Password stored in mysql.user of TIDB is the format of SHA1(pwd), which is not compatible with MySQL. Different password format will cause user migrate data from MySQL login failed on TIDB.
235 lines
7.6 KiB
Go
235 lines
7.6 KiB
Go
// Copyright 2016 PingCAP, Inc.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package tidb
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
. "github.com/pingcap/check"
|
|
"github.com/pingcap/tidb/context"
|
|
"github.com/pingcap/tidb/kv"
|
|
"github.com/pingcap/tidb/meta"
|
|
"github.com/pingcap/tidb/parser"
|
|
"github.com/pingcap/tidb/sessionctx"
|
|
"github.com/pingcap/tidb/sessionctx/variable"
|
|
"github.com/pingcap/tidb/util"
|
|
"github.com/pingcap/tidb/util/testleak"
|
|
)
|
|
|
|
var _ = Suite(&testBootstrapSuite{})
|
|
|
|
type testBootstrapSuite struct {
|
|
dbName string
|
|
dbNameBootstrap string
|
|
}
|
|
|
|
func (s *testBootstrapSuite) SetUpSuite(c *C) {
|
|
s.dbName = "test_bootstrap"
|
|
s.dbNameBootstrap = "test_main_db_bootstrap"
|
|
}
|
|
|
|
func (s *testBootstrapSuite) TestBootstrap(c *C) {
|
|
defer testleak.AfterTest(c)()
|
|
store := newStoreWithBootstrap(c, s.dbName)
|
|
se := newSession(c, store, s.dbName)
|
|
mustExecSQL(c, se, "USE mysql;")
|
|
r := mustExecSQL(c, se, `select * from user;`)
|
|
c.Assert(r, NotNil)
|
|
row, err := r.Next()
|
|
c.Assert(err, IsNil)
|
|
c.Assert(row, NotNil)
|
|
match(c, row.Data, []byte("%"), []byte("root"), []byte(""), "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y")
|
|
|
|
c.Assert(se.Auth("root@anyhost", []byte(""), []byte("")), IsTrue)
|
|
mustExecSQL(c, se, "USE test;")
|
|
// Check privilege tables.
|
|
mustExecSQL(c, se, "SELECT * from mysql.db;")
|
|
mustExecSQL(c, se, "SELECT * from mysql.tables_priv;")
|
|
mustExecSQL(c, se, "SELECT * from mysql.columns_priv;")
|
|
// Check privilege tables.
|
|
r = mustExecSQL(c, se, "SELECT COUNT(*) from mysql.global_variables;")
|
|
c.Assert(r, NotNil)
|
|
v, err := r.Next()
|
|
c.Assert(err, IsNil)
|
|
c.Assert(v.Data[0].GetInt64(), Equals, globalVarsCount())
|
|
|
|
// Check a storage operations are default autocommit after the second start.
|
|
mustExecSQL(c, se, "USE test;")
|
|
mustExecSQL(c, se, "drop table if exists t")
|
|
mustExecSQL(c, se, "create table t (id int)")
|
|
delete(storeBootstrapped, store.UUID())
|
|
se.Close()
|
|
se, err = CreateSession(store)
|
|
c.Assert(err, IsNil)
|
|
mustExecSQL(c, se, "USE test;")
|
|
mustExecSQL(c, se, "insert t values (?)", 3)
|
|
se, err = CreateSession(store)
|
|
c.Assert(err, IsNil)
|
|
mustExecSQL(c, se, "USE test;")
|
|
r = mustExecSQL(c, se, "select * from t")
|
|
c.Assert(r, NotNil)
|
|
v, err = r.Next()
|
|
c.Assert(err, IsNil)
|
|
match(c, v.Data, 3)
|
|
mustExecSQL(c, se, "drop table if exists t")
|
|
se.Close()
|
|
|
|
// Try to do bootstrap dml jobs on an already bootstraped TiDB system will not cause fatal.
