Merge 10.3 into 10.4
This commit is contained in:
commit
fdf43b5c78
@ -48,11 +48,15 @@ commands="$commands
|
||||
path=`dirname $0`
|
||||
. \"$path/autorun.sh\""
|
||||
|
||||
if [ -z "$just_clean" ]
|
||||
if [ -z "$just_clean"]
|
||||
then
|
||||
commands="$commands
|
||||
git submodule update
|
||||
CC=\"$CC\" CFLAGS=\"$cflags\" CXX=\"$CXX\" CXXFLAGS=\"$cxxflags\" CXXLDFLAGS=\"$CXXLDFLAGS\" $configure"
|
||||
if test -d .git
|
||||
then
|
||||
commands="$commands
|
||||
git submodule update"
|
||||
fi
|
||||
commands="$commands
|
||||
CC=\"$CC\" CFLAGS=\"$cflags\" CXX=\"$CXX\" CXXFLAGS=\"$cxxflags\" CXXLDFLAGS=\"$CXXLDFLAGS\" $configure"
|
||||
fi
|
||||
|
||||
if [ -z "$just_configure" -a -z "$just_clean" ]
|
||||
|
@ -200,6 +200,18 @@ struct system_status_var;
|
||||
typedef int (*mysql_show_var_func)(MYSQL_THD, struct st_mysql_show_var*, void *, struct system_status_var *status_var, enum enum_var_type);
|
||||
|
||||
|
||||
static inline
|
||||
struct st_mysql_show_var SHOW_FUNC_ENTRY(const char *name,
|
||||
mysql_show_var_func func_arg)
|
||||
{
|
||||
struct st_mysql_show_var tmp;
|
||||
tmp.name= name;
|
||||
tmp.value= (void*) func_arg;
|
||||
tmp.type= SHOW_FUNC;
|
||||
return tmp;
|
||||
};
|
||||
|
||||
|
||||
/*
|
||||
Constants for plugin flags.
|
||||
*/
|
||||
|
@ -445,6 +445,16 @@ struct st_mysql_show_var {
|
||||
};
|
||||
struct system_status_var;
|
||||
typedef int (*mysql_show_var_func)(void*, struct st_mysql_show_var*, void *, struct system_status_var *status_var, enum enum_var_type);
|
||||
static inline
|
||||
struct st_mysql_show_var SHOW_FUNC_ENTRY(const char *name,
|
||||
mysql_show_var_func func_arg)
|
||||
{
|
||||
struct st_mysql_show_var tmp;
|
||||
tmp.name= name;
|
||||
tmp.value= (void*) func_arg;
|
||||
tmp.type= SHOW_FUNC;
|
||||
return tmp;
|
||||
};
|
||||
struct st_mysql_sys_var;
|
||||
struct st_mysql_value;
|
||||
typedef int (*mysql_var_check_func)(void* thd,
|
||||
|
@ -445,6 +445,16 @@ struct st_mysql_show_var {
|
||||
};
|
||||
struct system_status_var;
|
||||
typedef int (*mysql_show_var_func)(void*, struct st_mysql_show_var*, void *, struct system_status_var *status_var, enum enum_var_type);
|
||||
static inline
|
||||
struct st_mysql_show_var SHOW_FUNC_ENTRY(const char *name,
|
||||
mysql_show_var_func func_arg)
|
||||
{
|
||||
struct st_mysql_show_var tmp;
|
||||
tmp.name= name;
|
||||
tmp.value= (void*) func_arg;
|
||||
tmp.type= SHOW_FUNC;
|
||||
return tmp;
|
||||
};
|
||||
struct st_mysql_sys_var;
|
||||
struct st_mysql_value;
|
||||
typedef int (*mysql_var_check_func)(void* thd,
|
||||
|
@ -445,6 +445,16 @@ struct st_mysql_show_var {
|
||||
};
|
||||
struct system_status_var;
|
||||
typedef int (*mysql_show_var_func)(void*, struct st_mysql_show_var*, void *, struct system_status_var *status_var, enum enum_var_type);
|
||||
static inline
|
||||
struct st_mysql_show_var SHOW_FUNC_ENTRY(const char *name,
|
||||
mysql_show_var_func func_arg)
|
||||
{
|
||||
struct st_mysql_show_var tmp;
|
||||
tmp.name= name;
|
||||
tmp.value= (void*) func_arg;
|
||||
tmp.type= SHOW_FUNC;
|
||||
return tmp;
|
||||
};
|
||||
struct st_mysql_sys_var;
|
||||
struct st_mysql_value;
|
||||
typedef int (*mysql_var_check_func)(void* thd,
|
||||
|
@ -445,6 +445,16 @@ struct st_mysql_show_var {
|
||||
};
|
||||
struct system_status_var;
|
||||
typedef int (*mysql_show_var_func)(void*, struct st_mysql_show_var*, void *, struct system_status_var *status_var, enum enum_var_type);
|
||||
static inline
|
||||
struct st_mysql_show_var SHOW_FUNC_ENTRY(const char *name,
|
||||
mysql_show_var_func func_arg)
|
||||
{
|
||||
struct st_mysql_show_var tmp;
|
||||
tmp.name= name;
|
||||
tmp.value= (void*) func_arg;
|
||||
tmp.type= SHOW_FUNC;
|
||||
return tmp;
|
||||
};
|
||||
struct st_mysql_sys_var;
|
||||
struct st_mysql_value;
|
||||
typedef int (*mysql_var_check_func)(void* thd,
|
||||
|
@ -445,6 +445,16 @@ struct st_mysql_show_var {
|
||||
};
|
||||
struct system_status_var;
|
||||
typedef int (*mysql_show_var_func)(void*, struct st_mysql_show_var*, void *, struct system_status_var *status_var, enum enum_var_type);
|
||||
static inline
|
||||
struct st_mysql_show_var SHOW_FUNC_ENTRY(const char *name,
|
||||
mysql_show_var_func func_arg)
|
||||
{
|
||||
struct st_mysql_show_var tmp;
|
||||
tmp.name= name;
|
||||
tmp.value= (void*) func_arg;
|
||||
tmp.type= SHOW_FUNC;
|
||||
return tmp;
|
||||
};
|
||||
struct st_mysql_sys_var;
|
||||
struct st_mysql_value;
|
||||
typedef int (*mysql_var_check_func)(void* thd,
|
||||
|
@ -516,7 +516,6 @@ int init_embedded_server(int argc, char **argv, char **groups)
|
||||
*/
|
||||
int *argcp;
|
||||
char ***argvp;
|
||||
int fake_argc = 1;
|
||||
char *fake_argv[] = { (char *)"", 0 };
|
||||
const char *fake_groups[] = { "server", "embedded", 0 };
|
||||
my_bool acl_error;
|
||||
@ -529,16 +528,14 @@ int init_embedded_server(int argc, char **argv, char **groups)
|
||||
if (init_early_variables())
|
||||
return 1;
|
||||
|
||||
if (argc)
|
||||
if (!argc)
|
||||
{
|
||||
argcp= &argc;
|
||||
argvp= (char***) &argv;
|
||||
}
|
||||
else
|
||||
{
|
||||
argcp= &fake_argc;
|
||||
argvp= (char ***) &fake_argv;
|
||||
argc= 1;
|
||||
argv= fake_argv;
|
||||
}
|
||||
argcp= &argc;
|
||||
argvp= &argv;
|
||||
|
||||
if (!groups)
|
||||
groups= (char**) fake_groups;
|
||||
|
||||
|
@ -2,14 +2,7 @@ To be able to see the level of coverage with the current test suite,
|
||||
do the following:
|
||||
|
||||
- Make sure gcov is installed
|
||||
- Compile the MySQL distribution with BUILD/compile-pentium64-gcov (if your
|
||||
machine does not have a pentium CPU, hack this script, or just live with
|
||||
the pentium-specific stuff)
|
||||
- In the mysql-test directory, run this command: ./mysql-test-run -gcov
|
||||
- To see the level of coverage for a given source file:
|
||||
grep -1 source_file_name ../mysql-test-gcov.msg
|
||||
- To see which lines are not yet covered, look at source_file_name.gcov in
|
||||
the source tree. You can find this by doing something like:
|
||||
find source-directory -name "mysqld.cc.gcov"
|
||||
Then think hard about a test case that will cover those lines, and write
|
||||
one!
|
||||
- Compile the MariaDB distribution with -DENABLE_GCOV=1
|
||||
- In the mysql-test directory, run this command: `./mysql-test-run --gcov`
|
||||
- see var/last_changes.dgcov for the coverage of uncommitted code
|
||||
- see `./dgcov -h` for more options
|
||||
|
@ -36,6 +36,7 @@ my $opt_skip_gcov;
|
||||
my %cov;
|
||||
my $file_no=0;
|
||||
|
||||
Getopt::Long::Configure ("bundling");
|
||||
GetOptions
|
||||
("v|verbose+" => \$opt_verbose,
|
||||
"h|help" => \$opt_help,
|
||||
@ -62,13 +63,16 @@ my $res;
|
||||
my $cmd;
|
||||
if ($opt_purge)
|
||||
{
|
||||
$cmd= "find . -name '*.da' -o -name '*.gcda' -o -name '*.gcov' -o ".
|
||||
"-name '*.dgcov' | grep -v 'README\.gcov' | xargs rm -f ''";
|
||||
$cmd= "find . -name '*.da' -o -name '*.gcda*' -o -name '*.gcov' -o ".
|
||||
"-name '*.dgcov' | xargs rm -f ''";
|
||||
logv "Running: $cmd";
|
||||
system($cmd)==0 or die "system($cmd): $? $!";
|
||||
exit 0;
|
||||
}
|
||||
|
||||
my $gcc_version= `gcc -dumpversion`;
|
||||
$gcc_version=~ s/^(\d+).*$/$1/ or die "Cannot parse gcc -dumpversion: $gcc_version";
|
||||
|
||||
find(\&gcov_one_file, $root);
|
||||
find(\&write_coverage, $root) if $opt_generate;
|
||||
exit 0 if $opt_only_gcov;
|
||||
@ -162,26 +166,42 @@ sub gcov_one_file {
|
||||
}
|
||||
|
||||
# now, read the generated file
|
||||
for my $gcov_file (<$_*.gcov>) {
|
||||
open FH, '<', "$gcov_file" or die "open(<$gcov_file): $!";
|
||||
my $fname;
|
||||
while (<FH>) {
|
||||
chomp;
|
||||
if (/^function:/) {
|
||||
next;
|
||||
if ($gcc_version <9){
|
||||
for my $gcov_file (<$_*.gcov>) {
|
||||
open FH, '<', "$gcov_file" or die "open(<$gcov_file): $!";
|
||||
my $fname;
|
||||
while (<FH>) {
|
||||
chomp;
|
||||
if (/^function:/) {
|
||||
next;
|
||||
}
|
||||
if (/^file:/) {
|
||||
$fname=realpath(-f $' ? $' : $root.$');
|
||||
next;
|
||||
}
|
||||
next if /^lcount:\d+,-\d+/; # whatever that means
|
||||
unless (/^lcount:(\d+),(\d+)/ and $fname) {
|
||||
warn "unknown line '$_' in $gcov_file";
|
||||
next;
|
||||
}
|
||||
$cov{$fname}->{$1}+=$2;
|
||||
}
|
||||
close(FH);
|
||||
}
|
||||
} else {
|
||||
require IO::Uncompress::Gunzip;
|
||||
require JSON::PP;
|
||||
no warnings 'once';
|
||||
my $gcov_file_json;
|
||||
s/\.gcda$// if $gcc_version >= 11;
|
||||
IO::Uncompress::Gunzip::gunzip("$_.gcov.json.gz", \$gcov_file_json)
|
||||
or die "gunzip($_.gcov.json.gz): $IO::Uncompress::Gunzip::GunzipError";
|
||||
my $obj= JSON::PP::decode_json $gcov_file_json;
|
||||
for my $file (@{$obj->{files}}) {
|
||||
for my $line (@{$file->{lines}}){
|
||||
$cov{$file->{file}}->{$line->{line_number}}+= $line->{count};
|
||||
}
|
||||
if (/^file:/) {
|
||||
$fname=realpath(-f $' ? $' : $root.$');
|
||||
next;
|
||||
}
|
||||
next if /^lcount:\d+,-\d+/; # whatever that means
|
||||
unless (/^lcount:(\d+),(\d+)/ and $fname) {
|
||||
warn "unknown line '$_' in $gcov_file";
|
||||
next;
|
||||
}
|
||||
$cov{$fname}->{$1}+=$2;
|
||||
}
|
||||
close(FH);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -2,3 +2,9 @@ if (`SELECT COUNT(*)=0 FROM INFORMATION_SCHEMA.PLUGINS WHERE PLUGIN_NAME = 'file
|
||||
{
|
||||
--skip Test requires file_key_management plugin
|
||||
}
|
||||
|
||||
#
|
||||
# This file is only included when using encryption. As all encryption test are
|
||||
# very slow with valgrind, lets disable these if not run with --big
|
||||
#
|
||||
--source include/no_valgrind_without_big.inc
|
||||
|
@ -1,5 +1,3 @@
|
||||
--source include/no_valgrind_without_big.inc
|
||||
|
||||
# ==== Purpose ====
|
||||
#
|
||||
# Configure two servers to be replication master and slave.
|
||||
|
@ -144,7 +144,7 @@ sub do_args($$$$$) {
|
||||
my $v = $debuggers{$k};
