sp-security.test 7.19 KB
Newer Older
1 2 3 4
#
# Testing SQL SECURITY of stored procedures
#

5 6 7
# Can't test with embedded server that doesn't support grants
-- source include/not_embedded.inc

8 9 10 11 12
connect (con1root,localhost,root,,);

connection con1root;
use test;

13 14 15
# Create user user1 with no particular access rights
grant usage on *.* to user1@localhost;
flush privileges;
16 17

--disable_warnings
18
drop table if exists t1;
19 20 21 22 23
drop database if exists db1_secret;
--enable_warnings
# Create our secret database
create database db1_secret;

24 25 26 27
# Can create a procedure in other db
create procedure db1_secret.dummy() begin end;
drop procedure db1_secret.dummy;

28 29 30 31
use db1_secret;

create table t1 ( u varchar(64), i int );

32
# A test procedure and function
33 34
create procedure stamp(i int)
  insert into db1_secret.t1 values (user(), i);
35
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
36 37
show procedure status like 'stamp';

38 39 40 41
create function db() returns varchar(64) return database();
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
show function status like 'db';

42 43 44
# root can, of course
call stamp(1);
select * from t1;
45
select db();
46

47 48 49 50
grant execute on procedure db1_secret.stamp to user1@'%';
grant execute on function db1_secret.db to user1@'%';
grant execute on procedure db1_secret.stamp to ''@'%';
grant execute on function db1_secret.db to ''@'%';
51

52
connect (con2user1,localhost,user1,,);
53 54
connect (con3anon,localhost,anon,,);

55

56
#
57
# User1 can
58
#
59
connection con2user1;
60 61

# This should work...
62
call db1_secret.stamp(2);
63
select db1_secret.db();
64 65

# ...but not this
66
--error 1142
67 68
select * from db1_secret.t1;

69
# ...and not this
unknown's avatar
unknown committed
70
--error 1044
71
create procedure db1_secret.dummy() begin end;
72
--error 1305
73 74 75
drop procedure db1_secret.dummy;


76 77 78 79 80 81
#
# Anonymous can
#
connection con3anon;

# This should work...
82
call db1_secret.stamp(3);
83
select db1_secret.db();
84 85

# ...but not this
86
--error 1142
87 88
select * from db1_secret.t1;

89
# ...and not this
unknown's avatar
unknown committed
90
--error 1044
91
create procedure db1_secret.dummy() begin end;
92
--error 1305
93 94 95
drop procedure db1_secret.dummy;


96 97 98 99 100 101 102 103 104 105
#
# Check it out
#
connection con1root;
select * from t1;

#
# Change to invoker's rights
#
alter procedure stamp sql security invoker;
106
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
107 108
show procedure status like 'stamp';

109 110 111 112
alter function db sql security invoker;
--replace_column 5 '0000-00-00 00:00:00' 6 '0000-00-00 00:00:00'
show function status like 'db';

113 114 115
# root still can
call stamp(4);
select * from t1;
116
select db();
117 118

#
119
# User1 cannot
120
#
121
connection con2user1;
122 123 124

# This should not work
--error 1044
125
call db1_secret.stamp(5);
126 127
--error 1044
select db1_secret.db();
128 129 130 131 132 133 134 135

#
# Anonymous cannot
#
connection con3anon;

# This should not work
--error 1044
136
call db1_secret.stamp(6);
137 138
--error 1044
select db1_secret.db();
139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157

#
# BUG#2777
#

connection con1root;
--disable_warnings
drop database if exists db2;
--enable_warnings
create database db2;

use db2;

create table t2 (s1 int);
insert into t2 values (0);

grant usage on db2.* to user1@localhost;
grant select on db2.* to user1@localhost;
grant usage on db2.* to user2@localhost;
158 159
grant select,insert,update,delete,create routine on db2.* to user2@localhost;
grant create routine on db2.* to user1@localhost;
160 161 162 163 164 165 166 167
flush privileges;

connection con2user1;
use db2;

create procedure p () insert into t2 values (1);

# Check that this doesn't work.
168
--error 1142
169 170 171 172 173 174 175 176
call p();

connect (con4user2,localhost,user2,,);

connection con4user2;
use db2;

# This should not work, since p is executed with definer's (user1's) rights.
177
--error 1370
178 179 180 181 182 183 184 185
call p();
select * from t2;

create procedure q () insert into t2 values (2);

call q();
select * from t2;

186
connection con1root;
187
grant usage on procedure db2.q to user2@localhost with grant option;
188 189

connection con4user2;
190
grant execute on procedure db2.q to user1@localhost;
191

192 193 194 195 196 197 198
connection con2user1;
use db2;

# This should work
call q();
select * from t2;

199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215

#
# BUG#6030: Stored procedure has no appropriate DROP privilege
# (or ALTER for that matter)

# still connection con2user1 in db2

# This should work:
alter procedure p modifies sql data;
drop procedure p;

# This should NOT work
--error 1370
alter procedure q modifies sql data;
--error 1370
drop procedure q;

216
connection con1root;
217 218 219 220 221 222 223 224
use db2;
# But root always can
alter procedure q modifies sql data;
drop procedure q;


# Clean up
#Still connection con1root;
225 226 227
disconnect con2user1;
disconnect con3anon;
disconnect con4user2;
228
use test;
229
select type,db,name from mysql.proc;
230
drop database db1_secret;
231
drop database db2;
232 233 234
# Make sure the routines are gone
select type,db,name from mysql.proc;
# Get rid of the users
235
delete from mysql.user where user='user1' or user='user2';
236 237 238 239 240 241 242 243 244 245 246 247 248
# And any routine privileges
delete from mysql.procs_priv where user='user1' or user='user2';

#
# Test the new security acls
#
grant usage on *.* to usera@localhost;
grant usage on *.* to userb@localhost;
grant usage on *.* to userc@localhost;
create database sptest;
create table t1 ( u varchar(64), i int );
create procedure sptest.p1(i int) insert into test.t1 values (user(), i);
grant insert on t1 to usera@localhost;
249
grant execute on procedure sptest.p1 to usera@localhost;
250
show grants for usera@localhost;
251
grant execute on procedure sptest.p1 to userc@localhost with grant option;
252 253 254 255 256 257 258 259 260
show grants for userc@localhost;

connect (con2usera,localhost,usera,,);
connect (con3userb,localhost,userb,,);
connect (con4userc,localhost,userc,,);

connection con2usera;
call sptest.p1(1);
--error 1370
261
grant execute on procedure sptest.p1 to userb@localhost;
262 263 264 265 266 267 268
--error 1370
drop procedure sptest.p1;

connection con3userb;
--error 1370
call sptest.p1(2);
--error 1370
269
grant execute on procedure sptest.p1 to userb@localhost;
270 271 272 273 274
--error 1370
drop procedure sptest.p1;

connection con4userc;
call sptest.p1(3);
275
grant execute on procedure sptest.p1 to userb@localhost;
276 277 278 279 280 281
--error 1370
drop procedure sptest.p1;

connection con3userb;
call sptest.p1(4);
--error 1370
282
grant execute on procedure sptest.p1 to userb@localhost;
283 284 285 286 287 288
--error 1370
drop procedure sptest.p1;

connection con1root;
select * from t1;

289
grant all privileges on procedure sptest.p1 to userc@localhost;
290 291 292 293
show grants for userc@localhost;
show grants for userb@localhost;

connection con4userc;
294
revoke all privileges on procedure sptest.p1 from userb@localhost;
295 296 297 298 299 300 301 302 303 304 305 306 307

connection con1root;
show grants for userb@localhost;

#cleanup
disconnect con4userc;
disconnect con3userb;
disconnect con2usera;
use test;
drop database sptest;
delete from mysql.user where user='usera' or user='userb' or user='userc';
delete from mysql.procs_priv where user='usera' or user='userb' or user='userc';

308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343
#
# BUG#9503: reseting correct parameters of thread after error in SP function
#
connect (root,localhost,root,,test);
connection root;

--disable_warnings
drop function if exists bug_9503;
--enable_warnings
delimiter //;
create database mysqltest//
use mysqltest//
create table t1 (s1 int)//
grant select on t1 to user1@localhost//
create function bug_9503 () returns int sql security invoker begin declare v int;
select min(s1) into v from t1; return v; end//
delimiter ;//

connect (user1,localhost,user1,,test);
connection user1;
use mysqltest;
-- error 1370
select bug_9503();

connection root;
grant execute on function bug_9503 to user1@localhost;

connection user1;
do 1;
use test;

connection root;
REVOKE ALL PRIVILEGES, GRANT OPTION FROM user1@localhost;
drop function bug_9503;
use test;
drop database mysqltest;