blob: c619bb0bac9d4a842f487c948dfc9428851704f0 [file] [log] [blame]
/*
* Licensed to the Apache Software Foundation (ASF) under one or more
* contributor license agreements. See the NOTICE file distributed with
* this work for additional information regarding copyright ownership.
* The ASF licenses this file to You under the Apache License, Version 2.0
* (the "License"); you may not use this file except in compliance with
* the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.sentry.tests.e2e;
import static org.junit.Assert.assertEquals;
import static org.junit.Assert.assertTrue;
import java.io.File;
import java.io.FileOutputStream;
import java.sql.Connection;
import java.sql.ResultSet;
import java.sql.ResultSetMetaData;
import java.sql.SQLException;
import java.sql.Statement;
import java.util.ArrayList;
import java.util.List;
import junit.framework.Assert;
import org.apache.sentry.provider.file.PolicyFile;
import org.junit.After;
import org.junit.Before;
import org.junit.Test;
import com.google.common.io.Resources;
/* Tests privileges at table scope with cross database access */
public class TestCrossDbOps extends AbstractTestWithStaticLocalFS {
private File dataFile;
private PolicyFile policyFile;
private String loadData;
@Before
public void setup() throws Exception {
context = createContext();
File dataDir = context.getDataDir();
// copy data file to test dir
dataFile = new File(dataDir, SINGLE_TYPE_DATA_FILE_NAME);
FileOutputStream to = new FileOutputStream(dataFile);
Resources.copy(Resources.getResource(SINGLE_TYPE_DATA_FILE_NAME), to);
to.close();
policyFile = PolicyFile.createAdminOnServer1(ADMIN1);
loadData = "server=server1->uri=file://" + dataFile.getPath();
}
@After
public void tearDown() throws Exception {
if (context != null) {
context.close();
}
}
/*
* Admin creates DB_1, DB2, tables (tab_1 ) and (tab_2, tab_3) in DB_1 and
* DB_2 respectively. User user_1 has select on DB_1.tab_1, insert on
* DB2.tab_2 User user_2 has select on DB2.tab_3 Test show database and show
* tables for both user_1 and user_2
*/
@Test
public void testShowDatabasesAndShowTables() throws Exception {
// edit policy file
File policyFile = context.getPolicyFile();
PolicyFileEditor editor = new PolicyFileEditor(policyFile);
editor.addPolicy("admin = admin", "groups");
editor.addPolicy("group1 = select_tab1, insert_tab2", "groups");
editor.addPolicy("group2 = select_tab3", "groups");
editor.addPolicy("admin = server=server1", "roles");
editor.addPolicy(
"select_tab1 = server=server1->db=db1->table=tab1->action=select",
"roles");
editor.addPolicy(
"select_tab3 = server=server1->db=db2->table=tab3->action=select",
"roles");
editor.addPolicy(
"insert_tab2 = server=server1->db=db2->table=tab2->action=insert",
"roles");
editor.addPolicy("admin1 = admin", "users");
editor.addPolicy("user1 = group1", "users");
editor.addPolicy("user2 = group2", "users");
// admin create two databases
Connection connection = context.createConnection(ADMIN1, "foo");
Statement statement = context.createStatement(connection);
statement.execute("DROP DATABASE IF EXISTS DB_1 CASCADE");
statement.execute("DROP DATABASE IF EXISTS DB_2 CASCADE");
statement.execute("DROP DATABASE IF EXISTS DB1 CASCADE");
statement.execute("DROP DATABASE IF EXISTS DB2 CASCADE");
statement.execute("CREATE DATABASE DB1");
statement.execute("CREATE DATABASE DB2");
statement.execute("USE DB1");
statement.execute("CREATE TABLE TAB1(id int)");
statement.executeQuery("SHOW TABLES");
statement.execute("USE DB2");
statement.execute("CREATE TABLE TAB2(id int)");
statement.execute("CREATE TABLE TAB3(id int)");
// test show databases
// show databases shouldn't filter any of the dbs from the resultset
Connection conn = context.createConnection("user1", "");
Statement stmt = context.createStatement(conn);
ResultSet res = stmt.executeQuery("SHOW DATABASES");
List<String> result = new ArrayList<String>();
result.add("db1");
result.add("db2");
result.add("default");
while (res.next()) {
String dbName = res.getString(1);
assertTrue(dbName, result.remove(dbName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
// test show tables
stmt.execute("USE DB1");
res = stmt.executeQuery("SHOW TABLES");
result.clear();
result.add("tab1");
while (res.next()) {
String tableName = res.getString(1);