|
||||
|
||||
# on windows mtr args are quoted (for system), otherwise not (for exec)
|
||||
sub quote($) { $_[0] =~ /[; ]/ ? "\"$_[0]\"" : $_[0] }
|
||||
sub quote($) { $_[0] =~ /[; >]/ ? "\"$_[0]\"" : $_[0] }
|
||||
sub unquote($) { $_[0] =~ s/^"(.*)"$/$1/; $_[0] }
|
||||
sub quote_from_mtr($) { IS_WINDOWS() ? $_[0] : quote($_[0]) }
|
||||
sub unquote_for_mtr($) { IS_WINDOWS() ? $_[0] : unquote($_[0]) }
|
||||
|
@ -1,3 +1,6 @@
|
||||
# mysqld refuses to run as root normally.
|
||||
--source include/not_as_root.inc
|
||||
|
||||
--source include/not_embedded.inc
|
||||
--source include/have_ssl_communication.inc
|
||||
|
||||
|
@ -17,7 +17,7 @@ GRANT SELECT(c1) on testdb.v1 to 'select_only_c1'@localhost;
|
||||
SHOW GRANTS FOR 'select_only_c1'@'localhost';
|
||||
Grants for select_only_c1@localhost
|
||||
GRANT USAGE ON *.* TO `select_only_c1`@`localhost`
|
||||
GRANT SELECT (c1) ON `testdb`.`v1` TO `select_only_c1`@`localhost`
|
||||
GRANT SELECT (`c1`) ON `testdb`.`v1` TO `select_only_c1`@`localhost`
|
||||
|
||||
"after fix privs"
|
||||
SHOW GRANTS FOR 'show_view_tbl'@'localhost';
|
||||
@ -28,7 +28,7 @@ GRANT CREATE VIEW, SHOW VIEW ON `testdb`.`v1` TO `show_view_tbl`@`localhost`
|
||||
SHOW GRANTS FOR 'select_only_c1'@'localhost';
|
||||
Grants for select_only_c1@localhost
|
||||
GRANT USAGE ON *.* TO `select_only_c1`@`localhost`
|
||||
GRANT SELECT (c1) ON `testdb`.`v1` TO `select_only_c1`@`localhost`
|
||||
GRANT SELECT (`c1`) ON `testdb`.`v1` TO `select_only_c1`@`localhost`
|
||||
|
||||
DROP USER 'show_view_tbl'@'localhost';
|
||||
DROP USER 'select_only_c1'@'localhost';
|
||||
|
@ -9,11 +9,11 @@ CONVERT(DES_ENCRYPT(0, CHAR('1' USING ucs2)),UNSIGNED)
|
||||
0
|
||||
Warnings:
|
||||
Warning 1292 Truncated incorrect INTEGER value: '\xFFT\xDCiK\x92j\xE6\xFC'
|
||||
SELECT CHAR_LENGTH(DES_DECRYPT(0xFF0DC9FC9537CA75F4, CHAR('1' USING ucs2)));
|
||||
CHAR_LENGTH(DES_DECRYPT(0xFF0DC9FC9537CA75F4, CHAR('1' USING ucs2)))
|
||||
SELECT CHAR_LENGTH(DES_DECRYPT(0xFF0DC9FC9537CA75F4, CHAR('1' USING ucs2))) as a;
|
||||
a
|
||||
4
|
||||
SELECT CONVERT(DES_DECRYPT(0xFF0DC9FC9537CA75F4, CHAR('1' using ucs2)), UNSIGNED);
|
||||
CONVERT(DES_DECRYPT(0xFF0DC9FC9537CA75F4, CHAR('1' using ucs2)), UNSIGNED)
|
||||
SELECT CONVERT(DES_DECRYPT(0xFF0DC9FC9537CA75F4, CHAR('1' using ucs2)), UNSIGNED) as a;
|
||||
a
|
||||
0
|
||||
Warnings:
|
||||
Warning 1292 Truncated incorrect INTEGER value: 'test'
|
||||
|
@ -8,8 +8,7 @@
|
||||
SELECT CHAR_LENGTH(DES_ENCRYPT(0, CHAR('1' USING ucs2)));
|
||||
SELECT CONVERT(DES_ENCRYPT(0, CHAR('1' USING ucs2)),UNSIGNED);
|
||||
|
||||
#enable after fix MDEV-28643, MDEV-27871
|
||||
--disable_view_protocol
|
||||
SELECT CHAR_LENGTH(DES_DECRYPT(0xFF0DC9FC9537CA75F4, CHAR('1' USING ucs2)));
|
||||
SELECT CONVERT(DES_DECRYPT(0xFF0DC9FC9537CA75F4, CHAR('1' using ucs2)), UNSIGNED);
|
||||
SELECT CHAR_LENGTH(DES_DECRYPT(0xFF0DC9FC9537CA75F4, CHAR('1' USING ucs2))) as a;
|
||||
SELECT CONVERT(DES_DECRYPT(0xFF0DC9FC9537CA75F4, CHAR('1' using ucs2)), UNSIGNED) as a;
|
||||
--enable_view_protocol
|
||||
|
@ -58,6 +58,9 @@ Warning 4038 Syntax error in JSON text in argument 1 to function 'st_geomfromgeo
|
||||
SELECT st_astext(st_geomfromgeojson('{ "type": "Feature", "geometry": { "type": "Point", "coordinates": [102.0, 0.5] } }'));
|
||||
st_astext(st_geomfromgeojson('{ "type": "Feature", "geometry": { "type": "Point", "coordinates": [102.0, 0.5] } }'))
|
||||
POINT(102 0.5)
|
||||
SELECT st_astext(st_geomfromgeojson('{ "geometry": { "type": "Point", "coordinates": [102.0, 0.5] }, "type": "Feature" }'));
|
||||
st_astext(st_geomfromgeojson('{ "geometry": { "type": "Point", "coordinates": [102.0, 0.5] }, "type": "Feature" }'))
|
||||
POINT(102 0.5)
|
||||
SELECT st_astext(st_geomfromgeojson('{ "type": "FeatureCollection", "features": [{ "type": "Feature", "geometry": { "type": "Point", "coordinates": [102.0, 0.5] }, "properties": { "prop0": "value0" } }]}'));
|
||||
st_astext(st_geomfromgeojson('{ "type": "FeatureCollection", "features": [{ "type": "Feature", "geometry": { "type": "Point", "coordinates": [102.0, 0.5] }, "properties": { "prop0": "value0" } }]}'))
|
||||
GEOMETRYCOLLECTION(POINT(102 0.5))
|
||||
|
@ -26,6 +26,7 @@ SELECT st_astext(st_geomfromgeojson('{"type""point"}'));
|
||||
#enable after fix MDEV-27871
|
||||
--disable_view_protocol
|
||||
SELECT st_astext(st_geomfromgeojson('{ "type": "Feature", "geometry": { "type": "Point", "coordinates": [102.0, 0.5] } }'));
|
||||
SELECT st_astext(st_geomfromgeojson('{ "geometry": { "type": "Point", "coordinates": [102.0, 0.5] }, "type": "Feature" }'));
|
||||
SELECT st_astext(st_geomfromgeojson('{ "type": "FeatureCollection", "features": [{ "type": "Feature", "geometry": { "type": "Point", "coordinates": [102.0, 0.5] }, "properties": { "prop0": "value0" } }]}'));
|
||||
|
||||
|
||||
|
@ -248,7 +248,7 @@ GRANT select (a), update (a),insert(a), references(a) on t1 to mysqltest_1@local
|
||||
show grants for mysqltest_1@localhost;
|
||||
Grants for mysqltest_1@localhost
|
||||
GRANT USAGE ON *.* TO `mysqltest_1`@`localhost`
|
||||
GRANT SELECT, SELECT (a), INSERT, INSERT (a), UPDATE, UPDATE (a), REFERENCES (a) ON `test`.`t1` TO `mysqltest_1`@`localhost`
|
||||
GRANT SELECT, SELECT (`a`), INSERT, INSERT (`a`), UPDATE, UPDATE (`a`), REFERENCES (`a`) ON `test`.`t1` TO `mysqltest_1`@`localhost`
|
||||
select table_priv,column_priv from mysql.tables_priv where user="mysqltest_1";
|
||||
table_priv column_priv
|
||||
Select,Insert,Update Select,Insert,Update,References
|
||||
@ -256,12 +256,12 @@ REVOKE select (a), update on t1 from mysqltest_1@localhost;
|
||||
show grants for mysqltest_1@localhost;
|
||||
Grants for mysqltest_1@localhost
|
||||
GRANT USAGE ON *.* TO `mysqltest_1`@`localhost`
|
||||
GRANT SELECT, INSERT, INSERT (a), REFERENCES (a) ON `test`.`t1` TO `mysqltest_1`@`localhost`
|
||||
GRANT SELECT, INSERT, INSERT (`a`), REFERENCES (`a`) ON `test`.`t1` TO `mysqltest_1`@`localhost`
|
||||
REVOKE select,update,insert,insert (a) on t1 from mysqltest_1@localhost;
|
||||
show grants for mysqltest_1@localhost;
|
||||
Grants for mysqltest_1@localhost
|
||||
GRANT USAGE ON *.* TO `mysqltest_1`@`localhost`
|
||||
GRANT REFERENCES (a) ON `test`.`t1` TO `mysqltest_1`@`localhost`
|
||||
GRANT REFERENCES (`a`) ON `test`.`t1` TO `mysqltest_1`@`localhost`
|
||||
GRANT select,references on t1 to mysqltest_1@localhost;
|
||||
select table_priv,column_priv from mysql.tables_priv where user="mysqltest_1";
|
||||
table_priv column_priv
|
||||
@ -336,13 +336,13 @@ show grants for drop_user@localhost;
|
||||
Grants for drop_user@localhost
|
||||
GRANT ALL PRIVILEGES ON *.* TO `drop_user`@`localhost` WITH GRANT OPTION
|
||||
GRANT ALL PRIVILEGES ON `test`.* TO `drop_user`@`localhost` WITH GRANT OPTION
|
||||
GRANT SELECT (a) ON `test`.`t1` TO `drop_user`@`localhost`
|
||||
GRANT SELECT (`a`) ON `test`.`t1` TO `drop_user`@`localhost`
|
||||
set sql_mode=ansi_quotes;
|
||||
show grants for drop_user@localhost;
|
||||
Grants for drop_user@localhost
|
||||
GRANT ALL PRIVILEGES ON *.* TO "drop_user"@"localhost" WITH GRANT OPTION
|
||||
GRANT ALL PRIVILEGES ON "test".* TO "drop_user"@"localhost" WITH GRANT OPTION
|
||||
GRANT SELECT (a) ON "test"."t1" TO "drop_user"@"localhost"
|
||||
GRANT SELECT ("a") ON "test"."t1" TO "drop_user"@"localhost"
|
||||
set sql_mode=default;
|
||||
set sql_quote_show_create=0;
|
||||
show grants for drop_user@localhost;
|
||||
@ -361,13 +361,13 @@ show grants for drop_user@localhost;
|
||||
Grants for drop_user@localhost
|
||||
GRANT ALL PRIVILEGES ON *.* TO "drop_user"@"localhost" WITH GRANT OPTION
|
||||
GRANT ALL PRIVILEGES ON "test".* TO "drop_user"@"localhost" WITH GRANT OPTION
|
||||
GRANT SELECT (a) ON "test"."t1" TO "drop_user"@"localhost"
|
||||
GRANT SELECT ("a") ON "test"."t1" TO "drop_user"@"localhost"
|
||||
set sql_mode="";
|
||||
show grants for drop_user@localhost;
|
||||
Grants for drop_user@localhost
|
||||
GRANT ALL PRIVILEGES ON *.* TO `drop_user`@`localhost` WITH GRANT OPTION
|
||||
GRANT ALL PRIVILEGES ON `test`.* TO `drop_user`@`localhost` WITH GRANT OPTION
|
||||
GRANT SELECT (a) ON `test`.`t1` TO `drop_user`@`localhost`
|
||||
GRANT SELECT (`a`) ON `test`.`t1` TO `drop_user`@`localhost`
|
||||
revoke all privileges, grant option from drop_user@localhost;
|
||||
show grants for drop_user@localhost;
|
||||
Grants for drop_user@localhost
|
||||
@ -415,7 +415,7 @@ GRANT SELECT (
|
||||
SHOW GRANTS FOR ÀÚÅÒ@localhost;
|
||||
Grants for ÀÚÅÒ@localhost
|
||||
GRANT USAGE ON *.* TO `ÀÚÅÒ`@`localhost`
|
||||
GRANT SELECT (ËÏÌ) ON `ÂÄ`.`ÔÁÂ` TO `ÀÚÅÒ`@`localhost`
|
||||
GRANT SELECT (`ËÏÌ`) ON `ÂÄ`.`ÔÁÂ` TO `ÀÚÅÒ`@`localhost`
|
||||
REVOKE SELECT (ËÏÌ) ON ÂÄ.ÔÁÂ FROM ÀÚÅÒ@localhost;
|
||||
DROP USER ÀÚÅÒ@localhost;
|
||||
DROP DATABASE ÂÄ;
|
||||
@ -492,7 +492,7 @@ grant insert(b), insert(c), insert(d), insert(a) on t1 to grant_user@localhost;
|
||||
show grants for grant_user@localhost;
|
||||
Grants for grant_user@localhost
|
||||
GRANT USAGE ON *.* TO `grant_user`@`localhost`
|
||||
GRANT INSERT (a, d, c, b) ON `test`.`t1` TO `grant_user`@`localhost`
|
||||
GRANT INSERT (`a`, `d`, `c`, `b`) ON `test`.`t1` TO `grant_user`@`localhost`
|
||||
select Host,Db,User,Table_name,Column_name,Column_priv from mysql.columns_priv order by Column_name;
|
||||
Host Db User Table_name Column_name Column_priv
|
||||
localhost test grant_user t1 a Insert
|
||||
@ -904,20 +904,20 @@ grant update (a) on t1 to mysqltest_8;
|
||||
show grants for mysqltest_8@'';
|
||||
Grants for mysqltest_8@%
|
||||
GRANT USAGE ON *.* TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE (a) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE (`a`) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
show grants for mysqltest_8;
|
||||
Grants for mysqltest_8@%
|
||||
GRANT USAGE ON *.* TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE (a) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE (`a`) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
flush privileges;
|
||||
show grants for mysqltest_8@'';
|
||||
Grants for mysqltest_8@%
|
||||
GRANT USAGE ON *.* TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE (a) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE (`a`) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
show grants for mysqltest_8;
|
||||
Grants for mysqltest_8@%
|
||||
GRANT USAGE ON *.* TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE (a) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE (`a`) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
select * from information_schema.column_privileges;
|
||||
GRANTEE TABLE_CATALOG TABLE_SCHEMA TABLE_NAME COLUMN_NAME PRIVILEGE_TYPE IS_GRANTABLE
|
||||
'mysqltest_8'@'%' def test t1 a UPDATE NO
|
||||
@ -1000,12 +1000,12 @@ show grants for mysqltest_8@'';
|
||||
Grants for mysqltest_8@%
|
||||
GRANT USAGE ON *.* TO `mysqltest_8`@`%`
|
||||
GRANT ALL PRIVILEGES ON `mysqltest`.* TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE, UPDATE (a) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE, UPDATE (`a`) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
show grants for mysqltest_8;
|
||||
Grants for mysqltest_8@%
|
||||
GRANT USAGE ON *.* TO `mysqltest_8`@`%`
|
||||
GRANT ALL PRIVILEGES ON `mysqltest`.* TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE, UPDATE (a) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE, UPDATE (`a`) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
select * from information_schema.user_privileges
|
||||
where grantee like "'mysqltest_8'%";
|
||||
GRANTEE TABLE_CATALOG PRIVILEGE_TYPE IS_GRANTABLE
|
||||
@ -1021,12 +1021,12 @@ show grants for mysqltest_8@'';
|
||||
Grants for mysqltest_8@%
|
||||
GRANT USAGE ON *.* TO `mysqltest_8`@`%`
|
||||
GRANT ALL PRIVILEGES ON `mysqltest`.* TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE, UPDATE (a) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE, UPDATE (`a`) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
show grants for mysqltest_8;
|
||||
Grants for mysqltest_8@%
|
||||
GRANT USAGE ON *.* TO `mysqltest_8`@`%`
|
||||
GRANT ALL PRIVILEGES ON `mysqltest`.* TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE, UPDATE (a) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
GRANT UPDATE, UPDATE (`a`) ON `test`.`t1` TO `mysqltest_8`@`%`
|
||||
drop user mysqltest_8@'';
|
||||
show grants for mysqltest_8@'';
|
||||
