Update contrib.
1 // Copyright (c) 2006-2009 Nokia Corporation and/or its subsidiary(-ies).
2 // All rights reserved.
3 // This component and the accompanying materials are made available
4 // under the terms of "Eclipse Public License v1.0"
5 // which accompanies this distribution, and is available
6 // at the URL "http://www.eclipse.org/legal/epl-v10.html".
8 // Initial Contributors:
9 // Nokia Corporation - initial contribution.
20 #define __SQLSRV_STRINGS__
21 #include "SqlSrvStrings.h"
23 ///////////////////////////////////////////////////////////////////////////////////////////////////////////////////
27 TParse TheFileNameParse;
28 RTest TheTest(_L("t_sqlauthorizer test"));
30 const TSecurityPolicy KPolicy1(ECapabilityReadUserData, ECapabilityNetworkControl, ECapabilityWriteUserData);
31 const TSecurityPolicy KPolicy2(ECapabilityReadUserData);
33 _LIT8(KPragma , "PRAGMA %S.%S\x0");
34 _LIT8(KPragmaWithParam, "PRAGMA %S.%S%S\x0");
36 _LIT(KPublicDir, "C:\\test\\");
37 _LIT(KPrivateDir, "C:\\private\\21212129\\");
39 _LIT(KPublicDbName, "C:\\test\\t_sqlauthorizer.db");
40 _LIT(KSecureDbName, "C:[21212129]t_sqlauthorizer.db");
41 _LIT(KPrivateDbName, "C:\\private\\21212129\\t_sqlauthorizer.db");
42 _LIT(KAttachDb, "AttachedDB");
44 _LIT(KCreateTable1, "CREATE TABLE A(Id INTEGER,Name TEXT)");
45 _LIT(KCreateTable2, "CREATE TABLE B(Id INTEGER,Address TEXT, Num INTEGER, FOREIGN KEY (Address) REFERENCES A(id))");
46 _LIT(KCreateIndex, "CREATE INDEX Index1 ON B (Num)");
47 _LIT(KInsertTable, "INSERT INTO A VALUES(1, 'AAA')");
49 TBuf8<KMaxFileName + 64> TheSql;
50 const TInt KNumPragma = 34;
52 //////////////////////////////////////////// Input List ///////////////////////////////////////////////
55 const TPtrC8 iPragmaName;
56 const TPtrC8 iReadParam;
57 const TPtrC8 iWriteParam;
60 const TInputList KInputList [KNumPragma] =
62 ////////////////////////////////////////////////////////////////////////////////////////////////
63 // Pragma Name |Read Parameter |Write Parameter |Pragma Command
64 ////////////////////////////////////////////////////////////////////////////////////////////////
65 {KAutoVacuum(), KNullDesC8(), _L8(" = 0")}, //auto_vacuum
66 {KCacheSize(), KNullDesC8(), _L8(" = 32")}, //cache_size
67 {KCaseSensitiveLike(), KNullDesC8(), _L8(" = 0")}, //case_sensitive_like
68 {KCountChanges(), KNullDesC8(), _L8(" = 1")}, //count_changes
69 {KDefaultCacheSize(), KNullDesC8(), _L8(" = 32")}, //DefaultAccess_cache_size
70 {KEmptyResultCallbacks(), KNullDesC8(), _L8(" = 0")}, //empty_result_callbacks
71 {KEncoding(), KNullDesC8(), _L8(" = \"UTF-8\"")}, //encoding
72 {KFullColumnNames(), KNullDesC8(), _L8(" = 0")}, //full_column_names
73 {KFullfsync(), KNullDesC8(), _L8(" = 1")}, //fullfsync
74 {KIncrementalVacuum(), KNullDesC8(), _L8(" = 0")}, //incremental_vacuum
75 {KJournalMode(), KNullDesC8(), _L8(" = DELETE")}, //journal_mode
76 {KJournalSizeLimit(), KNullDesC8(), _L8(" = 1000000")}, //journal_size_limit
77 {KLegacyFileFormat(), KNullDesC8(), _L8(" = ON")}, //legacy_file_format
78 {KLockingMode(), KNullDesC8(), _L8(" = Normal")}, //locking_mode
