Слияние кода завершено, страница обновится автоматически
// Copyright 2016 PingCAP, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// See the License for the specific language governing permissions and
// limitations under the License.
package ast_test
import (
. "github.com/hanchuanchuan/goInception/ast"
"github.com/hanchuanchuan/goInception/parser"
"github.com/hanchuanchuan/goInception/util/auth"
. "github.com/pingcap/check"
)
var _ = Suite(&testMiscSuite{})
type testMiscSuite struct {
}
type visitor struct{}
func (v visitor) Enter(in Node) (Node, bool) {
return in, false
}
func (v visitor) Leave(in Node) (Node, bool) {
return in, true
}
type visitor1 struct {
visitor
}
func (visitor1) Enter(in Node) (Node, bool) {
return in, true
}
func (ts *testMiscSuite) TestMiscVisitorCover(c *C) {
stmts := []Node{
&AdminStmt{},
&AlterUserStmt{},
&BeginStmt{},
&BinlogStmt{},
&CommitStmt{},
&CreateUserStmt{},
&DeallocateStmt{},
&DoStmt{},
&ExecuteStmt{UsingVars: []ExprNode{&ValueExpr{}}},
&ExplainStmt{Stmt: &ShowStmt{}},
&GrantStmt{},
&PrepareStmt{SQLVar: &VariableExpr{Value: &ValueExpr{}}},
&RollbackStmt{},
&SetPwdStmt{},
&SetStmt{Variables: []*VariableAssignment{
{
Value: &ValueExpr{},
},
}},
&UseStmt{},
&AnalyzeTableStmt{
TableNames: []*TableName{
{},
},
},
&FlushStmt{},
&PrivElem{},
&VariableAssignment{Value: &ValueExpr{}},
&KillStmt{},
&DropStatsStmt{Table: &TableName{}},
}
for _, v := range stmts {
v.Accept(visitor{})
v.Accept(visitor1{})
}
}
func (ts *testMiscSuite) TestDDLVisitorCover(c *C) {
sql := `
create table t (c1 smallint unsigned, c2 int unsigned);
alter table t add column a smallint unsigned after b;
create index t_i on t (id);
create database test character set utf8;
drop database test;
drop index t_i on t;
drop table t;
truncate t;
create table t (
jobAbbr char(4) not null,
constraint foreign key (jobabbr) references ffxi_jobtype (jobabbr) on delete cascade on update cascade
);
`
parse := parser.New()
stmts, _, err := parse.Parse(sql, "", "")
c.Assert(err, IsNil)
for _, stmt := range stmts {
stmt.Accept(visitor{})
stmt.Accept(visitor1{})
}
}
func (ts *testMiscSuite) TestDMLVistorCover(c *C) {
sql := `delete from somelog where user = 'jcole' order by timestamp_column limit 1;
delete t1, t2 from t1 inner join t2 inner join t3 where t1.id=t2.id and t2.id=t3.id;
select * from t where exists(select * from t k where t.c = k.c having sum(c) = 1);
insert into t_copy select * from t where t.x > 5;
(select /*+ TIDB_INLJ(t1) */ a from t1 where a=10 and b=1) union (select /*+ TIDB_SMJ(t2) */ a from t2 where a=11 and b=2) order by a limit 10;
update t1 set col1 = col1 + 1, col2 = col1;
show create table t;
load data infile '/tmp/t.csv' into table t fields terminated by 'ab' enclosed by 'b';`
p := parser.New()
stmts, _, err := p.Parse(sql, "", "")
c.Assert(err, IsNil)
for _, stmt := range stmts {
stmt.Accept(visitor{})
stmt.Accept(visitor1{})
}
}
func (ts *testMiscSuite) TestSensitiveStatement(c *C) {
positive := []StmtNode{
&SetPwdStmt{},
&CreateUserStmt{},
&AlterUserStmt{},
&GrantStmt{},
}
for i, stmt := range positive {
_, ok := stmt.(SensitiveStmtNode)
c.Assert(ok, IsTrue, Commentf("%d, %#v fail", i, stmt))
}
negative := []StmtNode{
&DropUserStmt{},
&RevokeStmt{},
&AlterTableStmt{},
&CreateDatabaseStmt{},
&CreateIndexStmt{},
&CreateTableStmt{},
&DropDatabaseStmt{},
&DropIndexStmt{},
&DropTableStmt{},
&RenameTableStmt{},
&TruncateTableStmt{},
}
for _, stmt := range negative {
_, ok := stmt.(SensitiveStmtNode)
c.Assert(ok, IsFalse)
}
}
func (ts *testMiscSuite) TestUserSpec(c *C) {
hashString := "*3D56A309CD04FA2EEF181462E59011F075C89548"
u := UserSpec{
User: &auth.UserIdentity{
Username: "test",
},
AuthOpt: &AuthOption{
ByAuthString: false,
AuthString: "xxx",
HashString: hashString,
},
}
pwd, ok := u.EncodedPassword()
c.Assert(ok, IsTrue)
c.Assert(pwd, Equals, u.AuthOpt.HashString)
u.AuthOpt.HashString = "not-good-password-format"
pwd, ok = u.EncodedPassword()
c.Assert(ok, IsFalse)
u.AuthOpt.ByAuthString = true
pwd, ok = u.EncodedPassword()
c.Assert(ok, IsTrue)
c.Assert(pwd, Equals, hashString)
u.AuthOpt.AuthString = ""
pwd, ok = u.EncodedPassword()
c.Assert(ok, IsTrue)
c.Assert(pwd, Equals, "")
}
Вы можете оставить комментарий после Вход в систему
Неприемлемый контент может быть отображен здесь и не будет показан на странице. Вы можете проверить и изменить его с помощью соответствующей функции редактирования.
Если вы подтверждаете, что содержание не содержит непристойной лексики/перенаправления на рекламу/насилия/вульгарной порнографии/нарушений/пиратства/ложного/незначительного или незаконного контента, связанного с национальными законами и предписаниями, вы можете нажать «Отправить» для подачи апелляции, и мы обработаем ее как можно скорее.
Опубликовать ( 0 )