Linux ip-172-26-2-223 5.4.0-1018-aws #18-Ubuntu SMP Wed Jun 24 01:15:00 UTC 2020 x86_64
Apache
: 172.26.2.223 | : 18.221.248.199
Cant Read [ /etc/named.conf ]
8.1.13
www
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
www /
server /
mysql /
mysql-test /
suite /
funcs_1 /
r /
[ HOME SHELL ]
Name
Size
Permission
Action
charset_collation.result
1.31
KB
-rw-r--r--
innodb_bitdata.result
117
B
-rw-r--r--
innodb_cursors.result
116
B
-rw-r--r--
innodb_func_view.result
309.26
KB
-rw-r--r--
innodb_storedproc_02.result
36.35
KB
-rw-r--r--
innodb_storedproc_03.result
15.48
KB
-rw-r--r--
innodb_storedproc_06.result
14.62
KB
-rw-r--r--
innodb_storedproc_07.result
8.36
KB
-rw-r--r--
innodb_storedproc_08.result
25.53
KB
-rw-r--r--
innodb_storedproc_10.result
13.39
KB
-rw-r--r--
innodb_trig_0102.result
15.08
KB
-rw-r--r--
innodb_trig_03.result
24.65
KB
-rw-r--r--
innodb_trig_03e.result
48.78
KB
-rw-r--r--
innodb_trig_0407.result
10.07
KB
-rw-r--r--
innodb_trig_08.result
18.46
KB
-rw-r--r--
innodb_trig_09.result
9.98
KB
-rw-r--r--
innodb_trig_1011ext.result
12.04
KB
-rw-r--r--
innodb_trig_frkey.result
2.23
KB
-rw-r--r--
innodb_views.result
588.04
KB
-rw-r--r--
is_basics_mixed.result
30.21
KB
-rw-r--r--
is_character_sets.result
3.96
KB
-rw-r--r--
is_cml_innodb.result
4.97
KB
-rw-r--r--
is_cml_memory.result
3.94
KB
-rw-r--r--
is_cml_myisam.result
4.97
KB
-rw-r--r--
is_coll_char_set_appl.result
4.34
KB
-rw-r--r--
is_collations.result
4.43
KB
-rw-r--r--
is_column_privileges.result
19.15
KB
-rw-r--r--
is_column_privileges_is_mysql_...
1.44
KB
-rw-r--r--
is_columns.result
20.71
KB
-rw-r--r--
is_columns_innodb.result
78.28
KB
-rw-r--r--
is_columns_is.result
77.55
KB
-rw-r--r--
is_columns_is_embedded.result
75.57
KB
-rw-r--r--
is_columns_memory.result
75.05
KB
-rw-r--r--
is_columns_myisam.result
83.51
KB
-rw-r--r--
is_columns_myisam_embedded.res...
72.89
KB
-rw-r--r--
is_columns_mysql.result
67.25
KB
-rw-r--r--
is_columns_mysql_embedded.resu...
58.59
KB
-rw-r--r--
is_engines.result
3.88
KB
-rw-r--r--
is_engines_archive.result
161
B
-rw-r--r--
is_engines_blackhole.result
205
B
-rw-r--r--
is_engines_csv.result
149
B
-rw-r--r--
is_engines_federated.result
173
B
-rw-r--r--
is_engines_innodb.result
202
B
-rw-r--r--
is_engines_memory.result
194
B
-rw-r--r--
is_engines_merge.result
182
B
-rw-r--r--
is_engines_myisam.result
158
B
-rw-r--r--
is_events.result
6.38
KB
-rw-r--r--
is_key_column_usage.result
20.01
KB
-rw-r--r--
is_key_column_usage_embedded.r...
16.94
KB
-rw-r--r--
is_routines.result
27.73
KB
-rw-r--r--
is_routines_embedded.result
23.94
KB
-rw-r--r--
is_schema_privileges.result
15.56
KB
-rw-r--r--
is_schema_privileges_is_mysql_...
1.84
KB
-rw-r--r--
is_schemata.result
8.67
KB
-rw-r--r--
is_schemata_embedded.result
8.75
KB
-rw-r--r--
is_schemata_is_mysql_test.resu...
1.59
KB
-rw-r--r--
is_statistics.result
20.12
KB
-rw-r--r--
is_statistics_is.result
1.01
KB
-rw-r--r--
is_statistics_mysql.result
6.23
KB
-rw-r--r--
is_statistics_mysql_embedded.r...
11.47
KB
-rw-r--r--
is_table_constraints.result
15.57
KB
-rw-r--r--
is_table_constraints_is.result
828
B
-rw-r--r--
is_table_constraints_mysql.res...
2.3
KB
-rw-r--r--
is_table_constraints_mysql_emb...
3.81
KB
-rw-r--r--
is_table_privileges.result
15.08
KB
-rw-r--r--
is_tables.result
17.27
KB
-rw-r--r--
is_tables_embedded.result
17.48
KB
-rw-r--r--
is_tables_innodb.result
4.07
KB
-rw-r--r--
is_tables_is.result
30.01
KB
-rw-r--r--
is_tables_memory.result
4.17
KB
-rw-r--r--
is_tables_myisam.result
4.23
KB
-rw-r--r--
is_tables_myisam_embedded.resu...
4.63
KB
-rw-r--r--
is_tables_mysql.result
16.11
KB
-rw-r--r--
is_tables_mysql_embedded.resul...
31.05
KB
-rw-r--r--
is_triggers.result
15.87
KB
-rw-r--r--
is_triggers_embedded.result
11.97
KB
-rw-r--r--
is_user_privileges.result
41.08
KB
-rw-r--r--
is_views.result
14.67
KB
-rw-r--r--
is_views_embedded.result
10.98
KB
-rw-r--r--
memory_bitdata.result
286
B
-rw-r--r--
memory_cursors.result
285
B
-rw-r--r--
memory_func_view.result
309.31
KB
-rw-r--r--
memory_storedproc_02.result
36.4
KB
-rw-r--r--
memory_storedproc_03.result
15.53
KB
-rw-r--r--
memory_storedproc_06.result
14.67
KB
-rw-r--r--
memory_storedproc_07.result
8.41
KB
-rw-r--r--
memory_storedproc_08.result
25.58
KB
-rw-r--r--
memory_storedproc_10.result
13.44
KB
-rw-r--r--
memory_trig_0102.result
15.25
KB
-rw-r--r--
memory_trig_03.result
24.47
KB
-rw-r--r--
memory_trig_03e.result
47.41
KB
-rw-r--r--
memory_trig_0407.result
10.23
KB
-rw-r--r--
memory_trig_08.result
18.51
KB
-rw-r--r--
memory_trig_09.result
10.14
KB
-rw-r--r--
memory_trig_1011ext.result
12.11
KB
-rw-r--r--
memory_views.result
588.33
KB
-rw-r--r--
myisam_bitdata.result
286
B
-rw-r--r--
myisam_cursors.result
285
B
-rw-r--r--
myisam_func_view.result
309.31
KB
-rw-r--r--
myisam_storedproc_02.result
36.4
KB
-rw-r--r--
myisam_storedproc_03.result
15.53
KB
-rw-r--r--
myisam_storedproc_06.result
14.67
KB
-rw-r--r--
myisam_storedproc_07.result
8.41
KB
-rw-r--r--
myisam_storedproc_08.result
25.58
KB
-rw-r--r--
myisam_storedproc_10.result
13.44
KB
-rw-r--r--
myisam_trig_0102.result
15.25
KB
-rw-r--r--
myisam_trig_03.result
24.47
KB
-rw-r--r--
myisam_trig_03e.result
47.41
KB
-rw-r--r--
myisam_trig_0407.result
10.23
KB
-rw-r--r--
myisam_trig_08.result
18.51
KB
-rw-r--r--
myisam_trig_09.result
10.14
KB
-rw-r--r--
myisam_trig_1011ext.result
12.11
KB
-rw-r--r--
myisam_views-big.result
603.32
KB
-rw-r--r--
processlist_priv_no_prot.resul...
28.91
KB
-rw-r--r--
processlist_priv_ps.result
28.94
KB
-rw-r--r--
processlist_val_no_prot.result
91.97
KB
-rw-r--r--
processlist_val_ps.result
91.98
KB
-rw-r--r--
row_count_func.result
1.4
KB
-rw-r--r--
storedproc.result
893.84
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : is_schema_privileges.result
SHOW TABLES FROM information_schema LIKE 'SCHEMA_PRIVILEGES'; Tables_in_information_schema (SCHEMA_PRIVILEGES) SCHEMA_PRIVILEGES ####################################################################### # Testcase 3.2.1.1: INFORMATION_SCHEMA tables can be queried via SELECT ####################################################################### DROP VIEW IF EXISTS test.v1; DROP PROCEDURE IF EXISTS test.p1; DROP FUNCTION IF EXISTS test.f1; CREATE VIEW test.v1 AS SELECT * FROM information_schema.SCHEMA_PRIVILEGES; CREATE PROCEDURE test.p1() SELECT * FROM information_schema.SCHEMA_PRIVILEGES; CREATE FUNCTION test.f1() returns BIGINT BEGIN DECLARE counter BIGINT DEFAULT NULL; SELECT COUNT(*) INTO counter FROM information_schema.SCHEMA_PRIVILEGES; RETURN counter; END// # Attention: The printing of the next result sets is disabled. SELECT * FROM information_schema.SCHEMA_PRIVILEGES; SELECT * FROM test.v1; CALL test.p1; SELECT test.f1(); DROP VIEW test.v1; DROP PROCEDURE test.p1; DROP FUNCTION test.f1; ######################################################################### # Testcase 3.2.15.1: INFORMATION_SCHEMA.SCHEMA_PRIVILEGES layout ######################################################################### DESCRIBE information_schema.SCHEMA_PRIVILEGES; Field Type Null Key Default Extra GRANTEE varchar(81) NO TABLE_CATALOG varchar(512) NO TABLE_SCHEMA varchar(64) NO PRIVILEGE_TYPE varchar(64) NO IS_GRANTABLE varchar(3) NO SHOW CREATE TABLE information_schema.SCHEMA_PRIVILEGES; Table Create Table SCHEMA_PRIVILEGES CREATE TEMPORARY TABLE `SCHEMA_PRIVILEGES` ( `GRANTEE` varchar(81) NOT NULL DEFAULT '', `TABLE_CATALOG` varchar(512) NOT NULL DEFAULT '', `TABLE_SCHEMA` varchar(64) NOT NULL DEFAULT '', `PRIVILEGE_TYPE` varchar(64) NOT NULL DEFAULT '', `IS_GRANTABLE` varchar(3) NOT NULL DEFAULT '' ) ENGINE=MEMORY DEFAULT CHARSET=utf8 SHOW COLUMNS FROM information_schema.SCHEMA_PRIVILEGES; Field Type Null Key Default Extra GRANTEE varchar(81) NO TABLE_CATALOG varchar(512) NO TABLE_SCHEMA varchar(64) NO PRIVILEGE_TYPE varchar(64) NO IS_GRANTABLE varchar(3) NO SELECT GRANTEE, TABLE_CATALOG, TABLE_SCHEMA, PRIVILEGE_TYPE FROM information_schema.schema_privileges WHERE table_catalog IS NOT NULL; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE 'mysql.sys'@'localhost' def sys TRIGGER 'mysql.session'@'localhost' def performance_schema SELECT ''@'%' def test SELECT ''@'%' def test INSERT ''@'%' def test UPDATE ''@'%' def test DELETE ''@'%' def test CREATE ''@'%' def test DROP ''@'%' def test REFERENCES ''@'%' def test INDEX ''@'%' def test ALTER ''@'%' def test CREATE TEMPORARY TABLES ''@'%' def test LOCK TABLES ''@'%' def test CREATE VIEW ''@'%' def test SHOW VIEW ''@'%' def test CREATE ROUTINE ''@'%' def test EVENT ''@'%' def test TRIGGER ''@'%' def test\_% SELECT ''@'%' def test\_% INSERT ''@'%' def test\_% UPDATE ''@'%' def test\_% DELETE ''@'%' def test\_% CREATE ''@'%' def test\_% DROP ''@'%' def test\_% REFERENCES ''@'%' def test\_% INDEX ''@'%' def test\_% ALTER ''@'%' def test\_% CREATE TEMPORARY TABLES ''@'%' def test\_% LOCK TABLES ''@'%' def test\_% CREATE VIEW ''@'%' def test\_% SHOW VIEW ''@'%' def test\_% CREATE ROUTINE ''@'%' def test\_% EVENT ''@'%' def test\_% TRIGGER ############################################################################### # Testcase 3.2.15.2-3.2.15.4 INFORMATION_SCHEMA.SCHEMA_PRIVILEGES accessibility ############################################################################### DROP DATABASE IF EXISTS db_datadict_1; DROP DATABASE IF EXISTS db_datadict_2; DROP DATABASE IF EXISTS db_datadict_3; CREATE DATABASE db_datadict_1; CREATE DATABASE db_datadict_2; CREATE DATABASE db_datadict_3; CREATE TABLE db_datadict_2.t1(f1 INT, f2 INT, f3 INT) ENGINE = <engine_type>; DROP USER 'testuser1'@'localhost'; CREATE USER 'testuser1'@'localhost'; DROP USER 'testuser2'@'localhost'; CREATE USER 'testuser2'@'localhost'; GRANT INSERT ON db_datadict_1.* TO 'testuser1'@'localhost'; GRANT INSERT ON db_datadict_2.t1 TO 'testuser1'@'localhost'; GRANT SELECT ON db_datadict_4.* TO 'testuser1'@'localhost' WITH GRANT OPTION; GRANT SELECT ON db_datadict_3.* TO 'testuser2'@'localhost'; GRANT SELECT ON db_datadict_1.* TO 'testuser2'@'localhost'; # Establish connection testuser1 (user=testuser1) GRANT SELECT ON db_datadict_4.* TO 'testuser2'@'localhost'; # Root granted INSERT db_datadict_1 to me -> visible # Root granted SELECT db_datadict_1 to testuser2 -> invisible # Root granted INSERT db_datadict_2.t1 (no schema-level priv!) # but not db_datadict_2 to me -> invisible # Root granted SELECT db_datadict_3. to testuser2 but not to me -> invisible # Root granted SELECT db_datadict_4. to me -> visible # I granted SELECT db_datadict_4. to testuser2 -> invisible (reality), visible(requirement) # FIXME SELECT * FROM information_schema.schema_privileges WHERE table_schema LIKE 'db_datadict%' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict_1 INSERT NO 'testuser1'@'localhost' def db_datadict_4 SELECT YES SHOW GRANTS FOR 'testuser1'@'localhost'; Grants for testuser1@localhost GRANT USAGE ON *.* TO 'testuser1'@'localhost' GRANT INSERT ON `db_datadict_1`.* TO 'testuser1'@'localhost' GRANT SELECT ON `db_datadict_4`.* TO 'testuser1'@'localhost' WITH GRANT OPTION GRANT INSERT ON `db_datadict_2`.`t1` TO 'testuser1'@'localhost' SHOW GRANTS FOR 'testuser2'@'localhost'; ERROR 42000: Access denied for user 'testuser1'@'localhost' to database 'mysql' # Establish connection testuser2 (user=testuser2) # Root granted SELECT db_datadict_1 to me -> visible # Root granted INSERT db_datadict_1 to testuser1 -> invisible # Root granted INSERT db_datadict_2.t1 but not db_datadict_1 to testuser1 -> invisible # Root granted SELECT db_datadict_3. to me -> visible # testuser1 granted SELECT db_datadict_4. to me -> visible SELECT * FROM information_schema.schema_privileges WHERE table_schema LIKE 'db_datadict%' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser2'@'localhost' def db_datadict_1 SELECT NO 'testuser2'@'localhost' def db_datadict_3 SELECT NO 'testuser2'@'localhost' def db_datadict_4 SELECT NO SHOW GRANTS FOR 'testuser1'@'localhost'; ERROR 42000: Access denied for user 'testuser2'@'localhost' to database 'mysql' SHOW GRANTS FOR 'testuser2'@'localhost'; Grants for testuser2@localhost GRANT USAGE ON *.* TO 'testuser2'@'localhost' GRANT SELECT ON `db_datadict_3`.* TO 'testuser2'@'localhost' GRANT SELECT ON `db_datadict_1`.* TO 'testuser2'@'localhost' GRANT SELECT ON `db_datadict_4`.* TO 'testuser2'@'localhost' # Switch to connection default and close connections testuser1 and testuser2 SELECT * FROM information_schema.schema_privileges WHERE table_schema LIKE 'db_datadict%' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict_1 INSERT NO 'testuser1'@'localhost' def db_datadict_4 SELECT YES 'testuser2'@'localhost' def db_datadict_1 SELECT NO 'testuser2'@'localhost' def db_datadict_3 SELECT NO 'testuser2'@'localhost' def db_datadict_4 SELECT NO SHOW GRANTS FOR 'testuser1'@'localhost'; Grants for testuser1@localhost GRANT USAGE ON *.* TO 'testuser1'@'localhost' GRANT INSERT ON `db_datadict_1`.* TO 'testuser1'@'localhost' GRANT SELECT ON `db_datadict_4`.* TO 'testuser1'@'localhost' WITH GRANT OPTION GRANT INSERT ON `db_datadict_2`.`t1` TO 'testuser1'@'localhost' SHOW GRANTS FOR 'testuser2'@'localhost'; Grants for testuser2@localhost GRANT USAGE ON *.* TO 'testuser2'@'localhost' GRANT SELECT ON `db_datadict_3`.* TO 'testuser2'@'localhost' GRANT SELECT ON `db_datadict_1`.* TO 'testuser2'@'localhost' GRANT SELECT ON `db_datadict_4`.* TO 'testuser2'@'localhost' DROP USER 'testuser1'@'localhost'; DROP USER 'testuser2'@'localhost'; DROP DATABASE db_datadict_1; DROP DATABASE db_datadict_2; DROP DATABASE db_datadict_3; ################################################################################ # 3.2.1.13+3.2.1.14+3.2.1.15: INFORMATION_SCHEMA.SCHEMA_PRIVILEGES modifications ################################################################################ DROP DATABASE IF EXISTS db_datadict; CREATE DATABASE db_datadict; DROP USER 'the_user'@'localhost'; DROP USER 'testuser1'@'localhost'; CREATE USER 'testuser1'@'localhost'; GRANT SELECT ON test.* TO 'testuser1'@'localhost'; SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE # Establish connection testuser1 (user=testuser1) SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE # Switch to connection default GRANT UPDATE ON db_datadict.* TO 'testuser1'@'localhost'; SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict UPDATE NO # Switch to connection testuser1 SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict UPDATE NO # Switch to connection default GRANT SELECT ON db_datadict.* TO 'testuser1'@'localhost'; SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict SELECT NO 'testuser1'@'localhost' def db_datadict UPDATE NO # Switch to connection testuser1 SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict SELECT NO 'testuser1'@'localhost' def db_datadict UPDATE NO # Switch to connection default GRANT SELECT ON db_datadict.* TO 'testuser1'@'localhost' WITH GRANT OPTION; SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict SELECT YES 'testuser1'@'localhost' def db_datadict UPDATE YES # Switch to connection testuser1 SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict SELECT YES 'testuser1'@'localhost' def db_datadict UPDATE YES # Switch to connection default DROP SCHEMA db_datadict; SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict SELECT YES 'testuser1'@'localhost' def db_datadict UPDATE YES # Switch to connection testuser1 SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict SELECT YES 'testuser1'@'localhost' def db_datadict UPDATE YES # Switch to connection default REVOKE UPDATE ON db_datadict.* FROM 'testuser1'@'localhost'; SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict SELECT YES # Switch to connection testuser1 SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'testuser1'@'localhost' def db_datadict SELECT YES # Switch to connection default RENAME USER 'testuser1'@'localhost' TO 'the_user'@'localhost'; SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'the_user'@'localhost' def db_datadict SELECT YES # Switch to connection testuser1 SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'the_user'@'localhost' def db_datadict SELECT YES # Close connection testuser1 # Establish connection the_user (user=the_user) SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'the_user'@'localhost' def db_datadict SELECT YES # Close connection the_user # Switch to connection default SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE 'the_user'@'localhost' def db_datadict SELECT YES DROP USER 'the_user'@'localhost'; SELECT * FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict' ORDER BY grantee,table_schema,privilege_type; GRANTEE TABLE_CATALOG TABLE_SCHEMA PRIVILEGE_TYPE IS_GRANTABLE ######################################################################## # Testcases 3.2.1.3-3.2.1.5 + 3.2.1.8-3.2.1.12: INSERT/UPDATE/DELETE and # DDL on INFORMATION_SCHEMA table are not supported ######################################################################## DROP DATABASE IF EXISTS db_datadict; CREATE DATABASE db_datadict; CREATE TABLE db_datadict.t1 (f1 BIGINT, f2 BIGINT) ENGINE = <engine_type>; DROP USER 'testuser1'@'localhost'; CREATE USER 'testuser1'@'localhost'; GRANT SELECT ON db_datadict.* TO 'testuser1'@'localhost'; INSERT INTO information_schema.schema_privileges SELECT * FROM information_schema.schema_privileges; ERROR 42000: Access denied for user 'root'@'localhost' to database 'information_schema' UPDATE information_schema.schema_privileges SET table_schema = 'test' WHERE table_name = 't1'; ERROR 42000: Access denied for user 'root'@'localhost' to database 'information_schema' DELETE FROM information_schema.schema_privileges WHERE table_schema = 'db_datadict'; ERROR 42000: Access denied for user 'root'@'localhost' to database 'information_schema' TRUNCATE information_schema.schema_privileges; ERROR 42000: Access denied for user 'root'@'localhost' to database 'information_schema' CREATE INDEX my_idx_on_tables ON information_schema.schema_privileges(table_schema); ERROR 42000: Access denied for user 'root'@'localhost' to database 'information_schema' ALTER TABLE information_schema.schema_privileges ADD f1 INT; ERROR 42000: Access denied for user 'root'@'localhost' to database 'information_schema' DROP TABLE information_schema.schema_privileges; ERROR 42000: Access denied for user 'root'@'localhost' to database 'information_schema' ALTER TABLE information_schema.schema_privileges RENAME db_datadict.schema_privileges; ERROR 42000: Access denied for user 'root'@'localhost' to database 'information_schema' ALTER TABLE information_schema.schema_privileges RENAME information_schema.xschema_privileges; ERROR 42000: Access denied for user 'root'@'localhost' to database 'information_schema' DROP DATABASE db_datadict; DROP USER 'testuser1'@'localhost';
Close