|
|
// For https://github.com/pingcap/tidb/issues/1096
|
|
store = newStore(c, s.dbName)
|
|
se, err = CreateSession(store)
|
|
c.Assert(err, IsNil)
|
|
doDMLWorks(se)
|
|
|
|
err = store.Close()
|
|
c.Assert(err, IsNil)
|
|
}
|
|
|
|
func globalVarsCount() int64 {
|
|
var count int64
|
|
for _, v := range variable.SysVars {
|
|
if v.Scope != variable.ScopeSession {
|
|
count++
|
|
}
|
|
}
|
|
return count
|
|
}
|
|
|
|
// bootstrapWithOnlyDDLWork creates a new session on store but only do ddl works.
|
|
func (s *testBootstrapSuite) bootstrapWithOnlyDDLWork(store kv.Storage, c *C) {
|
|
ss := &session{
|
|
store: store,
|
|
parser: parser.New(),
|
|
sessionVars: variable.NewSessionVars(),
|
|
}
|
|
ss.mu.values = make(map[fmt.Stringer]interface{})
|
|
ss.SetValue(context.Initing, true)
|
|
domain, err := domap.Get(store)
|
|
c.Assert(err, IsNil)
|
|
sessionctx.BindDomain(ss, domain)
|
|
sessionMu.Lock()
|
|
defer sessionMu.Unlock()
|
|
b, err := checkBootstrapped(ss)
|
|
c.Assert(b, IsFalse)
|
|
c.Assert(err, IsNil)
|
|
doDDLWorks(ss)
|
|
// Leave dml unfinished.
|
|
}
|
|
|
|
// testBootstrapWithError :
|
|
// When a session failed in bootstrap process (for example, the session is killed after doDDLWorks()).
|
|
// We should make sure that the following session could finish the bootstrap process.
|
|
func (s *testBootstrapSuite) testBootstrapWithError(c *C) {
|
|
defer testleak.AfterTest(c)()
|
|
store := newStore(c, s.dbNameBootstrap)
|
|
s.bootstrapWithOnlyDDLWork(store, c)
|
|
|
|
BootstrapSession(store)
|
|
se := newSession(c, store, s.dbNameBootstrap)
|
|
mustExecSQL(c, se, "USE mysql;")
|
|
r := mustExecSQL(c, se, `select * from user;`)
|
|
row, err := r.Next()
|
|
c.Assert(err, IsNil)
|
|
c.Assert(row, NotNil)
|
|
match(c, row.Data, []byte("%"), []byte("root"), []byte(""), "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y", "Y")
|
|
mustExecSQL(c, se, "USE test;")
|
|
// Check privilege tables.
|
|
mustExecSQL(c, se, "SELECT * from mysql.db;")
|
|
mustExecSQL(c, se, "SELECT * from mysql.tables_priv;")
|
|
mustExecSQL(c, se, "SELECT * from mysql.columns_priv;")
|
|
// Check global variables.
