ClickHouse/tests/queries/0_stateless/02366_kql_func_ip.reference
Yong Wang 795c1a98dc
Fix segmentation fault in KQL parser when the input query exceeds the max_query_size (#59626)
* Fix_kql_issue_found_by_wingfuzz

This commit fix the issues:
 https://github.com/ClickHouse/ClickHouse/issues/59036
 https://github.com/ClickHouse/ClickHouse/issues/59037

both issues are same reason, the input query exceed the max_query_size,
so the condition isEnd() of token is not meet and cause the assertion failure

* fix_kql_issue_found_by_wingfuzz: use isValid instead of TokenType::EndOfStream

* fix_kql_issue_found_by_wingfuzz: make functional test result consist

* fix_kql_issue_found_by_wingfuzz: update test case for makeseries

* fix_kql_issue_found_by_wingfuzz: disable makeseries

* fix_kql_issue_found_by_wingfuzz:
 use isvalid() function to replace isEnd() function of TokenIterator to check the end of stream

* fix_kql_issue_found_by_wingfuzz: add test case for max_query_size

* fix_kql_issue_found_by_wingfuzz: fix AST structure

* fix_kql_issue_found_by_wingfuzz: make sure the max query size test is in the dialect of kusto

* fix_kql_issue_found_by_wingfuzz : restore max query size after test

* fix_kql_issue_found_by_wingfuzz : fix typo

---------

Co-authored-by: János Benjamin Antal <benjamin.antal@clickhouse.com>
2024-02-26 13:31:47 +01:00

124 lines
2.2 KiB
Plaintext

-- ipv4_is_private(\'127.0.0.1\')
0
-- ipv4_is_private(\'10.1.2.3\')
1
-- ipv4_is_private(\'192.168.1.1/24\')
1
ipv4_is_private(strcat(\'192.\',\'168.\',\'1.\',\'1\',\'/24\'))
1
-- ipv4_is_private(\'abc\')
\N
-- ipv4_netmask_suffix(\'192.168.1.1/24\')
24
-- ipv4_netmask_suffix(\'192.168.1.1\')
32
-- ipv4_netmask_suffix(\'127.0.0.1/16\')
16
-- ipv4_netmask_suffix(\'abc\')
\N
ipv4_netmask_suffix(strcat(\'127.\', \'0.\', \'0.1/16\'))
16
-- ipv4_is_in_range(\'127.0.0.1\', \'127.0.0.1\')
1
-- ipv4_is_in_range(\'192.168.1.6\', \'192.168.1.1/24\')
1
-- ipv4_is_in_range(\'192.168.1.1\', \'192.168.2.1/24\')
0
-- ipv4_is_in_range(strcat(\'192.\',\'168.\', \'1.1\'), \'192.168.2.1/24\')
0
-- ipv4_is_in_range(\'abc\', \'127.0.0.1\')
\N
-- parse_ipv6(127.0.0.1)
0000:0000:0000:0000:0000:ffff:7f00:0001
-- parse_ipv6(fe80::85d:e82c:9446:7994)
fe80:0000:0000:0000:085d:e82c:9446:7994
-- parse_ipv4(\'127.0.0.1\')
2130706433
-- parse_ipv4(\'192.1.168.1\') < parse_ipv4(\'192.1.168.2\')
1
-- parse_ipv4(arrayStringConcat([\'127\', \'0\', \'0\', \'1\'], \'.\'))
-- parse_ipv4_mask(\'127.0.0.1\', 24) == 2130706432
2130706432
-- parse_ipv4_mask(\'abc\', 31)
\N
\N
-- parse_ipv4_mask(\'192.1.168.2\', 31) == parse_ipv4_mask(\'192.1.168.3\', 31)
3221334018
3221334018
-- ipv4_is_match(\'127.0.0.1\', \'127.0.0.1\')
1
-- ipv4_is_match(\'192.168.1.1\', \'192.168.1.255\')
0
-- ipv4_is_match(\'192.168.1.1/24\', \'192.168.1.255/24\')
1
-- ipv4_is_match(\'192.168.1.1\', \'192.168.1.255\', 24)
1
-- ipv4_is_match(\'abc\', \'def\', 24)
\N
-- ipv4_compare()
0
-1
1
0
0
0
0
0
0
0
0
-- format_ipv4()
192.168.1.0
192.168.1.1
192.168.1.0
192.168.1.0
1
1
127.0.0.0
-- format_ipv4_mask()
192.168.1.0/24
192.168.1.0/24
192.168.1.0/24
192.168.1.1/32
192.168.1.0/24
1
1
127.0.0.0/24
-- parse_ipv6_mask()
0000:0000:0000:0000:0000:0000:0000:0000
fe80:0000:0000:0000:085d:e82c:9446:7900
0000:0000:0000:0000:0000:ffff:c0a8:ff00
0000:0000:0000:0000:0000:ffff:c0a8:ff00
0000:0000:0000:0000:0000:ffff:ffff:ffff
fe80:0000:0000:0000:085d:e82c:9446:7994
fe80:0000:0000:0000:085d:e82c:9446:7900
0000:0000:0000:0000:0000:ffff:c0a8:ffff
0000:0000:0000:0000:0000:ffff:c0a8:ff00
-- ipv6_is_match()
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1