mirror of
https://github.com/MariaDB/server.git
synced 2025-01-17 20:42:30 +01:00
66e0ee6639
MySQL crashes if a user without proper privileges attempts to create a procedure. The crash happens because more than one error state is pushed onto the Diagnostic area. In this particular case the user is denied to implicitly create a new user account with the implicitly granted privileges ALTER- and EXECUTE ROUTINE. The new account is needed if the original user account contained a host mask. A user account with a host mask is a distinct user account in this context. An alternative would be to first get the most permissive user account which include the current user connection and then assign privileges to that account. This behavior change is considered out of scope for this bug patch. The implicit assignment of privileges when a user creates a stored routine is a considered to be a feature for user convenience and as such it is not a critical operation. Any failure to complete this operation is thus considered non-fatal (an error becomes a warning). The patch back ports a stack implementation of the internal error handler interface. This enables the use of multiple error handlers so that it is possible to intercept and cancel errors thrown by lower layers. This is needed as a error handler already is used in the call stack emitting the errors which needs to be converted. mysql-test/r/grant.result: * Added test case for bug44658 mysql-test/t/grant.test: * Added test case for bug44658 sql/sp.cc: * Removed non functional parameter no_error and my_error calls as all errors from this function will be converted to a warning anyway. * Change function return type from int to bool. sql/sp.h: * Removed non functional parameter no_error and my_error calls as all errors from this function will be converted to a warning anyway. * Changed function return value from int to bool sql/sql_acl.cc: * Removed the non functional no_error parameter from the function prototype. The function is called from two places and in one of the places we now ignore errors through error handlers. * Introduced the parameter write_to_binlog * Introduced an error handler to cancel any error state from mysql_routine_grant. * Moved my_ok() signal from mysql_routine_grant to make it easier to avoid setting the wrong state in the Diagnostic area. * Changed the broken error state in sp_grant_privileges() to a warning so that if "CREATE PROCEDURE" fails because "Password hash isn't a hexidecimal number" it is still clear what happened. sql/sql_acl.h: * Removed the non functional no_error parameter from the function prototype. The function is called from two places and in one of the places we now ignore errors through error handlers. * Introduced the parameter write_to_binlog * Changed return type for sp_grant_privileges() from int to bool sql/sql_class.cc: * Back ported implementation of internal error handler from 6.0 branch sql/sql_class.h: * Back ported implementation of internal error handler from 6.0 branch sql/sql_parse.cc: * Moved my_ok() signal from mysql_routine_grant() to make it easier to avoid setting the wrong state in the Diagnostic area.
1529 lines
45 KiB
Text
1529 lines
45 KiB
Text
# Test of GRANT commands
|
||
|
||
# Grant tests not performed with embedded server
|
||
-- source include/not_embedded.inc
|
||
|
||
# Save the initial number of concurrent sessions
|
||
--source include/count_sessions.inc
|
||
|
||
SET @old_log_bin_trust_function_creators= @@global.log_bin_trust_function_creators;
|
||
SET GLOBAL log_bin_trust_function_creators = 1;
|
||
|
||
# Cleanup
|
||
--disable_warnings
|
||
drop table if exists t1;
|
||
drop database if exists mysqltest;
|
||
--enable_warnings
|
||
|
||
connect (master,localhost,root,,);
|
||
connection master;
|
||
SET NAMES binary;
|
||
|
||
#
|
||
# Test that SSL options works properly
|
||
#
|
||
|
||
delete from mysql.user where user='mysqltest_1';
|
||
delete from mysql.db where user='mysqltest_1';
|
||
flush privileges;
|
||
grant select on mysqltest.* to mysqltest_1@localhost require cipher "EDH-RSA-DES-CBC3-SHA";
|
||
show grants for mysqltest_1@localhost;
|
||
grant delete on mysqltest.* to mysqltest_1@localhost;
|
||
select * from mysql.user where user="mysqltest_1";
|
||
show grants for mysqltest_1@localhost;
|
||
revoke delete on mysqltest.* from mysqltest_1@localhost;
|
||
show grants for mysqltest_1@localhost;
|
||
grant select on mysqltest.* to mysqltest_1@localhost require NONE;
|
||
show grants for mysqltest_1@localhost;
|
||
grant USAGE on mysqltest.* to mysqltest_1@localhost require cipher "EDH-RSA-DES-CBC3-SHA" AND SUBJECT "testsubject" ISSUER "MySQL AB";
|
||
show grants for mysqltest_1@localhost;
|
||
revoke all privileges on mysqltest.* from mysqltest_1@localhost;
|
||
show grants for mysqltest_1@localhost;
|
||
delete from mysql.user where user='mysqltest_1';
|
||
flush privileges;
|
||
|
||
#
|
||
# Test of GRANTS specifying user limits
|
||
#
|
||
delete from mysql.user where user='mysqltest_1';
|
||
flush privileges;
|
||
grant usage on *.* to mysqltest_1@localhost with max_queries_per_hour 10;
|
||
select * from mysql.user where user="mysqltest_1";
|
||
show grants for mysqltest_1@localhost;
|
||
grant usage on *.* to mysqltest_1@localhost with max_updates_per_hour 20 max_connections_per_hour 30;
|
||
select * from mysql.user where user="mysqltest_1";
|
||
show grants for mysqltest_1@localhost;
|
||
# This is just to double check that one won't ignore results of selects
|
||
flush privileges;
|
||
show grants for mysqltest_1@localhost;
|
||
delete from mysql.user where user='mysqltest_1';
|
||
flush privileges;
|
||
|
||
#
|
||
# Test that the new db privileges are stored/retrieved correctly
|
||
#
|
||
|
||
grant CREATE TEMPORARY TABLES, LOCK TABLES on mysqltest.* to mysqltest_1@localhost;
|
||
show grants for mysqltest_1@localhost;
|
||
flush privileges;
|
||
show grants for mysqltest_1@localhost;
|
||
revoke CREATE TEMPORARY TABLES on mysqltest.* from mysqltest_1@localhost;
|
||
show grants for mysqltest_1@localhost;
|
||
grant ALL PRIVILEGES on mysqltest.* to mysqltest_1@localhost with GRANT OPTION;
|
||
flush privileges;
|
||
show grants for mysqltest_1@localhost;
|
||
revoke LOCK TABLES, ALTER on mysqltest.* from mysqltest_1@localhost;
|
||
show grants for mysqltest_1@localhost;
|
||
revoke all privileges on mysqltest.* from mysqltest_1@localhost;
|
||
delete from mysql.user where user='mysqltest_1';
|
||
flush privileges;
|
||
grant usage on test.* to mysqltest_1@localhost with grant option;
