mirror of
https://github.com/neondatabase/neon.git
synced 2026-01-05 20:42:54 +00:00
## Problem pg_regress tests start failing due to unique ids added to Neon error messages ## Summary of changes Patches updated
4059 lines
238 KiB
Diff
4059 lines
238 KiB
Diff
diff --git a/src/test/regress/expected/aggregates.out b/src/test/regress/expected/aggregates.out
|
|
index 1c1ca7573a..6dfe537647 100644
|
|
--- a/src/test/regress/expected/aggregates.out
|
|
+++ b/src/test/regress/expected/aggregates.out
|
|
@@ -11,7 +11,8 @@ CREATE TABLE aggtest (
|
|
b float4
|
|
);
|
|
\set filename :abs_srcdir '/data/agg.data'
|
|
-COPY aggtest FROM :'filename';
|
|
+\set command '\\copy aggtest FROM ' :'filename';
|
|
+:command
|
|
ANALYZE aggtest;
|
|
SELECT avg(four) AS avg_1 FROM onek;
|
|
avg_1
|
|
diff --git a/src/test/regress/expected/alter_generic.out b/src/test/regress/expected/alter_generic.out
|
|
index ae54cb254f..888e2ee8bc 100644
|
|
--- a/src/test/regress/expected/alter_generic.out
|
|
+++ b/src/test/regress/expected/alter_generic.out
|
|
@@ -15,9 +15,9 @@ DROP ROLE IF EXISTS regress_alter_generic_user1;
|
|
DROP ROLE IF EXISTS regress_alter_generic_user2;
|
|
DROP ROLE IF EXISTS regress_alter_generic_user3;
|
|
RESET client_min_messages;
|
|
-CREATE USER regress_alter_generic_user3;
|
|
-CREATE USER regress_alter_generic_user2;
|
|
-CREATE USER regress_alter_generic_user1 IN ROLE regress_alter_generic_user3;
|
|
+CREATE USER regress_alter_generic_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_alter_generic_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_alter_generic_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE regress_alter_generic_user3;
|
|
CREATE SCHEMA alt_nsp1;
|
|
CREATE SCHEMA alt_nsp2;
|
|
GRANT ALL ON SCHEMA alt_nsp1, alt_nsp2 TO public;
|
|
@@ -370,7 +370,7 @@ ERROR: STORAGE cannot be specified in ALTER OPERATOR FAMILY
|
|
DROP OPERATOR FAMILY alt_opf4 USING btree;
|
|
-- Should fail. Need to be SUPERUSER to do ALTER OPERATOR FAMILY .. ADD / DROP
|
|
BEGIN TRANSACTION;
|
|
-CREATE ROLE regress_alter_generic_user5 NOSUPERUSER;
|
|
+CREATE ROLE regress_alter_generic_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER NOSUPERUSER;
|
|
CREATE OPERATOR FAMILY alt_opf5 USING btree;
|
|
SET ROLE regress_alter_generic_user5;
|
|
ALTER OPERATOR FAMILY alt_opf5 USING btree ADD OPERATOR 1 < (int4, int2), FUNCTION 1 btint42cmp(int4, int2);
|
|
@@ -382,7 +382,7 @@ ERROR: current transaction is aborted, commands ignored until end of transactio
|
|
ROLLBACK;
|
|
-- Should fail. Need rights to namespace for ALTER OPERATOR FAMILY .. ADD / DROP
|
|
BEGIN TRANSACTION;
|
|
-CREATE ROLE regress_alter_generic_user6;
|
|
+CREATE ROLE regress_alter_generic_user6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA alt_nsp6;
|
|
REVOKE ALL ON SCHEMA alt_nsp6 FROM regress_alter_generic_user6;
|
|
CREATE OPERATOR FAMILY alt_nsp6.alt_opf6 USING btree;
|
|
diff --git a/src/test/regress/expected/alter_operator.out b/src/test/regress/expected/alter_operator.out
|
|
index 4217ba15de..d28e3ff86e 100644
|
|
--- a/src/test/regress/expected/alter_operator.out
|
|
+++ b/src/test/regress/expected/alter_operator.out
|
|
@@ -119,7 +119,7 @@ ERROR: operator attribute "Restrict" not recognized
|
|
--
|
|
-- Test permission check. Must be owner to ALTER OPERATOR.
|
|
--
|
|
-CREATE USER regress_alter_op_user;
|
|
+CREATE USER regress_alter_op_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_alter_op_user;
|
|
ALTER OPERATOR === (boolean, boolean) SET (RESTRICT = NONE);
|
|
ERROR: must be owner of operator ===
|
|
diff --git a/src/test/regress/expected/alter_table.out b/src/test/regress/expected/alter_table.out
|
|
index 6de74a26a9..cd59809194 100644
|
|
--- a/src/test/regress/expected/alter_table.out
|
|
+++ b/src/test/regress/expected/alter_table.out
|
|
@@ -5,7 +5,7 @@
|
|
SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_alter_table_user1;
|
|
RESET client_min_messages;
|
|
-CREATE USER regress_alter_table_user1;
|
|
+CREATE USER regress_alter_table_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
--
|
|
-- add attribute
|
|
--
|
|
@@ -3928,8 +3928,8 @@ DROP TABLE fail_part;
|
|
ALTER TABLE list_parted ATTACH PARTITION nonexistent FOR VALUES IN (1);
|
|
ERROR: relation "nonexistent" does not exist
|
|
-- check ownership of the source table
|
|
-CREATE ROLE regress_test_me;
|
|
-CREATE ROLE regress_test_not_me;
|
|
+CREATE ROLE regress_test_me PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_not_me PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE not_owned_by_me (LIKE list_parted);
|
|
ALTER TABLE not_owned_by_me OWNER TO regress_test_not_me;
|
|
SET SESSION AUTHORIZATION regress_test_me;
|
|
diff --git a/src/test/regress/expected/arrays.out b/src/test/regress/expected/arrays.out
|
|
index a6d81fd5f9..afefd761cb 100644
|
|
--- a/src/test/regress/expected/arrays.out
|
|
+++ b/src/test/regress/expected/arrays.out
|
|
@@ -18,7 +18,8 @@ CREATE TABLE array_op_test (
|
|
t text[]
|
|
);
|
|
\set filename :abs_srcdir '/data/array.data'
|
|
-COPY array_op_test FROM :'filename';
|
|
+\set command '\\copy array_op_test FROM ' :'filename';
|
|
+:command
|
|
ANALYZE array_op_test;
|
|
--
|
|
-- only the 'e' array is 0-based, the others are 1-based.
|
|
diff --git a/src/test/regress/expected/btree_index.out b/src/test/regress/expected/btree_index.out
|
|
index 510646cbce..0b3ca1f720 100644
|
|
--- a/src/test/regress/expected/btree_index.out
|
|
+++ b/src/test/regress/expected/btree_index.out
|
|
@@ -20,13 +20,17 @@ CREATE TABLE bt_f8_heap (
|
|
random int4
|
|
);
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY bt_i4_heap FROM :'filename';
|
|
+\set command '\\copy bt_i4_heap FROM ' :'filename';
|
|
+:command
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY bt_name_heap FROM :'filename';
|
|
+\set command '\\copy bt_name_heap FROM ' :'filename';
|
|
+:command
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY bt_txt_heap FROM :'filename';
|
|
+\set command '\\copy bt_txt_heap FROM ' :'filename';
|
|
+:command
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY bt_f8_heap FROM :'filename';
|
|
+\set command '\\copy bt_f8_heap FROM ' :'filename';
|
|
+:command
|
|
ANALYZE bt_i4_heap;
|
|
ANALYZE bt_name_heap;
|
|
ANALYZE bt_txt_heap;
|
|
diff --git a/src/test/regress/expected/cluster.out b/src/test/regress/expected/cluster.out
|
|
index a13aafff0b..f0289b5c06 100644
|
|
--- a/src/test/regress/expected/cluster.out
|
|
+++ b/src/test/regress/expected/cluster.out
|
|
@@ -308,7 +308,7 @@ WHERE pg_class.oid=indexrelid
|
|
-- Verify that toast tables are clusterable
|
|
CLUSTER pg_toast.pg_toast_826 USING pg_toast_826_index;
|
|
-- Verify that clustering all tables does in fact cluster the right ones
|
|
-CREATE USER regress_clstr_user;
|
|
+CREATE USER regress_clstr_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE clstr_1 (a INT PRIMARY KEY);
|
|
CREATE TABLE clstr_2 (a INT PRIMARY KEY);
|
|
CREATE TABLE clstr_3 (a INT PRIMARY KEY);
|
|
@@ -499,7 +499,7 @@ DROP TABLE clstrpart;
|
|
CREATE TABLE ptnowner(i int unique) PARTITION BY LIST (i);
|
|
CREATE INDEX ptnowner_i_idx ON ptnowner(i);
|
|
CREATE TABLE ptnowner1 PARTITION OF ptnowner FOR VALUES IN (1);
|
|
-CREATE ROLE regress_ptnowner;
|
|
+CREATE ROLE regress_ptnowner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE ptnowner2 PARTITION OF ptnowner FOR VALUES IN (2);
|
|
ALTER TABLE ptnowner1 OWNER TO regress_ptnowner;
|
|
SET SESSION AUTHORIZATION regress_ptnowner;
|
|
diff --git a/src/test/regress/expected/collate.icu.utf8.out b/src/test/regress/expected/collate.icu.utf8.out
|
|
index 7a425afe1f..2756fb2d55 100644
|
|
--- a/src/test/regress/expected/collate.icu.utf8.out
|
|
+++ b/src/test/regress/expected/collate.icu.utf8.out
|
|
@@ -1016,7 +1016,7 @@ select * from collate_test1 where b ilike 'ABC';
|
|
|
|
reset enable_seqscan;
|
|
-- schema manipulation commands
|
|
-CREATE ROLE regress_test_role;
|
|
+CREATE ROLE regress_test_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA test_schema;
|
|
-- We need to do this this way to cope with varying names for encodings:
|
|
SET client_min_messages TO WARNING;
|
|
diff --git a/src/test/regress/expected/constraints.out b/src/test/regress/expected/constraints.out
|
|
index cf0b80d616..e8e2a14a4a 100644
|
|
--- a/src/test/regress/expected/constraints.out
|
|
+++ b/src/test/regress/expected/constraints.out
|
|
@@ -349,7 +349,8 @@ CREATE TABLE COPY_TBL (x INT, y TEXT, z INT,
|
|
CONSTRAINT COPY_CON
|
|
CHECK (x > 3 AND y <> 'check failed' AND x < 7 ));
|
|
\set filename :abs_srcdir '/data/constro.data'
|
|
-COPY COPY_TBL FROM :'filename';
|
|
+\set command '\\copy COPY_TBL FROM ' :'filename';
|
|
+:command
|
|
SELECT * FROM COPY_TBL;
|
|
x | y | z
|
|
---+---------------+---
|
|
@@ -358,7 +359,8 @@ SELECT * FROM COPY_TBL;
|
|
(2 rows)
|
|
|
|
\set filename :abs_srcdir '/data/constrf.data'
|
|
-COPY COPY_TBL FROM :'filename';
|
|
+\set command '\\copy COPY_TBL FROM ' :'filename';
|
|
+:command
|
|
ERROR: new row for relation "copy_tbl" violates check constraint "copy_con"
|
|
DETAIL: Failing row contains (7, check failed, 6).
|
|
CONTEXT: COPY copy_tbl, line 2: "7 check failed 6"
|
|
@@ -799,7 +801,7 @@ DETAIL: Key (f1)=(3) conflicts with key (f1)=(3).
|
|
DROP TABLE deferred_excl;
|
|
-- Comments
|
|
-- Setup a low-level role to enforce non-superuser checks.
|
|
-CREATE ROLE regress_constraint_comments;
|
|
+CREATE ROLE regress_constraint_comments PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_constraint_comments;
|
|
CREATE TABLE constraint_comments_tbl (a int CONSTRAINT the_constraint CHECK (a > 0));
|
|
CREATE DOMAIN constraint_comments_dom AS int CONSTRAINT the_constraint CHECK (value > 0);
|
|
@@ -819,7 +821,7 @@ COMMENT ON CONSTRAINT the_constraint ON constraint_comments_tbl IS NULL;
|
|
COMMENT ON CONSTRAINT the_constraint ON DOMAIN constraint_comments_dom IS NULL;
|
|
-- unauthorized user
|
|
RESET SESSION AUTHORIZATION;
|
|
-CREATE ROLE regress_constraint_comments_noaccess;
|
|
+CREATE ROLE regress_constraint_comments_noaccess PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_constraint_comments_noaccess;
|
|
COMMENT ON CONSTRAINT the_constraint ON constraint_comments_tbl IS 'no, the comment';
|
|
ERROR: must be owner of relation constraint_comments_tbl
|
|
diff --git a/src/test/regress/expected/conversion.out b/src/test/regress/expected/conversion.out
|
|
index 442e7aff2b..525f732b03 100644
|
|
--- a/src/test/regress/expected/conversion.out
|
|
+++ b/src/test/regress/expected/conversion.out
|
|
@@ -8,7 +8,7 @@
|
|
CREATE FUNCTION test_enc_conversion(bytea, name, name, bool, validlen OUT int, result OUT bytea)
|
|
AS :'regresslib', 'test_enc_conversion'
|
|
LANGUAGE C STRICT;
|
|
-CREATE USER regress_conversion_user WITH NOCREATEDB NOCREATEROLE;
|
|
+CREATE USER regress_conversion_user WITH NOCREATEDB NOCREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_conversion_user;
|
|
CREATE CONVERSION myconv FOR 'LATIN1' TO 'UTF8' FROM iso8859_1_to_utf8;
|
|
--
|
|
diff --git a/src/test/regress/expected/copy.out b/src/test/regress/expected/copy.out
|
|
index 44114089a6..fc1894a0f2 100644
|
|
--- a/src/test/regress/expected/copy.out
|
|
+++ b/src/test/regress/expected/copy.out
|
|
@@ -15,9 +15,11 @@ insert into copytest values('Unix',E'abc\ndef',2);
|
|
insert into copytest values('Mac',E'abc\rdef',3);
|
|
insert into copytest values(E'esc\\ape',E'a\\r\\\r\\\n\\nb',4);
|
|
\set filename :abs_builddir '/results/copytest.csv'
|
|
-copy copytest to :'filename' csv;
|
|
+\set command '\\copy copytest to ' :'filename' csv;
|
|
+:command
|
|
create temp table copytest2 (like copytest);
|
|
-copy copytest2 from :'filename' csv;
|
|
+\set command '\\copy copytest2 from ' :'filename' csv;
|
|
+:command
|
|
select * from copytest except select * from copytest2;
|
|
style | test | filler
|
|
-------+------+--------
|
|
@@ -25,8 +27,10 @@ select * from copytest except select * from copytest2;
|
|
|
|
truncate copytest2;
|
|
--- same test but with an escape char different from quote char
|
|
-copy copytest to :'filename' csv quote '''' escape E'\\';
|
|
-copy copytest2 from :'filename' csv quote '''' escape E'\\';
|
|
+\set command '\\copy copytest to ' :'filename' ' csv quote ' '\'\'\'\'' ' escape ' 'E\'' '\\\\\'';
|
|
+:command
|
|
+\set command '\\copy copytest2 from ' :'filename' ' csv quote ' '\'\'\'\'' ' escape ' 'E\'' '\\\\\'';
|
|
+:command
|
|
select * from copytest except select * from copytest2;
|
|
style | test | filler
|
|
-------+------+--------
|
|
@@ -66,13 +70,16 @@ insert into parted_copytest select x,1,'One' from generate_series(1,1000) x;
|
|
insert into parted_copytest select x,2,'Two' from generate_series(1001,1010) x;
|
|
insert into parted_copytest select x,1,'One' from generate_series(1011,1020) x;
|
|
\set filename :abs_builddir '/results/parted_copytest.csv'
|
|
-copy (select * from parted_copytest order by a) to :'filename';
|
|
+\set command '\\copy (select * from parted_copytest order by a) to ' :'filename';
|
|
+:command
|
|
truncate parted_copytest;
|
|
-copy parted_copytest from :'filename';
|
|
+\set command '\\copy parted_copytest from ' :'filename';
|
|
+:command
|
|
-- Ensure COPY FREEZE errors for partitioned tables.
|
|
begin;
|
|
truncate parted_copytest;
|
|
-copy parted_copytest from :'filename' (freeze);
|
|
+\set command '\\copy parted_copytest from ' :'filename' (freeze);
|
|
+:command
|
|
ERROR: cannot perform COPY FREEZE on a partitioned table
|
|
rollback;
|
|
select tableoid::regclass,count(*),sum(a) from parted_copytest
|
|
@@ -94,7 +101,8 @@ create trigger part_ins_trig
|
|
before insert on parted_copytest_a2
|
|
for each row
|
|
execute procedure part_ins_func();
|
|
-copy parted_copytest from :'filename';
|
|
+\set command '\\copy parted_copytest from ' :'filename';
|
|
+:command
|
|
select tableoid::regclass,count(*),sum(a) from parted_copytest
|
|
group by tableoid order by tableoid::regclass::name;
|
|
tableoid | count | sum
|
|
@@ -106,7 +114,8 @@ group by tableoid order by tableoid::regclass::name;
|
|
truncate table parted_copytest;
|
|
create index on parted_copytest (b);
|
|
drop trigger part_ins_trig on parted_copytest_a2;
|
|
-copy parted_copytest from stdin;
|
|
+\set command '\\copy parted_copytest from ' stdin;
|
|
+:command
|
|
-- Ensure index entries were properly added during the copy.
|
|
select * from parted_copytest where b = 1;
|
|
a | b | c
|
|
@@ -170,9 +179,9 @@ INFO: progress: {"type": "PIPE", "command": "COPY FROM", "relname": "tab_progre
|
|
-- Generate COPY FROM report with FILE, with some excluded tuples.
|
|
truncate tab_progress_reporting;
|
|
\set filename :abs_srcdir '/data/emp.data'
|
|
-copy tab_progress_reporting from :'filename'
|
|
- where (salary < 2000);
|
|
-INFO: progress: {"type": "FILE", "command": "COPY FROM", "relname": "tab_progress_reporting", "has_bytes_total": true, "tuples_excluded": 1, "tuples_processed": 2, "has_bytes_processed": true}
|
|
+\set command '\\copy tab_progress_reporting from ' :'filename' 'where (salary < 2000)';
|
|
+:command
|
|
+INFO: progress: {"type": "PIPE", "command": "COPY FROM", "relname": "tab_progress_reporting", "has_bytes_total": false, "tuples_excluded": 1, "tuples_processed": 2, "has_bytes_processed": true}
|
|
drop trigger check_after_tab_progress_reporting on tab_progress_reporting;
|
|
drop function notice_after_tab_progress_reporting();
|
|
drop table tab_progress_reporting;
|
|
@@ -281,7 +290,8 @@ CREATE TABLE parted_si_p_odd PARTITION OF parted_si FOR VALUES IN (1);
|
|
-- https://postgr.es/m/18130-7a86a7356a75209d%40postgresql.org
|
|
-- https://postgr.es/m/257696.1695670946%40sss.pgh.pa.us
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY parted_si(id, data) FROM :'filename';
|
|
+\set command '\\COPY parted_si(id, data) FROM ' :'filename';
|
|
+:command
|
|
-- An earlier bug (see commit b1ecb9b3fcf) could end up using a buffer from
|
|
-- the wrong partition. This test is *not* guaranteed to trigger that bug, but
|
|
-- does so when shared_buffers is small enough. To test if we encountered the
|
|
diff --git a/src/test/regress/expected/copy2.out b/src/test/regress/expected/copy2.out
|
|
index 695b1b2d63..9c9addead6 100644
|
|
--- a/src/test/regress/expected/copy2.out
|
|
+++ b/src/test/regress/expected/copy2.out
|
|
@@ -631,8 +631,8 @@ select * from check_con_tbl;
|
|
(2 rows)
|
|
|
|
-- test with RLS enabled.
|
|
-CREATE ROLE regress_rls_copy_user;
|
|
-CREATE ROLE regress_rls_copy_user_colperms;
|
|
+CREATE ROLE regress_rls_copy_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_copy_user_colperms PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE rls_t1 (a int, b int, c int);
|
|
COPY rls_t1 (a, b, c) from stdin;
|
|
CREATE POLICY p1 ON rls_t1 FOR SELECT USING (a % 2 = 0);
|
|
diff --git a/src/test/regress/expected/create_function_sql.out b/src/test/regress/expected/create_function_sql.out
|
|
index 50aca5940f..42527142f6 100644
|
|
--- a/src/test/regress/expected/create_function_sql.out
|
|
+++ b/src/test/regress/expected/create_function_sql.out
|
|
@@ -4,7 +4,7 @@
|
|
-- Assorted tests using SQL-language functions
|
|
--
|
|
-- All objects made in this test are in temp_func_test schema
|
|
-CREATE USER regress_unpriv_user;
|
|
+CREATE USER regress_unpriv_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA temp_func_test;
|
|
GRANT ALL ON SCHEMA temp_func_test TO public;
|
|
SET search_path TO temp_func_test, public;
|
|
diff --git a/src/test/regress/expected/create_index.out b/src/test/regress/expected/create_index.out
|
|
index cf6eac5734..3e56ea09d7 100644
|
|
--- a/src/test/regress/expected/create_index.out
|
|
+++ b/src/test/regress/expected/create_index.out
|
|
@@ -51,7 +51,8 @@ CREATE TABLE fast_emp4000 (
|
|
home_base box
|
|
);
|
|
\set filename :abs_srcdir '/data/rect.data'
|
|
-COPY slow_emp4000 FROM :'filename';
|
|
+\set command '\\copy slow_emp4000 FROM ' :'filename';
|
|
+:command
|
|
INSERT INTO fast_emp4000 SELECT * FROM slow_emp4000;
|
|
ANALYZE slow_emp4000;
|
|
ANALYZE fast_emp4000;
|
|
@@ -655,7 +656,8 @@ CREATE TABLE array_index_op_test (
|
|
t text[]
|
|
);
|
|
\set filename :abs_srcdir '/data/array.data'
|
|
-COPY array_index_op_test FROM :'filename';
|
|
+\set command '\\copy array_index_op_test FROM ' :'filename';
|
|
+:command
|
|
ANALYZE array_index_op_test;
|
|
SELECT * FROM array_index_op_test WHERE i = '{NULL}' ORDER BY seqno;
|
|
seqno | i | t
|
|
@@ -2966,7 +2968,7 @@ END;
|
|
-- concurrently
|
|
REINDEX SCHEMA CONCURRENTLY schema_to_reindex;
|
|
-- Failure for unauthorized user
|
|
-CREATE ROLE regress_reindexuser NOLOGIN;
|
|
+CREATE ROLE regress_reindexuser NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION ROLE regress_reindexuser;
|
|
REINDEX SCHEMA schema_to_reindex;
|
|
ERROR: must be owner of schema schema_to_reindex
|
|
diff --git a/src/test/regress/expected/create_procedure.out b/src/test/regress/expected/create_procedure.out
|
|
index 2177ba3509..ae3ca94d00 100644
|
|
--- a/src/test/regress/expected/create_procedure.out
|
|
+++ b/src/test/regress/expected/create_procedure.out
|
|
@@ -421,7 +421,7 @@ ERROR: cp_testfunc1(integer) is not a procedure
|
|
DROP PROCEDURE nonexistent();
|
|
ERROR: procedure nonexistent() does not exist
|
|
-- privileges
|
|
-CREATE USER regress_cp_user1;
|
|
+CREATE USER regress_cp_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT INSERT ON cp_test TO regress_cp_user1;
|
|
REVOKE EXECUTE ON PROCEDURE ptest1(text) FROM PUBLIC;
|
|
SET ROLE regress_cp_user1;
|
|
diff --git a/src/test/regress/expected/create_role.out b/src/test/regress/expected/create_role.out
|
|
index 46d4f9efe9..fc2a28a2f6 100644
|
|
--- a/src/test/regress/expected/create_role.out
|
|
+++ b/src/test/regress/expected/create_role.out
|
|
@@ -1,28 +1,28 @@
|
|
-- ok, superuser can create users with any set of privileges
|
|
-CREATE ROLE regress_role_super SUPERUSER;
|
|
-CREATE ROLE regress_role_admin CREATEDB CREATEROLE REPLICATION BYPASSRLS;
|
|
+CREATE ROLE regress_role_super SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_role_admin CREATEDB CREATEROLE REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_role_admin WITH GRANT OPTION;
|
|
-CREATE ROLE regress_role_limited_admin CREATEROLE;
|
|
-CREATE ROLE regress_role_normal;
|
|
+CREATE ROLE regress_role_limited_admin CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_role_normal PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- fail, CREATEROLE user can't give away role attributes without having them
|
|
SET SESSION AUTHORIZATION regress_role_limited_admin;
|
|
-CREATE ROLE regress_nosuch_superuser SUPERUSER;
|
|
+CREATE ROLE regress_nosuch_superuser SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to create role
|
|
DETAIL: Only roles with the SUPERUSER attribute may create roles with the SUPERUSER attribute.
|
|
-CREATE ROLE regress_nosuch_replication_bypassrls REPLICATION BYPASSRLS;
|
|
+CREATE ROLE regress_nosuch_replication_bypassrls REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to create role
|
|
DETAIL: Only roles with the REPLICATION attribute may create roles with the REPLICATION attribute.
