Fix varieties and curiosities

This commit is contained in:
Alexey Milovidov 2024-02-22 10:06:38 +01:00
parent afdfe35526
commit 6c9e7073c7
5 changed files with 9 additions and 9 deletions

View File

@ -893,7 +893,7 @@ def test_required_privileges():
instance.query("GRANT BACKUP ON test.table TO u1") instance.query("GRANT BACKUP ON test.table TO u1")
instance.query(f"BACKUP TABLE test.table TO {backup_name}", user="u1") instance.query(f"BACKUP TABLE test.table TO {backup_name}", user="u1")
expected_error = "necessary to have the grant INSERT, CREATE TABLE ON test.table" expected_error = "necessary to have the grant INSERT, CREATE TABLE ON test.`table`"
assert expected_error in instance.query_and_get_error( assert expected_error in instance.query_and_get_error(
f"RESTORE TABLE test.table FROM {backup_name}", user="u1" f"RESTORE TABLE test.table FROM {backup_name}", user="u1"
) )
@ -910,7 +910,7 @@ def test_required_privileges():
instance.query("DROP TABLE test.table") instance.query("DROP TABLE test.table")
expected_error = "necessary to have the grant INSERT, CREATE TABLE ON test.table" expected_error = "necessary to have the grant INSERT, CREATE TABLE ON test.`table`"
assert expected_error in instance.query_and_get_error( assert expected_error in instance.query_and_get_error(
f"RESTORE ALL FROM {backup_name}", user="u1" f"RESTORE ALL FROM {backup_name}", user="u1"
) )
@ -984,7 +984,7 @@ def test_system_users():
assert ( assert (
instance.query("SHOW CREATE USER u1") instance.query("SHOW CREATE USER u1")
== "CREATE USER u1 IDENTIFIED WITH sha256_password SETTINGS PROFILE default, custom_a = 1\n" == "CREATE USER u1 IDENTIFIED WITH sha256_password SETTINGS PROFILE `default`, custom_a = 1\n"
) )
assert instance.query("SHOW GRANTS FOR u1") == TSV( assert instance.query("SHOW GRANTS FOR u1") == TSV(
["GRANT SELECT ON test.* TO u1", "GRANT r2 TO u1"] ["GRANT SELECT ON test.* TO u1", "GRANT r2 TO u1"]

View File

@ -397,7 +397,7 @@ def test_introspection():
[ [
"CREATE USER A", "CREATE USER A",
"CREATE USER B", "CREATE USER B",
"CREATE USER default IDENTIFIED WITH plaintext_password SETTINGS PROFILE default", "CREATE USER default IDENTIFIED WITH plaintext_password SETTINGS PROFILE `default`",
] ]
) )
@ -457,7 +457,7 @@ def test_introspection():
expected_access1 = ( expected_access1 = (
"CREATE USER A\n" "CREATE USER A\n"
"CREATE USER B\n" "CREATE USER B\n"
"CREATE USER default IDENTIFIED WITH plaintext_password SETTINGS PROFILE default" "CREATE USER default IDENTIFIED WITH plaintext_password SETTINGS PROFILE `default`"
) )
expected_access2 = ( expected_access2 = (
"GRANT SELECT ON test.`table` TO A\n" "GRANT SELECT ON test.`table` TO A\n"
@ -558,7 +558,7 @@ def test_grant_with_replace_option():
) )
expected_error = ( expected_error = (
"it's necessary to have the grant INSERT ON test.table WITH GRANT OPTION" "it's necessary to have the grant INSERT ON test.`table` WITH GRANT OPTION"
) )
assert expected_error in instance.query_and_get_error( assert expected_error in instance.query_and_get_error(
"GRANT INSERT ON test.`table` TO B WITH REPLACE OPTION", user="A" "GRANT INSERT ON test.`table` TO B WITH REPLACE OPTION", user="A"

View File

@ -247,7 +247,7 @@ def test_create_table():
"CREATE TABLE table7 (`x` int) ENGINE = S3('http://minio1:9001/root/data/test5.csv.gz', 'minio', '[HIDDEN]', 'CSV', 'gzip')", "CREATE TABLE table7 (`x` int) ENGINE = S3('http://minio1:9001/root/data/test5.csv.gz', 'minio', '[HIDDEN]', 'CSV', 'gzip')",
"CREATE TABLE table8 (`x` int) ENGINE = MySQL(named_collection_1, host = 'mysql80', port = 3306, database = 'mysql_db', `table` = 'mysql_table', user = 'mysql_user', password = '[HIDDEN]')", "CREATE TABLE table8 (`x` int) ENGINE = MySQL(named_collection_1, host = 'mysql80', port = 3306, database = 'mysql_db', `table` = 'mysql_table', user = 'mysql_user', password = '[HIDDEN]')",
"CREATE TABLE table9 (`x` int) ENGINE = MySQL(named_collection_2, database = 'mysql_db', host = 'mysql80', port = 3306, password = '[HIDDEN]', `table` = 'mysql_table', user = 'mysql_user')", "CREATE TABLE table9 (`x` int) ENGINE = MySQL(named_collection_2, database = 'mysql_db', host = 'mysql80', port = 3306, password = '[HIDDEN]', `table` = 'mysql_table', user = 'mysql_user')",
"CREATE TABLE table10 (x int) ENGINE = MySQL(named_collection_3, database = 'mysql_db', host = 'mysql80', port = 3306, `table` = 'mysql_table')", "CREATE TABLE table10 (x int) ENGINE = MySQL(named_collection_3, database = 'mysql_db', host = 'mysql80', port = 3306, table = 'mysql_table')",
"CREATE TABLE table11 (`x` int) ENGINE = PostgreSQL(named_collection_4, host = 'postgres1', port = 5432, database = 'postgres_db', `table` = 'postgres_table', user = 'postgres_user', password = '[HIDDEN]')", "CREATE TABLE table11 (`x` int) ENGINE = PostgreSQL(named_collection_4, host = 'postgres1', port = 5432, database = 'postgres_db', `table` = 'postgres_table', user = 'postgres_user', password = '[HIDDEN]')",
"CREATE TABLE table12 (`x` int) ENGINE = MongoDB(named_collection_5, host = 'mongo1', port = 5432, db = 'mongo_db', collection = 'mongo_col', user = 'mongo_user', password = '[HIDDEN]'", "CREATE TABLE table12 (`x` int) ENGINE = MongoDB(named_collection_5, host = 'mongo1', port = 5432, db = 'mongo_db', collection = 'mongo_col', user = 'mongo_user', password = '[HIDDEN]'",
"CREATE TABLE table13 (`x` int) ENGINE = S3(named_collection_6, url = 'http://minio1:9001/root/data/test8.csv', access_key_id = 'minio', secret_access_key = '[HIDDEN]', format = 'CSV')", "CREATE TABLE table13 (`x` int) ENGINE = S3(named_collection_6, url = 'http://minio1:9001/root/data/test8.csv', access_key_id = 'minio', secret_access_key = '[HIDDEN]', format = 'CSV')",

View File

@ -802,10 +802,10 @@ def test_tags_with_db_and_table_names():
assert node.query("SHOW CREATE POLICIES default") == TSV( assert node.query("SHOW CREATE POLICIES default") == TSV(
[ [
"CREATE ROW POLICY default ON mydb.`table` FOR SELECT USING a = 0 TO default",
"CREATE ROW POLICY default ON mydb.`.filtered_table4` FOR SELECT USING c = 2 TO default", "CREATE ROW POLICY default ON mydb.`.filtered_table4` FOR SELECT USING c = 2 TO default",
"CREATE ROW POLICY default ON mydb.filtered_table2 FOR SELECT USING c > (d + 5) TO default", "CREATE ROW POLICY default ON mydb.filtered_table2 FOR SELECT USING c > (d + 5) TO default",
"CREATE ROW POLICY default ON mydb.filtered_table3 FOR SELECT USING c = 0 TO default", "CREATE ROW POLICY default ON mydb.filtered_table3 FOR SELECT USING c = 0 TO default",
"CREATE ROW POLICY default ON mydb.`table` FOR SELECT USING a = 0 TO default",
] ]
) )

View File

@ -318,7 +318,7 @@ SHOW ACCESS
``` ```
**result** **result**
``` ```
CREATE USER default IDENTIFIED WITH plaintext_password SETTINGS PROFILE default CREATE USER default IDENTIFIED WITH plaintext_password SETTINGS PROFILE `default`
CREATE SETTINGS PROFILE default SETTINGS max_memory_usage = 10000000000, load_balancing = 'random' CREATE SETTINGS PROFILE default SETTINGS max_memory_usage = 10000000000, load_balancing = 'random'
CREATE SETTINGS PROFILE readonly SETTINGS readonly = 1 CREATE SETTINGS PROFILE readonly SETTINGS readonly = 1
CREATE QUOTA default KEYED BY user_name FOR INTERVAL 1 hour TRACKING ONLY TO default CREATE QUOTA default KEYED BY user_name FOR INTERVAL 1 hour TRACKING ONLY TO default