mirror of
https://github.com/ClickHouse/ClickHouse.git
synced 2024-11-22 23:52:03 +00:00
134 lines
6.7 KiB
Python
Executable File
134 lines
6.7 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
import sys
|
|
|
|
from testflows.core import *
|
|
|
|
append_path(sys.path, "..")
|
|
|
|
from helpers.cluster import Cluster
|
|
from helpers.argparser import argparser
|
|
from rbac.requirements import SRS_006_ClickHouse_Role_Based_Access_Control
|
|
|
|
issue_14091 = "https://github.com/ClickHouse/ClickHouse/issues/14091"
|
|
issue_14149 = "https://github.com/ClickHouse/ClickHouse/issues/14149"
|
|
issue_14224 = "https://github.com/ClickHouse/ClickHouse/issues/14224"
|
|
issue_14418 = "https://github.com/ClickHouse/ClickHouse/issues/14418"
|
|
issue_14451 = "https://github.com/ClickHouse/ClickHouse/issues/14451"
|
|
issue_14566 = "https://github.com/ClickHouse/ClickHouse/issues/14566"
|
|
issue_14674 = "https://github.com/ClickHouse/ClickHouse/issues/14674"
|
|
issue_14810 = "https://github.com/ClickHouse/ClickHouse/issues/14810"
|
|
issue_15165 = "https://github.com/ClickHouse/ClickHouse/issues/15165"
|
|
issue_15980 = "https://github.com/ClickHouse/ClickHouse/issues/15980"
|
|
issue_16403 = "https://github.com/ClickHouse/ClickHouse/issues/16403"
|
|
|
|
xfails = {
|
|
"syntax/show create quota/I show create quota current":
|
|
[(Fail, "https://github.com/ClickHouse/ClickHouse/issues/12495")],
|
|
"views/:/create with subquery privilege granted directly or via role/:":
|
|
[(Fail, issue_14091)],
|
|
"views/:/create with join query privilege granted directly or via role/:":
|
|
[(Fail, issue_14091)],
|
|
"views/:/create with union query privilege granted directly or via role/:":
|
|
[(Fail, issue_14091)],
|
|
"views/:/create with join union subquery privilege granted directly or via role/:":
|
|
[(Fail, issue_14091)],
|
|
"views/:/create with nested views privilege granted directly or via role/:":
|
|
[(Fail, issue_14091)],
|
|
"views/view/select with join query privilege granted directly or via role/:":
|
|
[(Fail, issue_14149)],
|
|
"views/view/select with join union subquery privilege granted directly or via role/:":
|
|
[(Fail, issue_14149)],
|
|
"views/view/select with nested views privilege granted directly or via role/:":
|
|
[(Fail, issue_14149)],
|
|
"views/live view/refresh with privilege granted directly or via role/:":
|
|
[(Fail, issue_14224)],
|
|
"views/live view/refresh with privilege revoked directly or from role/:":
|
|
[(Fail, issue_14224)],
|
|
"views/live view/select:":
|
|
[(Fail, issue_14418)],
|
|
"views/live view/select:/:":
|
|
[(Fail, issue_14418)],
|
|
"views/materialized view/select with:":
|
|
[(Fail, issue_14451)],
|
|
"views/materialized view/select with:/:":
|
|
[(Fail, issue_14451)],
|
|
"views/materialized view/modify query:":
|
|
[(Fail, issue_14674)],
|
|
"views/materialized view/modify query:/:":
|
|
[(Fail, issue_14674)],
|
|
"views/materialized view/insert on source table privilege granted directly or via role/:":
|
|
[(Fail, issue_14810)],
|
|
"privileges/alter ttl/table_type=:/user with some privileges":
|
|
[(Fail, issue_14566)],
|
|
"privileges/alter ttl/table_type=:/role with some privileges":
|
|
[(Fail, issue_14566)],
|
|
"privileges/alter ttl/table_type=:/user with privileges on cluster":
|
|
[(Fail, issue_14566)],
|
|
"privileges/alter ttl/table_type=:/user with privileges from user with grant option":
|
|
[(Fail, issue_14566)],
|
|
"privileges/alter ttl/table_type=:/user with privileges from role with grant option":
