@@ -11163,13 +11163,11 @@ fn parse_explain_with_option_list() {
1116311163
1116411164#[ test]
1116511165fn test_create_policy ( ) {
11166- let sql = concat ! (
11167- "CREATE POLICY my_policy ON my_table " ,
11168- "AS PERMISSIVE FOR SELECT " ,
11169- "TO my_role, CURRENT_USER " ,
11170- "USING (c0 = 1) " ,
11171- "WITH CHECK (true)"
11172- ) ;
11166+ let sql: & str = "CREATE POLICY my_policy ON my_table \
11167+ AS PERMISSIVE FOR SELECT \
11168+ TO my_role, CURRENT_USER \
11169+ USING (c0 = 1) \
11170+ WITH CHECK (1 = 1)";
1117311171
1117411172 match all_dialects ( ) . verified_stmt ( sql) {
1117511173 Statement :: CreatePolicy {
@@ -11197,7 +11195,14 @@ fn test_create_policy() {
1119711195 right: Box :: new( Expr :: Value ( Value :: Number ( "1" . parse( ) . unwrap( ) , false ) ) ) ,
1119811196 } )
1119911197 ) ;
11200- assert_eq ! ( with_check, Some ( Expr :: Value ( Value :: Boolean ( true ) ) ) ) ;
11198+ assert_eq ! (
11199+ with_check,
11200+ Some ( Expr :: BinaryOp {
11201+ left: Box :: new( Expr :: Value ( Value :: Number ( "1" . parse( ) . unwrap( ) , false ) ) ) ,
11202+ op: BinaryOperator :: Eq ,
11203+ right: Box :: new( Expr :: Value ( Value :: Number ( "1" . parse( ) . unwrap( ) , false ) ) ) ,
11204+ } )
11205+ ) ;
1120111206 }
1120211207 _ => unreachable ! ( ) ,
1120311208 }
@@ -11208,7 +11213,7 @@ fn test_create_policy() {
1120811213 "AS PERMISSIVE FOR SELECT " ,
1120911214 "TO my_role, CURRENT_USER " ,
1121011215 "USING (c0 IN (SELECT column FROM t0)) " ,
11211- "WITH CHECK (true )"
11216+ "WITH CHECK (1 = 1 )"
1121211217 ) ) ;
1121311218 // omit AS / FOR / TO / USING / WITH CHECK clauses is allowed
1121411219 all_dialects ( ) . verified_stmt ( "CREATE POLICY my_policy ON my_table" ) ;
0 commit comments