@@ -54,8 +54,8 @@ CREATE VIEW viewperms_v7 AS SELECT * FROM viewperms_v2;
54
54
-- v2pgslq
55
55
-- v3tuser
56
56
-- v4tuser
57
- -- v5pgsql
58
- -- v6pgsql
57
+ -- v5postgres
58
+ -- v6postgres
59
59
-- v7tuser
60
60
--
61
61
UPDATE pg_classSET relowner= viewperms_testid()
@@ -71,31 +71,31 @@ UPDATE pg_class SET relowner = viewperms_testid()
71
71
-- Now for the tests.
72
72
--
73
73
74
- -- View v1 ownerpgsql has access to t1 owned by tuser
74
+ -- View v1 ownerpostgres has access to t1 owned by tuser
75
75
SELECT * FROM viewperms_v1;
76
76
77
- -- View v2 ownerpgsql has access to t2 owned bypgsql (of cause)
77
+ -- View v2 ownerpostgres has access to t2 owned bypostgres (of cause)
78
78
SELECT * FROM viewperms_v2;
79
79
80
80
-- View v3 owner tuser has access to t1 owned by tuser
81
81
SELECT * FROM viewperms_v3;
82
82
83
- -- View v4 owner tuser has NO access to t2 owned bypgsql
83
+ -- View v4 owner tuser has NO access to t2 owned bypostgres
84
84
-- MUST fail with permission denied
85
85
SELECT * FROM viewperms_v4;
86
86
87
- -- v5 (pgsql ) can access v2 (pgsql ) can access t1 (tuser)
87
+ -- v5 (postgres ) can access v2 (postgres ) can access t1 (tuser)
88
88
SELECT * FROM viewperms_v5;
89
89
90
- -- v6 (pgsql ) can access v4 (tuser) CANNOT access t2 (pgsql )
90
+ -- v6 (postgres ) can access v4 (tuser) CANNOT access t2 (postgres )
91
91
SELECT * FROM viewperms_v6;
92
92
93
- -- v7 (tuser) CANNOT access v2 (pgsql ) wanna access t2 (pgslq)
93
+ -- v7 (tuser) CANNOT access v2 (postgres ) wanna access t2 (pgslq)
94
94
SELECT * FROM viewperms_v7;
95
95
96
96
GRANT SELECT ON viewperms_v2 TO PUBLIC;
97
97
-- but now
98
- -- v7 (tuser) can access v2 (pgsql via grant) can access t2 (pgsql )
98
+ -- v7 (tuser) can access v2 (postgres via grant) can access t2 (postgres )
99
99
SELECT * FROM viewperms_v7;
100
100
101
101
--