79 {KPageSize(), KNullDesC8(), _L8(" = 2048")}, //page_size
80 {KMaxPageCount(), KNullDesC8(), _L8(" = 32")}, //max_page_count
81 {KReadUncommitted(), KNullDesC8(), _L8(" = 1")}, //read_uncommitted
82 {KShortColumnNames(), KNullDesC8(), _L8(" = 0")}, //short_column_names
83 {KSynchronousFlag(), KNullDesC8(), _L8(" = NORMAL")}, //synchronous
84 {KTempStore(), KNullDesC8(), _L8(" = MEMORY")}, //temp_store
85 {KTempStoreDirectory(), KNullDesC8(), _L8(" = TEMP")}, //temp_store_directory
86 {KDatabaseList(), KNullDesC8(), KNullDesC8()}, //database_list
87 {KForeignKeyList(), _L8("(B)"), KNullDesC8()}, //foreign_key_list
88 {KFreelistCount(), KNullDesC8(), KNullDesC8()}, //freelist_count
89 {KIndexInfo(), _L8("(Index1)"), KNullDesC8()}, //index_info
90 {KIndexIist(), _L8("(B)"), KNullDesC8()}, //index_list
91 {KPageCount(), KNullDesC8(), KNullDesC8()}, //page_count
92 {KTableInfo(), _L8("(B)"), KNullDesC8()}, //table_info
93 {KSchemaVersion(), KNullDesC8(), _L8(" = 10")}, //schema_version
94 {KUserVersion(), KNullDesC8(), _L8(" = 10")}, //user_version
95 {KIntegrityCheck(), KNullDesC8(), _L8(" = 1")}, //integrity_check
96 {KParserTrace(), KNullDesC8(), _L8(" = ON")}, //parser_trace
97 {KVdbeTrace(), KNullDesC8(), _L8(" = ON")}, //vdbe_trace
98 {KdbeListing(), KNullDesC8(), _L8(" = ON")}, //vdbe_listing
101 //////////////////////////////////////////////// Expected results ///////////////////////////////////////////////////////////
124 // Table listing the expected for each pragma command for the following access conditions:-
125 // 1) Pragma Read with non-secure database
126 // 2) Pragma Write with non-secure database
127 // 3) Pragma Read with secure database
128 // 4) Pragma Write with secure database
129 const TInt KResultsTable[KNumPragma][4] =
131 ////////////////////////////////////////////////////////////////////////////////////
132 // NON_SECURE | SECURE |
133 //W/out Pram |With Param|W/out Pram |With Param |Pragma Command
134 ///////////////////////////////////////////////////////////////////////////////////
135 {EOk, EIgnore, EDeny, EDeny }, //auto_vacuum
136 {EOk, EIgnore, EDeny, EDeny }, //cache_size
137 {EOk, ENoCheck, EDeny, EDeny }, //case_sensitive_like
138 {EOk, EOk, EDeny, EDeny }, //count_changes
139 {EOk, EIgnore, EDeny, EDeny }, //cache_size
140 {EOk, EIgnore, EDeny, EDeny }, //empty_result_callbacks
141 {EOk, EIgnore, EDeny, EDeny }, //encoding
142 {EOk, EOk, EDeny, EDeny }, //full_column_names
143 {EOk, EIgnore, EDeny, EDeny }, //fullfsync
144 {EIgnore, EIgnore, EDeny, EDeny }, //incremental_vacuum
145 {EIgnore, EIgnore, EDeny, EDeny }, //journal_mode
146 {EIgnore, EIgnore, EDeny, EDeny }, //journal_size_limit
147 {EOk, EIgnore, EDeny, EDeny }, //legacy_file_format
148 {EOk, EIgnore, EDeny, EDeny }, //locking_mode
149 {EOk, EIgnore, EDeny, EDeny }, //page_size
150 {EIgnore, EIgnore, EDeny, EDeny }, //max_page_count
151 {EOk, EIgnore, EDeny, EDeny }, //read_uncommitted
152 {EOk, EOk, EDeny, EDeny }, //short_column_names
153 {EOk, EIgnore, EDeny, EDeny }, //synchronous
154 {EOk, EIgnore, EDeny, EDeny }, //temp_store
155 {EOk, ENoCheck, EDeny, EDeny }, //temp_store_directory
