mirror of
https://github.com/GreptimeTeam/greptimedb.git
synced 2025-12-22 22:20:02 +00:00
feat: add naive region failover test for metric table (#4269)
* feat: add failover test for metric table * chore: introduce help marco * chore: remove incorrect check
This commit is contained in:
@@ -40,6 +40,7 @@ lazy_static = { workspace = true }
|
||||
libfuzzer-sys = "0.4"
|
||||
nix = { version = "0.28", features = ["process", "signal"], optional = true }
|
||||
partition = { workspace = true }
|
||||
paste.workspace = true
|
||||
rand = { workspace = true }
|
||||
rand_chacha = "0.3.1"
|
||||
reqwest = { workspace = true }
|
||||
@@ -128,6 +129,13 @@ test = false
|
||||
bench = false
|
||||
doc = false
|
||||
|
||||
[[bin]]
|
||||
name = "fuzz_failover_metric_regions"
|
||||
path = "targets/failover/fuzz_failover_metric_regions.rs"
|
||||
test = false
|
||||
bench = false
|
||||
doc = false
|
||||
|
||||
[[bin]]
|
||||
name = "fuzz_migrate_mito_regions"
|
||||
path = "targets/migration/fuzz_migrate_mito_regions.rs"
|
||||
|
||||
@@ -28,6 +28,7 @@ use std::env;
|
||||
|
||||
use common_telemetry::info;
|
||||
use common_telemetry::tracing::log::LevelFilter;
|
||||
use paste::paste;
|
||||
use snafu::ResultExt;
|
||||
use sqlx::mysql::{MySqlConnectOptions, MySqlPoolOptions};
|
||||
use sqlx::{ConnectOptions, MySql, Pool};
|
||||
@@ -126,9 +127,28 @@ pub const GT_FUZZ_INPUT_MAX_COLUMNS: &str = "GT_FUZZ_INPUT_MAX_COLUMNS";
|
||||
pub const GT_FUZZ_INPUT_MAX_ALTER_ACTIONS: &str = "GT_FUZZ_INPUT_MAX_ALTER_ACTIONS";
|
||||
pub const GT_FUZZ_INPUT_MAX_INSERT_ACTIONS: &str = "GT_FUZZ_INPUT_MAX_INSERT_ACTIONS";
|
||||
|
||||
macro_rules! make_get_from_env_helper {
|
||||
($key:expr, $default: expr) => {
|
||||
paste! {
|
||||
#[doc = "Retrieves `" $key "` environment variable \
|
||||
or returns a default value (`" $default "`) if the environment variable is not set.
|
||||
"]
|
||||
pub fn [<get_ $key:lower>]() -> usize {
|
||||
get_from_env_or_default_value($key, $default)
|
||||
}
|
||||
}
|
||||
};
|
||||
}
|
||||
|
||||
make_get_from_env_helper!(GT_FUZZ_INPUT_MAX_ALTER_ACTIONS, 256);
|
||||
make_get_from_env_helper!(GT_FUZZ_INPUT_MAX_INSERT_ACTIONS, 8);
|
||||
make_get_from_env_helper!(GT_FUZZ_INPUT_MAX_ROWS, 2048);
|
||||
make_get_from_env_helper!(GT_FUZZ_INPUT_MAX_TABLES, 64);
|
||||
make_get_from_env_helper!(GT_FUZZ_INPUT_MAX_COLUMNS, 32);
|
||||
|
||||
/// Retrieves a value from the environment variables
|
||||
/// or returns a default value if the environment variable is not set.
|
||||
pub fn get_from_env_or_default_value(key: &str, default_value: usize) -> usize {
|
||||
fn get_from_env_or_default_value(key: &str, default_value: usize) -> usize {
|
||||
let _ = dotenv::dotenv();
|
||||
if let Ok(value) = env::var(key) {
|
||||
value.parse().unwrap()
|
||||
|
||||
303
tests-fuzz/targets/failover/fuzz_failover_metric_regions.rs
Normal file
303
tests-fuzz/targets/failover/fuzz_failover_metric_regions.rs
Normal file
@@ -0,0 +1,303 @@
|
||||
// Copyright 2023 Greptime Team
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#![no_main]
|
||||
use std::collections::HashMap;
|
||||
use std::env;
|
||||
use std::sync::Arc;
|
||||
use std::time::Duration;
|
||||
|
||||
use arbitrary::{Arbitrary, Unstructured};
|
||||
use common_telemetry::info;
|
||||
use libfuzzer_sys::fuzz_target;
|
||||
use rand::{Rng, SeedableRng};
|
||||
use rand_chacha::{ChaCha20Rng, ChaChaRng};
|
||||
use snafu::{ensure, ResultExt};
|
||||
use sqlx::{Executor, MySql, Pool};
|
||||
use tests_fuzz::context::{TableContext, TableContextRef};
|
||||
use tests_fuzz::error::{self, Result};
|
||||
use tests_fuzz::fake::{
|
||||
merge_two_word_map_fn, random_capitalize_map, uppercase_and_keyword_backtick_map,
|
||||
MappedGenerator, WordGenerator,
|
||||
};
|
||||
use tests_fuzz::generator::create_expr::{
|
||||
CreateLogicalTableExprGeneratorBuilder, CreatePhysicalTableExprGeneratorBuilder,
|
||||
};
|
||||
use tests_fuzz::generator::insert_expr::InsertExprGeneratorBuilder;
|
||||
use tests_fuzz::generator::Generator;
|
||||
use tests_fuzz::ir::{
|
||||
generate_random_timestamp_for_mysql, generate_random_value, CreateTableExpr, InsertIntoExpr,
|
||||
};
|
||||
use tests_fuzz::translator::mysql::create_expr::CreateTableExprTranslator;
|
||||
use tests_fuzz::translator::mysql::insert_expr::InsertIntoExprTranslator;
|
||||
use tests_fuzz::translator::DslTranslator;
|
||||
use tests_fuzz::utils::cluster_info::wait_for_all_datanode_online;
|
||||
use tests_fuzz::utils::partition::{
|
||||
fetch_partitions, region_distribution, wait_for_all_regions_evicted,
|
||||
};
|
||||
use tests_fuzz::utils::pod_failure::{inject_datanode_pod_failure, recover_pod_failure};
|
||||
use tests_fuzz::utils::{
|
||||
compact_table, flush_memtable, get_gt_fuzz_input_max_rows, get_gt_fuzz_input_max_tables,
|
||||
init_greptime_connections_via_env, Connections, GT_FUZZ_CLUSTER_NAME,
|
||||
GT_FUZZ_CLUSTER_NAMESPACE,
|
||||
};
|
||||
use tests_fuzz::validator::row::count_values;
|
||||
|
||||
struct FuzzContext {
|
||||
greptime: Pool<MySql>,
|
||||
kube: kube::client::Client,
|
||||
namespace: String,
|
||||
cluster_name: String,
|
||||
}
|
||||
|
||||
impl FuzzContext {
|
||||
async fn close(self) {
|
||||
self.greptime.close().await;
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Copy, Clone, Debug)]
|
||||
struct FuzzInput {
|
||||
seed: u64,
|
||||
rows: usize,
|
||||
tables: usize,
|
||||
}
|
||||
|
||||
impl Arbitrary<'_> for FuzzInput {
|
||||
fn arbitrary(u: &mut Unstructured<'_>) -> arbitrary::Result<Self> {
|
||||
let seed = u.int_in_range(u64::MIN..=u64::MAX)?;
|
||||
let mut rng = ChaChaRng::seed_from_u64(seed);
|
||||
let max_rows = get_gt_fuzz_input_max_rows();
|
||||
let rows = rng.gen_range(2..max_rows);
|
||||
let max_tables = get_gt_fuzz_input_max_tables();
|
||||
let tables = rng.gen_range(1..max_tables);
|
||||
Ok(FuzzInput { rows, seed, tables })
|
||||
}
|
||||
}
|
||||
|
||||
fn generate_create_physical_table_expr<R: Rng + 'static>(rng: &mut R) -> Result<CreateTableExpr> {
|
||||
let physical_table_if_not_exists = rng.gen_bool(0.5);
|
||||
let create_physical_table_expr = CreatePhysicalTableExprGeneratorBuilder::default()
|
||||
.name_generator(Box::new(MappedGenerator::new(
|
||||
WordGenerator,
|
||||
merge_two_word_map_fn(random_capitalize_map, uppercase_and_keyword_backtick_map),
|
||||
)))
|
||||
.if_not_exists(physical_table_if_not_exists)
|
||||
.build()
|
||||
.unwrap();
|
||||
create_physical_table_expr.generate(rng)
|
||||
}
|
||||
|
||||
async fn create_physical_table<R: Rng + 'static>(
|
||||
ctx: &FuzzContext,
|
||||
rng: &mut R,
|
||||
) -> Result<TableContextRef> {
|
||||
// Create a physical table and a logical table on top of it
|
||||
let create_physical_table_expr = generate_create_physical_table_expr(rng).unwrap();
|
||||
let translator = CreateTableExprTranslator;
|
||||
let sql = translator.translate(&create_physical_table_expr)?;
|
||||
let result = sqlx::query(&sql)
|
||||
.execute(&ctx.greptime)
|
||||
.await
|
||||
.context(error::ExecuteQuerySnafu { sql: &sql })?;
|
||||
info!("Create physical table: {sql}, result: {result:?}");
|
||||
|
||||
Ok(Arc::new(TableContext::from(&create_physical_table_expr)))
|
||||
}
|
||||
|
||||
fn generate_create_logical_table_expr<R: Rng + 'static>(
|
||||
physical_table_ctx: TableContextRef,
|
||||
rng: &mut R,
|
||||
) -> Result<CreateTableExpr> {
|
||||
let labels = rng.gen_range(1..=5);
|
||||
let logical_table_if_not_exists = rng.gen_bool(0.5);
|
||||
|
||||
let create_logical_table_expr = CreateLogicalTableExprGeneratorBuilder::default()
|
||||
.name_generator(Box::new(MappedGenerator::new(
|
||||
WordGenerator,
|
||||
merge_two_word_map_fn(random_capitalize_map, uppercase_and_keyword_backtick_map),
|
||||
)))
|
||||
.physical_table_ctx(physical_table_ctx)
|
||||
.labels(labels)
|
||||
.if_not_exists(logical_table_if_not_exists)
|
||||
.build()
|
||||
.unwrap();
|
||||
create_logical_table_expr.generate(rng)
|
||||
}
|
||||
|
||||
fn generate_insert_expr<R: Rng + 'static>(
|
||||
rows: usize,
|
||||
rng: &mut R,
|
||||
table_ctx: TableContextRef,
|
||||
) -> Result<InsertIntoExpr> {
|
||||
let insert_generator = InsertExprGeneratorBuilder::default()
|
||||
.omit_column_list(false)
|
||||
.table_ctx(table_ctx)
|
||||
.rows(rows)
|
||||
.value_generator(Box::new(generate_random_value))
|
||||
.ts_value_generator(Box::new(generate_random_timestamp_for_mysql))
|
||||
.build()
|
||||
.unwrap();
|
||||
insert_generator.generate(rng)
|
||||
}
|
||||
|
||||
async fn insert_values<R: Rng + 'static>(
|
||||
rows: usize,
|
||||
ctx: &FuzzContext,
|
||||
rng: &mut R,
|
||||
logical_table_ctx: TableContextRef,
|
||||
) -> Result<InsertIntoExpr> {
|
||||
let insert_expr = generate_insert_expr(rows, rng, logical_table_ctx.clone())?;
|
||||
let translator = InsertIntoExprTranslator;
|
||||
let sql = translator.translate(&insert_expr)?;
|
||||
let result = ctx
|
||||
.greptime
|
||||
// unprepared query, see <https://github.com/GreptimeTeam/greptimedb/issues/3500>
|
||||
.execute(sql.as_str())
|
||||
.await
|
||||
.context(error::ExecuteQuerySnafu { sql: &sql })?;
|
||||
|
||||
ensure!(
|
||||
result.rows_affected() == rows as u64,
|
||||
error::AssertSnafu {
|
||||
reason: format!(
|
||||
"expected rows affected: {}, actual: {}",
|
||||
rows,
|
||||
result.rows_affected(),
|
||||
)
|
||||
}
|
||||
);
|
||||
|
||||
Ok(insert_expr)
|
||||
}
|
||||
|
||||
async fn execute_failover(ctx: FuzzContext, input: FuzzInput) -> Result<()> {
|
||||
let mut rng = ChaCha20Rng::seed_from_u64(input.seed);
|
||||
// Creates a physical table.
