mirror of
https://github.com/neondatabase/neon.git
synced 2025-12-23 22:29:58 +00:00
## Problem The shared libraries preloaded by default interfered with the `pg_regress` tests on staging, causing wrong results ## Summary of changes The projects used for these tests are now free from unnecessary extensions. Some changes were made in patches.
3962 lines
234 KiB
Diff
3962 lines
234 KiB
Diff
diff --git a/src/test/regress/expected/aggregates.out b/src/test/regress/expected/aggregates.out
|
|
index 0c24f6afe4..dd808ac2b4 100644
|
|
--- a/src/test/regress/expected/aggregates.out
|
|
+++ b/src/test/regress/expected/aggregates.out
|
|
@@ -11,7 +11,8 @@ CREATE TABLE aggtest (
|
|
b float4
|
|
);
|
|
\set filename :abs_srcdir '/data/agg.data'
|
|
-COPY aggtest FROM :'filename';
|
|
+\set command '\\copy aggtest FROM ' :'filename';
|
|
+:command
|
|
ANALYZE aggtest;
|
|
SELECT avg(four) AS avg_1 FROM onek;
|
|
avg_1
|
|
diff --git a/src/test/regress/expected/alter_generic.out b/src/test/regress/expected/alter_generic.out
|
|
index ae54cb254f..888e2ee8bc 100644
|
|
--- a/src/test/regress/expected/alter_generic.out
|
|
+++ b/src/test/regress/expected/alter_generic.out
|
|
@@ -15,9 +15,9 @@ DROP ROLE IF EXISTS regress_alter_generic_user1;
|
|
DROP ROLE IF EXISTS regress_alter_generic_user2;
|
|
DROP ROLE IF EXISTS regress_alter_generic_user3;
|
|
RESET client_min_messages;
|
|
-CREATE USER regress_alter_generic_user3;
|
|
-CREATE USER regress_alter_generic_user2;
|
|
-CREATE USER regress_alter_generic_user1 IN ROLE regress_alter_generic_user3;
|
|
+CREATE USER regress_alter_generic_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_alter_generic_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_alter_generic_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE regress_alter_generic_user3;
|
|
CREATE SCHEMA alt_nsp1;
|
|
CREATE SCHEMA alt_nsp2;
|
|
GRANT ALL ON SCHEMA alt_nsp1, alt_nsp2 TO public;
|
|
@@ -370,7 +370,7 @@ ERROR: STORAGE cannot be specified in ALTER OPERATOR FAMILY
|
|
DROP OPERATOR FAMILY alt_opf4 USING btree;
|
|
-- Should fail. Need to be SUPERUSER to do ALTER OPERATOR FAMILY .. ADD / DROP
|
|
BEGIN TRANSACTION;
|
|
-CREATE ROLE regress_alter_generic_user5 NOSUPERUSER;
|
|
+CREATE ROLE regress_alter_generic_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER NOSUPERUSER;
|
|
CREATE OPERATOR FAMILY alt_opf5 USING btree;
|
|
SET ROLE regress_alter_generic_user5;
|
|
ALTER OPERATOR FAMILY alt_opf5 USING btree ADD OPERATOR 1 < (int4, int2), FUNCTION 1 btint42cmp(int4, int2);
|
|
@@ -382,7 +382,7 @@ ERROR: current transaction is aborted, commands ignored until end of transactio
|
|
ROLLBACK;
|
|
-- Should fail. Need rights to namespace for ALTER OPERATOR FAMILY .. ADD / DROP
|
|
BEGIN TRANSACTION;
|
|
-CREATE ROLE regress_alter_generic_user6;
|
|
+CREATE ROLE regress_alter_generic_user6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA alt_nsp6;
|
|
REVOKE ALL ON SCHEMA alt_nsp6 FROM regress_alter_generic_user6;
|
|
CREATE OPERATOR FAMILY alt_nsp6.alt_opf6 USING btree;
|
|
diff --git a/src/test/regress/expected/alter_operator.out b/src/test/regress/expected/alter_operator.out
|
|
index 71bd484282..066ea4ec0d 100644
|
|
--- a/src/test/regress/expected/alter_operator.out
|
|
+++ b/src/test/regress/expected/alter_operator.out
|
|
@@ -127,7 +127,7 @@ ERROR: operator attribute "Restrict" not recognized
|
|
--
|
|
-- Test permission check. Must be owner to ALTER OPERATOR.
|
|
--
|
|
-CREATE USER regress_alter_op_user;
|
|
+CREATE USER regress_alter_op_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_alter_op_user;
|
|
ALTER OPERATOR === (boolean, boolean) SET (RESTRICT = NONE);
|
|
ERROR: must be owner of operator ===
|
|
diff --git a/src/test/regress/expected/alter_table.out b/src/test/regress/expected/alter_table.out
|
|
index 0e439a6488..393f316c3e 100644
|
|
--- a/src/test/regress/expected/alter_table.out
|
|
+++ b/src/test/regress/expected/alter_table.out
|
|
@@ -5,7 +5,7 @@
|
|
SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_alter_table_user1;
|
|
RESET client_min_messages;
|
|
-CREATE USER regress_alter_table_user1;
|
|
+CREATE USER regress_alter_table_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
--
|
|
-- add attribute
|
|
--
|
|
@@ -3896,8 +3896,8 @@ DROP TABLE fail_part;
|
|
ALTER TABLE list_parted ATTACH PARTITION nonexistent FOR VALUES IN (1);
|
|
ERROR: relation "nonexistent" does not exist
|
|
-- check ownership of the source table
|
|
-CREATE ROLE regress_test_me;
|
|
-CREATE ROLE regress_test_not_me;
|
|
+CREATE ROLE regress_test_me PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_not_me PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE not_owned_by_me (LIKE list_parted);
|
|
ALTER TABLE not_owned_by_me OWNER TO regress_test_not_me;
|
|
SET SESSION AUTHORIZATION regress_test_me;
|
|
diff --git a/src/test/regress/expected/arrays.out b/src/test/regress/expected/arrays.out
|
|
index 57a283dc59..9672d526b4 100644
|
|
--- a/src/test/regress/expected/arrays.out
|
|
+++ b/src/test/regress/expected/arrays.out
|
|
@@ -18,7 +18,8 @@ CREATE TABLE array_op_test (
|
|
t text[]
|
|
);
|
|
\set filename :abs_srcdir '/data/array.data'
|
|
-COPY array_op_test FROM :'filename';
|
|
+\set command '\\copy array_op_test FROM ' :'filename';
|
|
+:command
|
|
ANALYZE array_op_test;
|
|
--
|
|
-- only the 'e' array is 0-based, the others are 1-based.
|
|
diff --git a/src/test/regress/expected/btree_index.out b/src/test/regress/expected/btree_index.out
|
|
index 93ed5e8cc0..54bd7d535c 100644
|
|
--- a/src/test/regress/expected/btree_index.out
|
|
+++ b/src/test/regress/expected/btree_index.out
|
|
@@ -20,13 +20,17 @@ CREATE TABLE bt_f8_heap (
|
|
random int4
|
|
);
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY bt_i4_heap FROM :'filename';
|
|
+\set command '\\copy bt_i4_heap FROM ' :'filename';
|
|
+:command
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY bt_name_heap FROM :'filename';
|
|
+\set command '\\copy bt_name_heap FROM ' :'filename';
|
|
+:command
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY bt_txt_heap FROM :'filename';
|
|
+\set command '\\copy bt_txt_heap FROM ' :'filename';
|
|
+:command
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY bt_f8_heap FROM :'filename';
|
|
+\set command '\\copy bt_f8_heap FROM ' :'filename';
|
|
+:command
|
|
ANALYZE bt_i4_heap;
|
|
ANALYZE bt_name_heap;
|
|
ANALYZE bt_txt_heap;
|
|
diff --git a/src/test/regress/expected/cluster.out b/src/test/regress/expected/cluster.out
|
|
index 542c2e098c..0062d3024f 100644
|
|
--- a/src/test/regress/expected/cluster.out
|
|
+++ b/src/test/regress/expected/cluster.out
|
|
@@ -308,7 +308,7 @@ WHERE pg_class.oid=indexrelid
|
|
-- Verify that toast tables are clusterable
|
|
CLUSTER pg_toast.pg_toast_826 USING pg_toast_826_index;
|
|
-- Verify that clustering all tables does in fact cluster the right ones
|
|
-CREATE USER regress_clstr_user;
|
|
+CREATE USER regress_clstr_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE clstr_1 (a INT PRIMARY KEY);
|
|
CREATE TABLE clstr_2 (a INT PRIMARY KEY);
|
|
CREATE TABLE clstr_3 (a INT PRIMARY KEY);
|
|
@@ -497,7 +497,7 @@ DROP TABLE clstrpart;
|
|
CREATE TABLE ptnowner(i int unique) PARTITION BY LIST (i);
|
|
CREATE INDEX ptnowner_i_idx ON ptnowner(i);
|
|
CREATE TABLE ptnowner1 PARTITION OF ptnowner FOR VALUES IN (1);
|
|
-CREATE ROLE regress_ptnowner;
|
|
+CREATE ROLE regress_ptnowner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE ptnowner2 PARTITION OF ptnowner FOR VALUES IN (2);
|
|
ALTER TABLE ptnowner1 OWNER TO regress_ptnowner;
|
|
ALTER TABLE ptnowner OWNER TO regress_ptnowner;
|
|
diff --git a/src/test/regress/expected/collate.icu.utf8.out b/src/test/regress/expected/collate.icu.utf8.out
|
|
index 3f9a8f539c..0a51b52940 100644
|
|
--- a/src/test/regress/expected/collate.icu.utf8.out
|
|
+++ b/src/test/regress/expected/collate.icu.utf8.out
|
|
@@ -1016,7 +1016,7 @@ select * from collate_test1 where b ilike 'ABC';
|
|
|
|
reset enable_seqscan;
|
|
-- schema manipulation commands
|
|
-CREATE ROLE regress_test_role;
|
|
+CREATE ROLE regress_test_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA test_schema;
|
|
-- We need to do this this way to cope with varying names for encodings:
|
|
SET client_min_messages TO WARNING;
|
|
diff --git a/src/test/regress/expected/constraints.out b/src/test/regress/expected/constraints.out
|
|
index cf0b80d616..e8e2a14a4a 100644
|
|
--- a/src/test/regress/expected/constraints.out
|
|
+++ b/src/test/regress/expected/constraints.out
|
|
@@ -349,7 +349,8 @@ CREATE TABLE COPY_TBL (x INT, y TEXT, z INT,
|
|
CONSTRAINT COPY_CON
|
|
CHECK (x > 3 AND y <> 'check failed' AND x < 7 ));
|
|
\set filename :abs_srcdir '/data/constro.data'
|
|
-COPY COPY_TBL FROM :'filename';
|
|
+\set command '\\copy COPY_TBL FROM ' :'filename';
|
|
+:command
|
|
SELECT * FROM COPY_TBL;
|
|
x | y | z
|
|
---+---------------+---
|
|
@@ -358,7 +359,8 @@ SELECT * FROM COPY_TBL;
|
|
(2 rows)
|
|
|
|
\set filename :abs_srcdir '/data/constrf.data'
|
|
-COPY COPY_TBL FROM :'filename';
|
|
+\set command '\\copy COPY_TBL FROM ' :'filename';
|
|
+:command
|
|
ERROR: new row for relation "copy_tbl" violates check constraint "copy_con"
|
|
DETAIL: Failing row contains (7, check failed, 6).
|
|
CONTEXT: COPY copy_tbl, line 2: "7 check failed 6"
|
|
@@ -799,7 +801,7 @@ DETAIL: Key (f1)=(3) conflicts with key (f1)=(3).
|
|
DROP TABLE deferred_excl;
|
|
-- Comments
|
|
-- Setup a low-level role to enforce non-superuser checks.
|
|
-CREATE ROLE regress_constraint_comments;
|
|
+CREATE ROLE regress_constraint_comments PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_constraint_comments;
|
|
CREATE TABLE constraint_comments_tbl (a int CONSTRAINT the_constraint CHECK (a > 0));
|
|
CREATE DOMAIN constraint_comments_dom AS int CONSTRAINT the_constraint CHECK (value > 0);
|
|
@@ -819,7 +821,7 @@ COMMENT ON CONSTRAINT the_constraint ON constraint_comments_tbl IS NULL;
|
|
COMMENT ON CONSTRAINT the_constraint ON DOMAIN constraint_comments_dom IS NULL;
|
|
-- unauthorized user
|
|
RESET SESSION AUTHORIZATION;
|
|
-CREATE ROLE regress_constraint_comments_noaccess;
|
|
+CREATE ROLE regress_constraint_comments_noaccess PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_constraint_comments_noaccess;
|
|
COMMENT ON CONSTRAINT the_constraint ON constraint_comments_tbl IS 'no, the comment';
|
|
ERROR: must be owner of relation constraint_comments_tbl
|
|
diff --git a/src/test/regress/expected/conversion.out b/src/test/regress/expected/conversion.out
|
|
index d785f92561..16377e5ac9 100644
|
|
--- a/src/test/regress/expected/conversion.out
|
|
+++ b/src/test/regress/expected/conversion.out
|
|
@@ -15,7 +15,7 @@ SELECT FROM test_enc_setup();
|
|
CREATE FUNCTION test_enc_conversion(bytea, name, name, bool, validlen OUT int, result OUT bytea)
|
|
AS :'regresslib', 'test_enc_conversion'
|
|
LANGUAGE C STRICT;
|
|
-CREATE USER regress_conversion_user WITH NOCREATEDB NOCREATEROLE;
|
|
+CREATE USER regress_conversion_user WITH NOCREATEDB NOCREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_conversion_user;
|
|
CREATE CONVERSION myconv FOR 'LATIN1' TO 'UTF8' FROM iso8859_1_to_utf8;
|
|
--
|
|
diff --git a/src/test/regress/expected/copy.out b/src/test/regress/expected/copy.out
|
|
index b48365ec98..a6ef910055 100644
|
|
--- a/src/test/regress/expected/copy.out
|
|
+++ b/src/test/regress/expected/copy.out
|
|
@@ -15,9 +15,11 @@ insert into copytest values('Unix',E'abc\ndef',2);
|
|
insert into copytest values('Mac',E'abc\rdef',3);
|
|
insert into copytest values(E'esc\\ape',E'a\\r\\\r\\\n\\nb',4);
|
|
\set filename :abs_builddir '/results/copytest.csv'
|
|
-copy copytest to :'filename' csv;
|
|
+\set command '\\copy copytest to ' :'filename' csv;
|
|
+:command
|
|
create temp table copytest2 (like copytest);
|
|
-copy copytest2 from :'filename' csv;
|
|
+\set command '\\copy copytest2 from ' :'filename' csv;
|
|
+:command
|
|
select * from copytest except select * from copytest2;
|
|
style | test | filler
|
|
-------+------+--------
|
|
@@ -25,8 +27,10 @@ select * from copytest except select * from copytest2;
|
|
|
|
truncate copytest2;
|
|
--- same test but with an escape char different from quote char
|
|
-copy copytest to :'filename' csv quote '''' escape E'\\';
|
|
-copy copytest2 from :'filename' csv quote '''' escape E'\\';
|
|
+\set command '\\copy copytest to ' :'filename' ' csv quote ' '\'\'\'\'' ' escape ' 'E\'' '\\\\\'';
|
|
+:command
|
|
+\set command '\\copy copytest2 from ' :'filename' ' csv quote ' '\'\'\'\'' ' escape ' 'E\'' '\\\\\'';
|
|
+:command
|
|
select * from copytest except select * from copytest2;
|
|
style | test | filler
|
|
-------+------+--------
|
|
@@ -66,13 +70,16 @@ insert into parted_copytest select x,1,'One' from generate_series(1,1000) x;
|
|
insert into parted_copytest select x,2,'Two' from generate_series(1001,1010) x;
|
|
insert into parted_copytest select x,1,'One' from generate_series(1011,1020) x;
|
|
\set filename :abs_builddir '/results/parted_copytest.csv'
|
|
-copy (select * from parted_copytest order by a) to :'filename';
|
|
+\set command '\\copy (select * from parted_copytest order by a) to ' :'filename';
|
|
+:command
|
|
truncate parted_copytest;
|
|
-copy parted_copytest from :'filename';
|
|
+\set command '\\copy parted_copytest from ' :'filename';
|
|
+:command
|
|
-- Ensure COPY FREEZE errors for partitioned tables.
|
|
begin;
|
|
truncate parted_copytest;
|
|
-copy parted_copytest from :'filename' (freeze);
|
|
+\set command '\\copy parted_copytest from ' :'filename' (freeze);
|
|
+:command
|
|
ERROR: cannot perform COPY FREEZE on a partitioned table
|
|
rollback;
|
|
select tableoid::regclass,count(*),sum(a) from parted_copytest
|
|
@@ -94,7 +101,8 @@ create trigger part_ins_trig
|
|
before insert on parted_copytest_a2
|
|
for each row
|
|
execute procedure part_ins_func();
|
|
-copy parted_copytest from :'filename';
|
|
+\set command '\\copy parted_copytest from ' :'filename';
|
|
+:command
|
|
select tableoid::regclass,count(*),sum(a) from parted_copytest
|
|
group by tableoid order by tableoid::regclass::name;
|
|
tableoid | count | sum
|
|
@@ -106,7 +114,8 @@ group by tableoid order by tableoid::regclass::name;
|
|
truncate table parted_copytest;
|
|
create index on parted_copytest (b);
|
|
drop trigger part_ins_trig on parted_copytest_a2;
|
|
-copy parted_copytest from stdin;
|
|
+\set command '\\copy parted_copytest from ' stdin;
|
|
+:command
|
|
-- Ensure index entries were properly added during the copy.
|
|
select * from parted_copytest where b = 1;
|
|
a | b | c
|
|
@@ -170,9 +179,9 @@ INFO: progress: {"type": "PIPE", "command": "COPY FROM", "relname": "tab_progre
|
|
-- Generate COPY FROM report with FILE, with some excluded tuples.
|
|
truncate tab_progress_reporting;
|
|
\set filename :abs_srcdir '/data/emp.data'
|
|
-copy tab_progress_reporting from :'filename'
|
|
- where (salary < 2000);
|
|
-INFO: progress: {"type": "FILE", "command": "COPY FROM", "relname": "tab_progress_reporting", "has_bytes_total": true, "tuples_excluded": 1, "tuples_processed": 2, "has_bytes_processed": true}
|
|
+\set command '\\copy tab_progress_reporting from ' :'filename' 'where (salary < 2000)';
|
|
+:command
|
|
+INFO: progress: {"type": "PIPE", "command": "COPY FROM", "relname": "tab_progress_reporting", "has_bytes_total": false, "tuples_excluded": 1, "tuples_processed": 2, "has_bytes_processed": true}
|
|
drop trigger check_after_tab_progress_reporting on tab_progress_reporting;
|
|
drop function notice_after_tab_progress_reporting();
|
|
drop table tab_progress_reporting;
|
|
@@ -281,7 +290,8 @@ CREATE TABLE parted_si_p_odd PARTITION OF parted_si FOR VALUES IN (1);
|
|
-- https://postgr.es/m/18130-7a86a7356a75209d%40postgresql.org
|
|
-- https://postgr.es/m/257696.1695670946%40sss.pgh.pa.us
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY parted_si(id, data) FROM :'filename';
|
|
+\set command '\\COPY parted_si(id, data) FROM ' :'filename';
|
|
+:command
|
|
-- An earlier bug (see commit b1ecb9b3fcf) could end up using a buffer from
|
|
-- the wrong partition. This test is *not* guaranteed to trigger that bug, but
|
|
-- does so when shared_buffers is small enough. To test if we encountered the
|
|
diff --git a/src/test/regress/expected/copy2.out b/src/test/regress/expected/copy2.out
|
|
index 9a74820ee8..22400a5551 100644
|
|
--- a/src/test/regress/expected/copy2.out
|
|
+++ b/src/test/regress/expected/copy2.out
|
|
@@ -553,8 +553,8 @@ select * from check_con_tbl;
|
|
(2 rows)
|
|
|
|
-- test with RLS enabled.
|
|
-CREATE ROLE regress_rls_copy_user;
|
|
-CREATE ROLE regress_rls_copy_user_colperms;
|
|
+CREATE ROLE regress_rls_copy_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_copy_user_colperms PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE rls_t1 (a int, b int, c int);
|
|
COPY rls_t1 (a, b, c) from stdin;
|
|
CREATE POLICY p1 ON rls_t1 FOR SELECT USING (a % 2 = 0);
|
|
diff --git a/src/test/regress/expected/create_function_sql.out b/src/test/regress/expected/create_function_sql.out
|
|
index 50aca5940f..42527142f6 100644
|
|
--- a/src/test/regress/expected/create_function_sql.out
|
|
+++ b/src/test/regress/expected/create_function_sql.out
|
|
@@ -4,7 +4,7 @@
|
|
-- Assorted tests using SQL-language functions
|
|
--
|
|
-- All objects made in this test are in temp_func_test schema
|
|
-CREATE USER regress_unpriv_user;
|
|
+CREATE USER regress_unpriv_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA temp_func_test;
|
|
GRANT ALL ON SCHEMA temp_func_test TO public;
|
|
SET search_path TO temp_func_test, public;
|
|
diff --git a/src/test/regress/expected/create_index.out b/src/test/regress/expected/create_index.out
|
|
index acfd9d1f4f..0eeb64e47a 100644
|
|
--- a/src/test/regress/expected/create_index.out
|
|
+++ b/src/test/regress/expected/create_index.out
|
|
@@ -51,7 +51,8 @@ CREATE TABLE fast_emp4000 (
|
|
home_base box
|
|
);
|
|
\set filename :abs_srcdir '/data/rect.data'
|
|
-COPY slow_emp4000 FROM :'filename';
|
|
+\set command '\\copy slow_emp4000 FROM ' :'filename';
|
|
+:command
|
|
INSERT INTO fast_emp4000 SELECT * FROM slow_emp4000;
|
|
ANALYZE slow_emp4000;
|
|
ANALYZE fast_emp4000;
|
|
@@ -655,7 +656,8 @@ CREATE TABLE array_index_op_test (
|
|
t text[]
|
|
);
|
|
\set filename :abs_srcdir '/data/array.data'
|
|
-COPY array_index_op_test FROM :'filename';
|
|
+\set command '\\copy array_index_op_test FROM ' :'filename';
|
|
+:command
|
|
ANALYZE array_index_op_test;
|
|
SELECT * FROM array_index_op_test WHERE i = '{NULL}' ORDER BY seqno;
|
|
seqno | i | t
|
|
@@ -2822,7 +2824,7 @@ END;
|
|
-- concurrently
|
|
REINDEX SCHEMA CONCURRENTLY schema_to_reindex;
|
|
-- Failure for unauthorized user
|
|
-CREATE ROLE regress_reindexuser NOLOGIN;
|
|
+CREATE ROLE regress_reindexuser NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION ROLE regress_reindexuser;
|
|
REINDEX SCHEMA schema_to_reindex;
|
|
ERROR: must be owner of schema schema_to_reindex
|
|
diff --git a/src/test/regress/expected/create_procedure.out b/src/test/regress/expected/create_procedure.out
|
|
index 2177ba3509..ae3ca94d00 100644
|
|
--- a/src/test/regress/expected/create_procedure.out
|
|
+++ b/src/test/regress/expected/create_procedure.out
|
|
@@ -421,7 +421,7 @@ ERROR: cp_testfunc1(integer) is not a procedure
|
|
DROP PROCEDURE nonexistent();
|
|
ERROR: procedure nonexistent() does not exist
|
|
-- privileges
|
|
-CREATE USER regress_cp_user1;
|
|
+CREATE USER regress_cp_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT INSERT ON cp_test TO regress_cp_user1;
|
|
REVOKE EXECUTE ON PROCEDURE ptest1(text) FROM PUBLIC;
|
|
SET ROLE regress_cp_user1;
|
|
diff --git a/src/test/regress/expected/create_role.out b/src/test/regress/expected/create_role.out
|
|
index 46d4f9efe9..fc2a28a2f6 100644
|
|
--- a/src/test/regress/expected/create_role.out
|
|
+++ b/src/test/regress/expected/create_role.out
|
|
@@ -1,28 +1,28 @@
|
|
-- ok, superuser can create users with any set of privileges
|
|
-CREATE ROLE regress_role_super SUPERUSER;
|
|
-CREATE ROLE regress_role_admin CREATEDB CREATEROLE REPLICATION BYPASSRLS;
|
|
+CREATE ROLE regress_role_super SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_role_admin CREATEDB CREATEROLE REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_role_admin WITH GRANT OPTION;
|
|
-CREATE ROLE regress_role_limited_admin CREATEROLE;
|
|
-CREATE ROLE regress_role_normal;
|
|
+CREATE ROLE regress_role_limited_admin CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_role_normal PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- fail, CREATEROLE user can't give away role attributes without having them
|
|
SET SESSION AUTHORIZATION regress_role_limited_admin;
|
|
-CREATE ROLE regress_nosuch_superuser SUPERUSER;
|
|
+CREATE ROLE regress_nosuch_superuser SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to create role
|
|
DETAIL: Only roles with the SUPERUSER attribute may create roles with the SUPERUSER attribute.
