File: binlog_write_error.test

package info (click to toggle)
mariadb 1%3A11.8.3-1
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 772,520 kB
  • sloc: ansic: 2,414,714; cpp: 1,791,394; asm: 381,336; perl: 62,905; sh: 49,647; pascal: 40,897; java: 39,363; python: 20,791; yacc: 20,432; sql: 17,907; xml: 12,344; ruby: 8,544; cs: 6,542; makefile: 6,145; ada: 1,879; lex: 1,193; javascript: 996; objc: 80; tcl: 73; awk: 46; php: 22
file content (84 lines) | stat: -rw-r--r-- 2,179 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
#
# This file is included by binlog_encryption.binlog_write_error
# Please check all dependent tests after modifying it
#

#
# === Name ===
#
# binlog_write_error.test
#
# === Description ===
#
# This test case check if the error of writing binlog file is properly
# reported and handled when executing statements.
#
# === Related Bugs ===
#
# BUG#37148
#

source include/have_debug.inc;
source include/have_binlog_format_mixed_or_statement.inc;

call mtr.add_suppression("Write to binary log failed: Error writing file*");

--echo #
--echo # Test injecting binlog write error when executing queries
--echo #

let $query= CREATE TABLE t1 (a INT);
source include/binlog_inject_error.inc;

INSERT INTO t1 VALUES (1),(2),(3);

let $query= INSERT INTO t1 VALUES (4),(5),(6);
source include/binlog_inject_error.inc;

let $query= UPDATE t1 set a=a+1;
source include/binlog_inject_error.inc;

let $query= DELETE FROM t1;
source include/binlog_inject_error.inc;

let $query= CREATE TRIGGER tr1 AFTER INSERT ON t1 FOR EACH ROW INSERT INTO t1 VALUES (new.a + 100);
source include/binlog_inject_error.inc;

let $query= DROP TRIGGER tr1;
source include/binlog_inject_error.inc;

let $query= ALTER TABLE t1 ADD (b INT);
source include/binlog_inject_error.inc;

let $query= CREATE VIEW v1 AS SELECT a FROM t1;
source include/binlog_inject_error.inc;

let $query= DROP VIEW v1;
source include/binlog_inject_error.inc;

let $query= CREATE PROCEDURE p1(OUT rows_cnt INT) SELECT count(*) INTO rows_cnt FROM t1;
source include/binlog_inject_error.inc;

let $query= DROP PROCEDURE p1;
source include/binlog_inject_error.inc;

let $query= DROP TABLE t1;
source include/binlog_inject_error.inc;

let $query= CREATE FUNCTION f1() RETURNS INT return 1;
source include/binlog_inject_error.inc;

let $query= DROP FUNCTION f1;
source include/binlog_inject_error.inc;

let $query= CREATE USER user1;
source include/binlog_inject_error.inc;

let $query= REVOKE ALL PRIVILEGES, GRANT OPTION FROM user1;
source include/binlog_inject_error.inc;

let $query= SET PASSWORD FOR user1=PASSWORD('foobar');
source include/binlog_inject_error.inc;

let $query= DROP USER user1;
source include/binlog_inject_error.inc;