Created
June 30, 2013 06:19
-
-
Save enile8/5894086 to your computer and use it in GitHub Desktop.
A MySQL connection test script.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" | |
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> | |
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> | |
<head> | |
<title>MySQL Connection Test</title> | |
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> | |
<style type="text/css"> | |
#wrapper { | |
width: 600px; | |
margin: 20px auto 0; | |
font: 1.2em Verdana, Arial, sans-serif; | |
} | |
input { | |
font-size: 1em; | |
} | |
#submit { | |
padding: 4px 8px; | |
} | |
</style> | |
</head> | |
<body> | |
<div id="wrapper"> | |
<?php | |
$action = htmlspecialchars($_GET['action'], ENT_QUOTES); | |
?> | |
<?php if (!$action) { ?> | |
<h1>MySQL connection test</h1> | |
<form action="<?php echo $_SERVER['PHP_SELF']; ?>?action=test" id="mail" method="post"> | |
<table cellpadding="2"> | |
<tr> | |
<td>Hostname</td> | |
<td><input type="text" name="hostname" id="hostname" value="" size="30" tabindex="1" /></td> | |
<td>(usually "localhost")</td> | |
</tr> | |
<tr> | |
<td>Username</td> | |
<td><input type="text" name="username" id="username" value="" size="30" tabindex="2" /></td> | |
<td></td> | |
</tr> | |
<tr> | |
<td>Password</td> | |
<td><input type="text" name="password" id="password" value="" size="30" tabindex="3" /></td> | |
<td></td> | |
</tr> | |
<tr> | |
<td>Database</td> | |
<td><input type="text" name="database" id="database" value="" size="30" tabindex="4" /></td> | |
<td>(optional)</td> | |
</tr> | |
<tr> | |
<td></td> | |
<td><input type="submit" id="submit" value="Test Connection" tabindex="5" /></td> | |
<td></td> | |
</tr> | |
</table> | |
</form> | |
<?php } ?> | |
<?php if ($action == "test") { | |
// The variables have not been adequately sanitized to protect against SQL Injection attacks: http://us3.php.net/mysql_real_escape_string | |
$hostname = trim($_POST['hostname']); | |
$username = trim($_POST['username']); | |
$password = trim($_POST['password']); | |
$database = trim($_POST['database']); | |
$link = mysql_connect("$hostname", "$username", "$password"); | |
if (!$link) { | |
echo "<p>Could not connect to the server '" . $hostname . "'</p>"; | |
echo mysql_error(); | |
}else{ | |
echo "<p>Successfully connected to the server '" . $hostname . "'</p>"; | |
// printf("MySQL client info: %sn", mysql_get_client_info()); | |
// printf("MySQL host info: %sn", mysql_get_host_info()); | |
// printf("MySQL server version: %sn", mysql_get_server_info()); | |
// printf("MySQL protocol version: %sn", mysql_get_proto_info()); | |
} | |
if ($link && !$database) { | |
echo "<p>No database name was given. Available databases:</p>"; | |
$db_list = mysql_list_dbs($link); | |
echo "<pre>"; | |
while ($row = mysql_fetch_array($db_list)) { | |
echo $row['Database']; | |
} | |
echo "</pre>"; | |
} | |
if ($database) { | |
$dbcheck = mysql_select_db("$database"); | |
if (!$dbcheck) { | |
echo mysql_error(); | |
}else{ | |
echo "<p>Successfully connected to the database '" . $database . "'</p>"; | |
// Check tables | |
$sql = "SHOW TABLES FROM `$database`"; | |
$result = mysql_query($sql); | |
if (mysql_num_rows($result) > 0) { | |
echo "<p>Available tables:</p>"; | |
echo "<pre>n"; | |
while ($row = mysql_fetch_row($result)) { | |
echo "{$row[0]}"; | |
} | |
echo "</pre>n"; | |
} else { | |
echo "<p>The database '" . $database . "' contains no tables.</p>"; | |
echo mysql_error(); | |
} | |
} | |
} | |
} | |
?> | |
</div><!-- end #wrapper --> | |
</body> | |
</html> |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment