mirror of
https://github.com/MariaDB/server.git
synced 2025-08-08 11:22:35 +03:00
MDEV-32627 Distinguish between absence of a keyword and empty value for the keyword
Distinguish them in two place: when constructing connection key in create_conn_key and spider_create_conn for both ordinary queries and spider_direct_sql For spider_create_conn and spider_udf_direct_sql_create_conn, the created conn gets assigned a field from the source object if and only if source->field is non-null. For spider_create_conn_keys and spider_udf_direct_sql_create_conn_key, we update the encoding so that absence of keyword and keyword with an empty value result in different keys. More specifically, if the i-th keyword has a value, the corresponding part in the conn key begins with the char \i, followed by the possibly empty value and ends with a \0. If the i-th keyword is not specified, then it does not get a mention in the conn key. As part of this change, we also update table param / option parsing to recognise a singleton empty string when creating an string list, instead of writing it off as NULL.
This commit is contained in:
@@ -999,12 +999,7 @@ int spider_create_string_list(
|
||||
tmp_ptr = str;
|
||||
while (*tmp_ptr == ' ')
|
||||
tmp_ptr++;
|
||||
if (*tmp_ptr)
|
||||
*list_length = 1;
|
||||
else {
|
||||
*string_list = NULL;
|
||||
DBUG_RETURN(0);
|
||||
}
|
||||
*list_length= 1;
|
||||
|
||||
bool last_esc_flg = FALSE;
|
||||
while (TRUE)
|
||||
@@ -3820,6 +3815,17 @@ void spider_print_keys(
|
||||
}
|
||||
#endif
|
||||
|
||||
void spider_create_conn_key_add_one(int* counter, char** target, char* src)
|
||||
{
|
||||
(*counter)++;
|
||||
if (src)
|
||||
{
|
||||
**target= (char) *counter;
|
||||
*target= strmov(*target + 1, src);
|
||||
(*target)++;
|
||||
}
|
||||
}
|
||||
|
||||
int spider_create_conn_keys(
|
||||
SPIDER_SHARE *share
|
||||
) {
|
||||
@@ -3881,23 +3887,23 @@ int spider_create_conn_keys(
|
||||
}
|
||||
conn_keys_lengths[roop_count]
|
||||
= 1
|
||||
+ share->tgt_wrappers_lengths[roop_count] + 1
|
||||
+ share->tgt_hosts_lengths[roop_count] + 1
|
||||
+ 5 + 1
|
||||
+ share->tgt_sockets_lengths[roop_count] + 1
|
||||
+ (tables_on_different_db_are_joinable ?
|
||||
0 : share->tgt_dbs_lengths[roop_count] + 1)
|
||||
+ share->tgt_usernames_lengths[roop_count] + 1
|
||||
+ share->tgt_passwords_lengths[roop_count] + 1
|
||||
+ share->tgt_ssl_cas_lengths[roop_count] + 1
|
||||
+ share->tgt_ssl_capaths_lengths[roop_count] + 1
|
||||
+ share->tgt_ssl_certs_lengths[roop_count] + 1
|
||||
+ share->tgt_ssl_ciphers_lengths[roop_count] + 1
|
||||
+ share->tgt_ssl_keys_lengths[roop_count] + 1
|
||||
+ 1 + 1
|
||||
+ share->tgt_default_files_lengths[roop_count] + 1
|
||||
+ share->tgt_default_groups_lengths[roop_count] + 1
|
||||
+ share->tgt_dsns_lengths[roop_count];
|
||||
+ (share->tgt_wrappers[roop_count] ? share->tgt_wrappers_lengths[roop_count] + 2 : 0)
|
||||
+ (share->tgt_hosts[roop_count] ? share->tgt_hosts_lengths[roop_count] + 2 : 0)
|
||||
+ 5 + 2
|
||||
+ (share->tgt_sockets[roop_count] ? share->tgt_sockets_lengths[roop_count] + 2 : 0)
|
||||
+ (!tables_on_different_db_are_joinable && share->tgt_dbs[roop_count] ?
