|
| 1 | +# |
| 2 | +# MDEV-XXXXX: Column-level DENY privilege implementation |
| 3 | +# |
| 4 | +CREATE DATABASE deny_col_db; |
| 5 | +CREATE TABLE deny_col_db.sensitive_data ( |
| 6 | +id INT, |
| 7 | +public_info VARCHAR(50), |
| 8 | +salary DECIMAL(10,2), |
| 9 | +ssn VARCHAR(11), |
| 10 | +address VARCHAR(100) |
| 11 | +); |
| 12 | +INSERT INTO deny_col_db.sensitive_data VALUES |
| 13 | +(1, 'John Doe', 75000.00, '123-45-6789', '123 Main St'), |
| 14 | +(2, 'Jane Smith', 85000.00, '987-65-4321', '456 Oak Ave'); |
| 15 | +CREATE USER col_user1@localhost; |
| 16 | +CREATE USER col_user2@localhost; |
| 17 | +# |
| 18 | +# Test 1: Basic column-level DENY |
| 19 | +# |
| 20 | +GRANT SELECT ON deny_col_db.sensitive_data TO col_user1@localhost; |
| 21 | +DENY SELECT (salary, ssn) ON deny_col_db.sensitive_data TO col_user1@localhost; |
| 22 | +connect con1, localhost, col_user1,,deny_col_db; |
| 23 | +SELECT id, public_info FROM sensitive_data; |
| 24 | +id public_info |
| 25 | +1 John Doe |
| 26 | +2 Jane Smith |
| 27 | +SELECT salary FROM sensitive_data; |
| 28 | +ERROR 42000: SELECT command denied to user 'col_user1'@'localhost' for column 'salary' in table 'sensitive_data' |
| 29 | +SELECT ssn FROM sensitive_data; |
| 30 | +ERROR 42000: SELECT command denied to user 'col_user1'@'localhost' for column 'ssn' in table 'sensitive_data' |
| 31 | +SELECT * FROM sensitive_data; |
| 32 | +ERROR 42000: SELECT command denied to user 'col_user1'@'localhost' for column 'id' in table 'sensitive_data' |
| 33 | +SELECT id, salary FROM sensitive_data; |
| 34 | +ERROR 42000: SELECT command denied to user 'col_user1'@'localhost' for column 'salary' in table 'sensitive_data' |
| 35 | +disconnect con1; |
| 36 | +connection default; |
| 37 | +REVOKE SELECT ON deny_col_db.sensitive_data FROM col_user1@localhost; |
| 38 | +REVOKE DENY SELECT (salary, ssn) ON deny_col_db.sensitive_data FROM col_user1@localhost; |
| 39 | +# |
| 40 | +# Test 2: DENY on one column, access to others allowed |
| 41 | +# |
| 42 | +GRANT SELECT ON deny_col_db.sensitive_data TO col_user2@localhost; |
| 43 | +DENY SELECT (ssn) ON deny_col_db.sensitive_data TO col_user2@localhost; |
| 44 | +connect con2, localhost, col_user2,,deny_col_db; |
| 45 | +SELECT id, public_info, salary, address FROM sensitive_data; |
| 46 | +id public_info salary address |
| 47 | +1 John Doe 75000.00 123 Main St |
| 48 | +2 Jane Smith 85000.00 456 Oak Ave |
| 49 | +SELECT ssn FROM sensitive_data; |
| 50 | +ERROR 42000: SELECT command denied to user 'col_user2'@'localhost' for column 'ssn' in table 'sensitive_data' |
| 51 | +SELECT id, ssn FROM sensitive_data; |
| 52 | +ERROR 42000: SELECT command denied to user 'col_user2'@'localhost' for column 'ssn' in table 'sensitive_data' |
| 53 | +SELECT * FROM sensitive_data; |
| 54 | +ERROR 42000: SELECT command denied to user 'col_user2'@'localhost' for column 'id' in table 'sensitive_data' |
| 55 | +disconnect con2; |
| 56 | +connection default; |
| 57 | +REVOKE SELECT ON deny_col_db.sensitive_data FROM col_user2@localhost; |
| 58 | +REVOKE DENY SELECT (ssn) ON deny_col_db.sensitive_data FROM col_user2@localhost; |
| 59 | +# |
| 60 | +# Test 3: Column DENY takes precedence over explicit column GRANT |
| 61 | +# |
| 62 | +GRANT SELECT (salary,id,public_info) ON deny_col_db.sensitive_data TO col_user1@localhost; |
| 63 | +DENY SELECT (salary) ON deny_col_db.sensitive_data TO col_user1@localhost; |
| 64 | +connect con3, localhost, col_user1,,deny_col_db; |
| 65 | +SELECT id, public_info FROM sensitive_data; |
| 66 | +id public_info |
| 67 | +1 John Doe |
| 68 | +2 Jane Smith |
| 69 | +SELECT salary FROM sensitive_data; |
| 70 | +ERROR 42000: SELECT command denied to user 'col_user1'@'localhost' for column 'salary' in table 'sensitive_data' |
| 71 | +disconnect con3; |
| 72 | +connection default; |
| 73 | +REVOKE SELECT (salary,id,public_info) ON deny_col_db.sensitive_data FROM col_user1@localhost; |
| 74 | +REVOKE DENY SELECT (salary) ON deny_col_db.sensitive_data FROM col_user1@localhost; |
| 75 | +# |
| 76 | +# Test 4: REVOKE DENY on a column |
| 77 | +# |
| 78 | +GRANT SELECT (salary) ON deny_col_db.sensitive_data TO col_user1@localhost; |
| 79 | +DENY SELECT (salary,ssn) ON deny_col_db.sensitive_data TO col_user1@localhost; |
| 80 | +REVOKE DENY SELECT (salary) ON deny_col_db.sensitive_data FROM col_user1@localhost; |
| 81 | +connect con4, localhost, col_user1,,deny_col_db; |
| 82 | +SELECT salary FROM sensitive_data; |
| 83 | +salary |
| 84 | +75000.00 |
| 85 | +85000.00 |
| 86 | +SELECT ssn FROM sensitive_data; |
| 87 | +ERROR 42000: SELECT command denied to user 'col_user1'@'localhost' for column 'ssn' in table 'sensitive_data' |
| 88 | +disconnect con4; |
| 89 | +connection default; |
| 90 | +REVOKE DENY SELECT (ssn) ON deny_col_db.sensitive_data FROM col_user1@localhost; |
| 91 | +# |
| 92 | +# Test 5: Multiple column DENYs |
| 93 | +# |
| 94 | +GRANT SELECT ON deny_col_db.sensitive_data TO col_user2@localhost; |
| 95 | +DENY SELECT (salary, ssn, address) ON deny_col_db.sensitive_data TO col_user2@localhost; |
| 96 | +connect con5, localhost, col_user2,,deny_col_db; |
| 97 | +SELECT id, public_info FROM sensitive_data; |
| 98 | +id public_info |
| 99 | +1 John Doe |
| 100 | +2 Jane Smith |
| 101 | +SELECT salary FROM sensitive_data; |
| 102 | +ERROR 42000: SELECT command denied to user 'col_user2'@'localhost' for column 'salary' in table 'sensitive_data' |
| 103 | +SELECT address FROM sensitive_data; |
| 104 | +ERROR 42000: SELECT command denied to user 'col_user2'@'localhost' for column 'address' in table 'sensitive_data' |
| 105 | +SELECT * FROM sensitive_data; |
| 106 | +ERROR 42000: SELECT command denied to user 'col_user2'@'localhost' for column 'id' in table 'sensitive_data' |
| 107 | +disconnect con5; |
| 108 | +connection default; |
| 109 | +# |
| 110 | +# Test 6: DENY one column, then DENY another |
| 111 | +# |
| 112 | +REVOKE DENY SELECT (salary, ssn, address) ON deny_col_db.sensitive_data FROM col_user2@localhost; |
| 113 | +DENY SELECT (salary) ON deny_col_db.sensitive_data TO col_user2@localhost; |
| 114 | +DENY SELECT (ssn) ON deny_col_db.sensitive_data TO col_user2@localhost; |
| 115 | +connect con6, localhost, col_user2,,deny_col_db; |
| 116 | +SELECT id, public_info, address FROM sensitive_data; |
| 117 | +id public_info address |
| 118 | +1 John Doe 123 Main St |
| 119 | +2 Jane Smith 456 Oak Ave |
| 120 | +SELECT salary FROM sensitive_data; |
| 121 | +ERROR 42000: SELECT command denied to user 'col_user2'@'localhost' for column 'salary' in table 'sensitive_data' |
| 122 | +SELECT ssn FROM sensitive_data; |
