Skip to content

Commit 8f330a1

Browse files
authoredDec 13, 2024
Merge branch 'main' into problame/remove-read-num-layers-visited-metric
2 parents c54d257 + 2c91062 commit 8f330a1

28 files changed

+454
-409
lines changed
 

‎.github/workflows/cloud-regress.yml

+1
Original file line numberDiff line numberDiff line change
@@ -99,6 +99,7 @@ jobs:
9999
BENCHMARK_CONNSTR: ${{steps.create-branch.outputs.dsn}}
100100

101101
- name: Delete branch
102+
if: always()
102103
uses: ./.github/actions/neon-branch-delete
103104
with:
104105
api_key: ${{ secrets.NEON_STAGING_API_KEY }}

‎Cargo.lock

+3
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

‎compute/patches/cloud_regress_pg16.patch

+94-79
Original file line numberDiff line numberDiff line change
@@ -981,7 +981,7 @@ index fc42d418bf..e38f517574 100644
981981
CREATE SCHEMA addr_nsp;
982982
SET search_path TO 'addr_nsp';
983983
diff --git a/src/test/regress/expected/password.out b/src/test/regress/expected/password.out
984-
index 8475231735..1afae5395f 100644
984+
index 8475231735..0653946337 100644
985985
--- a/src/test/regress/expected/password.out
986986
+++ b/src/test/regress/expected/password.out
987987
@@ -12,11 +12,11 @@ SET password_encryption = 'md5'; -- ok
@@ -1006,65 +1006,63 @@ index 8475231735..1afae5395f 100644
10061006
-----------------+---------------------------------------------------
10071007
- regress_passwd1 | md5783277baca28003b33453252be4dbb34
10081008
- regress_passwd2 | md54044304ba511dd062133eb5b4b84a2a3
1009-
+ regress_passwd1 | NEON_MD5_PLACEHOLDER_regress_passwd1
1010-
+ regress_passwd2 | NEON_MD5_PLACEHOLDER_regress_passwd2
1009+
+ regress_passwd1 | NEON_MD5_PLACEHOLDER:regress_passwd1
1010+
+ regress_passwd2 | NEON_MD5_PLACEHOLDER:regress_passwd2
10111011
regress_passwd3 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
10121012
- regress_passwd4 |
10131013
+ regress_passwd4 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
10141014
(4 rows)
10151015

10161016
-- Rename a role
1017-
@@ -54,24 +54,30 @@ ALTER ROLE regress_passwd2_new RENAME TO regress_passwd2;
1017+
@@ -54,24 +54,16 @@ ALTER ROLE regress_passwd2_new RENAME TO regress_passwd2;
10181018
-- passwords.
10191019
SET password_encryption = 'md5';
10201020
-- encrypt with MD5
10211021
-ALTER ROLE regress_passwd2 PASSWORD 'foo';
1022+
--- already encrypted, use as they are
1023+
-ALTER ROLE regress_passwd1 PASSWORD 'md5cd3578025fe2c3d7ed1b9a9b26238b70';
1024+
-ALTER ROLE regress_passwd3 PASSWORD 'SCRAM-SHA-256$4096:VLK4RMaQLCvNtQ==$6YtlR4t69SguDiwFvbVgVZtuz6gpJQQqUMZ7IQJK5yI=:ps75jrHeYU4lXCcXI4O8oIdJ3eO8o2jirjruw9phBTo=';
10221025
+ALTER ROLE regress_passwd2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
1023-
-- already encrypted, use as they are
1024-
ALTER ROLE regress_passwd1 PASSWORD 'md5cd3578025fe2c3d7ed1b9a9b26238b70';
1025-
+ERROR: Received HTTP code 400 from control plane: {"error":"Neon only supports being given plaintext passwords"}
1026-
ALTER ROLE regress_passwd3 PASSWORD 'SCRAM-SHA-256$4096:VLK4RMaQLCvNtQ==$6YtlR4t69SguDiwFvbVgVZtuz6gpJQQqUMZ7IQJK5yI=:ps75jrHeYU4lXCcXI4O8oIdJ3eO8o2jirjruw9phBTo=';
1027-
+ERROR: Received HTTP code 400 from control plane: {"error":"Neon only supports being given plaintext passwords"}
10281026
SET password_encryption = 'scram-sha-256';
10291027
-- create SCRAM secret
10301028
-ALTER ROLE regress_passwd4 PASSWORD 'foo';
1029+
--- already encrypted with MD5, use as it is
1030+
-CREATE ROLE regress_passwd5 PASSWORD 'md5e73a4b11df52a6068f8b39f90be36023';
1031+
--- This looks like a valid SCRAM-SHA-256 secret, but it is not
1032+
--- so it should be hashed with SCRAM-SHA-256.
1033+
-CREATE ROLE regress_passwd6 PASSWORD 'SCRAM-SHA-256$1234';
1034+
--- These may look like valid MD5 secrets, but they are not, so they
1035+
--- should be hashed with SCRAM-SHA-256.
1036+
--- trailing garbage at the end
1037+
-CREATE ROLE regress_passwd7 PASSWORD 'md5012345678901234567890123456789zz';
1038+
--- invalid length
1039+
-CREATE ROLE regress_passwd8 PASSWORD 'md501234567890123456789012345678901zz';
10311040
+ALTER ROLE regress_passwd4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
1032-
-- already encrypted with MD5, use as it is
1033-
CREATE ROLE regress_passwd5 PASSWORD 'md5e73a4b11df52a6068f8b39f90be36023';
1034-
+ERROR: Received HTTP code 400 from control plane: {"error":"Neon only supports being given plaintext passwords"}
1035-
-- This looks like a valid SCRAM-SHA-256 secret, but it is not
1036-
-- so it should be hashed with SCRAM-SHA-256.
1037-
CREATE ROLE regress_passwd6 PASSWORD 'SCRAM-SHA-256$1234';
1038-
+ERROR: Received HTTP code 400 from control plane: {"error":"Neon only supports being given plaintext passwords"}
1039-
-- These may look like valid MD5 secrets, but they are not, so they
1040-
-- should be hashed with SCRAM-SHA-256.
1041-
-- trailing garbage at the end
1042-
CREATE ROLE regress_passwd7 PASSWORD 'md5012345678901234567890123456789zz';
1043-
+ERROR: Received HTTP code 400 from control plane: {"error":"Neon only supports being given plaintext passwords"}
1044-
-- invalid length
1045-
CREATE ROLE regress_passwd8 PASSWORD 'md501234567890123456789012345678901zz';
1046-
+ERROR: Received HTTP code 400 from control plane: {"error":"Neon only supports being given plaintext passwords"}
1041+
+-- Neon does not support encrypted passwords, use unencrypted instead
1042+
+CREATE ROLE regress_passwd5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
1043+
+-- Neon does not support encrypted passwords, use unencrypted instead
1044+
+CREATE ROLE regress_passwd6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
1045+
+CREATE ROLE regress_passwd7 PASSWORD NEON_PASSWORD_PLACEHOLDER;
1046+
+CREATE ROLE regress_passwd8 PASSWORD NEON_PASSWORD_PLACEHOLDER;
10471047
-- Changing the SCRAM iteration count
10481048
SET scram_iterations = 1024;
10491049
CREATE ROLE regress_passwd9 PASSWORD 'alterediterationcount';
1050-
@@ -81,63 +87,67 @@ SELECT rolname, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+
1050+
@@ -81,11 +73,11 @@ SELECT rolname, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+
10511051
ORDER BY rolname, rolpassword;
10521052
rolname | rolpassword_masked
10531053
-----------------+---------------------------------------------------
10541054
- regress_passwd1 | md5cd3578025fe2c3d7ed1b9a9b26238b70
10551055
- regress_passwd2 | md5dfa155cadd5f4ad57860162f3fab9cdb
1056-
+ regress_passwd1 | NEON_MD5_PLACEHOLDER_regress_passwd1
1057-
+ regress_passwd2 | NEON_MD5_PLACEHOLDER_regress_passwd2
1056+
+ regress_passwd1 | NEON_MD5_PLACEHOLDER:regress_passwd1
1057+
+ regress_passwd2 | NEON_MD5_PLACEHOLDER:regress_passwd2
10581058
regress_passwd3 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
10591059
regress_passwd4 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
10601060
- regress_passwd5 | md5e73a4b11df52a6068f8b39f90be36023
1061-
- regress_passwd6 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
1062-
- regress_passwd7 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
1063-
- regress_passwd8 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
1064-
regress_passwd9 | SCRAM-SHA-256$1024:<salt>$<storedkey>:<serverkey>
1065-
-(9 rows)
1066-
+(5 rows)
1067-
1061+
+ regress_passwd5 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
1062+
regress_passwd6 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
1063+
regress_passwd7 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
1064+
regress_passwd8 | SCRAM-SHA-256$4096:<salt>$<storedkey>:<serverkey>
1065+
@@ -95,23 +87,20 @@ SELECT rolname, regexp_replace(rolpassword, '(SCRAM-SHA-256)\$(\d+):([a-zA-Z0-9+
10681066
-- An empty password is not allowed, in any form
10691067
CREATE ROLE regress_passwd_empty PASSWORD '';
10701068
NOTICE: empty string is not a valid password, clearing password
@@ -1082,56 +1080,37 @@ index 8475231735..1afae5395f 100644
10821080
-(1 row)
10831081
+(0 rows)
10841082

1085-
-- Test with invalid stored and server keys.
1086-
--
1087-
-- The first is valid, to act as a control. The others have too long
1088-
-- stored/server keys. They will be re-hashed.
1089-
CREATE ROLE regress_passwd_sha_len0 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
1090-
+ERROR: Received HTTP code 400 from control plane: {"error":"Neon only supports being given plaintext passwords"}
1091-
CREATE ROLE regress_passwd_sha_len1 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96RqwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
1092-
+ERROR: Received HTTP code 400 from control plane: {"error":"Neon only supports being given plaintext passwords"}
1093-
CREATE ROLE regress_passwd_sha_len2 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=';
1094-
+ERROR: Received HTTP code 400 from control plane: {"error":"Neon only supports being given plaintext passwords"}
1083+
--- Test with invalid stored and server keys.
1084+
---
1085+
--- The first is valid, to act as a control. The others have too long
1086+
--- stored/server keys. They will be re-hashed.
1087+
-CREATE ROLE regress_passwd_sha_len0 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
1088+
-CREATE ROLE regress_passwd_sha_len1 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96RqwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
1089+
-CREATE ROLE regress_passwd_sha_len2 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=';
1090+
+-- Neon does not support encrypted passwords, use unencrypted instead
1091+
+CREATE ROLE regress_passwd_sha_len0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
1092+
+CREATE ROLE regress_passwd_sha_len1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
1093+
+CREATE ROLE regress_passwd_sha_len2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
10951094
-- Check that the invalid secrets were re-hashed. A re-hashed secret
10961095
-- should not contain the original salt.
10971096
SELECT rolname, rolpassword not like '%A6xHKoH/494E941doaPOYg==%' as is_rolpassword_rehashed
1098-
FROM pg_authid
1099-
WHERE rolname LIKE 'regress_passwd_sha_len%'
1097+
@@ -120,7 +109,7 @@ SELECT rolname, rolpassword not like '%A6xHKoH/494E941doaPOYg==%' as is_rolpassw
11001098
ORDER BY rolname;
1101-
- rolname | is_rolpassword_rehashed
1102-
--------------------------+-------------------------
1099+
rolname | is_rolpassword_rehashed
1100+
-------------------------+-------------------------
11031101
- regress_passwd_sha_len0 | f
1104-
- regress_passwd_sha_len1 | t
1105-
- regress_passwd_sha_len2 | t
1106-
-(3 rows)
1107-
+ rolname | is_rolpassword_rehashed
1108-
+---------+-------------------------
1109-
+(0 rows)
1110-
1111-
DROP ROLE regress_passwd1;
1112-
DROP ROLE regress_passwd2;
1113-
DROP ROLE regress_passwd3;
1114-
DROP ROLE regress_passwd4;
1115-
DROP ROLE regress_passwd5;
1116-
+ERROR: role "regress_passwd5" does not exist
1117-
DROP ROLE regress_passwd6;
1118-
+ERROR: role "regress_passwd6" does not exist
1119-
DROP ROLE regress_passwd7;
1120-
+ERROR: role "regress_passwd7" does not exist
1102+
+ regress_passwd_sha_len0 | t
1103+
regress_passwd_sha_len1 | t
1104+
regress_passwd_sha_len2 | t
1105+
(3 rows)
1106+
@@ -135,6 +124,7 @@ DROP ROLE regress_passwd7;
11211107
DROP ROLE regress_passwd8;
1122-
+ERROR: role "regress_passwd8" does not exist
11231108
DROP ROLE regress_passwd9;
11241109
DROP ROLE regress_passwd_empty;
11251110
+ERROR: role "regress_passwd_empty" does not exist
11261111
DROP ROLE regress_passwd_sha_len0;
1127-
+ERROR: role "regress_passwd_sha_len0" does not exist
11281112
DROP ROLE regress_passwd_sha_len1;
1129-
+ERROR: role "regress_passwd_sha_len1" does not exist
11301113
DROP ROLE regress_passwd_sha_len2;
1131-
+ERROR: role "regress_passwd_sha_len2" does not exist
1132-
-- all entries should have been removed
1133-
SELECT rolname, rolpassword
1134-
FROM pg_authid
11351114
diff --git a/src/test/regress/expected/privileges.out b/src/test/regress/expected/privileges.out
11361115
index 5b9dba7b32..cc408dad42 100644
11371116
--- a/src/test/regress/expected/privileges.out
@@ -3194,7 +3173,7 @@ index 1a6c61f49d..1c31ac6a53 100644
31943173
-- Test generic object addressing/identification functions
31953174
CREATE SCHEMA addr_nsp;
31963175
diff --git a/src/test/regress/sql/password.sql b/src/test/regress/sql/password.sql
3197-
index 53e86b0b6c..f07cf1ec54 100644
3176+
index 53e86b0b6c..0303fdfe96 100644
31983177
--- a/src/test/regress/sql/password.sql
31993178
+++ b/src/test/regress/sql/password.sql
32003179
@@ -10,11 +10,11 @@ SET password_encryption = 'scram-sha-256'; -- ok
@@ -3213,23 +3192,59 @@ index 53e86b0b6c..f07cf1ec54 100644
32133192

32143193
-- check list of created entries
32153194
--
3216-
@@ -42,14 +42,14 @@ ALTER ROLE regress_passwd2_new RENAME TO regress_passwd2;
3195+
@@ -42,26 +42,18 @@ ALTER ROLE regress_passwd2_new RENAME TO regress_passwd2;
32173196
SET password_encryption = 'md5';
32183197

32193198
-- encrypt with MD5
32203199
-ALTER ROLE regress_passwd2 PASSWORD 'foo';
3200+
--- already encrypted, use as they are
3201+
-ALTER ROLE regress_passwd1 PASSWORD 'md5cd3578025fe2c3d7ed1b9a9b26238b70';
3202+
-ALTER ROLE regress_passwd3 PASSWORD 'SCRAM-SHA-256$4096:VLK4RMaQLCvNtQ==$6YtlR4t69SguDiwFvbVgVZtuz6gpJQQqUMZ7IQJK5yI=:ps75jrHeYU4lXCcXI4O8oIdJ3eO8o2jirjruw9phBTo=';
32213203
+ALTER ROLE regress_passwd2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
3222-
-- already encrypted, use as they are
3223-
ALTER ROLE regress_passwd1 PASSWORD 'md5cd3578025fe2c3d7ed1b9a9b26238b70';
3224-
ALTER ROLE regress_passwd3 PASSWORD 'SCRAM-SHA-256$4096:VLK4RMaQLCvNtQ==$6YtlR4t69SguDiwFvbVgVZtuz6gpJQQqUMZ7IQJK5yI=:ps75jrHeYU4lXCcXI4O8oIdJ3eO8o2jirjruw9phBTo=';
32253204

32263205
SET password_encryption = 'scram-sha-256';
32273206
-- create SCRAM secret
32283207
-ALTER ROLE regress_passwd4 PASSWORD 'foo';
3208+
--- already encrypted with MD5, use as it is
3209+
-CREATE ROLE regress_passwd5 PASSWORD 'md5e73a4b11df52a6068f8b39f90be36023';
32293210
+ALTER ROLE regress_passwd4 PASSWORD NEON_PASSWORD_PLACEHOLDER;
3230-
-- already encrypted with MD5, use as it is
3231-
CREATE ROLE regress_passwd5 PASSWORD 'md5e73a4b11df52a6068f8b39f90be36023';
3211+
+-- Neon does not support encrypted passwords, use unencrypted instead
3212+
+CREATE ROLE regress_passwd5 PASSWORD NEON_PASSWORD_PLACEHOLDER;
3213+
3214+
--- This looks like a valid SCRAM-SHA-256 secret, but it is not
3215+
--- so it should be hashed with SCRAM-SHA-256.
3216+
-CREATE ROLE regress_passwd6 PASSWORD 'SCRAM-SHA-256$1234';
3217+
--- These may look like valid MD5 secrets, but they are not, so they
3218+
--- should be hashed with SCRAM-SHA-256.
3219+
--- trailing garbage at the end
3220+
-CREATE ROLE regress_passwd7 PASSWORD 'md5012345678901234567890123456789zz';
3221+
--- invalid length
3222+
-CREATE ROLE regress_passwd8 PASSWORD 'md501234567890123456789012345678901zz';
3223+
+-- Neon does not support encrypted passwords, use unencrypted instead
3224+
+CREATE ROLE regress_passwd6 PASSWORD NEON_PASSWORD_PLACEHOLDER;
3225+
+CREATE ROLE regress_passwd7 PASSWORD NEON_PASSWORD_PLACEHOLDER;
3226+
+CREATE ROLE regress_passwd8 PASSWORD NEON_PASSWORD_PLACEHOLDER;
3227+
3228+
-- Changing the SCRAM iteration count
3229+
SET scram_iterations = 1024;
3230+
@@ -78,13 +70,10 @@ ALTER ROLE regress_passwd_empty PASSWORD 'md585939a5ce845f1a1b620742e3c659e0a';
3231+
ALTER ROLE regress_passwd_empty PASSWORD 'SCRAM-SHA-256$4096:hpFyHTUsSWcR7O9P$LgZFIt6Oqdo27ZFKbZ2nV+vtnYM995pDh9ca6WSi120=:qVV5NeluNfUPkwm7Vqat25RjSPLkGeoZBQs6wVv+um4=';
3232+
SELECT rolpassword FROM pg_authid WHERE rolname='regress_passwd_empty';
32323233

3234+
--- Test with invalid stored and server keys.
3235+
---
3236+
--- The first is valid, to act as a control. The others have too long
3237+
--- stored/server keys. They will be re-hashed.
3238+
-CREATE ROLE regress_passwd_sha_len0 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
3239+
-CREATE ROLE regress_passwd_sha_len1 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96RqwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZI=';
3240+
-CREATE ROLE regress_passwd_sha_len2 PASSWORD 'SCRAM-SHA-256$4096:A6xHKoH/494E941doaPOYg==$Ky+A30sewHIH3VHQLRN9vYsuzlgNyGNKCh37dy96Rqw=:COPdlNiIkrsacU5QoxydEuOH6e/KfiipeETb/bPw8ZIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=';
3241+
+-- Neon does not support encrypted passwords, use unencrypted instead
3242+
+CREATE ROLE regress_passwd_sha_len0 PASSWORD NEON_PASSWORD_PLACEHOLDER;
3243+
+CREATE ROLE regress_passwd_sha_len1 PASSWORD NEON_PASSWORD_PLACEHOLDER;
3244+
+CREATE ROLE regress_passwd_sha_len2 PASSWORD NEON_PASSWORD_PLACEHOLDER;
3245+
3246+
-- Check that the invalid secrets were re-hashed. A re-hashed secret
3247+
-- should not contain the original salt.
32333248
diff --git a/src/test/regress/sql/privileges.sql b/src/test/regress/sql/privileges.sql
32343249
index 249df17a58..b258e7f26a 100644
32353250
--- a/src/test/regress/sql/privileges.sql

0 commit comments

Comments
 (0)