Files
tidb/pkg/executor/adapter_test.go

151 lines
6.1 KiB
Go

// Copyright 2019 PingCAP, Inc.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package executor_test
import (
"context"
"strings"
"sync"
"testing"
"time"
"github.com/pingcap/failpoint"
"github.com/pingcap/tidb/pkg/executor"
"github.com/pingcap/tidb/pkg/session"
"github.com/pingcap/tidb/pkg/sessionctx/vardef"
"github.com/pingcap/tidb/pkg/sessionctx/variable"
"github.com/pingcap/tidb/pkg/testkit"
"github.com/pingcap/tidb/pkg/util/execdetails"
"github.com/pingcap/tidb/pkg/util/mock"
"github.com/stretchr/testify/require"
"github.com/tikv/client-go/v2/util"
)
func TestFormatSQL(t *testing.T) {
val := executor.FormatSQL("aaaa")
require.Equal(t, "aaaa", val.String())
vardef.QueryLogMaxLen.Store(0)
val = executor.FormatSQL("aaaaaaaaaaaaaaaaaaaa")
require.Equal(t, "aaaaaaaaaaaaaaaaaaaa", val.String())
vardef.QueryLogMaxLen.Store(5)
val = executor.FormatSQL("aaaaaaaaaaaaaaaaaaaa")
require.Equal(t, "aaaaa(len:20)", val.String())
}
func TestContextCancelWhenReadFromCopIterator(t *testing.T) {
store := testkit.CreateMockStore(t)
tk := testkit.NewTestKit(t, store)
tk.MustExec("use test")
tk.MustExec("create table t(a int)")
tk.MustExec("insert into t values(1)")
syncCh := make(chan struct{})
require.NoError(t, failpoint.EnableCall("github.com/pingcap/tidb/pkg/store/copr/CtxCancelBeforeReceive",
func(ctx context.Context) {
if ctx.Value("TestContextCancel") == "test" {
syncCh <- struct{}{}
<-syncCh
}
},
))
ctx := context.WithValue(context.Background(), "TestContextCancel", "test")
ctx, cancelFunc := context.WithCancel(ctx)
defer cancelFunc()
var wg sync.WaitGroup
wg.Add(1)
go func() {
defer wg.Done()
ctx = util.WithInternalSourceType(ctx, "scheduler")
rs, err := tk.Session().ExecuteInternal(ctx, "select * from test.t")
require.NoError(t, err)
_, err2 := session.ResultSetToStringSlice(ctx, tk.Session(), rs)
require.ErrorIs(t, err2, context.Canceled)
}()
<-syncCh
cancelFunc()
syncCh <- struct{}{}
wg.Wait()
}
func TestPrepareAndCompleteSlowLogItemsForRules(t *testing.T) {
ctx := mock.NewContext()
sessVars := ctx.GetSessionVars()
sessVars.ConnectionID = 123
sessVars.SessionAlias = "alias1"
sessVars.CurrentDB = "testdb"
sessVars.DurationParse = time.Second
sessVars.DurationCompile = 2 * time.Second
sessVars.DurationOptimization = 3 * time.Second
sessVars.DurationWaitTS = 4 * time.Second
sessVars.StmtCtx.ExecRetryCount = 2
sessVars.StmtCtx.ExecSuccess = true
sessVars.MemTracker.Consume(1000)
sessVars.DiskTracker.Consume(2000)
copExec := execdetails.CopExecDetails{
BackoffTime: time.Millisecond,
ScanDetail: &util.ScanDetail{
ProcessedKeys: 20001,
TotalKeys: 10000,
},
TimeDetail: util.TimeDetail{
ProcessTime: time.Second * time.Duration(2),
WaitTime: time.Minute,
},
}
ctx.GetSessionVars().StmtCtx.MergeCopExecDetails(&copExec, 0)
tikvExecDetail := &util.ExecDetails{
WaitKVRespDuration: (10 * time.Second).Nanoseconds(),
WaitPDRespDuration: (11 * time.Second).Nanoseconds(),
BackoffDuration: (12 * time.Second).Nanoseconds(),
}
goCtx := context.WithValue(ctx.GoCtx(), util.ExecDetailsKey, tikvExecDetail)
// only require a subset of fields
sessVars.SlowLogRules = &variable.SlowLogRules{
AllConditionFields: map[string]struct{}{
strings.ToLower(variable.SlowLogConnIDStr): {},
strings.ToLower(variable.SlowLogDBStr): {},
strings.ToLower(variable.SlowLogSucc): {},
strings.ToLower(execdetails.ProcessTimeStr): {},
},
}
items := executor.PrepareSlowLogItemsForRules(goCtx, ctx.GetSessionVars())
require.True(t, variable.SlowLogRuleFieldAccessors[strings.ToLower(variable.SlowLogConnIDStr)].Match(ctx.GetSessionVars(), items, uint64(123)))
require.True(t, variable.SlowLogRuleFieldAccessors[strings.ToLower(variable.SlowLogDBStr)].Match(ctx.GetSessionVars(), items, "testdb"))
require.True(t, variable.SlowLogRuleFieldAccessors[strings.ToLower(variable.SlowLogSucc)].Match(ctx.GetSessionVars(), items, true))
require.True(t, variable.SlowLogRuleFieldAccessors[strings.ToLower(execdetails.ProcessTimeStr)].Match(ctx.GetSessionVars(), items, copExec.TimeDetail.ProcessTime.Seconds()))
require.True(t, variable.SlowLogRuleFieldAccessors[strings.ToLower(execdetails.BackoffTimeStr)].Match(ctx.GetSessionVars(), items, copExec.BackoffTime.Seconds()))
require.True(t, variable.SlowLogRuleFieldAccessors[strings.ToLower(execdetails.ProcessKeysStr)].Match(ctx.GetSessionVars(), items, copExec.ScanDetail.ProcessedKeys))
require.True(t, variable.SlowLogRuleFieldAccessors[strings.ToLower(execdetails.TotalKeysStr)].Match(ctx.GetSessionVars(), items, copExec.ScanDetail.TotalKeys))
// fields not in AllConditionFields should be zero at this point
require.Equal(t, uint64(0), items.ExecRetryCount)
// fields not in SlowLogRuleFieldAccessors should be zero at this point
waitTimeAccessor, ok := variable.SlowLogRuleFieldAccessors[strings.ToLower(execdetails.WaitTimeStr)]
require.False(t, ok)
require.Equal(t, variable.SlowLogFieldAccessor{}, waitTimeAccessor)
// fill the rest
executor.CompleteSlowLogItemsForRules(goCtx, ctx.GetSessionVars(), items)
require.Equal(t, uint64(2), items.ExecRetryCount)
require.Equal(t, int64(1000), items.MemMax)
require.Equal(t, int64(2000), items.DiskMax)
require.Equal(t, sessVars.StmtCtx.ExecSuccess, items.Succ)
require.True(t, variable.SlowLogRuleFieldAccessors[strings.ToLower(variable.SlowLogKVTotal)].Match(ctx.GetSessionVars(), items, time.Duration(tikvExecDetail.WaitKVRespDuration).Seconds()))
require.True(t, variable.SlowLogRuleFieldAccessors[strings.ToLower(variable.SlowLogPDTotal)].Match(ctx.GetSessionVars(), items, time.Duration(tikvExecDetail.WaitPDRespDuration).Seconds()))
}