|
|
-CREATE ROLE regress_nosuch_replication REPLICATION;
|
|
+CREATE ROLE regress_nosuch_replication REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to create role
|
|
DETAIL: Only roles with the REPLICATION attribute may create roles with the REPLICATION attribute.
|
|
-CREATE ROLE regress_nosuch_bypassrls BYPASSRLS;
|
|
+CREATE ROLE regress_nosuch_bypassrls BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to create role
|
|
DETAIL: Only roles with the BYPASSRLS attribute may create roles with the BYPASSRLS attribute.
|
|
-CREATE ROLE regress_nosuch_createdb CREATEDB;
|
|
+CREATE ROLE regress_nosuch_createdb CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to create role
|
|
DETAIL: Only roles with the CREATEDB attribute may create roles with the CREATEDB attribute.
|
|
-- ok, can create a role without any special attributes
|
|
-CREATE ROLE regress_role_limited;
|
|
+CREATE ROLE regress_role_limited PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- fail, can't give it in any of the restricted attributes
|
|
ALTER ROLE regress_role_limited SUPERUSER;
|
|
ERROR: permission denied to alter role
|
|
@@ -39,10 +39,10 @@ DETAIL: Only roles with the BYPASSRLS attribute may change the BYPASSRLS attrib
|
|
DROP ROLE regress_role_limited;
|
|
-- ok, can give away these role attributes if you have them
|
|
SET SESSION AUTHORIZATION regress_role_admin;
|
|
-CREATE ROLE regress_replication_bypassrls REPLICATION BYPASSRLS;
|
|
-CREATE ROLE regress_replication REPLICATION;
|
|
-CREATE ROLE regress_bypassrls BYPASSRLS;
|
|
-CREATE ROLE regress_createdb CREATEDB;
|
|
+CREATE ROLE regress_replication_bypassrls REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_replication REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_bypassrls BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_createdb CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- ok, can toggle these role attributes off and on if you have them
|
|
ALTER ROLE regress_replication NOREPLICATION;
|
|
ALTER ROLE regress_replication REPLICATION;
|
|
@@ -58,48 +58,48 @@ ALTER ROLE regress_createdb NOSUPERUSER;
|
|
ERROR: permission denied to alter role
|
|
DETAIL: Only roles with the SUPERUSER attribute may change the SUPERUSER attribute.
|
|
-- ok, having CREATEROLE is enough to create users with these privileges
|
|
-CREATE ROLE regress_createrole CREATEROLE NOINHERIT;
|
|
+CREATE ROLE regress_createrole CREATEROLE NOINHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_createrole WITH GRANT OPTION;
|
|
-CREATE ROLE regress_login LOGIN;
|
|
-CREATE ROLE regress_inherit INHERIT;
|
|
-CREATE ROLE regress_connection_limit CONNECTION LIMIT 5;
|
|
-CREATE ROLE regress_encrypted_password ENCRYPTED PASSWORD 'foo';
|
|
-CREATE ROLE regress_password_null PASSWORD NULL;
|
|
+CREATE ROLE regress_login LOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_inherit INHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_connection_limit CONNECTION LIMIT 5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_encrypted_password ENCRYPTED PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- ok, backwards compatible noise words should be ignored
|
|
-CREATE ROLE regress_noiseword SYSID 12345;
|
|
+CREATE ROLE regress_noiseword SYSID 12345 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
NOTICE: SYSID can no longer be specified
|
|
-- fail, cannot grant membership in superuser role
|
|
-CREATE ROLE regress_nosuch_super IN ROLE regress_role_super;
|
|
+CREATE ROLE regress_nosuch_super IN ROLE regress_role_super PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: permission denied to grant role "regress_role_super"
|
|
DETAIL: Only roles with the SUPERUSER attribute may grant roles with the SUPERUSER attribute.
|
|
-- fail, database owner cannot have members
|
|
-CREATE ROLE regress_nosuch_dbowner IN ROLE pg_database_owner;
|
|
+CREATE ROLE regress_nosuch_dbowner IN ROLE pg_database_owner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: role "pg_database_owner" cannot have explicit members
|
|
-- ok, can grant other users into a role
|
|
CREATE ROLE regress_inroles ROLE
|
|
regress_role_super, regress_createdb, regress_createrole, regress_login,
|
|
- regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null;
|
|
+ regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- fail, cannot grant a role into itself
|
|
-CREATE ROLE regress_nosuch_recursive ROLE regress_nosuch_recursive;
|
|
+CREATE ROLE regress_nosuch_recursive ROLE regress_nosuch_recursive PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: role "regress_nosuch_recursive" is a member of role "regress_nosuch_recursive"
|
|
-- ok, can grant other users into a role with admin option
|
|
CREATE ROLE regress_adminroles ADMIN
|
|
regress_role_super, regress_createdb, regress_createrole, regress_login,
|
|
- regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null;
|
|
+ regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- fail, cannot grant a role into itself with admin option
|
|
-CREATE ROLE regress_nosuch_admin_recursive ADMIN regress_nosuch_admin_recursive;
|
|
+CREATE ROLE regress_nosuch_admin_recursive ADMIN regress_nosuch_admin_recursive PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ERROR: role "regress_nosuch_admin_recursive" is a member of role "regress_nosuch_admin_recursive"
|
|
-- fail, regress_createrole does not have CREATEDB privilege
|
|
SET SESSION AUTHORIZATION regress_createrole;
|
|
CREATE DATABASE regress_nosuch_db;
|
|
ERROR: permission denied to create database
|
|
-- ok, regress_createrole can create new roles
|
|
-CREATE ROLE regress_plainrole;
|
|
+CREATE ROLE regress_plainrole PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- ok, roles with CREATEROLE can create new roles with it
|
|
-CREATE ROLE regress_rolecreator CREATEROLE;
|
|
+CREATE ROLE regress_rolecreator CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- ok, roles with CREATEROLE can create new roles with different role
|
|
-- attributes, including CREATEROLE
|
|
-CREATE ROLE regress_hasprivs CREATEROLE LOGIN INHERIT CONNECTION LIMIT 5;
|
|
+CREATE ROLE regress_hasprivs CREATEROLE LOGIN INHERIT CONNECTION LIMIT 5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- ok, we should be able to modify a role we created
|
|
COMMENT ON ROLE regress_hasprivs IS 'some comment';
|
|
ALTER ROLE regress_hasprivs RENAME TO regress_tenant;
|
|
@@ -141,7 +141,7 @@ ERROR: permission denied to reassign objects
|
|
DETAIL: Only roles with privileges of role "regress_tenant" may reassign objects owned by it.
|
|
-- ok, create a role with a value for createrole_self_grant
|
|
SET createrole_self_grant = 'set, inherit';
|
|
-CREATE ROLE regress_tenant2;
|
|
+CREATE ROLE regress_tenant2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_tenant2;
|
|
-- ok, regress_tenant2 can create objects within the database
|
|
SET SESSION AUTHORIZATION regress_tenant2;
|
|
@@ -165,34 +165,34 @@ ALTER TABLE tenant2_table OWNER TO regress_tenant2;
|
|
ERROR: must be able to SET ROLE "regress_tenant2"
|
|
DROP TABLE tenant2_table;
|
|
-- fail, CREATEROLE is not enough to create roles in privileged roles
|
|
-CREATE ROLE regress_read_all_data IN ROLE pg_read_all_data;
|
|
+CREATE ROLE regress_read_all_data PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_data;
|
|
ERROR: permission denied to grant role "pg_read_all_data"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_read_all_data" may grant this role.
|
|
-CREATE ROLE regress_write_all_data IN ROLE pg_write_all_data;
|
|
+CREATE ROLE regress_write_all_data PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_write_all_data;
|
|
ERROR: permission denied to grant role "pg_write_all_data"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_write_all_data" may grant this role.
|
|
-CREATE ROLE regress_monitor IN ROLE pg_monitor;
|
|
+CREATE ROLE regress_monitor PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_monitor;
|
|
ERROR: permission denied to grant role "pg_monitor"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_monitor" may grant this role.
|
|
-CREATE ROLE regress_read_all_settings IN ROLE pg_read_all_settings;
|
|
+CREATE ROLE regress_read_all_settings PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_settings;
|
|
ERROR: permission denied to grant role "pg_read_all_settings"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_read_all_settings" may grant this role.
|
|
-CREATE ROLE regress_read_all_stats IN ROLE pg_read_all_stats;
|
|
+CREATE ROLE regress_read_all_stats PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_stats;
|
|
ERROR: permission denied to grant role "pg_read_all_stats"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_read_all_stats" may grant this role.
|
|
-CREATE ROLE regress_stat_scan_tables IN ROLE pg_stat_scan_tables;
|
|
+CREATE ROLE regress_stat_scan_tables PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_stat_scan_tables;
|
|
ERROR: permission denied to grant role "pg_stat_scan_tables"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_stat_scan_tables" may grant this role.
|
|
-CREATE ROLE regress_read_server_files IN ROLE pg_read_server_files;
|
|
+CREATE ROLE regress_read_server_files PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_server_files;
|
|
ERROR: permission denied to grant role "pg_read_server_files"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_read_server_files" may grant this role.
|
|
-CREATE ROLE regress_write_server_files IN ROLE pg_write_server_files;
|
|
+CREATE ROLE regress_write_server_files PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_write_server_files;
|
|
ERROR: permission denied to grant role "pg_write_server_files"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_write_server_files" may grant this role.
|
|
-CREATE ROLE regress_execute_server_program IN ROLE pg_execute_server_program;
|
|
+CREATE ROLE regress_execute_server_program PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_execute_server_program;
|
|
ERROR: permission denied to grant role "pg_execute_server_program"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_execute_server_program" may grant this role.
|
|
-CREATE ROLE regress_signal_backend IN ROLE pg_signal_backend;
|
|
+CREATE ROLE regress_signal_backend PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_signal_backend;
|
|
ERROR: permission denied to grant role "pg_signal_backend"
|
|
DETAIL: Only roles with the ADMIN option on role "pg_signal_backend" may grant this role.
|
|
-- fail, role still owns database objects
|
|
diff --git a/src/test/regress/expected/create_schema.out b/src/test/regress/expected/create_schema.out
|
|
index 93302a07ef..1a73f083ac 100644
|
|
--- a/src/test/regress/expected/create_schema.out
|
|
+++ b/src/test/regress/expected/create_schema.out
|
|
@@ -2,7 +2,7 @@
|
|
-- CREATE_SCHEMA
|
|
--
|
|
-- Schema creation with elements.
|
|
-CREATE ROLE regress_create_schema_role SUPERUSER;
|
|
+CREATE ROLE regress_create_schema_role SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Cases where schema creation fails as objects are qualified with a schema
|
|
-- that does not match with what's expected.
|
|
-- This checks all the object types that include schema qualifications.
|
|
diff --git a/src/test/regress/expected/create_view.out b/src/test/regress/expected/create_view.out
|
|
index f551624afb..57f1e432d4 100644
|
|
--- a/src/test/regress/expected/create_view.out
|
|
+++ b/src/test/regress/expected/create_view.out
|
|
@@ -18,7 +18,8 @@ CREATE TABLE real_city (
|
|
outline path
|
|
);
|
|
\set filename :abs_srcdir '/data/real_city.data'
|
|
-COPY real_city FROM :'filename';
|
|
+\set command '\\copy real_city FROM ' :'filename';
|
|
+:command
|
|
ANALYZE real_city;
|
|
SELECT *
|
|
INTO TABLE ramp
|
|
diff --git a/src/test/regress/expected/database.out b/src/test/regress/expected/database.out
|
|
index 454db91ec0..01378d7081 100644
|
|
--- a/src/test/regress/expected/database.out
|
|
+++ b/src/test/regress/expected/database.out
|
|
@@ -1,8 +1,7 @@
|
|
CREATE DATABASE regression_tbd
|
|
ENCODING utf8 LC_COLLATE "C" LC_CTYPE "C" TEMPLATE template0;
|
|
ALTER DATABASE regression_tbd RENAME TO regression_utf8;
|
|
-ALTER DATABASE regression_utf8 SET TABLESPACE regress_tblspace;
|
|
-ALTER DATABASE regression_utf8 RESET TABLESPACE;
|
|
+WARNING: you need to manually restart any running background workers after this command
|
|
ALTER DATABASE regression_utf8 CONNECTION_LIMIT 123;
|
|
-- Test PgDatabaseToastTable. Doing this with GRANT would be slow.
|
|
BEGIN;
|
|
diff --git a/src/test/regress/expected/dependency.out b/src/test/regress/expected/dependency.out
|
|
index 74d9ff2998..fad0151614 100644
|
|
--- a/src/test/regress/expected/dependency.out
|
|
+++ b/src/test/regress/expected/dependency.out
|
|
@@ -1,10 +1,10 @@
|
|
--
|
|
-- DEPENDENCIES
|
|
--
|
|
-CREATE USER regress_dep_user;
|
|
-CREATE USER regress_dep_user2;
|
|
-CREATE USER regress_dep_user3;
|
|
-CREATE GROUP regress_dep_group;
|
|
+CREATE USER regress_dep_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_dep_group PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE deptest (f1 serial primary key, f2 text);
|
|
GRANT SELECT ON TABLE deptest TO GROUP regress_dep_group;
|
|
GRANT ALL ON TABLE deptest TO regress_dep_user, regress_dep_user2;
|
|
@@ -41,9 +41,9 @@ ERROR: role "regress_dep_user3" cannot be dropped because some objects depend o
|
|
DROP TABLE deptest;
|
|
DROP USER regress_dep_user3;
|
|
-- Test DROP OWNED
|
|
-CREATE USER regress_dep_user0;
|
|
-CREATE USER regress_dep_user1;
|
|
-CREATE USER regress_dep_user2;
|
|
+CREATE USER regress_dep_user0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_dep_user0;
|
|
-- permission denied
|
|
DROP OWNED BY regress_dep_user1;
|
|
diff --git a/src/test/regress/expected/drop_if_exists.out b/src/test/regress/expected/drop_if_exists.out
|
|
index 5e44c2c3ce..eb3bb329fb 100644
|
|
--- a/src/test/regress/expected/drop_if_exists.out
|
|
+++ b/src/test/regress/expected/drop_if_exists.out
|
|
@@ -64,9 +64,9 @@ ERROR: type "test_domain_exists" does not exist
|
|
---
|
|
--- role/user/group
|
|
---
|
|
-CREATE USER regress_test_u1;
|
|
-CREATE ROLE regress_test_r1;
|
|
-CREATE GROUP regress_test_g1;
|
|
+CREATE USER regress_test_u1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_r1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_test_g1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
DROP USER regress_test_u2;
|
|
ERROR: role "regress_test_u2" does not exist
|
|
DROP USER IF EXISTS regress_test_u1, regress_test_u2;
|
|
diff --git a/src/test/regress/expected/equivclass.out b/src/test/regress/expected/equivclass.out
|
|
index 126f7047fe..0e2cc73426 100644
|
|
--- a/src/test/regress/expected/equivclass.out
|
|
+++ b/src/test/regress/expected/equivclass.out
|
|
@@ -384,7 +384,7 @@ set enable_nestloop = on;
|
|
set enable_mergejoin = off;
|
|
alter table ec1 enable row level security;
|
|
create policy p1 on ec1 using (f1 < '5'::int8alias1);
|
|
-create user regress_user_ectest;
|
|
+create user regress_user_ectest PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant select on ec0 to regress_user_ectest;
|
|
grant select on ec1 to regress_user_ectest;
|
|
-- without any RLS, we'll treat {a.ff, b.ff, 43} as an EquivalenceClass
|
|
diff --git a/src/test/regress/expected/event_trigger.out b/src/test/regress/expected/event_trigger.out
|
|
index 7b2198eac6..39919697ad 100644
|
|
--- a/src/test/regress/expected/event_trigger.out
|
|
+++ b/src/test/regress/expected/event_trigger.out
|
|
@@ -85,7 +85,7 @@ create event trigger regress_event_trigger2 on ddl_command_start
|
|
-- OK
|
|
comment on event trigger regress_event_trigger is 'test comment';
|
|
-- drop as non-superuser should fail
|
|
-create role regress_evt_user;
|
|
+create role regress_evt_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
set role regress_evt_user;
|
|
create event trigger regress_event_trigger_noperms on ddl_command_start
|
|
execute procedure test_event_trigger();
|
|
diff --git a/src/test/regress/expected/foreign_data.out b/src/test/regress/expected/foreign_data.out
|
|
index 6ed50fdcfa..caa00a345d 100644
|
|
--- a/src/test/regress/expected/foreign_data.out
|
|
+++ b/src/test/regress/expected/foreign_data.out
|
|
@@ -14,13 +14,13 @@ CREATE FUNCTION test_fdw_handler()
|
|
SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_foreign_data_user, regress_test_role, regress_test_role2, regress_test_role_super, regress_test_indirect, regress_unprivileged_role;
|
|
RESET client_min_messages;
|
|
-CREATE ROLE regress_foreign_data_user LOGIN SUPERUSER;
|
|
+CREATE ROLE regress_foreign_data_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_foreign_data_user';
|
|
-CREATE ROLE regress_test_role;
|
|
-CREATE ROLE regress_test_role2;
|
|
-CREATE ROLE regress_test_role_super SUPERUSER;
|
|
-CREATE ROLE regress_test_indirect;
|
|
-CREATE ROLE regress_unprivileged_role;
|
|
+CREATE ROLE regress_test_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_role_super SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_indirect PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_unprivileged_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE FOREIGN DATA WRAPPER dummy;
|
|
COMMENT ON FOREIGN DATA WRAPPER dummy IS 'useless';
|
|
CREATE FOREIGN DATA WRAPPER postgresql VALIDATOR postgresql_fdw_validator;
|
|
diff --git a/src/test/regress/expected/foreign_key.out b/src/test/regress/expected/foreign_key.out
|
|
index 69994c98e3..129abcfbe8 100644
|
|
--- a/src/test/regress/expected/foreign_key.out
|
|
+++ b/src/test/regress/expected/foreign_key.out
|
|
@@ -1985,7 +1985,7 @@ ALTER TABLE fk_partitioned_fk_6 ATTACH PARTITION fk_partitioned_pk_6 FOR VALUES
|
|
ERROR: cannot ALTER TABLE "fk_partitioned_pk_61" because it is being used by active queries in this session
|
|
DROP TABLE fk_partitioned_pk_6, fk_partitioned_fk_6;
|
|
-- test the case when the referenced table is owned by a different user
|
|
-create role regress_other_partitioned_fk_owner;
|
|
+create role regress_other_partitioned_fk_owner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant references on fk_notpartitioned_pk to regress_other_partitioned_fk_owner;
|
|
set role regress_other_partitioned_fk_owner;
|
|
create table other_partitioned_fk(a int, b int) partition by list (a);
|
|
diff --git a/src/test/regress/expected/generated.out b/src/test/regress/expected/generated.out
|
|
index 499072e14c..bd7a8b3f18 100644
|
|
--- a/src/test/regress/expected/generated.out
|
|
+++ b/src/test/regress/expected/generated.out
|
|
@@ -534,7 +534,7 @@ CREATE TABLE gtest10a (a int PRIMARY KEY, b int GENERATED ALWAYS AS (a * 2) STOR
|
|
ALTER TABLE gtest10a DROP COLUMN b;
|
|
INSERT INTO gtest10a (a) VALUES (1);
|
|
-- privileges
|
|
-CREATE USER regress_user11;
|
|
+CREATE USER regress_user11 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE gtest11s (a int PRIMARY KEY, b int, c int GENERATED ALWAYS AS (b * 2) STORED);
|
|
INSERT INTO gtest11s VALUES (1, 10), (2, 20);
|
|
GRANT SELECT (a, c) ON gtest11s TO regress_user11;
|
|
diff --git a/src/test/regress/expected/guc.out b/src/test/regress/expected/guc.out
|
|
index 455b6d6c0c..12fa350c6d 100644
|
|
--- a/src/test/regress/expected/guc.out
|
|
+++ b/src/test/regress/expected/guc.out
|
|
@@ -584,7 +584,7 @@ PREPARE foo AS SELECT 1;
|
|
LISTEN foo_event;
|
|
SET vacuum_cost_delay = 13;
|
|
CREATE TEMP TABLE tmp_foo (data text) ON COMMIT DELETE ROWS;
|
|
-CREATE ROLE regress_guc_user;
|
|
+CREATE ROLE regress_guc_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_guc_user;
|
|
-- look changes
|
|
SELECT pg_listening_channels();
|
|
diff --git a/src/test/regress/expected/hash_index.out b/src/test/regress/expected/hash_index.out
|
|
index 0d4bdb2ade..9a5a9b5407 100644
|
|
--- a/src/test/regress/expected/hash_index.out
|
|
+++ b/src/test/regress/expected/hash_index.out
|
|
@@ -20,10 +20,14 @@ CREATE TABLE hash_f8_heap (
|
|
random float8
|
|
);
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY hash_i4_heap FROM :'filename';
|
|
-COPY hash_name_heap FROM :'filename';
|
|
-COPY hash_txt_heap FROM :'filename';
|
|
-COPY hash_f8_heap FROM :'filename';
|
|
+\set command '\\copy hash_i4_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_name_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_txt_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_f8_heap FROM ' :'filename';
|
|
+:command
|
|
-- the data in this file has a lot of duplicates in the index key
|
|
-- fields, leading to long bucket chains and lots of table expansion.
|
|
-- this is therefore a stress test of the bucket overflow code (unlike
|
|
diff --git a/src/test/regress/expected/identity.out b/src/test/regress/expected/identity.out
|
|
index f14bfccfb1..bbb2092df9 100644
|
|
--- a/src/test/regress/expected/identity.out
|
|
+++ b/src/test/regress/expected/identity.out
|
|
@@ -520,7 +520,7 @@ ALTER TABLE itest7 ALTER COLUMN a SET GENERATED BY DEFAULT;
|
|
ALTER TABLE itest7 ALTER COLUMN a RESTART;
|
|
ALTER TABLE itest7 ALTER COLUMN a DROP IDENTITY;
|
|
-- privileges
|
|
-CREATE USER regress_identity_user1;
|
|
+CREATE USER regress_identity_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE itest8 (a int GENERATED ALWAYS AS IDENTITY, b text);
|
|
GRANT SELECT, INSERT ON itest8 TO regress_identity_user1;
|
|
SET ROLE regress_identity_user1;
|
|
diff --git a/src/test/regress/expected/inherit.out b/src/test/regress/expected/inherit.out
|
|
index 85240a9b0b..5294f7557d 100644
|
|
--- a/src/test/regress/expected/inherit.out
|
|
+++ b/src/test/regress/expected/inherit.out
|
|
@@ -2055,8 +2055,8 @@ NOTICE: drop cascades to table cnullchild
|
|
--
|
|
-- Mixed ownership inheritance tree
|
|
--
|
|
-create role regress_alice;
|
|
-create role regress_bob;
|
|
+create role regress_alice password NEON_PASSWORD_PLACEHOLDER;
|
|
+create role regress_bob password NEON_PASSWORD_PLACEHOLDER;
|
|
grant all on schema public to regress_alice, regress_bob;
|
|
grant regress_alice to regress_bob;
|
|
set session authorization regress_alice;
|
|
@@ -2789,7 +2789,7 @@ create index on permtest_parent (left(c, 3));
|
|
insert into permtest_parent
|
|
select 1, 'a', left(fipshash(i::text), 5) from generate_series(0, 100) i;
|
|
analyze permtest_parent;
|
|
-create role regress_no_child_access;
|
|
+create role regress_no_child_access PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
revoke all on permtest_grandchild from regress_no_child_access;
|
|
grant select on permtest_parent to regress_no_child_access;
|
|
set session authorization regress_no_child_access;
|
|
diff --git a/src/test/regress/expected/insert.out b/src/test/regress/expected/insert.out
|
|
index cf4b5221a8..fa6ccb639c 100644
|
|
--- a/src/test/regress/expected/insert.out
|
|
+++ b/src/test/regress/expected/insert.out
|
|
@@ -802,7 +802,7 @@ drop table mlparted5;
|
|
-- appropriate key description (or none) in various situations
|
|
create table key_desc (a int, b int) partition by list ((a+0));
|
|
create table key_desc_1 partition of key_desc for values in (1) partition by range (b);
|
|
-create user regress_insert_other_user;
|
|
+create user regress_insert_other_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant select (a) on key_desc_1 to regress_insert_other_user;
|
|
grant insert on key_desc to regress_insert_other_user;
|
|
set role regress_insert_other_user;
|
|
@@ -914,7 +914,7 @@ DETAIL: Failing row contains (2, hi there).
|
|
-- check that the message shows the appropriate column description in a
|
|
-- situation where the partitioned table is not the primary ModifyTable node
|
|
create table inserttest3 (f1 text default 'foo', f2 text default 'bar', f3 int);
|
|
-create role regress_coldesc_role;
|
|
+create role regress_coldesc_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant insert on inserttest3 to regress_coldesc_role;
|
|
grant insert on brtrigpartcon to regress_coldesc_role;
|
|
revoke select on brtrigpartcon from regress_coldesc_role;
|
|
diff --git a/src/test/regress/expected/jsonb.out b/src/test/regress/expected/jsonb.out
|
|
index e66d760189..86348fd416 100644
|
|
--- a/src/test/regress/expected/jsonb.out
|
|
+++ b/src/test/regress/expected/jsonb.out
|
|
@@ -4,7 +4,8 @@ CREATE TABLE testjsonb (
|
|
j jsonb
|
|
);
|
|
\set filename :abs_srcdir '/data/jsonb.data'
|
|
-COPY testjsonb FROM :'filename';
|
|
+\set command '\\copy testjsonb FROM ' :'filename';
|
|
+:command
|
|
-- Strings.
|
|
SELECT '""'::jsonb; -- OK.
|
|
jsonb
|
|
diff --git a/src/test/regress/expected/largeobject.out b/src/test/regress/expected/largeobject.out
|
|
index 4921dd79ae..d18a3cdd66 100644
|
|
--- a/src/test/regress/expected/largeobject.out
|
|
+++ b/src/test/regress/expected/largeobject.out
|
|
@@ -7,7 +7,7 @@
|
|
-- ensure consistent test output regardless of the default bytea format
|
|
SET bytea_output TO escape;
|
|
-- Test ALTER LARGE OBJECT OWNER
|
|
-CREATE ROLE regress_lo_user;
|
|
+CREATE ROLE regress_lo_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SELECT lo_create(42);
|
|
lo_create
|
|
-----------
|
|
@@ -346,7 +346,8 @@ SELECT lo_unlink(loid) from lotest_stash_values;
|
|
|
|
TRUNCATE lotest_stash_values;
|
|
\set filename :abs_srcdir '/data/tenk.data'
|
|
-INSERT INTO lotest_stash_values (loid) SELECT lo_import(:'filename');
|
|
+\lo_import :filename
|
|
+INSERT INTO lotest_stash_values (loid) VALUES (:LASTOID);
|
|
BEGIN;
|
|
UPDATE lotest_stash_values SET fd=lo_open(loid, CAST(x'20000' | x'40000' AS integer));
|
|
-- verify length of large object
|
|
@@ -410,12 +411,8 @@ SELECT lo_close(fd) FROM lotest_stash_values;
|
|
|
|
END;
|
|
\set filename :abs_builddir '/results/lotest.txt'
|
|
-SELECT lo_export(loid, :'filename') FROM lotest_stash_values;
|
|
- lo_export
|
|
------------
|
|
- 1
|
|
-(1 row)
|
|
-
|
|
+SELECT loid FROM lotest_stash_values \gset
|
|
+\lo_export :loid, :filename
|
|
\lo_import :filename
|
|
\set newloid :LASTOID
|
|
-- just make sure \lo_export does not barf
|
|
diff --git a/src/test/regress/expected/lock.out b/src/test/regress/expected/lock.out
|
|
index ad137d3645..8dac447436 100644
|
|
--- a/src/test/regress/expected/lock.out
|
|
+++ b/src/test/regress/expected/lock.out
|
|
@@ -16,7 +16,7 @@ CREATE VIEW lock_view3 AS SELECT * from lock_view2;
|
|
CREATE VIEW lock_view4 AS SELECT (select a from lock_tbl1a limit 1) from lock_tbl1;
|
|
CREATE VIEW lock_view5 AS SELECT * from lock_tbl1 where a in (select * from lock_tbl1a);
|
|
CREATE VIEW lock_view6 AS SELECT * from (select * from lock_tbl1) sub;
|
|
-CREATE ROLE regress_rol_lock1;
|
|
+CREATE ROLE regress_rol_lock1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER ROLE regress_rol_lock1 SET search_path = lock_schema1;
|
|
GRANT USAGE ON SCHEMA lock_schema1 TO regress_rol_lock1;
|
|
-- Try all valid lock options; also try omitting the optional TABLE keyword.
|
|
diff --git a/src/test/regress/expected/matview.out b/src/test/regress/expected/matview.out
|
|
index 038ab73517..bd471f9fac 100644
|
|
--- a/src/test/regress/expected/matview.out
|
|
+++ b/src/test/regress/expected/matview.out
|
|
@@ -549,7 +549,7 @@ SELECT * FROM mvtest_mv_v;
|
|
DROP TABLE mvtest_v CASCADE;
|
|
NOTICE: drop cascades to materialized view mvtest_mv_v
|
|
-- make sure running as superuser works when MV owned by another role (bug #11208)
|
|
-CREATE ROLE regress_user_mvtest;
|
|
+CREATE ROLE regress_user_mvtest PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET ROLE regress_user_mvtest;
|
|
-- this test case also checks for ambiguity in the queries issued by
|
|
-- refresh_by_match_merge(), by choosing column names that intentionally
|
|
@@ -617,7 +617,7 @@ HINT: Use the REFRESH MATERIALIZED VIEW command.
|
|
ROLLBACK;
|
|
-- INSERT privileges if relation owner is not allowed to insert.
|
|
CREATE SCHEMA matview_schema;
|
|
-CREATE USER regress_matview_user;
|
|
+CREATE USER regress_matview_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE regress_matview_user
|
|
REVOKE INSERT ON TABLES FROM regress_matview_user;
|
|
GRANT ALL ON SCHEMA matview_schema TO public;
|
|
diff --git a/src/test/regress/expected/merge.out b/src/test/regress/expected/merge.out
|
|
index 521d70a891..7fd218f3d8 100644
|
|
--- a/src/test/regress/expected/merge.out
|
|
+++ b/src/test/regress/expected/merge.out
|
|
@@ -1,9 +1,9 @@
|
|
--
|
|
-- MERGE
|
|
--
|
|
-CREATE USER regress_merge_privs;
|
|
-CREATE USER regress_merge_no_privs;
|
|
-CREATE USER regress_merge_none;
|
|
+CREATE USER regress_merge_privs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_merge_no_privs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_merge_none PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
DROP TABLE IF EXISTS target;
|
|
NOTICE: table "target" does not exist, skipping
|
|
DROP TABLE IF EXISTS source;
|
|
diff --git a/src/test/regress/expected/misc.out b/src/test/regress/expected/misc.out
|
|
index 6e816c57f1..6ef45b468e 100644
|
|
--- a/src/test/regress/expected/misc.out
|
|
+++ b/src/test/regress/expected/misc.out
|
|
@@ -59,9 +59,11 @@ DROP TABLE tmp;
|
|
-- copy
|
|
--
|
|
\set filename :abs_builddir '/results/onek.data'
|
|
-COPY onek TO :'filename';
|
|
+\set command '\\copy onek TO ' :'filename';
|
|
+:command
|
|
CREATE TEMP TABLE onek_copy (LIKE onek);
|
|
-COPY onek_copy FROM :'filename';
|
|
+\set command '\\copy onek_copy FROM ' :'filename';
|
|
+:command
|
|
SELECT * FROM onek EXCEPT ALL SELECT * FROM onek_copy;
|
|
unique1 | unique2 | two | four | ten | twenty | hundred | thousand | twothousand | fivethous | tenthous | odd | even | stringu1 | stringu2 | string4
|
|
---------+---------+-----+------+-----+--------+---------+----------+-------------+-----------+----------+-----+------+----------+----------+---------
|
|
@@ -73,9 +75,11 @@ SELECT * FROM onek_copy EXCEPT ALL SELECT * FROM onek;
|
|
(0 rows)
|
|
|
|
\set filename :abs_builddir '/results/stud_emp.data'
|
|
-COPY BINARY stud_emp TO :'filename';
|
|
+\set command '\\COPY BINARY stud_emp TO ' :'filename';
|
|
+:command
|
|
CREATE TEMP TABLE stud_emp_copy (LIKE stud_emp);
|
|
-COPY BINARY stud_emp_copy FROM :'filename';
|
|
+\set command '\\COPY BINARY stud_emp_copy FROM ' :'filename';
|
|
+:command
|
|
SELECT * FROM stud_emp_copy;
|
|
name | age | location | salary | manager | gpa | percent
|
|
-------+-----+------------+--------+---------+-----+---------
|
|
diff --git a/src/test/regress/expected/misc_functions.out b/src/test/regress/expected/misc_functions.out
|
|
index d94056862a..f8270d8343 100644
|
|
--- a/src/test/regress/expected/misc_functions.out
|
|
+++ b/src/test/regress/expected/misc_functions.out
|
|
@@ -297,7 +297,7 @@ SELECT pg_log_backend_memory_contexts(pid) FROM pg_stat_activity
|
|
t
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_log_memory;
|
|
+CREATE ROLE regress_log_memory PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SELECT has_function_privilege('regress_log_memory',
|
|
'pg_log_backend_memory_contexts(integer)', 'EXECUTE'); -- no
|
|
has_function_privilege
|
|
@@ -483,7 +483,7 @@ select count(*) > 0 from
|
|
--
|
|
-- Test replication slot directory functions
|
|
--
|
|
-CREATE ROLE regress_slot_dir_funcs;
|
|
+CREATE ROLE regress_slot_dir_funcs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Not available by default.
|
|
SELECT has_function_privilege('regress_slot_dir_funcs',
|
|
'pg_ls_logicalsnapdir()', 'EXECUTE');
|
|
@@ -671,7 +671,7 @@ FROM pg_walfile_name_offset('0/0'::pg_lsn + :segment_size - 1),
|
|
(1 row)
|
|
|
|
-- pg_current_logfile
|
|
-CREATE ROLE regress_current_logfile;
|
|
+CREATE ROLE regress_current_logfile PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- not available by default
|
|
SELECT has_function_privilege('regress_current_logfile',
|
|
'pg_current_logfile()', 'EXECUTE');
|
|
diff --git a/src/test/regress/expected/multirangetypes.out b/src/test/regress/expected/multirangetypes.out
|
|
index c6363ebeb2..8f43732404 100644
|
|
--- a/src/test/regress/expected/multirangetypes.out
|
|
+++ b/src/test/regress/expected/multirangetypes.out
|
|
@@ -3118,7 +3118,7 @@ drop type textrange2;
|
|
-- Multiranges don't have their own ownership or permissions.
|
|
--
|
|
create type textrange1 as range(subtype=text, multirange_type_name=multitextrange1, collation="C");
|
|
-create role regress_multirange_owner;
|
|
+create role regress_multirange_owner password NEON_PASSWORD_PLACEHOLDER;
|
|
alter type multitextrange1 owner to regress_multirange_owner; -- fail
|
|
ERROR: cannot alter multirange type multitextrange1
|
|
HINT: You can alter type textrange1, which will alter the multirange type as well.
|
|
diff --git a/src/test/regress/expected/object_address.out b/src/test/regress/expected/object_address.out
|
|
index fc42d418bf..e38f517574 100644
|
|
--- a/src/test/regress/expected/object_address.out
|
|
+++ b/src/test/regress/expected/object_address.out
|
|
@@ -5,7 +5,7 @@
|
|
SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_addr_user;
|
|
RESET client_min_messages;
|
|
-CREATE USER regress_addr_user;
|
|
+CREATE USER regress_addr_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Test generic object addressing/identification functions
|
|
CREATE SCHEMA addr_nsp;
|
|
SET search_path TO 'addr_nsp';
|
|
diff --git a/src/test/regress/expected/password.out b/src/test/regress/expected/password.out
|
|
index 924d6e001d..7fdda73439 100644
|
|
--- a/src/test/regress/expected/password.out
|
|
+++ b/src/test/regress/expected/password.out
|
|
@@ -12,13 +12,11 @@ SET password_encryption = 'md5'; -- ok
|
|
SET password_encryption = 'scram-sha-256'; -- ok
|
|
-- consistency of password entries
|
|
SET password_encryption = 'md5';
|
|
-CREATE ROLE regress_passwd1;
|
|
-ALTER ROLE regress_passwd1 PASSWORD 'role_pwd1';
|
|
-CREATE ROLE regress_passwd2;
|
|
-ALTER ROLE regress_passwd2 PASSWORD 'role_pwd2';
|
|
+CREATE ROLE regress_passwd1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET password_encryption = 'scram-sha-256';
|
|
-CREATE ROLE regress_passwd3 PASSWORD 'role_pwd3';
|
|
-CREATE ROLE regress_passwd4 PASSWORD NULL;
|
|
+CREATE ROLE regress_passwd3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- check list of created entries
|
|
--
|
|
-- The scram secret will look something like:
|
|
@@ -32,10 +30,10 @@ SELECT rolname, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+
|
|
ORDER BY rolname, rolpassword;
|
|
rolname | rolpassword_masked
|
|
-----------------+---------------------------------------------------
|
|
- regress_passwd1 | md5783277baca28003b33453252be4dbb34
|
|
- regress_passwd2 | md54044304ba511dd062133eb5b4b84a2a3
|
|
+ regress_passwd1 | NEON_MD5_PLACEHOLDER:regress_passwd1
|
|
+ regress_passwd2 | NEON_MD5_PLACEHOLDER:regress_passwd2
|
|
regress_passwd3 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
- regress_passwd4 |
|
|
+ regress_passwd4 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
(4 rows)
|
|
|
|
-- Rename a role
|
|
@@ -56,24 +54,17 @@ ALTER ROLE regress_passwd2_new RENAME TO regress_passwd2;
|
|
-- passwords.
|
|
SET password_encryption = 'md5';
|
|
-- encrypt with MD5
|
|
-ALTER ROLE regress_passwd2 PASSWORD 'foo';
|
|
--- already encrypted, use as they are
|
|
-ALTER ROLE regress_passwd1 PASSWORD 'md5cd3578025fe2c3d7ed1b9a9b26238b70';
|
|
-ALTER ROLE regress_passwd3 PASSWORD 'SCRAM-SHA-256$4096:VLK4RMaQLCvNtQ==$6YtlR4t69SguDiwFvbVgVZtuz6gpJQQqUMZ7IQJK5yI=:ps75jrHeYU4lXCcXI4O8oIdJ3eO8o2jirjruw9phBTo=';
|
|
+ALTER ROLE regress_passwd2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET password_encryption = 'scram-sha-256';
|
|
-- create SCRAM secret
|
|
-ALTER ROLE regress_passwd4 PASSWORD 'foo';
|
|
+ALTER ROLE regress_passwd4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- already encrypted with MD5, use as it is
|
|
-CREATE ROLE regress_passwd5 PASSWORD 'md5e73a4b11df52a6068f8b39f90be36023';
|
|
--- This looks like a valid SCRAM-SHA-256 secret, but it is not
|
|
--- so it should be hashed with SCRAM-SHA-256.
|
|
-CREATE ROLE regress_passwd6 PASSWORD 'SCRAM-SHA-256$1234';
|
|
--- These may look like valid MD5 secrets, but they are not, so they
|
|
--- should be hashed with SCRAM-SHA-256.
|
|
--- trailing garbage at the end
|
|
-CREATE ROLE regress_passwd7 PASSWORD 'md5012345678901234567890123456789zz';
|
|
--- invalid length
|
|
-CREATE ROLE regress_passwd8 PASSWORD 'md501234567890123456789012345678901zz';
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd7 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd8 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Changing the SCRAM iteration count
|
|
SET scram_iterations = 1024;
|
|
CREATE ROLE regress_passwd9 PASSWORD 'alterediterationcount';
|
|
@@ -83,11 +74,11 @@ SELECT rolname, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+
|
|
ORDER BY rolname, rolpassword;
|
|
rolname | rolpassword_masked
|
|
-----------------+---------------------------------------------------
|
|
- regress_passwd1 | md5cd3578025fe2c3d7ed1b9a9b26238b70
|
|
- regress_passwd2 | md5dfa155cadd5f4ad57860162f3fab9cdb
|
|
+ regress_passwd1 | NEON_MD5_PLACEHOLDER:regress_passwd1
|
|
+ regress_passwd2 | NEON_MD5_PLACEHOLDER:regress_passwd2
|
|
regress_passwd3 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
regress_passwd4 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
- regress_passwd5 | md5e73a4b11df52a6068f8b39f90be36023
|
|
+ regress_passwd5 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
regress_passwd6 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
regress_passwd7 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
regress_passwd8 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
|
|
@@ -97,23 +88,20 @@ SELECT rolname, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+
|
|
-- An empty password is not allowed, in any form
|
|
CREATE ROLE regress_passwd_empty PASSWORD '';
|
|
NOTICE: empty string is not a valid password, clearing password
|
|
+ERROR: Failed to get encrypted password: User "regress_passwd_empty" has no password assigned.
|
|
ALTER ROLE regress_passwd_empty PASSWORD 'md585939a5ce845f1a1b620742e3c659e0a';
|
|
-NOTICE: empty string is not a valid password, clearing password
|
|
+ERROR: role "regress_passwd_empty" does not exist
|
|
ALTER ROLE regress_passwd_empty PASSWORD 'SCRAM-SHA-256$4096:hpFyHTUsSWcR7O9P$LgZFIt6Oqdo27ZFKbZ2nV+vtnYM995pDh9ca6WSi120=:qVV5NeluNfUPkwm7Vqat25RjSPLkGeoZBQs6wVv+um4=';
|
|
-NOTICE: empty string is not a valid password, clearing password
|
|
+ERROR: role "regress_passwd_empty" does not exist
|
|
SELECT rolpassword FROM pg_authid WHERE rolname='regress_passwd_empty';
|
|
rolpassword
|
|
-------------
|
|
-
|
|
-(1 row)
|
|
+(0 rows)
|
|
|
|
--- Test with invalid stored and server keys.
|
|
---
|
|
--- The first is valid, to act as a control. The others have too long
|
|
--- stored/server keys. They will be re-hashed.
|
|
-CREATE ROLE regress_passwd_sha_len0 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
|
|
-CREATE ROLE regress_passwd_sha_len1 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96RqwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
|
|
-CREATE ROLE regress_passwd_sha_len2 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=';
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd_sha_len0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd_sha_len1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd_sha_len2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Check that the invalid secrets were re-hashed. A re-hashed secret
|
|
-- should not contain the original salt.
|
|
SELECT rolname, rolpassword not like '%A6xHKoH/494E941doaPOYg==%' as is_rolpassword_rehashed
|
|
@@ -122,7 +110,7 @@ SELECT rolname, rolpassword not like '%A6xHKoH/494E941doaPOYg==%' as is_rolpassw
|
|
ORDER BY rolname;
|
|
rolname | is_rolpassword_rehashed
|
|
-------------------------+-------------------------
|
|
- regress_passwd_sha_len0 | f
|
|
+ regress_passwd_sha_len0 | t
|
|
regress_passwd_sha_len1 | t
|
|
regress_passwd_sha_len2 | t
|
|
(3 rows)
|
|
@@ -137,6 +125,7 @@ DROP ROLE regress_passwd7;
|
|
DROP ROLE regress_passwd8;
|
|
DROP ROLE regress_passwd9;
|
|
DROP ROLE regress_passwd_empty;
|
|
+ERROR: role "regress_passwd_empty" does not exist
|
|
DROP ROLE regress_passwd_sha_len0;
|
|
DROP ROLE regress_passwd_sha_len1;
|
|
DROP ROLE regress_passwd_sha_len2;
|
|
diff --git a/src/test/regress/expected/privileges.out b/src/test/regress/expected/privileges.out
|
|
index 1296da0d57..f43fffa44c 100644
|
|
--- a/src/test/regress/expected/privileges.out
|
|
+++ b/src/test/regress/expected/privileges.out
|
|
@@ -20,19 +20,19 @@ SELECT lo_unlink(oid) FROM pg_largeobject_metadata WHERE oid >= 1000 AND oid < 3
|
|
|
|
RESET client_min_messages;
|
|
-- test proper begins here
|
|
-CREATE USER regress_priv_user1;
|
|
-CREATE USER regress_priv_user2;
|
|
-CREATE USER regress_priv_user3;
|
|
-CREATE USER regress_priv_user4;
|
|
-CREATE USER regress_priv_user5;
|
|
-CREATE USER regress_priv_user5; -- duplicate
|
|
+CREATE USER regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER; -- duplicate
|
|
ERROR: role "regress_priv_user5" already exists
|
|
-CREATE USER regress_priv_user6;
|
|
-CREATE USER regress_priv_user7;
|
|
-CREATE USER regress_priv_user8;
|
|
-CREATE USER regress_priv_user9;
|
|
-CREATE USER regress_priv_user10;
|
|
-CREATE ROLE regress_priv_role;
|
|
+CREATE USER regress_priv_user6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user7 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user8 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user9 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user10 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_priv_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- circular ADMIN OPTION grants should be disallowed
|
|
GRANT regress_priv_user1 TO regress_priv_user2 WITH ADMIN OPTION;
|
|
GRANT regress_priv_user1 TO regress_priv_user3 WITH ADMIN OPTION GRANTED BY regress_priv_user2;
|
|
@@ -108,11 +108,11 @@ ERROR: role "regress_priv_user5" cannot be dropped because some objects depend
|
|
DETAIL: privileges for membership of role regress_priv_user6 in role regress_priv_user1
|
|
DROP ROLE regress_priv_user1, regress_priv_user5; -- ok, despite order
|
|
-- recreate the roles we just dropped
|
|
-CREATE USER regress_priv_user1;
|
|
-CREATE USER regress_priv_user2;
|
|
-CREATE USER regress_priv_user3;
|
|
-CREATE USER regress_priv_user4;
|
|
-CREATE USER regress_priv_user5;
|
|
+CREATE USER regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT pg_read_all_data TO regress_priv_user6;
|
|
GRANT pg_write_all_data TO regress_priv_user7;
|
|
GRANT pg_read_all_settings TO regress_priv_user8 WITH ADMIN OPTION;
|
|
@@ -212,8 +212,8 @@ REVOKE pg_read_all_settings FROM regress_priv_user8;
|
|
DROP USER regress_priv_user10;
|
|
DROP USER regress_priv_user9;
|
|
DROP USER regress_priv_user8;
|
|
-CREATE GROUP regress_priv_group1;
|
|
-CREATE GROUP regress_priv_group2 WITH ADMIN regress_priv_user1 USER regress_priv_user2;
|
|
+CREATE GROUP regress_priv_group1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_priv_group2 WITH ADMIN regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER USER regress_priv_user2;
|
|
ALTER GROUP regress_priv_group1 ADD USER regress_priv_user4;
|
|
GRANT regress_priv_group2 TO regress_priv_user2 GRANTED BY regress_priv_user1;
|
|
SET SESSION AUTHORIZATION regress_priv_user1;
|
|
@@ -239,12 +239,16 @@ GRANT regress_priv_role TO regress_priv_user1 WITH ADMIN OPTION GRANTED BY regre
|
|
ERROR: permission denied to grant privileges as role "regress_priv_role"
|
|
DETAIL: The grantor must have the ADMIN option on role "regress_priv_role".
|
|
GRANT regress_priv_role TO regress_priv_user1 WITH ADMIN OPTION GRANTED BY CURRENT_ROLE;
|
|
+ERROR: permission denied to grant privileges as role "neondb_owner"
|
|
+DETAIL: The grantor must have the ADMIN option on role "regress_priv_role".
|
|
REVOKE ADMIN OPTION FOR regress_priv_role FROM regress_priv_user1 GRANTED BY foo; -- error
|
|
ERROR: role "foo" does not exist
|
|
REVOKE ADMIN OPTION FOR regress_priv_role FROM regress_priv_user1 GRANTED BY regress_priv_user2; -- warning, noop
|
|
WARNING: role "regress_priv_user1" has not been granted membership in role "regress_priv_role" by role "regress_priv_user2"
|
|
REVOKE ADMIN OPTION FOR regress_priv_role FROM regress_priv_user1 GRANTED BY CURRENT_USER;
|
|
+WARNING: role "regress_priv_user1" has not been granted membership in role "regress_priv_role" by role "neondb_owner"
|
|
REVOKE regress_priv_role FROM regress_priv_user1 GRANTED BY CURRENT_ROLE;
|
|
+WARNING: role "regress_priv_user1" has not been granted membership in role "regress_priv_role" by role "neondb_owner"
|
|
DROP ROLE regress_priv_role;
|
|
SET SESSION AUTHORIZATION regress_priv_user1;
|
|
SELECT session_user, current_user;
|
|
@@ -1776,7 +1780,7 @@ SELECT has_table_privilege('regress_priv_user1', 'atest4', 'SELECT WITH GRANT OP
|
|
|
|
-- security-restricted operations
|
|
\c -
|
|
-CREATE ROLE regress_sro_user;
|
|
+CREATE ROLE regress_sro_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Check that index expressions and predicates are run as the table's owner
|
|
-- A dummy index function checking current_user
|
|
CREATE FUNCTION sro_ifun(int) RETURNS int AS $$
|
|
@@ -2668,8 +2672,8 @@ drop cascades to function testns.priv_testagg(integer)
|
|
drop cascades to function testns.priv_testproc(integer)
|
|
-- Change owner of the schema & and rename of new schema owner
|
|
\c -
|
|
-CREATE ROLE regress_schemauser1 superuser login;
|
|
-CREATE ROLE regress_schemauser2 superuser login;
|
|
+CREATE ROLE regress_schemauser1 superuser login PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_schemauser2 superuser login PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION ROLE regress_schemauser1;
|
|
CREATE SCHEMA testns;
|
|
SELECT nspname, rolname FROM pg_namespace, pg_roles WHERE pg_namespace.nspname = 'testns' AND pg_namespace.nspowner = pg_roles.oid;
|
|
@@ -2792,7 +2796,7 @@ DROP USER regress_priv_user7;
|
|
DROP USER regress_priv_user8; -- does not exist
|
|
ERROR: role "regress_priv_user8" does not exist
|
|
-- permissions with LOCK TABLE
|
|
-CREATE USER regress_locktable_user;
|
|
+CREATE USER regress_locktable_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE lock_table (a int);
|
|
-- LOCK TABLE and SELECT permission
|
|
GRANT SELECT ON lock_table TO regress_locktable_user;
|
|
@@ -2888,7 +2892,7 @@ DROP USER regress_locktable_user;
|
|
-- pg_backend_memory_contexts.
