os/persistentdata/persistentstorage/dbms/tdbms/t_dbplatsec2.cpp
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/persistentdata/persistentstorage/dbms/tdbms/t_dbplatsec2.cpp	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,311 @@
     1.4 +// Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies).
     1.5 +// All rights reserved.
     1.6 +// This component and the accompanying materials are made available
     1.7 +// under the terms of "Eclipse Public License v1.0"
     1.8 +// which accompanies this distribution, and is available
     1.9 +// at the URL "http://www.eclipse.org/legal/epl-v10.html".
    1.10 +//
    1.11 +// Initial Contributors:
    1.12 +// Nokia Corporation - initial contribution.
    1.13 +//
    1.14 +// Contributors:
    1.15 +//
    1.16 +// Description:
    1.17 +// DBMS security policy - testing new APIs.
    1.18 +// This test app has "WriteUserData" (UID: WRITE) capability, which allows it to
    1.19 +// write data in some of the tables.
    1.20 +// The UID policy file is 11335579.spd.
    1.21 +// The test uses C:TESTDB.DB secure shared database, which has tables A, B and C, each of them
    1.22 +// with at least one record.
    1.23 +// Please, ensure that t_dbenvcreate test is executed before t_dbplatsec<N>/t_dbplatsecperf tests!
    1.24 +// Please, ensure that t_dbenvdestroy test is executed after t_dbplatsec<N>/t_dbplatsecperf tests!
    1.25 +// 
    1.26 +//
    1.27 +
    1.28 +#include <e32test.h>
    1.29 +#include <d32dbms.h>
    1.30 +#include "t_dbplatsecutl.h"
    1.31 +
    1.32 +const TUid KSecureDbUid = {0x11335579};
    1.33 +_LIT(KSecure,	"SECURE");
    1.34 +_LIT(KDbName,	"C:TestDB.DB");
    1.35 +_LIT(KTblNameA,	"A");
    1.36 +_LIT(KTblNameB,	"B");
    1.37 +_LIT(KTblNameC,	"C");
    1.38 +_LIT(KTblNameCC,"CC");
    1.39 +
    1.40 +static RTest 				TheTest(_L("t_dbplatsec2: DBMS platform security testing - 2"));
    1.41 +static RDbs 				TheDbs;
    1.42 +static RDbNamedDatabase 	TheDb;
    1.43 +static RDbTable 			TheTbl;
    1.44 +static RDbView 				TheView;
    1.45 +
    1.46 +TDBSCUtils 	TheDbscUtils(TheTest, NULL);
    1.47 +
    1.48 +static TColDef const KColumns[]=
    1.49 +	{
    1.50 +	{_S("ID"), EDbColInt32, TDbCol::ENotNull | TDbCol::EAutoIncrement},
    1.51 +	{_S("DATA1"), EDbColInt32, TDbCol::ENotNull},
    1.52 +	{_S("DATA2"), EDbColInt32, TDbCol::ENotNull},
    1.53 +	{0}
    1.54 +	};
    1.55 +
    1.56 +/**
    1.57 +@SYMTestCaseID SYSLIB-DBMS-CT-0012
    1.58 +@SYMTestCaseDesc Database operations test.
    1.59 +				 This test app has "WriteUserData" (UID: WRITE) capability, which allows it to
    1.60 +				 write data in some of the tables. Almost all database calls must fail, the caller
    1.61 +				 cannot satisfy the database's schema security policy.
    1.62 +@SYMTestPriority High
    1.63 +@SYMTestActions  Database calls.
    1.64 +@SYMTestExpectedResults The test must not fail.
    1.65 +@SYMREQ REQ2429
    1.66 +                 DBMS shall provide an API to apply security policies to database tables.
    1.67 +*/
    1.68 +static void DbTestL()
    1.69 +	{
    1.70 +	TheTest.Printf(_L("An attempt to delete the database\n"));
    1.71 +	TInt err = TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDbName);
    1.72 +	TEST2(err, KErrPermissionDenied);
    1.73 +
    1.74 +	TBuf<32> format;
    1.75 +
    1.76 +	TheTest.Printf(_L("An attempt to create the database\n"));
    1.77 +	//The test must fail, because the test app cannot satisfy KSecureDbUid uid, policy S.