ERROR 42000: There is no such grant defined for user 'mysqltest_8' on host '%'
|
||||
|
@ -204,7 +204,7 @@ show grants for 'mysqltest_2';
|
||||
Grants for mysqltest_2@%
|
||||
GRANT SELECT ON *.* TO "mysqltest_2"@"%" IDENTIFIED BY PASSWORD '*BD447CBA355AF58578D3AE33BA2E2CD388BA08D1'
|
||||
GRANT INSERT ON "test".* TO "mysqltest_2"@"%"
|
||||
GRANT UPDATE (c2) ON "test"."t2" TO "mysqltest_2"@"%"
|
||||
GRANT UPDATE ("c2") ON "test"."t2" TO "mysqltest_2"@"%"
|
||||
GRANT UPDATE ON "test"."t1" TO "mysqltest_2"@"%"
|
||||
drop user 'mysqltest_1';
|
||||
select host,user,password,plugin,authentication_string from mysql.user where user like 'mysqltest_%';
|
||||
@ -242,7 +242,7 @@ show grants for 'mysqltest_1';
|
||||
Grants for mysqltest_1@%
|
||||
GRANT SELECT ON *.* TO "mysqltest_1"@"%" IDENTIFIED BY PASSWORD '*BD447CBA355AF58578D3AE33BA2E2CD388BA08D1'
|
||||
GRANT INSERT ON "test".* TO "mysqltest_1"@"%"
|
||||
GRANT UPDATE (c2) ON "test"."t2" TO "mysqltest_1"@"%"
|
||||
GRANT UPDATE ("c2") ON "test"."t2" TO "mysqltest_1"@"%"
|
||||
GRANT UPDATE ON "test"."t1" TO "mysqltest_1"@"%"
|
||||
drop user 'mysqltest_1', 'mysqltest_3';
|
||||
drop user 'mysqltest_1';
|
||||
|
@ -172,14 +172,14 @@ GRANT SELECT (a), INSERT (b) ON `temp`.`t1` TO 'user2'@'%';
|
||||
SHOW GRANTS FOR 'user2'@'%';
|
||||
Grants for user2@%
|
||||
GRANT USAGE ON *.* TO `user2`@`%`
|
||||
GRANT SELECT (a), INSERT (b) ON `temp`.`t1` TO `user2`@`%`
|
||||
GRANT SELECT (`a`), INSERT (`b`) ON `temp`.`t1` TO `user2`@`%`
|
||||
# Connect as the renamed user
|
||||
connect conn1, localhost, user2,,;
|
||||
connection conn1;
|
||||
SHOW GRANTS;
|
||||
Grants for user2@%
|
||||
GRANT USAGE ON *.* TO `user2`@`%`
|
||||
GRANT SELECT (a), INSERT (b) ON `temp`.`t1` TO `user2`@`%`
|
||||
GRANT SELECT (`a`), INSERT (`b`) ON `temp`.`t1` TO `user2`@`%`
|
||||
SELECT a FROM temp.t1;
|
||||
a
|
||||
1
|
||||
|
@ -300,6 +300,30 @@ drop database db;
|
||||
drop user foo@localhost;
|
||||
drop user bar@localhost;
|
||||
drop user buz@localhost;
|
||||
CREATE USER foo;
|
||||
CREATE DATABASE db;
|
||||
CREATE TABLE db.test_getcolpriv(col1 INT, col2 INT);
|
||||
GRANT SELECT (col1,col2) ON db.test_getcolpriv TO foo;
|
||||
GRANT INSERT (col1) ON db.test_getcolpriv TO foo;
|
||||
SHOW GRANTS FOR foo;
|
||||
Grants for foo@%
|
||||
GRANT USAGE ON *.* TO `foo`@`%`
|
||||
GRANT SELECT (`col2`, `col1`), INSERT (`col1`) ON `db`.`test_getcolpriv` TO `foo`@`%`
|
||||
REVOKE SELECT (col1,col2) ON db.test_getcolpriv FROM foo;
|
||||
SHOW GRANTS FOR foo;
|
||||
Grants for foo@%
|
||||
GRANT USAGE ON *.* TO `foo`@`%`
|
||||
GRANT INSERT (`col1`) ON `db`.`test_getcolpriv` TO `foo`@`%`
|
||||
REVOKE INSERT (col1) ON db.test_getcolpriv FROM foo;
|
||||
SHOW GRANTS FOR foo;
|
||||
Grants for foo@%
|
||||
GRANT USAGE ON *.* TO `foo`@`%`
|
||||
FLUSH PRIVILEGES;
|
||||
SHOW GRANTS FOR foo;
|
||||
Grants for foo@%
|
||||
GRANT USAGE ON *.* TO `foo`@`%`
|
||||
DROP USER foo;
|
||||
DROP DATABASE db;
|
||||
# End of 10.3 tests
|
||||
create user u1@h identified with 'mysql_native_password' using 'pwd';
|
||||
ERROR HY000: Password hash should be a 41-digit hexadecimal number
|
||||
|
@ -262,6 +262,25 @@ drop user foo@localhost;
|
||||
drop user bar@localhost;
|
||||
drop user buz@localhost;
|
||||
|
||||
CREATE USER foo;
|
||||
CREATE DATABASE db;
|
||||
CREATE TABLE db.test_getcolpriv(col1 INT, col2 INT);
|
||||
|
||||
GRANT SELECT (col1,col2) ON db.test_getcolpriv TO foo;
|
||||
GRANT INSERT (col1) ON db.test_getcolpriv TO foo;
|
||||
|
||||
SHOW GRANTS FOR foo;
|
||||
REVOKE SELECT (col1,col2) ON db.test_getcolpriv FROM foo;
|
||||
SHOW GRANTS FOR foo;
|
||||
REVOKE INSERT (col1) ON db.test_getcolpriv FROM foo;
|
||||
|
||||
SHOW GRANTS FOR foo;
|
||||
FLUSH PRIVILEGES;
|
||||
SHOW GRANTS FOR foo;
|
||||
|
||||
DROP USER foo;
|
||||
DROP DATABASE db;
|
||||
|
||||
--echo # End of 10.3 tests
|
||||
|
||||
#
|
||||
|
@ -1058,7 +1058,7 @@ GRANTEE TABLE_CATALOG PRIVILEGE_TYPE IS_GRANTABLE
|
||||
show grants;
|
||||
Grants for user1@localhost
|
||||
GRANT USAGE ON *.* TO `user1`@`localhost`
|
||||
GRANT SELECT (f1) ON `mysqltest`.`t1` TO `user1`@`localhost`
|
||||
GRANT SELECT (`f1`) ON `mysqltest`.`t1` TO `user1`@`localhost`
|
||||
connection con2;
|
||||
select * from information_schema.column_privileges order by grantee;
|
||||
GRANTEE TABLE_CATALOG TABLE_SCHEMA TABLE_NAME COLUMN_NAME PRIVILEGE_TYPE IS_GRANTABLE
|
||||
|
@ -541,7 +541,7 @@ connection default;
|
||||
--echo #
|
||||
send SELECT SLEEP(1000);
|
||||
connection con1;
|
||||
let $wait_condition= SELECT @id:=QUERY_ID FROM INFORMATION_SCHEMA.PROCESSLIST WHERE INFO='SELECT SLEEP(1000)';
|
||||
let $wait_condition= SELECT @id:=QUERY_ID FROM INFORMATION_SCHEMA.PROCESSLIST WHERE INFO='SELECT SLEEP(1000)' AND STATE='User sleep';
|
||||
source include/wait_condition.inc;
|
||||
KILL QUERY ID @id;
|
||||
connection default;
|
||||
@ -559,7 +559,7 @@ CREATE USER u1@localhost;
|
||||
send SELECT SLEEP(1000);
|
||||
|
||||
connection con1;
|
||||
let $wait_condition= SELECT @id:=QUERY_ID FROM INFORMATION_SCHEMA.PROCESSLIST WHERE INFO='SELECT SLEEP(1000)';
|
||||
let $wait_condition= SELECT @id:=QUERY_ID FROM INFORMATION_SCHEMA.PROCESSLIST WHERE INFO='SELECT SLEEP(1000)' AND STATE='User sleep';
|
||||
source include/wait_condition.inc;
|
||||
let $id= `SELECT @id`;
|
||||
|
||||
|
@ -826,7 +826,66 @@ DROP USER 'user3'@'%';
|
||||
update mysql.db set Delete_history_priv='Y' where db like 'test%';
|
||||
drop table mysql.global_priv;
|
||||
rename table mysql.global_priv_bak to mysql.global_priv;
|
||||
# End of 10.3 tests
|
||||
#
|
||||
# MDEV-16735 Upgrades only work if 'alter_algorithm' is 'DEFAULT'
|
||||
# or 'COPY'. Test that the session value 'DEFAULT' in mysql_upgrade
|
||||
# properly overrides the potentially incompatible global value.
|
||||
#
|
||||
SET GLOBAL alter_algorithm='INPLACE';
|
||||
SHOW GLOBAL VARIABLES LIKE 'alter_algorithm';
|
||||
Variable_name Value
|
||||
alter_algorithm INPLACE
|
||||
Phase 1/7: Checking and upgrading mysql database
|
||||
Processing databases
|
||||
mysql
|
||||
mysql.column_stats OK
|
||||
mysql.columns_priv OK
|
||||
mysql.db OK
|
||||
mysql.event OK
|
||||
mysql.func OK
|
||||
mysql.global_priv OK
|
||||
mysql.gtid_slave_pos OK
|
||||
mysql.help_category OK
|
||||
mysql.help_keyword OK
|
||||
mysql.help_relation OK
|
||||
mysql.help_topic OK
|
||||
mysql.index_stats OK
|
||||
mysql.innodb_index_stats OK
|
||||
mysql.innodb_table_stats OK
|
||||
mysql.plugin OK
|
||||
mysql.proc OK
|
||||
mysql.procs_priv OK
|
||||
mysql.proxies_priv OK
|
||||
mysql.roles_mapping OK
|
||||
mysql.servers OK
|
||||
mysql.table_stats OK
|
||||
mysql.tables_priv OK
|
||||
mysql.time_zone OK
|
||||
mysql.time_zone_leap_second OK
|
||||
mysql.time_zone_name OK
|
||||
mysql.time_zone_transition OK
|
||||
mysql.time_zone_transition_type OK
|
||||
mysql.transaction_registry OK
|
||||
Phase 2/7: Installing used storage engines... Skipped
|
||||
Phase 3/7: Fixing views
|
||||
mysql.user OK
|
||||
Phase 4/7: Running 'mysql_fix_privilege_tables'
|
||||
Phase 5/7: Fixing table and database names
|
||||
Phase 6/7: Checking and upgrading tables
|
||||
Processing databases
|
||||
information_schema
|
||||
mtr
|
||||
mtr.global_suppressions OK
|
||||
mtr.test_suppressions OK
|
||||
performance_schema
|
||||
test
|
||||
Phase 7/7: Running 'FLUSH PRIVILEGES'
|
||||
OK
|
||||
SET GLOBAL alter_algorithm=DEFAULT;
|
||||
SHOW GLOBAL VARIABLES LIKE 'alter_algorithm';
|
||||
Variable_name Value
|
||||
alter_algorithm DEFAULT
|
||||
End of 10.3 tests
|
||||
# switching from mysql.global_priv to mysql.user
|
||||
drop view mysql.user_bak;
|
||||
create user 'user3'@'localhost' identified with mysql_native_password as password('a_password');
|
||||
|
@ -383,7 +383,20 @@ update mysql.db set Delete_history_priv='Y' where db like 'test%';
|
||||
drop table mysql.global_priv;
|
||||
rename table mysql.global_priv_bak to mysql.global_priv;
|
||||
|
||||
--echo # End of 10.3 tests
|
||||
--echo #
|
||||
--echo # MDEV-16735 Upgrades only work if 'alter_algorithm' is 'DEFAULT'
|
||||
--echo # or 'COPY'. Test that the session value 'DEFAULT' in mysql_upgrade
|
||||
--echo # properly overrides the potentially incompatible global value.
|
||||
--echo #
|
||||
|
||||
SET GLOBAL alter_algorithm='INPLACE';
|
||||
SHOW GLOBAL VARIABLES LIKE 'alter_algorithm';
|
||||
--exec $MYSQL_UPGRADE --force 2>&1
|
||||
SET GLOBAL alter_algorithm=DEFAULT;
|
||||
SHOW GLOBAL VARIABLES LIKE 'alter_algorithm';
|
||||
--remove_file $MYSQLD_DATADIR/mysql_upgrade_info
|
||||
|
||||
--echo End of 10.3 tests
|
||||
|
||||
--source include/switch_to_mysql_user.inc
|
||||
drop view mysql.user_bak;
|
||||
|
@ -1,3 +1,4 @@
|
||||
reset master;
|
||||
set sql_log_bin=0;
|
||||
drop table if exists t1,v1,v2,v3,v4,v1badcheck;
|
||||
drop view if exists t1,v1,v2,v3,v4,v1badcheck;
|
||||
|
@ -1,5 +1,5 @@
|
||||
-- source include/have_log_bin.inc
|
||||
|
||||
reset master; # clear binlogs
|
||||
set sql_log_bin=0;
|
||||
--disable_warnings
|
||||
drop table if exists t1,v1,v2,v3,v4,v1badcheck;
|
||||
|
@ -211,6 +211,19 @@ Table Op Msg_type Msg_text
|
||||
test.t check status OK
|
||||
delete from t order by b limit 1;
|
||||
drop table t;
|
||||
#
|
||||
# MDEV-30112 ASAN errors in Item_ident::print / generate_partition_syntax
|
||||
#
|
||||
create table t (a int) partition by hash(a);
|
||||
alter table t change a b int, drop a;
|
||||
ERROR 42S22: Unknown column 'a' in 't'
|
||||
show create table t;
|
||||
Table Create Table
|
||||
t CREATE TABLE `t` (
|
||||
`a` int(11) DEFAULT NULL
|
||||
) ENGINE=MyISAM DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci
|
||||
PARTITION BY HASH (`a`)
|
||||
drop table t;
|
||||
# End of 10.3 tests
|
||||
#
|
||||
# Start of 10.4 tests
|
||||
|
@ -196,6 +196,16 @@ delete from t order by b limit 1;
|
||||
# cleanup
|
||||
drop table t;
|
||||
|
||||
--echo #
|
||||
--echo # MDEV-30112 ASAN errors in Item_ident::print / generate_partition_syntax
|
||||
--echo #
|
||||
create table t (a int) partition by hash(a);
|
||||
--error ER_BAD_FIELD_ERROR
|
||||
alter table t change a b int, drop a;
|
||||
show create table t;
|
||||
# Cleanup
|
||||
drop table t;
|
||||
|
||||
--echo # End of 10.3 tests
|
||||
|
||||
--echo #
|
||||
|
@ -58,3 +58,21 @@ Create View CREATE ALGORITHM=UNDEFINED DEFINER=`root`@`localhost` SQL SECURITY D
|
||||
character_set_client latin1
|
||||
collation_connection latin1_swedish_ci
|
||||
drop view v1;
|
||||
#
|
||||
# MDEV-30082 View definition losing brackets changes semantics of the query and causes wrong result
|
||||
#
|
||||
create table t1 (a varchar(1), b bool) engine=myisam;
|
||||
insert into t1 values ('u',1),('s',1);
|
||||
select * from t1 where t1.b in (t1.a <= all (select 'a'));
|
||||
a b
|
||||
create view v as select * from t1 where t1.b in (t1.a <= all (select 'a'));
|
||||
select * from v;
|
||||
a b
|
||||
show create view v;
|
||||
View Create View character_set_client collation_connection
|
||||
v CREATE ALGORITHM=UNDEFINED DEFINER=`root`@`localhost` SQL SECURITY DEFINER VIEW `v` AS select `t1`.`a` AS `a`,`t1`.`b` AS `b` from `t1` where `t1`.`b` = (`t1`.`a` <= all (select 'a')) latin1 latin1_swedish_ci
|
||||
drop view v;
|
||||
drop table t1;
|
||||
#
|
||||
# End of 10.3 results
|
||||
#
|
||||
|
@ -39,3 +39,19 @@ drop table t1;
|
||||
create view v1 as select 1 like (now() between '2000-01-01' and '2012-12-12' );
|
||||
query_vertical show create view v1;
|
||||
drop view v1;
|
||||
|
||||
--echo #
|
||||
--echo # MDEV-30082 View definition losing brackets changes semantics of the query and causes wrong result
|
||||
--echo #
|
||||
create table t1 (a varchar(1), b bool) engine=myisam;
|
||||
insert into t1 values ('u',1),('s',1);
|
||||
select * from t1 where t1.b in (t1.a <= all (select 'a'));
|
||||
create view v as select * from t1 where t1.b in (t1.a <= all (select 'a'));
|
||||
select * from v;
|
||||
show create view v;
|
||||
drop view v;
|
||||
drop table t1;
|
||||
|
||||
--echo #
|
||||
--echo # End of 10.3 results
|
||||
--echo #
|
||||
|
@ -1,3 +1,4 @@
|
||||
RESET MASTER;
|
||||
#
|
||||
# Bug mdev-463: assertion failure when running ANALYZE with RBR on
|
||||
#
|
||||
|
@ -1,7 +1,7 @@
|
||||
--source include/have_binlog_format_row.inc
|
||||
--source include/have_innodb.inc
|
||||
--source include/have_partition.inc
|
||||
|
||||
RESET MASTER; # clear up binlogs
|
||||
--echo #
|