|
|
-CREATE ROLE regress_nosuch_replication_bypassrls REPLICATION BYPASSRLS;
|
|
+CREATE ROLE regress_nosuch_replication_bypassrls REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to create role
|
|
DETAIL: Only roles with the REPLICATION attribute may create roles with the REPLICATION attribute.
|
|
-CREATE ROLE regress_nosuch_replication REPLICATION;
|
|
+CREATE ROLE regress_nosuch_replication REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to create role
|
|
DETAIL: Only roles with the REPLICATION attribute may create roles with the REPLICATION attribute.
|
|
-CREATE ROLE regress_nosuch_bypassrls BYPASSRLS;
|
|
+CREATE ROLE regress_nosuch_bypassrls BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to create role
|
|
DETAIL: Only roles with the BYPASSRLS attribute may create roles with the BYPASSRLS attribute.
|
|
-CREATE ROLE regress_nosuch_createdb CREATEDB;
|
|
+CREATE ROLE regress_nosuch_createdb CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to create role
|
|
DETAIL: Only roles with the CREATEDB attribute may create roles with the CREATEDB attribute.
|
|
-- ok, can create a role without any special attributes
|
|
-CREATE ROLE regress_role_limited;
|
|
+CREATE ROLE regress_role_limited PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- fail, can't give it in any of the restricted attributes
|
|
ALTER ROLE regress_role_limited SUPERUSER;
|
|
ERROR: permission denied to alter role
|
|
@@ -39,10 +39,10 @@ DETAIL: Only roles with the BYPASSRLS attribute may change the BYPASSRLS attrib
|
|
DROP ROLE regress_role_limited;
|
|
-- ok, can give away these role attributes if you have them
|
|
SET SESSION AUTHORIZATION regress_role_admin;
|
|
-CREATE ROLE regress_replication_bypassrls REPLICATION BYPASSRLS;
|
|
-CREATE ROLE regress_replication REPLICATION;
|
|
-CREATE ROLE regress_bypassrls BYPASSRLS;
|
|
-CREATE ROLE regress_createdb CREATEDB;
|
|
+CREATE ROLE regress_replication_bypassrls REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_replication REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_bypassrls BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_createdb CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- ok, can toggle these role attributes off and on if you have them
|
|
ALTER ROLE regress_replication NOREPLICATION;
|
|
ALTER ROLE regress_replication REPLICATION;
|
|
@@ -58,48 +58,48 @@ ALTER ROLE regress_createdb NOSUPERUSER;
|
|
ERROR: permission denied to alter role
|
|
DETAIL: Only roles with the SUPERUSER attribute may change the SUPERUSER attribute.
|
|
-- ok, having CREATEROLE is enough to create users with these privileges
|
|
-CREATE ROLE regress_createrole CREATEROLE NOINHERIT;
|
|
+CREATE ROLE regress_createrole CREATEROLE NOINHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_createrole WITH GRANT OPTION;
|
|
-CREATE ROLE regress_login LOGIN;
|
|
-CREATE ROLE regress_inherit INHERIT;
|
|
-CREATE ROLE regress_connection_limit CONNECTION LIMIT 5;
|
|
-CREATE ROLE regress_encrypted_password ENCRYPTED PASSWORD 'foo';
|
|
-CREATE ROLE regress_password_null PASSWORD NULL;
|
|
+CREATE ROLE regress_login LOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_inherit INHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_connection_limit CONNECTION LIMIT 5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_encrypted_password ENCRYPTED PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- ok, backwards compatible noise words should be ignored
|
|
-CREATE ROLE regress_noiseword SYSID 12345;
|
|
+CREATE ROLE regress_noiseword SYSID 12345 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
NOTICE: SYSID can no longer be specified
|
|
-- fail, cannot grant membership in superuser role
|
|
-CREATE ROLE regress_nosuch_super IN ROLE regress_role_super;
|
|
+CREATE ROLE regress_nosuch_super IN ROLE regress_role_super PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to grant role "regress_role_super"
|
|
DETAIL: Only roles with the SUPERUSER attribute may grant roles with the SUPERUSER attribute.
|
|
-- fail, database owner cannot have members
|
|
-CREATE ROLE regress_nosuch_dbowner IN ROLE pg_database_owner;
|
|
+CREATE ROLE regress_nosuch_dbowner IN ROLE pg_database_owner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: role "pg_database_owner" cannot have explicit members
|
|
-- ok, can grant other users into a role
|
|
CREATE ROLE regress_inroles ROLE
|
|
regress_role_super, regress_createdb, regress_createrole, regress_login,
|
|
- regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null;
|
|
+ regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- fail, cannot grant a role into itself
|
|
-CREATE ROLE regress_nosuch_recursive ROLE regress_nosuch_recursive;
|
|
+CREATE ROLE regress_nosuch_recursive ROLE regress_nosuch_recursive PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: role "regress_nosuch_recursive" is a member of role "regress_nosuch_recursive"
|
|
-- ok, can grant other users into a role with admin option
|
|
CREATE ROLE regress_adminroles ADMIN
|
|
regress_role_super, regress_createdb, regress_createrole, regress_login,
|
|
- regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null;
|
|
+ regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- fail, cannot grant a role into itself with admin option
|
|
-CREATE ROLE regress_nosuch_admin_recursive ADMIN regress_nosuch_admin_recursive;
|
|
+CREATE ROLE regress_nosuch_admin_recursive ADMIN regress_nosuch_admin_recursive PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: role "regress_nosuch_admin_recursive" is a member of role "regress_nosuch_admin_recursive"
|
|
-- fail, regress_createrole does not have CREATEDB privilege
|
|
SET SESSION AUTHORIZATION regress_createrole;
|
|
CREATE DATABASE regress_nosuch_db;
|
|
ERROR: permission denied to create database
|
|
-- ok, regress_createrole can create new roles
|
|
-CREATE ROLE regress_plainrole;
|
|
+CREATE ROLE regress_plainrole PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- ok, roles with CREATEROLE can create new roles with it
|
|
-CREATE ROLE regress_rolecreator CREATEROLE;
|
|
+CREATE ROLE regress_rolecreator CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- ok, roles with CREATEROLE can create new roles with different role
|
|
-- attributes, including CREATEROLE
|
|
-CREATE ROLE regress_hasprivs CREATEROLE LOGIN INHERIT CONNECTION LIMIT 5;
|
|
+CREATE ROLE regress_hasprivs CREATEROLE LOGIN INHERIT CONNECTION LIMIT 5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- ok, we should be able to modify a role we created
|
|
COMMENT ON ROLE regress_hasprivs IS 'some comment';
|
|
ALTER ROLE regress_hasprivs RENAME TO regress_tenant;
|
|
@@ -141,7 +141,7 @@ ERROR: permission denied to reassign objects
|
|
DETAIL: Only roles with privileges of role "regress_tenant" may reassign objects owned by it.
|
|
-- ok, create a role with a value for createrole_self_grant
|
|
SET createrole_self_grant = 'set, inherit';
|
|
-CREATE ROLE regress_tenant2;
|
|
+CREATE ROLE regress_tenant2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_tenant2;
|
|
-- ok, regress_tenant2 can create objects within the database
|
|
SET SESSION AUTHORIZATION regress_tenant2;
|
|
@@ -165,34 +165,34 @@ ALTER TABLE tenant2_table OWNER TO regress_tenant2;
|
|
ERROR: must be able to SET ROLE "regress_tenant2"
|
|
DROP TABLE tenant2_table;
|
|
-- fail, CREATEROLE is not enough to create roles in privileged roles
|
|
-CREATE ROLE regress_read_all_data IN ROLE pg_read_all_data;
|
|
+CREATE ROLE regress_read_all_data PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_data;
|
|
ERROR: permission denied to grant role "pg_read_all_data"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_read_all_data" may grant this role.
|
|
-CREATE ROLE regress_write_all_data IN ROLE pg_write_all_data;
|
|
+CREATE ROLE regress_write_all_data PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_write_all_data;
|
|
ERROR: permission denied to grant role "pg_write_all_data"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_write_all_data" may grant this role.
|
|
-CREATE ROLE regress_monitor IN ROLE pg_monitor;
|
|
+CREATE ROLE regress_monitor PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_monitor;
|
|
ERROR: permission denied to grant role "pg_monitor"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_monitor" may grant this role.
|
|
-CREATE ROLE regress_read_all_settings IN ROLE pg_read_all_settings;
|
|
+CREATE ROLE regress_read_all_settings PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_settings;
|
|
ERROR: permission denied to grant role "pg_read_all_settings"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_read_all_settings" may grant this role.
|
|
-CREATE ROLE regress_read_all_stats IN ROLE pg_read_all_stats;
|
|
+CREATE ROLE regress_read_all_stats PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_stats;
|
|
ERROR: permission denied to grant role "pg_read_all_stats"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_read_all_stats" may grant this role.
|
|
-CREATE ROLE regress_stat_scan_tables IN ROLE pg_stat_scan_tables;
|
|
+CREATE ROLE regress_stat_scan_tables PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_stat_scan_tables;
|
|
ERROR: permission denied to grant role "pg_stat_scan_tables"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_stat_scan_tables" may grant this role.
|
|
-CREATE ROLE regress_read_server_files IN ROLE pg_read_server_files;
|
|
+CREATE ROLE regress_read_server_files PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_server_files;
|
|
ERROR: permission denied to grant role "pg_read_server_files"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_read_server_files" may grant this role.
|
|
-CREATE ROLE regress_write_server_files IN ROLE pg_write_server_files;
|
|
+CREATE ROLE regress_write_server_files PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_write_server_files;
|
|
ERROR: permission denied to grant role "pg_write_server_files"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_write_server_files" may grant this role.
|
|
-CREATE ROLE regress_execute_server_program IN ROLE pg_execute_server_program;
|
|
+CREATE ROLE regress_execute_server_program PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_execute_server_program;
|
|
ERROR: permission denied to grant role "pg_execute_server_program"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_execute_server_program" may grant this role.
|
|
-CREATE ROLE regress_signal_backend IN ROLE pg_signal_backend;
|
|
+CREATE ROLE regress_signal_backend PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_signal_backend;
|
|
ERROR: permission denied to grant role "pg_signal_backend"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_signal_backend" may grant this role.
|
|
-- fail, role still owns database objects
|
|
diff --git a/src/test/regress/expected/create_schema.out b/src/test/regress/expected/create_schema.out
|
|
index 93302a07ef..1a73f083ac 100644
|
|
--- a/src/test/regress/expected/create_schema.out
|
|
+++ b/src/test/regress/expected/create_schema.out
|
|
@@ -2,7 +2,7 @@
|
|
-- CREATE_SCHEMA
|
|
--
|
|
-- Schema creation with elements.
|
|
-CREATE ROLE regress_create_schema_role SUPERUSER;
|
|
+CREATE ROLE regress_create_schema_role SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Cases where schema creation fails as objects are qualified with a schema
|
|
-- that does not match with what's expected.
|
|
-- This checks all the object types that include schema qualifications.
|
|
diff --git a/src/test/regress/expected/create_view.out b/src/test/regress/expected/create_view.out
|
|
index f551624afb..57f1e432d4 100644
|
|
--- a/src/test/regress/expected/create_view.out
|
|
+++ b/src/test/regress/expected/create_view.out
|
|
@@ -18,7 +18,8 @@ CREATE TABLE real_city (
|
|
outline path
|
|
);
|
|
\set filename :abs_srcdir '/data/real_city.data'
|
|
-COPY real_city FROM :'filename';
|
|
+\set command '\\copy real_city FROM ' :'filename';
|
|
+:command
|
|
ANALYZE real_city;
|
|
SELECT *
|
|
INTO TABLE ramp
|
|
diff --git a/src/test/regress/expected/database.out b/src/test/regress/expected/database.out
|
|
index 4cbdbdf84d..573362850e 100644
|
|
--- a/src/test/regress/expected/database.out
|
|
+++ b/src/test/regress/expected/database.out
|
|
@@ -1,8 +1,6 @@
|
|
CREATE DATABASE regression_tbd
|
|
ENCODING utf8 LC_COLLATE "C" LC_CTYPE "C" TEMPLATE template0;
|
|
ALTER DATABASE regression_tbd RENAME TO regression_utf8;
|
|
-ALTER DATABASE regression_utf8 SET TABLESPACE regress_tblspace;
|
|
-ALTER DATABASE regression_utf8 RESET TABLESPACE;
|
|
ALTER DATABASE regression_utf8 CONNECTION_LIMIT 123;
|
|
-- Test PgDatabaseToastTable. Doing this with GRANT would be slow.
|
|
BEGIN;
|
|
diff --git a/src/test/regress/expected/dependency.out b/src/test/regress/expected/dependency.out
|
|
index 6d9498cdd1..692cf979d0 100644
|
|
--- a/src/test/regress/expected/dependency.out
|
|
+++ b/src/test/regress/expected/dependency.out
|
|
@@ -1,10 +1,10 @@
|
|
--
|
|
-- DEPENDENCIES
|
|
--
|
|
-CREATE USER regress_dep_user;
|
|
-CREATE USER regress_dep_user2;
|
|
-CREATE USER regress_dep_user3;
|
|
-CREATE GROUP regress_dep_group;
|
|
+CREATE USER regress_dep_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_dep_group PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE deptest (f1 serial primary key, f2 text);
|
|
GRANT SELECT ON TABLE deptest TO GROUP regress_dep_group;
|
|
GRANT ALL ON TABLE deptest TO regress_dep_user, regress_dep_user2;
|
|
@@ -41,9 +41,9 @@ ERROR: role "regress_dep_user3" cannot be dropped because some objects depend o
|
|
DROP TABLE deptest;
|
|
DROP USER regress_dep_user3;
|
|
-- Test DROP OWNED
|
|
-CREATE USER regress_dep_user0;
|
|
-CREATE USER regress_dep_user1;
|
|
-CREATE USER regress_dep_user2;
|
|
+CREATE USER regress_dep_user0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_dep_user0;
|
|
-- permission denied
|
|
DROP OWNED BY regress_dep_user1;
|
|
diff --git a/src/test/regress/expected/drop_if_exists.out b/src/test/regress/expected/drop_if_exists.out
|
|
index 5e44c2c3ce..eb3bb329fb 100644
|
|
--- a/src/test/regress/expected/drop_if_exists.out
|
|
+++ b/src/test/regress/expected/drop_if_exists.out
|
|
@@ -64,9 +64,9 @@ ERROR: type "test_domain_exists" does not exist
|
|
---
|
|
--- role/user/group
|
|
---
|
|
-CREATE USER regress_test_u1;
|
|
-CREATE ROLE regress_test_r1;
|
|
-CREATE GROUP regress_test_g1;
|
|
+CREATE USER regress_test_u1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_r1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_test_g1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
DROP USER regress_test_u2;
|
|
ERROR: role "regress_test_u2" does not exist
|
|
DROP USER IF EXISTS regress_test_u1, regress_test_u2;
|
|
diff --git a/src/test/regress/expected/equivclass.out b/src/test/regress/expected/equivclass.out
|
|
index 126f7047fe..0e2cc73426 100644
|
|
--- a/src/test/regress/expected/equivclass.out
|
|
+++ b/src/test/regress/expected/equivclass.out
|
|
@@ -384,7 +384,7 @@ set enable_nestloop = on;
|
|
set enable_mergejoin = off;
|
|
alter table ec1 enable row level security;
|
|
create policy p1 on ec1 using (f1 < '5'::int8alias1);
|
|
-create user regress_user_ectest;
|
|
+create user regress_user_ectest PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant select on ec0 to regress_user_ectest;
|
|
grant select on ec1 to regress_user_ectest;
|
|
-- without any RLS, we'll treat {a.ff, b.ff, 43} as an EquivalenceClass
|
|
diff --git a/src/test/regress/expected/event_trigger.out b/src/test/regress/expected/event_trigger.out
|
|
index 5a10958df5..a578c06ebd 100644
|
|
--- a/src/test/regress/expected/event_trigger.out
|
|
+++ b/src/test/regress/expected/event_trigger.out
|
|
@@ -85,7 +85,7 @@ create event trigger regress_event_trigger2 on ddl_command_start
|
|
-- OK
|
|
comment on event trigger regress_event_trigger is 'test comment';
|
|
-- drop as non-superuser should fail
|
|
-create role regress_evt_user;
|
|
+create role regress_evt_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
set role regress_evt_user;
|
|
create event trigger regress_event_trigger_noperms on ddl_command_start
|
|
execute procedure test_event_trigger();
|
|
diff --git a/src/test/regress/expected/foreign_data.out b/src/test/regress/expected/foreign_data.out
|
|
index 6ed50fdcfa..caa00a345d 100644
|
|
--- a/src/test/regress/expected/foreign_data.out
|
|
+++ b/src/test/regress/expected/foreign_data.out
|
|
@@ -14,13 +14,13 @@ CREATE FUNCTION test_fdw_handler()
|
|
SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_foreign_data_user, regress_test_role, regress_test_role2, regress_test_role_super, regress_test_indirect, regress_unprivileged_role;
|
|
RESET client_min_messages;
|
|
-CREATE ROLE regress_foreign_data_user LOGIN SUPERUSER;
|
|
+CREATE ROLE regress_foreign_data_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_foreign_data_user';
|
|
-CREATE ROLE regress_test_role;
|
|
-CREATE ROLE regress_test_role2;
|
|
-CREATE ROLE regress_test_role_super SUPERUSER;
|
|
-CREATE ROLE regress_test_indirect;
|
|
-CREATE ROLE regress_unprivileged_role;
|
|
+CREATE ROLE regress_test_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_role_super SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_indirect PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_unprivileged_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE FOREIGN DATA WRAPPER dummy;
|
|
COMMENT ON FOREIGN DATA WRAPPER dummy IS 'useless';
|
|
CREATE FOREIGN DATA WRAPPER postgresql VALIDATOR postgresql_fdw_validator;
|
|
diff --git a/src/test/regress/expected/foreign_key.out b/src/test/regress/expected/foreign_key.out
|
|
index 84745b9f60..4883c12351 100644
|
|
--- a/src/test/regress/expected/foreign_key.out
|
|
+++ b/src/test/regress/expected/foreign_key.out
|
|
@@ -1985,7 +1985,7 @@ ALTER TABLE fk_partitioned_fk_6 ATTACH PARTITION fk_partitioned_pk_6 FOR VALUES
|
|
ERROR: cannot ALTER TABLE "fk_partitioned_pk_61" because it is being used by active queries in this session
|
|
DROP TABLE fk_partitioned_pk_6, fk_partitioned_fk_6;
|
|
-- test the case when the referenced table is owned by a different user
|
|
-create role regress_other_partitioned_fk_owner;
|
|
+create role regress_other_partitioned_fk_owner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant references on fk_notpartitioned_pk to regress_other_partitioned_fk_owner;
|
|
set role regress_other_partitioned_fk_owner;
|
|
create table other_partitioned_fk(a int, b int) partition by list (a);
|
|
diff --git a/src/test/regress/expected/generated.out b/src/test/regress/expected/generated.out
|
|
index 5881420388..4ae21aa43c 100644
|
|
--- a/src/test/regress/expected/generated.out
|
|
+++ b/src/test/regress/expected/generated.out
|
|
@@ -534,7 +534,7 @@ CREATE TABLE gtest10a (a int PRIMARY KEY, b int GENERATED ALWAYS AS (a * 2) STOR
|
|
ALTER TABLE gtest10a DROP COLUMN b;
|
|
INSERT INTO gtest10a (a) VALUES (1);
|
|
-- privileges
|
|
-CREATE USER regress_user11;
|
|
+CREATE USER regress_user11 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE gtest11s (a int PRIMARY KEY, b int, c int GENERATED ALWAYS AS (b * 2) STORED);
|
|
INSERT INTO gtest11s VALUES (1, 10), (2, 20);
|
|
GRANT SELECT (a, c) ON gtest11s TO regress_user11;
|
|
diff --git a/src/test/regress/expected/guc.out b/src/test/regress/expected/guc.out
|
|
index 127c953297..e6f8272f99 100644
|
|
--- a/src/test/regress/expected/guc.out
|
|
+++ b/src/test/regress/expected/guc.out
|
|
@@ -584,7 +584,7 @@ PREPARE foo AS SELECT 1;
|
|
LISTEN foo_event;
|
|
SET vacuum_cost_delay = 13;
|
|
CREATE TEMP TABLE tmp_foo (data text) ON COMMIT DELETE ROWS;
|
|
-CREATE ROLE regress_guc_user;
|
|
+CREATE ROLE regress_guc_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_guc_user;
|
|
-- look changes
|
|
SELECT pg_listening_channels();
|
|
diff --git a/src/test/regress/expected/hash_index.out b/src/test/regress/expected/hash_index.out
|
|
index a2036a1597..805d73b9d2 100644
|
|
--- a/src/test/regress/expected/hash_index.out
|
|
+++ b/src/test/regress/expected/hash_index.out
|
|
@@ -20,10 +20,14 @@ CREATE TABLE hash_f8_heap (
|
|
random float8
|
|
);
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY hash_i4_heap FROM :'filename';
|
|
-COPY hash_name_heap FROM :'filename';
|
|
-COPY hash_txt_heap FROM :'filename';
|
|
-COPY hash_f8_heap FROM :'filename';
|
|
+\set command '\\copy hash_i4_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_name_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_txt_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_f8_heap FROM ' :'filename';
|
|
+:command
|
|
-- the data in this file has a lot of duplicates in the index key
|
|
-- fields, leading to long bucket chains and lots of table expansion.
|
|
-- this is therefore a stress test of the bucket overflow code (unlike
|
|
diff --git a/src/test/regress/expected/identity.out b/src/test/regress/expected/identity.out
|
|
index 1b74958de9..078187b542 100644
|
|
--- a/src/test/regress/expected/identity.out
|
|
+++ b/src/test/regress/expected/identity.out
|
|
@@ -520,7 +520,7 @@ ALTER TABLE itest7 ALTER COLUMN a SET GENERATED BY DEFAULT;
|
|
ALTER TABLE itest7 ALTER COLUMN a RESTART;
|
|
ALTER TABLE itest7 ALTER COLUMN a DROP IDENTITY;
|
|
-- privileges
|
|
-CREATE USER regress_identity_user1;
|
|
+CREATE USER regress_identity_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE itest8 (a int GENERATED ALWAYS AS IDENTITY, b text);
|
|
GRANT SELECT, INSERT ON itest8 TO regress_identity_user1;
|
|
SET ROLE regress_identity_user1;
|
|
diff --git a/src/test/regress/expected/inherit.out b/src/test/regress/expected/inherit.out
|
|
index 8f831c95c3..ec681b52af 100644
|
|
--- a/src/test/regress/expected/inherit.out
|
|
+++ b/src/test/regress/expected/inherit.out
|
|
@@ -2636,7 +2636,7 @@ create index on permtest_parent (left(c, 3));
|
|
insert into permtest_parent
|
|
select 1, 'a', left(fipshash(i::text), 5) from generate_series(0, 100) i;
|
|
analyze permtest_parent;
|
|
-create role regress_no_child_access;
|
|
+create role regress_no_child_access PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
revoke all on permtest_grandchild from regress_no_child_access;
|
|
grant select on permtest_parent to regress_no_child_access;
|
|
set session authorization regress_no_child_access;
|
|
diff --git a/src/test/regress/expected/insert.out b/src/test/regress/expected/insert.out
|
|
index cf4b5221a8..fa6ccb639c 100644
|
|
--- a/src/test/regress/expected/insert.out
|
|
+++ b/src/test/regress/expected/insert.out
|
|
@@ -802,7 +802,7 @@ drop table mlparted5;
|
|
-- appropriate key description (or none) in various situations
|
|
create table key_desc (a int, b int) partition by list ((a+0));
|
|
create table key_desc_1 partition of key_desc for values in (1) partition by range (b);
|
|
-create user regress_insert_other_user;
|
|
+create user regress_insert_other_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant select (a) on key_desc_1 to regress_insert_other_user;
|
|
grant insert on key_desc to regress_insert_other_user;
|
|
set role regress_insert_other_user;
|
|
@@ -914,7 +914,7 @@ DETAIL: Failing row contains (2, hi there).
|
|
-- check that the message shows the appropriate column description in a
|
|
-- situation where the partitioned table is not the primary ModifyTable node
|
|
create table inserttest3 (f1 text default 'foo', f2 text default 'bar', f3 int);
|
|
-create role regress_coldesc_role;
|
|
+create role regress_coldesc_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant insert on inserttest3 to regress_coldesc_role;
|
|
grant insert on brtrigpartcon to regress_coldesc_role;
|
|
revoke select on brtrigpartcon from regress_coldesc_role;
|
|
diff --git a/src/test/regress/expected/jsonb.out b/src/test/regress/expected/jsonb.out
|
|
index f8a7dac960..64dcaf171c 100644
|
|
--- a/src/test/regress/expected/jsonb.out
|
|
+++ b/src/test/regress/expected/jsonb.out
|
|
@@ -4,7 +4,8 @@ CREATE TABLE testjsonb (
|
|
j jsonb
|
|
);
|
|
\set filename :abs_srcdir '/data/jsonb.data'
|
|
-COPY testjsonb FROM :'filename';
|
|
+\set command '\\copy testjsonb FROM ' :'filename';
|
|
+:command
|
|
-- Strings.
|
|
SELECT '""'::jsonb; -- OK.
|
|
jsonb
|
|
diff --git a/src/test/regress/expected/largeobject.out b/src/test/regress/expected/largeobject.out
|
|
index 4921dd79ae..d18a3cdd66 100644
|
|
--- a/src/test/regress/expected/largeobject.out
|
|
+++ b/src/test/regress/expected/largeobject.out
|
|
@@ -7,7 +7,7 @@
|
|
-- ensure consistent test output regardless of the default bytea format
|
|
SET bytea_output TO escape;
|
|
-- Test ALTER LARGE OBJECT OWNER
|
|
-CREATE ROLE regress_lo_user;
|
|
+CREATE ROLE regress_lo_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SELECT lo_create(42);
|
|
lo_create
|
|
-----------
|
|
@@ -346,7 +346,8 @@ SELECT lo_unlink(loid) from lotest_stash_values;
|
|
|
|
TRUNCATE lotest_stash_values;
|
|
\set filename :abs_srcdir '/data/tenk.data'
|
|
-INSERT INTO lotest_stash_values (loid) SELECT lo_import(:'filename');
|
|
+\lo_import :filename
|
|
+INSERT INTO lotest_stash_values (loid) VALUES (:LASTOID);
|
|
BEGIN;
|
|
UPDATE lotest_stash_values SET fd=lo_open(loid, CAST(x'20000' | x'40000' AS integer));
|
|
-- verify length of large object
|
|
@@ -410,12 +411,8 @@ SELECT lo_close(fd) FROM lotest_stash_values;
|
|
|
|
END;
|
|
\set filename :abs_builddir '/results/lotest.txt'
|
|
-SELECT lo_export(loid, :'filename') FROM lotest_stash_values;
|
|
- lo_export
|
|
------------
|
|
- 1
|
|
-(1 row)
|
|
-
|
|
+SELECT loid FROM lotest_stash_values \gset
|
|
+\lo_export :loid, :filename
|
|
\lo_import :filename
|
|
\set newloid :LASTOID
|
|
-- just make sure \lo_export does not barf
|
|
diff --git a/src/test/regress/expected/lock.out b/src/test/regress/expected/lock.out
|
|
index ad137d3645..8dac447436 100644
|
|
--- a/src/test/regress/expected/lock.out
|
|
+++ b/src/test/regress/expected/lock.out
|
|
@@ -16,7 +16,7 @@ CREATE VIEW lock_view3 AS SELECT * from lock_view2;
|
|
CREATE VIEW lock_view4 AS SELECT (select a from lock_tbl1a limit 1) from lock_tbl1;
|
|
CREATE VIEW lock_view5 AS SELECT * from lock_tbl1 where a in (select * from lock_tbl1a);
|
|
CREATE VIEW lock_view6 AS SELECT * from (select * from lock_tbl1) sub;
|
|
-CREATE ROLE regress_rol_lock1;
|
|
+CREATE ROLE regress_rol_lock1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER ROLE regress_rol_lock1 SET search_path = lock_schema1;
|
|
GRANT USAGE ON SCHEMA lock_schema1 TO regress_rol_lock1;
|
|
-- Try all valid lock options; also try omitting the optional TABLE keyword.
|
|
diff --git a/src/test/regress/expected/matview.out b/src/test/regress/expected/matview.out
|
|
index 67a50bde3d..7eeafd2603 100644
|
|
--- a/src/test/regress/expected/matview.out
|
|
+++ b/src/test/regress/expected/matview.out
|
|
@@ -549,7 +549,7 @@ SELECT * FROM mvtest_mv_v;
|
|
DROP TABLE mvtest_v CASCADE;
|
|
NOTICE: drop cascades to materialized view mvtest_mv_v
|
|
-- make sure running as superuser works when MV owned by another role (bug #11208)
|
|
-CREATE ROLE regress_user_mvtest;
|
|
+CREATE ROLE regress_user_mvtest PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET ROLE regress_user_mvtest;
|
|
-- this test case also checks for ambiguity in the queries issued by
|
|
-- refresh_by_match_merge(), by choosing column names that intentionally
|
|
@@ -615,7 +615,7 @@ HINT: Use the REFRESH MATERIALIZED VIEW command.
|
|
ROLLBACK;
|
|
-- INSERT privileges if relation owner is not allowed to insert.
|
|
CREATE SCHEMA matview_schema;
|
|
-CREATE USER regress_matview_user;
|
|
+CREATE USER regress_matview_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE regress_matview_user
|
|
REVOKE INSERT ON TABLES FROM regress_matview_user;
|
|
GRANT ALL ON SCHEMA matview_schema TO public;
|
|
diff --git a/src/test/regress/expected/merge.out b/src/test/regress/expected/merge.out
|
|
index bc9a59803f..5b9ddf0626 100644
|
|
--- a/src/test/regress/expected/merge.out
|
|
+++ b/src/test/regress/expected/merge.out
|
|
@@ -1,9 +1,9 @@
|
|
--
|
|
-- MERGE
|
|
--
|
|
-CREATE USER regress_merge_privs;
|
|
-CREATE USER regress_merge_no_privs;
|
|
-CREATE USER regress_merge_none;
|
|
+CREATE USER regress_merge_privs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_merge_no_privs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_merge_none PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
DROP TABLE IF EXISTS target;
|
|
NOTICE: table "target" does not exist, skipping
|
|
DROP TABLE IF EXISTS source;
|
|
diff --git a/src/test/regress/expected/misc.out b/src/test/regress/expected/misc.out
|
|
index 6e816c57f1..6ef45b468e 100644
|
|
--- a/src/test/regress/expected/misc.out
|
|
+++ b/src/test/regress/expected/misc.out
|
|
@@ -59,9 +59,11 @@ DROP TABLE tmp;
|
|
-- copy
|
|
--
|
|
\set filename :abs_builddir '/results/onek.data'
|
|
-COPY onek TO :'filename';
|
|
+\set command '\\copy onek TO ' :'filename';
|
|
+:command
|
|
CREATE TEMP TABLE onek_copy (LIKE onek);
|
|
-COPY onek_copy FROM :'filename';
|
|
+\set command '\\copy onek_copy FROM ' :'filename';
|
|
+:command
|
|
SELECT * FROM onek EXCEPT ALL SELECT * FROM onek_copy;
|
|
unique1 | unique2 | two | four | ten | twenty | hundred | thousand | twothousand | fivethous | tenthous | odd | even | stringu1 | stringu2 | string4
|
|
---------+---------+-----+------+-----+--------+---------+----------+-------------+-----------+----------+-----+------+----------+----------+---------
|
|
@@ -73,9 +75,11 @@ SELECT * FROM onek_copy EXCEPT ALL SELECT * FROM onek;
|
|
(0 rows)
|
|
|
|
\set filename :abs_builddir '/results/stud_emp.data'
|
|
-COPY BINARY stud_emp TO :'filename';
|
|
+\set command '\\COPY BINARY stud_emp TO ' :'filename';
|
|
+:command
|
|
CREATE TEMP TABLE stud_emp_copy (LIKE stud_emp);
|
|
-COPY BINARY stud_emp_copy FROM :'filename';
|
|
+\set command '\\COPY BINARY stud_emp_copy FROM ' :'filename';
|
|
+:command
|
|
SELECT * FROM stud_emp_copy;
|
|
name | age | location | salary | manager | gpa | percent
|
|
-------+-----+------------+--------+---------+-----+---------
|
|
diff --git a/src/test/regress/expected/misc_functions.out b/src/test/regress/expected/misc_functions.out
|
|
index c669948370..47111b1d24 100644
|
|
--- a/src/test/regress/expected/misc_functions.out
|
|
+++ b/src/test/regress/expected/misc_functions.out
|
|
@@ -297,7 +297,7 @@ SELECT pg_log_backend_memory_contexts(pid) FROM pg_stat_activity
|
|
t
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_log_memory;
|
|
+CREATE ROLE regress_log_memory PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SELECT has_function_privilege('regress_log_memory',
|
|
'pg_log_backend_memory_contexts(integer)', 'EXECUTE'); -- no
|
|
has_function_privilege
|
|
@@ -483,7 +483,7 @@ select count(*) > 0 from
|
|
--
|
|
-- Test replication slot directory functions
|
|
--
|
|
-CREATE ROLE regress_slot_dir_funcs;
|
|
+CREATE ROLE regress_slot_dir_funcs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Not available by default.
|
|
SELECT has_function_privilege('regress_slot_dir_funcs',
|
|
'pg_ls_logicalsnapdir()', 'EXECUTE');
|
|
diff --git a/src/test/regress/expected/object_address.out b/src/test/regress/expected/object_address.out
|
|
index fc42d418bf..e38f517574 100644
|
|
--- a/src/test/regress/expected/object_address.out
|
|
+++ b/src/test/regress/expected/object_address.out
|
|
@@ -5,7 +5,7 @@
|
|
SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_addr_user;
|
|
RESET client_min_messages;
|
|
-CREATE USER regress_addr_user;
|
|
+CREATE USER regress_addr_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Test generic object addressing/identification functions
|
|
CREATE SCHEMA addr_nsp;
|
|
SET search_path TO 'addr_nsp';
|
|
diff --git a/src/test/regress/expected/password.out b/src/test/regress/expected/password.out
|
|
index 8475231735..0653946337 100644
|
|
--- a/src/test/regress/expected/password.out
|
|
+++ b/src/test/regress/expected/password.out
|
|
@@ -12,11 +12,11 @@ SET password_encryption = 'md5'; -- ok
|
|
SET password_encryption = 'scram-sha-256'; -- ok
|
|
-- consistency of password entries
|
|
SET password_encryption = 'md5';
|
|
-CREATE ROLE regress_passwd1 PASSWORD 'role_pwd1';
|
|
-CREATE ROLE regress_passwd2 PASSWORD 'role_pwd2';
|
|
+CREATE ROLE regress_passwd1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET password_encryption = 'scram-sha-256';
|
|
-CREATE ROLE regress_passwd3 PASSWORD 'role_pwd3';
|
|
-CREATE ROLE regress_passwd4 PASSWORD NULL;
|
|
+CREATE ROLE regress_passwd3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- check list of created entries
|
|
--
|
|
-- The scram secret will look something like:
|
|
@@ -30,10 +30,10 @@ SELECT rolname, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+
|
|
ORDER BY rolname, rolpassword;
|
|
rolname | rolpassword_masked
|
|
-----------------+---------------------------------------------------
|
|
- regress_passwd1 | md5783277baca28003b33453252be4dbb34
|
|
- regress_passwd2 | md54044304ba511dd062133eb5b4b84a2a3
|
|
+ regress_passwd1 | NEON_MD5_PLACEHOLDER:regress_passwd1
|
|
+ regress_passwd2 | NEON_MD5_PLACEHOLDER:regress_passwd2
|
|
regress_passwd3 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
- regress_passwd4 |
|
|
+ regress_passwd4 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
(4 rows)
|
|
|
|
-- Rename a role
|
|
@@ -54,24 +54,16 @@ ALTER ROLE regress_passwd2_new RENAME TO regress_passwd2;
|
|
-- passwords.
|
|
SET password_encryption = 'md5';
|
|
-- encrypt with MD5
|
|
-ALTER ROLE regress_passwd2 PASSWORD 'foo';
|
|
--- already encrypted, use as they are
|
|
-ALTER ROLE regress_passwd1 PASSWORD 'md5cd3578025fe2c3d7ed1b9a9b26238b70';
|
|
-ALTER ROLE regress_passwd3 PASSWORD 'SCRAM-SHA-256$4096:VLK4RMaQLCvNtQ==$6YtlR4t69SguDiwFvbVgVZtuz6gpJQQqUMZ7IQJK5yI=:ps75jrHeYU4lXCcXI4O8oIdJ3eO8o2jirjruw9phBTo=';
|
|
+ALTER ROLE regress_passwd2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET password_encryption = 'scram-sha-256';
|
|
-- create SCRAM secret
|
|
-ALTER ROLE regress_passwd4 PASSWORD 'foo';
|
|
--- already encrypted with MD5, use as it is
|
|
-CREATE ROLE regress_passwd5 PASSWORD 'md5e73a4b11df52a6068f8b39f90be36023';
|
|
--- This looks like a valid SCRAM-SHA-256 secret, but it is not
|
|
--- so it should be hashed with SCRAM-SHA-256.
|
|
-CREATE ROLE regress_passwd6 PASSWORD 'SCRAM-SHA-256$1234';
|
|
--- These may look like valid MD5 secrets, but they are not, so they
|
|
--- should be hashed with SCRAM-SHA-256.
|
|
--- trailing garbage at the end
|
|
-CREATE ROLE regress_passwd7 PASSWORD 'md5012345678901234567890123456789zz';
|
|
--- invalid length
|
|
-CREATE ROLE regress_passwd8 PASSWORD 'md501234567890123456789012345678901zz';
|
|
+ALTER ROLE regress_passwd4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd7 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd8 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Changing the SCRAM iteration count
|
|
SET scram_iterations = 1024;
|
|
CREATE ROLE regress_passwd9 PASSWORD 'alterediterationcount';
|
|
@@ -81,11 +73,11 @@ SELECT rolname, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+
|
|
ORDER BY rolname, rolpassword;
|
|
rolname | rolpassword_masked
|
|
-----------------+---------------------------------------------------
|
|
- regress_passwd1 | md5cd3578025fe2c3d7ed1b9a9b26238b70
|
|
- regress_passwd2 | md5dfa155cadd5f4ad57860162f3fab9cdb
|
|
+ regress_passwd1 | NEON_MD5_PLACEHOLDER:regress_passwd1
|
|
+ regress_passwd2 | NEON_MD5_PLACEHOLDER:regress_passwd2
|
|
regress_passwd3 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
regress_passwd4 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
- regress_passwd5 | md5e73a4b11df52a6068f8b39f90be36023
|
|
+ regress_passwd5 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
regress_passwd6 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
regress_passwd7 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
regress_passwd8 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
@@ -95,23 +87,20 @@ SELECT rolname, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+
|
|
-- An empty password is not allowed, in any form
|
|
CREATE ROLE regress_passwd_empty PASSWORD '';
|
|
NOTICE: empty string is not a valid password, clearing password
|
|
+ERROR: Failed to get encrypted password: User "regress_passwd_empty" has no password assigned.
|
|
ALTER ROLE regress_passwd_empty PASSWORD 'md585939a5ce845f1a1b620742e3c659e0a';
|
|
-NOTICE: empty string is not a valid password, clearing password
|
|
+ERROR: role "regress_passwd_empty" does not exist
|
|
ALTER ROLE regress_passwd_empty PASSWORD 'SCRAM-SHA-256$4096:hpFyHTUsSWcR7O9P$LgZFIt6Oqdo27ZFKbZ2nV+vtnYM995pDh9ca6WSi120=:qVV5NeluNfUPkwm7Vqat25RjSPLkGeoZBQs6wVv+um4=';
|
|
-NOTICE: empty string is not a valid password, clearing password
|
|
+ERROR: role "regress_passwd_empty" does not exist
|
|
SELECT rolpassword FROM pg_authid WHERE rolname='regress_passwd_empty';
|
|
rolpassword
|
|
-------------
|
|
-
|
|
-(1 row)
|
|
+(0 rows)
|
|
|
|
--- Test with invalid stored and server keys.
|
|
---
|
|
--- The first is valid, to act as a control. The others have too long
|
|
--- stored/server keys. They will be re-hashed.
|
|
-CREATE ROLE regress_passwd_sha_len0 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
|
|
-CREATE ROLE regress_passwd_sha_len1 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96RqwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
|
|
-CREATE ROLE regress_passwd_sha_len2 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=';
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd_sha_len0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd_sha_len1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd_sha_len2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Check that the invalid secrets were re-hashed. A re-hashed secret
|
|
-- should not contain the original salt.
|
|
SELECT rolname, rolpassword not like '%A6xHKoH/494E941doaPOYg==%' as is_rolpassword_rehashed
|
|
@@ -120,7 +109,7 @@ SELECT rolname, rolpassword not like '%A6xHKoH/494E941doaPOYg==%' as is_rolpassw
|
|
ORDER BY rolname;
|
|
rolname | is_rolpassword_rehashed
|
|
-------------------------+-------------------------
|
|
- regress_passwd_sha_len0 | f
|
|
+ regress_passwd_sha_len0 | t
|
|
regress_passwd_sha_len1 | t
|
|
regress_passwd_sha_len2 | t
|
|
(3 rows)
|
|
@@ -135,6 +124,7 @@ DROP ROLE regress_passwd7;
|
|
DROP ROLE regress_passwd8;
|
|
DROP ROLE regress_passwd9;
|
|
DROP ROLE regress_passwd_empty;
|
|
+ERROR: role "regress_passwd_empty" does not exist
|
|
DROP ROLE regress_passwd_sha_len0;
|
|
DROP ROLE regress_passwd_sha_len1;
|
|
DROP ROLE regress_passwd_sha_len2;
|
|
diff --git a/src/test/regress/expected/privileges.out b/src/test/regress/expected/privileges.out
|
|
index 620fbe8c52..0570102357 100644
|
|
--- a/src/test/regress/expected/privileges.out
|
|
+++ b/src/test/regress/expected/privileges.out
|
|
@@ -20,19 +20,19 @@ SELECT lo_unlink(oid) FROM pg_largeobject_metadata WHERE oid >= 1000 AND oid < 3
|
|
|
|
RESET client_min_messages;
|
|
-- test proper begins here
|
|
-CREATE USER regress_priv_user1;
|
|
-CREATE USER regress_priv_user2;
|
|
-CREATE USER regress_priv_user3;
|
|
-CREATE USER regress_priv_user4;
|
|
-CREATE USER regress_priv_user5;
|
|
-CREATE USER regress_priv_user5; -- duplicate
|
|
+CREATE USER regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER; -- duplicate
|
|
ERROR: role "regress_priv_user5" already exists
|
|
-CREATE USER regress_priv_user6;
|
|
-CREATE USER regress_priv_user7;
|
|
-CREATE USER regress_priv_user8;
|
|
-CREATE USER regress_priv_user9;
|
|
-CREATE USER regress_priv_user10;
|
|
-CREATE ROLE regress_priv_role;
|
|
+CREATE USER regress_priv_user6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user7 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user8 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user9 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user10 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_priv_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- circular ADMIN OPTION grants should be disallowed
|
|
GRANT regress_priv_user1 TO regress_priv_user2 WITH ADMIN OPTION;
|
|
GRANT regress_priv_user1 TO regress_priv_user3 WITH ADMIN OPTION GRANTED BY regress_priv_user2;
|
|
@@ -108,11 +108,11 @@ ERROR: role "regress_priv_user5" cannot be dropped because some objects depend
|
|
DETAIL: privileges for membership of role regress_priv_user6 in role regress_priv_user1
|
|
DROP ROLE regress_priv_user1, regress_priv_user5; -- ok, despite order
|
|
-- recreate the roles we just dropped
|
|
-CREATE USER regress_priv_user1;
|
|
-CREATE USER regress_priv_user2;
|
|
-CREATE USER regress_priv_user3;
|
|
-CREATE USER regress_priv_user4;
|
|
-CREATE USER regress_priv_user5;
|
|
+CREATE USER regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT pg_read_all_data TO regress_priv_user6;
|
|
GRANT pg_write_all_data TO regress_priv_user7;
|
|
GRANT pg_read_all_settings TO regress_priv_user8 WITH ADMIN OPTION;
|
|
@@ -212,8 +212,8 @@ REVOKE pg_read_all_settings FROM regress_priv_user8;
|
|
DROP USER regress_priv_user10;
|
|
DROP USER regress_priv_user9;
|
|
DROP USER regress_priv_user8;
|
|
-CREATE GROUP regress_priv_group1;
|
|
-CREATE GROUP regress_priv_group2 WITH ADMIN regress_priv_user1 USER regress_priv_user2;
|
|
+CREATE GROUP regress_priv_group1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_priv_group2 WITH ADMIN regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER USER regress_priv_user2;
|
|
ALTER GROUP regress_priv_group1 ADD USER regress_priv_user4;
|
|
GRANT regress_priv_group2 TO regress_priv_user2 GRANTED BY regress_priv_user1;
|
|
SET SESSION AUTHORIZATION regress_priv_user3;
|
|
@@ -246,12 +246,16 @@ GRANT regress_priv_role TO regress_priv_user1 WITH ADMIN OPTION GRANTED BY regre
|
|
ERROR: permission denied to grant privileges as role "regress_priv_role"
|
|
DETAIL: The grantor must have the ADMIN option on role "regress_priv_role".
|
|
GRANT regress_priv_role TO regress_priv_user1 WITH ADMIN OPTION GRANTED BY CURRENT_ROLE;
|
|
+ERROR: permission denied to grant privileges as role "neondb_owner"
|
|
+DETAIL: The grantor must have the ADMIN option on role "regress_priv_role".
|
|
REVOKE ADMIN OPTION FOR regress_priv_role FROM regress_priv_user1 GRANTED BY foo; -- error
|
|
ERROR: role "foo" does not exist
|
|
REVOKE ADMIN OPTION FOR regress_priv_role FROM regress_priv_user1 GRANTED BY regress_priv_user2; -- warning, noop
|
|
WARNING: role "regress_priv_user1" has not been granted membership in role "regress_priv_role" by role "regress_priv_user2"
|
|
REVOKE ADMIN OPTION FOR regress_priv_role FROM regress_priv_user1 GRANTED BY CURRENT_USER;
|
|
+WARNING: role "regress_priv_user1" has not been granted membership in role "regress_priv_role" by role "neondb_owner"
|
|
REVOKE regress_priv_role FROM regress_priv_user1 GRANTED BY CURRENT_ROLE;
|
|
+WARNING: role "regress_priv_user1" has not been granted membership in role "regress_priv_role" by role "neondb_owner"
|
|
DROP ROLE regress_priv_role;
|
|
SET SESSION AUTHORIZATION regress_priv_user1;
|
|
SELECT session_user, current_user;
|
|
@@ -1783,7 +1787,7 @@ SELECT has_table_privilege('regress_priv_user1', 'atest4', 'SELECT WITH GRANT OP
|
|
|
|
-- security-restricted operations
|
|
\c -
|
|
-CREATE ROLE regress_sro_user;
|
|
+CREATE ROLE regress_sro_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Check that index expressions and predicates are run as the table's owner
|
|
-- A dummy index function checking current_user
|
|
CREATE FUNCTION sro_ifun(int) RETURNS int AS $$
|
|
@@ -2675,8 +2679,8 @@ drop cascades to function testns.priv_testagg(integer)
|
|
drop cascades to function testns.priv_testproc(integer)
|
|
-- Change owner of the schema & and rename of new schema owner
|
|
\c -
|
|
-CREATE ROLE regress_schemauser1 superuser login;
|
|
-CREATE ROLE regress_schemauser2 superuser login;
|
|
+CREATE ROLE regress_schemauser1 superuser login PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_schemauser2 superuser login PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION ROLE regress_schemauser1;
|
|
CREATE SCHEMA testns;
|
|
SELECT nspname, rolname FROM pg_namespace, pg_roles WHERE pg_namespace.nspname = 'testns' AND pg_namespace.nspowner = pg_roles.oid;
|
|
@@ -2799,7 +2803,7 @@ DROP USER regress_priv_user7;
|
|
DROP USER regress_priv_user8; -- does not exist
|
|
ERROR: role "regress_priv_user8" does not exist
|
|
-- permissions with LOCK TABLE
|
|
-CREATE USER regress_locktable_user;
|
|
+CREATE USER regress_locktable_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE lock_table (a int);
|
|
-- LOCK TABLE and SELECT permission
|
|
GRANT SELECT ON lock_table TO regress_locktable_user;
|
|
@@ -2881,7 +2885,7 @@ DROP USER regress_locktable_user;
|
|
-- pg_backend_memory_contexts.