|
|
[(Fail, issue_14566)],
|
|
"privileges/alter ttl/table_type=:/role with privileges from user with grant option":
|
|
[(Fail, issue_14566)],
|
|
"privileges/alter ttl/table_type=:/role with privileges from role with grant option":
|
|
[(Fail, issue_14566)],
|
|
"privileges/distributed table/:/special cases/insert with table on source table of materialized view:":
|
|
[(Fail, issue_14810)],
|
|
"privileges/distributed table/cluster tests/cluster='sharded*":
|
|
[(Fail, issue_15165)],
|
|
"privileges/distributed table/cluster tests/cluster=:/special cases/insert with table on source table of materialized view privilege granted directly or via role/:":
|
|
[(Fail, issue_14810)],
|
|
"views/materialized view/select from implicit target table privilege granted directly or via role/select from implicit target table, privilege granted directly":
|
|
[(Fail, ".inner table is not created as expected")],
|
|
"views/materialized view/insert on target table privilege granted directly or via role/insert on target table, privilege granted through a role":
|
|
[(Fail, ".inner table is not created as expected")],
|
|
"views/materialized view/select from implicit target table privilege granted directly or via role/select from implicit target table, privilege granted through a role":
|
|
[(Fail, ".inner table is not created as expected")],
|
|
"views/materialized view/insert on target table privilege granted directly or via role/insert on target table, privilege granted directly":
|
|
[(Fail, ".inner table is not created as expected")],
|
|
"views/materialized view/select from source table privilege granted directly or via role/select from implicit target table, privilege granted directly":
|
|
[(Fail, ".inner table is not created as expected")],
|
|
"views/materialized view/select from source table privilege granted directly or via role/select from implicit target table, privilege granted through a role":
|
|
[(Fail, ".inner table is not created as expected")],
|
|
"privileges/alter move/:/:/:/:/move partition to implicit target table of a materialized view":
|
|
[(Fail, ".inner table is not created as expected")],
|
|
"privileges/alter move/:/:/:/:/user without ALTER MOVE PARTITION privilege/":
|
|
[(Fail, issue_16403)],
|
|
"privileges/alter move/:/:/:/:/user with revoked ALTER MOVE PARTITION privilege/":
|
|
[(Fail, issue_16403)],
|
|
}
|
|
|
|
xflags = {
|
|
"privileges/alter index/table_type='ReplicatedVersionedCollapsingMergeTree-sharded_cluster'/role with privileges from role with grant option/granted=:/I try to ALTER INDEX with given privileges/I check order by when privilege is granted":
|
|
(SKIP, 0)
|
|
}
|
|
|
|
@TestModule
|
|
@ArgumentParser(argparser)
|
|
@XFails(xfails)
|
|
@XFlags(xflags)
|
|
@Name("rbac")
|
|
@Specifications(
|
|
SRS_006_ClickHouse_Role_Based_Access_Control
|
|
)
|
|
def regression(self, local, clickhouse_binary_path, stress=None, parallel=None):
|
|
"""RBAC regression.
|
|
"""
|
|
nodes = {
|
|
"clickhouse":
|
|
("clickhouse1", "clickhouse2", "clickhouse3")
|
|
}
|
|
with Cluster(local, clickhouse_binary_path, nodes=nodes) as cluster:
|
|
self.context.cluster = cluster
|
|
self.context.stress = stress
|
|
|
|
if parallel is not None:
|
|
self.context.parallel = parallel
|
|
|
|
Feature(run=load("rbac.tests.syntax.feature", "feature"), flags=TE)
|
|
Feature(run=load("rbac.tests.privileges.feature", "feature"), flags=TE)
|
|
Feature(run=load("rbac.tests.views.feature", "feature"), flags=TE)
|
|
|
|
if main():
|
|
regression()
|