generated from ansible-collections/collection_template
-
Notifications
You must be signed in to change notification settings - Fork 88
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
sql_mode can be set in session, therefore we should look for ANSI_QUO…
…TES in session variable instead of global variable (#677) * issue-671: get ASNI_QUOTES from session sql_mode instead of GLOBAL sql_mode
- Loading branch information
1 parent
90bd0b0
commit ebb37ae
Showing
4 changed files
with
131 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
bugfixes: | ||
- mysql_user,mysql_role - The sql_mode ANSI_QUOTES affects how the modules mysql_user | ||
and mysql_role compare the existing privileges with the configured privileges, | ||
as well as decide whether double quotes or backticks should be used in the GRANT | ||
statements. Pointing out in issue 671, the modules mysql_user and mysql_role allow | ||
users to enable/disable ANSI_QUOTES in session variable (within a DB session, the | ||
session variable always overwrites the global one). But due to the issue, the modules | ||
do not check for ANSI_MODE in the session variable, instead, they only check in the | ||
GLOBAL one.That behavior is not only limiting the users' flexibility, but also not | ||
allowing users to explicitly disable ANSI_MODE to work around such bugs like | ||
https://bugs.mysql.com/bug.php?id=115953. | ||
(https://github.com/ansible-collections/community.mysql/issues/671) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
112 changes: 112 additions & 0 deletions
112
tests/integration/targets/test_mysql_user/tasks/issue-671.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,112 @@ | ||
--- | ||
# Due to https://bugs.mysql.com/bug.php?id=115953, in Mysql 8, if ANSI_QUOTES is enabled, | ||
# backticks will be used instead of double quotes to quote functions or procedures name. | ||
# As a consequence, mysql_user and mysql_roles will always report "changed" for functions | ||
# and procedures no matter the privileges are granted or not. | ||
# Workaround for the mysql bug 116953 is removing ANSI_QUOTES from the module's session | ||
# sql_mode. But because issue 671, ANSI_QUOTES is always got from GLOBAL sql_mode, thus | ||
# this workaround can't work. Even without the Mysql bug, because sql_mode in session | ||
# precedes GLOBAL sql_mode. we should check for sql_mode in session variable instead of | ||
# the GLOBAL one. | ||
- vars: | ||
mysql_parameters: &mysql_params | ||
login_user: '{{ mysql_user }}' | ||
login_password: '{{ mysql_password }}' | ||
login_host: '{{ mysql_host }}' | ||
login_port: '{{ mysql_primary_port }}' | ||
|
||
block: | ||
- name: Issue-671| test setup | drop database | ||
community.mysql.mysql_db: | ||
<<: *mysql_params | ||
name: "{{ item }}" | ||
state: absent | ||
loop: | ||
- foo | ||
- bar | ||
|
||
- name: Issue-671| test setup | create database | ||
community.mysql.mysql_db: | ||
<<: *mysql_params | ||
name: "{{ item }}" | ||
state: present | ||
loop: | ||
- foo | ||
- bar | ||
|
||
- name: Issue-671| test setup | get value of GLOBAL.sql_mode | ||
community.mysql.mysql_query: | ||
<<: *mysql_params | ||
query: 'select @@GLOBAL.sql_mode AS sql_mode' | ||
register: sql_mode_orig | ||
|
||
- name: Issue-671| Assert sql_mode_orig | ||
ansible.builtin.assert: | ||
that: | ||
- sql_mode_orig.query_result[0][0].sql_mode != None | ||
|
||
- name: Issue-671| enable sql_mode ANSI_QUOTES | ||
community.mysql.mysql_variables: | ||
<<: *mysql_params | ||
variable: sql_mode | ||
value: '{{ sql_mode_orig.query_result[0][0].sql_mode }},ANSI_QUOTES' | ||
mode: "{% if db_engine == 'mariadb' %}global{% else %}persist{% endif %}" | ||
|
||
- name: Issue-671| Copy SQL scripts to remote | ||
ansible.builtin.copy: | ||
src: "{{ item }}" | ||
dest: "{{ remote_tmp_dir }}/{{ item | basename }}" | ||
loop: | ||
- create-function.sql | ||
- create-procedure.sql | ||
|
||
- name: Issue-671| Create function for test | ||
ansible.builtin.shell: | ||
cmd: "{{ mysql_command }} < {{ remote_tmp_dir }}/create-function.sql" | ||
|
||
- name: Issue-671| Create procedure for test | ||
ansible.builtin.shell: | ||
cmd: "{{ mysql_command }} < {{ remote_tmp_dir }}/create-procedure.sql" | ||
|
||
- name: Issue-671| Create user with FUNCTION and PROCEDURE privileges | ||
community.mysql.mysql_user: | ||
<<: *mysql_params | ||
name: '{{ user_name_2 }}' | ||
password: '{{ user_password_2 }}' | ||
state: present | ||
priv: 'FUNCTION foo.function:EXECUTE/foo.*:SELECT/PROCEDURE bar.procedure:EXECUTE' | ||
|
||
- name: Issue-671| Grant the privileges again, remove ANSI_QUOTES from the session variable | ||
community.mysql.mysql_user: | ||
<<: *mysql_params | ||
session_vars: | ||
sql_mode: "" | ||
name: '{{ user_name_2 }}' | ||
password: '{{ user_password_2 }}' | ||
state: present | ||
priv: 'FUNCTION foo.function:EXECUTE/foo.*:SELECT/PROCEDURE bar.procedure:EXECUTE' | ||
register: result | ||
failed_when: | ||
- result is failed or result is changed | ||
|
||
- name: Issue-671| Test teardown | cleanup databases | ||
community.mysql.mysql_db: | ||
<<: *mysql_params | ||
name: "{{ item }}" | ||
state: absent | ||
loop: | ||
- foo | ||
- bar | ||
|
||
- name: Issue-671| set sql_mode back to original value | ||
community.mysql.mysql_variables: | ||
<<: *mysql_params | ||
variable: sql_mode | ||
value: '{{ sql_mode_orig.query_result[0][0].sql_mode }}' | ||
mode: "{% if db_engine == 'mariadb' %}global{% else %}persist{% endif %}" | ||
|
||
- name: Issue-671| Teardown user_name_2 | ||
ansible.builtin.include_tasks: | ||
file: utils/remove_user.yml | ||
vars: | ||
user_name: "{{ user_name_2 }}" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters