package mysql import ( "flag" "fmt" "github.com/zr-hebo/sniffer-agent/util" "regexp" ) var ( uselessSQLPattern = regexp.MustCompile(`(?i)^\s*(select @@version_comment limit 1)`) ddlPatern = regexp.MustCompile(`(?i)^\s*(create|alter|drop)`) ) var ( strictMode bool adminUser string adminPasswd string coverRangePool = NewCoveragePool() localStmtCache = util.NewSliceBufferPool("statement cache", MaxMysqlPacketLen) PrepareStatement = []byte(":prepare") ) func init() { flag.BoolVar(&strictMode,"strict_mode", false, "strict mode. Default is false") flag.StringVar(&adminUser,"admin_user", "", "admin user name. When set strict mode, must set admin user to query session info") flag.StringVar(&adminPasswd,"admin_passwd", "", "admin user passwd. When use strict mode, must set admin user to query session info") } func CheckParams() { if !strictMode { return } if len(adminUser) < 1 { panic(fmt.Sprintf("In strict mode, admin user name cannot be empty")) } if len(adminPasswd) < 1 { panic(fmt.Sprintf("In strict mode, admin passwd cannot be empty")) } }