@mysql/xdevapi
Version:
MySQL Connector/Node.js - A Node.js driver for MySQL using the X Protocol and X DevAPI.
195 lines (151 loc) • 7.43 kB
JavaScript
/*
* Copyright (c) 2020, 2023, Oracle and/or its affiliates.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License, version 2.0, as
* published by the Free Software Foundation.
*
* This program is also distributed with certain software (including
* but not limited to OpenSSL) that is licensed under separate terms,
* as designated in a particular file or component or in included license
* documentation. The authors of MySQL hereby grant you an
* additional permission to link the program and your derivative works
* with the separately licensed software that they have included with
* MySQL.
*
* Without limiting anything contained in the foregoing, this file,
* which is part of MySQL Connector/Node.js, is also subject to the
* Universal FOSS Exception, version 1.0, a copy of which can be found at
* http://oss.oracle.com/licenses/universal-foss-exception.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
* See the GNU General Public License, version 2.0, for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software Foundation, Inc.,
* 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*/
'use strict';
/* eslint-env node, mocha */
const config = require('../../../../config');
const errors = require('../../../../../lib/constants/errors');
const expect = require('chai').expect;
const mysqlx = require('../../../../../');
const os = require('os');
const path = require('path');
const util = require('util');
describe('sha256_password authentication plugin on MySQL 5.7', () => {
// mysql-5.7-sha256-password service defined in $root/test/docker/docker.compose.yml
const baseConfig = { host: 'mysql-5.7-sha256-password', schema: undefined };
const socket = path.join(os.tmpdir(), `${baseConfig.host}.sock`);
context('connecting without an authentication mechanism', () => {
it('succeeds over TCP with TLS using PLAIN', async () => {
const authConfig = { ...config, ...baseConfig, socket: undefined, tls: { enabled: true } };
const session = await mysqlx.getSession(authConfig);
expect(session.inspect().auth).to.equal('PLAIN');
await session?.close();
});
it('succeeds over regular TCP using MYSQL41', async () => {
const authConfig = { ...config, ...baseConfig, socket: undefined, tls: { enabled: false } };
const session = await mysqlx.getSession(authConfig);
expect(session.inspect().auth).to.equal('MYSQL41');
await session?.close();
});
it('succeeds over a Unix socket using PLAIN', async () => {
const authConfig = { ...config, ...baseConfig, socket, tls: { enabled: false } };
const session = await mysqlx.getSession(authConfig);
expect(session.inspect().auth).to.equal('PLAIN');
await session?.close();
});
});
context('connecting with the MYSQL41 authentication mechanism', () => {
const auth = 'MYSQL41';
it('succeeds over TCP with TLS', async () => {
const authConfig = { ...config, ...baseConfig, auth, socket: undefined, tls: { enabled: true } };
const session = await mysqlx.getSession(authConfig);
expect(session.inspect().auth).to.equal(auth);
await session?.close();
});
it('succeeds over regular TCP', async () => {
const authConfig = { ...config, ...baseConfig, auth, socket: undefined, tls: { enabled: false } };
const session = await mysqlx.getSession(authConfig);
expect(session.inspect().auth).to.equal(auth);
await session?.close();
});
it('succeeds over a Unix socket', async () => {
const authConfig = { ...config, ...baseConfig, auth, socket, tls: { enabled: false } };
const session = await mysqlx.getSession(authConfig);
expect(session.inspect().auth).to.equal(auth);
await session?.close();
});
});
context('connecting with the PLAIN authentication mechanism', () => {
const auth = 'PLAIN';
it('succeeds over TCP with TLS', async () => {
const authConfig = { ...config, ...baseConfig, auth, socket: undefined, tls: { enabled: true } };
const session = await mysqlx.getSession(authConfig);
expect(session.inspect().auth).to.equal(auth);
await session?.close();
});
it('fails over regular TCP', async () => {
const authConfig = { ...config, ...baseConfig, auth, socket: undefined, tls: { enabled: false } };
let session;
try {
session = await mysqlx.getSession(authConfig);
expect.fail();
} catch (err) {
expect(err.info).to.include.keys('code');
expect(err.info.code).to.equal(errors.ER_NOT_SUPPORTED_AUTH_MODE);
} finally {
await session?.close();
}
});
it('succeeds over a Unix socket', async () => {
const authConfig = { ...config, ...baseConfig, auth, socket, tls: { enabled: false } };
const session = await mysqlx.getSession(authConfig);
expect(session.inspect().auth).to.equal(auth);
await session?.close();
});
});
context('connecting with the SHA256_MEMORY authentication mechanism', () => {
const auth = 'SHA256_MEMORY';
it('fails over TCP with TLS', async () => {
const authConfig = { ...config, ...baseConfig, auth, socket: undefined, tls: { enabled: true } };
let session;
try {
session = await mysqlx.getSession(authConfig);
expect.fail();
} catch (err) {
expect(err.message).to.equal(util.format(errors.MESSAGES.ER_DEVAPI_AUTH_UNSUPPORTED_SERVER, 'SHA256_MEMORY'));
} finally {
await session?.close();
}
});
it('fails over regular TLS', async () => {
const authConfig = { ...config, ...baseConfig, auth, socket: undefined, tls: { enabled: false } };
let session;
try {
session = await mysqlx.getSession(authConfig);
expect.fail();
} catch (err) {
expect(err.message).to.equal(util.format(errors.MESSAGES.ER_DEVAPI_AUTH_UNSUPPORTED_SERVER, 'SHA256_MEMORY'));
} finally {
await session?.close();
}
});
it('fails over a Unix socket', async () => {
const authConfig = { ...config, ...baseConfig, auth, socket, tls: { enabled: false } };
let session;
try {
session = await mysqlx.getSession(authConfig);
expect.fail();
} catch (err) {
expect(err.message).to.equal(util.format(errors.MESSAGES.ER_DEVAPI_AUTH_UNSUPPORTED_SERVER, 'SHA256_MEMORY'));
} finally {
await session?.close();
}
});
});
});