diff --git a/README.md b/README.md index 80dffcc39..aab8ae510 100644 --- a/README.md +++ b/README.md @@ -90,6 +90,7 @@ JSQLParserBenchmark.parseSQLStatements 5.1 avgt 15 86.592 ± 5.781 m | RDBMS | Statements | |-----------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------------------------------------| | BigQuery
Snowflake
DuckDB
Redshift
Oracle
MS SQL Server and Sybase
Postgres
MySQL and MariaDB
DB2
H2 and HSQLDB and Derby
SQLite | `SELECT`
`INSERT`, `UPDATE`, `UPSERT`, `MERGE`
`DELETE`, `TRUNCATE TABLE`
`CREATE ...`, `ALTER ....`, `DROP ...`
`WITH ...` | +| PostgreSQL Row Level Security | `CREATE POLICY`
`ALTER TABLE ... ENABLE/DISABLE/FORCE/NO FORCE ROW LEVEL SECURITY` | | Salesforce SOQL | `INCLUDES`, `EXCLUDES` | | Piped SQL (also known as FROM SQL) | | diff --git a/src/main/java/net/sf/jsqlparser/statement/StatementVisitor.java b/src/main/java/net/sf/jsqlparser/statement/StatementVisitor.java index 4636cbc8e..9ebab53a8 100644 --- a/src/main/java/net/sf/jsqlparser/statement/StatementVisitor.java +++ b/src/main/java/net/sf/jsqlparser/statement/StatementVisitor.java @@ -17,6 +17,7 @@ import net.sf.jsqlparser.statement.analyze.Analyze; import net.sf.jsqlparser.statement.comment.Comment; import net.sf.jsqlparser.statement.create.index.CreateIndex; +import net.sf.jsqlparser.statement.create.policy.CreatePolicy; import net.sf.jsqlparser.statement.create.schema.CreateSchema; import net.sf.jsqlparser.statement.create.sequence.CreateSequence; import net.sf.jsqlparser.statement.create.synonym.CreateSynonym; @@ -351,4 +352,10 @@ default void visit(LockStatement lock) { this.visit(lock, null); } + T visit(CreatePolicy createPolicy, S context); + + default void visit(CreatePolicy createPolicy) { + this.visit(createPolicy, null); + } + } diff --git a/src/main/java/net/sf/jsqlparser/statement/StatementVisitorAdapter.java b/src/main/java/net/sf/jsqlparser/statement/StatementVisitorAdapter.java index ce0f5c82c..3b12c01c0 100644 --- a/src/main/java/net/sf/jsqlparser/statement/StatementVisitorAdapter.java +++ b/src/main/java/net/sf/jsqlparser/statement/StatementVisitorAdapter.java @@ -21,6 +21,7 @@ import net.sf.jsqlparser.statement.analyze.Analyze; import net.sf.jsqlparser.statement.comment.Comment; import net.sf.jsqlparser.statement.create.index.CreateIndex; +import net.sf.jsqlparser.statement.create.policy.CreatePolicy; import net.sf.jsqlparser.statement.create.schema.CreateSchema; import net.sf.jsqlparser.statement.create.sequence.CreateSequence; import net.sf.jsqlparser.statement.create.synonym.CreateSynonym; @@ -296,6 +297,12 @@ public T visit(LockStatement lock, S context) { return null; } + @Override + public T visit(CreatePolicy createPolicy, S context) { + + return null; + } + @Override public T visit(SetStatement set, S context) { diff --git a/src/main/java/net/sf/jsqlparser/statement/alter/AlterExpression.java b/src/main/java/net/sf/jsqlparser/statement/alter/AlterExpression.java index 372d9c790..336d66b44 100644 --- a/src/main/java/net/sf/jsqlparser/statement/alter/AlterExpression.java +++ b/src/main/java/net/sf/jsqlparser/statement/alter/AlterExpression.java @@ -856,6 +856,14 @@ public String toString() { } else { if (operation == AlterOperation.COMMENT_WITH_EQUAL_SIGN) { b.append("COMMENT =").append(" "); + } else if (operation == AlterOperation.ENABLE_ROW_LEVEL_SECURITY) { + b.append("ENABLE ROW LEVEL SECURITY").append(" "); + } else if (operation == AlterOperation.DISABLE_ROW_LEVEL_SECURITY) { + b.append("DISABLE ROW LEVEL SECURITY").append(" "); + } else if (operation == AlterOperation.FORCE_ROW_LEVEL_SECURITY) { + b.append("FORCE ROW LEVEL SECURITY").append(" "); + } else if (operation == AlterOperation.NO_FORCE_ROW_LEVEL_SECURITY) { + b.append("NO FORCE ROW LEVEL SECURITY").append(" "); } else { b.append(operation).append(" "); } diff --git a/src/main/java/net/sf/jsqlparser/statement/alter/AlterOperation.java b/src/main/java/net/sf/jsqlparser/statement/alter/AlterOperation.java index 839685b1a..48fe639ea 100644 --- a/src/main/java/net/sf/jsqlparser/statement/alter/AlterOperation.java +++ b/src/main/java/net/sf/jsqlparser/statement/alter/AlterOperation.java @@ -10,7 +10,7 @@ package net.sf.jsqlparser.statement.alter; public enum AlterOperation { - ADD, ALTER, DROP, DROP_PRIMARY_KEY, DROP_UNIQUE, DROP_FOREIGN_KEY, MODIFY, CHANGE, CONVERT, COLLATE, ALGORITHM, RENAME, RENAME_TABLE, RENAME_INDEX, RENAME_KEY, RENAME_CONSTRAINT, COMMENT, COMMENT_WITH_EQUAL_SIGN, UNSPECIFIC, ADD_PARTITION, DROP_PARTITION, DISCARD_PARTITION, IMPORT_PARTITION, TRUNCATE_PARTITION, COALESCE_PARTITION, REORGANIZE_PARTITION, EXCHANGE_PARTITION, ANALYZE_PARTITION, CHECK_PARTITION, OPTIMIZE_PARTITION, REBUILD_PARTITION, REPAIR_PARTITION, REMOVE_PARTITIONING, PARTITION_BY, SET_TABLE_OPTION, ENGINE, FORCE, KEY_BLOCK_SIZE, LOCK, DISCARD_TABLESPACE, IMPORT_TABLESPACE, DISABLE_KEYS, ENABLE_KEYS; + ADD, ALTER, DROP, DROP_PRIMARY_KEY, DROP_UNIQUE, DROP_FOREIGN_KEY, MODIFY, CHANGE, CONVERT, COLLATE, ALGORITHM, RENAME, RENAME_TABLE, RENAME_INDEX, RENAME_KEY, RENAME_CONSTRAINT, COMMENT, COMMENT_WITH_EQUAL_SIGN, UNSPECIFIC, ADD_PARTITION, DROP_PARTITION, DISCARD_PARTITION, IMPORT_PARTITION, TRUNCATE_PARTITION, COALESCE_PARTITION, REORGANIZE_PARTITION, EXCHANGE_PARTITION, ANALYZE_PARTITION, CHECK_PARTITION, OPTIMIZE_PARTITION, REBUILD_PARTITION, REPAIR_PARTITION, REMOVE_PARTITIONING, PARTITION_BY, SET_TABLE_OPTION, ENGINE, FORCE, KEY_BLOCK_SIZE, LOCK, DISCARD_TABLESPACE, IMPORT_TABLESPACE, DISABLE_KEYS, ENABLE_KEYS, ENABLE_ROW_LEVEL_SECURITY, DISABLE_ROW_LEVEL_SECURITY, FORCE_ROW_LEVEL_SECURITY, NO_FORCE_ROW_LEVEL_SECURITY; public static AlterOperation from(String operation) { return Enum.valueOf(AlterOperation.class, operation.toUpperCase()); diff --git a/src/main/java/net/sf/jsqlparser/statement/create/policy/CreatePolicy.java b/src/main/java/net/sf/jsqlparser/statement/create/policy/CreatePolicy.java new file mode 100644 index 000000000..7c11636aa --- /dev/null +++ b/src/main/java/net/sf/jsqlparser/statement/create/policy/CreatePolicy.java @@ -0,0 +1,131 @@ +/*- + * #%L + * JSQLParser library + * %% + * Copyright (C) 2004 - 2025 JSQLParser + * %% + * Dual licensed under GNU LGPL 2.1 or Apache License 2.0 + * #L% + */ +package net.sf.jsqlparser.statement.create.policy; + +import net.sf.jsqlparser.expression.Expression; +import net.sf.jsqlparser.schema.Table; +import net.sf.jsqlparser.statement.Statement; +import net.sf.jsqlparser.statement.StatementVisitor; + +import java.util.ArrayList; +import java.util.List; + +/** + * PostgreSQL CREATE POLICY statement for Row Level Security (RLS). + * + * Syntax: CREATE POLICY name ON table_name [ FOR { ALL | SELECT | INSERT | UPDATE | DELETE } ] [ TO + * { role_name | PUBLIC | CURRENT_USER | SESSION_USER } [, ...] ] [ USING ( using_expression ) ] [ + * WITH CHECK ( check_expression ) ] + */ +public class CreatePolicy implements Statement { + + private String policyName; + private Table table; + private String command; // ALL, SELECT, INSERT, UPDATE, DELETE + private List roles = new ArrayList<>(); + private Expression usingExpression; + private Expression withCheckExpression; + + public String getPolicyName() { + return policyName; + } + + public CreatePolicy setPolicyName(String policyName) { + this.policyName = policyName; + return this; + } + + public Table getTable() { + return table; + } + + public CreatePolicy setTable(Table table) { + this.table = table; + return this; + } + + public String getCommand() { + return command; + } + + public CreatePolicy setCommand(String command) { + this.command = command; + return this; + } + + public List getRoles() { + return roles; + } + + public CreatePolicy setRoles(List roles) { + this.roles = roles; + return this; + } + + public CreatePolicy addRole(String role) { + this.roles.add(role); + return this; + } + + public Expression getUsingExpression() { + return usingExpression; + } + + public CreatePolicy setUsingExpression(Expression usingExpression) { + this.usingExpression = usingExpression; + return this; + } + + public Expression getWithCheckExpression() { + return withCheckExpression; + } + + public CreatePolicy setWithCheckExpression(Expression withCheckExpression) { + this.withCheckExpression = withCheckExpression; + return this; + } + + @Override + public T accept(StatementVisitor statementVisitor, S context) { + return statementVisitor.visit(this, context); + } + + @Override + public String toString() { + StringBuilder builder = new StringBuilder("CREATE POLICY "); + builder.append(policyName); + builder.append(" ON "); + builder.append(table.toString()); + + if (command != null) { + builder.append(" FOR ").append(command); + } + + if (roles != null && !roles.isEmpty()) { + builder.append(" TO "); + for (int i = 0; i < roles.size(); i++) { + if (i > 0) { + builder.append(", "); + } + builder.append(roles.get(i)); + } + } + + if (usingExpression != null) { + builder.append(" USING (").append(usingExpression.toString()).append(")"); + } + + if (withCheckExpression != null) { + builder.append(" WITH CHECK (").append(withCheckExpression.toString()).append(")"); + } + + return builder.toString(); + } +} diff --git a/src/main/java/net/sf/jsqlparser/util/TablesNamesFinder.java b/src/main/java/net/sf/jsqlparser/util/TablesNamesFinder.java index b062d2503..020332caf 100644 --- a/src/main/java/net/sf/jsqlparser/util/TablesNamesFinder.java +++ b/src/main/java/net/sf/jsqlparser/util/TablesNamesFinder.java @@ -90,6 +90,7 @@ import net.sf.jsqlparser.statement.analyze.Analyze; import net.sf.jsqlparser.statement.comment.Comment; import net.sf.jsqlparser.statement.create.index.CreateIndex; +import net.sf.jsqlparser.statement.create.policy.CreatePolicy; import net.sf.jsqlparser.statement.create.schema.CreateSchema; import net.sf.jsqlparser.statement.create.sequence.CreateSequence; import net.sf.jsqlparser.statement.create.synonym.CreateSynonym; @@ -1845,4 +1846,28 @@ public Void visit(LockStatement lock, S context) { public void visit(LockStatement lock) { StatementVisitor.super.visit(lock); } + + @Override + public Void visit(CreatePolicy createPolicy, S context) { + if (createPolicy.getTable() != null) { + visit(createPolicy.getTable(), context); + } + + // Visit USING expression to find tables in subqueries + if (createPolicy.getUsingExpression() != null) { + createPolicy.getUsingExpression().accept(this, context); + } + + // Visit WITH CHECK expression to find tables in subqueries + if (createPolicy.getWithCheckExpression() != null) { + createPolicy.getWithCheckExpression().accept(this, context); + } + + return null; + } + + @Override + public void visit(CreatePolicy createPolicy) { + StatementVisitor.super.visit(createPolicy); + } } diff --git a/src/main/java/net/sf/jsqlparser/util/deparser/StatementDeParser.java b/src/main/java/net/sf/jsqlparser/util/deparser/StatementDeParser.java index a27aee7af..751c4bf64 100644 --- a/src/main/java/net/sf/jsqlparser/util/deparser/StatementDeParser.java +++ b/src/main/java/net/sf/jsqlparser/util/deparser/StatementDeParser.java @@ -42,6 +42,7 @@ import net.sf.jsqlparser.statement.analyze.Analyze; import net.sf.jsqlparser.statement.comment.Comment; import net.sf.jsqlparser.statement.create.index.CreateIndex; +import net.sf.jsqlparser.statement.create.policy.CreatePolicy; import net.sf.jsqlparser.statement.create.schema.CreateSchema; import net.sf.jsqlparser.statement.create.sequence.CreateSequence; import net.sf.jsqlparser.statement.create.synonym.CreateSynonym; @@ -520,4 +521,10 @@ public StringBuilder visit(LockStatement lock, S context) { builder.append(lock.toString()); return builder; } + + @Override + public StringBuilder visit(CreatePolicy createPolicy, S context) { + builder.append(createPolicy.toString()); + return builder; + } } diff --git a/src/main/java/net/sf/jsqlparser/util/validation/validator/StatementValidator.java