1843 lines
		
	
	
		
			55 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
			
		
		
	
	
			1843 lines
		
	
	
		
			55 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
| # Test of GRANT commands
 | ||
| 
 | ||
| # Grant tests not performed with embedded server
 | ||
| -- source include/not_embedded.inc
 | ||
| 
 | ||
| # Save the initial number of concurrent sessions
 | ||
| --source include/count_sessions.inc
 | ||
| 
 | ||
| SET @old_log_bin_trust_function_creators= @@global.log_bin_trust_function_creators;
 | ||
| SET GLOBAL log_bin_trust_function_creators = 1;
 | ||
| 
 | ||
| # Cleanup
 | ||
| --disable_warnings
 | ||
| drop table if exists t1;
 | ||
| drop database if exists mysqltest;
 | ||
| --enable_warnings
 | ||
| 
 | ||
| connect (master,localhost,root,,);
 | ||
| connection master;
 | ||
| SET NAMES binary;
 | ||
| 
 | ||
| #
 | ||
| # Test that SSL options works properly
 | ||
| #
 | ||
| 
 | ||
| delete from mysql.user where user='mysqltest_1';
 | ||
| delete from mysql.db where user='mysqltest_1';
 | ||
| flush privileges;
 | ||
| grant select on mysqltest.* to mysqltest_1@localhost require cipher "EDH-RSA-DES-CBC3-SHA";
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| grant delete on mysqltest.* to mysqltest_1@localhost;
 | ||
| select * from mysql.user where user="mysqltest_1";
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| revoke delete on mysqltest.* from mysqltest_1@localhost;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| grant select on mysqltest.* to mysqltest_1@localhost require NONE;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| grant USAGE on mysqltest.* to mysqltest_1@localhost require cipher "EDH-RSA-DES-CBC3-SHA" AND SUBJECT "testsubject" ISSUER "MySQL AB";
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| revoke all privileges on mysqltest.* from mysqltest_1@localhost;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| delete from mysql.user where user='mysqltest_1';
 | ||
| flush privileges;
 | ||
| 
 | ||
| #
 | ||
| # Test of GRANTS specifying user limits
 | ||
| #
 | ||
| delete from mysql.user where user='mysqltest_1';
 | ||
| flush privileges;
 | ||
| grant usage on *.* to mysqltest_1@localhost with max_queries_per_hour 10;
 | ||
| select * from mysql.user where user="mysqltest_1";
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| grant usage on *.* to mysqltest_1@localhost with max_updates_per_hour 20 max_connections_per_hour 30;
 | ||
| select * from mysql.user where user="mysqltest_1";
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| # This is just to double check that one won't ignore results of selects
 | ||
| flush privileges;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| delete from mysql.user where user='mysqltest_1';
 | ||
| flush privileges;
 | ||
| 
 | ||
| #
 | ||
| # Test that the new db privileges are stored/retrieved correctly
 | ||
| #
 | ||
| 
 | ||
| grant CREATE TEMPORARY TABLES, LOCK TABLES on mysqltest.* to mysqltest_1@localhost;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| flush privileges;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| revoke CREATE TEMPORARY TABLES on mysqltest.* from mysqltest_1@localhost;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| grant ALL PRIVILEGES on mysqltest.* to mysqltest_1@localhost with GRANT OPTION;
 | ||
| flush privileges;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| revoke LOCK TABLES, ALTER on mysqltest.* from mysqltest_1@localhost;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| revoke all privileges on mysqltest.* from mysqltest_1@localhost;
 | ||
| delete from mysql.user where user='mysqltest_1';
 | ||
| flush privileges;
 | ||
| grant usage on test.* to mysqltest_1@localhost with grant option;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| delete from mysql.user where user='mysqltest_1';
 | ||
| delete from mysql.db where user='mysqltest_1';
 | ||
| delete from mysql.tables_priv where user='mysqltest_1';
 | ||
| delete from mysql.columns_priv where user='mysqltest_1';
 | ||
| flush privileges;
 | ||
| --error ER_NONEXISTING_GRANT
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| 
 | ||
| #
 | ||
| # Test what happens when you have same table and colum level grants
 | ||
| #
 | ||
| 
 | ||
| create table t1 (a int);
 | ||
| GRANT select,update,insert on t1 to mysqltest_1@localhost;
 | ||
| GRANT select (a), update (a),insert(a), references(a) on t1 to mysqltest_1@localhost;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| select table_priv,column_priv from mysql.tables_priv where user="mysqltest_1";
 | ||
| REVOKE select (a), update on t1 from mysqltest_1@localhost;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| REVOKE select,update,insert,insert (a) on t1 from mysqltest_1@localhost;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| GRANT select,references on t1 to mysqltest_1@localhost;
 | ||
| select table_priv,column_priv from mysql.tables_priv where user="mysqltest_1";
 | ||
| grant all on test.* to mysqltest_3@localhost with grant option;
 | ||
| revoke all on test.* from mysqltest_3@localhost;
 | ||
| show grants for mysqltest_3@localhost;
 | ||
| revoke grant option on test.* from mysqltest_3@localhost;
 | ||
| show grants for mysqltest_3@localhost;
 | ||
| grant all on test.t1 to mysqltest_2@localhost with grant option;
 | ||
| revoke all on test.t1 from mysqltest_2@localhost;
 | ||
| show grants for mysqltest_2@localhost;
 | ||
| revoke grant option on test.t1 from mysqltest_2@localhost;
 | ||
| show grants for mysqltest_2@localhost;
 | ||
| delete from mysql.user where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
 | ||
| delete from mysql.db where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
 | ||
| delete from mysql.tables_priv where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
 | ||
| delete from mysql.columns_priv where user='mysqltest_1' or user="mysqltest_2" or user="mysqltest_3";
 | ||
| flush privileges;
 | ||
| drop table t1;
 | ||
| 
 | ||
| #
 | ||
| # Test some error conditions
 | ||
| #
 | ||
| --error ER_WRONG_USAGE
 | ||
| GRANT FILE on mysqltest.*  to mysqltest_1@localhost;
 | ||
| select 1;     # To test that the previous command didn't cause problems
 | ||
| 
 | ||
| #
 | ||
| # Bug#4898 User privileges depending on ORDER BY Settings of table db
 | ||
| #
 | ||
| insert into mysql.user (host, user) values ('localhost', 'test11');
 | ||
| insert into mysql.db (host, db, user, select_priv) values
 | ||
| ('localhost', 'a%', 'test11', 'Y'), ('localhost', 'ab%', 'test11', 'Y');
 | ||
| alter table mysql.db order by db asc;
 | ||
| flush privileges;
 | ||
| show grants for test11@localhost;
 | ||
| alter table mysql.db order by db desc;
 | ||
| flush privileges;
 | ||
| show grants for test11@localhost;
 | ||
| delete from mysql.user where user='test11';
 | ||
| delete from mysql.db where user='test11';
 | ||
| 
 | ||
| #
 | ||
| # Bug#6123 GRANT USAGE inserts useless Db row
 | ||
| #
 | ||
| create database mysqltest1;
 | ||
| grant usage on mysqltest1.* to test6123 identified by 'magic123';
 | ||
| select host,db,user,select_priv,insert_priv from mysql.db where db="mysqltest1";
 | ||
| delete from mysql.user where user='test6123';
 | ||
| drop database mysqltest1;
 | ||
| 
 | ||
| #
 | ||
| # Test for 'drop user', 'revoke privileges, grant'
 | ||
| #
 | ||
| 
 | ||
| create table t1 (a int);
 | ||
| grant ALL PRIVILEGES on *.* to drop_user2@localhost with GRANT OPTION;
 | ||
| show grants for drop_user2@localhost;
 | ||
| revoke all privileges, grant option from drop_user2@localhost;
 | ||
| drop user drop_user2@localhost;
 | ||
| 
 | ||
| grant ALL PRIVILEGES on *.* to drop_user@localhost with GRANT OPTION;
 | ||
| grant ALL PRIVILEGES on test.* to drop_user@localhost with GRANT OPTION;
 | ||
| grant select(a) on test.t1 to drop_user@localhost;
 | ||
| show grants for drop_user@localhost;
 | ||
| 
 | ||
| #
 | ||
| # Bug#3086 SHOW GRANTS doesn't follow ANSI_QUOTES
 | ||
| #
 | ||
| set sql_mode=ansi_quotes;
 | ||
| show grants for drop_user@localhost;
 | ||
| set sql_mode=default;
 | ||
| 
 | ||
| set sql_quote_show_create=0;
 | ||
| show grants for drop_user@localhost;
 | ||
| set sql_mode="ansi_quotes";
 | ||
| show grants for drop_user@localhost;
 | ||
| set sql_quote_show_create=1;
 | ||
| show grants for drop_user@localhost;
 | ||
| set sql_mode="";
 | ||
| show grants for drop_user@localhost;
 | ||
| 
 | ||
| revoke all privileges, grant option from drop_user@localhost;
 | ||
| show grants for drop_user@localhost;
 | ||
| drop user drop_user@localhost;
 | ||
| --error ER_REVOKE_GRANTS
 | ||
| revoke all privileges, grant option from drop_user@localhost;
 | ||
| 
 | ||
| grant select(a) on test.t1 to drop_user1@localhost;
 | ||
| grant select on test.t1 to drop_user2@localhost;
 | ||
| grant select on test.* to drop_user3@localhost;
 | ||
| grant select on *.* to drop_user4@localhost;
 | ||
| # Drop user now implicitly revokes all privileges.
 | ||
| drop user drop_user1@localhost, drop_user2@localhost, drop_user3@localhost,
 | ||
| drop_user4@localhost;
 | ||
| --error ER_REVOKE_GRANTS
 | ||
| revoke all privileges, grant option from drop_user1@localhost, drop_user2@localhost,
 | ||
| drop_user3@localhost, drop_user4@localhost;
 | ||
| --error ER_CANNOT_USER
 | ||
| drop user drop_user1@localhost, drop_user2@localhost, drop_user3@localhost,
 | ||
| drop_user4@localhost;
 | ||
| drop table t1;
 | ||
| grant usage on *.* to mysqltest_1@localhost identified by "password";
 | ||
| grant select, update, insert on test.* to mysqltest_1@localhost;
 | ||
| show grants for mysqltest_1@localhost;
 | ||
| drop user mysqltest_1@localhost;
 | ||
| 
 | ||
| #
 | ||
| # Bug#3403 Wrong encoding in SHOW GRANTS output
 | ||
| #
 | ||
| SET NAMES koi8r;
 | ||
| CREATE DATABASE <20><>;
 | ||
| USE <20><>;
 | ||
| CREATE TABLE <20><><EFBFBD> (<28><><EFBFBD> INT);
 | ||
| 
 | ||
| GRANT SELECT ON <20><>.* TO <20><><EFBFBD><EFBFBD>@localhost;
 | ||
| SHOW GRANTS FOR <20><><EFBFBD><EFBFBD>@localhost;
 | ||
| REVOKE SELECT ON <20><>.* FROM <20><><EFBFBD><EFBFBD>@localhost;
 | ||
| 
 | ||
| GRANT SELECT ON <20><>.<2E><><EFBFBD> TO <20><><EFBFBD><EFBFBD>@localhost;
 | ||
| SHOW GRANTS FOR <20><><EFBFBD><EFBFBD>@localhost;
 | ||
| REVOKE SELECT ON <20><>.<2E><><EFBFBD> FROM <20><><EFBFBD><EFBFBD>@localhost;
 | ||
| 
 | ||
| GRANT SELECT (<28><><EFBFBD>) ON <20><>.<2E><><EFBFBD> TO <20><><EFBFBD><EFBFBD>@localhost;
 | ||
| SHOW GRANTS FOR <20><><EFBFBD><EFBFBD>@localhost;
 | ||
| REVOKE SELECT (<28><><EFBFBD>) ON <20><>.<2E><><EFBFBD> FROM <20><><EFBFBD><EFBFBD>@localhost;
 | ||
| 
 | ||
| # Revoke does not drop user. Leave a clean user table for the next tests.