156 {EOk, EOk, EDeny, EDeny }, //database_list
157 {ENoCheck, EOk, EDeny, EDeny }, //foreign_key_list
158 {EOk, EIgnore, EDeny, EDeny }, //freelist_count
159 {ENoCheck, EOk, EDeny, EDeny }, //index_info
160 {ENoCheck, EOk, EDeny, EDeny }, //index_list
161 {EOk, EIgnore, EDeny, EDeny }, //page_count
162 {ENoCheck, EOk, EDeny, EDeny }, //table_info
163 {EOk, EIgnore, EDeny, EDeny }, //schema_version
164 {EOk, EIgnore, EDeny, EDeny }, //user_version
165 {EOk, EIgnore, EDeny, EDeny }, //integrity_check
166 {EOk, EIgnore, EDeny, EDeny }, //parser_trace
167 {EOk, EIgnore, EDeny, EDeny }, //vdbe_trace
168 {EOk, EIgnore, EDeny, EDeny }, //vdbe_trace
171 ///////////////////////////////////////////////////////////////////////////////////////
172 //Deletes all created test files.
173 void DeleteTestFiles()
175 (void)RSqlDatabase::Delete(KPrivateDbName);
176 (void)RSqlDatabase::Delete(KSecureDbName);
177 (void)RSqlDatabase::Delete(KPublicDbName);
180 ///////////////////////////////////////////////////////////////////////////////////////
181 //Test macros and functions
182 void Check1(TInt aValue, TInt aLine)
187 RDebug::Print(_L("*** Line %d\r\n"), aLine);
188 TheTest(EFalse, aLine);
191 void Check2(TInt aValue, TInt aExpected, TInt aLine)
193 if(aValue != aExpected)
196 RDebug::Print(_L("*** Line %d, Expected error: %d, got: %d\r\n"), aLine, aExpected, aValue);
197 TheTest(EFalse, aLine);
200 #define TEST(arg) ::Check1((arg), __LINE__)
201 #define TEST2(aValue, aExpected) ::Check2(aValue, aExpected, __LINE__)
203 ///////////////////////////////////////////////////////////////////////////////////////////////////////////
204 //Creates file session instance and the test directory
207 TInt err = TheFs.Connect();
208 TEST2(err, KErrNone);
210 err = TheFs.MkDir(KPublicDir);
211 TEST(err == KErrNone || err == KErrAlreadyExists);
213 err = TheFs.MkDir(KPrivateDir);
214 TEST(err == KErrNone || err == KErrAlreadyExists);
216 ///////////////////////////////////////////////////////////////////////////////////////////////////////////
217 //Create and setup all the database test files
219 //Perform common setup steps for all databases
222 TInt err = TheDb.Exec(KCreateTable1);
223 TEST(err >= KErrNone);
225 err = TheDb.Exec(KCreateTable2);
226 TEST(err >= KErrNone);
228 err = TheDb.Exec(KCreateIndex);
229 TEST(err >= KErrNone);
231 err = TheDb.Exec(KInsertTable);
232 TEST(err >= KErrNone);
237 RSqlSecurityPolicy policy; //required for secure database
239 //Create Private Database
240 TInt err = TheDb.Create(KPublicDbName);
241 TEST2(err, KErrNone);
247 //Create Public Database
248 err = TheDb.Create(KPrivateDbName);
249 TEST2 (err, KErrNone);
255 //Create Secure Database
256 err = policy.Create(TSecurityPolicy(TSecurityPolicy::EAlwaysPass));
257 TEST2 (err, KErrNone);
258 err = policy.SetDbPolicy(RSqlSecurityPolicy::EReadPolicy, KPolicy1);
259 TEST2 (err, KErrNone);
260 err = policy.SetDbPolicy(RSqlSecurityPolicy::EWritePolicy, KPolicy2);
261 TEST2 (err, KErrNone);
262 err = TheDb.Create(KSecureDbName,policy);
263 TEST2 (err, KErrNone);