|
||||
let physical_table_ctx = create_physical_table(&ctx, &mut rng).await?;
|
||||
|
||||
let mut tables = HashMap::with_capacity(input.tables);
|
||||
|
||||
for _ in 0..input.tables {
|
||||
let translator = CreateTableExprTranslator;
|
||||
let create_logical_table_expr =
|
||||
generate_create_logical_table_expr(physical_table_ctx.clone(), &mut rng).unwrap();
|
||||
if tables.contains_key(&create_logical_table_expr.table_name) {
|
||||
// Ignores same name logical table.
|
||||
continue;
|
||||
}
|
||||
let sql = translator.translate(&create_logical_table_expr)?;
|
||||
let result = sqlx::query(&sql)
|
||||
.execute(&ctx.greptime)
|
||||
.await
|
||||
.context(error::ExecuteQuerySnafu { sql: &sql })?;
|
||||
info!("Create logical table: {sql}, result: {result:?}");
|
||||
let logical_table_ctx = Arc::new(TableContext::from(&create_logical_table_expr));
|
||||
|
||||
let insert_expr =
|
||||
insert_values(input.rows, &ctx, &mut rng, logical_table_ctx.clone()).await?;
|
||||
if rng.gen_bool(0.1) {
|
||||
flush_memtable(&ctx.greptime, &physical_table_ctx.name).await?;
|
||||
}
|
||||
if rng.gen_bool(0.1) {
|
||||
compact_table(&ctx.greptime, &physical_table_ctx.name).await?;
|
||||
}
|
||||
|
||||
tables.insert(
|
||||
logical_table_ctx.name.clone(),
|
||||
(logical_table_ctx.clone(), insert_expr),
|
||||
);
|
||||
}
|
||||
|
||||
let partitions = fetch_partitions(&ctx.greptime, physical_table_ctx.name.clone()).await?;
|
||||
let region_distribution = region_distribution(partitions);
|
||||
let selected_datanode = *region_distribution.keys().next().unwrap();
|
||||
let selected_regions = region_distribution
|
||||
.get(&selected_datanode)
|
||||
.cloned()
|
||||
.unwrap();
|
||||
|
||||
// Injects pod failures
|
||||
info!("Injects pod failures to datanode: {selected_datanode}, regions: {selected_regions:?}");
|
||||
let chaos_name = inject_datanode_pod_failure(
|
||||
ctx.kube.clone(),
|
||||
&ctx.namespace,
|
||||
&ctx.cluster_name,
|
||||
selected_datanode,
|
||||
360,
|
||||
)
|
||||
.await?;
|
||||
|
||||
// Waits for num of regions on `selected_datanode` become to 0.