assertTrue(tableName, result.remove(tableName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
stmt.execute("USE DB2");
res = stmt.executeQuery("SHOW TABLES");
result.clear();
result.add("tab2");
while (res.next()) {
String tableName = res.getString(1);
assertTrue(tableName, result.remove(tableName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
stmt.close();
conn.close();
// test show databases and show tables for user2
conn = context.createConnection("user2", "");
stmt = context.createStatement(conn);
res = stmt.executeQuery("SHOW DATABASES");
result.clear();
result.add("db2");
result.add("default");
while (res.next()) {
String dbName = res.getString(1);
assertTrue(dbName, result.remove(dbName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
// test show tables
stmt.execute("USE DB2");
res = stmt.executeQuery("SHOW TABLES");
result.clear();
result.add("tab3");
while (res.next()) {
String tableName = res.getString(1);
assertTrue(tableName, result.remove(tableName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
try {
stmt.execute("USE DB1");
Assert.fail("Expected SQL exception");
} catch (SQLException e) {
context.verifyAuthzException(e);
}
context.close();
}
/*
* Admin creates DB_1, DB2, tables (tab_1 ) and (tab_2, tab_3) in DB_1 and
* DB_2 respectively. User user_1 has select on DB_1.tab_1, insert on
* DB2.tab_2 User user_2 has select on DB2.tab_3 Test show database and show
* tables for both user_1 and user_2
*/
@Test
public void testJDBCGetSchemasAndGetTables() throws Exception {
// edit policy file
File policyFile = context.getPolicyFile();
PolicyFileEditor editor = new PolicyFileEditor(policyFile);
editor.addPolicy("admin = admin", "groups");
editor.addPolicy("group1 = select_tab1, insert_tab2", "groups");
editor.addPolicy("group2 = select_tab3", "groups");
editor.addPolicy("admin = server=server1", "roles");
editor.addPolicy("select_tab1 = server=server1->db=db1->table=tab1->action=select","roles");
editor.addPolicy("select_tab3 = server=server1->db=db2->table=tab3->action=select","roles");
editor.addPolicy("insert_tab2 = server=server1->db=db2->table=tab2->action=insert","roles");
editor.addPolicy("admin1 = admin", "users");
editor.addPolicy("user1 = group1", "users");
editor.addPolicy("user2 = group2", "users");
// admin create two databases
Connection connection = context.createConnection(ADMIN1, "foo");
Statement statement = context.createStatement(connection);
statement.execute("DROP DATABASE IF EXISTS DB_1 CASCADE");
statement.execute("DROP DATABASE IF EXISTS DB_2 CASCADE");
statement.execute("DROP DATABASE IF EXISTS DB1 CASCADE");
statement.execute("DROP DATABASE IF EXISTS DB2 CASCADE");
statement.execute("CREATE DATABASE DB1");
statement.execute("CREATE DATABASE DB2");
statement.execute("USE DB1");
statement.execute("CREATE TABLE TAB1(id int)");
statement.executeQuery("SHOW TABLES");
statement.execute("USE DB2");
statement.execute("CREATE TABLE TAB2(id int)");
statement.execute("CREATE TABLE TAB3(id int)");
// test show databases
// show databases shouldn't filter any of the dbs from the resultset
Connection conn = context.createConnection("user1", "");
List<String> result = new ArrayList<String>();
// test direct JDBC metadata API
ResultSet res = conn.getMetaData().getSchemas();
ResultSetMetaData resMeta = res.getMetaData();
assertEquals(2, resMeta.getColumnCount());
assertEquals("TABLE_SCHEM", resMeta.getColumnName(1));
assertEquals("TABLE_CATALOG", resMeta.getColumnName(2));
result.add("db1");
result.add("db2");
result.add("default");
while (res.next()) {
String dbName = res.getString(1);
assertTrue(dbName, result.remove(dbName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
// test direct JDBC metadata API
res = conn.getMetaData().getTables(null, "DB1", "tab%", null);
result.add("tab1");
while (res.next()) {
String tableName = res.getString(3);
assertTrue(tableName, result.remove(tableName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
// test direct JDBC metadata API
res = conn.getMetaData().getTables(null, "DB2", "tab%", null);
result.add("tab2");
while (res.next()) {
String tableName = res.getString(3);
assertTrue(tableName, result.remove(tableName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
res = conn.getMetaData().getTables(null, "DB%", "tab%", null);
result.add("tab2");
result.add("tab1");
while (res.next()) {
