summaryrefslogtreecommitdiff
path: root/mysql-test/suite/funcs_1/r/is_user_privileges.result
diff options
context:
space:
mode:
authorMonty <monty@mariadb.org>2014-10-07 11:37:36 +0300
committerMonty <monty@mariadb.org>2014-10-07 11:37:36 +0300
commitcc8aed3eb7a671d353c453a255b53e8d91d7fa73 (patch)
tree27989f6009e4fd08c1c9dde9df1d77c56a4f1fa3 /mysql-test/suite/funcs_1/r/is_user_privileges.result
parent1a7d17311c8325a072e5c912a2eb3fffb95aa97d (diff)
downloadmariadb-git-cc8aed3eb7a671d353c453a255b53e8d91d7fa73.tar.gz
MDEV 4427: query timeouts
Added MAX_STATEMENT_TIME user variable to automaticly kill queries after a given time limit has expired. - Added timer functions based on pthread_cond_timedwait - Added kill_handlerton() to signal storage engines about kill/timeout - Added support for GRANT ... MAX_STATEMENT_TIME=# - Copy max_statement_time to current user, if stored in mysql.user - Added status variable max_statement_time_exceeded - Added KILL_TIMEOUT - Removed digest hash from performance schema tests as they change all the time. - Updated test results that changed because of the new user variables or new fields in mysql.user This functionallity is inspired by work done by Davi Arnaut at twitter. Test case is copied from Davi's work. Documentation can be found at https://kb.askmonty.org/en/how-to-limittimeout-queries/ mysql-test/r/mysqld--help.result: Updated for new help message mysql-test/suite/perfschema/r/all_instances.result: Added new mutex mysql-test/suite/sys_vars/r/max_statement_time_basic.result: Added testing of max_statement_time mysql-test/suite/sys_vars/t/max_statement_time_basic.test: Added testing of max_statement_time mysql-test/t/max_statement_time.test: Added testing of max_statement_time mysys/CMakeLists.txt: Added thr_timer mysys/my_init.c: mysys/mysys_priv.h: Added new mutex and condition variables Added new mutex and condition variables mysys/thr_timer.c: Added timer functions based on pthread_cond_timedwait() This can be compiled with HAVE_TIMER_CREATE to benchmark agains timer_create()/timer_settime() sql/lex.h: Added MAX_STATEMENT_TIME sql/log_event.cc: Safety fix (timeout should be threated as an interrupted query) sql/mysqld.cc: Added support for timers Added status variable max_statement_time_exceeded sql/share/errmsg-utf8.txt: Added ER_QUERY_TIMEOUT sql/signal_handler.cc: Added support for KILL_TIMEOUT sql/sql_acl.cc: Added support for GRANT ... MAX_STATEMENT_TIME=# Copy max_statement_time to current user sql/sql_class.cc: Added timer functionality to THD. Added thd_kill_timeout() sql/sql_class.h: Added timer functionality to THD. Added KILL_TIMEOUT Added max_statement_time variable in similar manner as long_query_time was done. sql/sql_connect.cc: Added handling of max_statement_time_exceeded sql/sql_parse.cc: Added starting and stopping timers for queries. sql/sql_show.cc: Added max_statement_time_exceeded for user/connects status in MariaDB 10.0 sql/sql_yacc.yy: Added support for GRANT ... MAX_STATEMENT_TIME=# syntax, to be enabled in 10.0 sql/structs.h: Added max_statement_time user resource sql/sys_vars.cc: Added max_statement_time variables mysql-test/suite/roles/create_and_drop_role_invalid_user_table.test Removed test as we require all fields in mysql.user table. scripts/mysql_system_tables.sql scripts/mysql_system_tables_data.sql scripts/mysql_system_tables_fix.sql Updated mysql.user with new max_statement_time field
Diffstat (limited to 'mysql-test/suite/funcs_1/r/is_user_privileges.result')
-rw-r--r--mysql-test/suite/funcs_1/r/is_user_privileges.result33
1 files changed, 33 insertions, 0 deletions
diff --git a/mysql-test/suite/funcs_1/r/is_user_privileges.result b/mysql-test/suite/funcs_1/r/is_user_privileges.result
index 5296a37c98d..dfbe50ad862 100644
--- a/mysql-test/suite/funcs_1/r/is_user_privileges.result
+++ b/mysql-test/suite/funcs_1/r/is_user_privileges.result
@@ -132,6 +132,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser2
Password
@@ -177,6 +178,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser3
Password
@@ -222,6 +224,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
#
# Add GRANT OPTION db_datadict.* to testuser1;
GRANT UPDATE ON db_datadict.* TO 'testuser1'@'localhost' WITH GRANT OPTION;
@@ -291,6 +294,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser2
Password
@@ -336,6 +340,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser3
Password
@@ -381,6 +386,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
# Establish connection testuser1 (user=testuser1)
SELECT * FROM information_schema.user_privileges
WHERE grantee LIKE '''testuser%'''
@@ -436,6 +442,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser2
Password
@@ -481,6 +488,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser3
Password
@@ -526,6 +534,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
SHOW GRANTS;
Grants for testuser1@localhost
GRANT USAGE ON *.* TO 'testuser1'@'localhost'
@@ -603,6 +612,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser2
Password
@@ -648,6 +658,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser3
Password
@@ -693,6 +704,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
GRANT SELECT ON *.* TO 'testuser1'@'localhost' WITH GRANT OPTION;
#
# Here <SELECT YES> is shown correctly for testuser1;
@@ -762,6 +774,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser2
Password
@@ -807,6 +820,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser3
Password
@@ -852,6 +866,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
# Switch to connection testuser1
SELECT * FROM information_schema.user_privileges
WHERE grantee LIKE '''testuser%'''
@@ -907,6 +922,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser2
Password
@@ -952,6 +968,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser3
Password
@@ -997,6 +1014,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
SHOW GRANTS;
Grants for testuser1@localhost
GRANT SELECT ON *.* TO 'testuser1'@'localhost' WITH GRANT OPTION
@@ -1104,6 +1122,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser2
Password
@@ -1149,6 +1168,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser3
Password
@@ -1194,6 +1214,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
# Switch to connection testuser1
SELECT * FROM information_schema.user_privileges
WHERE grantee LIKE '''testuser%'''
@@ -1296,6 +1317,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser2
Password
@@ -1341,6 +1363,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser3
Password
@@ -1386,6 +1409,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
# Switch to connection testuser1
SELECT * FROM information_schema.user_privileges
WHERE grantee LIKE '''testuser%'''
@@ -1441,6 +1465,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser2
Password
@@ -1486,6 +1511,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser3
Password
@@ -1531,6 +1557,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
SHOW GRANTS;
Grants for testuser1@localhost
GRANT USAGE ON *.* TO 'testuser1'@'localhost'
@@ -1593,6 +1620,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser2
Password
@@ -1638,6 +1666,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser3
Password
@@ -1683,6 +1712,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
SHOW GRANTS;
Grants for testuser1@localhost
GRANT USAGE ON *.* TO 'testuser1'@'localhost'
@@ -1760,6 +1790,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser2
Password
@@ -1805,6 +1836,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
Host localhost
User testuser3
Password
@@ -1850,6 +1882,7 @@ authentication_string
password_expired N
is_role N
default_role
+max_statement_time 0.000000
# Switch to connection testuser1
SELECT * FROM information_schema.user_privileges
WHERE grantee LIKE '''testuser%'''