os/persistentdata/persistentstorage/dbms/tdbms/t_dbplatsec1.cpp
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
// Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     2
// All rights reserved.
sl@0
     3
// This component and the accompanying materials are made available
sl@0
     4
// under the terms of "Eclipse Public License v1.0"
sl@0
     5
// which accompanies this distribution, and is available
sl@0
     6
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     7
//
sl@0
     8
// Initial Contributors:
sl@0
     9
// Nokia Corporation - initial contribution.
sl@0
    10
//
sl@0
    11
// Contributors:
sl@0
    12
//
sl@0
    13
// Description:
sl@0
    14
// DBMS security policy - testing new APIs.
sl@0
    15
// This test app has "NetworkServices" (SCHEMA) capability, which allows it to
sl@0
    16
// modify the DBMS structure but not to write any data in the tables.
sl@0
    17
// The UID policy file is 11335579.spd.
sl@0
    18
// Please, ensure that t_dbenvcreate test is executed before t_dbplatsec<N>/t_dbplatsecperf tests!
sl@0
    19
// Please, ensure that t_dbenvdestroy test is executed after t_dbplatsec<N>/t_dbplatsecperf tests!
sl@0
    20
// 
sl@0
    21
//
sl@0
    22
sl@0
    23
#include <e32test.h>
sl@0
    24
#include <d32dbms.h>
sl@0
    25
#include "t_dbplatsecutl.h"
sl@0
    26
sl@0
    27
const TUid KSecureDbUid = {0x11335579};
sl@0
    28
const TUid KProtSecureDbUid = {0x11335578};
sl@0
    29
_LIT(KSecure,	"SECURE");
sl@0
    30
_LIT(KDbName,	"C:TestDB2.dB");
sl@0
    31
_LIT(KTblNameA,	"A");
sl@0
    32
_LIT(KTblNameB,	"B");
sl@0
    33
_LIT(KTblNameC,	"C");
sl@0
    34
sl@0
    35
static RTest 				TheTest(_L("t_dbplatsec1: DBMS platform security testing - 1"));
sl@0
    36
static RDbs 				TheDbs;
sl@0
    37
static RDbNamedDatabase 	TheDb;
sl@0
    38
static RDbTable 			TheTbl;
sl@0
    39
static RDbView 				TheView;
sl@0
    40
sl@0
    41
static void CleanupTest()
sl@0
    42
	{
sl@0
    43
	TheView.Close();
sl@0
    44
	TheTbl.Close();
sl@0
    45
	TheDb.Close();
sl@0
    46
	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDbName);
sl@0
    47
	TheDbs.Close();
sl@0
    48
	}
sl@0
    49
sl@0
    50
TDBSCUtils 	TheDbscUtils(TheTest, &CleanupTest);
sl@0
    51
sl@0
    52
static TColDef const KColumns[]=
sl@0
    53
	{
sl@0
    54
	{_S("ID"), EDbColInt32, TDbCol::ENotNull | TDbCol::EAutoIncrement},
sl@0
    55
	{_S("DATA1"), EDbColInt32, TDbCol::ENotNull},
sl@0
    56
	{_S("DATA2"), EDbColInt32, TDbCol::ENotNull},
sl@0
    57
	{0}
sl@0
    58
	};
sl@0
    59
sl@0
    60
/**
sl@0
    61
@SYMTestCaseID SYSLIB-DBMS-CT-0008
sl@0
    62
@SYMTestCaseDesc Database tests. Some of the calls must fail because the caller has no enough rights
sl@0
    63
                 for the requested operation.
sl@0
    64
@SYMTestPriority High
sl@0
    65
@SYMTestActions  RDbNamedDatabase::Open()/RDbNamedDatabase::DatabaseNamesL()/RDbNamedDatabase::Create().
sl@0
    66
@SYMTestExpectedResults The test must not fail.
sl@0
    67
@SYMREQ REQ2429
sl@0
    68
                 DBMS shall provide an API to apply security policies to database tables.
sl@0
    69
*/
sl@0
    70
static void DbTestL()
sl@0
    71
	{
sl@0
    72
	TBuf<32> format;
sl@0
    73
sl@0
    74
	TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDbName);
sl@0
    75
	TheTest.Printf(_L("Create database\n"));
sl@0
    76
	//The test must pass, because the test app has "SCHEMA" capability
sl@0
    77
	format.Copy(KSecure);
sl@0
    78
	format.Append(KSecureDbUid.Name());
sl@0
    79
	TInt err = TheDb.Create(TheDbs, KDbName, format);
sl@0
    80
	TEST2(err, KErrNone);
sl@0
    81
sl@0
    82
	//The test must pass, because "DatabaseNamesL" is a DBMS operation available for everyone.
sl@0
    83
	TheTest.Printf(_L("Database list\n"));
sl@0
    84
	CDbDatabaseNames* dbNames = TheDbs.DatabaseNamesL(EDriveC, KSecureDbUid);
sl@0
    85
	TEST(dbNames->Count() > 0);
sl@0
    86
	TBool casePreserved = EFalse;
sl@0
    87
	for(TInt i=0;i<dbNames->Count();++i)
sl@0
    88
		{
sl@0
    89
		const TDesC& dbName = (*dbNames)[i];
sl@0
    90
		RDebug::Print(_L("--Database: %S\n"), &dbName);
sl@0
    91
		TBuf<128> dbName2;
sl@0
    92
		dbName2.Append(TChar('A' + EDriveC));
sl@0
    93
		dbName2.Append(TChar(':'));
sl@0
    94
		dbName2.Append(dbName);
sl@0
    95
		if(dbName2 == KDbName())
sl@0
    96
			{
sl@0
    97
			casePreserved = ETrue;
sl@0
    98
			}
sl@0
    99
		}
sl@0
   100
	//if casePreserved is non-zero that means the DBMS server does not change the database names to
sl@0
   101
	//upper or lower case - that's what we want to check
sl@0
   102
	TEST(casePreserved);
sl@0
   103
	delete dbNames;
sl@0
   104
sl@0
   105
	TheDb.Close();
sl@0
   106
sl@0
   107
	TheTest.Printf(_L("An attempt to create database - existing, but protected UID\n"));
sl@0
   108
	//The test must fail, because the test app does not have capabilities to satisfy
sl@0
   109
	//KProtSecureDbUid "SCHEMA" policy.
sl@0
   110
	format.Copy(KSecure);
sl@0
   111
	format.Append(KProtSecureDbUid.Name());
sl@0
   112
	err = TheDb.Create(TheDbs, KDbName, format);
sl@0
   113
	TEST2(err, KErrPermissionDenied);
sl@0
   114
sl@0
   115
	//The test must pass, because the test app has "SCHEMA" capability (it must have capabilities,
sl@0
   116
	//satisfying at least one of the UID's R/W/S policies)
sl@0
   117
	TheTest.Printf(_L("Open database\n"));
sl@0
   118
	format.Copy(KSecure);
sl@0
   119
	format.Append(KSecureDbUid.Name());
sl@0
   120
	err = TheDb.Open(TheDbs, KDbName, format);
sl@0
   121
	TEST2(err, KErrNone);
sl@0
   122
	}
sl@0
   123
sl@0
   124
/**
sl@0
   125
@SYMTestCaseID SYSLIB-DBMS-CT-0009
sl@0
   126
@SYMTestCaseDesc Opening table test. The caller has a set of capabilities which satisfy database's
sl@0
   127
                 schema security policy only. The test checks that the capapbility checking
sl@0
   128
				 on the DBMS server side works properly. Some of the initiated open table
sl@0
   129
				 operations won't executed and the returned error will be KErrPermisssionDenied.
sl@0
   130
@SYMTestPriority High
sl@0
   131
@SYMTestActions  Attempts to execute RDbTable::Open() on different tables from the test database.
sl@0
   132
@SYMTestExpectedResults The test must not fail.
sl@0
   133
@SYMREQ REQ2429
sl@0
   134
                 DBMS shall provide an API to apply security policies to database tables.
