236. `roleId` int(10) unsigned NOT NULL COMMENT 'Role id',
  237. `permissionId` int(10) unsigned NOT NULL COMMENT 'Permission id',
  238. PRIMARY KEY (`roleId`,`permissionId`),
  239. KEY `fk__role_permissions__rbac_permissions` (`permissionId`),
  240. CONSTRAINT `fk__role_permissions__rbac_permissions` FOREIGN KEY (`permissionId`) REFERENCES `rbac_permissions` (`id`) ON DELETE CASCADE,
  241. CONSTRAINT `fk__role_permissions__rbac_roles` FOREIGN KEY (`roleId`) REFERENCES `rbac_roles` (`id`) ON DELETE CASCADE
  242. ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='Role Permission relation';
  243. -- ----------------------------
  244. -- Records of rbac_role_permissions
  245. -- ----------------------------
  246. INSERT INTO `rbac_role_permissions` VALUES ('5', '1');
  247. INSERT INTO `rbac_role_permissions` VALUES ('5', '2');
  248. INSERT INTO `rbac_role_permissions` VALUES ('6', '3');
  249. INSERT INTO `rbac_role_permissions` VALUES ('6', '4');
  250. INSERT INTO `rbac_role_permissions` VALUES ('6', '5');
  251. INSERT INTO `rbac_role_permissions` VALUES ('7', '6');
  252. INSERT INTO `rbac_role_permissions` VALUES ('1', '7');
  253. INSERT INTO `rbac_role_permissions` VALUES ('2', '8');
  254. INSERT INTO `rbac_role_permissions` VALUES ('3', '9');
  255. INSERT INTO `rbac_role_permissions` VALUES ('4', '10');
  256. INSERT INTO `rbac_role_permissions` VALUES ('8', '11');
  257. INSERT INTO `rbac_role_permissions` VALUES ('9', '13');
  258. INSERT INTO `rbac_role_permissions` VALUES ('33', '14');
  259. INSERT INTO `rbac_role_permissions` VALUES ('33', '15');
  260. INSERT INTO `rbac_role_permissions` VALUES ('33', '16');
  261. INSERT INTO `rbac_role_permissions` VALUES ('33', '17');
  262. INSERT INTO `rbac_role_permissions` VALUES ('33', '18');
  263. INSERT INTO `rbac_role_permissions` VALUES ('27', '19');
  264. INSERT INTO `rbac_role_permissions` VALUES ('22', '20');
  265. INSERT INTO `rbac_role_permissions` VALUES ('23', '21');
  266. INSERT INTO `rbac_role_permissions` VALUES ('24', '22');
  267. INSERT INTO `rbac_role_permissions` VALUES ('17', '23');
  268. INSERT INTO `rbac_role_permissions` VALUES ('34', '24');
  269. INSERT INTO `rbac_role_permissions` VALUES ('28', '25');
  270. INSERT INTO `rbac_role_permissions` VALUES ('30', '26');
  271. INSERT INTO `rbac_role_permissions` VALUES ('19', '27');
  272. INSERT INTO `rbac_role_permissions` VALUES ('35', '28');
  273. INSERT INTO `rbac_role_permissions` VALUES ('36', '29');
  274. INSERT INTO `rbac_role_permissions` VALUES ('11', '30');
  275. INSERT INTO `rbac_role_permissions` VALUES ('12', '31');
  276. INSERT INTO `rbac_role_permissions` VALUES ('10', '32');
  277. INSERT INTO `rbac_role_permissions` VALUES ('20', '33');
  278. INSERT INTO `rbac_role_permissions` VALUES ('14', '34');
  279. INSERT INTO `rbac_role_permissions` VALUES ('37', '35');
  280. INSERT INTO `rbac_role_permissions` VALUES ('29', '36');
  281. INSERT INTO `rbac_role_permissions` VALUES ('15', '37');
  282. INSERT INTO `rbac_role_permissions` VALUES ('13', '38');
  283. INSERT INTO `rbac_role_permissions` VALUES ('25', '39');
  284. INSERT INTO `rbac_role_permissions` VALUES ('38', '40');
  285. INSERT INTO `rbac_role_permissions` VALUES ('26', '41');
  286. INSERT INTO `rbac_role_permissions` VALUES ('18', '42');
  287. INSERT INTO `rbac_role_permissions` VALUES ('18', '43');
  288. INSERT INTO `rbac_role_permissions` VALUES ('16', '44');
  289. INSERT INTO `rbac_role_permissions` VALUES ('31', '45');
  290. INSERT INTO `rbac_role_permissions` VALUES ('32', '46');
  291. INSERT INTO `rbac_role_permissions` VALUES ('21', '47');
  292. -- ----------------------------
  293. -- Table structure for `rbac_roles`
  294. -- ----------------------------
  295. DROP TABLE IF EXISTS `rbac_roles`;
  296. CREATE TABLE `rbac_roles` (
  297. `id` int(10) unsigned NOT NULL DEFAULT '0' COMMENT 'Role id',
  298. `name` varchar(100) NOT NULL COMMENT 'Role name',
  299. PRIMARY KEY (`id`)
  300. ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='Roles List';
  301. -- ----------------------------
  302. -- Records of rbac_roles
  303. -- ----------------------------
  304. INSERT INTO `rbac_roles` VALUES ('1', 'Player Commands');
  305. INSERT INTO `rbac_roles` VALUES ('2', 'Moderator Commands');
  306. INSERT INTO `rbac_roles` VALUES ('3', 'GameMaster Commands');
