| /* |
| * Licensed to the Apache Software Foundation (ASF) under one or more |
| * contributor license agreements. See the NOTICE file distributed with |
| * this work for additional information regarding copyright ownership. |
| * The ASF licenses this file to You under the Apache License, Version 2.0 |
| * (the "License"); you may not use this file except in compliance with |
| * the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| package org.apache.sentry.tests.e2e; |
| |
| import static org.junit.Assert.*; |
| import static org.junit.Assert.assertEquals; |
| import static org.junit.Assert.assertTrue; |
| |
| import java.io.File; |
| import java.io.FileOutputStream; |
| import java.sql.Connection; |
| import java.sql.ResultSet; |
| import java.sql.SQLException; |
| import java.sql.Statement; |
| |
| import junit.framework.Assert; |
| |
| import org.junit.After; |
| import org.junit.Before; |
| import org.junit.Test; |
| |
| import com.google.common.io.Resources; |
| |
| /* Tests privileges at table scope within a single database. |
| */ |
| |
| public class TestPrivilegesAtTableScope |
| extends |
| AbstractTestWithStaticLocalFS { |
| |
| private Context context; |
| private final String SINGLE_TYPE_DATA_FILE_NAME = "kv1.dat"; |
| private final String MULTI_TYPE_DATA_FILE_NAME = "emp.dat"; |
| |
| @Before |
| public void setup() throws Exception { |
| context = createContext(); |
| } |
| |
| @After |
| public void teardown() throws Exception { |
| if (context != null) { |
| context.close(); |
| } |
| } |
| |
| /* |
| * Admin creates database DB_1, table TAB_1, TAB_2 in DB_1, loads data into |
| * TAB_1, TAB_2 Admin grants SELECT on TAB_1, TAB_2, INSERT on TAB_1 to |
| * USER_GROUP of which USER_1 is a member. |
| */ |
| @Test |
| public void testInsertAndSelect() throws Exception { |
| File policyFile = context.getPolicyFile(); |
| File dataDir = context.getDataDir(); |
| // copy data file to test dir |
| File dataFile = new File(dataDir, SINGLE_TYPE_DATA_FILE_NAME); |
| FileOutputStream to = new FileOutputStream(dataFile); |
| Resources.copy(Resources.getResource(SINGLE_TYPE_DATA_FILE_NAME), to); |
| to.close(); |
| // delete existing policy file; create new policy file |
| assertTrue("Could not delete " + policyFile, context.deletePolicyFile()); |
| // groups : role -> group |
| |
| context.append("[groups]"); |
| context.append("admin = all_server"); |
| context.append("user_group = select_tab1, insert_tab1, select_tab2"); |
| // roles: privileges -> role |
| context.append("[roles]"); |
| context.append("all_server = server=server1"); |
| context.append("select_tab1 = server=server1->db=DB_1->table=TAB_1->action=select"); |
| context.append("insert_tab1 = server=server1->db=DB_1->table=TAB_1->action=insert"); |
| context.append("select_tab2 = server=server1->db=DB_1->table=TAB_2->action=select"); |
| // users: users -> groups |
| context.append("[users]"); |
| context.append("hive = admin"); |
| context.append("user_1 = user_group"); |
| // setup db objects needed by the test |
| Connection connection = context.createConnection("hive", "hive"); |
| Statement statement = context.createStatement(connection); |
| statement.execute("DROP DATABASE IF EXISTS DB_1 CASCADE"); |
| statement.execute("CREATE DATABASE DB_1"); |
| statement.execute("USE DB_1"); |
| statement.execute("CREATE TABLE TAB_1(A STRING)"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_1"); |
| statement.execute("CREATE TABLE TAB_2(A STRING)"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_2"); |
| statement.close(); |
| connection.close(); |
| |
| // test execution |
| connection = context.createConnection("user_1", "password"); |
| statement = context.createStatement(connection); |
| statement.execute("USE DB_1"); |
| // test user can insert |
| statement.execute("INSERT INTO TABLE TAB_1 SELECT A FROM TAB_2"); |