|
|
-- switch to superuser
|
|
\c -
|
|
-CREATE ROLE regress_readallstats;
|
|
+CREATE ROLE regress_readallstats PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SELECT has_table_privilege('regress_readallstats','pg_backend_memory_contexts','SELECT'); -- no
|
|
has_table_privilege
|
|
---------------------
|
|
@@ -2932,10 +2936,10 @@ RESET ROLE;
|
|
-- clean up
|
|
DROP ROLE regress_readallstats;
|
|
-- test role grantor machinery
|
|
-CREATE ROLE regress_group;
|
|
-CREATE ROLE regress_group_direct_manager;
|
|
-CREATE ROLE regress_group_indirect_manager;
|
|
-CREATE ROLE regress_group_member;
|
|
+CREATE ROLE regress_group PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_direct_manager PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_indirect_manager PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_member PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT regress_group TO regress_group_direct_manager WITH INHERIT FALSE, ADMIN TRUE;
|
|
GRANT regress_group_direct_manager TO regress_group_indirect_manager;
|
|
SET SESSION AUTHORIZATION regress_group_direct_manager;
|
|
@@ -2964,9 +2968,9 @@ DROP ROLE regress_group_direct_manager;
|
|
DROP ROLE regress_group_indirect_manager;
|
|
DROP ROLE regress_group_member;
|
|
-- test SET and INHERIT options with object ownership changes
|
|
-CREATE ROLE regress_roleoption_protagonist;
|
|
-CREATE ROLE regress_roleoption_donor;
|
|
-CREATE ROLE regress_roleoption_recipient;
|
|
+CREATE ROLE regress_roleoption_protagonist PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_roleoption_donor PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_roleoption_recipient PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA regress_roleoption;
|
|
GRANT CREATE, USAGE ON SCHEMA regress_roleoption TO PUBLIC;
|
|
GRANT regress_roleoption_donor TO regress_roleoption_protagonist WITH INHERIT TRUE, SET FALSE;
|
|
@@ -2995,9 +2999,9 @@ DROP ROLE regress_roleoption_protagonist;
|
|
DROP ROLE regress_roleoption_donor;
|
|
DROP ROLE regress_roleoption_recipient;
|
|
-- MAINTAIN
|
|
-CREATE ROLE regress_no_maintain;
|
|
-CREATE ROLE regress_maintain;
|
|
-CREATE ROLE regress_maintain_all IN ROLE pg_maintain;
|
|
+CREATE ROLE regress_no_maintain PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_maintain PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_maintain_all IN ROLE pg_maintain PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE maintain_test (a INT);
|
|
CREATE INDEX ON maintain_test (a);
|
|
GRANT MAINTAIN ON maintain_test TO regress_maintain;
|
|
diff --git a/src/test/regress/expected/psql.out b/src/test/regress/expected/psql.out
|
|
index 3bbe4c5f97..e742a46a63 100644
|
|
--- a/src/test/regress/expected/psql.out
|
|
+++ b/src/test/regress/expected/psql.out
|
|
@@ -2862,7 +2862,7 @@ Type | func
|
|
-- check conditional am display
|
|
\pset expanded off
|
|
CREATE SCHEMA tableam_display;
|
|
-CREATE ROLE regress_display_role;
|
|
+CREATE ROLE regress_display_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER SCHEMA tableam_display OWNER TO regress_display_role;
|
|
SET search_path TO tableam_display;
|
|
CREATE ACCESS METHOD heap_psql TYPE TABLE HANDLER heap_tableam_handler;
|
|
@@ -4817,7 +4817,7 @@ last error code: 22012
|
|
reset debug_parallel_query;
|
|
\unset FETCH_COUNT
|
|
create schema testpart;
|
|
-create role regress_partitioning_role;
|
|
+create role regress_partitioning_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
alter schema testpart owner to regress_partitioning_role;
|
|
set role to regress_partitioning_role;
|
|
-- run test inside own schema and hide other partitions
|
|
@@ -5269,7 +5269,7 @@ reset work_mem;
|
|
|
|
-- check \df+
|
|
-- we have to use functions with a predictable owner name, so make a role
|
|
-create role regress_psql_user superuser;
|
|
+create role regress_psql_user superuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
begin;
|
|
set session authorization regress_psql_user;
|
|
create function psql_df_internal (float8)
|
|
@@ -5557,11 +5557,14 @@ CREATE TEMPORARY TABLE reload_output(
|
|
line text
|
|
);
|
|
SELECT 1 AS a \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT 2 AS b\; SELECT 3 AS c\; SELECT 4 AS d \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
COPY (SELECT 'foo') TO STDOUT \; COPY (SELECT 'bar') TO STDOUT \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
line
|
|
---------
|
|
@@ -5600,13 +5603,15 @@ SELECT 1 AS a\; SELECT 2 AS b\; SELECT 3 AS c;
|
|
-- COPY TO file
|
|
-- The data goes to :g_out_file and the status to :o_out_file
|
|
\set QUIET false
|
|
-COPY (SELECT unique1 FROM onek ORDER BY unique1 LIMIT 10) TO :'g_out_file';
|
|
+\set command '\\COPY (SELECT unique1 FROM onek ORDER BY unique1 LIMIT 10) TO ' :'g_out_file';
|
|
+:command
|
|
-- DML command status
|
|
UPDATE onek SET unique1 = unique1 WHERE false;
|
|
\set QUIET true
|
|
\o
|
|
-- Check the contents of the files generated.
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
line
|
|
------
|
|
@@ -5623,7 +5628,8 @@ SELECT line FROM reload_output ORDER BY lineno;
|
|
(10 rows)
|
|
|
|
TRUNCATE TABLE reload_output;
|
|
-COPY reload_output(line) FROM :'o_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'o_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
line
|
|
----------
|
|
@@ -5660,7 +5666,8 @@ COPY (SELECT 'foo1') TO STDOUT \; COPY (SELECT 'bar1') TO STDOUT;
|
|
COPY (SELECT 'foo2') TO STDOUT \; COPY (SELECT 'bar2') TO STDOUT \g :g_out_file
|
|
\o
|
|
-- Check the contents of the files generated.
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
line
|
|
------
|
|
@@ -5669,7 +5676,8 @@ SELECT line FROM reload_output ORDER BY lineno;
|
|
(2 rows)
|
|
|
|
TRUNCATE TABLE reload_output;
|
|
-COPY reload_output(line) FROM :'o_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'o_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
line
|
|
------
|
|
@@ -6633,10 +6641,10 @@ cross-database references are not implemented: "no.such.database"."no.such.schem
|
|
\dX "no.such.database"."no.such.schema"."no.such.extended.statistics"
|
|
cross-database references are not implemented: "no.such.database"."no.such.schema"."no.such.extended.statistics"
|
|
-- check \drg and \du
|
|
-CREATE ROLE regress_du_role0;
|
|
-CREATE ROLE regress_du_role1;
|
|
-CREATE ROLE regress_du_role2;
|
|
-CREATE ROLE regress_du_admin;
|
|
+CREATE ROLE regress_du_role0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_role1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_admin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT regress_du_role0 TO regress_du_admin WITH ADMIN TRUE;
|
|
GRANT regress_du_role1 TO regress_du_admin WITH ADMIN TRUE;
|
|
GRANT regress_du_role2 TO regress_du_admin WITH ADMIN TRUE;
|
|
diff --git a/src/test/regress/expected/publication.out b/src/test/regress/expected/publication.out
|
|
index 30b6371134..cc01076c22 100644
|
|
--- a/src/test/regress/expected/publication.out
|
|
+++ b/src/test/regress/expected/publication.out
|
|
@@ -1,9 +1,9 @@
|
|
--
|
|
-- PUBLICATION
|
|
--
|
|
-CREATE ROLE regress_publication_user LOGIN SUPERUSER;
|
|
-CREATE ROLE regress_publication_user2;
|
|
-CREATE ROLE regress_publication_user_dummy LOGIN NOSUPERUSER;
|
|
+CREATE ROLE regress_publication_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_publication_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_publication_user_dummy LOGIN NOSUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_publication_user';
|
|
-- suppress warning that depends on wal_level
|
|
SET client_min_messages = 'ERROR';
|
|
@@ -1221,7 +1221,7 @@ ALTER PUBLICATION testpub2 ADD TABLE testpub_tbl1; -- ok
|
|
DROP PUBLICATION testpub2;
|
|
DROP PUBLICATION testpub3;
|
|
SET ROLE regress_publication_user;
|
|
-CREATE ROLE regress_publication_user3;
|
|
+CREATE ROLE regress_publication_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT regress_publication_user2 TO regress_publication_user3;
|
|
SET client_min_messages = 'ERROR';
|
|
CREATE PUBLICATION testpub4 FOR TABLES IN SCHEMA pub_test;
|
|
diff --git a/src/test/regress/expected/regproc.out b/src/test/regress/expected/regproc.out
|
|
index 97b917502c..e9428535cb 100644
|
|
--- a/src/test/regress/expected/regproc.out
|
|
+++ b/src/test/regress/expected/regproc.out
|
|
@@ -2,7 +2,7 @@
|
|
-- regproc
|
|
--
|
|
/* If objects exist, return oids */
|
|
-CREATE ROLE regress_regrole_test;
|
|
+CREATE ROLE regress_regrole_test PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- without schemaname
|
|
SELECT regoper('||/');
|
|
regoper
|
|
diff --git a/src/test/regress/expected/roleattributes.out b/src/test/regress/expected/roleattributes.out
|
|
index 5e6969b173..2c4d52237f 100644
|
|
--- a/src/test/regress/expected/roleattributes.out
|
|
+++ b/src/test/regress/expected/roleattributes.out
|
|
@@ -1,233 +1,233 @@
|
|
-- default for superuser is false
|
|
-CREATE ROLE regress_test_def_superuser;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_superuser';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_superuser | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_superuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_superuser';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_superuser | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_superuser WITH SUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_superuser | t | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_superuser WITH SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_superuser | t | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_superuser WITH NOSUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_superuser | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_superuser | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_superuser WITH SUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_superuser | t | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_superuser | t | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for inherit is true
|
|
-CREATE ROLE regress_test_def_inherit;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_inherit';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_inherit | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_inherit PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_inherit';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_inherit | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_inherit WITH NOINHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_inherit | f | f | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_inherit WITH NOINHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_inherit | f | f | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_inherit WITH INHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_inherit | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_inherit | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_inherit WITH NOINHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_inherit | f | f | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_inherit | f | f | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for create role is false
|
|
-CREATE ROLE regress_test_def_createrole;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createrole';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_createrole | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_createrole PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createrole';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_createrole | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_createrole WITH CREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createrole | f | t | t | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_createrole WITH CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createrole | f | t | t | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_createrole WITH NOCREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createrole | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createrole | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_createrole WITH CREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createrole | f | t | t | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createrole | f | t | t | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for create database is false
|
|
-CREATE ROLE regress_test_def_createdb;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createdb';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_createdb | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_createdb PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createdb';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+---------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_createdb | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_createdb WITH CREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createdb | f | t | f | t | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_createdb WITH CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createdb | f | t | f | t | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_createdb WITH NOCREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createdb | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createdb | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_createdb WITH CREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_createdb | f | t | f | t | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+-----------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_createdb | f | t | f | t | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for can login is false for role
|
|
-CREATE ROLE regress_test_def_role_canlogin;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_role_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_role_canlogin | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_role_canlogin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_role_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_role_canlogin | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_role_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_role_canlogin | f | t | f | f | t | f | f | -1 | |
|
|
+CREATE ROLE regress_test_role_canlogin WITH LOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_role_canlogin | f | t | f | f | t | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_role_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_role_canlogin | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_role_canlogin | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_role_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_role_canlogin | f | t | f | f | t | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_role_canlogin | f | t | f | f | t | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for can login is true for user
|
|
-CREATE USER regress_test_def_user_canlogin;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_user_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_user_canlogin | f | t | f | f | t | f | f | -1 | |
|
|
+CREATE USER regress_test_def_user_canlogin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_user_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_user_canlogin | f | t | f | f | t | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE USER regress_test_user_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_user_canlogin | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE USER regress_test_user_canlogin WITH NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_user_canlogin | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER USER regress_test_user_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_user_canlogin | f | t | f | f | t | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_user_canlogin | f | t | f | f | t | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER USER regress_test_user_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_user_canlogin | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_user_canlogin | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for replication is false
|
|
-CREATE ROLE regress_test_def_replication;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_replication';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_replication | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_replication PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_replication';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_replication | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_replication WITH REPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_replication | f | t | f | f | f | t | f | -1 | |
|
|
+CREATE ROLE regress_test_replication WITH REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_replication | f | t | f | f | f | t | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_replication WITH NOREPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_replication | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_replication | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_replication WITH REPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
---------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_replication | f | t | f | f | f | t | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+--------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_replication | f | t | f | f | f | t | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- default for bypassrls is false
|
|
-CREATE ROLE regress_test_def_bypassrls;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_bypassrls';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_def_bypassrls | f | t | f | f | f | f | f | -1 | |
|
|
+CREATE ROLE regress_test_def_bypassrls PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_bypassrls';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+----------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_def_bypassrls | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-CREATE ROLE regress_test_bypassrls WITH BYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_bypassrls | f | t | f | f | f | f | t | -1 | |
|
|
+CREATE ROLE regress_test_bypassrls WITH BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_bypassrls | f | t | f | f | f | f | t | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_bypassrls WITH NOBYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_bypassrls | f | t | f | f | f | f | f | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_bypassrls | f | t | f | f | f | f | f | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
ALTER ROLE regress_test_bypassrls WITH BYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
- rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | rolpassword | rolvaliduntil
|
|
-------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+-------------+---------------
|
|
- regress_test_bypassrls | f | t | f | f | f | f | t | -1 | |
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+ rolname | rolsuper | rolinherit | rolcreaterole | rolcreatedb | rolcanlogin | rolreplication | rolbypassrls | rolconnlimit | regexp_replace | rolvaliduntil
|
|
+------------------------+----------+------------+---------------+-------------+-------------+----------------+--------------+--------------+---------------------------------------------------+---------------
|
|
+ regress_test_bypassrls | f | t | f | f | f | f | t | -1 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey> |
|
|
(1 row)
|
|
|
|
-- clean up roles
|
|
diff --git a/src/test/regress/expected/rowsecurity.out b/src/test/regress/expected/rowsecurity.out
|
|
index 51bba175ec..45355a9c66 100644
|
|
--- a/src/test/regress/expected/rowsecurity.out
|
|
+++ b/src/test/regress/expected/rowsecurity.out
|
|
@@ -14,13 +14,13 @@ DROP ROLE IF EXISTS regress_rls_group2;
|
|
DROP SCHEMA IF EXISTS regress_rls_schema CASCADE;
|
|
RESET client_min_messages;
|
|
-- initial setup
|
|
-CREATE USER regress_rls_alice NOLOGIN;
|
|
-CREATE USER regress_rls_bob NOLOGIN;
|
|
-CREATE USER regress_rls_carol NOLOGIN;
|
|
-CREATE USER regress_rls_dave NOLOGIN;
|
|
-CREATE USER regress_rls_exempt_user BYPASSRLS NOLOGIN;
|
|
-CREATE ROLE regress_rls_group1 NOLOGIN;
|
|
-CREATE ROLE regress_rls_group2 NOLOGIN;
|
|
+CREATE USER regress_rls_alice NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_bob NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_carol NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_dave NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_exempt_user BYPASSRLS NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_group1 NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_group2 NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT regress_rls_group1 TO regress_rls_bob;
|
|
GRANT regress_rls_group2 TO regress_rls_carol;
|
|
CREATE SCHEMA regress_rls_schema;
|
|
@@ -4423,8 +4423,8 @@ SELECT count(*) = 0 FROM pg_depend
|
|
|
|
-- DROP OWNED BY testing
|
|
RESET SESSION AUTHORIZATION;
|
|
-CREATE ROLE regress_rls_dob_role1;
|
|
-CREATE ROLE regress_rls_dob_role2;
|
|
+CREATE ROLE regress_rls_dob_role1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_dob_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE dob_t1 (c1 int);
|
|
CREATE TABLE dob_t2 (c1 int) PARTITION BY RANGE (c1);
|
|
CREATE POLICY p1 ON dob_t1 TO regress_rls_dob_role1 USING (true);
|
|
diff --git a/src/test/regress/expected/rules.out b/src/test/regress/expected/rules.out
|
|
index 13178e2b3d..9a3ebfea3c 100644
|
|
--- a/src/test/regress/expected/rules.out
|
|
+++ b/src/test/regress/expected/rules.out
|
|
@@ -3799,7 +3799,7 @@ DROP TABLE ruletest2;
|
|
-- Test non-SELECT rule on security invoker view.
|
|
-- Should use view owner's permissions.
|
|
--
|
|
-CREATE USER regress_rule_user1;
|
|
+CREATE USER regress_rule_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE ruletest_t1 (x int);
|
|
CREATE TABLE ruletest_t2 (x int);
|
|
CREATE VIEW ruletest_v1 WITH (security_invoker=true) AS
|
|
diff --git a/src/test/regress/expected/security_label.out b/src/test/regress/expected/security_label.out
|
|
index a8e01a6220..83543b250a 100644
|
|
--- a/src/test/regress/expected/security_label.out
|
|
+++ b/src/test/regress/expected/security_label.out
|
|
@@ -6,8 +6,8 @@ SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_seclabel_user1;
|
|
DROP ROLE IF EXISTS regress_seclabel_user2;
|
|
RESET client_min_messages;
|
|
-CREATE USER regress_seclabel_user1 WITH CREATEROLE;
|
|
-CREATE USER regress_seclabel_user2;
|
|
+CREATE USER regress_seclabel_user1 WITH CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_seclabel_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE seclabel_tbl1 (a int, b text);
|
|
CREATE TABLE seclabel_tbl2 (x int, y text);
|
|
CREATE VIEW seclabel_view1 AS SELECT * FROM seclabel_tbl2;
|
|
diff --git a/src/test/regress/expected/select_into.out b/src/test/regress/expected/select_into.out
|
|
index b79fe9a1c0..e29fab88ab 100644
|
|
--- a/src/test/regress/expected/select_into.out
|
|
+++ b/src/test/regress/expected/select_into.out
|
|
@@ -15,7 +15,7 @@ DROP TABLE sitmp1;
|
|
-- SELECT INTO and INSERT permission, if owner is not allowed to insert.
|
|
--
|
|
CREATE SCHEMA selinto_schema;
|
|
-CREATE USER regress_selinto_user;
|
|
+CREATE USER regress_selinto_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE regress_selinto_user
|
|
REVOKE INSERT ON TABLES FROM regress_selinto_user;
|
|
GRANT ALL ON SCHEMA selinto_schema TO public;
|
|
diff --git a/src/test/regress/expected/select_parallel.out b/src/test/regress/expected/select_parallel.out
|
|
index 496ddb1289..a4fea8e367 100644
|
|
--- a/src/test/regress/expected/select_parallel.out
|
|
+++ b/src/test/regress/expected/select_parallel.out
|
|
@@ -1295,7 +1295,7 @@ SELECT 1 FROM tenk1_vw_sec
|
|
|
|
rollback;
|
|
-- test that function option SET ROLE works in parallel workers.
|
|
-create role regress_parallel_worker;
|
|
+create role regress_parallel_worker PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
create function set_and_report_role() returns text as
|
|
$$ select current_setting('role') $$ language sql parallel safe
|
|
set role = regress_parallel_worker;
|
|
diff --git a/src/test/regress/expected/select_views.out b/src/test/regress/expected/select_views.out
|
|
index 1aeed8452b..7d9427d070 100644
|
|
--- a/src/test/regress/expected/select_views.out
|
|
+++ b/src/test/regress/expected/select_views.out
|
|
@@ -1250,7 +1250,7 @@ SELECT * FROM toyemp WHERE name = 'sharon';
|
|
--
|
|
-- Test for Leaky view scenario
|
|
--
|
|
-CREATE ROLE regress_alice;
|
|
+CREATE ROLE regress_alice PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE FUNCTION f_leak (text)
|
|
RETURNS bool LANGUAGE 'plpgsql' COST 0.0000001
|
|
AS 'BEGIN RAISE NOTICE ''f_leak => %'', $1; RETURN true; END';
|
|
diff --git a/src/test/regress/expected/sequence.out b/src/test/regress/expected/sequence.out
|
|
index fa8059dbcd..190d41afc7 100644
|
|
--- a/src/test/regress/expected/sequence.out
|
|
+++ b/src/test/regress/expected/sequence.out
|
|
@@ -22,7 +22,7 @@ CREATE SEQUENCE sequence_testx OWNED BY pg_class_oid_index.oid; -- not a table
|
|
ERROR: sequence cannot be owned by relation "pg_class_oid_index"
|
|
DETAIL: This operation is not supported for indexes.
|
|
CREATE SEQUENCE sequence_testx OWNED BY pg_class.relname; -- not same schema
|
|
-ERROR: sequence must be in same schema as table it is linked to
|
|
+ERROR: sequence must have same owner as table it is linked to
|
|
CREATE TABLE sequence_test_table (a int);
|
|
CREATE SEQUENCE sequence_testx OWNED BY sequence_test_table.b; -- wrong column
|
|
ERROR: column "b" of relation "sequence_test_table" does not exist
|
|
@@ -640,7 +640,7 @@ SELECT setval('sequence_test2', 1); -- error
|
|
ERROR: cannot execute setval() in a read-only transaction
|
|
ROLLBACK;
|
|
-- privileges tests
|
|
-CREATE USER regress_seq_user;
|
|
+CREATE USER regress_seq_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- nextval
|
|
BEGIN;
|
|
SET LOCAL SESSION AUTHORIZATION regress_seq_user;
|
|
diff --git a/src/test/regress/expected/stats.out b/src/test/regress/expected/stats.out
|
|
index 6e08898b18..7eb5385b7a 100644
|
|
--- a/src/test/regress/expected/stats.out
|
|
+++ b/src/test/regress/expected/stats.out
|
|
@@ -1301,37 +1301,6 @@ SELECT current_setting('fsync') = 'off'
|
|
t
|
|
(1 row)
|
|
|
|
--- Change the tablespace so that the table is rewritten directly, then SELECT
|
|
--- from it to cause it to be read back into shared buffers.
|
|
-SELECT sum(reads) AS io_sum_shared_before_reads
|
|
- FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
--- Do this in a transaction to prevent spurious failures due to concurrent accesses to our newly
|
|
--- rewritten table, e.g. by autovacuum.
|
|
-BEGIN;
|
|
-ALTER TABLE test_io_shared SET TABLESPACE regress_tblspace;
|
|
--- SELECT from the table so that the data is read into shared buffers and
|
|
--- context 'normal', object 'relation' reads are counted.
|
|
-SELECT COUNT(*) FROM test_io_shared;
|
|
- count
|
|
--------
|
|
- 100
|
|
-(1 row)
|
|
-
|
|
-COMMIT;
|
|
-SELECT pg_stat_force_next_flush();
|
|
- pg_stat_force_next_flush
|
|
---------------------------
|
|
-
|
|
-(1 row)
|
|
-
|
|
-SELECT sum(reads) AS io_sum_shared_after_reads
|
|
- FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
-SELECT :io_sum_shared_after_reads > :io_sum_shared_before_reads;
|
|
- ?column?
|
|
-----------
|
|
- t
|
|
-(1 row)
|
|
-
|
|
SELECT sum(hits) AS io_sum_shared_before_hits
|
|
FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
-- Select from the table again to count hits.
|
|
@@ -1433,6 +1402,7 @@ SELECT :io_sum_local_after_evictions > :io_sum_local_before_evictions,
|
|
-- local buffers, exercising a different codepath than standard local buffer
|
|
-- writes.
|
|
ALTER TABLE test_io_local SET TABLESPACE regress_tblspace;
|
|
+ERROR: tablespace "regress_tblspace" does not exist
|
|
SELECT pg_stat_force_next_flush();
|
|
pg_stat_force_next_flush
|
|
--------------------------
|
|
@@ -1444,7 +1414,7 @@ SELECT sum(writes) AS io_sum_local_new_tblspc_writes
|
|
SELECT :io_sum_local_new_tblspc_writes > :io_sum_local_after_writes;
|
|
?column?
