php-src/ext/pgsql/tests
2015-06-09 09:12:59 +02:00
..
01createdb.phpt
02connection.phpt
03sync_query.phpt
04async_query.phpt
05large_object.phpt
06copy.phpt
07optional.phpt
08escape.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
09notice.phpt Apply pgsql notice test fixes to PHP-5.5 2013-08-22 14:02:55 +02:00
10pg_convert_9.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
10pg_convert.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
11pg_meta_data.phpt
12pg_insert_9.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
12pg_insert.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
13pg_select_9.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
13pg_select.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
14pg_update_9.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
14pg_update.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
15pg_delete.phpt
16pg_result_status.phpt
17result.phpt
18pg_escape_bytea_before.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
18pg_escape_bytea_esc.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
18pg_escape_bytea_hex.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
19pg_ping.phpt
20pg_get_pid.phpt
21pg_get_notify.phpt
22pg_fetch_object.phpt Remove executable permission on phpt 2012-10-10 10:27:49 +08:00
23sync_query_params.phpt
24sync_query_prepared.phpt
25async_query_params.phpt
26async_query_prepared.phpt
27large_object_oid.phpt
28large_object_import_oid.phpt
80_bug14383.phpt
80_bug24499.phpt Remove executable permission on phpt 2012-10-10 10:27:49 +08:00
80_bug27597.phpt Remove executable permission on phpt 2012-10-10 10:27:49 +08:00
80_bug32223.phpt Apply pgsql notice test fixes to PHP-5.5 2013-08-22 14:02:55 +02:00
80_bug32223b.phpt Apply pgsql notice test fixes to PHP-5.5 2013-08-22 14:02:55 +02:00
80_bug36625.phpt Clean up leftover file after the test 2013-06-19 11:48:03 +02:00
80_bug39971.phpt
80_bug42783.phpt
98old_api.phpt
9999dropdb.phpt
bug37100_9.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
bug37100.phpt Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00
bug46408.phpt Skip locale dependent test if locale not available 2013-03-23 21:09:21 +01:00
bug47199.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
bug60244.phpt Fixed bug #60244 (pg_fetch_* functions do not validate that row param is >0). 2011-11-15 18:02:58 +00:00
bug64609.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
bug65119.phpt Fixed Bug #65199 pg_copy_from() modifies input array variable 2015-02-03 15:26:02 +09:00
bug68638.phpt Test case Bug #68638 pg_update() fails to store infinite values 2015-02-05 13:19:52 -02:00
config.inc Added PGSQL_TEST_CONNSTR env var support for ext/pgsql tests 2014-10-31 18:54:16 +01:00
lcmess.inc Fixed a few false positives on gcov for ext/pgsql 2011-08-30 14:01:03 +00:00
pg_delete_001.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
pg_insert_001.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
pg_insert_002.phpt fix test description 2015-06-09 09:12:59 +02:00
pg_meta_data_001.phpt
pg_select_001.phpt
pg_update_001.phpt Fixed bug #62978. pg_select()/etc may allow SQL injection when table name is user parameter, users are able to control table names. 2013-08-05 18:23:15 +09:00
php.gif
README
skipif.inc Fixed bug #65047 (Test skip on client / server version) 2013-06-19 11:48:03 +02:00

Test scripts assumes: 
 - PostgreSQL server is installed locally
 - there is a PostgreSQL account for the users running the test scripts
 - there is database named "test"

For instance, if your login name is 'testuser', you should have PostgreSQL 
user account named 'testuser' and grant that user access to the database 
'test'.

If you have account and database, type "createdb test" from command prompt 
to create the database to execute the test scripts. By executing the above 
command as the same user running the tests you ensure that the user is 
granted access to the database.

If you find problems in PostgreSQL module, please mail to
intenals@lists.php.net, helly@php.net or yohgaki@php.net.