mirror of
https://github.com/neondatabase/neon.git
synced 2026-01-07 21:42:56 +00:00
Make `mgmt` port mandatory argument for `NeonProxy` (and set it for `static_proxy`) to avoid port collision when tests run in parallel.
144 lines
5.0 KiB
Python
144 lines
5.0 KiB
Python
import json
|
|
import subprocess
|
|
from urllib.parse import urlparse
|
|
|
|
import psycopg2
|
|
import pytest
|
|
from fixtures.log_helper import log
|
|
from fixtures.neon_fixtures import PSQL, NeonProxy, VanillaPostgres
|
|
|
|
|
|
def test_proxy_select_1(static_proxy: NeonProxy):
|
|
static_proxy.safe_psql("select 1", options="project=generic-project-name")
|
|
|
|
|
|
def test_password_hack(static_proxy: NeonProxy):
|
|
user = "borat"
|
|
password = "password"
|
|
static_proxy.safe_psql(
|
|
f"create role {user} with login password '{password}'", options="project=irrelevant"
|
|
)
|
|
|
|
# Note the format of `magic`!
|
|
magic = f"project=irrelevant;{password}"
|
|
static_proxy.safe_psql("select 1", sslsni=0, user=user, password=magic)
|
|
|
|
# Must also check that invalid magic won't be accepted.
|
|
with pytest.raises(psycopg2.OperationalError):
|
|
magic = "broken"
|
|
static_proxy.safe_psql("select 1", sslsni=0, user=user, password=magic)
|
|
|
|
|
|
def get_session_id_from_uri_line(uri_prefix, uri_line):
|
|
assert uri_prefix in uri_line
|
|
|
|
url_parts = urlparse(uri_line)
|
|
psql_session_id = url_parts.path[1:]
|
|
assert psql_session_id.isalnum(), "session_id should only contain alphanumeric chars."
|
|
link_auth_uri_prefix = uri_line[: -len(url_parts.path)]
|
|
# invariant: the prefix must match the uri_prefix.
|
|
assert (
|
|
link_auth_uri_prefix == uri_prefix
|
|
), f"Line='{uri_line}' should contain a http auth link of form '{uri_prefix}/<psql_session_id>'."
|
|
# invariant: the entire link_auth_uri should be on its own line, module spaces.
|
|
assert " ".join(uri_line.split(" ")) == f"{uri_prefix}/{psql_session_id}"
|
|
|
|
return psql_session_id
|
|
|
|
|
|
def create_and_send_db_info(local_vanilla_pg, psql_session_id, mgmt_port):
|
|
pg_user = "proxy"
|
|
pg_password = "password"
|
|
|
|
local_vanilla_pg.start()
|
|
query = f"create user {pg_user} with login superuser password '{pg_password}'"
|
|
local_vanilla_pg.safe_psql(query)
|
|
|
|
port = local_vanilla_pg.default_options["port"]
|
|
host = local_vanilla_pg.default_options["host"]
|
|
dbname = local_vanilla_pg.default_options["dbname"]
|
|
|
|
db_info_dict = {
|
|
"session_id": psql_session_id,
|
|
"result": {
|
|
"Success": {
|
|
"host": host,
|
|
"port": port,
|
|
"dbname": dbname,
|
|
"user": pg_user,
|
|
"password": pg_password,
|
|
}
|
|
},
|
|
}
|
|
db_info_str = json.dumps(db_info_dict)
|
|
cmd_args = [
|
|
"psql",
|
|
"-h",
|
|
"127.0.0.1", # localhost
|
|
"-p",
|
|
f"{mgmt_port}",
|
|
"-c",
|
|
db_info_str,
|
|
]
|
|
|
|
log.info(f"Sending to proxy the user and db info: {' '.join(cmd_args)}")
|
|
p = subprocess.Popen(cmd_args, stdout=subprocess.PIPE)
|
|
out, err = p.communicate()
|
|
assert "ok" in str(out)
|
|
|
|
|
|
async def get_uri_line_from_process_welcome_notice(link_auth_uri_prefix, proc):
|
|
"""
|
|
Returns the line from the welcome notice from proc containing link_auth_uri_prefix.
|
|
:param link_auth_uri_prefix: the uri prefix used to indicate the line of interest
|
|
:param proc: the process to read the welcome message from.
|
|
:return: a line containing the full link authentication uri.
|
|
"""
|
|
max_num_lines_of_welcome_message = 15
|
|
for attempt in range(max_num_lines_of_welcome_message):
|
|
raw_line = await proc.stderr.readline()
|
|
line = raw_line.decode("utf-8").strip()
|
|
if link_auth_uri_prefix in line:
|
|
return line
|
|
assert False, f"did not find line containing '{link_auth_uri_prefix}'"
|
|
|
|
|
|
@pytest.mark.asyncio
|
|
async def test_psql_session_id(vanilla_pg: VanillaPostgres, link_proxy: NeonProxy):
|
|
"""
|
|
Test copied and modified from: test_project_psql_link_auth test from cloud/tests_e2e/tests/test_project.py
|
|
Step 1. establish connection to the proxy
|
|
Step 2. retrieve session_id:
|
|
Step 2.1: read welcome message
|
|
Step 2.2: parse session_id
|
|
Step 3. create a vanilla_pg and send user and db info via command line (using Popen) a psql query via mgmt port to proxy.
|
|
Step 4. assert that select 1 has been executed correctly.
|
|
"""
|
|
|
|
psql = PSQL(
|
|
host=link_proxy.host,
|
|
port=link_proxy.proxy_port,
|
|
)
|
|
proc = await psql.run("select 42")
|
|
|
|
uri_prefix = link_proxy.link_auth_uri_prefix
|
|
line_str = await get_uri_line_from_process_welcome_notice(uri_prefix, proc)
|
|
|
|
psql_session_id = get_session_id_from_uri_line(uri_prefix, line_str)
|
|
log.info(f"Parsed psql_session_id='{psql_session_id}' from Neon welcome message.")
|
|
|
|
create_and_send_db_info(vanilla_pg, psql_session_id, link_proxy.mgmt_port)
|
|
|
|
assert proc.stdout is not None
|
|
out = (await proc.stdout.read()).decode("utf-8").strip()
|
|
assert out == "42"
|
|
|
|
|
|
# Pass extra options to the server.
|
|
def test_proxy_options(static_proxy: NeonProxy):
|
|
with static_proxy.connect(options="project=irrelevant -cproxytest.option=value") as conn:
|
|
with conn.cursor() as cur:
|
|
cur.execute("SHOW proxytest.option")
|
|
value = cur.fetchall()[0][0]
|
|
assert value == "value"
|