Add the schema for all function’s tests
With that check_cookie function i realized that the schema of functions is important, otherwise pgTAP could give me the OK when it finds the function in a different schema than what i intended.
This commit is contained in:
parent
c4fc37349b
commit
afd4bc16b7
|
@ -9,15 +9,15 @@ select plan(11);
|
||||||
|
|
||||||
set search_path to auth, numerus, public;
|
set search_path to auth, numerus, public;
|
||||||
|
|
||||||
select has_function('encrypt_password');
|
select has_function('auth', 'encrypt_password', array []::name[]);
|
||||||
select function_lang_is('encrypt_password', array []::name[], 'plpgsql');
|
select function_lang_is('auth', 'encrypt_password', array []::name[], 'plpgsql');
|
||||||
select function_returns('encrypt_password', array []::name[], 'trigger');
|
select function_returns('auth', 'encrypt_password', array []::name[], 'trigger');
|
||||||
select isnt_definer('encrypt_password', array []::name[]);
|
select isnt_definer('auth', 'encrypt_password', array []::name[]);
|
||||||
select volatility_is('encrypt_password', array []::name[], 'volatile');
|
select volatility_is('auth', 'encrypt_password', array []::name[], 'volatile');
|
||||||
select function_privs_are('encrypt_password', array []::name[], 'guest', array []::text[]);
|
select function_privs_are('auth', 'encrypt_password', array []::name[], 'guest', array []::text[]);
|
||||||
select function_privs_are('encrypt_password', array []::name[], 'invoicer', array []::text[]);
|
select function_privs_are('auth', 'encrypt_password', array []::name[], 'invoicer', array []::text[]);
|
||||||
select function_privs_are('encrypt_password', array []::name[], 'admin', array []::text[]);
|
select function_privs_are('auth', 'encrypt_password', array []::name[], 'admin', array []::text[]);
|
||||||
select function_privs_are('encrypt_password', array []::name[], 'authenticator', array []::text[]);
|
select function_privs_are('auth', 'encrypt_password', array []::name[], 'authenticator', array []::text[]);
|
||||||
|
|
||||||
select trigger_is('user', 'encrypt_password', 'encrypt_password');
|
select trigger_is('user', 'encrypt_password', 'encrypt_password');
|
||||||
|
|
||||||
|
|
|
@ -9,15 +9,15 @@ select plan(14);
|
||||||
|
|
||||||
set search_path to auth, public;
|
set search_path to auth, public;
|
||||||
|
|
||||||
select has_function('ensure_role_exists');
|
select has_function('auth', 'ensure_role_exists', array []::name[]);
|
||||||
select function_lang_is('ensure_role_exists', array []::name[], 'plpgsql');
|
select function_lang_is('auth', 'ensure_role_exists', array []::name[], 'plpgsql');
|
||||||
select function_returns('ensure_role_exists', array []::name[], 'trigger');
|
select function_returns('auth', 'ensure_role_exists', array []::name[], 'trigger');
|
||||||
select isnt_definer('ensure_role_exists', array []::name[]);
|
select isnt_definer('auth', 'ensure_role_exists', array []::name[]);
|
||||||
select volatility_is('ensure_role_exists', array []::name[], 'volatile');
|
select volatility_is('auth', 'ensure_role_exists', array []::name[], 'volatile');
|
||||||
select function_privs_are('ensure_role_exists', array []::name[], 'guest', array []::text[]);
|
select function_privs_are('auth', 'ensure_role_exists', array []::name[], 'guest', array []::text[]);
|
||||||
select function_privs_are('ensure_role_exists', array []::name[], 'invoicer', array []::text[]);
|
select function_privs_are('auth', 'ensure_role_exists', array []::name[], 'invoicer', array []::text[]);
|
||||||
select function_privs_are('ensure_role_exists', array []::name[], 'admin', array []::text[]);
|
select function_privs_are('auth', 'ensure_role_exists', array []::name[], 'admin', array []::text[]);
|
||||||
select function_privs_are('ensure_role_exists', array []::name[], 'authenticator', array []::text[]);
|
select function_privs_are('auth', 'ensure_role_exists', array []::name[], 'authenticator', array []::text[]);
|
||||||
|
|
||||||
select trigger_is('user', 'ensure_role_exists', 'ensure_role_exists');
|
select trigger_is('user', 'ensure_role_exists', 'ensure_role_exists');
|
||||||
|
|
||||||
|
|
|
@ -9,15 +9,15 @@ select plan(20);
|
||||||
|
|
||||||
set search_path to auth, numerus, public;
|
set search_path to auth, numerus, public;
|
||||||
|
|
||||||
select has_function('login');
|
select has_function('numerus', 'login', array ['email', 'text', 'inet']);
|
||||||
select function_lang_is('login', array ['email', 'text', 'inet'], 'plpgsql');
|
select function_lang_is('numerus', 'login', array ['email', 'text', 'inet'], 'plpgsql');
|
||||||
select function_returns('login', array ['email', 'text', 'inet'], 'text');
|
select function_returns('numerus', 'login', array ['email', 'text', 'inet'], 'text');
|
||||||
select is_definer('login', array ['email', 'text', 'inet']);
|
select is_definer('numerus', 'login', array ['email', 'text', 'inet']);
|
||||||
select volatility_is('login', array ['email', 'text', 'inet'], 'volatile');
|
select volatility_is('numerus', 'login', array ['email', 'text', 'inet'], 'volatile');
|
||||||
select function_privs_are('login', array ['email', 'text', 'inet'], 'guest', array ['EXECUTE']);
|
select function_privs_are('numerus', 'login', array ['email', 'text', 'inet'], 'guest', array ['EXECUTE']);
|
||||||
select function_privs_are('login', array ['email', 'text', 'inet'], 'invoicer', array []::text[]);
|
select function_privs_are('numerus', 'login', array ['email', 'text', 'inet'], 'invoicer', array []::text[]);
|
||||||
select function_privs_are('login', array ['email', 'text', 'inet'], 'admin', array []::text[]);
|
select function_privs_are('numerus', 'login', array ['email', 'text', 'inet'], 'admin', array []::text[]);
|
||||||
select function_privs_are('login', array ['email', 'text', 'inet'], 'authenticator', array []::text[]);
|
select function_privs_are('numerus', 'login', array ['email', 'text', 'inet'], 'authenticator', array []::text[]);
|
||||||
|
|
||||||
set client_min_messages to warning;
|
set client_min_messages to warning;
|
||||||
truncate auth."user" cascade;
|
truncate auth."user" cascade;
|
||||||
|
|
|
@ -9,15 +9,15 @@ select plan(15);
|
||||||
|
|
||||||
set search_path to auth, numerus, public;
|
set search_path to auth, numerus, public;
|
||||||
|
|
||||||
select has_function('logout');
|
select has_function('numerus', 'logout', array []::name[]);
|
||||||
select function_lang_is('logout', array []::text[], 'sql');
|
select function_lang_is('numerus', 'logout', array []::name[], 'sql');
|
||||||
select function_returns('logout', array []::text[], 'void');
|
select function_returns('numerus', 'logout', array []::name[], 'void');
|
||||||
select is_definer('logout', array []::text[]);
|
select is_definer('numerus', 'logout', array []::name[]);
|
||||||
select volatility_is('logout', array []::text[], 'volatile');
|
select volatility_is('numerus', 'logout', array []::name[], 'volatile');
|
||||||
select function_privs_are('logout', array []::text[], 'guest', array []::text[]);
|
select function_privs_are('numerus', 'logout', array []::name[], 'guest', array []::text[]);
|
||||||
select function_privs_are('logout', array []::text[], 'invoicer', array ['EXECUTE']);
|
select function_privs_are('numerus', 'logout', array []::name[], 'invoicer', array ['EXECUTE']);
|
||||||
select function_privs_are('logout', array []::text[], 'admin', array ['EXECUTE']);
|
select function_privs_are('numerus', 'logout', array []::name[], 'admin', array ['EXECUTE']);
|
||||||
select function_privs_are('logout', array []::text[], 'authenticator', array []::text[]);
|
select function_privs_are('numerus', 'logout', array []::name[], 'authenticator', array []::text[]);
|
||||||
|
|
||||||
set client_min_messages to warning;
|
set client_min_messages to warning;
|
||||||
truncate auth."user" cascade;
|
truncate auth."user" cascade;
|
||||||
|
|
Loading…
Reference in New Issue