|
|
-- switch to superuser
|
|
\c -
|
|
-CREATE ROLE regress_readallstats;
|
|
+CREATE ROLE regress_readallstats PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SELECT has_table_privilege('regress_readallstats','pg_backend_memory_contexts','SELECT'); -- no
|
|
has_table_privilege
|
|
---------------------
|
|
@@ -2925,10 +2929,10 @@ RESET ROLE;
|
|
-- clean up
|
|
DROP ROLE regress_readallstats;
|
|
-- test role grantor machinery
|
|
-CREATE ROLE regress_group;
|
|
-CREATE ROLE regress_group_direct_manager;
|
|
-CREATE ROLE regress_group_indirect_manager;
|
|
-CREATE ROLE regress_group_member;
|
|
+CREATE ROLE regress_group PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_direct_manager PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_indirect_manager PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_member PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT regress_group TO regress_group_direct_manager WITH INHERIT FALSE, ADMIN TRUE;
|
|
GRANT regress_group_direct_manager TO regress_group_indirect_manager;
|
|
SET SESSION AUTHORIZATION regress_group_direct_manager;
|
|
@@ -2957,9 +2961,9 @@ DROP ROLE regress_group_direct_manager;
|
|
DROP ROLE regress_group_indirect_manager;
|
|
DROP ROLE regress_group_member;
|
|
-- test SET and INHERIT options with object ownership changes
|
|
-CREATE ROLE regress_roleoption_protagonist;
|
|
-CREATE ROLE regress_roleoption_donor;
|
|
-CREATE ROLE regress_roleoption_recipient;
|
|
+CREATE ROLE regress_roleoption_protagonist PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_roleoption_donor PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_roleoption_recipient PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA regress_roleoption;
|
|
GRANT CREATE, USAGE ON SCHEMA regress_roleoption TO PUBLIC;
|
|
GRANT regress_roleoption_donor TO regress_roleoption_protagonist WITH INHERIT TRUE, SET FALSE;
|
|
diff --git a/src/test/regress/expected/psql.out b/src/test/regress/expected/psql.out
|
|
index 7cd0c27cca..d7a124ed68 100644
|
|
--- a/src/test/regress/expected/psql.out
|
|
+++ b/src/test/regress/expected/psql.out
|
|
@@ -2857,7 +2857,7 @@ Type | func
|
|
-- check conditional am display
|
|
\pset expanded off
|
|
CREATE SCHEMA tableam_display;
|
|
-CREATE ROLE regress_display_role;
|
|
+CREATE ROLE regress_display_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER SCHEMA tableam_display OWNER TO regress_display_role;
|
|
SET search_path TO tableam_display;
|
|
CREATE ACCESS METHOD heap_psql TYPE TABLE HANDLER heap_tableam_handler;
|
|
@@ -4808,7 +4808,7 @@ last error message: division by zero
|
|
last error code: 22012
|
|
\unset FETCH_COUNT
|
|
create schema testpart;
|
|
-create role regress_partitioning_role;
|
|
+create role regress_partitioning_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
alter schema testpart owner to regress_partitioning_role;
|
|
set role to regress_partitioning_role;
|
|
-- run test inside own schema and hide other partitions
|
|
@@ -5260,7 +5260,7 @@ reset work_mem;
|
|
|
|
-- check \df+
|
|
-- we have to use functions with a predictable owner name, so make a role
|
|
-create role regress_psql_user superuser;
|
|
+create role regress_psql_user superuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
begin;
|
|
set session authorization regress_psql_user;
|
|
create function psql_df_internal (float8)
|
|
@@ -5544,11 +5544,14 @@ CREATE TEMPORARY TABLE reload_output(
|
|
line text
|
|
);
|
|
SELECT 1 AS a \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT 2 AS b\; SELECT 3 AS c\; SELECT 4 AS d \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
COPY (SELECT 'foo') TO STDOUT \; COPY (SELECT 'bar') TO STDOUT \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
line
|
|
---------
|
|
@@ -5587,13 +5590,15 @@ SELECT 1 AS a\; SELECT 2 AS b\; SELECT 3 AS c;
|
|
-- COPY TO file
|
|
-- The data goes to :g_out_file and the status to :o_out_file
|
|
\set QUIET false
|
|
-COPY (SELECT unique1 FROM onek ORDER BY unique1 LIMIT 10) TO :'g_out_file';
|
|
+\set command '\\COPY (SELECT unique1 FROM onek ORDER BY unique1 LIMIT 10) TO ' :'g_out_file';
|
|
+:command
|
|
-- DML command status
|
|
UPDATE onek SET unique1 = unique1 WHERE false;
|
|
\set QUIET true
|
|
\o
|
|
-- Check the contents of the files generated.
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
line
|
|
------
|
|
@@ -5610,7 +5615,8 @@ SELECT line FROM reload_output ORDER BY lineno;
|
|
(10 rows)
|
|
|
|
TRUNCATE TABLE reload_output;
|
|
-COPY reload_output(line) FROM :'o_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'o_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
line
|
|
----------
|
|
@@ -5647,7 +5653,8 @@ COPY (SELECT 'foo1') TO STDOUT \; COPY (SELECT 'bar1') TO STDOUT;
|
|
COPY (SELECT 'foo2') TO STDOUT \; COPY (SELECT 'bar2') TO STDOUT \g :g_out_file
|
|
\o
|
|
-- Check the contents of the files generated.
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
line
|
|
------
|
|
@@ -5656,7 +5663,8 @@ SELECT line FROM reload_output ORDER BY lineno;
|
|
(2 rows)
|
|
|
|
TRUNCATE TABLE reload_output;
|
|
-COPY reload_output(line) FROM :'o_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'o_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
line
|
|
------
|
|
@@ -6619,10 +6627,10 @@ cross-database references are not implemented: "no.such.database"."no.such.schem
|
|
\dX "no.such.database"."no.such.schema"."no.such.extended.statistics"
|
|
cross-database references are not implemented: "no.such.database"."no.such.schema"."no.such.extended.statistics"
|
|
-- check \drg and \du
|
|
-CREATE ROLE regress_du_role0;
|
|
-CREATE ROLE regress_du_role1;
|
|
-CREATE ROLE regress_du_role2;
|
|
-CREATE ROLE regress_du_admin;
|
|
+CREATE ROLE regress_du_role0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_role1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_admin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT regress_du_role0 TO regress_du_admin WITH ADMIN TRUE;
|
|
GRANT regress_du_role1 TO regress_du_admin WITH ADMIN TRUE;
|
|
GRANT regress_du_role2 TO regress_du_admin WITH ADMIN TRUE;
|
|
diff --git a/src/test/regress/expected/publication.out b/src/test/regress/expected/publication.out
|
|
index 69dc6cfd85..68390cc18a 100644
|
|
--- a/src/test/regress/expected/publication.out
|
|
+++ b/src/test/regress/expected/publication.out
|
|
@@ -1,9 +1,9 @@
|
|
--
|
|
-- PUBLICATION
|
|
--
|
|
-CREATE ROLE regress_publication_user LOGIN SUPERUSER;
|
|
-CREATE ROLE regress_publication_user2;
|
|
-CREATE ROLE regress_publication_user_dummy LOGIN NOSUPERUSER;
|
|
+CREATE ROLE regress_publication_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_publication_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_publication_user_dummy LOGIN NOSUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_publication_user';
|
|
-- suppress warning that depends on wal_level
|
|
SET client_min_messages = 'ERROR';
|
|
@@ -1211,7 +1211,7 @@ ALTER PUBLICATION testpub2 ADD TABLE testpub_tbl1; -- ok
|
|
DROP PUBLICATION testpub2;
|
|
DROP PUBLICATION testpub3;
|
|
SET ROLE regress_publication_user;
|
|
-CREATE ROLE regress_publication_user3;
|
|
+CREATE ROLE regress_publication_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT regress_publication_user2 TO regress_publication_user3;
|
|
SET client_min_messages = 'ERROR';
|
|
CREATE PUBLICATION testpub4 FOR TABLES IN SCHEMA pub_test;
|
|
diff --git a/src/test/regress/expected/regproc.out b/src/test/regress/expected/regproc.out
|
|
index a9420850b8..bd3b5f312d 100644
|
|
--- a/src/test/regress/expected/regproc.out
|
|
+++ b/src/test/regress/expected/regproc.out
|
|
@@ -2,7 +2,7 @@
|
|
-- regproc
|
|
--
|
|
/* If objects exist, return oids */
|
|
-CREATE ROLE regress_regrole_test;
|
|
+CREATE ROLE regress_regrole_test PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- without schemaname
|
|
SELECT regoper('||/');
|
|
regoper
|
|
diff --git a/src/test/regress/expected/roleattributes.out b/src/test/regress/expected/roleattributes.out
|
|
index 5e6969b173..2c4d52237f 100644
|
|
--- a/src/test/regress/expected/roleattributes.out
|
|
+++ b/src/test/regress/expected/roleattributes.out
|
|
@@ -1,233 +1,233 @@
|
|
-- default for superuser is false
|
|
-CREATE ROLE regress_test_def_superuser;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_superuser';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_superuser | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_superuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_superuser';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_superuser | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_superuser WITH SUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_superuser | t | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_superuser WITH SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_superuser | t | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_superuser WITH NOSUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_superuser | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_superuser | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_superuser WITH SUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_superuser | t | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_superuser | t | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for inherit is true
|
|
-CREATE ROLE regress_test_def_inherit;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_inherit';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_inherit | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_inherit PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_inherit';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_inherit | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_inherit WITH NOINHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_inherit | f | f | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_inherit WITH NOINHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_inherit | f | f | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_inherit WITH INHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_inherit | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_inherit | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_inherit WITH NOINHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_inherit | f | f | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_inherit | f | f | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for create role is false
|
|
-CREATE ROLE regress_test_def_createrole;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createrole';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_createrole | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_createrole PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createrole';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_createrole | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_createrole WITH CREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createrole | f | t | t | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_createrole WITH CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createrole | f | t | t | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_createrole WITH NOCREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createrole | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createrole | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_createrole WITH CREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createrole | f | t | t | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createrole | f | t | t | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for create database is false
|
|
-CREATE ROLE regress_test_def_createdb;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createdb';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_createdb | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_createdb PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createdb';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+---------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_createdb | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_createdb WITH CREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createdb | f | t | f | t | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_createdb WITH CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createdb | f | t | f | t | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_createdb WITH NOCREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createdb | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createdb | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_createdb WITH CREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createdb | f | t | f | t | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createdb | f | t | f | t | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for can login is false for role
|
|
-CREATE ROLE regress_test_def_role_canlogin;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_role_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_role_canlogin | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_role_canlogin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_role_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_role_canlogin | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_role_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_role_canlogin | f | t | f | f | t | f | f | -1 | |
|
|
+CREATE ROLE regress_test_role_canlogin WITH LOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_role_canlogin | f | t | f | f | t | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_role_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_role_canlogin | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_role_canlogin | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_role_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_role_canlogin | f | t | f | f | t | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_role_canlogin | f | t | f | f | t | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for can login is true for user
|
|
-CREATE USER regress_test_def_user_canlogin;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_user_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_user_canlogin | f | t | f | f | t | f | f | -1 | |
|
|
+CREATE USER regress_test_def_user_canlogin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_user_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_user_canlogin | f | t | f | f | t | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE USER regress_test_user_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_user_canlogin | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE USER regress_test_user_canlogin WITH NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_user_canlogin | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER USER regress_test_user_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_user_canlogin | f | t | f | f | t | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_user_canlogin | f | t | f | f | t | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER USER regress_test_user_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_user_canlogin | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_user_canlogin | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for replication is false
|
|
-CREATE ROLE regress_test_def_replication;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_replication';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_replication | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_replication PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_replication';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_replication | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_replication WITH REPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_replication | f | t | f | f | f | t | f | -1 | |
|
|
+CREATE ROLE regress_test_replication WITH REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_replication | f | t | f | f | f | t | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_replication WITH NOREPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_replication | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_replication | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_replication WITH REPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_replication | f | t | f | f | f | t | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_replication | f | t | f | f | f | t | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for bypassrls is false
|
|
-CREATE ROLE regress_test_def_bypassrls;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_bypassrls';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_bypassrls | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_bypassrls PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_bypassrls';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_bypassrls | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_bypassrls WITH BYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_bypassrls | f | t | f | f | f | f | t | -1 | |
|
|
+CREATE ROLE regress_test_bypassrls WITH BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_bypassrls | f | t | f | f | f | f | t | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_bypassrls WITH NOBYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_bypassrls | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_bypassrls | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_bypassrls WITH BYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_bypassrls | f | t | f | f | f | f | t | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_bypassrls | f | t | f | f | f | f | t | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- clean up roles
|
|
diff --git a/src/test/regress/expected/rowsecurity.out b/src/test/regress/expected/rowsecurity.out
|
|
index 218c0c2863..f7af0cfb12 100644
|
|
--- a/src/test/regress/expected/rowsecurity.out
|
|
+++ b/src/test/regress/expected/rowsecurity.out
|
|
@@ -14,13 +14,13 @@ DROP ROLE IF EXISTS regress_rls_group2;
|
|
DROP SCHEMA IF EXISTS regress_rls_schema CASCADE;
|
|
RESET client_min_messages;
|
|
-- initial setup
|
|
-CREATE USER regress_rls_alice NOLOGIN;
|
|
-CREATE USER regress_rls_bob NOLOGIN;
|
|
-CREATE USER regress_rls_carol NOLOGIN;
|
|
-CREATE USER regress_rls_dave NOLOGIN;
|
|
-CREATE USER regress_rls_exempt_user BYPASSRLS NOLOGIN;
|
|
-CREATE ROLE regress_rls_group1 NOLOGIN;
|
|
-CREATE ROLE regress_rls_group2 NOLOGIN;
|
|
+CREATE USER regress_rls_alice NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_bob NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_carol NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_dave NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_exempt_user BYPASSRLS NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_group1 NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_group2 NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT regress_rls_group1 TO regress_rls_bob;
|
|
GRANT regress_rls_group2 TO regress_rls_carol;
|
|
CREATE SCHEMA regress_rls_schema;
|
|
@@ -4352,8 +4352,8 @@ SELECT count(*) = 0 FROM pg_depend
|
|
|
|
-- DROP OWNED BY testing
|
|
RESET SESSION AUTHORIZATION;
|
|
-CREATE ROLE regress_rls_dob_role1;
|
|
-CREATE ROLE regress_rls_dob_role2;
|
|
+CREATE ROLE regress_rls_dob_role1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_dob_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE dob_t1 (c1 int);
|
|
CREATE TABLE dob_t2 (c1 int) PARTITION BY RANGE (c1);
|
|
CREATE POLICY p1 ON dob_t1 TO regress_rls_dob_role1 USING (true);
|
|
diff --git a/src/test/regress/expected/rules.out b/src/test/regress/expected/rules.out
|
|
index 09a255649b..15895f0c53 100644
|
|
--- a/src/test/regress/expected/rules.out
|
|
+++ b/src/test/regress/expected/rules.out
|
|
@@ -3708,7 +3708,7 @@ DROP TABLE ruletest2;
|
|
-- Test non-SELECT rule on security invoker view.
|
|
-- Should use view owner's permissions.
|
|
--
|
|
-CREATE USER regress_rule_user1;
|
|
+CREATE USER regress_rule_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE ruletest_t1 (x int);
|
|
CREATE TABLE ruletest_t2 (x int);
|
|
CREATE VIEW ruletest_v1 WITH (security_invoker=true) AS
|
|
diff --git a/src/test/regress/expected/security_label.out b/src/test/regress/expected/security_label.out
|
|
index a8e01a6220..83543b250a 100644
|
|
--- a/src/test/regress/expected/security_label.out
|
|
+++ b/src/test/regress/expected/security_label.out
|
|
@@ -6,8 +6,8 @@ SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_seclabel_user1;
|
|
DROP ROLE IF EXISTS regress_seclabel_user2;
|
|
RESET client_min_messages;
|
|
-CREATE USER regress_seclabel_user1 WITH CREATEROLE;
|
|
-CREATE USER regress_seclabel_user2;
|
|
+CREATE USER regress_seclabel_user1 WITH CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_seclabel_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE seclabel_tbl1 (a int, b text);
|
|
CREATE TABLE seclabel_tbl2 (x int, y text);
|
|
CREATE VIEW seclabel_view1 AS SELECT * FROM seclabel_tbl2;
|
|
diff --git a/src/test/regress/expected/select_into.out b/src/test/regress/expected/select_into.out
|
|
index b79fe9a1c0..e29fab88ab 100644
|
|
--- a/src/test/regress/expected/select_into.out
|
|
+++ b/src/test/regress/expected/select_into.out
|
|
@@ -15,7 +15,7 @@ DROP TABLE sitmp1;
|
|
-- SELECT INTO and INSERT permission, if owner is not allowed to insert.
|
|
--
|
|
CREATE SCHEMA selinto_schema;
|
|
-CREATE USER regress_selinto_user;
|
|
+CREATE USER regress_selinto_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE regress_selinto_user
|
|
REVOKE INSERT ON TABLES FROM regress_selinto_user;
|
|
GRANT ALL ON SCHEMA selinto_schema TO public;
|
|
diff --git a/src/test/regress/expected/select_parallel.out b/src/test/regress/expected/select_parallel.out
|
|
index afc6ab08c2..dfcd891af3 100644
|
|
--- a/src/test/regress/expected/select_parallel.out
|
|
+++ b/src/test/regress/expected/select_parallel.out
|
|
@@ -1220,7 +1220,7 @@ SELECT 1 FROM tenk1_vw_sec
|
|
|
|
rollback;
|
|
-- test that function option SET ROLE works in parallel workers.
|
|
-create role regress_parallel_worker;
|
|
+create role regress_parallel_worker PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
create function set_and_report_role() returns text as
|
|
$$ select current_setting('role') $$ language sql parallel safe
|
|
set role = regress_parallel_worker;
|
|
diff --git a/src/test/regress/expected/select_views.out b/src/test/regress/expected/select_views.out
|
|
index 1aeed8452b..7d9427d070 100644
|
|
--- a/src/test/regress/expected/select_views.out
|
|
+++ b/src/test/regress/expected/select_views.out
|
|
@@ -1250,7 +1250,7 @@ SELECT * FROM toyemp WHERE name = 'sharon';
|
|
--
|
|
-- Test for Leaky view scenario
|
|
--
|
|
-CREATE ROLE regress_alice;
|
|
+CREATE ROLE regress_alice PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE FUNCTION f_leak (text)
|
|
RETURNS bool LANGUAGE 'plpgsql' COST 0.0000001
|
|
AS 'BEGIN RAISE NOTICE ''f_leak => %'', $1; RETURN true; END';
|
|
diff --git a/src/test/regress/expected/sequence.out b/src/test/regress/expected/sequence.out
|
|
index f02f020542..c9e0fda350 100644
|
|
--- a/src/test/regress/expected/sequence.out
|
|
+++ b/src/test/regress/expected/sequence.out
|
|
@@ -22,7 +22,7 @@ CREATE SEQUENCE sequence_testx OWNED BY pg_class_oid_index.oid; -- not a table
|
|
ERROR: sequence cannot be owned by relation "pg_class_oid_index"
|
|
DETAIL: This operation is not supported for indexes.
|
|
CREATE SEQUENCE sequence_testx OWNED BY pg_class.relname; -- not same schema
|
|
-ERROR: sequence must be in same schema as table it is linked to
|
|
+ERROR: sequence must have same owner as table it is linked to
|
|
CREATE TABLE sequence_test_table (a int);
|
|
CREATE SEQUENCE sequence_testx OWNED BY sequence_test_table.b; -- wrong column
|
|
ERROR: column "b" of relation "sequence_test_table" does not exist
|
|
@@ -639,7 +639,7 @@ SELECT setval('sequence_test2', 1); -- error
|
|
ERROR: cannot execute setval() in a read-only transaction
|
|
ROLLBACK;
|
|
-- privileges tests
|
|
-CREATE USER regress_seq_user;
|
|
+CREATE USER regress_seq_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- nextval
|
|
BEGIN;
|
|
SET LOCAL SESSION AUTHORIZATION regress_seq_user;
|
|
diff --git a/src/test/regress/expected/stats.out b/src/test/regress/expected/stats.out
|
|
index 94187e59cf..72346e2c71 100644
|
|
--- a/src/test/regress/expected/stats.out
|
|
+++ b/src/test/regress/expected/stats.out
|
|
@@ -1283,37 +1283,6 @@ SELECT current_setting('fsync') = 'off'
|
|
t
|
|
(1 row)
|
|
|
|
--- Change the tablespace so that the table is rewritten directly, then SELECT
|
|
--- from it to cause it to be read back into shared buffers.
|
|
-SELECT sum(reads) AS io_sum_shared_before_reads
|
|
- FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
--- Do this in a transaction to prevent spurious failures due to concurrent accesses to our newly
|
|
--- rewritten table, e.g. by autovacuum.
|
|
-BEGIN;
|
|
-ALTER TABLE test_io_shared SET TABLESPACE regress_tblspace;
|
|
--- SELECT from the table so that the data is read into shared buffers and
|
|
--- context 'normal', object 'relation' reads are counted.
|
|
-SELECT COUNT(*) FROM test_io_shared;
|
|
- count
|
|
--------
|
|
- 100
|
|
-(1 row)
|
|
-
|
|
-COMMIT;
|
|
-SELECT pg_stat_force_next_flush();
|
|
- pg_stat_force_next_flush
|
|
---------------------------
|
|
-
|
|
-(1 row)
|
|
-
|
|
-SELECT sum(reads) AS io_sum_shared_after_reads
|
|
- FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
-SELECT :io_sum_shared_after_reads > :io_sum_shared_before_reads;
|
|
- ?column?
|
|
-----------
|
|
- t
|
|
-(1 row)
|
|
-
|
|
SELECT sum(hits) AS io_sum_shared_before_hits
|
|
FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
-- Select from the table again to count hits.
|
|
@@ -1415,6 +1384,7 @@ SELECT :io_sum_local_after_evictions > :io_sum_local_before_evictions,
|
|
-- local buffers, exercising a different codepath than standard local buffer
|
|
-- writes.
|
|
ALTER TABLE test_io_local SET TABLESPACE regress_tblspace;
|
|
+ERROR: tablespace "regress_tblspace" does not exist
|
|
SELECT pg_stat_force_next_flush();
|
|
pg_stat_force_next_flush
|
|
--------------------------
|
|
@@ -1426,7 +1396,7 @@ SELECT sum(writes) AS io_sum_local_new_tblspc_writes
|
|
SELECT :io_sum_local_new_tblspc_writes > :io_sum_local_after_writes;
|
|
?column?