|
||
show grants for mysqltest_1@localhost;
|
||
delete from mysql.user where user='mysqltest_1';
|
||
delete from mysql.db where user='mysqltest_1';
|
||
delete from mysql.tables_priv where user='mysqltest_1';
|
||
delete from mysql.columns_priv where user='mysqltest_1';
|
||
flush privileges;
|
||
--error ER_NONEXISTING_GRANT
|
||
show grants for mysqltest_1@localhost;
|
||
|
||
#
|
||
# Test what happens when you have same table and colum level grants
|
||
#
|
||
|
||
create table t1 (a int);
|
||
GRANT select,update,insert on t1 to mysqltest_1@localhost;
|
||
GRANT select (a), update (a),insert(a), references(a) on t1 to mysqltest_1@localhost;
|
||
show grants for mysqltest_1@localhost;
|
||
select table_priv,column_priv from mysql.tables_priv where user="mysqltest_1";
|
||
REVOKE select (a), update on t1 from mysqltest_1@localhost;
|
||
show grants for mysqltest_1@localhost;
|
||
REVOKE select,update,insert,insert (a) on t1 from mysqltest_1@localhost;
|
||
show grants for mysqltest_1@localhost;
|
||
GRANT select,references on t1 to mysqltest_1@localhost;
|
||
select table_priv,column_priv from mysql.tables_priv where user="mysqltest_1";
|
||
grant all on test.* to mysqltest_3@localhost with grant option;
|
||
revoke all on test.* from mysqltest_3@localhost;
|
||
show grants for mysqltest_3@localhost;
|
||
revoke grant option on test.* from mysqltest_3@localhost;
|
||
show grants for mysqltest_3@localhost;
|
||
grant all on test.t1 to mysqltest_2@localhost with grant option;
|
||
revoke all on test.t1 from mysqltest_2@localhost;
|
||
show grants for mysqltest_2@localhost;
|
||
revoke grant option on test.t1 from mysqltest_2@localhost;
|
||
show grants for mysqltest_2@localhost;
|
||
delete from mysql.user where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
|
||
delete from mysql.db where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
|
||
delete from mysql.tables_priv where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
|
||
delete from mysql.columns_priv where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
|
||
flush privileges;
|
||
drop table t1;
|
||
|
||
#
|
||
# Test some error conditions
|
||
#
|
||
--error ER_WRONG_USAGE
|
||
GRANT FILE on mysqltest.* to mysqltest_1@localhost;
|
||
select 1; # To test that the previous command didn't cause problems
|
||
|
||
#
|
||
# Bug#4898 User privileges depending on ORDER BY Settings of table db
|
||
#
|
||
insert into mysql.user (host, user) values ('localhost', 'test11');
|
||
insert into mysql.db (host, db, user, select_priv) values
|
||
('localhost', 'a%', 'test11', 'Y'), ('localhost', 'ab%', 'test11', 'Y');
|
||
alter table mysql.db order by db asc;
|
||
flush privileges;
|
||
show grants for test11@localhost;
|
||
alter table mysql.db order by db desc;
|
||
flush privileges;
|
||
show grants for test11@localhost;
|
||
delete from mysql.user where user='test11';
|
||
delete from mysql.db where user='test11';
|
||
|
||
#
|
||
# Bug#6123 GRANT USAGE inserts useless Db row
|
||
#
|
||
create database mysqltest1;
|
||
grant usage on mysqltest1.* to test6123 identified by 'magic123';
|
||
select host,db,user,select_priv,insert_priv from mysql.db where db="mysqltest1";
|
||
delete from mysql.user where user='test6123';
|
||
drop database mysqltest1;
|
||
|
||
#
|
||
# Test for 'drop user', 'revoke privileges, grant'
|
||
#
|
||
|
||
create table t1 (a int);
|
||
grant ALL PRIVILEGES on *.* to drop_user2@localhost with GRANT OPTION;
|
||
show grants for drop_user2@localhost;
|
||
revoke all privileges, grant option from drop_user2@localhost;
|
||
drop user drop_user2@localhost;
|
||
|
||
grant ALL PRIVILEGES on *.* to drop_user@localhost with GRANT OPTION;
|
||
grant ALL PRIVILEGES on test.* to drop_user@localhost with GRANT OPTION;
|
||
grant select(a) on test.t1 to drop_user@localhost;
|
||
show grants for drop_user@localhost;
|
||
|
||
#
|
||
# Bug#3086 SHOW GRANTS doesn't follow ANSI_QUOTES
|
||
#
|
||
set sql_mode=ansi_quotes;
|
||
show grants for drop_user@localhost;
|
||
set sql_mode=default;
|
||
|
||
set sql_quote_show_create=0;
|
||
show grants for drop_user@localhost;
|
||
set sql_mode="ansi_quotes";
|
||
show grants for drop_user@localhost;
|
||
set sql_quote_show_create=1;
|
||
show grants for drop_user@localhost;
|
||
set sql_mode="";
|
||
show grants for drop_user@localhost;
|
||
|
||
revoke all privileges, grant option from drop_user@localhost;
|
||
show grants for drop_user@localhost;
|
||
drop user drop_user@localhost;
|
||
--error ER_REVOKE_GRANTS
|
||
revoke all privileges, grant option from drop_user@localhost;
|
||
|
||
grant select(a) on test.t1 to drop_user1@localhost;
|
||
grant select on test.t1 to drop_user2@localhost;
|
||
grant select on test.* to drop_user3@localhost;
|
||
grant select on *.* to drop_user4@localhost;
|
||
# Drop user now implicitly revokes all privileges.
|
||
drop user drop_user1@localhost, drop_user2@localhost, drop_user3@localhost,
|
||
drop_user4@localhost;
|
||
--error ER_REVOKE_GRANTS
|
||
revoke all privileges, grant option from drop_user1@localhost, drop_user2@localhost,
|
||
drop_user3@localhost, drop_user4@localhost;
|
||
--error ER_CANNOT_USER
|
||
drop user drop_user1@localhost, drop_user2@localhost, drop_user3@localhost,
|
||
drop_user4@localhost;
|
||
drop table t1;
|
||
grant usage on *.* to mysqltest_1@localhost identified by "password";
|
||
grant select, update, insert on test.* to mysqltest_1@localhost;
|
||
show grants for mysqltest_1@localhost;
|
||
drop user mysqltest_1@localhost;
|
||
|
||
#
|
||
# Bug#3403 Wrong encoding in SHOW GRANTS output
|
||
#
|
||
SET NAMES koi8r;
|
||
CREATE DATABASE <20><>;
|
||
USE <20><>;
|
||
CREATE TABLE <20><><EFBFBD> (<28><><EFBFBD> INT);
|
||
|
||
GRANT SELECT ON <20><>.* TO <20><><EFBFBD><EFBFBD>@localhost;
|
||
SHOW GRANTS FOR <20><><EFBFBD><EFBFBD>@localhost;
|
||
REVOKE SELECT ON <20><>.* FROM <20><><EFBFBD><EFBFBD>@localhost;
|
||
|
||
GRANT SELECT ON <20><>.<2E><><EFBFBD> TO <20><><EFBFBD><EFBFBD>@localhost;
|
||
SHOW GRANTS FOR <20><><EFBFBD><EFBFBD>@localhost;
|
||
REVOKE SELECT ON <20><>.<2E><><EFBFBD> FROM <20><><EFBFBD><EFBFBD>@localhost;
|
||
|
||
GRANT SELECT (<28><><EFBFBD>) ON <20><>.<2E><><EFBFBD> TO <20><><EFBFBD><EFBFBD>@localhost;
|
||
SHOW GRANTS FOR <20><><EFBFBD><EFBFBD>@localhost;
|
||
REVOKE SELECT (<28><><EFBFBD>) ON <20><>.<2E><><EFBFBD> FROM <20><><EFBFBD><EFBFBD>@localhost;
|
||
|
||
# Revoke does not drop user. Leave a clean user table for the next tests.
|
||
DROP USER <20><><EFBFBD><EFBFBD>@localhost;