|
||||
wait_for_all_regions_evicted(
|
||||
ctx.greptime.clone(),
|
||||
selected_datanode,
|
||||
Duration::from_secs(300),
|
||||
)
|
||||
.await;
|
||||
|
||||
// Recovers pod failures
|
||||
recover_pod_failure(ctx.kube.clone(), &ctx.namespace, &chaos_name).await?;
|
||||
wait_for_all_datanode_online(ctx.greptime.clone(), Duration::from_secs(60)).await;
|
||||
|
||||
// Validates value rows
|
||||
info!("Validates num of rows");
|
||||
|
||||
for (table_ctx, insert_expr) in tables.values() {
|
||||
let sql = format!("select count(1) as count from {}", table_ctx.name);
|
||||
let values = count_values(&ctx.greptime, &sql).await?;
|
||||
assert_eq!(values.count as usize, insert_expr.values_list.len());
|
||||
}
|
||||
|
||||
// Clean up
|
||||
for (table_ctx, _) in tables.values() {
|
||||
let sql = format!("DROP TABLE {}", table_ctx.name);
|
||||
let result = sqlx::query(&sql)
|
||||
.execute(&ctx.greptime)
|
||||
.await
|
||||
.context(error::ExecuteQuerySnafu { sql })?;
|
||||
info!("Drop table: {}\n\nResult: {result:?}\n\n", table_ctx.name);
|
||||
}
|
||||
|
||||
let sql = format!("DROP TABLE {}", physical_table_ctx.name);
|
||||
let result = sqlx::query(&sql)
|
||||
.execute(&ctx.greptime)
|
||||
.await
|
||||
.context(error::ExecuteQuerySnafu { sql })?;
|
||||
info!(
|
||||
"Drop table: {}\n\nResult: {result:?}\n\n",
|
||||
physical_table_ctx.name
|
||||
);
|
||||
|
||||
ctx.close().await;
|
||||
Ok(())
|
||||
}
|
||||
|
||||
fuzz_target!(|input: FuzzInput| {
|
||||
common_telemetry::init_default_ut_logging();
|
||||
common_runtime::block_on_write(async {
|
||||
let Connections { mysql } = init_greptime_connections_via_env().await;
|
||||
let ctx = FuzzContext {
|
||||
greptime: mysql.expect("mysql connection init must be succeed"),
|
||||
kube: kube::client::Client::try_default()
|
||||
.await
|
||||
.expect("init kube client"),
|
||||
namespace: env::var(GT_FUZZ_CLUSTER_NAMESPACE).unwrap_or("my-greptimedb".to_string()),
|
||||
cluster_name: env::var(GT_FUZZ_CLUSTER_NAME).unwrap_or("my-greptimedb".to_string()),
|
||||
};
|
||||
execute_failover(ctx, input)
|
||||
.await
|
||||
.unwrap_or_else(|err| panic!("fuzz test must be succeed: {err:?}"));
|
||||
})
|
||||
});
|
||||
@@ -51,10 +51,10 @@ use tests_fuzz::utils::partition::{
|
||||
};
|
||||
use tests_fuzz::utils::pod_failure::{inject_datanode_pod_failure, recover_pod_failure};
|
||||
use tests_fuzz::utils::{
|
||||
compact_table, flush_memtable, get_from_env_or_default_value,
|
||||
compact_table, flush_memtable, get_gt_fuzz_input_max_columns,
|
||||
get_gt_fuzz_input_max_insert_actions, get_gt_fuzz_input_max_rows, get_gt_fuzz_input_max_tables,
|
||||
init_greptime_connections_via_env, Connections, GT_FUZZ_CLUSTER_NAME,
|
||||
GT_FUZZ_CLUSTER_NAMESPACE, GT_FUZZ_INPUT_MAX_COLUMNS, GT_FUZZ_INPUT_MAX_INSERT_ACTIONS,
|
||||
GT_FUZZ_INPUT_MAX_ROWS, GT_FUZZ_INPUT_MAX_TABLES,
|
||||
GT_FUZZ_CLUSTER_NAMESPACE,
|
||||
};
|
||||
use tests_fuzz::validator::row::count_values;
|
||||
use tokio::sync::Semaphore;