| // test user can query table |
| ResultSet resultSet = statement.executeQuery("SELECT COUNT(A) FROM TAB_1"); |
| int count = 0; |
| int countRows = 0; |
| |
| while (resultSet.next()) { |
| count = resultSet.getInt(1); |
| countRows++; |
| } |
| |
| assertTrue("Incorrect row count", countRows == 1); |
| assertTrue("Incorrect result", count == 1000); |
| |
| // negative test: test user can't drop |
| try { |
| statement.execute("DROP TABLE TAB_1"); |
| Assert.fail("Expected SQL exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| statement.close(); |
| connection.close(); |
| |
| // connect as admin and drop tab_1 |
| connection = context.createConnection("hive", "hive"); |
| statement = context.createStatement(connection); |
| statement.execute("USE DB_1"); |
| statement.execute("DROP TABLE TAB_1"); |
| statement.close(); |
| connection.close(); |
| |
| // negative test: connect as user_1 and try to recreate tab_1 |
| connection = context.createConnection("user_1", "password"); |
| statement = context.createStatement(connection); |
| statement.execute("USE DB_1"); |
| try { |
| statement.execute("CREATE TABLE TAB_1(A STRING)"); |
| Assert.fail("Expected SQL exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| |
| statement.close(); |
| connection.close(); |
| |
| // test cleanup |
| connection = context.createConnection("hive", "hive"); |
| statement = context.createStatement(connection); |
| statement.execute("DROP DATABASE DB_1 CASCADE"); |
| statement.close(); |
| connection.close(); |
| |
| } |
| |
| /* |
| * Admin creates database DB_1, table TAB_1, TAB_2 in DB_1, loads data into |
| * TAB_1, TAB_2. Admin grants INSERT on TAB_1, SELECT on TAB_2 to USER_GROUP |
| * of which USER_1 is a member. |
| */ |
| @Test |
| public void testInsert() throws Exception { |
| File policyFile = context.getPolicyFile(); |
| File dataDir = context.getDataDir(); |
| // copy data file to test dir |
| File dataFile = new File(dataDir, SINGLE_TYPE_DATA_FILE_NAME); |
| FileOutputStream to = new FileOutputStream(dataFile); |
| Resources.copy(Resources.getResource(SINGLE_TYPE_DATA_FILE_NAME), to); |
| to.close(); |
| // delete existing policy file; create new policy file |
| assertTrue("Could not delete " + policyFile, context.deletePolicyFile()); |
| // groups : role -> group |
| |
| context.append("[groups]"); |
| context.append("admin = all_server"); |
| context.append("user_group = insert_tab1, select_tab2"); |
| // roles: privileges -> role |
| context.append("[roles]"); |
| context.append("all_server = server=server1"); |
| context.append("insert_tab1 = server=server1->db=DB_1->table=TAB_1->action=insert"); |
| context.append("select_tab2 = server=server1->db=DB_1->table=TAB_2->action=select"); |
| // users: users -> groups |
| context.append("[users]"); |
| context.append("hive = admin"); |
| context.append("user_1 = user_group"); |
| // setup db objects needed by the test |
| Connection connection = context.createConnection("hive", "hive"); |
| Statement statement = context.createStatement(connection); |
| statement.execute("DROP DATABASE IF EXISTS DB_1 CASCADE"); |
| statement.execute("CREATE DATABASE DB_1"); |
| statement.execute("USE DB_1"); |
| statement.execute("CREATE TABLE TAB_1(A STRING)"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_1"); |
| statement.execute("CREATE VIEW VIEW_1(A) AS SELECT A FROM TAB_1"); |
| statement.execute("CREATE TABLE TAB_2(A STRING)"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_2"); |
| statement.close(); |
| connection.close(); |
| |
| // test execution |
| connection = context.createConnection("user_1", "password"); |
| statement = context.createStatement(connection); |
| statement.execute("USE DB_1"); |
| // test user can execute insert on table |
| statement.executeQuery("INSERT INTO TABLE TAB_1 SELECT A FROM TAB_2"); |
