2021-04-26 20:07:00 +02:00
|
|
|
#coding:utf-8
|
|
|
|
|
2022-02-04 19:05:19 +01:00
|
|
|
"""
|
|
|
|
ID: syspriv.grant-revoke-any-object
|
|
|
|
TITLE: Check ability to query, modify and deleting data plus add/drop constraints on any table
|
|
|
|
DESCRIPTION:
|
|
|
|
Two users are created, U01 and U02.
|
|
|
|
User U01 is granted with system privilege grant_revoke_any_object.
|
|
|
|
User U02 has NO any privilege.
|
|
|
|
User U01 then creates table and issue GRANT SELECT statement for U02 (WITHOUT using 'granted by clause).
|
|
|
|
Then we
|
|
|
|
1) check result (contrent of RDB$ tables)
|
|
|
|
2) connect as U02 and query this table - this should work OK
|
|
|
|
3) connect as U01 and revoke grant on just queried table from U02
|
|
|
|
4) connect again as U02 and repeat select - this shoiuld fail.
|
|
|
|
FBTEST: functional.syspriv.grant_revoke_any_object
|
|
|
|
"""
|
2021-04-26 20:07:00 +02:00
|
|
|
|
2022-02-04 19:05:19 +01:00
|
|
|
import pytest
|
|
|
|
from firebird.qa import *
|
2021-04-26 20:07:00 +02:00
|
|
|
|
2022-02-04 19:05:19 +01:00
|
|
|
db = db_factory()
|
|
|
|
user_01 = user_factory('db', name='u01', do_not_create=True)
|
|
|
|
user_02 = user_factory('db', name='u02', do_not_create=True)
|
|
|
|
role_revoke = role_factory('db', name='role_for_grant_revoke_any_object', do_not_create=True)
|
2021-04-26 20:07:00 +02:00
|
|
|
|
2022-02-04 19:05:19 +01:00
|
|
|
test_script = """
|
2021-04-26 20:07:00 +02:00
|
|
|
set wng off;
|
|
|
|
set bail on;
|
|
|
|
set list on;
|
|
|
|
|
|
|
|
|
|
|
|
create or alter user u01 password '123' revoke admin role;
|
|
|
|
create or alter user u02 password '456' revoke admin role;
|
|
|
|
revoke all on all from u01;
|
|
|
|
revoke all on all from u02;
|
|
|
|
grant create table to u01;
|
|
|
|
commit;
|
2022-02-04 19:05:19 +01:00
|
|
|
/*
|
2021-04-26 20:07:00 +02:00
|
|
|
set term ^;
|
|
|
|
execute block as
|
|
|
|
begin
|
|
|
|
execute statement 'drop role role_for_grant_revoke_any_object';
|
|
|
|
when any do begin end
|
|
|
|
end^
|
|
|
|
set term ;^
|
|
|
|
commit;
|
2022-02-04 19:05:19 +01:00
|
|
|
*/
|
2021-04-26 20:07:00 +02:00
|
|
|
-- Add/change/delete non-system records in RDB$TYPES
|
|
|
|
create role role_for_grant_revoke_any_object set system privileges to GRANT_REVOKE_ON_ANY_OBJECT;
|
|
|
|
commit;
|
|
|
|
grant default role_for_grant_revoke_any_object to user u01;
|
|
|
|
commit;
|
|
|
|
|
|
|
|
connect '$(DSN)' user u01 password '123';
|
|
|
|
select current_user as who_am_i,r.rdb$role_name,rdb$role_in_use(r.rdb$role_name),r.rdb$system_privileges
|
|
|
|
from mon$database m cross join rdb$roles r;
|
|
|
|
commit;
|
|
|
|
|
|
|
|
recreate table test_u01(id int, who_is_author varchar(31) default current_user);
|
|
|
|
commit;
|
|
|
|
insert into test_u01(id) values(1);
|
|
|
|
commit;
|
|
|
|
|
|
|
|
grant select on table test_u01 to u02; -- nb: do NOT add here "granted by sysdba"!