sl@0
   135
*/
sl@0
   136
static void TblOpenL()
sl@0
   137
	{
sl@0
   138
	TheTest.Printf(_L("Create tables\n"));
sl@0
   139
	//The test must pass, because the test app has "SCHEMA" capability
sl@0
   140
	CDbColSet* colset = TDBSCUtils::CreateColSetLC(KColumns);
sl@0
   141
	TInt err = TheDb.CreateTable(KTblNameA, *colset);//R: PowerMgmt, W: WriteUserData
sl@0
   142
	TEST2(err, KErrNone);
sl@0
   143
	err = TheDb.CreateTable(KTblNameB, *colset);//R: None, W: WriteUserData WriteDeviceData
sl@0
   144
	TEST2(err, KErrNone);
sl@0
   145
	err = TheDb.CreateTable(KTblNameC, *colset);//R: None, W: WriteUserData
sl@0
   146
	TEST2(err, KErrNone);
sl@0
   147
	CleanupStack::PopAndDestroy(colset);
sl@0
   148
sl@0
   149
	TheTest.Printf(_L("An attempt to open table A\n"));
sl@0
   150
	//The test must fail, because the test app has no capabilities to satisfy
sl@0
   151
	//R/W policies of table A
sl@0
   152
	err = TheTbl.Open(TheDb, KTblNameA);
sl@0
   153
	TEST2(err, KErrPermissionDenied);
sl@0
   154
	err = TheTbl.Open(TheDb, KTblNameA, RDbRowSet::EUpdatable);
sl@0
   155
	TEST2(err, KErrPermissionDenied);
sl@0
   156
	err = TheTbl.Open(TheDb, KTblNameA, RDbRowSet::EReadOnly);
sl@0
   157
	TEST2(err, KErrPermissionDenied);
sl@0
   158
	err = TheTbl.Open(TheDb, KTblNameA, RDbRowSet::EInsertOnly);
sl@0
   159
	TEST2(err, KErrPermissionDenied);
sl@0
   160
sl@0
   161
	TheTest.Printf(_L("An attempt to open table B\n"));
sl@0
   162
	//Open table B in insert/update mode - the test must fail, because the test app has no
sl@0
   163
	//capabilities to satisfy table B, policy W.
sl@0
   164
	//Open table B in read-only mode - the test must pass, because table B has no R policy.
sl@0
   165
	err = TheTbl.Open(TheDb, KTblNameB);
sl@0
   166
	TEST2(err, KErrPermissionDenied);
sl@0
   167
	err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EUpdatable);
sl@0
   168
	TEST2(err, KErrPermissionDenied);
sl@0
   169
	err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EInsertOnly);
sl@0
   170
	TEST2(err, KErrPermissionDenied);
sl@0
   171
	err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EReadOnly);
sl@0
   172
	TEST2(err, KErrNone);
sl@0
   173
	TheTbl.Close();
sl@0
   174
sl@0
   175
	TheTest.Printf(_L("An attempt to open table C\n"));
sl@0
   176
	//Open table C in insert/update mode - the test must fail, because the test app has no
sl@0
   177
	//capabilities to satisfy table C, policy W.
sl@0
   178
	//Open table C in read-only mode - the test must pass, because table C has no R policy.
sl@0
   179
	err = TheTbl.Open(TheDb, KTblNameC);
sl@0
   180
	TEST2(err, KErrPermissionDenied);
sl@0
   181
	err = TheTbl.Open(TheDb, KTblNameC, RDbRowSet::EUpdatable);
sl@0
   182
	TEST2(err, KErrPermissionDenied);
sl@0
   183
	err = TheTbl.Open(TheDb, KTblNameC, RDbRowSet::EInsertOnly);
sl@0
   184
	TEST2(err, KErrPermissionDenied);
sl@0
   185
	err = TheTbl.Open(TheDb, KTblNameC, RDbRowSet::EReadOnly);
sl@0
   186
	TEST2(err, KErrNone);
sl@0
   187
	TheTbl.Close();
sl@0
   188
	}
sl@0
   189
sl@0
   190
/**
sl@0
   191
@SYMTestCaseID SYSLIB-DBMS-CT-0010
sl@0
   192
@SYMTestCaseDesc Table R/w operations. The caller has a set of capabilities which satisfy database's
sl@0
   193
                 schema security policy only. The test checks that the capapbility checking
sl@0
   194
				 on the DBMS server side works properly. Some of the R/W table operations won't be
sl@0
   195
				 executed and the returned error will be KErrPermisssionDenied.