| |
| // negative test: user can't query table |
| try { |
| statement.executeQuery("SELECT COUNT(A) FROM TAB_1"); |
| Assert.fail("Expected SQL exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| |
| // negative test: test user can't query view |
| try { |
| statement.executeQuery("SELECT COUNT(A) FROM VIEW_1"); |
| Assert.fail("Expected SQL exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| |
| // negative test case: show tables shouldn't list VIEW_1 |
| ResultSet resultSet = statement.executeQuery("SHOW TABLES"); |
| while (resultSet.next()) { |
| String tableName = resultSet.getString(1); |
| assertNotNull("table name is null in result set", tableName); |
| assertFalse("Found VIEW_1 in the result set", |
| "VIEW_1".equalsIgnoreCase(tableName)); |
| } |
| |
| // negative test: test user can't create a new view |
| try { |
| statement.executeQuery("CREATE VIEW VIEW_2(A) AS SELECT A FROM TAB_1"); |
| Assert.fail("Expected SQL Exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| statement.close(); |
| connection.close(); |
| |
| // test cleanup |
| connection = context.createConnection("hive", "hive"); |
| statement = context.createStatement(connection); |
| statement.execute("DROP DATABASE DB_1 CASCADE"); |
| statement.close(); |
| connection.close(); |
| } |
| |
| /* |
| * Admin creates database DB_1, table TAB_1, TAB_2 in DB_1, loads data into |
| * TAB_1, TAB_2. Admin grants SELECT on TAB_1, TAB_2 to USER_GROUP of which |
| * USER_1 is a member. |
| */ |
| @Test |
| public void testSelect() throws Exception { |
| File policyFile = context.getPolicyFile(); |
| File dataDir = context.getDataDir(); |
| // copy data file to test dir |
| File dataFile = new File(dataDir, SINGLE_TYPE_DATA_FILE_NAME); |
| FileOutputStream to = new FileOutputStream(dataFile); |
| Resources.copy(Resources.getResource(SINGLE_TYPE_DATA_FILE_NAME), to); |
| to.close(); |
| // delete existing policy file; create new policy file |
| assertTrue("Could not delete " + policyFile, context.deletePolicyFile()); |
| // groups : role -> group |
| context.append("[groups]"); |
| context.append("admin = all_server"); |
| context.append("user_group = select_tab1, select_tab2"); |
| // roles: privileges -> role |
| context.append("[roles]"); |
| context.append("all_server = server=server1"); |
| context.append("select_tab1 = server=server1->db=DB_1->table=TAB_1->action=select"); |
| context.append("insert_tab1 = server=server1->db=DB_1->table=TAB_1->action=insert"); |
| context.append("select_tab2 = server=server1->db=DB_1->table=TAB_2->action=select"); |
| // users: users -> groups |
| context.append("[users]"); |
| context.append("hive = admin"); |
| context.append("user_1 = user_group"); |
| // setup db objects needed by the test |
| Connection connection = context.createConnection("hive", "hive"); |
| Statement statement = context.createStatement(connection); |
| |
| statement.execute("DROP DATABASE IF EXISTS DB_1 CASCADE"); |
| statement.execute("CREATE DATABASE DB_1"); |
| statement.execute("USE DB_1"); |
| statement.execute("CREATE TABLE TAB_1(A STRING)"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_1"); |
| statement.execute("CREATE VIEW VIEW_1(A) AS SELECT A FROM TAB_1"); |
| statement.execute("CREATE TABLE TAB_2(A STRING)"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_2"); |
| statement.close(); |
| connection.close(); |
| |
| // test execution |
| connection = context.createConnection("user_1", "password"); |
| statement = context.createStatement(connection); |
| statement.execute("USE DB_1"); |
| // test user can execute query on table |
| ResultSet resultSet = statement.executeQuery("SELECT COUNT(A) FROM TAB_1"); |
| int count = 0; |
| int countRows = 0; |
| |
| while (resultSet.next()) { |
| count = resultSet.getInt(1); |
| countRows++; |