 | ||
| DROP USER <20><><EFBFBD><EFBFBD>@localhost;
 | ||
| 
 | ||
| DROP DATABASE <20><>;
 | ||
| SET NAMES latin1;
 | ||
| 
 | ||
| #
 | ||
| # Bug#5831 REVOKE ALL PRIVILEGES, GRANT OPTION does not revoke everything
 | ||
| #
 | ||
| USE test;
 | ||
| CREATE TABLE t1 (a int );
 | ||
| CREATE TABLE t2 LIKE t1;
 | ||
| CREATE TABLE t3 LIKE t1;
 | ||
| CREATE TABLE t4 LIKE t1;
 | ||
| CREATE TABLE t5 LIKE t1;
 | ||
| CREATE TABLE t6 LIKE t1;
 | ||
| CREATE TABLE t7 LIKE t1;
 | ||
| CREATE TABLE t8 LIKE t1;
 | ||
| CREATE TABLE t9 LIKE t1;
 | ||
| CREATE TABLE t10 LIKE t1;
 | ||
| CREATE DATABASE testdb1;
 | ||
| CREATE DATABASE testdb2;
 | ||
| CREATE DATABASE testdb3;
 | ||
| CREATE DATABASE testdb4;
 | ||
| CREATE DATABASE testdb5;
 | ||
| CREATE DATABASE testdb6;
 | ||
| CREATE DATABASE testdb7;
 | ||
| CREATE DATABASE testdb8;
 | ||
| CREATE DATABASE testdb9;
 | ||
| CREATE DATABASE testdb10;
 | ||
| GRANT ALL ON testdb1.* TO testuser@localhost;
 | ||
| GRANT ALL ON testdb2.* TO testuser@localhost;
 | ||
| GRANT ALL ON testdb3.* TO testuser@localhost;
 | ||
| GRANT ALL ON testdb4.* TO testuser@localhost;
 | ||
| GRANT ALL ON testdb5.* TO testuser@localhost;
 | ||
| GRANT ALL ON testdb6.* TO testuser@localhost;
 | ||
| GRANT ALL ON testdb7.* TO testuser@localhost;
 | ||
| GRANT ALL ON testdb8.* TO testuser@localhost;
 | ||
| GRANT ALL ON testdb9.* TO testuser@localhost;
 | ||
| GRANT ALL ON testdb10.* TO testuser@localhost;
 | ||
| GRANT SELECT ON test.t1 TO testuser@localhost;
 | ||
| GRANT SELECT ON test.t2 TO testuser@localhost;
 | ||
| GRANT SELECT ON test.t3 TO testuser@localhost;
 | ||
| GRANT SELECT ON test.t4 TO testuser@localhost;
 | ||
| GRANT SELECT ON test.t5 TO testuser@localhost;
 | ||
| GRANT SELECT ON test.t6 TO testuser@localhost;
 | ||
| GRANT SELECT ON test.t7 TO testuser@localhost;
 | ||
| GRANT SELECT ON test.t8 TO testuser@localhost;
 | ||
| GRANT SELECT ON test.t9 TO testuser@localhost;
 | ||
| GRANT SELECT ON test.t10 TO testuser@localhost;
 | ||
| GRANT SELECT (a) ON test.t1 TO testuser@localhost;
 | ||
| GRANT SELECT (a) ON test.t2 TO testuser@localhost;
 | ||
| GRANT SELECT (a) ON test.t3 TO testuser@localhost;
 | ||
| GRANT SELECT (a) ON test.t4 TO testuser@localhost;
 | ||
| GRANT SELECT (a) ON test.t5 TO testuser@localhost;
 | ||
| GRANT SELECT (a) ON test.t6 TO testuser@localhost;
 | ||
| GRANT SELECT (a) ON test.t7 TO testuser@localhost;
 | ||
| GRANT SELECT (a) ON test.t8 TO testuser@localhost;
 | ||
| GRANT SELECT (a) ON test.t9 TO testuser@localhost;
 | ||
| GRANT SELECT (a) ON test.t10 TO testuser@localhost;
 | ||
| REVOKE ALL PRIVILEGES, GRANT OPTION FROM testuser@localhost;
 | ||
| SHOW GRANTS FOR testuser@localhost;
 | ||
| DROP USER testuser@localhost;
 | ||
| DROP TABLE t1,t2,t3,t4,t5,t6,t7,t8,t9,t10;
 | ||
| DROP DATABASE testdb1;
 | ||
| DROP DATABASE testdb2;
 | ||
| DROP DATABASE testdb3;
 | ||
| DROP DATABASE testdb4;
 | ||
| DROP DATABASE testdb5;
 | ||
| DROP DATABASE testdb6;
 | ||
| DROP DATABASE testdb7;
 | ||
| DROP DATABASE testdb8;
 | ||
| DROP DATABASE testdb9;
 | ||
| DROP DATABASE testdb10;
 | ||
| 
 | ||
| #
 | ||
| # Bug#6932 a problem with 'revoke ALL PRIVILEGES'
 | ||
| #
 | ||
| 
 | ||
| create table t1(a int, b int, c int, d int);
 | ||
| grant insert(b), insert(c), insert(d), insert(a) on t1 to grant_user@localhost;
 | ||
| show grants for grant_user@localhost;
 | ||
| select Host,Db,User,Table_name,Column_name,Column_priv from mysql.columns_priv order by Column_name;
 | ||
| revoke ALL PRIVILEGES on t1 from grant_user@localhost;
 | ||
| show grants for grant_user@localhost;
 | ||
| select Host,Db,User,Table_name,Column_name,Column_priv from mysql.columns_priv;
 | ||
| drop user grant_user@localhost;
 | ||
| drop table t1;
 | ||
| 
 | ||
| #
 | ||
| # Bug#7391 Cross-database multi-table UPDATE security problem
 | ||
| #
 | ||
| create database mysqltest_1;
 | ||
| create database mysqltest_2;
 | ||
| create table mysqltest_1.t1 select 1 a, 2 q;
 | ||
| create table mysqltest_1.t2 select 1 b, 2 r;
 | ||
| create table mysqltest_2.t1 select 1 c, 2 s;
 | ||
| create table mysqltest_2.t2 select 1 d, 2 t;
 | ||
| 
 | ||
| # test the column privileges
 | ||
| grant update (a) on mysqltest_1.t1 to mysqltest_3@localhost;
 | ||
| grant select (b) on mysqltest_1.t2 to mysqltest_3@localhost;
 | ||
| grant select (c) on mysqltest_2.t1 to mysqltest_3@localhost;
 | ||
| grant update (d) on mysqltest_2.t2 to mysqltest_3@localhost;
 | ||
| connect (conn1,localhost,mysqltest_3,,);
 | ||
| connection conn1;
 | ||
| SELECT * FROM INFORMATION_SCHEMA.COLUMN_PRIVILEGES
 | ||
|  WHERE GRANTEE = '''mysqltest_3''@''localhost'''
 | ||
|  ORDER BY TABLE_NAME,COLUMN_NAME,PRIVILEGE_TYPE;
 | ||
| SELECT * FROM INFORMATION_SCHEMA.TABLE_PRIVILEGES
 | ||
|  WHERE GRANTEE = '''mysqltest_3''@''localhost'''
 | ||
|  ORDER BY TABLE_NAME,PRIVILEGE_TYPE;
 | ||
| SELECT * from INFORMATION_SCHEMA.SCHEMA_PRIVILEGES
 | ||
|  WHERE GRANTEE = '''mysqltest_3''@''localhost'''
 | ||
|  ORDER BY TABLE_SCHEMA,PRIVILEGE_TYPE;
 | ||
| SELECT * from INFORMATION_SCHEMA.USER_PRIVILEGES
 | ||
|  WHERE GRANTEE = '''mysqltest_3''@''localhost'''
 | ||
|  ORDER BY TABLE_CATALOG,PRIVILEGE_TYPE;
 | ||
| --error ER_COLUMNACCESS_DENIED_ERROR
 | ||
| update mysqltest_1.t1, mysqltest_1.t2 set q=10 where b=1;
 | ||
| --error ER_COLUMNACCESS_DENIED_ERROR
 | ||
| update mysqltest_1.t2, mysqltest_2.t2 set d=20 where d=1;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| update mysqltest_1.t1, mysqltest_2.t2 set d=20 where d=1;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| update mysqltest_2.t1, mysqltest_1.t2 set c=20 where b=1;
 | ||
| --error ER_COLUMNACCESS_DENIED_ERROR
 | ||
| update mysqltest_2.t1, mysqltest_2.t2 set d=10 where s=2;
 | ||
| # the following two should work
 | ||
| update mysqltest_1.t1, mysqltest_2.t2 set a=10,d=10;
 | ||
| update mysqltest_1.t1, mysqltest_2.t1 set a=20 where c=20;
 | ||
| connection master;
 | ||
| select t1.*,t2.* from mysqltest_1.t1,mysqltest_1.t2;
 | ||
| select t1.*,t2.* from mysqltest_2.t1,mysqltest_2.t2;
 | ||
| revoke all on mysqltest_1.t1 from mysqltest_3@localhost;
 | ||
| revoke all on mysqltest_1.t2 from mysqltest_3@localhost;
 | ||
| revoke all on mysqltest_2.t1 from mysqltest_3@localhost;
 | ||
| revoke all on mysqltest_2.t2 from mysqltest_3@localhost;
 | ||
| 
 | ||
| # test the db/table level privileges
 | ||
| grant all on mysqltest_2.* to mysqltest_3@localhost;
 | ||
| grant select on *.* to mysqltest_3@localhost;
 | ||
| # Next grant is needed to trigger bug#7391. Do not optimize!
 | ||
| grant select on mysqltest_2.t1 to mysqltest_3@localhost;
 | ||
| flush privileges;
 | ||
| disconnect conn1;
 | ||
| connect (conn2,localhost,mysqltest_3,,);
 | ||
| connection conn2;
 | ||
| use mysqltest_1;
 | ||
| update mysqltest_2.t1, mysqltest_2.t2 set c=500,d=600;
 | ||
| # the following failed before, should fail now.
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| update mysqltest_1.t1, mysqltest_1.t2 set a=100,b=200;
 | ||
| use mysqltest_2;
 | ||
| # the following used to succeed, it must fail now.
