BEGIN; CREATE EXTENSION anon CASCADE; SET anon.privacy_by_default = True; CREATE TABLE public.access_logs ( date_open TIMESTAMP, session_id TEXT, ip_addr INET, url TEXT, browser TEXT DEFAULT 'unkown', operating_system TEXT, locale TEXT ); INSERT INTO public.access_logs VALUES ('2020-10-08', '1234','10.0.0.78', '/home.html', 'Mozilla/5.0','Windows','en_US'), ('2015-07-22', '999', '192.168.42.2', '/index.html', 'Chrome/97','Linux','fr_FR') ; SAVEPOINT initial_state; -- 1 SELECT count(*)=7 AS test1 FROM anon.pg_masking_rules; -- 2 SELECT anon.anonymize_table('public.access_logs'); SELECT bool_and(date_open IS NULL) AS test2 FROM public.access_logs; -- 3 SELECT bool_and(browser ='unkown') AS test3 FROM public.access_logs; -- 4: not_null_violation ROLLBACK TO initial_state; ALTER TABLE public.access_logs ALTER COLUMN date_open SET NOT NULL; SELECT 'test4 must fail'; SELECT anon.anonymize_table('public.access_logs') as test4; ROLLBACK TO initial_state; -- 5: foreign_key_violation CREATE TABLE public.os (name TEXT UNIQUE NOT NULL); INSERT INTO public.os VALUES ('Windows'),('Linux'); ALTER TABLE public.access_logs ADD CONSTRAINT osfk FOREIGN KEY (operating_system) REFERENCES os (name) MATCH FULL; SELECT anon.anonymize_table('public.access_logs') as test5; ROLLBACK TO initial_state; -- 6: unique_violation ALTER TABLE public.access_logs ADD CONSTRAINT session_id_unique UNIQUE (session_id); SELECT anon.anonymize_table('public.access_logs') as test6; ROLLBACK TO initial_state; -- 7: check_violation ALTER TABLE public.access_logs ADD CONSTRAINT date_check CHECK (date_open >= '2000-01-01'); SELECT anon.anonymize_table('public.access_logs') as test7; ROLLBACK TO initial_state; -- 10: security CREATE ROLE ursula; SET ROLE ursula; SELECT 'test10 must fail'; SET anon.privacy_by_default = off; ROLLBACK TO initial_state; -- Clean up DROP TABLE public.access_logs; DROP EXTENSION anon; ROLLBACK;