b/src/main/java/net/sf/jsqlparser/util/validation/validator/StatementValidator.java index e6c42ab48..9e073a227 100644 --- a/src/main/java/net/sf/jsqlparser/util/validation/validator/StatementValidator.java +++ b/src/main/java/net/sf/jsqlparser/util/validation/validator/StatementValidator.java @@ -39,6 +39,7 @@ import net.sf.jsqlparser.statement.comment.Comment; import net.sf.jsqlparser.statement.create.function.CreateFunction; import net.sf.jsqlparser.statement.create.index.CreateIndex; +import net.sf.jsqlparser.statement.create.policy.CreatePolicy; import net.sf.jsqlparser.statement.create.procedure.CreateProcedure; import net.sf.jsqlparser.statement.create.schema.CreateSchema; import net.sf.jsqlparser.statement.create.sequence.CreateSequence; @@ -589,4 +590,14 @@ public void visit(Import imprt) { public void visit(Export export) { visit(export, null); } + + @Override + public Void visit(CreatePolicy createPolicy, S context) { + // TODO: not yet implemented + return null; + } + + public void visit(CreatePolicy createPolicy) { + visit(createPolicy, null); + } } diff --git a/src/main/jjtree/net/sf/jsqlparser/parser/JSqlParserCC.jjt b/src/main/jjtree/net/sf/jsqlparser/parser/JSqlParserCC.jjt index 0f2dd1df6..36f60ed58 100644 --- a/src/main/jjtree/net/sf/jsqlparser/parser/JSqlParserCC.jjt +++ b/src/main/jjtree/net/sf/jsqlparser/parser/JSqlParserCC.jjt @@ -50,6 +50,7 @@ import net.sf.jsqlparser.statement.alter.sequence.*; import net.sf.jsqlparser.statement.comment.*; import net.sf.jsqlparser.statement.create.function.*; import net.sf.jsqlparser.statement.create.index.*; +import net.sf.jsqlparser.statement.create.policy.*; import net.sf.jsqlparser.statement.create.procedure.*; import net.sf.jsqlparser.statement.create.schema.*; import net.sf.jsqlparser.statement.create.synonym.*; @@ -453,6 +454,7 @@ TOKEN: /* SQL Keywords. prefixed with K_ to avoid name clashes */ | | | +| | | | @@ -541,6 +543,7 @@ TOKEN: /* SQL Keywords. prefixed with K_ to avoid name clashes */ | | | +| | | | @@ -590,6 +593,7 @@ TOKEN: /* SQL Keywords. prefixed with K_ to avoid name clashes */ | | | +| | | | @@ -3268,7 +3272,7 @@ String RelObjectNameWithoutValue() : { Token tk = null; } { ( tk= | tk= | tk= | tk= | tk= | tk= | tk= | tk= | tk= - | tk="ACTION" | tk="ACTIVE" | tk="ADD" | tk="ADVANCE" | tk="ADVISE" | tk="AGAINST" | tk="AGGREGATE" | tk="ALGORITHM" | tk="ALIGN" | tk="ALTER" | tk="ALWAYS" | tk="ANALYZE" | tk="APPEND_ONLY" | tk="APPLY" | tk="APPROXIMATE" | tk="ARCHIVE" | tk="ARRAY" | tk="ASC" | tk="ASYMMETRIC" | tk="AT" | tk="AUTHORIZATION" | tk="AUTO" | tk="AUTO_INCREMENT" | tk="AZURE" | tk="BASE64" | tk="BEFORE" | tk="BEGIN" | tk="BERNOULLI" | tk="BINARY" | tk="BIT" | tk="BLOBSTORAGE" | tk="BLOCK" | tk="BOOLEAN" | tk="BRANCH" | tk="BROWSE" | tk="BUFFERS" | tk="BY" | tk="BYTE" | tk="BYTES" | tk="CACHE" | tk="CALL" | tk="CASCADE" | tk="CASE" | tk="CAST" | tk="CERTIFICATE" | tk="CHANGE" | tk="CHANGES" | tk="CHAR" | tk="CHARACTER" | tk="CHECKPOINT" | tk="CLOSE" | tk="CLOUD" | tk="COALESCE" | tk="COLLATE" | tk="COLUMN" | tk="COLUMNS" | tk="COMMENT" | tk="COMMENTS" | tk="COMMIT" | tk="CONCURRENTLY" | tk="CONFLICT" | tk="CONSTRAINTS" | tk="CONVERT" | tk="CORRESPONDING" | tk="COSTS" | tk="COUNT" | tk="CREATED" | tk="CS" | tk="CYCLE" | tk="DATA" | tk="DATABASE" | tk="DATETIME" | tk="DBA_RECYCLEBIN" | tk="DDL" | tk="DECLARE" | tk="DEFAULTS" | tk="DEFERRABLE" | tk="DELAYED" | tk="DELETE" | tk="DELIMIT" | tk="DELIMITER" | tk="DESC" | tk="DESCRIBE" | tk="DISABLE" | tk="DISCARD" | tk="DISCONNECT" | tk="DIV" | tk="DML" | tk="DO" | tk="DOMAIN" | tk="DRIVER" | tk="DROP" | tk="DUMP" | tk="DUPLICATE" | tk="ELEMENTS" | tk="EMIT" | tk="ENABLE" | tk="ENCODING" | tk="ENCRYPTION" | tk="END" | tk="ENFORCED" | tk="ENGINE" | tk="ERROR" | tk="ESCAPE" | tk="EXA" | tk="EXCHANGE" | tk="EXCLUDE" | tk="EXCLUDING" | tk="EXCLUSIVE" | tk="EXEC" | tk="EXECUTE" | tk="EXPLAIN" | tk="EXPLICIT" | tk="EXPORT" | tk="EXTENDED" | tk="EXTRACT" | tk="FILTER" | tk="FIRST" | tk="FLUSH" | tk="FN" | tk="FOLLOWING" | tk="FORMAT" | tk="FULLTEXT" | tk="FUNCTION" | tk="GRANT" | tk="GROUP_CONCAT" | tk="GUARD" | tk="HASH" | tk="HIGH" | tk="HIGH_PRIORITY" | tk="HISTORY" | tk="HOPPING" | tk="IDENTIFIED" | tk="IDENTITY" | tk="INCLUDE" | tk="INCLUDE_NULL_VALUES" | tk="INCLUDING" | tk="INCREMENT" | tk="INDEX" | tk="INFORMATION" | tk="INSERT" | tk="INTERLEAVE" | tk="INTERPRET" | tk="INVALIDATE" | tk="INVERSE" | tk="INVISIBLE" | tk="ISNULL" | tk="JDBC" | tk="JSON" | tk="JSON_ARRAY" | tk="JSON_ARRAYAGG" | tk="JSON_OBJECT" | tk="JSON_OBJECTAGG" | tk="KEEP" | tk="KEY" | tk="KEYS" | tk="KEY_BLOCK_SIZE" | tk="KILL" | tk="LAST" | tk="LEADING" | tk="LESS" | tk="LINK" | tk="LOCAL" | tk="LOCK" | tk="LOCKED" | tk="LOG" | tk="LONGTEXT" | tk="LOOP" | tk="LOW" | tk="LOW_PRIORITY" | tk="LTRIM" | tk="MATCH" | tk="MATCHED" | tk="MATCH_ALL" | tk="MATCH_ANY" | tk="MATCH_PHRASE" | tk="MATCH_PHRASE_PREFIX" | tk="MATCH_REGEXP" | tk="MATERIALIZED" | tk="MAX" | tk="MAXVALUE" | tk="MEDIUMTEXT" | tk="MEMBER" | tk="MERGE" | tk="MIN" | tk="MINVALUE" | tk="MODE" | tk="MODIFY" | tk="MOVEMENT" | tk="NAME" | tk="NAMES" | tk="NEVER" | tk="NEXT" | tk="NO" | tk="NOCACHE" | tk="NOKEEP" | tk="NOLOCK" | tk="NOMAXVALUE" | tk="NOMINVALUE" | tk="NONE" | tk="NOORDER" | tk="NOTHING" | tk="NOTNULL" | tk="NOVALIDATE" | tk="NOWAIT" | tk="NULLS" | tk="OF" | tk="OFF" | tk="OPEN" | tk="ORA" | tk="ORDINALITY" | tk="OVER" | tk="OVERFLOW" | tk="OVERLAPS" | tk="OVERRIDING" | tk="OVERWRITE" | tk="PADDING" | tk="PARALLEL" | tk="PARENT" | tk="PARSER" | tk="PARTITION" | tk="PARTITIONING" | tk="PATH" | tk="PERCENT" | tk="PLACING" | tk="PLAN" | tk="PLUS" | tk="PRECEDING" | tk="PRIMARY" | tk="PURGE" | tk="QUERY" | tk="QUICK" | tk="QUIESCE" | tk="RANGE" | tk="RAW" | tk="READ" | tk="REBUILD" | tk="RECURSIVE" | tk="RECYCLEBIN" | tk="REFERENCES" | tk="REFRESH" | tk="REGEXP" | tk="REGEXP_LIKE" | tk="REGISTER" | tk="REJECT" | tk="REMOTE" | tk="REMOVE" | tk="RENAME" | tk="REORGANIZE