| } |
| assertTrue("Incorrect row count", countRows == 1); |
| assertTrue("Incorrect result", count == 500); |
| |
| // negative test: test insert into table |
| try { |
| statement.executeQuery("INSERT INTO TABLE TAB_1 SELECT A FROM TAB_2"); |
| Assert.fail("Expected SQL exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| |
| // negative test: test user can't query view |
| try { |
| statement.executeQuery("SELECT COUNT(A) FROM VIEW_1"); |
| Assert.fail("Expected SQL exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| |
| // negative test: test user can't create a new view |
| try { |
| statement.executeQuery("CREATE VIEW VIEW_2(A) AS SELECT A FROM TAB_1"); |
| Assert.fail("Expected SQL Exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| statement.close(); |
| connection.close(); |
| |
| // test cleanup |
| connection = context.createConnection("hive", "hive"); |
| statement = context.createStatement(connection); |
| statement.execute("DROP DATABASE DB_1 CASCADE"); |
| statement.close(); |
| connection.close(); |
| } |
| |
| /* |
| * Admin creates database DB_1, table TAB_1, TAB_2 in DB_1, VIEW_1 on TAB_1 |
| * loads data into TAB_1, TAB_2. Admin grants SELECT on TAB_1,TAB_2 to |
| * USER_GROUP of which USER_1 is a member. |
| */ |
| @Test |
| public void testTableViewJoin() throws Exception { |
| File policyFile = context.getPolicyFile(); |
| File dataDir = context.getDataDir(); |
| // copy data file to test dir |
| File dataFile = new File(dataDir, MULTI_TYPE_DATA_FILE_NAME); |
| FileOutputStream to = new FileOutputStream(dataFile); |
| Resources.copy(Resources.getResource(MULTI_TYPE_DATA_FILE_NAME), to); |
| to.close(); |
| // delete existing policy file; create new policy file |
| assertTrue("Could not delete " + policyFile, context.deletePolicyFile()); |
| // groups : role -> group |
| context.append("[groups]"); |
| context.append("admin = all_server"); |
| context.append("user_group = select_tab1, select_tab2"); |
| // roles: privileges -> role |
| context.append("[roles]"); |
| context.append("all_server = server=server1"); |
| context.append("select_tab1 = server=server1->db=DB_1->table=TAB_1->action=select"); |
| context.append("select_tab2 = server=server1->db=DB_1->table=TAB_2->action=select"); |
| // users: users -> groups |
| context.append("[users]"); |
| context.append("hive = admin"); |
| context.append("user_1 = user_group"); |
| // setup db objects needed by the test |
| Connection connection = context.createConnection("hive", "hive"); |
| Statement statement = context.createStatement(connection); |
| |
| statement.execute("DROP DATABASE IF EXISTS DB_1 CASCADE"); |
| statement.execute("CREATE DATABASE DB_1"); |
| statement.execute("USE DB_1"); |
| statement.execute("CREATE TABLE TAB_1(B INT, A STRING) " |
| + " row format delimited fields terminated by '|' stored as textfile"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_1"); |
| statement.execute("CREATE VIEW VIEW_1 AS SELECT A, B FROM TAB_1"); |
| statement.execute("CREATE TABLE TAB_2(B INT, A STRING) " |
| + " row format delimited fields terminated by '|' stored as textfile"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_2"); |
| statement.close(); |
| connection.close(); |
| |
| // test execution |
| connection = context.createConnection("user_1", "password"); |
| statement = context.createStatement(connection); |
| statement.execute("USE DB_1"); |
| // test user can execute query TAB_1 JOIN TAB_2 |
| ResultSet resultSet = statement |
| .executeQuery("SELECT COUNT(*) FROM TAB_1 T1 JOIN TAB_2 T2 ON (T1.B = T2.B)"); |
| int count = 0; |
| int countRows = 0; |
| |
| while (resultSet.next()) { |
| count = resultSet.getInt(1); |
| countRows++; |
| } |
| assertTrue("Incorrect row count", countRows == 1); |
| assertTrue("Incorrect result", count == 12); |
| |
