2020-04-02 21:40:55 +01:00
|
|
|
import ./../make-test-python.nix ({ pkgs, ...} : {
|
2014-06-28 15:04:49 +01:00
|
|
|
name = "mysql";
|
2015-07-12 11:09:40 +01:00
|
|
|
meta = with pkgs.stdenv.lib.maintainers; {
|
2019-02-22 15:14:13 +00:00
|
|
|
maintainers = [ eelco shlevy ];
|
2015-07-12 11:09:40 +01:00
|
|
|
};
|
2011-07-13 21:58:48 +01:00
|
|
|
|
|
|
|
nodes = {
|
2020-05-23 14:32:54 +01:00
|
|
|
mysql57 =
|
2018-07-20 21:56:59 +01:00
|
|
|
{ pkgs, ... }:
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2011-07-13 21:58:48 +01:00
|
|
|
{
|
2020-05-23 14:32:54 +01:00
|
|
|
users.users.testuser = { };
|
|
|
|
users.users.testuser2 = { };
|
2011-07-13 21:58:48 +01:00
|
|
|
services.mysql.enable = true;
|
2019-04-01 19:01:29 +01:00
|
|
|
services.mysql.initialDatabases = [
|
2020-05-23 14:32:54 +01:00
|
|
|
{ name = "testdb3"; schema = ./testdb.sql; }
|
2019-04-01 19:01:29 +01:00
|
|
|
];
|
2019-04-01 20:08:47 +01:00
|
|
|
# note that using pkgs.writeText here is generally not a good idea,
|
|
|
|
# as it will store the password in world-readable /nix/store ;)
|
|
|
|
services.mysql.initialScript = pkgs.writeText "mysql-init.sql" ''
|
2020-05-23 14:32:54 +01:00
|
|
|
CREATE USER 'testuser3'@'localhost' IDENTIFIED BY 'secure';
|
|
|
|
GRANT ALL PRIVILEGES ON testdb3.* TO 'testuser3'@'localhost';
|
2019-04-01 20:08:47 +01:00
|
|
|
'';
|
2020-05-23 14:32:54 +01:00
|
|
|
services.mysql.ensureDatabases = [ "testdb" "testdb2" ];
|
|
|
|
services.mysql.ensureUsers = [{
|
|
|
|
name = "testuser";
|
|
|
|
ensurePermissions = {
|
|
|
|
"testdb.*" = "ALL PRIVILEGES";
|
|
|
|
};
|
|
|
|
} {
|
|
|
|
name = "testuser2";
|
|
|
|
ensurePermissions = {
|
|
|
|
"testdb2.*" = "ALL PRIVILEGES";
|
|
|
|
};
|
|
|
|
}];
|
2019-08-04 15:41:55 +01:00
|
|
|
services.mysql.package = pkgs.mysql57;
|
2011-09-14 19:20:50 +01:00
|
|
|
};
|
2019-03-12 22:53:32 +00:00
|
|
|
|
2020-03-21 00:46:26 +00:00
|
|
|
mysql80 =
|
|
|
|
{ pkgs, ... }:
|
|
|
|
|
|
|
|
{
|
|
|
|
# prevent oom:
|
|
|
|
# Kernel panic - not syncing: Out of memory: compulsory panic_on_oom is enabled
|
|
|
|
virtualisation.memorySize = 1024;
|
|
|
|
|
2020-05-23 14:44:02 +01:00
|
|
|
users.users.testuser = { };
|
|
|
|
users.users.testuser2 = { };
|
2020-03-21 00:46:26 +00:00
|
|
|
services.mysql.enable = true;
|
|
|
|
services.mysql.initialDatabases = [
|
2020-05-23 14:44:02 +01:00
|
|
|
{ name = "testdb3"; schema = ./testdb.sql; }
|
2020-03-21 00:46:26 +00:00
|
|
|
];
|
|
|
|
# note that using pkgs.writeText here is generally not a good idea,
|