|
||||
share->tgt_dbs_lengths[roop_count] + 2 : 0)
|
||||
+ (share->tgt_usernames[roop_count] ? share->tgt_usernames_lengths[roop_count] + 2 : 0)
|
||||
+ (share->tgt_passwords[roop_count] ? share->tgt_passwords_lengths[roop_count] + 2 : 0)
|
||||
+ (share->tgt_ssl_cas[roop_count] ? share->tgt_ssl_cas_lengths[roop_count] + 2 : 0)
|
||||
+ (share->tgt_ssl_capaths[roop_count] ? share->tgt_ssl_capaths_lengths[roop_count] + 2 : 0)
|
||||
+ (share->tgt_ssl_certs[roop_count] ? share->tgt_ssl_certs_lengths[roop_count] + 2 : 0)
|
||||
+ (share->tgt_ssl_ciphers[roop_count] ? share->tgt_ssl_ciphers_lengths[roop_count] + 2 : 0)
|
||||
+ (share->tgt_ssl_keys[roop_count] ? share->tgt_ssl_keys_lengths[roop_count] + 2 : 0)
|
||||
+ 1 + 2
|
||||
+ (share->tgt_default_files[roop_count] ? share->tgt_default_files_lengths[roop_count] + 2 : 0)
|
||||
+ (share->tgt_default_groups[roop_count] ? share->tgt_default_groups_lengths[roop_count] + 2 : 0)
|
||||
+ (share->tgt_dsns[roop_count] ? share->tgt_dsns_lengths[roop_count] + 2 : 0);
|
||||
share->conn_keys_charlen += conn_keys_lengths[roop_count] + 2;
|
||||
}
|
||||
if (!(share->conn_keys = (char **)
|
||||
@@ -3937,105 +3943,35 @@ int spider_create_conn_keys(
|
||||
|
||||
share->conn_keys[roop_count] = tmp_name;
|
||||
*tmp_name = '0';
|
||||
DBUG_PRINT("info",("spider tgt_wrappers[%d]=%s", roop_count,
|
||||
share->tgt_wrappers[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_wrappers[roop_count]);
|
||||
DBUG_PRINT("info",("spider tgt_hosts[%d]=%s", roop_count,
|
||||
share->tgt_hosts[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_hosts[roop_count]);
|
||||
tmp_name++;
|
||||
int counter= 0;
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_wrappers[roop_count]);
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_hosts[roop_count]);
|
||||
my_sprintf(port_str, (port_str, "%05ld", share->tgt_ports[roop_count]));
|
||||
DBUG_PRINT("info",("spider port_str=%s", port_str));
|
||||
tmp_name = strmov(tmp_name + 1, port_str);
|
||||
if (share->tgt_sockets[roop_count])
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, port_str);
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_sockets[roop_count]);
|
||||
counter++;
|
||||
if (!tables_on_different_db_are_joinable && share->tgt_dbs[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_sockets[%d]=%s", roop_count,
|
||||
share->tgt_sockets[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_sockets[roop_count]);
|
||||
} else
|
||||
*tmp_name= (char) counter;
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_dbs[roop_count]);
|
||||
tmp_name++;
|
||||
if (!tables_on_different_db_are_joinable)
|
||||
{
|
||||
if (share->tgt_dbs[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_dbs[%d]=%s", roop_count,
|
||||
share->tgt_dbs[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_dbs[roop_count]);
|
||||
} else
|
||||
tmp_name++;
|
||||
}
|
||||
if (share->tgt_usernames[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_usernames[%d]=%s", roop_count,
|
||||
share->tgt_usernames[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_usernames[roop_count]);
|
||||
} else
|
||||
tmp_name++;
|
||||
if (share->tgt_passwords[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_passwords[%d]=%s", roop_count,
|
||||
share->tgt_passwords[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_passwords[roop_count]);
|
||||
} else
|
||||
tmp_name++;
|
||||
if (share->tgt_ssl_cas[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_ssl_cas[%d]=%s", roop_count,
|
||||
share->tgt_ssl_cas[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_ssl_cas[roop_count]);
|
||||
} else
|
||||
tmp_name++;
|
||||
if (share->tgt_ssl_capaths[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_ssl_capaths[%d]=%s", roop_count,
|
||||
share->tgt_ssl_capaths[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_ssl_capaths[roop_count]);
|
||||
} else
|
||||
tmp_name++;
|
||||
if (share->tgt_ssl_certs[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_ssl_certs[%d]=%s", roop_count,
|
||||
share->tgt_ssl_certs[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_ssl_certs[roop_count]);
|
||||
} else
|
||||
tmp_name++;
|
||||
if (share->tgt_ssl_ciphers[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_ssl_ciphers[%d]=%s", roop_count,
|
||||
share->tgt_ssl_ciphers[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_ssl_ciphers[roop_count]);
|
||||
} else
|
||||
tmp_name++;
|
||||
if (share->tgt_ssl_keys[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_ssl_keys[%d]=%s", roop_count,
|
||||
share->tgt_ssl_keys[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_ssl_keys[roop_count]);
|
||||
} else
|
||||
tmp_name++;
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_usernames[roop_count]);
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_passwords[roop_count]);
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_ssl_cas[roop_count]);
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_ssl_capaths[roop_count]);
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_ssl_certs[roop_count]);
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_ssl_ciphers[roop_count]);
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_ssl_keys[roop_count]);
|
||||
counter++;
|
||||
*tmp_name= (char) counter;
|
||||
tmp_name++;
|
||||
*tmp_name = '0' + ((char) share->tgt_ssl_vscs[roop_count]);
|
||||
if (share->tgt_default_files[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_default_files[%d]=%s", roop_count,
|
||||
share->tgt_default_files[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_default_files[roop_count]);
|
||||
} else
|
||||
tmp_name++;
|
||||
if (share->tgt_default_groups[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_default_groups[%d]=%s", roop_count,
|
||||
share->tgt_default_groups[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_default_groups[roop_count]);
|
||||
} else
|
||||
tmp_name++;
|
||||
if (share->tgt_dsns[roop_count])
|
||||
{
|
||||
DBUG_PRINT("info",("spider tgt_dsns[%d]=%s", roop_count,
|
||||
share->tgt_dsns[roop_count]));
|
||||
tmp_name = strmov(tmp_name + 1, share->tgt_dsns[roop_count]);
|
||||
} else
|
||||
tmp_name++;
|
||||
tmp_name++;
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_default_files[roop_count]);
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_default_groups[roop_count]);
|
||||
spider_create_conn_key_add_one(&counter, &tmp_name, share->tgt_dsns[roop_count]);
|
||||
tmp_name++;
|
||||
#ifdef SPIDER_HAS_HASH_VALUE_TYPE
|
||||
share->conn_keys_hash_value[roop_count] = my_calc_hash(
|
||||
|
Reference in New Issue
Block a user