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| update mysqltest_1.t1, mysqltest_1.t2 set a=100,b=200;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| update mysqltest_2.t1, mysqltest_1.t2 set c=100,b=200;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| update mysqltest_1.t1, mysqltest_2.t2 set a=100,d=200;
 | ||
| # lets see the result
 | ||
| connection master;
 | ||
| select t1.*,t2.* from mysqltest_1.t1,mysqltest_1.t2;
 | ||
| select t1.*,t2.* from mysqltest_2.t1,mysqltest_2.t2;
 | ||
| 
 | ||
| delete from mysql.user where user='mysqltest_3';
 | ||
| delete from mysql.db where user="mysqltest_3";
 | ||
| delete from mysql.tables_priv where user="mysqltest_3";
 | ||
| delete from mysql.columns_priv where user="mysqltest_3";
 | ||
| flush privileges;
 | ||
| drop database mysqltest_1;
 | ||
| drop database mysqltest_2;
 | ||
| disconnect conn2;
 | ||
| 
 | ||
| #
 | ||
| # just SHOW PRIVILEGES test
 | ||
| #
 | ||
| SHOW PRIVILEGES;
 | ||
| 
 | ||
| #
 | ||
| # Rights for renaming test (Bug#3270)
 | ||
| #
 | ||
| connect (root,localhost,root,,test,$MASTER_MYPORT,$MASTER_MYSOCK);
 | ||
| connection root;
 | ||
| --disable_warnings
 | ||
| create database mysqltest;
 | ||
| --enable_warnings
 | ||
| create table mysqltest.t1 (a int,b int,c int);
 | ||
| grant all on mysqltest.t1 to mysqltest_1@localhost;
 | ||
| connect (user1,localhost,mysqltest_1,,mysqltest,$MASTER_MYPORT,$MASTER_MYSOCK);
 | ||
| connection user1;
 | ||
| -- error ER_TABLEACCESS_DENIED_ERROR
 | ||
| alter table t1 rename t2;
 | ||
| disconnect user1;
 | ||
| connection root;
 | ||
| revoke all privileges on mysqltest.t1 from mysqltest_1@localhost;
 | ||
| delete from mysql.user where user=_binary'mysqltest_1';
 | ||
| drop database mysqltest;
 | ||
| connection default;
 | ||
| disconnect root;
 | ||
| 
 | ||
| #
 | ||
| # check all new table privileges
 | ||
| #
 | ||
| CREATE USER dummy@localhost;
 | ||
| CREATE DATABASE mysqltest;
 | ||
| CREATE TABLE mysqltest.dummytable (dummyfield INT);
 | ||
| CREATE VIEW mysqltest.dummyview AS SELECT dummyfield FROM mysqltest.dummytable;
 | ||
| GRANT ALL PRIVILEGES ON mysqltest.dummytable TO dummy@localhost;
 | ||
| GRANT ALL PRIVILEGES ON mysqltest.dummyview TO dummy@localhost;
 | ||
| SHOW GRANTS FOR dummy@localhost;
 | ||
| use INFORMATION_SCHEMA;
 | ||
| SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
 | ||
| PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
 | ||
| = '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
 | ||
| FLUSH PRIVILEGES;
 | ||
| SHOW GRANTS FOR dummy@localhost;
 | ||
| SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
 | ||
| PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
 | ||
| = '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
 | ||
| SHOW FIELDS FROM mysql.tables_priv;
 | ||
| use test;
 | ||
| REVOKE ALL PRIVILEGES, GRANT OPTION FROM dummy@localhost;
 | ||
| DROP USER dummy@localhost;
 | ||
| DROP DATABASE mysqltest;
 | ||
| # check view only privileges
 | ||
| CREATE USER dummy@localhost;
 | ||
| CREATE DATABASE mysqltest;
 | ||
| CREATE TABLE mysqltest.dummytable (dummyfield INT);
 | ||
| CREATE VIEW mysqltest.dummyview AS SELECT dummyfield FROM mysqltest.dummytable;
 | ||
| GRANT CREATE VIEW ON mysqltest.dummytable TO dummy@localhost;
 | ||
| GRANT CREATE VIEW ON mysqltest.dummyview TO dummy@localhost;
 | ||
| SHOW GRANTS FOR dummy@localhost;
 | ||
| use INFORMATION_SCHEMA;
 | ||
| SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
 | ||
| PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
 | ||
| = '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
 | ||
| FLUSH PRIVILEGES;
 | ||
| SHOW GRANTS FOR dummy@localhost;
 | ||
| SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
 | ||
| PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
 | ||
| = '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
 | ||
| use test;
 | ||
| REVOKE ALL PRIVILEGES, GRANT OPTION FROM dummy@localhost;
 | ||
| DROP USER dummy@localhost;
 | ||
| DROP DATABASE mysqltest;
 | ||
| CREATE USER dummy@localhost;
 | ||
| CREATE DATABASE mysqltest;
 | ||
| CREATE TABLE mysqltest.dummytable (dummyfield INT);
 | ||
| CREATE VIEW mysqltest.dummyview AS SELECT dummyfield FROM mysqltest.dummytable;
 | ||
| GRANT SHOW VIEW ON mysqltest.dummytable TO dummy@localhost;
 | ||
| GRANT SHOW VIEW ON mysqltest.dummyview TO dummy@localhost;
 | ||
| SHOW GRANTS FOR dummy@localhost;
 | ||
| use INFORMATION_SCHEMA;
 | ||
| SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
 | ||
| PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
 | ||
| = '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
 | ||
| FLUSH PRIVILEGES;
 | ||
| SHOW GRANTS FOR dummy@localhost;
 | ||
| SELECT TABLE_SCHEMA, TABLE_NAME, GROUP_CONCAT(PRIVILEGE_TYPE ORDER BY
 | ||
| PRIVILEGE_TYPE SEPARATOR ', ') AS PRIVILEGES FROM TABLE_PRIVILEGES WHERE GRANTEE
 | ||
| = '\'dummy\'@\'localhost\'' GROUP BY TABLE_SCHEMA, TABLE_NAME;
 | ||
| use test;
 | ||
| REVOKE ALL PRIVILEGES, GRANT OPTION FROM dummy@localhost;
 | ||
| DROP USER dummy@localhost;
 | ||
| DROP DATABASE mysqltest;
 | ||
| #
 | ||
| # Bug#11330 Entry in tables_priv with host = '' causes crash
 | ||
| #
 | ||
| connection default;
 | ||
| use mysql;
 | ||
| insert into tables_priv values ('','test_db','mysqltest_1','test_table','test_grantor',CURRENT_TIMESTAMP,'Select','Select');
 | ||
| flush privileges;
 | ||
| delete from tables_priv where host = '' and user = 'mysqltest_1';
 | ||
| flush privileges;
 | ||
| use test;
 | ||
| 
 | ||
| #
 | ||
| # Bug#10892 user variables not auto cast for comparisons
 | ||
| # Check that we don't get illegal mix of collations
 | ||
| #
 | ||
| set @user123="non-existent";
 | ||
| select * from mysql.db where user=@user123;
 | ||
| 
 | ||
| set names koi8r;
 | ||
| create database <20><>;
 | ||
| grant select on <20><>.* to root@localhost;
 | ||
| select hex(Db) from mysql.db where Db='<27><>';
 | ||
| show grants for root@localhost;
 | ||
| flush privileges;
 | ||
| show grants for root@localhost;
 | ||
| drop database <20><>;
 | ||
| revoke all privileges on <20><>.* from root@localhost;
 | ||
| show grants for root@localhost;
 | ||
| set names latin1;
 | ||
| 
 | ||
| #
 | ||
| # Bug#15598 Server crashes in specific case during setting new password
 | ||
| # - Caused by a user with host ''
 | ||
| #
 | ||
| create user mysqltest_7@;
 | ||
| set password for mysqltest_7@ = password('systpass');
 | ||
| show grants for mysqltest_7@;
 | ||
| drop user mysqltest_7@;
 | ||
| --error ER_NONEXISTING_GRANT
 | ||
| show grants for mysqltest_7@;
 | ||
| 
 | ||
| #
 | ||
| # Bug#14385 GRANT and mapping to correct user account problems
 | ||
| #
 | ||
| create database mysqltest;
 | ||
| use mysqltest;
 | ||
| create table t1(f1 int);
 | ||
| GRANT DELETE ON mysqltest.t1 TO mysqltest1@'%';
 | ||
| GRANT SELECT ON mysqltest.t1 TO mysqltest1@'192.%';
 | ||
| show grants for mysqltest1@'192.%';
 | ||
| show grants for mysqltest1@'%';
 | ||
| delete from mysql.user where user='mysqltest1';
 | ||
| delete from mysql.db where user='mysqltest1';
 | ||
| delete from mysql.tables_priv where user='mysqltest1';
 | ||
| flush privileges;
 | ||
| drop database mysqltest;
 | ||
| 
 | ||
| #
 | ||
| # Bug#27515 DROP previlege is not required for RENAME TABLE
 | ||
| #
 | ||
| connection master;
 | ||
| create database db27515;
 | ||
| use db27515;
 | ||
| create table t1 (a int);
 | ||
| grant alter on db27515.t1 to user27515@localhost;
 | ||
| grant insert, create on db27515.t2 to user27515@localhost;
 | ||
| 
 | ||
| connect (conn27515, localhost, user27515, , db27515);
 | ||
| connection conn27515;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| rename table t1 to t2;
 | ||
| disconnect conn27515;
 | ||
| 
 | ||
| connection master;
 | ||
| revoke all privileges, grant option from user27515@localhost;
 | ||
| drop user user27515@localhost;
 | ||
| drop database db27515;
 | ||
| 
 | ||
| --echo End of 4.1 tests
 | ||
| 
 | ||
| #
 | ||
| # Bug#16297 In memory grant tables not flushed when users's hostname is ""
 | ||
| #
 | ||
| use test;
 | ||
| create table t1 (a int);
 | ||
| 
 | ||
| # Backup anonymous users and remove them. (They get in the way of
 | ||
| # the one we test with here otherwise.)