|
|
----------
|
|
- t
|
|
+ f
|
|
(1 row)
|
|
|
|
RESET temp_buffers;
|
|
diff --git a/src/test/regress/expected/stats_ext.out b/src/test/regress/expected/stats_ext.out
|
|
index 8c4da95508..346961f92a 100644
|
|
--- a/src/test/regress/expected/stats_ext.out
|
|
+++ b/src/test/regress/expected/stats_ext.out
|
|
@@ -70,7 +70,7 @@ DROP TABLE ext_stats_test;
|
|
CREATE TABLE ab1 (a INTEGER, b INTEGER, c INTEGER);
|
|
CREATE STATISTICS IF NOT EXISTS ab1_a_b_stats ON a, b FROM ab1;
|
|
COMMENT ON STATISTICS ab1_a_b_stats IS 'new comment';
|
|
-CREATE ROLE regress_stats_ext;
|
|
+CREATE ROLE regress_stats_ext PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_stats_ext;
|
|
COMMENT ON STATISTICS ab1_a_b_stats IS 'changed comment';
|
|
ERROR: must be owner of statistics object ab1_a_b_stats
|
|
@@ -3214,7 +3214,7 @@ set search_path to public, stts_s1;
|
|
stts_s1 | stts_foo | col1, col2 FROM stts_t3 | defined | defined | defined
|
|
(10 rows)
|
|
|
|
-create role regress_stats_ext nosuperuser;
|
|
+create role regress_stats_ext nosuperuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
set role regress_stats_ext;
|
|
\dX
|
|
List of extended statistics
|
|
@@ -3237,7 +3237,7 @@ drop schema stts_s1, stts_s2 cascade;
|
|
drop user regress_stats_ext;
|
|
reset search_path;
|
|
-- User with no access
|
|
-CREATE USER regress_stats_user1;
|
|
+CREATE USER regress_stats_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT USAGE ON SCHEMA tststats TO regress_stats_user1;
|
|
SET SESSION AUTHORIZATION regress_stats_user1;
|
|
SELECT * FROM tststats.priv_test_tbl; -- Permission denied
|
|
diff --git a/src/test/regress/expected/subscription.out b/src/test/regress/expected/subscription.out
|
|
index 0f2a25cdc1..de168e39d9 100644
|
|
--- a/src/test/regress/expected/subscription.out
|
|
+++ b/src/test/regress/expected/subscription.out
|
|
@@ -1,10 +1,10 @@
|
|
--
|
|
-- SUBSCRIPTION
|
|
--
|
|
-CREATE ROLE regress_subscription_user LOGIN SUPERUSER;
|
|
-CREATE ROLE regress_subscription_user2;
|
|
-CREATE ROLE regress_subscription_user3 IN ROLE pg_create_subscription;
|
|
-CREATE ROLE regress_subscription_user_dummy LOGIN NOSUPERUSER;
|
|
+CREATE ROLE regress_subscription_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_subscription_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_subscription_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_create_subscription;
|
|
+CREATE ROLE regress_subscription_user_dummy LOGIN NOSUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_subscription_user';
|
|
-- fail - no publications
|
|
CREATE SUBSCRIPTION regress_testsub CONNECTION 'foo';
|
|
diff --git a/src/test/regress/expected/test_setup.out b/src/test/regress/expected/test_setup.out
|
|
index 3d0eeec996..2c3932139d 100644
|
|
--- a/src/test/regress/expected/test_setup.out
|
|
+++ b/src/test/regress/expected/test_setup.out
|
|
@@ -21,6 +21,7 @@ GRANT ALL ON SCHEMA public TO public;
|
|
-- Create a tablespace we can use in tests.
|
|
SET allow_in_place_tablespaces = true;
|
|
CREATE TABLESPACE regress_tblspace LOCATION '';
|
|
+ERROR: CREATE TABLESPACE is not supported on Neon
|
|
--
|
|
-- These tables have traditionally been referenced by many tests,
|
|
-- so create and populate them. Insert only non-error values here.
|
|
@@ -111,7 +112,8 @@ CREATE TABLE onek (
|
|
string4 name
|
|
);
|
|
\set filename :abs_srcdir '/data/onek.data'
|
|
-COPY onek FROM :'filename';
|
|
+\set command '\\copy onek FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE onek;
|
|
CREATE TABLE onek2 AS SELECT * FROM onek;
|
|
VACUUM ANALYZE onek2;
|
|
@@ -134,7 +136,8 @@ CREATE TABLE tenk1 (
|
|
string4 name
|
|
);
|
|
\set filename :abs_srcdir '/data/tenk.data'
|
|
-COPY tenk1 FROM :'filename';
|
|
+\set command '\\copy tenk1 FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE tenk1;
|
|
CREATE TABLE tenk2 AS SELECT * FROM tenk1;
|
|
VACUUM ANALYZE tenk2;
|
|
@@ -144,20 +147,23 @@ CREATE TABLE person (
|
|
location point
|
|
);
|
|
\set filename :abs_srcdir '/data/person.data'
|
|
-COPY person FROM :'filename';
|
|
+\set command '\\copy person FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE person;
|
|
CREATE TABLE emp (
|
|
salary int4,
|
|
manager name
|
|
) INHERITS (person);
|
|
\set filename :abs_srcdir '/data/emp.data'
|
|
-COPY emp FROM :'filename';
|
|
+\set command '\\copy emp FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE emp;
|
|
CREATE TABLE student (
|
|
gpa float8
|
|
) INHERITS (person);
|
|
\set filename :abs_srcdir '/data/student.data'
|
|
-COPY student FROM :'filename';
|
|
+\set command '\\copy student FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE student;
|
|
CREATE TABLE stud_emp (
|
|
percent int4
|
|
@@ -166,14 +172,16 @@ NOTICE: merging multiple inherited definitions of column "name"
|
|
NOTICE: merging multiple inherited definitions of column "age"
|
|
NOTICE: merging multiple inherited definitions of column "location"
|
|
\set filename :abs_srcdir '/data/stud_emp.data'
|
|
-COPY stud_emp FROM :'filename';
|
|
+\set command '\\copy stud_emp FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE stud_emp;
|
|
CREATE TABLE road (
|
|
name text,
|
|
thepath path
|
|
);
|
|
\set filename :abs_srcdir '/data/streets.data'
|
|
-COPY road FROM :'filename';
|
|
+\set command '\\copy road FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE road;
|
|
CREATE TABLE ihighway () INHERITS (road);
|
|
INSERT INTO ihighway
|
|
diff --git a/src/test/regress/expected/tsearch.out b/src/test/regress/expected/tsearch.out
|
|
index 9fad6c8b04..a1b8e82389 100644
|
|
--- a/src/test/regress/expected/tsearch.out
|
|
+++ b/src/test/regress/expected/tsearch.out
|
|
@@ -63,7 +63,8 @@ CREATE TABLE test_tsvector(
|
|
a tsvector
|
|
);
|
|
\set filename :abs_srcdir '/data/tsearch.data'
|
|
-COPY test_tsvector FROM :'filename';
|
|
+\set command '\\copy test_tsvector FROM ' :'filename';
|
|
+:command
|
|
ANALYZE test_tsvector;
|
|
-- test basic text search behavior without indexes, then with
|
|
SELECT count(*) FROM test_tsvector WHERE a @@ 'wr|qh';
|
|
diff --git a/src/test/regress/expected/updatable_views.out b/src/test/regress/expected/updatable_views.out
|
|
index 442b55120c..7224709d6f 100644
|
|
--- a/src/test/regress/expected/updatable_views.out
|
|
+++ b/src/test/regress/expected/updatable_views.out
|
|
@@ -1338,9 +1338,9 @@ NOTICE: drop cascades to 2 other objects
|
|
DETAIL: drop cascades to view rw_view1
|
|
drop cascades to function rw_view1_aa(rw_view1)
|
|
-- permissions checks
|
|
-CREATE USER regress_view_user1;
|
|
-CREATE USER regress_view_user2;
|
|
-CREATE USER regress_view_user3;
|
|
+CREATE USER regress_view_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_view_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_view_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_view_user1;
|
|
CREATE TABLE base_tbl(a int, b text, c float);
|
|
INSERT INTO base_tbl VALUES (1, 'Row 1', 1.0);
|
|
@@ -3734,8 +3734,8 @@ DETAIL: View columns that are not columns of their base relation are not updata
|
|
drop view uv_iocu_view;
|
|
drop table uv_iocu_tab;
|
|
-- ON CONFLICT DO UPDATE permissions checks
|
|
-create user regress_view_user1;
|
|
-create user regress_view_user2;
|
|
+create user regress_view_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+create user regress_view_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
set session authorization regress_view_user1;
|
|
create table base_tbl(a int unique, b text, c float);
|
|
insert into base_tbl values (1,'xxx',1.0);
|
|
diff --git a/src/test/regress/expected/update.out b/src/test/regress/expected/update.out
|
|
index 1b27d132d7..25b109d609 100644
|
|
--- a/src/test/regress/expected/update.out
|
|
+++ b/src/test/regress/expected/update.out
|
|
@@ -608,7 +608,7 @@ DROP FUNCTION func_parted_mod_b();
|
|
-- RLS policies with update-row-movement
|
|
-----------------------------------------
|
|
ALTER TABLE range_parted ENABLE ROW LEVEL SECURITY;
|
|
-CREATE USER regress_range_parted_user;
|
|
+CREATE USER regress_range_parted_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT ALL ON range_parted, mintab TO regress_range_parted_user;
|
|
CREATE POLICY seeall ON range_parted AS PERMISSIVE FOR SELECT USING (true);
|
|
CREATE POLICY policy_range_parted ON range_parted for UPDATE USING (true) WITH CHECK (c % 2 = 0);
|
|
diff --git a/src/test/regress/expected/vacuum.out b/src/test/regress/expected/vacuum.out
|
|
index 2eba712887..d46877aca9 100644
|
|
--- a/src/test/regress/expected/vacuum.out
|
|
+++ b/src/test/regress/expected/vacuum.out
|
|
@@ -433,7 +433,7 @@ CREATE TABLE vacowned (a int);
|
|
CREATE TABLE vacowned_parted (a int) PARTITION BY LIST (a);
|
|
CREATE TABLE vacowned_part1 PARTITION OF vacowned_parted FOR VALUES IN (1);
|
|
CREATE TABLE vacowned_part2 PARTITION OF vacowned_parted FOR VALUES IN (2);
|
|
-CREATE ROLE regress_vacuum;
|
|
+CREATE ROLE regress_vacuum PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET ROLE regress_vacuum;
|
|
-- Simple table
|
|
VACUUM vacowned;
|
|
diff --git a/src/test/regress/parallel_schedule b/src/test/regress/parallel_schedule
|
|
index f53a526f7c..c07b093476 100644
|
|
--- a/src/test/regress/parallel_schedule
|
|
+++ b/src/test/regress/parallel_schedule
|
|
@@ -135,4 +135,4 @@ test: fast_default
|
|
|
|
# run tablespace test at the end because it drops the tablespace created during
|
|
# setup that other tests may use.
|
|
-test: tablespace
|
|
+#test: tablespace
|
|
diff --git a/src/test/regress/sql/aggregates.sql b/src/test/regress/sql/aggregates.sql
|
|
index 1a18ca3d8f..b2009628d0 100644
|
|
--- a/src/test/regress/sql/aggregates.sql
|
|
+++ b/src/test/regress/sql/aggregates.sql
|
|
@@ -15,7 +15,8 @@ CREATE TABLE aggtest (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/agg.data'
|
|
-COPY aggtest FROM :'filename';
|
|
+\set command '\\copy aggtest FROM ' :'filename';
|
|
+:command
|
|
|
|
ANALYZE aggtest;
|
|
|
|
diff --git a/src/test/regress/sql/alter_generic.sql b/src/test/regress/sql/alter_generic.sql
|
|
index de58d268d3..9d38df7f42 100644
|
|
--- a/src/test/regress/sql/alter_generic.sql
|
|
+++ b/src/test/regress/sql/alter_generic.sql
|
|
@@ -22,9 +22,9 @@ DROP ROLE IF EXISTS regress_alter_generic_user3;
|
|
|
|
RESET client_min_messages;
|
|
|
|
-CREATE USER regress_alter_generic_user3;
|
|
-CREATE USER regress_alter_generic_user2;
|
|
-CREATE USER regress_alter_generic_user1 IN ROLE regress_alter_generic_user3;
|
|
+CREATE USER regress_alter_generic_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_alter_generic_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_alter_generic_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE regress_alter_generic_user3;
|
|
|
|
CREATE SCHEMA alt_nsp1;
|
|
CREATE SCHEMA alt_nsp2;
|
|
@@ -316,7 +316,7 @@ DROP OPERATOR FAMILY alt_opf4 USING btree;
|
|
|
|
-- Should fail. Need to be SUPERUSER to do ALTER OPERATOR FAMILY .. ADD / DROP
|
|
BEGIN TRANSACTION;
|
|
-CREATE ROLE regress_alter_generic_user5 NOSUPERUSER;
|
|
+CREATE ROLE regress_alter_generic_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER NOSUPERUSER;
|
|
CREATE OPERATOR FAMILY alt_opf5 USING btree;
|
|
SET ROLE regress_alter_generic_user5;
|
|
ALTER OPERATOR FAMILY alt_opf5 USING btree ADD OPERATOR 1 < (int4, int2), FUNCTION 1 btint42cmp(int4, int2);
|
|
@@ -326,7 +326,7 @@ ROLLBACK;
|
|
|
|
-- Should fail. Need rights to namespace for ALTER OPERATOR FAMILY .. ADD / DROP
|
|
BEGIN TRANSACTION;
|
|
-CREATE ROLE regress_alter_generic_user6;
|
|
+CREATE ROLE regress_alter_generic_user6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA alt_nsp6;
|
|
REVOKE ALL ON SCHEMA alt_nsp6 FROM regress_alter_generic_user6;
|
|
CREATE OPERATOR FAMILY alt_nsp6.alt_opf6 USING btree;
|
|
diff --git a/src/test/regress/sql/alter_operator.sql b/src/test/regress/sql/alter_operator.sql
|
|
index 8faecf7830..bb8b8e14ea 100644
|
|
--- a/src/test/regress/sql/alter_operator.sql
|
|
+++ b/src/test/regress/sql/alter_operator.sql
|
|
@@ -83,7 +83,7 @@ ALTER OPERATOR & (bit, bit) SET ("Restrict" = _int_contsel, "Join" = _int_contjo
|
|
--
|
|
-- Test permission check. Must be owner to ALTER OPERATOR.
|
|
--
|
|
-CREATE USER regress_alter_op_user;
|
|
+CREATE USER regress_alter_op_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_alter_op_user;
|
|
|
|
ALTER OPERATOR === (boolean, boolean) SET (RESTRICT = NONE);
|
|
diff --git a/src/test/regress/sql/alter_table.sql b/src/test/regress/sql/alter_table.sql
|
|
index da12724473..86f5ae5444 100644
|
|
--- a/src/test/regress/sql/alter_table.sql
|
|
+++ b/src/test/regress/sql/alter_table.sql
|
|
@@ -7,7 +7,7 @@ SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_alter_table_user1;
|
|
RESET client_min_messages;
|
|
|
|
-CREATE USER regress_alter_table_user1;
|
|
+CREATE USER regress_alter_table_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
--
|
|
-- add attribute
|
|
@@ -2404,8 +2404,8 @@ DROP TABLE fail_part;
|
|
ALTER TABLE list_parted ATTACH PARTITION nonexistent FOR VALUES IN (1);
|
|
|
|
-- check ownership of the source table
|
|
-CREATE ROLE regress_test_me;
|
|
-CREATE ROLE regress_test_not_me;
|
|
+CREATE ROLE regress_test_me PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_not_me PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE not_owned_by_me (LIKE list_parted);
|
|
ALTER TABLE not_owned_by_me OWNER TO regress_test_not_me;
|
|
SET SESSION AUTHORIZATION regress_test_me;
|
|
diff --git a/src/test/regress/sql/arrays.sql b/src/test/regress/sql/arrays.sql
|
|
index 47058dfde5..f8962592e4 100644
|
|
--- a/src/test/regress/sql/arrays.sql
|
|
+++ b/src/test/regress/sql/arrays.sql
|
|
@@ -22,7 +22,8 @@ CREATE TABLE array_op_test (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/array.data'
|
|
-COPY array_op_test FROM :'filename';
|
|
+\set command '\\copy array_op_test FROM ' :'filename';
|
|
+:command
|
|
ANALYZE array_op_test;
|
|
|
|
--
|
|
diff --git a/src/test/regress/sql/btree_index.sql b/src/test/regress/sql/btree_index.sql
|
|
index 0d2a33f370..df86e6b050 100644
|
|
--- a/src/test/regress/sql/btree_index.sql
|
|
+++ b/src/test/regress/sql/btree_index.sql
|
|
@@ -26,16 +26,20 @@ CREATE TABLE bt_f8_heap (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY bt_i4_heap FROM :'filename';
|
|
+\set command '\\copy bt_i4_heap FROM ' :'filename';
|
|
+:command
|
|
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY bt_name_heap FROM :'filename';
|
|
+\set command '\\copy bt_name_heap FROM ' :'filename';
|
|
+:command
|
|
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY bt_txt_heap FROM :'filename';
|
|
+\set command '\\copy bt_txt_heap FROM ' :'filename';
|
|
+:command
|
|
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY bt_f8_heap FROM :'filename';
|
|
+\set command '\\copy bt_f8_heap FROM ' :'filename';
|
|
+:command
|
|
|
|
ANALYZE bt_i4_heap;
|
|
ANALYZE bt_name_heap;
|
|
diff --git a/src/test/regress/sql/cluster.sql b/src/test/regress/sql/cluster.sql
|
|
index b7115f8610..a753f2c794 100644
|
|
--- a/src/test/regress/sql/cluster.sql
|
|
+++ b/src/test/regress/sql/cluster.sql
|
|
@@ -108,7 +108,7 @@ WHERE pg_class.oid=indexrelid
|
|
CLUSTER pg_toast.pg_toast_826 USING pg_toast_826_index;
|
|
|
|
-- Verify that clustering all tables does in fact cluster the right ones
|
|
-CREATE USER regress_clstr_user;
|
|
+CREATE USER regress_clstr_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE clstr_1 (a INT PRIMARY KEY);
|
|
CREATE TABLE clstr_2 (a INT PRIMARY KEY);
|
|
CREATE TABLE clstr_3 (a INT PRIMARY KEY);
|
|
@@ -235,7 +235,7 @@ DROP TABLE clstrpart;
|
|
CREATE TABLE ptnowner(i int unique) PARTITION BY LIST (i);
|
|
CREATE INDEX ptnowner_i_idx ON ptnowner(i);
|
|
CREATE TABLE ptnowner1 PARTITION OF ptnowner FOR VALUES IN (1);
|
|
-CREATE ROLE regress_ptnowner;
|
|
+CREATE ROLE regress_ptnowner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE ptnowner2 PARTITION OF ptnowner FOR VALUES IN (2);
|
|
ALTER TABLE ptnowner1 OWNER TO regress_ptnowner;
|
|
SET SESSION AUTHORIZATION regress_ptnowner;
|
|
diff --git a/src/test/regress/sql/collate.icu.utf8.sql b/src/test/regress/sql/collate.icu.utf8.sql
|
|
index 4eb1adf028..28636ec711 100644
|
|
--- a/src/test/regress/sql/collate.icu.utf8.sql
|
|
+++ b/src/test/regress/sql/collate.icu.utf8.sql
|
|
@@ -353,7 +353,7 @@ reset enable_seqscan;
|
|
|
|
-- schema manipulation commands
|
|
|
|
-CREATE ROLE regress_test_role;
|
|
+CREATE ROLE regress_test_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA test_schema;
|
|
|
|
-- We need to do this this way to cope with varying names for encodings:
|
|
diff --git a/src/test/regress/sql/constraints.sql b/src/test/regress/sql/constraints.sql
|
|
index e3e3bea709..fa86ddc326 100644
|
|
--- a/src/test/regress/sql/constraints.sql
|
|
+++ b/src/test/regress/sql/constraints.sql
|
|
@@ -243,12 +243,14 @@ CREATE TABLE COPY_TBL (x INT, y TEXT, z INT,
|
|
CHECK (x > 3 AND y <> 'check failed' AND x < 7 ));
|
|
|
|
\set filename :abs_srcdir '/data/constro.data'
|
|
-COPY COPY_TBL FROM :'filename';
|
|
+\set command '\\copy COPY_TBL FROM ' :'filename';
|
|
+:command
|
|
|
|
SELECT * FROM COPY_TBL;
|
|
|
|
\set filename :abs_srcdir '/data/constrf.data'
|
|
-COPY COPY_TBL FROM :'filename';
|
|
+\set command '\\copy COPY_TBL FROM ' :'filename';
|
|
+:command
|
|
|
|
SELECT * FROM COPY_TBL;
|
|
|
|
@@ -599,7 +601,7 @@ DROP TABLE deferred_excl;
|
|
|
|
-- Comments
|
|
-- Setup a low-level role to enforce non-superuser checks.
|
|
-CREATE ROLE regress_constraint_comments;
|
|
+CREATE ROLE regress_constraint_comments PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_constraint_comments;
|
|
|
|
CREATE TABLE constraint_comments_tbl (a int CONSTRAINT the_constraint CHECK (a > 0));
|
|
@@ -621,7 +623,7 @@ COMMENT ON CONSTRAINT the_constraint ON DOMAIN constraint_comments_dom IS NULL;
|
|
|
|
-- unauthorized user
|
|
RESET SESSION AUTHORIZATION;
|
|
-CREATE ROLE regress_constraint_comments_noaccess;
|
|
+CREATE ROLE regress_constraint_comments_noaccess PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_constraint_comments_noaccess;
|
|
COMMENT ON CONSTRAINT the_constraint ON constraint_comments_tbl IS 'no, the comment';
|
|
COMMENT ON CONSTRAINT the_constraint ON DOMAIN constraint_comments_dom IS 'no, another comment';
|
|
diff --git a/src/test/regress/sql/conversion.sql b/src/test/regress/sql/conversion.sql
|
|
index 9a65fca91f..58431a3056 100644
|
|
--- a/src/test/regress/sql/conversion.sql
|
|
+++ b/src/test/regress/sql/conversion.sql
|
|
@@ -12,7 +12,7 @@ CREATE FUNCTION test_enc_conversion(bytea, name, name, bool, validlen OUT int, r
|
|
AS :'regresslib', 'test_enc_conversion'
|
|
LANGUAGE C STRICT;
|
|
|
|
-CREATE USER regress_conversion_user WITH NOCREATEDB NOCREATEROLE;
|
|
+CREATE USER regress_conversion_user WITH NOCREATEDB NOCREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_conversion_user;
|
|
CREATE CONVERSION myconv FOR 'LATIN1' TO 'UTF8' FROM iso8859_1_to_utf8;
|
|
--
|
|
diff --git a/src/test/regress/sql/copy.sql b/src/test/regress/sql/copy.sql
|
|
index e2dd24cb35..4a186750f8 100644
|
|
--- a/src/test/regress/sql/copy.sql
|
|
+++ b/src/test/regress/sql/copy.sql
|
|
@@ -20,11 +20,13 @@ insert into copytest values('Mac',E'abc\rdef',3);
|
|
insert into copytest values(E'esc\\ape',E'a\\r\\\r\\\n\\nb',4);
|
|
|
|
\set filename :abs_builddir '/results/copytest.csv'
|
|
-copy copytest to :'filename' csv;
|
|
+\set command '\\copy copytest to ' :'filename' csv;
|
|
+:command
|
|
|
|
create temp table copytest2 (like copytest);
|
|
|
|
-copy copytest2 from :'filename' csv;
|
|
+\set command '\\copy copytest2 from ' :'filename' csv;
|
|
+:command
|
|
|
|
select * from copytest except select * from copytest2;
|
|
|
|
@@ -32,9 +34,11 @@ truncate copytest2;
|
|
|
|
--- same test but with an escape char different from quote char
|
|
|
|
-copy copytest to :'filename' csv quote '''' escape E'\\';
|
|
+\set command '\\copy copytest to ' :'filename' ' csv quote ' '\'\'\'\'' ' escape ' 'E\'' '\\\\\'';
|
|
+:command
|
|
|
|
-copy copytest2 from :'filename' csv quote '''' escape E'\\';
|
|
+\set command '\\copy copytest2 from ' :'filename' ' csv quote ' '\'\'\'\'' ' escape ' 'E\'' '\\\\\'';
|
|
+:command
|
|
|
|
select * from copytest except select * from copytest2;
|
|
|
|
@@ -86,16 +90,19 @@ insert into parted_copytest select x,2,'Two' from generate_series(1001,1010) x;
|
|
insert into parted_copytest select x,1,'One' from generate_series(1011,1020) x;
|
|
|
|
\set filename :abs_builddir '/results/parted_copytest.csv'
|
|
-copy (select * from parted_copytest order by a) to :'filename';
|
|
+\set command '\\copy (select * from parted_copytest order by a) to ' :'filename';
|
|
+:command
|
|
|
|
truncate parted_copytest;
|
|
|
|
-copy parted_copytest from :'filename';
|
|
+\set command '\\copy parted_copytest from ' :'filename';
|
|
+:command
|
|
|
|
-- Ensure COPY FREEZE errors for partitioned tables.
|
|
begin;
|
|
truncate parted_copytest;
|
|
-copy parted_copytest from :'filename' (freeze);
|
|
+\set command '\\copy parted_copytest from ' :'filename' (freeze);
|
|
+:command
|
|
rollback;
|
|
|
|
select tableoid::regclass,count(*),sum(a) from parted_copytest
|
|
@@ -115,7 +122,8 @@ create trigger part_ins_trig
|
|
for each row
|
|
execute procedure part_ins_func();
|
|
|
|
-copy parted_copytest from :'filename';
|
|
+\set command '\\copy parted_copytest from ' :'filename';
|
|
+:command
|
|
|
|
select tableoid::regclass,count(*),sum(a) from parted_copytest
|
|
group by tableoid order by tableoid::regclass::name;
|
|
@@ -124,7 +132,8 @@ truncate table parted_copytest;
|
|
create index on parted_copytest (b);
|
|
drop trigger part_ins_trig on parted_copytest_a2;
|
|
|
|
-copy parted_copytest from stdin;
|
|
+\set command '\\copy parted_copytest from ' stdin;
|
|
+:command
|
|
1 1 str1
|
|
2 2 str2
|
|
\.
|
|
@@ -191,8 +200,8 @@ bill 20 (11,10) 1000 sharon
|
|
-- Generate COPY FROM report with FILE, with some excluded tuples.
