Testing needed for recent tablespace hacking
От | Tom Lane |
---|---|
Тема | Testing needed for recent tablespace hacking |
Дата | |
Msg-id | 16275.1093818384@sss.pgh.pa.us обсуждение исходный текст |
Ответы |
Re: Testing needed for recent tablespace
|
Список | pgsql-hackers-win32 |
Would someone check that I didn't break the Windows port with this recent commit: Log Message: ----------- Add WAL logging for CREATE/DROP DATABASE and CREATE/DROP TABLESPACE. Fix TablespaceCreateDbspace() to be able to create a dummy directory in place of a dropped tablespace's symlink. This eliminates the open problem of a PANIC during WAL replay when a replayed action attempts to touch a file in a since-deleted tablespace. It also makes for a significant improvement in the usability of PITR replay. I had to do some fooling around with platform-specific code, so it's possible that things are broken. Please test that the above-mentioned four commands still work. Also see if they work when WAL-replayed. (The easy way to check this is to do one and then "kill -9" the backend as soon as it completes.) One test case for the former PANIC bug is to run the regression tests using "make installcheck", then immediately start another backend and kill -9 it (you must do this before a checkpoint occurs in order to exercise the bug case). Some code I'm particularly worried about is in DROP TABLESPACE: /* * Okay, try to remove the symlink. We must however deal with the * possibility that it's a directory instead of a symlink --- this * could happen during WAL replay (see TablespaceCreateDbspace), * and it is also the normal case on Windows. */ if (lstat(location, &st) == 0 && S_ISDIR(st.st_mode)) { if (rmdir(location) < 0) ereport(ERROR, (errcode_for_file_access(), errmsg("could not remove directory \"%s\": %m", location))); } else { if (unlink(location) < 0) ereport(ERROR, (errcode_for_file_access(), errmsg("could not unlink symbolic link \"%s\": %m", location))); } Is there any reason lstat() wouldn't work on Windows? regards, tom lane
В списке pgsql-hackers-win32 по дате отправления: