Files
tidb/testkit/testkit.go
2023-03-03 21:21:23 +08:00

540 lines
17 KiB
Go

// Copyright 2021 PingCAP, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//go:build !codes
package testkit
import (
"context"
"fmt"
"runtime"
"strings"
"sync"
"testing"
"time"
"github.com/pingcap/errors"
"github.com/pingcap/tidb/expression"
"github.com/pingcap/tidb/kv"
"github.com/pingcap/tidb/parser/ast"
"github.com/pingcap/tidb/parser/terror"
"github.com/pingcap/tidb/session"
"github.com/pingcap/tidb/sessionctx/variable"
"github.com/pingcap/tidb/util/chunk"
"github.com/pingcap/tidb/util/intest"
"github.com/pingcap/tidb/util/mathutil"
"github.com/pingcap/tidb/util/sqlexec"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/tikv/client-go/v2/tikv"
"github.com/tikv/client-go/v2/tikvrpc"
"go.uber.org/atomic"
)
var testKitIDGenerator atomic.Uint64
// TestKit is a utility to run sql test.
type TestKit struct {
require *require.Assertions
assert *assert.Assertions
t testing.TB
store kv.Storage
session session.Session
alloc chunk.Allocator
}
// NewTestKit returns a new *TestKit.
func NewTestKit(t testing.TB, store kv.Storage) *TestKit {
require.True(t, intest.InTest, "you should add --tags=intest when to test, see https://pingcap.github.io/tidb-dev-guide/get-started/setup-an-ide.html for help")
runtime.GOMAXPROCS(mathutil.Min(16, runtime.GOMAXPROCS(0)))
tk := &TestKit{
require: require.New(t),
assert: assert.New(t),
t: t,
store: store,
alloc: chunk.NewAllocator(),
}
tk.RefreshSession()
dom, _ := session.GetDomain(store)
sm := dom.InfoSyncer().GetSessionManager()
if sm != nil {
mockSm, ok := sm.(*MockSessionManager)
if ok {
mockSm.mu.Lock()
if mockSm.conn == nil {
mockSm.conn = make(map[uint64]session.Session)
}
mockSm.conn[tk.session.GetSessionVars().ConnectionID] = tk.session
mockSm.mu.Unlock()
}
tk.session.SetSessionManager(sm)
}
return tk
}
// NewTestKitWithSession returns a new *TestKit.
func NewTestKitWithSession(t testing.TB, store kv.Storage, se session.Session) *TestKit {
return &TestKit{
require: require.New(t),
assert: assert.New(t),
t: t,
store: store,
session: se,
alloc: chunk.NewAllocator(),
}
}
// RefreshSession set a new session for the testkit
func (tk *TestKit) RefreshSession() {
tk.session = newSession(tk.t, tk.store)
// enforce sysvar cache loading, ref loadCommonGlobalVariableIfNeeded
tk.MustExec("select 3")
}
// SetSession set the session of testkit
func (tk *TestKit) SetSession(session session.Session) {
tk.session = session
// enforce sysvar cache loading, ref loadCommonGlobalVariableIfNeeded
tk.MustExec("select 3")
}
// Session return the session associated with the testkit
func (tk *TestKit) Session() session.Session {
return tk.session
}
// MustExec executes a sql statement and asserts nil error.
func (tk *TestKit) MustExec(sql string, args ...interface{}) {
defer func() {
if tk.alloc != nil {
tk.alloc.Reset()
}
}()
tk.MustExecWithContext(context.Background(), sql, args...)
}
// MustExecWithContext executes a sql statement and asserts nil error.
func (tk *TestKit) MustExecWithContext(ctx context.Context, sql string, args ...interface{}) {
res, err := tk.ExecWithContext(ctx, sql, args...)
comment := fmt.Sprintf("sql:%s, %v, error stack %v", sql, args, errors.ErrorStack(err))
tk.require.NoError(err, comment)
if res != nil {
tk.require.NoError(res.Close())
}
}
// MustQuery query the statements and returns result rows.
// If expected result is set it asserts the query result equals expected result.
func (tk *TestKit) MustQuery(sql string, args ...interface{}) *Result {
defer func() {
if tk.alloc != nil {
tk.alloc.Reset()
}
}()
return tk.MustQueryWithContext(context.Background(), sql, args...)
}
// MustQueryWithContext query the statements and returns result rows.
func (tk *TestKit) MustQueryWithContext(ctx context.Context, sql string, args ...interface{}) *Result {
comment := fmt.Sprintf("sql:%s, args:%v", sql, args)
rs, err := tk.ExecWithContext(ctx, sql, args...)
tk.require.NoError(err, comment)
tk.require.NotNil(rs, comment)
return tk.ResultSetToResultWithCtx(ctx, rs, comment)
}
// MustIndexLookup checks whether the plan for the sql is IndexLookUp.
func (tk *TestKit) MustIndexLookup(sql string, args ...interface{}) *Result {
tk.require.True(tk.HasPlan(sql, "IndexLookUp", args...))
return tk.MustQuery(sql, args...)
