diff -r 000000000000 -r 08ec8eefde2f persistentstorage/dbms/tdbms/t_dbplatsec1.cpp --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/persistentstorage/dbms/tdbms/t_dbplatsec1.cpp Fri Jan 22 11:06:30 2010 +0200 @@ -0,0 +1,328 @@ +// Copyright (c) 2004-2009 Nokia Corporation and/or its subsidiary(-ies). +// All rights reserved. +// This component and the accompanying materials are made available +// under the terms of "Eclipse Public License v1.0" +// which accompanies this distribution, and is available +// at the URL "http://www.eclipse.org/legal/epl-v10.html". +// +// Initial Contributors: +// Nokia Corporation - initial contribution. +// +// Contributors: +// +// Description: +// DBMS security policy - testing new APIs. +// This test app has "NetworkServices" (SCHEMA) capability, which allows it to +// modify the DBMS structure but not to write any data in the tables. +// The UID policy file is 11335579.spd. +// Please, ensure that t_dbenvcreate test is executed before t_dbplatsec/t_dbplatsecperf tests! +// Please, ensure that t_dbenvdestroy test is executed after t_dbplatsec/t_dbplatsecperf tests! +// +// + +#include +#include +#include "t_dbplatsecutl.h" + +const TUid KSecureDbUid = {0x11335579}; +const TUid KProtSecureDbUid = {0x11335578}; +_LIT(KSecure, "SECURE"); +_LIT(KDbName, "C:TestDB2.dB"); +_LIT(KTblNameA, "A"); +_LIT(KTblNameB, "B"); +_LIT(KTblNameC, "C"); + +static RTest TheTest(_L("t_dbplatsec1: DBMS platform security testing - 1")); +static RDbs TheDbs; +static RDbNamedDatabase TheDb; +static RDbTable TheTbl; +static RDbView TheView; + +static void CleanupTest() + { + TheView.Close(); + TheTbl.Close(); + TheDb.Close(); + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDbName); + TheDbs.Close(); + } + +TDBSCUtils TheDbscUtils(TheTest, &CleanupTest); + +static TColDef const KColumns[]= + { + {_S("ID"), EDbColInt32, TDbCol::ENotNull | TDbCol::EAutoIncrement}, + {_S("DATA1"), EDbColInt32, TDbCol::ENotNull}, + {_S("DATA2"), EDbColInt32, TDbCol::ENotNull}, + {0} + }; + +/** +@SYMTestCaseID SYSLIB-DBMS-CT-0008 +@SYMTestCaseDesc Database tests. Some of the calls must fail because the caller has no enough rights + for the requested operation. +@SYMTestPriority High +@SYMTestActions RDbNamedDatabase::Open()/RDbNamedDatabase::DatabaseNamesL()/RDbNamedDatabase::Create(). +@SYMTestExpectedResults The test must not fail. +@SYMREQ REQ2429 + DBMS shall provide an API to apply security policies to database tables. +*/ +static void DbTestL() + { + TBuf<32> format; + + TDBSCUtils::DeleteDatabase(TheDbs, KSecureDbUid, KDbName); + TheTest.Printf(_L("Create database\n")); + //The test must pass, because the test app has "SCHEMA" capability + format.Copy(KSecure); + format.Append(KSecureDbUid.Name()); + TInt err = TheDb.Create(TheDbs, KDbName, format); + TEST2(err, KErrNone); + + //The test must pass, because "DatabaseNamesL" is a DBMS operation available for everyone. + TheTest.Printf(_L("Database list\n")); + CDbDatabaseNames* dbNames = TheDbs.DatabaseNamesL(EDriveC, KSecureDbUid); + TEST(dbNames->Count() > 0); + TBool casePreserved = EFalse; + for(TInt i=0;iCount();++i) + { + const TDesC& dbName = (*dbNames)[i]; + RDebug::Print(_L("--Database: %S\n"), &dbName); + TBuf<128> dbName2; + dbName2.Append(TChar('A' + EDriveC)); + dbName2.Append(TChar(':')); + dbName2.Append(dbName); + if(dbName2 == KDbName()) + { + casePreserved = ETrue; + } + } + //if casePreserved is non-zero that means the DBMS server does not change the database names to + //upper or lower case - that's what we want to check + TEST(casePreserved); + delete dbNames; + + TheDb.Close(); + + TheTest.Printf(_L("An attempt to create database - existing, but protected UID\n")); + //The test must fail, because the test app does not have capabilities to satisfy + //KProtSecureDbUid "SCHEMA" policy. + format.Copy(KSecure); + format.Append(KProtSecureDbUid.Name()); + err = TheDb.Create(TheDbs, KDbName, format); + TEST2(err, KErrPermissionDenied); + + //The test must pass, because the test app has "SCHEMA" capability (it must have capabilities, + //satisfying at least one of the UID's R/W/S