Skip to content

Commit 9c9fd18

Browse files
committed
run ./gradlew spotlessApply
1 parent e07cd4f commit 9c9fd18

File tree

3 files changed

+51
-49
lines changed

3 files changed

+51
-49
lines changed

src/main/java/net/sf/jsqlparser/statement/create/policy/CreatePolicy.java

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,12 +20,9 @@
2020
/**
2121
* PostgreSQL CREATE POLICY statement for Row Level Security (RLS).
2222
*
23-
* Syntax:
24-
* CREATE POLICY name ON table_name
25-
* [ FOR { ALL | SELECT | INSERT | UPDATE | DELETE } ]
26-
* [ TO { role_name | PUBLIC | CURRENT_USER | SESSION_USER } [, ...] ]
27-
* [ USING ( using_expression ) ]
28-
* [ WITH CHECK ( check_expression ) ]
23+
* Syntax: CREATE POLICY name ON table_name [ FOR { ALL | SELECT | INSERT | UPDATE | DELETE } ] [ TO
24+
* { role_name | PUBLIC | CURRENT_USER | SESSION_USER } [, ...] ] [ USING ( using_expression ) ] [
25+
* WITH CHECK ( check_expression ) ]
2926
*/
3027
public class CreatePolicy implements Statement {
3128

src/test/java/net/sf/jsqlparser/statement/alter/AlterRowLevelSecurityTest.java

Lines changed: 21 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -26,67 +26,68 @@ public class AlterRowLevelSecurityTest {
2626
public void testEnableRowLevelSecurity() throws JSQLParserException {
2727
String sql = "ALTER TABLE table1 ENABLE ROW LEVEL SECURITY";
2828
assertSqlCanBeParsedAndDeparsed(sql, true);
29-
29+
3030
Statement stmt = CCJSqlParserUtil.parse(sql);
3131
assertInstanceOf(Alter.class, stmt);
3232
Alter alter = (Alter) stmt;
3333
assertEquals("table1", alter.getTable().getName());
34-
assertEquals(AlterOperation.ENABLE_ROW_LEVEL_SECURITY,
35-
alter.getAlterExpressions().get(0).getOperation());
34+
assertEquals(AlterOperation.ENABLE_ROW_LEVEL_SECURITY,
35+
alter.getAlterExpressions().get(0).getOperation());
3636
}
3737

3838
@Test
3939
public void testEnableRowLevelSecurityWithSchema() throws JSQLParserException {
4040
String sql = "ALTER TABLE customer_custom_data.phone_opt_out ENABLE ROW LEVEL SECURITY";
4141
assertSqlCanBeParsedAndDeparsed(sql, true);
42-
42+
4343
Alter alter = (Alter) CCJSqlParserUtil.parse(sql);
44-
assertEquals("customer_custom_data.phone_opt_out", alter.getTable().getFullyQualifiedName());
44+
assertEquals("customer_custom_data.phone_opt_out",
45+
alter.getTable().getFullyQualifiedName());
4546
assertEquals(AlterOperation.ENABLE_ROW_LEVEL_SECURITY,
46-
alter.getAlterExpressions().get(0).getOperation());
47+
alter.getAlterExpressions().get(0).getOperation());
4748
}
4849

4950
@Test
5051
public void testDisableRowLevelSecurity() throws JSQLParserException {
5152
String sql = "ALTER TABLE table1 DISABLE ROW LEVEL SECURITY";
5253
assertSqlCanBeParsedAndDeparsed(sql, true);
53-
54+
5455
Alter alter = (Alter) CCJSqlParserUtil.parse(sql);
5556
assertEquals(AlterOperation.DISABLE_ROW_LEVEL_SECURITY,
56-
alter.getAlterExpressions().get(0).getOperation());
57+
alter.getAlterExpressions().get(0).getOperation());
5758
}
5859

5960
@Test
6061
public void testForceRowLevelSecurity() throws JSQLParserException {
6162
String sql = "ALTER TABLE table1 FORCE ROW LEVEL SECURITY";
6263
assertSqlCanBeParsedAndDeparsed(sql, true);
63-
64+
6465
Alter alter = (Alter) CCJSqlParserUtil.parse(sql);
6566
assertEquals(AlterOperation.FORCE_ROW_LEVEL_SECURITY,
66-
alter.getAlterExpressions().get(0).getOperation());
67+
alter.getAlterExpressions().get(0).getOperation());
6768
}
6869

6970
@Test
7071
public void testNoForceRowLevelSecurity() throws JSQLParserException {
7172
String sql = "ALTER TABLE table1 NO FORCE ROW LEVEL SECURITY";
7273
assertSqlCanBeParsedAndDeparsed(sql, true);
73-
74+
7475
Alter alter = (Alter) CCJSqlParserUtil.parse(sql);
7576
assertEquals(AlterOperation.NO_FORCE_ROW_LEVEL_SECURITY,
76-
alter.getAlterExpressions().get(0).getOperation());
77+
alter.getAlterExpressions().get(0).getOperation());
7778
}
7879