}
// MustPartition checks if the result execution plan must read specific partitions.
func (tk *TestKit) MustPartition(sql string, partitions string, args ...interface{}) *Result {
rs := tk.MustQuery("explain "+sql, args...)
ok := len(partitions) == 0
for i := range rs.rows {
if len(partitions) == 0 && strings.Contains(rs.rows[i][3], "partition:") {
ok = false
}
// The data format is "table: t1, partition: p0,p1,p2"
if len(partitions) != 0 && strings.HasSuffix(rs.rows[i][3], "partition:"+partitions) {
ok = true
}
}
tk.require.True(ok)
return tk.MustQuery(sql, args...)
}
// MustPartitionByList checks if the result execution plan must read specific partitions by list.
func (tk *TestKit) MustPartitionByList(sql string, partitions []string, args ...interface{}) *Result {
rs := tk.MustQuery("explain "+sql, args...)
ok := len(partitions) == 0
for i := range rs.rows {
if ok {
tk.require.NotContains(rs.rows[i][3], "partition:")
}
for index, partition := range partitions {
if !ok && strings.Contains(rs.rows[i][3], "partition:"+partition) {
partitions = append(partitions[:index], partitions[index+1:]...)
}
}
}
if !ok {
tk.require.Len(partitions, 0)
}
return tk.MustQuery(sql, args...)
}
// QueryToErr executes a sql statement and discard results.
func (tk *TestKit) QueryToErr(sql string, args ...interface{}) error {
comment := fmt.Sprintf("sql:%s, args:%v", sql, args)
res, err := tk.Exec(sql, args...)
tk.require.NoError(err, comment)
tk.require.NotNil(res, comment)
_, resErr := session.GetRows4Test(context.Background(), tk.session, res)
tk.require.NoError(res.Close())
return resErr
}
// ResultSetToResult converts sqlexec.RecordSet to testkit.Result.
// It is used to check results of execute statement in binary mode.
func (tk *TestKit) ResultSetToResult(rs sqlexec.RecordSet, comment string) *Result {
return tk.ResultSetToResultWithCtx(context.Background(), rs, comment)
}
// ResultSetToResultWithCtx converts sqlexec.RecordSet to testkit.Result.
func (tk *TestKit) ResultSetToResultWithCtx(ctx context.Context, rs sqlexec.RecordSet, comment string) *Result {
rows, err := session.ResultSetToStringSlice(ctx, tk.session, rs)
tk.require.NoError(err, comment)
return &Result{rows: rows, comment: comment, assert: tk.assert, require: tk.require}
}
// HasPlan checks if the result execution plan contains specific plan.
func (tk *TestKit) HasPlan(sql string, plan string, args ...interface{}) bool {
rs := tk.MustQuery("explain "+sql, args...)
for i := range rs.rows {
if strings.Contains(rs.rows[i][0], plan) {
return true
}
}
return false
}
// HasTiFlashPlan checks if the result execution plan contains TiFlash plan.
func (tk *TestKit) HasTiFlashPlan(sql string, args ...interface{}) bool {
rs := tk.MustQuery("explain "+sql, args...)
for i := range rs.rows {
if strings.Contains(rs.rows[i][2], "tiflash") {
return true
}
}
return false
}
// HasPlanForLastExecution checks if the execution plan of the last execution contains specific plan.
func (tk *TestKit) HasPlanForLastExecution(plan string) bool {
connID := tk.session.GetSessionVars().ConnectionID
rs := tk.MustQuery(fmt.Sprintf("explain for connection %d", connID))
for i := range rs.rows {
if strings.Contains(rs.rows[i][0], plan) {
return true
}
}
return false
}
// HasKeywordInOperatorInfo checks if the result execution plan contains specific keyword in the operator info.
func (tk *TestKit) HasKeywordInOperatorInfo(sql string, keyword string, args ...interface{}) bool {
rs := tk.MustQuery("explain "+sql, args...)
for i := range rs.rows {
if strings.Contains(rs.rows[i][4], keyword) {
return true
}
}
return false
}
// NotHasKeywordInOperatorInfo checks if the result execution plan doesn't contain specific keyword in the operator info.
func (tk *TestKit) NotHasKeywordInOperatorInfo(sql string, keyword string, args ...interface{}) bool {
rs := tk.MustQuery("explain "+sql, args...)
for i := range rs.rows {
if strings.Contains(rs.rows[i][4], keyword) {
return false
}
}
return true
}
// HasPlan4ExplainFor checks if the result execution plan contains specific plan.
func (tk *TestKit) HasPlan4ExplainFor(result *Result, plan string) bool {
for i := range result.rows {
if strings.Contains(result.rows[i][0], plan) {
return true
}
}
return false
}
// Exec executes a sql statement using the prepared stmt API
func (tk *TestKit) Exec(sql string, args ...interface{}) (sqlexec.RecordSet, error) {
return tk.ExecWithContext(context.Background(), sql, args...)
}
// ExecWithContext executes a sql statement using the prepared stmt API
func (tk *TestKit) ExecWithContext(ctx context.Context, sql string, args ...interface{}) (rs sqlexec.RecordSet, err error) {
defer tk.Session().GetSessionVars().ClearAlloc(&tk.alloc, err != nil)
if len(args) == 0 {
sc := tk.session.GetSessionVars().StmtCtx
prevWarns := sc.GetWarnings()
var stmts []ast.StmtNode
if len(stmts) == 0 {
var err error
stmts, err = tk.session.Parse(ctx, sql)
if err != nil {
return nil, errors.Trace(err)
}
}
warns := sc.GetWarnings()
parserWarns := warns[len(prevWarns):]
tk.Session().GetSessionVars().SetAlloc(tk.alloc)
var rs0 sqlexec.RecordSet
for i, stmt := range stmts {
var rs sqlexec.RecordSet
var err error
if s, ok := stmt.(*ast.NonTransactionalDMLStmt); ok {
rs, err = session.HandleNonTransactionalDML(ctx, s, tk.Session())
} else {
rs, err = tk.Session().ExecuteStmt(ctx, stmt)
}
if i == 0 {
rs0 = rs
}
if err != nil {
tk.session.GetSessionVars().StmtCtx.AppendError(err)
return rs, errors.Trace(err)
}
}
if len(parserWarns) > 0 {
tk.session.GetSessionVars().StmtCtx.AppendWarnings(parserWarns)
}
return rs0, nil
}
stmtID, _, _, err := tk.session.PrepareStmt(sql)
if err != nil {
return nil, errors.Trace(err)
}
params := expression.Args2Expressions4Test(args...)
tk.Session().GetSessionVars().SetAlloc(tk.alloc)
rs, err = tk.session.ExecutePreparedStmt(ctx, stmtID, params)
if err != nil {
return rs, errors.Trace(err)
}
err = tk.session.DropPreparedStmt(stmtID)
if err != nil {
return rs, errors.Trace(err)
}
return rs, nil
}
// ExecToErr executes a sql statement and discard results.
func (tk *TestKit) ExecToErr(sql string, args ...interface{}) error {
res, err := tk.Exec(sql, args...)
if res != nil {
tk.require.NoError(res.Close())
}
return err
}
// MustExecToErr executes a sql statement and must return Error.
func (tk *TestKit) MustExecToErr(sql string, args ...interface{}) {
res, err := tk.Exec(sql, args...)
if res != nil {
tk.require.NoError(res.Close())
}
tk.require.Error(err)
}
func newSession(t testing.TB, store kv.Storage) session.Session {
se, err := session.CreateSession4Test(store)
require.NoError(t, err)
se.SetConnectionID(testKitIDGenerator.Inc())
return se
}
// RefreshConnectionID refresh the connection ID for session of the testkit
func (tk *TestKit) RefreshConnectionID() {
if tk.session != nil {
tk.session.SetConnectionID(testKitIDGenerator.Inc())
}
}
// MustGetErrCode executes a sql statement and assert it's error code.
func (tk *TestKit) MustGetErrCode(sql string, errCode int) {
_, err := tk.Exec(sql)
tk.require.Errorf(err, "sql: %s", sql)
originErr := errors.Cause(err)
tErr, ok := originErr.(*terror.Error)
tk.require.Truef(ok, "sql: %s, expect type 'terror.Error', but obtain '%T': %v", sql, originErr, originErr)
sqlErr := terror.ToSQLError(tErr)
tk.require.Equalf(errCode, int(sqlErr.Code), "sql: %s, Assertion failed, origin err:\n %v", sql, sqlErr)
}
// MustGetErrMsg executes a sql statement and assert its error message.
func (tk *TestKit) MustGetErrMsg(sql string, errStr string) {
err := tk.ExecToErr(sql)
tk.require.EqualError(err, errStr)
}
// MustGetDBError executes a sql statement and assert its terror.
func (tk *TestKit) MustGetDBError(sql string, dberr *terror.Error) {
err := tk.ExecToErr(sql)
tk.require.Truef(terror.ErrorEqual(err, dberr), "err %v", err)
}
// MustContainErrMsg executes a sql statement and assert its error message containing errStr.