|
|
|
# as it will store the password in world-readable /nix/store ;)
|
|
|
|
services.mysql.initialScript = pkgs.writeText "mysql-init.sql" ''
|
2020-05-23 14:44:02 +01:00
|
|
|
CREATE USER 'testuser3'@'localhost' IDENTIFIED BY 'secure';
|
|
|
|
GRANT ALL PRIVILEGES ON testdb3.* TO 'testuser3'@'localhost';
|
2020-03-21 00:46:26 +00:00
|
|
|
'';
|
2020-05-23 14:44:02 +01:00
|
|
|
services.mysql.ensureDatabases = [ "testdb" "testdb2" ];
|
|
|
|
services.mysql.ensureUsers = [{
|
|
|
|
name = "testuser";
|
|
|
|
ensurePermissions = {
|
|
|
|
"testdb.*" = "ALL PRIVILEGES";
|
|
|
|
};
|
|
|
|
} {
|
|
|
|
name = "testuser2";
|
|
|
|
ensurePermissions = {
|
|
|
|
"testdb2.*" = "ALL PRIVILEGES";
|
|
|
|
};
|
|
|
|
}];
|
2020-03-21 00:46:26 +00:00
|
|
|
services.mysql.package = pkgs.mysql80;
|
|
|
|
};
|
|
|
|
|
2019-03-12 22:53:32 +00:00
|
|
|
mariadb =
|
|
|
|
{ pkgs, ... }:
|
|
|
|
|
|
|
|
{
|
|
|
|
users.users.testuser = { };
|
2019-12-28 14:30:11 +00:00
|
|
|
users.users.testuser2 = { };
|
2019-03-12 22:53:32 +00:00
|
|
|
services.mysql.enable = true;
|
2019-07-01 03:01:02 +01:00
|
|
|
services.mysql.initialScript = pkgs.writeText "mariadb-init.sql" ''
|
2019-07-02 23:35:35 +01:00
|
|
|
ALTER USER root@localhost IDENTIFIED WITH unix_socket;
|
|
|
|
DELETE FROM mysql.user WHERE password = ''' AND plugin = ''';
|
|
|
|
DELETE FROM mysql.user WHERE user = ''';
|
|
|
|
FLUSH PRIVILEGES;
|
2019-07-01 03:01:02 +01:00
|
|
|
'';
|
2019-12-28 14:30:11 +00:00
|
|
|
services.mysql.ensureDatabases = [ "testdb" "testdb2" ];
|
2019-03-12 22:53:32 +00:00
|
|
|
services.mysql.ensureUsers = [{
|
|
|
|
name = "testuser";
|
|
|
|
ensurePermissions = {
|
|
|
|
"testdb.*" = "ALL PRIVILEGES";
|
|
|
|
};
|
2019-12-28 14:30:11 +00:00
|
|
|
} {
|
|
|
|
name = "testuser2";
|
|
|
|
ensurePermissions = {
|
|
|
|
"testdb2.*" = "ALL PRIVILEGES";
|
|
|
|
};
|
2019-03-12 22:53:32 +00:00
|
|
|
}];
|
2020-03-30 11:37:10 +01:00
|
|
|
services.mysql.settings = {
|
|
|
|
mysqld = {
|
2020-03-31 12:46:04 +01:00
|
|
|
plugin-load-add = [ "ha_tokudb.so" "ha_rocksdb.so" ];
|
2020-03-30 11:37:10 +01:00
|
|
|
};
|
|
|
|
};
|
2019-03-12 22:53:32 +00:00
|
|
|
services.mysql.package = pkgs.mariadb;
|
|
|
|
};
|
|
|
|
|
2011-07-13 21:58:48 +01:00
|
|
|
};
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2011-07-13 21:58:48 +01:00
|
|
|
testScript = ''
|
2019-12-28 14:29:22 +00:00
|
|
|
start_all()
|
2011-09-14 19:20:50 +01:00
|
|
|
|
2020-05-23 14:32:54 +01:00
|
|
|
mysql57.wait_for_unit("mysql")
|
|
|
|
mysql57.succeed(
|
|
|
|
"echo 'use testdb; create table tests (test_id INT, PRIMARY KEY (test_id));' | sudo -u testuser mysql -u testuser"
|
|
|
|
)
|
|
|
|
mysql57.succeed(
|
|
|
|
"echo 'use testdb; insert into tests values (41);' | sudo -u testuser mysql -u testuser"
|
|
|
|
)
|
|
|
|
# Ensure testuser2 is not able to insert into testdb as mysql testuser2
|
|
|
|
mysql57.fail(
|
|
|
|
"echo 'use testdb; insert into tests values (22);' | sudo -u testuser2 mysql -u testuser2"
|
|
|
|
)
|
|
|
|
# Ensure testuser2 is not able to authenticate as mysql testuser
|
|
|
|
mysql57.fail(
|
|
|
|
"echo 'use testdb; insert into tests values (22);' | sudo -u testuser2 mysql -u testuser"
|
|
|
|
)
|
|
|
|
mysql57.succeed(
|
|
|
|
"echo 'use testdb; select test_id from tests;' | sudo -u testuser mysql -u testuser -N | grep 41"
|
|
|
|
)
|
|
|
|
mysql57.succeed(
|
|
|
|
"echo 'use testdb3; select * from tests;' | mysql -u testuser3 --password=secure -N | grep 4"
|
|
|
|
)
|
2019-03-12 22:53:32 +00:00
|
|
|
|
2020-03-21 00:46:26 +00:00
|
|
|
mysql80.wait_for_unit("mysql")
|
2020-05-23 14:44:02 +01:00
|
|
|
mysql80.succeed(
|
|
|
|
"echo 'use testdb; create table tests (test_id INT, PRIMARY KEY (test_id));' | sudo -u testuser mysql -u testuser"
|
|
|
|
)
|
|
|
|
mysql80.succeed(
|
|
|
|
"echo 'use testdb; insert into tests values (41);' | sudo -u testuser mysql -u testuser"
|
|
|
|
)
|
|
|
|
# Ensure testuser2 is not able to insert into testdb as mysql testuser2
|
|
|
|
mysql80.fail(
|
|
|
|
"echo 'use testdb; insert into tests values (22);' | sudo -u testuser2 mysql -u testuser2"
|
|
|
|
)
|
|
|
|
# Ensure testuser2 is not able to authenticate as mysql testuser
|
|
|
|
mysql80.fail(
|
|
|
|
"echo 'use testdb; insert into tests values (22);' | sudo -u testuser2 mysql -u testuser"
|
|
|
|
)
|
|
|
|
mysql80.succeed(
|
|
|
|
"echo 'use testdb; select test_id from tests;' | sudo -u testuser mysql -u testuser -N | grep 41"
|
|
|
|
)
|
|
|
|
mysql80.succeed(
|
|
|
|
"echo 'use testdb3; select * from tests;' | mysql -u testuser3 --password=secure -N | grep 4"
|
|
|
|
)
|
2020-03-21 00:46:26 +00:00
|
|
|
|
2019-11-23 22:47:16 +00:00
|
|
|
mariadb.wait_for_unit("mysql")
|
|
|
|
mariadb.succeed(
|
|
|
|
"echo 'use testdb; create table tests (test_id INT, PRIMARY KEY (test_id));' | sudo -u testuser mysql -u testuser"
|
|
|
|
)
|
|
|
|
mariadb.succeed(
|
|
|
|
"echo 'use testdb; insert into tests values (42);' | sudo -u testuser mysql -u testuser"
|
|
|
|
)
|
2019-12-28 14:30:11 +00:00
|
|
|