|
|
truncate tab_progress_reporting;
|
|
\set filename :abs_srcdir '/data/emp.data'
|
|
-copy tab_progress_reporting from :'filename'
|
|
- where (salary < 2000);
|
|
+\set command '\\copy tab_progress_reporting from ' :'filename' 'where (salary < 2000)';
|
|
+:command
|
|
|
|
drop trigger check_after_tab_progress_reporting on tab_progress_reporting;
|
|
drop function notice_after_tab_progress_reporting();
|
|
@@ -311,7 +320,8 @@ CREATE TABLE parted_si_p_odd PARTITION OF parted_si FOR VALUES IN (1);
|
|
-- https://postgr.es/m/18130-7a86a7356a75209d%40postgresql.org
|
|
-- https://postgr.es/m/257696.1695670946%40sss.pgh.pa.us
|
|
\set filename :abs_srcdir '/data/desc.data'
|
|
-COPY parted_si(id, data) FROM :'filename';
|
|
+\set command '\\COPY parted_si(id, data) FROM ' :'filename';
|
|
+:command
|
|
|
|
-- An earlier bug (see commit b1ecb9b3fcf) could end up using a buffer from
|
|
-- the wrong partition. This test is *not* guaranteed to trigger that bug, but
|
|
diff --git a/src/test/regress/sql/copy2.sql b/src/test/regress/sql/copy2.sql
|
|
index 6b75b6c7ea..f3655b413c 100644
|
|
--- a/src/test/regress/sql/copy2.sql
|
|
+++ b/src/test/regress/sql/copy2.sql
|
|
@@ -407,8 +407,8 @@ copy check_con_tbl from stdin;
|
|
select * from check_con_tbl;
|
|
|
|
-- test with RLS enabled.
|
|
-CREATE ROLE regress_rls_copy_user;
|
|
-CREATE ROLE regress_rls_copy_user_colperms;
|
|
+CREATE ROLE regress_rls_copy_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_copy_user_colperms PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE rls_t1 (a int, b int, c int);
|
|
|
|
COPY rls_t1 (a, b, c) from stdin;
|
|
diff --git a/src/test/regress/sql/create_function_sql.sql b/src/test/regress/sql/create_function_sql.sql
|
|
index 89e9af3a49..2b86fe2285 100644
|
|
--- a/src/test/regress/sql/create_function_sql.sql
|
|
+++ b/src/test/regress/sql/create_function_sql.sql
|
|
@@ -6,7 +6,7 @@
|
|
|
|
-- All objects made in this test are in temp_func_test schema
|
|
|
|
-CREATE USER regress_unpriv_user;
|
|
+CREATE USER regress_unpriv_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE SCHEMA temp_func_test;
|
|
GRANT ALL ON SCHEMA temp_func_test TO public;
|
|
diff --git a/src/test/regress/sql/create_index.sql b/src/test/regress/sql/create_index.sql
|
|
index e296891cab..70cea565e4 100644
|
|
--- a/src/test/regress/sql/create_index.sql
|
|
+++ b/src/test/regress/sql/create_index.sql
|
|
@@ -71,7 +71,8 @@ CREATE TABLE fast_emp4000 (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/rect.data'
|
|
-COPY slow_emp4000 FROM :'filename';
|
|
+\set command '\\copy slow_emp4000 FROM ' :'filename';
|
|
+:command
|
|
|
|
INSERT INTO fast_emp4000 SELECT * FROM slow_emp4000;
|
|
|
|
@@ -269,7 +270,8 @@ CREATE TABLE array_index_op_test (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/array.data'
|
|
-COPY array_index_op_test FROM :'filename';
|
|
+\set command '\\copy array_index_op_test FROM ' :'filename';
|
|
+:command
|
|
ANALYZE array_index_op_test;
|
|
|
|
SELECT * FROM array_index_op_test WHERE i = '{NULL}' ORDER BY seqno;
|
|
@@ -1298,7 +1300,7 @@ END;
|
|
REINDEX SCHEMA CONCURRENTLY schema_to_reindex;
|
|
|
|
-- Failure for unauthorized user
|
|
-CREATE ROLE regress_reindexuser NOLOGIN;
|
|
+CREATE ROLE regress_reindexuser NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION ROLE regress_reindexuser;
|
|
REINDEX SCHEMA schema_to_reindex;
|
|
-- Permission failures with toast tables and indexes (pg_authid here)
|
|
diff --git a/src/test/regress/sql/create_procedure.sql b/src/test/regress/sql/create_procedure.sql
|
|
index 069a3727ce..faeeb3f744 100644
|
|
--- a/src/test/regress/sql/create_procedure.sql
|
|
+++ b/src/test/regress/sql/create_procedure.sql
|
|
@@ -255,7 +255,7 @@ DROP PROCEDURE nonexistent();
|
|
|
|
-- privileges
|
|
|
|
-CREATE USER regress_cp_user1;
|
|
+CREATE USER regress_cp_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT INSERT ON cp_test TO regress_cp_user1;
|
|
REVOKE EXECUTE ON PROCEDURE ptest1(text) FROM PUBLIC;
|
|
SET ROLE regress_cp_user1;
|
|
diff --git a/src/test/regress/sql/create_role.sql b/src/test/regress/sql/create_role.sql
|
|
index 4491a28a8a..3045434865 100644
|
|
--- a/src/test/regress/sql/create_role.sql
|
|
+++ b/src/test/regress/sql/create_role.sql
|
|
@@ -1,20 +1,20 @@
|
|
-- ok, superuser can create users with any set of privileges
|
|
-CREATE ROLE regress_role_super SUPERUSER;
|
|
-CREATE ROLE regress_role_admin CREATEDB CREATEROLE REPLICATION BYPASSRLS;
|
|
+CREATE ROLE regress_role_super SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_role_admin CREATEDB CREATEROLE REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_role_admin WITH GRANT OPTION;
|
|
-CREATE ROLE regress_role_limited_admin CREATEROLE;
|
|
-CREATE ROLE regress_role_normal;
|
|
+CREATE ROLE regress_role_limited_admin CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_role_normal PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, CREATEROLE user can't give away role attributes without having them
|
|
SET SESSION AUTHORIZATION regress_role_limited_admin;
|
|
-CREATE ROLE regress_nosuch_superuser SUPERUSER;
|
|
-CREATE ROLE regress_nosuch_replication_bypassrls REPLICATION BYPASSRLS;
|
|
-CREATE ROLE regress_nosuch_replication REPLICATION;
|
|
-CREATE ROLE regress_nosuch_bypassrls BYPASSRLS;
|
|
-CREATE ROLE regress_nosuch_createdb CREATEDB;
|
|
+CREATE ROLE regress_nosuch_superuser SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_nosuch_replication_bypassrls REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_nosuch_replication REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_nosuch_bypassrls BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_nosuch_createdb CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, can create a role without any special attributes
|
|
-CREATE ROLE regress_role_limited;
|
|
+CREATE ROLE regress_role_limited PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, can't give it in any of the restricted attributes
|
|
ALTER ROLE regress_role_limited SUPERUSER;
|
|
@@ -25,10 +25,10 @@ DROP ROLE regress_role_limited;
|
|
|
|
-- ok, can give away these role attributes if you have them
|
|
SET SESSION AUTHORIZATION regress_role_admin;
|
|
-CREATE ROLE regress_replication_bypassrls REPLICATION BYPASSRLS;
|
|
-CREATE ROLE regress_replication REPLICATION;
|
|
-CREATE ROLE regress_bypassrls BYPASSRLS;
|
|
-CREATE ROLE regress_createdb CREATEDB;
|
|
+CREATE ROLE regress_replication_bypassrls REPLICATION BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_replication REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_bypassrls BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_createdb CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, can toggle these role attributes off and on if you have them
|
|
ALTER ROLE regress_replication NOREPLICATION;
|
|
@@ -43,52 +43,52 @@ ALTER ROLE regress_createdb SUPERUSER;
|
|
ALTER ROLE regress_createdb NOSUPERUSER;
|
|
|
|
-- ok, having CREATEROLE is enough to create users with these privileges
|
|
-CREATE ROLE regress_createrole CREATEROLE NOINHERIT;
|
|
+CREATE ROLE regress_createrole CREATEROLE NOINHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_createrole WITH GRANT OPTION;
|
|
-CREATE ROLE regress_login LOGIN;
|
|
-CREATE ROLE regress_inherit INHERIT;
|
|
-CREATE ROLE regress_connection_limit CONNECTION LIMIT 5;
|
|
-CREATE ROLE regress_encrypted_password ENCRYPTED PASSWORD 'foo';
|
|
-CREATE ROLE regress_password_null PASSWORD NULL;
|
|
+CREATE ROLE regress_login LOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_inherit INHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_connection_limit CONNECTION LIMIT 5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_encrypted_password ENCRYPTED PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, backwards compatible noise words should be ignored
|
|
-CREATE ROLE regress_noiseword SYSID 12345;
|
|
+CREATE ROLE regress_noiseword SYSID 12345 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, cannot grant membership in superuser role
|
|
-CREATE ROLE regress_nosuch_super IN ROLE regress_role_super;
|
|
+CREATE ROLE regress_nosuch_super IN ROLE regress_role_super PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, database owner cannot have members
|
|
-CREATE ROLE regress_nosuch_dbowner IN ROLE pg_database_owner;
|
|
+CREATE ROLE regress_nosuch_dbowner IN ROLE pg_database_owner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, can grant other users into a role
|
|
CREATE ROLE regress_inroles ROLE
|
|
regress_role_super, regress_createdb, regress_createrole, regress_login,
|
|
- regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null;
|
|
+ regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, cannot grant a role into itself
|
|
-CREATE ROLE regress_nosuch_recursive ROLE regress_nosuch_recursive;
|
|
+CREATE ROLE regress_nosuch_recursive ROLE regress_nosuch_recursive PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, can grant other users into a role with admin option
|
|
CREATE ROLE regress_adminroles ADMIN
|
|
regress_role_super, regress_createdb, regress_createrole, regress_login,
|
|
- regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null;
|
|
+ regress_inherit, regress_connection_limit, regress_encrypted_password, regress_password_null PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, cannot grant a role into itself with admin option
|
|
-CREATE ROLE regress_nosuch_admin_recursive ADMIN regress_nosuch_admin_recursive;
|
|
+CREATE ROLE regress_nosuch_admin_recursive ADMIN regress_nosuch_admin_recursive PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- fail, regress_createrole does not have CREATEDB privilege
|
|
SET SESSION AUTHORIZATION regress_createrole;
|
|
CREATE DATABASE regress_nosuch_db;
|
|
|
|
-- ok, regress_createrole can create new roles
|
|
-CREATE ROLE regress_plainrole;
|
|
+CREATE ROLE regress_plainrole PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, roles with CREATEROLE can create new roles with it
|
|
-CREATE ROLE regress_rolecreator CREATEROLE;
|
|
+CREATE ROLE regress_rolecreator CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, roles with CREATEROLE can create new roles with different role
|
|
-- attributes, including CREATEROLE
|
|
-CREATE ROLE regress_hasprivs CREATEROLE LOGIN INHERIT CONNECTION LIMIT 5;
|
|
+CREATE ROLE regress_hasprivs CREATEROLE LOGIN INHERIT CONNECTION LIMIT 5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- ok, we should be able to modify a role we created
|
|
COMMENT ON ROLE regress_hasprivs IS 'some comment';
|
|
@@ -123,7 +123,7 @@ REASSIGN OWNED BY regress_tenant TO regress_createrole;
|
|
|
|
-- ok, create a role with a value for createrole_self_grant
|
|
SET createrole_self_grant = 'set, inherit';
|
|
-CREATE ROLE regress_tenant2;
|
|
+CREATE ROLE regress_tenant2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT CREATE ON DATABASE regression TO regress_tenant2;
|
|
|
|
-- ok, regress_tenant2 can create objects within the database
|
|
@@ -150,16 +150,16 @@ ALTER TABLE tenant2_table OWNER TO regress_tenant2;
|
|
DROP TABLE tenant2_table;
|
|
|
|
-- fail, CREATEROLE is not enough to create roles in privileged roles
|
|
-CREATE ROLE regress_read_all_data IN ROLE pg_read_all_data;
|
|
-CREATE ROLE regress_write_all_data IN ROLE pg_write_all_data;
|
|
-CREATE ROLE regress_monitor IN ROLE pg_monitor;
|
|
-CREATE ROLE regress_read_all_settings IN ROLE pg_read_all_settings;
|
|
-CREATE ROLE regress_read_all_stats IN ROLE pg_read_all_stats;
|
|
-CREATE ROLE regress_stat_scan_tables IN ROLE pg_stat_scan_tables;
|
|
-CREATE ROLE regress_read_server_files IN ROLE pg_read_server_files;
|
|
-CREATE ROLE regress_write_server_files IN ROLE pg_write_server_files;
|
|
-CREATE ROLE regress_execute_server_program IN ROLE pg_execute_server_program;
|
|
-CREATE ROLE regress_signal_backend IN ROLE pg_signal_backend;
|
|
+CREATE ROLE regress_read_all_data PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_data;
|
|
+CREATE ROLE regress_write_all_data PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_write_all_data;
|
|
+CREATE ROLE regress_monitor PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_monitor;
|
|
+CREATE ROLE regress_read_all_settings PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_settings;
|
|
+CREATE ROLE regress_read_all_stats PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_all_stats;
|
|
+CREATE ROLE regress_stat_scan_tables PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_stat_scan_tables;
|
|
+CREATE ROLE regress_read_server_files PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_read_server_files;
|
|
+CREATE ROLE regress_write_server_files PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_write_server_files;
|
|
+CREATE ROLE regress_execute_server_program PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_execute_server_program;
|
|
+CREATE ROLE regress_signal_backend PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_signal_backend;
|
|
|
|
-- fail, role still owns database objects
|
|
DROP ROLE regress_tenant;
|
|
diff --git a/src/test/regress/sql/create_schema.sql b/src/test/regress/sql/create_schema.sql
|
|
index 1b7064247a..be5b662ce1 100644
|
|
--- a/src/test/regress/sql/create_schema.sql
|
|
+++ b/src/test/regress/sql/create_schema.sql
|
|
@@ -4,7 +4,7 @@
|
|
|
|
-- Schema creation with elements.
|
|
|
|
-CREATE ROLE regress_create_schema_role SUPERUSER;
|
|
+CREATE ROLE regress_create_schema_role SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- Cases where schema creation fails as objects are qualified with a schema
|
|
-- that does not match with what's expected.
|
|
diff --git a/src/test/regress/sql/create_view.sql b/src/test/regress/sql/create_view.sql
|
|
index ae6841308b..47bc792e30 100644
|
|
--- a/src/test/regress/sql/create_view.sql
|
|
+++ b/src/test/regress/sql/create_view.sql
|
|
@@ -23,7 +23,8 @@ CREATE TABLE real_city (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/real_city.data'
|
|
-COPY real_city FROM :'filename';
|
|
+\set command '\\copy real_city FROM ' :'filename';
|
|
+:command
|
|
ANALYZE real_city;
|
|
|
|
SELECT *
|
|
diff --git a/src/test/regress/sql/database.sql b/src/test/regress/sql/database.sql
|
|
index 0367c0e37a..a23b98c4bd 100644
|
|
--- a/src/test/regress/sql/database.sql
|
|
+++ b/src/test/regress/sql/database.sql
|
|
@@ -1,8 +1,6 @@
|
|
CREATE DATABASE regression_tbd
|
|
ENCODING utf8 LC_COLLATE "C" LC_CTYPE "C" TEMPLATE template0;
|
|
ALTER DATABASE regression_tbd RENAME TO regression_utf8;
|
|
-ALTER DATABASE regression_utf8 SET TABLESPACE regress_tblspace;
|
|
-ALTER DATABASE regression_utf8 RESET TABLESPACE;
|
|
ALTER DATABASE regression_utf8 CONNECTION_LIMIT 123;
|
|
|
|
-- Test PgDatabaseToastTable. Doing this with GRANT would be slow.
|
|
diff --git a/src/test/regress/sql/dependency.sql b/src/test/regress/sql/dependency.sql
|
|
index 8d74ed7122..293194615e 100644
|
|
--- a/src/test/regress/sql/dependency.sql
|
|
+++ b/src/test/regress/sql/dependency.sql
|
|
@@ -2,10 +2,10 @@
|
|
-- DEPENDENCIES
|
|
--
|
|
|
|
-CREATE USER regress_dep_user;
|
|
-CREATE USER regress_dep_user2;
|
|
-CREATE USER regress_dep_user3;
|
|
-CREATE GROUP regress_dep_group;
|
|
+CREATE USER regress_dep_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_dep_group PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE TABLE deptest (f1 serial primary key, f2 text);
|
|
|
|
@@ -45,9 +45,9 @@ DROP TABLE deptest;
|
|
DROP USER regress_dep_user3;
|
|
|
|
-- Test DROP OWNED
|
|
-CREATE USER regress_dep_user0;
|
|
-CREATE USER regress_dep_user1;
|
|
-CREATE USER regress_dep_user2;
|
|
+CREATE USER regress_dep_user0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_dep_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_dep_user0;
|
|
-- permission denied
|
|
DROP OWNED BY regress_dep_user1;
|
|
diff --git a/src/test/regress/sql/drop_if_exists.sql b/src/test/regress/sql/drop_if_exists.sql
|
|
index ac6168b91f..4270062ec7 100644
|
|
--- a/src/test/regress/sql/drop_if_exists.sql
|
|
+++ b/src/test/regress/sql/drop_if_exists.sql
|
|
@@ -86,9 +86,9 @@ DROP DOMAIN test_domain_exists;
|
|
--- role/user/group
|
|
---
|
|
|
|
-CREATE USER regress_test_u1;
|
|
-CREATE ROLE regress_test_r1;
|
|
-CREATE GROUP regress_test_g1;
|
|
+CREATE USER regress_test_u1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_r1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_test_g1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
DROP USER regress_test_u2;
|
|
|
|
diff --git a/src/test/regress/sql/equivclass.sql b/src/test/regress/sql/equivclass.sql
|
|
index 247b0a3105..bf018fd3a1 100644
|
|
--- a/src/test/regress/sql/equivclass.sql
|
|
+++ b/src/test/regress/sql/equivclass.sql
|
|
@@ -230,7 +230,7 @@ set enable_mergejoin = off;
|
|
alter table ec1 enable row level security;
|
|
create policy p1 on ec1 using (f1 < '5'::int8alias1);
|
|
|
|
-create user regress_user_ectest;
|
|
+create user regress_user_ectest PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant select on ec0 to regress_user_ectest;
|
|
grant select on ec1 to regress_user_ectest;
|
|
|
|
diff --git a/src/test/regress/sql/event_trigger.sql b/src/test/regress/sql/event_trigger.sql
|
|
index 013546b830..616a46da1d 100644
|
|
--- a/src/test/regress/sql/event_trigger.sql
|
|
+++ b/src/test/regress/sql/event_trigger.sql
|
|
@@ -86,7 +86,7 @@ create event trigger regress_event_trigger2 on ddl_command_start
|
|
comment on event trigger regress_event_trigger is 'test comment';
|
|
|
|
-- drop as non-superuser should fail
|
|
-create role regress_evt_user;
|
|
+create role regress_evt_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
set role regress_evt_user;
|
|
create event trigger regress_event_trigger_noperms on ddl_command_start
|
|
execute procedure test_event_trigger();
|
|
diff --git a/src/test/regress/sql/foreign_data.sql b/src/test/regress/sql/foreign_data.sql
|
|
index aa147b14a9..370e0dd570 100644
|
|
--- a/src/test/regress/sql/foreign_data.sql
|
|
+++ b/src/test/regress/sql/foreign_data.sql
|
|
@@ -22,14 +22,14 @@ DROP ROLE IF EXISTS regress_foreign_data_user, regress_test_role, regress_test_r
|
|
|
|
RESET client_min_messages;
|
|
|
|
-CREATE ROLE regress_foreign_data_user LOGIN SUPERUSER;
|
|
+CREATE ROLE regress_foreign_data_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_foreign_data_user';
|
|
|
|
-CREATE ROLE regress_test_role;
|
|
-CREATE ROLE regress_test_role2;
|
|
-CREATE ROLE regress_test_role_super SUPERUSER;
|
|
-CREATE ROLE regress_test_indirect;
|
|
-CREATE ROLE regress_unprivileged_role;
|
|
+CREATE ROLE regress_test_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_role_super SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_test_indirect PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_unprivileged_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE FOREIGN DATA WRAPPER dummy;
|
|
COMMENT ON FOREIGN DATA WRAPPER dummy IS 'useless';
|
|
diff --git a/src/test/regress/sql/foreign_key.sql b/src/test/regress/sql/foreign_key.sql
|
|
index 2e710e419c..89cd481a54 100644
|
|
--- a/src/test/regress/sql/foreign_key.sql
|
|
+++ b/src/test/regress/sql/foreign_key.sql
|
|
@@ -1435,7 +1435,7 @@ ALTER TABLE fk_partitioned_fk_6 ATTACH PARTITION fk_partitioned_pk_6 FOR VALUES
|
|
DROP TABLE fk_partitioned_pk_6, fk_partitioned_fk_6;
|
|
|
|
-- test the case when the referenced table is owned by a different user
|
|
-create role regress_other_partitioned_fk_owner;
|
|
+create role regress_other_partitioned_fk_owner PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant references on fk_notpartitioned_pk to regress_other_partitioned_fk_owner;
|
|
set role regress_other_partitioned_fk_owner;
|
|
create table other_partitioned_fk(a int, b int) partition by list (a);
|
|
diff --git a/src/test/regress/sql/generated.sql b/src/test/regress/sql/generated.sql
|
|
index cb55d77821..9c15ae954c 100644
|
|
--- a/src/test/regress/sql/generated.sql
|
|
+++ b/src/test/regress/sql/generated.sql
|
|
@@ -263,7 +263,7 @@ ALTER TABLE gtest10a DROP COLUMN b;
|
|
INSERT INTO gtest10a (a) VALUES (1);
|
|
|
|
-- privileges
|
|
-CREATE USER regress_user11;
|
|
+CREATE USER regress_user11 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE TABLE gtest11s (a int PRIMARY KEY, b int, c int GENERATED ALWAYS AS (b * 2) STORED);
|
|
INSERT INTO gtest11s VALUES (1, 10), (2, 20);
|
|
diff --git a/src/test/regress/sql/guc.sql b/src/test/regress/sql/guc.sql
|
|
index dc79761955..a9ead75349 100644
|
|
--- a/src/test/regress/sql/guc.sql
|
|
+++ b/src/test/regress/sql/guc.sql
|
|
@@ -188,7 +188,7 @@ PREPARE foo AS SELECT 1;
|
|
LISTEN foo_event;
|
|
SET vacuum_cost_delay = 13;
|
|
CREATE TEMP TABLE tmp_foo (data text) ON COMMIT DELETE ROWS;
|
|
-CREATE ROLE regress_guc_user;
|
|
+CREATE ROLE regress_guc_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_guc_user;
|
|
-- look changes
|
|
SELECT pg_listening_channels();
|
|
diff --git a/src/test/regress/sql/hash_index.sql b/src/test/regress/sql/hash_index.sql
|
|
index 219da82981..bf99d2ec4c 100644
|
|
--- a/src/test/regress/sql/hash_index.sql
|
|
+++ b/src/test/regress/sql/hash_index.sql
|
|
@@ -26,10 +26,14 @@ CREATE TABLE hash_f8_heap (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/hash.data'
|
|
-COPY hash_i4_heap FROM :'filename';
|
|
-COPY hash_name_heap FROM :'filename';
|
|
-COPY hash_txt_heap FROM :'filename';
|
|
-COPY hash_f8_heap FROM :'filename';
|
|
+\set command '\\copy hash_i4_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_name_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_txt_heap FROM ' :'filename';
|
|
+:command
|
|
+\set command '\\copy hash_f8_heap FROM ' :'filename';
|
|
+:command
|
|
|
|
-- the data in this file has a lot of duplicates in the index key
|
|
-- fields, leading to long bucket chains and lots of table expansion.