    1.78 +	format.Copy(KSecure);
    1.79 +	format.Append(KSecureDbUid.Name());
    1.80 +	err = TheDb.Create(TheDbs, KDbName, format);
    1.81 +	TEST2(err, KErrPermissionDenied);
    1.82 +
    1.83 +	TheTest.Printf(_L("Open database\n"));
    1.84 +	format.Copy(KSecure);
    1.85 +	format.Append(KSecureDbUid.Name());
    1.86 +	err = TheDb.Open(TheDbs, KDbName, format);
    1.87 +	TEST2(err, KErrNone);
    1.88 +
    1.89 +	TheTest.Printf(_L("An attempt to create a table\n"));
    1.90 +	//The test must fail, because the test app cannot satisfy KSecureDbUid uid, policy S.
    1.91 +	CDbColSet* colset = TDBSCUtils::CreateColSetLC(KColumns);
    1.92 +	err = TheDb.CreateTable(KTblNameCC, *colset);
    1.93 +	TEST2(err, KErrPermissionDenied);
    1.94 +
    1.95 +	CleanupStack::PopAndDestroy(colset);
    1.96 +
    1.97 +	TheTest.Printf(_L("An attempt to create a table using SQL\n"));
    1.98 +	//The test must fail, because the test app cannot satisfy KSecureDbUid uid, policy S.
    1.99 +	err = TheDb.Execute(_L("create table AAAA (id counter)"));
   1.100 +	TEST2(err, KErrPermissionDenied);
   1.101 +
   1.102 +	TheTest.Printf(_L("An attempt to alter a table using SQL\n"));
   1.103 +	//The test must fail, because the test app cannot satisfy KSecureDbUid uid, policy S.
   1.104 +	err = TheDb.Execute(_L("alter table A add DATA11 CHAR(20)"));
   1.105 +	TEST2(err, KErrPermissionDenied);
   1.106 +
   1.107 +	_LIT(KColName, "DATA2");
   1.108 +	TheTest.Printf(_L("An attempt to create an index\n"));
   1.109 +	//The test must fail, because the test app cannot satisfy KSecureDbUid uid, policy S.
   1.110 +	CDbKey* key = TDBSCUtils::CreateKeyLC(KColName);
   1.111 +	err = TheDb.CreateIndex(KColName, KTblNameA, *key);
   1.112 +	TEST2(err, KErrPermissionDenied);
   1.113 +	CleanupStack::PopAndDestroy(key);
   1.114 +
   1.115 +	TheTest.Printf(_L("An attempt to drop an index\n"));
   1.116 +	//The test must fail, because the test app cannot satisfy KSecureDbUid uid, policy S.
   1.117 +	err = TheDb.DropIndex(KColName, KTblNameA);
   1.118 +	TEST2(err, KErrPermissionDenied);
   1.119 +	}
   1.120 +
   1.121 +/**
   1.122 +@SYMTestCaseID SYSLIB-DBMS-CT-0013
   1.123 +@SYMTestCaseDesc Open table test.
   1.124 +				 This test app has "WriteUserData" (UID: WRITE) capability, which allows it to
   1.125 +				 write data in some of the tables. Some of the calls must fail because the caller has no
   1.126 +				 enough rights for the requested operation (for example - the attempts to open some
   1.127 +				 of the tables in ready-only mode)
   1.128 +@SYMTestPriority High
   1.129 +@SYMTestActions  RDBTable::Open() called fon different tables from the test database.
   1.130 +@SYMTestExpectedResults The test must not fail.
   1.131 +@SYMREQ REQ2429
   1.132 +                 DBMS shall provide an API to apply security policies to database tables.
   1.133 +*/
   1.134 +static void TblOpenL()
   1.135 +	{
   1.136 +	TheTest.Printf(_L("An attempt to open table A\n"));
   1.137 +	//The test must pass, because the test app can satisfy table A, policy W.
   1.138 +	TInt err = TheTbl.Open(TheDb, KTblNameA, RDbRowSet::EUpdatable);
   1.139 +	TEST2(err, KErrNone);
   1.140 +	TheTbl.Close();
   1.141 +	//The test must pass, because the test app can satisfy table A, policy W.
   1.142 +	err = TheTbl.Open(TheDb, KTblNameA, RDbRowSet::EInsertOnly);
   1.143 +	TEST2(err, KErrNone);
   1.144 +	TheTbl.Close();
   1.145 +	//The test must fail, because the test app cannot satisfy table A, policy R.