|
||
|
||
DROP DATABASE <20><>;
|
||
SET NAMES latin1;
|
||
|
||
#
|
||
# Bug#5831 REVOKE ALL PRIVILEGES, GRANT OPTION does not revoke everything
|
||
#
|
||
USE test;
|
||
CREATE TABLE t1 (a int );
|
||
CREATE TABLE t2 LIKE t1;
|
||
CREATE TABLE t3 LIKE t1;
|
||
CREATE TABLE t4 LIKE t1;
|
||
CREATE TABLE t5 LIKE t1;
|
||
CREATE TABLE t6 LIKE t1;
|
||
CREATE TABLE t7 LIKE t1;
|
||
CREATE TABLE t8 LIKE t1;
|
||
CREATE TABLE t9 LIKE t1;
|
||
CREATE TABLE t10 LIKE t1;
|
||
CREATE DATABASE testdb1;
|
||
CREATE DATABASE testdb2;
|
||
CREATE DATABASE testdb3;
|
||
CREATE DATABASE testdb4;
|
||
CREATE DATABASE testdb5;
|
||
CREATE DATABASE testdb6;
|
||
CREATE DATABASE testdb7;
|
||
CREATE DATABASE testdb8;
|
||
CREATE DATABASE testdb9;
|
||
CREATE DATABASE testdb10;
|
||
GRANT ALL ON testdb1.* TO testuser@localhost;
|
||
GRANT ALL ON testdb2.* TO testuser@localhost;
|
||
GRANT ALL ON testdb3.* TO testuser@localhost;
|
||
GRANT ALL ON testdb4.* TO testuser@localhost;
|
||
GRANT ALL ON testdb5.* TO testuser@localhost;
|
||
GRANT ALL ON testdb6.* TO testuser@localhost;
|
||
GRANT ALL ON testdb7.* TO testuser@localhost;
|
||
GRANT ALL ON testdb8.* TO testuser@localhost;
|
||
GRANT ALL ON testdb9.* TO testuser@localhost;
|
||
GRANT ALL ON testdb10.* TO testuser@localhost;
|
||
GRANT SELECT ON test.t1 TO testuser@localhost;
|
||
GRANT SELECT ON test.t2 TO testuser@localhost;
|
||
GRANT SELECT ON test.t3 TO testuser@localhost;
|
||
GRANT SELECT ON test.t4 TO testuser@localhost;
|
||
GRANT SELECT ON test.t5 TO testuser@localhost;
|
||
GRANT SELECT ON test.t6 TO testuser@localhost;
|
||
GRANT SELECT ON test.t7 TO testuser@localhost;
|
||
GRANT SELECT ON test.t8 TO testuser@localhost;
|
||
GRANT SELECT ON test.t9 TO testuser@localhost;
|
||
GRANT SELECT ON test.t10 TO testuser@localhost;
|
||
GRANT SELECT (a) ON test.t1 TO testuser@localhost;
|
||
GRANT SELECT (a) ON test.t2 TO testuser@localhost;
|
||
GRANT SELECT (a) ON test.t3 TO testuser@localhost;
|
||
GRANT SELECT (a) ON test.t4 TO testuser@localhost;
|
||
GRANT SELECT (a) ON test.t5 TO testuser@localhost;
|
||
GRANT SELECT (a) ON test.t6 TO testuser@localhost;
|
||
GRANT SELECT (a) ON test.t7 TO testuser@localhost;
|
||
GRANT SELECT (a) ON test.t8 TO testuser@localhost;
|
||
GRANT SELECT (a) ON test.t9 TO testuser@localhost;
|
||
GRANT SELECT (a) ON test.t10 TO testuser@localhost;
|
||
REVOKE ALL PRIVILEGES, GRANT OPTION FROM testuser@localhost;
|
||
SHOW GRANTS FOR testuser@localhost;
|
||
DROP USER testuser@localhost;
|
||
DROP TABLE t1,t2,t3,t4,t5,t6,t7,t8,t9,t10;
|
||
DROP DATABASE testdb1;
|
||
DROP DATABASE testdb2;
|
||
DROP DATABASE testdb3;
|
||
DROP DATABASE testdb4;
|
||
DROP DATABASE testdb5;
|
||
DROP DATABASE testdb6;
|
||
DROP DATABASE testdb7;
|
||
DROP DATABASE testdb8;
|
||
DROP DATABASE testdb9;
|
||
DROP DATABASE testdb10;
|
||
|
||
#
|
||
# Bug#6932 a problem with 'revoke ALL PRIVILEGES'
|
||
#
|
||
|
||
create table t1(a int, b int, c int, d int);
|
||
grant insert(b), insert(c), insert(d), insert(a) on t1 to grant_user@localhost;
|
||
show grants for grant_user@localhost;
|
||
select Host,Db,User,Table_name,Column_name,Column_priv from mysql.columns_priv order by Column_name;
|
||
revoke ALL PRIVILEGES on t1 from grant_user@localhost;
|
||
show grants for grant_user@localhost;
|
||
select Host,Db,User,Table_name,Column_name,Column_priv from mysql.columns_priv;
|
||
drop user grant_user@localhost;
|
||
drop table t1;
|
||
|
||
#
|
||
# Bug#7391 Cross-database multi-table UPDATE security problem
|
||
#
|
||
create database mysqltest_1;
|
||
create database mysqltest_2;
|
||
create table mysqltest_1.t1 select 1 a, 2 q;
|
||
create table mysqltest_1.t2 select 1 b, 2 r;
|
||
create table mysqltest_2.t1 select 1 c, 2 s;
|
||
create table mysqltest_2.t2 select 1 d, 2 t;
|
||
|
||
# test the column privileges
|
||
grant update (a) on mysqltest_1.t1 to mysqltest_3@localhost;
|
||
grant select (b) on mysqltest_1.t2 to mysqltest_3@localhost;
|
||
grant select (c) on mysqltest_2.t1 to mysqltest_3@localhost;
|
||
grant update (d) on mysqltest_2.t2 to mysqltest_3@localhost;
|
||
connect (conn1,localhost,mysqltest_3,,);
|
||
connection conn1;
|
||
SELECT * FROM INFORMATION_SCHEMA.COLUMN_PRIVILEGES
|
||
WHERE GRANTEE = '''mysqltest_3''@''localhost'''
|
||
ORDER BY TABLE_NAME,COLUMN_NAME,PRIVILEGE_TYPE;
|
||
SELECT * FROM INFORMATION_SCHEMA.TABLE_PRIVILEGES
|
||
WHERE GRANTEE = '''mysqltest_3''@''localhost'''
|
||
ORDER BY TABLE_NAME,PRIVILEGE_TYPE;
|
||
SELECT * from INFORMATION_SCHEMA.SCHEMA_PRIVILEGES
|
||
WHERE GRANTEE = '''mysqltest_3''@''localhost'''
|
||
ORDER BY TABLE_SCHEMA,PRIVILEGE_TYPE;
|
||
SELECT * from INFORMATION_SCHEMA.USER_PRIVILEGES
|
||
WHERE GRANTEE = '''mysqltest_3''@''localhost'''
|
||
ORDER BY TABLE_CATALOG,PRIVILEGE_TYPE;
|
||
--error ER_COLUMNACCESS_DENIED_ERROR
|
||
update mysqltest_1.t1, mysqltest_1.t2 set q=10 where b=1;
|
||
--error ER_COLUMNACCESS_DENIED_ERROR
|
||
update mysqltest_1.t2, mysqltest_2.t2 set d=20 where d=1;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
update mysqltest_1.t1, mysqltest_2.t2 set d=20 where d=1;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
update mysqltest_2.t1, mysqltest_1.t2 set c=20 where b=1;
|
||
--error ER_COLUMNACCESS_DENIED_ERROR
|
||
update mysqltest_2.t1, mysqltest_2.t2 set d=10 where s=2;
|
||
# the following two should work
|
||
update mysqltest_1.t1, mysqltest_2.t2 set a=10,d=10;
|
||
update mysqltest_1.t1, mysqltest_2.t1 set a=20 where c=20;
|
||
connection master;
|
||
select t1.*,t2.* from mysqltest_1.t1,mysqltest_1.t2;
|
||
select t1.*,t2.* from mysqltest_2.t1,mysqltest_2.t2;
|
||
revoke all on mysqltest_1.t1 from mysqltest_3@localhost;
|
||
revoke all on mysqltest_1.t2 from mysqltest_3@localhost;
|
||
revoke all on mysqltest_2.t1 from mysqltest_3@localhost;
|
||
revoke all on mysqltest_2.t2 from mysqltest_3@localhost;
|
||
|
||
# test the db/table level privileges
|
||
grant all on mysqltest_2.* to mysqltest_3@localhost;
|
||
grant select on *.* to mysqltest_3@localhost;
|
||
# Next grant is needed to trigger bug#7391. Do not optimize!
|
||
grant select on mysqltest_2.t1 to mysqltest_3@localhost;
|
||
flush privileges;
|
||
disconnect conn1;
|
||
connect (conn2,localhost,mysqltest_3,,);
|
||
connection conn2;
|
||
use mysqltest_1;
|
||
update mysqltest_2.t1, mysqltest_2.t2 set c=500,d=600;
|
||
# the following failed before, should fail now.
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
update mysqltest_1.t1, mysqltest_1.t2 set a=100,b=200;
|
||
use mysqltest_2;