String tableName = res.getString(3);
assertTrue(tableName, result.remove(tableName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
//test show columns
res = conn.getMetaData().getColumns(null, "DB%", "tab%","i%" );
result.add("id");
result.add("id");
while (res.next()) {
String columnName = res.getString(4);
assertTrue(columnName, result.remove(columnName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
conn.close();
// test show databases and show tables for user2
conn = context.createConnection("user2", "");
// test direct JDBC metadata API
res = conn.getMetaData().getSchemas();
resMeta = res.getMetaData();
assertEquals(2, resMeta.getColumnCount());
assertEquals("TABLE_SCHEM", resMeta.getColumnName(1));
assertEquals("TABLE_CATALOG", resMeta.getColumnName(2));
result.add("db2");
result.add("default");
while (res.next()) {
String dbName = res.getString(1);
assertTrue(dbName, result.remove(dbName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
// test JDBC direct API
res = conn.getMetaData().getTables(null, "DB%", "tab%", null);
result.add("tab3");
while (res.next()) {
String tableName = res.getString(3);
assertTrue(tableName, result.remove(tableName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
//test show columns
res = conn.getMetaData().getColumns(null, "DB%", "tab%","i%" );
result.add("id");
while (res.next()) {
String columnName = res.getString(4);
assertTrue(columnName, result.remove(columnName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
//test show columns
res = conn.getMetaData().getColumns(null, "DB1", "tab%","i%" );
while (res.next()) {
String columnName = res.getString(4);
assertTrue(columnName, result.remove(columnName));
}
assertTrue(result.toString(), result.isEmpty());
res.close();
context.close();
}
/**
* 2.8 admin user create two database, DB_1, DB_2 admin grant all to USER_1,
* USER_2 on DB_1, admin grant all to USER_1's group, USER_2's group on DB_2
* positive test case: USER_1, USER_2 has ALL privilege on both DB_1 and DB_2
* negative test case: USER_1, USER_2 don't have ALL privilege on SERVER
*/
@Test
public void testDbPrivileges() throws Exception {
// edit policy file
String testPolicies[] = {
"[groups]",
"admin_group = admin_role",
"user_group = db1_all,db2_all, load_data",
"[roles]",
"db1_all = server=server1->db=" + DB1,
"db2_all = server=server1->db=" + DB2,
"load_data = server=server1->URI=file://" + dataFile.getPath(),
"admin_role = server=server1",
"[users]",
"user1 = user_group",
"user2 = user_group",
ADMIN1 + " = admin_group"
};
context.makeNewPolicy(testPolicies);
dropDb(ADMIN1, DB1, DB2);
createDb(ADMIN1, DB1, DB2);
for (String user : new String[]{USER1, USER2}) {
for (String dbName : new String[]{DB1, DB2}) {
Connection userConn = context.createConnection(user, "foo");
String tabName = user + "_tab1";
Statement userStmt = context.createStatement(userConn);
// Positive case: test user1 and user2 has permissions to access
// db1 and
// db2
userStmt
.execute("create table " + dbName + "." + tabName + " (id int)");
userStmt.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath()
+ "' INTO TABLE " + dbName + "." + tabName);
userStmt.execute("select * from " + dbName + "." + tabName);
context.close();
}
}
}
/**
* Test Case 2.11 admin user create a new database DB_1 and grant ALL to
* himself on DB_1 should work
*/
@Test
public void testAdminDbPrivileges() throws Exception {
policyFile.write(context.getPolicyFile());
dropDb(ADMIN1, DB1);
createDb(ADMIN1, DB1);
Connection adminCon = context.createConnection(ADMIN1, "password");
Statement adminStmt = context.createStatement(adminCon);
String tabName = DB1 + "." + "admin_tab1";
adminStmt.execute("create table " + tabName + "(c1 string)");
adminStmt.execute("load data local inpath '" + dataFile.getPath() + "' into table "
+ tabName);
assertTrue(adminStmt.executeQuery("select * from " + tabName).next());
adminStmt.close();
adminCon.close();
}
/**
* Test Case 2.14 admin user create a new database DB_1 create TABLE_1 in DB_1
* admin user grant INSERT to USER_1's group on TABLE_1 negative test case:
* USER_1 try to do following on TABLE_1 will fail: --explain --analyze
* --describe --describe function --show columns --show table status --show
* table properties --show create table --show partitions --show indexes
* --select * from TABLE_1.