   1.146 +	err = TheTbl.Open(TheDb, KTblNameA, RDbRowSet::EReadOnly);
   1.147 +	TEST2(err, KErrPermissionDenied);
   1.148 +
   1.149 +	TheTest.Printf(_L("An attempt to open table B\n"));
   1.150 +    if(PlatSec::ConfigSetting(PlatSec::EPlatSecEnforcement) &&
   1.151 +       PlatSec::IsCapabilityEnforced(ECapabilityWriteDeviceData))
   1.152 +        {
   1.153 +	    //The test must fail, because the test app cannot satisfy table B, policy W.
   1.154 +	    err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EUpdatable);
   1.155 +	    TEST2(err, KErrPermissionDenied);
   1.156 +	    //The test must fail, because the test app cannot satisfy table B, policy W.
   1.157 +	    err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EInsertOnly);
   1.158 +	    TEST2(err, KErrPermissionDenied);
   1.159 +        }
   1.160 +	//The test must pass, because the test app can satisfy table B, policy R.
   1.161 +	err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EReadOnly);
   1.162 +	TEST2(err, KErrNone);
   1.163 +	TheTbl.Close();
   1.164 +
   1.165 +	TheTest.Printf(_L("An attempt to open table C\n"));
   1.166 +	//The test must pass, because the test app can satisfy table C, policy W.
   1.167 +	err = TheTbl.Open(TheDb, KTblNameC, RDbRowSet::EUpdatable);
   1.168 +	TEST2(err, KErrNone);
   1.169 +	TheTbl.Close();
   1.170 +	//The test must pass, because the test app can satisfy table C, policy W.
   1.171 +	err = TheTbl.Open(TheDb, KTblNameC, RDbRowSet::EInsertOnly);
   1.172 +	TEST2(err, KErrNone);
   1.173 +	TheTbl.Close();
   1.174 +	//The test must pass, because the test app can satisfy table C, policy R.
   1.175 +	err = TheTbl.Open(TheDb, KTblNameC, RDbRowSet::EReadOnly);
   1.176 +	TEST2(err, KErrNone);
   1.177 +	TheTbl.Close();
   1.178 +	}
   1.179 +
   1.180 +/**
   1.181 +@SYMTestCaseID SYSLIB-DBMS-CT-0014
   1.182 +@SYMTestCaseDesc R/W operations at a table level.
   1.183 +				 This test app has "WriteUserData" (UID: WRITE) capability, which allows it to
   1.184 +				 write data in some of the tables. Some of the calls must fail because the caller has no
   1.185 +				 enough rights for the requested operation.
   1.186 +@SYMTestPriority High
   1.187 +@SYMTestActions  R/W operations at a table level.
   1.188 +@SYMTestExpectedResults The test must not fail.
   1.189 +@SYMREQ REQ2429
   1.190 +                 DBMS shall provide an API to apply security policies to database tables.
   1.191 +*/
   1.192 +static void TblRWL()
   1.193 +	{
   1.194 +	TheTest.Printf(_L("Table A - Write\n"));
   1.195 +	TInt err = TheTbl.Open(TheDb, KTblNameA);
   1.196 +	TEST2(err, KErrNone);
   1.197 +	//The test must pass, because the test app can satisfy table A, policy W.
   1.198 +	TRAP(err, TheTbl.InsertL());
   1.199 +	TEST2(err, KErrNone);
   1.200 +	TheTbl.SetColL(2, 100);
   1.201 +	TheTbl.SetColL(3, 200);
   1.202 +	TRAP(err, TheTbl.PutL());
   1.203 +	TEST2(err, KErrNone);
   1.204 +	TInt cnt = TheDb.Execute(_L("UPDATE A SET DATA1 = 400 WHERE ID < 10"));
   1.205 +	TEST(cnt > 0);
   1.206 +
   1.207 +	TheTest.Printf(_L("Table A - Read\n"));
   1.208 +	//The test must fail, because the test app cannot satisfy table A, policy R.
   1.209 +	TBool res = EFalse;
   1.210 +	TRAP(err, res = TheTbl.FirstL());
   1.211 +	TEST2(err, KErrPermissionDenied);
   1.212 +	err = TheView.Prepare(TheDb, TDbQuery(_L("SELECT * FROM A")));
   1.213 +	TEST2(err, KErrPermissionDenied);
   1.214 +	TheView.Close();
   1.215 +
   1.216 +	TheTbl.Close();
   1.217 +
   1.218 +	TheTest.Printf(_L("Table B - Write\n"));
   1.219 +	err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EReadOnly);
   1.220 +	TEST2(err, KErrNone);
   1.221 +	if(PlatSec::ConfigSetting(PlatSec::EPlatSecEnforcement) &&
   1.222 +	   PlatSec::IsCapabilityEnforced(ECapabilityWriteDeviceData))
   1.223 +		{
   1.224 +		//The test must fail, because the test app cannot satisfy table B, policy W.