 | ||
| create table t2 as select * from mysql.user where user='';
 | ||
| delete from mysql.user where user='';
 | ||
| flush privileges;
 | ||
| 
 | ||
| # Create some users with different hostnames
 | ||
| create user mysqltest_8@'';
 | ||
| create user mysqltest_8;
 | ||
| create user mysqltest_8@host8;
 | ||
| 
 | ||
| # Try to create them again
 | ||
| --error ER_CANNOT_USER
 | ||
| create user mysqltest_8@'';
 | ||
| --error ER_CANNOT_USER
 | ||
| create user mysqltest_8;
 | ||
| --error ER_CANNOT_USER
 | ||
| create user mysqltest_8@host8;
 | ||
| 
 | ||
| select user, QUOTE(host) from mysql.user where user="mysqltest_8";
 | ||
| 
 | ||
| --echo Schema privileges
 | ||
| grant select on mysqltest.* to mysqltest_8@'';
 | ||
| show grants for mysqltest_8@'';
 | ||
| grant select on mysqltest.* to mysqltest_8@;
 | ||
| show grants for mysqltest_8@;
 | ||
| grant select on mysqltest.* to mysqltest_8;
 | ||
| show grants for mysqltest_8;
 | ||
| select * from  information_schema.schema_privileges
 | ||
| where grantee like "'mysqltest_8'%";
 | ||
| connect (conn3,localhost,mysqltest_8,,);
 | ||
| select * from t1;
 | ||
| disconnect conn3;
 | ||
| connection master;
 | ||
| revoke select on mysqltest.* from mysqltest_8@'';
 | ||
| revoke select on mysqltest.* from mysqltest_8;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| select * from  information_schema.schema_privileges
 | ||
| where grantee like "'mysqltest_8'%";
 | ||
| flush privileges;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8@;
 | ||
| grant select on mysqltest.* to mysqltest_8@'';
 | ||
| flush privileges;
 | ||
| show grants for mysqltest_8@;
 | ||
| revoke select on mysqltest.* from mysqltest_8@'';
 | ||
| flush privileges;
 | ||
| 
 | ||
| --echo Column privileges
 | ||
| grant update (a) on t1 to mysqltest_8@'';
 | ||
| grant update (a) on t1 to mysqltest_8;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| flush privileges;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| select * from  information_schema.column_privileges;
 | ||
| connect (conn4,localhost,mysqltest_8,,);
 | ||
| select * from t1;
 | ||
| disconnect conn4;
 | ||
| connection master;
 | ||
| revoke update (a) on t1 from mysqltest_8@'';
 | ||
| revoke update (a) on t1 from mysqltest_8;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| select * from  information_schema.column_privileges;
 | ||
| flush privileges;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| 
 | ||
| --echo Table privileges
 | ||
| grant update on t1 to mysqltest_8@'';
 | ||
| grant update on t1 to mysqltest_8;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| flush privileges;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| select * from  information_schema.table_privileges;
 | ||
| connect (conn5,localhost,mysqltest_8,,);
 | ||
| select * from t1;
 | ||
| disconnect conn5;
 | ||
| connection master;
 | ||
| revoke update on t1 from mysqltest_8@'';
 | ||
| revoke update on t1 from mysqltest_8;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| select * from  information_schema.table_privileges;
 | ||
| flush privileges;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| 
 | ||
| --echo "DROP USER" should clear privileges
 | ||
| grant all privileges on mysqltest.* to mysqltest_8@'';
 | ||
| grant select on mysqltest.* to mysqltest_8@'';
 | ||
| grant update on t1 to mysqltest_8@'';
 | ||
| grant update (a) on t1 to mysqltest_8@'';
 | ||
| grant all privileges on mysqltest.* to mysqltest_8;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| select * from  information_schema.user_privileges
 | ||
| where grantee like "'mysqltest_8'%";
 | ||
| connect (conn5,localhost,mysqltest_8,,);
 | ||
| select * from t1;
 | ||
| disconnect conn5;
 | ||
| connection master;
 | ||
| flush privileges;
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| drop user mysqltest_8@'';
 | ||
| --error ER_NONEXISTING_GRANT
 | ||
| show grants for mysqltest_8@'';
 | ||
| show grants for mysqltest_8;
 | ||
| select * from  information_schema.user_privileges
 | ||
| where grantee like "'mysqltest_8'%";
 | ||
| drop user mysqltest_8;
 | ||
| --replace_result $MASTER_MYSOCK MASTER_SOCKET $MASTER_MYPORT MASTER_PORT
 | ||
| --error ER_ACCESS_DENIED_ERROR
 | ||
| connect (conn6,localhost,mysqltest_8,,);
 | ||
| connection master;
 | ||
| --error ER_NONEXISTING_GRANT
 | ||
| show grants for mysqltest_8;
 | ||
| drop user mysqltest_8@host8;
 | ||
| --error ER_NONEXISTING_GRANT
 | ||
| show grants for mysqltest_8@host8;
 | ||
| 
 | ||
| # Restore the anonymous users.
 | ||
| insert into mysql.user select * from t2;
 | ||
| flush privileges;
 | ||
| drop table t2;
 | ||
| drop table t1;
 | ||
| 
 | ||
| #
 | ||
| # Bug#20214 Incorrect error when user calls SHOW CREATE VIEW on non
 | ||
| #           privileged view
 | ||
| #
 | ||
| 
 | ||
| connection master;
 | ||
| 
 | ||
| CREATE DATABASE mysqltest3;
 | ||
| USE mysqltest3;
 | ||
| 
 | ||
| CREATE TABLE t_nn (c1 INT);
 | ||
| CREATE VIEW  v_nn AS SELECT * FROM t_nn;
 | ||
| 
 | ||
| CREATE DATABASE mysqltest2;
 | ||
| USE mysqltest2;
 | ||
| 
 | ||
| CREATE TABLE t_nn (c1 INT);
 | ||
| CREATE VIEW  v_nn AS SELECT * FROM t_nn;
 | ||
| CREATE VIEW  v_yn AS SELECT * FROM t_nn;
 | ||
| CREATE VIEW  v_gy AS SELECT * FROM t_nn;
 | ||
| CREATE VIEW  v_ny AS SELECT * FROM t_nn;
 | ||
| CREATE VIEW  v_yy AS SELECT * FROM t_nn WHERE c1=55;
 | ||
| 
 | ||
| GRANT SHOW VIEW        ON mysqltest2.v_ny TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
 | ||
| GRANT SELECT           ON mysqltest2.v_yn TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
 | ||
| GRANT SELECT           ON mysqltest2.*    TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
 | ||
| GRANT SHOW VIEW,SELECT ON mysqltest2.v_yy TO 'mysqltest_1'@'localhost' IDENTIFIED BY 'mysqltest_1';
 | ||
| 
 | ||
| connect (mysqltest_1, localhost, mysqltest_1, mysqltest_1,);
 | ||
| 
 | ||
| # fail because of missing SHOW VIEW (have generic SELECT)
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| SHOW CREATE VIEW  mysqltest2.v_nn;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| SHOW CREATE TABLE mysqltest2.v_nn;
 | ||
| 
 | ||
| # fail because of missing SHOW VIEW
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| SHOW CREATE VIEW  mysqltest2.v_yn;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| SHOW CREATE TABLE mysqltest2.v_yn;
 | ||
| 
 | ||
| # succeed (despite of missing SELECT, having SHOW VIEW bails us out)
 | ||
| SHOW CREATE TABLE mysqltest2.v_ny;
 | ||
| 
 | ||
| # succeed (despite of missing SELECT, having SHOW VIEW bails us out)
 | ||
| SHOW CREATE VIEW  mysqltest2.v_ny;
 | ||
| 
 | ||
| # fail because of missing (specific or generic) SELECT
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| SHOW CREATE TABLE mysqltest3.t_nn;
 | ||
| 
 | ||
| # fail because of missing (specific or generic) SELECT (not because it's not a view!)
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| SHOW CREATE VIEW  mysqltest3.t_nn;
 | ||
| 
 | ||
| # fail because of missing missing (specific or generic) SELECT (and SHOW VIEW)
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| SHOW CREATE VIEW  mysqltest3.v_nn;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| SHOW CREATE TABLE mysqltest3.v_nn;
 | ||
| 
 | ||
| # succeed thanks to generic SELECT
 | ||
| SHOW CREATE TABLE mysqltest2.t_nn;
 | ||
| 
 | ||
| # fail because it's not a view!  (have generic SELECT though)
 | ||
| --error ER_WRONG_OBJECT
 | ||
| SHOW CREATE VIEW  mysqltest2.t_nn;
 | ||
| 
 | ||
| # succeed, have SELECT and SHOW VIEW
 | ||
| SHOW CREATE VIEW mysqltest2.v_yy;
 | ||
| 
 | ||
| # succeed, have SELECT and SHOW VIEW
 | ||
| SHOW CREATE TABLE mysqltest2.v_yy;
 | ||
| 
 | ||
| # clean-up
 | ||
| connection master;
 | ||
| 
 | ||
| # succeed, we're root
 | ||
| SHOW CREATE TABLE mysqltest2.v_nn;
 | ||
| SHOW CREATE VIEW  mysqltest2.v_nn;
 | ||
| 
 | ||
| SHOW CREATE TABLE mysqltest2.t_nn;
 | ||
| 
 | ||
| # fail because it's not a view!
 | ||
| --error ER_WRONG_OBJECT
 | ||
| SHOW CREATE VIEW mysqltest2.t_nn;
 | ||
| 
 | ||
| DROP VIEW  mysqltest2.v_nn;
 | ||
| DROP VIEW  mysqltest2.v_yn;
 | ||
| DROP VIEW  mysqltest2.v_ny;
 | ||
| DROP VIEW  mysqltest2.v_yy;
 | ||
| DROP TABLE mysqltest2.t_nn;
 | ||
| DROP DATABASE mysqltest2;
 | ||
| DROP VIEW  mysqltest3.v_nn;
 | ||
| DROP TABLE mysqltest3.t_nn;
 | ||
| DROP DATABASE mysqltest3;
 | ||
| disconnect mysqltest_1;
 | ||
| REVOKE ALL PRIVILEGES, GRANT OPTION FROM 'mysqltest_1'@'localhost';
 | ||
| DROP USER 'mysqltest_1'@'localhost';
 | ||
| 
 | ||
| # restore the original database
 | ||
| USE test;
 | ||
| connection default;
 | ||
| disconnect master;
 | ||
| 
 | ||
| 
 | ||
| #
 | ||
| # Bug#10668 CREATE USER does not enforce username length limit
 | ||
| #
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| create user mysqltest1_thisisreallytoolong;
 | ||
| 
 | ||
| #
 | ||
| # Test for Bug#16899 Possible buffer overflow in handling of DEFINER-clause.
 | ||
| #
 | ||
| # These checks are intended to ensure that appropriate errors are risen when
 | ||
| # illegal user name or hostname is specified in user-clause of GRANT/REVOKE
 | ||
| # statements.