" | tk="REPAIR" | tk="REPEATABLE" | tk="REPLACE" | tk="RESET" | tk="RESPECT" | tk="RESTART" | tk="RESTRICT" | tk="RESTRICTED" | tk="RESUMABLE" | tk="RESUME" | tk="RETURN" | tk="RLIKE" | tk="ROLLBACK" | tk="ROLLUP" | tk="ROOT" | tk="ROW" | tk="ROWS" | tk="RR" | tk="RS" | tk="RTRIM" | tk="SAFE_CAST" | tk="SAFE_CONVERT" | tk="SAVEPOINT" | tk="SCHEMA" | tk="SECURE" | tk="SEED" | tk="SEPARATOR" | tk="SEQUENCE" | tk="SESSION" | tk="SETS" | tk="SHARE" | tk="SHOW" | tk="SHUTDOWN" | tk="SIBLINGS" | tk="SIGNED" | tk="SIMILAR" | tk="SIZE" | tk="SKIP" | tk="SPATIAL" | tk="STORED" | tk="STREAM" | tk="STRICT" | tk="STRING" | tk="STRUCT" | tk="SUMMARIZE" | tk="SUSPEND" | tk="SWITCH" | tk="SYMMETRIC" | tk="SYNONYM" | tk="SYSTEM" | tk="SYSTEM_TIME" | tk="SYSTEM_TIMESTAMP" | tk="SYSTEM_VERSION" | tk="TABLE" | tk="TABLESPACE" | tk="TEMP" | tk="TEMPORARY" | tk="TEXT" | tk="THAN" | tk="THEN" | tk="TIMEOUT" | tk="TIMESTAMPTZ" | tk="TIMEZONE" | tk="TINYTEXT" | tk="TO" | tk="TRIGGER" | tk="TRUNCATE" | tk="TRY_CAST" | tk="TRY_CONVERT" | tk="TUMBLING" | tk="TYPE" | tk="UNLIMITED" | tk="UNLOGGED" | tk="UNQIESCE" | tk="UNSIGNED" | tk="UPDATE" | tk="UPSERT" | tk="UR" | tk="USER" | tk="VALIDATE" | tk="VALIDATION" | tk="VERBOSE" | tk="VERSION" | tk="VIEW" | tk="VISIBLE" | tk="VOLATILE" | tk="WAIT" | tk="WITHIN" | tk="WITHOUT" | tk="WITHOUT_ARRAY_WRAPPER" | tk="WORK" | tk="XML" | tk="XMLAGG" | tk="XMLDATA" | tk="XMLSCHEMA" | tk="XMLTEXT" | tk="XSINIL" | tk="YAML" | tk="YES" | tk="ZONE" ) + | tk="ACTION" | tk="ACTIVE" | tk="ADD" | tk="ADVANCE" | tk="ADVISE" | tk="AGAINST" | tk="AGGREGATE" | tk="ALGORITHM" | tk="ALIGN" | tk="ALTER" | tk="ALWAYS" | tk="ANALYZE" | tk="APPEND_ONLY" | tk="APPLY" | tk="APPROXIMATE" | tk="ARCHIVE" | tk="ARRAY" | tk="ASC" | tk="ASYMMETRIC" | tk="AT" | tk="AUTHORIZATION" | tk="AUTO" | tk="AUTO_INCREMENT" | tk="AZURE" | tk="BASE64" | tk="BEFORE" | tk="BEGIN" | tk="BERNOULLI" | tk="BINARY" | tk="BIT" | tk="BLOBSTORAGE" | tk="BLOCK" | tk="BOOLEAN" | tk="BRANCH" | tk="BROWSE" | tk="BUFFERS" | tk="BY" | tk="BYTE" | tk="BYTES" | tk="CACHE" | tk="CALL" | tk="CASCADE" | tk="CASE" | tk="CAST" | tk="CERTIFICATE" | tk="CHANGE" | tk="CHANGES" | tk="CHAR" | tk="CHARACTER" | tk="CHECKPOINT" | tk="CLOSE" | tk="CLOUD" | tk="COALESCE" | tk="COLLATE" | tk="COLUMN" | tk="COLUMNS" | tk="COMMENT" | tk="COMMENTS" | tk="COMMIT" | tk="CONCURRENTLY" | tk="CONFLICT" | tk="CONSTRAINTS" | tk="CONVERT" | tk="CORRESPONDING" | tk="COSTS" | tk="COUNT" | tk="CREATED" | tk="CS" | tk="CYCLE" | tk="DATA" | tk="DATABASE" | tk="DATETIME" | tk="DBA_RECYCLEBIN" | tk="DDL" | tk="DECLARE" | tk="DEFAULTS" | tk="DEFERRABLE" | tk="DELAYED" | tk="DELETE" | tk="DELIMIT" | tk="DELIMITER" | tk="DESC" | tk="DESCRIBE" | tk="DISABLE" | tk="DISCARD" | tk="DISCONNECT" | tk="DIV" | tk="DML" | tk="DO" | tk="DOMAIN" | tk="DRIVER" | tk="DROP" | tk="DUMP" | tk="DUPLICATE" | tk="ELEMENTS" | tk="EMIT" | tk="ENABLE" | tk="ENCODING" | tk="ENCRYPTION" | tk="END" | tk="ENFORCED" | tk="ENGINE" | tk="ERROR" | tk="ESCAPE" | tk="EXA" | tk="EXCHANGE" | tk="EXCLUDE" | tk="EXCLUDING" | tk="EXCLUSIVE" | tk="EXEC" | tk="EXECUTE" | tk="EXPLAIN" | tk="EXPLICIT" | tk="EXPORT" | tk="EXTENDED" | tk="EXTRACT" | tk="FILTER" | tk="FIRST" | tk="FLUSH" | tk="FN" | tk="FOLLOWING" | tk="FORMAT" | tk="FULLTEXT" | tk="FUNCTION" | tk="GRANT" | tk="GROUP_CONCAT" | tk="GUARD" | tk="HASH" | tk="HIGH" | tk="HIGH_PRIORITY" | tk="HISTORY" | tk="HOPPING" | tk="IDENTIFIED" | tk="IDENTITY" | tk="INCLUDE" | tk="INCLUDE_NULL_VALUES" | tk="INCLUDING" | tk="INCREMENT" | tk="INDEX" | tk="INFORMATION" | tk="INSERT" | tk="INTERLEAVE" | tk="INTERPRET" | tk="INVALIDATE" | tk="INVERSE" | tk="INVISIBLE" | tk="ISNULL" | tk="JDBC" | tk="JSON" | tk="JSON_ARRAY" | tk="JSON_ARRAYAGG" | tk="JSON_OBJECT" | tk="JSON_OBJECTAGG" | tk="KEEP" | tk="KEY" | tk="KEYS" | tk="KEY_BLOCK_SIZE" | tk="KILL" | tk="LAST" | tk="LEADING" | tk="LESS" | tk="LEVEL" | tk="LINK" | tk="LOCAL" | tk="LOCK" | tk="LOCKED" | tk="LOG" | tk="LONGTEXT" | tk="LOOP" | tk="LOW" | tk="LOW_PRIORITY" | tk="LTRIM" | tk="MATCH" | tk="MATCHED" | tk="MATCH_ALL" | tk="MATCH_ANY" | tk="MATCH_PHRASE" | tk="MATCH_PHRASE_PREFIX" | tk="MATCH_REGEXP" | tk="MATERIALIZED" | tk="MAX" | tk="MAXVALUE" | tk="MEDIUMTEXT" | tk="MEMBER" | tk="MERGE" | tk="MIN" | tk="MINVALUE" | tk="MODE" | tk="MODIFY" | tk="MOVEMENT" | tk="NAME" | tk="NAMES" | tk="NEVER" | tk="NEXT" | tk="NO" | tk="NOCACHE" | tk="NOKEEP" | tk="NOLOCK" | tk="NOMAXVALUE" | tk="NOMINVALUE" | tk="NONE" | tk="NOORDER" | tk="NOTHING" | tk="NOTNULL" | tk="NOVALIDATE" | tk="NOWAIT" | tk="NULLS" | tk="OF" | tk="OFF" | tk="OPEN" | tk="ORA" | tk="ORDINALITY" | tk="OVER" | tk="OVERFLOW" | tk="OVERLAPS" | tk="OVERRIDING" | tk="OVERWRITE" | tk="PADDING" | tk="PARALLEL" | tk="PARENT" | tk="PARSER" | tk="PARTITION" | tk="PARTITIONING" | tk="PATH" | tk="PERCENT" | tk="PLACING" | tk="PLAN" | tk="PLUS" | tk="POLICY" | tk="PRECEDING" | tk="PRIMARY" | tk="PURGE" | tk="QUERY" | tk="QUICK" | tk="QUIESCE" | tk="RANGE" | tk="RAW" | tk="READ" | tk="REBUILD" | tk="RECURSIVE" | tk="RECYCLEBIN" | tk="REFERENCES" | tk="REFRESH" | tk="REGEXP" | tk="REGEXP_LIKE" | tk="REGISTER" | tk="REJECT" | tk="REMOTE" | tk="REMOVE" | tk="RENAME" | tk="REORGANIZE" | tk="REPAIR" | tk="REPEATABLE" | tk="REPLACE" | tk="RESET" | tk="RESPECT" | tk="RESTART" | tk="RESTRICT" | tk="RESTRICTED" | tk="RESUMABLE" | tk="RESUME" | tk="RETURN" | tk="RLIKE" | tk="ROLLBACK" | tk="ROLLUP" | tk="ROOT" | tk="ROW" | tk="ROWS" | tk="RR" | tk="RS" | tk="RTRIM" | tk="SAFE_CAST" | tk="SAFE_CONVERT" | tk="SAVEPOINT" | tk="SCHEMA" | tk="SECURE" | tk="SECURITY" | tk="SEED" | tk="SEPARATOR" | tk="SEQUENCE" | tk="SESSION" | tk="SETS" | tk="SHARE" | tk="SHOW" | tk="SHUTDOWN" | tk="SIBLINGS" | tk="SIGNED" | tk="SIMILAR" | tk="SIZE" | tk="SKIP" | tk="SPATIAL" | tk="STORED" | tk="STREAM" | tk="STRICT" | tk="STRING" | tk="STRUCT" | tk="SUMMARIZE" | tk="SUSPEND" | tk="SWITCH" | tk="SYMMETRIC" | tk="SYNONYM" | tk="SYSTEM" | tk="SYSTEM_TIME" | tk="SYSTEM_TIMESTAMP" | tk="SYSTEM_VERSION" | tk="TABLE" | tk="TABLESPACE" | tk="TEMP" | tk="TEMPORARY" | tk="TEXT" | tk="THAN" | tk="THEN" | tk="TIMEOUT" | tk="TIMESTAMPTZ" | tk="TIMEZONE" | tk="TINYTEXT" | tk="TO" | tk="TRIGGER" | tk="TRUNCATE" | tk="TRY_CAST" | tk="TRY_CONVERT" | tk="TUMBLING" | tk="TYPE" | tk="UNLIMITED" | tk="UNLOGGED" | tk="UNQIESCE" | tk="UNSIGNED" | tk="UPDATE" | tk="UPSERT" | tk="UR" | tk="USER" | tk="VALIDATE" | tk="VALIDATION" | tk="VERBOSE" | tk="VERSION" | tk="VIEW" | tk="VISIBLE" | tk="VOLATILE" | tk="WAIT" | tk="WITHIN" | tk="WITHOUT" | tk="WITHOUT_ARRAY_WRAPPER" | tk="WORK" | tk="XML" | tk="XMLAGG" | tk="XMLDATA" | tk="XMLSCHEMA" | tk="XMLTEXT" | tk="XSINIL" | tk="YAML" | tk="YES" | tk="ZONE" ) { return