   1.225 +		TRAP(err, TheTbl.InsertL());
   1.226 +		TEST2(err, KErrPermissionDenied);
   1.227 +		err = TheDb.Execute(_L("INSERT INTO B (DATA2) VALUES (45)"));
   1.228 +		TEST2(err, KErrPermissionDenied);
   1.229 +		}
   1.230 +
   1.231 +	TheTest.Printf(_L("Table B - Read\n"));
   1.232 +	//The test must pass, because table B has no R policy.
   1.233 +	TRAP(err, res = TheTbl.FirstL());
   1.234 +	TEST2(err, KErrNone);
   1.235 +	TEST(res);
   1.236 +	cnt = TheTbl.CountL();
   1.237 +	TEST(cnt > 0);
   1.238 +	err = TheView.Prepare(TheDb, TDbQuery(_L("SELECT * FROM B")));
   1.239 +	TEST2(err, KErrNone);
   1.240 +	cnt = TheView.CountL();
   1.241 +	TEST(cnt > 0);
   1.242 +	TheView.Close();
   1.243 +
   1.244 +	TheTbl.Close();
   1.245 +
   1.246 +	TheTest.Printf(_L("Table C - Write\n"));
   1.247 +	err = TheTbl.Open(TheDb, KTblNameC);
   1.248 +	TEST2(err, KErrNone);
   1.249 +	//The test must pass, because the test app can satisfy table C, policy W.
   1.250 +	TRAP(err, TheTbl.InsertL());
   1.251 +	TEST2(err, KErrNone);
   1.252 +	TheTbl.SetColL(2, 100);
   1.253 +	TheTbl.SetColL(3, 200);
   1.254 +	TRAP(err, TheTbl.PutL());
   1.255 +	TEST2(err, KErrNone);
   1.256 +	cnt = TheDb.Execute(_L("UPDATE C SET DATA1 = 400 WHERE ID < 10"));
   1.257 +	TEST(cnt > 0);
   1.258 +
   1.259 +	TheTest.Printf(_L("Table C - Read\n"));
   1.260 +	//The test must pass, because table C has no R policy.
   1.261 +	TRAP(err, res = TheTbl.FirstL());
   1.262 +	TEST2(err, KErrNone);
   1.263 +	TEST(res);
   1.264 +	cnt = TheTbl.CountL();
   1.265 +	TEST(cnt > 0);
   1.266 +	err = TheView.Prepare(TheDb, TDbQuery(_L("SELECT * FROM C")));
   1.267 +	TEST2(err, KErrNone);
   1.268 +	cnt = TheView.CountL();
   1.269 +	TEST(cnt > 0);
   1.270 +	TheView.Close();
   1.271 +
   1.272 +	TheTbl.Close();
   1.273 +	}
   1.274 +
   1.275 +static void DoRunL()
   1.276 +	{
   1.277 +	TheTest.Start(_L("An app with \"UID:WRITE\" capabilities set"));
   1.278 +
   1.279 +	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0012 Database tests "));
   1.280 +	::DbTestL();
   1.281 +
   1.282 +	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0013 Open table tests "));
   1.283 +	::TblOpenL();
   1.284 +
   1.285 +	TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0014 Table R/W tests "));
   1.286 +	::TblRWL();
   1.287 +	}
   1.288 +
   1.289 +TInt E32Main()
   1.290 +    {
   1.291 +	__UHEAP_MARK;
   1.292 +	CTrapCleanup* tc = CTrapCleanup::New();
   1.293 +	TEST(tc != NULL);
   1.294 +
   1.295 +	TInt err = TheDbs.Connect();
   1.296 +	TEST2(err, KErrNone);
   1.297 +
   1.298 +	TRAP(err, ::DoRunL());
   1.299 +	TEST2(err, KErrNone);
   1.300 +
   1.301 +	TheView.Close();
   1.302 +	TheTbl.Close();
   1.303 +	TheDb.Close();
   1.304 +	TheDbs.Close();
   1.305 +
   1.306 +	TheTest.End();
   1.307 +	TheTest.Close();
   1.308 +
   1.309 +	delete tc;
   1.310 +
   1.311 +	__UHEAP_MARKEND;
   1.312 +	User::Heap().Check();
   1.313 +	return KErrNone;
   1.314 +    }