summaryrefslogtreecommitdiff
path: root/test/auth3.test
diff options
context:
space:
mode:
authorHans-Christoph Steiner <hans@eds.org>2012-03-30 20:42:12 -0400
committerHans-Christoph Steiner <hans@eds.org>2012-03-30 20:42:12 -0400
commit7bb481fda9ecb134804b49c2ce77ca28f7eea583 (patch)
tree31b520b9914d3e2453968abe375f2c102772c3dc /test/auth3.test
Imported Upstream version 2.0.3
Diffstat (limited to 'test/auth3.test')
-rw-r--r--test/auth3.test111
1 files changed, 111 insertions, 0 deletions
diff --git a/test/auth3.test b/test/auth3.test
new file mode 100644
index 0000000..21e2b3b
--- /dev/null
+++ b/test/auth3.test
@@ -0,0 +1,111 @@
+# 2008 October 27
+#
+# The author disclaims copyright to this source code. In place of
+# a legal notice, here is a blessing:
+#
+# May you do good and not evil.
+# May you find forgiveness for yourself and forgive others.
+# May you share freely, never taking more than you give.
+#
+#***********************************************************************
+#
+# Test that the truncate optimization is disabled if the SQLITE_DELETE
+# authorization callback returns SQLITE_IGNORE.
+#
+# $Id: auth3.test,v 1.2 2009/05/04 01:58:31 drh Exp $
+#
+
+set testdir [file dirname $argv0]
+source $testdir/tester.tcl
+
+# disable this test if the SQLITE_OMIT_AUTHORIZATION macro is
+# defined during compilation.
+if {[catch {db auth {}} msg]} {
+ finish_test
+ return
+}
+
+# Disable the statement cache for these tests.
+#
+db cache size 0
+
+db authorizer ::auth
+proc auth {code arg1 arg2 arg3 arg4} {
+ if {$code=="SQLITE_DELETE"} {
+ return $::authcode
+ }
+ return SQLITE_OK
+}
+
+#--------------------------------------------------------------------------
+# The following tests - auth3-1.* - test that return values of SQLITE_DENY,
+# SQLITE_IGNORE, SQLITE_OK and <invalid> are correctly handled when returned
+# by an SQLITE_DELETE authorization callback triggered by a
+# "DELETE FROM <table-name>" statement.
+#
+do_test auth3-1.1 {
+ execsql {
+ CREATE TABLE t1(a,b,c);
+ INSERT INTO t1 VALUES(1, 2, 3);
+ INSERT INTO t1 VALUES(4, 5, 6);
+ }
+} {}
+do_test auth3.1.2 {
+ set ::authcode SQLITE_DENY
+ catchsql { DELETE FROM t1 }
+} {1 {not authorized}}
+do_test auth3.1.3 {
+ set ::authcode SQLITE_INVALID
+ catchsql { DELETE FROM t1 }
+} {1 {authorizer malfunction}}
+do_test auth3.1.4 {
+ execsql { SELECT * FROM t1 }
+} {1 2 3 4 5 6}
+do_test auth3-1.5 {
+ set ::authcode SQLITE_IGNORE
+ execsql {
+ DELETE FROM t1;
+ SELECT * FROM t1;
+ }
+} {}
+do_test auth3-1.6 {
+ set ::authcode SQLITE_OK
+ execsql {
+ INSERT INTO t1 VALUES(1, 2, 3);
+ INSERT INTO t1 VALUES(4, 5, 6);
+ DELETE FROM t1;
+ SELECT * FROM t1;
+ }
+} {}
+
+#--------------------------------------------------------------------------
+# These tests - auth3-2.* - test that returning SQLITE_IGNORE really does
+# disable the truncate optimization.
+#
+do_test auth3-2.1 {
+ set ::authcode SQLITE_OK
+ execsql {
+ INSERT INTO t1 VALUES(1, 2, 3);
+ INSERT INTO t1 VALUES(4, 5, 6);
+ }
+ set sqlite_search_count 0
+ execsql {
+ DELETE FROM t1;
+ }
+ set sqlite_search_count
+} {0}
+
+do_test auth3-2.2 {
+ set ::authcode SQLITE_IGNORE
+ execsql {
+ INSERT INTO t1 VALUES(1, 2, 3);
+ INSERT INTO t1 VALUES(4, 5, 6);
+ }
+ set sqlite_search_count 0
+ execsql {
+ DELETE FROM t1;
+ }
+ set sqlite_search_count
+} {1}
+
+finish_test