| // negative test: test user can't execute query VIEW_1 JOIN TAB_2 |
| try { |
| statement |
| .executeQuery("SELECT COUNT(*) FROM VIEW_1 V1 JOIN TAB_2 T2 ON (V1.B = T2.B)"); |
| Assert.fail("Expected SQL exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| |
| statement.close(); |
| connection.close(); |
| |
| // test cleanup |
| connection = context.createConnection("hive", "hive"); |
| statement = context.createStatement(connection); |
| statement.execute("DROP DATABASE DB_1 CASCADE"); |
| statement.close(); |
| connection.close(); |
| } |
| |
| /* |
| * Admin creates database DB_1, table TAB_1, TAB_2 in DB_1, VIEW_1 on TAB_1 |
| * loads data into TAB_1, TAB_2. Admin grants SELECT on TAB_2 to USER_GROUP of |
| * which USER_1 is a member. |
| */ |
| @Test |
| public void testTableViewJoin2() throws Exception { |
| File policyFile = context.getPolicyFile(); |
| File dataDir = context.getDataDir(); |
| // copy data file to test dir |
| File dataFile = new File(dataDir, MULTI_TYPE_DATA_FILE_NAME); |
| FileOutputStream to = new FileOutputStream(dataFile); |
| Resources.copy(Resources.getResource(MULTI_TYPE_DATA_FILE_NAME), to); |
| to.close(); |
| // delete existing policy file; create new policy file |
| assertTrue("Could not delete " + policyFile, context.deletePolicyFile()); |
| // groups : role -> group |
| context.append("[groups]"); |
| context.append("admin = all_server"); |
| context.append("user_group = select_tab2"); |
| // roles: privileges -> role |
| |
| context.append("[roles]"); |
| context.append("all_server = server=server1"); |
| context.append("select_tab1 = server=server1->db=DB_1->table=TAB_1->action=select"); |
| context.append("select_tab2 = server=server1->db=DB_1->table=TAB_2->action=select"); |
| |
| // users: users -> groups |
| context.append("[users]"); |
| context.append("hive = admin"); |
| context.append("user_1 = user_group"); |
| // setup db objects needed by the test |
| Connection connection = context.createConnection("hive", "hive"); |
| Statement statement = context.createStatement(connection); |
| |
| statement.execute("DROP DATABASE IF EXISTS DB_1 CASCADE"); |
| statement.execute("CREATE DATABASE DB_1"); |
| statement.execute("USE DB_1"); |
| statement.execute("CREATE TABLE TAB_1(B INT, A STRING) " |
| + " row format delimited fields terminated by '|' stored as textfile"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_1"); |
| statement.execute("CREATE VIEW VIEW_1 AS SELECT A, B FROM TAB_1"); |
| statement.execute("CREATE TABLE TAB_2(B INT, A STRING) " |
| + " row format delimited fields terminated by '|' stored as textfile"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_2"); |
| statement.close(); |
| connection.close(); |
| |
| // test execution |
| connection = context.createConnection("user_1", "password"); |
| statement = context.createStatement(connection); |
| statement.execute("USE DB_1"); |
| // test user can execute query on TAB_2 |
| ResultSet resultSet = statement.executeQuery("SELECT COUNT(*) FROM TAB_2"); |
| int count = 0; |
| int countRows = 0; |
| |
| while (resultSet.next()) { |
| count = resultSet.getInt(1); |
| countRows++; |
| } |
| assertTrue("Incorrect row count", countRows == 1); |
| assertTrue("Incorrect result", count == 12); |
| |
| // negative test: test user can't execute query VIEW_1 JOIN TAB_2 |
| try { |
| statement |
| .executeQuery("SELECT COUNT(*) FROM VIEW_1 JOIN TAB_2 ON (VIEW_1.B = TAB_2.B)"); |
| Assert.fail("Expected SQL exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| |
| // negative test: test user can't execute query TAB_1 JOIN TAB_2 |
| try { |
| statement |
| .executeQuery("SELECT COUNT(*) FROM TAB_1 JOIN TAB_2 ON (TAB_1.B = TAB_2.B)"); |
| Assert.fail("Expected SQL exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| |
| statement.close(); |
| connection.close(); |
| |
| // test cleanup |
