This is an automated email from the ASF dual-hosted git repository.

dataroaring pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/doris.git


The following commit(s) were added to refs/heads/master by this push:
     new b4c7f13b26c [fix](cloud) Fix some regression case due to #33347 
(#33727)
b4c7f13b26c is described below

commit b4c7f13b26cca9077aa5a01543bd21f9429935ae
Author: deardeng <[email protected]>
AuthorDate: Wed Apr 17 09:20:44 2024 +0800

    [fix](cloud) Fix some regression case due to #33347 (#33727)
---
 .../auth/test_grant_revoke_cluster_role.groovy     | 38 +++++++++++-----------
 .../auth/test_grant_revoke_cluster_to_user.groovy  | 28 ++++++++--------
 .../test_stream_load_move_memtable.groovy          |  9 +++++
 3 files changed, 42 insertions(+), 33 deletions(-)

diff --git 
a/regression-test/suites/cloud_p0/auth/test_grant_revoke_cluster_role.groovy 
b/regression-test/suites/cloud_p0/auth/test_grant_revoke_cluster_role.groovy
index 22b4f4a1f4f..ef61f802ae5 100644
--- a/regression-test/suites/cloud_p0/auth/test_grant_revoke_cluster_role.groovy
+++ b/regression-test/suites/cloud_p0/auth/test_grant_revoke_cluster_role.groovy
@@ -100,8 +100,8 @@ suite("test_grant_revoke_cluster_stage_to_role", 
"cloud_auth") {
         """
 
     result = showRoles.call(roleName)
-    assertEquals(result.CloudClusterPrivs as String, "$testClusterA: 
Cluster_usage_priv " as String)
-    assertEquals(result.CloudStagePrivs as String, "$testStageA: 
Stage_usage_priv " as String)
+    assertEquals(result.CloudClusterPrivs as String, "$testClusterA: 
Cluster_usage_priv" as String)
+    assertEquals(result.CloudStagePrivs as String, "$testStageA: 
Stage_usage_priv" as String)
     assertEquals(result.Users as String, "")
 
     sql """
@@ -116,8 +116,8 @@ suite("test_grant_revoke_cluster_stage_to_role", 
"cloud_auth") {
         GRANT SELECT_PRIV ON *.*.* TO ROLE '${roleName}'
     """
     result = sql_return_maparray """show grants for '${user1}'"""
-    commonAuth result, "'${user1}'@'%'", "Yes", "testRole", "Select_priv "
-    assertEquals("[$testClusterA: Cluster_usage_priv ; $validCluster: 
Cluster_usage_priv ]" as String, result.CloudClusterPrivs as String)
+    commonAuth result, "'${user1}'@'%'", "Yes", "testRole", "Select_priv"
+    assertEquals("[$testClusterA: Cluster_usage_priv; $validCluster: 
Cluster_usage_priv]" as String, result.CloudClusterPrivs as String)
     def db = context.dbName
 
     sql """
@@ -159,25 +159,25 @@ suite("test_grant_revoke_cluster_stage_to_role", 
"cloud_auth") {
     assertTrue(m.keySet().containsAll(Arrays.asList("${testClusterA}" as 
String, "%", "${validCluster}" as String)) as boolean)
     assertEquals(m.values().toUnique().asList().size(), 1)
     assertEquals(m.values().toUnique().asList().get(0) as String, 
"Cluster_usage_priv")
-    assertEquals(result.GlobalPrivs as String, "Select_priv " as String)
+    assertEquals(result.GlobalPrivs as String, "Select_priv" as String)
     m = splitCloudAuth(result.CloudStagePrivs as String)
     assertTrue(m.keySet().containsAll(Arrays.asList("${testStageA}" as String, 
"%")) as boolean)
     assertEquals(m.values().toUnique().asList().size(), 1)
     assertEquals(m.values().toUnique().asList().get(0) as String, 
"Stage_usage_priv")
-    assertEquals(result.GlobalPrivs as String, "Select_priv " as String) 
+    assertEquals(result.GlobalPrivs as String, "Select_priv" as String) 
     def matcher = result.Users =~ /.*${user1}.*/
     assertTrue(matcher.matches())
 