7980
@Test
8081
public void testMultipleStatements() throws JSQLParserException {
8182
// Test CREATE POLICY followed by ENABLE RLS
8283
String sql = "CREATE POLICY policy1 ON table1 USING (id = user_id()); " +
83-
"ALTER TABLE table1 ENABLE ROW LEVEL SECURITY";
84-
84+
"ALTER TABLE table1 ENABLE ROW LEVEL SECURITY";
85+
8586
net.sf.jsqlparser.statement.Statements stmts = CCJSqlParserUtil.parseStatements(sql);
8687
assertEquals(2, stmts.getStatements().size());
87-
88+
8889
assertInstanceOf(net.sf.jsqlparser.statement.create.policy.CreatePolicy.class,
89-
stmts.getStatements().get(0));
90+
stmts.getStatements().get(0));
9091
assertInstanceOf(Alter.class, stmts.getStatements().get(1));
9192
}
9293

@@ -95,20 +96,20 @@ public void testEnableKeysStillWorks() throws JSQLParserException {
9596
// Ensure our changes don't break existing ENABLE KEYS syntax
9697
String sql = "ALTER TABLE table1 ENABLE KEYS";
9798
assertSqlCanBeParsedAndDeparsed(sql, true);
98-
99+
99100
Alter alter = (Alter) CCJSqlParserUtil.parse(sql);
100101
assertEquals(AlterOperation.ENABLE_KEYS,
101-
alter.getAlterExpressions().get(0).getOperation());
102+
alter.getAlterExpressions().get(0).getOperation());
102103
}
103104

104105
@Test
105106
public void testDisableKeysStillWorks() throws JSQLParserException {
106107
// Ensure our changes don't break existing DISABLE KEYS syntax
107108
String sql = "ALTER TABLE table1 DISABLE KEYS";
108109
assertSqlCanBeParsedAndDeparsed(sql, true);
109-
110+
110111
Alter alter = (Alter) CCJSqlParserUtil.parse(sql);
111112
assertEquals(AlterOperation.DISABLE_KEYS,
112-
alter.getAlterExpressions().get(0).getOperation());
113+
alter.getAlterExpressions().get(0).getOperation());
113114
}
114115
}

src/test/java/net/sf/jsqlparser/statement/create/CreatePolicyTest.java

Lines changed: 27 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ public class CreatePolicyTest {
2727
public void testCreatePolicyBasic() throws JSQLParserException {
2828
String sql = "CREATE POLICY policy_name ON table_name";
2929
assertSqlCanBeParsedAndDeparsed(sql, true);
30-
30+
3131
Statement stmt = CCJSqlParserUtil.parse(sql);
3232
assertInstanceOf(CreatePolicy.class, stmt);
3333
CreatePolicy policy = (CreatePolicy) stmt;
@@ -37,20 +37,22 @@ public void testCreatePolicyBasic() throws JSQLParserException {
3737

3838
@Test
3939
public void testCreatePolicyWithSchema() throws JSQLParserException {
40-
String sql = "CREATE POLICY single_tenant_access_policy ON customer_custom_data.phone_opt_out";
40+
String sql =
41+
"CREATE POLICY single_tenant_access_policy ON customer_custom_data.phone_opt_out";
4142
assertSqlCanBeParsedAndDeparsed(sql, true);
42-
43+
4344
Statement stmt = CCJSqlParserUtil.parse(sql);
4445
CreatePolicy policy = (CreatePolicy) stmt;
4546
assertEquals("single_tenant_access_policy", policy.getPolicyName());
46-
assertEquals("customer_custom_data.phone_opt_out", policy.getTable().getFullyQualifiedName());
47+
assertEquals("customer_custom_data.phone_opt_out",
48+
policy.getTable().getFullyQualifiedName());
4749
}
4850