  307. INSERT INTO `rbac_roles` VALUES ('4', 'Administrator Commands');
  308. INSERT INTO `rbac_roles` VALUES ('5', 'Quick Login/Logout');
  309. INSERT INTO `rbac_roles` VALUES ('6', 'Use Battleground/Arenas');
  310. INSERT INTO `rbac_roles` VALUES ('7', 'Use Dungeon Finder');
  311. INSERT INTO `rbac_roles` VALUES ('8', 'Log GM trades');
  312. INSERT INTO `rbac_roles` VALUES ('9', 'Skip Instance required bosses check');
  313. INSERT INTO `rbac_roles` VALUES ('10', 'Ticket management');
  314. INSERT INTO `rbac_roles` VALUES ('11', 'Instant .save');
  315. INSERT INTO `rbac_roles` VALUES ('12', 'Allow params with .unstuck');
  316. INSERT INTO `rbac_roles` VALUES ('13', 'Full HP after resurrect');
  317. INSERT INTO `rbac_roles` VALUES ('14', 'Appear in GM ingame list');
  318. INSERT INTO `rbac_roles` VALUES ('15', 'Use staff badge in chat');
  319. INSERT INTO `rbac_roles` VALUES ('16', 'Receive global GM messages/texts');
  320. INSERT INTO `rbac_roles` VALUES ('17', 'Skip over-speed ping check');
  321. INSERT INTO `rbac_roles` VALUES ('18', 'Allows Admin Opcodes');
  322. INSERT INTO `rbac_roles` VALUES ('19', 'Two side mail interaction');
  323. INSERT INTO `rbac_roles` VALUES ('20', 'Notify if a command was not found');
  324. INSERT INTO `rbac_roles` VALUES ('21', 'Enables lower security than target check');
  325. INSERT INTO `rbac_roles` VALUES ('22', 'Skip disable map check');
  326. INSERT INTO `rbac_roles` VALUES ('23', 'Skip reset talents when used more than allowed check');
  327. INSERT INTO `rbac_roles` VALUES ('24', 'Skip spam chat check');
  328. INSERT INTO `rbac_roles` VALUES ('25', 'Restore saved gm setting states');
  329. INSERT INTO `rbac_roles` VALUES ('26', 'Use Config option START_GM_LEVEL to assign new character level');
  330. INSERT INTO `rbac_roles` VALUES ('27', 'Skip needed requirements to use channel check');
  331. INSERT INTO `rbac_roles` VALUES ('28', 'Allow say chat between factions');
  332. INSERT INTO `rbac_roles` VALUES ('29', 'Filter whispers');
  333. INSERT INTO `rbac_roles` VALUES ('30', 'Allow channel chat between factions');
  334. INSERT INTO `rbac_roles` VALUES ('31', 'Join channels without announce');
  335. INSERT INTO `rbac_roles` VALUES ('32', 'Change channel settings without being channel moderator');
  336. INSERT INTO `rbac_roles` VALUES ('33', 'Skip character creation checks');
  337. INSERT INTO `rbac_roles` VALUES ('34', 'Two side faction characters on the same account');
  338. INSERT INTO `rbac_roles` VALUES ('35', 'See two side who list');
  339. INSERT INTO `rbac_roles` VALUES ('36', 'Add friends of other faction');
  340. INSERT INTO `rbac_roles` VALUES ('37', 'See all security levels with who command');
  341. INSERT INTO `rbac_roles` VALUES ('38', 'Allows to add a gm to friend list');
  342. -- ----------------------------
  343. -- Table structure for `rbac_security_level_groups`
  344. -- ----------------------------
  345. DROP TABLE IF EXISTS `rbac_security_level_groups`;
  346. CREATE TABLE `rbac_security_level_groups` (
  347. `secId` int(10) unsigned NOT NULL COMMENT 'Security Level id',
  348. `groupId` int(10) unsigned NOT NULL COMMENT 'group id',
  349. PRIMARY KEY (`secId`,`groupId`),
  350. KEY `fk__rbac_security_level_groups__rbac_groups` (`groupId`),
  351. CONSTRAINT `fk__rbac_security_level_groups__rbac_groups` FOREIGN KEY (`groupId`) REFERENCES `rbac_groups` (`id`)
  352. ) ENGINE=InnoDB DEFAULT CHARSET=utf8 COMMENT='Default groups to assign when an account is set gm level';
  353. -- ----------------------------
  354. -- Records of rbac_security_level_groups
  355. -- ----------------------------
  356. INSERT INTO `rbac_security_level_groups` VALUES ('0', '1');
  357. INSERT INTO `rbac_security_level_groups` VALUES ('1', '1');
  358. INSERT INTO `rbac_security_level_groups` VALUES ('2', '1');
  359. INSERT INTO `rbac_security_level_groups` VALUES ('3', '1');
  360. INSERT INTO `rbac_security_level_groups` VALUES ('1', '2');
  361. INSERT INTO `rbac_security_level_groups` VALUES ('2', '2');
  362. INSERT INTO `rbac_security_level_groups` VALUES ('3', '2');
  363. INSERT INTO `rbac_security_level_groups` VALUES ('2', '3');
  364. INSERT INTO `rbac_security_level_groups` VALUES ('3', '3');
  365. INSERT INTO `rbac_security_level_groups` VALUES ('3', '4');