*/
@Test
public void testNegativeUserPrivileges() throws Exception {
// edit policy file
String testPolicies[] = {
"[groups]",
"admin_group = admin_role",
"user_group = db1_tab1_insert, db1_tab2_all",
"[roles]",
"db1_tab2_all = server=server1->db=db1->table=table_2",
"db1_tab1_insert = server=server1->db=db1->table=table_1->action=insert",
"admin_role = server=server1", "[users]", "user3 = user_group",
"admin = admin_group"};
context.makeNewPolicy(testPolicies);
Connection adminCon = context.createConnection("admin", "foo");
Statement adminStmt = context.createStatement(adminCon);
String dbName = "db1";
adminStmt.execute("use default");
adminStmt.execute("DROP DATABASE IF EXISTS " + dbName + " CASCADE");
adminStmt.execute("CREATE DATABASE " + dbName);
adminStmt.execute("create table " + dbName + ".table_1 (id int)");
adminStmt.close();
adminCon.close();
Connection userConn = context.createConnection("user3", "foo");
Statement userStmt = context.createStatement(userConn);
context.assertAuthzException(userStmt, "select * from " + dbName + ".table_1");
userConn.close();
userStmt.close();
}
/**
* Test Case 2.16 admin user create a new database DB_1 create TABLE_1 and
* TABLE_2 (same schema) in DB_1 admin user grant SELECT, INSERT to USER_1's
* group on TABLE_2 negative test case: USER_1 try to do following on TABLE_1
* will fail: --insert overwrite TABLE_2 select * from TABLE_1
*/
@Test
public void testNegativeUserDMLPrivileges() throws Exception {
policyFile
.addPermissionsToRole("db1_tab2_all", "server=server1->db=db1->table=table_2")
.addRolesToGroup("group1", "db1_tab2_all")
.addGroupsToUser("user3", "group1");
policyFile.write(context.getPolicyFile());
dropDb(ADMIN1, DB1);
createDb(ADMIN1, DB1);
Connection adminCon = context.createConnection(ADMIN1, "password");
Statement adminStmt = context.createStatement(adminCon);
adminStmt.execute("create table " + DB1 + ".table_1 (id int)");
adminStmt.execute("create table " + DB1 + ".table_2 (id int)");
adminStmt.close();
adminCon.close();
Connection userConn = context.createConnection("user3", "foo");
Statement userStmt = context.createStatement(userConn);
context.assertAuthzException(userStmt, "insert overwrite table " + DB1
+ ".table_2 select * from " + DB1 + ".table_1");
context.assertAuthzException(userStmt, "insert overwrite directory '" + dataDir.getPath()
+ "' select * from " + DB1 + ".table_1");
userStmt.close();
userConn.close();
}
/**
* Test Case 2.17 Execution steps
* a) Admin user creates a new database DB_1,
* b) Admin user grants ALL on DB_1 to group GROUP_1
* c) User from GROUP_1 creates table TAB_1, TAB_2 in DB_1
* d) Admin user grants SELECT on TAB_1 to group GROUP_2
*
* 1) verify users from GROUP_2 have only SELECT privileges on TAB_1. They
* shouldn't be able to perform any operation other than those listed as
* requiring SELECT in the privilege model.
*
* 2) verify users from GROUP_2 can't perform queries involving join between
* TAB_1 and TAB_2.
*
* 3) verify users from GROUP_1 can't perform operations requiring ALL @
* SERVER scope. Refer to list
*/
@Test
public void testNegUserPrivilegesAll() throws Exception {
String testPolicies[] = {
"[groups]",
"admin_group = admin_role",
"user_group1 = db1_all",
"user_group2 = db1_tab1_select",
"[roles]",
"db1_all = server=server1->db=db1",
"db1_tab1_select = server=server1->db=db1->table=table_1->action=select",
"admin_role = server=server1", "[users]", "user1 = user_group1",
"user2 = user_group2", "admin = admin_group"};
context.makeNewPolicy(testPolicies);
// create dbs
Connection adminCon = context.createConnection("admin", "foo");
Statement adminStmt = context.createStatement(adminCon);
String dbName = "db1";
adminStmt.execute("use default");
adminStmt.execute("create table table_def (name string)");
adminStmt
.execute("load data local inpath '" + dataFile.getPath() + "' into table table_def");
adminStmt.execute("DROP DATABASE IF EXISTS " + dbName + " CASCADE");
adminStmt.execute("CREATE DATABASE " + dbName);
adminStmt.execute("use " + dbName);
adminStmt.execute("create table table_1 (name string)");
adminStmt
.execute("load data local inpath '" + dataFile.getPath() + "' into table table_1");
adminStmt.execute("create table table_2 (name string)");
adminStmt
.execute("load data local inpath '" + dataFile.getPath() + "' into table table_2");
adminStmt.execute("create view v1 AS select * from table_1");
adminStmt
.execute("create table table_part_1 (name string) PARTITIONED BY (year INT)");
adminStmt.execute("ALTER TABLE table_part_1 ADD PARTITION (year = 2012)");
adminStmt.close();
adminCon.close();
Connection userConn = context.createConnection("user2", "foo");
Statement userStmt = context.createStatement(userConn);
context.assertAuthzException(userStmt, "drop database " + dbName);
// Hive currently doesn't support cross db index DDL
context.assertAuthzException(userStmt, "CREATE TEMPORARY FUNCTION strip AS 'org.apache.hadoop.hive.ql.udf.generic.GenericUDFPrintf'");
context.assertAuthzException(userStmt, "create table " + dbName
+ ".c_tab_2 as select * from " + dbName + ".table_2");
context.assertAuthzException(userStmt, "select * from " + dbName + ".table_2");
context.assertAuthzException(userStmt, "ALTER DATABASE " + dbName
+ " SET DBPROPERTIES ('foo' = 'bar')");
context.assertAuthzException(userStmt, "drop table " + dbName + ".table_1");
context.assertAuthzException(userStmt, "DROP VIEW IF EXISTS " + dbName + ".v1");
context.assertAuthzException(userStmt, "create table " + dbName + ".table_5 (name string)");
context.assertAuthzException(userStmt, "ALTER TABLE " + dbName + ".table_1 RENAME TO "
+ dbName + ".table_99");
context.assertAuthzException(userStmt, "insert overwrite table " + dbName
+ ".table_2 select * from " + dbName + ".table_1");
context.assertAuthzException(userStmt, "insert overwrite table " + dbName
+ ".table_2 select * from " + "table_def");
context.assertAuthzException(userStmt, "ALTER TABLE " + dbName
+ ".table_part_1 ADD IF NOT EXISTS PARTITION (year = 2012)");
context.assertAuthzException(userStmt, "ALTER TABLE " + dbName
+ ".table_part_1 PARTITION (year = 2012) SET LOCATION '/etc'");
userStmt.close();
userConn.close();
}
/**
* Steps: 1. admin user create databases, DB_1 and DB_2, no table or other
* object in database
* 2. admin grant all to USER_1's group on DB_1 and DB_2
* positive test case:
* a)USER_1 has the privilege to create table, load data,
* drop table, create view, insert more data on both databases
* b) USER_1 can switch between DB_1 and DB_2 without exception
* negative test case:
* c) USER_1 cannot drop database
*/
@Test
public void testSandboxOpt9() throws Exception {
policyFile
.addPermissionsToRole(GROUP1_ROLE, ALL_DB1, ALL_DB2, loadData)
.addRolesToGroup(GROUP1, GROUP1_ROLE)
.addGroupsToUser(USER1, GROUP1);
policyFile.write(context.getPolicyFile());
dropDb(ADMIN1, DB1, DB2);
createDb(ADMIN1, DB1, DB2);
Connection connection = context.createConnection(USER1, "password");
Statement statement = context.createStatement(connection);
// a
statement.execute("DROP TABLE IF EXISTS " + DB1 + "." + TBL1);
statement.execute("create table " + DB1 + "." + TBL1
+ " (under_col int comment 'the under column', value string)");
statement.execute("load data local inpath '" + dataFile.getPath()
+ "' into table " + DB1 + "." + TBL1);
statement.execute("DROP VIEW IF EXISTS " + DB1 + "." + VIEW1);
statement.execute("CREATE VIEW " + DB1 + "." + VIEW1
+ " (value) AS SELECT value from " + DB1 + "." + TBL1
+ " LIMIT 10");
statement.execute("DROP TABLE IF EXISTS " + DB2 + "." + TBL1);
statement.execute("CREATE TABLE " + DB2 + "." + TBL1
+ " AS SELECT value from " + DB1 + "." + TBL1
+ " LIMIT 10");
// b
statement.execute("DROP TABLE IF EXISTS " + DB2 + "." + TBL2);
statement.execute("create table " + DB2 + "." + TBL2
+ " (under_col int comment 'the under column', value string)");
statement.execute("load data local inpath '" + dataFile.getPath()
+ "' into table " + DB2 + "." + TBL2);
statement.execute("DROP TABLE IF EXISTS " + DB2 + "." + TBL3);
statement.execute("create table " + DB2 + "." + TBL3
+ " (under_col int comment 'the under column', value string)");
statement.execute("load data local inpath '" + dataFile.getPath()
+ "' into table " + DB2 + "." + TBL3);
// c
context.assertAuthzException(statement, "DROP DATABASE IF EXISTS " + DB1);
context.assertAuthzException(statement, "DROP DATABASE IF EXISTS " + DB2);
policyFile.removePermissionsFromRole(GROUP1_ROLE, ALL_DB2);
policyFile.write(context.getPolicyFile());
// create db1.view1 as select from db2.tbl2
statement.execute("DROP VIEW IF EXISTS " + DB1 + "." + VIEW2);
context.assertAuthzException(statement, "CREATE VIEW " + DB1 + "." + VIEW2 +
" (value) AS SELECT value from " + DB2 + "." + TBL2 + " LIMIT 10");
// create db1.tbl2 as select from db2.tbl2
statement.execute("DROP TABLE IF EXISTS " + DB1 + "." + TBL2);
context.assertAuthzException(statement, "CREATE TABLE " + DB1 + "." + TBL2 +
" AS SELECT value from " + DB2 + "." + TBL2 + " LIMIT 10");
statement.close();
connection.close();
}
/**
* Steps: 1. admin user create databases, DB_1 and DB_2, no table or other
* object in database positive test case:
* d) USER_1 has the privilege to create view on tables in DB_1 negative test case:
* e) USER_1 cannot create view in DB_1 that select from tables in DB_2
* with no select privilege 2.
* positive test case:
* f) USER_1 has the privilege to create view to select from DB_1.tb_1
* and DB_2.tb_2 negative test case:
* g) USER_1 cannot create view to select from DB_1.tb_1 and DB_2.tb_3
*/
@Test
public void testCrossDbViewOperations() throws Exception {
// edit policy file
File policyFile = context.getPolicyFile();
PolicyFileEditor editor = new PolicyFileEditor(policyFile);
editor.clearOldPolicy();
editor.addPolicy("admin = admin", "groups");
editor.addPolicy("group1 = all_db1,load_data,select_tb2", "groups");
editor.addPolicy("admin = server=server1", "roles");
editor.addPolicy("all_db1 = server=server1->db=db_1", "roles");
editor.addPolicy("all_db2 = server=server1->db=db_2", "roles");
editor.addPolicy(
"select_tb2 = server=server1->db=db_2->table=tb_1->action=select",
"roles");
editor.addPolicy("load_data = server=server1->URI=file://" + dataFile.getPath(),
"roles");
editor.addPolicy("admin1 = admin", "users");
editor.addPolicy("user1 = group1", "users");
// admin create two databases
dropDb(ADMIN1, DB1, DB2);
createDb(ADMIN1, DB1, DB2);
Connection connection = context.createConnection(ADMIN1, "password");
Statement statement = context.createStatement(connection);
statement
.execute("CREATE TABLE " + DB1 + "." + TBL1 + "(id int)");
statement
.execute("CREATE TABLE " + DB2 + "." + TBL1 + "(id int)");
statement
.execute("CREATE TABLE " + DB2 + "." + TBL2 + "(id int)");
context.close();
connection = context.createConnection("user1", "foo");
statement = context.createStatement(connection);
// d
statement.execute("DROP TABLE IF EXISTS " + DB1 + "." + TBL1);
statement.execute("create table " + DB1 + "." + TBL1
+ " (under_col int comment 'the under column', value string)");
// e
statement.execute("DROP VIEW IF EXISTS " + DB1 + "." + VIEW1);
context.assertAuthzException(statement, "CREATE VIEW " + DB1 + "." + VIEW1
+ " (value) AS SELECT value from " + DB2 + "." + TBL2
+ " LIMIT 10");
// f
statement.execute("DROP VIEW IF EXISTS " + DB1 + "." + VIEW2);
statement.execute("CREATE VIEW " + DB1 + "." + VIEW2
+ " (value) AS SELECT value from " + DB1 + "." + TBL1
+ " LIMIT 10");
// g
statement.execute("DROP VIEW IF EXISTS " + DB1 + "." + VIEW3);
context.assertAuthzException(statement, "CREATE VIEW " + DB1 + "." + VIEW3
+ " (value) AS SELECT value from " + DB2 + "." + TBL2
+ " LIMIT 10");
}
}