diff options
| author | Tom Lane | 2002-03-21 23:27:25 +0000 |
|---|---|---|
| committer | Tom Lane | 2002-03-21 23:27:25 +0000 |
| commit | 56c9b73c1d426c79a604df6d6f36293dd9f18754 (patch) | |
| tree | e381610845e8693ec025af08f4ddc405247461d9 /src/test | |
| parent | 6137ed1b591920d919e437fbf6e2ea07de44a883 (diff) | |
Change the aclchk.c routines to uniformly use OIDs to identify the
objects to be privilege-checked. Some change in their APIs would be
necessary no matter what in the schema environment, and simply getting
rid of the name-based interface entirely seems like the best way.
Diffstat (limited to 'src/test')
| -rw-r--r-- | src/test/regress/expected/errors.out | 2 | ||||
| -rw-r--r-- | src/test/regress/expected/privileges.out | 6 |
2 files changed, 4 insertions, 4 deletions
diff --git a/src/test/regress/expected/errors.out b/src/test/regress/expected/errors.out index 625c6d7499d..bd9707c2bdb 100644 --- a/src/test/regress/expected/errors.out +++ b/src/test/regress/expected/errors.out @@ -221,7 +221,7 @@ drop rule 314159; ERROR: parser: parse error at or near "314159" -- no such rule drop rule nonesuch; -ERROR: Rule or view "nonesuch" not found +ERROR: Rule "nonesuch" not found -- bad keyword drop tuple rule nonesuch; ERROR: parser: parse error at or near "tuple" diff --git a/src/test/regress/expected/privileges.out b/src/test/regress/expected/privileges.out index 0bf560a949f..6c9b84dda2b 100644 --- a/src/test/regress/expected/privileges.out +++ b/src/test/regress/expected/privileges.out @@ -90,7 +90,7 @@ ERROR: LOCK TABLE: permission denied COPY atest2 FROM stdin; -- fail ERROR: atest2: Permission denied. GRANT ALL ON atest1 TO PUBLIC; -- fail -ERROR: permission denied +ERROR: atest1: permission denied -- checks in subquery, both ok SELECT * FROM atest1 WHERE ( b IN ( SELECT col1 FROM atest2 ) ); a | b @@ -246,9 +246,9 @@ ERROR: user "nosuchuser" does not exist select has_table_privilege('pg_shadow','sel'); ERROR: has_table_privilege: invalid privilege type sel select has_table_privilege(-999999,'pg_shadow','update'); -ERROR: pg_aclcheck: invalid user id 4293967297 +ERROR: pg_class_aclcheck: invalid user id 4293967297 select has_table_privilege(1,'rule'); -ERROR: has_table_privilege: invalid relation oid 1 +ERROR: pg_class_aclcheck: relation 1 not found -- superuser \c - select has_table_privilege(current_user,'pg_shadow','select'); |