| 123 | +ERROR 42000: SELECT command denied to user 'col_user2'@'localhost' for column 'ssn' in table 'sensitive_data' |
| 124 | +disconnect con6; |
| 125 | +connection default; |
| 126 | +# |
| 127 | +# Test 7: SHOW GRANTS displays column-level DENY |
| 128 | +# |
| 129 | +SHOW GRANTS FOR col_user1@localhost; |
| 130 | +Grants for col_user1@localhost |
| 131 | +GRANT USAGE ON *.* TO `col_user1`@`localhost` |
| 132 | +GRANT SELECT (`salary`) ON `deny_col_db`.`sensitive_data` TO `col_user1`@`localhost` |
| 133 | +SHOW GRANTS FOR col_user2@localhost; |
| 134 | +Grants for col_user2@localhost |
| 135 | +GRANT USAGE ON *.* TO `col_user2`@`localhost` |
| 136 | +GRANT SELECT ON `deny_col_db`.`sensitive_data` TO `col_user2`@`localhost` |
| 137 | +DENY SELECT (`ssn`, `salary`) ON `deny_col_db`.`sensitive_data` TO `col_user2`@`localhost` |
| 138 | +# |
| 139 | +# Test 8: Column DENY with INSERT/UPDATE operations |
| 140 | +# |
| 141 | +CREATE TABLE deny_col_db.audit_log ( |
| 142 | +id INT AUTO_INCREMENT PRIMARY KEY, |
| 143 | +action VARCHAR(50), |
| 144 | +modified_by VARCHAR(50), |
| 145 | +timestamp TIMESTAMP DEFAULT CURRENT_TIMESTAMP |
| 146 | +); |
| 147 | +GRANT SELECT, INSERT ON deny_col_db.audit_log TO col_user1@localhost; |
| 148 | +DENY INSERT (modified_by) ON deny_col_db.audit_log TO col_user1@localhost; |
| 149 | +connect con8, localhost, col_user1,,deny_col_db; |
| 150 | +INSERT INTO audit_log (action) VALUES ('test_action'); |
| 151 | +INSERT INTO audit_log (action, modified_by) VALUES ('test', 'hacker'); |
| 152 | +ERROR 42000: INSERT command denied to user 'col_user1'@'localhost' for column 'modified_by' in table 'audit_log' |
| 153 | +SELECT * FROM audit_log; |
| 154 | +id action modified_by timestamp |
| 155 | +1 test_action NULL TIMESTAMP |
| 156 | +disconnect con8; |
| 157 | +connection default; |
| 158 | +# |
| 159 | +# Test 9: Column DENY with UPDATE |
| 160 | +# |
| 161 | +GRANT UPDATE ON deny_col_db.sensitive_data TO col_user1@localhost; |
| 162 | +DENY UPDATE (salary) ON deny_col_db.sensitive_data TO col_user1@localhost; |
| 163 | +GRANT SELECT(id,public_info) on deny_col_db.sensitive_data TO col_user1@localhost; |
| 164 | +connect con9, localhost, col_user1,,deny_col_db; |
| 165 | +UPDATE sensitive_data SET public_info = 'Updated' WHERE id = 1; |
| 166 | +UPDATE sensitive_data SET salary = 100000 WHERE id = 1; |
| 167 | +ERROR 42000: UPDATE command denied to user 'col_user1'@'localhost' for column 'salary' in table 'sensitive_data' |
| 168 | +UPDATE sensitive_data SET public_info = 'X', salary = 90000 WHERE id = 2; |
| 169 | +ERROR 42000: UPDATE command denied to user 'col_user1'@'localhost' for column 'salary' in table 'sensitive_data' |
| 170 | +disconnect con9; |
| 171 | +connection default; |
| 172 | +# |
| 173 | +# Test 10: REVOKE all column DENYs |
| 174 | +# |
| 175 | +GRANT SELECT(ssn) on deny_col_db.sensitive_data to col_user1@localhost; |
| 176 | +connect con10, localhost, col_user1,,deny_col_db; |
| 177 | +SELECT ssn FROM sensitive_data; |
| 178 | +ssn |
| 179 | +123-45-6789 |
| 180 | +987-65-4321 |
| 181 | +disconnect con10; |
| 182 | +connection default; |
| 183 | +# |
| 184 | +# Cleanup |
| 185 | +# |
| 186 | +DROP USER col_user1@localhost; |
| 187 | +DROP USER col_user2@localhost; |
| 188 | +DROP DATABASE deny_col_db; |
| 189 | +# |
| 190 | +# End of column-level DENY tests |
| 191 | +# |
0 commit comments