policies) + TheTest.Printf(_L("Open database\n")); + format.Copy(KSecure); + format.Append(KSecureDbUid.Name()); + err = TheDb.Open(TheDbs, KDbName, format); + TEST2(err, KErrNone); + } + +/** +@SYMTestCaseID SYSLIB-DBMS-CT-0009 +@SYMTestCaseDesc Opening table test. The caller has a set of capabilities which satisfy database's + schema security policy only. The test checks that the capapbility checking + on the DBMS server side works properly. Some of the initiated open table + operations won't executed and the returned error will be KErrPermisssionDenied. +@SYMTestPriority High +@SYMTestActions Attempts to execute RDbTable::Open() on different tables from the test database. +@SYMTestExpectedResults The test must not fail. +@SYMREQ REQ2429 + DBMS shall provide an API to apply security policies to database tables. +*/ +static void TblOpenL() + { + TheTest.Printf(_L("Create tables\n")); + //The test must pass, because the test app has "SCHEMA" capability + CDbColSet* colset = TDBSCUtils::CreateColSetLC(KColumns); + TInt err = TheDb.CreateTable(KTblNameA, *colset);//R: PowerMgmt, W: WriteUserData + TEST2(err, KErrNone); + err = TheDb.CreateTable(KTblNameB, *colset);//R: None, W: WriteUserData WriteDeviceData + TEST2(err, KErrNone); + err = TheDb.CreateTable(KTblNameC, *colset);//R: None, W: WriteUserData + TEST2(err, KErrNone); + CleanupStack::PopAndDestroy(colset); + + TheTest.Printf(_L("An attempt to open table A\n")); + //The test must fail, because the test app has no capabilities to satisfy + //R/W policies of table A + err = TheTbl.Open(TheDb, KTblNameA); + TEST2(err, KErrPermissionDenied); + err = TheTbl.Open(TheDb, KTblNameA, RDbRowSet::EUpdatable); + TEST2(err, KErrPermissionDenied); + err = TheTbl.Open(TheDb, KTblNameA, RDbRowSet::EReadOnly); + TEST2(err, KErrPermissionDenied); + err = TheTbl.Open(TheDb, KTblNameA, RDbRowSet::EInsertOnly); + TEST2(err, KErrPermissionDenied); + + TheTest.Printf(_L("An attempt to open table B\n")); + //Open table B in insert/update mode - the test must fail, because the test app has no + //capabilities to satisfy table B, policy W. + //Open table B in read-only mode - the test must pass, because table B has no R policy. + err = TheTbl.Open(TheDb, KTblNameB); + TEST2(err, KErrPermissionDenied); + err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EUpdatable); + TEST2(err, KErrPermissionDenied); + err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EInsertOnly); + TEST2(err, KErrPermissionDenied); + err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EReadOnly); + TEST2(err, KErrNone); + TheTbl.Close(); + + TheTest.Printf(_L("An attempt to open table C\n")); + //Open table C in insert/update mode - the test must fail, because the test app has no + //capabilities to satisfy table C, policy W. + //Open table C in read-only mode - the test must pass, because table C has no R policy. + err = TheTbl.Open(TheDb, KTblNameC); + TEST2(err, KErrPermissionDenied); + err = TheTbl.Open(TheDb, KTblNameC, RDbRowSet::EUpdatable); + TEST2(err, KErrPermissionDenied); + err = TheTbl.Open(TheDb, KTblNameC, RDbRowSet::EInsertOnly); + TEST2(err, KErrPermissionDenied); + err = TheTbl.Open(TheDb, KTblNameC, RDbRowSet::EReadOnly); + TEST2(err, KErrNone); + TheTbl.Close(); + } + +/** +@SYMTestCaseID SYSLIB-DBMS-CT-0010 +@SYMTestCaseDesc Table R/w operations. The caller has a set of capabilities which satisfy database's + schema security policy only. The test checks that the capapbility checking + on the DBMS server side works properly. Some of the R/W table operations won't be + executed and the returned error will be KErrPermisssionDenied. +@SYMTestPriority High +@SYMTestActions Attempts to execute RDbTable::Insert()/RDbTable::Update()/RDbTable::FirstL() + on different tables from the test database. +@SYMTestExpectedResults The test must not fail. +@SYMREQ REQ2429 + DBMS shall provide an API to apply security policies to database tables. +*/ +static void TblRWL() + { + TheTest.Printf(_L("An attempt to write in table B\n")); + TInt err = TheTbl.Open(TheDb, KTblNameB, RDbRowSet::EReadOnly); + TEST2(err, KErrNone); + //"Write table B" test must fail, because the test app has no capabilities + //to satisfy table B, policy W. + TRAP(err, TheTbl.InsertL()); + TEST2(err, KErrPermissionDenied); + TRAP(err, TheTbl.UpdateL()); + TEST2(err, KErrPermissionDenied); + + TheTest.Printf(_L("An attempt to read from table B\n")); + //"Read table B" test must pass, because table B has no R policy + TBool res = TheTbl.FirstL(); + TEST(!res); + + TheTbl.Close(); + + TheTest.Printf(_L("An attempt to write in table C\n")); + //"Write table C" test must fail, because the test app has no capabilities + //to satisfy table C, policy W. + err = TheTbl.Open(TheDb, KTblNameC, RDbRowSet::EReadOnly); + TEST2(err, KErrNone); + TRAP(err, TheTbl.InsertL()); + TEST2(err, KErrPermissionDenied); + TRAP(err, TheTbl.UpdateL()); + TEST2(err, KErrPermissionDenied); + + TheTest.Printf(_L("An attempt to read from table C\n")); + //"Read table C" test must pass, because table C has no R policy + res = TheTbl.FirstL(); + TEST(!res); + + TheTbl.Close(); + } + +/** +@SYMTestCaseID SYSLIB-DBMS-CT-0011 +@SYMTestCaseDesc SQL tests. The caller has a set of capabilities which satisfy database's + schema security policy only. The test checks that the capapbility checking + on the DBMS server side works properly. Some of the SQL statements won't be + executed and the returned error will be KErrPermisssionDenied. +@SYMTestPriority High +@SYMTestActions Attempts to execute various INSERT/UPDATE/SELECT SQL statements. +@SYMTestExpectedResults The test must not fail. +@SYMREQ REQ2429 + DBMS shall provide an API to apply security policies to database tables. +*/ +static void TblSqlL() + { + TheTest.Printf(_L("SELECT SQL\n")); + //The test must fail, because the test app cannot satisfy table A, policy R. + TInt err = TheView.Prepare(TheDb, TDbQuery(_L("SELECT * FROM A"))); + TEST2(err, KErrPermissionDenied); + //The test must pass, because table B has no R policy. + err = TheView.Prepare(TheDb, TDbQuery(_L("SELECT * FROM B"))); + TEST2(err, KErrNone); + TheView.Close(); + //The test must pass, because table C has no R policy. + err = TheView.Prepare(TheDb, TDbQuery(_L("SELECT * FROM C"))); + TEST2(err, KErrNone); + TheView.Close(); + + TheTest.Printf(_L("INSERT/UPDATE SQL\n")); + //The test must fail, because the test app cannot satisfy table A, policy W. + err = TheDb.Execute(_L("INSERT INTO A (DATA2) VALUES(45)")); + TEST2(err, KErrPermissionDenied); + //The test must fail, because the test app cannot satisfy table B, policy W. + err = TheDb.Execute(_L("INSERT INTO B (DATA2) VALUES(45)")); + TEST2(err, KErrPermissionDenied); + //The test must fail, because the test app cannot satisfy table C, policy W. + err = TheDb.Execute(_L("INSERT INTO C (DATA2) VALUES(45)")); + TEST2(err, KErrPermissionDenied); + + //The test must fail, because the test app cannot satisfy table A, policy W. + err = TheDb.Execute(_L("UPDATE A SET DATA2=56 WHERE ID = 0")); + TEST2(err, KErrPermissionDenied); + //The test must fail, because the test app cannot satisfy table B, policy W. + err = TheDb.Execute(_L("UPDATE B SET DATA2=56 WHERE ID = 0")); + TEST2(err, KErrPermissionDenied); + //The test must fail, because the test app cannot satisfy table C, policy W. + err = TheDb.Execute(_L("UPDATE C SET DATA2=56 WHERE ID = 0")); + TEST2(err, KErrPermissionDenied); + } + +static void DoRunL() + { + TheTest.Start(_L("An app with \"SCHEMA\" capabilities set")); + + TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0008 Database test ")); + ::DbTestL(); + + TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0009 Open table test ")); + ::TblOpenL(); + + TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0010 Read/Write table test ")); + ::TblRWL(); + + TheTest.Next(_L(" @SYMTestCaseID:SYSLIB-DBMS-CT-0011 SQL table test ")); + ::TblSqlL(); + } + +TInt E32Main() + { + __UHEAP_MARK; + CTrapCleanup* tc = CTrapCleanup::New(); + TEST(tc != NULL); + + TInt err = TheDbs.Connect(); + TEST2(err, KErrNone); + + TRAP(err, ::DoRunL()); + TEST2(err, KErrNone); + + ::CleanupTest(); + + TheTest.End(); + TheTest.Close(); + + delete tc; + + __UHEAP_MARKEND; + User::Heap().Check(); + return KErrNone; + }