6
0
mirror of https://github.com/FirebirdSQL/firebird-qa.git synced 2025-01-23 14:03:06 +01:00
firebird-qa/tests/functional/syspriv/test_use_granted_by_clause.py

140 lines
4.4 KiB
Python

#coding:utf-8
#
# id: functional.syspriv.use_granted_by_clause
# title: Check ability to query, modify and deleting data plus add/drop constraints on any table.
# decription:
# Two users are created, U01 and U02.
# User U01 is granted with system privilege USE_GRANTED_BY_CLAUSE.
# User U02 has NO any privilege.
# User U01 then creates table and issue GRANT SELECT statement for U02 as it was granted by SYSDBA.
# Then we
# 1) check result (contrent of RDB$ tables)
# 2) connect as U02 and query this table - this should work OK
# 3) connect as U01 and revoke grant on just queried table from U02
# 4) connect again as U02 and repeat select - this shoiuld fail.
#
# Checked on WI-T4.0.0.267.
#
# tracker_id:
# min_versions: ['4.0.0']
# versions: 4.0
# qmid: None
import pytest
from firebird.qa import db_factory, isql_act, Action
# version: 4.0
# resources: None
substitutions_1 = []
init_script_1 = """"""
db_1 = db_factory(sql_dialect=3, init=init_script_1)
test_script_1 = """
set wng off;
set bail on;
set list on;
create or alter user u01 password '123' revoke admin role;
create or alter user u02 password '456' revoke admin role;
revoke all on all from u01;
revoke all on all from u02;
grant create table to u01;
commit;
set term ^;
execute block as
begin
execute statement 'drop role role_for_use_granted_by_clause';
when any do begin end
end^
set term ;^
commit;
-- Add/change/delete non-system records in RDB$TYPES
create role role_for_use_granted_by_clause set system privileges to USE_GRANTED_BY_CLAUSE;
commit;
grant default role_for_use_granted_by_clause to user u01;
commit;
connect '$(DSN)' user u01 password '123';
select current_user as who_am_i,r.rdb$role_name,rdb$role_in_use(r.rdb$role_name),r.rdb$system_privileges
from mon$database m cross join rdb$roles r;
commit;
recreate table test_u01(id int, who_is_author varchar(31) default current_user);
commit;
insert into test_u01(id) values(1);
commit;
grant select on table test_u01 to u02 granted by sysdba;
commit;
-- this should give output with rdb$grantor = 'SYSDBA' despite that actual grantor was 'U01':
select * from rdb$user_privileges where rdb$relation_name=upper('test_u01') and rdb$user=upper('u02');
commit;
connect '$(DSN)' user u02 password '456';
select current_user as who_am_i, u.* from test_u01 u;
commit;
connect '$(DSN)' user u01 password '123';
revoke select on test_u01 from u02 granted by sysdba;
commit;
set bail off;
connect '$(DSN)' user u02 password '456';
select current_user as who_am_i, u.* from test_u01 u; -- this should FAIL
commit;
set bail on;
connect '$(DSN)' user sysdba password 'masterkey';
drop user u01;
drop user u02;
commit;
"""
act_1 = isql_act('db_1', test_script_1, substitutions=substitutions_1)
expected_stdout_1 = """
WHO_AM_I U01
RDB$ROLE_NAME RDB$ADMIN
RDB$ROLE_IN_USE <false>
RDB$SYSTEM_PRIVILEGES FFFFFFFFFFFFFFFF
WHO_AM_I U01
RDB$ROLE_NAME ROLE_FOR_USE_GRANTED_BY_CLAUSE
RDB$ROLE_IN_USE <true>
RDB$SYSTEM_PRIVILEGES 0000100000000000
RDB$USER U02
RDB$GRANTOR SYSDBA
RDB$PRIVILEGE S
RDB$GRANT_OPTION 0
RDB$RELATION_NAME TEST_U01
RDB$FIELD_NAME <null>
RDB$USER_TYPE 8
RDB$OBJECT_TYPE 0
WHO_AM_I U02
ID 1
WHO_IS_AUTHOR U01
"""
expected_stderr_1 = """
Statement failed, SQLSTATE = 28000
no permission for SELECT access to TABLE TEST_U01
-Effective user is U02
"""
@pytest.mark.version('>=4.0')
def test_1(act_1: Action):
act_1.expected_stdout = expected_stdout_1
act_1.expected_stderr = expected_stderr_1
act_1.execute()
assert act_1.clean_expected_stderr == act_1.clean_stderr
assert act_1.clean_expected_stdout == act_1.clean_stdout