|
|
----------
|
|
- t
|
|
+ f
|
|
(1 row)
|
|
|
|
RESET temp_buffers;
|
|
diff --git a/src/test/regress/expected/stats_ext.out b/src/test/regress/expected/stats_ext.out
|
|
index b4c85613de..d32a9a69ad 100644
|
|
--- a/src/test/regress/expected/stats_ext.out
|
|
+++ b/src/test/regress/expected/stats_ext.out
|
|
@@ -70,7 +70,7 @@ DROP TABLE ext_stats_test;
|
|
CREATE TABLE ab1 (a INTEGER, b INTEGER, c INTEGER);
|
|
CREATE STATISTICS IF NOT EXISTS ab1_a_b_stats ON a, b FROM ab1;
|
|
COMMENT ON STATISTICS ab1_a_b_stats IS 'new comment';
|
|
-CREATE ROLE regress_stats_ext;
|
|
+CREATE ROLE regress_stats_ext PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_stats_ext;
|
|
COMMENT ON STATISTICS ab1_a_b_stats IS 'changed comment';
|
|
ERROR: must be owner of statistics object ab1_a_b_stats
|
|
@@ -3214,7 +3214,7 @@ set search_path to public, stts_s1;
|
|
stts_s1 | stts_foo | col1, col2 FROM stts_t3 | defined | defined | defined
|
|
(10 rows)
|
|
|
|
-create role regress_stats_ext nosuperuser;
|
|
+create role regress_stats_ext nosuperuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
set role regress_stats_ext;
|
|
\dX
|
|
List of extended statistics
|
|
@@ -3237,7 +3237,7 @@ drop schema stts_s1, stts_s2 cascade;
|
|
drop user regress_stats_ext;
|
|
reset search_path;
|
|
-- User with no access
|
|
-CREATE USER regress_stats_user1;
|
|
+CREATE USER regress_stats_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT USAGE ON SCHEMA tststats TO regress_stats_user1;
|
|
SET SESSION AUTHORIZATION regress_stats_user1;
|
|
SELECT * FROM tststats.priv_test_tbl; -- Permission denied
|
|
diff --git a/src/test/regress/expected/subscription.out b/src/test/regress/expected/subscription.out
|
|
index b15eddbff3..e9ba4568eb 100644
|
|
--- a/src/test/regress/expected/subscription.out
|
|
+++ b/src/test/regress/expected/subscription.out
|
|
@@ -1,10 +1,10 @@
|
|
--
|
|
-- SUBSCRIPTION
|
|
--
|
|
-CREATE ROLE regress_subscription_user LOGIN SUPERUSER;
|
|
-CREATE ROLE regress_subscription_user2;
|
|
-CREATE ROLE regress_subscription_user3 IN ROLE pg_create_subscription;
|
|
-CREATE ROLE regress_subscription_user_dummy LOGIN NOSUPERUSER;
|
|
+CREATE ROLE regress_subscription_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_subscription_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_subscription_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_create_subscription;
|
|
+CREATE ROLE regress_subscription_user_dummy LOGIN NOSUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_subscription_user';
|
|
-- fail - no publications
|
|
CREATE SUBSCRIPTION regress_testsub CONNECTION 'foo';
|
|
diff --git a/src/test/regress/expected/test_setup.out b/src/test/regress/expected/test_setup.out
|
|
index 5d9e6bf12b..c5fddfdca6 100644
|
|
--- a/src/test/regress/expected/test_setup.out
|
|
+++ b/src/test/regress/expected/test_setup.out
|
|
@@ -21,6 +21,7 @@ GRANT ALL ON SCHEMA public TO public;
|
|
-- Create a tablespace we can use in tests.
|
|
SET allow_in_place_tablespaces = true;
|
|
CREATE TABLESPACE regress_tblspace LOCATION '';
|
|
+ERROR: CREATE TABLESPACE is not supported on Neon
|
|
--
|
|
-- These tables have traditionally been referenced by many tests,
|
|
-- so create and populate them. Insert only non-error values here.
|
|
@@ -111,7 +112,8 @@ CREATE TABLE onek (
|
|
string4 name
|
|
);
|
|
\set filename :abs_srcdir '/data/onek.data'
|
|
-COPY onek FROM :'filename';
|
|
+\set command '\\copy onek FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE onek;
|
|
CREATE TABLE onek2 AS SELECT * FROM onek;
|
|
VACUUM ANALYZE onek2;
|
|
@@ -134,7 +136,8 @@ CREATE TABLE tenk1 (
|
|
string4 name
|
|
);
|
|
\set filename :abs_srcdir '/data/tenk.data'
|
|
-COPY tenk1 FROM :'filename';
|
|
+\set command '\\copy tenk1 FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE tenk1;
|
|
CREATE TABLE tenk2 AS SELECT * FROM tenk1;
|
|
VACUUM ANALYZE tenk2;
|
|
@@ -144,20 +147,23 @@ CREATE TABLE person (
|
|
location point
|
|
);
|
|
\set filename :abs_srcdir '/data/person.data'
|
|
-COPY person FROM :'filename';
|
|
+\set command '\\copy person FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE person;
|
|
CREATE TABLE emp (
|
|
salary int4,
|
|
manager name
|
|
) INHERITS (person);
|
|
\set filename :abs_srcdir '/data/emp.data'
|
|
-COPY emp FROM :'filename';
|
|
+\set command '\\copy emp FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE emp;
|
|
CREATE TABLE student (
|
|
gpa float8
|
|
) INHERITS (person);
|
|
\set filename :abs_srcdir '/data/student.data'
|
|
-COPY student FROM :'filename';
|
|
+\set command '\\copy student FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE student;
|
|
CREATE TABLE stud_emp (
|
|
percent int4
|
|
@@ -166,14 +172,16 @@ NOTICE: merging multiple inherited definitions of column "name"
|
|
NOTICE: merging multiple inherited definitions of column "age"
|
|
NOTICE: merging multiple inherited definitions of column "location"
|
|
\set filename :abs_srcdir '/data/stud_emp.data'
|
|
-COPY stud_emp FROM :'filename';
|
|
+\set command '\\copy stud_emp FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE stud_emp;
|
|
CREATE TABLE road (
|
|
name text,
|
|
thepath path
|
|
);
|
|
\set filename :abs_srcdir '/data/streets.data'
|
|
-COPY road FROM :'filename';
|
|
+\set command '\\copy road FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE road;
|
|
CREATE TABLE ihighway () INHERITS (road);
|
|
INSERT INTO ihighway
|
|
diff --git a/src/test/regress/expected/tsearch.out b/src/test/regress/expected/tsearch.out
|
|
index 9fad6c8b04..a1b8e82389 100644
|
|
--- a/src/test/regress/expected/tsearch.out
|
|
+++ b/src/test/regress/expected/tsearch.out
|
|
@@ -63,7 +63,8 @@ CREATE TABLE test_tsvector(
|
|
a tsvector
|
|
);
|
|
\set filename :abs_srcdir '/data/tsearch.data'
|
|
-COPY test_tsvector FROM :'filename';
|
|
+\set command '\\copy test_tsvector FROM ' :'filename';
|
|
+:command
|
|
ANALYZE test_tsvector;
|
|
-- test basic text search behavior without indexes, then with
|
|
SELECT count(*) FROM test_tsvector WHERE a @@ 'wr|qh';
|
|
diff --git a/src/test/regress/expected/updatable_views.out b/src/test/regress/expected/updatable_views.out
|
|
index ba46c32029..eac3017bac 100644
|
|
--- a/src/test/regress/expected/updatable_views.out
|
|
+++ b/src/test/regress/expected/updatable_views.out
|
|
@@ -999,9 +999,9 @@ NOTICE: drop cascades to 2 other objects
|
|
DETAIL: drop cascades to view rw_view1
|
|
drop cascades to function rw_view1_aa(rw_view1)
|
|
-- permissions checks
|
|
-CREATE USER regress_view_user1;
|
|
-CREATE USER regress_view_user2;
|
|
-CREATE USER regress_view_user3;
|
|
+CREATE USER regress_view_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_view_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_view_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_view_user1;
|
|
CREATE TABLE base_tbl(a int, b text, c float);
|
|
INSERT INTO base_tbl VALUES (1, 'Row 1', 1.0);
|
|
@@ -3094,8 +3094,8 @@ DETAIL: View columns that are not columns of their base relation are not updata
|
|
drop view uv_iocu_view;
|
|
drop table uv_iocu_tab;
|
|
-- ON CONFLICT DO UPDATE permissions checks
|
|
-create user regress_view_user1;
|
|
-create user regress_view_user2;
|
|
+create user regress_view_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+create user regress_view_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
set session authorization regress_view_user1;
|
|
create table base_tbl(a int unique, b text, c float);
|
|
insert into base_tbl values (1,'xxx',1.0);
|
|
diff --git a/src/test/regress/expected/update.out b/src/test/regress/expected/update.out
|
|
index c809f88f54..d1d57852d4 100644
|
|
--- a/src/test/regress/expected/update.out
|
|
+++ b/src/test/regress/expected/update.out
|
|
@@ -602,7 +602,7 @@ DROP FUNCTION func_parted_mod_b();
|
|
-- RLS policies with update-row-movement
|
|
-----------------------------------------
|
|
ALTER TABLE range_parted ENABLE ROW LEVEL SECURITY;
|
|
-CREATE USER regress_range_parted_user;
|
|
+CREATE USER regress_range_parted_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT ALL ON range_parted, mintab TO regress_range_parted_user;
|
|
CREATE POLICY seeall ON range_parted AS PERMISSIVE FOR SELECT USING (true);
|
|
CREATE POLICY policy_range_parted ON range_parted for UPDATE USING (true) WITH CHECK (c % 2 = 0);
|
|
diff --git a/src/test/regress/expected/vacuum.out b/src/test/regress/expected/vacuum.out
|
|
index 4aaf4f025d..40a339758a 100644
|
|
--- a/src/test/regress/expected/vacuum.out
|
|
+++ b/src/test/regress/expected/vacuum.out
|
|
@@ -433,7 +433,7 @@ CREATE TABLE vacowned (a int);
|
|
CREATE TABLE vacowned_parted (a int) PARTITION BY LIST (a);
|
|
CREATE TABLE vacowned_part1 PARTITION OF vacowned_parted FOR VALUES IN (1);
|
|
CREATE TABLE vacowned_part2 PARTITION OF vacowned_parted FOR VALUES IN (2);
|
|
-CREATE ROLE regress_vacuum;
|
|
+CREATE ROLE regress_vacuum PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET ROLE regress_vacuum;
|
|
-- Simple table
|
|
VACUUM vacowned;
|
|
diff --git a/src/test/regress/parallel_schedule b/src/test/regress/parallel_schedule
|
|
index 3d14bf4e4f..87f351b1d1 100644
|
|
--- a/src/test/regress/parallel_schedule
|
|
+++ b/src/test/regress/parallel_schedule
|
|
@@ -130,4 +130,4 @@ test: fast_default
|
|
|
|
# run tablespace test at the end because it drops the tablespace created during
|
|
# setup that other tests may use.
|
|
-test: tablespace
|
|
+#test: tablespace
|
|
diff --git a/src/test/regress/sql/aggregates.sql b/src/test/regress/sql/aggregates.sql
|
|
index f51726e8ed..8854104eff 100644
|
|
--- a/src/test/regress/sql/aggregates.sql
|
|
+++ b/src/test/regress/sql/aggregates.sql
|
|
@@ -15,7 +15,8 @@ CREATE TABLE aggtest (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/agg.data'
|
|
-COPY aggtest FROM :'filename';
|
|
+\set command '\\copy aggtest FROM ' :'filename';
|
|
+:command
|
|
|
|
ANALYZE aggtest;
|
|
|
|
diff --git a/src/test/regress/sql/alter_generic.sql b/src/test/regress/sql/alter_generic.sql
|
|
index de58d268d3..9d38df7f42 100644
|
|
--- a/src/test/regress/sql/alter_generic.sql
|
|
+++ b/src/test/regress/sql/alter_generic.sql
|
|
@@ -22,9 +22,9 @@ DROP ROLE IF EXISTS regress_alter_generic_user3;
|
|
|
|
RESET client_min_messages;
|
|
|
|
-CREATE USER regress_alter_generic_user3;
|
|
-CREATE USER regress_alter_generic_user2;
|
|
-CREATE USER regress_alter_generic_user1 IN ROLE regress_alter_generic_user3;
|
|
+CREATE USER regress_alter_generic_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_alter_generic_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_alter_generic_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE regress_alter_generic_user3;
|
|
|
|
CREATE SCHEMA alt_nsp1;
|
|
CREATE SCHEMA alt_nsp2;
|
|
@@ -316,7 +316,7 @@ DROP OPERATOR FAMILY alt_opf4 USING btree;
|
|
|
|
-- Should fail. Need to be SUPERUSER to do ALTER OPERATOR FAMILY .. ADD / DROP
|
|
BEGIN TRANSACTION;
|
|
-CREATE ROLE regress_alter_generic_user5 NOSUPERUSER;
|
|
+CREATE ROLE regress_alter_generic_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER NOSUPERUSER;
|
|
CREATE OPERATOR FAMILY alt_opf5 USING btree;
|
|
SET ROLE regress_alter_generic_user5;
|
|
ALTER OPERATOR FAMILY alt_opf5 USING btree ADD OPERATOR 1 < (int4, int2), FUNCTION 1 btint42cmp(int4, int2);
|
|
@@ -326,7 +326,7 @@ ROLLBACK;
|
|
|
|
-- Should fail. Need rights to namespace for ALTER OPERATOR FAMILY .. ADD / DROP
|
|
BEGIN TRANSACTION;
|
|
-CREATE ROLE regress_alter_generic_user6;
|
|
+CREATE ROLE regress_alter_generic_user6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA alt_nsp6;
|
|
REVOKE ALL ON SCHEMA alt_nsp6 FROM regress_alter_generic_user6;
|
|
CREATE OPERATOR FAMILY alt_nsp6.alt_opf6 USING btree;
|
|
diff --git a/src/test/regress/sql/alter_operator.sql b/src/test/regress/sql/alter_operator.sql
|
|
index fd40370165..ca8055e06d 100644
|
|
--- a/src/test/regress/sql/alter_operator.sql
|
|
+++ b/src/test/regress/sql/alter_operator.sql
|
|
@@ -87,7 +87,7 @@ ALTER OPERATOR & (bit, bit) SET ("Restrict" = _int_contsel, "Join" = _int_contjo
|
|
--
|
|
-- Test permission check. Must be owner to ALTER OPERATOR.
|
|
--
|
|
-CREATE USER regress_alter_op_user;
|
|
+CREATE USER regress_alter_op_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_alter_op_user;
|
|
|
|
ALTER OPERATOR === (boolean, boolean) SET (RESTRICT = NONE);
|
|
diff --git a/src/test/regress/sql/alter_table.sql b/src/test/regress/sql/alter_table.sql
|
|
index d2845abc97..a0719b8d0e 100644
|
|
--- a/src/test/regress/sql/alter_table.sql
|
|
+++ b/src/test/regress/sql/alter_table.sql
|
|
@@ -7,7 +7,7 @@ SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_alter_table_user1;
|
|
RESET client_min_messages;
|
|
|
|
-CREATE USER regress_alter_table_user1;
|
|
+CREATE USER regress_alter_table_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
--
|
|
-- add attribute
|
|
@@ -2397,8 +2397,8 @@ DROP TABLE fail_part;
|
|
ALTER TABLE list_parted ATTACH PARTITION nonexistent FOR VALUES IN (1);
|
|
|
|
-- check ownership of the source table
|
|
-CREATE ROLE regress_test_me;
|
|
-CREATE ROLE regress_test_not_me;
|
|
+CREATE ROLE regress_test_me PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_not_me PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE not_owned_by_me (LIKE list_parted);
|
|
ALTER TABLE not_owned_by_me OWNER TO regress_test_not_me;
|
|
SET SESSION AUTHORIZATION regress_test_me;
|
|
diff --git a/src/test/regress/sql/arrays.sql b/src/test/regress/sql/arrays.sql
|
|
index e414fa560d..79a75a0e57 100644
|
|
--- a/src/test/regress/sql/arrays.sql
|
|
+++ b/src/test/regress/sql/arrays.sql
|
|
@@ -22,7 +22,8 @@ CREATE TABLE array_op_test (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/array.data'
|
|
-COPY array_op_test FROM :'filename';
|
|
+\set command '\\copy array_op_test FROM ' :'filename';
|
|
+:command
|
|
ANALYZE array_op_test;
|
|
|
|
--
|
|
diff --git a/src/test/regress/sql/btree_index.sql b/src/test/regress/sql/btree_index.sql
|
|
index 239f4a4755..f29d87bdff 100644
|
|
--- a/src/test/regress/sql/btree_index.sql
|
|
+++ b/src/test/regress/sql/btree_index.sql
|
|
@@ -26,16 +26,20 @@ CREATE TABLE bt_f8_heap (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY bt_i4_heap FROM :'filename';
|
|
+\set command '\\copy bt_i4_heap FROM ' :'filename';
|
|
+:command
|
|
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY bt_name_heap FROM :'filename';
|
|
+\set command '\\copy bt_name_heap FROM ' :'filename';
|
|
+:command
|
|
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY bt_txt_heap FROM :'filename';
|
|
+\set command '\\copy bt_txt_heap FROM ' :'filename';
|
|
+:command
|
|
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY bt_f8_heap FROM :'filename';
|
|
+\set command '\\copy bt_f8_heap FROM ' :'filename';
|
|
+:command
|
|
|
|
ANALYZE bt_i4_heap;
|
|
ANALYZE bt_name_heap;
|
|
diff --git a/src/test/regress/sql/cluster.sql b/src/test/regress/sql/cluster.sql
|
|
index 6cb9c926c0..5e689e4062 100644
|
|
--- a/src/test/regress/sql/cluster.sql
|
|
+++ b/src/test/regress/sql/cluster.sql
|
|
@@ -108,7 +108,7 @@ WHERE pg_class.oid=indexrelid
|
|
CLUSTER pg_toast.pg_toast_826 USING pg_toast_826_index;
|
|
|
|
-- Verify that clustering all tables does in fact cluster the right ones
|
|
-CREATE USER regress_clstr_user;
|
|
+CREATE USER regress_clstr_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE clstr_1 (a INT PRIMARY KEY);
|
|
CREATE TABLE clstr_2 (a INT PRIMARY KEY);
|
|
CREATE TABLE clstr_3 (a INT PRIMARY KEY);
|
|
@@ -233,7 +233,7 @@ DROP TABLE clstrpart;
|
|
CREATE TABLE ptnowner(i int unique) PARTITION BY LIST (i);
|
|
CREATE INDEX ptnowner_i_idx ON ptnowner(i);
|
|
CREATE TABLE ptnowner1 PARTITION OF ptnowner FOR VALUES IN (1);
|
|
-CREATE ROLE regress_ptnowner;
|
|
+CREATE ROLE regress_ptnowner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE ptnowner2 PARTITION OF ptnowner FOR VALUES IN (2);
|
|
ALTER TABLE ptnowner1 OWNER TO regress_ptnowner;
|
|
ALTER TABLE ptnowner OWNER TO regress_ptnowner;
|
|
diff --git a/src/test/regress/sql/collate.icu.utf8.sql b/src/test/regress/sql/collate.icu.utf8.sql
|
|
index 8aa902d5ab..24bb823b86 100644
|
|
--- a/src/test/regress/sql/collate.icu.utf8.sql
|
|
+++ b/src/test/regress/sql/collate.icu.utf8.sql
|
|
@@ -353,7 +353,7 @@ reset enable_seqscan;
|
|
|
|
-- schema manipulation commands
|
|
|
|
-CREATE ROLE regress_test_role;
|
|
+CREATE ROLE regress_test_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA test_schema;
|
|
|
|
-- We need to do this this way to cope with varying names for encodings:
|
|
diff --git a/src/test/regress/sql/constraints.sql b/src/test/regress/sql/constraints.sql
|
|
index e3e3bea709..fa86ddc326 100644
|
|
--- a/src/test/regress/sql/constraints.sql
|
|
+++ b/src/test/regress/sql/constraints.sql
|
|
@@ -243,12 +243,14 @@ CREATE TABLE COPY_TBL (x INT, y TEXT, z INT,
|
|
CHECK (x > 3 AND y <> 'check failed' AND x < 7 ));
|
|
|
|
\set filename :abs_srcdir '/data/constro.data'
|
|
-COPY COPY_TBL FROM :'filename';
|
|
+\set command '\\copy COPY_TBL FROM ' :'filename';
|
|
+:command
|
|
|
|
SELECT * FROM COPY_TBL;
|
|
|
|
\set filename :abs_srcdir '/data/constrf.data'
|
|
-COPY COPY_TBL FROM :'filename';
|
|
+\set command '\\copy COPY_TBL FROM ' :'filename';
|
|
+:command
|
|
|
|
SELECT * FROM COPY_TBL;
|
|
|
|
@@ -599,7 +601,7 @@ DROP TABLE deferred_excl;
|
|
|
|
-- Comments
|
|
-- Setup a low-level role to enforce non-superuser checks.
|
|
-CREATE ROLE regress_constraint_comments;
|
|
+CREATE ROLE regress_constraint_comments PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_constraint_comments;
|
|
|
|
CREATE TABLE constraint_comments_tbl (a int CONSTRAINT the_constraint CHECK (a > 0));
|
|
@@ -621,7 +623,7 @@ COMMENT ON CONSTRAINT the_constraint ON DOMAIN constraint_comments_dom IS NULL;
|
|
|
|
-- unauthorized user
|
|
RESET SESSION AUTHORIZATION;
|
|
-CREATE ROLE regress_constraint_comments_noaccess;
|
|
+CREATE ROLE regress_constraint_comments_noaccess PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_constraint_comments_noaccess;
|
|
COMMENT ON CONSTRAINT the_constraint ON constraint_comments_tbl IS 'no, the comment';
|
|
COMMENT ON CONSTRAINT the_constraint ON DOMAIN constraint_comments_dom IS 'no, another comment';
|
|
diff --git a/src/test/regress/sql/conversion.sql b/src/test/regress/sql/conversion.sql
|
|
index b567a1a572..4d1ac2e631 100644
|
|
--- a/src/test/regress/sql/conversion.sql
|
|
+++ b/src/test/regress/sql/conversion.sql
|
|
@@ -17,7 +17,7 @@ CREATE FUNCTION test_enc_conversion(bytea, name, name, bool, validlen OUT int, r
|
|
AS :'regresslib', 'test_enc_conversion'
|
|
LANGUAGE C STRICT;
|
|
|
|
-CREATE USER regress_conversion_user WITH NOCREATEDB NOCREATEROLE;
|
|
+CREATE USER regress_conversion_user WITH NOCREATEDB NOCREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_conversion_user;
|
|
CREATE CONVERSION myconv FOR 'LATIN1' TO 'UTF8' FROM iso8859_1_to_utf8;
|
|
--
|
|
diff --git a/src/test/regress/sql/copy.sql b/src/test/regress/sql/copy.sql
|
|
index 43d2e906dd..6c993d70f0 100644
|
|
--- a/src/test/regress/sql/copy.sql
|
|
+++ b/src/test/regress/sql/copy.sql
|
|
@@ -20,11 +20,13 @@ insert into copytest values('Mac',E'abc\rdef',3);
|
|
insert into copytest values(E'esc\\ape',E'a\\r\\\r\\\n\\nb',4);
|
|
|
|
\set filename :abs_builddir '/results/copytest.csv'
|
|
-copy copytest to :'filename' csv;
|
|
+\set command '\\copy copytest to ' :'filename' csv;
|
|
+:command
|
|
|
|
create temp table copytest2 (like copytest);
|
|
|
|
-copy copytest2 from :'filename' csv;
|
|
+\set command '\\copy copytest2 from ' :'filename' csv;
|
|
+:command
|
|
|
|
select * from copytest except select * from copytest2;
|
|
|
|
@@ -32,9 +34,11 @@ truncate copytest2;
|
|
|
|
--- same test but with an escape char different from quote char
|
|
|
|
-copy copytest to :'filename' csv quote '''' escape E'\\';
|
|
+\set command '\\copy copytest to ' :'filename' ' csv quote ' '\'\'\'\'' ' escape ' 'E\'' '\\\\\'';
|
|
+:command
|
|
|
|
-copy copytest2 from :'filename' csv quote '''' escape E'\\';
|
|
+\set command '\\copy copytest2 from ' :'filename' ' csv quote ' '\'\'\'\'' ' escape ' 'E\'' '\\\\\'';
|
|
+:command
|
|
|
|
select * from copytest except select * from copytest2;
|
|
|
|
@@ -86,16 +90,19 @@ insert into parted_copytest select x,2,'Two' from generate_series(1001,1010) x;
|
|
insert into parted_copytest select x,1,'One' from generate_series(1011,1020) x;
|
|
|
|
\set filename :abs_builddir '/results/parted_copytest.csv'
|
|
-copy (select * from parted_copytest order by a) to :'filename';
|
|
+\set command '\\copy (select * from parted_copytest order by a) to ' :'filename';
|
|
+:command
|
|
|
|
truncate parted_copytest;
|
|
|
|
-copy parted_copytest from :'filename';
|
|
+\set command '\\copy parted_copytest from ' :'filename';
|
|
+:command
|
|
|
|
-- Ensure COPY FREEZE errors for partitioned tables.