|
||||
@@ -85,13 +85,13 @@ impl Arbitrary<'_> for FuzzInput {
|
||||
fn arbitrary(u: &mut Unstructured<'_>) -> arbitrary::Result<Self> {
|
||||
let seed = u.int_in_range(u64::MIN..=u64::MAX)?;
|
||||
let mut rng = ChaChaRng::seed_from_u64(seed);
|
||||
let max_columns = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_COLUMNS, 64);
|
||||
let max_columns = get_gt_fuzz_input_max_columns();
|
||||
let columns = rng.gen_range(2..max_columns);
|
||||
let max_rows = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_ROWS, 2048);
|
||||
let max_rows = get_gt_fuzz_input_max_rows();
|
||||
let rows = rng.gen_range(2..max_rows);
|
||||
let max_tables = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_TABLES, 64);
|
||||
let tables = rng.gen_range(1..max_tables);
|
||||
let max_inserts = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_INSERT_ACTIONS, 8);
|
||||
let max_tables = get_gt_fuzz_input_max_tables();
|
||||
let tables = rng.gen_range(2..max_tables);
|
||||
let max_inserts = get_gt_fuzz_input_max_insert_actions();
|
||||
let inserts = rng.gen_range(2..max_inserts);
|
||||
Ok(FuzzInput {
|
||||
columns,
|
||||
@@ -283,8 +283,6 @@ async fn execute_failover(ctx: FuzzContext, input: FuzzInput) -> Result<()> {
|
||||
let partitions = collect_table_partitions(&ctx, &table_ctxs).await?;
|
||||
let region_distribution = region_distribution(partitions);
|
||||
|
||||
// Ensures num of datanode > 1.
|
||||
assert!(region_distribution.len() > 1);
|
||||
pretty_print_region_distribution(®ion_distribution);
|
||||
let nodes = region_distribution.keys().cloned().collect::<Vec<_>>();
|
||||
let selected_datanode = nodes
|
||||
@@ -321,7 +319,7 @@ async fn execute_failover(ctx: FuzzContext, input: FuzzInput) -> Result<()> {
|
||||
wait_for_all_datanode_online(ctx.greptime.clone(), Duration::from_secs(60)).await;
|
||||
|
||||
// Validates value rows
|
||||
info!("Validates num of values");
|
||||
info!("Validates num of rows");
|
||||
for (table_ctx, expected_rows) in table_ctxs.iter().zip(affected_rows) {
|
||||
let sql = format!("select count(1) as count from {}", table_ctx.name);
|
||||
let values = count_values(&ctx.greptime, &sql).await?;
|
||||
|
||||
@@ -43,8 +43,7 @@ use tests_fuzz::translator::mysql::alter_expr::AlterTableExprTranslator;
|
||||
use tests_fuzz::translator::mysql::create_expr::CreateTableExprTranslator;
|
||||
use tests_fuzz::translator::DslTranslator;
|
||||
use tests_fuzz::utils::{
|
||||
get_from_env_or_default_value, init_greptime_connections_via_env, Connections,
|
||||
GT_FUZZ_INPUT_MAX_ALTER_ACTIONS,
|
||||
get_gt_fuzz_input_max_alter_actions, init_greptime_connections_via_env, Connections,
|
||||
};
|
||||
use tests_fuzz::validator;
|
||||
|
||||
@@ -68,7 +67,7 @@ impl Arbitrary<'_> for FuzzInput {
|
||||
fn arbitrary(u: &mut Unstructured<'_>) -> arbitrary::Result<Self> {
|
||||
let seed = u.int_in_range(u64::MIN..=u64::MAX)?;
|
||||
let mut rng = ChaChaRng::seed_from_u64(seed);
|
||||
