Server IP : 185.86.78.101 / Your IP : 216.73.216.213 Web Server : Apache System : Linux 675867-vds-valikoshka1996.gmhost.pp.ua 5.4.0-150-generic #167-Ubuntu SMP Mon May 15 17:35:05 UTC 2023 x86_64 User : www ( 1000) PHP Version : 7.4.33 Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : OFF Directory : /www/server/mysql/mysql-test/include/ |
Upload File : |
let $MYSQLD_DATADIR= `SELECT @@datadir`; LET MYSQLD_DATADIR = `SELECT @@datadir`; --disable_query_log --disable_warnings CREATE TABLE t1(c1 INT PRIMARY KEY) COMPRESSION="ZLIB"; let COMPR_ZIP_WARN= `SHOW WARNINGS`; --enable_warnings --enable_query_log perl; use strict; my $no_holes = ($ENV{COMPR_ZIP_WARN} =~ /Punch hole not supported/)? 1 : 0; ### we do not expect any other warning printf("Unexpected warning: %s\n",$ENV{COMPR_ZIP_WARN}) if (not $no_holes and $ENV{COMPR_ZIP_WARN} ne ''); open(DHF,">$ENV{'MYSQLD_DATADIR'}/compr.inc"); printf DHF "let \$no_holes= %s;\n",$no_holes; close(DHF); EOF --source $MYSQLD_DATADIR/compr.inc --remove_file $MYSQLD_DATADIR/compr.inc --disable_query_log DROP TABLE t1; --enable_query_log if ($no_holes) { --skip Test requires 'Punch hole support' }