2019-03-16 02:08:21 +00:00
|
|
|
#pragma once
|
|
|
|
|
2019-07-01 05:58:31 +00:00
|
|
|
#include <Common/MemoryTracker.h>
|
|
|
|
#include <Common/PODArray.h>
|
2019-05-26 06:52:29 +00:00
|
|
|
#include <Core/Types.h>
|
2019-03-26 18:30:41 +00:00
|
|
|
#include <IO/copyData.h>
|
2019-05-26 06:52:29 +00:00
|
|
|
#include <IO/ReadBuffer.h>
|
2019-07-01 05:58:31 +00:00
|
|
|
#include <IO/ReadBufferFromMemory.h>
|
2019-04-29 06:05:30 +00:00
|
|
|
#include <IO/ReadBufferFromPocoSocket.h>
|
2019-07-01 05:58:31 +00:00
|
|
|
#include <IO/ReadHelpers.h>
|
2019-05-26 06:52:29 +00:00
|
|
|
#include <IO/WriteBuffer.h>
|
2019-04-29 06:05:30 +00:00
|
|
|
#include <IO/WriteBufferFromPocoSocket.h>
|
2019-05-16 03:34:04 +00:00
|
|
|
#include <IO/WriteBufferFromString.h>
|
2019-07-01 05:58:31 +00:00
|
|
|
#include <IO/WriteHelpers.h>
|
2019-04-29 06:05:30 +00:00
|
|
|
#include <Poco/Net/StreamSocket.h>
|
2019-05-26 06:52:29 +00:00
|
|
|
#include <Poco/RandomStream.h>
|
2019-03-16 02:08:21 +00:00
|
|
|
#include <random>
|
|
|
|
#include <sstream>
|
2019-07-19 17:50:42 +00:00
|
|
|
#include <IO/LimitReadBuffer.h>
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-07-19 19:29:44 +00:00
|
|
|
/// Implementation of MySQL wire protocol.
|
|
|
|
/// Works only on little-endian architecture.
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
namespace DB
|
|
|
|
{
|
|
|
|
|
|
|
|
namespace ErrorCodes
|
|
|
|
{
|
|
|
|
extern const int UNKNOWN_PACKET_FROM_CLIENT;
|
|
|
|
}
|
|
|
|
|
|
|
|
namespace MySQLProtocol
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
|
|
|
|
const size_t MAX_PACKET_LENGTH = (1 << 24) - 1; // 16 mb
|
|
|
|
const size_t SCRAMBLE_LENGTH = 20;
|
|
|
|
const size_t AUTH_PLUGIN_DATA_PART_1_LENGTH = 8;
|
|
|
|
const size_t MYSQL_ERRMSG_SIZE = 512;
|
2019-05-16 17:15:43 +00:00
|
|
|
const size_t PACKET_HEADER_SIZE = 4;
|
|
|
|
const size_t SSL_REQUEST_PAYLOAD_SIZE = 32;
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
namespace Authentication
|
|
|
|
{
|
2019-07-23 07:10:06 +00:00
|
|
|
const String Native = "mysql_native_password";
|
2019-05-16 17:15:43 +00:00
|
|
|
const String SHA256 = "sha256_password"; /// Caching SHA2 plugin is not used because it would be possible to authenticate knowing hash from users.xml.
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
enum CharacterSet
|
|
|
|
{
|
|
|
|
utf8_general_ci = 33,
|
|
|
|
binary = 63
|
2019-03-16 02:08:21 +00:00
|
|
|
};
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
enum StatusFlags
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
SERVER_SESSION_STATE_CHANGED = 0x4000
|
|
|
|
};
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
enum Capability
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
CLIENT_CONNECT_WITH_DB = 0x00000008,
|
|
|
|
CLIENT_PROTOCOL_41 = 0x00000200,
|
2019-04-29 06:05:30 +00:00
|
|
|
CLIENT_SSL = 0x00000800,
|
2019-03-16 02:08:21 +00:00
|
|
|
CLIENT_TRANSACTIONS = 0x00002000, // TODO
|
|
|
|
CLIENT_SESSION_TRACK = 0x00800000, // TODO
|
|
|
|
CLIENT_SECURE_CONNECTION = 0x00008000,
|
|
|
|
CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA = 0x00200000,
|
|
|
|
CLIENT_PLUGIN_AUTH = 0x00080000,
|
|
|
|
CLIENT_DEPRECATE_EOF = 0x01000000,
|
|
|
|
};
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
enum Command
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
COM_SLEEP = 0x0,
|
|
|
|
COM_QUIT = 0x1,
|
|
|
|
COM_INIT_DB = 0x2,
|
|
|
|
COM_QUERY = 0x3,
|
|
|
|
COM_FIELD_LIST = 0x4,
|
|
|
|
COM_CREATE_DB = 0x5,
|
|
|
|
COM_DROP_DB = 0x6,
|
|
|
|
COM_REFRESH = 0x7,
|
|
|
|
COM_SHUTDOWN = 0x8,
|
|
|
|
COM_STATISTICS = 0x9,
|
|
|
|
COM_PROCESS_INFO = 0xa,
|
|
|
|
COM_CONNECT = 0xb,
|
|
|
|
COM_PROCESS_KILL = 0xc,
|
|
|
|
COM_DEBUG = 0xd,
|
|
|
|
COM_PING = 0xe,
|
|
|
|
COM_TIME = 0xf,
|
|
|
|
COM_DELAYED_INSERT = 0x10,
|
|
|
|
COM_CHANGE_USER = 0x11,
|
|
|
|
COM_RESET_CONNECTION = 0x1f,
|
|
|
|
COM_DAEMON = 0x1d
|
|
|
|
};
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
enum ColumnType
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
MYSQL_TYPE_DECIMAL = 0x00,
|
|
|
|
MYSQL_TYPE_TINY = 0x01,
|
|
|
|
MYSQL_TYPE_SHORT = 0x02,
|
|
|
|
MYSQL_TYPE_LONG = 0x03,
|
|
|
|
MYSQL_TYPE_FLOAT = 0x04,
|
|
|
|
MYSQL_TYPE_DOUBLE = 0x05,
|
|
|
|
MYSQL_TYPE_NULL = 0x06,
|
|
|
|
MYSQL_TYPE_TIMESTAMP = 0x07,
|
|
|
|
MYSQL_TYPE_LONGLONG = 0x08,
|
|
|
|
MYSQL_TYPE_INT24 = 0x09,
|
|
|
|
MYSQL_TYPE_DATE = 0x0a,
|
|
|
|
MYSQL_TYPE_TIME = 0x0b,
|
|
|
|
MYSQL_TYPE_DATETIME = 0x0c,
|
|
|
|
MYSQL_TYPE_YEAR = 0x0d,
|
|
|
|
MYSQL_TYPE_VARCHAR = 0x0f,
|
|
|
|
MYSQL_TYPE_BIT = 0x10,
|
|
|
|
MYSQL_TYPE_NEWDECIMAL = 0xf6,
|
|
|
|
MYSQL_TYPE_ENUM = 0xf7,
|
|
|
|
MYSQL_TYPE_SET = 0xf8,
|
|
|
|
MYSQL_TYPE_TINY_BLOB = 0xf9,
|
|
|
|
MYSQL_TYPE_MEDIUM_BLOB = 0xfa,
|
|
|
|
MYSQL_TYPE_LONG_BLOB = 0xfb,
|
|
|
|
MYSQL_TYPE_BLOB = 0xfc,
|
|
|
|
MYSQL_TYPE_VAR_STRING = 0xfd,
|
|
|
|
MYSQL_TYPE_STRING = 0xfe,
|
|
|
|
MYSQL_TYPE_GEOMETRY = 0xff
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
class ProtocolError : public DB::Exception
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
using Exception::Exception;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
/** Reading packets.
|
|
|
|
* Internally, it calls (if no more data) next() method of the underlying ReadBufferFromPocoSocket, and sets the working buffer to the rest part of the current packet payload.
|
|
|
|
*/
|
2019-07-14 22:13:56 +00:00
|
|
|
class PacketPayloadReadBuffer : public ReadBuffer
|
|
|
|
{
|
|
|
|
public:
|
2019-07-16 06:39:18 +00:00
|
|
|
PacketPayloadReadBuffer(ReadBuffer & in, uint8_t & sequence_id)
|
|
|
|
: ReadBuffer(in.position(), 0) // not in.buffer().begin(), because working buffer may include previous packet
|
|
|
|
, in(in)
|
|
|
|
, sequence_id(sequence_id)
|
2019-07-14 22:53:30 +00:00
|
|
|
{
|
2019-07-14 22:13:56 +00:00
|
|
|
}
|
2019-07-19 17:50:42 +00:00
|
|
|
|
2019-07-14 22:13:56 +00:00
|
|
|
private:
|
|
|
|
ReadBuffer & in;
|
2019-07-16 06:39:18 +00:00
|
|
|
uint8_t & sequence_id;
|
2019-07-14 22:13:56 +00:00
|
|
|
const size_t max_packet_size = MAX_PACKET_LENGTH;
|
|
|
|
|
|
|
|
// Size of packet which is being read now.
|
|
|
|
size_t payload_length = 0;
|
|
|
|
|
|
|
|
// Offset in packet payload.
