Improve Documentation: various corrections of the English usage i…#4
Merged
ngaut merged 1 commit intoSep 6, 2015
Merged
Conversation
Member
|
Good job! |
Member
|
LGTM |
1 similar comment
Member
|
LGTM |
ngaut
added a commit
that referenced
this pull request
Sep 6, 2015
…usage Improvement Documentation: various corrections of the English usage i…
coocood
added a commit
to coocood/tidb
that referenced
this pull request
Apr 18, 2019
IggieWang
referenced
this pull request
in IggieWang/tidb
Aug 11, 2019
finish virtual index DDL statement
windtalker
referenced
this pull request
in windtalker/tidb
Apr 22, 2020
basic cbo support for broadcast join
Deardrops
pushed a commit
to Deardrops/tidb
that referenced
this pull request
May 15, 2020
privilege: support login fail count and account blacklist
abbccdda
pushed a commit
to abbccdda/tidb
that referenced
this pull request
Jan 16, 2021
store: make network cost threshold as a Variable
YuJuncen
pushed a commit
to YuJuncen/tidb
that referenced
this pull request
Apr 23, 2021
* package for hanlding key-value operations * with error checks * kv encode now support execute sql convert in 'prepare statement' mode * address comment * address comment
YuJuncen
pushed a commit
to YuJuncen/tidb
that referenced
this pull request
Apr 23, 2021
backup: support rate limit
knull-cn
added a commit
to knull-cn/tidb
that referenced
this pull request
Dec 31, 2021
add rfc for hackathon 2021
TszKitLo40
pushed a commit
to TszKitLo40/tidb
that referenced
this pull request
Jan 3, 2022
crazycs520
referenced
this pull request
in crazycs520/tidb
Jan 6, 2022
create `aws` SQL, support WHERE for TableScan and Selection
AilinKid
added a commit
to AilinKid/tidb
that referenced
this pull request
Mar 2, 2022
12 tasks
sleepymole
referenced
this pull request
in sleepymole/tidb
Aug 22, 2022
Fine tuning dry-run in order to avoid recover-data
zhongzc
pushed a commit
to zhongzc/tidb
that referenced
this pull request
Feb 2, 2023
keeplearning20221
added a commit
to keeplearning20221/tidb
that referenced
this pull request
Feb 13, 2023
…ules/golang.org/x/oauth2-0.5.0 build(deps): bump golang.org/x/oauth2 from 0.2.0 to 0.5.0
ljun0712
pushed a commit
to ljun0712/tidb
that referenced
this pull request
Mar 1, 2023
rebelice
added a commit
to rebelice/tidb
that referenced
this pull request
Mar 28, 2023
rleungx
pushed a commit
to rleungx/tidb
that referenced
this pull request
Feb 26, 2024
* init * audit: init first version of audit log * audit: support log global rotate * audit: update log keys * audit: more common notify implement * audit: add record id * audit: rename some names * audit: default use normal log path * audit: add server ip info * audit: do some refine * audit: Add some log keys * audit: update some item format * audit: add stmt demo * audit: support redact * audit: fix bug * audit: update filter * audit: update filter * audit: check user * audit: update * update * audit: update * audit: fix bug * aduit: update * audit: update * update * update * audit: add filter unit test * fmt * Add tests for `tidb_audit_enabled` and `tidb_audit_log` * Add tests for `tidb_audit_log_max_size` and `tidb_audit_log_max_lifetime` * Add tests for `tidb_audit_log_reserved_*` * TODO: TestAuditLogRedact * Fininsh `TestAuditLogRedact` * Update (pingcap#1) * fix typo (pingcap#2) * Add `TRANSACTION` * rename sysvar * audit_log_create_filter, audit_log_remove_filter * finish function call and table test * test privilege * finish test for sysvar * TODO: TestConnectionEvenClass * update * audit: fix lint for audit log (pingcap#1) * audit: fix UT failure caused by the change of redact log (pingcap#3) * audit: use `t.TempDir()` to make test stable (pingcap#4) * audit: fix test failed for 7.1 * Add `OWNERS` file (pingcap#35) Co-authored-by: Chao Wang <cclcwangchao@hotmail.com> * audit: fix panic when logging sometime (pingcap#26) (pingcap#31) * test: fix unstable test TestAuditLogReservedDays (pingcap#8) * Format sysvar_test.go * audit: use `StatementContext` to generate redacted SQL (pingcap#9) * audit: fix panic when logging sometime (pingcap#26) * update * add owner * Update OWNERS --------- Co-authored-by: CbcWestwolf <1004626265@qq.com> Co-authored-by: wuhuizuo <wuhuizuo@126.com> * audit: fix panic sometimes when `create user` without password (pingcap#37) (pingcap#39) * This is an automated cherry-pick of pingcap#37 Signed-off-by: ti-chi-bot <ti-community-prow-bot@tidb.io> * fix conflict --------- Signed-off-by: ti-chi-bot <ti-community-prow-bot@tidb.io> Co-authored-by: 王超 <cclcwangchao@hotmail.com> * extension/audit: introduce serverless audit log Signed-off-by: Wen Jiazhi <jiazhi.wen@pingcap.com> * update bazel config Signed-off-by: Wen Jiazhi <jiazhi.wen@pingcap.com> * support enable audit log when activate Signed-off-by: Wen Jiazhi <jiazhi.wen@pingcap.com> * add gwconnid to audit log Signed-off-by: Wen Jiazhi <jiazhi.wen@pingcap.com> * comment unstable test * update bazel * add log about activate request * diff audit log enabled * audit: fix memory leak for executeSQL (pingcap#44) (pingcap#45) * This is an automated cherry-pick of pingcap#44 Signed-off-by: ti-chi-bot <ti-community-prow-bot@tidb.io> * Update util.go --------- Signed-off-by: ti-chi-bot <ti-community-prow-bot@tidb.io> Co-authored-by: 王超 <cclcwangchao@hotmail.com> * Update extension/serverless/OWNERS --------- Signed-off-by: ti-chi-bot <ti-community-prow-bot@tidb.io> Signed-off-by: Wen Jiazhi <jiazhi.wen@pingcap.com> Co-authored-by: Chao Wang <cclcwangchao@hotmail.com> Co-authored-by: cbcwestwolf <1004626265@qq.com> Co-authored-by: Ti Chi Robot <ti-community-prow-bot@tidb.io> Co-authored-by: wuhuizuo <wuhuizuo@126.com> Co-authored-by: zzm <zhouzemin@pingcap.com> Co-authored-by: Yuqing Bai <baiyuq@gmail.com>
guoshouyan
pushed a commit
to guoshouyan/tidb
that referenced
this pull request
Mar 5, 2024
…oschema cache size and refine metric (pingcap#46684) (pingcap#4) Signed-off-by: crazycs520 <crazycs520@gmail.com> Signed-off-by: crazycs520 <crazycs520@gmail.com> Co-authored-by: crazycs <crazycs520@gmail.com>
13 tasks
gengliqi
pushed a commit
to gengliqi/tidb
that referenced
this pull request
Feb 28, 2026
Materialized View Service
2 tasks
Open
13 tasks
13 tasks
premal
added a commit
to 6si/tidb
that referenced
this pull request
May 4, 2026
Bug pingcap#4 — panic in PointGetPlan.AccessObject and LoadTableStats when a partitioned+sharded table is accessed by PK/index on UPDATE/DELETE. GetPartitionIdxByRow returns a flat shard index (partIdx*shardCnt+slot) which was used directly to index pi.Definitions (original partition count), causing index-out-of-range. Fix maps flat→logical via idx/ShardCnt before indexing the original PI for display (access_object.go, point_get_plan.go) and resolves to the physical shard ID for KV access (GetPhysID in executor). Bug pingcap#1 — PointGetPlan misroutes PK-only queries on sharded tables to the wrong shard because locateShard hashes a zero shard-key column value. Fix: decline to generate PointGetPlan when the predicate omits the shard key; queries like WHERE id=X fall back to a table scan covering all shards. Bug pingcap#3 — RANGE/HASH/KEY+shard tables with a shard-only filter always pruned to partition p0 because PartitionPruning called pruneShardKeyPartition directly (returning flat indices only in the first partition's range). Fix: use pruneShardedRangeOrHashDynamic which expands matched shard slots across all logical partitions. Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
