File: rpl_rotate_binlog_master_key_errors.test

package info (click to toggle)
mysql-8.0 8.0.43-3
  • links: PTS, VCS
  • area: main
  • in suites: sid
  • size: 1,273,924 kB
  • sloc: cpp: 4,684,605; ansic: 412,450; pascal: 108,398; java: 83,641; perl: 30,221; cs: 27,067; sql: 26,594; sh: 24,181; python: 21,816; yacc: 17,169; php: 11,522; xml: 7,388; javascript: 7,076; makefile: 2,194; lex: 1,075; awk: 670; asm: 520; objc: 183; ruby: 97; lisp: 86
file content (79 lines) | stat: -rw-r--r-- 3,182 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
# ==== Purpose ====
#
# To cover error branches when executing the command
# 'ALTER INSTANCE ROTATE BINLOG MASTER KEY' on a binlogless slave.
#
# ==== Implementation ====
#
# Please see rpl_rotate_binlog_master_key_errors.inc
#
# ==== References ====
#
# Wl#12080 Add support to binary log encryption key rotation and cleanup

--source include/master-slave.inc
--source include/have_binlog_format_row.inc
--source include/have_debug.inc
--source include/have_debug_sync.inc

--source include/rpl_connection_slave.inc
call mtr.add_suppression("You need to use --log-bin to make --binlog-format work.");
--let $SLAVE_DATADIR= `select @@datadir`
--let $relay_log_base=`SELECT @@GLOBAL.relay_log`

--let $first_relay_log_suffix=.000001
--let $rpl_log_file=$SLAVE_DATADIR$relay_log_base$first_relay_log_suffix
--source include/rpl_get_log_encryption_key_id.inc
--let $assert_text=The first relay log is encrypted using first master key
--let $assert_cond= RIGHT("$rpl_encryption_key_id", 2) = "_1"
--source include/assert.inc

--source include/rpl_connection_master.inc
CREATE TABLE t1 (c1 INT);
INSERT INTO t1 VALUES (1);

--source include/sync_slave_sql_with_master.inc

# Verify that an error 'ER_BINLOG_MASTER_KEY_ROTATION_FAIL_TO_REENCRYPT_LOG'
# is emitted to the client side on binlogless slave when executing the
# command 'ALTER INSTANCE ROTATE BINLOG MASTER KEY' if there is an error
# decrypting file password when re-encrypting a log file.
--echo # Part 1: fail_to_decrypt_file_password
--let $debug_point=fail_to_decrypt_file_password
--let $expected_error=ER_BINLOG_MASTER_KEY_ROTATION_FAIL_TO_REENCRYPT_LOG
--let $current_master_key_id=2
--let $rotated_master_key_id=3
--let $before_relay_log_suffix=.000003
--let $after_relay_log_suffix=.000004
--source suite/rpl/include/rpl_rotate_binlog_master_key_errors.inc

# Verify that an error 'ER_BINLOG_MASTER_KEY_ROTATION_FAIL_TO_REENCRYPT_LOG' is emitted
# to the client side on binlogless slave when executing the command
# 'ALTER INSTANCE ROTATE BINLOG MASTER KEY' if there is an
# error when opening a log file for re-encryption.
--echo # Part 2: fail_to_open_log_file
--let $debug_point=fail_to_open_log_file
--let $expected_error=ER_BINLOG_MASTER_KEY_ROTATION_FAIL_TO_REENCRYPT_LOG
--let $current_master_key_id=4
--let $rotated_master_key_id=5
--let $before_relay_log_suffix=.000005
--let $after_relay_log_suffix=.000006
--source suite/rpl/include/rpl_rotate_binlog_master_key_errors.inc

# Verify that an error 'ER_BINLOG_MASTER_KEY_ROTATION_FAIL_TO_REENCRYPT_LOG' is emitted
# to the client side on binlogless slave when executing the command
# 'ALTER INSTANCE ROTATE BINLOG MASTER KEY' if there is an
# error when opening an index file for re-encryption.
--echo # Part 3: fail_to_open_index_file
--let $debug_point=fail_to_open_index_file
--let $expected_error=ER_BINLOG_MASTER_KEY_ROTATION_FAIL_TO_REENCRYPT_LOG
--let $current_master_key_id=6
--let $rotated_master_key_id=7
--let $before_relay_log_suffix=.000007
--let $after_relay_log_suffix=.000008
--source suite/rpl/include/rpl_rotate_binlog_master_key_errors.inc

# Cleanup
--source include/rpl_connection_master.inc
DROP TABLE t1;
--source include/rpl_end.inc