erp-construccion-database-v2/schemas/13-audit-triggers-ddl.sql
Adrian Flores Cortes a05f7595b4 [GAP-007] fix: Remove non-immutable generated column in change_log
PostgreSQL requires generated columns to use immutable expressions.
The executed_at::date cast is not immutable due to timezone dependencies.
Changed to a regular DATE column that can be populated by the trigger.

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-02-04 01:35:04 -06:00

357 lines
11 KiB
PL/PgSQL

-- ============================================================================
-- 13-audit-triggers-ddl.sql
-- Schema: audit
-- ERP Construccion - GAP-007: Audit Triggers
-- ============================================================================
-- Descripcion: Sistema de auditoría detallada con:
-- - Registro de cambios a nivel de campo
-- - Triggers automáticos para tablas críticas
-- - Historial completo de modificaciones
-- ============================================================================
-- Autor: Claude-Arquitecto-Orquestador
-- Fecha: 2026-02-04
-- Version: 1.0.0
-- GAP: GAP-007
-- ============================================================================
-- Crear schema si no existe
CREATE SCHEMA IF NOT EXISTS audit;
-- ============================================================================
-- ENUMS
-- ============================================================================
-- Tipo de operación
CREATE TYPE audit.operation_type AS ENUM (
'INSERT',
'UPDATE',
'DELETE',
'TRUNCATE'
);
-- ============================================================================
-- TABLA DE AUDIT LOG
-- ============================================================================
CREATE TABLE IF NOT EXISTS audit.change_log (
id UUID PRIMARY KEY DEFAULT gen_random_uuid(),
-- Contexto
tenant_id UUID,
user_id UUID,
session_id VARCHAR(100),
-- Operación
operation audit.operation_type NOT NULL,
table_schema VARCHAR(63) NOT NULL,
table_name VARCHAR(63) NOT NULL,
record_id UUID,
-- Datos
old_data JSONB,
new_data JSONB,
changed_fields TEXT[],
-- Metadatos
client_ip INET,
user_agent TEXT,
application_name VARCHAR(100),
-- Timestamp
executed_at TIMESTAMPTZ NOT NULL DEFAULT NOW(),
-- Para queries eficientes (calculado, no generado - por compatibilidad)
executed_date DATE
);
-- Índices para change_log
CREATE INDEX IF NOT EXISTS idx_change_log_tenant ON audit.change_log(tenant_id);
CREATE INDEX IF NOT EXISTS idx_change_log_user ON audit.change_log(user_id);
CREATE INDEX IF NOT EXISTS idx_change_log_table ON audit.change_log(table_schema, table_name);
CREATE INDEX IF NOT EXISTS idx_change_log_record ON audit.change_log(record_id);
CREATE INDEX IF NOT EXISTS idx_change_log_executed ON audit.change_log(executed_at DESC);
CREATE INDEX IF NOT EXISTS idx_change_log_date ON audit.change_log(executed_date);
CREATE INDEX IF NOT EXISTS idx_change_log_operation ON audit.change_log(operation);
-- Particionamiento por fecha (opcional, para grandes volúmenes)
-- La tabla puede ser particionada posteriormente si es necesario
-- ============================================================================
-- FUNCIÓN DE TRIGGER GENÉRICA
-- ============================================================================
CREATE OR REPLACE FUNCTION audit.log_changes()
RETURNS TRIGGER AS $$
DECLARE
v_tenant_id UUID;
v_user_id UUID;
v_session_id TEXT;
v_old_data JSONB;
v_new_data JSONB;
v_changed_fields TEXT[];