|
|
|
|
commit;
|
|
|
|
|
|
|
|
-- this should give output with rdb$grantor = 'SYSDBA' despite that actual grantor was 'U01':
|
|
|
|
select * from rdb$user_privileges where rdb$relation_name=upper('test_u01') and rdb$user=upper('u02');
|
|
|
|
commit;
|
|
|
|
|
|
|
|
connect '$(DSN)' user u02 password '456';
|
|
|
|
select current_user as who_am_i, u.* from test_u01 u;
|
|
|
|
commit;
|
|
|
|
|
|
|
|
connect '$(DSN)' user u01 password '123';
|
|
|
|
revoke select on test_u01 from u02;
|
|
|
|
commit;
|
|
|
|
|
|
|
|
set bail off;
|
|
|
|
connect '$(DSN)' user u02 password '456';
|
|
|
|
select current_user as who_am_i, u.* from test_u01 u; -- this should FAIL
|
|
|
|
commit;
|
|
|
|
set bail on;
|
|
|
|
|
2022-02-04 19:05:19 +01:00
|
|
|
-- connect '$(DSN)' user sysdba password 'masterkey';
|
|
|
|
-- drop user u01;
|
|
|
|
-- drop user u02;
|
|
|
|
-- commit;
|
2021-12-22 20:25:10 +01:00
|
|
|
"""
|
2021-04-26 20:07:00 +02:00
|
|
|
|
2022-02-04 19:05:19 +01:00
|
|
|
act = isql_act('db', test_script)
|
2021-04-26 20:07:00 +02:00
|
|
|
|
2022-02-04 19:05:19 +01:00
|
|
|
expected_stdout = """
|
2021-04-26 20:07:00 +02:00
|
|
|
WHO_AM_I U01
|
|
|
|
RDB$ROLE_NAME RDB$ADMIN
|
|
|
|
RDB$ROLE_IN_USE <false>
|
|
|
|
RDB$SYSTEM_PRIVILEGES FFFFFFFFFFFFFFFF
|
|
|
|
|
|
|
|
WHO_AM_I U01
|
|
|
|
RDB$ROLE_NAME ROLE_FOR_GRANT_REVOKE_ANY_OBJECT
|
|
|
|
RDB$ROLE_IN_USE <true>
|
|
|
|
RDB$SYSTEM_PRIVILEGES 0000200000000000
|
|
|
|
|
|
|
|
RDB$USER U02
|
|
|
|
RDB$GRANTOR U01
|
|
|
|
RDB$PRIVILEGE S
|
|
|
|
RDB$GRANT_OPTION 0
|
|
|
|
RDB$RELATION_NAME TEST_U01
|
|
|
|
RDB$FIELD_NAME <null>
|
|
|
|
RDB$USER_TYPE 8
|
|
|
|
RDB$OBJECT_TYPE 0
|
2022-02-04 19:05:19 +01:00
|
|
|
|
2021-04-26 20:07:00 +02:00
|
|
|
WHO_AM_I U02
|
|
|
|
ID 1
|
|
|
|
WHO_IS_AUTHOR U01
|
2021-12-22 20:25:10 +01:00
|
|
|
"""
|
2022-02-04 19:05:19 +01:00
|
|
|
|
|
|
|
expected_stderr = """
|
2021-04-26 20:07:00 +02:00
|
|
|
Statement failed, SQLSTATE = 28000
|
|
|
|
no permission for SELECT access to TABLE TEST_U01
|
|
|
|
-Effective user is U02
|
2021-12-22 20:25:10 +01:00
|
|
|
"""
|
2021-04-26 20:07:00 +02:00
|
|
|
|
|
|
|
@pytest.mark.version('>=4.0')
|
2022-02-04 19:05:19 +01:00
|
|
|
def test_1(act: Action, user_01, user_02, role_revoke):
|
|
|
|
act.expected_stdout = expected_stdout
|
|
|
|
act.expected_stderr = expected_stderr
|
|
|
|
act.execute()
|
|
|
|
assert (act.clean_stderr == act.clean_expected_stderr and
|
|
|
|
act.clean_stdout == act.clean_expected_stdout)
|