|
||
# the following used to succeed, it must fail now.
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
update mysqltest_1.t1, mysqltest_1.t2 set a=100,b=200;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
update mysqltest_2.t1, mysqltest_1.t2 set c=100,b=200;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
update mysqltest_1.t1, mysqltest_2.t2 set a=100,d=200;
|
||
# lets see the result
|
||
connection master;
|
||
select t1.*,t2.* from mysqltest_1.t1,mysqltest_1.t2;
|
||
select t1.*,t2.* from mysqltest_2.t1,mysqltest_2.t2;
|
||
|
||
delete from mysql.user where user='mysqltest_3';
|
||
delete from mysql.db where user="mysqltest_3";
|
||
delete from mysql.tables_priv where user="mysqltest_3";
|
||
delete from mysql.columns_priv where user="mysqltest_3";
|
||
flush privileges;
|
||
drop database mysqltest_1;
|
||
drop database mysqltest_2;
|
||
disconnect conn2;
|
||
|
||
#
|
||
# just SHOW PRIVILEGES test
|
||
#
|
||
SHOW PRIVILEGES;
|
||
|
||
#
|
||
# Rights for renaming test (Bug#3270)
|
||
#
|
||
connect (root,localhost,root,,test,$MASTER_MYPORT,$MASTER_MYSOCK);
|
||
connection root;
|
||
--disable_warnings
|
||
create database mysqltest;
|
||
--enable_warnings
|
||
create table mysqltest.t1 (a int,b int,c int);
|
||
grant all on mysqltest.t1 to mysqltest_1@localhost;
|
||
connect (user1,localhost,mysqltest_1,,mysqltest,$MASTER_MYPORT,$MASTER_MYSOCK);
|
||
connection user1;
|
||
-- error ER_TABLEACCESS_DENIED_ERROR
|
||
alter table t1 rename t2;
|
||
disconnect user1;
|
||
connection root;
|
||
revoke all privileges on mysqltest.t1 from mysqltest_1@localhost;
|
||
delete from mysql.user where user=_binary'mysqltest_1';
|
||
drop database mysqltest;
|
||
connection default;
|
||
disconnect root;
|
||
|
||
#
|
||
# check all new table privileges
|
||
#
|
||
CREATE USER dummy@localhost;
|
||
CREATE DATABASE mysqltest;
|
||
CREATE TABLE mysqltest.dummytable (dummyfield INT);
|
||
CREATE VIEW mysqltest.dummyview AS SELECT dummyfield FROM mysqltest.dummytable;
|
||
GRANT ALL PRIVILEGES ON mysqltest.dummytable TO dummy@localhost;
|
||
GRANT ALL PRIVILEGES ON mysqltest.dummyview TO dummy@localhost;
|
||
SHOW GRANTS FOR dummy@localhost;
|
||
use INFORMATION_SCHEMA;
|
||
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
||
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
||
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
||
FLUSH PRIVILEGES;
|
||
SHOW GRANTS FOR dummy@localhost;
|
||
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
||
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
||
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
||
SHOW FIELDS FROM mysql.tables_priv;
|
||
use test;
|
||
REVOKE ALL PRIVILEGES, GRANT OPTION FROM dummy@localhost;
|
||
DROP USER dummy@localhost;
|
||
DROP DATABASE mysqltest;
|
||
# check view only privileges
|
||
CREATE USER dummy@localhost;
|
||
CREATE DATABASE mysqltest;
|
||
CREATE TABLE mysqltest.dummytable (dummyfield INT);
|
||
CREATE VIEW mysqltest.dummyview AS SELECT dummyfield FROM mysqltest.dummytable;
|
||
GRANT CREATE VIEW ON mysqltest.dummytable TO dummy@localhost;
|
||
GRANT CREATE VIEW ON mysqltest.dummyview TO dummy@localhost;
|
||
SHOW GRANTS FOR dummy@localhost;
|
||
use INFORMATION_SCHEMA;
|
||
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
||
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
||
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
||
FLUSH PRIVILEGES;
|
||
SHOW GRANTS FOR dummy@localhost;
|
||
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
||
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
||
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
||
use test;
|
||
REVOKE ALL PRIVILEGES, GRANT OPTION FROM dummy@localhost;
|
||
DROP USER dummy@localhost;
|
||
DROP DATABASE mysqltest;
|
||
CREATE USER dummy@localhost;
|
||
CREATE DATABASE mysqltest;
|
||
CREATE TABLE mysqltest.dummytable (dummyfield INT);
|
||
CREATE VIEW mysqltest.dummyview AS SELECT dummyfield FROM mysqltest.dummytable;
|
||
GRANT SHOW VIEW ON mysqltest.dummytable TO dummy@localhost;
|
||
GRANT SHOW VIEW ON mysqltest.dummyview TO dummy@localhost;
|
||
SHOW GRANTS FOR dummy@localhost;
|
||
use INFORMATION_SCHEMA;
|
||
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
||
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
||
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
||
FLUSH PRIVILEGES;
|
||
SHOW GRANTS FOR dummy@localhost;
|
||
SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
|
||
PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
|
||
= '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
|
||
use test;
|
||
REVOKE ALL PRIVILEGES, GRANT OPTION FROM dummy@localhost;
|
||
DROP USER dummy@localhost;
|
||
DROP DATABASE mysqltest;
|
||
#
|
||
# Bug#11330 Entry in tables_priv with host = '' causes crash
|
||
#
|
||
connection default;
|
||
use mysql;
|
||
insert into tables_priv values ('','test_db','mysqltest_1','test_table','test_grantor',CURRENT_TIMESTAMP,'Select','Select');
|
||
flush privileges;
|
||
delete from tables_priv where host = '' and user = 'mysqltest_1';
|
||
flush privileges;
|
||
use test;
|
||
|
||
#
|
||
# Bug#10892 user variables not auto cast for comparisons
|
||
# Check that we don't get illegal mix of collations
|
||
#
|
||
set @user123="non-existent";
|
||
select * from mysql.db where user=@user123;
|
||
|
||
set names koi8r;
|
||
create database <20><>;
|
||
grant select on <20><>.* to root@localhost;
|
||
select hex(Db) from mysql.db where Db='<27><>';
|
||
show grants for root@localhost;
|
||
flush privileges;
|
||
show grants for root@localhost;
|
||
drop database <20><>;
|
||
revoke all privileges on <20><>.* from root@localhost;
|
||
show grants for root@localhost;
|
||
set names latin1;
|
||
|
||
#
|
||
# Bug#15598 Server crashes in specific case during setting new password
|
||
# - Caused by a user with host ''
|
||
#
|
||
create user mysqltest_7@;
|
||
set password for mysqltest_7@ = password('systpass');
|
||
show grants for mysqltest_7@;
|
||
drop user mysqltest_7@;
|
||
--error ER_NONEXISTING_GRANT
|
||
show grants for mysqltest_7@;
|
||
|
||
#
|
||
# Bug#14385 GRANT and mapping to correct user account problems
|
||
#
|
||
create database mysqltest;
|
||
use mysqltest;
|
||
create table t1(f1 int);
|
||
GRANT DELETE ON mysqltest.t1 TO mysqltest1@'%';
|
||
GRANT SELECT ON mysqltest.t1 TO mysqltest1@'192.%';
|
||
show grants for mysqltest1@'192.%';
|
||
show grants for mysqltest1@'%';
|
||
delete from mysql.user where user='mysqltest1';
|
||
delete from mysql.db where user='mysqltest1';
|
||
delete from mysql.tables_priv where user='mysqltest1';
|
||
flush privileges;
|
||
drop database mysqltest;
|
||
|
||
#
|
||
# Bug#27515 DROP previlege is not required for RENAME TABLE
|
||
#
|
||
connection master;
|
||
create database db27515;
|
||
use db27515;
|
||
create table t1 (a int);
|
||
grant alter on db27515.t1 to user27515@localhost;
|
||
grant insert, create on db27515.t2 to user27515@localhost;
|
||
|
||
connect (conn27515, localhost, user27515, , db27515);
|
||
connection conn27515;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
rename table t1 to t2;
|
||
disconnect conn27515;
|
||
|
||
connection master;
|
||
revoke all privileges, grant option from user27515@localhost;
|
||
drop user user27515@localhost;
|
||
drop database db27515;
|
||
|
||
--echo End of 4.1 tests
|
||
|
||
#
|
||
# Bug#16297 In memory grant tables not flushed when users's hostname is ""
|
||
#
|
||
use test;
|
||
create table t1 (a int);