let max_actions = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_ALTER_ACTIONS, 256);
|
||||
let max_actions = get_gt_fuzz_input_max_alter_actions();
|
||||
let actions = rng.gen_range(1..max_actions);
|
||||
|
||||
Ok(FuzzInput { seed, actions })
|
||||
|
||||
@@ -41,8 +41,7 @@ use tests_fuzz::translator::mysql::alter_expr::AlterTableExprTranslator;
|
||||
use tests_fuzz::translator::mysql::create_expr::CreateTableExprTranslator;
|
||||
use tests_fuzz::translator::DslTranslator;
|
||||
use tests_fuzz::utils::{
|
||||
get_from_env_or_default_value, init_greptime_connections_via_env, Connections,
|
||||
GT_FUZZ_INPUT_MAX_COLUMNS,
|
||||
get_gt_fuzz_input_max_columns, init_greptime_connections_via_env, Connections,
|
||||
};
|
||||
use tests_fuzz::validator;
|
||||
struct FuzzContext {
|
||||
@@ -70,7 +69,7 @@ enum AlterTableOption {
|
||||
}
|
||||
|
||||
fn generate_create_table_expr<R: Rng + 'static>(rng: &mut R) -> Result<CreateTableExpr> {
|
||||
let max_columns = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_COLUMNS, 30);
|
||||
let max_columns = get_gt_fuzz_input_max_columns();
|
||||
let columns = rng.gen_range(2..max_columns);
|
||||
let create_table_generator = CreateTableExprGeneratorBuilder::default()
|
||||
.name_generator(Box::new(MappedGenerator::new(
|
||||
|
||||
@@ -32,8 +32,7 @@ use tests_fuzz::ir::CreateTableExpr;
|
||||
use tests_fuzz::translator::mysql::create_expr::CreateTableExprTranslator;
|
||||
use tests_fuzz::translator::DslTranslator;
|
||||
use tests_fuzz::utils::{
|
||||
get_from_env_or_default_value, init_greptime_connections_via_env, Connections,
|
||||
GT_FUZZ_INPUT_MAX_COLUMNS,
|
||||
get_gt_fuzz_input_max_columns, init_greptime_connections_via_env, Connections,
|
||||
};
|
||||
use tests_fuzz::validator;
|
||||
|
||||
@@ -57,7 +56,7 @@ impl Arbitrary<'_> for FuzzInput {
|
||||
fn arbitrary(u: &mut Unstructured<'_>) -> arbitrary::Result<Self> {
|
||||
let seed = u.int_in_range(u64::MIN..=u64::MAX)?;
|
||||
let mut rng = ChaChaRng::seed_from_u64(seed);
|
||||
let max_columns = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_COLUMNS, 30);
|
||||
let max_columns = get_gt_fuzz_input_max_columns();
|
||||
let columns = rng.gen_range(2..max_columns);
|
||||
Ok(FuzzInput { columns, seed })
|
||||
}
|
||||
|
||||
@@ -40,8 +40,8 @@ use tests_fuzz::translator::mysql::create_expr::CreateTableExprTranslator;
|
||||
use tests_fuzz::translator::mysql::insert_expr::InsertIntoExprTranslator;
|
||||
use tests_fuzz::translator::DslTranslator;
|
||||
use tests_fuzz::utils::{
|
||||
flush_memtable, get_from_env_or_default_value, init_greptime_connections_via_env, Connections,
|
||||
GT_FUZZ_INPUT_MAX_COLUMNS, GT_FUZZ_INPUT_MAX_ROWS,
|
||||
flush_memtable, get_gt_fuzz_input_max_columns, get_gt_fuzz_input_max_rows,
|
||||
init_greptime_connections_via_env, Connections,
|
||||
};
|
||||
use tests_fuzz::validator;
|
||||
|
||||
@@ -66,9 +66,9 @@ impl Arbitrary<'_> for FuzzInput {
|
||||
fn arbitrary(u: &mut Unstructured<'_>) -> arbitrary::Result<Self> {
|
||||