|
|
begin;
|
|
truncate parted_copytest;
|
|
-copy parted_copytest from :'filename' (freeze);
|
|
+\set command '\\copy parted_copytest from ' :'filename' (freeze);
|
|
+:command
|
|
rollback;
|
|
|
|
select tableoid::regclass,count(*),sum(a) from parted_copytest
|
|
@@ -115,7 +122,8 @@ create trigger part_ins_trig
|
|
for each row
|
|
execute procedure part_ins_func();
|
|
|
|
-copy parted_copytest from :'filename';
|
|
+\set command '\\copy parted_copytest from ' :'filename';
|
|
+:command
|
|
|
|
select tableoid::regclass,count(*),sum(a) from parted_copytest
|
|
group by tableoid order by tableoid::regclass::name;
|
|
@@ -124,7 +132,8 @@ truncate table parted_copytest;
|
|
create index on parted_copytest (b);
|
|
drop trigger part_ins_trig on parted_copytest_a2;
|
|
|
|
-copy parted_copytest from stdin;
|
|
+\set command '\\copy parted_copytest from ' stdin;
|
|
+:command
|
|
1 1 str1
|
|
2 2 str2
|
|
\.
|
|
@@ -191,8 +200,8 @@ bill 20 (11,10) 1000 sharon
|
|
-- Generate COPY FROM report with FILE, with some excluded tuples.
|
|
truncate tab_progress_reporting;
|
|
\set filename :abs_srcdir '/data/emp.data'
|
|
-copy tab_progress_reporting from :'filename'
|
|
- where (salary < 2000);
|
|
+\set command '\\copy tab_progress_reporting from ' :'filename' 'where (salary < 2000)';
|
|
+:command
|
|
|
|
drop trigger check_after_tab_progress_reporting on tab_progress_reporting;
|
|
drop function notice_after_tab_progress_reporting();
|
|
@@ -311,7 +320,8 @@ CREATE TABLE parted_si_p_odd PARTITION OF parted_si FOR VALUES IN (1);
|
|
-- https://postgr.es/m/18130-7a86a7356a75209d%40postgresql.org
|
|
-- https://postgr.es/m/257696.1695670946%40sss.pgh.pa.us
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY parted_si(id, data) FROM :'filename';
|
|
+\set command '\\COPY parted_si(id, data) FROM ' :'filename';
|
|
+:command
|
|
|
|
-- An earlier bug (see commit b1ecb9b3fcf) could end up using a buffer from
|
|
-- the wrong partition. This test is *not* guaranteed to trigger that bug, but
|
|
diff --git a/src/test/regress/sql/copy2.sql b/src/test/regress/sql/copy2.sql
|
|
index cf3828c16e..cf3ca38175 100644
|
|
--- a/src/test/regress/sql/copy2.sql
|
|
+++ b/src/test/regress/sql/copy2.sql
|
|
@@ -365,8 +365,8 @@ copy check_con_tbl from stdin;
|
|
select * from check_con_tbl;
|
|
|
|
-- test with RLS enabled.
|
|
-CREATE ROLE regress_rls_copy_user;
|
|
-CREATE ROLE regress_rls_copy_user_colperms;
|
|
+CREATE ROLE regress_rls_copy_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_copy_user_colperms PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE rls_t1 (a int, b int, c int);
|
|
|
|
COPY rls_t1 (a, b, c) from stdin;
|
|
diff --git a/src/test/regress/sql/create_function_sql.sql b/src/test/regress/sql/create_function_sql.sql
|
|
index 89e9af3a49..2b86fe2285 100644
|
|
--- a/src/test/regress/sql/create_function_sql.sql
|
|
+++ b/src/test/regress/sql/create_function_sql.sql
|
|
@@ -6,7 +6,7 @@
|
|
|
|
-- All objects made in this test are in temp_func_test schema
|
|
|
|
-CREATE USER regress_unpriv_user;
|
|
+CREATE USER regress_unpriv_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE SCHEMA temp_func_test;
|
|
GRANT ALL ON SCHEMA temp_func_test TO public;
|
|
diff --git a/src/test/regress/sql/create_index.sql b/src/test/regress/sql/create_index.sql
|
|
index d49ce9f300..47fa813bc8 100644
|
|
--- a/src/test/regress/sql/create_index.sql
|
|
+++ b/src/test/regress/sql/create_index.sql
|
|
@@ -71,7 +71,8 @@ CREATE TABLE fast_emp4000 (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/rect.data'
|
|
-COPY slow_emp4000 FROM :'filename';
|
|
+\set command '\\copy slow_emp4000 FROM ' :'filename';
|
|
+:command
|
|
|
|
INSERT INTO fast_emp4000 SELECT * FROM slow_emp4000;
|
|
|
|
@@ -269,7 +270,8 @@ CREATE TABLE array_index_op_test (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/array.data'
|
|
-COPY array_index_op_test FROM :'filename';
|
|
+\set command '\\copy array_index_op_test FROM ' :'filename';
|
|
+:command
|
|
ANALYZE array_index_op_test;
|
|
|
|
SELECT * FROM array_index_op_test WHERE i = '{NULL}' ORDER BY seqno;
|
|
@@ -1246,7 +1248,7 @@ END;
|
|
REINDEX SCHEMA CONCURRENTLY schema_to_reindex;
|
|
|
|
-- Failure for unauthorized user
|
|
-CREATE ROLE regress_reindexuser NOLOGIN;
|
|
+CREATE ROLE regress_reindexuser NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION ROLE regress_reindexuser;
|
|
REINDEX SCHEMA schema_to_reindex;
|
|
-- Permission failures with toast tables and indexes (pg_authid here)
|
|
diff --git a/src/test/regress/sql/create_procedure.sql b/src/test/regress/sql/create_procedure.sql
|
|
index 069a3727ce..faeeb3f744 100644
|
|
--- a/src/test/regress/sql/create_procedure.sql
|
|
+++ b/src/test/regress/sql/create_procedure.sql
|
|
@@ -255,7 +255,7 @@ DROP PROCEDURE nonexistent();
|
|
|
|
-- privileges
|
|
|
|
-CREATE USER regress_cp_user1;
|
|
+CREATE USER regress_cp_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT INSERT ON cp_test TO regress_cp_user1;
|
|
REVOKE EXECUTE ON PROCEDURE ptest1(text) FROM PUBLIC;
|
|
SET ROLE regress_cp_user1;
|
|
diff --git a/src/test/regress/sql/create_role.sql b/src/test/regress/sql/create_role.sql
|
|
index 4491a28a8a..3045434865 100644
|
|
--- a/src/test/regress/sql/create_role.sql
|
|
+++ b/src/test/regress/sql/create_role.sql
|
|
@@ -1,20 +1,20 @@
|
|
-- ok, superuser can create users with any set of privileges
|
|
-CREATE ROLE regress_role_super SUPERUSER;
|
|
-CREATE ROLE regress_role_admin CREATEDB CREATEROLE REPLICATION BYPASSRLS;
|
|
+CREATE ROLE regress_role_super SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_role_admin CREATEDB CREATEROLE REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_role_admin WITH GRANT OPTION;
|
|
-CREATE ROLE regress_role_limited_admin CREATEROLE;
|
|
-CREATE ROLE regress_role_normal;
|
|
+CREATE ROLE regress_role_limited_admin CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_role_normal PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, CREATEROLE user can't give away role attributes without having them
|
|
SET SESSION AUTHORIZATION regress_role_limited_admin;
|
|
-CREATE ROLE regress_nosuch_superuser SUPERUSER;
|
|
-CREATE ROLE regress_nosuch_replication_bypassrls REPLICATION BYPASSRLS;
|
|
-CREATE ROLE regress_nosuch_replication REPLICATION;
|
|
-CREATE ROLE regress_nosuch_bypassrls BYPASSRLS;
|
|
-CREATE ROLE regress_nosuch_createdb CREATEDB;
|
|
+CREATE ROLE regress_nosuch_superuser SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_nosuch_replication_bypassrls REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_nosuch_replication REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_nosuch_bypassrls BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_nosuch_createdb CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, can create a role without any special attributes
|
|
-CREATE ROLE regress_role_limited;
|
|
+CREATE ROLE regress_role_limited PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, can't give it in any of the restricted attributes
|
|
ALTER ROLE regress_role_limited SUPERUSER;
|
|
@@ -25,10 +25,10 @@ DROP ROLE regress_role_limited;
|
|
|
|
-- ok, can give away these role attributes if you have them
|
|
SET SESSION AUTHORIZATION regress_role_admin;
|
|
-CREATE ROLE regress_replication_bypassrls REPLICATION BYPASSRLS;
|
|
-CREATE ROLE regress_replication REPLICATION;
|
|
-CREATE ROLE regress_bypassrls BYPASSRLS;
|
|
-CREATE ROLE regress_createdb CREATEDB;
|
|
+CREATE ROLE regress_replication_bypassrls REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_replication REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_bypassrls BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_createdb CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, can toggle these role attributes off and on if you have them
|
|
ALTER ROLE regress_replication NOREPLICATION;
|
|
@@ -43,52 +43,52 @@ ALTER ROLE regress_createdb SUPERUSER;
|
|
ALTER ROLE regress_createdb NOSUPERUSER;
|
|
|
|
-- ok, having CREATEROLE is enough to create users with these privileges
|
|
-CREATE ROLE regress_createrole CREATEROLE NOINHERIT;
|
|
+CREATE ROLE regress_createrole CREATEROLE NOINHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_createrole WITH GRANT OPTION;
|
|
-CREATE ROLE regress_login LOGIN;
|
|
-CREATE ROLE regress_inherit INHERIT;
|
|
-CREATE ROLE regress_connection_limit CONNECTION LIMIT 5;
|
|
-CREATE ROLE regress_encrypted_password ENCRYPTED PASSWORD 'foo';
|
|
-CREATE ROLE regress_password_null PASSWORD NULL;
|
|
+CREATE ROLE regress_login LOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_inherit INHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_connection_limit CONNECTION LIMIT 5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_encrypted_password ENCRYPTED PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, backwards compatible noise words should be ignored
|
|
-CREATE ROLE regress_noiseword SYSID 12345;
|
|
+CREATE ROLE regress_noiseword SYSID 12345 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, cannot grant membership in superuser role
|
|
-CREATE ROLE regress_nosuch_super IN ROLE regress_role_super;
|
|
+CREATE ROLE regress_nosuch_super IN ROLE regress_role_super PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, database owner cannot have members
|
|
-CREATE ROLE regress_nosuch_dbowner IN ROLE pg_database_owner;
|
|
+CREATE ROLE regress_nosuch_dbowner IN ROLE pg_database_owner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, can grant other users into a role
|
|
CREATE ROLE regress_inroles ROLE
|
|
regress_role_super, regress_createdb, regress_createrole, regress_login,
|
|
- regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null;
|
|
+ regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, cannot grant a role into itself
|
|
-CREATE ROLE regress_nosuch_recursive ROLE regress_nosuch_recursive;
|
|
+CREATE ROLE regress_nosuch_recursive ROLE regress_nosuch_recursive PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, can grant other users into a role with admin option
|
|
CREATE ROLE regress_adminroles ADMIN
|
|
regress_role_super, regress_createdb, regress_createrole, regress_login,
|
|
- regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null;
|
|
+ regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, cannot grant a role into itself with admin option
|
|
-CREATE ROLE regress_nosuch_admin_recursive ADMIN regress_nosuch_admin_recursive;
|
|
+CREATE ROLE regress_nosuch_admin_recursive ADMIN regress_nosuch_admin_recursive PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, regress_createrole does not have CREATEDB privilege
|
|
SET SESSION AUTHORIZATION regress_createrole;
|
|
CREATE DATABASE regress_nosuch_db;
|
|
|
|
-- ok, regress_createrole can create new roles
|
|
-CREATE ROLE regress_plainrole;
|
|
+CREATE ROLE regress_plainrole PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, roles with CREATEROLE can create new roles with it
|
|
-CREATE ROLE regress_rolecreator CREATEROLE;
|
|
+CREATE ROLE regress_rolecreator CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, roles with CREATEROLE can create new roles with different role
|
|
-- attributes, including CREATEROLE
|
|
-CREATE ROLE regress_hasprivs CREATEROLE LOGIN INHERIT CONNECTION LIMIT 5;
|
|
+CREATE ROLE regress_hasprivs CREATEROLE LOGIN INHERIT CONNECTION LIMIT 5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, we should be able to modify a role we created
|
|
COMMENT ON ROLE regress_hasprivs IS 'some comment';
|
|
@@ -123,7 +123,7 @@ REASSIGN OWNED BY regress_tenant TO regress_createrole;
|
|
|
|
-- ok, create a role with a value for createrole_self_grant
|
|
SET createrole_self_grant = 'set, inherit';
|
|
-CREATE ROLE regress_tenant2;
|
|
+CREATE ROLE regress_tenant2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_tenant2;
|
|
|
|
-- ok, regress_tenant2 can create objects within the database
|
|
@@ -150,16 +150,16 @@ ALTER TABLE tenant2_table OWNER TO regress_tenant2;
|
|
DROP TABLE tenant2_table;
|
|
|
|
-- fail, CREATEROLE is not enough to create roles in privileged roles
|
|
-CREATE ROLE regress_read_all_data IN ROLE pg_read_all_data;
|
|
-CREATE ROLE regress_write_all_data IN ROLE pg_write_all_data;
|
|
-CREATE ROLE regress_monitor IN ROLE pg_monitor;
|
|
-CREATE ROLE regress_read_all_settings IN ROLE pg_read_all_settings;
|
|
-CREATE ROLE regress_read_all_stats IN ROLE pg_read_all_stats;
|
|
-CREATE ROLE regress_stat_scan_tables IN ROLE pg_stat_scan_tables;
|
|
-CREATE ROLE regress_read_server_files IN ROLE pg_read_server_files;
|
|
-CREATE ROLE regress_write_server_files IN ROLE pg_write_server_files;
|
|
-CREATE ROLE regress_execute_server_program IN ROLE pg_execute_server_program;
|
|
-CREATE ROLE regress_signal_backend IN ROLE pg_signal_backend;
|
|
+CREATE ROLE regress_read_all_data PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_data;
|
|
+CREATE ROLE regress_write_all_data PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_write_all_data;
|
|
+CREATE ROLE regress_monitor PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_monitor;
|
|
+CREATE ROLE regress_read_all_settings PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_settings;
|
|
+CREATE ROLE regress_read_all_stats PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_stats;
|
|
+CREATE ROLE regress_stat_scan_tables PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_stat_scan_tables;
|
|
+CREATE ROLE regress_read_server_files PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_server_files;
|
|
+CREATE ROLE regress_write_server_files PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_write_server_files;
|
|
+CREATE ROLE regress_execute_server_program PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_execute_server_program;
|
|
+CREATE ROLE regress_signal_backend PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_signal_backend;
|
|
|
|
-- fail, role still owns database objects
|
|
DROP ROLE regress_tenant;
|
|
diff --git a/src/test/regress/sql/create_schema.sql b/src/test/regress/sql/create_schema.sql
|
|
index 1b7064247a..be5b662ce1 100644
|
|
--- a/src/test/regress/sql/create_schema.sql
|
|
+++ b/src/test/regress/sql/create_schema.sql
|
|
@@ -4,7 +4,7 @@
|
|
|
|
-- Schema creation with elements.
|
|
|
|
-CREATE ROLE regress_create_schema_role SUPERUSER;
|
|
+CREATE ROLE regress_create_schema_role SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- Cases where schema creation fails as objects are qualified with a schema
|
|
-- that does not match with what's expected.
|
|
diff --git a/src/test/regress/sql/create_view.sql b/src/test/regress/sql/create_view.sql
|
|
index ae6841308b..47bc792e30 100644
|
|
--- a/src/test/regress/sql/create_view.sql
|
|
+++ b/src/test/regress/sql/create_view.sql
|
|
@@ -23,7 +23,8 @@ CREATE TABLE real_city (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/real_city.data'
|
|
-COPY real_city FROM :'filename';
|
|
+\set command '\\copy real_city FROM ' :'filename';
|
|
+:command
|
|
ANALYZE real_city;
|
|
|
|
SELECT *
|
|
diff --git a/src/test/regress/sql/database.sql b/src/test/regress/sql/database.sql
|
|
index 46ad263478..eb05584ed5 100644
|
|
--- a/src/test/regress/sql/database.sql
|
|
+++ b/src/test/regress/sql/database.sql
|
|
@@ -1,8 +1,6 @@
|
|
CREATE DATABASE regression_tbd
|
|
ENCODING utf8 LC_COLLATE "C" LC_CTYPE "C" TEMPLATE template0;
|
|
ALTER DATABASE regression_tbd RENAME TO regression_utf8;
|
|
-ALTER DATABASE regression_utf8 SET TABLESPACE regress_tblspace;
|
|
-ALTER DATABASE regression_utf8 RESET TABLESPACE;
|
|
ALTER DATABASE regression_utf8 CONNECTION_LIMIT 123;
|
|
|
|
-- Test PgDatabaseToastTable. Doing this with GRANT would be slow.
|
|
diff --git a/src/test/regress/sql/dependency.sql b/src/test/regress/sql/dependency.sql
|
|
index 2559c62d0b..06c3aa1a36 100644
|
|
--- a/src/test/regress/sql/dependency.sql
|
|
+++ b/src/test/regress/sql/dependency.sql
|
|
@@ -2,10 +2,10 @@
|
|
-- DEPENDENCIES
|
|
--
|
|
|
|
-CREATE USER regress_dep_user;
|
|
-CREATE USER regress_dep_user2;
|
|
-CREATE USER regress_dep_user3;
|
|
-CREATE GROUP regress_dep_group;
|
|
+CREATE USER regress_dep_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_dep_group PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE TABLE deptest (f1 serial primary key, f2 text);
|
|
|
|
@@ -45,9 +45,9 @@ DROP TABLE deptest;
|
|
DROP USER regress_dep_user3;
|
|
|
|
-- Test DROP OWNED
|
|
-CREATE USER regress_dep_user0;
|
|
-CREATE USER regress_dep_user1;
|
|
-CREATE USER regress_dep_user2;
|
|
+CREATE USER regress_dep_user0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_dep_user0;
|
|
-- permission denied
|
|
DROP OWNED BY regress_dep_user1;
|
|
diff --git a/src/test/regress/sql/drop_if_exists.sql b/src/test/regress/sql/drop_if_exists.sql
|
|
index ac6168b91f..4270062ec7 100644
|
|
--- a/src/test/regress/sql/drop_if_exists.sql
|
|
+++ b/src/test/regress/sql/drop_if_exists.sql
|
|
@@ -86,9 +86,9 @@ DROP DOMAIN test_domain_exists;
|
|
--- role/user/group
|
|
---
|
|
|
|
-CREATE USER regress_test_u1;
|
|
-CREATE ROLE regress_test_r1;
|
|
-CREATE GROUP regress_test_g1;
|
|
+CREATE USER regress_test_u1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_r1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_test_g1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
DROP USER regress_test_u2;
|
|
|
|
diff --git a/src/test/regress/sql/equivclass.sql b/src/test/regress/sql/equivclass.sql
|
|
index 247b0a3105..bf018fd3a1 100644
|
|
--- a/src/test/regress/sql/equivclass.sql
|
|
+++ b/src/test/regress/sql/equivclass.sql
|
|
@@ -230,7 +230,7 @@ set enable_mergejoin = off;
|
|
alter table ec1 enable row level security;
|
|
create policy p1 on ec1 using (f1 < '5'::int8alias1);
|
|
|
|
-create user regress_user_ectest;
|
|
+create user regress_user_ectest PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant select on ec0 to regress_user_ectest;
|
|
grant select on ec1 to regress_user_ectest;
|
|
|
|
diff --git a/src/test/regress/sql/event_trigger.sql b/src/test/regress/sql/event_trigger.sql
|
|
index 1aeaddbe71..89a410ec4a 100644
|
|
--- a/src/test/regress/sql/event_trigger.sql
|
|
+++ b/src/test/regress/sql/event_trigger.sql
|
|
@@ -86,7 +86,7 @@ create event trigger regress_event_trigger2 on ddl_command_start
|
|
comment on event trigger regress_event_trigger is 'test comment';
|
|
|
|
-- drop as non-superuser should fail
|
|
-create role regress_evt_user;
|
|
+create role regress_evt_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
set role regress_evt_user;
|
|
create event trigger regress_event_trigger_noperms on ddl_command_start
|
|
execute procedure test_event_trigger();
|
|
diff --git a/src/test/regress/sql/foreign_data.sql b/src/test/regress/sql/foreign_data.sql
|
|
index aa147b14a9..370e0dd570 100644
|
|
--- a/src/test/regress/sql/foreign_data.sql
|
|
+++ b/src/test/regress/sql/foreign_data.sql
|
|
@@ -22,14 +22,14 @@ DROP ROLE IF EXISTS regress_foreign_data_user, regress_test_role, regress_test_r
|
|
|
|
RESET client_min_messages;
|
|
|
|
-CREATE ROLE regress_foreign_data_user LOGIN SUPERUSER;
|
|
+CREATE ROLE regress_foreign_data_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_foreign_data_user';
|
|
|
|
-CREATE ROLE regress_test_role;
|
|
-CREATE ROLE regress_test_role2;
|
|
-CREATE ROLE regress_test_role_super SUPERUSER;
|
|
-CREATE ROLE regress_test_indirect;
|
|
-CREATE ROLE regress_unprivileged_role;
|
|
+CREATE ROLE regress_test_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_role_super SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_indirect PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_unprivileged_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE FOREIGN DATA WRAPPER dummy;
|
|
COMMENT ON FOREIGN DATA WRAPPER dummy IS 'useless';
|
|
diff --git a/src/test/regress/sql/foreign_key.sql b/src/test/regress/sql/foreign_key.sql
|
|
index 9f4210b26e..620d3fc87e 100644
|
|
--- a/src/test/regress/sql/foreign_key.sql
|
|
+++ b/src/test/regress/sql/foreign_key.sql
|
|
@@ -1435,7 +1435,7 @@ ALTER TABLE fk_partitioned_fk_6 ATTACH PARTITION fk_partitioned_pk_6 FOR VALUES
|
|
DROP TABLE fk_partitioned_pk_6, fk_partitioned_fk_6;
|
|
|
|
-- test the case when the referenced table is owned by a different user
|
|
-create role regress_other_partitioned_fk_owner;
|
|
+create role regress_other_partitioned_fk_owner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant references on fk_notpartitioned_pk to regress_other_partitioned_fk_owner;
|
|
set role regress_other_partitioned_fk_owner;
|
|
create table other_partitioned_fk(a int, b int) partition by list (a);
|
|
diff --git a/src/test/regress/sql/generated.sql b/src/test/regress/sql/generated.sql
|
|
index 298f6b3aa8..f058913ae0 100644
|
|
--- a/src/test/regress/sql/generated.sql
|
|
+++ b/src/test/regress/sql/generated.sql
|
|
@@ -263,7 +263,7 @@ ALTER TABLE gtest10a DROP COLUMN b;
|
|
INSERT INTO gtest10a (a) VALUES (1);
|
|
|
|
-- privileges
|
|
-CREATE USER regress_user11;
|
|
+CREATE USER regress_user11 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE TABLE gtest11s (a int PRIMARY KEY, b int, c int GENERATED ALWAYS AS (b * 2) STORED);
|
|
INSERT INTO gtest11s VALUES (1, 10), (2, 20);
|
|
diff --git a/src/test/regress/sql/guc.sql b/src/test/regress/sql/guc.sql
|
|
index dc79761955..a9ead75349 100644
|
|
--- a/src/test/regress/sql/guc.sql
|
|
+++ b/src/test/regress/sql/guc.sql
|
|
@@ -188,7 +188,7 @@ PREPARE foo AS SELECT 1;
|
|
LISTEN foo_event;
|
|
SET vacuum_cost_delay = 13;
|
|
CREATE TEMP TABLE tmp_foo (data text) ON COMMIT DELETE ROWS;
|
|
-CREATE ROLE regress_guc_user;
|
|
+CREATE ROLE regress_guc_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_guc_user;
|
|
-- look changes
|
|
SELECT pg_listening_channels();
|
|
diff --git a/src/test/regress/sql/hash_index.sql b/src/test/regress/sql/hash_index.sql
|
|
index 527024f710..de49c0b85f 100644
|
|
--- a/src/test/regress/sql/hash_index.sql
|
|
+++ b/src/test/regress/sql/hash_index.sql
|
|
@@ -26,10 +26,14 @@ CREATE TABLE hash_f8_heap (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY hash_i4_heap FROM :'filename';
|
|
-COPY hash_name_heap FROM :'filename';
|
|
-COPY hash_txt_heap FROM :'filename';
|
|
-COPY hash_f8_heap FROM :'filename';
|
|
+\set command '\\copy hash_i4_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_name_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_txt_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_f8_heap FROM ' :'filename';
|
|
+:command
|
|
|
|
-- the data in this file has a lot of duplicates in the index key
|
|
-- fields, leading to long bucket chains and lots of table expansion.
|
|
diff --git a/src/test/regress/sql/identity.sql b/src/test/regress/sql/identity.sql
|
|
index 7537258a75..9041e35e34 100644
|
|
--- a/src/test/regress/sql/identity.sql
|
|
+++ b/src/test/regress/sql/identity.sql
|
|
@@ -287,7 +287,7 @@ ALTER TABLE itest7 ALTER COLUMN a RESTART;
|
|
ALTER TABLE itest7 ALTER COLUMN a DROP IDENTITY;
|
|
|
|
-- privileges
|
|
-CREATE USER regress_identity_user1;
|
|
+CREATE USER regress_identity_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE itest8 (a int GENERATED ALWAYS AS IDENTITY, b text);
|
|
GRANT SELECT, INSERT ON itest8 TO regress_identity_user1;
|
|
SET ROLE regress_identity_user1;
|
|
diff --git a/src/test/regress/sql/inherit.sql b/src/test/regress/sql/inherit.sql
|
|
index b5b554a125..109889ad24 100644
|
|
--- a/src/test/regress/sql/inherit.sql
|
|
+++ b/src/test/regress/sql/inherit.sql
|
|
@@ -958,7 +958,7 @@ create index on permtest_parent (left(c, 3));
|
|
insert into permtest_parent
|
|
select 1, 'a', left(fipshash(i::text), 5) from generate_series(0, 100) i;
|
|
analyze permtest_parent;
|
|
-create role regress_no_child_access;
|
|
+create role regress_no_child_access PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
revoke all on permtest_grandchild from regress_no_child_access;
|
|
grant select on permtest_parent to regress_no_child_access;
|
|
set session authorization regress_no_child_access;
|
|
diff --git a/src/test/regress/sql/insert.sql b/src/test/regress/sql/insert.sql
|
|
index 2b086eeb6d..913d8a0aed 100644
|
|
--- a/src/test/regress/sql/insert.sql
|
|
+++ b/src/test/regress/sql/insert.sql
|
|
@@ -513,7 +513,7 @@ drop table mlparted5;
|
|
create table key_desc (a int, b int) partition by list ((a+0));
|
|
create table key_desc_1 partition of key_desc for values in (1) partition by range (b);
|
|
|
|
-create user regress_insert_other_user;
|
|
+create user regress_insert_other_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant select (a) on key_desc_1 to regress_insert_other_user;
|
|
grant insert on key_desc to regress_insert_other_user;
|
|
|
|
@@ -597,7 +597,7 @@ insert into brtrigpartcon1 values (1, 'hi there');
|
|
-- check that the message shows the appropriate column description in a
|
|
-- situation where the partitioned table is not the primary ModifyTable node
|
|
create table inserttest3 (f1 text default 'foo', f2 text default 'bar', f3 int);
|
|
-create role regress_coldesc_role;
|
|
+create role regress_coldesc_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant insert on inserttest3 to regress_coldesc_role;
|
|
grant insert on brtrigpartcon to regress_coldesc_role;
|
|
revoke select on brtrigpartcon from regress_coldesc_role;
|
|
diff --git a/src/test/regress/sql/jsonb.sql b/src/test/regress/sql/jsonb.sql
|
|
index 6dae715afd..aa320ba7be 100644
|
|
--- a/src/test/regress/sql/jsonb.sql
|
|
+++ b/src/test/regress/sql/jsonb.sql
|
|
@@ -6,7 +6,8 @@ CREATE TABLE testjsonb (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/jsonb.data'
|
|
-COPY testjsonb FROM :'filename';
|
|
+\set command '\\copy testjsonb FROM ' :'filename';
|
|
+:command
|
|
|
|
-- Strings.
|
|
SELECT '""'::jsonb; -- OK.
|
|
diff --git a/src/test/regress/sql/largeobject.sql b/src/test/regress/sql/largeobject.sql
|
|
index a4aee02e3a..8839c9496a 100644
|
|
--- a/src/test/regress/sql/largeobject.sql
|
|
+++ b/src/test/regress/sql/largeobject.sql
|
|
@@ -10,7 +10,7 @@
|
|
SET bytea_output TO escape;
|
|
|
|
-- Test ALTER LARGE OBJECT OWNER
|
|
-CREATE ROLE regress_lo_user;
|
|
+CREATE ROLE regress_lo_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SELECT lo_create(42);
|
|
ALTER LARGE OBJECT 42 OWNER TO regress_lo_user;
|
|
|
|
@@ -189,7 +189,8 @@ SELECT lo_unlink(loid) from lotest_stash_values;
|
|
TRUNCATE lotest_stash_values;
|
|
|
|
\set filename :abs_srcdir '/data/tenk.data'
|
|
-INSERT INTO lotest_stash_values (loid) SELECT lo_import(:'filename');
|
|
+\lo_import :filename
|
|
+INSERT INTO lotest_stash_values (loid) VALUES (:LASTOID);
|
|
|
|
BEGIN;
|
|
UPDATE lotest_stash_values SET fd=lo_open(loid, CAST(x'20000' | x'40000' AS integer));
|
|
@@ -219,8 +220,8 @@ SELECT lo_close(fd) FROM lotest_stash_values;
|
|
END;
|
|
|
|
\set filename :abs_builddir '/results/lotest.txt'
|
|
-SELECT lo_export(loid, :'filename') FROM lotest_stash_values;
|
|
-
|
|
+SELECT loid FROM lotest_stash_values \gset
|
|
+\lo_export :loid, :filename
|
|
\lo_import :filename
|
|
|
|
\set newloid :LASTOID
|
|
diff --git a/src/test/regress/sql/lock.sql b/src/test/regress/sql/lock.sql
|
|
index b88488c6d0..78b31e6dd3 100644
|
|
--- a/src/test/regress/sql/lock.sql
|
|
+++ b/src/test/regress/sql/lock.sql
|
|
@@ -19,7 +19,7 @@ CREATE VIEW lock_view3 AS SELECT * from lock_view2;
|
|
CREATE VIEW lock_view4 AS SELECT (select a from lock_tbl1a limit 1) from lock_tbl1;
|
|
CREATE VIEW lock_view5 AS SELECT * from lock_tbl1 where a in (select * from lock_tbl1a);
|
|
CREATE VIEW lock_view6 AS SELECT * from (select * from lock_tbl1) sub;
|
|
-CREATE ROLE regress_rol_lock1;
|
|
+CREATE ROLE regress_rol_lock1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER ROLE regress_rol_lock1 SET search_path = lock_schema1;
|
|
GRANT USAGE ON SCHEMA lock_schema1 TO regress_rol_lock1;
|
|
|
|
diff --git a/src/test/regress/sql/matview.sql b/src/test/regress/sql/matview.sql
|
|
index 235123de1e..58e73cec5d 100644
|
|
--- a/src/test/regress/sql/matview.sql
|
|
+++ b/src/test/regress/sql/matview.sql
|
|
@@ -209,7 +209,7 @@ SELECT * FROM mvtest_mv_v;
|
|
DROP TABLE mvtest_v CASCADE;
|
|
|
|
-- make sure running as superuser works when MV owned by another role (bug #11208)
|
|
-CREATE ROLE regress_user_mvtest;
|
|
+CREATE ROLE regress_user_mvtest PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET ROLE regress_user_mvtest;
|
|
-- this test case also checks for ambiguity in the queries issued by
|
|
-- refresh_by_match_merge(), by choosing column names that intentionally
|
|
@@ -264,7 +264,7 @@ ROLLBACK;
|
|
|
|
-- INSERT privileges if relation owner is not allowed to insert.
|
|
CREATE SCHEMA matview_schema;
|
|
-CREATE USER regress_matview_user;
|
|
+CREATE USER regress_matview_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE regress_matview_user
|
|
REVOKE INSERT ON TABLES FROM regress_matview_user;
|
|
GRANT ALL ON SCHEMA matview_schema TO public;
|
|
diff --git a/src/test/regress/sql/merge.sql b/src/test/regress/sql/merge.sql
|
|
index 2a220a248f..91a404d51e 100644
|
|
--- a/src/test/regress/sql/merge.sql
|
|
+++ b/src/test/regress/sql/merge.sql
|
|
@@ -2,9 +2,9 @@
|
|
-- MERGE
|
|
--
|
|
|
|
-CREATE USER regress_merge_privs;
|
|
-CREATE USER regress_merge_no_privs;
|
|
-CREATE USER regress_merge_none;
|
|
+CREATE USER regress_merge_privs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_merge_no_privs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_merge_none PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
DROP TABLE IF EXISTS target;
|
|
DROP TABLE IF EXISTS source;
|
|
diff --git a/src/test/regress/sql/misc.sql b/src/test/regress/sql/misc.sql
|
|
index 165a2e175f..08d7096e2c 100644
|
|
--- a/src/test/regress/sql/misc.sql
|
|
+++ b/src/test/regress/sql/misc.sql
|
|
@@ -74,22 +74,26 @@ DROP TABLE tmp;
|
|
-- copy
|
|
--
|
|
\set filename :abs_builddir '/results/onek.data'
|
|
-COPY onek TO :'filename';
|
|
+\set command '\\copy onek TO ' :'filename';
|
|
+:command
|
|
|
|
CREATE TEMP TABLE onek_copy (LIKE onek);
|
|
|
|
-COPY onek_copy FROM :'filename';
|
|
+\set command '\\copy onek_copy FROM ' :'filename';
|
|
+:command
|
|
|
|
SELECT * FROM onek EXCEPT ALL SELECT * FROM onek_copy;
|
|
|
|
SELECT * FROM onek_copy EXCEPT ALL SELECT * FROM onek;
|
|
|
|
\set filename :abs_builddir '/results/stud_emp.data'
|
|
-COPY BINARY stud_emp TO :'filename';
|
|
+\set command '\\COPY BINARY stud_emp TO ' :'filename';
|
|
+:command
|
|
|
|
CREATE TEMP TABLE stud_emp_copy (LIKE stud_emp);
|
|
|
|
-COPY BINARY stud_emp_copy FROM :'filename';
|
|
+\set command '\\COPY BINARY stud_emp_copy FROM ' :'filename';
|
|
+:command
|
|
|
|
SELECT * FROM stud_emp_copy;
|
|
|
|
diff --git a/src/test/regress/sql/misc_functions.sql b/src/test/regress/sql/misc_functions.sql
|
|
index b57f01f3e9..3e05aa6400 100644
|
|
--- a/src/test/regress/sql/misc_functions.sql
|
|
+++ b/src/test/regress/sql/misc_functions.sql
|
|
@@ -82,7 +82,7 @@ SELECT pg_log_backend_memory_contexts(pg_backend_pid());
|
|
SELECT pg_log_backend_memory_contexts(pid) FROM pg_stat_activity
|
|
WHERE backend_type = 'checkpointer';
|
|
|
|
-CREATE ROLE regress_log_memory;
|
|
+CREATE ROLE regress_log_memory PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
SELECT has_function_privilege('regress_log_memory',
|
|
'pg_log_backend_memory_contexts(integer)', 'EXECUTE'); -- no
|
|
@@ -169,7 +169,7 @@ select count(*) > 0 from
|
|
--
|
|
-- Test replication slot directory functions
|
|
--
|
|
-CREATE ROLE regress_slot_dir_funcs;
|
|
+CREATE ROLE regress_slot_dir_funcs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Not available by default.
|
|
SELECT has_function_privilege('regress_slot_dir_funcs',
|
|
'pg_ls_logicalsnapdir()', 'EXECUTE');
|
|
diff --git a/src/test/regress/sql/object_address.sql b/src/test/regress/sql/object_address.sql
|
|
index 1a6c61f49d..1c31ac6a53 100644
|
|
--- a/src/test/regress/sql/object_address.sql
|
|
+++ b/src/test/regress/sql/object_address.sql
|
|
@@ -7,7 +7,7 @@ SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_addr_user;
|
|
RESET client_min_messages;
|
|
|
|
-CREATE USER regress_addr_user;
|
|
+CREATE USER regress_addr_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- Test generic object addressing/identification functions
|
|
CREATE SCHEMA addr_nsp;
|
|
diff --git a/src/test/regress/sql/password.sql b/src/test/regress/sql/password.sql
|
|
index 53e86b0b6c..0303fdfe96 100644
|
|
--- a/src/test/regress/sql/password.sql
|
|
+++ b/src/test/regress/sql/password.sql
|
|
@@ -10,11 +10,11 @@ SET password_encryption = 'scram-sha-256'; -- ok
|
|
|
|
-- consistency of password entries
|
|
SET password_encryption = 'md5';
|
|
-CREATE ROLE regress_passwd1 PASSWORD 'role_pwd1';
|
|
-CREATE ROLE regress_passwd2 PASSWORD 'role_pwd2';
|
|
+CREATE ROLE regress_passwd1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET password_encryption = 'scram-sha-256';
|
|
-CREATE ROLE regress_passwd3 PASSWORD 'role_pwd3';
|
|
-CREATE ROLE regress_passwd4 PASSWORD NULL;
|
|
+CREATE ROLE regress_passwd3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- check list of created entries
|
|
--
|
|
@@ -42,26 +42,18 @@ ALTER ROLE regress_passwd2_new RENAME TO regress_passwd2;
|
|
SET password_encryption = 'md5';
|
|
|
|
-- encrypt with MD5
|
|
-ALTER ROLE regress_passwd2 PASSWORD 'foo';
|
|
--- already encrypted, use as they are
|
|
-ALTER ROLE regress_passwd1 PASSWORD 'md5cd3578025fe2c3d7ed1b9a9b26238b70';
|
|
-ALTER ROLE regress_passwd3 PASSWORD 'SCRAM-SHA-256$4096:VLK4RMaQLCvNtQ==$6YtlR4t69SguDiwFvbVgVZtuz6gpJQQqUMZ7IQJK5yI=:ps75jrHeYU4lXCcXI4O8oIdJ3eO8o2jirjruw9phBTo=';
|
|
+ALTER ROLE regress_passwd2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
SET password_encryption = 'scram-sha-256';
|
|
-- create SCRAM secret
|
|
-ALTER ROLE regress_passwd4 PASSWORD 'foo';
|
|
--- already encrypted with MD5, use as it is
|
|
-CREATE ROLE regress_passwd5 PASSWORD 'md5e73a4b11df52a6068f8b39f90be36023';
|
|
+ALTER ROLE regress_passwd4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
--- This looks like a valid SCRAM-SHA-256 secret, but it is not
|
|
--- so it should be hashed with SCRAM-SHA-256.
|
|
-CREATE ROLE regress_passwd6 PASSWORD 'SCRAM-SHA-256$1234';
|
|
--- These may look like valid MD5 secrets, but they are not, so they
|
|
--- should be hashed with SCRAM-SHA-256.
|
|
--- trailing garbage at the end
|
|
-CREATE ROLE regress_passwd7 PASSWORD 'md5012345678901234567890123456789zz';
|
|
--- invalid length
|
|
-CREATE ROLE regress_passwd8 PASSWORD 'md501234567890123456789012345678901zz';
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd7 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd8 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- Changing the SCRAM iteration count
|
|
SET scram_iterations = 1024;
|
|
@@ -78,13 +70,10 @@ ALTER ROLE regress_passwd_empty PASSWORD 'md585939a5ce845f1a1b620742e3c659e0a';
|
|
ALTER ROLE regress_passwd_empty PASSWORD 'SCRAM-SHA-256$4096:hpFyHTUsSWcR7O9P$LgZFIt6Oqdo27ZFKbZ2nV+vtnYM995pDh9ca6WSi120=:qVV5NeluNfUPkwm7Vqat25RjSPLkGeoZBQs6wVv+um4=';
|
|
SELECT rolpassword FROM pg_authid WHERE rolname='regress_passwd_empty';
|
|
|
|
--- Test with invalid stored and server keys.
|
|
---
|
|
--- The first is valid, to act as a control. The others have too long
|
|
--- stored/server keys. They will be re-hashed.
|
|
-CREATE ROLE regress_passwd_sha_len0 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
|
|
-CREATE ROLE regress_passwd_sha_len1 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96RqwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
|
|
-CREATE ROLE regress_passwd_sha_len2 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=';
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd_sha_len0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd_sha_len1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd_sha_len2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- Check that the invalid secrets were re-hashed. A re-hashed secret
|
|
-- should not contain the original salt.
|
|
diff --git a/src/test/regress/sql/privileges.sql b/src/test/regress/sql/privileges.sql
|
|
index 259f1aedd1..6e1a3d17b7 100644
|
|
--- a/src/test/regress/sql/privileges.sql
|
|
+++ b/src/test/regress/sql/privileges.sql
|
|
@@ -24,18 +24,18 @@ RESET client_min_messages;
|
|
|
|
-- test proper begins here
|
|
|
|
-CREATE USER regress_priv_user1;
|
|
-CREATE USER regress_priv_user2;
|
|
-CREATE USER regress_priv_user3;
|
|
-CREATE USER regress_priv_user4;
|
|
-CREATE USER regress_priv_user5;
|
|
-CREATE USER regress_priv_user5; -- duplicate
|
|
-CREATE USER regress_priv_user6;
|
|
-CREATE USER regress_priv_user7;
|
|
-CREATE USER regress_priv_user8;
|
|
-CREATE USER regress_priv_user9;
|
|
-CREATE USER regress_priv_user10;
|
|
-CREATE ROLE regress_priv_role;
|
|
+CREATE USER regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER; -- duplicate
|
|
+CREATE USER regress_priv_user6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user7 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user8 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user9 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user10 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_priv_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- circular ADMIN OPTION grants should be disallowed
|
|
GRANT regress_priv_user1 TO regress_priv_user2 WITH ADMIN OPTION;
|
|
@@ -84,11 +84,11 @@ DROP ROLE regress_priv_user5; -- should fail, dependency
|
|
DROP ROLE regress_priv_user1, regress_priv_user5; -- ok, despite order
|
|
|
|
-- recreate the roles we just dropped
|
|
-CREATE USER regress_priv_user1;
|
|
-CREATE USER regress_priv_user2;
|
|
-CREATE USER regress_priv_user3;
|
|
-CREATE USER regress_priv_user4;
|
|
-CREATE USER regress_priv_user5;
|
|
+CREATE USER regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
GRANT pg_read_all_data TO regress_priv_user6;
|
|
GRANT pg_write_all_data TO regress_priv_user7;
|
|
@@ -163,8 +163,8 @@ DROP USER regress_priv_user10;
|
|
DROP USER regress_priv_user9;
|
|
DROP USER regress_priv_user8;
|
|
|
|
-CREATE GROUP regress_priv_group1;
|
|
-CREATE GROUP regress_priv_group2 WITH ADMIN regress_priv_user1 USER regress_priv_user2;
|
|
+CREATE GROUP regress_priv_group1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_priv_group2 WITH ADMIN regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER USER regress_priv_user2;
|
|
|
|
ALTER GROUP regress_priv_group1 ADD USER regress_priv_user4;
|
|
|
|
@@ -1160,7 +1160,7 @@ SELECT has_table_privilege('regress_priv_user1', 'atest4', 'SELECT WITH GRANT OP
|
|
|
|
-- security-restricted operations
|
|
\c -
|
|
-CREATE ROLE regress_sro_user;
|
|
+CREATE ROLE regress_sro_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- Check that index expressions and predicates are run as the table's owner
|
|
|
|
@@ -1656,8 +1656,8 @@ DROP SCHEMA testns CASCADE;
|
|
-- Change owner of the schema & and rename of new schema owner
|
|
\c -
|
|
|
|
-CREATE ROLE regress_schemauser1 superuser login;
|
|
-CREATE ROLE regress_schemauser2 superuser login;
|
|
+CREATE ROLE regress_schemauser1 superuser login PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_schemauser2 superuser login PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
SET SESSION ROLE regress_schemauser1;
|
|
CREATE SCHEMA testns;
|
|
@@ -1751,7 +1751,7 @@ DROP USER regress_priv_user8; -- does not exist
|
|
|
|
|
|
-- permissions with LOCK TABLE
|
|
-CREATE USER regress_locktable_user;
|
|
+CREATE USER regress_locktable_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE lock_table (a int);
|
|
|
|
-- LOCK TABLE and SELECT permission
|
|
@@ -1839,7 +1839,7 @@ DROP USER regress_locktable_user;
|
|
-- switch to superuser
|
|
\c -
|
|
|
|
-CREATE ROLE regress_readallstats;
|
|
+CREATE ROLE regress_readallstats PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
SELECT has_table_privilege('regress_readallstats','pg_backend_memory_contexts','SELECT'); -- no
|
|
SELECT has_table_privilege('regress_readallstats','pg_shmem_allocations','SELECT'); -- no
|
|
@@ -1859,10 +1859,10 @@ RESET ROLE;
|
|
DROP ROLE regress_readallstats;
|
|
|
|
-- test role grantor machinery
|
|
-CREATE ROLE regress_group;
|
|
-CREATE ROLE regress_group_direct_manager;
|
|
-CREATE ROLE regress_group_indirect_manager;
|
|
-CREATE ROLE regress_group_member;
|
|
+CREATE ROLE regress_group PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_direct_manager PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_indirect_manager PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_member PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
GRANT regress_group TO regress_group_direct_manager WITH INHERIT FALSE, ADMIN TRUE;
|
|
GRANT regress_group_direct_manager TO regress_group_indirect_manager;
|
|
@@ -1884,9 +1884,9 @@ DROP ROLE regress_group_indirect_manager;
|
|
DROP ROLE regress_group_member;
|
|
|
|
-- test SET and INHERIT options with object ownership changes
|
|
-CREATE ROLE regress_roleoption_protagonist;
|
|
-CREATE ROLE regress_roleoption_donor;
|
|
-CREATE ROLE regress_roleoption_recipient;
|
|
+CREATE ROLE regress_roleoption_protagonist PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_roleoption_donor PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_roleoption_recipient PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA regress_roleoption;
|
|
GRANT CREATE, USAGE ON SCHEMA regress_roleoption TO PUBLIC;
|
|
GRANT regress_roleoption_donor TO regress_roleoption_protagonist WITH INHERIT TRUE, SET FALSE;
|
|
diff --git a/src/test/regress/sql/psql.sql b/src/test/regress/sql/psql.sql
|
|
index f3bc6cd07e..f1a2f58069 100644
|
|
--- a/src/test/regress/sql/psql.sql
|
|
+++ b/src/test/regress/sql/psql.sql
|
|
@@ -496,7 +496,7 @@ select 1 where false;
|
|
\pset expanded off
|
|
|
|
CREATE SCHEMA tableam_display;
|
|
-CREATE ROLE regress_display_role;
|
|
+CREATE ROLE regress_display_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER SCHEMA tableam_display OWNER TO regress_display_role;
|
|
SET search_path TO tableam_display;
|
|
CREATE ACCESS METHOD heap_psql TYPE TABLE HANDLER heap_tableam_handler;
|
|
@@ -1174,7 +1174,7 @@ select 1/(15-unique2) from tenk1 order by unique2 limit 19;
|
|
\unset FETCH_COUNT
|
|
|
|
create schema testpart;
|
|
-create role regress_partitioning_role;
|
|
+create role regress_partitioning_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
alter schema testpart owner to regress_partitioning_role;
|
|
|
|
@@ -1285,7 +1285,7 @@ reset work_mem;
|
|
|
|
-- check \df+
|
|
-- we have to use functions with a predictable owner name, so make a role
|
|
-create role regress_psql_user superuser;
|
|
+create role regress_psql_user superuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
begin;
|
|
set session authorization regress_psql_user;
|
|
|
|
@@ -1431,11 +1431,14 @@ CREATE TEMPORARY TABLE reload_output(
|
|
);
|
|
|
|
SELECT 1 AS a \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT 2 AS b\; SELECT 3 AS c\; SELECT 4 AS d \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
COPY (SELECT 'foo') TO STDOUT \; COPY (SELECT 'bar') TO STDOUT \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
TRUNCATE TABLE reload_output;
|
|
@@ -1452,17 +1455,20 @@ SELECT 1 AS a\; SELECT 2 AS b\; SELECT 3 AS c;
|
|
-- COPY TO file
|
|
-- The data goes to :g_out_file and the status to :o_out_file
|
|
\set QUIET false
|
|
-COPY (SELECT unique1 FROM onek ORDER BY unique1 LIMIT 10) TO :'g_out_file';
|
|
+\set command '\\COPY (SELECT unique1 FROM onek ORDER BY unique1 LIMIT 10) TO ' :'g_out_file';
|
|
+:command
|
|
-- DML command status
|
|
UPDATE onek SET unique1 = unique1 WHERE false;
|
|
\set QUIET true
|
|
\o
|
|
|
|
-- Check the contents of the files generated.