|
||
|
||
# Backup anonymous users and remove them. (They get in the way of
|
||
# the one we test with here otherwise.)
|
||
create table t2 as select * from mysql.user where user='';
|
||
delete from mysql.user where user='';
|
||
flush privileges;
|
||
|
||
# Create some users with different hostnames
|
||
create user mysqltest_8@'';
|
||
create user mysqltest_8;
|
||
create user mysqltest_8@host8;
|
||
|
||
# Try to create them again
|
||
--error ER_CANNOT_USER
|
||
create user mysqltest_8@'';
|
||
--error ER_CANNOT_USER
|
||
create user mysqltest_8;
|
||
--error ER_CANNOT_USER
|
||
create user mysqltest_8@host8;
|
||
|
||
select user, QUOTE(host) from mysql.user where user="mysqltest_8";
|
||
|
||
--echo Schema privileges
|
||
grant select on mysqltest.* to mysqltest_8@'';
|
||
show grants for mysqltest_8@'';
|
||
grant select on mysqltest.* to mysqltest_8@;
|
||
show grants for mysqltest_8@;
|
||
grant select on mysqltest.* to mysqltest_8;
|
||
show grants for mysqltest_8;
|
||
select * from information_schema.schema_privileges
|
||
where grantee like "'mysqltest_8'%";
|
||
connect (conn3,localhost,mysqltest_8,,);
|
||
select * from t1;
|
||
disconnect conn3;
|
||
connection master;
|
||
revoke select on mysqltest.* from mysqltest_8@'';
|
||
revoke select on mysqltest.* from mysqltest_8;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
select * from information_schema.schema_privileges
|
||
where grantee like "'mysqltest_8'%";
|
||
flush privileges;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8@;
|
||
grant select on mysqltest.* to mysqltest_8@'';
|
||
flush privileges;
|
||
show grants for mysqltest_8@;
|
||
revoke select on mysqltest.* from mysqltest_8@'';
|
||
flush privileges;
|
||
|
||
--echo Column privileges
|
||
grant update (a) on t1 to mysqltest_8@'';
|
||
grant update (a) on t1 to mysqltest_8;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
flush privileges;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
select * from information_schema.column_privileges;
|
||
connect (conn4,localhost,mysqltest_8,,);
|
||
select * from t1;
|
||
disconnect conn4;
|
||
connection master;
|
||
revoke update (a) on t1 from mysqltest_8@'';
|
||
revoke update (a) on t1 from mysqltest_8;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
select * from information_schema.column_privileges;
|
||
flush privileges;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
|
||
--echo Table privileges
|
||
grant update on t1 to mysqltest_8@'';
|
||
grant update on t1 to mysqltest_8;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
flush privileges;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
select * from information_schema.table_privileges;
|
||
connect (conn5,localhost,mysqltest_8,,);
|
||
select * from t1;
|
||
disconnect conn5;
|
||
connection master;
|
||
revoke update on t1 from mysqltest_8@'';
|
||
revoke update on t1 from mysqltest_8;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
select * from information_schema.table_privileges;
|
||
flush privileges;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
|
||
--echo "DROP USER" should clear privileges
|
||
grant all privileges on mysqltest.* to mysqltest_8@'';
|
||
grant select on mysqltest.* to mysqltest_8@'';
|
||
grant update on t1 to mysqltest_8@'';
|
||
grant update (a) on t1 to mysqltest_8@'';
|
||
grant all privileges on mysqltest.* to mysqltest_8;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
select * from information_schema.user_privileges
|
||
where grantee like "'mysqltest_8'%";
|
||
connect (conn5,localhost,mysqltest_8,,);
|
||
select * from t1;
|
||
disconnect conn5;
|
||
connection master;
|
||
flush privileges;
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
drop user mysqltest_8@'';
|
||
--error ER_NONEXISTING_GRANT
|
||
show grants for mysqltest_8@'';
|
||
show grants for mysqltest_8;
|
||
select * from information_schema.user_privileges
|
||
where grantee like "'mysqltest_8'%";
|
||
drop user mysqltest_8;
|
||
--replace_result $MASTER_MYSOCK MASTER_SOCKET $MASTER_MYPORT MASTER_PORT
|
||
--error ER_ACCESS_DENIED_ERROR
|
||
connect (conn6,localhost,mysqltest_8,,);
|
||
connection master;
|
||
--error ER_NONEXISTING_GRANT
|
||
show grants for mysqltest_8;
|
||
drop user mysqltest_8@host8;
|
||
--error ER_NONEXISTING_GRANT
|
||
show grants for mysqltest_8@host8;
|
||
|
||
# Restore the anonymous users.
|
||
insert into mysql.user select * from t2;
|
||
flush privileges;
|
||
drop table t2;
|
||
drop table t1;
|
||
|
||
#
|
||
# Bug#20214 Incorrect error when user calls SHOW CREATE VIEW on non
|
||
# privileged view
|
||
#
|
||
|
||
connection master;
|
||
|
||
CREATE DATABASE mysqltest3;
|
||
USE mysqltest3;
|
||
|
||
CREATE TABLE t_nn (c1 INT);
|
||
CREATE VIEW v_nn AS SELECT * FROM t_nn;
|
||
|
||
CREATE DATABASE mysqltest2;
|
||
USE mysqltest2;
|
||
|
||
CREATE TABLE t_nn (c1 INT);
|
||
CREATE VIEW v_nn AS SELECT * FROM t_nn;
|
||
CREATE VIEW v_yn AS SELECT * FROM t_nn;
|
||
CREATE VIEW v_gy AS SELECT * FROM t_nn;
|
||
CREATE VIEW v_ny AS SELECT * FROM t_nn;
|
||
CREATE VIEW v_yy AS SELECT * FROM t_nn WHERE c1=55;
|
||
|
||
GRANT SHOW VIEW ON mysqltest2.v_ny TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
|
||
GRANT SELECT ON mysqltest2.v_yn TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
|
||
GRANT SELECT ON mysqltest2.* TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
|
||
GRANT SHOW VIEW,SELECT ON mysqltest2.v_yy TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
|
||
|
||
connect (mysqltest_1, localhost, mysqltest_1, mysqltest_1,);
|
||
|
||
# fail because of missing SHOW VIEW (have generic SELECT)
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
SHOW CREATE VIEW mysqltest2.v_nn;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
SHOW CREATE TABLE mysqltest2.v_nn;
|
||
|
||
# fail because of missing SHOW VIEW
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
SHOW CREATE VIEW mysqltest2.v_yn;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
SHOW CREATE TABLE mysqltest2.v_yn;
|
||
|
||
# succeed (despite of missing SELECT, having SHOW VIEW bails us out)
|
||
SHOW CREATE TABLE mysqltest2.v_ny;
|
||
|
||
# succeed (despite of missing SELECT, having SHOW VIEW bails us out)
|
||
SHOW CREATE VIEW mysqltest2.v_ny;
|
||
|
||
# fail because of missing (specific or generic) SELECT
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
SHOW CREATE TABLE mysqltest3.t_nn;
|
||
|
||
# fail because of missing (specific or generic) SELECT (not because it's not a view!)
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
SHOW CREATE VIEW mysqltest3.t_nn;
|
||
|
||
# fail because of missing missing (specific or generic) SELECT (and SHOW VIEW)
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
SHOW CREATE VIEW mysqltest3.v_nn;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
SHOW CREATE TABLE mysqltest3.v_nn;
|
||
|
||
# succeed thanks to generic SELECT
|
||
SHOW CREATE TABLE mysqltest2.t_nn;
|
||
|
||
# fail because it's not a view! (have generic SELECT though)
|
||
--error ER_WRONG_OBJECT
|
||
SHOW CREATE VIEW mysqltest2.t_nn;
|
||
|
||
# succeed, have SELECT and SHOW VIEW
|
||
SHOW CREATE VIEW mysqltest2.v_yy;
|
||
|
||
# succeed, have SELECT and SHOW VIEW
|
||
SHOW CREATE TABLE mysqltest2.v_yy;
|
||
|
||
# clean-up
|
||
connection master;
|
||
|
||
# succeed, we're root
|
||
SHOW CREATE TABLE mysqltest2.v_nn;
|
||
SHOW CREATE VIEW mysqltest2.v_nn;
|
||
|
||
SHOW CREATE TABLE mysqltest2.t_nn;
|
||
|
||
# fail because it's not a view!
|
||
--error ER_WRONG_OBJECT
|
||
SHOW CREATE VIEW mysqltest2.t_nn;
|
||
|
||
DROP VIEW mysqltest2.v_nn;
|
||
DROP VIEW mysqltest2.v_yn;
|
||
DROP VIEW mysqltest2.v_ny;
|
||
DROP VIEW mysqltest2.v_yy;
|
||
DROP TABLE mysqltest2.t_nn;
|
||
DROP DATABASE mysqltest2;
|
||
DROP VIEW mysqltest3.v_nn;
|
||
DROP TABLE mysqltest3.t_nn;
|
||
DROP DATABASE mysqltest3;
|
||
disconnect mysqltest_1;
|
||
REVOKE ALL PRIVILEGES, GRANT OPTION FROM 'mysqltest_1'@'localhost';
|
||
DROP USER 'mysqltest_1'@'localhost';
|
||
|
||
# restore the original database
|
||
USE test;
|
||
connection default;
|
||
disconnect master;
|
||
|
||
|
||
#
|
||
# Bug#10668 CREATE USER does not enforce username length limit
|
||
#
|
||
--error ER_WRONG_STRING_LENGTH
|
||
create user mysqltest1_thisisreallytoolong;