sl@0
   196
@SYMTestPriority High
sl@0
   197
@SYMTestActions  Attempts to execute RDbTable::Insert()/RDbTable::Update()/RDbTable::FirstL()
sl@0
   198
                 on different tables from the test database.
sl@0
   199
@SYMTestExpectedResults The test must not fail.
sl@0
   200
@SYMREQ REQ2429
sl@0
   201
                 DBMS shall provide an API to apply security policies to database tables.
sl@0
   202
*/
sl@0
   203
static void TblRWL()
sl@0
   204
	{
sl@0
   205
	TheTest.Printf(_L("An attempt to write in table B\n"));
sl@0
   206
	TInt err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EReadOnly);
sl@0
   207
	TEST2(err, KErrNone);
sl@0
   208
	//"Write table B" test must fail, because the test app has no capabilities
sl@0
   209
	//to satisfy table B, policy W.
sl@0
   210
	TRAP(err, TheTbl.InsertL());
sl@0
   211
	TEST2(err, KErrPermissionDenied);
sl@0
   212
	TRAP(err, TheTbl.UpdateL());
sl@0
   213
	TEST2(err, KErrPermissionDenied);
sl@0
   214
sl@0
   215
	TheTest.Printf(_L("An attempt to read from table B\n"));
sl@0
   216
	//"Read table B" test must pass, because table B has no R policy
sl@0
   217
	TBool res = TheTbl.FirstL();
sl@0
   218
	TEST(!res);
sl@0
   219
sl@0
   220
	TheTbl.Close();
sl@0
   221
sl@0
   222
	TheTest.Printf(_L("An attempt to write in table C\n"));
sl@0
   223
	//"Write table C" test must fail, because the test app has no capabilities
sl@0
   224
	//to satisfy table C, policy W.
sl@0
   225
	err = TheTbl.Open(TheDb, KTblNameC, RDbRowSet::EReadOnly);
sl@0
   226
	TEST2(err, KErrNone);
sl@0
   227
	TRAP(err, TheTbl.InsertL());
sl@0
   228
	TEST2(err, KErrPermissionDenied);
sl@0
   229
	TRAP(err, TheTbl.UpdateL());
sl@0
   230
	TEST2(err, KErrPermissionDenied);
sl@0
   231
sl@0
   232
	TheTest.Printf(_L("An attempt to read from table C\n"));
sl@0
   233
	//"Read table C" test must pass, because table C has no R policy
sl@0
   234
	res = TheTbl.FirstL();
sl@0
   235
	TEST(!res);
sl@0
   236
sl@0
   237
	TheTbl.Close();
sl@0
   238
	}
sl@0
   239
sl@0
   240
/**
sl@0
   241
@SYMTestCaseID SYSLIB-DBMS-CT-0011
sl@0
   242
@SYMTestCaseDesc SQL tests. The caller has a set of capabilities which satisfy database's
sl@0
   243
                 schema security policy only. The test checks that the capapbility checking
sl@0
   244
				 on the DBMS server side works properly. Some of the SQL statements won't be
sl@0
   245
				 executed and the returned error will be KErrPermisssionDenied.
sl@0
   246
@SYMTestPriority High
sl@0
   247
@SYMTestActions  Attempts to execute various INSERT/UPDATE/SELECT SQL statements.
sl@0
   248
@SYMTestExpectedResults The test must not fail.
sl@0
   249
@SYMREQ REQ2429
sl@0
   250
                 DBMS shall provide an API to apply security policies to database tables.
sl@0
   251
*/
sl@0
   252
static void TblSqlL()
sl@0
   253
	{
sl@0
   254
	TheTest.Printf(_L("SELECT SQL\n"));
sl@0
   255
	//The test must fail, because the test app cannot satisfy table A, policy R.
sl@0
   256
	TInt err = TheView.Prepare(TheDb, TDbQuery(_L("SELECT * FROM A")));
sl@0
   257
	TEST2(err, KErrPermissionDenied);
sl@0
   258
	//The test must pass, because table B has no R policy.