|
|
r = mustExecSQL(c, se, "SELECT COUNT(*) from mysql.global_variables;")
|
|
v, err := r.Next()
|
|
c.Assert(err, IsNil)
|
|
c.Assert(v.Data[0].GetInt64(), Equals, globalVarsCount())
|
|
|
|
r = mustExecSQL(c, se, `SELECT VARIABLE_VALUE from mysql.TiDB where VARIABLE_NAME="bootstrapped";`)
|
|
row, err = r.Next()
|
|
c.Assert(err, IsNil)
|
|
c.Assert(row, NotNil)
|
|
c.Assert(row.Data, HasLen, 1)
|
|
c.Assert(row.Data[0].GetBytes(), BytesEquals, []byte("True"))
|
|
|
|
err = store.Close()
|
|
c.Assert(err, IsNil)
|
|
}
|
|
|
|
// TestUpgrade tests upgrading
|
|
func (s *testBootstrapSuite) TestUpgrade(c *C) {
|
|
defer testleak.AfterTest(c)()
|
|
store := newStoreWithBootstrap(c, s.dbName)
|
|
se := newSession(c, store, s.dbName)
|
|
mustExecSQL(c, se, "USE mysql;")
|
|
|
|
// bootstrap with currentBootstrapVersion
|
|
r := mustExecSQL(c, se, `SELECT VARIABLE_VALUE from mysql.TiDB where VARIABLE_NAME="tidb_server_version";`)
|
|
row, err := r.Next()
|
|
c.Assert(err, IsNil)
|
|
c.Assert(row, NotNil)
|
|
c.Assert(row.Data, HasLen, 1)
|
|
c.Assert(row.Data[0].GetBytes(), BytesEquals, []byte(fmt.Sprintf("%d", currentBootstrapVersion)))
|
|
|
|
se1 := newSession(c, store, s.dbName)
|
|
ver, err := getBootstrapVersion(se1)
|
|
c.Assert(err, IsNil)
|
|
c.Assert(ver, Equals, int64(currentBootstrapVersion))
|
|
|
|
// Do something to downgrade the store.
|
|
// downgrade meta bootstrap version
|
|
txn, err := store.Begin()
|
|
c.Assert(err, IsNil)
|
|
m := meta.NewMeta(txn)
|
|
err = m.FinishBootstrap(int64(1))
|
|
c.Assert(err, IsNil)
|
|
err = txn.Commit()
|
|
c.Assert(err, IsNil)
|
|
mustExecSQL(c, se1, `delete from mysql.TiDB where VARIABLE_NAME="tidb_server_version";`)
|
|
mustExecSQL(c, se1, fmt.Sprintf(`delete from mysql.global_variables where VARIABLE_NAME="%s";`,
|
|
variable.TiDBDistSQLScanConcurrency))
|
|
mustExecSQL(c, se1, `commit;`)
|
|
delete(storeBootstrapped, store.UUID())
|
|
// Make sure the version is downgraded.
|
|
r = mustExecSQL(c, se1, `SELECT VARIABLE_VALUE from mysql.TiDB where VARIABLE_NAME="tidb_server_version";`)
|
|
row, err = r.Next()
|
|
c.Assert(err, IsNil)
|
|
c.Assert(row, IsNil)
|
|
|
|
ver, err = getBootstrapVersion(se1)
|
|
c.Assert(err, IsNil)
|
|
c.Assert(ver, Equals, int64(0))
|
|
|
|
// Create a new session then upgrade() will run automatically.
|
|
BootstrapSession(store)
|
|
se2 := newSession(c, store, s.dbName)
|
|
r = mustExecSQL(c, se2, `SELECT VARIABLE_VALUE from mysql.TiDB where VARIABLE_NAME="tidb_server_version";`)
|
|
row, err = r.Next()
|
|
c.Assert(err, IsNil)
|
|
c.Assert(row, NotNil)
|
|
c.Assert(row.Data, HasLen, 1)
|
|
c.Assert(row.Data[0].GetBytes(), BytesEquals, []byte(fmt.Sprintf("%d", currentBootstrapVersion)))
|
|
|
|
ver, err = getBootstrapVersion(se2)
|
|
c.Assert(err, IsNil)
|
|
c.Assert(ver, Equals, int64(currentBootstrapVersion))
|
|
}
|
|
|
|
func (s *testBootstrapSuite) TestOldPasswordUpgrade(c *C) {
|
|
defer testleak.AfterTest(c)()
|
|
pwd := "abc"
|
|
oldpwd := fmt.Sprintf("%X", util.Sha1Hash([]byte(pwd)))
|
|
newpwd, err := oldPasswordUpgrade(oldpwd)
|
|
c.Assert(err, IsNil)
|
|
c.Assert(newpwd, Equals, "*0D3CED9BEC10A777AEC23CCC353A8C08A633045E")
|
|
}
|