 | ||
| #
 | ||
| 
 | ||
| #
 | ||
| # Bug#22369 Alter table rename combined with other alterations causes lost tables
 | ||
| #
 | ||
| CREATE DATABASE mysqltest1;
 | ||
| CREATE TABLE mysqltest1.t1 (
 | ||
|   int_field INTEGER UNSIGNED NOT NULL,
 | ||
|   char_field CHAR(10),
 | ||
|   INDEX(`int_field`)
 | ||
| );
 | ||
| CREATE TABLE mysqltest1.t2 (int_field INT);
 | ||
| 
 | ||
| --echo "Now check that we require equivalent grants for "
 | ||
| --echo "RENAME TABLE and ALTER TABLE"
 | ||
| CREATE USER mysqltest_1@localhost;
 | ||
| GRANT SELECT ON mysqltest1.t1 TO mysqltest_1@localhost;
 | ||
| 
 | ||
| connect (conn42,localhost,mysqltest_1,,mysqltest1);
 | ||
| SELECT USER();
 | ||
| SHOW GRANTS;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| RENAME TABLE t1 TO t2;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| ALTER TABLE t1 RENAME TO t2;
 | ||
| --disconnect conn42
 | ||
| --connection default
 | ||
| GRANT DROP ON mysqltest1.t1 TO mysqltest_1@localhost;
 | ||
| 
 | ||
| connect (conn42,localhost,mysqltest_1,,mysqltest1);
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| RENAME TABLE t1 TO t2;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| ALTER TABLE t1 RENAME TO t2;
 | ||
| --disconnect conn42
 | ||
| --connection default
 | ||
| GRANT ALTER ON mysqltest1.t1 TO mysqltest_1@localhost;
 | ||
| 
 | ||
| connect (conn42,localhost,mysqltest_1,,mysqltest1);
 | ||
| SHOW GRANTS;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| RENAME TABLE t1 TO t2;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| ALTER TABLE t1 RENAME TO t2;
 | ||
| --disconnect conn42
 | ||
| --connection default
 | ||
| GRANT INSERT, CREATE ON mysqltest1.t1 TO mysqltest_1@localhost;
 | ||
| connect (conn42,localhost,mysqltest_1,,mysqltest1);
 | ||
| SHOW GRANTS;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| --disconnect conn42
 | ||
| --connection default
 | ||
| GRANT INSERT, SELECT, CREATE, ALTER, DROP ON mysqltest1.t2 TO mysqltest_1@localhost;
 | ||
| DROP TABLE mysqltest1.t2;
 | ||
| 
 | ||
| connect (conn42,localhost,mysqltest_1,,mysqltest1);
 | ||
| SHOW GRANTS;
 | ||
| RENAME TABLE t1 TO t2;
 | ||
| RENAME TABLE t2 TO t1;
 | ||
| ALTER TABLE t1 RENAME TO t2;
 | ||
| ALTER TABLE t2 RENAME TO t1;
 | ||
| --disconnect conn42
 | ||
| --connection default
 | ||
| REVOKE DROP, INSERT ON mysqltest1.t1 FROM mysqltest_1@localhost;
 | ||
| REVOKE DROP, INSERT ON mysqltest1.t2 FROM mysqltest_1@localhost;
 | ||
| 
 | ||
| connect (conn42,localhost,mysqltest_1,,mysqltest1);
 | ||
| SHOW GRANTS;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| RENAME TABLE t1 TO t2;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| ALTER TABLE t1 RENAME TO t2;
 | ||
| --disconnect conn42
 | ||
| --connection default
 | ||
| 
 | ||
| DROP USER mysqltest_1@localhost;
 | ||
| DROP DATABASE mysqltest1;
 | ||
| USE test;
 | ||
| 
 | ||
| # Working with database-level privileges.
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| GRANT CREATE ON mysqltest.* TO 1234567890abcdefGHIKL@localhost;
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| GRANT CREATE ON mysqltest.* TO some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| REVOKE CREATE ON mysqltest.* FROM 1234567890abcdefGHIKL@localhost;
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| REVOKE CREATE ON mysqltest.* FROM some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
 | ||
| 
 | ||
| # Working with table-level privileges.
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| GRANT CREATE ON t1 TO 1234567890abcdefGHIKL@localhost;
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| GRANT CREATE ON t1 TO some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| REVOKE CREATE ON t1 FROM 1234567890abcdefGHIKL@localhost;
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| REVOKE CREATE ON t1 FROM some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
 | ||
| 
 | ||
| # Working with routine-level privileges.
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| GRANT EXECUTE ON PROCEDURE p1 TO 1234567890abcdefGHIKL@localhost;
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| GRANT EXECUTE ON PROCEDURE p1 TO some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| REVOKE EXECUTE ON PROCEDURE p1 FROM 1234567890abcdefGHIKL@localhost;
 | ||
| 
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| REVOKE EXECUTE ON PROCEDURE t1 FROM some_user_name@1234567890abcdefghij1234567890abcdefghij1234567890abcdefghijQWERTY;
 | ||
| 
 | ||
| 
 | ||
| #
 | ||
| # Bug#23556 TRUNCATE TABLE still maps to DELETE
 | ||
| #
 | ||
| CREATE USER bug23556@localhost;
 | ||
| CREATE DATABASE bug23556;
 | ||
| GRANT SELECT ON bug23556.* TO bug23556@localhost;
 | ||
| connect (bug23556,localhost,bug23556,,bug23556);
 | ||
| 
 | ||
| connection default;
 | ||
| USE bug23556;
 | ||
| CREATE TABLE t1 (a INT PRIMARY KEY); INSERT INTO t1 VALUES (1),(2),(3),(4),(5);
 | ||
| GRANT DELETE ON t1 TO bug23556@localhost;
 | ||
| 
 | ||
| connection bug23556;
 | ||
| USE bug23556;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| TRUNCATE t1;
 | ||
| 
 | ||
| connection default;
 | ||
| USE bug23556;
 | ||
| REVOKE DELETE ON t1 FROM bug23556@localhost;
 | ||
| GRANT DROP ON t1 TO bug23556@localhost;
 | ||
| 
 | ||
| connection bug23556;
 | ||
| USE bug23556;
 | ||
| TRUNCATE t1;
 | ||
| 
 | ||
| connection default;
 | ||
| USE bug23556;
 | ||
| DROP TABLE t1;
 | ||
| USE test;
 | ||
| DROP DATABASE bug23556;
 | ||
| DROP USER bug23556@localhost;
 | ||
| connection default;
 | ||
| disconnect bug23556;
 | ||
| 
 | ||
| 
 | ||
| #
 | ||
| # Bug#6774 Replication fails with Wrong usage of DB GRANT and GLOBAL PRIVILEGES
 | ||
| #
 | ||
| # Check if GRANT ... ON * ... fails when no database is selected
 | ||
| connect (con1, localhost, root,,*NO-ONE*);
 | ||
| connection con1;
 | ||
| --error ER_NO_DB_ERROR
 | ||
| GRANT PROCESS ON * TO user@localhost;
 | ||
| disconnect con1;
 | ||
| connection default;
 | ||
| 
 | ||
| 
 | ||
| #
 | ||
| # Bug#9504 Stored procedures: execute privilege doesn't make 'use database'
 | ||
| # okay.
 | ||
| #
 | ||
| 
 | ||
| # Prepare.
 | ||
| 
 | ||
| --disable_warnings
 | ||
| DROP DATABASE IF EXISTS mysqltest1;
 | ||
| DROP DATABASE IF EXISTS mysqltest2;
 | ||
| DROP DATABASE IF EXISTS mysqltest3;
 | ||
| DROP DATABASE IF EXISTS mysqltest4;
 | ||
| --enable_warnings
 | ||
| 
 | ||
| CREATE DATABASE mysqltest1;
 | ||
| CREATE DATABASE mysqltest2;
 | ||
| CREATE DATABASE mysqltest3;
 | ||
| CREATE DATABASE mysqltest4;
 | ||
| 
 | ||
| CREATE PROCEDURE mysqltest1.p_def() SQL SECURITY DEFINER
 | ||
|   SELECT 1;
 | ||
| 
 | ||
| CREATE PROCEDURE mysqltest2.p_inv() SQL SECURITY INVOKER
 | ||
|   SELECT 1;
 | ||
| 
 | ||
| CREATE FUNCTION mysqltest3.f_def() RETURNS INT SQL SECURITY DEFINER
 | ||
|   RETURN 1;
 | ||
| 
 | ||
| CREATE FUNCTION mysqltest4.f_inv() RETURNS INT SQL SECURITY INVOKER
 | ||
|   RETURN 1;
 | ||
| 
 | ||
| GRANT EXECUTE ON PROCEDURE mysqltest1.p_def TO mysqltest_1@localhost;
 | ||
| GRANT EXECUTE ON PROCEDURE mysqltest2.p_inv TO mysqltest_1@localhost;
 | ||
| GRANT EXECUTE ON FUNCTION mysqltest3.f_def TO mysqltest_1@localhost;
 | ||
| GRANT EXECUTE ON FUNCTION mysqltest4.f_inv TO mysqltest_1@localhost;
 | ||
| 
 | ||
| GRANT ALL PRIVILEGES ON test.* TO mysqltest_1@localhost;
 | ||
| 
 | ||
| # Test.
 | ||
| 
 | ||
| --connect (bug9504_con1,localhost,mysqltest_1,,)
 | ||
| --echo
 | ||
| --echo ---> connection: bug9504_con1
 | ||
| 
 | ||
| # - Check that we can switch to the db;
 | ||
| 
 | ||
| use mysqltest1;
 | ||
| 
 | ||
| use mysqltest2;
 | ||
| 
 | ||
| use mysqltest3;
 | ||
| 
 | ||
| use mysqltest4;
 | ||
| 
 | ||
| # - Check that we can call stored routines;
 | ||
| 
 | ||
| use test;
 | ||
| 
 | ||
| CALL mysqltest1.p_def();
 | ||
| 
 | ||
| CALL mysqltest2.p_inv();
 | ||
| 
 | ||
| SELECT mysqltest3.f_def();
 | ||
| 
 | ||
| SELECT mysqltest4.f_inv();
 | ||
| 
 | ||
| # Cleanup.
 | ||
| 
 | ||
| --connection default
 | ||
| --echo
 | ||
| --echo ---> connection: default
 | ||
| 
 | ||
| --disconnect bug9504_con1
 | ||
| 
 | ||
| DROP DATABASE mysqltest1;
 | ||
| DROP DATABASE mysqltest2;
 | ||
| DROP DATABASE mysqltest3;
 | ||
| DROP DATABASE mysqltest4;
 | ||
| 
 | ||
| DROP USER mysqltest_1@localhost;
 | ||
| 
 | ||
| 
 | ||
| #
 | ||
| # Bug#27337 Privileges are not restored properly.
 | ||
| #
 | ||
| # Actually, the patch for this bugs fixes two problems. So, here are two test
 | ||
| # cases.
 | ||
| 
 | ||
| # Test case 1: privileges are not restored properly after calling a stored
 | ||
| # routine defined with SQL SECURITY INVOKER clause.
 | ||
| 
 | ||
| # Prepare.
 | ||
| 
 | ||
| --disable_warnings
 | ||
| DROP DATABASE IF EXISTS mysqltest1;
 | ||
| DROP DATABASE IF EXISTS mysqltest2;
 | ||
| --enable_warnings
 | ||
| 
 | ||
| CREATE DATABASE mysqltest1;
 | ||
| CREATE DATABASE mysqltest2;
 | ||
| 
 | ||
| GRANT ALL PRIVILEGES ON mysqltest1.* TO mysqltest_1@localhost;
 | ||
| GRANT SELECT ON mysqltest2.* TO mysqltest_1@localhost;
 | ||
| 
 | ||
| CREATE PROCEDURE mysqltest1.p1() SQL SECURITY INVOKER
 | ||
|   SELECT 1;
 | ||
| 
 | ||
| # Test.
 | ||
| 
 | ||
| --connect (bug27337_con1,localhost,mysqltest_1,,mysqltest2)
 | ||
| --echo
 | ||
| --echo ---> connection: bug27337_con1
 | ||
| 
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| CREATE TABLE t1(c INT);
 | ||
| 
 | ||
| CALL mysqltest1.p1();
 | ||
| 
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| CREATE TABLE t1(c INT);
 | ||
| 
 | ||
| --disconnect bug27337_con1
 | ||
| 
 | ||
| --connect (bug27337_con2,localhost,mysqltest_1,,mysqltest2)
 | ||
| --echo
 | ||
| --echo ---> connection: bug27337_con2
 | ||
| 
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| CREATE TABLE t1(c INT);
 | ||
| 
 | ||
| SHOW TABLES;
 | ||
| 
 | ||
| # Cleanup.
 | ||
| 
 | ||
| --connection default
 | ||
| --echo
 | ||
| --echo ---> connection: default
 | ||
| 
 | ||
| --disconnect bug27337_con2
 | ||
| 
 | ||
| DROP DATABASE mysqltest1;
 | ||
| DROP DATABASE mysqltest2;
 | ||
| 
 | ||
| DROP USER mysqltest_1@localhost;
 | ||
| 
 | ||
| # Test case 2: privileges are not checked properly for prepared statements.
 | ||
| 
 | ||
| # Prepare.
 | ||
| 
 | ||
| --disable_warnings
 | ||
| DROP DATABASE IF EXISTS mysqltest1;
 | ||
| DROP DATABASE IF EXISTS mysqltest2;
 | ||
| --enable_warnings
 | ||
| 
 | ||
| CREATE DATABASE mysqltest1;
 | ||
| CREATE DATABASE mysqltest2;
 | ||
| 
 | ||
| CREATE TABLE mysqltest1.t1(c INT);
 | ||
| CREATE TABLE mysqltest2.t2(c INT);
 | ||
| 
 | ||
| GRANT SELECT ON mysqltest1.t1 TO mysqltest_1@localhost;
 | ||
| GRANT SELECT ON mysqltest2.t2 TO mysqltest_2@localhost;
 | ||
| 
 | ||
| # Test.
 | ||
| 
 | ||
| --connect (bug27337_con1,localhost,mysqltest_1,,mysqltest1)
 | ||
| --echo
 | ||
| --echo ---> connection: bug27337_con1
 | ||
| 
 | ||
| SHOW TABLES FROM mysqltest1;
 | ||
| 
 | ||
| PREPARE stmt1 FROM 'SHOW TABLES FROM mysqltest1';
 | ||
| 
 | ||
| EXECUTE stmt1;
 | ||
| 
 | ||
| --connect (bug27337_con2,localhost,mysqltest_2,,mysqltest2)
 | ||
| --echo
 | ||
| --echo ---> connection: bug27337_con2
 | ||
| 
 | ||
| SHOW COLUMNS FROM mysqltest2.t2;
 | ||
| 
 | ||
| PREPARE stmt2 FROM 'SHOW COLUMNS FROM mysqltest2.t2';
 | ||
| 
 | ||
| EXECUTE stmt2;
 | ||
| 
 | ||
| --connection default
 | ||
| --echo
 | ||
| --echo ---> connection: default
 | ||
| 
 | ||
| REVOKE SELECT ON mysqltest1.t1 FROM mysqltest_1@localhost;
 | ||
| REVOKE SELECT ON mysqltest2.t2 FROM mysqltest_2@localhost;
 | ||
| 
 | ||
| --connection bug27337_con1
 | ||
| --echo
 | ||
| --echo ---> connection: bug27337_con1
 | ||
| 
 | ||
| --error ER_DBACCESS_DENIED_ERROR
 | ||
| SHOW TABLES FROM mysqltest1;
 | ||
| 
 | ||
| --error ER_DBACCESS_DENIED_ERROR
 | ||
| EXECUTE stmt1;
 | ||
| 
 | ||
| --connection bug27337_con2
 | ||
| --echo
 | ||
| --echo ---> connection: bug27337_con2
 | ||
| 
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| SHOW COLUMNS FROM mysqltest2.t2;
 | ||
| 
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| EXECUTE stmt2;
 | ||
| 
 | ||
| # Cleanup.
 | ||
| 
 | ||
| --connection default
 | ||
| --echo
 | ||
| --echo ---> connection: default
 | ||
| 
 | ||
| --disconnect bug27337_con1
 | ||
| --disconnect bug27337_con2
 | ||
| 
 | ||
| DROP DATABASE mysqltest1;
 | ||
| DROP DATABASE mysqltest2;
 | ||
| 
 | ||
| DROP USER mysqltest_1@localhost;
 | ||
| DROP USER mysqltest_2@localhost;
 | ||
| 
 | ||
| #
 | ||
| # Bug#27878 Unchecked privileges on a view referring to a table from another
 | ||
| #           database.
 | ||
| #
 | ||
| USE test;
 | ||
| CREATE TABLE t1 (f1 int, f2 int);
 | ||
| INSERT INTO t1 VALUES(1,1), (2,2);
 | ||
| CREATE DATABASE db27878;
 | ||
| GRANT UPDATE(f1) ON t1 TO 'mysqltest_1'@'localhost';
 | ||
| GRANT SELECT ON `test`.* TO 'mysqltest_1'@'localhost';
 | ||
| GRANT ALL ON db27878.* TO 'mysqltest_1'@'localhost';
 | ||
| USE db27878;
 | ||
| CREATE SQL SECURITY INVOKER VIEW db27878.v1 AS SELECT * FROM test.t1;
 | ||
| connect (user1,localhost,mysqltest_1,,test);
 | ||
| connection user1;
 | ||
| USE db27878;
 | ||
| --error 1356
 | ||
| UPDATE v1 SET f2 = 4;
 | ||
| SELECT * FROM test.t1;
 | ||
| disconnect user1;
 | ||
| connection default;
 | ||
| REVOKE UPDATE (f1) ON `test`.`t1` FROM 'mysqltest_1'@'localhost';
 | ||
| REVOKE SELECT ON `test`.* FROM 'mysqltest_1'@'localhost';
 | ||
| REVOKE ALL ON db27878.* FROM 'mysqltest_1'@'localhost';
 | ||
| DROP USER mysqltest_1@localhost;
 | ||
| DROP DATABASE db27878;
 | ||
| USE test;
 | ||
| DROP TABLE t1;
 | ||
| 
 | ||
| --echo #
 | ||
| --echo #  Bug#33275 Server crash when creating temporary table mysql.user
 | ||
| --echo #
 | ||
| CREATE TEMPORARY TABLE mysql.user (id INT);
 | ||
| FLUSH PRIVILEGES;
 | ||
| DROP TABLE mysql.user;
 | ||
| 
 | ||
| 
 | ||
| #
 | ||
| # Bug#33201 Crash occurs when granting update privilege on one column of a view
 | ||
| #
 | ||
| drop table if exists test;
 | ||
| drop function if exists test_function;
 | ||
| drop view if exists v1;
 | ||
| create table test (col1 varchar(30));
 | ||
| delimiter |;
 | ||
| create function test_function() returns varchar(30)
 | ||
| begin
 | ||
|         declare tmp varchar(30);
 | ||
|         select col1 from test limit 1 into tmp;
 | ||
|         return '1';
 | ||
| end|
 | ||
| delimiter ;|
 | ||
| create view v1 as select test.* from test where test.col1=test_function();
 | ||
| grant update (col1) on v1 to 'greg'@'localhost';
 | ||
| drop user 'greg'@'localhost';
 | ||
| drop view v1;
 | ||
| drop table test;
 | ||
| drop function test_function;
 | ||
| 
 | ||
| #
 | ||
| # Bug#41456 SET PASSWORD hates CURRENT_USER()
 | ||
| #
 | ||
| SELECT CURRENT_USER();
 | ||
| SET PASSWORD FOR CURRENT_USER() = PASSWORD("admin");
 | ||
| SET PASSWORD FOR CURRENT_USER() = PASSWORD("");
 | ||
| 
 | ||
| #
 | ||
| # Bug#57952: privilege change is not taken into account by EXECUTE.
 | ||
| #
 | ||
| 
 | ||
| --echo
 | ||
| --echo # Bug#57952
 | ||
| --echo
 | ||
| 
 | ||
| --disable_warnings
 | ||
| DROP DATABASE IF EXISTS mysqltest1;
 | ||
| DROP DATABASE IF EXISTS mysqltest2;
 | ||
| --enable_warnings
 | ||
| 
 | ||
| CREATE DATABASE mysqltest1;
 | ||
| CREATE DATABASE mysqltest2;
 | ||
| 
 | ||
| use mysqltest1;
 | ||
| CREATE TABLE t1(a INT, b INT);
 | ||
| INSERT INTO t1 VALUES (1, 1);
 | ||
| 
 | ||
| CREATE TABLE t2(a INT);
 | ||
| INSERT INTO t2 VALUES (2);
 | ||
| 
 | ||
| CREATE TABLE mysqltest2.t3(a INT);
 | ||
| INSERT INTO mysqltest2.t3 VALUES (4);
 | ||
| 
 | ||
| CREATE USER testuser@localhost;
 | ||
| GRANT CREATE ROUTINE, EXECUTE ON mysqltest1.* TO testuser@localhost;
 | ||
| GRANT SELECT(b) ON t1 TO testuser@localhost;
 | ||
| GRANT SELECT    ON t2 TO testuser@localhost;
 | ||
| GRANT SELECT    ON mysqltest2.* TO testuser@localhost;
 | ||
| 
 | ||
| --echo
 | ||
| --echo # Connection: bug57952_con1 (testuser@localhost, db: mysqltest1)
 | ||
| --connect (bug57952_con1,localhost,testuser,,mysqltest1)
 | ||
| PREPARE s1 FROM 'SELECT b FROM t1';
 | ||
| PREPARE s2 FROM 'SELECT a FROM t2';
 | ||
| PREPARE s3 FROM 'SHOW TABLES FROM mysqltest2';
 | ||
| 
 | ||
| CREATE PROCEDURE p1() SELECT b FROM t1;
 | ||
| CREATE PROCEDURE p2() SELECT a FROM t2;
 | ||
| CREATE PROCEDURE p3() SHOW TABLES FROM mysqltest2;
 | ||
| 
 | ||
| CALL p1;
 | ||
| CALL p2;
 | ||
| CALL p3;
 | ||
| 
 | ||
| --echo
 | ||
| --echo # Connection: default
 | ||
| --connection default
 | ||
| REVOKE SELECT ON t1 FROM testuser@localhost;
 | ||
| GRANT SELECT(a) ON t1 TO testuser@localhost;
 | ||
| REVOKE SELECT ON t2 FROM testuser@localhost;
 | ||
| REVOKE SELECT ON mysqltest2.* FROM testuser@localhost;
 | ||
| 
 | ||
| --echo
 | ||
| --echo # Connection: bug57952_con1 (testuser@localhost, db: mysqltest1)
 | ||
| --connection bug57952_con1
 | ||
| --echo #   - Check column-level privileges...
 | ||
| --error ER_COLUMNACCESS_DENIED_ERROR
 | ||
| EXECUTE s1;
 | ||
| 
 | ||
| --error ER_COLUMNACCESS_DENIED_ERROR
 | ||
| SELECT b FROM t1;
 | ||
| 
 | ||
| --error ER_COLUMNACCESS_DENIED_ERROR
 | ||
| EXECUTE s1;
 | ||
| 
 | ||
| --error ER_COLUMNACCESS_DENIED_ERROR
 | ||
| CALL p1;
 | ||
| 
 | ||
| --echo #   - Check table-level privileges...
