2003-08-18 23:08:08 +02:00
|
|
|
|
# Test of GRANT commands
|
|
|
|
|
|
2005-03-30 01:50:16 +02:00
|
|
|
|
# Grant tests not performed with embedded server
|
|
|
|
|
-- source include/not_embedded.inc
|
|
|
|
|
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Save the initial number of concurrent sessions
|
|
|
|
|
--source include/count_sessions.inc
|
|
|
|
|
|
BUG#37975: wait_for_slave_* should increase the timeout
Problem 1: tests often fail in pushbuild with a timeout when waiting
for the slave to start/stop/receive error.
Fix 1: Updated the wait_for_slave_* macros in the following way:
- The timeout is increased by a factor ten
- Refactored the macros so that wait_for_slave_param does the work for
the other macros.
Problem 2: Tests are often incorrectly written, lacking a
source include/wait_for_slave_to_[start|stop].inc.
Fix 2: Improved the chance to get it right by adding
include/start_slave.inc and include/stop_slave.inc, and updated tests
to use these.
Problem 3: The the built-in test language command
wait_for_slave_to_stop is a misnomer (does not wait for the slave io
thread) and does not give as much debug info in case of failure as
the otherwise equivalent macro
source include/wait_for_slave_sql_to_stop.inc
Fix 3: Replaced all calls to the built-in command by a call to the
macro.
Problem 4: Some, but not all, of the wait_for_slave_* macros had an
implicit connection slave. This made some tests confusing to read,
and made it more difficult to use the macro in circular replication
scenarios, where the connection named master needs to wait.
Fix 4: Removed the implicit connection slave from all
wait_for_slave_* macros, and updated tests to use an explicit
connection slave where necessary.
Problem 5: The macros wait_slave_status.inc and wait_show_pattern.inc
were unused. Moreover, using them is difficult and error-prone.
Fix 5: remove these macros.
Problem 6: log_bin_trust_function_creators_basic failed when running
tests because it assumed @@global.log_bin_trust_function_creators=1,
and some tests modified this variable without resetting it to its
original value.
Fix 6: All tests that use this variable have been updated so that
they reset the value at end of test.
mysql-test/extra/rpl_tests/rpl_extraMaster_Col.test:
Replaced wait_for_slave_to_stop by include/wait_for_slave_sql_to_stop.inc
mysql-test/extra/rpl_tests/rpl_extraSlave_Col.test:
Replaced wait_for_slave_to_stop by include/wait_for_slave_sql_to_stop.inc
Added connection slave since includ/wait_for_slave_sql_to_stop.inc
does not do that anymore.
mysql-test/extra/rpl_tests/rpl_log.test:
Replaced start slave+wait_slave_status by start_slave.inc
mysql-test/include/reset_master_and_slave.inc:
replaced start/stop slave by start_slave.inc/stop_slave.inc
mysql-test/include/sync_slave_io_with_master.inc:
Improved comments and error message.
mysql-test/include/wait_for_slave_io_to_stop.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_for_slave_param.inc:
- Improved usage instructions
- Added more debug info in case of timeout
- Added parameters $slave_param_comparison, $slave_timeout,
$slave_keep_connection, $slave_error_message
mysql-test/include/wait_for_slave_sql_error.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_for_slave_sql_to_start.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_for_slave_sql_to_stop.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_for_slave_to_start.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_for_slave_to_stop.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_show_pattern.inc:
Removed unused (and error-prone) file
mysql-test/include/wait_slave_status.inc:
Removed unused (and error-prone) file
mysql-test/suite/binlog/t/binlog_auto_increment_bug33029.test:
Renamed $keep_connection to $slave_keep_connection.
mysql-test/suite/rpl/t/rpl_bug26395.test:
Replace stop slave by stop_slave.inc
mysql-test/suite/rpl/t/rpl_circular_for_4_hosts.test:
Replace start/stop slave by start_slave.inc/stop_slave.inc.
Replace wait_for_slave_param by wait_for_slave_sql_to_stop.inc.
mysql-test/suite/rpl/t/rpl_dual_pos_advance.test:
Renamed $keep_connection to $slave_keep_connection.
mysql-test/suite/rpl/t/rpl_flushlog_loop.test:
Replace wait_slave_status by start_slave.inc
mysql-test/suite/rpl/t/rpl_idempotency.test:
Added connection slave since wait_for_slave_sql_to_stop.inc does not
do that any more.
mysql-test/suite/rpl/t/rpl_incident.test:
Replaced wait_for_slave_to_stop by wait_for_slave_sql_to_stop.inc
mysql-test/suite/rpl/t/rpl_init_slave.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
Replaced save_master_pos;connection slave;sync_with_master by
sync_slave_with_master.
mysql-test/suite/rpl/t/rpl_log_pos.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
Replaced wait_for_slave_param by other wait_for_slave_* macros.
mysql-test/suite/rpl/t/rpl_packet.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_row_inexist_tbl.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_row_stop_middle_update.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_row_until.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
Replaced save_master_pos;connection slave;sync_with_master by
sync_slave_with_master.
mysql-test/suite/rpl/t/rpl_server_id1.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_slave_grp_exec.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_slave_skip.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_slave_status.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_sp.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/suite/rpl/t/rpl_sp_effects.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/suite/rpl/t/rpl_stm_until.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
Replaced save_master_pos;connection slave;sync_with_master by
sync_slave_with_master.
mysql-test/suite/rpl_ndb/t/rpl_ndb_basic.test:
Replaced start slave by start_slave.inc.
Added explicit connection slave since wait_for_slave_sql_to_stop.inc
does not do that anymore.
mysql-test/t/disabled.def:
Disabled failing test.
mysql-test/t/func_time.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/grant.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/grant2.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/innodb_notembedded.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/log_bin_trust_function_creators_func.test:
Restore @@global.log_bin_trust_function_creators at end of test.
Clean up at end of test by dropping the created user.
mysql-test/t/query_cache.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/query_cache_notembedded.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/rpl_init_slave_func.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/t/timezone2.test:
Restore @@global.log_bin_trust_function_creators at end of test.
2008-07-10 18:09:39 +02:00
|
|
|
|
SET @old_log_bin_trust_function_creators= @@global.log_bin_trust_function_creators;
|
2007-04-13 13:04:57 +02:00
|
|
|
|
SET GLOBAL log_bin_trust_function_creators = 1;
|
|
|
|
|
|
2003-08-18 23:08:08 +02:00
|
|
|
|
# Cleanup
|
REVOKE all privileges and delete user(244)
include/mysqld_error.h:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/r/grant.result:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/t/grant.test:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/czech/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/danish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/dutch/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/english/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/estonian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/french/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/german/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/greek/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/hungarian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/italian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/japanese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/korean/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian-ny/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/polish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/portuguese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/romanian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/russian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/serbian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/slovak/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/spanish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/swedish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/ukrainian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
2003-06-06 14:43:23 +02:00
|
|
|
|
--disable_warnings
|
|
|
|
|
drop table if exists t1;
|
2005-07-05 12:36:36 +02:00
|
|
|
|
drop database if exists mysqltest;
|
REVOKE all privileges and delete user(244)
include/mysqld_error.h:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/r/grant.result:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/t/grant.test:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/czech/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/danish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/dutch/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/english/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/estonian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/french/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/german/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/greek/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/hungarian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/italian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/japanese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/korean/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian-ny/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/polish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/portuguese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/romanian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/russian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/serbian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/slovak/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/spanish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/swedish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/ukrainian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
2003-06-06 14:43:23 +02:00
|
|
|
|
--enable_warnings
|
|
|
|
|
|
2004-12-18 03:07:32 +01:00
|
|
|
|
connect (master,localhost,root,,);
|
|
|
|
|
connection master;
|
2004-07-08 15:54:07 +02:00
|
|
|
|
SET NAMES binary;
|
|
|
|
|
|
2002-09-05 15:17:08 +02:00
|
|
|
|
#
|
|
|
|
|
# Test that SSL options works properly
|
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
delete from mysql.user where user='mysqltest_1';
|
|
|
|
|
delete from mysql.db where user='mysqltest_1';
|
|
|
|
|
flush privileges;
|
|
|
|
|
grant select on mysqltest.* to mysqltest_1@localhost require cipher "EDH-RSA-DES-CBC3-SHA";
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
grant delete on mysqltest.* to mysqltest_1@localhost;
|
2002-09-11 05:40:08 +02:00
|
|
|
|
select * from mysql.user where user="mysqltest_1";
|
2002-09-05 15:17:08 +02:00
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
revoke delete on mysqltest.* from mysqltest_1@localhost;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
grant select on mysqltest.* to mysqltest_1@localhost require NONE;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
grant USAGE on mysqltest.* to mysqltest_1@localhost require cipher "EDH-RSA-DES-CBC3-SHA" AND SUBJECT "testsubject" ISSUER "MySQL AB";
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
revoke all privileges on mysqltest.* from mysqltest_1@localhost;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
delete from mysql.user where user='mysqltest_1';
|
|
|
|
|
flush privileges;
|
2002-09-16 14:55:19 +02:00
|
|
|
|
|
2004-12-23 19:59:36 +01:00
|
|
|
|
#
|
|
|
|
|
# Test of GRANTS specifying user limits
|
|
|
|
|
#
|
|
|
|
|
delete from mysql.user where user='mysqltest_1';
|
|
|
|
|
flush privileges;
|
|
|
|
|
grant usage on *.* to mysqltest_1@localhost with max_queries_per_hour 10;
|
|
|
|
|
select * from mysql.user where user="mysqltest_1";
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
grant usage on *.* to mysqltest_1@localhost with max_updates_per_hour 20 max_connections_per_hour 30;
|
|
|
|
|
select * from mysql.user where user="mysqltest_1";
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
# This is just to double check that one won't ignore results of selects
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
delete from mysql.user where user='mysqltest_1';
|
|
|
|
|
flush privileges;
|
|
|
|
|
|
2002-09-16 14:55:19 +02:00
|
|
|
|
#
|
|
|
|
|
# Test that the new db privileges are stored/retrieved correctly
|
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
grant CREATE TEMPORARY TABLES, LOCK TABLES on mysqltest.* to mysqltest_1@localhost;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
revoke CREATE TEMPORARY TABLES on mysqltest.* from mysqltest_1@localhost;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
grant ALL PRIVILEGES on mysqltest.* to mysqltest_1@localhost with GRANT OPTION;
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
revoke LOCK TABLES, ALTER on mysqltest.* from mysqltest_1@localhost;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
revoke all privileges on mysqltest.* from mysqltest_1@localhost;
|
|
|
|
|
delete from mysql.user where user='mysqltest_1';
|
|
|
|
|
flush privileges;
|
2003-06-23 19:03:59 +02:00
|
|
|
|
grant usage on test.* to mysqltest_1@localhost with grant option;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
delete from mysql.user where user='mysqltest_1';
|
|
|
|
|
delete from mysql.db where user='mysqltest_1';
|
|
|
|
|
delete from mysql.tables_priv where user='mysqltest_1';
|
|
|
|
|
delete from mysql.columns_priv where user='mysqltest_1';
|
|
|
|
|
flush privileges;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_NONEXISTING_GRANT
|
2004-04-08 12:58:06 +02:00
|
|
|
|
show grants for mysqltest_1@localhost;
|
2003-06-23 19:03:59 +02:00
|
|
|
|
|
|
|
|
|
#
|
|
|
|
|
# Test what happens when you have same table and colum level grants
|
|
|
|
|
#
|
2003-01-11 17:02:10 +01:00
|
|
|
|
|
2003-06-23 19:03:59 +02:00
|
|
|
|
create table t1 (a int);
|
|
|
|
|
GRANT select,update,insert on t1 to mysqltest_1@localhost;
|
|
|
|
|
GRANT select (a), update (a),insert(a), references(a) on t1 to mysqltest_1@localhost;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
select table_priv,column_priv from mysql.tables_priv where user="mysqltest_1";
|
|
|
|
|
REVOKE select (a), update on t1 from mysqltest_1@localhost;
|
|
|
|
|
show grants for mysqltest_1@localhost;
|
2003-09-09 19:06:50 +02:00
|
|
|
|
REVOKE select,update,insert,insert (a) on t1 from mysqltest_1@localhost;
|
2003-06-23 19:03:59 +02:00
|
|
|
|
show grants for mysqltest_1@localhost;
|
2003-09-09 19:06:50 +02:00
|
|
|
|
GRANT select,references on t1 to mysqltest_1@localhost;
|
2003-06-23 19:03:59 +02:00
|
|
|
|
select table_priv,column_priv from mysql.tables_priv where user="mysqltest_1";
|
2003-09-09 19:06:50 +02:00
|
|
|
|
grant all on test.* to mysqltest_3@localhost with grant option;
|
|
|
|
|
revoke all on test.* from mysqltest_3@localhost;
|
|
|
|
|
show grants for mysqltest_3@localhost;
|
|
|
|
|
revoke grant option on test.* from mysqltest_3@localhost;
|
|
|
|
|
show grants for mysqltest_3@localhost;
|
|
|
|
|
grant all on test.t1 to mysqltest_2@localhost with grant option;
|
|
|
|
|
revoke all on test.t1 from mysqltest_2@localhost;
|
|
|
|
|
show grants for mysqltest_2@localhost;
|
|
|
|
|
revoke grant option on test.t1 from mysqltest_2@localhost;
|
|
|
|
|
show grants for mysqltest_2@localhost;
|
|
|
|
|
delete from mysql.user where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
|
|
|
|
|
delete from mysql.db where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
|
|
|
|
|
delete from mysql.tables_priv where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
|
|
|
|
|
delete from mysql.columns_priv where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
|
2003-06-23 19:03:59 +02:00
|
|
|
|
flush privileges;
|
|
|
|
|
drop table t1;
|
2003-08-18 23:08:08 +02:00
|
|
|
|
|
|
|
|
|
#
|
|
|
|
|
# Test some error conditions
|
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_WRONG_USAGE
|
2003-07-01 23:10:47 +02:00
|
|
|
|
GRANT FILE on mysqltest.* to mysqltest_1@localhost;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
select 1; # To test that the previous command didn't cause problems
|
2003-01-11 17:02:10 +01:00
|
|
|
|
|
2004-08-12 11:49:16 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#4898 User privileges depending on ORDER BY Settings of table db
|
2004-08-12 11:49:16 +02:00
|
|
|
|
#
|
|
|
|
|
insert into mysql.user (host, user) values ('localhost', 'test11');
|
2009-02-05 21:47:23 +01:00
|
|
|
|
insert into mysql.db (host, db, user, select_priv) values
|
2004-08-12 11:49:16 +02:00
|
|
|
|
('localhost', 'a%', 'test11', 'Y'), ('localhost', 'ab%', 'test11', 'Y');
|
2004-08-12 13:02:12 +02:00
|
|
|
|
alter table mysql.db order by db asc;
|
2004-08-12 11:49:16 +02:00
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for test11@localhost;
|
|
|
|
|
alter table mysql.db order by db desc;
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for test11@localhost;
|
|
|
|
|
delete from mysql.user where user='test11';
|
|
|
|
|
delete from mysql.db where user='test11';
|
2004-11-11 21:59:03 +01:00
|
|
|
|
|
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#6123 GRANT USAGE inserts useless Db row
|
2004-11-11 21:59:03 +01:00
|
|
|
|
#
|
2004-11-12 10:17:53 +01:00
|
|
|
|
create database mysqltest1;
|
|
|
|
|
grant usage on mysqltest1.* to test6123 identified by 'magic123';
|
|
|
|
|
select host,db,user,select_priv,insert_priv from mysql.db where db="mysqltest1";
|
2004-11-11 21:59:03 +01:00
|
|
|
|
delete from mysql.user where user='test6123';
|
2004-11-12 10:17:53 +01:00
|
|
|
|
drop database mysqltest1;
|
|
|
|
|
|
REVOKE all privileges and delete user(244)