|
||
|
||
#
|
||
# Test for Bug#16899 Possible buffer overflow in handling of DEFINER-clause.
|
||
#
|
||
# These checks are intended to ensure that appropriate errors are risen when
|
||
# illegal user name or hostname is specified in user-clause of GRANT/REVOKE
|
||
# statements.
|
||
#
|
||
|
||
#
|
||
# Bug#22369 Alter table rename combined with other alterations causes lost tables
|
||
#
|
||
CREATE DATABASE mysqltest1;
|
||
CREATE TABLE mysqltest1.t1 (
|
||
int_field INTEGER UNSIGNED NOT NULL,
|
||
char_field CHAR(10),
|
||
INDEX(`int_field`)
|
||
);
|
||
CREATE TABLE mysqltest1.t2 (int_field INT);
|
||
|
||
--echo "Now check that we require equivalent grants for "
|
||
--echo "RENAME TABLE and ALTER TABLE"
|
||
CREATE USER mysqltest_1@localhost;
|
||
GRANT SELECT ON mysqltest1.t1 TO mysqltest_1@localhost;
|
||
|
||
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
||
SELECT USER();
|
||
SHOW GRANTS;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
RENAME TABLE t1 TO t2;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
ALTER TABLE t1 RENAME TO t2;
|
||
--disconnect conn42
|
||
--connection default
|
||
GRANT DROP ON mysqltest1.t1 TO mysqltest_1@localhost;
|
||
|
||
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
RENAME TABLE t1 TO t2;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
ALTER TABLE t1 RENAME TO t2;
|
||
--disconnect conn42
|
||
--connection default
|
||
GRANT ALTER ON mysqltest1.t1 TO mysqltest_1@localhost;
|
||
|
||
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
||
SHOW GRANTS;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
RENAME TABLE t1 TO t2;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
ALTER TABLE t1 RENAME TO t2;
|
||
--disconnect conn42
|
||
--connection default
|
||
GRANT INSERT, CREATE ON mysqltest1.t1 TO mysqltest_1@localhost;
|
||
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
||
SHOW GRANTS;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
--disconnect conn42
|
||
--connection default
|
||
GRANT INSERT, SELECT, CREATE, ALTER, DROP ON mysqltest1.t2 TO mysqltest_1@localhost;
|
||
DROP TABLE mysqltest1.t2;
|
||
|
||
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
||
SHOW GRANTS;
|
||
RENAME TABLE t1 TO t2;
|
||
RENAME TABLE t2 TO t1;
|
||
ALTER TABLE t1 RENAME TO t2;
|
||
ALTER TABLE t2 RENAME TO t1;
|
||
--disconnect conn42
|
||
--connection default
|
||
REVOKE DROP, INSERT ON mysqltest1.t1 FROM mysqltest_1@localhost;
|
||
REVOKE DROP, INSERT ON mysqltest1.t2 FROM mysqltest_1@localhost;
|
||
|
||
connect (conn42,localhost,mysqltest_1,,mysqltest1);
|
||
SHOW GRANTS;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
RENAME TABLE t1 TO t2;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
ALTER TABLE t1 RENAME TO t2;
|
||
--disconnect conn42
|
||
--connection default
|
||
|
||
DROP USER mysqltest_1@localhost;
|
||
DROP DATABASE mysqltest1;
|
||
USE test;
|
||
|
||
# Working with database-level privileges.
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
GRANT CREATE ON mysqltest.* TO 1234567890abcdefGHIKL@localhost;
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
GRANT CREATE ON mysqltest.* TO some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
REVOKE CREATE ON mysqltest.* FROM 1234567890abcdefGHIKL@localhost;
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
REVOKE CREATE ON mysqltest.* FROM some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
||
|
||
# Working with table-level privileges.
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
GRANT CREATE ON t1 TO 1234567890abcdefGHIKL@localhost;
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
GRANT CREATE ON t1 TO some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
REVOKE CREATE ON t1 FROM 1234567890abcdefGHIKL@localhost;
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
REVOKE CREATE ON t1 FROM some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
||
|
||
# Working with routine-level privileges.
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
GRANT EXECUTE ON PROCEDURE p1 TO 1234567890abcdefGHIKL@localhost;
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
GRANT EXECUTE ON PROCEDURE p1 TO some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
REVOKE EXECUTE ON PROCEDURE p1 FROM 1234567890abcdefGHIKL@localhost;
|
||
|
||
--error ER_WRONG_STRING_LENGTH
|
||
REVOKE EXECUTE ON PROCEDURE t1 FROM some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
|
||
|
||
|
||
#
|
||
# Bug#23556 TRUNCATE TABLE still maps to DELETE
|
||
#
|
||
CREATE USER bug23556@localhost;
|
||
CREATE DATABASE bug23556;
|
||
GRANT SELECT ON bug23556.* TO bug23556@localhost;
|
||
connect (bug23556,localhost,bug23556,,bug23556);
|
||
|
||
connection default;
|
||
USE bug23556;
|
||
CREATE TABLE t1 (a INT PRIMARY KEY); INSERT INTO t1 VALUES (1),(2),(3),(4),(5);
|
||
GRANT DELETE ON t1 TO bug23556@localhost;
|
||
|
||
connection bug23556;
|
||
USE bug23556;
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
TRUNCATE t1;
|
||
|
||
connection default;
|
||
USE bug23556;
|
||
REVOKE DELETE ON t1 FROM bug23556@localhost;
|
||
GRANT DROP ON t1 TO bug23556@localhost;
|
||
|
||
connection bug23556;
|
||
USE bug23556;
|
||
TRUNCATE t1;
|
||
|
||
connection default;
|
||
USE bug23556;
|
||
DROP TABLE t1;
|
||
USE test;
|
||
DROP DATABASE bug23556;
|
||
DROP USER bug23556@localhost;
|
||
connection default;
|
||
disconnect bug23556;
|
||
|
||
|
||
#
|
||
# Bug#6774 Replication fails with Wrong usage of DB GRANT and GLOBAL PRIVILEGES
|
||
#
|
||
# Check if GRANT ... ON * ... fails when no database is selected
|
||
connect (con1, localhost, root,,*NO-ONE*);
|
||
connection con1;
|
||
--error ER_NO_DB_ERROR
|
||
GRANT PROCESS ON * TO user@localhost;
|
||
disconnect con1;
|
||
connection default;
|
||
|
||
|
||
#
|
||
# Bug#9504 Stored procedures: execute privilege doesn't make 'use database'
|
||
# okay.
|
||
#
|
||
|
||
# Prepare.
|
||
|
||
--disable_warnings
|
||
DROP DATABASE IF EXISTS mysqltest1;
|
||
DROP DATABASE IF EXISTS mysqltest2;
|
||
DROP DATABASE IF EXISTS mysqltest3;
|
||
DROP DATABASE IF EXISTS mysqltest4;
|
||
--enable_warnings
|
||
|
||
CREATE DATABASE mysqltest1;
|
||
CREATE DATABASE mysqltest2;
|
||
CREATE DATABASE mysqltest3;
|
||
CREATE DATABASE mysqltest4;
|
||
|
||
CREATE PROCEDURE mysqltest1.p_def() SQL SECURITY DEFINER
|
||
SELECT 1;
|
||
|
||
CREATE PROCEDURE mysqltest2.p_inv() SQL SECURITY INVOKER
|
||
SELECT 1;
|
||
|
||
CREATE FUNCTION mysqltest3.f_def() RETURNS INT SQL SECURITY DEFINER
|
||
RETURN 1;
|
||
|
||
CREATE FUNCTION mysqltest4.f_inv() RETURNS INT SQL SECURITY INVOKER
|
||
RETURN 1;
|
||
|
||
GRANT EXECUTE ON PROCEDURE mysqltest1.p_def TO mysqltest_1@localhost;
|
||
GRANT EXECUTE ON PROCEDURE mysqltest2.p_inv TO mysqltest_1@localhost;
|
||
GRANT EXECUTE ON FUNCTION mysqltest3.f_def TO mysqltest_1@localhost;
|
||
GRANT EXECUTE ON FUNCTION mysqltest4.f_inv TO mysqltest_1@localhost;
|
||
|
||
GRANT ALL PRIVILEGES ON test.* TO mysqltest_1@localhost;
|
||
|
||
# Test.
|
||
|
||
--connect (bug9504_con1,localhost,mysqltest_1,,)
|
||
--echo
|
||
--echo ---> connection: bug9504_con1
|
||
|
||
# - Check that we can switch to the db;
|
||
|
||
use mysqltest1;
|
||
|
||
use mysqltest2;
|
||
|
||
use mysqltest3;
|
||
|
||
use mysqltest4;
|
||
|
||
# - Check that we can call stored routines;
|
||
|
||
use test;
|
||
|
||
CALL mysqltest1.p_def();
|
||
|
||
CALL mysqltest2.p_inv();
|
||
|
||
SELECT mysqltest3.f_def();
|
||
|
||
SELECT mysqltest4.f_inv();
|
||
|
||
# Cleanup.
|
||
|
||
--connection default
|
||
--echo
|
||
--echo ---> connection: default
|
||
|
||
--disconnect bug9504_con1
|
||
|
||
DROP DATABASE mysqltest1;
|
||
DROP DATABASE mysqltest2;
|
||
DROP DATABASE mysqltest3;
|
||
DROP DATABASE mysqltest4;
|
||
|
||
DROP USER mysqltest_1@localhost;