||||
--echo # Bug mdev-463: assertion failure when running ANALYZE with RBR on
|
||||
--echo #
|
||||
|
@ -961,6 +961,13 @@ id a
|
||||
DELETE FROM t1 WHERE a=CAST(0.671437 AS FLOAT);
|
||||
DROP TABLE t1;
|
||||
#
|
||||
# MDEV-29473 UBSAN: Signed integer overflow: X * Y cannot be represented in type 'int' in strings/dtoa.c
|
||||
#
|
||||
CREATE TABLE t1 (c DOUBLE);
|
||||
INSERT INTO t1 VALUES ('1e4294967297');
|
||||
ERROR 22003: Out of range value for column 'c' at row 1
|
||||
DROP TABLE t1;
|
||||
#
|
||||
# End of 10.3 tests
|
||||
#
|
||||
#
|
||||
|
@ -666,6 +666,16 @@ SELECT * FROM t1;
|
||||
DELETE FROM t1 WHERE a=CAST(0.671437 AS FLOAT);
|
||||
DROP TABLE t1;
|
||||
|
||||
--echo #
|
||||
--echo # MDEV-29473 UBSAN: Signed integer overflow: X * Y cannot be represented in type 'int' in strings/dtoa.c
|
||||
--echo #
|
||||
|
||||
# This test was failing with UBSAN builds
|
||||
|
||||
CREATE TABLE t1 (c DOUBLE);
|
||||
--error ER_WARN_DATA_OUT_OF_RANGE
|
||||
INSERT INTO t1 VALUES ('1e4294967297');
|
||||
DROP TABLE t1;
|
||||
|
||||
--echo #
|
||||
--echo # End of 10.3 tests
|
||||
|
@ -1,4 +1,3 @@
|
||||
drop table if exists t1,t2,t3,t4,t5,t6;
|
||||
CREATE TABLE t1 (a int not null, b char (10) not null);
|
||||
insert into t1 values(1,'a'),(2,'b'),(3,'c'),(3,'c');
|
||||
CREATE TABLE t2 (a int not null, b char (10) not null);
|
||||
@ -1536,6 +1535,9 @@ DROP TABLE t1;
|
||||
ERROR 42000: You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near 'into @var) union (select 1)' at line 1
|
||||
(select 1) union (select 1 into @var);
|
||||
ERROR 42000: You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near 'into @var)' at line 1
|
||||
select @var;
|
||||
@var
|
||||
NULL
|
||||
(select 2) union (select 1 into @var);
|
||||
ERROR 42000: You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near 'into @var)' at line 1
|
||||
(select 1) union (select 1) into @var;
|
||||
@ -2764,5 +2766,20 @@ a b c d
|
||||
3 4 2 197
|
||||
drop table t1,t2;
|
||||
#
|
||||
# MDEV-30066 (limit + offset) union all (...) limit = incorrect result
|
||||
#
|
||||
create table t1(id int primary key auto_increment, c1 int);
|
||||
insert into t1(c1) values(1),(2),(3);
|
||||
(select * from t1 where c1>=1 order by c1 desc limit 2,1) union all (select * from t1 where c1>1 order by c1 desc);
|
||||
id c1
|
||||
1 1
|
||||
2 2
|
||||
3 3
|
||||
(select * from t1 where c1>=1 order by c1 desc limit 2,1) union all (select * from t1 where c1>1 order by c1 desc) limit 2;
|
||||
id c1
|
||||
1 1
|
||||
2 2
|
||||
drop table t1;
|
||||
#
|
||||
# End of 10.3 tests
|
||||
#
|
||||
|
@ -2,10 +2,6 @@
|
||||
# Test of unions
|
||||
#
|
||||
|
||||
--disable_warnings
|
||||
drop table if exists t1,t2,t3,t4,t5,t6;
|
||||
--enable_warnings
|
||||
|
||||
CREATE TABLE t1 (a int not null, b char (10) not null);
|
||||
insert into t1 values(1,'a'),(2,'b'),(3,'c'),(3,'c');
|
||||
CREATE TABLE t2 (a int not null, b char (10) not null);
|
||||
@ -23,7 +19,7 @@ select 't1',b,count(*) from t1 group by b UNION select 't2',b,count(*) from t2 g
|
||||
(select a,b from t1 limit 2) union all (select a,b from t2 order by a) limit 4;
|
||||
(select a,b from t1 limit 2) union all (select a,b from t2 order by a limit 1);
|
||||
(select a,b from t1 limit 2) union all (select a,b from t2 order by a limit 1) order by b desc;
|
||||
--error 1250
|
||||
--error ER_TABLENAME_NOT_ALLOWED_HERE
|
||||
(select a,b from t1 limit 2) union all (select a,b from t2 order by a limit 1) order by t1.b;
|
||||
explain extended (select a,b from t1 limit 2) union all (select a,b from t2 order by a limit 1) order by b desc;
|
||||
--disable_view_protocol
|
||||
@ -42,13 +38,13 @@ select found_rows();
|
||||
|
||||
explain select a,b from t1 union all select a,b from t2;
|
||||
|
||||
--error 1054
|
||||
--error ER_BAD_FIELD_ERROR
|
||||
explain select xx from t1 union select 1;
|
||||
--error 1222
|
||||
--error ER_WRONG_NUMBER_OF_COLUMNS_IN_SELECT
|
||||
explain select a,b from t1 union select 1;
|
||||
--error 1222
|
||||
--error ER_WRONG_NUMBER_OF_COLUMNS_IN_SELECT
|
||||
explain select 1 union select a,b from t1 union select 1;
|
||||
--error 1222
|
||||
--error ER_WRONG_NUMBER_OF_COLUMNS_IN_SELECT
|
||||
explain select a,b from t1 union select 1 limit 0;
|
||||
|
||||
--error ER_PARSE_ERROR
|
||||
@ -60,19 +56,19 @@ select a,b from t1 order by a union select a,b from t2;
|
||||
--error ER_PARSE_ERROR
|
||||
insert into t3 select a from t1 order by a union select a from t2;
|
||||
|
||||
--error 1222
|
||||
--error ER_WRONG_NUMBER_OF_COLUMNS_IN_SELECT
|
||||
create table t3 select a,b from t1 union select a from t2;
|
||||
|
||||
--error 1222
|
||||
--error ER_WRONG_NUMBER_OF_COLUMNS_IN_SELECT
|
||||
select a,b from t1 union select a from t2;
|
||||
|
||||
--error 1222
|
||||
--error ER_WRONG_NUMBER_OF_COLUMNS_IN_SELECT
|
||||
select * from t1 union select a from t2;
|
||||
|
||||
--error 1222
|
||||
--error ER_WRONG_NUMBER_OF_COLUMNS_IN_SELECT
|
||||
select a from t1 union select * from t2;
|
||||
|
||||
--error 1234
|
||||
--error ER_CANT_USE_OPTION_HERE
|
||||
select * from t1 union select SQL_BUFFER_RESULT * from t2;
|
||||
|
||||
# Test CREATE, INSERT and REPLACE
|
||||
@ -86,13 +82,13 @@ drop table t1,t2,t3;
|
||||
#
|
||||
# Test some unions without tables
|
||||
#
|
||||
--error 1096
|
||||
--error ER_NO_TABLES_USED
|
||||
select * union select 1;
|
||||
select 1 as a,(select a union select a);
|
||||
--error 1054
|
||||
--error ER_BAD_FIELD_ERROR
|
||||
(select 1) union (select 2) order by 0;
|
||||
SELECT @a:=1 UNION SELECT @a:=@a+1;
|
||||
--error 1054
|
||||
--error ER_BAD_FIELD_ERROR
|
||||
(SELECT 1) UNION (SELECT 2) ORDER BY (SELECT a);
|
||||
(SELECT 1,3) UNION (SELECT 2,1) ORDER BY (SELECT 2);
|
||||
|
||||
@ -294,7 +290,7 @@ SELECT * FROM t1 UNION SELECT * FROM t2 ORDER BY a desc LIMIT 1;
|
||||
(SELECT * FROM t1 ORDER by a) UNION ALL (SELECT * FROM t2 ORDER BY a) ORDER BY A desc LIMIT 4;
|
||||
|
||||
# Wrong usage
|
||||
--error 1234
|
||||
--error ER_CANT_USE_OPTION_HERE
|
||||
(SELECT * FROM t1) UNION all (SELECT SQL_CALC_FOUND_ROWS * FROM t2) LIMIT 1;
|
||||
|
||||
create temporary table t1 select a from t1 union select a from t2;
|
||||
@ -477,7 +473,7 @@ create table t1 select 1 union select -1;
|
||||
select * from t1;
|
||||
show create table t1;
|
||||
drop table t1;
|
||||
-- error 1267
|
||||
-- error ER_CANT_AGGREGATE_2COLLATIONS
|
||||
create table t1 select _latin1"test" union select _latin2"testt" ;
|
||||
create table t1 select _latin2"test" union select _latin2"testt" ;
|
||||
show create table t1;
|
||||
@ -585,7 +581,7 @@ set sql_select_limit=default;
|
||||
#
|
||||
CREATE TABLE t1 (i int(11) default NULL,c char(1) default NULL,KEY i (i));
|
||||
CREATE TABLE t2 (i int(11) default NULL,c char(1) default NULL,KEY i (i));
|
||||
--error 1054
|
||||
--error ER_BAD_FIELD_ERROR
|
||||
explain (select * from t1) union (select * from t2) order by not_existing_column;
|
||||
drop table t1, t2;
|
||||
|
||||
@ -687,7 +683,7 @@ drop table t1;
|
||||
create table t2 (
|
||||
a char character set latin1 collate latin1_swedish_ci,
|
||||
b char character set latin1 collate latin1_german1_ci);
|
||||
--error 1271
|
||||
--error ER_CANT_AGGREGATE_NCOLLATIONS
|
||||
create table t1 as
|
||||
(select a from t2) union
|
||||
(select b from t2);
|
||||
@ -984,7 +980,7 @@ CREATE TABLE t1 (a int);
|
||||
INSERT INTO t1 VALUES (3),(1),(2),(4),(1);
|
||||
|
||||
SELECT a FROM (SELECT a FROM t1 UNION SELECT a FROM t1 ORDER BY a) AS test;
|
||||
--error 1054
|
||||
--error ER_BAD_FIELD_ERROR
|
||||
SELECT a FROM (SELECT a FROM t1 UNION SELECT a FROM t1 ORDER BY c) AS test;
|
||||
|
||||
DROP TABLE t1;
|
||||
@ -997,6 +993,7 @@ DROP TABLE t1;
|
||||
(select 1 into @var) union (select 1);
|
||||
--error ER_PARSE_ERROR
|
||||
(select 1) union (select 1 into @var);
|
||||
select @var;
|
||||
--error ER_PARSE_ERROR
|
||||
(select 2) union (select 1 into @var);
|
||||
(select 1) union (select 1) into @var;
|
||||
@ -1996,6 +1993,15 @@ union (select 0 as a, 99 as b,
|
||||
|
||||
drop table t1,t2;
|
||||
|
||||
--echo #
|
||||
--echo # MDEV-30066 (limit + offset) union all (...) limit = incorrect result
|
||||
--echo #
|
||||
create table t1(id int primary key auto_increment, c1 int);
|
||||
insert into t1(c1) values(1),(2),(3);
|
||||
(select * from t1 where c1>=1 order by c1 desc limit 2,1) union all (select * from t1 where c1>1 order by c1 desc);
|
||||
(select * from t1 where c1>=1 order by c1 desc limit 2,1) union all (select * from t1 where c1>1 order by c1 desc) limit 2;
|
||||
drop table t1;
|
||||
|
||||
--echo #
|
||||
--echo # End of 10.3 tests
|
||||
--echo #
|
||||
|
@ -149,12 +149,9 @@ select N'', length(N'');
|
||||
select '', length('');
|
||||
--enable_view_protocol
|
||||
|
||||
#enable after fix MDEV-28696
|
||||
--disable_view_protocol
|
||||
select b'', 0+b'';
|
||||
|
||||
select x'', 0+x'';
|
||||
--enable_view_protocol
|
||||
|
||||
--error ER_BAD_FIELD_ERROR
|
||||
select 0x;
|
||||
|
@ -6917,6 +6917,14 @@ deallocate prepare stmt;
|
||||
drop view v1;
|
||||
drop table t1;
|
||||
#
|
||||
# MDEV-28696 View created as "select b''; " references invalid table(s) or column(s) or function(s) or definer/invoker of view lack rights to use them
|
||||
#
|
||||
CREATE VIEW v1 as select b'';
|
||||
SELECT * FROM v1;
|
||||
b''
|
||||
|
||||
DROP VIEW v1;
|
||||
#
|
||||
# End of 10.3 tests
|
||||
#
|
||||
#
|
||||
|
@ -6645,6 +6645,15 @@ deallocate prepare stmt;
|
||||
drop view v1;
|
||||
drop table t1;
|
||||
|
||||
--echo #
|
||||
--echo # MDEV-28696 View created as "select b''; " references invalid table(s) or column(s) or function(s) or definer/invoker of view lack rights to use them
|
||||
--echo #
|
||||
|
||||
CREATE VIEW v1 as select b'';
|
||||
SELECT * FROM v1;
|
||||
DROP VIEW v1;
|
||||
|
||||
|
||||
--echo #
|
||||
--echo # End of 10.3 tests
|
||||
--echo #
|
||||
|
@ -1,4 +1,10 @@
|
||||
# mdev-23741 sharing violation when renaming .frm file in ALTER
|
||||
CREATE TABLE t(i int);
|
||||
SET STATEMENT debug_dbug='+d,rename_sharing_violation' FOR ALTER TABLE t ADD PRIMARY KEY (i);
|
||||
SET @saved_dbug = @@SESSION.debug_dbug;
|
||||
SET debug_dbug='+d,file_sharing_violation';
|
||||
CREATE TABLE t(i int) ENGINE=ARIA;
|
||||
ALTER TABLE t ADD PRIMARY KEY (i);
|
||||
FLUSH TABLES t;
|
||||
SELECT * FROM t;
|
||||
i
|
||||
DROP TABLE t;
|
||||
SET debug_dbug=@saved_dbug;
|
||||
|
@ -4,8 +4,16 @@
|
||||
--source include/windows.inc
|
||||
|
||||
--echo # mdev-23741 sharing violation when renaming .frm file in ALTER
|
||||
CREATE TABLE t(i int);
|
||||
SET STATEMENT debug_dbug='+d,rename_sharing_violation' FOR ALTER TABLE t ADD PRIMARY KEY (i);
|
||||
|
||||
SET @saved_dbug = @@SESSION.debug_dbug;
|
||||
SET debug_dbug='+d,file_sharing_violation';
|
||||
|
||||
CREATE TABLE t(i int) ENGINE=ARIA;
|
||||
ALTER TABLE t ADD PRIMARY KEY (i);
|
||||
FLUSH TABLES t;
|
||||
SELECT * FROM t;
|
||||
DROP TABLE t;
|
||||
|
||||
SET debug_dbug=@saved_dbug;
|
||||
|
||||
#End of 10.3 tests
|
||||
|
@ -4384,6 +4384,7 @@ sub extract_warning_lines ($$) {
|
||||
qr|Linux Native AIO|, # warning that aio does not work on /dev/shm
|
||||
qr|InnoDB: io_setup\(\) attempt|,
|
||||
qr|InnoDB: io_setup\(\) failed with EAGAIN|,
|
||||
qr/InnoDB: Failed to set (O_DIRECT|DIRECTIO_ON) on file/,
|
||||
qr|setrlimit could not change the size of core files to 'infinity';|,
|
||||
qr|feedback plugin: failed to retrieve the MAC address|,
|
||||
qr|Plugin 'FEEDBACK' init function returned error|,
|
||||
|
BIN
mysql-test/std_data/mysql80/ibdata1_16384
Normal file
BIN
mysql-test/std_data/mysql80/ibdata1_16384
Normal file
Binary file not shown.
BIN
mysql-test/std_data/mysql80/ibdata1_32768
Normal file
BIN
mysql-test/std_data/mysql80/ibdata1_32768
Normal file
Binary file not shown.
BIN
mysql-test/std_data/mysql80/ibdata1_4096
Normal file
BIN
mysql-test/std_data/mysql80/ibdata1_4096
Normal file
Binary file not shown.
BIN
mysql-test/std_data/mysql80/ibdata1_65536
Normal file
BIN
mysql-test/std_data/mysql80/ibdata1_65536
Normal file
Binary file not shown.
BIN
mysql-test/std_data/mysql80/ibdata1_8192
Normal file
BIN
mysql-test/std_data/mysql80/ibdata1_8192
Normal file
Binary file not shown.
BIN
mysql-test/std_data/mysql80/t1.ibd
Normal file
BIN
mysql-test/std_data/mysql80/t1.ibd
Normal file
Binary file not shown.
Binary file not shown.
Binary file not shown.
@ -1,3 +1,4 @@
|
||||
reset master;
|
||||
create table t1 (a int, b int) engine=innodb;
|
||||
begin;
|
||||
insert into t1 values (1,2);
|
||||
|
@ -1,3 +1,4 @@
|
||||
reset master;
|
||||
include/show_binlog_events.inc
|
||||
Log_name Pos Event_type Server_id End_log_pos Info
|
||||
master-bin.000001 # Gtid # # GTID #-#-#
|
||||
|
@ -1,3 +1,4 @@
|
||||
RESET MASTER;
|
||||
SET @old_isolation_level= @@session.tx_isolation;
|
||||
SET @@session.tx_isolation= 'READ-COMMITTED';
|
||||
CREATE DATABASE b42829;
|
||||
|
@ -1,3 +1,4 @@
|
||||
reset master;
|
||||
call mtr.add_suppression("Unsafe statement written to the binary log using statement format since BINLOG_FORMAT = STATEMENT");
|
||||
select @@innodb_autoinc_lock_mode;
|
||||
@@innodb_autoinc_lock_mode
|
||||
|
@ -3,6 +3,7 @@
|
||||
let collation=utf8_unicode_ci;
|
||||
--source include/have_collation.inc
|
||||
|
||||
reset master; # clear up binlogs
|
||||
# REQUIREMENT
|
||||
# replace_regex should replace output of SHOW BINLOG EVENTS
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
--source include/not_embedded.inc
|
||||
--source include/have_binlog_format_statement.inc
|
||||
|
||||
reset master; # clear up binlogs
|
||||
--exec $MYSQL_CLIENT_TEST test_datetime_ranges_mdev15289 > $MYSQLTEST_VARDIR/log/binlog_stm_datetime_ranges_mysql_client_test.out.log 2>&1
|
||||
|
||||
--let $binlog_file = LAST
|
||||
|
@ -37,7 +37,7 @@
|
||||
-- source include/have_log_bin.inc
|
||||
-- source include/have_innodb.inc
|
||||
-- source include/have_binlog_format_statement.inc
|
||||
|
||||
RESET MASTER; # clear up binlogs
|
||||
SET @old_isolation_level= @@session.tx_isolation;
|
||||
SET @@session.tx_isolation= 'READ-COMMITTED';
|
||||
|
||||
|
@ -1,6 +1,6 @@
|
||||
--source include/have_innodb.inc
|
||||
--source include/have_binlog_format_mixed.inc
|
||||
|
||||
reset master; #clear up binlogs
|
||||
call mtr.add_suppression("Unsafe statement written to the binary log using statement format since BINLOG_FORMAT = STATEMENT");
|
||||
|
||||
select @@innodb_autoinc_lock_mode;
|
||||
|
@ -50,7 +50,6 @@ restore: t1 .ibd and .cfg files
|
||||
# restart: --plugin-load-add=file_key_management --file-key-management --file-key-management-filename=MYSQL_TEST_DIR/std_data/keys2.txt
|
||||
ALTER TABLE t1 DISCARD TABLESPACE;
|
||||
Warnings:
|
||||
Warning 1814 Tablespace has been discarded for table `t1`
|
||||
Warning 1812 Tablespace is missing for table 'test/t1'
|
||||
restore: t1 .ibd and .cfg files
|
||||
ALTER TABLE t1 IMPORT TABLESPACE;
|
||||
|
@ -391,7 +391,7 @@ connection no_privs_424d;
|
||||
show grants;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1), INSERT (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg4d_1 before INSERT on t1 for each row
|
||||
set new.f1 = 'trig 3.5.3.7-1d';
|
||||
@ -413,7 +413,7 @@ connection yes_privs_424d;
|
||||
show grants;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT UPDATE (f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT UPDATE (`f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg4d_2 before INSERT on t1 for each row
|
||||
set new.f1 = 'trig 3.5.3.7-2d';
|
||||
@ -618,14 +618,14 @@ grant UPDATE (f1), INSERT (f1) on priv_db.t1 to test_noprivs@localhost;
|
||||
show grants for test_noprivs@localhost;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT INSERT (f1), UPDATE (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT INSERT (`f1`), UPDATE (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
revoke ALL PRIVILEGES, GRANT OPTION FROM test_yesprivs@localhost;
|
||||
grant TRIGGER on *.* to test_yesprivs@localhost;
|
||||
grant SELECT (f1) on priv_db.t1 to test_yesprivs@localhost;
|
||||
show grants for test_noprivs@localhost;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT INSERT (f1), UPDATE (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT INSERT (`f1`), UPDATE (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
connect no_privs_425d,localhost,test_noprivs,PWD,test,$MASTER_MYPORT,$MASTER_MYSOCK;
|
||||
connect yes_privs_425d,localhost,test_yesprivs,PWD,test,$MASTER_MYPORT,$MASTER_MYSOCK;
|
||||
connection default;
|
||||
@ -633,7 +633,7 @@ connection no_privs_425d;
|
||||
show grants;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT INSERT (f1), UPDATE (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT INSERT (`f1`), UPDATE (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg5d_1 before INSERT on t1 for each row
|
||||
set @test_var= new.f1;
|
||||
@ -649,7 +649,7 @@ connection yes_privs_425d;
|
||||
show grants;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg5d_2 before INSERT on t1 for each row
|
||||
set @test_var= new.f1;
|
||||
|
@ -1541,8 +1541,8 @@ show grants for test_yesprivs@localhost;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT USAGE ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT TRIGGER ON `priv_db`.* TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (f1), INSERT ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (f1), INSERT, UPDATE (f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT, UPDATE (`f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
connection yes_privs;
|
||||
select current_user;
|
||||
current_user
|
||||
@ -1692,8 +1692,8 @@ to test_yesprivs@localhost;
|
||||
show grants for test_yesprivs@localhost;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT USAGE ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (f1), INSERT, UPDATE (f3, f2), TRIGGER ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (`f1`), INSERT, UPDATE (`f3`, `f2`), TRIGGER ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
connection yes_privs;
|
||||
select current_user;
|
||||
current_user
|
||||
@ -1735,8 +1735,8 @@ to test_yesprivs@localhost;
|
||||
show grants for test_yesprivs@localhost;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT USAGE ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (f1), INSERT, UPDATE (f3, f2, f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (`f1`), INSERT, UPDATE (`f3`, `f2`, `f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
connection no_privs;
|
||||
select current_user;
|
||||
current_user
|
||||
|
@ -134,7 +134,7 @@ GRANT SELECT (a) ON t1 TO foo;
|
||||
SHOW GRANTS FOR foo;
|
||||
Grants for foo@%
|
||||
GRANT USAGE ON *.* TO `foo`@`%`
|
||||
GRANT SELECT (a) ON `db`.`t1` TO `foo`@`%`
|
||||
GRANT SELECT (`a`) ON `db`.`t1` TO `foo`@`%`
|
||||
SELECT * FROM information_schema.check_constraints;
|
||||
CONSTRAINT_CATALOG CONSTRAINT_SCHEMA TABLE_NAME CONSTRAINT_NAME CHECK_CLAUSE
|
||||
def db t1 CONSTRAINT_1 `b` > 0
|
||||
|
@ -219,7 +219,7 @@ SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT ALL PRIVILEGES ON `test`.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f3, f1) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f3`, `f1`) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
connection testuser1;
|
||||
SELECT * FROM information_schema.column_privileges
|
||||
WHERE table_name = 'my_table'
|
||||
@ -231,7 +231,7 @@ SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT ALL PRIVILEGES ON `test`.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f3, f1) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f3`, `f1`) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
connection default;
|
||||
ALTER TABLE db_datadict.my_table DROP COLUMN f3;
|
||||
GRANT UPDATE (f1) ON db_datadict.my_table TO 'testuser1'@'localhost';
|
||||
@ -246,7 +246,7 @@ SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT ALL PRIVILEGES ON `test`.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f3, f1), UPDATE (f1) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f3`, `f1`), UPDATE (`f1`) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
connection testuser1;
|
||||
SELECT * FROM information_schema.column_privileges
|
||||
WHERE table_name = 'my_table'
|
||||
@ -259,7 +259,7 @@ SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT ALL PRIVILEGES ON `test`.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f3, f1), UPDATE (f1) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f3`, `f1`), UPDATE (`f1`) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
SELECT f1, f3 FROM db_datadict.my_table;
|
||||
ERROR 42S22: Unknown column 'f3' in 'field list'
|
||||
connection default;
|
||||
@ -275,7 +275,7 @@ SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT ALL PRIVILEGES ON `test`.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f3, f1), UPDATE (f1) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f3`, `f1`), UPDATE (`f1`) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
connection testuser1;
|
||||
SELECT * FROM information_schema.column_privileges
|
||||
WHERE table_name = 'my_table'
|
||||
@ -288,7 +288,7 @@ SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT ALL PRIVILEGES ON `test`.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f3, f1), UPDATE (f1) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f3`, `f1`), UPDATE (`f1`) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
connection default;
|
||||
DROP TABLE db_datadict.my_table;
|
||||
SELECT * FROM information_schema.column_privileges
|
||||
@ -302,7 +302,7 @@ SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT ALL PRIVILEGES ON `test`.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f3, f1), UPDATE (f1) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f3`, `f1`), UPDATE (`f1`) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
connection testuser1;
|
||||
SELECT * FROM information_schema.column_privileges
|
||||
WHERE table_name = 'my_table'
|
||||
@ -315,7 +315,7 @@ SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT ALL PRIVILEGES ON `test`.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f3, f1), UPDATE (f1) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f3`, `f1`), UPDATE (`f1`) ON `db_datadict`.`my_table` TO `testuser1`@`localhost`
|
||||
connection default;
|
||||
REVOKE ALL ON db_datadict.my_table FROM 'testuser1'@'localhost';
|
||||
SELECT * FROM information_schema.column_privileges
|
||||
|
@ -238,7 +238,7 @@ def db_datadict_2 t4 0 db_datadict_2 PRIMARY 1 f1 NULL 0 NULL NULL HASH
|
||||
SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f5, f1) ON `db_datadict_2`.`t3` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f5`, `f1`) ON `db_datadict_2`.`t3` TO `testuser1`@`localhost`
|
||||
GRANT SELECT ON `db_datadict`.`t1` TO `testuser1`@`localhost` WITH GRANT OPTION
|
||||
SHOW GRANTS FOR 'testuser2'@'localhost';
|
||||
Grants for testuser2@localhost
|
||||
@ -257,7 +257,7 @@ def db_datadict_2 t3 0 db_datadict_2 PRIMARY 1 f1 NULL 0 NULL NULL HASH
|
||||
SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f5, f1) ON `db_datadict_2`.`t3` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f5`, `f1`) ON `db_datadict_2`.`t3` TO `testuser1`@`localhost`
|
||||
GRANT SELECT ON `db_datadict`.`t1` TO `testuser1`@`localhost` WITH GRANT OPTION
|
||||
SHOW GRANTS FOR 'testuser2'@'localhost';
|
||||
ERROR 42000: Access denied for user 'testuser1'@'localhost' to database 'mysql'
|
||||
@ -276,7 +276,7 @@ REVOKE SELECT,GRANT OPTION ON db_datadict.t1 FROM 'testuser1'@'localhost';
|
||||
SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f5, f1) ON `db_datadict_2`.`t3` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f5`, `f1`) ON `db_datadict_2`.`t3` TO `testuser1`@`localhost`
|
||||
connection testuser1;
|
||||
SELECT * FROM information_schema.statistics
|
||||
WHERE table_schema LIKE 'db_datadict%'
|
||||
@ -289,7 +289,7 @@ def db_datadict_2 t3 0 db_datadict_2 PRIMARY 1 f1 NULL 0 NULL NULL HASH
|
||||
SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f5, f1) ON `db_datadict_2`.`t3` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f5`, `f1`) ON `db_datadict_2`.`t3` TO `testuser1`@`localhost`
|
||||
connection default;
|
||||
disconnect testuser1;
|
||||
disconnect testuser2;
|
||||
|
@ -110,7 +110,7 @@ GRANT SELECT(f5) ON db_datadict.t1 TO 'testuser1'@'localhost';
|
||||
SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f5) ON `db_datadict`.`t1` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f5`) ON `db_datadict`.`t1` TO `testuser1`@`localhost`
|
||||
SELECT * FROM information_schema.table_constraints
|
||||
WHERE table_schema = 'db_datadict'
|
||||
ORDER BY table_schema,table_name, constraint_name;
|
||||
@ -134,7 +134,7 @@ connect testuser1, localhost, testuser1, , db_datadict;
|
||||
SHOW GRANTS FOR 'testuser1'@'localhost';
|
||||
Grants for testuser1@localhost
|
||||
GRANT USAGE ON *.* TO `testuser1`@`localhost`
|
||||
GRANT SELECT (f5) ON `db_datadict`.`t1` TO `testuser1`@`localhost`
|
||||
GRANT SELECT (`f5`) ON `db_datadict`.`t1` TO `testuser1`@`localhost`
|
||||
SELECT * FROM information_schema.table_constraints
|
||||
WHERE table_schema = 'db_datadict'
|
||||
ORDER BY table_schema,table_name, constraint_name;
|
||||
|
@ -391,7 +391,7 @@ connection no_privs_424d;
|
||||
show grants;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1), INSERT (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg4d_1 before INSERT on t1 for each row
|
||||
set new.f1 = 'trig 3.5.3.7-1d';
|
||||
@ -413,7 +413,7 @@ connection yes_privs_424d;
|
||||
show grants;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT UPDATE (f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT UPDATE (`f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg4d_2 before INSERT on t1 for each row
|
||||
set new.f1 = 'trig 3.5.3.7-2d';
|
||||
@ -618,14 +618,14 @@ grant UPDATE (f1), INSERT (f1) on priv_db.t1 to test_noprivs@localhost;
|
||||
show grants for test_noprivs@localhost;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT INSERT (f1), UPDATE (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT INSERT (`f1`), UPDATE (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
revoke ALL PRIVILEGES, GRANT OPTION FROM test_yesprivs@localhost;
|
||||
grant TRIGGER on *.* to test_yesprivs@localhost;
|
||||
grant SELECT (f1) on priv_db.t1 to test_yesprivs@localhost;
|
||||
show grants for test_noprivs@localhost;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT INSERT (f1), UPDATE (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT INSERT (`f1`), UPDATE (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
connect no_privs_425d,localhost,test_noprivs,PWD,test,$MASTER_MYPORT,$MASTER_MYSOCK;
|
||||
connect yes_privs_425d,localhost,test_yesprivs,PWD,test,$MASTER_MYPORT,$MASTER_MYSOCK;
|
||||
connection default;
|
||||
@ -633,7 +633,7 @@ connection no_privs_425d;
|
||||
show grants;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT INSERT (f1), UPDATE (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT INSERT (`f1`), UPDATE (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg5d_1 before INSERT on t1 for each row
|
||||
set @test_var= new.f1;
|
||||
@ -649,7 +649,7 @@ connection yes_privs_425d;
|
||||
show grants;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg5d_2 before INSERT on t1 for each row
|
||||
set @test_var= new.f1;
|
||||
|
@ -1480,8 +1480,8 @@ show grants for test_yesprivs@localhost;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT USAGE ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT TRIGGER ON `priv_db`.* TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (f1), INSERT ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (f1), INSERT, UPDATE (f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT, UPDATE (`f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
connection yes_privs;
|
||||
select current_user;
|
||||
current_user
|
||||
@ -1631,8 +1631,8 @@ to test_yesprivs@localhost;
|
||||
show grants for test_yesprivs@localhost;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT USAGE ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (f1), INSERT, UPDATE (f3, f2), TRIGGER ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (`f1`), INSERT, UPDATE (`f3`, `f2`), TRIGGER ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
connection yes_privs;
|
||||
select current_user;
|
||||
current_user
|
||||
@ -1674,8 +1674,8 @@ to test_yesprivs@localhost;
|
||||
show grants for test_yesprivs@localhost;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT USAGE ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (f1), INSERT, UPDATE (f3, f2, f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (`f1`), INSERT, UPDATE (`f3`, `f2`, `f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
connection no_privs;
|
||||
select current_user;
|
||||
current_user
|
||||
|
@ -391,7 +391,7 @@ connection no_privs_424d;
|
||||
show grants;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1), INSERT (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg4d_1 before INSERT on t1 for each row
|
||||
set new.f1 = 'trig 3.5.3.7-1d';
|
||||
@ -413,7 +413,7 @@ connection yes_privs_424d;
|
||||
show grants;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT UPDATE (f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT UPDATE (`f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg4d_2 before INSERT on t1 for each row
|
||||
set new.f1 = 'trig 3.5.3.7-2d';
|
||||
@ -618,14 +618,14 @@ grant UPDATE (f1), INSERT (f1) on priv_db.t1 to test_noprivs@localhost;
|
||||
show grants for test_noprivs@localhost;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT INSERT (f1), UPDATE (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT INSERT (`f1`), UPDATE (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
revoke ALL PRIVILEGES, GRANT OPTION FROM test_yesprivs@localhost;
|
||||
grant TRIGGER on *.* to test_yesprivs@localhost;
|
||||
grant SELECT (f1) on priv_db.t1 to test_yesprivs@localhost;
|
||||
show grants for test_noprivs@localhost;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT INSERT (f1), UPDATE (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT INSERT (`f1`), UPDATE (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
connect no_privs_425d,localhost,test_noprivs,PWD,test,$MASTER_MYPORT,$MASTER_MYSOCK;
|
||||
connect yes_privs_425d,localhost,test_yesprivs,PWD,test,$MASTER_MYPORT,$MASTER_MYSOCK;
|
||||
connection default;
|
||||
@ -633,7 +633,7 @@ connection no_privs_425d;
|
||||
show grants;
|
||||
Grants for test_noprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_noprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT INSERT (f1), UPDATE (f1) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
GRANT INSERT (`f1`), UPDATE (`f1`) ON `priv_db`.`t1` TO `test_noprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg5d_1 before INSERT on t1 for each row
|
||||
set @test_var= new.f1;
|
||||
@ -649,7 +649,7 @@ connection yes_privs_425d;
|
||||
show grants;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT TRIGGER ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
use priv_db;
|
||||
create trigger trg5d_2 before INSERT on t1 for each row
|
||||
set @test_var= new.f1;
|
||||
|
@ -1480,8 +1480,8 @@ show grants for test_yesprivs@localhost;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT USAGE ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT TRIGGER ON `priv_db`.* TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (f1), INSERT ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (f1), INSERT, UPDATE (f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT, UPDATE (`f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
connection yes_privs;
|
||||
select current_user;
|
||||
current_user
|
||||
@ -1631,8 +1631,8 @@ to test_yesprivs@localhost;
|
||||
show grants for test_yesprivs@localhost;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT USAGE ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (f1), INSERT, UPDATE (f3, f2), TRIGGER ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (`f1`), INSERT, UPDATE (`f3`, `f2`), TRIGGER ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
connection yes_privs;
|
||||
select current_user;
|
||||
current_user
|
||||
@ -1674,8 +1674,8 @@ to test_yesprivs@localhost;
|
||||
show grants for test_yesprivs@localhost;
|
||||
Grants for test_yesprivs@localhost
|
||||
GRANT USAGE ON *.* TO `test_yesprivs`@`localhost` IDENTIFIED BY PASSWORD '*C49735D016A099C0CF104EF9183F374A54CA2576'
|
||||
GRANT SELECT (f1), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (f1), INSERT, UPDATE (f3, f2, f1) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT (`f1`), INSERT, UPDATE ON `priv_db`.`t2` TO `test_yesprivs`@`localhost`
|
||||
GRANT SELECT, SELECT (`f1`), INSERT, UPDATE (`f3`, `f2`, `f1`) ON `priv_db`.`t1` TO `test_yesprivs`@`localhost`
|
||||
connection no_privs;
|
||||
select current_user;
|
||||
current_user
|
||||
|
@ -9,6 +9,14 @@ connection node_2;
|
||||
Cleaning grastate.dat file ...