include/mysqld_error.h:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/r/grant.result:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/t/grant.test:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/czech/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/danish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/dutch/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/english/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/estonian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/french/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/german/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/greek/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/hungarian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/italian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/japanese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/korean/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian-ny/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/polish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/portuguese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/romanian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/russian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/serbian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/slovak/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/spanish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/swedish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/ukrainian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
2003-06-06 14:43:23 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Test for 'drop user', 'revoke privileges, grant'
|
REVOKE all privileges and delete user(244)
include/mysqld_error.h:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/r/grant.result:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/t/grant.test:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/czech/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/danish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/dutch/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/english/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/estonian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/french/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/german/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/greek/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/hungarian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/italian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/japanese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/korean/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian-ny/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/polish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/portuguese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/romanian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/russian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/serbian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/slovak/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/spanish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/swedish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/ukrainian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
2003-06-06 14:43:23 +02:00
|
|
|
|
#
|
|
|
|
|
|
2003-08-18 23:08:08 +02:00
|
|
|
|
create table t1 (a int);
|
REVOKE all privileges and delete user(244)
include/mysqld_error.h:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/r/grant.result:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/t/grant.test:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/czech/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/danish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/dutch/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/english/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/estonian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/french/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/german/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/greek/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/hungarian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/italian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/japanese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/korean/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian-ny/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/polish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/portuguese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/romanian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/russian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/serbian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/slovak/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/spanish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/swedish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/ukrainian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
2003-06-06 14:43:23 +02:00
|
|
|
|
grant ALL PRIVILEGES on *.* to drop_user2@localhost with GRANT OPTION;
|
|
|
|
|
show grants for drop_user2@localhost;
|
2004-02-15 17:59:52 +01:00
|
|
|
|
revoke all privileges, grant option from drop_user2@localhost;
|
REVOKE all privileges and delete user(244)
include/mysqld_error.h:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/r/grant.result:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/t/grant.test:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/czech/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/danish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/dutch/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/english/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/estonian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/french/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/german/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/greek/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/hungarian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/italian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/japanese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/korean/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian-ny/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/polish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/portuguese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/romanian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/russian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/serbian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/slovak/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/spanish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/swedish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/ukrainian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
2003-06-06 14:43:23 +02:00
|
|
|
|
drop user drop_user2@localhost;
|
|
|
|
|
|
|
|
|
|
grant ALL PRIVILEGES on *.* to drop_user@localhost with GRANT OPTION;
|
|
|
|
|
grant ALL PRIVILEGES on test.* to drop_user@localhost with GRANT OPTION;
|
|
|
|
|
grant select(a) on test.t1 to drop_user@localhost;
|
|
|
|
|
show grants for drop_user@localhost;
|
2004-03-17 13:19:09 +01:00
|
|
|
|
|
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#3086 SHOW GRANTS doesn't follow ANSI_QUOTES
|
2004-03-17 13:19:09 +01:00
|
|
|
|
#
|
|
|
|
|
set sql_mode=ansi_quotes;
|
|
|
|
|
show grants for drop_user@localhost;
|
|
|
|
|
set sql_mode=default;
|
|
|
|
|
|
|
|
|
|
set sql_quote_show_create=0;
|
|
|
|
|
show grants for drop_user@localhost;
|
|
|
|
|
set sql_mode="ansi_quotes";
|
|
|
|
|
show grants for drop_user@localhost;
|
|
|
|
|
set sql_quote_show_create=1;
|
|
|
|
|
show grants for drop_user@localhost;
|
|
|
|
|
set sql_mode="";
|
|
|
|
|
show grants for drop_user@localhost;
|
|
|
|
|
|
2004-02-15 17:59:52 +01:00
|
|
|
|
revoke all privileges, grant option from drop_user@localhost;
|
REVOKE all privileges and delete user(244)
include/mysqld_error.h:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/r/grant.result:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/t/grant.test:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/czech/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/danish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/dutch/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/english/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/estonian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/french/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/german/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/greek/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/hungarian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/italian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/japanese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/korean/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian-ny/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/polish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/portuguese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/romanian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/russian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/serbian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/slovak/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/spanish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/swedish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/ukrainian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
2003-06-06 14:43:23 +02:00
|
|
|
|
show grants for drop_user@localhost;
|
|
|
|
|
drop user drop_user@localhost;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_REVOKE_GRANTS
|
2004-02-15 17:59:52 +01:00
|
|
|
|
revoke all privileges, grant option from drop_user@localhost;
|
REVOKE all privileges and delete user(244)
include/mysqld_error.h:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/r/grant.result:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/t/grant.test:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/czech/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/danish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/dutch/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/english/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/estonian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/french/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/german/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/greek/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/hungarian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/italian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/japanese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/korean/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian-ny/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/polish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/portuguese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/romanian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/russian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/serbian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/slovak/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/spanish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/swedish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/ukrainian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
2003-06-06 14:43:23 +02:00
|
|
|
|
|
|
|
|
|
grant select(a) on test.t1 to drop_user1@localhost;
|
|
|
|
|
grant select on test.t1 to drop_user2@localhost;
|
|
|
|
|
grant select on test.* to drop_user3@localhost;
|
|
|
|
|
grant select on *.* to drop_user4@localhost;
|
2004-11-25 21:55:49 +01:00
|
|
|
|
# Drop user now implicitly revokes all privileges.
|
REVOKE all privileges and delete user(244)
include/mysqld_error.h:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/r/grant.result:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/t/grant.test:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/czech/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/danish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/dutch/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/english/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/estonian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/french/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/german/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/greek/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/hungarian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/italian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/japanese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/korean/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian-ny/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/polish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/portuguese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/romanian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/russian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/serbian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/slovak/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/spanish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/swedish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/ukrainian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
2003-06-06 14:43:23 +02:00
|
|
|
|
drop user drop_user1@localhost, drop_user2@localhost, drop_user3@localhost,
|
|
|
|
|
drop_user4@localhost;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_REVOKE_GRANTS
|
2004-02-15 17:59:52 +01:00
|
|
|
|
revoke all privileges, grant option from drop_user1@localhost, drop_user2@localhost,
|
REVOKE all privileges and delete user(244)
include/mysqld_error.h:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/r/grant.result:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/t/grant.test:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/czech/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/danish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/dutch/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/english/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/estonian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/french/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/german/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/greek/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/hungarian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/italian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/japanese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/korean/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian-ny/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/polish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/portuguese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/romanian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/russian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/serbian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/slovak/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/spanish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/swedish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/ukrainian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
2003-06-06 14:43:23 +02:00
|
|
|
|
drop_user3@localhost, drop_user4@localhost;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_CANNOT_USER
|
REVOKE all privileges and delete user(244)
include/mysqld_error.h:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/r/grant.result:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
mysql-test/t/grant.test:
Test for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/czech/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/danish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/dutch/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/english/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/estonian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/french/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/german/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/greek/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/hungarian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/italian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/japanese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/korean/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian-ny/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/norwegian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/polish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/portuguese/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/romanian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/russian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/serbian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/slovak/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/spanish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/swedish/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
sql/share/ukrainian/errmsg.txt:
Error messages for DROP USER, REVOKE ALL PRIVILEGES, GRANT
2003-06-06 14:43:23 +02:00
|
|
|
|
drop user drop_user1@localhost, drop_user2@localhost, drop_user3@localhost,
|
|
|
|
|
drop_user4@localhost;
|
|
|
|
|
drop table t1;
|
2004-03-01 20:54:08 +01:00
|
|
|
|
grant usage on *.* to mysqltest_1@localhost identified by "password";
|
2004-11-25 21:55:49 +01:00
|
|
|
|
grant select, update, insert on test.* to mysqltest_1@localhost;
|
2004-03-01 20:54:08 +01:00
|
|
|
|
show grants for mysqltest_1@localhost;
|
|
|
|
|
drop user mysqltest_1@localhost;
|
2004-05-14 09:16:27 +02:00
|
|
|
|
|
|
|
|
|
#
|
2009-02-09 22:00:15 +01:00
|
|
|
|
# Bug#3403 Wrong encoding in SHOW GRANTS output
|
2004-05-14 09:16:27 +02:00
|
|
|
|
#
|
|
|
|
|
SET NAMES koi8r;
|
|
|
|
|
CREATE DATABASE <20><>;
|
|
|
|
|
USE <20><>;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
CREATE TABLE <20><><EFBFBD> (<28><><EFBFBD> INT);
|
2004-05-14 09:16:27 +02:00
|
|
|
|
|
|
|
|
|
GRANT SELECT ON <20><>.* TO <20><><EFBFBD><EFBFBD>@localhost;
|
|
|
|
|
SHOW GRANTS FOR <20><><EFBFBD><EFBFBD>@localhost;
|
|
|
|
|
REVOKE SELECT ON <20><>.* FROM <20><><EFBFBD><EFBFBD>@localhost;
|
|
|
|
|
|
|
|
|
|
GRANT SELECT ON <20><>.<2E><><EFBFBD> TO <20><><EFBFBD><EFBFBD>@localhost;
|
|
|
|
|
SHOW GRANTS FOR <20><><EFBFBD><EFBFBD>@localhost;
|
|
|
|
|
REVOKE SELECT ON <20><>.<2E><><EFBFBD> FROM <20><><EFBFBD><EFBFBD>@localhost;
|
|
|
|
|
|
|
|
|
|
GRANT SELECT (<28><><EFBFBD>) ON <20><>.<2E><><EFBFBD> TO <20><><EFBFBD><EFBFBD>@localhost;
|
|
|
|
|
SHOW GRANTS FOR <20><><EFBFBD><EFBFBD>@localhost;
|
|
|
|
|
REVOKE SELECT (<28><><EFBFBD>) ON <20><>.<2E><><EFBFBD> FROM <20><><EFBFBD><EFBFBD>@localhost;
|
|
|
|
|
|
2004-11-25 21:55:49 +01:00
|
|
|
|
# Revoke does not drop user. Leave a clean user table for the next tests.
|
|
|
|
|
DROP USER <20><><EFBFBD><EFBFBD>@localhost;
|
|
|
|
|
|
2004-05-14 09:16:27 +02:00