 
     result = sql_return_maparray """show grants for '${user1}'"""
-    commonAuth result, "'${user1}'@'%'", "Yes", "testRole", "Select_priv "
+    commonAuth result, "'${user1}'@'%'", "Yes", "testRole", "Select_priv"
     m = splitCloudAuth(result.CloudClusterPrivs[0] as String)
     log.info(m.keySet() as String)
     // clusterA: Cluster_usage_priv ; %: Cluster_usage_priv ; compute_cluster: 
Cluster_usage_priv
     assertTrue(m.keySet().containsAll(Arrays.asList("${testClusterA}" as 
String, "%", "${validCluster}" as String)) as boolean)
     assertEquals(m.values().toUnique().asList().size(), 1)
     assertEquals(m.values().toUnique().asList().get(0) as String, 
"Cluster_usage_priv")
-    assertEquals(result.GlobalPrivs[0] as String, "Select_priv " as String)
+    assertEquals(result.GlobalPrivs[0] as String, "Select_priv" as String)
 
     def otherRole = "testOtherRole"
     def testClusterB = "clusterB"
@@ -192,8 +192,8 @@ suite("test_grant_revoke_cluster_stage_to_role", 
"cloud_auth") {
     """
 
     result = showRoles.call(otherRole)
-    assertEquals(result.CloudClusterPrivs as String, "$testClusterB: 
Cluster_usage_priv " as String)
-    assertEquals(result.CloudStagePrivs as String, "$testStageB: 
Stage_usage_priv " as String)
+    assertEquals(result.CloudClusterPrivs as String, "$testClusterB: 
Cluster_usage_priv" as String)
+    assertEquals(result.CloudStagePrivs as String, "$testStageB: 
Stage_usage_priv" as String)
     assertEquals(result.Users as String, "")
 
     // add more roles to user1
@@ -201,14 +201,14 @@ suite("test_grant_revoke_cluster_stage_to_role", 
"cloud_auth") {
         GRANT '$otherRole' TO '$user1';  
     """
     result = showRoles.call(otherRole)
-    assertEquals(result.CloudClusterPrivs as String, "$testClusterB: 
Cluster_usage_priv " as String)
-    assertEquals(result.CloudStagePrivs as String, "$testStageB: 
Stage_usage_priv " as String)
+    assertEquals(result.CloudClusterPrivs as String, "$testClusterB: 
Cluster_usage_priv" as String)
+    assertEquals(result.CloudStagePrivs as String, "$testStageB: 
Stage_usage_priv" as String)
     matcher = result.Users =~ /.*${user1}.*/
     assertTrue(matcher.matches())
 
     result = sql_return_maparray """show grants for '${user1}'"""
     log.info(result as String)
-    commonAuth result, "'${user1}'@'%'", "Yes", "testOtherRole,testRole", 
"Select_priv "
+    commonAuth result, "'${user1}'@'%'", "Yes", "testOtherRole,testRole", 
"Select_priv"
     // [%: Cluster_usage_priv ; clusterA: Cluster_usage_priv ; clusterB: 
Cluster_usage_priv ; compute_cluster: Cluster_usage_priv ]
     m = splitCloudAuth(result.CloudClusterPrivs[0] as String)
     assertTrue(m.keySet().containsAll(Arrays.asList("${testClusterA}" as 
String, "%", "${validCluster}" as String, "${testClusterB}" as String)) as 
boolean)
@@ -236,7 +236,7 @@ suite("test_grant_revoke_cluster_stage_to_role", 
"cloud_auth") {
     assertTrue(matcher.matches())
 
     result = sql_return_maparray """show grants for '${user1}'"""
-    commonAuth result, "'${user1}'@'%'", "Yes", "testOtherRole,testRole", 
"Select_priv "
+    commonAuth result, "'${user1}'@'%'", "Yes", "testOtherRole,testRole", 
"Select_priv"
     log.info(result as String)
     // CloudClusterPrivs:%: Cluster_usage_priv ; clusterB: Cluster_usage_priv 
; compute_cluster: Cluster_usage_priv
     m = splitCloudAuth(result.CloudClusterPrivs[0] as String)
@@ -250,11 +250,11 @@ suite("test_grant_revoke_cluster_stage_to_role", 
"cloud_auth") {
     """
 