# Ensure testuser2 is not able to insert into testdb as mysql testuser2
|
|
|
|
mariadb.fail(
|
|
|
|
"echo 'use testdb; insert into tests values (23);' | sudo -u testuser2 mysql -u testuser2"
|
|
|
|
)
|
|
|
|
# Ensure testuser2 is not able to authenticate as mysql testuser
|
|
|
|
mariadb.fail(
|
|
|
|
"echo 'use testdb; insert into tests values (23);' | sudo -u testuser2 mysql -u testuser"
|
|
|
|
)
|
2019-11-23 22:47:16 +00:00
|
|
|
mariadb.succeed(
|
|
|
|
"echo 'use testdb; select test_id from tests;' | sudo -u testuser mysql -u testuser -N | grep 42"
|
|
|
|
)
|
2020-03-30 11:37:10 +01:00
|
|
|
|
2020-08-15 10:34:34 +01:00
|
|
|
# Check if RocksDB plugin works
|
2020-03-30 11:37:10 +01:00
|
|
|
mariadb.succeed(
|
2020-08-15 10:34:34 +01:00
|
|
|
"echo 'use testdb; create table rocksdb (test_id INT, PRIMARY KEY (test_id)) ENGINE = RocksDB;' | sudo -u testuser mysql -u testuser"
|
2020-03-30 11:37:10 +01:00
|
|
|
)
|
|
|
|
mariadb.succeed(
|
2020-08-15 10:34:34 +01:00
|
|
|
"echo 'use testdb; insert into rocksdb values (28);' | sudo -u testuser mysql -u testuser"
|
2020-03-30 11:37:10 +01:00
|
|
|
)
|
|
|
|
mariadb.succeed(
|
2020-08-15 10:34:34 +01:00
|
|
|
"echo 'use testdb; select test_id from rocksdb;' | sudo -u testuser mysql -u testuser -N | grep 28"
|
2020-03-30 11:37:10 +01:00
|
|
|
)
|
|
|
|
mariadb.succeed(
|
2020-08-15 10:34:34 +01:00
|
|
|
"echo 'use testdb; drop table rocksdb;' | sudo -u testuser mysql -u testuser"
|
2020-03-30 11:37:10 +01:00
|
|
|
)
|
2020-08-15 10:34:34 +01:00
|
|
|
'' + pkgs.stdenv.lib.optionalString pkgs.stdenv.isx86_64 ''
|
|
|
|
# Check if TokuDB plugin works
|
2020-03-31 12:46:04 +01:00
|
|
|
mariadb.succeed(
|
2020-08-15 10:34:34 +01:00
|
|
|
"echo 'use testdb; create table tokudb (test_id INT, PRIMARY KEY (test_id)) ENGINE = TokuDB;' | sudo -u testuser mysql -u testuser"
|
2020-03-31 12:46:04 +01:00
|
|
|
)
|
|
|
|
mariadb.succeed(
|
2020-08-15 10:34:34 +01:00
|
|
|
"echo 'use testdb; insert into tokudb values (25);' | sudo -u testuser mysql -u testuser"
|
2020-03-31 12:46:04 +01:00
|
|
|
)
|
|
|
|
mariadb.succeed(
|
2020-08-15 10:34:34 +01:00
|
|
|
"echo 'use testdb; select test_id from tokudb;' | sudo -u testuser mysql -u testuser -N | grep 25"
|
2020-03-31 12:46:04 +01:00
|
|
|
)
|
|
|
|
mariadb.succeed(
|
2020-08-15 10:34:34 +01:00
|
|
|
"echo 'use testdb; drop table tokudb;' | sudo -u testuser mysql -u testuser"
|
2020-03-31 12:46:04 +01:00
|
|
|
)
|
2011-07-13 21:58:48 +01:00
|
|
|
'';
|
2015-07-12 11:09:40 +01:00
|
|
|
})
|