|
|
|
|
DROP DATABASE <20><>;
|
|
|
|
|
SET NAMES latin1;
|
2004-07-20 23:45:52 +02:00
|
|
|
|
|
2004-10-01 14:50:26 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#5831 REVOKE ALL PRIVILEGES, GRANT OPTION does not revoke everything
|
2004-10-01 14:50:26 +02:00
|
|
|
|
#
|
|
|
|
|
USE test;
|
|
|
|
|
CREATE TABLE t1 (a int );
|
|
|
|
|
CREATE TABLE t2 LIKE t1;
|
|
|
|
|
CREATE TABLE t3 LIKE t1;
|
|
|
|
|
CREATE TABLE t4 LIKE t1;
|
|
|
|
|
CREATE TABLE t5 LIKE t1;
|
|
|
|
|
CREATE TABLE t6 LIKE t1;
|
|
|
|
|
CREATE TABLE t7 LIKE t1;
|
|
|
|
|
CREATE TABLE t8 LIKE t1;
|
|
|
|
|
CREATE TABLE t9 LIKE t1;
|
|
|
|
|
CREATE TABLE t10 LIKE t1;
|
2004-10-01 21:48:48 +02:00
|
|
|
|
CREATE DATABASE testdb1;
|
|
|
|
|
CREATE DATABASE testdb2;
|
|
|
|
|
CREATE DATABASE testdb3;
|
|
|
|
|
CREATE DATABASE testdb4;
|
|
|
|
|
CREATE DATABASE testdb5;
|
|
|
|
|
CREATE DATABASE testdb6;
|
|
|
|
|
CREATE DATABASE testdb7;
|
|
|
|
|
CREATE DATABASE testdb8;
|
|
|
|
|
CREATE DATABASE testdb9;
|
|
|
|
|
CREATE DATABASE testdb10;
|
|
|
|
|
GRANT ALL ON testdb1.* TO testuser@localhost;
|
|
|
|
|
GRANT ALL ON testdb2.* TO testuser@localhost;
|
|
|
|
|
GRANT ALL ON testdb3.* TO testuser@localhost;
|
|
|
|
|
GRANT ALL ON testdb4.* TO testuser@localhost;
|
|
|
|
|
GRANT ALL ON testdb5.* TO testuser@localhost;
|
|
|
|
|
GRANT ALL ON testdb6.* TO testuser@localhost;
|
|
|
|
|
GRANT ALL ON testdb7.* TO testuser@localhost;
|
|
|
|
|
GRANT ALL ON testdb8.* TO testuser@localhost;
|
|
|
|
|
GRANT ALL ON testdb9.* TO testuser@localhost;
|
|
|
|
|
GRANT ALL ON testdb10.* TO testuser@localhost;
|
2004-10-01 14:50:26 +02:00
|
|
|
|
GRANT SELECT ON test.t1 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT ON test.t2 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT ON test.t3 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT ON test.t4 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT ON test.t5 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT ON test.t6 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT ON test.t7 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT ON test.t8 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT ON test.t9 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT ON test.t10 TO testuser@localhost;
|
2004-10-01 21:48:48 +02:00
|
|
|
|
GRANT SELECT (a) ON test.t1 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT (a) ON test.t2 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT (a) ON test.t3 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT (a) ON test.t4 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT (a) ON test.t5 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT (a) ON test.t6 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT (a) ON test.t7 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT (a) ON test.t8 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT (a) ON test.t9 TO testuser@localhost;
|
|
|
|
|
GRANT SELECT (a) ON test.t10 TO testuser@localhost;
|
2004-10-01 14:50:26 +02:00
|
|
|
|
REVOKE ALL PRIVILEGES, GRANT OPTION FROM testuser@localhost;
|
|
|
|
|
SHOW GRANTS FOR testuser@localhost;
|
|
|
|
|
DROP USER testuser@localhost;
|
|
|
|
|
DROP TABLE t1,t2,t3,t4,t5,t6,t7,t8,t9,t10;
|
2004-10-01 21:48:48 +02:00
|
|
|
|
DROP DATABASE testdb1;
|
|
|
|
|
DROP DATABASE testdb2;
|
|
|
|
|
DROP DATABASE testdb3;
|
|
|
|
|
DROP DATABASE testdb4;
|
|
|
|
|
DROP DATABASE testdb5;
|
|
|
|
|
DROP DATABASE testdb6;
|
|
|
|
|
DROP DATABASE testdb7;
|
|
|
|
|
DROP DATABASE testdb8;
|
|
|
|
|
DROP DATABASE testdb9;
|
|
|
|
|
DROP DATABASE testdb10;
|
2004-10-01 14:50:26 +02:00
|
|
|
|
|
2004-12-02 10:34:30 +01:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#6932 a problem with 'revoke ALL PRIVILEGES'
|
2004-12-02 10:34:30 +01:00
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
create table t1(a int, b int, c int, d int);
|
|
|
|
|
grant insert(b), insert(c), insert(d), insert(a) on t1 to grant_user@localhost;
|
|
|
|
|
show grants for grant_user@localhost;
|
2006-05-26 10:47:53 +02:00
|
|
|
|
select Host,Db,User,Table_name,Column_name,Column_priv from mysql.columns_priv order by Column_name;
|
2004-12-02 10:34:30 +01:00
|
|
|
|
revoke ALL PRIVILEGES on t1 from grant_user@localhost;
|
|
|
|
|
show grants for grant_user@localhost;
|
|
|
|
|
select Host,Db,User,Table_name,Column_name,Column_priv from mysql.columns_priv;
|
|
|
|
|
drop user grant_user@localhost;
|
|
|
|
|
drop table t1;
|
2004-09-06 14:14:10 +02:00
|
|
|
|
|
2004-12-18 03:07:32 +01:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#7391 Cross-database multi-table UPDATE security problem
|
2004-12-18 03:07:32 +01:00
|
|
|
|
#
|
|
|
|
|
create database mysqltest_1;
|
|
|
|
|
create database mysqltest_2;
|
|
|
|
|
create table mysqltest_1.t1 select 1 a, 2 q;
|
|
|
|
|
create table mysqltest_1.t2 select 1 b, 2 r;
|
|
|
|
|
create table mysqltest_2.t1 select 1 c, 2 s;
|
|
|
|
|
create table mysqltest_2.t2 select 1 d, 2 t;
|
|
|
|
|
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# test the column privileges
|
2004-12-18 03:07:32 +01:00
|
|
|
|
grant update (a) on mysqltest_1.t1 to mysqltest_3@localhost;
|
|
|
|
|
grant select (b) on mysqltest_1.t2 to mysqltest_3@localhost;
|
|
|
|
|
grant select (c) on mysqltest_2.t1 to mysqltest_3@localhost;
|
|
|
|
|
grant update (d) on mysqltest_2.t2 to mysqltest_3@localhost;
|
|
|
|
|
connect (conn1,localhost,mysqltest_3,,);
|
|
|
|
|
connection conn1;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
SELECT * FROM INFORMATION_SCHEMA.COLUMN_PRIVILEGES
|
|
|
|
|
WHERE GRANTEE = '''mysqltest_3''@''localhost'''
|
2006-05-26 10:47:53 +02:00
|
|
|
|
ORDER BY TABLE_NAME,COLUMN_NAME,PRIVILEGE_TYPE;
|
|
|
|
|
SELECT * FROM INFORMATION_SCHEMA.TABLE_PRIVILEGES
|
2009-02-05 21:47:23 +01:00
|
|
|
|
WHERE GRANTEE = '''mysqltest_3''@''localhost'''
|
2006-05-26 10:47:53 +02:00
|
|
|
|
ORDER BY TABLE_NAME,PRIVILEGE_TYPE;
|
|
|
|
|
SELECT * from INFORMATION_SCHEMA.SCHEMA_PRIVILEGES
|
2009-02-05 21:47:23 +01:00
|
|
|
|
WHERE GRANTEE = '''mysqltest_3''@''localhost'''
|
2006-05-26 10:47:53 +02:00
|
|
|
|
ORDER BY TABLE_SCHEMA,PRIVILEGE_TYPE;
|
|
|
|
|
SELECT * from INFORMATION_SCHEMA.USER_PRIVILEGES
|
|
|
|
|
WHERE GRANTEE = '''mysqltest_3''@''localhost'''
|
|
|
|
|
ORDER BY TABLE_CATALOG,PRIVILEGE_TYPE;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_COLUMNACCESS_DENIED_ERROR
|
2004-12-18 03:07:32 +01:00
|
|
|
|
update mysqltest_1.t1, mysqltest_1.t2 set q=10 where b=1;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_COLUMNACCESS_DENIED_ERROR
|
2004-12-30 23:44:00 +01:00
|
|
|
|
update mysqltest_1.t2, mysqltest_2.t2 set d=20 where d=1;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2004-12-18 03:07:32 +01:00
|
|
|
|
update mysqltest_1.t1, mysqltest_2.t2 set d=20 where d=1;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2004-12-18 03:07:32 +01:00
|
|
|
|
update mysqltest_2.t1, mysqltest_1.t2 set c=20 where b=1;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_COLUMNACCESS_DENIED_ERROR
|
2004-12-18 03:07:32 +01:00
|
|
|
|
update mysqltest_2.t1, mysqltest_2.t2 set d=10 where s=2;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# the following two should work
|
2004-12-18 03:07:32 +01:00
|
|
|
|
update mysqltest_1.t1, mysqltest_2.t2 set a=10,d=10;
|
|
|
|
|
update mysqltest_1.t1, mysqltest_2.t1 set a=20 where c=20;
|
|
|
|
|
connection master;
|
|
|
|
|
select t1.*,t2.* from mysqltest_1.t1,mysqltest_1.t2;
|
|
|
|
|
select t1.*,t2.* from mysqltest_2.t1,mysqltest_2.t2;
|
|
|
|
|
revoke all on mysqltest_1.t1 from mysqltest_3@localhost;
|
|
|
|
|
revoke all on mysqltest_1.t2 from mysqltest_3@localhost;
|
|
|
|
|
revoke all on mysqltest_2.t1 from mysqltest_3@localhost;
|
|
|
|
|
revoke all on mysqltest_2.t2 from mysqltest_3@localhost;
|
|
|
|
|
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# test the db/table level privileges
|
2004-12-18 03:07:32 +01:00
|
|
|
|
grant all on mysqltest_2.* to mysqltest_3@localhost;
|
|
|
|
|
grant select on *.* to mysqltest_3@localhost;
|
2006-08-11 11:41:07 +02:00
|
|
|
|
# Next grant is needed to trigger bug#7391. Do not optimize!
|
|
|
|
|
grant select on mysqltest_2.t1 to mysqltest_3@localhost;
|
2004-12-18 03:07:32 +01:00
|
|
|
|
flush privileges;
|
|
|
|
|
disconnect conn1;
|
|
|
|
|
connect (conn2,localhost,mysqltest_3,,);
|
|
|
|
|
connection conn2;
|
|
|
|
|
use mysqltest_1;
|
|
|
|
|
update mysqltest_2.t1, mysqltest_2.t2 set c=500,d=600;
|
|
|
|
|
# the following failed before, should fail now.
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2004-12-18 03:07:32 +01:00
|
|
|
|
update mysqltest_1.t1, mysqltest_1.t2 set a=100,b=200;
|
|
|
|
|
use mysqltest_2;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# the following used to succeed, it must fail now.
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2004-12-18 03:07:32 +01:00
|
|
|
|
update mysqltest_1.t1, mysqltest_1.t2 set a=100,b=200;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2004-12-18 03:07:32 +01:00
|
|
|
|
update mysqltest_2.t1, mysqltest_1.t2 set c=100,b=200;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2004-12-18 03:07:32 +01:00
|
|
|
|
update mysqltest_1.t1, mysqltest_2.t2 set a=100,d=200;
|
2009-02-09 22:00:15 +01:00
|
|
|
|
# lets see the result
|
2004-12-18 03:07:32 +01:00
|
|
|
|
connection master;
|
|
|
|
|
select t1.*,t2.* from mysqltest_1.t1,mysqltest_1.t2;
|
|
|
|
|
select t1.*,t2.* from mysqltest_2.t1,mysqltest_2.t2;
|
|
|
|
|
|
|
|
|
|
delete from mysql.user where user='mysqltest_3';
|
|
|
|
|
delete from mysql.db where user="mysqltest_3";
|
|
|
|
|
delete from mysql.tables_priv where user="mysqltest_3";
|
|
|
|
|
delete from mysql.columns_priv where user="mysqltest_3";
|
|
|
|
|
flush privileges;
|
|
|
|
|
drop database mysqltest_1;
|
|
|
|
|
drop database mysqltest_2;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
disconnect conn2;
|
2004-12-22 12:54:39 +01:00
|
|
|
|
|
2004-07-20 23:45:52 +02:00
|
|
|
|
#
|
|
|
|
|
# just SHOW PRIVILEGES test
|
|
|
|
|
#
|
|
|
|
|
SHOW PRIVILEGES;
|
2005-04-02 05:17:15 +02:00
|
|
|
|
|
2005-02-10 03:17:40 +01:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Rights for renaming test (Bug#3270)
|
2005-02-10 03:17:40 +01:00
|
|
|
|
#
|
|
|
|
|
connect (root,localhost,root,,test,$MASTER_MYPORT,$MASTER_MYSOCK);
|
|
|
|
|
connection root;
|
|
|
|
|
--disable_warnings
|
|
|
|
|
create database mysqltest;
|
|
|
|
|
--enable_warnings
|
|
|
|
|
create table mysqltest.t1 (a int,b int,c int);
|
|
|
|
|
grant all on mysqltest.t1 to mysqltest_1@localhost;
|
|
|
|
|
connect (user1,localhost,mysqltest_1,,mysqltest,$MASTER_MYPORT,$MASTER_MYSOCK);
|
|
|
|
|
connection user1;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
-- error ER_TABLEACCESS_DENIED_ERROR
|
2005-02-10 03:17:40 +01:00
|
|
|
|
alter table t1 rename t2;
|
2007-05-11 21:19:11 +02:00
|
|
|
|
disconnect user1;
|
2005-02-10 03:17:40 +01:00
|
|
|
|
connection root;
|
|
|
|
|
revoke all privileges on mysqltest.t1 from mysqltest_1@localhost;
|
|
|
|
|
delete from mysql.user where user=_binary'mysqltest_1';
|
|
|
|
|
drop database mysqltest;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
connection default;
|
|
|
|
|
disconnect root;
|
2005-07-05 12:36:36 +02:00
|
|
|
|
|
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# check all new table privileges
|
2005-07-05 12:36:36 +02:00
|
|
|
|
#
|
|
|
|
|
CREATE USER dummy@localhost;
|
|
|
|
|
CREATE DATABASE mysqltest;
|
|
|
|
|
CREATE TABLE mysqltest.dummytable (dummyfield INT);
|
|
|
|
|
CREATE VIEW mysqltest.dummyview AS SELECT dummyfield FROM mysqltest.dummytable;
|
|
|
|
|
GRANT ALL PRIVILEGES ON mysqltest.dummytable TO dummy@localhost;
|
|
|
|
|
GRANT ALL PRIVILEGES ON mysqltest.dummyview TO dummy@localhost;
|
|
|
|
|
SHOW GRANTS FOR dummy@localhost;
|
|
|
|
|
use INFORMATION_SCHEMA;
|
|
|
|
|
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
|
|
|
|
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
|
|
|
|
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
|
|
|
|
FLUSH PRIVILEGES;
|
|
|
|
|
SHOW GRANTS FOR dummy@localhost;
|
|
|
|
|
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
|
|
|
|
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
|
|
|
|
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
|
|
|
|
SHOW FIELDS FROM mysql.tables_priv;
|
|
|
|
|
use test;
|
|
|
|
|
REVOKE ALL PRIVILEGES, GRANT OPTION FROM dummy@localhost;
|
|
|
|
|
DROP USER dummy@localhost;
|
|
|
|
|
DROP DATABASE mysqltest;
|
|
|
|
|
# check view only privileges
|
|
|
|
|
CREATE USER dummy@localhost;
|
|
|
|
|
CREATE DATABASE mysqltest;
|
|
|
|
|
CREATE TABLE mysqltest.dummytable (dummyfield INT);
|
|
|
|
|
CREATE VIEW mysqltest.dummyview AS SELECT dummyfield FROM mysqltest.dummytable;
|
|
|
|
|
GRANT CREATE VIEW ON mysqltest.dummytable TO dummy@localhost;
|
|
|
|
|
GRANT CREATE VIEW ON mysqltest.dummyview TO dummy@localhost;
|
|
|
|
|
SHOW GRANTS FOR dummy@localhost;
|
|
|
|
|
use INFORMATION_SCHEMA;
|
|
|
|
|
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
|
|
|
|
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
|
|
|
|
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
|
|
|
|
FLUSH PRIVILEGES;
|
|
|
|
|
SHOW GRANTS FOR dummy@localhost;
|
|
|
|
|
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
|
|
|
|
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
|
|
|
|
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
|
|
|
|
use test;
|
|
|
|
|
REVOKE ALL PRIVILEGES, GRANT OPTION FROM dummy@localhost;
|
|
|
|
|
DROP USER dummy@localhost;
|
|
|
|
|
DROP DATABASE mysqltest;
|
|
|
|
|
CREATE USER dummy@localhost;
|
|
|
|
|
CREATE DATABASE mysqltest;
|
|
|
|
|
CREATE TABLE mysqltest.dummytable (dummyfield INT);
|
|
|
|
|
CREATE VIEW mysqltest.dummyview AS SELECT dummyfield FROM mysqltest.dummytable;
|
|
|
|
|
GRANT SHOW VIEW ON mysqltest.dummytable TO dummy@localhost;
|
|
|
|
|
GRANT SHOW VIEW ON mysqltest.dummyview TO dummy@localhost;
|
|
|
|
|
SHOW GRANTS FOR dummy@localhost;
|
|
|
|
|
use INFORMATION_SCHEMA;
|
|
|
|
|
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
|
|
|
|
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
|
|
|
|
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
|
|
|
|
FLUSH PRIVILEGES;
|
|
|
|
|
SHOW GRANTS FOR dummy@localhost;
|
|
|
|
|
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
|
|
|
|
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
|
|
|
|
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
|
|
|
|
use test;
|
|
|
|
|
REVOKE ALL PRIVILEGES, GRANT OPTION FROM dummy@localhost;
|
|
|
|
|
DROP USER dummy@localhost;
|
|
|
|
|
DROP DATABASE mysqltest;
|
2005-06-20 19:21:35 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#11330 Entry in tables_priv with host = '' causes crash
|
2005-06-20 19:21:35 +02:00
|
|
|
|
#
|
|
|
|
|
connection default;
|
|
|
|
|
use mysql;
|
2005-07-06 00:19:04 +02:00
|
|
|
|
insert into tables_priv values ('','test_db','mysqltest_1','test_table','test_grantor',CURRENT_TIMESTAMP,'Select','Select');
|
2005-06-20 19:21:35 +02:00
|
|
|
|
flush privileges;
|
|
|
|
|
delete from tables_priv where host = '' and user = 'mysqltest_1';
|
2005-07-06 00:19:04 +02:00
|
|
|
|
flush privileges;
|
2006-05-23 11:35:14 +02:00
|
|
|
|
use test;
|
2005-07-28 02:22:47 +02:00
|
|
|
|
|
2005-08-04 12:25:03 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#10892 user variables not auto cast for comparisons
|
2005-08-04 12:25:03 +02:00
|
|
|
|
# Check that we don't get illegal mix of collations
|
|
|
|
|
#
|
|
|
|
|
set @user123="non-existent";
|
|
|
|
|
select * from mysql.db where user=@user123;
|
|
|
|
|
|
2005-11-14 13:36:06 +01:00
|
|
|
|
set names koi8r;
|
|
|
|
|
create database <20><>;
|
|
|
|
|
grant select on <20><>.* to root@localhost;
|
|
|
|
|
select hex(Db) from mysql.db where Db='<27><>';
|
|
|
|
|
show grants for root@localhost;
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for root@localhost;
|
|
|
|
|
drop database <20><>;
|
|
|
|
|
revoke all privileges on <20><>.* from root@localhost;
|
|
|
|
|
show grants for root@localhost;
|
|
|
|
|
set names latin1;
|
|
|
|
|
|
2006-01-09 10:31:07 +01:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#15598 Server crashes in specific case during setting new password
|
2006-01-09 10:31:07 +01:00
|
|
|
|
# - Caused by a user with host ''
|
|
|
|
|
#
|
2006-01-09 17:12:26 +01:00
|
|
|
|
create user mysqltest_7@;
|
2006-01-09 10:31:07 +01:00
|
|
|
|
set password for mysqltest_7@ = password('systpass');
|
|
|
|
|
show grants for mysqltest_7@;
|
|
|
|
|
drop user mysqltest_7@;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_NONEXISTING_GRANT
|
2006-01-09 10:31:07 +01:00
|
|
|
|
show grants for mysqltest_7@;
|
|
|
|
|
|
2006-03-06 11:03:40 +01:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#14385 GRANT and mapping to correct user account problems
|
2006-03-06 11:03:40 +01:00
|
|
|
|
#
|
|
|
|
|
create database mysqltest;
|
|
|
|
|
use mysqltest;
|
|
|
|
|
create table t1(f1 int);
|
|
|
|
|
GRANT DELETE ON mysqltest.t1 TO mysqltest1@'%';
|
|
|
|
|
GRANT SELECT ON mysqltest.t1 TO mysqltest1@'192.%';
|
|
|
|
|
show grants for mysqltest1@'192.%';
|
|
|
|
|
show grants for mysqltest1@'%';
|
|
|
|
|
delete from mysql.user where user='mysqltest1';
|
|
|
|
|
delete from mysql.db where user='mysqltest1';
|
|
|
|
|
delete from mysql.tables_priv where user='mysqltest1';
|
|
|
|
|
flush privileges;
|
|
|
|
|
drop database mysqltest;
|
|
|
|
|
|
2007-04-17 13:52:50 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#27515 DROP previlege is not required for RENAME TABLE
|
2007-04-17 13:52:50 +02:00
|
|
|
|
#
|
|
|
|
|
connection master;
|
|
|
|
|
create database db27515;
|
|
|
|
|
use db27515;
|
|
|
|
|
create table t1 (a int);
|
|
|
|
|
grant alter on db27515.t1 to user27515@localhost;
|
|
|
|
|
grant insert, create on db27515.t2 to user27515@localhost;
|
|
|
|
|
|
|
|
|
|
connect (conn27515, localhost, user27515, , db27515);
|
|
|
|
|
connection conn27515;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2007-04-17 13:52:50 +02:00
|
|
|
|
rename table t1 to t2;
|
|
|
|
|
disconnect conn27515;
|
|
|
|
|
|
|
|
|
|
connection master;
|
|
|
|
|
revoke all privileges, grant option from user27515@localhost;
|
|
|
|
|
drop user user27515@localhost;
|
|
|
|
|
drop database db27515;
|
|
|
|
|
|
|
|
|
|
--echo End of 4.1 tests
|
2006-05-23 11:35:14 +02:00
|
|
|
|
|
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#16297 In memory grant tables not flushed when users's hostname is ""
|
2006-05-23 11:35:14 +02:00
|
|
|
|
#
|
2006-05-29 15:05:31 +02:00
|
|
|
|
use test;
|
2006-05-23 11:35:14 +02:00
|
|
|
|
create table t1 (a int);
|
|
|
|
|
|
|
|
|
|
# Backup anonymous users and remove them. (They get in the way of
|
|
|
|
|
# the one we test with here otherwise.)
|
|
|
|
|
create table t2 as select * from mysql.user where user='';
|
|
|
|
|
delete from mysql.user where user='';
|
|
|
|
|
flush privileges;
|
|
|
|
|
|
|
|
|
|
# Create some users with different hostnames
|
|
|
|
|
create user mysqltest_8@'';
|
|
|
|
|
create user mysqltest_8;
|
|
|
|
|
create user mysqltest_8@host8;
|
|
|
|
|
|
|
|
|
|
# Try to create them again
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_CANNOT_USER
|
2006-05-23 11:35:14 +02:00
|
|
|
|
create user mysqltest_8@'';
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_CANNOT_USER
|
2006-05-23 11:35:14 +02:00
|
|
|
|
create user mysqltest_8;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_CANNOT_USER
|
2006-05-23 11:35:14 +02:00
|
|
|
|
create user mysqltest_8@host8;
|
|
|
|
|
|
|
|
|
|
select user, QUOTE(host) from mysql.user where user="mysqltest_8";
|
|
|
|
|
|
|
|
|
|
--echo Schema privileges
|
|
|
|
|
grant select on mysqltest.* to mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
grant select on mysqltest.* to mysqltest_8@;
|
|
|
|
|
show grants for mysqltest_8@;
|
|
|
|
|
grant select on mysqltest.* to mysqltest_8;
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
select * from information_schema.schema_privileges
|
|
|
|
|
where grantee like "'mysqltest_8'%";
|
|
|
|
|
connect (conn3,localhost,mysqltest_8,,);
|
|
|
|
|
select * from t1;
|
|
|
|
|
disconnect conn3;
|
|
|
|
|
connection master;
|
|
|
|
|
revoke select on mysqltest.* from mysqltest_8@'';
|
|
|
|
|
revoke select on mysqltest.* from mysqltest_8;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
select * from information_schema.schema_privileges
|
|
|
|
|
where grantee like "'mysqltest_8'%";
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8@;
|
|
|
|
|
grant select on mysqltest.* to mysqltest_8@'';
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for mysqltest_8@;
|
|
|
|
|
revoke select on mysqltest.* from mysqltest_8@'';
|
|
|
|
|
flush privileges;
|
|
|
|
|
|
|
|
|
|
--echo Column privileges
|
|
|
|
|
grant update (a) on t1 to mysqltest_8@'';
|
|
|
|
|
grant update (a) on t1 to mysqltest_8;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
select * from information_schema.column_privileges;
|
|
|
|
|
connect (conn4,localhost,mysqltest_8,,);
|
|
|
|
|
select * from t1;
|
|
|
|
|
disconnect conn4;
|
|
|
|
|
connection master;
|
|
|
|
|
revoke update (a) on t1 from mysqltest_8@'';
|
|
|
|
|
revoke update (a) on t1 from mysqltest_8;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
select * from information_schema.column_privileges;
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
|
|
|
|
|
--echo Table privileges
|
|
|
|
|
grant update on t1 to mysqltest_8@'';
|
|
|
|
|
grant update on t1 to mysqltest_8;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
select * from information_schema.table_privileges;
|
|
|
|
|
connect (conn5,localhost,mysqltest_8,,);
|
|
|
|
|
select * from t1;
|
|
|
|
|
disconnect conn5;
|
|
|
|
|
connection master;
|
|
|
|
|
revoke update on t1 from mysqltest_8@'';
|
|
|
|
|
revoke update on t1 from mysqltest_8;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
select * from information_schema.table_privileges;
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
|
|
|
|
|
--echo "DROP USER" should clear privileges
|
|
|
|
|
grant all privileges on mysqltest.* to mysqltest_8@'';
|
|
|
|
|
grant select on mysqltest.* to mysqltest_8@'';
|
|
|
|
|
grant update on t1 to mysqltest_8@'';
|
|
|
|
|
grant update (a) on t1 to mysqltest_8@'';
|
|
|
|
|
grant all privileges on mysqltest.* to mysqltest_8;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
select * from information_schema.user_privileges
|
|
|
|
|
where grantee like "'mysqltest_8'%";
|
|
|
|
|
connect (conn5,localhost,mysqltest_8,,);
|
|
|
|
|
select * from t1;
|
|
|
|
|
disconnect conn5;
|
|
|
|
|
connection master;
|
|
|
|
|
flush privileges;
|
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
drop user mysqltest_8@'';
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_NONEXISTING_GRANT
|
2006-05-23 11:35:14 +02:00
|
|
|
|
show grants for mysqltest_8@'';
|
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
select * from information_schema.user_privileges
|
|
|
|
|
where grantee like "'mysqltest_8'%";
|
|
|
|
|
drop user mysqltest_8;
|
|
|
|
|
--replace_result $MASTER_MYSOCK MASTER_SOCKET $MASTER_MYPORT MASTER_PORT
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_ACCESS_DENIED_ERROR
|
2006-05-23 11:35:14 +02:00
|
|
|
|
connect (conn6,localhost,mysqltest_8,,);
|
|
|
|
|
connection master;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_NONEXISTING_GRANT
|
2006-05-23 11:35:14 +02:00
|
|
|
|
show grants for mysqltest_8;
|
|
|
|
|
drop user mysqltest_8@host8;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--error ER_NONEXISTING_GRANT
|
2006-05-23 11:35:14 +02:00
|
|
|
|
show grants for mysqltest_8@host8;
|
|
|
|
|
|
|
|
|
|
# Restore the anonymous users.
|
|
|
|
|
insert into mysql.user select * from t2;
|
|
|
|
|
flush privileges;
|
|
|
|
|
drop table t2;
|
|
|
|
|
drop table t1;
|
|
|
|
|
|
2006-08-03 14:58:13 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#20214 Incorrect error when user calls SHOW CREATE VIEW on non
|
|
|
|
|
# privileged view
|
2006-08-03 14:58:13 +02:00
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
connection master;
|
|
|
|
|
|
|
|
|
|
CREATE DATABASE mysqltest3;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
USE mysqltest3;
|
2006-08-03 14:58:13 +02:00
|
|
|
|
|
|
|
|
|
CREATE TABLE t_nn (c1 INT);
|
|
|
|
|
CREATE VIEW v_nn AS SELECT * FROM t_nn;
|
|
|
|
|
|
|
|
|
|
CREATE DATABASE mysqltest2;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
USE mysqltest2;
|
2006-08-03 14:58:13 +02:00
|
|
|
|
|
|
|
|
|
CREATE TABLE t_nn (c1 INT);
|
|
|
|
|
CREATE VIEW v_nn AS SELECT * FROM t_nn;
|
|
|
|
|
CREATE VIEW v_yn AS SELECT * FROM t_nn;
|
|
|
|
|
CREATE VIEW v_gy AS SELECT * FROM t_nn;
|
|
|
|
|
CREATE VIEW v_ny AS SELECT * FROM t_nn;
|
|
|
|
|
CREATE VIEW v_yy AS SELECT * FROM t_nn WHERE c1=55;
|
|
|
|
|
|
|
|
|
|
GRANT SHOW VIEW ON mysqltest2.v_ny TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
|
|
|
|
|
GRANT SELECT ON mysqltest2.v_yn TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
|
|
|
|
|
GRANT SELECT ON mysqltest2.* TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
|
|
|
|
|
GRANT SHOW VIEW,SELECT ON mysqltest2.v_yy TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
|
|
|
|
|
|
|
|
|
|
connect (mysqltest_1, localhost, mysqltest_1, mysqltest_1,);
|
|
|
|
|
|
|
|
|
|
# fail because of missing SHOW VIEW (have generic SELECT)
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
SHOW CREATE VIEW mysqltest2.v_nn;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
SHOW CREATE TABLE mysqltest2.v_nn;
|
|
|
|
|
|
|
|
|
|
# fail because of missing SHOW VIEW
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
SHOW CREATE VIEW mysqltest2.v_yn;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
SHOW CREATE TABLE mysqltest2.v_yn;
|
|
|
|
|
|
|
|
|
|
# succeed (despite of missing SELECT, having SHOW VIEW bails us out)
|
|
|
|
|
SHOW CREATE TABLE mysqltest2.v_ny;
|
|
|
|
|
|
|
|
|
|
# succeed (despite of missing SELECT, having SHOW VIEW bails us out)
|
|
|
|
|
SHOW CREATE VIEW mysqltest2.v_ny;
|
|
|
|
|
|
|
|
|
|
# fail because of missing (specific or generic) SELECT
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
SHOW CREATE TABLE mysqltest3.t_nn;
|
|
|
|
|
|
|
|
|
|
# fail because of missing (specific or generic) SELECT (not because it's not a view!)
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
SHOW CREATE VIEW mysqltest3.t_nn;
|
|
|
|
|
|
|
|
|
|
# fail because of missing missing (specific or generic) SELECT (and SHOW VIEW)
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
SHOW CREATE VIEW mysqltest3.v_nn;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
SHOW CREATE TABLE mysqltest3.v_nn;
|
|
|
|
|
|
|
|
|
|
# succeed thanks to generic SELECT
|
|
|
|
|
SHOW CREATE TABLE mysqltest2.t_nn;
|
|
|
|
|
|
|
|
|
|
# fail because it's not a view! (have generic SELECT though)
|
|
|
|
|
--error ER_WRONG_OBJECT
|
|
|
|
|
SHOW CREATE VIEW mysqltest2.t_nn;
|
|
|
|
|
|
|
|
|
|
# succeed, have SELECT and SHOW VIEW
|
|
|
|
|
SHOW CREATE VIEW mysqltest2.v_yy;
|
|
|
|
|
|
|
|
|
|
# succeed, have SELECT and SHOW VIEW
|
|
|
|
|
SHOW CREATE TABLE mysqltest2.v_yy;
|
|
|
|
|
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# clean-up
|
2006-08-03 14:58:13 +02:00
|
|
|
|
connection master;
|
|
|
|
|
|
|
|
|
|
# succeed, we're root
|
|
|
|
|
SHOW CREATE TABLE mysqltest2.v_nn;
|
|
|
|
|
SHOW CREATE VIEW mysqltest2.v_nn;
|
|
|
|
|
|
|
|
|
|
SHOW CREATE TABLE mysqltest2.t_nn;
|
|
|
|
|
|
|
|
|
|
# fail because it's not a view!
|
|
|
|
|
--error ER_WRONG_OBJECT
|
|
|
|
|
SHOW CREATE VIEW mysqltest2.t_nn;
|
|
|
|
|
|
|
|
|
|
DROP VIEW mysqltest2.v_nn;
|
|
|
|
|
DROP VIEW mysqltest2.v_yn;
|
|
|
|
|
DROP VIEW mysqltest2.v_ny;
|
|
|
|
|
DROP VIEW mysqltest2.v_yy;
|
|
|
|
|
DROP TABLE mysqltest2.t_nn;
|
|
|
|
|
DROP DATABASE mysqltest2;
|
|
|
|
|
DROP VIEW mysqltest3.v_nn;
|
|
|
|
|
DROP TABLE mysqltest3.t_nn;
|
|
|
|
|
DROP DATABASE mysqltest3;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
disconnect mysqltest_1;
|
2006-08-03 14:58:13 +02:00
|
|
|
|
REVOKE ALL PRIVILEGES, GRANT OPTION FROM 'mysqltest_1'@'localhost';
|
|
|
|
|
DROP USER 'mysqltest_1'@'localhost';
|
2006-08-07 01:39:05 +02:00
|
|
|
|
|
2006-08-30 01:22:59 +02:00
|
|
|
|
# restore the original database
|
2009-02-05 21:47:23 +01:00
|
|
|
|
USE test;
|
2009-02-09 22:00:15 +01:00
|
|
|
|
connection default;
|
|
|
|
|
disconnect master;
|
|
|
|
|
|
2006-08-07 01:39:05 +02:00
|
|
|
|
|
2006-07-25 01:45:26 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#10668 CREATE USER does not enforce username length limit
|
2006-07-25 01:45:26 +02:00
|
|
|
|
#
|
2006-08-29 23:48:15 +02:00
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
2006-07-25 01:45:26 +02:00
|
|
|
|
create user mysqltest1_thisisreallytoolong;
|
2006-05-23 11:35:14 +02:00
|
|
|
|
|
2006-08-23 19:31:00 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Test for Bug#16899 Possible buffer overflow in handling of DEFINER-clause.
|
2006-08-23 19:31:00 +02:00
|
|
|
|
#
|
|
|
|
|
# These checks are intended to ensure that appropriate errors are risen when
|
|
|
|
|
# illegal user name or hostname is specified in user-clause of GRANT/REVOKE
|
|
|
|
|
# statements.
|
|
|
|
|
#
|
|
|
|
|
|
2006-12-04 18:22:38 +01:00
|
|
|
|
#
|
2009-02-09 22:00:15 +01:00
|
|
|
|
# Bug#22369 Alter table rename combined with other alterations causes lost tables
|
2006-12-04 18:22:38 +01:00
|
|
|
|
#
|
|
|
|
|
CREATE DATABASE mysqltest1;
|
|
|
|
|
CREATE TABLE mysqltest1.t1 (
|
|
|
|
|
int_field INTEGER UNSIGNED NOT NULL,
|
|
|
|
|
char_field CHAR(10),
|
|
|
|
|
INDEX(`int_field`)
|
|
|
|
|
);
|
|
|
|
|
CREATE TABLE mysqltest1.t2 (int_field INT);
|
|
|
|
|
|
|
|
|
|
--echo "Now check that we require equivalent grants for "
|
|
|
|
|
--echo "RENAME TABLE and ALTER TABLE"
|
|
|
|
|
CREATE USER mysqltest_1@localhost;
|
|
|
|
|
GRANT SELECT ON mysqltest1.t1 TO mysqltest_1@localhost;
|
|
|
|
|
|
2007-06-01 14:12:16 +02:00
|
|
|
|
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
2006-12-04 18:22:38 +01:00
|
|
|
|
SELECT USER();
|
|
|
|
|
SHOW GRANTS;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
RENAME TABLE t1 TO t2;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
ALTER TABLE t1 RENAME TO t2;
|
|
|
|
|
--disconnect conn42
|
|
|
|
|
--connection default
|
|
|
|
|
GRANT DROP ON mysqltest1.t1 TO mysqltest_1@localhost;
|
|
|
|
|
|
2007-06-01 14:12:16 +02:00
|
|
|
|
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
2006-12-04 18:22:38 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
RENAME TABLE t1 TO t2;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
ALTER TABLE t1 RENAME TO t2;
|
|
|
|
|
--disconnect conn42
|
|
|
|
|
--connection default
|
|
|
|
|
GRANT ALTER ON mysqltest1.t1 TO mysqltest_1@localhost;
|
|
|
|
|
|
2007-06-01 14:12:16 +02:00
|
|
|
|
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
2006-12-04 18:22:38 +01:00
|
|
|
|
SHOW GRANTS;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
RENAME TABLE t1 TO t2;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
ALTER TABLE t1 RENAME TO t2;
|
|
|
|
|
--disconnect conn42
|
|
|
|
|
--connection default
|
|
|
|
|
GRANT INSERT, CREATE ON mysqltest1.t1 TO mysqltest_1@localhost;
|
2007-06-01 14:12:16 +02:00
|
|
|
|
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
2006-12-04 18:22:38 +01:00
|
|
|
|
SHOW GRANTS;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
--disconnect conn42
|
|
|
|
|
--connection default
|
|
|
|
|
GRANT INSERT, SELECT, CREATE, ALTER, DROP ON mysqltest1.t2 TO mysqltest_1@localhost;
|
|
|
|
|
DROP TABLE mysqltest1.t2;
|
|
|
|
|
|
2007-06-01 14:12:16 +02:00
|
|
|
|
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
2006-12-04 18:22:38 +01:00
|
|
|
|
SHOW GRANTS;
|
|
|
|
|
RENAME TABLE t1 TO t2;
|
|
|
|
|
RENAME TABLE t2 TO t1;
|
|
|
|
|
ALTER TABLE t1 RENAME TO t2;
|
|
|
|
|
ALTER TABLE t2 RENAME TO t1;
|
|
|
|
|
--disconnect conn42
|
|
|
|
|
--connection default
|
|
|
|
|
REVOKE DROP, INSERT ON mysqltest1.t1 FROM mysqltest_1@localhost;
|
|
|
|
|
REVOKE DROP, INSERT ON mysqltest1.t2 FROM mysqltest_1@localhost;
|
|
|
|
|
|
2007-06-01 14:12:16 +02:00
|
|
|
|
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
2006-12-04 18:22:38 +01:00
|
|
|
|
SHOW GRANTS;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
RENAME TABLE t1 TO t2;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
ALTER TABLE t1 RENAME TO t2;
|
|
|
|
|
--disconnect conn42
|
|
|
|
|
--connection default
|
|
|
|
|
|
|
|
|
|
DROP USER mysqltest_1@localhost;
|
|
|
|
|
DROP DATABASE mysqltest1;
|
2007-04-24 10:53:12 +02:00
|
|
|
|
USE test;
|
2006-12-04 18:22:38 +01:00
|
|
|
|
|
2006-08-23 19:31:00 +02:00
|
|
|
|
# Working with database-level privileges.
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
GRANT CREATE ON mysqltest.* TO 1234567890abcdefGHIKL@localhost;
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
GRANT CREATE ON mysqltest.* TO some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
REVOKE CREATE ON mysqltest.* FROM 1234567890abcdefGHIKL@localhost;
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
REVOKE CREATE ON mysqltest.* FROM some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
|
|
|
|
|
|
|
|
|
# Working with table-level privileges.
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
GRANT CREATE ON t1 TO 1234567890abcdefGHIKL@localhost;
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
GRANT CREATE ON t1 TO some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
REVOKE CREATE ON t1 FROM 1234567890abcdefGHIKL@localhost;
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
REVOKE CREATE ON t1 FROM some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
|
|
|
|
|
|
|
|
|
# Working with routine-level privileges.
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
GRANT EXECUTE ON PROCEDURE p1 TO 1234567890abcdefGHIKL@localhost;
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
GRANT EXECUTE ON PROCEDURE p1 TO some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
REVOKE EXECUTE ON PROCEDURE p1 FROM 1234567890abcdefGHIKL@localhost;
|
|
|
|
|
|
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
|
|
|
|
REVOKE EXECUTE ON PROCEDURE t1 FROM some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
2007-01-24 14:45:30 +01:00
|
|
|
|
|
2006-11-21 09:25:10 +01:00
|
|
|
|
|
|
|
|
|
#
|
2009-02-09 22:00:15 +01:00
|
|
|
|
# Bug#23556 TRUNCATE TABLE still maps to DELETE
|
2006-11-21 09:25:10 +01:00
|
|
|
|
#
|
|
|
|
|
CREATE USER bug23556@localhost;
|
|
|
|
|
CREATE DATABASE bug23556;
|
|
|
|
|
GRANT SELECT ON bug23556.* TO bug23556@localhost;
|
|
|
|
|
connect (bug23556,localhost,bug23556,,bug23556);
|
|
|
|
|
|
|
|
|
|
connection default;
|
|
|
|
|
USE bug23556;
|
|
|
|
|
CREATE TABLE t1 (a INT PRIMARY KEY); INSERT INTO t1 VALUES (1),(2),(3),(4),(5);
|
|
|
|
|
GRANT DELETE ON t1 TO bug23556@localhost;
|
|
|
|
|
|
|
|
|
|
connection bug23556;
|
|
|
|
|
USE bug23556;
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
TRUNCATE t1;
|
|
|
|
|
|
|
|
|
|
connection default;
|
|
|
|
|
USE bug23556;
|
|
|
|
|
REVOKE DELETE ON t1 FROM bug23556@localhost;
|
|
|
|
|
GRANT DROP ON t1 TO bug23556@localhost;
|
|
|
|
|
|
|
|
|
|
connection bug23556;
|
|
|
|
|
USE bug23556;
|
|
|
|
|
TRUNCATE t1;
|
|
|
|
|
|
|
|
|
|
connection default;
|
|
|
|
|
USE bug23556;
|
|
|
|
|
DROP TABLE t1;
|
|
|
|
|
USE test;
|
|
|
|
|
DROP DATABASE bug23556;
|
|
|
|
|
DROP USER bug23556@localhost;
|
2009-02-09 22:00:15 +01:00
|
|
|
|
connection default;
|
|
|
|
|
disconnect bug23556;
|
|
|
|
|
|
|
|
|
|
|
2007-01-24 14:45:30 +01:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#6774 Replication fails with Wrong usage of DB GRANT and GLOBAL PRIVILEGES
|
2007-01-24 14:45:30 +01:00
|
|
|
|
#
|
|
|
|
|
# Check if GRANT ... ON * ... fails when no database is selected
|
2007-06-01 13:39:54 +02:00
|
|
|
|
connect (con1, localhost, root,,*NO-ONE*);
|
2007-01-24 14:45:30 +01:00
|
|
|
|
connection con1;
|
|
|
|
|
--error ER_NO_DB_ERROR
|
|
|
|
|
GRANT PROCESS ON * TO user@localhost;
|
|
|
|
|
disconnect con1;
|
|
|
|
|
connection default;
|
|
|
|
|
|
2007-03-23 12:12:11 +01:00
|
|
|
|
|
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#9504 Stored procedures: execute privilege doesn't make 'use database'
|
2007-03-23 12:12:11 +01:00
|
|
|
|
# okay.
|
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
# Prepare.
|
|
|
|
|
|
|
|
|
|
--disable_warnings
|
|
|
|
|
DROP DATABASE IF EXISTS mysqltest1;
|
|
|
|
|
DROP DATABASE IF EXISTS mysqltest2;
|
|
|
|
|
DROP DATABASE IF EXISTS mysqltest3;
|
|
|
|
|
DROP DATABASE IF EXISTS mysqltest4;
|
|
|
|
|
--enable_warnings
|
|
|
|
|
|
|
|
|
|
CREATE DATABASE mysqltest1;
|
|
|
|
|
CREATE DATABASE mysqltest2;
|
|
|
|
|
CREATE DATABASE mysqltest3;
|
|
|
|
|
CREATE DATABASE mysqltest4;
|
|
|
|
|
|
|
|
|
|
CREATE PROCEDURE mysqltest1.p_def() SQL SECURITY DEFINER
|
|
|
|
|
SELECT 1;
|
|
|
|
|
|
|
|
|
|
CREATE PROCEDURE mysqltest2.p_inv() SQL SECURITY INVOKER
|
|
|
|
|
SELECT 1;
|
|
|
|
|
|
|
|
|
|
CREATE FUNCTION mysqltest3.f_def() RETURNS INT SQL SECURITY DEFINER
|
2009-02-05 21:47:23 +01:00
|
|
|
|
RETURN 1;
|
|
|
|
|
|
2007-03-23 12:12:11 +01:00
|
|
|
|
CREATE FUNCTION mysqltest4.f_inv() RETURNS INT SQL SECURITY INVOKER
|
|
|
|
|
RETURN 1;
|
|
|
|
|
|
|
|
|
|
GRANT EXECUTE ON PROCEDURE mysqltest1.p_def TO mysqltest_1@localhost;
|
|
|
|
|
GRANT EXECUTE ON PROCEDURE mysqltest2.p_inv TO mysqltest_1@localhost;
|
|
|
|
|
GRANT EXECUTE ON FUNCTION mysqltest3.f_def TO mysqltest_1@localhost;
|
|
|
|
|
GRANT EXECUTE ON FUNCTION mysqltest4.f_inv TO mysqltest_1@localhost;
|
|
|
|
|
|
|
|
|
|
GRANT ALL PRIVILEGES ON test.* TO mysqltest_1@localhost;
|
|
|
|
|
|
|
|
|
|
# Test.
|
|
|
|
|
|
|
|
|
|
--connect (bug9504_con1,localhost,mysqltest_1,,)
|
|
|
|
|
--echo
|
|
|
|
|
--echo ---> connection: bug9504_con1
|
|
|
|
|
|
|
|
|
|
# - Check that we can switch to the db;
|
|
|
|
|
|
|
|
|
|
use mysqltest1;
|
|
|
|
|
|
|
|
|
|
use mysqltest2;
|
|
|
|
|
|
|
|
|
|
use mysqltest3;
|
|
|
|
|
|
|
|
|
|
use mysqltest4;
|
|
|
|
|
|
|
|
|
|
# - Check that we can call stored routines;
|
|
|
|
|
|
|
|
|
|
use test;
|
|
|
|
|
|
|
|
|
|
CALL mysqltest1.p_def();
|
|
|
|
|
|
|
|
|
|
CALL mysqltest2.p_inv();
|
|
|
|
|
|
|
|
|
|
SELECT mysqltest3.f_def();
|
|
|
|
|
|
|
|
|
|
SELECT mysqltest4.f_inv();
|
|
|
|
|
|
|
|
|
|
# Cleanup.
|
|
|
|
|
|
|
|
|
|
--connection default
|
|
|
|
|
--echo
|
|
|
|
|
--echo ---> connection: default
|
|
|
|
|
|
|
|
|
|
--disconnect bug9504_con1
|
|
|
|
|
|
|
|
|
|
DROP DATABASE mysqltest1;
|
|
|
|
|
DROP DATABASE mysqltest2;
|
|
|
|
|
DROP DATABASE mysqltest3;
|
|
|
|
|
DROP DATABASE mysqltest4;
|
|
|
|
|
|
|
|
|
|
DROP USER mysqltest_1@localhost;
|
|
|
|
|
|
|
|
|
|
|
Fix for BUG#27337: Privileges are not properly restored.
The problem was that THD::db_access variable was not restored after
database switch in stored-routine-execution code.
The fix is to restore THD::db_access in this case.
Unfortunately, this fix requires additional changes,
because in prepare_schema_table(), called on the parsing stage, we checked
privileges. That was wrong according to our design, but this flaw haven't
struck so far, because it was masked. All privilege checkings must be
done on the execution stage in order to be compatible with prepared statements
and stored routines. So, this patch also contains patch for
prepare_schema_table(), which moves the checkings to the execution phase.
mysql-test/r/grant.result:
Updated result file.
mysql-test/t/grant.test:
Added test case for BUG#27337.
sql/mysql_priv.h:
Added function declaration.
sql/sql_db.cc:
Fix for BUG#27337 -- set THD::db_access even if we're called
from stored-routine-execution code.
sql/sql_parse.cc:
Split prepare_schema_table() into two functions:
- prepare_schema_table(), which is called from the parser (parsing stage);
- check_show_access(), which is called on the execution stage.
sql/sql_show.cc:
Ignore schema_select_lex member if its table is NULL.
2007-04-03 13:11:34 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#27337 Privileges are not restored properly.
|
Fix for BUG#27337: Privileges are not properly restored.
The problem was that THD::db_access variable was not restored after
database switch in stored-routine-execution code.
The fix is to restore THD::db_access in this case.
Unfortunately, this fix requires additional changes,
because in prepare_schema_table(), called on the parsing stage, we checked
privileges. That was wrong according to our design, but this flaw haven't
struck so far, because it was masked. All privilege checkings must be
done on the execution stage in order to be compatible with prepared statements
and stored routines. So, this patch also contains patch for
prepare_schema_table(), which moves the checkings to the execution phase.
mysql-test/r/grant.result:
Updated result file.
mysql-test/t/grant.test:
Added test case for BUG#27337.
sql/mysql_priv.h:
Added function declaration.
sql/sql_db.cc:
Fix for BUG#27337 -- set THD::db_access even if we're called
from stored-routine-execution code.
sql/sql_parse.cc:
Split prepare_schema_table() into two functions:
- prepare_schema_table(), which is called from the parser (parsing stage);
- check_show_access(), which is called on the execution stage.
sql/sql_show.cc:
Ignore schema_select_lex member if its table is NULL.
2007-04-03 13:11:34 +02:00
|
|
|
|
#
|
|
|
|
|
# Actually, the patch for this bugs fixes two problems. So, here are two test
|
|
|
|
|
# cases.
|
|
|
|
|
|
|
|
|
|
# Test case 1: privileges are not restored properly after calling a stored
|
|
|
|
|
# routine defined with SQL SECURITY INVOKER clause.
|
|
|
|
|
|
|
|
|
|
# Prepare.
|
|
|
|
|
|
|
|
|
|
--disable_warnings
|
|
|
|
|
DROP DATABASE IF EXISTS mysqltest1;
|
|
|
|
|
DROP DATABASE IF EXISTS mysqltest2;
|
|
|
|
|
--enable_warnings
|
|
|
|
|
|
|
|
|
|
CREATE DATABASE mysqltest1;
|
|
|
|
|
CREATE DATABASE mysqltest2;
|
|
|
|
|
|
|
|
|
|
GRANT ALL PRIVILEGES ON mysqltest1.* TO mysqltest_1@localhost;
|
|
|
|
|
GRANT SELECT ON mysqltest2.* TO mysqltest_1@localhost;
|
|
|
|
|
|
|
|
|
|
CREATE PROCEDURE mysqltest1.p1() SQL SECURITY INVOKER
|
|
|
|
|
SELECT 1;
|
|
|
|
|
|
|
|
|
|
# Test.
|
|
|
|
|
|
|
|
|
|
--connect (bug27337_con1,localhost,mysqltest_1,,mysqltest2)
|
|
|
|
|
--echo
|
|
|
|
|
--echo ---> connection: bug27337_con1
|
|
|
|
|
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
CREATE TABLE t1(c INT);
|
|
|
|
|
|
|
|
|
|
CALL mysqltest1.p1();
|
|
|
|
|
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
CREATE TABLE t1(c INT);
|
|
|
|
|
|
|
|
|
|
--disconnect bug27337_con1
|
|
|
|
|
|
|
|
|
|
--connect (bug27337_con2,localhost,mysqltest_1,,mysqltest2)
|
|
|
|
|
--echo
|
|
|
|
|
--echo ---> connection: bug27337_con2
|
|
|
|
|
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
CREATE TABLE t1(c INT);
|
|
|
|
|
|
|
|
|
|
SHOW TABLES;
|
|
|
|
|
|
|
|
|
|
# Cleanup.
|
|
|
|
|
|
|
|
|
|
--connection default
|
|
|
|
|
--echo
|
|
|
|
|
--echo ---> connection: default
|
|
|
|
|
|
|
|
|
|
--disconnect bug27337_con2
|
|
|
|
|
|
|
|
|
|
DROP DATABASE mysqltest1;
|
|
|
|
|
DROP DATABASE mysqltest2;
|
|
|
|
|
|
|
|
|
|
DROP USER mysqltest_1@localhost;
|
|
|
|
|
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Test case 2: privileges are not checked properly for prepared statements.
|
Fix for BUG#27337: Privileges are not properly restored.
The problem was that THD::db_access variable was not restored after
database switch in stored-routine-execution code.
The fix is to restore THD::db_access in this case.
Unfortunately, this fix requires additional changes,
because in prepare_schema_table(), called on the parsing stage, we checked
privileges. That was wrong according to our design, but this flaw haven't
struck so far, because it was masked. All privilege checkings must be
done on the execution stage in order to be compatible with prepared statements
and stored routines. So, this patch also contains patch for
prepare_schema_table(), which moves the checkings to the execution phase.
mysql-test/r/grant.result:
Updated result file.
mysql-test/t/grant.test:
Added test case for BUG#27337.
sql/mysql_priv.h:
Added function declaration.
sql/sql_db.cc:
Fix for BUG#27337 -- set THD::db_access even if we're called
from stored-routine-execution code.
sql/sql_parse.cc:
Split prepare_schema_table() into two functions:
- prepare_schema_table(), which is called from the parser (parsing stage);
- check_show_access(), which is called on the execution stage.
sql/sql_show.cc:
Ignore schema_select_lex member if its table is NULL.
2007-04-03 13:11:34 +02:00
|
|
|
|
|
|
|
|
|
# Prepare.
|
|
|
|
|
|
|
|
|
|
--disable_warnings
|
|
|
|
|
DROP DATABASE IF EXISTS mysqltest1;
|
|
|
|
|
DROP DATABASE IF EXISTS mysqltest2;
|
|
|
|
|
--enable_warnings
|
|
|
|
|
|
|
|
|
|
CREATE DATABASE mysqltest1;
|
|
|
|
|
CREATE DATABASE mysqltest2;
|
|
|
|
|
|
|
|
|
|
CREATE TABLE mysqltest1.t1(c INT);
|
|
|
|
|
CREATE TABLE mysqltest2.t2(c INT);
|
|
|
|
|
|
|
|
|
|
GRANT SELECT ON mysqltest1.t1 TO mysqltest_1@localhost;
|
|
|
|
|
GRANT SELECT ON mysqltest2.t2 TO mysqltest_2@localhost;
|
|
|
|
|
|
|
|
|
|
# Test.
|
|
|
|
|
|
|
|
|
|
--connect (bug27337_con1,localhost,mysqltest_1,,mysqltest1)
|
|
|
|
|
--echo
|
|
|
|
|
--echo ---> connection: bug27337_con1
|
|
|
|
|
|
|
|
|
|
SHOW TABLES FROM mysqltest1;
|
|
|
|
|
|
|
|
|
|
PREPARE stmt1 FROM 'SHOW TABLES FROM mysqltest1';
|
|
|
|
|
|
|
|
|
|
EXECUTE stmt1;
|
|
|
|
|
|
|
|
|
|
--connect (bug27337_con2,localhost,mysqltest_2,,mysqltest2)
|
|
|
|
|
--echo
|
|
|
|
|
--echo ---> connection: bug27337_con2
|
|
|
|
|
|
|
|
|
|
SHOW COLUMNS FROM mysqltest2.t2;
|
|
|
|
|
|
|
|
|
|
PREPARE stmt2 FROM 'SHOW COLUMNS FROM mysqltest2.t2';
|
|
|
|
|
|
|
|
|
|
EXECUTE stmt2;
|
|
|
|
|
|
|
|
|
|
--connection default
|
|
|
|
|
--echo
|
|
|
|
|
--echo ---> connection: default
|
|
|
|
|
|
|
|
|
|
REVOKE SELECT ON mysqltest1.t1 FROM mysqltest_1@localhost;
|
|
|
|
|
REVOKE SELECT ON mysqltest2.t2 FROM mysqltest_2@localhost;
|
|
|
|
|
|
|
|
|
|
--connection bug27337_con1
|
|
|
|
|
--echo
|
|
|
|
|
--echo ---> connection: bug27337_con1
|
|
|
|
|
|
|
|
|
|
--error ER_DBACCESS_DENIED_ERROR
|
|
|
|
|
SHOW TABLES FROM mysqltest1;
|
|
|
|
|
|
|
|
|
|
--error ER_DBACCESS_DENIED_ERROR
|
|
|
|
|
EXECUTE stmt1;
|
|
|
|
|
|
|
|
|
|
--connection bug27337_con2
|
|
|
|
|
--echo
|
|
|
|
|
--echo ---> connection: bug27337_con2
|
|
|
|
|
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
SHOW COLUMNS FROM mysqltest2.t2;
|
|
|
|
|
|
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
|
|
|
|
EXECUTE stmt2;
|
|
|
|
|
|
|
|
|
|
# Cleanup.
|
|
|
|
|
|
|
|
|
|
--connection default
|
|
|
|
|
--echo
|
|
|
|
|
--echo ---> connection: default
|
|
|
|
|
|
2009-02-05 21:47:23 +01:00
|
|
|
|
--disconnect bug27337_con1
|
Fix for BUG#27337: Privileges are not properly restored.
The problem was that THD::db_access variable was not restored after
database switch in stored-routine-execution code.
The fix is to restore THD::db_access in this case.
Unfortunately, this fix requires additional changes,
because in prepare_schema_table(), called on the parsing stage, we checked
privileges. That was wrong according to our design, but this flaw haven't
struck so far, because it was masked. All privilege checkings must be
done on the execution stage in order to be compatible with prepared statements
and stored routines. So, this patch also contains patch for
prepare_schema_table(), which moves the checkings to the execution phase.
mysql-test/r/grant.result:
Updated result file.
mysql-test/t/grant.test:
Added test case for BUG#27337.
sql/mysql_priv.h:
Added function declaration.
sql/sql_db.cc:
Fix for BUG#27337 -- set THD::db_access even if we're called
from stored-routine-execution code.
sql/sql_parse.cc:
Split prepare_schema_table() into two functions:
- prepare_schema_table(), which is called from the parser (parsing stage);
- check_show_access(), which is called on the execution stage.
sql/sql_show.cc:
Ignore schema_select_lex member if its table is NULL.
2007-04-03 13:11:34 +02:00
|
|
|
|
--disconnect bug27337_con2
|
|
|
|
|
|
|
|
|
|
DROP DATABASE mysqltest1;
|
|
|
|
|
DROP DATABASE mysqltest2;
|
|
|
|
|
|
|
|
|
|
DROP USER mysqltest_1@localhost;
|
2007-12-07 11:39:37 +01:00
|
|
|
|
DROP USER mysqltest_2@localhost;
|
Fix for BUG#27337: Privileges are not properly restored.
The problem was that THD::db_access variable was not restored after
database switch in stored-routine-execution code.
The fix is to restore THD::db_access in this case.
Unfortunately, this fix requires additional changes,
because in prepare_schema_table(), called on the parsing stage, we checked
privileges. That was wrong according to our design, but this flaw haven't
struck so far, because it was masked. All privilege checkings must be
done on the execution stage in order to be compatible with prepared statements
and stored routines. So, this patch also contains patch for
prepare_schema_table(), which moves the checkings to the execution phase.
mysql-test/r/grant.result:
Updated result file.
mysql-test/t/grant.test:
Added test case for BUG#27337.
sql/mysql_priv.h:
Added function declaration.
sql/sql_db.cc:
Fix for BUG#27337 -- set THD::db_access even if we're called
from stored-routine-execution code.
sql/sql_parse.cc:
Split prepare_schema_table() into two functions:
- prepare_schema_table(), which is called from the parser (parsing stage);
- check_show_access(), which is called on the execution stage.
sql/sql_show.cc:
Ignore schema_select_lex member if its table is NULL.
2007-04-03 13:11:34 +02:00
|
|
|
|
|
2007-05-11 21:19:11 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#27878 Unchecked privileges on a view referring to a table from another
|
|
|
|
|
# database.
|
2007-05-11 21:19:11 +02:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
USE test;
|
2007-05-11 21:19:11 +02:00
|
|
|
|
CREATE TABLE t1 (f1 int, f2 int);
|
|
|
|
|
INSERT INTO t1 VALUES(1,1), (2,2);
|
|
|
|
|
CREATE DATABASE db27878;
|
|
|
|
|
GRANT UPDATE(f1) ON t1 TO 'mysqltest_1'@'localhost';
|
|
|
|
|
GRANT SELECT ON `test`.* TO 'mysqltest_1'@'localhost';
|
|
|
|
|
GRANT ALL ON db27878.* TO 'mysqltest_1'@'localhost';
|
2009-02-05 21:47:23 +01:00
|
|
|
|
USE db27878;
|
2007-05-11 21:19:11 +02:00
|
|
|
|
CREATE SQL SECURITY INVOKER VIEW db27878.v1 AS SELECT * FROM test.t1;
|
|
|
|
|
connect (user1,localhost,mysqltest_1,,test);
|
|
|
|
|
connection user1;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
USE db27878;
|
2007-05-11 21:19:11 +02:00
|
|
|
|
--error 1356
|
|
|
|
|
UPDATE v1 SET f2 = 4;
|
|
|
|
|
SELECT * FROM test.t1;
|
|
|
|
|
disconnect user1;
|
|
|
|
|
connection default;
|
2007-09-20 18:10:35 +02:00
|
|
|
|
REVOKE UPDATE (f1) ON `test`.`t1` FROM 'mysqltest_1'@'localhost';
|
|
|
|
|
REVOKE SELECT ON `test`.* FROM 'mysqltest_1'@'localhost';
|
|
|
|
|
REVOKE ALL ON db27878.* FROM 'mysqltest_1'@'localhost';
|
2007-12-07 11:39:37 +01:00
|
|
|
|
DROP USER mysqltest_1@localhost;
|
2007-05-11 22:46:07 +02:00
|
|
|
|
DROP DATABASE db27878;
|
2009-02-05 21:47:23 +01:00
|
|
|
|
USE test;
|
2007-05-11 21:19:11 +02:00
|
|
|
|
DROP TABLE t1;
|
Fix for BUG#27337: Privileges are not properly restored.
The problem was that THD::db_access variable was not restored after
database switch in stored-routine-execution code.
The fix is to restore THD::db_access in this case.
Unfortunately, this fix requires additional changes,
because in prepare_schema_table(), called on the parsing stage, we checked
privileges. That was wrong according to our design, but this flaw haven't
struck so far, because it was masked. All privilege checkings must be
done on the execution stage in order to be compatible with prepared statements
and stored routines. So, this patch also contains patch for
prepare_schema_table(), which moves the checkings to the execution phase.
mysql-test/r/grant.result:
Updated result file.
mysql-test/t/grant.test:
Added test case for BUG#27337.
sql/mysql_priv.h:
Added function declaration.
sql/sql_db.cc:
Fix for BUG#27337 -- set THD::db_access even if we're called
from stored-routine-execution code.
sql/sql_parse.cc:
Split prepare_schema_table() into two functions:
- prepare_schema_table(), which is called from the parser (parsing stage);
- check_show_access(), which is called on the execution stage.
sql/sql_show.cc:
Ignore schema_select_lex member if its table is NULL.
2007-04-03 13:11:34 +02:00
|
|
|
|
|
2008-03-25 12:52:55 +01:00
|
|
|
|
--echo #
|
|
|
|
|
--echo # Bug#33275 Server crash when creating temporary table mysql.user
|
|
|
|
|
--echo #
|
|
|
|
|
CREATE TEMPORARY TABLE mysql.user (id INT);
|
|
|
|
|
FLUSH PRIVILEGES;
|
|
|
|
|
DROP TABLE mysql.user;
|
2009-02-09 22:00:15 +01:00
|
|
|
|
|
|
|
|
|
|
2008-02-01 14:10:46 +01:00
|
|
|
|
#
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Bug#33201 Crash occurs when granting update privilege on one column of a view
|
2008-02-01 14:10:46 +01:00
|
|
|
|
#
|
|
|
|
|
drop table if exists test;
|
|
|
|
|
drop function if exists test_function;
|
|
|
|
|
drop view if exists v1;
|
|
|
|
|
create table test (col1 varchar(30));
|
|
|
|
|
delimiter |;
|
|
|
|
|
create function test_function() returns varchar(30)
|
|
|
|
|
begin
|
|
|
|
|
declare tmp varchar(30);
|
|
|
|
|
select col1 from test limit 1 into tmp;
|
|
|
|
|
return '1';
|
|
|
|
|
end|
|
|
|
|
|
delimiter ;|
|
|
|
|
|
create view v1 as select test.* from test where test.col1=test_function();
|
2008-02-04 19:55:36 +01:00
|
|
|
|
grant update (col1) on v1 to 'greg'@'localhost';
|
|
|
|
|
drop user 'greg'@'localhost';
|
2008-02-01 14:10:46 +01:00
|
|
|
|
drop view v1;
|
|
|
|
|
drop table test;
|
|
|
|
|
drop function test_function;
|
|
|
|
|
|
2008-12-24 16:14:59 +01:00
|
|
|
|
#
|
|
|
|
|
# Bug#41456 SET PASSWORD hates CURRENT_USER()
|
|
|
|
|
#
|
|
|
|
|
SELECT CURRENT_USER();
|
|
|
|
|
SET PASSWORD FOR CURRENT_USER() = PASSWORD("admin");
|
|
|
|
|
SET PASSWORD FOR CURRENT_USER() = PASSWORD("");
|
|
|
|
|
|
2006-07-25 01:45:26 +02:00
|
|
|
|
--echo End of 5.0 tests
|
2007-04-03 13:13:27 +02:00
|
|
|
|
|
|
|
|
|
#
|
2009-02-09 22:00:15 +01:00
|
|
|
|
# Bug#21432 Database/Table name limited to 64 bytes, not chars, problems with multi-byte
|
2007-04-03 13:13:27 +02:00
|
|
|
|
#
|
|
|
|
|
set names utf8;
|
|
|
|
|
grant select on test.* to юзер_юзер@localhost;
|
|
|
|
|
--exec $MYSQL --default-character-set=utf8 --user=юзер_юзер -e "select user()"
|
|
|
|
|
revoke all on test.* from юзер_юзер@localhost;
|
|
|
|
|
drop user юзер_юзер@localhost;
|
2007-06-26 13:15:43 +02:00
|
|
|
|
--error ER_WRONG_STRING_LENGTH
|
2007-04-03 13:13:27 +02:00
|
|
|
|
grant select on test.* to очень_длинный_юзер@localhost;
|
|
|
|
|
set names default;
|
2007-11-26 19:09:40 +01:00
|
|
|
|
|
2007-12-07 08:54:32 +01:00
|
|
|
|
#
|
2009-02-09 22:00:15 +01:00
|
|
|
|
# Bug#20901 CREATE privilege is enough to insert into a table
|
2007-12-07 08:54:32 +01:00
|
|
|
|
#
|
|
|
|
|
|
|
|
|
|
create database mysqltest;
|
|
|
|
|
use mysqltest;
|
|
|
|
|
|
|
|
|
|
grant create on mysqltest.* to mysqltest@localhost;
|
|
|
|
|
create table t1 (i INT);
|
|
|
|
|
|
|
|
|
|
connect (user1,localhost,mysqltest,,mysqltest);
|
|
|
|
|
connection user1;
|
|
|
|
|
# show we don't have INSERT
|
2009-02-09 22:00:15 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2007-12-07 08:54:32 +01:00
|
|
|
|
insert into t1 values (1);
|
|
|
|
|
# show we have CREATE
|
|
|
|
|
create table t2 (i INT);
|
|
|
|
|
create table t4 (i INT);
|
|
|
|
|
|
|
|
|
|
connection default;
|
|
|
|
|
grant select, insert on mysqltest.t2 to mysqltest@localhost;
|
|
|
|
|
grant insert on mysqltest.t4 to mysqltest@localhost;
|
|
|
|
|
# to specify ACLs for non-existent objects, must explictly |CREATE
|
|
|
|
|
grant create, insert on mysqltest.t5 to mysqltest@localhost;
|
|
|
|
|
grant create, insert on mysqltest.t6 to mysqltest@localhost;
|
|
|
|
|
flush privileges;
|
|
|
|
|
|
|
|
|
|
connection user1;
|
|
|
|
|
insert into t2 values (1);
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# CREATE IF NOT EXISTS...SELECT, t1 exists, no INSERT, must fail
|
2009-02-09 22:00:15 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2007-12-07 08:54:32 +01:00
|
|
|
|
create table if not exists t1 select * from t2;
|
|
|
|
|
|
|
|
|
|
# CREATE IF NOT EXISTS...SELECT, no t3 yet, no INSERT, must fail
|
2009-02-09 22:00:15 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2007-12-07 08:54:32 +01:00
|
|
|
|
create table if not exists t3 select * from t2;
|
|
|
|
|
|
|
|
|
|
# CREATE IF NOT EXISTS...SELECT, t4 exists, have INSERT, must succeed
|
|
|
|
|
create table if not exists t4 select * from t2;
|
|
|
|
|
|
|
|
|
|
# CREATE IF NOT EXISTS...SELECT, no t5 yet, have INSERT, must succeed
|
|
|
|
|
create table if not exists t5 select * from t2;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
# CREATE...SELECT, no t6 yet, have INSERT, must succeed
|
|
|
|
|
create table t6 select * from t2;
|
|
|
|
|
|
|
|
|
|
# CREATE...SELECT, no t7 yet, no INSERT, must fail
|
2009-02-09 22:00:15 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2007-12-07 08:54:32 +01:00
|
|
|
|
create table t7 select * from t2;
|
|
|
|
|
|
|
|
|
|
# CREATE...SELECT, t4 exists, have INSERT, must still fail (exists)
|
|
|
|
|
--error 1050
|
|
|
|
|
create table t4 select * from t2;
|
|
|
|
|
|
|
|
|
|
# CREATE...SELECT, t1 exists, no INSERT, must fail
|
2009-02-09 22:00:15 +01:00
|
|
|
|
--error ER_TABLEACCESS_DENIED_ERROR
|
2007-12-07 08:54:32 +01:00
|
|
|
|
create table t1 select * from t2;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
connection default;
|
|
|
|
|
drop table t1,t2,t4,t5,t6;
|
|
|
|
|
|
|
|
|
|
revoke create on mysqltest.* from mysqltest@localhost;
|
|
|
|
|
revoke select, insert on mysqltest.t2 from mysqltest@localhost;
|
|
|
|
|
revoke insert on mysqltest.t4 from mysqltest@localhost;
|
|
|
|
|
revoke create, insert on mysqltest.t5 from mysqltest@localhost;
|
|
|
|
|
revoke create, insert on mysqltest.t6 from mysqltest@localhost;
|
|
|
|
|
drop user mysqltest@localhost;
|
|
|
|
|
|
|
|
|
|
disconnect user1;
|
|
|
|
|
drop database mysqltest;
|
|
|
|
|
use test;
|
|
|
|
|
|
2007-11-26 19:09:40 +01:00
|
|
|
|
|
|
|
|
|
#
|
2009-02-09 22:00:15 +01:00
|
|
|
|
# Bug#16470 crash on grant if old grant tables
|
2007-11-26 19:09:40 +01:00
|
|
|
|
#
|
|
|
|
|
--echo FLUSH PRIVILEGES without procs_priv table.
|
|
|
|
|
RENAME TABLE mysql.procs_priv TO mysql.procs_gone;
|
Bug#12713 "Error in a stored function called from a SELECT doesn't
cause ROLLBACK of statement", part 1. Review fixes.
Do not send OK/EOF packets to the client until we reached the end of
the current statement.
This is a consolidation, to keep the functionality that is shared by all
SQL statements in one place in the server.
Currently this functionality includes:
- close_thread_tables()
- log_slow_statement().
After this patch and the subsequent patch for Bug#12713, it shall also include:
- ha_autocommit_or_rollback()
- net_end_statement()
- query_cache_end_of_result().
In future it may also include:
- mysql_reset_thd_for_next_command().
include/mysql_com.h:
Rename now unused members of NET: no_send_ok, no_send_error, report_error.
These were server-specific variables related to the client/server
protocol. They have been made obsolete by this patch.
Previously the same members of NET were used to store the error message
both on the client and on the server.
The error message was stored in net.last_error (client: mysql->net.last_error,
server: thd->net.last_error).
The error code was stored in net.last_errno (client: mysql->net.last_errno,
server: thd->net.last_errno).
The server error code and message are now stored elsewhere
(in the Diagnostics_area), thus NET members are no longer used by the
server.
Rename last_error to client_last_error, last_errno to client_last_errno
to avoid potential bugs introduced by merges.
include/mysql_h.ic:
Update the ABI file to reflect a rename.
Renames do not break the binary compatibility.
libmysql/libmysql.c:
Rename last_error to client_last_error, last_errno to client_last_errno.
This is necessary to ensure no unnoticed bugs introduced by merged
changesets.
Remove net.report_error, net.no_send_ok, net.no_send_error.
libmysql/manager.c:
Rename net.last_errno to net.client_last_errno.
libmysqld/lib_sql.cc:
Rename net.last_errno to net.client_last_errno.
Update the embedded implementation of the client-server protocol to
reflect the refactoring of protocol.cc.
libmysqld/libmysqld.c:
Rename net.last_errno to net.client_last_errno.
mysql-test/r/events.result:
Update to reflect the change in mysql_rm_db(). Now we drop stored
routines and events for a given database name only if there
is a directory for this database name. ha_drop_database() and
query_cache_invalidate() are called likewise.
Previously we would attempt to drop routines/events even if database
directory was not found (it worked, since routines and events are stored
in tables). This fixes Bug 29958 "Weird message on DROP DATABASE if mysql.proc
does not exist".
The change was done because the previous code used to call send_ok()
twice, which led to an assertion failure when asserts against it were
added by this patch.
mysql-test/r/grant.result:
Fix the patch for Bug 16470, now FLUSH PRIVILEGES produces an error
if mysql.procs_priv is missing.
This fixes the assert that send_ok() must not called after send_error()
(the original patch for Bug 16470 was prone to this).
mysql-test/suite/rpl/r/rpl_row_tabledefs_2myisam.result:
Produce a more detailed error message.
mysql-test/suite/rpl/r/rpl_row_tabledefs_3innodb.result:
Produce a more detailed error message.
mysql-test/t/grant.test:
Update the test, now FLUSH PRIVILEGES returns an error if mysql.procs_priv
is missing.
server-tools/instance-manager/mysql_connection.cc:
Rename net.last_errno to net.client_last_errno.
sql/ha_ndbcluster_binlog.cc:
Add asserts.
Use getters to access statement status information.
Add a comment why run_query() is broken. Reset the diagnostics area
in the end of run_query() to fulfill the invariant that the diagnostics_area
is never assigned twice per statement (see the comment in the code
when this can happen). We still do not clear thd->is_fatal_error and
thd->is_slave_error, which may lead to bugs, I consider the whole affair
as something to be dealt with separately.
sql/ha_partition.cc:
fatal_error() doesn't set an error by itself. Perhaps we should
remove this method altogether and instead add a flag to my_error
to set thd->is_fatal_error property.
Meanwhile, this change is a part of inspection made to the entire source
code with the goal to ensure that fatal_error()
is always accompanied by my_error().
sql/item_func.cc:
There is no net.last_error anymore. Remove the obsolete assignment.
sql/log_event.cc:
Use getters to access statement error status information.
sql/log_event_old.cc:
Use getters to access statement error status information.
sql/mysqld.cc:
Previously, if a continue handler for an error was found, my_message_sql()
would not set an error in THD. Since the current statement
must be aborted in any case, find_handler() had a hack to assign
thd->net.report_error to 1.
Remove this hack. Set an error in my_message_sql() even if the continue
handler is found. The error will be cleared anyway when the handler
is executed. This is one action among many in this patch to ensure the
invariant that whenever thd->is_error() is TRUE, we have a message in
thd->main_da.message().
sql/net_serv.cc:
Use a full-blown my_error() in net_serv.cc to report an error,
instead of just setting net->last_errno. This ensures the invariant that
whenever thd->is_error() returns TRUE, we have a message in
thd->main_da.message().
Remove initialization of removed NET members.
sql/opt_range.cc:
Use my_error() instead of just raising thd->net.report_error.
This ensures the invariant that whenever thd->is_error() returns TRUE,
there is a message in thd->main_da.message().
sql/opt_sum.cc:
Move invocation of fatal_error() right next to the place where
we set the error message. That makes it easier to track that whenever
fatal_error() is called, there is a message in THD.
sql/protocol.cc:
Rename send_ok() and send_eof() to net_send_ok() and net_send_eof()
respectively. These functions write directly to the network and are not
for use anywhere outside the client/server protocol code.
Remove the code that was responsible for cases when either there is
no error code, or no error message, or both.
Instead the calling code ensures that they are always present. Asserts
are added to enforce the invariant.
Instead of a direct access to thd->server_status and thd->total_warn_count
use function parameters, since these from now on don't always come directly
from THD.
Introduce net_end_statement(), the single-entry-point replacement API for
send_ok(), send_eof() and net_send_error().
Implement Protocol::end_partial_result_set to use in select_send::abort()
when there is a continue handler.
sql/protocol.h:
Update declarations.
sql/repl_failsafe.cc:
Use getters to access statement status information in THD.
Rename net.last_error to net.client_last_error.
sql/rpl_record.cc:
Set an error message in prepare_record() if there is no default
value for the field -- later we do print this message to the client.
sql/rpl_rli.cc:
Use getters to access statement status information in THD.
sql/slave.cc:
In create_table_from_dump() (a common function that is used in
LOAD MASTER TABLE SQL statement and COM_LOAD_MASTER_DATA), instead of hacks
with no_send_ok, clear the diagnostics area when mysql_rm_table() succeeded.
Update has_temporary_error() to work correctly when no error is set.
This is the case when Incident_log_event is executed: it always returns
an error but does not set an error message.
Use getters to access error status information.
sql/sp_head.cc:
Instead of hacks with no_send_error, work through the diagnostics area
interface to suppress sending of OK/ERROR packets to the client.
Move query_cache_end_of_result before log_slow_statement(), similarly
to how it's done in dispatch_command().
sql/sp_rcontext.cc:
Remove hacks with assignment of thd->net.report_error, they are not
necessary any more (see the changes in mysqld.cc).
sql/sql_acl.cc:
Use getters to access error status information in THD.
sql/sql_base.cc:
Access thd->main_da.sql_errno() only if there is an error. This fixes
a bug when auto-discovery, that was effectively disabled under pre-locking.
sql/sql_binlog.cc:
Remove hacks with no_send_ok/no_send_error, they are not necessary
anymore: the caller is responsible for network communication.
sql/sql_cache.cc:
Disable sending of OK/ERROR/EOF packet in the end of dispatch_command
if the response has been served from the query cache. This raises the
question whether we should store EOF packet in the query cache at all,
or generate it anew for each statement (we should generate it anew), but
this is to be addressed separately.
sql/sql_class.cc:
Implement class Diagnostics_area. Please see comments in sql_class.h
for details.
Fix a subtle coding mistake in select_send::send_data: when on slave,
an error in Item::send() was ignored.
The problem became visible due to asserts that the diagnostics area is
never double assigned.
Remove initialization of removed NET members.
In select_send::abort() do not call select_send::send_eof(). This is
not inheritance-safe. Even if a stored procedure continue handler is
found, the current statement is aborted, not succeeded.
Instead introduce a Protocol API to send the required response,
Protocol::end_partial_result_set().
This simplifies implementation of select_send::send_eof(). No need
to add more asserts that there is no error, there is an assert inside
Diagnostics_area::set_ok_status() already.
Leave no trace of no_send_* in the code.
sql/sql_class.h:
Declare class Diagnostics_area.
Remove the hack with no_send_ok from
Substatement_state.
Provide inline implementations of send_ok/send_eof.
Add commetns.
sql/sql_connect.cc:
Remove hacks with no_send_error.
Since now an error in THD is always set if net->error, it's not necessary
to check both net->error and thd->is_error() in the do_command loop.
Use thd->main_da.message() instead of net->last_errno.
Remove the hack with is_slave_error in sys_init_connect. Since now we do not
reset the diagnostics area in net_send_error (it's reset at the beginning
of the next statement), we can access it safely even after
execute_init_command.
sql/sql_db.cc:
Update the code to satisfy the invariant that the diagnostics area is never
assigned twice.
Incidentally, this fixes Bug 29958 "Weird message on DROP DATABASE if
mysql.proc does not exist".
sql/sql_delete.cc:
Change multi-delete to abort in abort(), as per select_send protocol.
Fixes the merge error with the test for Bug 29136
sql/sql_derived.cc:
Use getters to access error information.
sql/sql_insert.cc:
Use getters to access error information.
sql-common/client.c:
Rename last_error to client_last_error, last_errno to client_last_errno.
sql/sql_parse.cc:
Remove hacks with no_send_error. Deploy net_end_statement().
The story of COM_SHUTDOWN is interesting. Long story short, the server
would become on its death's door, and only no_send_ok/no_send_error assigned
by send_ok()/net_send_error() would hide its babbling from the client.
First of all, COM_QUIT does not require a response. So, the comment saying
"Let's send a response to possible COM_QUIT" is not only groundless
(even mysqladmin shutdown/mysql_shutdown() doesn't send COM_QUIT after
COM_SHUTDOWN), it's plainly incorrect.
Secondly, besides this additional 'OK' packet to respond to a hypothetical
COM_QUIT, there was the following code in dispatch_command():
if (thd->killed)
thd->send_kill_message();
if (thd->is_error()
net_send_error(thd);
This worked out really funny for the thread through which COM_SHUTDOWN
was delivered: we would get COM_SHUTDOWN, say okay, say okay again,
kill everybody, get the kill signal ourselves, and then attempt to say
"Server shutdown in progress" to the client that is very likely long gone.
This all became visible when asserts were added that the Diagnostics_area
is not assigned twice.
Move query_cache_end_of_result() to the end of dispatch_command(), since
net_send_eof() has been moved there. This is safe, query_cache_end_of_result()
is a no-op if there is no started query in the cache.