sl@0
   259
	err = TheView.Prepare(TheDb, TDbQuery(_L("SELECT * FROM B")));
sl@0
   260
	TEST2(err, KErrNone);
sl@0
   261
	TheView.Close();
sl@0
   262
	//The test must pass, because table C has no R policy.
sl@0
   263
	err = TheView.Prepare(TheDb, TDbQuery(_L("SELECT * FROM C")));
sl@0
   264
	TEST2(err, KErrNone);
sl@0
   265
	TheView.Close();
sl@0
   266
sl@0
   267
	TheTest.Printf(_L("INSERT/UPDATE SQL\n"));
sl@0
   268
	//The test must fail, because the test app cannot satisfy table A, policy W.
sl@0
   269
	err = TheDb.Execute(_L("INSERT INTO A (DATA2) VALUES(45)"));
sl@0
   270
	TEST2(err, KErrPermissionDenied);
sl@0
   271
	//The test must fail, because the test app cannot satisfy table B, policy W.
sl@0
   272
	err = TheDb.Execute(_L("INSERT INTO B (DATA2) VALUES(45)"));
sl@0
   273
	TEST2(err, KErrPermissionDenied);
sl@0
   274
	//The test must fail, because the test app cannot satisfy table C, policy W.
sl@0
   275
	err = TheDb.Execute(_L("INSERT INTO C (DATA2) VALUES(45)"));
sl@0
   276
	TEST2(err, KErrPermissionDenied);
sl@0
   277
sl@0
   278
	//The test must fail, because the test app cannot satisfy table A, policy W.
sl@0
   279
	err = TheDb.Execute(_L("UPDATE A SET DATA2=56 WHERE ID = 0"));
sl@0
   280
	TEST2(err, KErrPermissionDenied);
sl@0
   281
	//The test must fail, because the test app cannot satisfy table B, policy W.
sl@0
   282
	err = TheDb.Execute(_L("UPDATE B SET DATA2=56 WHERE ID = 0"));
sl@0
   283
	TEST2(err, KErrPermissionDenied);
sl@0
   284
	//The test must fail, because the test app cannot satisfy table C, policy W.
sl@0
   285
	err = TheDb.Execute(_L("UPDATE C SET DATA2=56 WHERE ID = 0"));
sl@0
   286
	TEST2(err, KErrPermissionDenied);
sl@0
   287
	}
sl@0
   288
sl@0
   289
static void DoRunL()
sl@0
   290
	{
sl@0
   291
	TheTest.Start(_L("An app with \"SCHEMA\" capabilities set"));
sl@0
   292
sl@0
   293
	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0008 Database test "));
sl@0
   294
	::DbTestL();
sl@0
   295
sl@0
   296
	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0009 Open table test "));
sl@0
   297
	::TblOpenL();
sl@0
   298
sl@0
   299
	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0010 Read/Write table test "));
sl@0
   300
	::TblRWL();
sl@0
   301
sl@0
   302
	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0011 SQL table test "));
sl@0
   303
	::TblSqlL();
sl@0
   304
	}
sl@0
   305
sl@0
   306
TInt E32Main()
sl@0
   307
    {
sl@0
   308
	__UHEAP_MARK;
sl@0
   309
	CTrapCleanup* tc = CTrapCleanup::New();
sl@0
   310
	TEST(tc != NULL);
sl@0
   311
sl@0
   312
	TInt err = TheDbs.Connect();
sl@0
   313
	TEST2(err, KErrNone);
sl@0
   314
sl@0
   315
	TRAP(err, ::DoRunL());
sl@0
   316
	TEST2(err, KErrNone);
sl@0
   317
sl@0
   318
	::CleanupTest();
sl@0
   319
sl@0
   320
	TheTest.End();
sl@0
   321
	TheTest.Close();
sl@0
   322
sl@0
   323
	delete tc;
sl@0
   324
sl@0
   325
	__UHEAP_MARKEND;
sl@0
   326
	User::Heap().Check();
sl@0
   327
	return KErrNone;
sl@0
   328
    }