|
|
|
|
size_t offset = 0;
|
2019-07-16 06:39:18 +00:00
|
|
|
|
2019-07-14 22:13:56 +00:00
|
|
|
protected:
|
|
|
|
bool nextImpl() override
|
|
|
|
{
|
|
|
|
if (payload_length == 0 || (payload_length == max_packet_size && offset == payload_length))
|
|
|
|
{
|
|
|
|
working_buffer.resize(0);
|
|
|
|
offset = 0;
|
|
|
|
payload_length = 0;
|
|
|
|
in.readStrict(reinterpret_cast<char *>(&payload_length), 3);
|
|
|
|
|
|
|
|
if (payload_length > max_packet_size)
|
|
|
|
{
|
|
|
|
std::ostringstream tmp;
|
|
|
|
tmp << "Received packet with payload larger than max_packet_size: " << payload_length;
|
|
|
|
throw ProtocolError(tmp.str(), ErrorCodes::UNKNOWN_PACKET_FROM_CLIENT);
|
|
|
|
}
|
|
|
|
else if (payload_length == 0)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t packet_sequence_id = 0;
|
|
|
|
in.read(reinterpret_cast<char &>(packet_sequence_id));
|
|
|
|
if (packet_sequence_id != sequence_id)
|
|
|
|
{
|
|
|
|
std::ostringstream tmp;
|
2019-07-16 06:39:18 +00:00
|
|
|
tmp << "Received packet with wrong sequence-id: " << packet_sequence_id << ". Expected: " << static_cast<unsigned int>(sequence_id) << '.';
|
2019-07-14 22:13:56 +00:00
|
|
|
throw ProtocolError(tmp.str(), ErrorCodes::UNKNOWN_PACKET_FROM_CLIENT);
|
|
|
|
}
|
|
|
|
sequence_id++;
|
|
|
|
}
|
|
|
|
else if (offset == payload_length)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
in.nextIfAtEnd();
|
|
|
|
working_buffer = ReadBuffer::Buffer(in.position(), in.buffer().end());
|
|
|
|
size_t count = std::min(in.available(), payload_length - offset);
|
|
|
|
working_buffer.resize(count);
|
|
|
|
in.ignore(count);
|
|
|
|
|
|
|
|
offset += count;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2019-07-19 17:50:42 +00:00
|
|
|
class ClientPacket
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
ClientPacket() = default;
|
|
|
|
ClientPacket(ClientPacket &&) = default;
|
|
|
|
|
|
|
|
virtual void read(ReadBuffer & in, uint8_t & sequence_id)
|
|
|
|
{
|
|
|
|
PacketPayloadReadBuffer payload(in, sequence_id);
|
|
|
|
readPayload(payload);
|
2019-07-19 19:29:44 +00:00
|
|
|
if (!payload.eof())
|
|
|
|
{
|
|
|
|
std::stringstream tmp;
|
|
|
|
tmp << "Packet payload is not fully read. Stopped after " << payload.count() << " bytes, while " << payload.available() << " bytes are in buffer.";
|
|
|
|
throw ProtocolError(tmp.str(), ErrorCodes::UNKNOWN_PACKET_FROM_CLIENT);
|
|
|
|
}
|
2019-07-19 17:50:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
virtual void readPayload(ReadBuffer & buf) = 0;
|
|
|
|
|
|
|
|
virtual ~ClientPacket() = default;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
class LimitedClientPacket : public ClientPacket
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
void read(ReadBuffer & in, uint8_t & sequence_id) override
|
|
|
|
{
|
|
|
|
LimitReadBuffer limited(in, 10000, true, "too long MySQL packet.");
|
|
|
|
ClientPacket::read(limited, sequence_id);
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
/** Writing packets.
|
|
|
|
* https://dev.mysql.com/doc/internals/en/mysql-packet.html
|
|
|
|
*/
|
2019-07-15 20:37:01 +00:00
|
|
|
class PacketPayloadWriteBuffer : public WriteBuffer
|
|
|
|
{
|
2019-07-16 06:39:18 +00:00
|
|
|
public:
|
|
|
|
PacketPayloadWriteBuffer(WriteBuffer & out, size_t payload_length, uint8_t & sequence_id)
|
|
|
|
: WriteBuffer(out.position(), 0)
|
|
|
|
, out(out)
|
|
|
|
, sequence_id(sequence_id)
|
|
|
|
, total_left(payload_length)
|
|
|
|
{
|
|
|
|
startPacket();
|
|
|
|
}
|
|
|
|
|
|
|
|
void checkPayloadSize()
|
|
|
|
{
|
|
|
|
if (bytes_written + offset() < payload_length)
|
|
|
|
{
|
|
|
|
std::stringstream ss;
|
|
|
|
ss << "Incomplete payload. Written " << bytes << " bytes, expected " << payload_length << " bytes.";
|
|
|
|
throw Exception(ss.str(), 0);
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
~PacketPayloadWriteBuffer() override { next(); }
|
2019-07-15 20:37:01 +00:00
|
|
|
private:
|
2019-07-16 06:39:18 +00:00
|
|
|
WriteBuffer & out;
|
|
|
|
uint8_t & sequence_id;
|
|
|
|
|
|
|
|
size_t total_left = 0;
|
|
|
|
size_t payload_length = 0;
|
|
|
|
size_t bytes_written = 0;
|
|
|
|
|
|
|
|
void startPacket()
|
|
|
|
{
|
|
|
|
payload_length = std::min(total_left, MAX_PACKET_LENGTH);
|
|
|
|
bytes_written = 0;
|
|
|
|
total_left -= payload_length;
|
2019-07-15 20:37:01 +00:00
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
out.write(reinterpret_cast<char *>(&payload_length), 3);
|
|
|
|
out.write(sequence_id++);
|
|
|
|
|
|
|
|
working_buffer = WriteBuffer::Buffer(out.position(), out.position() + std::min(payload_length - bytes_written, out.available()));
|
|
|
|
pos = working_buffer.begin();
|
|
|
|
}
|
2019-07-15 20:37:01 +00:00
|
|
|
protected:
|
|
|
|
void nextImpl() override
|
|
|
|
{
|
2019-07-16 06:39:18 +00:00
|
|
|
int written = pos - working_buffer.begin();
|
|
|
|
out.position() += written;
|
|
|
|
bytes_written += written;
|
2019-07-15 20:37:01 +00:00
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
if (bytes_written < payload_length)
|
|
|
|
{
|
|
|
|
out.nextIfAtEnd();
|
|
|
|
working_buffer = WriteBuffer::Buffer(out.position(), out.position() + std::min(payload_length - bytes_written, out.available()));
|
|
|
|
}
|
|
|
|
else if (total_left > 0 || payload_length == MAX_PACKET_LENGTH)
|
|
|
|
{
|
2019-07-28 00:41:41 +00:00
|
|
|
// Starting new packet, since packets of size greater than MAX_PACKET_LENGTH should be split.