tk.image; } } @@ -3292,7 +3296,8 @@ String RelObjectNameWithoutStart() : { Token tk = null; String result = null; } { (result = RelObjectNameWithoutValue() | tk= | tk= | tk= - | tk= ) + | tk= + ) { return tk!=null ? tk.image : result; } } @@ -9491,7 +9496,19 @@ AlterExpression AlterExpression(): ) ) | - ( + LOOKAHEAD(5) ( + { + alterExp.setOperation(AlterOperation.FORCE_ROW_LEVEL_SECURITY); + } + ) + | + LOOKAHEAD(5) ( + { + alterExp.setOperation(AlterOperation.NO_FORCE_ROW_LEVEL_SECURITY); + } + ) + | + LOOKAHEAD(1) ( { alterExp.setOperation(AlterOperation.FORCE); } ) | @@ -9641,16 +9658,28 @@ AlterExpression AlterExpression(): ) ) | - ( - (tk = ) - (tk2 = ) { + + LOOKAHEAD(4) ( + { + alterExp.setOperation(AlterOperation.DISABLE_ROW_LEVEL_SECURITY); + } + ) + | + LOOKAHEAD(2) ( + { alterExp.setOperation(AlterOperation.DISABLE_KEYS); } ) + | - ( - (tk = ) - (tk2 = ) { + LOOKAHEAD(4) ( + { + alterExp.setOperation(AlterOperation.ENABLE_ROW_LEVEL_SECURITY); + } + ) + | + LOOKAHEAD(2) ( + { alterExp.setOperation(AlterOperation.ENABLE_KEYS); } ) @@ -10326,6 +10355,8 @@ Statement Create(): | LOOKAHEAD(2) statement = CreateView(isUsingOrReplace) | + statement = CreatePolicy() + | // @fixme: must appear with TRIGGER before INDEX or it will collide with INDEX's CreateParameter() production ( tk= | tk= ) captureRest = captureRest() { @@ -10406,6 +10437,45 @@ Synonym Synonym() #Synonym : } } +CreatePolicy CreatePolicy() #CreatePolicy: +{ + CreatePolicy createPolicy = new CreatePolicy(); + String policyName; + Table table; + Token commandToken = null; + String roleName; + Expression usingExpr = null; + Expression checkExpr = null; +} +{ + policyName=RelObjectName() { createPolicy.setPolicyName(policyName); } + table=Table() { createPolicy.setTable(table); } + + [ + ( commandToken= + | commandToken= + | commandToken= + | commandToken= + | commandToken= + ) + { createPolicy.setCommand(commandToken.image); } + ] + + [ + roleName=RelObjectName() { createPolicy.addRole(roleName); } + ( "," roleName=RelObjectName() { createPolicy.addRole(roleName); } )* + ] + + [ "(" usingExpr=Expression() ")" { createPolicy.setUsingExpression(usingExpr); } ] + + [ LOOKAHEAD(2) "(" checkExpr=Expression() ")" { createPolicy.setWithCheckExpression(checkExpr); } ] + + { + + return createPolicy; + } +} + UnsupportedStatement UnsupportedStatement(): { List tokens = new LinkedList(); diff --git a/src/test/java/net/sf/jsqlparser/expression/DateUnitExpressionTest.java b/src/test/java/net/sf/jsqlparser/expression/DateUnitExpressionTest.java index 054b25e9a..164c9e112 100644 --- a/src/test/java/net/sf/jsqlparser/expression/DateUnitExpressionTest.java +++ b/src/test/java/net/sf/jsqlparser/expression/DateUnitExpressionTest.java @@ -1,3 +1,12 @@ +/*- + * #%L + * JSQLParser library + * %% + * Copyright (C) 2004 - 2025 JSQLParser + * %% + * Dual licensed under GNU LGPL 2.1 or Apache License 2.0 + * #L% + */ package net.sf.jsqlparser.expression; import net.sf.jsqlparser.JSQLParserException; diff --git a/src/test/java/net/sf/jsqlparser/statement/alter/AlterRowLevelSecurityTest.java b/src/test/java/net/sf/jsqlparser/statement/alter/AlterRowLevelSecurityTest.java new file mode 100644 index 000000000..d91cd6341 --- /dev/null +++ b/src/test/java/net/sf/jsqlparser/statement/alter/AlterRowLevelSecurityTest.java @@ -0,0 +1,115 @@ +/*- + * #%L + * JSQLParser library + * %% + * Copyright (C) 2004 - 2025 JSQLParser + * %% + * Dual licensed under GNU LGPL 2.1 or Apache License 2.0 + * #L% + */ +package net.sf.jsqlparser.statement.alter; + +import net.sf.jsqlparser.JSQLParserException; +import net.sf.jsqlparser.parser.CCJSqlParserUtil; +import net.sf.jsqlparser.statement.Statement; +import org.junit.jupiter.api.Test; + +import static net.sf.jsqlparser.test.TestUtils.assertSqlCanBeParsedAndDeparsed; +import static org.junit.jupiter.api.Assertions.*; + +/** + * Tests for PostgreSQL ALTER TABLE ... ROW LEVEL SECURITY statements + */ +public class AlterRowLevelSecurityTest { + + @Test + public void testEnableRowLevelSecurity() throws JSQLParserException { + String sql = "ALTER TABLE table1 ENABLE ROW LEVEL SECURITY"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + Statement stmt = CCJSqlParserUtil.parse(sql); + assertInstanceOf(Alter.class, stmt); + Alter alter = (Alter) stmt; + assertEquals("table1", alter.getTable().getName()); + assertEquals(AlterOperation.ENABLE_ROW_LEVEL_SECURITY, + alter.getAlterExpressions().get(0).getOperation()); + } + + @Test + public void testEnableRowLevelSecurityWithSchema() throws JSQLParserException { + String sql = "ALTER TABLE customer_custom_data.phone_opt_out ENABLE ROW LEVEL SECURITY"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + Alter alter = (Alter) CCJSqlParserUtil.parse(sql); + assertEquals("customer_custom_data.phone_opt_out", + alter.getTable().getFullyQualifiedName()); + assertEquals(AlterOperation.ENABLE_ROW_LEVEL_SECURITY, + alter.getAlterExpressions().get(0).getOperation()); + } + + @Test + public void testDisableRowLevelSecurity() throws JSQLParserException { + String sql = "ALTER TABLE table1 DISABLE ROW LEVEL SECURITY"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + Alter alter = (Alter) CCJSqlParserUtil.parse(sql); + assertEquals(AlterOperation.DISABLE_ROW_LEVEL_SECURITY, + alter.getAlterExpressions().get(0).getOperation()); + } + + @Test + public void testForceRowLevelSecurity() throws JSQLParserException { + String sql = "ALTER TABLE table1 FORCE ROW LEVEL SECURITY"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + Alter alter = (Alter) CCJSqlParserUtil.parse(sql); + assertEquals(AlterOperation.FORCE_ROW_LEVEL_SECURITY, + alter.getAlterExpressions().get(0).getOperation()); + } + + @Test + public void testNoForceRowLevelSecurity() throws JSQLParserException { + String sql = "ALTER TABLE table1 NO FORCE ROW LEVEL SECURITY"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + Alter alter = (Alter) CCJSqlParserUtil.parse(sql); + assertEquals(AlterOperation.NO_FORCE_ROW_LEVEL_SECURITY, + alter.getAlterExpressions().get(0).getOperation()); + } + + @Test + public void testMultipleStatements() throws JSQLParserException { + // Test CREATE POLICY followed by ENABLE RLS + String sql = "CREATE POLICY policy1 ON table1 USING (id = user_id()); " + + "ALTER TABLE table1 ENABLE ROW LEVEL SECURITY"; + + net.sf.jsqlparser.statement.Statements stmts = CCJSqlParserUtil.parseStatements(sql); + assertEquals(2, stmts.getStatements().size()); + + assertInstanceOf(net.sf.jsqlparser.statement.create.policy.CreatePolicy.class, + stmts.getStatements().get(0)); + assertInstanceOf(Alter.class, stmts.getStatements().get(1)); + } + + @Test + public void testEnableKeysStillWorks() throws JSQLParserException { + // Ensure our changes don't break existing ENABLE KEYS syntax + String sql = "ALTER TABLE table1 ENABLE KEYS"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + Alter alter = (Alter) CCJSqlParserUtil.parse(sql); + assertEquals(AlterOperation.ENABLE_KEYS, + alter.getAlterExpressions().get(0).getOperation()); + } + + @Test + public void testDisableKeysStillWorks() throws JSQLParserException { + // Ensure our changes don't break existing DISABLE KEYS syntax + String sql = "ALTER TABLE table1 DISABLE KEYS"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + Alter alter = (Alter) CCJSqlParserUtil.parse(sql); + assertEquals(AlterOperation.DISABLE_KEYS, + alter.getAlterExpressions().get(0).getOperation()); + } +} diff --git a/src/test/java/net/sf/jsqlparser/statement/create/CreatePolicyTablesFinderTest.java b/src/test/java/net/sf/jsqlparser/statement/create/CreatePolicyTablesFinderTest.java new file mode 100644 index 000000000..031c86b6e --- /dev/null +++ b/src/test/java/net/sf/jsqlparser/statement/create/CreatePolicyTablesFinderTest.java @@ -0,0 +1,263 @@ +/*- + * #%L + * JSQLParser library + * %% + * Copyright (C) 2004 - 2025 JSQLParser + * %% + * Dual licensed under GNU LGPL 2.1 or Apache License 2.0 + * #L% + */ +package net.sf.jsqlparser.statement.create; + +import net.sf.jsqlparser.JSQLParserException; +import net.sf.jsqlparser.parser.CCJSqlParserUtil; +import net.sf.jsqlparser.statement.Statement; +import net.sf.jsqlparser.util.TablesNamesFinder; +import org.junit.jupiter.api.Test; + +import java.util.List; + +import static org.junit.jupiter.api.Assertions.*; + +/** + * Tests for TablesNamesFinder integration with PostgreSQL CREATE POLICY statements. + * + *

+ * These tests verify that TablesNamesFinder correctly identifies ALL tables referenced in a CREATE + * POLICY statement, including: + *

    + *
  • The policy's target table
  • + *
  • Tables in USING expression subqueries
  • + *
  • Tables in WITH CHECK expression subqueries
  • + *
  • Tables in complex expressions (JOINs, CTEs, nested subqueries)
  • + *
+ * + *

+ * Current Status: These tests will FAIL until + * TablesNamesFinder.visit(CreatePolicy) is updated to traverse USING and WITH CHECK expressions. + * This is incomplete feature support, not a regression - CREATE POLICY parsing works correctly, but + * analysis tools don't yet have complete integration. + * + *

+ * Expected Behavior: Once fixed, TablesNamesFinder should find tables in policy + * expressions using the same pattern as other statements (CreateView, Insert, Update). + */ +public class CreatePolicyTablesFinderTest { + + // ========================================================================= + // Helper Methods + // ========================================================================= + + /** + * Parse SQL and extract table names using TablesNamesFinder. + */ + private List getTablesFromSQL(String sql) throws JSQLParserException { + Statement stmt = CCJSqlParserUtil.parse(sql); + TablesNamesFinder finder = new TablesNamesFinder(); + return finder.getTableList(stmt); + } + + /** + * Assert that the actual table list contains exactly the expected tables. + */ + private void assertContainsAllTables(List actual, String... expected) { + assertEquals(expected.length, actual.size(), + "Expected " + expected.length + " tables but found " + actual.size() + ". " + + "Expected: " + java.util.Arrays.toString(expected) + ", " + + "Actual: " + actual); + + for (String table : expected) { + assertTrue(actual.contains(table), + "Expected to find table '" + table + "' but it was missing. " + + "Found tables: " + actual); + } + } + + // ========================================================================= + // Simple Subqueries - Basic USE Cases + // ========================================================================= + + @Test + public void testTablesFinderWithSubqueryInUsing() throws JSQLParserException { + String sql = "CREATE POLICY tenant_policy ON documents " + + "USING (tenant_id IN (SELECT tenant_id FROM tenant_access))"; + + List tables = getTablesFromSQL(sql); + + // Should find: target table + table in USING subquery + assertContainsAllTables(tables, "documents", "tenant_access"); + } + + @Test + public void testTablesFinderWithSubqueryInWithCheck() throws JSQLParserException { + String sql = "CREATE POLICY data_policy ON user_data " + + "WITH CHECK (status IN (SELECT allowed_status FROM status_config))"; + + List tables = getTablesFromSQL(sql); + + // Should find: target table + table in WITH CHECK subquery + assertContainsAllTables(tables, "user_data", "status_config"); + } + + @Test + public void testTablesFinderWithBothUsingAndWithCheck() throws JSQLParserException { + String sql = "CREATE POLICY dual_check_policy ON records " + + "USING (user_id IN (SELECT id FROM active_users)) " + + "WITH CHECK (status IN (SELECT status FROM valid_statuses))"; + + List tables = getTablesFromSQL(sql); + + // Should find: target table + table in USING + table in WITH CHECK + assertContainsAllTables(tables, "records", "active_users", "valid_statuses"); + } + + // ========================================================================= + // Complex Expressions - Multiple/Nested Subqueries + // ========================================================================= + + @Test + public void testTablesFinderWithMultipleSubqueries() throws JSQLParserException { + String sql = "CREATE POLICY complex_policy ON documents " + + "USING (" + + " tenant_id IN (SELECT tenant_id FROM tenant_access) " + + " AND status IN (SELECT status FROM allowed_statuses) " + + " AND department_id = (SELECT id FROM departments WHERE name = 'Engineering')" + + ")"; + + List tables = getTablesFromSQL(sql); + + // Should find: target table + 3 tables from subqueries + assertContainsAllTables(tables, "documents", "tenant_access", "allowed_statuses", + "departments"); + } + + @Test + public void testTablesFinderWithNestedSubqueries() throws JSQLParserException { + String sql = "CREATE POLICY nested_policy ON orders " + + "USING (customer_id IN (" + + " SELECT customer_id FROM customer_access " + + " WHERE region_id IN (SELECT id FROM regions WHERE active = true)" + + "))"; + + List tables = getTablesFromSQL(sql); + + // Should find: target table + tables from nested subqueries + assertContainsAllTables(tables, "orders", "customer_access", "regions"); + } + + @Test + public void testTablesFinderWithJoinsInSubquery() throws JSQLParserException { + String sql = "CREATE POLICY join_policy ON orders " + + "USING (EXISTS (" + + " SELECT 1 FROM customers c " + + " JOIN customer_access ca ON c.id = ca.customer_id " + + " WHERE c.id = orders.customer_id" + + "))"; + + List tables = getTablesFromSQL(sql); + + // Should find: target table + tables from JOIN in subquery + assertContainsAllTables(tables, "orders", "customers", "customer_access"); + } + + // ========================================================================= + // Advanced SQL Features - CTEs, Schema Qualification, Functions + // ========================================================================= + + @Test + public void testTablesFinderWithCTE() throws JSQLParserException { + String sql = "CREATE POLICY cte_policy ON documents " + + "USING (tenant_id IN (" + + " WITH active_tenants AS (SELECT id FROM tenants WHERE active = true) " + + " SELECT id FROM active_tenants" + + "))"; + + List tables = getTablesFromSQL(sql); + + // Should find: target table + table referenced in CTE + assertContainsAllTables(tables, "documents", "tenants"); + } + + @Test + public void testTablesFinderWithSchemaQualifiedTables() throws JSQLParserException { + String sql = "CREATE POLICY schema_policy ON myschema.documents " + + "USING (tenant_id IN (SELECT id FROM otherschema.tenants))"; + + List tables = getTablesFromSQL(sql); + + // Should find both schema-qualified tables + assertEquals(2, tables.size(), + "Should find both schema-qualified tables. Found: " + tables); + + // Check if tables are found (with or without schema prefix depending on TablesNamesFinder + // behavior) + boolean foundDocuments = tables.stream() + .anyMatch(t -> t.contains("documents")); + boolean foundTenants = tables.stream() + .anyMatch(t -> t.contains("tenants")); + + assertTrue(foundDocuments, "Should find documents table. Found: " + tables); + assertTrue(foundTenants, "Should find tenants table. Found: " + tables); + } + + @Test + public void testTablesFinderWithTableFunctions() throws JSQLParserException { + // PostgreSQL table-valued functions can be used in FROM clauses + String sql = "CREATE POLICY function_policy ON documents " + + "USING (tenant_id IN (" + + " SELECT tenant_id FROM get_accessible_tenants(current_user_id())" + + "))"; + + List tables = getTablesFromSQL(sql); + + // Should at least find the target table + // Note: Table-valued functions might not be reported as "tables" depending on + // implementation + assertTrue(tables.contains("documents"), + "Should at least find the target table. Found: " + tables); + } + + // ========================================================================= + // Edge Cases - EXISTS, UNION, Empty Policies + // ========================================================================= + + @Test + public void testTablesFinderWithExistsClause() throws JSQLParserException { + String sql = "CREATE POLICY exists_policy ON documents " + + "USING (EXISTS (" + + " SELECT 1 FROM tenant_access " + + " WHERE tenant_id = documents.tenant_id AND active = true" + + "))"; + + List tables = getTablesFromSQL(sql); + + // Should find: target table + table in EXISTS subquery + assertContainsAllTables(tables, "documents", "tenant_access"); + } + + @Test + public void testTablesFinderWithUnionInSubquery() throws JSQLParserException { + String sql = "CREATE POLICY union_policy ON documents " + + "USING (tenant_id IN (" + + " SELECT tenant_id FROM primary_tenants " + + " UNION " + + " SELECT tenant_id FROM secondary_tenants" + + "))"; + + List tables = getTablesFromSQL(sql); + + // Should find: target table + both tables in UNION + assertContainsAllTables(tables, "documents", "primary_tenants", "secondary_tenants"); + } + + @Test + public void testTablesFinderEmptyPolicy() throws JSQLParserException { + // Policy with no USING or WITH CHECK