diff --git itests/src/test/resources/testconfiguration.properties itests/src/test/resources/testconfiguration.properties index 705903a..64da7ea 100644 --- itests/src/test/resources/testconfiguration.properties +++ itests/src/test/resources/testconfiguration.properties @@ -298,7 +298,8 @@ minitez.query.files=bucket_map_join_tez1.q,\ encrypted.query.files.shared=encryption_join_unencrypted_tbl.q,\ encryption_insert_partition_static.q,\ encryption_insert_partition_dynamic.q,\ - encryption_join_with_different_encryption_keys.q + encryption_join_with_different_encryption_keys.q\ + encryption_select_read_only_encrypted_tbl.q beeline.positive.exclude=add_part_exist.q,\ alter1.q,\ diff --git ql/src/test/queries/clientpositive/encryption_select_read_only_encrypted_tbl.q ql/src/test/queries/clientpositive/encryption_select_read_only_encrypted_tbl.q new file mode 100644 index 0000000..04fdb44 --- /dev/null +++ ql/src/test/queries/clientpositive/encryption_select_read_only_encrypted_tbl.q @@ -0,0 +1,13 @@ +-- SORT_QUERY_RESULTS + +DROP TABLE IF EXISTS encrypted_table; +CREATE TABLE encrypted_table (key INT, value STRING) LOCATION '/user/hive/warehouse/default/encrypted_table'; + +CRYPTO CREATE_KEY --keyName key_128 --bitLength 128; +CRYPTO CREATE_ZONE --keyName key_128 --path /user/hive/warehouse/default/encrypted_table; + +LOAD DATA LOCAL INPATH '../../data/files/kv1.txt' INTO TABLE encrypted_table; + +dfs -chmod -R 555 /user/hive/warehouse/default/encrypted_table; + +SELECT count(*) FROM encrypted_table; diff --git ql/src/test/results/clientpositive/encrypted/encryption_select_read_only_encrypted_tbl.q.out ql/src/test/results/clientpositive/encrypted/encryption_select_read_only_encrypted_tbl.q.out new file mode 100644 index 0000000..cf6fd15 --- /dev/null +++ ql/src/test/results/clientpositive/encrypted/encryption_select_read_only_encrypted_tbl.q.out @@ -0,0 +1,37 @@ +PREHOOK: query: -- SORT_QUERY_RESULTS + +DROP TABLE IF EXISTS encrypted_table +PREHOOK: type: DROPTABLE +POSTHOOK: query: -- SORT_QUERY_RESULTS + +DROP TABLE IF EXISTS encrypted_table +POSTHOOK: type: DROPTABLE +#### A masked pattern was here #### +PREHOOK: type: CREATETABLE +#### A masked pattern was here #### +PREHOOK: Output: database:default +PREHOOK: Output: default@encrypted_table +#### A masked pattern was here #### +POSTHOOK: type: CREATETABLE +#### A masked pattern was here #### +POSTHOOK: Output: database:default +POSTHOOK: Output: default@encrypted_table +Encryption key created: 'key_128' +Encryption zone created: '/user/hive/warehouse/default/encrypted_table' using key: 'key_128' +PREHOOK: query: LOAD DATA LOCAL INPATH '../../data/files/kv1.txt' INTO TABLE encrypted_table +PREHOOK: type: LOAD +#### A masked pattern was here #### +PREHOOK: Output: default@encrypted_table +POSTHOOK: query: LOAD DATA LOCAL INPATH '../../data/files/kv1.txt' INTO TABLE encrypted_table +POSTHOOK: type: LOAD +#### A masked pattern was here #### +POSTHOOK: Output: default@encrypted_table +PREHOOK: query: SELECT count(*) FROM encrypted_table +PREHOOK: type: QUERY +PREHOOK: Input: default@encrypted_table +#### A masked pattern was here #### +POSTHOOK: query: SELECT count(*) FROM encrypted_table +POSTHOOK: type: QUERY +POSTHOOK: Input: default@encrypted_table +#### A masked pattern was here #### +500