From c703b1e689010961c6bb7ede1e88c2ae296858b6 Mon Sep 17 00:00:00 2001
From: Stephen Frost <sfrost@snowman.net>
Date: Thu, 14 May 2015 11:44:16 -0400
Subject: [PATCH] Further fixes for the buildfarm for pg_audit

The database built by the buildfarm is specific to the extension, use
\connect - instead.
---
 contrib/pg_audit/expected/pg_audit.out | 26 +++++++++++++-------------
 contrib/pg_audit/sql/pg_audit.sql      | 26 +++++++++++++-------------
 2 files changed, 26 insertions(+), 26 deletions(-)

diff --git a/contrib/pg_audit/expected/pg_audit.out b/contrib/pg_audit/expected/pg_audit.out
index af4609b9bae..c237baa599f 100644
--- a/contrib/pg_audit/expected/pg_audit.out
+++ b/contrib/pg_audit/expected/pg_audit.out
@@ -17,7 +17,7 @@ create extension pg_audit;
 CREATE USER super SUPERUSER;
 ALTER ROLE super SET pg_audit.log = 'Role';
 ALTER ROLE super SET pg_audit.log_level = 'notice';
-\connect contrib_regression super;
+\connect - super;
 --
 -- Create auditor role
 CREATE ROLE auditor;
@@ -32,7 +32,7 @@ ALTER ROLE user1 SET pg_audit.log_level = 'notice';
 NOTICE:  AUDIT: SESSION,4,1,ROLE,ALTER ROLE,,,ALTER ROLE user1 SET pg_audit.log_level = 'notice';,<not logged>
 --
 -- Create, select, drop (select will not be audited)
-\connect contrib_regression user1
+\connect - user1
 CREATE TABLE public.test (id INT);
 NOTICE:  AUDIT: SESSION,1,1,DDL,CREATE TABLE,TABLE,public.test,CREATE TABLE public.test (id INT);,<not logged>
 SELECT * FROM test;
@@ -44,7 +44,7 @@ DROP TABLE test;
 NOTICE:  AUDIT: SESSION,2,1,DDL,DROP TABLE,TABLE,public.test,DROP TABLE test;,<not logged>
 --
 -- Create second test user
-\connect contrib_regression super
+\connect - super
 CREATE USER user2;
 NOTICE:  AUDIT: SESSION,1,1,ROLE,CREATE ROLE,,,CREATE USER user2;,<not logged>
 ALTER ROLE user2 SET pg_audit.log = 'Read, writE';
@@ -57,7 +57,7 @@ ALTER ROLE user2 SET pg_audit.role = auditor;
 NOTICE:  AUDIT: SESSION,5,1,ROLE,ALTER ROLE,,,ALTER ROLE user2 SET pg_audit.role = auditor;,<not logged>
 ALTER ROLE user2 SET pg_audit.log_statement_once = ON;
 NOTICE:  AUDIT: SESSION,6,1,ROLE,ALTER ROLE,,,ALTER ROLE user2 SET pg_audit.log_statement_once = ON;,<not logged>
-\connect contrib_regression user2
+\connect - user2
 CREATE TABLE test2 (id INT);
 GRANT SELECT ON TABLE public.test2 TO auditor;
 --
@@ -203,10 +203,10 @@ UPDATE test3
 WARNING:  AUDIT: OBJECT,6,1,WRITE,INSERT,TABLE,public.test2,<previously logged>,<previously logged>
 --
 -- Change permissions of user 2 so that only object logging will be done
-\connect contrib_regression super
+\connect - super
 alter role user2 set pg_audit.log = 'NONE';
 NOTICE:  AUDIT: SESSION,1,1,ROLE,ALTER ROLE,,,alter role user2 set pg_audit.log = 'NONE';,<not logged>
-\connect contrib_regression user2
+\connect - user2
 --
 -- Create test4 and add permissions
 CREATE TABLE test4
@@ -278,10 +278,10 @@ DROP TABLE test3;
 DROP TABLE test4;
 --
 -- Change permissions of user 1 so that session logging will be done
-\connect contrib_regression super
+\connect - super
 alter role user1 set pg_audit.log = 'DDL, READ';
 NOTICE:  AUDIT: SESSION,1,1,ROLE,ALTER ROLE,,,"alter role user1 set pg_audit.log = 'DDL, READ';",<not logged>
-\connect contrib_regression user1
+\connect - user1
 --
 -- Create table is session logged
 CREATE TABLE public.account
@@ -314,12 +314,12 @@ INSERT INTO account (id, name, password, description)
 			 VALUES (1, 'user1', 'HASH1', 'blah, blah');
 --
 -- Change permissions of user 1 so that only object logging will be done
-\connect contrib_regression super
+\connect - super
 alter role user1 set pg_audit.log = 'none';
 NOTICE:  AUDIT: SESSION,1,1,ROLE,ALTER ROLE,,,alter role user1 set pg_audit.log = 'none';,<not logged>
 alter role user1 set pg_audit.role = 'auditor';
 NOTICE:  AUDIT: SESSION,2,1,ROLE,ALTER ROLE,,,alter role user1 set pg_audit.role = 'auditor';,<not logged>
-\connect contrib_regression user1
+\connect - user1
 --
 -- ROLE class not set, so auditor grants not logged
 GRANT SELECT (password),
@@ -361,12 +361,12 @@ NOTICE:  AUDIT: OBJECT,2,1,WRITE,UPDATE,TABLE,public.account,"UPDATE account
    SET password = 'HASH2';",<not logged>
 --
 -- Change permissions of user 1 so that session relation logging will be done
-\connect contrib_regression super
+\connect - super
 alter role user1 set pg_audit.log_relation = on;
 NOTICE:  AUDIT: SESSION,1,1,ROLE,ALTER ROLE,,,alter role user1 set pg_audit.log_relation = on;,<not logged>
 alter role user1 set pg_audit.log = 'read, WRITE';
 NOTICE:  AUDIT: SESSION,2,1,ROLE,ALTER ROLE,,,"alter role user1 set pg_audit.log = 'read, WRITE';",<not logged>
-\connect contrib_regression user1
+\connect - user1
 --
 -- Not logged
 create table ACCOUNT_ROLE_MAP
@@ -460,7 +460,7 @@ NOTICE:  AUDIT: SESSION,5,1,WRITE,UPDATE,TABLE,public.account,"UPDATE account
    SET password = 'HASH2';",<not logged>
 --
 -- Change back to superuser to do exhaustive tests
-\connect contrib_regression super
+\connect - super
 SET pg_audit.log = 'ALL';
 NOTICE:  AUDIT: SESSION,1,1,MISC,SET,,,SET pg_audit.log = 'ALL';,<not logged>
 SET pg_audit.log_level = 'notice';
diff --git a/contrib/pg_audit/sql/pg_audit.sql b/contrib/pg_audit/sql/pg_audit.sql
index 2a63674c571..f6591cca938 100644
--- a/contrib/pg_audit/sql/pg_audit.sql
+++ b/contrib/pg_audit/sql/pg_audit.sql
@@ -19,7 +19,7 @@ create extension pg_audit;
 CREATE USER super SUPERUSER;
 ALTER ROLE super SET pg_audit.log = 'Role';
 ALTER ROLE super SET pg_audit.log_level = 'notice';
-\connect contrib_regression super;
+\connect - super;
 
 --
 -- Create auditor role
@@ -33,14 +33,14 @@ ALTER ROLE user1 SET pg_audit.log_level = 'notice';
 
 --
 -- Create, select, drop (select will not be audited)
-\connect contrib_regression user1
+\connect - user1
 CREATE TABLE public.test (id INT);
 SELECT * FROM test;
 DROP TABLE test;
 
 --
 -- Create second test user
-\connect contrib_regression super
+\connect - super
 
 CREATE USER user2;
 ALTER ROLE user2 SET pg_audit.log = 'Read, writE';
@@ -49,7 +49,7 @@ ALTER ROLE user2 SET pg_audit.log_level = 'warning';
 ALTER ROLE user2 SET pg_audit.role = auditor;
 ALTER ROLE user2 SET pg_audit.log_statement_once = ON;
 
-\connect contrib_regression user2
+\connect - user2
 CREATE TABLE test2 (id INT);
 GRANT SELECT ON TABLE public.test2 TO auditor;
 
@@ -148,10 +148,10 @@ UPDATE test3
 
 --
 -- Change permissions of user 2 so that only object logging will be done
-\connect contrib_regression super
+\connect - super
 alter role user2 set pg_audit.log = 'NONE';
 
-\connect contrib_regression user2
+\connect - user2
 
 --
 -- Create test4 and add permissions
@@ -221,9 +221,9 @@ DROP TABLE test4;
 
 --
 -- Change permissions of user 1 so that session logging will be done
-\connect contrib_regression super
+\connect - super
 alter role user1 set pg_audit.log = 'DDL, READ';
-\connect contrib_regression user1
+\connect - user1
 
 --
 -- Create table is session logged
@@ -247,10 +247,10 @@ INSERT INTO account (id, name, password, description)
 
 --
 -- Change permissions of user 1 so that only object logging will be done
-\connect contrib_regression super
+\connect - super
 alter role user1 set pg_audit.log = 'none';
 alter role user1 set pg_audit.role = 'auditor';
-\connect contrib_regression user1
+\connect - user1
 
 --
 -- ROLE class not set, so auditor grants not logged
@@ -284,10 +284,10 @@ UPDATE account
 
 --
 -- Change permissions of user 1 so that session relation logging will be done
-\connect contrib_regression super
+\connect - super
 alter role user1 set pg_audit.log_relation = on;
 alter role user1 set pg_audit.log = 'read, WRITE';
-\connect contrib_regression user1
+\connect - user1
 
 --
 -- Not logged
@@ -344,7 +344,7 @@ UPDATE account
 
 --
 -- Change back to superuser to do exhaustive tests
-\connect contrib_regression super
+\connect - super
 SET pg_audit.log = 'ALL';
 SET pg_audit.log_level = 'notice';
 SET pg_audit.log_relation = ON;
-- 
GitLab