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
TRUNCATE TABLE reload_output;
|
|
-COPY reload_output(line) FROM :'o_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'o_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
TRUNCATE TABLE reload_output;
|
|
|
|
@@ -1475,10 +1481,12 @@ COPY (SELECT 'foo2') TO STDOUT \; COPY (SELECT 'bar2') TO STDOUT \g :g_out_file
|
|
\o
|
|
|
|
-- Check the contents of the files generated.
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
TRUNCATE TABLE reload_output;
|
|
-COPY reload_output(line) FROM :'o_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'o_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
|
|
DROP TABLE reload_output;
|
|
@@ -1825,10 +1833,10 @@ DROP FUNCTION psql_error;
|
|
\dX "no.such.database"."no.such.schema"."no.such.extended.statistics"
|
|
|
|
-- check \drg and \du
|
|
-CREATE ROLE regress_du_role0;
|
|
-CREATE ROLE regress_du_role1;
|
|
-CREATE ROLE regress_du_role2;
|
|
-CREATE ROLE regress_du_admin;
|
|
+CREATE ROLE regress_du_role0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_role1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_admin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
GRANT regress_du_role0 TO regress_du_admin WITH ADMIN TRUE;
|
|
GRANT regress_du_role1 TO regress_du_admin WITH ADMIN TRUE;
|
|
diff --git a/src/test/regress/sql/publication.sql b/src/test/regress/sql/publication.sql
|
|
index d5051a5e74..b32d729271 100644
|
|
--- a/src/test/regress/sql/publication.sql
|
|
+++ b/src/test/regress/sql/publication.sql
|
|
@@ -1,9 +1,9 @@
|
|
--
|
|
-- PUBLICATION
|
|
--
|
|
-CREATE ROLE regress_publication_user LOGIN SUPERUSER;
|
|
-CREATE ROLE regress_publication_user2;
|
|
-CREATE ROLE regress_publication_user_dummy LOGIN NOSUPERUSER;
|
|
+CREATE ROLE regress_publication_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_publication_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_publication_user_dummy LOGIN NOSUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_publication_user';
|
|
|
|
-- suppress warning that depends on wal_level
|
|
@@ -801,7 +801,7 @@ DROP PUBLICATION testpub2;
|
|
DROP PUBLICATION testpub3;
|
|
|
|
SET ROLE regress_publication_user;
|
|
-CREATE ROLE regress_publication_user3;
|
|
+CREATE ROLE regress_publication_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT regress_publication_user2 TO regress_publication_user3;
|
|
SET client_min_messages = 'ERROR';
|
|
CREATE PUBLICATION testpub4 FOR TABLES IN SCHEMA pub_test;
|
|
diff --git a/src/test/regress/sql/regproc.sql b/src/test/regress/sql/regproc.sql
|
|
index de2aa881a8..41a675fd35 100644
|
|
--- a/src/test/regress/sql/regproc.sql
|
|
+++ b/src/test/regress/sql/regproc.sql
|
|
@@ -4,7 +4,7 @@
|
|
|
|
/* If objects exist, return oids */
|
|
|
|
-CREATE ROLE regress_regrole_test;
|
|
+CREATE ROLE regress_regrole_test PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- without schemaname
|
|
|
|
diff --git a/src/test/regress/sql/roleattributes.sql b/src/test/regress/sql/roleattributes.sql
|
|
index c961b2d730..0859b89c4f 100644
|
|
--- a/src/test/regress/sql/roleattributes.sql
|
|
+++ b/src/test/regress/sql/roleattributes.sql
|
|
@@ -1,83 +1,83 @@
|
|
-- default for superuser is false
|
|
-CREATE ROLE regress_test_def_superuser;
|
|
+CREATE ROLE regress_test_def_superuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_superuser';
|
|
-CREATE ROLE regress_test_superuser WITH SUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_superuser';
|
|
+CREATE ROLE regress_test_superuser WITH SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
ALTER ROLE regress_test_superuser WITH NOSUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
ALTER ROLE regress_test_superuser WITH SUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
|
|
-- default for inherit is true
|
|
-CREATE ROLE regress_test_def_inherit;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_inherit';
|
|
-CREATE ROLE regress_test_inherit WITH NOINHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+CREATE ROLE regress_test_def_inherit PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_inherit';
|
|
+CREATE ROLE regress_test_inherit WITH NOINHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
ALTER ROLE regress_test_inherit WITH INHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
ALTER ROLE regress_test_inherit WITH NOINHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
|
|
-- default for create role is false
|
|
-CREATE ROLE regress_test_def_createrole;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createrole';
|
|
-CREATE ROLE regress_test_createrole WITH CREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+CREATE ROLE regress_test_def_createrole PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createrole';
|
|
+CREATE ROLE regress_test_createrole WITH CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
ALTER ROLE regress_test_createrole WITH NOCREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
ALTER ROLE regress_test_createrole WITH CREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
|
|
-- default for create database is false
|
|
-CREATE ROLE regress_test_def_createdb;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createdb';
|
|
-CREATE ROLE regress_test_createdb WITH CREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+CREATE ROLE regress_test_def_createdb PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createdb';
|
|
+CREATE ROLE regress_test_createdb WITH CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
ALTER ROLE regress_test_createdb WITH NOCREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
ALTER ROLE regress_test_createdb WITH CREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
|
|
-- default for can login is false for role
|
|
-CREATE ROLE regress_test_def_role_canlogin;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_role_canlogin';
|
|
-CREATE ROLE regress_test_role_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+CREATE ROLE regress_test_def_role_canlogin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_role_canlogin';
|
|
+CREATE ROLE regress_test_role_canlogin WITH LOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
ALTER ROLE regress_test_role_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
ALTER ROLE regress_test_role_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
|
|
-- default for can login is true for user
|
|
-CREATE USER regress_test_def_user_canlogin;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_user_canlogin';
|
|
-CREATE USER regress_test_user_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+CREATE USER regress_test_def_user_canlogin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_user_canlogin';
|
|
+CREATE USER regress_test_user_canlogin WITH NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
ALTER USER regress_test_user_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
ALTER USER regress_test_user_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
|
|
-- default for replication is false
|
|
-CREATE ROLE regress_test_def_replication;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_replication';
|
|
-CREATE ROLE regress_test_replication WITH REPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+CREATE ROLE regress_test_def_replication PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_replication';
|
|
+CREATE ROLE regress_test_replication WITH REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
ALTER ROLE regress_test_replication WITH NOREPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
ALTER ROLE regress_test_replication WITH REPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
|
|
-- default for bypassrls is false
|
|
-CREATE ROLE regress_test_def_bypassrls;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_bypassrls';
|
|
-CREATE ROLE regress_test_bypassrls WITH BYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+CREATE ROLE regress_test_def_bypassrls PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_bypassrls';
|
|
+CREATE ROLE regress_test_bypassrls WITH BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
ALTER ROLE regress_test_bypassrls WITH NOBYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
ALTER ROLE regress_test_bypassrls WITH BYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
|
|
-- clean up roles
|
|
DROP ROLE regress_test_def_superuser;
|
|
diff --git a/src/test/regress/sql/rowsecurity.sql b/src/test/regress/sql/rowsecurity.sql
|
|
index d3bfd53e23..919ce1d0c6 100644
|
|
--- a/src/test/regress/sql/rowsecurity.sql
|
|
+++ b/src/test/regress/sql/rowsecurity.sql
|
|
@@ -20,13 +20,13 @@ DROP SCHEMA IF EXISTS regress_rls_schema CASCADE;
|
|
RESET client_min_messages;
|
|
|
|
-- initial setup
|
|
-CREATE USER regress_rls_alice NOLOGIN;
|
|
-CREATE USER regress_rls_bob NOLOGIN;
|
|
-CREATE USER regress_rls_carol NOLOGIN;
|
|
-CREATE USER regress_rls_dave NOLOGIN;
|
|
-CREATE USER regress_rls_exempt_user BYPASSRLS NOLOGIN;
|
|
-CREATE ROLE regress_rls_group1 NOLOGIN;
|
|
-CREATE ROLE regress_rls_group2 NOLOGIN;
|
|
+CREATE USER regress_rls_alice NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_bob NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_carol NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_dave NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_exempt_user BYPASSRLS NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_group1 NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_group2 NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
GRANT regress_rls_group1 TO regress_rls_bob;
|
|
GRANT regress_rls_group2 TO regress_rls_carol;
|
|
@@ -2065,8 +2065,8 @@ SELECT count(*) = 0 FROM pg_depend
|
|
-- DROP OWNED BY testing
|
|
RESET SESSION AUTHORIZATION;
|
|
|
|
-CREATE ROLE regress_rls_dob_role1;
|
|
-CREATE ROLE regress_rls_dob_role2;
|
|
+CREATE ROLE regress_rls_dob_role1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_dob_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE TABLE dob_t1 (c1 int);
|
|
CREATE TABLE dob_t2 (c1 int) PARTITION BY RANGE (c1);
|
|
diff --git a/src/test/regress/sql/rules.sql b/src/test/regress/sql/rules.sql
|
|
index 8b7e255dcd..c58d095c05 100644
|
|
--- a/src/test/regress/sql/rules.sql
|
|
+++ b/src/test/regress/sql/rules.sql
|
|
@@ -1356,7 +1356,7 @@ DROP TABLE ruletest2;
|
|
-- Test non-SELECT rule on security invoker view.
|
|
-- Should use view owner's permissions.
|
|
--
|
|
-CREATE USER regress_rule_user1;
|
|
+CREATE USER regress_rule_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE TABLE ruletest_t1 (x int);
|
|
CREATE TABLE ruletest_t2 (x int);
|
|
diff --git a/src/test/regress/sql/security_label.sql b/src/test/regress/sql/security_label.sql
|
|
index 98e6a5f211..68c868fef2 100644
|
|
--- a/src/test/regress/sql/security_label.sql
|
|
+++ b/src/test/regress/sql/security_label.sql
|
|
@@ -10,8 +10,8 @@ DROP ROLE IF EXISTS regress_seclabel_user2;
|
|
|
|
RESET client_min_messages;
|
|
|
|
-CREATE USER regress_seclabel_user1 WITH CREATEROLE;
|
|
-CREATE USER regress_seclabel_user2;
|
|
+CREATE USER regress_seclabel_user1 WITH CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_seclabel_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE TABLE seclabel_tbl1 (a int, b text);
|
|
CREATE TABLE seclabel_tbl2 (x int, y text);
|
|
diff --git a/src/test/regress/sql/select_into.sql b/src/test/regress/sql/select_into.sql
|
|
index 689c448cc2..223ceb1d75 100644
|
|
--- a/src/test/regress/sql/select_into.sql
|
|
+++ b/src/test/regress/sql/select_into.sql
|
|
@@ -20,7 +20,7 @@ DROP TABLE sitmp1;
|
|
-- SELECT INTO and INSERT permission, if owner is not allowed to insert.
|
|
--
|
|
CREATE SCHEMA selinto_schema;
|
|
-CREATE USER regress_selinto_user;
|
|
+CREATE USER regress_selinto_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE regress_selinto_user
|
|
REVOKE INSERT ON TABLES FROM regress_selinto_user;
|
|
GRANT ALL ON SCHEMA selinto_schema TO public;
|
|
diff --git a/src/test/regress/sql/select_parallel.sql b/src/test/regress/sql/select_parallel.sql
|
|
index 33d78e16dc..cb193c9b27 100644
|
|
--- a/src/test/regress/sql/select_parallel.sql
|
|
+++ b/src/test/regress/sql/select_parallel.sql
|
|
@@ -464,7 +464,7 @@ SELECT 1 FROM tenk1_vw_sec
|
|
rollback;
|
|
|
|
-- test that function option SET ROLE works in parallel workers.
|
|
-create role regress_parallel_worker;
|
|
+create role regress_parallel_worker PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
create function set_and_report_role() returns text as
|
|
$$ select current_setting('role') $$ language sql parallel safe
|
|
diff --git a/src/test/regress/sql/select_views.sql b/src/test/regress/sql/select_views.sql
|
|
index e742f13699..7bd0255df8 100644
|
|
--- a/src/test/regress/sql/select_views.sql
|
|
+++ b/src/test/regress/sql/select_views.sql
|
|
@@ -12,7 +12,7 @@ SELECT * FROM toyemp WHERE name = 'sharon';
|
|
--
|
|
-- Test for Leaky view scenario
|
|
--
|
|
-CREATE ROLE regress_alice;
|
|
+CREATE ROLE regress_alice PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE FUNCTION f_leak (text)
|
|
RETURNS bool LANGUAGE 'plpgsql' COST 0.0000001
|
|
diff --git a/src/test/regress/sql/sequence.sql b/src/test/regress/sql/sequence.sql
|
|
index 793f1415f6..ec07c1f193 100644
|
|
--- a/src/test/regress/sql/sequence.sql
|
|
+++ b/src/test/regress/sql/sequence.sql
|
|
@@ -293,7 +293,7 @@ ROLLBACK;
|
|
|
|
-- privileges tests
|
|
|
|
-CREATE USER regress_seq_user;
|
|
+CREATE USER regress_seq_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- nextval
|
|
BEGIN;
|
|
diff --git a/src/test/regress/sql/stats.sql b/src/test/regress/sql/stats.sql
|
|
index 1e21e55c6d..2251f50c5e 100644
|
|
--- a/src/test/regress/sql/stats.sql
|
|
+++ b/src/test/regress/sql/stats.sql
|
|
@@ -622,23 +622,6 @@ SELECT :io_sum_shared_after_writes > :io_sum_shared_before_writes;
|
|
SELECT current_setting('fsync') = 'off'
|
|
OR :io_sum_shared_after_fsyncs > :io_sum_shared_before_fsyncs;
|
|
|
|
--- Change the tablespace so that the table is rewritten directly, then SELECT
|
|
--- from it to cause it to be read back into shared buffers.
|
|
-SELECT sum(reads) AS io_sum_shared_before_reads
|
|
- FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
--- Do this in a transaction to prevent spurious failures due to concurrent accesses to our newly
|
|
--- rewritten table, e.g. by autovacuum.
|
|
-BEGIN;
|
|
-ALTER TABLE test_io_shared SET TABLESPACE regress_tblspace;
|
|
--- SELECT from the table so that the data is read into shared buffers and
|
|
--- context 'normal', object 'relation' reads are counted.
|
|
-SELECT COUNT(*) FROM test_io_shared;
|
|
-COMMIT;
|
|
-SELECT pg_stat_force_next_flush();
|
|
-SELECT sum(reads) AS io_sum_shared_after_reads
|
|
- FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
-SELECT :io_sum_shared_after_reads > :io_sum_shared_before_reads;
|
|
-
|
|
SELECT sum(hits) AS io_sum_shared_before_hits
|
|
FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
-- Select from the table again to count hits.
|
|
diff --git a/src/test/regress/sql/stats_ext.sql b/src/test/regress/sql/stats_ext.sql
|
|
index 1b80d3687b..4d8798b0b1 100644
|
|
--- a/src/test/regress/sql/stats_ext.sql
|
|
+++ b/src/test/regress/sql/stats_ext.sql
|
|
@@ -50,7 +50,7 @@ DROP TABLE ext_stats_test;
|
|
CREATE TABLE ab1 (a INTEGER, b INTEGER, c INTEGER);
|
|
CREATE STATISTICS IF NOT EXISTS ab1_a_b_stats ON a, b FROM ab1;
|
|
COMMENT ON STATISTICS ab1_a_b_stats IS 'new comment';
|
|
-CREATE ROLE regress_stats_ext;
|
|
+CREATE ROLE regress_stats_ext PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_stats_ext;
|
|
COMMENT ON STATISTICS ab1_a_b_stats IS 'changed comment';
|
|
DROP STATISTICS ab1_a_b_stats;
|
|
@@ -1607,7 +1607,7 @@ drop statistics stts_t1_expr_expr_stat;
|
|
set search_path to public, stts_s1;
|
|
\dX
|
|
|
|
-create role regress_stats_ext nosuperuser;
|
|
+create role regress_stats_ext nosuperuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
set role regress_stats_ext;
|
|
\dX
|
|
reset role;
|
|
@@ -1618,7 +1618,7 @@ drop user regress_stats_ext;
|
|
reset search_path;
|
|
|
|
-- User with no access
|
|
-CREATE USER regress_stats_user1;
|
|
+CREATE USER regress_stats_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT USAGE ON SCHEMA tststats TO regress_stats_user1;
|
|
SET SESSION AUTHORIZATION regress_stats_user1;
|
|
SELECT * FROM tststats.priv_test_tbl; -- Permission denied
|
|
diff --git a/src/test/regress/sql/subscription.sql b/src/test/regress/sql/subscription.sql
|
|
index 444e563ff3..1a538a98a0 100644
|
|
--- a/src/test/regress/sql/subscription.sql
|
|
+++ b/src/test/regress/sql/subscription.sql
|
|
@@ -2,10 +2,10 @@
|
|
-- SUBSCRIPTION
|
|
--
|
|
|
|
-CREATE ROLE regress_subscription_user LOGIN SUPERUSER;
|
|
-CREATE ROLE regress_subscription_user2;
|
|
-CREATE ROLE regress_subscription_user3 IN ROLE pg_create_subscription;
|
|
-CREATE ROLE regress_subscription_user_dummy LOGIN NOSUPERUSER;
|
|
+CREATE ROLE regress_subscription_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_subscription_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_subscription_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_create_subscription;
|
|
+CREATE ROLE regress_subscription_user_dummy LOGIN NOSUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_subscription_user';
|
|
|
|
-- fail - no publications
|
|
diff --git a/src/test/regress/sql/test_setup.sql b/src/test/regress/sql/test_setup.sql
|
|
index 1b2d434683..b765c748b8 100644
|
|
--- a/src/test/regress/sql/test_setup.sql
|
|
+++ b/src/test/regress/sql/test_setup.sql
|
|
@@ -135,7 +135,8 @@ CREATE TABLE onek (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/onek.data'
|
|
-COPY onek FROM :'filename';
|
|
+\set command '\\copy onek FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE onek;
|
|
|
|
CREATE TABLE onek2 AS SELECT * FROM onek;
|
|
@@ -161,7 +162,8 @@ CREATE TABLE tenk1 (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/tenk.data'
|
|
-COPY tenk1 FROM :'filename';
|
|
+\set command '\\copy tenk1 FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE tenk1;
|
|
|
|
CREATE TABLE tenk2 AS SELECT * FROM tenk1;
|
|
@@ -174,7 +176,8 @@ CREATE TABLE person (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/person.data'
|
|
-COPY person FROM :'filename';
|
|
+\set command '\\copy person FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE person;
|
|
|
|
CREATE TABLE emp (
|
|
@@ -183,7 +186,8 @@ CREATE TABLE emp (
|
|
) INHERITS (person);
|
|
|
|
\set filename :abs_srcdir '/data/emp.data'
|
|
-COPY emp FROM :'filename';
|
|
+\set command '\\copy emp FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE emp;
|
|
|
|
CREATE TABLE student (
|
|
@@ -191,7 +195,8 @@ CREATE TABLE student (
|
|
) INHERITS (person);
|
|
|
|
\set filename :abs_srcdir '/data/student.data'
|
|
-COPY student FROM :'filename';
|
|
+\set command '\\copy student FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE student;
|
|
|
|
CREATE TABLE stud_emp (
|
|
@@ -199,7 +204,8 @@ CREATE TABLE stud_emp (
|
|
) INHERITS (emp, student);
|
|
|
|
\set filename :abs_srcdir '/data/stud_emp.data'
|
|
-COPY stud_emp FROM :'filename';
|
|
+\set command '\\copy stud_emp FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE stud_emp;
|
|
|
|
CREATE TABLE road (
|
|
@@ -208,7 +214,8 @@ CREATE TABLE road (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/streets.data'
|
|
-COPY road FROM :'filename';
|
|
+\set command '\\copy road FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE road;
|
|
|
|
CREATE TABLE ihighway () INHERITS (road);
|
|
diff --git a/src/test/regress/sql/tsearch.sql b/src/test/regress/sql/tsearch.sql
|
|
index fbd26cdba4..7ec2d78eee 100644
|
|
--- a/src/test/regress/sql/tsearch.sql
|
|
+++ b/src/test/regress/sql/tsearch.sql
|
|
@@ -49,7 +49,8 @@ CREATE TABLE test_tsvector(
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/tsearch.data'
|
|
-COPY test_tsvector FROM :'filename';
|
|
+\set command '\\copy test_tsvector FROM ' :'filename';
|
|
+:command
|
|
|
|
ANALYZE test_tsvector;
|
|
|
|
diff --git a/src/test/regress/sql/updatable_views.sql b/src/test/regress/sql/updatable_views.sql
|
|
index 0a3176e25d..7744ef68f5 100644
|
|
--- a/src/test/regress/sql/updatable_views.sql
|
|
+++ b/src/test/regress/sql/updatable_views.sql
|
|
@@ -425,9 +425,9 @@ DROP TABLE base_tbl CASCADE;
|
|
|
|
-- permissions checks
|
|
|
|
-CREATE USER regress_view_user1;
|
|
-CREATE USER regress_view_user2;
|
|
-CREATE USER regress_view_user3;
|
|
+CREATE USER regress_view_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_view_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_view_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
SET SESSION AUTHORIZATION regress_view_user1;
|
|
CREATE TABLE base_tbl(a int, b text, c float);
|
|
@@ -1586,8 +1586,8 @@ drop view uv_iocu_view;
|
|
drop table uv_iocu_tab;
|
|
|
|
-- ON CONFLICT DO UPDATE permissions checks
|
|
-create user regress_view_user1;
|
|
-create user regress_view_user2;
|
|
+create user regress_view_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+create user regress_view_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
set session authorization regress_view_user1;
|
|
create table base_tbl(a int unique, b text, c float);
|
|
diff --git a/src/test/regress/sql/update.sql b/src/test/regress/sql/update.sql
|
|
index 7a7bee77b9..07b480cd59 100644
|
|
--- a/src/test/regress/sql/update.sql
|
|
+++ b/src/test/regress/sql/update.sql
|
|
@@ -339,7 +339,7 @@ DROP FUNCTION func_parted_mod_b();
|
|
-----------------------------------------
|
|
|
|
ALTER TABLE range_parted ENABLE ROW LEVEL SECURITY;
|
|
-CREATE USER regress_range_parted_user;
|
|
+CREATE USER regress_range_parted_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT ALL ON range_parted, mintab TO regress_range_parted_user;
|
|
CREATE POLICY seeall ON range_parted AS PERMISSIVE FOR SELECT USING (true);
|
|
CREATE POLICY policy_range_parted ON range_parted for UPDATE USING (true) WITH CHECK (c % 2 = 0);
|
|
diff --git a/src/test/regress/sql/vacuum.sql b/src/test/regress/sql/vacuum.sql
|
|
index ae36b54641..5612b8e162 100644
|
|
--- a/src/test/regress/sql/vacuum.sql
|
|
+++ b/src/test/regress/sql/vacuum.sql
|
|
@@ -335,7 +335,7 @@ CREATE TABLE vacowned (a int);
|
|
CREATE TABLE vacowned_parted (a int) PARTITION BY LIST (a);
|
|
CREATE TABLE vacowned_part1 PARTITION OF vacowned_parted FOR VALUES IN (1);
|
|
CREATE TABLE vacowned_part2 PARTITION OF vacowned_parted FOR VALUES IN (2);
|
|
-CREATE ROLE regress_vacuum;
|
|
+CREATE ROLE regress_vacuum PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET ROLE regress_vacuum;
|
|
-- Simple table
|
|
VACUUM vacowned;
|