271 void PragmaTests(const TAccessType aAccessType, TDatabaseType aDbType, TBool aAttached)
273 TBuf8<10> databaseName;
276 //Depending if we are
277 aAttached ? databaseName.Copy(_L8("AttachedDB")) : databaseName.Copy(_L8("main"));
279 if(aDbType == ENonSecure)
281 index = (aAccessType == EReadParam) ? 0 : 1;
285 index = (aAccessType == EReadParam) ? 2 : 3;
288 for(TInt i=0;i<KNumPragma;i++)
290 //////////////////////////////////// Formatting the pragma string ////////////////////////////////////////
291 //Check to see if a parameter value is needed for input
293 (aAccessType == EReadParam) ? param.Set(KInputList[i].iReadParam) : param.Set(KInputList[i].iWriteParam);
294 if (param != KNullDesC8)
296 //Formatting Pragma Strings with Parameters
297 TheSql.Format(KPragmaWithParam, &databaseName, &KInputList[i].iPragmaName, ¶m);
301 //Formatting Pragma Strings without Parameters
302 TheSql.Format(KPragma, &databaseName, &KInputList[i].iPragmaName);
305 //////////////////// Executing the pragma and checking the results against the "ResultsTable" ////////////
308 TInt err = stmt.Prepare(TheDb, TheSql);
309 RDebug::Printf("Testing the following pragma command - %s",TheSql.Ptr());
310 switch (KResultsTable[i][index])
314 TEST2(err, KErrNone);
317 TEST2(err, KErrPermissionDenied);
328 //This function will perform the following to test authorizer:-
329 // 1) Setup the connection - either using a single or attached database
330 // 2) Test the authorizer using pragma 'writes'
331 // 3) Test the authorizer using pragma 'reads'
332 void PerformPragmaTest(const TDesC16& aDatabaseName, TDatabaseType aDbType, TBool aAttached)
338 if (aDatabaseName.Compare(KSecureDbName) == 0)
340 TheDb.Open(KPublicDbName);
341 TEST2(err, KErrNone);
345 TheDb.Open(KSecureDbName);
346 TEST2(err, KErrNone);
349 err = TheDb.Attach(aDatabaseName,KAttachDb);
350 TEST2(err, KErrNone);
354 err = TheDb.Open(aDatabaseName);
355 TEST2(err, KErrNone);
358 //Testing Pragma Reads
359 PragmaTests(EReadParam, aDbType, aAttached);
361 //Testing Pragma Writes
362 PragmaTests(EWriteParam, aDbType, aAttached);
368 @SYMTestCaseID PDS-SQL-UT-4122
369 @SYMTestCaseDesc Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
370 Execute all SQL pragmas to test the permissions returned from the CSqlSrvDatabase::AuthorizeCallback
372 The test attempts to execute pragmas for the following cases:-
373 1) Without paramter (also known as 'Read' access)
374 2) With parameter (also known as 'Write' access)
375 The database tested in this case is a public database.
376 @SYMTestPriority High
377 @SYMTestActions Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
378 @SYMTestExpectedResults Test must not fail
381 void PublicDbPragmaTest()
383 PerformPragmaTest(KPublicDbName(), ENonSecure, EFalse);
387 @SYMTestCaseID PDS-SQL-UT-4123
388 @SYMTestCaseDesc Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
389 Execute all SQL pragmas to test the permissions returned from the CSqlSrvDatabase::AuthorizeCallback
391 The test attempts to execute pragmas for the following cases:-
392 1) Without paramter (also known as 'Read' access)
393 2) With parameter (also known as 'Write' access)