|
2019-07-16 06:39:18 +00:00
|
|
|
startPacket();
|
2019-07-28 01:34:48 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2019-07-28 00:41:41 +00:00
|
|
|
// Finished writing packet. Buffer is set to empty to prevent rewriting (pos will be set to the beginning of a working buffer in next()).
|
|
|
|
// Further attempts to write will stall in the infinite loop.
|
|
|
|
working_buffer = WriteBuffer::Buffer(out.position(), out.position());
|
2019-07-16 06:39:18 +00:00
|
|
|
}
|
2019-07-15 20:37:01 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
class WritePacket
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
virtual void writePayload(WriteBuffer & buffer, uint8_t & sequence_id) const
|
|
|
|
{
|
|
|
|
PacketPayloadWriteBuffer buf(buffer, getPayloadSize(), sequence_id);
|
|
|
|
writePayloadImpl(buf);
|
|
|
|
buf.checkPayloadSize();
|
|
|
|
}
|
|
|
|
|
|
|
|
virtual ~WritePacket() = default;
|
|
|
|
|
|
|
|
protected:
|
|
|
|
virtual size_t getPayloadSize() const = 0;
|
|
|
|
|
|
|
|
virtual void writePayloadImpl(WriteBuffer & buffer) const = 0;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
/* Writes and reads packets, keeping sequence-id.
|
|
|
|
* Throws ProtocolError, if packet with incorrect sequence-id was received.
|
|
|
|
*/
|
|
|
|
class PacketSender
|
|
|
|
{
|
|
|
|
public:
|
2019-07-16 06:39:18 +00:00
|
|
|
uint8_t & sequence_id;
|
2019-05-16 03:34:04 +00:00
|
|
|
ReadBuffer * in;
|
|
|
|
WriteBuffer * out;
|
2019-05-16 17:15:43 +00:00
|
|
|
size_t max_packet_size = MAX_PACKET_LENGTH;
|
2019-03-26 18:30:41 +00:00
|
|
|
|
2019-05-16 03:34:04 +00:00
|
|
|
/// For reading and writing.
|
2019-07-16 06:39:18 +00:00
|
|
|
PacketSender(ReadBuffer & in, WriteBuffer & out, uint8_t & sequence_id)
|
2019-05-16 03:34:04 +00:00
|
|
|
: sequence_id(sequence_id)
|
|
|
|
, in(&in)
|
|
|
|
, out(&out)
|
|
|
|
{
|
|
|
|
}
|
2019-04-29 06:05:30 +00:00
|
|
|
|
2019-05-16 03:34:04 +00:00
|
|
|
/// For writing.
|
2019-07-16 06:39:18 +00:00
|
|
|
PacketSender(WriteBuffer & out, uint8_t & sequence_id)
|
2019-04-29 06:05:30 +00:00
|
|
|
: sequence_id(sequence_id)
|
2019-05-16 03:34:04 +00:00
|
|
|
, in(nullptr)
|
|
|
|
, out(&out)
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-07-19 17:50:42 +00:00
|
|
|
void receivePacket(ClientPacket & packet)
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-07-19 17:50:42 +00:00
|
|
|
packet.read(*in, sequence_id);
|
2019-03-26 18:30:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
template<class T>
|
|
|
|
void sendPacket(const T & packet, bool flush = false)
|
|
|
|
{
|
|
|
|
static_assert(std::is_base_of<WritePacket, T>());
|
2019-07-16 06:39:18 +00:00
|
|
|
packet.writePayload(*out, sequence_id);
|
2019-03-26 18:30:41 +00:00
|
|
|
if (flush)
|
|
|
|
out->next();
|
|
|
|
}
|
|
|
|
|
2019-07-19 17:50:42 +00:00
|
|
|
PacketPayloadReadBuffer getPayload()
|
|
|
|
{
|
|
|
|
return PacketPayloadReadBuffer(*in, sequence_id);
|
|
|
|
}
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
/// Sets sequence-id to 0. Must be called before each command phase.
|
|
|
|
void resetSequenceId();
|
|
|
|
|
|
|
|
/// Converts packet to text. Is used for debug output.
|
2019-07-16 06:39:18 +00:00
|
|
|
static String packetToText(const String & payload);
|
2019-03-16 02:08:21 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2019-07-01 05:58:31 +00:00
|
|
|
uint64_t readLengthEncodedNumber(ReadBuffer & ss);
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-07-01 05:58:31 +00:00
|
|
|
void writeLengthEncodedNumber(uint64_t x, WriteBuffer & buffer);
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
inline void writeLengthEncodedString(const String & s, WriteBuffer & buffer)
|
2019-07-01 05:58:31 +00:00
|
|
|
{
|
|
|
|
writeLengthEncodedNumber(s.size(), buffer);
|
|
|
|
buffer.write(s.data(), s.size());
|
|
|
|
}
|
2019-03-26 18:30:41 +00:00
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
inline void writeNulTerminatedString(const String & s, WriteBuffer & buffer)
|
2019-07-01 05:58:31 +00:00
|
|
|
{
|
|
|
|
buffer.write(s.data(), s.size());
|
|
|
|
buffer.write(0);
|
|
|
|
}
|
2019-03-26 18:30:41 +00:00
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
size_t getLengthEncodedNumberSize(uint64_t x);
|
|
|
|
|
|
|
|
size_t getLengthEncodedStringSize(const String & s);
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
|
|
|
|
class Handshake : public WritePacket
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
int protocol_version = 0xa;
|
2019-03-26 18:30:41 +00:00
|
|
|
String server_version;
|
2019-03-16 02:08:21 +00:00
|
|
|
uint32_t connection_id;
|
|
|
|
uint32_t capability_flags;
|
|
|
|
uint8_t character_set;
|
|
|
|
uint32_t status_flags;
|
2019-07-28 00:41:41 +00:00
|
|
|
String auth_plugin_name;
|
2019-03-26 18:30:41 +00:00
|
|
|
String auth_plugin_data;
|
2019-03-16 02:08:21 +00:00
|
|
|
public:
|
2019-07-28 00:41:41 +00:00
|
|
|
explicit Handshake(uint32_t capability_flags, uint32_t connection_id, String server_version, String auth_plugin_name, String auth_plugin_data)
|
2019-04-22 10:57:50 +00:00
|
|
|
: protocol_version(0xa)
|
|
|
|
, server_version(std::move(server_version))
|
|
|
|
, connection_id(connection_id)
|
2019-05-26 06:52:29 +00:00
|
|
|
, capability_flags(capability_flags)
|
2019-04-22 10:57:50 +00:00
|
|
|
, character_set(CharacterSet::utf8_general_ci)
|
|
|
|
, status_flags(0)
|
2019-07-28 00:41:41 +00:00
|
|
|
, auth_plugin_name(std::move(auth_plugin_name))
|
2019-07-01 05:58:31 +00:00
|
|
|
, auth_plugin_data(std::move(auth_plugin_data))
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
protected:
|
|
|
|
size_t getPayloadSize() const override
|
|
|
|
{
|
2019-07-28 00:41:41 +00:00
|
|
|
return 26 + server_version.size() + auth_plugin_data.size() + auth_plugin_name.size();
|
2019-07-16 06:39:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void writePayloadImpl(WriteBuffer & buffer) const override
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
buffer.write(static_cast<char>(protocol_version));
|
|
|
|
writeNulTerminatedString(server_version, buffer);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&connection_id), 4);
|
|
|
|
writeNulTerminatedString(auth_plugin_data.substr(0, AUTH_PLUGIN_DATA_PART_1_LENGTH), buffer);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&capability_flags), 2);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&character_set), 1);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&status_flags), 2);
|
|
|
|
buffer.write((reinterpret_cast<const char *>(&capability_flags)) + 2, 2);
|
|
|
|
buffer.write(static_cast<char>(auth_plugin_data.size()));
|
|
|
|
writeChar(0x0, 10, buffer);
|
|
|
|
writeString(auth_plugin_data.substr(AUTH_PLUGIN_DATA_PART_1_LENGTH, auth_plugin_data.size() - AUTH_PLUGIN_DATA_PART_1_LENGTH), buffer);
|
2019-07-23 07:10:06 +00:00
|
|
|
// A workaround for PHP mysqlnd extension bug which occurs when sha256_password is used as a default authentication plugin.
|
|
|
|
// Instead of using client response for mysql_native_password plugin, the server will always generate authentication method mismatch
|
|
|
|
// and switch to sha256_password to simulate that mysql_native_password is used as a default plugin.
|
2019-07-28 00:41:41 +00:00
|
|
|
writeString(auth_plugin_name, buffer);
|
2019-07-01 05:58:31 +00:00
|
|
|
writeChar(0x0, 1, buffer);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-07-19 17:50:42 +00:00
|
|
|
class SSLRequest : public ClientPacket
|
2019-04-29 06:05:30 +00:00
|
|
|
{
|
|
|
|
public:
|
|
|
|
uint32_t capability_flags;
|
|
|
|
uint32_t max_packet_size;
|
|
|
|
uint8_t character_set;
|
|
|
|
|
2019-07-14 22:13:56 +00:00
|
|
|
void readPayload(ReadBuffer & buf) override
|
2019-04-29 06:05:30 +00:00
|
|
|
{
|
2019-07-14 22:13:56 +00:00
|
|
|
buf.readStrict(reinterpret_cast<char *>(&capability_flags), 4);
|
|
|
|
buf.readStrict(reinterpret_cast<char *>(&max_packet_size), 4);
|
|
|
|
buf.readStrict(reinterpret_cast<char *>(&character_set), 1);
|
2019-04-29 06:05:30 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-07-19 17:50:42 +00:00
|
|
|
class HandshakeResponse : public LimitedClientPacket
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
public:
|
2019-07-01 05:58:31 +00:00
|
|
|
uint32_t capability_flags = 0;
|
|
|
|
uint32_t max_packet_size = 0;
|
|
|
|
uint8_t character_set = 0;
|
2019-03-26 18:30:41 +00:00
|
|
|
String username;
|
|
|
|
String auth_response;
|
|
|
|
String database;
|
|
|
|
String auth_plugin_name;
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-04-29 06:05:30 +00:00
|
|
|
HandshakeResponse() = default;
|
|
|
|
|
2019-07-14 22:13:56 +00:00
|
|
|
void readPayload(ReadBuffer & payload) override
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-07-14 22:13:56 +00:00
|
|
|
payload.readStrict(reinterpret_cast<char *>(&capability_flags), 4);
|
|
|
|
payload.readStrict(reinterpret_cast<char *>(&max_packet_size), 4);
|
|
|
|
payload.readStrict(reinterpret_cast<char *>(&character_set), 1);
|
|
|
|
payload.ignore(23);
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-07-14 22:13:56 +00:00
|
|
|
readNullTerminated(username, payload);
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
if (capability_flags & CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA)
|
|
|
|
{
|
2019-07-14 22:13:56 +00:00
|
|
|
auto len = readLengthEncodedNumber(payload);
|
2019-03-16 02:08:21 +00:00
|
|
|
auth_response.resize(len);
|
2019-07-14 22:13:56 +00:00
|
|
|
payload.readStrict(auth_response.data(), len);
|
2019-03-26 18:30:41 +00:00
|
|
|
}
|
|
|
|
else if (capability_flags & CLIENT_SECURE_CONNECTION)
|
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
char len;
|
2019-07-14 22:13:56 +00:00
|
|
|
payload.readStrict(len);
|
2019-07-01 05:58:31 +00:00
|
|
|
auth_response.resize(static_cast<unsigned int>(len));
|
2019-07-14 22:13:56 +00:00
|
|
|
payload.readStrict(auth_response.data(), len);
|
2019-03-26 18:30:41 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2019-07-14 22:13:56 +00:00
|
|
|
readNullTerminated(auth_response, payload);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
if (capability_flags & CLIENT_CONNECT_WITH_DB)
|
|
|
|
{
|
2019-07-14 22:13:56 +00:00
|
|
|
readNullTerminated(database, payload);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
if (capability_flags & CLIENT_PLUGIN_AUTH)
|
|
|
|
{
|
2019-07-14 22:13:56 +00:00
|
|
|
readNullTerminated(auth_plugin_name, payload);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
class AuthSwitchRequest : public WritePacket
|
|
|
|
{
|
|
|
|
String plugin_name;
|
|
|
|
String auth_plugin_data;
|
|
|
|
public:
|
|
|
|
AuthSwitchRequest(String plugin_name, String auth_plugin_data)
|
|
|
|
: plugin_name(std::move(plugin_name)), auth_plugin_data(std::move(auth_plugin_data))
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
protected:
|
|
|
|
size_t getPayloadSize() const override
|
|
|
|
{
|
|
|
|
return 2 + plugin_name.size() + auth_plugin_data.size();
|
|
|
|
}
|
|
|
|
|
|
|
|
void writePayloadImpl(WriteBuffer & buffer) const override
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
buffer.write(0xfe);
|
|
|
|
writeNulTerminatedString(plugin_name, buffer);
|
|
|
|
writeString(auth_plugin_data, buffer);
|
2019-03-26 18:30:41 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-07-19 17:50:42 +00:00
|
|
|
class AuthSwitchResponse : public LimitedClientPacket
|
2019-04-22 10:57:50 +00:00
|
|
|
{
|
|
|
|
public:
|
|
|
|
String value;
|
|
|
|
|
2019-07-14 22:13:56 +00:00
|
|
|
void readPayload(ReadBuffer & payload) override
|
2019-04-22 10:57:50 +00:00
|
|
|
{
|
2019-07-14 22:13:56 +00:00
|
|
|
readStringUntilEOF(value, payload);
|
2019-04-22 10:57:50 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class AuthMoreData : public WritePacket
|
|
|
|
{
|
|
|
|
String data;
|
|
|
|
public:
|
2019-07-01 05:58:31 +00:00
|
|
|
explicit AuthMoreData(String data): data(std::move(data)) {}
|
2019-04-22 10:57:50 +00:00
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
protected:
|
|
|
|
size_t getPayloadSize() const override
|
|
|
|
{
|
|
|
|
return 1 + data.size();
|
|
|
|
}
|
|
|
|
|
|
|
|
void writePayloadImpl(WriteBuffer & buffer) const override
|
2019-04-22 10:57:50 +00:00
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
buffer.write(0x01);
|
|
|
|
writeString(data, buffer);
|
2019-04-22 10:57:50 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
|
|
|
|
class OK_Packet : public WritePacket
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
uint8_t header;
|
|
|
|
uint32_t capabilities;
|
|
|
|
uint64_t affected_rows;
|
|
|
|
int16_t warnings = 0;
|
|
|
|
uint32_t status_flags;
|
2019-03-26 18:30:41 +00:00
|
|
|
String session_state_changes;
|
2019-05-16 05:36:08 +00:00
|
|
|
String info;
|
2019-03-16 02:08:21 +00:00
|
|
|
public:
|
2019-05-16 05:36:08 +00:00
|
|
|
OK_Packet(uint8_t header,
|
|
|
|
uint32_t capabilities,
|
|
|
|
uint64_t affected_rows,
|
|
|
|
uint32_t status_flags,
|
|
|
|
int16_t warnings,
|
|
|
|
String session_state_changes = "",
|
|
|
|
String info = "")
|
|
|
|
: header(header)
|
|
|
|
, capabilities(capabilities)
|
|
|
|
, affected_rows(affected_rows)
|
|
|
|
, warnings(warnings)
|
|
|
|
, status_flags(status_flags)
|
|
|
|
, session_state_changes(std::move(session_state_changes))
|
2019-07-14 22:13:56 +00:00
|
|
|
, info(std::move(info))
|
2019-03-16 02:08:21 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
protected:
|
|
|
|
size_t getPayloadSize() const override
|
|
|
|
{
|
|
|
|
size_t result = 2 + getLengthEncodedNumberSize(affected_rows);
|
|
|
|
|
|
|
|
if (capabilities & CLIENT_PROTOCOL_41)
|
|
|
|
{
|
|
|
|
result += 4;
|
|
|
|
}
|
|
|
|
else if (capabilities & CLIENT_TRANSACTIONS)
|
|
|
|
{
|
|
|
|
result += 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (capabilities & CLIENT_SESSION_TRACK)
|
|
|
|
{
|
|
|
|
result += getLengthEncodedStringSize(info);
|
|
|
|
if (status_flags & SERVER_SESSION_STATE_CHANGED)
|
|
|
|
result += getLengthEncodedStringSize(session_state_changes);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
result += info.size();
|
|
|
|
}
|
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
void writePayloadImpl(WriteBuffer & buffer) const override
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
buffer.write(header);
|
|
|
|
writeLengthEncodedNumber(affected_rows, buffer);
|
|
|
|
writeLengthEncodedNumber(0, buffer); /// last insert-id
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
if (capabilities & CLIENT_PROTOCOL_41)
|
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
buffer.write(reinterpret_cast<const char *>(&status_flags), 2);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&warnings), 2);
|
2019-03-26 18:30:41 +00:00
|
|
|
}
|
|
|
|
else if (capabilities & CLIENT_TRANSACTIONS)
|
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
buffer.write(reinterpret_cast<const char *>(&status_flags), 2);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
if (capabilities & CLIENT_SESSION_TRACK)
|
|
|
|
{
|
2019-07-16 06:39:18 +00:00
|
|
|
writeLengthEncodedString(info, buffer);
|
2019-03-26 18:30:41 +00:00
|
|
|
if (status_flags & SERVER_SESSION_STATE_CHANGED)
|
2019-07-16 06:39:18 +00:00
|
|
|
writeLengthEncodedString(session_state_changes, buffer);
|
2019-03-26 18:30:41 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
writeString(info, buffer);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
class EOF_Packet : public WritePacket
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
int warnings;
|
|
|
|
int status_flags;
|
|
|
|
public:
|
2019-03-26 18:30:41 +00:00
|
|
|
EOF_Packet(int warnings, int status_flags) : warnings(warnings), status_flags(status_flags)
|
|
|
|
{}
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
protected:
|
|
|
|
size_t getPayloadSize() const override
|
|
|
|
{
|
|
|
|
return 5;
|
|
|
|
}
|
|
|
|
|
|
|
|
void writePayloadImpl(WriteBuffer & buffer) const override
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
buffer.write(0xfe); // EOF header
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&warnings), 2);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&status_flags), 2);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
class ERR_Packet : public WritePacket
|
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
int error_code;
|
2019-03-26 18:30:41 +00:00
|
|
|
String sql_state;
|
|
|
|
String error_message;
|
2019-03-16 02:08:21 +00:00
|
|
|
public:
|
2019-03-26 18:30:41 +00:00
|
|
|
ERR_Packet(int error_code, String sql_state, String error_message)
|
|
|
|
: error_code(error_code), sql_state(std::move(sql_state)), error_message(std::move(error_message))
|
2019-03-16 02:08:21 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
protected:
|
|
|
|
size_t getPayloadSize() const override
|
|
|
|
{
|
|
|
|
return 4 + sql_state.length() + std::min(error_message.length(), MYSQL_ERRMSG_SIZE);
|
|
|
|
}
|
|
|
|
|
|
|
|
void writePayloadImpl(WriteBuffer & buffer) const override
|
2019-03-16 02:08:21 +00:00
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
buffer.write(0xff);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&error_code), 2);
|
|
|
|
buffer.write('#');
|
|
|
|
buffer.write(sql_state.data(), sql_state.length());
|
|
|
|
buffer.write(error_message.data(), std::min(error_message.length(), MYSQL_ERRMSG_SIZE));
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
class ColumnDefinition : public WritePacket
|
|
|
|
{
|
|
|
|
String schema;
|
|
|
|
String table;
|
|
|
|
String org_table;
|
|
|
|
String name;
|
|
|
|
String org_name;
|
2019-03-16 02:08:21 +00:00
|
|
|
size_t next_length = 0x0c;
|
|
|
|
uint16_t character_set;
|
|
|
|
uint32_t column_length;
|
|
|
|
ColumnType column_type;
|
|
|
|
uint16_t flags;
|
|
|
|
uint8_t decimals = 0x00;
|
|
|
|
public:
|
2019-03-26 18:30:41 +00:00
|
|
|
ColumnDefinition(
|
|
|
|
String schema,
|
|
|
|
String table,
|
|
|
|
String org_table,
|
|
|
|
String name,
|
|
|
|
String org_name,
|
2019-03-16 02:08:21 +00:00
|
|
|
uint16_t character_set,
|
|
|
|
uint32_t column_length,
|
|
|
|
ColumnType column_type,
|
|
|
|
uint16_t flags,
|
|
|
|
uint8_t decimals)
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
: schema(std::move(schema)), table(std::move(table)), org_table(std::move(org_table)), name(std::move(name)),
|
|
|
|
org_name(std::move(org_name)), character_set(character_set), column_length(column_length), column_type(column_type), flags(flags),
|
|
|
|
decimals(decimals)
|
2019-03-16 02:08:21 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
/// Should be used when column metadata (original name, table, original table, database) is unknown.
|
|
|
|
ColumnDefinition(
|
|
|
|
String name,
|
|
|
|
uint16_t character_set,
|
|
|
|
uint32_t column_length,
|
|
|
|
ColumnType column_type,
|
|
|
|
uint16_t flags,
|
|
|
|
uint8_t decimals)
|
|
|
|
: ColumnDefinition("", "", "", std::move(name), "", character_set, column_length, column_type, flags, decimals)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
protected:
|
|
|
|
size_t getPayloadSize() const override
|
|
|
|
{
|
|
|
|
return 13 + getLengthEncodedStringSize("def") + getLengthEncodedStringSize(schema) + getLengthEncodedStringSize(table) + getLengthEncodedStringSize(org_table) + \
|
|
|
|
getLengthEncodedStringSize(name) + getLengthEncodedStringSize(org_name) + getLengthEncodedNumberSize(next_length);
|
|
|
|
}
|
|
|
|
|
|
|
|
void writePayloadImpl(WriteBuffer & buffer) const override
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
writeLengthEncodedString(std::string("def"), buffer); /// always "def"
|
|
|
|
writeLengthEncodedString(schema, buffer);
|
|
|
|
writeLengthEncodedString(table, buffer);
|
|
|
|
writeLengthEncodedString(org_table, buffer);
|
|
|
|
writeLengthEncodedString(name, buffer);
|
|
|
|
writeLengthEncodedString(org_name, buffer);
|
|
|
|
writeLengthEncodedNumber(next_length, buffer);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&character_set), 2);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&column_length), 4);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&column_type), 1);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&flags), 2);
|
|
|
|
buffer.write(reinterpret_cast<const char *>(&decimals), 2);
|
|
|
|
writeChar(0x0, 2, buffer);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-07-19 17:50:42 +00:00
|
|
|
class ComFieldList : public LimitedClientPacket
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-03-16 02:08:21 +00:00
|
|
|
public:
|
2019-03-26 18:30:41 +00:00
|
|
|
String table, field_wildcard;
|
2019-03-16 02:08:21 +00:00
|
|
|
|
2019-07-14 22:13:56 +00:00
|
|
|
void readPayload(ReadBuffer & payload) override
|
2019-03-16 02:08:21 +00:00
|
|
|
{
|
2019-07-14 22:13:56 +00:00
|
|
|
// Command byte has been already read from payload.
|
|
|
|
readNullTerminated(table, payload);
|
|
|
|
readStringUntilEOF(field_wildcard, payload);
|
2019-03-16 02:08:21 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2019-03-26 18:30:41 +00:00
|
|
|
class LengthEncodedNumber : public WritePacket
|
|
|
|
{
|
|
|
|
uint64_t value;
|
|
|
|
public:
|
2019-07-14 22:53:30 +00:00
|
|
|
explicit LengthEncodedNumber(uint64_t value): value(value)
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
protected:
|
|
|
|
size_t getPayloadSize() const override
|
|
|
|
{
|
|
|
|
return getLengthEncodedNumberSize(value);
|
|
|
|
}
|
|
|
|
|
|
|
|
void writePayloadImpl(WriteBuffer & buffer) const override
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-07-01 05:58:31 +00:00
|
|
|
writeLengthEncodedNumber(value, buffer);
|
2019-03-26 18:30:41 +00:00
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
class ResultsetRow : public WritePacket
|
|
|
|
{
|
2019-07-14 22:53:30 +00:00
|
|
|
std::vector<String> columns;
|
2019-07-16 06:39:18 +00:00
|
|
|
size_t payload_size = 0;
|
2019-03-26 18:30:41 +00:00
|
|
|
public:
|
2019-07-14 22:53:30 +00:00
|
|
|
ResultsetRow() = default;
|
2019-03-26 18:30:41 +00:00
|
|
|
|
2019-07-15 20:37:01 +00:00
|
|
|
void appendColumn(String && value)
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-07-16 06:39:18 +00:00
|
|
|
payload_size += getLengthEncodedStringSize(value);
|
2019-03-26 18:30:41 +00:00
|
|
|
columns.emplace_back(std::move(value));
|
|
|
|
}
|
|
|
|
|
2019-07-16 06:39:18 +00:00
|
|
|
protected:
|
|
|
|
size_t getPayloadSize() const override
|
|
|
|
{
|
|
|
|
return payload_size;
|
|
|
|
}
|
|
|
|
|
|
|
|
void writePayloadImpl(WriteBuffer & buffer) const override
|
2019-03-26 18:30:41 +00:00
|
|
|
{
|
2019-07-14 22:53:30 +00:00
|
|
|
for (const String & column : columns)
|
2019-07-01 05:58:31 +00:00
|
|
|
writeLengthEncodedString(column, buffer);
|
2019-03-26 18:30:41 +00:00
|
|
|
}
|
|
|
|
};
|
2019-03-16 02:08:21 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
}
|