| connection = context.createConnection("hive", "hive"); |
| statement = context.createStatement(connection); |
| statement.execute("DROP DATABASE DB_1 CASCADE"); |
| statement.close(); |
| connection.close(); |
| } |
| |
| /* |
| * Admin creates database DB_1, table TAB_1, TAB_2 in DB_1, VIEW_1 on TAB_1 |
| * loads data into TAB_1, TAB_2. Admin grants SELECT on TAB_2, VIEW_1 to |
| * USER_GROUP of which USER_1 is a member. |
| */ |
| @Test |
| public void testTableViewJoin3() throws Exception { |
| File policyFile = context.getPolicyFile(); |
| File dataDir = context.getDataDir(); |
| // copy data file to test dir |
| File dataFile = new File(dataDir, MULTI_TYPE_DATA_FILE_NAME); |
| FileOutputStream to = new FileOutputStream(dataFile); |
| Resources.copy(Resources.getResource(MULTI_TYPE_DATA_FILE_NAME), to); |
| to.close(); |
| // delete existing policy file; create new policy file |
| assertTrue("Could not delete " + policyFile, context.deletePolicyFile()); |
| // groups : role -> group |
| |
| context.append("[groups]"); |
| context.append("admin = all_server"); |
| context.append("user_group = select_tab2, select_view1"); |
| // roles: privileges -> role |
| context.append("[roles]"); |
| context.append("all_server = server=server1"); |
| context.append("select_view1 = server=server1->db=DB_1->table=VIEW_1->action=select"); |
| context.append("select_tab2 = server=server1->db=DB_1->table=TAB_2->action=select"); |
| // users: users -> groups |
| context.append("[users]"); |
| context.append("hive = admin"); |
| context.append("user_1 = user_group"); |
| // setup db objects needed by the test |
| Connection connection = context.createConnection("hive", "hive"); |
| Statement statement = context.createStatement(connection); |
| |
| statement.execute("DROP DATABASE IF EXISTS DB_1 CASCADE"); |
| statement.execute("CREATE DATABASE DB_1"); |
| statement.execute("USE DB_1"); |
| statement.execute("CREATE TABLE TAB_1(B INT, A STRING) " |
| + " row format delimited fields terminated by '|' stored as textfile"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_1"); |
| statement.execute("CREATE VIEW VIEW_1 AS SELECT A, B FROM TAB_1"); |
| statement.execute("CREATE TABLE TAB_2(B INT, A STRING) " |
| + " row format delimited fields terminated by '|' stored as textfile"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_2"); |
| statement.close(); |
| connection.close(); |
| |
| // test execution |
| connection = context.createConnection("user_1", "password"); |
| statement = context.createStatement(connection); |
| statement.execute("USE DB_1"); |
| // test user can execute query on TAB_2 |
| ResultSet resultSet = statement.executeQuery("SELECT COUNT(*) FROM TAB_2"); |
| int count = 0; |
| int countRows = 0; |
| |
| while (resultSet.next()) { |
| count = resultSet.getInt(1); |
| countRows++; |
| } |
| assertTrue("Incorrect row count", countRows == 1); |
| assertTrue("Incorrect result", count == 12); |
| |
| // test user can execute query VIEW_1 JOIN TAB_2 |
| resultSet = statement |
| .executeQuery("SELECT COUNT(*) FROM VIEW_1 V1 JOIN TAB_2 T2 ON (V1.B = T2.B)"); |
| count = 0; |
| countRows = 0; |
| |
| while (resultSet.next()) { |
| count = resultSet.getInt(1); |
| countRows++; |
| } |
| assertTrue("Incorrect row count", countRows == 1); |
| assertTrue("Incorrect result", count == 12); |
| |
| // test user can execute query on VIEW_1 |
| resultSet = statement.executeQuery("SELECT COUNT(*) FROM VIEW_1"); |
| count = 0; |
| countRows = 0; |
| |
| while (resultSet.next()) { |
| count = resultSet.getInt(1); |
| countRows++; |
| } |
| assertTrue("Incorrect row count", countRows == 1); |
| assertTrue("Incorrect result", count == 12); |
| |
| // negative test: test user can't execute query TAB_1 JOIN TAB_2 |
| try { |
| statement |