func (tk *TestKit) MustContainErrMsg(sql string, errStr interface{}) {
err := tk.ExecToErr(sql)
tk.require.Error(err)
tk.require.Contains(err.Error(), errStr)
}
// MustMatchErrMsg executes a sql statement and assert its error message matching errRx.
func (tk *TestKit) MustMatchErrMsg(sql string, errRx interface{}) {
err := tk.ExecToErr(sql)
tk.require.Error(err)
tk.require.Regexp(errRx, err.Error())
}
// MustUseIndex checks if the result execution plan contains specific index(es).
func (tk *TestKit) MustUseIndex(sql string, index string, args ...interface{}) bool {
rs := tk.MustQuery("explain "+sql, args...)
for i := range rs.rows {
if strings.Contains(rs.rows[i][3], "index:"+index) {
return true
}
}
return false
}
// MustUseIndex4ExplainFor checks if the result execution plan contains specific index(es).
func (tk *TestKit) MustUseIndex4ExplainFor(result *Result, index string) bool {
for i := range result.rows {
// It depends on whether we enable to collect the execution info.
if strings.Contains(result.rows[i][3], "index:"+index) {
return true
}
if strings.Contains(result.rows[i][4], "index:"+index) {
return true
}
}
return false
}
// CheckExecResult checks the affected rows and the insert id after executing MustExec.
func (tk *TestKit) CheckExecResult(affectedRows, insertID int64) {
tk.require.Equal(int64(tk.Session().AffectedRows()), affectedRows)
tk.require.Equal(int64(tk.Session().LastInsertID()), insertID)
}
// MustPointGet checks whether the plan for the sql is Point_Get.
func (tk *TestKit) MustPointGet(sql string, args ...interface{}) *Result {
rs := tk.MustQuery("explain "+sql, args...)
tk.require.Len(rs.rows, 1)
tk.require.Contains(rs.rows[0][0], "Point_Get", "plan %v", rs.rows[0][0])
return tk.MustQuery(sql, args...)
}
// UsedPartitions returns the partition names that will be used or all/dual.
func (tk *TestKit) UsedPartitions(sql string, args ...interface{}) *Result {
rs := tk.MustQuery("explain "+sql, args...)
var usedPartitions [][]string
for i := range rs.rows {
index := strings.Index(rs.rows[i][3], "partition:")
if index != -1 {
p := rs.rows[i][3][index+len("partition:"):]
partitions := strings.Split(strings.SplitN(p, " ", 2)[0], ",")
usedPartitions = append(usedPartitions, partitions)
}
}
comment := fmt.Sprintf("sql:%s, args:%v", sql, args)
return &Result{rows: usedPartitions, comment: comment, assert: tk.assert, require: tk.require}
}
// WithPruneMode run test case under prune mode.
func WithPruneMode(tk *TestKit, mode variable.PartitionPruneMode, f func()) {
tk.MustExec("set @@tidb_partition_prune_mode=`" + string(mode) + "`")
tk.MustExec("set global tidb_partition_prune_mode=`" + string(mode) + "`")
f()
}
func containGlobal(rs *Result) bool {
partitionNameCol := 2
for i := range rs.rows {
if strings.Contains(rs.rows[i][partitionNameCol], "global") {
return true
}
}
return false
}
// MustNoGlobalStats checks if there is no global stats.
func (tk *TestKit) MustNoGlobalStats(table string) bool {
if containGlobal(tk.MustQuery("show stats_meta where table_name like '" + table + "'")) {
return false
}
if containGlobal(tk.MustQuery("show stats_buckets where table_name like '" + table + "'")) {
return false
}
if containGlobal(tk.MustQuery("show stats_histograms where table_name like '" + table + "'")) {
return false
}
return true
}
// CheckLastMessage checks last message after executing MustExec
func (tk *TestKit) CheckLastMessage(msg string) {
tk.require.Equal(tk.Session().LastMessage(), msg)
}
// RegionProperityClient is to get region properties.
type RegionProperityClient struct {
tikv.Client
mu struct {
sync.Mutex
failedOnce bool
count int64
}
}
// SendRequest is to mock send request.
func (c *RegionProperityClient) SendRequest(ctx context.Context, addr string, req *tikvrpc.Request, timeout time.Duration) (*tikvrpc.Response, error) {
if req.Type == tikvrpc.CmdDebugGetRegionProperties {
c.mu.Lock()
defer c.mu.Unlock()
c.mu.count++
// Mock failure once.
if !c.mu.failedOnce {
c.mu.failedOnce = true
return &tikvrpc.Response{}, nil
}
}
return c.Client.SendRequest(ctx, addr, req, timeout)
}