|
||||
Starting server ...
|
||||
connection node_1;
|
||||
connection node_2;
|
||||
connection node_2;
|
||||
Shutting down server ...
|
||||
connection node_1;
|
||||
connection node_2;
|
||||
Cleaning grastate.dat file ...
|
||||
Starting server ...
|
||||
connection node_1;
|
||||
SELECT VARIABLE_VALUE FROM INFORMATION_SCHEMA.GLOBAL_STATUS WHERE VARIABLE_NAME = 'wsrep_cluster_status';
|
||||
VARIABLE_VALUE
|
||||
Primary
|
||||
|
@ -34,6 +34,34 @@
|
||||
--source include/start_mysqld.inc
|
||||
--source include/wait_until_ready.inc
|
||||
|
||||
# Save original auto_increment_offset values.
|
||||
--let $node_1=node_1
|
||||
--let $node_2=node_2
|
||||
--source include/auto_increment_offset_save.inc
|
||||
|
||||
--connection node_2
|
||||
--echo Shutting down server ...
|
||||
--source include/shutdown_mysqld.inc
|
||||
|
||||
--connection node_1
|
||||
|
||||
--let $wait_condition = SELECT VARIABLE_VALUE = 1 FROM INFORMATION_SCHEMA.GLOBAL_STATUS WHERE VARIABLE_NAME = 'wsrep_cluster_size'
|
||||
--source include/wait_condition.inc
|
||||
|
||||
--connection node_2
|
||||
|
||||
#
|
||||
# Delete grastate.dat with safe_to_bootstrap: 0
|
||||
#
|
||||
--echo Cleaning grastate.dat file ...
|
||||
--remove_file $MYSQLTEST_VARDIR/mysqld.2/data/grastate.dat
|
||||
|
||||
--echo Starting server ...
|
||||
--let $restart_noprint=2
|
||||
--let $start_mysqld_params="--wsrep-new-cluster"
|
||||
--source include/start_mysqld.inc
|
||||
--source include/wait_until_ready.inc
|
||||
|
||||
--connection node_1
|
||||
|
||||
--let $wait_condition = SELECT VARIABLE_VALUE = 'Primary' FROM INFORMATION_SCHEMA.GLOBAL_STATUS WHERE VARIABLE_NAME = 'wsrep_cluster_status';
|
||||
|
@ -247,3 +247,7 @@ create table t1 (a int);
|
||||
alter table t1 add column r blob generated always
|
||||
as (match(a) against ('' in boolean mode)) virtual;
|
||||
drop table t1;
|
||||
|
||||
--echo #
|
||||
--echo # End of 10.3 tests
|
||||
--echo #
|
||||
|
@ -49,18 +49,18 @@ alter table t1 add column (h int generated always as (a+1) virtual, i int as(5)
|
||||
drop table t1;
|
||||
|
||||
--echo # DEFAULT
|
||||
--error 1064
|
||||
--error ER_PARSE_ERROR
|
||||
create table t1 (a int, b int generated always as (a+1) virtual default 0);
|
||||
create table t1 (a int);
|
||||
--error 1064
|
||||
--error ER_PARSE_ERROR
|
||||
alter table t1 add column b int generated always as (a+1) virtual default 0;
|
||||
drop table t1;
|
||||
|
||||
--echo # AUTO_INCREMENT
|
||||
--error 1064
|
||||
--error ER_PARSE_ERROR
|
||||
create table t1 (a int, b int generated always as (a+1) virtual AUTO_INCREMENT);
|
||||
create table t1 (a int);
|
||||
--error 1064
|
||||
--error ER_PARSE_ERROR
|
||||
alter table t1 add column b int generated always as (a+1) virtual AUTO_INCREMENT;
|
||||
drop table t1;
|
||||
|
||||
@ -138,7 +138,7 @@ create table t1 (a int, b int generated always as (a % 2) stored references t2(a
|
||||
show create table t1;
|
||||
drop table t1;
|
||||
create table t1 (a int, b int generated always as (a % 2) virtual);
|
||||
--error 1064
|
||||
--error ER_PARSE_ERROR
|
||||
alter table t1 modify b int generated always as (a % 2) stored references t2(a);
|
||||
show create table t1;
|
||||
drop table t1;
|
||||
@ -199,6 +199,13 @@ create table t1 (a int, b int generated always as(-b) virtual, c int generated a
|
||||
create table t1 (a int, b int generated always as(-c) virtual, c int generated always as (b + 1) virtual);
|
||||
--error ER_GENERATED_COLUMN_FUNCTION_IS_NOT_ALLOWED
|
||||
create table t1 (pk int auto_increment primary key, col_int_nokey int generated always as (pk + col_int_key) stored, col_int_key int);
|
||||
--error ER_GENERATED_COLUMN_FUNCTION_IS_NOT_ALLOWED
|
||||
create table t1 (pk int auto_increment primary key, col_int_nokey int generated always as (pk + col_int_key) unique, col_int_key int);
|
||||
create table t1 (pk int auto_increment primary key, col_int_nokey int generated always as (pk + col_int_key), col_int_key int);
|
||||
show create table t1;
|
||||
insert t1 (col_int_key) values (10),(20),(30);
|
||||
select * from t1;
|
||||
drop table t1;
|
||||
|
||||
--echo # Bug#20339347: FAIL TO USE CREATE ....SELECT STATEMENT TO CREATE A NEW TABLE
|
||||
create table t1 (a int, b int generated always as(-a) virtual, c int generated always as (b + 1) stored);
|
||||
|
@ -170,6 +170,9 @@ alter table t1 add column r blob generated always
|
||||
as (match(a) against ('' in boolean mode)) virtual;
|
||||
ERROR HY000: Function or expression 'match ... against()' cannot be used in the GENERATED ALWAYS AS clause of `r`
|
||||
drop table t1;
|
||||
#
|
||||
# End of 10.3 tests
|
||||
#
|
||||
DROP VIEW IF EXISTS v1,v2;
|
||||
DROP TABLE IF EXISTS t1,t2,t3;
|
||||
DROP PROCEDURE IF EXISTS p1;
|
||||
|
@ -172,6 +172,9 @@ alter table t1 add column r blob generated always
|
||||
as (match(a) against ('' in boolean mode)) virtual;
|
||||
ERROR HY000: Function or expression 'match ... against()' cannot be used in the GENERATED ALWAYS AS clause of `r`
|
||||
drop table t1;
|
||||
#
|
||||
# End of 10.3 tests
|
||||
#
|
||||
DROP VIEW IF EXISTS v1,v2;
|
||||
DROP TABLE IF EXISTS t1,t2,t3;
|
||||
DROP PROCEDURE IF EXISTS p1;
|
||||
|
@ -260,6 +260,24 @@ create table t1 (a int, b int generated always as(-c) virtual, c int generated a
|
||||
ERROR 01000: Expression for field `b` is referring to uninitialized field `c`
|
||||
create table t1 (pk int auto_increment primary key, col_int_nokey int generated always as (pk + col_int_key) stored, col_int_key int);
|
||||
ERROR HY000: Function or expression 'AUTO_INCREMENT' cannot be used in the GENERATED ALWAYS AS clause of `pk`
|
||||
create table t1 (pk int auto_increment primary key, col_int_nokey int generated always as (pk + col_int_key) unique, col_int_key int);
|
||||
ERROR HY000: Function or expression 'AUTO_INCREMENT' cannot be used in the GENERATED ALWAYS AS clause of `pk`
|
||||
create table t1 (pk int auto_increment primary key, col_int_nokey int generated always as (pk + col_int_key), col_int_key int);
|
||||
show create table t1;
|
||||
Table Create Table
|
||||
t1 CREATE TABLE `t1` (
|
||||
`pk` int(11) NOT NULL AUTO_INCREMENT,
|
||||
`col_int_nokey` int(11) GENERATED ALWAYS AS (`pk` + `col_int_key`) VIRTUAL,
|
||||
`col_int_key` int(11) DEFAULT NULL,
|
||||
PRIMARY KEY (`pk`)
|
||||
) ENGINE=InnoDB DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci
|
||||
insert t1 (col_int_key) values (10),(20),(30);
|
||||
select * from t1;
|
||||
pk col_int_nokey col_int_key
|
||||
1 11 10
|
||||
2 22 20
|
||||
3 33 30
|
||||
drop table t1;
|
||||
# Bug#20339347: FAIL TO USE CREATE ....SELECT STATEMENT TO CREATE A NEW TABLE
|
||||
create table t1 (a int, b int generated always as(-a) virtual, c int generated always as (b + 1) stored);
|
||||
insert into t1(a) values(1),(2);
|
||||
|
@ -260,6 +260,24 @@ create table t1 (a int, b int generated always as(-c) virtual, c int generated a
|
||||
ERROR 01000: Expression for field `b` is referring to uninitialized field `c`
|
||||
create table t1 (pk int auto_increment primary key, col_int_nokey int generated always as (pk + col_int_key) stored, col_int_key int);
|
||||
ERROR HY000: Function or expression 'AUTO_INCREMENT' cannot be used in the GENERATED ALWAYS AS clause of `pk`
|
||||
create table t1 (pk int auto_increment primary key, col_int_nokey int generated always as (pk + col_int_key) unique, col_int_key int);
|
||||
ERROR HY000: Function or expression 'AUTO_INCREMENT' cannot be used in the GENERATED ALWAYS AS clause of `pk`
|
||||
create table t1 (pk int auto_increment primary key, col_int_nokey int generated always as (pk + col_int_key), col_int_key int);
|
||||
show create table t1;
|
||||
Table Create Table
|
||||
t1 CREATE TABLE `t1` (
|
||||
`pk` int(11) NOT NULL AUTO_INCREMENT,
|
||||
`col_int_nokey` int(11) GENERATED ALWAYS AS (`pk` + `col_int_key`) VIRTUAL,
|
||||
`col_int_key` int(11) DEFAULT NULL,
|
||||
PRIMARY KEY (`pk`)
|
||||
) ENGINE=MyISAM DEFAULT CHARSET=latin1 COLLATE=latin1_swedish_ci
|
||||
insert t1 (col_int_key) values (10),(20),(30);
|
||||
select * from t1;
|
||||
pk col_int_nokey col_int_key
|
||||
1 11 10
|
||||
2 22 20
|
||||
3 33 30
|
||||
drop table t1;
|
||||
# Bug#20339347: FAIL TO USE CREATE ....SELECT STATEMENT TO CREATE A NEW TABLE
|
||||
create table t1 (a int, b int generated always as(-a) virtual, c int generated always as (b + 1) stored);
|
||||
insert into t1(a) values(1),(2);
|
||||
|
50
mysql-test/suite/innodb/r/deadlock_in_subqueries_join.result
Normal file
50
mysql-test/suite/innodb/r/deadlock_in_subqueries_join.result
Normal file
@ -0,0 +1,50 @@
|
||||
CREATE TABLE t1 (
|
||||
pkey int NOT NULL PRIMARY KEY,
|
||||
c int
|
||||
) ENGINE=InnoDB;
|
||||
INSERT INTO t1 VALUES(1,1);
|
||||
CREATE TABLE t2 (
|
||||
pkey int NOT NULL PRIMARY KEY,
|
||||
c int
|
||||
) ENGINE=InnoDB DEFAULT CHARSET=latin1;
|
||||
INSERT INTO t2 VALUES (2, NULL);
|
||||
CREATE TABLE t3 (c int) engine = InnoDB;
|
||||
INSERT INTO t3 VALUES (10), (20), (30), (40), (50);
|
||||
connect con1, localhost,root,,;
|
||||
connection default;
|
||||
START TRANSACTION;
|
||||
UPDATE t3 SET c=c+1000;
|
||||
SELECT * FROM t1 FOR UPDATE;
|
||||
pkey c
|
||||
1 1
|
||||
connection con1;
|
||||
START TRANSACTION;
|
||||
DELETE FROM t2 WHERE c NOT IN (SELECT ref_0.pkey FROM t1 AS ref_0 INNER JOIN t1 AS ref_1 ON ref_0.c = ref_0.pkey);
|
||||
connection default;
|
||||
SELECT * FROM t2 FOR UPDATE;
|
||||
pkey c
|
||||
2 NULL
|
||||
COMMIT;
|
||||
connection con1;
|
||||
ERROR 40001: Deadlock found when trying to get lock; try restarting transaction
|
||||
COMMIT;
|
||||
connection default;
|
||||
START TRANSACTION;
|
||||
UPDATE t3 SET c=c+1000;
|
||||
SELECT * FROM t1 FOR UPDATE;
|
||||
pkey c
|
||||
1 1
|
||||
connection con1;
|
||||
START TRANSACTION;
|
||||
UPDATE t2 SET pkey=pkey+10 WHERE c NOT IN (SELECT ref_0.pkey FROM t1 AS ref_0 INNER JOIN t1 AS ref_1 ON ref_0.c = ref_0.pkey);
|
||||
connection default;
|
||||
SELECT * FROM t2 FOR UPDATE;
|
||||
pkey c
|
||||
2 NULL
|
||||
COMMIT;
|
||||
connection con1;
|
||||
ERROR 40001: Deadlock found when trying to get lock; try restarting transaction
|
||||
COMMIT;
|
||||
disconnect con1;
|
||||
connection default;
|
||||
DROP TABLE t1,t2,t3;
|
26
mysql-test/suite/innodb/r/import_tablespace_race.result
Normal file
26
mysql-test/suite/innodb/r/import_tablespace_race.result
Normal file
@ -0,0 +1,26 @@
|
||||
#
|
||||
# MDEV-29144 ER_TABLE_SCHEMA_MISMATCH or crash on DISCARD/IMPORT
|
||||
#
|
||||
CREATE TABLE t (pk int PRIMARY KEY, c varchar(1024))
|
||||
ENGINE=InnoDB CHARSET latin1;
|
||||
INSERT INTO t SELECT seq, 'x' FROM seq_1_to_100;
|
||||
connect con1,localhost,root,,test;
|
||||
BEGIN NOT ATOMIC
|
||||
DECLARE a INT DEFAULT 0;
|
||||
REPEAT
|
||||
SET a= a+1;
|
||||
UPDATE t SET c = 'xx' WHERE pk = a;
|
||||
UNTIL a = 100
|
||||
END REPEAT;
|
||||
END
|
||||
$
|
||||
connection default;
|
||||
ALTER TABLE t NOWAIT ADD INDEX (c);
|
||||
connection con1;
|
||||
connection default;
|
||||
FLUSH TABLE t FOR EXPORT;
|
||||
UNLOCK TABLES;
|
||||
DROP TABLE t;
|
||||
ALTER TABLE t DISCARD TABLESPACE;
|
||||
ALTER TABLE t IMPORT TABLESPACE;
|
||||
DROP TABLE t;
|
@ -460,10 +460,26 @@ SET DEBUG_SYNC = 'now WAIT_FOR created';
|
||||
UPDATE t1 SET f = REPEAT('a', 20000);
|
||||
SET DEBUG_SYNC = 'now SIGNAL updated';
|
||||
connection con1;
|
||||
disconnect con1;
|
||||
connection default;
|
||||
DROP TABLE t1;
|
||||
SET DEBUG_SYNC = 'RESET';
|
||||
#
|
||||
# MDEV-29977 Memory leak in row_log_table_apply_update
|
||||
#
|
||||
CREATE TABLE t1(f1 longtext, f2 int, KEY(f1(1024)), KEY(f2, f1(20))) ENGINE=InnoDB;
|
||||
INSERT INTO t1 VALUES('a', 1);
|
||||
connection con1;
|
||||
set DEBUG_SYNC="innodb_inplace_alter_table_enter SIGNAL con_default WAIT_FOR con1_signal";
|
||||
ALTER TABLE t1 FORCE;
|
||||
connection default;
|
||||
SET DEBUG_SYNC="now WAIT_FOR con_default";
|
||||
UPDATE t1 SET f1 = NULL;
|
||||
UPDATE t1 SET f1 = REPEAT('b', 9000);
|
||||
SET DEBUG_SYNC="now SIGNAL con1_signal";
|
||||
connection con1;
|
||||
DROP TABLE t1;
|
||||
connection default;
|
||||
SET DEBUG_SYNC=RESET;
|
||||
disconnect con1;
|
||||
SET GLOBAL innodb_file_per_table = @global_innodb_file_per_table_orig;
|
||||
SET GLOBAL innodb_monitor_enable = default;
|
||||
SET GLOBAL innodb_monitor_disable = default;
|
||||
|
@ -795,3 +795,19 @@ DROP DATABASE testdb_wl5522;
|
||||
call mtr.add_suppression("Got error -1 when reading table '.*'");
|
||||
call mtr.add_suppression("InnoDB: Error: tablespace id and flags in file '.*'.*");
|
||||
call mtr.add_suppression("InnoDB: The table .* doesn't have a corresponding tablespace, it was discarded");
|
||||
#
|
||||
# MDEV-27882 Innodb - recognise MySQL-8.0 innodb flags and give a specific error message
|
||||
#
|
||||
#
|
||||
CREATE TABLE `t1` (`i` int(11) NOT NULL, PRIMARY KEY (`i`) ) ENGINE=InnoDB;
|
||||
FLUSH TABLES t1 FOR EXPORT;
|
||||
backup: t1
|
||||
UNLOCK TABLES;
|
||||
ALTER TABLE t1 DISCARD TABLESPACE;
|
||||
call mtr.add_suppression("InnoDB: unsupported MySQL tablespace");
|
||||
ALTER TABLE t1 IMPORT TABLESPACE;
|
||||
ERROR 42000: Table 't1' uses an extension that doesn't exist in this MariaDB version
|
||||
DROP TABLE t1;
|
||||
#
|
||||
# End of 10.3 tests
|
||||
#
|
||||
|
@ -448,7 +448,7 @@ ERROR HY000: Tablespace has been discarded for table `t1`
|
||||
restore: t1 .ibd and .cfg files
|
||||
SET SESSION debug_dbug="+d,ib_import_reset_space_and_lsn_failure";
|
||||
ALTER TABLE t1 IMPORT TABLESPACE;
|
||||
ERROR HY000: Internal error: Cannot reset LSNs in table `test`.`t1` : Too many concurrent transactions
|
||||
ERROR HY000: Internal error: Error importing tablespace for table `test`.`t1` : Too many concurrent transactions
|
||||
restore: t1 .ibd and .cfg files
|
||||
SET SESSION debug_dbug=@saved_debug_dbug;
|
||||
SET SESSION debug_dbug="+d,ib_import_open_tablespace_failure";
|
||||
@ -867,7 +867,7 @@ ERROR HY000: Tablespace has been discarded for table `t1`
|
||||
restore: t1 .ibd and .cfg files
|
||||
SET SESSION debug_dbug="+d,ib_import_trigger_corruption_1";
|
||||
ALTER TABLE t1 IMPORT TABLESPACE;
|
||||
ERROR HY000: Internal error: Cannot reset LSNs in table `test`.`t1` : Data structure corruption
|
||||
ERROR HY000: Internal error: Error importing tablespace for table `test`.`t1` : Data structure corruption
|
||||
SET SESSION debug_dbug=@saved_debug_dbug;
|
||||
DROP TABLE t1;
|
||||
unlink: t1.ibd
|
||||
@ -879,7 +879,7 @@ ERROR HY000: Tablespace has been discarded for table `t1`
|
||||
restore: t1 .ibd and .cfg files
|
||||
SET SESSION debug_dbug="+d,buf_page_import_corrupt_failure";
|
||||
ALTER TABLE t1 IMPORT TABLESPACE;
|
||||
ERROR HY000: Internal error: Cannot reset LSNs in table `test`.`t1` : Data structure corruption
|
||||
ERROR HY000: Internal error: Error importing tablespace for table `test`.`t1` : Data structure corruption
|
||||
SET SESSION debug_dbug=@saved_debug_dbug;
|
||||
DROP TABLE t1;
|
||||
unlink: t1.ibd
|
||||
|
@ -3,6 +3,8 @@
|
||||
#
|
||||
# FIXME: Unlike MySQL, maybe MariaDB should not read the .ibd files
|
||||
# of tables with .isl file or DATA DIRECTORY attribute.
|
||||
call mtr.add_suppression("\\[ERROR\\] InnoDB: MySQL-8\\.0 tablespace in ");
|
||||
call mtr.add_suppression("\\[ERROR\\] InnoDB: Restart in MySQL for migration/recovery\\.");
|
||||
# FIXME: This is much more noisy than MariaDB 10.1!
|
||||
call mtr.add_suppression("\\[ERROR\\] InnoDB: Tablespace flags are invalid in datafile: .*test.t[rcd]\\.ibd");
|
||||
call mtr.add_suppression("\\[ERROR\\] InnoDB: Operating system error number .* in a file operation\\.");
|
||||
@ -41,3 +43,11 @@ Warning 1210 innodb_buffer_pool_size must be at least MIN_VAL for innodb_page_si
|
||||
Error 1231 Variable 'innodb_buffer_pool_size' can't be set to the value of 'WRONG_VALUE'
|
||||
EXECUTE IMMEDIATE 'SET GLOBAL innodb_buffer_pool_size = ?' USING (@min_pool_size);
|
||||
SET GLOBAL innodb_buffer_pool_size = @innodb_buffer_pool_size_orig;
|
||||
#
|
||||
# MDEV-27882 Innodb - recognise MySQL-8.0 innodb flags and give a specific error message
|
||||
#
|
||||
FOUND 1 /InnoDB: MySQL-8\.0 tablespace in \./ibdata1/ in attempted_start.err
|
||||
# restart
|
||||
#
|
||||
# End of 10.3 tests
|
||||
#
|
||||
|
@ -2,13 +2,6 @@
|
||||
--source include/have_innodb.inc
|
||||
--source include/have_symlink.inc
|
||||
|
||||
--disable_query_log
|
||||
CALL mtr.add_suppression(".*Failed to set O_DIRECT on file.*");
|
||||
|
||||
# The below mtr suppression to avoid failure in solaris platform.
|
||||
CALL mtr.add_suppression("\\[ERROR\\] InnoDB: Failed to set DIRECTIO_ON on file.*");
|
||||
--enable_query_log
|
||||
|
||||
SHOW VARIABLES LIKE 'innodb_flush_method';
|
||||
|
||||
let MYSQLD_DATADIR=`SELECT @@datadir`;
|
||||
|
81
mysql-test/suite/innodb/t/deadlock_in_subqueries_join.test
Normal file
81
mysql-test/suite/innodb/t/deadlock_in_subqueries_join.test
Normal file
@ -0,0 +1,81 @@
|
||||
--source include/have_innodb.inc
|
||||
--source include/count_sessions.inc
|
||||
|
||||
CREATE TABLE t1 (
|
||||
pkey int NOT NULL PRIMARY KEY,
|
||||
c int
|
||||
) ENGINE=InnoDB;
|
||||
|
||||
INSERT INTO t1 VALUES(1,1);
|
||||
|
||||
CREATE TABLE t2 (
|
||||
pkey int NOT NULL PRIMARY KEY,
|
||||
c int
|
||||
) ENGINE=InnoDB DEFAULT CHARSET=latin1;
|
||||
|
||||
INSERT INTO t2 VALUES (2, NULL);
|
||||
|
||||
# The following table is to increase tansaction weight on deadlock resolution
|
||||
CREATE TABLE t3 (c int) engine = InnoDB;
|
||||
INSERT INTO t3 VALUES (10), (20), (30), (40), (50);
|
||||
|
||||
--let $i= 2
|
||||
--let $delete= 2
|
||||
--let $update= 1
|
||||
--connect(con1, localhost,root,,)
|
||||
|
||||
while($i) {
|
||||
--connection default
|
||||
START TRANSACTION; # trx 1
|
||||
# The following update is necessary to increase the transaction weight, which is
|
||||
# calculated as the number of locks + the number of undo records during deadlock
|
||||
# report. Victim's transaction should have minimum weight. We need trx 2 to be
|
||||
# choosen as victim, that's why we need to increase the current transaction
|
||||
# weight.
|
||||
UPDATE t3 SET c=c+1000;
|
||||
SELECT * FROM t1 FOR UPDATE;
|
||||
|
||||
--connection con1
|
||||
START TRANSACTION; # trx 2
|
||||
# 1) read record from t2, lock it
|
||||
# 2) check if the read record should be deleted, i.e. read record from t1,
|
||||
# as the record from t1 is locked by trx 1, the subselect will be suspended.
|
||||
# see 'while' loop in mysql_delete() or mysql_update() and
|
||||
# select->skip_record(thd) call for details.
|
||||
if ($i == $delete) {
|
||||
--send DELETE FROM t2 WHERE c NOT IN (SELECT ref_0.pkey FROM t1 AS ref_0 INNER JOIN t1 AS ref_1 ON ref_0.c = ref_0.pkey)
|
||||
}
|
||||
if ($i == $update) {
|
||||
--send UPDATE t2 SET pkey=pkey+10 WHERE c NOT IN (SELECT ref_0.pkey FROM t1 AS ref_0 INNER JOIN t1 AS ref_1 ON ref_0.c = ref_0.pkey)
|
||||
}
|
||||
|
||||
--connection default
|
||||
let $wait_condition=
|
||||
SELECT count(*) = 1 FROM information_schema.processlist
|
||||
WHERE (state = 'Sending data' OR state = "Updating")
|
||||
AND (info LIKE 'delete from t2 where%' OR
|
||||
info LIKE 'UPDATE t2 SET pkey=pkey+10 WHERE%');
|
||||
--source include/wait_condition.inc
|
||||
|
||||
# The record from t2 is locked by the previous delete, so trx 2 is waiting for
|
||||
# trx 1, and trx 1 will be blocked by trx 2 with the following SELECT. So we
|
||||
# have deadlock here. And trx 2 is chosen as deadlock victim as trx 1 has
|
||||
# greater weight.
|
||||
SELECT * FROM t2 FOR UPDATE;
|
||||
COMMIT;
|
||||
|
||||
--connection con1
|
||||
# If the bug is not fixed, there will be assertion failure as
|
||||
# mysql_delete()/mysql_update() will continue execution despite its subselect
|
||||
# got deadlock error
|
||||
--error ER_LOCK_DEADLOCK
|
||||
--reap
|
||||
COMMIT;
|
||||
--dec $i
|
||||
}
|
||||
|
||||
--disconnect con1
|
||||
|
||||
--connection default
|
||||
DROP TABLE t1,t2,t3;
|
||||
--source include/wait_until_count_sessions.inc
|
54
mysql-test/suite/innodb/t/import_tablespace_race.test
Normal file
54
mysql-test/suite/innodb/t/import_tablespace_race.test
Normal file
@ -0,0 +1,54 @@
|
||||
--source include/have_innodb.inc
|
||||
--source include/have_sequence.inc
|
||||
|
||||
--echo #
|
||||
--echo # MDEV-29144 ER_TABLE_SCHEMA_MISMATCH or crash on DISCARD/IMPORT
|
||||
--echo #
|
||||
|
||||
CREATE TABLE t (pk int PRIMARY KEY, c varchar(1024))
|
||||
ENGINE=InnoDB CHARSET latin1;
|
||||
INSERT INTO t SELECT seq, 'x' FROM seq_1_to_100;
|
||||
|
||||
--connect (con1,localhost,root,,test)
|
||||
--delimiter $
|
||||
--send
|
||||
BEGIN NOT ATOMIC
|
||||
DECLARE a INT DEFAULT 0;
|
||||
REPEAT
|
||||
SET a= a+1;
|
||||
UPDATE t SET c = 'xx' WHERE pk = a;
|
||||
UNTIL a = 100
|
||||
END REPEAT;
|
||||
END
|
||||
$
|
||||
--delimiter ;
|
||||
|
||||
--connection default
|
||||
--error 0,ER_LOCK_WAIT_TIMEOUT
|
||||
ALTER TABLE t NOWAIT ADD INDEX (c);
|
||||
|
||||
--connection con1
|
||||
--reap
|
||||
|
||||
--connection default
|
||||
|
||||
--let $datadir= `select @@datadir`
|
||||
|
||||
FLUSH TABLE t FOR EXPORT;
|
||||
--let $create= query_get_value(SHOW CREATE TABLE t, Create Table, 1)
|
||||
--copy_file $datadir/test/t.cfg $MYSQL_TMP_DIR/t.cfg
|
||||
--copy_file $datadir/test/t.ibd $MYSQL_TMP_DIR/t.ibd
|
||||
UNLOCK TABLES;
|
||||
|
||||
DROP TABLE t;
|
||||
--disable_query_log
|
||||
eval $create;
|
||||
--enable_query_log
|
||||
|
||||
ALTER TABLE t DISCARD TABLESPACE;
|
||||
--move_file $MYSQL_TMP_DIR/t.cfg $datadir/test/t.cfg
|
||||
--move_file $MYSQL_TMP_DIR/t.ibd $datadir/test/t.ibd
|
||||
ALTER TABLE t IMPORT TABLESPACE;
|
||||
|
||||
# Cleanup
|
||||
DROP TABLE t;
|
@ -413,11 +413,28 @@ SET DEBUG_SYNC = 'now SIGNAL updated';
|
||||
|
||||
connection con1;
|
||||
reap;
|
||||
disconnect con1;
|
||||
|
||||
connection default;
|
||||
DROP TABLE t1;
|
||||
SET DEBUG_SYNC = 'RESET';
|
||||
--echo #
|
||||
--echo # MDEV-29977 Memory leak in row_log_table_apply_update
|
||||
--echo #
|
||||
CREATE TABLE t1(f1 longtext, f2 int, KEY(f1(1024)), KEY(f2, f1(20))) ENGINE=InnoDB;
|
||||
INSERT INTO t1 VALUES('a', 1);
|
||||
connection con1;
|
||||
set DEBUG_SYNC="innodb_inplace_alter_table_enter SIGNAL con_default WAIT_FOR con1_signal";
|
||||
send ALTER TABLE t1 FORCE;
|
||||
connection default;
|
||||
SET DEBUG_SYNC="now WAIT_FOR con_default";
|
||||
UPDATE t1 SET f1 = NULL;
|
||||
UPDATE t1 SET f1 = REPEAT('b', 9000);
|
||||
SET DEBUG_SYNC="now SIGNAL con1_signal";
|
||||
connection con1;
|
||||
reap;
|
||||
DROP TABLE t1;
|
||||
connection default;
|
||||
SET DEBUG_SYNC=RESET;
|
||||
disconnect con1;