4951
@Test
5052
public void testCreatePolicyWithForClause() throws JSQLParserException {
5153
String sql = "CREATE POLICY policy1 ON table1 FOR SELECT";
5254
assertSqlCanBeParsedAndDeparsed(sql, true);
53-
55+
5456
CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql);
5557
assertEquals("SELECT", policy.getCommand());
5658
}
@@ -70,7 +72,7 @@ public void testCreatePolicyWithAllCommands() throws JSQLParserException {
7072
public void testCreatePolicyWithSingleRole() throws JSQLParserException {
7173
String sql = "CREATE POLICY policy1 ON table1 TO role1";
7274
assertSqlCanBeParsedAndDeparsed(sql, true);
73-
75+
7476
CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql);
7577
assertEquals(1, policy.getRoles().size());
7678
assertEquals("role1", policy.getRoles().get(0));
@@ -80,7 +82,7 @@ public void testCreatePolicyWithSingleRole() throws JSQLParserException {
8082
public void testCreatePolicyWithMultipleRoles() throws JSQLParserException {
8183
String sql = "CREATE POLICY policy1 ON table1 TO role1, role2, role3";
8284
assertSqlCanBeParsedAndDeparsed(sql, true);
83-
85+
8486
CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql);
8587
assertEquals(3, policy.getRoles().size());
8688
assertEquals("role1", policy.getRoles().get(0));
@@ -92,7 +94,7 @@ public void testCreatePolicyWithMultipleRoles() throws JSQLParserException {
9294
public void testCreatePolicyWithUsing() throws JSQLParserException {
9395
String sql = "CREATE POLICY policy1 ON table1 USING (user_id = current_user_id())";
9496
assertSqlCanBeParsedAndDeparsed(sql, true);
95-
97+
9698
CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql);
9799
assertNotNull(policy.getUsingExpression());
98100
}
@@ -101,22 +103,24 @@ public void testCreatePolicyWithUsing() throws JSQLParserException {
101103
public void testCreatePolicyWithWithCheck() throws JSQLParserException {
102104
String sql = "CREATE POLICY policy1 ON table1 WITH CHECK (status = 'active')";
103105
assertSqlCanBeParsedAndDeparsed(sql, true);
104-
106+
105107
CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql);
106108
assertNotNull(policy.getWithCheckExpression());
107109
}
108110

109111
@Test
110112
public void testCreatePolicyComplete() throws JSQLParserException {
111-
String sql = "CREATE POLICY single_tenant_access_policy ON customer_custom_data.phone_opt_out " +
112-
"FOR SELECT " +
113-
"TO gong_app_single_tenant_ro_role, gong_app_single_tenant_rw_role " +
114-
"USING (company_id = current_setting('gong.tenant.company_id')::bigint)";
113+
String sql =
114+
"CREATE POLICY single_tenant_access_policy ON customer_custom_data.phone_opt_out " +
115+
"FOR SELECT " +
116+
"TO gong_app_single_tenant_ro_role, gong_app_single_tenant_rw_role " +
117+
"USING (company_id = current_setting('gong.tenant.company_id')::bigint)";
115118
assertSqlCanBeParsedAndDeparsed(sql, true);
116-
119+
117120
CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql);
118121
assertEquals("single_tenant_access_policy", policy.getPolicyName());
119-
assertEquals("customer_custom_data.phone_opt_out", policy.getTable().getFullyQualifiedName());
122+
assertEquals("customer_custom_data.phone_opt_out",
123+
policy.getTable().getFullyQualifiedName());
120124
assertEquals("SELECT", policy.getCommand());
121125
assertEquals(2, policy.getRoles().size());
122126
assertNotNull(policy.getUsingExpression());
@@ -125,10 +129,10 @@ public void testCreatePolicyComplete() throws JSQLParserException {
125129
@Test
126130
public void testCreatePolicyWithBothUsingAndWithCheck() throws JSQLParserException {
127131
String sql = "CREATE POLICY policy1 ON table1 " +
128-
"USING (department_id = current_user_department()) " +
129-
"WITH CHECK (status IN ('draft', 'published'))";
132+
"USING (department_id = current_user_department()) " +
133+
"WITH CHECK (status IN ('draft', 'published'))";
130134
assertSqlCanBeParsedAndDeparsed(sql, true);
131-
135+
132136
CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql);
133137
assertNotNull(policy.getUsingExpression());
134138
assertNotNull(policy.getWithCheckExpression());
@@ -137,12 +141,12 @@ public void testCreatePolicyWithBothUsingAndWithCheck() throws JSQLParserExcepti
137141
@Test
138142
public void testCreatePolicyCompleteWithAllClauses() throws JSQLParserException {
139143
String sql = "CREATE POLICY admin_policy ON documents " +
140-
"FOR UPDATE " +
141-
"TO admin_role, superuser " +
142-
"USING (author_id = current_user_id()) " +
143-
"WITH CHECK (updated_at >= CURRENT_TIMESTAMP)";
144+
"FOR UPDATE " +
145+
"TO admin_role, superuser " +
146+
"USING (author_id = current_user_id()) " +
147+
"WITH CHECK (updated_at >= CURRENT_TIMESTAMP)";
144148
assertSqlCanBeParsedAndDeparsed(sql, true);
145-
149+
146150
CreatePolicy policy = (CreatePolicy) CCJSqlParserUtil.parse(sql);
147151
assertEquals("admin_policy", policy.getPolicyName());
148152
assertEquals("documents", policy.getTable().getName());

0 commit comments

Comments
 (0)