premal
added a commit
to 6si/tidb
that referenced
this pull request
May 4, 2026
…pingcap#1 regressions Adds 7 unit tests to shard_test.go covering the flatIdx arithmetic, shardForRow bounds safety, rebuildShards post-DROP-PARTITION, and PartitionExpr staleness detection. Tests run without a live cluster and directly exercise the 4×4 layout (4 partitions × 4 shards) that triggered the OOB panic in production (Bug pingcap#4). Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
13 tasks
takaidohigasi
added a commit
to takaidohigasi/tidb
that referenced
this pull request
May 17, 2026
Fixes for D3Hunter's review on pingcap#68028: [Blocker] Dual-password clauses are parsed but ignored by execution - Add executor stubs that reject RETAIN CURRENT PASSWORD / DISCARD OLD PASSWORD with ER_NOT_SUPPORTED_YET in executeAlterUser and executeSetPwd. Full execution / privilege / storage logic lives in the follow-up PR pingcap#68393. - Expose exeerrors.ErrNotSupportedYet for callers (was previously only available via dbterror.ClassExecutor.NewStd inline). - New TestDualPasswordParserOnlyStub in passwordtest to pin the stub's behavior. [Major pingcap#2] CREATE USER accepted dual-password clauses outside MySQL grammar - Drop the CreateUserSpec/CreateUserSpecList non-terminals and route CREATE USER back through the original UserSpec/UserSpecList chain. CREATE USER + RETAIN/DISCARD is now a parser-level syntax error, matching MySQL. [Major pingcap#3] ALTER USER over-accepted invalid RETAIN combinations - Introduce AuthOptionWithPassword (the BY-form subset of AuthOption) and restructure AlterUserSpec to bind RETAIN only to that subset. Reject at parse time: ALTER USER u IDENTIFIED WITH plugin AS '<hash>' RETAIN ... ALTER USER u IDENTIFIED WITH plugin RETAIN ... ALTER USER u RETAIN CURRENT PASSWORD (no auth) ALTER USER u IDENTIFIED BY '...' DISCARD OLD PASSWORD - DISCARD becomes its own AlterUserSpec variant (no auth-option coexists with it). [Major pingcap#4] Grammar label/documentation contradiction - Drop the misleading 'unsupported dual password option' label on the deleted CreateUserSpec; rewrite UserSpec/AlterUserSpec labels to state the contract accurately. [Major pingcap#5] Generic *PasswordOrLockOption type was overloaded - Introduce dedicated ast.DualPasswordOption and ast.DualPasswordOptionType (with DualPasswordRetainCurrent / DualPasswordDiscardOld). UserSpec.DualPasswordOption now uses the dedicated type. Remove the RetainCurrentPassword and DiscardOldPassword iota entries from PasswordOrLockOption. [Minor pingcap#6] ALTER USER USER() branch - USER() still does not route through AlterUserSpecList; dual-password on USER() is now a parse-time syntax error (covered by negative test). [Minor pingcap#7] Parser tests had no negative coverage - Add explicit ok=false rows for CREATE USER + RETAIN, the AS-hash + RETAIN form, bare RETAIN with no auth, plain BY + DISCARD, bare-plugin + RETAIN, and ALTER USER USER() + RETAIN. [Minor pingcap#8] CREATE/ALTER user-spec grammar duplication - Now naturally eliminated because CREATE USER reuses UserSpec. Behavior PR (pingcap#68393) needs to: - Remove the executor stubs added here. - Adopt the new ast.DualPasswordOption / DualPasswordOptionType symbols (the iota entries it currently consumes are gone). Ref pingcap#60587
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Thanks for sharing the great work! Just try to improve the README as I am reading through it.