⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.124
Server IP:
50.28.103.30
Server:
Linux host.jcukjv-lwsites.com 4.18.0-553.22.1.el8_10.x86_64 #1 SMP Tue Sep 24 05:16:59 EDT 2024 x86_64
Server Software:
nginx/1.28.0
PHP Version:
8.3.12
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
www
/
server
/
mysql
/
mysql-test
/
suite
/
binlog
/
t
/
View File Name :
binlog_write_error.test
# # === Name === # # binlog_write_error.test # # === Description === # # This test case check if the error of writing binlog file is properly # reported and handled when executing statements. # # === Related Bugs === # # BUG#37148 # source include/have_log_bin.inc; source include/have_debug.inc; source include/have_binlog_format_mixed_or_statement.inc; CALL mtr.add_suppression("The content of the statement cache is corrupted " "while writing a rollback record of the transaction " "to the binary log. An incident event has been " "written to the binary log which will stop the " "slaves."); --echo # --echo # Initialization --echo # disable_warnings; DROP TABLE IF EXISTS t1, t2; DROP FUNCTION IF EXISTS f1; DROP FUNCTION IF EXISTS f2; DROP PROCEDURE IF EXISTS p1; DROP PROCEDURE IF EXISTS p2; DROP TRIGGER IF EXISTS tr1; DROP TRIGGER IF EXISTS tr2; DROP VIEW IF EXISTS v1, v2; enable_warnings; --echo # --echo # Test injecting binlog write error when executing queries --echo # let $query= CREATE TABLE t1 (a INT); source include/binlog_inject_error.inc; INSERT INTO t1 VALUES (1),(2),(3); let $query= INSERT INTO t1 VALUES (4),(5),(6); source include/binlog_inject_error.inc; let $query= UPDATE t1 set a=a+1; source include/binlog_inject_error.inc; let $query= DELETE FROM t1; source include/binlog_inject_error.inc; let $query= CREATE TRIGGER tr1 AFTER INSERT ON t1 FOR EACH ROW INSERT INTO t1 VALUES (new.a + 100); source include/binlog_inject_error.inc; let $query= DROP TRIGGER tr1; source include/binlog_inject_error.inc; let $query= ALTER TABLE t1 ADD (b INT); source include/binlog_inject_error.inc; let $query= CREATE VIEW v1 AS SELECT a FROM t1; source include/binlog_inject_error.inc; let $query= DROP VIEW v1; source include/binlog_inject_error.inc; let $query= CREATE PROCEDURE p1(OUT rows INT) SELECT count(*) INTO rows FROM t1; source include/binlog_inject_error.inc; let $query= DROP PROCEDURE p1; source include/binlog_inject_error.inc; let $query= DROP TABLE t1; source include/binlog_inject_error.inc; let $query= CREATE FUNCTION f1() RETURNS INT return 1; source include/binlog_inject_error.inc; let $query= DROP FUNCTION f1; source include/binlog_inject_error.inc; let $query= CREATE USER user1; source include/binlog_inject_error.inc; let $query= REVOKE ALL PRIVILEGES, GRANT OPTION FROM user1; source include/binlog_inject_error.inc; let $query= DROP USER user1; source include/binlog_inject_error.inc; --echo # --echo # Cleanup --echo # disable_warnings; DROP TABLE IF EXISTS t1, t2; DROP FUNCTION IF EXISTS f1; DROP PROCEDURE IF EXISTS p1; DROP TRIGGER IF EXISTS tr1; DROP VIEW IF EXISTS v1, v2; enable_warnings;