mirror of
https://github.com/MariaDB/server.git
synced 2025-11-10 23:02:54 +03:00
Before commit6112853cdain MySQL 4.1.1 introduced the parameter innodb_file_per_table, all InnoDB data was written to the InnoDB system tablespace (often named ibdata1). A serious design problem is that once the system tablespace has grown to some size, it cannot shrink even if the data inside it has been deleted. There are also other design problems, such as the server hang MDEV-29930 that should only be possible when using innodb_file_per_table=0 and innodb_undo_tablespaces=0 (storing both tables and undo logs in the InnoDB system tablespace). The parameter innodb_change_buffering was deprecated in commitb5852ffbee. Starting with commitbaf276e6d4(MDEV-19229) the number of innodb_undo_tablespaces can be increased, so that the undo logs can be moved out of the system tablespace of an existing installation. If all these things (tables, undo logs, and the change buffer) are removed from the InnoDB system tablespace, the only variable-size data structure inside it is the InnoDB data dictionary. DDL operations on .ibd files was optimized in commit86dc7b4d4c(MDEV-24626). That should have removed any thinkable performance advantage of using innodb_file_per_table=0. Since there should be no benefit of setting innodb_file_per_table=0, the parameter should be deprecated. Starting with MySQL 5.6 and MariaDB Server 10.0, the default value is innodb_file_per_table=1.
111 lines
3.6 KiB
Plaintext
111 lines
3.6 KiB
Plaintext
-- source include/have_innodb.inc
|
|
-- source include/have_file_key_management_plugin.inc
|
|
# embedded does not support restart
|
|
-- source include/not_embedded.inc
|
|
|
|
#
|
|
# MDEV-8588: Assertion failure in file ha_innodb.cc line 21140 if at least one encrypted
|
|
# table exists and encryption service is not available.
|
|
#
|
|
|
|
call mtr.add_suppression("Plugin 'file_key_management' init function returned error");
|
|
call mtr.add_suppression("Plugin 'file_key_management' registration.*failed");
|
|
call mtr.add_suppression("InnoDB: Table `test`\\.`t[12]` has an unreadable root page");
|
|
call mtr.add_suppression("Table .*t[12].* is corrupted");
|
|
call mtr.add_suppression("InnoDB: The page \\[page id: space=[1-9][0-9]*, page number=[1-9][0-9]*\\] in file '.*test.t[12]\\.ibd' cannot be decrypted; key_version=1");
|
|
call mtr.add_suppression("failed to read \\[page id: space=[1-9][0-9]*, page number=[1-9][0-9]*\\]");
|
|
call mtr.add_suppression("InnoDB: Encrypted page \\[page id: space=[1-9][0-9]*, page number=3\\] in file .*test.t1.ibd looks corrupted; key_version=1");
|
|
call mtr.add_suppression("File '.*mysql-test.std_data.keysbad3\\.txt' not found");
|
|
# for innodb_checksum_algorithm=full_crc32 only
|
|
call mtr.add_suppression("\\[ERROR\\] InnoDB: Cannot decrypt \\[page id: space=");
|
|
|
|
--echo # Start server with keys2.txt
|
|
-- let $restart_parameters=--file-key-management-filename=$MYSQL_TEST_DIR/std_data/keys2.txt
|
|
-- source include/restart_mysqld.inc
|
|
|
|
CREATE TABLE t1 (c VARCHAR(8)) ENGINE=InnoDB ENCRYPTED=YES ENCRYPTION_KEY_ID=2;
|
|
INSERT INTO t1 VALUES ('foobar');
|
|
ALTER TABLE t1 ADD COLUMN c2 INT;
|
|
INSERT INTO t1 VALUES ('foobar',2);
|
|
SELECT * FROM t1;
|
|
TRUNCATE TABLE t1;
|
|
SELECT * FROM t1;
|
|
INSERT INTO t1 VALUES ('foobar',1);
|
|
INSERT INTO t1 VALUES ('foobar',2);
|
|
FLUSH TABLE WITH READ LOCK;
|
|
SELECT * FROM t1;
|
|
|
|
--echo
|
|
--echo # Restart server with keysbad3.txt
|
|
-- let $restart_parameters=--file-key-management-filename=$MYSQL_TEST_DIR/std_data/keysbad3.txt
|
|
-- source include/restart_mysqld.inc
|
|
|
|
--disable_warnings
|
|
--error ER_NO_SUCH_TABLE_IN_ENGINE
|
|
SELECT * FROM t1;
|
|
--enable_warnings
|
|
|
|
-- let $restart_parameters=--file-key-management-filename=$MYSQL_TEST_DIR/std_data/keysbad3.txt
|
|
-- source include/restart_mysqld.inc
|
|
|
|
--replace_regex /key_id [1-9][0-9]*/\1 /
|
|
DROP TABLE t1;
|
|
|
|
#
|
|
# MDEV-8591: Database page corruption on disk or a failed space, Assertion failure in file buf0buf.cc
|
|
# line 2856 on querying a table using wrong default encryption key
|
|
#
|
|
|
|
--echo # Start server with keys3.txt
|
|
-- let $restart_parameters=--file-key-management-filename=$MYSQL_TEST_DIR/std_data/keys3.txt
|
|
-- source include/restart_mysqld.inc
|
|
|
|
SET GLOBAL innodb_default_encryption_key_id=5;
|
|
CREATE TABLE t2 (c VARCHAR(8), id int not null primary key, b int, key(b)) ENGINE=InnoDB ENCRYPTED=YES;
|
|
INSERT INTO t2 VALUES ('foobar',1,2);
|
|
|
|
--echo
|
|
--echo # Restart server with keys2.txt
|
|
-- let $restart_parameters=--file-key-management-filename=$MYSQL_TEST_DIR/std_data/keys2.txt
|
|
-- source include/restart_mysqld.inc
|
|
|
|
--disable_warnings
|
|
--error ER_NO_SUCH_TABLE_IN_ENGINE
|
|
SELECT * FROM t2;
|
|
|
|
--error ER_TABLE_CORRUPT
|
|
SELECT * FROM t2 where id = 1;
|
|
|
|
--error ER_TABLE_CORRUPT
|
|
SELECT * FROM t2 where b = 1;
|
|
|
|
--error ER_TABLE_CORRUPT
|
|
INSERT INTO t2 VALUES ('tmp',3,3);
|
|
|
|
--error ER_TABLE_CORRUPT
|
|
DELETE FROM t2 where b = 3;
|
|
|
|
--error ER_TABLE_CORRUPT
|
|
DELETE FROM t2 where id = 3;
|
|
|
|
--error ER_TABLE_CORRUPT
|
|
UPDATE t2 set b = b +1;
|
|
|
|
OPTIMIZE TABLE t2;
|
|
|
|
--error ER_TABLE_CORRUPT
|
|
ALTER TABLE t2 ADD COLUMN d INT;
|
|
|
|
ANALYZE TABLE t2;
|
|
|
|
--error ER_TABLE_CORRUPT
|
|
TRUNCATE TABLE t2;
|
|
|
|
DROP TABLE t2;
|
|
--enable_warnings
|
|
|
|
--echo
|
|
--echo # Start server with keys2.txt
|
|
-- let $restart_parameters=--file-key-management-filename=$MYSQL_TEST_DIR/std_data/keys2.txt
|
|
-- source include/restart_mysqld.inc
|