--TEST-- MySQL PDO->prepare() and 1295 (ER_UNSUPPORTED_PS) --SKIPIF-- query('SELECT USER() as _user'); $row = $stmt->fetch(PDO::FETCH_ASSOC); $tmp = explode('@', $row['_user']); if (count($tmp) < 2) die("skip Cannot detect if test is run against local or remote database server"); if (($tmp[1] !== 'localhost') && ($tmp[1] !== '127.0.0.1')) die("skip Test cannot be run against remote database server"); $stmt = $db->query("SHOW VARIABLES LIKE 'secure_file_priv'"); if (($row = $stmt->fetch(PDO::FETCH_ASSOC)) && ($row['value'] != '')) { if (!is_writable($row['value'])) die("skip secure_file_priv directory not writable: {$row['value']}"); $filename = $row['value'] . DIRECTORY_SEPARATOR . "pdo_mysql_exec_load_data.csv"; if (file_exists($filename) && !is_writable($filename)) die("skip {$filename} not writable"); } ?> --FILE-- exec($sql); if ($ret !== $exp) { printf("[%03d] Expecting '%s'/%s got '%s'/%s when running '%s', [%s] %s\n", $offset, $exp, gettype($exp), $ret, gettype($ret), $sql, $db->errorCode(), implode(' ', $db->errorInfo())); return false; } } catch (PDOException $e) { if (42000 == $db->errorCode()) { // Error: 1148 SQLSTATE: 42000 (ER_NOT_ALLOWED_COMMAND) // Load data infile not allowed return false; } printf("[%03d] '%s' has failed, [%s] %s\n", $offset, $sql, $db->errorCode(), implode(' ', $db->errorInfo())); return false; } return true; } require_once(dirname(__FILE__) . DIRECTORY_SEPARATOR . 'mysql_pdo_test.inc'); $db = MySQLPDOTest::factory(); // Run with native PS. // The test is about checking the fallback to emulation $db->setAttribute(PDO::ATTR_EMULATE_PREPARES, 0); MySQLPDOTest::createTestTable($db, MySQLPDOTest::detect_transactional_mysql_engine($db)); /* affected rows related */ try { exec_and_count(2, $db, 'DROP TABLE IF EXISTS test', 0); exec_and_count(3, $db, sprintf('CREATE TABLE test(id INT NOT NULL PRIMARY KEY, col1 CHAR(10)) ENGINE=%s', PDO_MYSQL_TEST_ENGINE), 0); $stmt = $db->query("SHOW VARIABLES LIKE 'secure_file_priv'"); if (($row = $stmt->fetch(PDO::FETCH_ASSOC)) && ($row['value'] != '')) { $filename = $row['value'] . DIRECTORY_SEPARATOR . "pdo_mysql_exec_load_data.csv"; } else { $filename = MySQLPDOTest::getTempDir() . DIRECTORY_SEPARATOR . "pdo_mysql_exec_load_data.csv"; } $fp = fopen($filename, "w"); fwrite($fp, b"1;foo\n"); fwrite($fp, b"2;bar"); fclose($fp); // This should fail, the PS protocol should not support it. // mysqlnd will give 2014 as a follow-up of the fallback logic // libmysql will give a little more precise 2030 error code // However, you get an error and the big question is what happens to the line $stmt = $db->prepare(sprintf("LOAD DATA INFILE %s INTO TABLE test FIELDS TERMINATED BY ';' LINES TERMINATED BY '\n'", $db->quote($filename))); if (!$stmt->execute()) { printf("[004] [%d] %s\n", $stmt->errorCode(), var_export($stmt->errorInfo(), true)); } // Check the line $stmt = $db->query("SELECT 1 as 'one'"); if ($stmt->errorCode() != '0000') { printf("[005] [%d] %s\n", $stmt->errorCode(), var_export($stmt->errorInfo(), true)); } else { $rows = $stmt->fetchAll(PDO::FETCH_ASSOC); if (!isset($rows[0]['one']) || $rows[0]['one'] != 1) printf("[006] [%d] %s\n", $stmt->errorCode(), var_export($stmt->errorInfo(), true)); } unlink($filename); } catch (PDOException $e) { printf("[001] %s, [%s] %s (%s)\n", $e->getMessage(), $db->errorCode(), implode(' ', $db->errorInfo()), (isset($stmt)) ? implode(' ', $stmt->errorInfo()) : 'N/A'); } print "done!"; ?> --CLEAN-- --EXPECTF-- Warning: PDOStatement::execute(): SQLSTATE[HY000]: General error: %s in %s on line %d [004] [0] array ( 0 => 'HY000', 1 => %d, 2 => %s, ) done!