Index: third_party/sqlite/sqlite-src-3080704/test/auth3.test |
diff --git a/third_party/sqlite/sqlite-src-3080704/test/auth3.test b/third_party/sqlite/sqlite-src-3080704/test/auth3.test |
new file mode 100644 |
index 0000000000000000000000000000000000000000..eef10b398f03f43d4b0b62b55cb94aac846c6dcc |
--- /dev/null |
+++ b/third_party/sqlite/sqlite-src-3080704/test/auth3.test |
@@ -0,0 +1,111 @@ |
+# 2008 October 27 |
+# |
+# The author disclaims copyright to this source code. In place of |
+# a legal notice, here is a blessing: |
+# |
+# May you do good and not evil. |
+# May you find forgiveness for yourself and forgive others. |
+# May you share freely, never taking more than you give. |
+# |
+#*********************************************************************** |
+# |
+# Test that the truncate optimization is disabled if the SQLITE_DELETE |
+# authorization callback returns SQLITE_IGNORE. |
+# |
+# $Id: auth3.test,v 1.2 2009/05/04 01:58:31 drh Exp $ |
+# |
+ |
+set testdir [file dirname $argv0] |
+source $testdir/tester.tcl |
+ |
+# disable this test if the SQLITE_OMIT_AUTHORIZATION macro is |
+# defined during compilation. |
+if {[catch {db auth {}} msg]} { |
+ finish_test |
+ return |
+} |
+ |
+# Disable the statement cache for these tests. |
+# |
+db cache size 0 |
+ |
+db authorizer ::auth |
+proc auth {code arg1 arg2 arg3 arg4 args} { |
+ if {$code=="SQLITE_DELETE"} { |
+ return $::authcode |
+ } |
+ return SQLITE_OK |
+} |
+ |
+#-------------------------------------------------------------------------- |
+# The following tests - auth3-1.* - test that return values of SQLITE_DENY, |
+# SQLITE_IGNORE, SQLITE_OK and <invalid> are correctly handled when returned |
+# by an SQLITE_DELETE authorization callback triggered by a |
+# "DELETE FROM <table-name>" statement. |
+# |
+do_test auth3-1.1 { |
+ execsql { |
+ CREATE TABLE t1(a,b,c); |
+ INSERT INTO t1 VALUES(1, 2, 3); |
+ INSERT INTO t1 VALUES(4, 5, 6); |
+ } |
+} {} |
+do_test auth3.1.2 { |
+ set ::authcode SQLITE_DENY |
+ catchsql { DELETE FROM t1 } |
+} {1 {not authorized}} |
+do_test auth3.1.3 { |
+ set ::authcode SQLITE_INVALID |
+ catchsql { DELETE FROM t1 } |
+} {1 {authorizer malfunction}} |
+do_test auth3.1.4 { |
+ execsql { SELECT * FROM t1 } |
+} {1 2 3 4 5 6} |
+do_test auth3-1.5 { |
+ set ::authcode SQLITE_IGNORE |
+ execsql { |
+ DELETE FROM t1; |
+ SELECT * FROM t1; |
+ } |
+} {} |
+do_test auth3-1.6 { |
+ set ::authcode SQLITE_OK |
+ execsql { |
+ INSERT INTO t1 VALUES(1, 2, 3); |
+ INSERT INTO t1 VALUES(4, 5, 6); |
+ DELETE FROM t1; |
+ SELECT * FROM t1; |
+ } |
+} {} |
+ |
+#-------------------------------------------------------------------------- |
+# These tests - auth3-2.* - test that returning SQLITE_IGNORE really does |
+# disable the truncate optimization. |
+# |
+do_test auth3-2.1 { |
+ set ::authcode SQLITE_OK |
+ execsql { |
+ INSERT INTO t1 VALUES(1, 2, 3); |
+ INSERT INTO t1 VALUES(4, 5, 6); |
+ } |
+ set sqlite_search_count 0 |
+ execsql { |
+ DELETE FROM t1; |
+ } |
+ set sqlite_search_count |
+} {0} |
+ |
+do_test auth3-2.2 { |
+ set ::authcode SQLITE_IGNORE |
+ execsql { |
+ INSERT INTO t1 VALUES(1, 2, 3); |
+ INSERT INTO t1 VALUES(4, 5, 6); |
+ } |
+ set sqlite_search_count 0 |
+ execsql { |
+ DELETE FROM t1; |
+ } |
+ set sqlite_search_count |
+} {1} |
+ |
+finish_test |