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| SELECT a FROM t2;
 | ||
| 
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| EXECUTE s2;
 | ||
| 
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| CALL p2;
 | ||
| 
 | ||
| --echo #   - Check database-level privileges...
 | ||
| --error ER_DBACCESS_DENIED_ERROR
 | ||
| SHOW TABLES FROM mysqltest2;
 | ||
| 
 | ||
| --error ER_DBACCESS_DENIED_ERROR
 | ||
| EXECUTE s3;
 | ||
| 
 | ||
| --error ER_DBACCESS_DENIED_ERROR
 | ||
| CALL p3;
 | ||
| 
 | ||
| --echo
 | ||
| --echo # Connection: default
 | ||
| --connection default
 | ||
| --disconnect bug57952_con1
 | ||
| DROP DATABASE mysqltest1;
 | ||
| DROP DATABASE mysqltest2;
 | ||
| DROP USER testuser@localhost;
 | ||
| use test;
 | ||
| --echo
 | ||
| 
 | ||
| 
 | ||
| --echo #
 | ||
| --echo # Test for bug #36544 "DROP USER does not remove stored function
 | ||
| --echo #                      privileges".
 | ||
| --echo #
 | ||
| create database mysqltest1;
 | ||
| create function mysqltest1.f1() returns int return 0;
 | ||
| create procedure mysqltest1.p1() begin end;
 | ||
| --echo #
 | ||
| --echo # 1) Check that DROP USER properly removes privileges on both
 | ||
| --echo #    stored procedures and functions.
 | ||
| --echo #
 | ||
| create user mysqluser1@localhost;
 | ||
| grant execute on function mysqltest1.f1 to mysqluser1@localhost;
 | ||
| grant execute on procedure mysqltest1.p1 to mysqluser1@localhost;
 | ||
| 
 | ||
| --echo # Quick test that granted privileges are properly reflected
 | ||
| --echo # in privilege tables and in in-memory structures.
 | ||
| show grants for mysqluser1@localhost;
 | ||
| select db, routine_name, routine_type, proc_priv from mysql.procs_priv where user='mysqluser1' and host='localhost';
 | ||
| --echo #
 | ||
| --echo # Create connection 'bug_36544_con1' as 'mysqluser1@localhost'.
 | ||
| --connect (bug36544_con1,localhost,mysqluser1,,)
 | ||
| call mysqltest1.p1();
 | ||
| select mysqltest1.f1();
 | ||
| 
 | ||
| --echo #
 | ||
| --echo # Switch to connection 'default'.
 | ||
| --connection default
 | ||
| drop user mysqluser1@localhost;
 | ||
| 
 | ||
| --echo #
 | ||
| --echo # Test that dropping of user is properly reflected in
 | ||
| --echo # both privilege tables and in in-memory structures.
 | ||
| --echo #
 | ||
| --echo # Switch to connection 'bug36544_con1'.
 | ||
| --connection bug36544_con1
 | ||
| --echo # The connection cold be alive but should not be able to
 | ||
| --echo # access to any of the stored routines.
 | ||
| --error ER_PROCACCESS_DENIED_ERROR
 | ||
| call mysqltest1.p1();
 | ||
| --error ER_PROCACCESS_DENIED_ERROR
 | ||
| select mysqltest1.f1();
 | ||
| --disconnect bug36544_con1
 | ||
| 
 | ||
| --echo #
 | ||
| --echo # Switch to connection 'default'.
 | ||
| --connection default
 | ||
| --echo #
 | ||
| --echo # Now create user with the same name and check that he
 | ||
| --echo # has not inherited privileges.
 | ||
| create user mysqluser1@localhost;
 | ||
| show grants for mysqluser1@localhost;
 | ||
| select db, routine_name, routine_type, proc_priv from mysql.procs_priv where user='mysqluser1' and host='localhost';
 | ||
| --echo #
 | ||
| --echo # Create connection 'bug_36544_con2' as 'mysqluser1@localhost'.
 | ||
| --connect (bug36544_con2,localhost,mysqluser1,,)
 | ||
| --echo # Newly created user should not be able to access any of the routines.
 | ||
| --error ER_PROCACCESS_DENIED_ERROR
 | ||
| call mysqltest1.p1();
 | ||
| --error ER_PROCACCESS_DENIED_ERROR
 | ||
| select mysqltest1.f1();
 | ||
| --echo #
 | ||
| --echo # Switch to connection 'default'.
 | ||
| --connection default
 | ||
| 
 | ||
| --echo #
 | ||
| --echo # 2) Check that RENAME USER properly updates privileges on both
 | ||
| --echo #    stored procedures and functions.
 | ||
| --echo #
 | ||
| grant execute on function mysqltest1.f1 to mysqluser1@localhost;
 | ||
| grant execute on procedure mysqltest1.p1 to mysqluser1@localhost;
 | ||
| --echo #
 | ||
| --echo # Create one more user to make in-memory hashes non-trivial.
 | ||
| --echo # User names 'mysqluser11' and 'mysqluser10' were selected
 | ||
| --echo # to trigger bug discovered during code inspection.
 | ||
| create user mysqluser11@localhost;
 | ||
| grant execute on function mysqltest1.f1 to mysqluser11@localhost;
 | ||
| grant execute on procedure mysqltest1.p1 to mysqluser11@localhost;
 | ||
| --echo # Also create a couple of tables to test for another bug
 | ||
| --echo # discovered during code inspection (again table names were
 | ||
| --echo # chosen especially to trigger the bug).
 | ||
| create table mysqltest1.t11 (i int);
 | ||
| create table mysqltest1.t22 (i int);
 | ||
| grant select on mysqltest1.t22 to mysqluser1@localhost;
 | ||
| grant select on mysqltest1.t11 to mysqluser1@localhost;
 | ||
| 
 | ||
| --echo # Quick test that granted privileges are properly reflected
 | ||
| --echo # in privilege tables and in in-memory structures.
 | ||
| show grants for mysqluser1@localhost;
 | ||
| select db, routine_name, routine_type, proc_priv from mysql.procs_priv where user='mysqluser1' and host='localhost';
 | ||
| select db, table_name, table_priv from mysql.tables_priv where user='mysqluser1' and host='localhost';
 | ||
| --echo #
 | ||
| --echo # Switch to connection 'bug36544_con2'.
 | ||
| --connection bug36544_con2
 | ||
| call mysqltest1.p1();
 | ||
| select mysqltest1.f1();
 | ||
| select * from mysqltest1.t11;
 | ||
| select * from mysqltest1.t22;
 | ||
| 
 | ||
| --echo #
 | ||
| --echo # Switch to connection 'default'.
 | ||
| --connection default
 | ||
| rename user mysqluser1@localhost to mysqluser10@localhost;
 | ||
| 
 | ||
| --echo #
 | ||
| --echo # Test that there are no privileges left for mysqluser1.
 | ||
| --echo #
 | ||
| --echo # Switch to connection 'bug36544_con2'.
 | ||
| --connection bug36544_con2
 | ||
| --echo # The connection cold be alive but should not be able to
 | ||
| --echo # access to any of the stored routines or tables.
 | ||
| --error ER_PROCACCESS_DENIED_ERROR
 | ||
| call mysqltest1.p1();
 | ||
| --error ER_PROCACCESS_DENIED_ERROR
 | ||
| select mysqltest1.f1();
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| select * from mysqltest1.t11;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| select * from mysqltest1.t22;
 | ||
| --disconnect bug36544_con2
 | ||
| 
 | ||
| --echo #
 | ||
| --echo # Switch to connection 'default'.
 | ||
| --connection default
 | ||
| --echo #
 | ||
| --echo # Now create user with the old name and check that he
 | ||
| --echo # has not inherited privileges.
 | ||
| create user mysqluser1@localhost;
 | ||
| show grants for mysqluser1@localhost;
 | ||
| select db, routine_name, routine_type, proc_priv from mysql.procs_priv where user='mysqluser1' and host='localhost';
 | ||
| select db, table_name, table_priv from mysql.tables_priv where user='mysqluser1' and host='localhost';
 | ||
| --echo #
 | ||
| --echo # Create connection 'bug_36544_con3' as 'mysqluser1@localhost'.
 | ||
| --connect (bug36544_con3,localhost,mysqluser1,,)
 | ||
| --echo # Newly created user should not be able to access to any of the
 | ||
| --echo # stored routines or tables.
 | ||
| --error ER_PROCACCESS_DENIED_ERROR
 | ||
| call mysqltest1.p1();
 | ||
| --error ER_PROCACCESS_DENIED_ERROR
 | ||
| select mysqltest1.f1();
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| select * from mysqltest1.t11;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| select * from mysqltest1.t22;
 | ||
| --disconnect bug36544_con3
 | ||
| 
 | ||
| --echo #
 | ||
| --echo # Switch to connection 'default'.
 | ||
| --connection default
 | ||
| --echo #
 | ||
| --echo # Now check that privileges became associated with a new user
 | ||
| --echo # name - mysqluser10.
 | ||
| --echo #
 | ||
| show grants for mysqluser10@localhost;
 | ||
| select db, routine_name, routine_type, proc_priv from mysql.procs_priv where user='mysqluser10' and host='localhost';
 | ||
| select db, table_name, table_priv from mysql.tables_priv where user='mysqluser10' and host='localhost';
 | ||
| --echo #
 | ||
| --echo # Create connection 'bug_36544_con4' as 'mysqluser10@localhost'.
 | ||
| --connect (bug36544_con4,localhost,mysqluser10,,)
 | ||
| call mysqltest1.p1();
 | ||
| select mysqltest1.f1();
 | ||
| select * from mysqltest1.t11;
 | ||
| select * from mysqltest1.t22;
 | ||
| --disconnect bug36544_con4
 | ||
| 
 | ||
| --echo #
 | ||
| --echo # Switch to connection 'default'.
 | ||
| --connection default
 | ||
| --echo #
 | ||
| --echo # Clean-up.
 | ||
| drop user mysqluser1@localhost;
 | ||
| drop user mysqluser10@localhost;
 | ||
| drop user mysqluser11@localhost;
 | ||
| drop database mysqltest1;
 | ||
| 
 | ||
| 
 | ||
| --echo End of 5.0 tests
 | ||
| 
 | ||
| #
 | ||
| # Bug#21432 Database/Table name limited to 64 bytes, not chars, problems with multi-byte
 | ||
| #
 | ||
| set names utf8;
 | ||
| grant select on test.* to юзер_юзер@localhost;
 | ||
| --exec $MYSQL --default-character-set=utf8 --user=юзер_юзер -e "select user()"
 | ||
| revoke all on test.* from юзер_юзер@localhost;
 | ||
| drop user юзер_юзер@localhost;
 | ||
| --error ER_WRONG_STRING_LENGTH
 | ||
| grant select on test.* to очень_длинный_юзер@localhost;
 | ||
| set names default;
 | ||
| 
 | ||
| #
 | ||
| # Bug#20901 CREATE privilege is enough to insert into a table
 | ||
| #
 | ||
| 
 | ||
| create database mysqltest;
 | ||
| use mysqltest;
 | ||
| 
 | ||
| grant create on mysqltest.* to mysqltest@localhost;
 | ||
| create table t1 (i INT);
 | ||
| 
 | ||
| connect (user1,localhost,mysqltest,,mysqltest);
 | ||
| connection user1;
 | ||
| # show we don't have INSERT
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| insert into t1 values (1);
 | ||
| # show we have CREATE
 | ||
| create table t2 (i INT);
 | ||
| create table t4 (i INT);
 | ||
| 
 | ||
| connection default;
 | ||
| grant select, insert on mysqltest.t2 to mysqltest@localhost;
 | ||
| grant         insert on mysqltest.t4 to mysqltest@localhost;
 | ||
| # to specify ACLs for non-existent objects, must explictly |CREATE
 | ||
| grant create, insert on mysqltest.t5 to mysqltest@localhost;
 | ||
| grant create, insert on mysqltest.t6 to mysqltest@localhost;
 | ||
| flush privileges;
 | ||
| 
 | ||
| connection user1;
 | ||
| insert into t2 values (1);
 | ||
| 
 | ||
| 
 | ||
| # CREATE IF NOT EXISTS...SELECT, t1 exists, no INSERT, must fail
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| create table if not exists t1 select * from t2;
 | ||
| 
 | ||
| # CREATE IF NOT EXISTS...SELECT, no t3 yet, no INSERT, must fail
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| create table if not exists t3 select * from t2;
 | ||
| 
 | ||
| # CREATE IF NOT EXISTS...SELECT, t4 exists, have INSERT, must succeed
 | ||
| create table if not exists t4 select * from t2;
 | ||
| 
 | ||
| # CREATE IF NOT EXISTS...SELECT, no t5 yet, have INSERT, must succeed
 | ||
| create table if not exists t5 select * from t2;
 | ||
| 
 | ||
| 
 | ||
| # CREATE...SELECT, no t6 yet, have INSERT, must succeed
 | ||
| create table t6 select * from t2;
 | ||
| 
 | ||
| # CREATE...SELECT, no t7 yet, no INSERT, must fail
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| create table t7 select * from t2;
 | ||
| 
 | ||
| # CREATE...SELECT, t4 exists, have INSERT, must still fail (exists)
 | ||
| --error 1050
 | ||
| create table t4 select * from t2;
 | ||
| 
 | ||
| # CREATE...SELECT, t1 exists, no INSERT, must fail
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| create table t1 select * from t2;
 | ||
| 
 | ||
| 
 | ||
| connection default;
 | ||
| drop table t1,t2,t4,t5,t6;
 | ||
| 
 | ||
| revoke create         on mysqltest.*  from mysqltest@localhost;
 | ||
| revoke select, insert on mysqltest.t2 from mysqltest@localhost;
 | ||
| revoke insert         on mysqltest.t4 from mysqltest@localhost;
 | ||
| revoke create, insert on mysqltest.t5 from mysqltest@localhost;
 | ||
| revoke create, insert on mysqltest.t6 from mysqltest@localhost;
 | ||
| drop user mysqltest@localhost;
 | ||
| 
 | ||
| disconnect user1;
 | ||
| drop database mysqltest;
 | ||
| use test;
 | ||
| 
 | ||
| 
 | ||
| #
 | ||
| # Bug#16470 crash on grant if old grant tables
 | ||
| #
 | ||
| --echo FLUSH PRIVILEGES without procs_priv table.
 | ||
| RENAME TABLE mysql.procs_priv TO mysql.procs_gone;
 | ||
| --error ER_NO_SUCH_TABLE
 | ||
| FLUSH PRIVILEGES;
 | ||
| --echo Assigning privileges without procs_priv table.
 | ||
| CREATE DATABASE mysqltest1;
 | ||
| CREATE PROCEDURE mysqltest1.test() SQL SECURITY DEFINER
 | ||
|   SELECT 1;
 | ||
| --error ER_NO_SUCH_TABLE
 | ||
| GRANT EXECUTE ON FUNCTION mysqltest1.test TO mysqltest_1@localhost;
 | ||
| GRANT ALL PRIVILEGES ON test.* TO mysqltest_1@localhost;
 | ||
| CALL mysqltest1.test();
 | ||
| DROP DATABASE mysqltest1;
 | ||
| RENAME TABLE mysql.procs_gone TO mysql.procs_priv;
 | ||
| DROP USER mysqltest_1@localhost;
 | ||
| FLUSH PRIVILEGES;
 | ||
| 
 | ||
| 
 | ||
| #
 | ||
| # Bug#33464 DROP FUNCTION caused a crash.
 | ||
| #
 | ||
| CREATE DATABASE dbbug33464;
 | ||
| CREATE USER 'userbug33464'@'localhost';
 | ||
| 
 | ||
| GRANT CREATE ROUTINE ON dbbug33464.* TO 'userbug33464'@'localhost';
 | ||
| 
 | ||
| --replace_result $MASTER_MYPORT MYSQL_PORT $MASTER_MYSOCK MYSQL_SOCK
 | ||
| connect (connbug33464, localhost, userbug33464, , dbbug33464);
 | ||
| --source suite/funcs_1/include/show_connection.inc
 | ||
| 
 | ||
| --disable_warnings
 | ||
| DROP PROCEDURE IF EXISTS sp3;
 | ||
| DROP FUNCTION IF EXISTS fn1;
 | ||
| --enable_warnings
 | ||
| 
 | ||
| delimiter //;
 | ||
| CREATE PROCEDURE sp3(v1 char(20))
 | ||
| BEGIN
 | ||
|    SELECT * from dbbug33464.t6 where t6.f2= 'xyz';
 | ||
| END//
 | ||
| delimiter ;//
 | ||
| 
 | ||
| delimiter //;
 | ||
| CREATE FUNCTION fn1() returns char(50) SQL SECURITY INVOKER
 | ||
| BEGIN
 | ||
|    return 1;
 | ||
| END//
 | ||
| delimiter ;//
 | ||
| 
 | ||
| delimiter //;
 | ||
| CREATE FUNCTION fn2() returns char(50) SQL SECURITY DEFINER
 | ||
| BEGIN
 | ||
|    return 2;
 | ||
| END//
 | ||
| delimiter ;//
 | ||
| 
 | ||
| disconnect connbug33464;
 | ||
| 
 | ||
| # cleanup
 | ||
| connection default;
 | ||
| USE dbbug33464;
 | ||
| --source suite/funcs_1/include/show_connection.inc
 | ||
| 
 | ||
| SELECT fn1();
 | ||
| SELECT fn2();
 | ||
| 
 | ||
| --error 0, ER_CANNOT_USER
 | ||
| DROP USER 'userbug33464'@'localhost';
 | ||
| 
 | ||
| DROP FUNCTION fn1;
 | ||
| DROP FUNCTION fn2;
 | ||
| DROP PROCEDURE sp3;
 | ||
| 
 | ||
| --error 0, ER_CANNOT_USER
 | ||
| DROP USER 'userbug33464'@'localhost';
 | ||
| 
 | ||
| USE test;
 | ||
| DROP DATABASE dbbug33464;
 | ||
| 
 | ||
| 
 | ||
| SET @@global.log_bin_trust_function_creators= @old_log_bin_trust_function_creators;
 | ||
| 
 | ||
| #
 | ||
| # Bug#44658 Create procedure makes server crash when user does not have ALL privilege
 | ||
| #
 | ||
| CREATE USER user1;
 | ||
| CREATE USER user2;
 | ||
| GRANT CREATE ON db1.* TO 'user1'@'localhost';
 | ||
| GRANT CREATE ROUTINE ON db1.* TO 'user1'@'localhost';
 | ||
| GRANT CREATE ON db1.* TO 'user2'@'%';
 | ||
| GRANT CREATE ROUTINE ON db1.* TO 'user2'@'%';
 | ||
| FLUSH PRIVILEGES;
 | ||
| SHOW GRANTS FOR 'user1'@'localhost';
 | ||
| connect (con1,localhost,user1,,);
 | ||
| --echo ** Connect as user1 and create a procedure.
 | ||
| --echo ** The creation will imply implicitly assigned
 | ||
| --echo ** EXECUTE and ALTER ROUTINE privileges to
 | ||
| --echo ** the current user user1@localhost. 
 | ||
| SELECT @@GLOBAL.sql_mode;
 | ||
| SELECT @@SESSION.sql_mode;
 | ||
| CREATE DATABASE db1;
 | ||
| DELIMITER ||;
 | ||
| CREATE PROCEDURE db1.proc1(p1 INT)
 | ||
|  BEGIN
 | ||
|  SET @x = 0;
 | ||
|  REPEAT SET @x = @x + 1; UNTIL @x > p1 END REPEAT;
 | ||
|  END ;||
 | ||
| DELIMITER ;||
 | ||
| 
 | ||
| connect (con2,localhost,user2,,);
 | ||
| --echo ** Connect as user2 and create a procedure.
 | ||
| --echo ** Implicitly assignment of privileges will
 | ||
| --echo ** fail because the user2@localhost is an
 | ||
| --echo ** unknown user.
 | ||
| DELIMITER ||;
 | ||
| CREATE PROCEDURE db1.proc2(p1 INT)
 | ||
|  BEGIN
 | ||
|  SET @x = 0;
 | ||
|  REPEAT SET @x = @x + 1; UNTIL @x > p1 END REPEAT;
 | ||
|  END ;||
 | ||
| DELIMITER ;||
 | ||
| 
 | ||
| connection default;
 | ||
| SHOW GRANTS FOR 'user1'@'localhost';
 | ||
| SHOW GRANTS FOR 'user2';
 | ||
| disconnect con1;
 | ||
| disconnect con2;
 | ||
| DROP PROCEDURE db1.proc1;
 | ||
| DROP PROCEDURE db1.proc2;
 | ||
| REVOKE ALL ON db1.* FROM 'user1'@'localhost';
 | ||
| REVOKE ALL ON db1.* FROM 'user2'@'%';
 | ||
| DROP USER 'user1';
 | ||
| DROP USER 'user1'@'localhost';
 | ||
| DROP USER 'user2';
 | ||
| DROP DATABASE db1;
 | ||
| 
 | ||
| 
 | ||
| #
 | ||
| # Bug #53371: COM_FIELD_LIST can be abused to bypass table level grants.
 | ||
| #
 | ||
| 
 | ||
| CREATE DATABASE db1;
 | ||
| CREATE DATABASE db2;
 | ||
| GRANT SELECT ON db1.* to 'testbug'@localhost;
 | ||
| USE db2;
 | ||
| CREATE TABLE t1 (a INT);
 | ||
| USE test;
 | ||
| connect (con1,localhost,testbug,,db1);
 | ||
| --error ER_NO_SUCH_TABLE
 | ||
| SELECT * FROM `../db2/tb2`;
 | ||
| --error ER_TABLEACCESS_DENIED_ERROR
 | ||
| SELECT * FROM `../db2`.tb2;
 | ||
| --error ER_NO_SUCH_TABLE
 | ||
| SELECT * FROM `#mysql50#/../db2/tb2`;
 | ||
| connection default;
 | ||
| disconnect con1;
 | ||
| DROP USER 'testbug'@localhost;
 | ||
| DROP TABLE db2.t1;
 | ||
| DROP DATABASE db1;
 | ||
| DROP DATABASE db2;
 | ||
| 
 | ||
| --echo #
 | ||
| --echo # Bug #36742
 | ||
| --echo #
 | ||
| grant usage on Foo.* to myuser@Localhost identified by 'foo';
 | ||
| grant select on Foo.* to myuser@localhost;
 | ||
| select host,user from mysql.user where User='myuser';
 | ||
| revoke select on Foo.* from myuser@localhost;
 | ||
| delete from mysql.user where User='myuser';
 | ||
| flush privileges;
 | ||
| 
 | ||
| # Wait till we reached the initial number of concurrent sessions
 | ||
| --source include/wait_until_count_sessions.inc
 |