|
| 1 | +package provisioner |
| 2 | + |
| 3 | +import ( |
| 4 | + "context" |
| 5 | + "database/sql" |
| 6 | + "os" |
| 7 | + "testing" |
| 8 | + "time" |
| 9 | + |
| 10 | + "github.com/photoprism/photoprism/internal/config" |
| 11 | +) |
| 12 | + |
| 13 | +func TestEnsureCredentials_ProxySQLIntegration(t *testing.T) { |
| 14 | + if os.Getenv("PHOTOPRISM_TEST_PROXYSQL") == "" { |
| 15 | + t.Skip("PHOTOPRISM_TEST_PROXYSQL not set; skipping ProxySQL integration test") |
| 16 | + } |
| 17 | + |
| 18 | + ctx := context.Background() |
| 19 | + |
| 20 | + proxyDSN := os.Getenv("PHOTOPRISM_TEST_PROXYSQL_DSN") |
| 21 | + if proxyDSN == "" { |
| 22 | + proxyDSN = "admin:admin@tcp(127.0.0.1:6032)/" |
| 23 | + } |
| 24 | + |
| 25 | + adminDB, err := sql.Open("mysql", normalizeProxyDSN(proxyDSN)) |
| 26 | + if err != nil { |
| 27 | + t.Skipf("proxy DSN not openable: %v", err) |
| 28 | + } |
| 29 | + t.Cleanup(func() { _ = adminDB.Close() }) |
| 30 | + |
| 31 | + pingCtx, cancel := context.WithTimeout(ctx, 5*time.Second) |
| 32 | + if err := adminDB.PingContext(pingCtx); err != nil { |
| 33 | + cancel() |
| 34 | + t.Skipf("proxy DSN not reachable: %v", err) |
| 35 | + } |
| 36 | + cancel() |
| 37 | + |
| 38 | + origDSN := ProvisionProxyDSN |
| 39 | + origOpts := ProvisionProxyOptions |
| 40 | + ProvisionProxyDSN = proxyDSN |
| 41 | + ProvisionProxyOptions = ProxyOptions{ |
| 42 | + Hostgroup: DefaultProxyHostgroup, |
| 43 | + Frontend: DefaultProxyFrontend, |
| 44 | + Backend: DefaultProxyBackend, |
| 45 | + MaxConnections: DefaultProxyMaxConnections, |
| 46 | + UseSSL: DefaultProxyUseSSL, |
| 47 | + Comment: DefaultProxyComment, |
| 48 | + } |
| 49 | + t.Cleanup(func() { |
| 50 | + ProvisionProxyDSN = origDSN |
| 51 | + ProvisionProxyOptions = origOpts |
| 52 | + }) |
| 53 | + |
| 54 | + conf := config.NewConfig(config.CliTestContext()) |
| 55 | + conf.Options().ClusterUUID = time.Now().UTC().Format("20060102-150405.000000000") |
| 56 | + |
| 57 | + nodeUUID := "11111111-1111-4111-8111-333333333333" |
| 58 | + nodeName := "pp-proxy-itest" |
| 59 | + |
| 60 | + creds, _, err := EnsureCredentials(ctx, conf, nodeUUID, nodeName, true) |
| 61 | + if err != nil { |
| 62 | + t.Fatalf("EnsureCredentials with ProxySQL error: %v", err) |
| 63 | + } |
| 64 | + |
| 65 | + t.Cleanup(func() { |
| 66 | + if creds.Name == "" || creds.User == "" { |
| 67 | + return |
| 68 | + } |
| 69 | + if dropErr := DropCredentials(ctx, creds.Name, creds.User); dropErr != nil { |
| 70 | + t.Logf("cleanup drop credentials: %v", dropErr) |
| 71 | + } |
| 72 | + }) |
| 73 | + |
| 74 | + var defaultSchema, comment string |
| 75 | + var frontend, backend, maxConnections int |
| 76 | + |
| 77 | + err = adminDB.QueryRowContext(ctx, ` |
| 78 | + SELECT default_schema, frontend, backend, max_connections, comment |
| 79 | + FROM mysql_users WHERE username = ? |
| 80 | + `, creds.User).Scan(&defaultSchema, &frontend, &backend, &maxConnections, &comment) |
| 81 | + if err != nil { |
| 82 | + t.Fatalf("mysql_users lookup: %v", err) |
| 83 | + } |
| 84 | + |
| 85 | + if defaultSchema != creds.Name { |
| 86 | + t.Fatalf("expected default_schema %q, got %q", creds.Name, defaultSchema) |
| 87 | + } |
| 88 | + if frontend != ProvisionProxyOptions.Frontend { |
| 89 | + t.Fatalf("expected frontend=%d, got %d", ProvisionProxyOptions.Frontend, frontend) |
| 90 | + } |
| 91 | + if backend != ProvisionProxyOptions.Backend { |
| 92 | + t.Fatalf("expected backend=%d, got %d", ProvisionProxyOptions.Backend, backend) |
| 93 | + } |
| 94 | + if maxConnections != ProvisionProxyOptions.MaxConnections { |
| 95 | + t.Fatalf("expected max_connections=%d, got %d", ProvisionProxyOptions.MaxConnections, maxConnections) |
| 96 | + } |
| 97 | + if comment != ProvisionProxyOptions.Comment { |
| 98 | + t.Fatalf("expected comment %q, got %q", ProvisionProxyOptions.Comment, comment) |
| 99 | + } |
| 100 | + |
| 101 | + if _, _, err := EnsureCredentials(ctx, conf, nodeUUID, nodeName, false); err != nil { |
| 102 | + t.Fatalf("EnsureCredentials (rotate=false) error: %v", err) |
| 103 | + } |
| 104 | + |
| 105 | + var count int |
| 106 | + if err := adminDB.QueryRowContext(ctx, "SELECT COUNT(*) FROM mysql_users WHERE username = ?", creds.User).Scan(&count); err != nil { |
| 107 | + t.Fatalf("count mysql_users: %v", err) |
| 108 | + } |
| 109 | + if count != 1 { |
| 110 | + t.Fatalf("expected mysql_users count 1 after idempotent ensure, got %d", count) |
| 111 | + } |
| 112 | + |
| 113 | + nodeUser := creds.User |
| 114 | + nodeSchema := creds.Name |
| 115 | + |
| 116 | + if err := DropCredentials(ctx, nodeSchema, nodeUser); err != nil { |
| 117 | + t.Fatalf("DropCredentials error: %v", err) |
| 118 | + } |
| 119 | + creds.Name, creds.User = "", "" |
| 120 | + |
| 121 | + if err := adminDB.QueryRowContext(ctx, "SELECT COUNT(*) FROM mysql_users WHERE username = ?", nodeUser).Scan(&count); err != nil { |
| 122 | + t.Fatalf("count mysql_users after drop: %v", err) |
| 123 | + } |
| 124 | + if count != 0 { |
| 125 | + t.Fatalf("expected mysql_users count 0 after drop, got %d", count) |
| 126 | + } |
| 127 | +} |
0 commit comments