|
||||
|
||||
# Check that all connections opened by test cases in this file are really
|
||||
# gone so execution of other tests won't be affected by their presence.
|
||||
|
@ -932,3 +932,34 @@ call mtr.add_suppression("InnoDB: The table .* doesn't have a corresponding tabl
|
||||
--remove_file $MYSQLTEST_VARDIR/tmp/t1.ibd
|
||||
--remove_file $MYSQLTEST_VARDIR/tmp/t1_fk.cfg
|
||||
--remove_file $MYSQLTEST_VARDIR/tmp/t1_fk.ibd
|
||||
|
||||
--echo #
|
||||
--echo # MDEV-27882 Innodb - recognise MySQL-8.0 innodb flags and give a specific error message
|
||||
--echo #
|
||||
--echo #
|
||||
|
||||
CREATE TABLE `t1` (`i` int(11) NOT NULL, PRIMARY KEY (`i`) ) ENGINE=InnoDB;
|
||||
FLUSH TABLES t1 FOR EXPORT;
|
||||
|
||||
# We use the cfg file of ours.
|
||||
perl;
|
||||
do "$ENV{MTR_SUITE_DIR}/include/innodb-util.pl";
|
||||
ib_backup_tablespaces("test", "t1");
|
||||
EOF
|
||||
|
||||
UNLOCK TABLES;
|
||||
ALTER TABLE t1 DISCARD TABLESPACE;
|
||||
|
||||
--move_file $MYSQLTEST_VARDIR/tmp/t1.cfg $MYSQLD_DATADIR/test/t1.cfg
|
||||
--copy_file std_data/mysql80/t1.ibd $MYSQLD_DATADIR/test/t1.ibd
|
||||
|
||||
call mtr.add_suppression("InnoDB: unsupported MySQL tablespace");
|
||||
--error ER_UNSUPPORTED_EXTENSION
|
||||
ALTER TABLE t1 IMPORT TABLESPACE;
|
||||
|
||||
DROP TABLE t1;
|
||||
--remove_file $MYSQLTEST_VARDIR/tmp/t1.ibd
|
||||
|
||||
--echo #
|
||||
--echo # End of 10.3 tests
|
||||
--echo #
|
||||
|
@ -15,6 +15,9 @@ let page_size= `select @@innodb_page_size`;
|
||||
|
||||
--echo # FIXME: Unlike MySQL, maybe MariaDB should not read the .ibd files
|
||||
--echo # of tables with .isl file or DATA DIRECTORY attribute.
|
||||
call mtr.add_suppression("\\[ERROR\\] InnoDB: MySQL-8\\.0 tablespace in ");
|
||||
call mtr.add_suppression("\\[ERROR\\] InnoDB: Restart in MySQL for migration/recovery\\.");
|
||||
|
||||
--echo # FIXME: This is much more noisy than MariaDB 10.1!
|
||||
call mtr.add_suppression("\\[ERROR\\] InnoDB: Tablespace flags are invalid in datafile: .*test.t[rcd]\\.ibd");
|
||||
call mtr.add_suppression("\\[ERROR\\] InnoDB: Operating system error number .* in a file operation\\.");
|
||||
@ -47,7 +50,7 @@ die unless open OUT, ">", "$ENV{datadir}/test/tc.ibd";
|
||||
print OUT "bar " x $ENV{page_size};
|
||||
close OUT or die;
|
||||
die unless open OUT, ">", "$ENV{MYSQL_TMP_DIR}/test/td.ibd";
|
||||
print OUT "xyz " x $ENV{page_size};
|
||||
print OUT "Xyz " x $ENV{page_size};
|
||||
close OUT or die;
|
||||
EOF
|
||||
|
||||
@ -101,3 +104,60 @@ EXECUTE IMMEDIATE 'SET GLOBAL innodb_buffer_pool_size = ?' USING (@min_pool_size
|
||||
--source include/wait_condition.inc
|
||||
|
||||
SET GLOBAL innodb_buffer_pool_size = @innodb_buffer_pool_size_orig;
|
||||
|
||||
--echo #
|
||||
--echo # MDEV-27882 Innodb - recognise MySQL-8.0 innodb flags and give a specific error message
|
||||
--echo #
|
||||
|
||||
--let MYSQLD_DATADIR= `SELECT @@datadir`
|
||||
--let SERVER_ID= `SELECT @@server_id`
|
||||
--let EXPECT_FILE_NAME= $MYSQLTEST_VARDIR/tmp/mysqld.$SERVER_ID.expect
|
||||
|
||||
--source include/shutdown_mysqld.inc
|
||||
|
||||
--move_file $MYSQLD_DATADIR/ibdata1 $MYSQLD_DATADIR/ibdata1.bak
|
||||
--copy_file std_data/mysql80/ibdata1_$page_size $MYSQLD_DATADIR/ibdata1
|
||||
|
||||
perl;
|
||||
use IO::Handle;
|
||||
my $size = 9 * 1048576;
|
||||
if ($ENV{MTR_COMBINATION_32K}) {
|
||||
$size *= 2;
|
||||
}
|
||||
if ($ENV{MTR_COMBINATION_64K}) {
|
||||
$size *= 4;
|
||||
}
|
||||
$size -= $ENV{page_size};
|
||||
die unless open(FILE, ">>", "$ENV{MYSQLD_DATADIR}/ibdata1");
|
||||
binmode FILE;
|
||||
|
||||
print FILE chr(0) x $size;
|
||||
close(FILE);
|
||||
EOF
|
||||
|
||||
--let ibdata_size='9M'
|
||||
if ($MTR_COMBINATION_32K)
|
||||
{
|
||||
--let ibdata_size='18M'
|
||||
}
|
||||
if ($MTR_COMBINATION_64K)
|
||||
{
|
||||
--let ibdata_size='36M'
|
||||
}
|
||||
|
||||
--error 1
|
||||
exec $MYSQLD --no-defaults --skip-networking --innodb_data_file_path=ibdata1:$ibdata_size --innodb-page-size=$page_size --datadir=$MYSQLD_DATADIR --log-error=$MYSQL_TMP_DIR/attempted_start.err;
|
||||
|
||||
let SEARCH_FILE= $MYSQL_TMP_DIR/attempted_start.err;
|
||||
let SEARCH_PATTERN= InnoDB: MySQL-8\.0 tablespace in \./ibdata1;
|
||||
source include/search_pattern_in_file.inc;
|
||||
|
||||
--remove_file $MYSQL_TMP_DIR/attempted_start.err
|
||||
--remove_file $MYSQLD_DATADIR/ibdata1
|
||||
--move_file $MYSQLD_DATADIR/ibdata1.bak $MYSQLD_DATADIR/ibdata1
|
||||
|
||||
--source include/start_mysqld.inc
|
||||
|
||||
--echo #
|
||||
--echo # End of 10.3 tests
|
||||
--echo #
|
||||
|
@ -279,3 +279,20 @@ ALTER TABLE t1 ADD d INT NULL;
|
||||
ALTER TABLE t1 ADD FULLTEXT(b);
|
||||
ERROR HY000: Index 'FTS_DOC_ID_INDEX' is of wrong type for an InnoDB FULLTEXT index
|
||||
DROP TABLE t1;
|
||||
#
|
||||
# MDEV-29169 Using MATCH returns NULL for Virtual Column
|
||||
#
|
||||
CREATE TABLE t (a TEXT DEFAULT NULL,
|
||||
b TEXT AS (a),
|
||||
c TEXT AS (concat(a, '1')),
|
||||
d int AS (111) VIRTUAL,
|
||||
FULLTEXT KEY `a` (`a`)
|
||||
) ENGINE=InnoDB;
|
||||
INSERT INTO t (a) VALUES ('test');
|
||||
SELECT * FROM t;
|
||||
a b c d
|
||||
test test test1 111
|
||||
SELECT * FROM t WHERE MATCH(a) AGAINST('test');
|
||||
a b c d
|
||||
test test test1 111
|
||||
DROP TABLE t;
|
||||
|
@ -268,3 +268,19 @@ ALTER TABLE t1 ADD d INT NULL;
|
||||
--error ER_INNODB_FT_WRONG_DOCID_INDEX
|
||||
ALTER TABLE t1 ADD FULLTEXT(b);
|
||||
DROP TABLE t1;
|
||||
|
||||
--echo #
|
||||
--echo # MDEV-29169 Using MATCH returns NULL for Virtual Column
|
||||
--echo #
|
||||
CREATE TABLE t (a TEXT DEFAULT NULL,
|
||||
b TEXT AS (a),
|
||||
c TEXT AS (concat(a, '1')),
|
||||
d int AS (111) VIRTUAL,
|
||||
FULLTEXT KEY `a` (`a`)
|
||||
) ENGINE=InnoDB;
|
||||
|
||||
INSERT INTO t (a) VALUES ('test');
|
||||
SELECT * FROM t;
|
||||
SELECT * FROM t WHERE MATCH(a) AGAINST('test');
|
||||
|
||||
DROP TABLE t;
|
||||
|
@ -78,7 +78,7 @@ ERROR HY000: Tablespace has been discarded for table `t1`
|
||||
restore: t1 .ibd and .cfg files
|
||||
SET SESSION debug_dbug="+d,ib_import_reset_space_and_lsn_failure";
|
||||
ALTER TABLE t1 IMPORT TABLESPACE;
|
||||
ERROR HY000: Internal error: Cannot reset LSNs in table `test`.`t1` : Too many concurrent transactions
|
||||
ERROR HY000: Internal error: Error importing tablespace for table `test`.`t1` : Too many concurrent transactions
|
||||
restore: t1 .ibd and .cfg files
|
||||
SET SESSION debug_dbug=@saved_debug_dbug;
|
||||
SET SESSION debug_dbug="+d,ib_import_open_tablespace_failure";
|
||||
@ -316,7 +316,7 @@ ERROR HY000: Tablespace has been discarded for table `t1`
|
||||
restore: t1 .ibd and .cfg files
|
||||
SET SESSION debug_dbug="+d,ib_import_trigger_corruption_1";
|
||||
ALTER TABLE t1 IMPORT TABLESPACE;
|
||||
ERROR HY000: Internal error: Cannot reset LSNs in table `test`.`t1` : Data structure corruption
|
||||
ERROR HY000: Internal error: Error importing tablespace for table `test`.`t1` : Data structure corruption
|
||||
SET SESSION debug_dbug=@saved_debug_dbug;
|
||||
DROP TABLE t1;
|
||||
unlink: t1.ibd
|
||||
@ -329,7 +329,7 @@ ERROR HY000: Tablespace has been discarded for table `t1`
|
||||
restore: t1 .ibd and .cfg files
|
||||
SET SESSION debug_dbug="+d,buf_page_import_corrupt_failure";
|
||||
ALTER TABLE t1 IMPORT TABLESPACE;
|
||||
ERROR HY000: Internal error: Cannot reset LSNs in table `test`.`t1` : Data structure corruption
|
||||
ERROR HY000: Internal error: Error importing tablespace for table `test`.`t1` : Data structure corruption
|
||||
SET SESSION debug_dbug=@saved_debug_dbug;
|
||||
DROP TABLE t1;
|
||||
unlink: t1.ibd
|
||||
|
@ -873,6 +873,19 @@ eval CREATE OR REPLACE TABLE t1 (pk INT AUTO_INCREMENT, a INT, KEY(pk)) ENGINE=$
|
||||
INSERT INTO t1 VALUES (1,1),(2,2);
|
||||
UPDATE t1 SET pk = 0;
|
||||
DROP TABLE t1;
|
||||
|
||||
--echo #
|
||||
--echo # MDEV-29636 Assertion `part_share->auto_inc_initialized || !can_use_for_auto_inc_init()'
|
||||
--echo # failed in ha_partition::set_auto_increment_if_higher upon REPLACE
|
||||
--echo # with partition pruning
|
||||
--echo #
|
||||
eval CREATE TABLE t1 (a INT AUTO_INCREMENT PRIMARY KEY) ENGINE=$engine
|
||||
PARTITION BY RANGE (a) (
|
||||
PARTITION p0 VALUES LESS THAN (10),
|
||||
PARTITION pn VALUES LESS THAN MAXVALUE
|
||||
);
|
||||
REPLACE INTO t1 PARTITION (p0) SELECT 1;
|
||||
DROP TABLE t1;
|
||||
}
|
||||
|
||||
if (!$skip_delete)
|
||||
|
@ -704,6 +704,18 @@ INSERT INTO t1 VALUES (1,1),(2,2);
|
||||
UPDATE t1 SET pk = 0;
|
||||
DROP TABLE t1;
|
||||
#
|
||||
# MDEV-29636 Assertion `part_share->auto_inc_initialized || !can_use_for_auto_inc_init()'
|
||||
# failed in ha_partition::set_auto_increment_if_higher upon REPLACE
|
||||
# with partition pruning
|
||||
#
|
||||
CREATE TABLE t1 (a INT AUTO_INCREMENT PRIMARY KEY) ENGINE='Blackhole'
|
||||
PARTITION BY RANGE (a) (
|
||||
PARTITION p0 VALUES LESS THAN (10),
|
||||
PARTITION pn VALUES LESS THAN MAXVALUE
|
||||
);
|
||||
REPLACE INTO t1 PARTITION (p0) SELECT 1;
|
||||
DROP TABLE t1;
|
||||
#
|
||||
# MDEV-21027 Assertion `part_share->auto_inc_initialized || !can_use_for_auto_inc_init()'
|
||||
# ha_partition::set_auto_increment_if_higher
|
||||
#
|
||||
|
@ -1111,6 +1111,18 @@ INSERT INTO t1 VALUES (1,1),(2,2);
|
||||
UPDATE t1 SET pk = 0;
|
||||
DROP TABLE t1;
|
||||
#
|
||||
# MDEV-29636 Assertion `part_share->auto_inc_initialized || !can_use_for_auto_inc_init()'
|
||||
# failed in ha_partition::set_auto_increment_if_higher upon REPLACE
|
||||
# with partition pruning
|
||||
#
|
||||
CREATE TABLE t1 (a INT AUTO_INCREMENT PRIMARY KEY) ENGINE='InnoDB'
|
||||
PARTITION BY RANGE (a) (
|
||||
PARTITION p0 VALUES LESS THAN (10),
|
||||
PARTITION pn VALUES LESS THAN MAXVALUE
|
||||
);
|
||||
REPLACE INTO t1 PARTITION (p0) SELECT 1;
|
||||
DROP TABLE t1;
|
||||
#
|
||||
# MDEV-21027 Assertion `part_share->auto_inc_initialized || !can_use_for_auto_inc_init()'
|
||||
# ha_partition::set_auto_increment_if_higher
|
||||
#
|
||||
|
@ -1158,6 +1158,18 @@ INSERT INTO t1 VALUES (1,1),(2,2);
|
||||
UPDATE t1 SET pk = 0;
|
||||
DROP TABLE t1;
|
||||
#
|
||||
# MDEV-29636 Assertion `part_share->auto_inc_initialized || !can_use_for_auto_inc_init()'
|
||||
# failed in ha_partition::set_auto_increment_if_higher upon REPLACE
|
||||
# with partition pruning
|
||||
#
|
||||
CREATE TABLE t1 (a INT AUTO_INCREMENT PRIMARY KEY) ENGINE='Aria'
|
||||
PARTITION BY RANGE (a) (
|
||||
PARTITION p0 VALUES LESS THAN (10),
|
||||
PARTITION pn VALUES LESS THAN MAXVALUE
|
||||
);
|
||||
REPLACE INTO t1 PARTITION (p0) SELECT 1;
|
||||
DROP TABLE t1;
|
||||
#
|
||||
# MDEV-21027 Assertion `part_share->auto_inc_initialized || !can_use_for_auto_inc_init()'
|
||||
# ha_partition::set_auto_increment_if_higher
|
||||
#
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user