php-src/ext/pgsql/tests
2013-08-10 23:12:04 -07:00
..
01createdb.phpt
02connection.phpt
03sync_query.phpt
04async_query.phpt
05large_object.phpt
06copy.phpt
07optional.phpt
08escape.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
09notice.phpt ensure notices are not ignored when tests need them 2013-08-10 23:12:04 -07:00
10pg_convert_9.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
10pg_convert.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
11pg_meta_data.phpt
12pg_insert_9.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
12pg_insert.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
13pg_select_9.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
13pg_select.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
14pg_update_9.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
14pg_update.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
15pg_delete.phpt
16pg_result_status.phpt
17result.phpt
18pg_escape_bytea_before.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
18pg_escape_bytea_esc.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
18pg_escape_bytea_hex.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
19pg_ping.phpt
20pg_get_pid.phpt
21pg_get_notify.phpt
22pg_fetch_object.phpt Remove executable permission on phpt 2012-10-10 10:27:49 +08:00
23sync_query_params.phpt
24sync_query_prepared.phpt
25async_query_params.phpt
26async_query_prepared.phpt
27large_object_oid.phpt splitted test cases for lo_create and lo_import, added version aware 2008-07-23 09:06:59 +00:00
28large_object_import_oid.phpt splitted test cases for lo_create and lo_import, added version aware 2008-07-23 09:06:59 +00:00
80_bug14383.phpt MFB: ext/pgsql/tests/80_bug14383.phpt 2009-04-06 14:23:07 +00:00
80_bug24499.phpt Remove executable permission on phpt 2012-10-10 10:27:49 +08:00
80_bug27597.phpt Remove executable permission on phpt 2012-10-10 10:27:49 +08:00
80_bug32223.phpt ensure notices are not ignored when tests need them 2013-08-10 23:12:04 -07:00
80_bug32223b.phpt ensure notices are not ignored when tests need them 2013-08-10 23:12:04 -07:00
80_bug36625.phpt Clean up leftover file after the test 2013-06-19 11:48:03 +02:00
80_bug39971.phpt
80_bug42783.phpt
98old_api.phpt
9999dropdb.phpt
bug37100_9.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
bug37100.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
bug47199.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
bug60244.phpt Fixed bug #60244 (pg_fetch_* functions do not validate that row param is >0). 2011-11-15 18:02:58 +00:00
bug64609.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
config.inc Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
lcmess.inc Fixed a few false positives on gcov for ext/pgsql 2011-08-30 14:01:03 +00:00
pg_delete_001.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
pg_insert_001.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
pg_meta_data_001.phpt MFH: 2008-10-16 00:39:31 +00:00
pg_select_001.phpt - MFH: Fix test 2009-01-30 14:50:05 +00:00
pg_update_001.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
php.gif
README
skipif.inc Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00

Test scripts assumes: 
 - PostgreSQL server is installed locally
 - there is a PostgreSQL account for the users running the test scripts
 - there is database named "test"

For instance, if your login name is 'testuser', you should have PostgreSQL 
user account named 'testuser' and grant that user access to the database 
'test'.

If you have account and database, type "createdb test" from command prompt 
to create the database to execute the test scripts. By executing the above 
command as the same user running the tests you ensure that the user is 
granted access to the database.

If you find problems in PostgreSQL module, please mail to
intenals@lists.php.net, helly@php.net or yohgaki@php.net.