1--TEST--
2MySQL PDO->exec(), affected rows
3--SKIPIF--
4<?php
5require_once(dirname(__FILE__) . DIRECTORY_SEPARATOR . 'skipif.inc');
6require_once(dirname(__FILE__) . DIRECTORY_SEPARATOR . 'mysql_pdo_test.inc');
7MySQLPDOTest::skip();
8
9// Run test only locally - not against remote hosts
10$db = MySQLPDOTest::factory();
11$stmt = $db->query('SELECT USER() as _user');
12$row = $stmt->fetch(PDO::FETCH_ASSOC);
13$tmp = explode('@', $row['_user']);
14if (count($tmp) < 2)
15	die("skip Cannot detect if test is run against local or remote database server");
16if (($tmp[1] !== 'localhost') && ($tmp[1] !== '127.0.0.1'))
17	die("skip Test cannot be run against remote database server");
18
19$stmt = $db->query("SHOW VARIABLES LIKE 'secure_file_priv'");
20if (($row = $stmt->fetch(PDO::FETCH_ASSOC)) && ($row['value'] != '')) {
21	if (!is_writable($row['value']))
22		die("skip secure_file_priv directory not writable: {$row['value']}");
23
24	$filename = $row['value'] . DIRECTORY_SEPARATOR  . "pdo_mysql_exec_load_data.csv";
25
26	if (file_exists($filename) && !is_writable($filename))
27		die("skip {$filename} not writable");
28}
29
30?>
31--FILE--
32<?php
33	function exec_and_count($offset, &$db, $sql, $exp) {
34
35		try {
36
37			$ret = $db->exec($sql);
38			if ($ret !== $exp) {
39				printf("[%03d] Expecting '%s'/%s got '%s'/%s when running '%s', [%s] %s\n",
40					$offset, $exp, gettype($exp), $ret, gettype($ret), $sql,
41					$db->errorCode(), implode(' ', $db->errorInfo()));
42				return false;
43			}
44
45		} catch (PDOException $e) {
46
47			if (42000 == $db->errorCode()) {
48				// Error: 1148 SQLSTATE: 42000  (ER_NOT_ALLOWED_COMMAND)
49				// Load data infile not allowed
50				return false;
51			}
52
53			printf("[%03d] '%s' has failed, [%s] %s\n",
54				$offset, $sql, $db->errorCode(), implode(' ', $db->errorInfo()));
55			return false;
56		}
57
58		return true;
59	}
60
61	require_once(dirname(__FILE__) . DIRECTORY_SEPARATOR . 'mysql_pdo_test.inc');
62	putenv('PDOTEST_ATTR='.serialize([PDO::MYSQL_ATTR_LOCAL_INFILE=>true]));
63	$db = MySQLPDOTest::factory();
64	MySQLPDOTest::createTestTable($db, MySQLPDOTest::detect_transactional_mysql_engine($db));
65
66	/* affected rows related */
67	try {
68
69		exec_and_count(2, $db, 'DROP TABLE IF EXISTS test', 0);
70		exec_and_count(3, $db, sprintf('CREATE TABLE test(id INT NOT NULL PRIMARY KEY, col1 CHAR(10)) ENGINE=%s', PDO_MYSQL_TEST_ENGINE), 0);
71
72		$stmt = $db->query("SHOW VARIABLES LIKE 'secure_file_priv'");
73		if (($row = $stmt->fetch(PDO::FETCH_ASSOC)) && ($row['value'] != '')) {
74			$filename = $row['value'] . DIRECTORY_SEPARATOR  . "pdo_mysql_exec_load_data.csv";
75		} else {
76			$filename =  MySQLPDOTest::getTempDir() . DIRECTORY_SEPARATOR  . "pdo_mysql_exec_load_data.csv";
77		}
78
79		$fp = fopen($filename, "w");
80		fwrite($fp, "1;foo\n");
81		fwrite($fp, "2;bar");
82		fclose($fp);
83
84		$sql = sprintf("LOAD DATA LOCAL INFILE %s INTO TABLE test FIELDS TERMINATED BY ';' LINES TERMINATED  BY '\n'", $db->quote($filename));
85
86		if (exec_and_count(4, $db, $sql, 2)) {
87
88			$stmt = $db->query('SELECT id, col1 FROM test ORDER BY id ASC');
89			$expected = array(array("id" => 1, "col1" => "foo"), array("id" => 2, "col1" => "bar"));
90			$ret = $stmt->fetchAll(PDO::FETCH_ASSOC);
91			foreach ($expected as $offset => $exp) {
92				foreach ($exp as $key => $value) {
93					if ($ret[$offset][$key] != $value) {
94						printf("Results seem wrong, check manually\n");
95						var_dump($ret);
96						var_dump($expected);
97						break 2;
98					}
99				}
100			}
101		}
102
103		unlink($filename);
104
105	} catch (PDOException $e) {
106		printf("[001] %s, [%s] %s\n",
107			$e->getMessage(),
108			$db->errorCode(), implode(' ', $db->errorInfo()));
109	}
110
111	print "done!";
112?>
113--CLEAN--
114<?php
115require dirname(__FILE__) . '/mysql_pdo_test.inc';
116$db = MySQLPDOTest::factory();
117$db->exec('DROP TABLE IF EXISTS test');
118?>
119--EXPECT--
120done!
121