     result = showRoles.call(otherRole)
-    assertEquals(result.CloudClusterPrivs as String, "$testClusterB: 
Cluster_usage_priv " as String)
+    assertEquals(result.CloudClusterPrivs as String, "$testClusterB: 
Cluster_usage_priv" as String)
     assertEquals(result.Users as String, "")
 
     result = sql_return_maparray """show grants for '${user1}'"""
-    commonAuth result, "'${user1}'@'%'", "Yes", "testRole", "Select_priv "
+    commonAuth result, "'${user1}'@'%'", "Yes", "testRole", "Select_priv"
     log.info(result as String)
     // CloudClusterPrivs:%: Cluster_usage_priv ; compute_cluster: 
Cluster_usage_priv
     m = splitCloudAuth(result.CloudClusterPrivs[0] as String)
@@ -283,7 +283,7 @@ suite("test_grant_revoke_cluster_stage_to_role", 
"cloud_auth") {
     } 
 
     result = sql_return_maparray """show grants for '${user1}'"""
-    commonAuth result, "'${user1}'@'%'", "Yes", "testRole", "Select_priv "
+    commonAuth result, "'${user1}'@'%'", "Yes", "testRole", "Select_priv"
     m = splitCloudAuth(result.CloudClusterPrivs[0] as String)
     assertTrue(m.keySet().containsAll(Arrays.asList("%")) as boolean)
     assertEquals(m.values().toUnique().asList().size(), 1)
@@ -305,10 +305,10 @@ suite("test_grant_revoke_cluster_stage_to_role", 
"cloud_auth") {
     assertEquals(m.size(), 0)
     m = splitCloudAuth(result.CloudStagePrivs as String)
     assertEquals(m.size(), 0)
-    assertEquals(result.GlobalPrivs as String, "Select_priv " as String)
+    assertEquals(result.GlobalPrivs as String, "Select_priv" as String)
 
     result = sql_return_maparray """show grants for '${user1}'"""
-    commonAuth result, "'${user1}'@'%'", "Yes", "testRole", "Select_priv "
+    commonAuth result, "'${user1}'@'%'", "Yes", "testRole", "Select_priv"
 
     // can not use @cluster, because no cluster auth
     connect(user = "${user1}", password = 'Cloud12345', url = 
context.config.jdbcUrl) {
diff --git 
a/regression-test/suites/cloud_p0/auth/test_grant_revoke_cluster_to_user.groovy 
b/regression-test/suites/cloud_p0/auth/test_grant_revoke_cluster_to_user.groovy
index d3c46bf9868..b85b2f1f8a8 100644
--- 
a/regression-test/suites/cloud_p0/auth/test_grant_revoke_cluster_to_user.groovy
+++ 
b/regression-test/suites/cloud_p0/auth/test_grant_revoke_cluster_to_user.groovy
@@ -68,7 +68,7 @@ suite("test_grant_revoke_cluster_to_user", "cloud_auth") {
     // ${user1} admin role
     sql """create user ${user1} identified by 'Cloud12345' default role 
'admin'"""
     result = sql_return_maparray """show grants for '${user1}'"""
-    commonAuth result, "'${user1}'@'%'" as String, "Yes", "admin", "Admin_priv 
"
+    commonAuth result, "'${user1}'@'%'" as String, "Yes", "admin", "Admin_priv"
     assertNull(result.CloudClusterPrivs[0])
 
     // ${user2} not admin role
@@ -124,13 +124,13 @@ suite("test_grant_revoke_cluster_to_user", "cloud_auth") {
 
     // case run user(default root), and show grant again, should be same result
     result = sql_return_maparray """show grants for '${user1}'"""
-    commonAuth result, "'${user1}'@'%'" as String, "Yes", "admin", "Admin_priv 
"
-    assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv " as String)
+    commonAuth result, "'${user1}'@'%'" as String, "Yes", "admin", "Admin_priv"
+    assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv" as String)
 
     sql """GRANT USAGE_PRIV ON CLUSTER '${cluster1}' TO '${user1}'"""
     result = sql_return_maparray """show grants for '${user1}'"""
-    commonAuth result, "'${user1}'@'%'" as String, "Yes", "admin", "Admin_priv 
"
-    assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv " as String)
+    commonAuth result, "'${user1}'@'%'" as String, "Yes", "admin", "Admin_priv"
+    assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv" as String)
 