|
||
|
||
|
||
#
|
||
# Bug#27337 Privileges are not restored properly.
|
||
#
|
||
# Actually, the patch for this bugs fixes two problems. So, here are two test
|
||
# cases.
|
||
|
||
# Test case 1: privileges are not restored properly after calling a stored
|
||
# routine defined with SQL SECURITY INVOKER clause.
|
||
|
||
# Prepare.
|
||
|
||
--disable_warnings
|
||
DROP DATABASE IF EXISTS mysqltest1;
|
||
DROP DATABASE IF EXISTS mysqltest2;
|
||
--enable_warnings
|
||
|
||
CREATE DATABASE mysqltest1;
|
||
CREATE DATABASE mysqltest2;
|
||
|
||
GRANT ALL PRIVILEGES ON mysqltest1.* TO mysqltest_1@localhost;
|
||
GRANT SELECT ON mysqltest2.* TO mysqltest_1@localhost;
|
||
|
||
CREATE PROCEDURE mysqltest1.p1() SQL SECURITY INVOKER
|
||
SELECT 1;
|
||
|
||
# Test.
|
||
|
||
--connect (bug27337_con1,localhost,mysqltest_1,,mysqltest2)
|
||
--echo
|
||
--echo ---> connection: bug27337_con1
|
||
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
CREATE TABLE t1(c INT);
|
||
|
||
CALL mysqltest1.p1();
|
||
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
CREATE TABLE t1(c INT);
|
||
|
||
--disconnect bug27337_con1
|
||
|
||
--connect (bug27337_con2,localhost,mysqltest_1,,mysqltest2)
|
||
--echo
|
||
--echo ---> connection: bug27337_con2
|
||
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
CREATE TABLE t1(c INT);
|
||
|
||
SHOW TABLES;
|
||
|
||
# Cleanup.
|
||
|
||
--connection default
|
||
--echo
|
||
--echo ---> connection: default
|
||
|
||
--disconnect bug27337_con2
|
||
|
||
DROP DATABASE mysqltest1;
|
||
DROP DATABASE mysqltest2;
|
||
|
||
DROP USER mysqltest_1@localhost;
|
||
|
||
# Test case 2: privileges are not checked properly for prepared statements.
|
||
|
||
# Prepare.
|
||
|
||
--disable_warnings
|
||
DROP DATABASE IF EXISTS mysqltest1;
|
||
DROP DATABASE IF EXISTS mysqltest2;
|
||
--enable_warnings
|
||
|
||
CREATE DATABASE mysqltest1;
|
||
CREATE DATABASE mysqltest2;
|
||
|
||
CREATE TABLE mysqltest1.t1(c INT);
|
||
CREATE TABLE mysqltest2.t2(c INT);
|
||
|
||
GRANT SELECT ON mysqltest1.t1 TO mysqltest_1@localhost;
|
||
GRANT SELECT ON mysqltest2.t2 TO mysqltest_2@localhost;
|
||
|
||
# Test.
|
||
|
||
--connect (bug27337_con1,localhost,mysqltest_1,,mysqltest1)
|
||
--echo
|
||
--echo ---> connection: bug27337_con1
|
||
|
||
SHOW TABLES FROM mysqltest1;
|
||
|
||
PREPARE stmt1 FROM 'SHOW TABLES FROM mysqltest1';
|
||
|
||
EXECUTE stmt1;
|
||
|
||
--connect (bug27337_con2,localhost,mysqltest_2,,mysqltest2)
|
||
--echo
|
||
--echo ---> connection: bug27337_con2
|
||
|
||
SHOW COLUMNS FROM mysqltest2.t2;
|
||
|
||
PREPARE stmt2 FROM 'SHOW COLUMNS FROM mysqltest2.t2';
|
||
|
||
EXECUTE stmt2;
|
||
|
||
--connection default
|
||
--echo
|
||
--echo ---> connection: default
|
||
|
||
REVOKE SELECT ON mysqltest1.t1 FROM mysqltest_1@localhost;
|
||
REVOKE SELECT ON mysqltest2.t2 FROM mysqltest_2@localhost;
|
||
|
||
--connection bug27337_con1
|
||
--echo
|
||
--echo ---> connection: bug27337_con1
|
||
|
||
--error ER_DBACCESS_DENIED_ERROR
|
||
SHOW TABLES FROM mysqltest1;
|
||
|
||
--error ER_DBACCESS_DENIED_ERROR
|
||
EXECUTE stmt1;
|
||
|
||
--connection bug27337_con2
|
||
--echo
|
||
--echo ---> connection: bug27337_con2
|
||
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
SHOW COLUMNS FROM mysqltest2.t2;
|
||
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
EXECUTE stmt2;
|
||
|
||
# Cleanup.
|
||
|
||
--connection default
|
||
--echo
|
||
--echo ---> connection: default
|
||
|
||
--disconnect bug27337_con1
|
||
--disconnect bug27337_con2
|
||
|
||
DROP DATABASE mysqltest1;
|
||
DROP DATABASE mysqltest2;
|
||
|
||
DROP USER mysqltest_1@localhost;
|
||
DROP USER mysqltest_2@localhost;
|
||
|
||
#
|
||
# Bug#27878 Unchecked privileges on a view referring to a table from another
|
||
# database.
|
||
#
|
||
USE test;
|
||
CREATE TABLE t1 (f1 int, f2 int);
|
||
INSERT INTO t1 VALUES(1,1), (2,2);
|
||
CREATE DATABASE db27878;
|
||
GRANT UPDATE(f1) ON t1 TO 'mysqltest_1'@'localhost';
|
||
GRANT SELECT ON `test`.* TO 'mysqltest_1'@'localhost';
|
||
GRANT ALL ON db27878.* TO 'mysqltest_1'@'localhost';
|
||
USE db27878;
|
||
CREATE SQL SECURITY INVOKER VIEW db27878.v1 AS SELECT * FROM test.t1;
|
||
connect (user1,localhost,mysqltest_1,,test);
|
||
connection user1;
|
||
USE db27878;
|
||
--error 1356
|
||
UPDATE v1 SET f2 = 4;
|
||
SELECT * FROM test.t1;
|
||
disconnect user1;
|
||
connection default;
|
||
REVOKE UPDATE (f1) ON `test`.`t1` FROM 'mysqltest_1'@'localhost';
|
||
REVOKE SELECT ON `test`.* FROM 'mysqltest_1'@'localhost';
|
||
REVOKE ALL ON db27878.* FROM 'mysqltest_1'@'localhost';
|
||
DROP USER mysqltest_1@localhost;
|
||
DROP DATABASE db27878;
|
||
USE test;
|
||
DROP TABLE t1;
|
||
|
||
--echo #
|
||
--echo # Bug#33275 Server crash when creating temporary table mysql.user
|
||
--echo #
|
||
CREATE TEMPORARY TABLE mysql.user (id INT);
|
||
FLUSH PRIVILEGES;
|
||
DROP TABLE mysql.user;
|
||
|
||
|
||
#
|
||
# Bug#33201 Crash occurs when granting update privilege on one column of a view
|
||
#
|
||
drop table if exists test;
|
||
drop function if exists test_function;
|
||
drop view if exists v1;
|
||
create table test (col1 varchar(30));
|
||
delimiter |;
|
||
create function test_function() returns varchar(30)
|
||
begin
|
||
declare tmp varchar(30);
|
||
select col1 from test limit 1 into tmp;
|
||
return '1';
|
||
end|
|
||
delimiter ;|
|
||
create view v1 as select test.* from test where test.col1=test_function();
|
||
grant update (col1) on v1 to 'greg'@'localhost';
|
||
drop user 'greg'@'localhost';
|
||
drop view v1;
|
||
drop table test;
|
||
drop function test_function;
|
||
|
||
#
|
||
# Bug#41456 SET PASSWORD hates CURRENT_USER()
|
||
#
|
||
SELECT CURRENT_USER();
|
||
SET PASSWORD FOR CURRENT_USER() = PASSWORD("admin");
|
||
SET PASSWORD FOR CURRENT_USER() = PASSWORD("");
|
||
|
||
--echo End of 5.0 tests
|
||
|
||
#
|
||
# Bug#21432 Database/Table name limited to 64 bytes, not chars, problems with multi-byte
|
||
#
|
||
set names utf8;
|
||
grant select on test.* to юзер_юзер@localhost;
|
||
--exec $MYSQL --default-character-set=utf8 --user=юзер_юзер -e "select user()"
|
||
revoke all on test.* from юзер_юзер@localhost;
|
||
drop user юзер_юзер@localhost;
|
||
--error ER_WRONG_STRING_LENGTH
|
||
grant select on test.* to очень_длинный_юзер@localhost;
|
||
set names default;
|
||
|
||
#
|
||
# Bug#20901 CREATE privilege is enough to insert into a table
|
||
#
|
||
|
||
create database mysqltest;
|
||
use mysqltest;
|
||
|
||
grant create on mysqltest.* to mysqltest@localhost;
|
||
create table t1 (i INT);
|
||
|
||
connect (user1,localhost,mysqltest,,mysqltest);
|
||
connection user1;
|
||
# show we don't have INSERT
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
insert into t1 values (1);
|
||
# show we have CREATE
|
||
create table t2 (i INT);
|
||
create table t4 (i INT);
|
||
|
||
connection default;
|
||
grant select, insert on mysqltest.t2 to mysqltest@localhost;
|
||
grant insert on mysqltest.t4 to mysqltest@localhost;
|
||
# to specify ACLs for non-existent objects, must explictly |CREATE
|
||
grant create, insert on mysqltest.t5 to mysqltest@localhost;
|
||
grant create, insert on mysqltest.t6 to mysqltest@localhost;
|
||
flush privileges;
|
||
|
||
connection user1;
|
||
insert into t2 values (1);
|
||
|
||
|
||
# CREATE IF NOT EXISTS...SELECT, t1 exists, no INSERT, must fail
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
create table if not exists t1 select * from t2;
|
||
|
||
# CREATE IF NOT EXISTS...SELECT, no t3 yet, no INSERT, must fail
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
create table if not exists t3 select * from t2;
|
||
|
||
# CREATE IF NOT EXISTS...SELECT, t4 exists, have INSERT, must succeed
|
||
create table if not exists t4 select * from t2;
|
||
|
||
# CREATE IF NOT EXISTS...SELECT, no t5 yet, have INSERT, must succeed
|
||
create table if not exists t5 select * from t2;
|
||
|
||
|
||
# CREATE...SELECT, no t6 yet, have INSERT, must succeed
|
||
create table t6 select * from t2;
|
||
|
||
# CREATE...SELECT, no t7 yet, no INSERT, must fail
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
create table t7 select * from t2;
|
||
|
||
# CREATE...SELECT, t4 exists, have INSERT, must still fail (exists)
|
||
--error 1050
|
||
create table t4 select * from t2;
|
||
|
||
# CREATE...SELECT, t1 exists, no INSERT, must fail
|
||
--error ER_TABLEACCESS_DENIED_ERROR
|
||
create table t1 select * from t2;
|
||
|
||
|
||
connection default;
|
||
drop table t1,t2,t4,t5,t6;
|
||
|
||
revoke create on mysqltest.* from mysqltest@localhost;
|
||
revoke select, insert on mysqltest.t2 from mysqltest@localhost;
|
||
revoke insert on mysqltest.t4 from mysqltest@localhost;
|
||
revoke create, insert on mysqltest.t5 from mysqltest@localhost;
|
||
revoke create, insert on mysqltest.t6 from mysqltest@localhost;
|
||
drop user mysqltest@localhost;
|
||
|
||
disconnect user1;
|
||
drop database mysqltest;
|
||
use test;
|
||
|
||
|
||
#
|
||
# Bug#16470 crash on grant if old grant tables
|
||
#
|
||
--echo FLUSH PRIVILEGES without procs_priv table.