v_record_id UUID;
v_key TEXT;
BEGIN
-- Obtener contexto de la sesión
BEGIN
v_tenant_id := current_setting('app.current_tenant_id', true)::uuid;
EXCEPTION WHEN OTHERS THEN
v_tenant_id := NULL;
END;
BEGIN
v_user_id := current_setting('app.current_user_id', true)::uuid;
EXCEPTION WHEN OTHERS THEN
v_user_id := NULL;
END;
BEGIN
v_session_id := current_setting('app.session_id', true);
EXCEPTION WHEN OTHERS THEN
v_session_id := NULL;
END;
-- Determinar datos según operación
IF TG_OP = 'INSERT' THEN
v_new_data := to_jsonb(NEW);
v_old_data := NULL;
v_record_id := NEW.id;
v_changed_fields := ARRAY(SELECT jsonb_object_keys(v_new_data));
ELSIF TG_OP = 'UPDATE' THEN
v_old_data := to_jsonb(OLD);
v_new_data := to_jsonb(NEW);
v_record_id := NEW.id;
-- Calcular campos modificados
v_changed_fields := ARRAY(
SELECT key FROM (
SELECT key, v_old_data->key AS old_val, v_new_data->key AS new_val
FROM jsonb_object_keys(v_new_data) AS key
) AS changes
WHERE old_val IS DISTINCT FROM new_val
);
-- Si no hay cambios reales, no registrar
IF array_length(v_changed_fields, 1) IS NULL THEN
RETURN NEW;
END IF;
ELSIF TG_OP = 'DELETE' THEN
v_old_data := to_jsonb(OLD);
v_new_data := NULL;
v_record_id := OLD.id;
v_changed_fields := NULL;
END IF;
-- Insertar registro de auditoría
INSERT INTO audit.change_log (
tenant_id,
user_id,
session_id,
operation,
table_schema,
table_name,
record_id,
old_data,
new_data,
changed_fields,
client_ip,
application_name
) VALUES (
v_tenant_id,
v_user_id,
v_session_id,
TG_OP::audit.operation_type,
TG_TABLE_SCHEMA,
TG_TABLE_NAME,
v_record_id,
v_old_data,
v_new_data,
v_changed_fields,
inet_client_addr(),
current_setting('application_name', true)
);
-- Retornar el registro apropiado
IF TG_OP = 'DELETE' THEN
RETURN OLD;
ELSE
RETURN NEW;
END IF;
END;
$$ LANGUAGE plpgsql SECURITY DEFINER;
-- ============================================================================
-- FUNCIÓN PARA CREAR TRIGGER DE AUDITORÍA
-- ============================================================================
CREATE OR REPLACE FUNCTION audit.enable_audit_trigger(
p_schema_name TEXT,
p_table_name TEXT
)
RETURNS VOID AS $$
DECLARE
v_trigger_name TEXT;
BEGIN
v_trigger_name := 'audit_' || p_table_name || '_changes';
-- Eliminar trigger si existe
EXECUTE format(
'DROP TRIGGER IF EXISTS %I ON %I.%I',
v_trigger_name, p_schema_name, p_table_name
);
-- Crear trigger
EXECUTE format(
'CREATE TRIGGER %I
AFTER INSERT OR UPDATE OR DELETE ON %I.%I
FOR EACH ROW EXECUTE FUNCTION audit.log_changes()',
v_trigger_name, p_schema_name, p_table_name
);
RAISE NOTICE 'Audit trigger creado: %.%', p_schema_name, p_table_name;
END;
$$ LANGUAGE plpgsql;
-- ============================================================================
-- FUNCIÓN PARA DESACTIVAR TRIGGER DE AUDITORÍA
-- ============================================================================
CREATE OR REPLACE FUNCTION audit.disable_audit_trigger(
p_schema_name TEXT,
p_table_name TEXT
)
RETURNS VOID AS $$
DECLARE
v_trigger_name TEXT;
BEGIN
v_trigger_name := 'audit_' || p_table_name || '_changes';
EXECUTE format(
'DROP TRIGGER IF EXISTS %I ON %I.%I',
v_trigger_name, p_schema_name, p_table_name
);
RAISE NOTICE 'Audit trigger eliminado: %.%', p_schema_name, p_table_name;
END;
$$ LANGUAGE plpgsql;
-- ============================================================================
-- ACTIVAR AUDITORÍA EN TABLAS CRÍTICAS