clauses + String sql = "CREATE POLICY simple_policy ON documents"; + + List tables = getTablesFromSQL(sql); + + // Should only find the target table + assertContainsAllTables(tables, "documents"); + } +} diff --git a/src/test/java/net/sf/jsqlparser/statement/create/CreatePolicyTest.java b/src/test/java/net/sf/jsqlparser/statement/create/CreatePolicyTest.java new file mode 100644 index 000000000..829efd2c7 --- /dev/null +++ b/src/test/java/net/sf/jsqlparser/statement/create/CreatePolicyTest.java @@ -0,0 +1,158 @@ +/*- + * #%L + * JSQLParser library + * %% + * Copyright (C) 2004 - 2025 JSQLParser + * %% + * Dual licensed under GNU LGPL 2.1 or Apache License 2.0 + * #L% + */ +package net.sf.jsqlparser.statement.create; + +import net.sf.jsqlparser.JSQLParserException; +import net.sf.jsqlparser.parser.CCJSqlParserUtil; +import net.sf.jsqlparser.statement.Statement; +import net.sf.jsqlparser.statement.create.policy.CreatePolicy; +import org.junit.jupiter.api.Test; + +import static net.sf.jsqlparser.test.TestUtils.assertSqlCanBeParsedAndDeparsed; +import static org.junit.jupiter.api.Assertions.*; + +/** + * Tests for PostgreSQL CREATE POLICY statement (Row Level Security) + */ +public class CreatePolicyTest { + + @Test + public void testCreatePolicyBasic() throws JSQLParserException { + String sql = "CREATE POLICY policy_name ON table_name"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + Statement stmt = CCJSqlParserUtil.parse(sql); + assertInstanceOf(CreatePolicy.class, stmt); + CreatePolicy policy = (CreatePolicy) stmt; + assertEquals("policy_name", policy.getPolicyName()); + assertEquals("table_name", policy.getTable().getName()); + } + + @Test + public void testCreatePolicyWithSchema() throws JSQLParserException { + String sql = + "CREATE POLICY single_tenant_access_policy ON customer_custom_data.phone_opt_out"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + Statement stmt = CCJSqlParserUtil.parse(sql); + CreatePolicy policy = (CreatePolicy) stmt; + assertEquals("single_tenant_access_policy", policy.getPolicyName()); + assertEquals("customer_custom_data.phone_opt_out", + policy.getTable().getFullyQualifiedName()); + } + + @Test + public void testCreatePolicyWithForClause() throws JSQLParserException { + String sql = "CREATE POLICY policy1 ON table1 FOR SELECT"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql); + assertEquals("SELECT", policy.getCommand()); + } + + @Test + public void testCreatePolicyWithAllCommands() throws JSQLParserException { + String[] commands = {"ALL", "SELECT", "INSERT", "UPDATE", "DELETE"}; + for (String cmd : commands) { + String sql = "CREATE POLICY p ON t FOR " + cmd; + assertSqlCanBeParsedAndDeparsed(sql, true); + CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql); + assertEquals(cmd, policy.getCommand()); + } + } + + @Test + public void testCreatePolicyWithSingleRole() throws JSQLParserException { + String sql = "CREATE POLICY policy1 ON table1 TO role1"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql); + assertEquals(1, policy.getRoles().size()); + assertEquals("role1", policy.getRoles().get(0)); + } + + @Test + public void testCreatePolicyWithMultipleRoles() throws JSQLParserException { + String sql = "CREATE POLICY policy1 ON table1 TO role1, role2, role3"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql); + assertEquals(3, policy.getRoles().size()); + assertEquals("role1", policy.getRoles().get(0)); + assertEquals("role2", policy.getRoles().get(1)); + assertEquals("role3", policy.getRoles().get(2)); + } + + @Test + public void testCreatePolicyWithUsing() throws JSQLParserException { + String sql = "CREATE POLICY policy1 ON table1 USING (user_id = current_user_id())"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql); + assertNotNull(policy.getUsingExpression()); + } + + @Test + public void testCreatePolicyWithWithCheck() throws JSQLParserException { + String sql = "CREATE POLICY policy1 ON table1 WITH CHECK (status = 'active')"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql); + assertNotNull(policy.getWithCheckExpression()); + } + + @Test + public void testCreatePolicyComplete() throws JSQLParserException { + String sql = + "CREATE POLICY single_tenant_access_policy ON customer_custom_data.phone_opt_out " + + "FOR SELECT " + + "TO gong_app_single_tenant_ro_role, gong_app_single_tenant_rw_role " + + "USING (company_id = current_setting('gong.tenant.company_id')::bigint)"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql); + assertEquals("single_tenant_access_policy", policy.getPolicyName()); + assertEquals("customer_custom_data.phone_opt_out", + policy.getTable().getFullyQualifiedName()); + assertEquals("SELECT", policy.getCommand()); + assertEquals(2, policy.getRoles().size()); + assertNotNull(policy.getUsingExpression()); + } + + @Test + public void testCreatePolicyWithBothUsingAndWithCheck() throws JSQLParserException { + String sql = "CREATE POLICY policy1 ON table1 " + + "USING (department_id = current_user_department()) " + + "WITH CHECK (status IN ('draft', 'published'))"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql); + assertNotNull(policy.getUsingExpression()); + assertNotNull(policy.getWithCheckExpression()); + } + + @Test + public void testCreatePolicyCompleteWithAllClauses() throws JSQLParserException { + String sql = "CREATE POLICY admin_policy ON documents " + + "FOR UPDATE " + + "TO admin_role, superuser " + + "USING (author_id = current_user_id()) " + + "WITH CHECK (updated_at >= CURRENT_TIMESTAMP)"; + assertSqlCanBeParsedAndDeparsed(sql, true); + + CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql); + assertEquals("admin_policy", policy.getPolicyName()); + assertEquals("documents", policy.getTable().getName()); + assertEquals("UPDATE", policy.getCommand()); + assertEquals(2, policy.getRoles().size()); + assertNotNull(policy.getUsingExpression()); + assertNotNull(policy.getWithCheckExpression()); + } +}