394 The database tested in this case is a private database.
395 @SYMTestPriority High
396 @SYMTestActions Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
397 @SYMTestExpectedResults Test must not fail
400 void PrivateDbPragmaTest()
402 PerformPragmaTest(KPrivateDbName(), ENonSecure, EFalse);
406 @SYMTestCaseID PDS-SQL-UT-4124
407 @SYMTestCaseDesc Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
408 Execute all SQL pragmas to test the permissions returned from the CSqlSrvDatabase::AuthorizeCallback
410 The test attempts to execute pragmas for the following cases:-
411 1) Without paramter (also known as 'Read' access)
412 2) With parameter (also known as 'Write' access)
413 The database tested in this case is a secure database.
414 @SYMTestPriority High
415 @SYMTestActions Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
416 @SYMTestExpectedResults Test must not fail
419 void SecureDbPragmaTest()
421 PerformPragmaTest(KSecureDbName(), ESecure, EFalse);
425 @SYMTestCaseID PDS-SQL-UT-4125
426 @SYMTestCaseDesc Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
427 Execute all SQL pragmas to test the permissions returned from the CSqlSrvDatabase::AuthorizeCallback
429 The test attempts to execute pragmas for the following cases:-
430 1) Without paramter (also known as 'Read' access)
431 2) With parameter (also known as 'Write' access)
432 The database tested in this case is a public attached database.
433 @SYMTestPriority High
434 @SYMTestActions Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
435 @SYMTestExpectedResults Test must not fail
438 void PublicAttDbPragmaTest()
440 PerformPragmaTest(KPublicDbName(), ENonSecure, ETrue);
444 @SYMTestCaseID PDS-SQL-UT-4126
445 @SYMTestCaseDesc Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
446 Execute all SQL pragmas to test the permissions returned from the CSqlSrvDatabase::AuthorizeCallback
448 The test attempts to execute pragmas for the following cases:-
449 1) Without paramter (also known as 'Read' access)
450 2) With parameter (also known as 'Write' access)
451 The database tested in this case is a private attached database.
452 @SYMTestPriority High
453 @SYMTestActions Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
454 @SYMTestExpectedResults Test must not fail
457 void PrivateAttDbPragmaTest()
459 PerformPragmaTest(KPrivateDbName(), ENonSecure, ETrue);
463 @SYMTestCaseID PDS-SQL-UT-4127
464 @SYMTestCaseDesc Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
465 Execute all SQL pragmas to test the permissions returned from the CSqlSrvDatabase::AuthorizeCallback
467 The test attempts to execute pragmas for the following cases:-
468 1) Without paramter (also known as 'Read' access)
469 2) With parameter (also known as 'Write' access)
470 The database tested in this case is a secure attached database.
471 @SYMTestPriority High
472 @SYMTestActions Test for DEF129581: All Pragmas are allowed to be executed on non-secure SQL databases.
473 @SYMTestExpectedResults Test must not fail
476 void SecureAttDbPragmaTest()
478 PerformPragmaTest(KSecureDbName(), ESecure, ETrue);
483 TheTest.Start(_L("@SYMTestCaseID:PDS-SQL-UT-4122 Pragma Testing with public databases"));
484 PublicDbPragmaTest();
486 TheTest.Next(_L("@SYMTestCaseID:PDS-SQL-UT-4123 Pragma Testing with private databases"));
487 PrivateDbPragmaTest();
489 TheTest.Next(_L("@SYMTestCaseID:PDS-SQL-UT-4124 Pragma Testing with secure databases"));
490 SecureDbPragmaTest();
492 TheTest.Next(_L("@SYMTestCaseID:PDS-SQL-UT-4125 Pragma Testing with attached public databases"));
493 PublicAttDbPragmaTest();
495 TheTest.Next(_L("@SYMTestCaseID:PDS-SQL-UT-4126 Pragma Testing with attached private databases"));
496 PrivateAttDbPragmaTest();
498 TheTest.Next(_L("@SYMTestCaseID:PDS-SQL-UT-4127 Pragma Testing with attached secure databases"));
499 SecureAttDbPragmaTest();
506 CTrapCleanup* tc = CTrapCleanup::New();
525 User::Heap().Check();