     connect(user = "${user1}", password = 'Cloud12345', url = 
context.config.jdbcUrl) {
         test {
@@ -138,8 +138,8 @@ suite("test_grant_revoke_cluster_to_user", "cloud_auth") {
             exception "Cluster ${cluster1} not exist"
         }
         result = sql_return_maparray """show grants for '${user1}'"""
-        commonAuth result, "'${user1}'@'%'", "Yes", "admin", "Admin_priv "
-        assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv " as String)
+        commonAuth result, "'${user1}'@'%'", "Yes", "admin", "Admin_priv"
+        assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv" as String)
     }
 
 
@@ -214,8 +214,8 @@ suite("test_grant_revoke_cluster_to_user", "cloud_auth") {
             exception "USAGE denied to user"
         }
         result = sql_return_maparray """show grants for '${user2}'"""
-        commonAuth result, "'${user2}'@'%'" as String, "Yes", "", "Select_priv 
"
-        assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv " as String)
+        commonAuth result, "'${user2}'@'%'" as String, "Yes", "", "Select_priv"
+        assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv" as String)
 
         test {
             sql """REVOKE USAGE_PRIV ON CLUSTER 'NotExistCluster' FROM 
'${user2}'"""
@@ -225,8 +225,8 @@ suite("test_grant_revoke_cluster_to_user", "cloud_auth") {
     
     sql """REVOKE USAGE_PRIV ON CLUSTER '${validCluster}' FROM '${user2}'"""
     result = sql_return_maparray """show grants for '${user2}'"""
-    commonAuth result, "'${user2}'@'%'" as String, "Yes", "", "Select_priv "
-    assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv " as String)
+    commonAuth result, "'${user2}'@'%'" as String, "Yes", "", "Select_priv"
+    assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv" as String)
 
     sql "sync"
     // 3. revoke cluster
@@ -250,12 +250,12 @@ suite("test_grant_revoke_cluster_to_user", "cloud_auth") {
     }
 
     result = sql_return_maparray """show grants for '${user1}'"""
-    commonAuth result, "'${user1}'@'%'" as String, "Yes", "admin", "Admin_priv 
"
+    commonAuth result, "'${user1}'@'%'" as String, "Yes", "admin", "Admin_priv"
     assertNull(result.CloudClusterPrivs[0])
 
     result = sql_return_maparray """show grants for '${user2}'"""
-    commonAuth result, "'${user2}'@'%'" as String, "Yes", "", "Select_priv "
-    assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv " as String)
+    commonAuth result, "'${user2}'@'%'" as String, "Yes", "", "Select_priv"
+    assertEquals(result.CloudClusterPrivs[0] as String, "${cluster1}: 
Cluster_usage_priv" as String)
 
     // revoke user1 admin role
     sql """REVOKE 'admin' FROM ${user1}"""
diff --git 
a/regression-test/suites/load_p0/stream_load/test_stream_load_move_memtable.groovy
 
b/regression-test/suites/load_p0/stream_load/test_stream_load_move_memtable.groovy
index cf8b7e63217..3696bfea550 100644
--- 
a/regression-test/suites/load_p0/stream_load/test_stream_load_move_memtable.groovy
+++ 
b/regression-test/suites/load_p0/stream_load/test_stream_load_move_memtable.groovy
@@ -877,8 +877,17 @@ suite("test_stream_load_move_memtable", "p0") {
         PROPERTIES ("replication_allocation" = "tag.location.default: 1");
     """
 
+    sql "sync"
+    try_sql """DROP USER 'ddd'"""
     sql """create USER ddd IDENTIFIED BY '123456test!'"""
     sql """GRANT LOAD_PRIV ON *.* TO 'ddd'@'%';"""
+    //cloud-mode
+    if (isCloudMode()) {
+        def clusters = sql " SHOW CLUSTERS; "
+        assertTrue(!clusters.isEmpty())
+        def validCluster = clusters[0][0]
+        sql """GRANT USAGE_PRIV ON CLUSTER ${validCluster} TO ddd""";
+    }
 
     streamLoad {
         table "${tableName13}"


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to