Consistently use select_send interface to call abort() or send_eof()
depending on the operation result.
Remove thd->fatal_error() from reset_master(), it was a no-op.
in hacks with no_send_error woudl save us
from complete breakage of the client/server protocol.
Consistently use select_send::abort() whenever there is an error,
and select_send::send_eof() in case of success.
The issue became visible due to added asserts.
sql/sql_partition.cc:
Always set an error in THD whenever there is a call to fatal_error().
sql/sql_prepare.cc:
Deploy class Diagnostics_area.
Remove the unnecessary juggling with the protocol in
Select_fetch_protocol_binary::send_eof(). EOF packet format is
protocol-independent.
sql/sql_select.cc:
Call fatal_error() directly in opt_sum_query.
Call my_error() whenever we call thd->fatal_error().
sql/sql_servers.cc:
Use getters to access error information in THD.
sql/sql_show.cc:
Use getters to access error information in THD.
Add comments.
Call my_error() whenever we call fatal_error().
sql/sql_table.cc:
Replace hacks with no_send_ok with the interface of the diagnostics area.
Clear the error if ENOENT error in ha_delete_table().
sql/sql_update.cc:
Introduce multi_update::abort(), which is the proper way to abort a
multi-update. This fixes the merge conflict between this patch and
the patch for Bug 29136.
sql/table.cc:
Use a getter to access error information in THD.
sql/tztime.cc:
Use a getter to access error information in THD.
2007-12-12 16:21:01 +01:00
|
|
|
|
--error ER_NO_SUCH_TABLE
|
2007-11-26 19:09:40 +01:00
|
|
|
|
FLUSH PRIVILEGES;
|
|
|
|
|
--echo Assigning privileges without procs_priv table.
|
|
|
|
|
CREATE DATABASE mysqltest1;
|
|
|
|
|
CREATE PROCEDURE mysqltest1.test() SQL SECURITY DEFINER
|
|
|
|
|
SELECT 1;
|
|
|
|
|
--error ER_NO_SUCH_TABLE
|
|
|
|
|
GRANT EXECUTE ON FUNCTION mysqltest1.test TO mysqltest_1@localhost;
|
|
|
|
|
GRANT ALL PRIVILEGES ON test.* TO mysqltest_1@localhost;
|
|
|
|
|
CALL mysqltest1.test();
|
|
|
|
|
DROP DATABASE mysqltest1;
|
|
|
|
|
RENAME TABLE mysql.procs_gone TO mysql.procs_priv;
|
2008-02-04 19:55:36 +01:00
|
|
|
|
DROP USER mysqltest_1@localhost;
|
2007-11-26 19:09:40 +01:00
|
|
|
|
FLUSH PRIVILEGES;
|
|
|
|
|
|
2007-12-07 11:56:03 +01:00
|
|
|
|
|
2008-03-05 20:18:35 +01:00
|
|
|
|
#
|
2009-02-09 22:00:15 +01:00
|
|
|
|
# Bug#33464 DROP FUNCTION caused a crash.
|
2008-03-05 20:18:35 +01:00
|
|
|
|
#
|
|
|
|
|
CREATE DATABASE dbbug33464;
|
|
|
|
|
CREATE USER 'userbug33464'@'localhost';
|
|
|
|
|
|
|
|
|
|
GRANT CREATE ROUTINE ON dbbug33464.* TO 'userbug33464'@'localhost';
|
|
|
|
|
|
|
|
|
|
--replace_result $MASTER_MYPORT MYSQL_PORT $MASTER_MYSOCK MYSQL_SOCK
|
|
|
|
|
connect (connbug33464, localhost, userbug33464, , dbbug33464);
|
|
|
|
|
--source suite/funcs_1/include/show_connection.inc
|
|
|
|
|
|
|
|
|
|
--disable_warnings
|
|
|
|
|
DROP PROCEDURE IF EXISTS sp3;
|
|
|
|
|
DROP FUNCTION IF EXISTS fn1;
|
|
|
|
|
--enable_warnings
|
|
|
|
|
|
|
|
|
|
delimiter //;
|
|
|
|
|
CREATE PROCEDURE sp3(v1 char(20))
|
|
|
|
|
BEGIN
|
|
|
|
|
SELECT * from dbbug33464.t6 where t6.f2= 'xyz';
|
|
|
|
|
END//
|
|
|
|
|
delimiter ;//
|
|
|
|
|
|
|
|
|
|
delimiter //;
|
|
|
|
|
CREATE FUNCTION fn1() returns char(50) SQL SECURITY INVOKER
|
|
|
|
|
BEGIN
|
|
|
|
|
return 1;
|
|
|
|
|
END//
|
|
|
|
|
delimiter ;//
|
|
|
|
|
|
|
|
|
|
delimiter //;
|
|
|
|
|
CREATE FUNCTION fn2() returns char(50) SQL SECURITY DEFINER
|
|
|
|
|
BEGIN
|
|
|
|
|
return 2;
|
|
|
|
|
END//
|
|
|
|
|
delimiter ;//
|
|
|
|
|
|
|
|
|
|
disconnect connbug33464;
|
|
|
|
|
|
|
|
|
|
# cleanup
|
|
|
|
|
connection default;
|
|
|
|
|
USE dbbug33464;
|
|
|
|
|
--source suite/funcs_1/include/show_connection.inc
|
|
|
|
|
|
|
|
|
|
SELECT fn1();
|
|
|
|
|
SELECT fn2();
|
|
|
|
|
|
|
|
|
|
--error 0, ER_CANNOT_USER
|
|
|
|
|
DROP USER 'userbug33464'@'localhost';
|
|
|
|
|
|
|
|
|
|
DROP FUNCTION fn1;
|
|
|
|
|
DROP FUNCTION fn2;
|
|
|
|
|
DROP PROCEDURE sp3;
|
|
|
|
|
|
|
|
|
|
--error 0, ER_CANNOT_USER
|
|
|
|
|
DROP USER 'userbug33464'@'localhost';
|
|
|
|
|
|
2009-02-09 22:00:15 +01:00
|
|
|
|
USE test;
|
2008-03-05 20:18:35 +01:00
|
|
|
|
DROP DATABASE dbbug33464;
|
|
|
|
|
|
|
|
|
|
|
BUG#37975: wait_for_slave_* should increase the timeout
Problem 1: tests often fail in pushbuild with a timeout when waiting
for the slave to start/stop/receive error.
Fix 1: Updated the wait_for_slave_* macros in the following way:
- The timeout is increased by a factor ten
- Refactored the macros so that wait_for_slave_param does the work for
the other macros.
Problem 2: Tests are often incorrectly written, lacking a
source include/wait_for_slave_to_[start|stop].inc.
Fix 2: Improved the chance to get it right by adding
include/start_slave.inc and include/stop_slave.inc, and updated tests
to use these.
Problem 3: The the built-in test language command
wait_for_slave_to_stop is a misnomer (does not wait for the slave io
thread) and does not give as much debug info in case of failure as
the otherwise equivalent macro
source include/wait_for_slave_sql_to_stop.inc
Fix 3: Replaced all calls to the built-in command by a call to the
macro.
Problem 4: Some, but not all, of the wait_for_slave_* macros had an
implicit connection slave. This made some tests confusing to read,
and made it more difficult to use the macro in circular replication
scenarios, where the connection named master needs to wait.
Fix 4: Removed the implicit connection slave from all
wait_for_slave_* macros, and updated tests to use an explicit
connection slave where necessary.
Problem 5: The macros wait_slave_status.inc and wait_show_pattern.inc
were unused. Moreover, using them is difficult and error-prone.
Fix 5: remove these macros.
Problem 6: log_bin_trust_function_creators_basic failed when running
tests because it assumed @@global.log_bin_trust_function_creators=1,
and some tests modified this variable without resetting it to its
original value.
Fix 6: All tests that use this variable have been updated so that
they reset the value at end of test.
mysql-test/extra/rpl_tests/rpl_extraMaster_Col.test:
Replaced wait_for_slave_to_stop by include/wait_for_slave_sql_to_stop.inc
mysql-test/extra/rpl_tests/rpl_extraSlave_Col.test:
Replaced wait_for_slave_to_stop by include/wait_for_slave_sql_to_stop.inc
Added connection slave since includ/wait_for_slave_sql_to_stop.inc
does not do that anymore.
mysql-test/extra/rpl_tests/rpl_log.test:
Replaced start slave+wait_slave_status by start_slave.inc
mysql-test/include/reset_master_and_slave.inc:
replaced start/stop slave by start_slave.inc/stop_slave.inc
mysql-test/include/sync_slave_io_with_master.inc:
Improved comments and error message.
mysql-test/include/wait_for_slave_io_to_stop.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_for_slave_param.inc:
- Improved usage instructions
- Added more debug info in case of timeout
- Added parameters $slave_param_comparison, $slave_timeout,
$slave_keep_connection, $slave_error_message
mysql-test/include/wait_for_slave_sql_error.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_for_slave_sql_to_start.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_for_slave_sql_to_stop.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_for_slave_to_start.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_for_slave_to_stop.inc:
Refactored to use wait_for_slave_param.inc.
Removed connection slave.
mysql-test/include/wait_show_pattern.inc:
Removed unused (and error-prone) file
mysql-test/include/wait_slave_status.inc:
Removed unused (and error-prone) file
mysql-test/suite/binlog/t/binlog_auto_increment_bug33029.test:
Renamed $keep_connection to $slave_keep_connection.
mysql-test/suite/rpl/t/rpl_bug26395.test:
Replace stop slave by stop_slave.inc
mysql-test/suite/rpl/t/rpl_circular_for_4_hosts.test:
Replace start/stop slave by start_slave.inc/stop_slave.inc.
Replace wait_for_slave_param by wait_for_slave_sql_to_stop.inc.
mysql-test/suite/rpl/t/rpl_dual_pos_advance.test:
Renamed $keep_connection to $slave_keep_connection.
mysql-test/suite/rpl/t/rpl_flushlog_loop.test:
Replace wait_slave_status by start_slave.inc
mysql-test/suite/rpl/t/rpl_idempotency.test:
Added connection slave since wait_for_slave_sql_to_stop.inc does not
do that any more.
mysql-test/suite/rpl/t/rpl_incident.test:
Replaced wait_for_slave_to_stop by wait_for_slave_sql_to_stop.inc
mysql-test/suite/rpl/t/rpl_init_slave.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
Replaced save_master_pos;connection slave;sync_with_master by
sync_slave_with_master.
mysql-test/suite/rpl/t/rpl_log_pos.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
Replaced wait_for_slave_param by other wait_for_slave_* macros.
mysql-test/suite/rpl/t/rpl_packet.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_row_inexist_tbl.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_row_stop_middle_update.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_row_until.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
Replaced save_master_pos;connection slave;sync_with_master by
sync_slave_with_master.
mysql-test/suite/rpl/t/rpl_server_id1.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_slave_grp_exec.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_slave_skip.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_slave_status.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/suite/rpl/t/rpl_sp.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/suite/rpl/t/rpl_sp_effects.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/suite/rpl/t/rpl_stm_until.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
Replaced save_master_pos;connection slave;sync_with_master by
sync_slave_with_master.
mysql-test/suite/rpl_ndb/t/rpl_ndb_basic.test:
Replaced start slave by start_slave.inc.
Added explicit connection slave since wait_for_slave_sql_to_stop.inc
does not do that anymore.
mysql-test/t/disabled.def:
Disabled failing test.
mysql-test/t/func_time.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/grant.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/grant2.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/innodb_notembedded.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/log_bin_trust_function_creators_func.test:
Restore @@global.log_bin_trust_function_creators at end of test.
Clean up at end of test by dropping the created user.
mysql-test/t/query_cache.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/query_cache_notembedded.test:
Restore @@global.log_bin_trust_function_creators at end of test.
mysql-test/t/rpl_init_slave_func.test:
Replaced start/stop slave by start_slave.inc/stop_slave.inc.
mysql-test/t/timezone2.test:
Restore @@global.log_bin_trust_function_creators at end of test.
2008-07-10 18:09:39 +02:00
|
|
|
|
SET @@global.log_bin_trust_function_creators= @old_log_bin_trust_function_creators;
|
2009-02-09 22:00:15 +01:00
|
|
|
|
|
2009-05-29 15:37:54 +02:00
|
|
|
|
#
|
|
|
|
|
# Bug#44658 Create procedure makes server crash when user does not have ALL privilege
|
|
|
|
|
#
|
|
|
|
|
CREATE USER user1;
|
|
|
|
|
CREATE USER user2;
|
|
|
|
|
GRANT CREATE ON db1.* TO 'user1'@'localhost';
|
|
|
|
|
GRANT CREATE ROUTINE ON db1.* TO 'user1'@'localhost';
|
|
|
|
|
GRANT CREATE ON db1.* TO 'user2'@'%';
|
|
|
|
|
GRANT CREATE ROUTINE ON db1.* TO 'user2'@'%';
|
|
|
|
|
FLUSH PRIVILEGES;
|
|
|
|
|
SHOW GRANTS FOR 'user1'@'localhost';
|
|
|
|
|
connect (con1,localhost,user1,,);
|
|
|
|
|
--echo ** Connect as user1 and create a procedure.
|
|
|
|
|
--echo ** The creation will imply implicitly assigned
|
|
|
|
|
--echo ** EXECUTE and ALTER ROUTINE privileges to
|
|
|
|
|
--echo ** the current user user1@localhost.
|
|
|
|
|
SELECT @@GLOBAL.sql_mode;
|
|
|
|
|
SELECT @@SESSION.sql_mode;
|
|
|
|
|
CREATE DATABASE db1;
|
|
|
|
|
DELIMITER ||;
|
|
|
|
|
CREATE PROCEDURE db1.proc1(p1 INT)
|
|
|
|
|
BEGIN
|
|
|
|
|
SET @x = 0;
|
|
|
|
|
REPEAT SET @x = @x + 1; UNTIL @x > p1 END REPEAT;
|
|
|
|
|
END ;||
|
|
|
|
|
DELIMITER ;||
|
|
|
|
|
|
|
|
|
|
connect (con2,localhost,user2,,);
|
|
|
|
|
--echo ** Connect as user2 and create a procedure.
|
|
|
|
|
--echo ** Implicitly assignment of privileges will
|
|
|
|
|
--echo ** fail because the user2@localhost is an
|
|
|
|
|
--echo ** unknown user.
|
|
|
|
|
DELIMITER ||;
|
|
|
|
|
CREATE PROCEDURE db1.proc2(p1 INT)
|
|
|
|
|
BEGIN
|
|
|
|
|
SET @x = 0;
|
|
|
|
|
REPEAT SET @x = @x + 1; UNTIL @x > p1 END REPEAT;
|
|
|
|
|
END ;||
|
|
|
|
|
DELIMITER ;||
|
|
|
|
|
|
|
|
|
|
connection default;
|
|
|
|
|
SHOW GRANTS FOR 'user1'@'localhost';
|
|
|
|
|
SHOW GRANTS FOR 'user2';
|
|
|
|
|
disconnect con1;
|
|
|
|
|
disconnect con2;
|
|
|
|
|
DROP PROCEDURE db1.proc1;
|
|
|
|
|
DROP PROCEDURE db1.proc2;
|
|
|
|
|
REVOKE ALL ON db1.* FROM 'user1'@'localhost';
|
|
|
|
|
REVOKE ALL ON db1.* FROM 'user2'@'%';
|
|
|
|
|
DROP USER 'user1';
|
|
|
|
|
DROP USER 'user1'@'localhost';
|
|
|
|
|
DROP USER 'user2';
|
|
|
|
|
DROP DATABASE db1;
|
|
|
|
|
|
2009-02-05 21:47:23 +01:00
|
|
|
|
# Wait till we reached the initial number of concurrent sessions
|
|
|
|
|
--source include/wait_until_count_sessions.inc
|