| .executeQuery("SELECT COUNT(*) FROM TAB_1 T1 JOIN TAB_2 T2 ON (T1.B = T2.B)"); |
| Assert.fail("Expected SQL exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| |
| statement.close(); |
| connection.close(); |
| |
| // test cleanup |
| connection = context.createConnection("hive", "hive"); |
| statement = context.createStatement(connection); |
| statement.execute("DROP DATABASE DB_1 CASCADE"); |
| statement.close(); |
| connection.close(); |
| } |
| |
| /* |
| * Admin creates database DB_1, table TAB_1, TAB_2 in DB_1, VIEW_1 on TAB_1 |
| * loads data into TAB_1, TAB_2. Admin grants SELECT on TAB_1, VIEW_1 to |
| * USER_GROUP of which USER_1 is a member. |
| */ |
| @Test |
| public void testTableViewJoin4() throws Exception { |
| File policyFile = context.getPolicyFile(); |
| File dataDir = context.getDataDir(); |
| // copy data file to test dir |
| File dataFile = new File(dataDir, MULTI_TYPE_DATA_FILE_NAME); |
| FileOutputStream to = new FileOutputStream(dataFile); |
| Resources.copy(Resources.getResource(MULTI_TYPE_DATA_FILE_NAME), to); |
| to.close(); |
| // delete existing policy file; create new policy file |
| assertTrue("Could not delete " + policyFile, context.deletePolicyFile()); |
| // groups : role -> group |
| |
| context.append("[groups]"); |
| context.append("admin = all_server"); |
| context.append("user_group = select_tab1, select_view1"); |
| // roles: privileges -> role |
| context.append("[roles]"); |
| context.append("all_server = server=server1"); |
| context.append("select_view1 = server=server1->db=DB_1->table=VIEW_1->action=select"); |
| context.append("select_tab1 = server=server1->db=DB_1->table=TAB_1->action=select"); |
| // users: users -> groups |
| context.append("[users]"); |
| context.append("hive = admin"); |
| context.append("user_1 = user_group"); |
| // setup db objects needed by the test |
| Connection connection = context.createConnection("hive", "hive"); |
| Statement statement = context.createStatement(connection); |
| |
| statement.execute("DROP DATABASE IF EXISTS DB_1 CASCADE"); |
| statement.execute("CREATE DATABASE DB_1"); |
| statement.execute("USE DB_1"); |
| statement.execute("CREATE TABLE TAB_1(B INT, A STRING) " |
| + " row format delimited fields terminated by '|' stored as textfile"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_1"); |
| statement.execute("CREATE VIEW VIEW_1 AS SELECT A, B FROM TAB_1"); |
| statement.execute("CREATE TABLE TAB_2(B INT, A STRING) " |
| + " row format delimited fields terminated by '|' stored as textfile"); |
| statement.execute("LOAD DATA LOCAL INPATH '" + dataFile.getPath() |
| + "' INTO TABLE TAB_2"); |
| statement.close(); |
| connection.close(); |
| |
| // test execution |
| connection = context.createConnection("user_1", "password"); |
| statement = context.createStatement(connection); |
| statement.execute("USE DB_1"); |
| |
| // test user can execute query VIEW_1 JOIN TAB_1 |
| ResultSet resultSet = statement |
| .executeQuery("SELECT COUNT(*) FROM VIEW_1 JOIN TAB_1 ON (VIEW_1.B = TAB_1.B)"); |
| int count = 0; |
| int countRows = 0; |
| |
| while (resultSet.next()) { |
| count = resultSet.getInt(1); |
| countRows++; |
| } |
| assertTrue("Incorrect row count", countRows == 1); |
| assertTrue("Incorrect result", count == 12); |
| |
| // negative test: test user can't execute query TAB_1 JOIN TAB_2 |
| try { |
| statement |
| .executeQuery("SELECT COUNT(*) FROM TAB_1 JOIN TAB_2 ON (TAB_1.B = TAB_2.B)"); |
| Assert.fail("Expected SQL exception"); |
| } catch (SQLException e) { |
| context.verifyAuthzException(e); |
| } |
| |
| statement.close(); |
| connection.close(); |
| |
| // test cleanup |
| connection = context.createConnection("hive", "hive"); |
| statement = context.createStatement(connection); |
| statement.execute("DROP DATABASE DB_1 CASCADE"); |
| statement.close(); |
| connection.close(); |
| } |
| } |