-- ============================================================================
-- Construction: Proyectos y Fraccionamientos
SELECT audit.enable_audit_trigger('construction', 'fraccionamientos');
SELECT audit.enable_audit_trigger('construction', 'proyectos');
-- Estimates: Estimaciones (facturación)
SELECT audit.enable_audit_trigger('estimates', 'estimaciones');
SELECT audit.enable_audit_trigger('estimates', 'anticipos');
-- Finance: Transacciones financieras
SELECT audit.enable_audit_trigger('finance', 'journal_entries');
SELECT audit.enable_audit_trigger('finance', 'invoices');
SELECT audit.enable_audit_trigger('finance', 'payments');
-- Assets: Activos fijos
SELECT audit.enable_audit_trigger('assets', 'assets');
SELECT audit.enable_audit_trigger('assets', 'depreciation_schedule');
-- Documents: Documentos y firmas
SELECT audit.enable_audit_trigger('documents', 'documents');
SELECT audit.enable_audit_trigger('documents', 'digital_signatures');
-- HR: Empleados
SELECT audit.enable_audit_trigger('hr', 'employees');
-- HSE: Incidentes de seguridad
SELECT audit.enable_audit_trigger('hse', 'incidentes');
-- ============================================================================
-- FUNCIONES DE CONSULTA
-- ============================================================================
-- Obtener historial de cambios de un registro
CREATE OR REPLACE FUNCTION audit.get_record_history(
p_table_schema TEXT,
p_table_name TEXT,
p_record_id UUID,
p_limit INT DEFAULT 100
)
RETURNS TABLE (
change_id UUID,
operation audit.operation_type,
changed_fields TEXT[],
old_data JSONB,
new_data JSONB,
user_id UUID,
executed_at TIMESTAMPTZ
) AS $$
BEGIN
RETURN QUERY
SELECT
cl.id,
cl.operation,
cl.changed_fields,
cl.old_data,
cl.new_data,
cl.user_id,
cl.executed_at
FROM audit.change_log cl
WHERE cl.table_schema = p_table_schema
AND cl.table_name = p_table_name
AND cl.record_id = p_record_id
ORDER BY cl.executed_at DESC
LIMIT p_limit;
END;
$$ LANGUAGE plpgsql;
-- Obtener cambios recientes por tenant
CREATE OR REPLACE FUNCTION audit.get_recent_changes(
p_tenant_id UUID,
p_hours INT DEFAULT 24,
p_limit INT DEFAULT 100
)
RETURNS TABLE (
change_id UUID,
table_schema VARCHAR,
table_name VARCHAR,
record_id UUID,
operation audit.operation_type,
user_id UUID,
executed_at TIMESTAMPTZ
) AS $$
BEGIN
RETURN QUERY
SELECT
cl.id,
cl.table_schema,
cl.table_name,
cl.record_id,
cl.operation,
cl.user_id,
cl.executed_at
FROM audit.change_log cl
WHERE cl.tenant_id = p_tenant_id
AND cl.executed_at >= NOW() - (p_hours || ' hours')::interval
ORDER BY cl.executed_at DESC
LIMIT p_limit;
END;
$$ LANGUAGE plpgsql;
-- ============================================================================
-- COMENTARIOS
-- ============================================================================
COMMENT ON SCHEMA audit IS 'GAP-007: Sistema de auditoría detallada';
COMMENT ON TABLE audit.change_log IS 'Registro de todos los cambios en tablas auditadas';
COMMENT ON FUNCTION audit.log_changes() IS 'Trigger function para registrar cambios';
COMMENT ON FUNCTION audit.enable_audit_trigger(TEXT, TEXT) IS 'Habilitar auditoría en una tabla';
COMMENT ON FUNCTION audit.disable_audit_trigger(TEXT, TEXT) IS 'Deshabilitar auditoría en una tabla';
-- ============================================================================
-- FIN DEL SCRIPT
-- Tablas auditadas: 13 tablas críticas
-- ============================================================================