|
||
RENAME TABLE mysql.procs_priv TO mysql.procs_gone;
|
||
--error ER_NO_SUCH_TABLE
|
||
FLUSH PRIVILEGES;
|
||
--echo Assigning privileges without procs_priv table.
|
||
CREATE DATABASE mysqltest1;
|
||
CREATE PROCEDURE mysqltest1.test() SQL SECURITY DEFINER
|
||
SELECT 1;
|
||
--error ER_NO_SUCH_TABLE
|
||
GRANT EXECUTE ON FUNCTION mysqltest1.test TO mysqltest_1@localhost;
|
||
GRANT ALL PRIVILEGES ON test.* TO mysqltest_1@localhost;
|
||
CALL mysqltest1.test();
|
||
DROP DATABASE mysqltest1;
|
||
RENAME TABLE mysql.procs_gone TO mysql.procs_priv;
|
||
DROP USER mysqltest_1@localhost;
|
||
FLUSH PRIVILEGES;
|
||
|
||
|
||
#
|
||
# Bug#33464 DROP FUNCTION caused a crash.
|
||
#
|
||
CREATE DATABASE dbbug33464;
|
||
CREATE USER 'userbug33464'@'localhost';
|
||
|
||
GRANT CREATE ROUTINE ON dbbug33464.* TO 'userbug33464'@'localhost';
|
||
|
||
--replace_result $MASTER_MYPORT MYSQL_PORT $MASTER_MYSOCK MYSQL_SOCK
|
||
connect (connbug33464, localhost, userbug33464, , dbbug33464);
|
||
--source suite/funcs_1/include/show_connection.inc
|
||
|
||
--disable_warnings
|
||
DROP PROCEDURE IF EXISTS sp3;
|
||
DROP FUNCTION IF EXISTS fn1;
|
||
--enable_warnings
|
||
|
||
delimiter //;
|
||
CREATE PROCEDURE sp3(v1 char(20))
|
||
BEGIN
|
||
SELECT * from dbbug33464.t6 where t6.f2= 'xyz';
|
||
END//
|
||
delimiter ;//
|
||
|
||
delimiter //;
|
||
CREATE FUNCTION fn1() returns char(50) SQL SECURITY INVOKER
|
||
BEGIN
|
||
return 1;
|
||
END//
|
||
delimiter ;//
|
||
|
||
delimiter //;
|
||
CREATE FUNCTION fn2() returns char(50) SQL SECURITY DEFINER
|
||
BEGIN
|
||
return 2;
|
||
END//
|
||
delimiter ;//
|
||
|
||
disconnect connbug33464;
|
||
|
||
# cleanup
|
||
connection default;
|
||
USE dbbug33464;
|
||
--source suite/funcs_1/include/show_connection.inc
|
||
|
||
SELECT fn1();
|
||
SELECT fn2();
|
||
|
||
--error 0, ER_CANNOT_USER
|
||
DROP USER 'userbug33464'@'localhost';
|
||
|
||
DROP FUNCTION fn1;
|
||
DROP FUNCTION fn2;
|
||
DROP PROCEDURE sp3;
|
||
|
||
--error 0, ER_CANNOT_USER
|
||
DROP USER 'userbug33464'@'localhost';
|
||
|
||
USE test;
|
||
DROP DATABASE dbbug33464;
|
||
|
||
|
||
SET @@global.log_bin_trust_function_creators= @old_log_bin_trust_function_creators;
|
||
|
||
#
|
||
# Bug#44658 Create procedure makes server crash when user does not have ALL privilege
|
||
#
|
||
CREATE USER user1;
|
||
CREATE USER user2;
|
||
GRANT CREATE ON db1.* TO 'user1'@'localhost';
|
||
GRANT CREATE ROUTINE ON db1.* TO 'user1'@'localhost';
|
||
GRANT CREATE ON db1.* TO 'user2'@'%';
|
||
GRANT CREATE ROUTINE ON db1.* TO 'user2'@'%';
|
||
FLUSH PRIVILEGES;
|
||
SHOW GRANTS FOR 'user1'@'localhost';
|
||
connect (con1,localhost,user1,,);
|
||
--echo ** Connect as user1 and create a procedure.
|
||
--echo ** The creation will imply implicitly assigned
|
||
--echo ** EXECUTE and ALTER ROUTINE privileges to
|
||
--echo ** the current user user1@localhost.
|
||
SELECT @@GLOBAL.sql_mode;
|
||
SELECT @@SESSION.sql_mode;
|
||
CREATE DATABASE db1;
|
||
DELIMITER ||;
|
||
CREATE PROCEDURE db1.proc1(p1 INT)
|
||
BEGIN
|
||
SET @x = 0;
|
||
REPEAT SET @x = @x + 1; UNTIL @x > p1 END REPEAT;
|
||
END ;||
|
||
DELIMITER ;||
|
||
|
||
connect (con2,localhost,user2,,);
|
||
--echo ** Connect as user2 and create a procedure.
|
||
--echo ** Implicitly assignment of privileges will
|
||
--echo ** fail because the user2@localhost is an
|
||
--echo ** unknown user.
|
||
DELIMITER ||;
|
||
CREATE PROCEDURE db1.proc2(p1 INT)
|
||
BEGIN
|
||
SET @x = 0;
|
||
REPEAT SET @x = @x + 1; UNTIL @x > p1 END REPEAT;
|
||
END ;||
|
||
DELIMITER ;||
|
||
|
||
connection default;
|
||
SHOW GRANTS FOR 'user1'@'localhost';
|
||
SHOW GRANTS FOR 'user2';
|
||
disconnect con1;
|
||
disconnect con2;
|
||
DROP PROCEDURE db1.proc1;
|
||
DROP PROCEDURE db1.proc2;
|
||
REVOKE ALL ON db1.* FROM 'user1'@'localhost';
|
||
REVOKE ALL ON db1.* FROM 'user2'@'%';
|
||
DROP USER 'user1';
|
||
DROP USER 'user1'@'localhost';
|
||
DROP USER 'user2';
|
||
DROP DATABASE db1;
|
||
|
||
# Wait till we reached the initial number of concurrent sessions
|
||
--source include/wait_until_count_sessions.inc
|