|
|
diff --git a/src/test/regress/sql/identity.sql b/src/test/regress/sql/identity.sql
|
|
index cb0e05a2f1..b11492bd31 100644
|
|
--- a/src/test/regress/sql/identity.sql
|
|
+++ b/src/test/regress/sql/identity.sql
|
|
@@ -287,7 +287,7 @@ ALTER TABLE itest7 ALTER COLUMN a RESTART;
|
|
ALTER TABLE itest7 ALTER COLUMN a DROP IDENTITY;
|
|
|
|
-- privileges
|
|
-CREATE USER regress_identity_user1;
|
|
+CREATE USER regress_identity_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE itest8 (a int GENERATED ALWAYS AS IDENTITY, b text);
|
|
GRANT SELECT, INSERT ON itest8 TO regress_identity_user1;
|
|
SET ROLE regress_identity_user1;
|
|
diff --git a/src/test/regress/sql/inherit.sql b/src/test/regress/sql/inherit.sql
|
|
index 51251b0e51..3492f1cfef 100644
|
|
--- a/src/test/regress/sql/inherit.sql
|
|
+++ b/src/test/regress/sql/inherit.sql
|
|
@@ -770,8 +770,8 @@ drop table cnullparent cascade;
|
|
--
|
|
-- Mixed ownership inheritance tree
|
|
--
|
|
-create role regress_alice;
|
|
-create role regress_bob;
|
|
+create role regress_alice password NEON_PASSWORD_PLACEHOLDER;
|
|
+create role regress_bob password NEON_PASSWORD_PLACEHOLDER;
|
|
grant all on schema public to regress_alice, regress_bob;
|
|
grant regress_alice to regress_bob;
|
|
set session authorization regress_alice;
|
|
@@ -1031,7 +1031,7 @@ create index on permtest_parent (left(c, 3));
|
|
insert into permtest_parent
|
|
select 1, 'a', left(fipshash(i::text), 5) from generate_series(0, 100) i;
|
|
analyze permtest_parent;
|
|
-create role regress_no_child_access;
|
|
+create role regress_no_child_access PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
revoke all on permtest_grandchild from regress_no_child_access;
|
|
grant select on permtest_parent to regress_no_child_access;
|
|
set session authorization regress_no_child_access;
|
|
diff --git a/src/test/regress/sql/insert.sql b/src/test/regress/sql/insert.sql
|
|
index 2b086eeb6d..913d8a0aed 100644
|
|
--- a/src/test/regress/sql/insert.sql
|
|
+++ b/src/test/regress/sql/insert.sql
|
|
@@ -513,7 +513,7 @@ drop table mlparted5;
|
|
create table key_desc (a int, b int) partition by list ((a+0));
|
|
create table key_desc_1 partition of key_desc for values in (1) partition by range (b);
|
|
|
|
-create user regress_insert_other_user;
|
|
+create user regress_insert_other_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant select (a) on key_desc_1 to regress_insert_other_user;
|
|
grant insert on key_desc to regress_insert_other_user;
|
|
|
|
@@ -597,7 +597,7 @@ insert into brtrigpartcon1 values (1, 'hi there');
|
|
-- check that the message shows the appropriate column description in a
|
|
-- situation where the partitioned table is not the primary ModifyTable node
|
|
create table inserttest3 (f1 text default 'foo', f2 text default 'bar', f3 int);
|
|
-create role regress_coldesc_role;
|
|
+create role regress_coldesc_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
grant insert on inserttest3 to regress_coldesc_role;
|
|
grant insert on brtrigpartcon to regress_coldesc_role;
|
|
revoke select on brtrigpartcon from regress_coldesc_role;
|
|
diff --git a/src/test/regress/sql/jsonb.sql b/src/test/regress/sql/jsonb.sql
|
|
index 97bc2242a1..88c8b1dcdb 100644
|
|
--- a/src/test/regress/sql/jsonb.sql
|
|
+++ b/src/test/regress/sql/jsonb.sql
|
|
@@ -6,7 +6,8 @@ CREATE TABLE testjsonb (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/jsonb.data'
|
|
-COPY testjsonb FROM :'filename';
|
|
+\set command '\\copy testjsonb FROM ' :'filename';
|
|
+:command
|
|
|
|
-- Strings.
|
|
SELECT '""'::jsonb; -- OK.
|
|
diff --git a/src/test/regress/sql/largeobject.sql b/src/test/regress/sql/largeobject.sql
|
|
index a4aee02e3a..8839c9496a 100644
|
|
--- a/src/test/regress/sql/largeobject.sql
|
|
+++ b/src/test/regress/sql/largeobject.sql
|
|
@@ -10,7 +10,7 @@
|
|
SET bytea_output TO escape;
|
|
|
|
-- Test ALTER LARGE OBJECT OWNER
|
|
-CREATE ROLE regress_lo_user;
|
|
+CREATE ROLE regress_lo_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SELECT lo_create(42);
|
|
ALTER LARGE OBJECT 42 OWNER TO regress_lo_user;
|
|
|
|
@@ -189,7 +189,8 @@ SELECT lo_unlink(loid) from lotest_stash_values;
|
|
TRUNCATE lotest_stash_values;
|
|
|
|
\set filename :abs_srcdir '/data/tenk.data'
|
|
-INSERT INTO lotest_stash_values (loid) SELECT lo_import(:'filename');
|
|
+\lo_import :filename
|
|
+INSERT INTO lotest_stash_values (loid) VALUES (:LASTOID);
|
|
|
|
BEGIN;
|
|
UPDATE lotest_stash_values SET fd=lo_open(loid, CAST(x'20000' | x'40000' AS integer));
|
|
@@ -219,8 +220,8 @@ SELECT lo_close(fd) FROM lotest_stash_values;
|
|
END;
|
|
|
|
\set filename :abs_builddir '/results/lotest.txt'
|
|
-SELECT lo_export(loid, :'filename') FROM lotest_stash_values;
|
|
-
|
|
+SELECT loid FROM lotest_stash_values \gset
|
|
+\lo_export :loid, :filename
|
|
\lo_import :filename
|
|
|
|
\set newloid :LASTOID
|
|
diff --git a/src/test/regress/sql/lock.sql b/src/test/regress/sql/lock.sql
|
|
index b88488c6d0..78b31e6dd3 100644
|
|
--- a/src/test/regress/sql/lock.sql
|
|
+++ b/src/test/regress/sql/lock.sql
|
|
@@ -19,7 +19,7 @@ CREATE VIEW lock_view3 AS SELECT * from lock_view2;
|
|
CREATE VIEW lock_view4 AS SELECT (select a from lock_tbl1a limit 1) from lock_tbl1;
|
|
CREATE VIEW lock_view5 AS SELECT * from lock_tbl1 where a in (select * from lock_tbl1a);
|
|
CREATE VIEW lock_view6 AS SELECT * from (select * from lock_tbl1) sub;
|
|
-CREATE ROLE regress_rol_lock1;
|
|
+CREATE ROLE regress_rol_lock1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER ROLE regress_rol_lock1 SET search_path = lock_schema1;
|
|
GRANT USAGE ON SCHEMA lock_schema1 TO regress_rol_lock1;
|
|
|
|
diff --git a/src/test/regress/sql/matview.sql b/src/test/regress/sql/matview.sql
|
|
index b74ee305e0..33b8b690fc 100644
|
|
--- a/src/test/regress/sql/matview.sql
|
|
+++ b/src/test/regress/sql/matview.sql
|
|
@@ -209,7 +209,7 @@ SELECT * FROM mvtest_mv_v;
|
|
DROP TABLE mvtest_v CASCADE;
|
|
|
|
-- make sure running as superuser works when MV owned by another role (bug #11208)
|
|
-CREATE ROLE regress_user_mvtest;
|
|
+CREATE ROLE regress_user_mvtest PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET ROLE regress_user_mvtest;
|
|
-- this test case also checks for ambiguity in the queries issued by
|
|
-- refresh_by_match_merge(), by choosing column names that intentionally
|
|
@@ -266,7 +266,7 @@ ROLLBACK;
|
|
|
|
-- INSERT privileges if relation owner is not allowed to insert.
|
|
CREATE SCHEMA matview_schema;
|
|
-CREATE USER regress_matview_user;
|
|
+CREATE USER regress_matview_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE regress_matview_user
|
|
REVOKE INSERT ON TABLES FROM regress_matview_user;
|
|
GRANT ALL ON SCHEMA matview_schema TO public;
|
|
diff --git a/src/test/regress/sql/merge.sql b/src/test/regress/sql/merge.sql
|
|
index 5ddcca84f8..99f4cef9ef 100644
|
|
--- a/src/test/regress/sql/merge.sql
|
|
+++ b/src/test/regress/sql/merge.sql
|
|
@@ -2,9 +2,9 @@
|
|
-- MERGE
|
|
--
|
|
|
|
-CREATE USER regress_merge_privs;
|
|
-CREATE USER regress_merge_no_privs;
|
|
-CREATE USER regress_merge_none;
|
|
+CREATE USER regress_merge_privs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_merge_no_privs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_merge_none PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
DROP TABLE IF EXISTS target;
|
|
DROP TABLE IF EXISTS source;
|
|
diff --git a/src/test/regress/sql/misc.sql b/src/test/regress/sql/misc.sql
|
|
index 165a2e175f..08d7096e2c 100644
|
|
--- a/src/test/regress/sql/misc.sql
|
|
+++ b/src/test/regress/sql/misc.sql
|
|
@@ -74,22 +74,26 @@ DROP TABLE tmp;
|
|
-- copy
|
|
--
|
|
\set filename :abs_builddir '/results/onek.data'
|
|
-COPY onek TO :'filename';
|
|
+\set command '\\copy onek TO ' :'filename';
|
|
+:command
|
|
|
|
CREATE TEMP TABLE onek_copy (LIKE onek);
|
|
|
|
-COPY onek_copy FROM :'filename';
|
|
+\set command '\\copy onek_copy FROM ' :'filename';
|
|
+:command
|
|
|
|
SELECT * FROM onek EXCEPT ALL SELECT * FROM onek_copy;
|
|
|
|
SELECT * FROM onek_copy EXCEPT ALL SELECT * FROM onek;
|
|
|
|
\set filename :abs_builddir '/results/stud_emp.data'
|
|
-COPY BINARY stud_emp TO :'filename';
|
|
+\set command '\\COPY BINARY stud_emp TO ' :'filename';
|
|
+:command
|
|
|
|
CREATE TEMP TABLE stud_emp_copy (LIKE stud_emp);
|
|
|
|
-COPY BINARY stud_emp_copy FROM :'filename';
|
|
+\set command '\\COPY BINARY stud_emp_copy FROM ' :'filename';
|
|
+:command
|
|
|
|
SELECT * FROM stud_emp_copy;
|
|
|
|
diff --git a/src/test/regress/sql/misc_functions.sql b/src/test/regress/sql/misc_functions.sql
|
|
index 76470fcb3f..09746de223 100644
|
|
--- a/src/test/regress/sql/misc_functions.sql
|
|
+++ b/src/test/regress/sql/misc_functions.sql
|
|
@@ -82,7 +82,7 @@ SELECT pg_log_backend_memory_contexts(pg_backend_pid());
|
|
SELECT pg_log_backend_memory_contexts(pid) FROM pg_stat_activity
|
|
WHERE backend_type = 'checkpointer';
|
|
|
|
-CREATE ROLE regress_log_memory;
|
|
+CREATE ROLE regress_log_memory PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
SELECT has_function_privilege('regress_log_memory',
|
|
'pg_log_backend_memory_contexts(integer)', 'EXECUTE'); -- no
|
|
@@ -169,7 +169,7 @@ select count(*) > 0 from
|
|
--
|
|
-- Test replication slot directory functions
|
|
--
|
|
-CREATE ROLE regress_slot_dir_funcs;
|
|
+CREATE ROLE regress_slot_dir_funcs PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- Not available by default.
|
|
SELECT has_function_privilege('regress_slot_dir_funcs',
|
|
'pg_ls_logicalsnapdir()', 'EXECUTE');
|
|
@@ -252,7 +252,7 @@ FROM pg_walfile_name_offset('0/0'::pg_lsn + :segment_size - 1),
|
|
pg_split_walfile_name(file_name);
|
|
|
|
-- pg_current_logfile
|
|
-CREATE ROLE regress_current_logfile;
|
|
+CREATE ROLE regress_current_logfile PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- not available by default
|
|
SELECT has_function_privilege('regress_current_logfile',
|
|
'pg_current_logfile()', 'EXECUTE');
|
|
diff --git a/src/test/regress/sql/multirangetypes.sql b/src/test/regress/sql/multirangetypes.sql
|
|
index 41d5524285..373be031a2 100644
|
|
--- a/src/test/regress/sql/multirangetypes.sql
|
|
+++ b/src/test/regress/sql/multirangetypes.sql
|
|
@@ -704,7 +704,7 @@ drop type textrange2;
|
|
-- Multiranges don't have their own ownership or permissions.
|
|
--
|
|
create type textrange1 as range(subtype=text, multirange_type_name=multitextrange1, collation="C");
|
|
-create role regress_multirange_owner;
|
|
+create role regress_multirange_owner password NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
alter type multitextrange1 owner to regress_multirange_owner; -- fail
|
|
alter type textrange1 owner to regress_multirange_owner;
|
|
diff --git a/src/test/regress/sql/object_address.sql b/src/test/regress/sql/object_address.sql
|
|
index 1a6c61f49d..1c31ac6a53 100644
|
|
--- a/src/test/regress/sql/object_address.sql
|
|
+++ b/src/test/regress/sql/object_address.sql
|
|
@@ -7,7 +7,7 @@ SET client_min_messages TO 'warning';
|
|
DROP ROLE IF EXISTS regress_addr_user;
|
|
RESET client_min_messages;
|
|
|
|
-CREATE USER regress_addr_user;
|
|
+CREATE USER regress_addr_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- Test generic object addressing/identification functions
|
|
CREATE SCHEMA addr_nsp;
|
|
diff --git a/src/test/regress/sql/password.sql b/src/test/regress/sql/password.sql
|
|
index bb82aa4aa2..dd8a05e24d 100644
|
|
--- a/src/test/regress/sql/password.sql
|
|
+++ b/src/test/regress/sql/password.sql
|
|
@@ -10,13 +10,11 @@ SET password_encryption = 'scram-sha-256'; -- ok
|
|
|
|
-- consistency of password entries
|
|
SET password_encryption = 'md5';
|
|
-CREATE ROLE regress_passwd1;
|
|
-ALTER ROLE regress_passwd1 PASSWORD 'role_pwd1';
|
|
-CREATE ROLE regress_passwd2;
|
|
-ALTER ROLE regress_passwd2 PASSWORD 'role_pwd2';
|
|
+CREATE ROLE regress_passwd1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET password_encryption = 'scram-sha-256';
|
|
-CREATE ROLE regress_passwd3 PASSWORD 'role_pwd3';
|
|
-CREATE ROLE regress_passwd4 PASSWORD NULL;
|
|
+CREATE ROLE regress_passwd3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- check list of created entries
|
|
--
|
|
@@ -44,26 +42,19 @@ ALTER ROLE regress_passwd2_new RENAME TO regress_passwd2;
|
|
SET password_encryption = 'md5';
|
|
|
|
-- encrypt with MD5
|
|
-ALTER ROLE regress_passwd2 PASSWORD 'foo';
|
|
--- already encrypted, use as they are
|
|
-ALTER ROLE regress_passwd1 PASSWORD 'md5cd3578025fe2c3d7ed1b9a9b26238b70';
|
|
-ALTER ROLE regress_passwd3 PASSWORD 'SCRAM-SHA-256$4096:VLK4RMaQLCvNtQ==$6YtlR4t69SguDiwFvbVgVZtuz6gpJQQqUMZ7IQJK5yI=:ps75jrHeYU4lXCcXI4O8oIdJ3eO8o2jirjruw9phBTo=';
|
|
+ALTER ROLE regress_passwd2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
SET password_encryption = 'scram-sha-256';
|
|
-- create SCRAM secret
|
|
-ALTER ROLE regress_passwd4 PASSWORD 'foo';
|
|
+ALTER ROLE regress_passwd4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
-- already encrypted with MD5, use as it is
|
|
-CREATE ROLE regress_passwd5 PASSWORD 'md5e73a4b11df52a6068f8b39f90be36023';
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
--- This looks like a valid SCRAM-SHA-256 secret, but it is not
|
|
--- so it should be hashed with SCRAM-SHA-256.
|
|
-CREATE ROLE regress_passwd6 PASSWORD 'SCRAM-SHA-256$1234';
|
|
--- These may look like valid MD5 secrets, but they are not, so they
|
|
--- should be hashed with SCRAM-SHA-256.
|
|
--- trailing garbage at the end
|
|
-CREATE ROLE regress_passwd7 PASSWORD 'md5012345678901234567890123456789zz';
|
|
--- invalid length
|
|
-CREATE ROLE regress_passwd8 PASSWORD 'md501234567890123456789012345678901zz';
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd7 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd8 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- Changing the SCRAM iteration count
|
|
SET scram_iterations = 1024;
|
|
@@ -80,13 +71,10 @@ ALTER ROLE regress_passwd_empty PASSWORD 'md585939a5ce845f1a1b620742e3c659e0a';
|
|
ALTER ROLE regress_passwd_empty PASSWORD 'SCRAM-SHA-256$4096:hpFyHTUsSWcR7O9P$LgZFIt6Oqdo27ZFKbZ2nV+vtnYM995pDh9ca6WSi120=:qVV5NeluNfUPkwm7Vqat25RjSPLkGeoZBQs6wVv+um4=';
|
|
SELECT rolpassword FROM pg_authid WHERE rolname='regress_passwd_empty';
|
|
|
|
--- Test with invalid stored and server keys.
|
|
---
|
|
--- The first is valid, to act as a control. The others have too long
|
|
--- stored/server keys. They will be re-hashed.
|
|
-CREATE ROLE regress_passwd_sha_len0 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
|
|
-CREATE ROLE regress_passwd_sha_len1 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96RqwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
|
|
-CREATE ROLE regress_passwd_sha_len2 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=';
|
|
+-- Neon does not support encrypted passwords, use unencrypted instead
|
|
+CREATE ROLE regress_passwd_sha_len0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd_sha_len1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_passwd_sha_len2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- Check that the invalid secrets were re-hashed. A re-hashed secret
|
|
-- should not contain the original salt.
|
|
diff --git a/src/test/regress/sql/privileges.sql b/src/test/regress/sql/privileges.sql
|
|
index 5880bc018d..27aa952b18 100644
|
|
--- a/src/test/regress/sql/privileges.sql
|
|
+++ b/src/test/regress/sql/privileges.sql
|
|
@@ -24,18 +24,18 @@ RESET client_min_messages;
|
|
|
|
-- test proper begins here
|
|
|
|
-CREATE USER regress_priv_user1;
|
|
-CREATE USER regress_priv_user2;
|
|
-CREATE USER regress_priv_user3;
|
|
-CREATE USER regress_priv_user4;
|
|
-CREATE USER regress_priv_user5;
|
|
-CREATE USER regress_priv_user5; -- duplicate
|
|
-CREATE USER regress_priv_user6;
|
|
-CREATE USER regress_priv_user7;
|
|
-CREATE USER regress_priv_user8;
|
|
-CREATE USER regress_priv_user9;
|
|
-CREATE USER regress_priv_user10;
|
|
-CREATE ROLE regress_priv_role;
|
|
+CREATE USER regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER; -- duplicate
|
|
+CREATE USER regress_priv_user6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user7 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user8 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user9 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user10 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_priv_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- circular ADMIN OPTION grants should be disallowed
|
|
GRANT regress_priv_user1 TO regress_priv_user2 WITH ADMIN OPTION;
|
|
@@ -84,11 +84,11 @@ DROP ROLE regress_priv_user5; -- should fail, dependency
|
|
DROP ROLE regress_priv_user1, regress_priv_user5; -- ok, despite order
|
|
|
|
-- recreate the roles we just dropped
|
|
-CREATE USER regress_priv_user1;
|
|
-CREATE USER regress_priv_user2;
|
|
-CREATE USER regress_priv_user3;
|
|
-CREATE USER regress_priv_user4;
|
|
-CREATE USER regress_priv_user5;
|
|
+CREATE USER regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_priv_user5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
GRANT pg_read_all_data TO regress_priv_user6;
|
|
GRANT pg_write_all_data TO regress_priv_user7;
|
|
@@ -163,8 +163,8 @@ DROP USER regress_priv_user10;
|
|
DROP USER regress_priv_user9;
|
|
DROP USER regress_priv_user8;
|
|
|
|
-CREATE GROUP regress_priv_group1;
|
|
-CREATE GROUP regress_priv_group2 WITH ADMIN regress_priv_user1 USER regress_priv_user2;
|
|
+CREATE GROUP regress_priv_group1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE GROUP regress_priv_group2 WITH ADMIN regress_priv_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER USER regress_priv_user2;
|
|
|
|
ALTER GROUP regress_priv_group1 ADD USER regress_priv_user4;
|
|
|
|
@@ -1157,7 +1157,7 @@ SELECT has_table_privilege('regress_priv_user1', 'atest4', 'SELECT WITH GRANT OP
|
|
|
|
-- security-restricted operations
|
|
\c -
|
|
-CREATE ROLE regress_sro_user;
|
|
+CREATE ROLE regress_sro_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- Check that index expressions and predicates are run as the table's owner
|
|
|
|
@@ -1653,8 +1653,8 @@ DROP SCHEMA testns CASCADE;
|
|
-- Change owner of the schema & and rename of new schema owner
|
|
\c -
|
|
|
|
-CREATE ROLE regress_schemauser1 superuser login;
|
|
-CREATE ROLE regress_schemauser2 superuser login;
|
|
+CREATE ROLE regress_schemauser1 superuser login PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_schemauser2 superuser login PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
SET SESSION ROLE regress_schemauser1;
|
|
CREATE SCHEMA testns;
|
|
@@ -1748,7 +1748,7 @@ DROP USER regress_priv_user8; -- does not exist
|
|
|
|
|
|
-- permissions with LOCK TABLE
|
|
-CREATE USER regress_locktable_user;
|
|
+CREATE USER regress_locktable_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE lock_table (a int);
|
|
|
|
-- LOCK TABLE and SELECT permission
|
|
@@ -1851,7 +1851,7 @@ DROP USER regress_locktable_user;
|
|
-- switch to superuser
|
|
\c -
|
|
|
|
-CREATE ROLE regress_readallstats;
|
|
+CREATE ROLE regress_readallstats PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
SELECT has_table_privilege('regress_readallstats','pg_backend_memory_contexts','SELECT'); -- no
|
|
SELECT has_table_privilege('regress_readallstats','pg_shmem_allocations','SELECT'); -- no
|
|
@@ -1871,10 +1871,10 @@ RESET ROLE;
|
|
DROP ROLE regress_readallstats;
|
|
|
|
-- test role grantor machinery
|
|
-CREATE ROLE regress_group;
|
|
-CREATE ROLE regress_group_direct_manager;
|
|
-CREATE ROLE regress_group_indirect_manager;
|
|
-CREATE ROLE regress_group_member;
|
|
+CREATE ROLE regress_group PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_direct_manager PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_indirect_manager PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_group_member PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
GRANT regress_group TO regress_group_direct_manager WITH INHERIT FALSE, ADMIN TRUE;
|
|
GRANT regress_group_direct_manager TO regress_group_indirect_manager;
|
|
@@ -1896,9 +1896,9 @@ DROP ROLE regress_group_indirect_manager;
|
|
DROP ROLE regress_group_member;
|
|
|
|
-- test SET and INHERIT options with object ownership changes
|
|
-CREATE ROLE regress_roleoption_protagonist;
|
|
-CREATE ROLE regress_roleoption_donor;
|
|
-CREATE ROLE regress_roleoption_recipient;
|
|
+CREATE ROLE regress_roleoption_protagonist PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_roleoption_donor PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_roleoption_recipient PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE SCHEMA regress_roleoption;
|
|
GRANT CREATE, USAGE ON SCHEMA regress_roleoption TO PUBLIC;
|
|
GRANT regress_roleoption_donor TO regress_roleoption_protagonist WITH INHERIT TRUE, SET FALSE;
|
|
@@ -1926,9 +1926,9 @@ DROP ROLE regress_roleoption_donor;
|
|
DROP ROLE regress_roleoption_recipient;
|
|
|
|
-- MAINTAIN
|
|
-CREATE ROLE regress_no_maintain;
|
|
-CREATE ROLE regress_maintain;
|
|
-CREATE ROLE regress_maintain_all IN ROLE pg_maintain;
|
|
+CREATE ROLE regress_no_maintain PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_maintain PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_maintain_all IN ROLE pg_maintain PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
CREATE TABLE maintain_test (a INT);
|
|
CREATE INDEX ON maintain_test (a);
|
|
GRANT MAINTAIN ON maintain_test TO regress_maintain;
|
|
diff --git a/src/test/regress/sql/psql.sql b/src/test/regress/sql/psql.sql
|
|
index 3b3c6f6e29..b09d6231f8 100644
|
|
--- a/src/test/regress/sql/psql.sql
|
|
+++ b/src/test/regress/sql/psql.sql
|
|
@@ -500,7 +500,7 @@ select 1 where false;
|
|
\pset expanded off
|
|
|
|
CREATE SCHEMA tableam_display;
|
|
-CREATE ROLE regress_display_role;
|
|
+CREATE ROLE regress_display_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER SCHEMA tableam_display OWNER TO regress_display_role;
|
|
SET search_path TO tableam_display;
|
|
CREATE ACCESS METHOD heap_psql TYPE TABLE HANDLER heap_tableam_handler;
|
|
@@ -1182,7 +1182,7 @@ reset debug_parallel_query;
|
|
\unset FETCH_COUNT
|
|
|
|
create schema testpart;
|
|
-create role regress_partitioning_role;
|
|
+create role regress_partitioning_role PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
alter schema testpart owner to regress_partitioning_role;
|
|
|
|
@@ -1293,7 +1293,7 @@ reset work_mem;
|
|
|
|
-- check \df+
|
|
-- we have to use functions with a predictable owner name, so make a role
|
|
-create role regress_psql_user superuser;
|
|
+create role regress_psql_user superuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
begin;
|
|
set session authorization regress_psql_user;
|
|
|
|
@@ -1439,11 +1439,14 @@ CREATE TEMPORARY TABLE reload_output(
|
|
);
|
|
|
|
SELECT 1 AS a \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT 2 AS b\; SELECT 3 AS c\; SELECT 4 AS d \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
COPY (SELECT 'foo') TO STDOUT \; COPY (SELECT 'bar') TO STDOUT \g :g_out_file
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
TRUNCATE TABLE reload_output;
|
|
@@ -1460,17 +1463,20 @@ SELECT 1 AS a\; SELECT 2 AS b\; SELECT 3 AS c;
|
|
-- COPY TO file
|
|
-- The data goes to :g_out_file and the status to :o_out_file
|
|
\set QUIET false
|
|
-COPY (SELECT unique1 FROM onek ORDER BY unique1 LIMIT 10) TO :'g_out_file';
|
|
+\set command '\\COPY (SELECT unique1 FROM onek ORDER BY unique1 LIMIT 10) TO ' :'g_out_file';
|
|
+:command
|
|
-- DML command status
|
|
UPDATE onek SET unique1 = unique1 WHERE false;
|
|
\set QUIET true
|
|
\o
|
|
|
|
-- Check the contents of the files generated.