let seed = u.int_in_range(u64::MIN..=u64::MAX)?;
|
||||
let mut rng = ChaChaRng::seed_from_u64(seed);
|
||||
let max_columns = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_COLUMNS, 30);
|
||||
let max_columns = get_gt_fuzz_input_max_columns();
|
||||
let columns = rng.gen_range(2..max_columns);
|
||||
let max_row = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_ROWS, 2048);
|
||||
let max_row = get_gt_fuzz_input_max_rows();
|
||||
let rows = rng.gen_range(1..max_row);
|
||||
Ok(FuzzInput {
|
||||
columns,
|
||||
|
||||
@@ -43,9 +43,8 @@ use tests_fuzz::translator::mysql::create_expr::CreateTableExprTranslator;
|
||||
use tests_fuzz::translator::mysql::insert_expr::InsertIntoExprTranslator;
|
||||
use tests_fuzz::translator::DslTranslator;
|
||||
use tests_fuzz::utils::{
|
||||
compact_table, flush_memtable, get_from_env_or_default_value,
|
||||
init_greptime_connections_via_env, Connections, GT_FUZZ_INPUT_MAX_ROWS,
|
||||
GT_FUZZ_INPUT_MAX_TABLES,
|
||||
compact_table, flush_memtable, get_gt_fuzz_input_max_rows, get_gt_fuzz_input_max_tables,
|
||||
init_greptime_connections_via_env, Connections,
|
||||
};
|
||||
use tests_fuzz::validator;
|
||||
struct FuzzContext {
|
||||
@@ -69,9 +68,9 @@ impl Arbitrary<'_> for FuzzInput {
|
||||
fn arbitrary(u: &mut Unstructured<'_>) -> arbitrary::Result<Self> {
|
||||
let seed = u.int_in_range(u64::MIN..=u64::MAX)?;
|
||||
let mut rng = ChaChaRng::seed_from_u64(seed);
|
||||
let max_tables = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_TABLES, 32);
|
||||
let max_tables = get_gt_fuzz_input_max_tables();
|
||||
let tables = rng.gen_range(1..max_tables);
|
||||
let max_row = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_ROWS, 2048);
|
||||
let max_row = get_gt_fuzz_input_max_rows();
|
||||
let rows = rng.gen_range(1..max_row);
|
||||
Ok(FuzzInput { tables, seed, rows })
|
||||
}
|
||||
|
||||
@@ -44,9 +44,7 @@ use tests_fuzz::translator::DslTranslator;
|
||||
use tests_fuzz::utils::config::{get_conf_path, write_config_file};
|
||||
use tests_fuzz::utils::health::HttpHealthChecker;
|
||||
use tests_fuzz::utils::process::{ProcessManager, ProcessState, UnstableProcessController};
|
||||
use tests_fuzz::utils::{
|
||||
get_from_env_or_default_value, load_unstable_test_env_variables, GT_FUZZ_INPUT_MAX_TABLES,
|
||||
};
|
||||
use tests_fuzz::utils::{get_gt_fuzz_input_max_tables, load_unstable_test_env_variables};
|
||||
use tests_fuzz::{error, validator};
|
||||
use tokio::sync::watch;
|
||||
|
||||
@@ -70,7 +68,7 @@ impl Arbitrary<'_> for FuzzInput {
|
||||
fn arbitrary(u: &mut Unstructured<'_>) -> arbitrary::Result<Self> {
|
||||
let seed = u.int_in_range(u64::MIN..=u64::MAX)?;
|
||||
let mut rng = ChaChaRng::seed_from_u64(seed);
|
||||
let max_tables = get_from_env_or_default_value(GT_FUZZ_INPUT_MAX_TABLES, 256);
|
||||
let max_tables = get_gt_fuzz_input_max_tables();
|
||||
let tables = rng.gen_range(1..max_tables);
|
||||
Ok(FuzzInput { seed, tables })
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user