MXS-1451: Expand test case

The test now checks that both users with passwords and users without
passwords work through MaxScale when skip_authentication is enabled. In
addition to this, the test also makes sure that the wrong password and a
missing password are properly detected.
This commit is contained in:
Markus Mäkelä 2017-09-26 07:48:45 +03:00
parent 2079bba49c
commit 753c61997d

View File

@ -11,28 +11,51 @@ int main(int argc, char *argv[])
TestConnections test(argc, argv);
test.set_timeout(60);
test.tprintf("Creating user...");
test.tprintf("Creating users");
test.repl->connect();
execute_query(test.repl->nodes[0], "CREATE USER 'auth_test'@'%s' IDENTIFIED BY 'test'", test.maxscale_ip());
execute_query(test.repl->nodes[0], "GRANT ALL ON *.* to 'auth_test'@'%s'", test.maxscale_ip());
execute_query(test.repl->nodes[0], "CREATE USER 'auth_test_nopw'@'%s'", test.maxscale_ip());
execute_query(test.repl->nodes[0], "GRANT ALL ON *.* to 'auth_test_nopw'@'%s'", test.maxscale_ip());
test.repl->sync_slaves();
test.repl->close_connections();
test.set_timeout(60);
test.tprintf("Trying to connect through MaxScale");
test.set_timeout(60);
test.tprintf("... with correct credentials");
MYSQL* conn = open_conn_db(test.rwsplit_port, test.maxscale_ip(), "test", "auth_test", "test", false);
test.try_query(conn, "SHOW DATABASES");
mysql_close(conn);
test.tprintf("Trying query with bad credentials");
conn = open_conn_db(test.rwsplit_port, test.maxscale_ip(), "test", "wrong_user", "wrong_password", false);
test.add_result(execute_query_silent(conn, "SHOW DATABASES") == 0, "Connection with bad credentials should fail");
test.set_timeout(60);
test.tprintf("... without a password");
conn = open_conn_db(test.rwsplit_port, test.maxscale_ip(), "test", "auth_test_nopw", "", false);
test.try_query(conn, "SHOW DATABASES");
mysql_close(conn);
test.set_timeout(60);
test.tprintf("Dropping user");
test.tprintf("... with wrong password");
conn = open_conn_db(test.rwsplit_port, test.maxscale_ip(), "test", "auth_test", "wrong_password", false);
test.add_result(mysql_errno(conn) == 0, "Connection with wrong password should fail");
mysql_close(conn);
test.set_timeout(60);
test.tprintf("... with a password for user without a password");
conn = open_conn_db(test.rwsplit_port, test.maxscale_ip(), "test", "auth_test_nopw", "test", false);
test.add_result(mysql_errno(conn) == 0, "Connection with wrong password to user without a password should fail");
mysql_close(conn);
test.tprintf("... with bad credentials");
conn = open_conn_db(test.rwsplit_port, test.maxscale_ip(), "test", "wrong_user", "wrong_password", false);
test.add_result(mysql_errno(conn) == 0, "Connection with bad credentials should fail");
mysql_close(conn);
test.set_timeout(60);
test.tprintf("Dropping users");
test.repl->connect();
execute_query(test.repl->nodes[0], "DROP USER 'auth_test'@'%s'", test.maxscale_ip());
execute_query(test.repl->nodes[0], "DROP USER 'auth_test_nopw'@'%s'", test.maxscale_ip());
test.repl->close_connections();
return test.global_result;