@@ -14,9 +14,9 @@ CREATE INDEX bttest_a_idx ON bttest_a USING btree (id);
14
14
CREATE INDEX bttest_b_idx ON bttest_b USING btree (id);
15
15
CREATE UNIQUE INDEX bttest_multi_idx ON bttest_multi
16
16
USING btree (id) INCLUDE (data);
17
- CREATE ROLEbttest_role ;
17
+ CREATE ROLEregress_bttest_role ;
18
18
-- verify permissions are checked (error due to function not callable)
19
- SET ROLEbttest_role ;
19
+ SET ROLEregress_bttest_role ;
20
20
SELECT bt_index_check('bttest_a_idx'::regclass);
21
21
ERROR: permission denied for function bt_index_check
22
22
SELECT bt_index_parent_check('bttest_a_idx'::regclass);
@@ -25,11 +25,11 @@ RESET ROLE;
25
25
-- we, intentionally, don't check relation permissions - it's useful
26
26
-- to run this cluster-wide with a restricted account, and as tested
27
27
-- above explicit permission has to be granted for that.
28
- GRANT EXECUTE ON FUNCTION bt_index_check(regclass) TObttest_role ;
29
- GRANT EXECUTE ON FUNCTION bt_index_parent_check(regclass) TObttest_role ;
30
- GRANT EXECUTE ON FUNCTION bt_index_check(regclass, boolean) TObttest_role ;
31
- GRANT EXECUTE ON FUNCTION bt_index_parent_check(regclass, boolean) TObttest_role ;
32
- SET ROLEbttest_role ;
28
+ GRANT EXECUTE ON FUNCTION bt_index_check(regclass) TOregress_bttest_role ;
29
+ GRANT EXECUTE ON FUNCTION bt_index_parent_check(regclass) TOregress_bttest_role ;
30
+ GRANT EXECUTE ON FUNCTION bt_index_check(regclass, boolean) TOregress_bttest_role ;
31
+ GRANT EXECUTE ON FUNCTION bt_index_parent_check(regclass, boolean) TOregress_bttest_role ;
32
+ SET ROLEregress_bttest_role ;
33
33
SELECT bt_index_check('bttest_a_idx');
34
34
bt_index_check
35
35
----------------
@@ -166,5 +166,5 @@ DROP TABLE bttest_b;
166
166
DROP TABLE bttest_multi;
167
167
DROP TABLE delete_test_table;
168
168
DROP TABLE toast_bug;
169
- DROP OWNED BYbttest_role ; -- permissions
170
- DROP ROLEbttest_role ;
169
+ DROP OWNED BYregress_bttest_role ; -- permissions
170
+ DROP ROLEregress_bttest_role ;