-
Notifications
You must be signed in to change notification settings - Fork 31
[DEBUG] #3788
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
[DEBUG] #3788
Conversation
|
Skipping CI for Draft Pull Request. |
|
[FORMAT CHECKER NOTIFICATION] Notice: To remove the 📖 For more info, you can check the "Contribute Code" section in the development guide. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
Summary of ChangesHello @wk989898, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request introduces a significant optimization to how multi-row DELETE statements are generated. By transitioning from a series of Highlights
🧠 New Feature in Public Preview: You can now enable Memory to help Gemini Code Assist learn from your team's feedback. This makes future code reviews more consistent and personalized to your project's style. Click here to enable Memory in your admin console. Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for Github and other Google products, sign up here. You can also get AI-powered code generation, chat, as well as code reviews directly in the IDE at no cost with the Gemini Code Assist IDE Extension. Footnotes
|
|
/test pull-cdc-mysql-integration-heavy |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request refactors GenDeleteSQL to use a more efficient IN clause for batch deletes, which is a good performance improvement. It also removes the now-unused SameTypeTargetAndColumns function. My review focuses on a potential correctness issue introduced by the GenDeleteSQL optimization. I've suggested adding a defensive check to prevent generating invalid SQL in edge cases.
| _, args := c.whereColumnsAndValues() | ||
| allArgs = append(allArgs, args...) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The new implementation of GenDeleteSQL is more efficient, but it assumes that all RowChanges in the changes slice will produce the same set of WHERE columns from whereColumnsAndValues. This was previously guaranteed by SameTypeTargetAndColumns, which has been removed in this PR.
If different RowChanges have different WHERE columns (e.g., due to using different unique keys with nullable columns), this function will generate an incorrect SQL statement, potentially leading to data inconsistencies.
For example, if changes[0] uses (colA) and changes[1] uses (colB), the generated SQL will be DELETE ... WHERE (colA) IN ((?), (?)) with arguments for both colA and colB, which is incorrect.
I suggest adding a check to ensure this precondition holds. A DPanic would be appropriate to catch this during development and testing, consistent with other checks in this package.
cols, args := c.whereColumnsAndValues()
if len(cols) != len(whereColumns) {
// The number of where columns is not as expected.
// This may happen when the handle key is not the same for all changes.
log.L().DPanic("unexpected where columns length in GenDeleteSQL",
zap.Int("expected", len(whereColumns)),
zap.Int("got", len(cols)),
zap.Any("expected-cols", whereColumns),
zap.Any("got-cols", cols))
}
allArgs = append(allArgs, args...)|
@wk989898: The following test failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
What problem does this PR solve?
Issue Number: close #xxx
What is changed and how it works?
Check List
Tests
Questions
Will it cause performance regression or break compatibility?
Do you need to update user documentation, design documentation or monitoring documentation?
Release note