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
TRUNCATE TABLE reload_output;
|
|
-COPY reload_output(line) FROM :'o_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'o_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
TRUNCATE TABLE reload_output;
|
|
|
|
@@ -1483,10 +1489,12 @@ COPY (SELECT 'foo2') TO STDOUT \; COPY (SELECT 'bar2') TO STDOUT \g :g_out_file
|
|
\o
|
|
|
|
-- Check the contents of the files generated.
|
|
-COPY reload_output(line) FROM :'g_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'g_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
TRUNCATE TABLE reload_output;
|
|
-COPY reload_output(line) FROM :'o_out_file';
|
|
+\set command '\\COPY reload_output(line) FROM ' :'o_out_file';
|
|
+:command
|
|
SELECT line FROM reload_output ORDER BY lineno;
|
|
|
|
DROP TABLE reload_output;
|
|
@@ -1834,10 +1842,10 @@ DROP FUNCTION psql_error;
|
|
\dX "no.such.database"."no.such.schema"."no.such.extended.statistics"
|
|
|
|
-- check \drg and \du
|
|
-CREATE ROLE regress_du_role0;
|
|
-CREATE ROLE regress_du_role1;
|
|
-CREATE ROLE regress_du_role2;
|
|
-CREATE ROLE regress_du_admin;
|
|
+CREATE ROLE regress_du_role0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_role1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_du_admin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
GRANT regress_du_role0 TO regress_du_admin WITH ADMIN TRUE;
|
|
GRANT regress_du_role1 TO regress_du_admin WITH ADMIN TRUE;
|
|
diff --git a/src/test/regress/sql/publication.sql b/src/test/regress/sql/publication.sql
|
|
index 479d4f3264..6d348a93e7 100644
|
|
--- a/src/test/regress/sql/publication.sql
|
|
+++ b/src/test/regress/sql/publication.sql
|
|
@@ -1,9 +1,9 @@
|
|
--
|
|
-- PUBLICATION
|
|
--
|
|
-CREATE ROLE regress_publication_user LOGIN SUPERUSER;
|
|
-CREATE ROLE regress_publication_user2;
|
|
-CREATE ROLE regress_publication_user_dummy LOGIN NOSUPERUSER;
|
|
+CREATE ROLE regress_publication_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_publication_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_publication_user_dummy LOGIN NOSUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_publication_user';
|
|
|
|
-- suppress warning that depends on wal_level
|
|
@@ -810,7 +810,7 @@ DROP PUBLICATION testpub2;
|
|
DROP PUBLICATION testpub3;
|
|
|
|
SET ROLE regress_publication_user;
|
|
-CREATE ROLE regress_publication_user3;
|
|
+CREATE ROLE regress_publication_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT regress_publication_user2 TO regress_publication_user3;
|
|
SET client_min_messages = 'ERROR';
|
|
CREATE PUBLICATION testpub4 FOR TABLES IN SCHEMA pub_test;
|
|
diff --git a/src/test/regress/sql/regproc.sql b/src/test/regress/sql/regproc.sql
|
|
index 232289ac39..d967ef0cd3 100644
|
|
--- a/src/test/regress/sql/regproc.sql
|
|
+++ b/src/test/regress/sql/regproc.sql
|
|
@@ -4,7 +4,7 @@
|
|
|
|
/* If objects exist, return oids */
|
|
|
|
-CREATE ROLE regress_regrole_test;
|
|
+CREATE ROLE regress_regrole_test PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- without schemaname
|
|
|
|
diff --git a/src/test/regress/sql/roleattributes.sql b/src/test/regress/sql/roleattributes.sql
|
|
index c961b2d730..0859b89c4f 100644
|
|
--- a/src/test/regress/sql/roleattributes.sql
|
|
+++ b/src/test/regress/sql/roleattributes.sql
|
|
@@ -1,83 +1,83 @@
|
|
-- default for superuser is false
|
|
-CREATE ROLE regress_test_def_superuser;
|
|
+CREATE ROLE regress_test_def_superuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_superuser';
|
|
-CREATE ROLE regress_test_superuser WITH SUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_superuser';
|
|
+CREATE ROLE regress_test_superuser WITH SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
ALTER ROLE regress_test_superuser WITH NOSUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
ALTER ROLE regress_test_superuser WITH SUPERUSER;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_superuser';
|
|
|
|
-- default for inherit is true
|
|
-CREATE ROLE regress_test_def_inherit;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_inherit';
|
|
-CREATE ROLE regress_test_inherit WITH NOINHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+CREATE ROLE regress_test_def_inherit PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_inherit';
|
|
+CREATE ROLE regress_test_inherit WITH NOINHERIT PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
ALTER ROLE regress_test_inherit WITH INHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
ALTER ROLE regress_test_inherit WITH NOINHERIT;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_inherit';
|
|
|
|
-- default for create role is false
|
|
-CREATE ROLE regress_test_def_createrole;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createrole';
|
|
-CREATE ROLE regress_test_createrole WITH CREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+CREATE ROLE regress_test_def_createrole PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createrole';
|
|
+CREATE ROLE regress_test_createrole WITH CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
ALTER ROLE regress_test_createrole WITH NOCREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
ALTER ROLE regress_test_createrole WITH CREATEROLE;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createrole';
|
|
|
|
-- default for create database is false
|
|
-CREATE ROLE regress_test_def_createdb;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createdb';
|
|
-CREATE ROLE regress_test_createdb WITH CREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+CREATE ROLE regress_test_def_createdb PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_createdb';
|
|
+CREATE ROLE regress_test_createdb WITH CREATEDB PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
ALTER ROLE regress_test_createdb WITH NOCREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
ALTER ROLE regress_test_createdb WITH CREATEDB;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_createdb';
|
|
|
|
-- default for can login is false for role
|
|
-CREATE ROLE regress_test_def_role_canlogin;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_role_canlogin';
|
|
-CREATE ROLE regress_test_role_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+CREATE ROLE regress_test_def_role_canlogin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_role_canlogin';
|
|
+CREATE ROLE regress_test_role_canlogin WITH LOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
ALTER ROLE regress_test_role_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
ALTER ROLE regress_test_role_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_role_canlogin';
|
|
|
|
-- default for can login is true for user
|
|
-CREATE USER regress_test_def_user_canlogin;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_user_canlogin';
|
|
-CREATE USER regress_test_user_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+CREATE USER regress_test_def_user_canlogin PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_user_canlogin';
|
|
+CREATE USER regress_test_user_canlogin WITH NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
ALTER USER regress_test_user_canlogin WITH LOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
ALTER USER regress_test_user_canlogin WITH NOLOGIN;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_user_canlogin';
|
|
|
|
-- default for replication is false
|
|
-CREATE ROLE regress_test_def_replication;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_replication';
|
|
-CREATE ROLE regress_test_replication WITH REPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+CREATE ROLE regress_test_def_replication PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_replication';
|
|
+CREATE ROLE regress_test_replication WITH REPLICATION PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
ALTER ROLE regress_test_replication WITH NOREPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
ALTER ROLE regress_test_replication WITH REPLICATION;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_replication';
|
|
|
|
-- default for bypassrls is false
|
|
-CREATE ROLE regress_test_def_bypassrls;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_bypassrls';
|
|
-CREATE ROLE regress_test_bypassrls WITH BYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+CREATE ROLE regress_test_def_bypassrls PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_def_bypassrls';
|
|
+CREATE ROLE regress_test_bypassrls WITH BYPASSRLS PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
ALTER ROLE regress_test_bypassrls WITH NOBYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
ALTER ROLE regress_test_bypassrls WITH BYPASSRLS;
|
|
-SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, rolpassword, rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
+SELECT rolname, rolsuper, rolinherit, rolcreaterole, rolcreatedb, rolcanlogin, rolreplication, rolbypassrls, rolconnlimit, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+/=]+)\$([a-zA-Z0-9+=/]+):([a-zA-Z0-9+/=]+)', '\1$\2:<salt>$<storedkey>:<serverkey>'), rolvaliduntil FROM pg_authid WHERE rolname = 'regress_test_bypassrls';
|
|
|
|
-- clean up roles
|
|
DROP ROLE regress_test_def_superuser;
|
|
diff --git a/src/test/regress/sql/rowsecurity.sql b/src/test/regress/sql/rowsecurity.sql
|
|
index eab7d99003..0cf1139e01 100644
|
|
--- a/src/test/regress/sql/rowsecurity.sql
|
|
+++ b/src/test/regress/sql/rowsecurity.sql
|
|
@@ -20,13 +20,13 @@ DROP SCHEMA IF EXISTS regress_rls_schema CASCADE;
|
|
RESET client_min_messages;
|
|
|
|
-- initial setup
|
|
-CREATE USER regress_rls_alice NOLOGIN;
|
|
-CREATE USER regress_rls_bob NOLOGIN;
|
|
-CREATE USER regress_rls_carol NOLOGIN;
|
|
-CREATE USER regress_rls_dave NOLOGIN;
|
|
-CREATE USER regress_rls_exempt_user BYPASSRLS NOLOGIN;
|
|
-CREATE ROLE regress_rls_group1 NOLOGIN;
|
|
-CREATE ROLE regress_rls_group2 NOLOGIN;
|
|
+CREATE USER regress_rls_alice NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_bob NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_carol NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_dave NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_rls_exempt_user BYPASSRLS NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_group1 NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_group2 NOLOGIN PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
GRANT regress_rls_group1 TO regress_rls_bob;
|
|
GRANT regress_rls_group2 TO regress_rls_carol;
|
|
@@ -2105,8 +2105,8 @@ SELECT count(*) = 0 FROM pg_depend
|
|
-- DROP OWNED BY testing
|
|
RESET SESSION AUTHORIZATION;
|
|
|
|
-CREATE ROLE regress_rls_dob_role1;
|
|
-CREATE ROLE regress_rls_dob_role2;
|
|
+CREATE ROLE regress_rls_dob_role1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_rls_dob_role2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE TABLE dob_t1 (c1 int);
|
|
CREATE TABLE dob_t2 (c1 int) PARTITION BY RANGE (c1);
|
|
diff --git a/src/test/regress/sql/rules.sql b/src/test/regress/sql/rules.sql
|
|
index 4a5fa50585..a9e9eab77d 100644
|
|
--- a/src/test/regress/sql/rules.sql
|
|
+++ b/src/test/regress/sql/rules.sql
|
|
@@ -1390,7 +1390,7 @@ DROP TABLE ruletest2;
|
|
-- Test non-SELECT rule on security invoker view.
|
|
-- Should use view owner's permissions.
|
|
--
|
|
-CREATE USER regress_rule_user1;
|
|
+CREATE USER regress_rule_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE TABLE ruletest_t1 (x int);
|
|
CREATE TABLE ruletest_t2 (x int);
|
|
diff --git a/src/test/regress/sql/security_label.sql b/src/test/regress/sql/security_label.sql
|
|
index 98e6a5f211..68c868fef2 100644
|
|
--- a/src/test/regress/sql/security_label.sql
|
|
+++ b/src/test/regress/sql/security_label.sql
|
|
@@ -10,8 +10,8 @@ DROP ROLE IF EXISTS regress_seclabel_user2;
|
|
|
|
RESET client_min_messages;
|
|
|
|
-CREATE USER regress_seclabel_user1 WITH CREATEROLE;
|
|
-CREATE USER regress_seclabel_user2;
|
|
+CREATE USER regress_seclabel_user1 WITH CREATEROLE PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_seclabel_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE TABLE seclabel_tbl1 (a int, b text);
|
|
CREATE TABLE seclabel_tbl2 (x int, y text);
|
|
diff --git a/src/test/regress/sql/select_into.sql b/src/test/regress/sql/select_into.sql
|
|
index 689c448cc2..223ceb1d75 100644
|
|
--- a/src/test/regress/sql/select_into.sql
|
|
+++ b/src/test/regress/sql/select_into.sql
|
|
@@ -20,7 +20,7 @@ DROP TABLE sitmp1;
|
|
-- SELECT INTO and INSERT permission, if owner is not allowed to insert.
|
|
--
|
|
CREATE SCHEMA selinto_schema;
|
|
-CREATE USER regress_selinto_user;
|
|
+CREATE USER regress_selinto_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
ALTER DEFAULT PRIVILEGES FOR ROLE regress_selinto_user
|
|
REVOKE INSERT ON TABLES FROM regress_selinto_user;
|
|
GRANT ALL ON SCHEMA selinto_schema TO public;
|
|
diff --git a/src/test/regress/sql/select_parallel.sql b/src/test/regress/sql/select_parallel.sql
|
|
index 3e4bfcb71f..99757eff3c 100644
|
|
--- a/src/test/regress/sql/select_parallel.sql
|
|
+++ b/src/test/regress/sql/select_parallel.sql
|
|
@@ -498,7 +498,7 @@ SELECT 1 FROM tenk1_vw_sec
|
|
rollback;
|
|
|
|
-- test that function option SET ROLE works in parallel workers.
|
|
-create role regress_parallel_worker;
|
|
+create role regress_parallel_worker PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
create function set_and_report_role() returns text as
|
|
$$ select current_setting('role') $$ language sql parallel safe
|
|
diff --git a/src/test/regress/sql/select_views.sql b/src/test/regress/sql/select_views.sql
|
|
index e742f13699..7bd0255df8 100644
|
|
--- a/src/test/regress/sql/select_views.sql
|
|
+++ b/src/test/regress/sql/select_views.sql
|
|
@@ -12,7 +12,7 @@ SELECT * FROM toyemp WHERE name = 'sharon';
|
|
--
|
|
-- Test for Leaky view scenario
|
|
--
|
|
-CREATE ROLE regress_alice;
|
|
+CREATE ROLE regress_alice PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
CREATE FUNCTION f_leak (text)
|
|
RETURNS bool LANGUAGE 'plpgsql' COST 0.0000001
|
|
diff --git a/src/test/regress/sql/sequence.sql b/src/test/regress/sql/sequence.sql
|
|
index 793f1415f6..ec07c1f193 100644
|
|
--- a/src/test/regress/sql/sequence.sql
|
|
+++ b/src/test/regress/sql/sequence.sql
|
|
@@ -293,7 +293,7 @@ ROLLBACK;
|
|
|
|
-- privileges tests
|
|
|
|
-CREATE USER regress_seq_user;
|
|
+CREATE USER regress_seq_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
-- nextval
|
|
BEGIN;
|
|
diff --git a/src/test/regress/sql/stats.sql b/src/test/regress/sql/stats.sql
|
|
index d8ac0d06f4..c9cfcea208 100644
|
|
--- a/src/test/regress/sql/stats.sql
|
|
+++ b/src/test/regress/sql/stats.sql
|
|
@@ -631,23 +631,6 @@ SELECT :io_sum_shared_after_writes > :io_sum_shared_before_writes;
|
|
SELECT current_setting('fsync') = 'off'
|
|
OR :io_sum_shared_after_fsyncs > :io_sum_shared_before_fsyncs;
|
|
|
|
--- Change the tablespace so that the table is rewritten directly, then SELECT
|
|
--- from it to cause it to be read back into shared buffers.
|
|
-SELECT sum(reads) AS io_sum_shared_before_reads
|
|
- FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
--- Do this in a transaction to prevent spurious failures due to concurrent accesses to our newly
|
|
--- rewritten table, e.g. by autovacuum.
|
|
-BEGIN;
|
|
-ALTER TABLE test_io_shared SET TABLESPACE regress_tblspace;
|
|
--- SELECT from the table so that the data is read into shared buffers and
|
|
--- context 'normal', object 'relation' reads are counted.
|
|
-SELECT COUNT(*) FROM test_io_shared;
|
|
-COMMIT;
|
|
-SELECT pg_stat_force_next_flush();
|
|
-SELECT sum(reads) AS io_sum_shared_after_reads
|
|
- FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
-SELECT :io_sum_shared_after_reads > :io_sum_shared_before_reads;
|
|
-
|
|
SELECT sum(hits) AS io_sum_shared_before_hits
|
|
FROM pg_stat_io WHERE context = 'normal' AND object = 'relation' \gset
|
|
-- Select from the table again to count hits.
|
|
diff --git a/src/test/regress/sql/stats_ext.sql b/src/test/regress/sql/stats_ext.sql
|
|
index 0c08a6cc42..7a5b1036d8 100644
|
|
--- a/src/test/regress/sql/stats_ext.sql
|
|
+++ b/src/test/regress/sql/stats_ext.sql
|
|
@@ -50,7 +50,7 @@ DROP TABLE ext_stats_test;
|
|
CREATE TABLE ab1 (a INTEGER, b INTEGER, c INTEGER);
|
|
CREATE STATISTICS IF NOT EXISTS ab1_a_b_stats ON a, b FROM ab1;
|
|
COMMENT ON STATISTICS ab1_a_b_stats IS 'new comment';
|
|
-CREATE ROLE regress_stats_ext;
|
|
+CREATE ROLE regress_stats_ext PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION regress_stats_ext;
|
|
COMMENT ON STATISTICS ab1_a_b_stats IS 'changed comment';
|
|
DROP STATISTICS ab1_a_b_stats;
|
|
@@ -1607,7 +1607,7 @@ drop statistics stts_t1_expr_expr_stat;
|
|
set search_path to public, stts_s1;
|
|
\dX
|
|
|
|
-create role regress_stats_ext nosuperuser;
|
|
+create role regress_stats_ext nosuperuser PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
set role regress_stats_ext;
|
|
\dX
|
|
reset role;
|
|
@@ -1618,7 +1618,7 @@ drop user regress_stats_ext;
|
|
reset search_path;
|
|
|
|
-- User with no access
|
|
-CREATE USER regress_stats_user1;
|
|
+CREATE USER regress_stats_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT USAGE ON SCHEMA tststats TO regress_stats_user1;
|
|
SET SESSION AUTHORIZATION regress_stats_user1;
|
|
SELECT * FROM tststats.priv_test_tbl; -- Permission denied
|
|
diff --git a/src/test/regress/sql/subscription.sql b/src/test/regress/sql/subscription.sql
|
|
index 3e5ba4cb8c..a35f030908 100644
|
|
--- a/src/test/regress/sql/subscription.sql
|
|
+++ b/src/test/regress/sql/subscription.sql
|
|
@@ -2,10 +2,10 @@
|
|
-- SUBSCRIPTION
|
|
--
|
|
|
|
-CREATE ROLE regress_subscription_user LOGIN SUPERUSER;
|
|
-CREATE ROLE regress_subscription_user2;
|
|
-CREATE ROLE regress_subscription_user3 IN ROLE pg_create_subscription;
|
|
-CREATE ROLE regress_subscription_user_dummy LOGIN NOSUPERUSER;
|
|
+CREATE ROLE regress_subscription_user LOGIN SUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_subscription_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE ROLE regress_subscription_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER IN ROLE pg_create_subscription;
|
|
+CREATE ROLE regress_subscription_user_dummy LOGIN NOSUPERUSER PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET SESSION AUTHORIZATION 'regress_subscription_user';
|
|
|
|
-- fail - no publications
|
|
diff --git a/src/test/regress/sql/test_setup.sql b/src/test/regress/sql/test_setup.sql
|
|
index 06b0e2121f..01444f9426 100644
|
|
--- a/src/test/regress/sql/test_setup.sql
|
|
+++ b/src/test/regress/sql/test_setup.sql
|
|
@@ -135,7 +135,8 @@ CREATE TABLE onek (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/onek.data'
|
|
-COPY onek FROM :'filename';
|
|
+\set command '\\copy onek FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE onek;
|
|
|
|
CREATE TABLE onek2 AS SELECT * FROM onek;
|
|
@@ -161,7 +162,8 @@ CREATE TABLE tenk1 (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/tenk.data'
|
|
-COPY tenk1 FROM :'filename';
|
|
+\set command '\\copy tenk1 FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE tenk1;
|
|
|
|
CREATE TABLE tenk2 AS SELECT * FROM tenk1;
|
|
@@ -174,7 +176,8 @@ CREATE TABLE person (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/person.data'
|
|
-COPY person FROM :'filename';
|
|
+\set command '\\copy person FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE person;
|
|
|
|
CREATE TABLE emp (
|
|
@@ -183,7 +186,8 @@ CREATE TABLE emp (
|
|
) INHERITS (person);
|
|
|
|
\set filename :abs_srcdir '/data/emp.data'
|
|
-COPY emp FROM :'filename';
|
|
+\set command '\\copy emp FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE emp;
|
|
|
|
CREATE TABLE student (
|
|
@@ -191,7 +195,8 @@ CREATE TABLE student (
|
|
) INHERITS (person);
|
|
|
|
\set filename :abs_srcdir '/data/student.data'
|
|
-COPY student FROM :'filename';
|
|
+\set command '\\copy student FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE student;
|
|
|
|
CREATE TABLE stud_emp (
|
|
@@ -199,7 +204,8 @@ CREATE TABLE stud_emp (
|
|
) INHERITS (emp, student);
|
|
|
|
\set filename :abs_srcdir '/data/stud_emp.data'
|
|
-COPY stud_emp FROM :'filename';
|
|
+\set command '\\copy stud_emp FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE stud_emp;
|
|
|
|
CREATE TABLE road (
|
|
@@ -208,7 +214,8 @@ CREATE TABLE road (
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/streets.data'
|
|
-COPY road FROM :'filename';
|
|
+\set command '\\copy road FROM ' :'filename';
|
|
+:command
|
|
VACUUM ANALYZE road;
|
|
|
|
CREATE TABLE ihighway () INHERITS (road);
|
|
diff --git a/src/test/regress/sql/tsearch.sql b/src/test/regress/sql/tsearch.sql
|
|
index fbd26cdba4..7ec2d78eee 100644
|
|
--- a/src/test/regress/sql/tsearch.sql
|
|
+++ b/src/test/regress/sql/tsearch.sql
|
|
@@ -49,7 +49,8 @@ CREATE TABLE test_tsvector(
|
|
);
|
|
|
|
\set filename :abs_srcdir '/data/tsearch.data'
|
|
-COPY test_tsvector FROM :'filename';
|
|
+\set command '\\copy test_tsvector FROM ' :'filename';
|
|
+:command
|
|
|
|
ANALYZE test_tsvector;
|
|
|
|
diff --git a/src/test/regress/sql/updatable_views.sql b/src/test/regress/sql/updatable_views.sql
|
|
index 93b693ae83..2983475265 100644
|
|
--- a/src/test/regress/sql/updatable_views.sql
|
|
+++ b/src/test/regress/sql/updatable_views.sql
|
|
@@ -569,9 +569,9 @@ DROP TABLE base_tbl CASCADE;
|
|
|
|
-- permissions checks
|
|
|
|
-CREATE USER regress_view_user1;
|
|
-CREATE USER regress_view_user2;
|
|
-CREATE USER regress_view_user3;
|
|
+CREATE USER regress_view_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_view_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+CREATE USER regress_view_user3 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
SET SESSION AUTHORIZATION regress_view_user1;
|
|
CREATE TABLE base_tbl(a int, b text, c float);
|
|
@@ -1909,8 +1909,8 @@ drop view uv_iocu_view;
|
|
drop table uv_iocu_tab;
|
|
|
|
-- ON CONFLICT DO UPDATE permissions checks
|
|
-create user regress_view_user1;
|
|
-create user regress_view_user2;
|
|
+create user regress_view_user1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
+create user regress_view_user2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
|
|
set session authorization regress_view_user1;
|
|
create table base_tbl(a int unique, b text, c float);
|
|
diff --git a/src/test/regress/sql/update.sql b/src/test/regress/sql/update.sql
|
|
index 8b4707eb9c..b9041f8134 100644
|
|
--- a/src/test/regress/sql/update.sql
|
|
+++ b/src/test/regress/sql/update.sql
|
|
@@ -342,7 +342,7 @@ DROP FUNCTION func_parted_mod_b();
|
|
-----------------------------------------
|
|
|
|
ALTER TABLE range_parted ENABLE ROW LEVEL SECURITY;
|
|
-CREATE USER regress_range_parted_user;
|
|
+CREATE USER regress_range_parted_user PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
GRANT ALL ON range_parted, mintab TO regress_range_parted_user;
|
|
CREATE POLICY seeall ON range_parted AS PERMISSIVE FOR SELECT USING (true);
|
|
CREATE POLICY policy_range_parted ON range_parted for UPDATE USING (true) WITH CHECK (c % 2 = 0);
|
|
diff --git a/src/test/regress/sql/vacuum.sql b/src/test/regress/sql/vacuum.sql
|
|
index 548cd7acca..5b15d4dab0 100644
|
|
--- a/src/test/regress/sql/vacuum.sql
|
|
+++ b/src/test/regress/sql/vacuum.sql
|
|
@@ -335,7 +335,7 @@ CREATE TABLE vacowned (a int);
|
|
CREATE TABLE vacowned_parted (a int) PARTITION BY LIST (a);
|
|
CREATE TABLE vacowned_part1 PARTITION OF vacowned_parted FOR VALUES IN (1);
|
|
CREATE TABLE vacowned_part2 PARTITION OF vacowned_parted FOR VALUES IN (2);
|
|
-CREATE ROLE regress_vacuum;
|
|
+CREATE ROLE regress_vacuum PASSWORD NEON_PASSWORD_PLACEHOLDER;
|
|
SET ROLE regress_vacuum;
|
|
-- Simple table
|
|
VACUUM vacowned;
|