@@ -5,9 +5,9 @@ INSERT INTO bttest_a SELECT * FROM generate_series(1, 100000);
5
5
INSERT INTO bttest_b SELECT * FROM generate_series(100000, 1, -1);
6
6
CREATE INDEX bttest_a_idx ON bttest_a USING btree (id);
7
7
CREATE INDEX bttest_b_idx ON bttest_b USING btree (id);
8
- CREATE ROLE bttest_role ;
8
+ CREATE ROLE regress_bttest_role ;
9
9
-- verify permissions are checked (error due to function not callable)
10
- SET ROLE bttest_role ;
10
+ SET ROLE regress_bttest_role ;
11
11
SELECT bt_index_check('bttest_a_idx'::regclass);
12
12
ERROR: permission denied for function bt_index_check
13
13
SELECT bt_index_parent_check('bttest_a_idx'::regclass);
@@ -16,9 +16,9 @@ RESET ROLE;
16
16
-- we, intentionally, don't check relation permissions - it's useful
17
17
-- to run this cluster-wide with a restricted account, and as tested
18
18
-- above explicit permission has to be granted for that.
19
- GRANT EXECUTE ON FUNCTION bt_index_check(regclass) TO bttest_role ;
20
- GRANT EXECUTE ON FUNCTION bt_index_parent_check(regclass) TO bttest_role ;
21
- SET ROLE bttest_role ;
19
+ GRANT EXECUTE ON FUNCTION bt_index_check(regclass) TO regress_bttest_role ;
20
+ GRANT EXECUTE ON FUNCTION bt_index_parent_check(regclass) TO regress_bttest_role ;
21
+ SET ROLE regress_bttest_role ;
22
22
SELECT bt_index_check('bttest_a_idx');
23
23
bt_index_check
24
24
----------------
@@ -88,5 +88,5 @@ COMMIT;
88
88
-- cleanup
89
89
DROP TABLE bttest_a;
90
90
DROP TABLE bttest_b;
91
- DROP OWNED BY bttest_role ; -- permissions
92
- DROP ROLE bttest_role ;
91
+ DROP OWNED BY regress_bttest_role ; -- permissions
92
+ DROP ROLE regress_bttest_role ;
0 commit comments