 753c61997d
			
		
	
	753c61997d
	
	
	
		
			
			The test now checks that both users with passwords and users without passwords work through MaxScale when skip_authentication is enabled. In addition to this, the test also makes sure that the wrong password and a missing password are properly detected.
		
			
				
	
	
		
			63 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
			
		
		
	
	
			63 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			C++
		
	
	
	
	
	
| /**
 | |
|  * MXS-1451: Password is not stored with skip_authentication=true
 | |
|  *
 | |
|  * Check that connection through MaxScale work even if authentication is disabled
 | |
|  */
 | |
| 
 | |
| #include "testconnections.h"
 | |
| 
 | |
| int main(int argc, char *argv[])
 | |
| {
 | |
|     TestConnections test(argc, argv);
 | |
| 
 | |
|     test.set_timeout(60);
 | |
|     test.tprintf("Creating users");
 | |
|     test.repl->connect();
 | |
|     execute_query(test.repl->nodes[0], "CREATE USER 'auth_test'@'%s' IDENTIFIED BY 'test'", test.maxscale_ip());
 | |
|     execute_query(test.repl->nodes[0], "GRANT ALL ON *.* to 'auth_test'@'%s'", test.maxscale_ip());
 | |
|     execute_query(test.repl->nodes[0], "CREATE USER 'auth_test_nopw'@'%s'", test.maxscale_ip());
 | |
|     execute_query(test.repl->nodes[0], "GRANT ALL ON *.* to 'auth_test_nopw'@'%s'", test.maxscale_ip());
 | |
|     test.repl->sync_slaves();
 | |
|     test.repl->close_connections();
 | |
| 
 | |
|     test.tprintf("Trying to connect through MaxScale");
 | |
| 
 | |
|     test.set_timeout(60);
 | |
|     test.tprintf("... with correct credentials");
 | |
|     MYSQL* conn = open_conn_db(test.rwsplit_port, test.maxscale_ip(), "test", "auth_test", "test", false);
 | |
|     test.try_query(conn, "SHOW DATABASES");
 | |
|     mysql_close(conn);
 | |
| 
 | |
|     test.set_timeout(60);
 | |
|     test.tprintf("... without a password");
 | |
|     conn = open_conn_db(test.rwsplit_port, test.maxscale_ip(), "test", "auth_test_nopw", "", false);
 | |
|     test.try_query(conn, "SHOW DATABASES");
 | |
|     mysql_close(conn);
 | |
| 
 | |
|     test.set_timeout(60);
 | |
|     test.tprintf("... with wrong password");
 | |
|     conn = open_conn_db(test.rwsplit_port, test.maxscale_ip(), "test", "auth_test", "wrong_password", false);
 | |
|     test.add_result(mysql_errno(conn) == 0, "Connection with wrong password should fail");
 | |
|     mysql_close(conn);
 | |
| 
 | |
|     test.set_timeout(60);
 | |
|     test.tprintf("... with a password for user without a password");
 | |
|     conn = open_conn_db(test.rwsplit_port, test.maxscale_ip(), "test", "auth_test_nopw", "test", false);
 | |
|     test.add_result(mysql_errno(conn) == 0, "Connection with wrong password to user without a password should fail");
 | |
|     mysql_close(conn);
 | |
| 
 | |
|     test.tprintf("... with bad credentials");
 | |
|     conn = open_conn_db(test.rwsplit_port, test.maxscale_ip(), "test", "wrong_user", "wrong_password", false);
 | |
|     test.add_result(mysql_errno(conn) == 0, "Connection with bad credentials should fail");
 | |
|     mysql_close(conn);
 | |
| 
 | |
|     test.set_timeout(60);
 | |
|     test.tprintf("Dropping users");
 | |
|     test.repl->connect();
 | |
|     execute_query(test.repl->nodes[0], "DROP USER 'auth_test'@'%s'", test.maxscale_ip());
 | |
|     execute_query(test.repl->nodes[0], "DROP USER 'auth_test_nopw'@'%s'", test.maxscale_ip());
 | |
|     test.repl->close_connections();
 | |
| 
 | |
|     return test.global_result;
 | |
| }
 |