dsn_test.go 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260
  1. // Go MySQL Driver - A MySQL-Driver for Go's database/sql package
  2. //
  3. // Copyright 2016 The Go-MySQL-Driver Authors. All rights reserved.
  4. //
  5. // This Source Code Form is subject to the terms of the Mozilla Public
  6. // License, v. 2.0. If a copy of the MPL was not distributed with this file,
  7. // You can obtain one at http://mozilla.org/MPL/2.0/.
  8. package mysql
  9. import (
  10. "crypto/tls"
  11. "fmt"
  12. "net/url"
  13. "reflect"
  14. "testing"
  15. "time"
  16. )
  17. var testDSNs = []struct {
  18. in string
  19. out *Config
  20. }{{
  21. "username:password@protocol(address)/dbname?param=value",
  22. &Config{User: "username", Passwd: "password", Net: "protocol", Addr: "address", DBName: "dbname", Params: map[string]string{"param": "value"}, Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true},
  23. }, {
  24. "username:password@protocol(address)/dbname?param=value&columnsWithAlias=true",
  25. &Config{User: "username", Passwd: "password", Net: "protocol", Addr: "address", DBName: "dbname", Params: map[string]string{"param": "value"}, Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true, ColumnsWithAlias: true},
  26. }, {
  27. "username:password@protocol(address)/dbname?param=value&columnsWithAlias=true&multiStatements=true",
  28. &Config{User: "username", Passwd: "password", Net: "protocol", Addr: "address", DBName: "dbname", Params: map[string]string{"param": "value"}, Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true, ColumnsWithAlias: true, MultiStatements: true},
  29. }, {
  30. "user@unix(/path/to/socket)/dbname?charset=utf8",
  31. &Config{User: "user", Net: "unix", Addr: "/path/to/socket", DBName: "dbname", Params: map[string]string{"charset": "utf8"}, Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true},
  32. }, {
  33. "user:password@tcp(localhost:5555)/dbname?charset=utf8&tls=true",
  34. &Config{User: "user", Passwd: "password", Net: "tcp", Addr: "localhost:5555", DBName: "dbname", Params: map[string]string{"charset": "utf8"}, Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true, TLSConfig: "true"},
  35. }, {
  36. "user:password@tcp(localhost:5555)/dbname?charset=utf8mb4,utf8&tls=skip-verify",
  37. &Config{User: "user", Passwd: "password", Net: "tcp", Addr: "localhost:5555", DBName: "dbname", Params: map[string]string{"charset": "utf8mb4,utf8"}, Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true, TLSConfig: "skip-verify"},
  38. }, {
  39. "user:password@/dbname?loc=UTC&timeout=30s&readTimeout=1s&writeTimeout=1s&allowAllFiles=1&clientFoundRows=true&allowOldPasswords=TRUE&collation=utf8mb4_unicode_ci&maxAllowedPacket=16777216",
  40. &Config{User: "user", Passwd: "password", Net: "tcp", Addr: "127.0.0.1:3306", DBName: "dbname", Collation: "utf8mb4_unicode_ci", Loc: time.UTC, AllowNativePasswords: true, Timeout: 30 * time.Second, ReadTimeout: time.Second, WriteTimeout: time.Second, AllowAllFiles: true, AllowOldPasswords: true, ClientFoundRows: true, MaxAllowedPacket: 16777216},
  41. }, {
  42. "user:password@/dbname?allowNativePasswords=false",
  43. &Config{User: "user", Passwd: "password", Net: "tcp", Addr: "127.0.0.1:3306", DBName: "dbname", Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: false},
  44. }, {
  45. "user:p@ss(word)@tcp([de:ad:be:ef::ca:fe]:80)/dbname?loc=Local",
  46. &Config{User: "user", Passwd: "p@ss(word)", Net: "tcp", Addr: "[de:ad:be:ef::ca:fe]:80", DBName: "dbname", Collation: "utf8_general_ci", Loc: time.Local, AllowNativePasswords: true},
  47. }, {
  48. "/dbname",
  49. &Config{Net: "tcp", Addr: "127.0.0.1:3306", DBName: "dbname", Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true},
  50. }, {
  51. "@/",
  52. &Config{Net: "tcp", Addr: "127.0.0.1:3306", Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true},
  53. }, {
  54. "/",
  55. &Config{Net: "tcp", Addr: "127.0.0.1:3306", Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true},
  56. }, {
  57. "",
  58. &Config{Net: "tcp", Addr: "127.0.0.1:3306", Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true},
  59. }, {
  60. "user:p@/ssword@/",
  61. &Config{User: "user", Passwd: "p@/ssword", Net: "tcp", Addr: "127.0.0.1:3306", Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true},
  62. }, {
  63. "unix/?arg=%2Fsome%2Fpath.ext",
  64. &Config{Net: "unix", Addr: "/tmp/mysql.sock", Params: map[string]string{"arg": "/some/path.ext"}, Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true},
  65. }, {
  66. "tcp(127.0.0.1)/dbname",
  67. &Config{Net: "tcp", Addr: "127.0.0.1:3306", DBName: "dbname", Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true},
  68. }, {
  69. "tcp(de:ad:be:ef::ca:fe)/dbname",
  70. &Config{Net: "tcp", Addr: "[de:ad:be:ef::ca:fe]:3306", DBName: "dbname", Collation: "utf8_general_ci", Loc: time.UTC, AllowNativePasswords: true},
  71. },
  72. }
  73. func TestDSNParser(t *testing.T) {
  74. for i, tst := range testDSNs {
  75. cfg, err := ParseDSN(tst.in)
  76. if err != nil {
  77. t.Error(err.Error())
  78. }
  79. // pointer not static
  80. cfg.tls = nil
  81. if !reflect.DeepEqual(cfg, tst.out) {
  82. t.Errorf("%d. ParseDSN(%q) mismatch:\ngot %+v\nwant %+v", i, tst.in, cfg, tst.out)
  83. }
  84. }
  85. }
  86. func TestDSNParserInvalid(t *testing.T) {
  87. var invalidDSNs = []string{
  88. "@net(addr/", // no closing brace
  89. "@tcp(/", // no closing brace
  90. "tcp(/", // no closing brace
  91. "(/", // no closing brace
  92. "net(addr)//", // unescaped
  93. "User:pass@tcp(1.2.3.4:3306)", // no trailing slash
  94. //"/dbname?arg=/some/unescaped/path",
  95. }
  96. for i, tst := range invalidDSNs {
  97. if _, err := ParseDSN(tst); err == nil {
  98. t.Errorf("invalid DSN #%d. (%s) didn't error!", i, tst)
  99. }
  100. }
  101. }
  102. func TestDSNReformat(t *testing.T) {
  103. for i, tst := range testDSNs {
  104. dsn1 := tst.in
  105. cfg1, err := ParseDSN(dsn1)
  106. if err != nil {
  107. t.Error(err.Error())
  108. continue
  109. }
  110. cfg1.tls = nil // pointer not static
  111. res1 := fmt.Sprintf("%+v", cfg1)
  112. dsn2 := cfg1.FormatDSN()
  113. cfg2, err := ParseDSN(dsn2)
  114. if err != nil {
  115. t.Error(err.Error())
  116. continue
  117. }
  118. cfg2.tls = nil // pointer not static
  119. res2 := fmt.Sprintf("%+v", cfg2)
  120. if res1 != res2 {
  121. t.Errorf("%d. %q does not match %q", i, res2, res1)
  122. }
  123. }
  124. }
  125. func TestDSNWithCustomTLS(t *testing.T) {
  126. baseDSN := "User:password@tcp(localhost:5555)/dbname?tls="
  127. tlsCfg := tls.Config{}
  128. RegisterTLSConfig("utils_test", &tlsCfg)
  129. // Custom TLS is missing
  130. tst := baseDSN + "invalid_tls"
  131. cfg, err := ParseDSN(tst)
  132. if err == nil {
  133. t.Errorf("invalid custom TLS in DSN (%s) but did not error. Got config: %#v", tst, cfg)
  134. }
  135. tst = baseDSN + "utils_test"
  136. // Custom TLS with a server name
  137. name := "foohost"
  138. tlsCfg.ServerName = name
  139. cfg, err = ParseDSN(tst)
  140. if err != nil {
  141. t.Error(err.Error())
  142. } else if cfg.tls.ServerName != name {
  143. t.Errorf("did not get the correct TLS ServerName (%s) parsing DSN (%s).", name, tst)
  144. }
  145. // Custom TLS without a server name
  146. name = "localhost"
  147. tlsCfg.ServerName = ""
  148. cfg, err = ParseDSN(tst)
  149. if err != nil {
  150. t.Error(err.Error())
  151. } else if cfg.tls.ServerName != name {
  152. t.Errorf("did not get the correct ServerName (%s) parsing DSN (%s).", name, tst)
  153. } else if tlsCfg.ServerName != "" {
  154. t.Errorf("tlsCfg was mutated ServerName (%s) should be empty parsing DSN (%s).", name, tst)
  155. }
  156. DeregisterTLSConfig("utils_test")
  157. }
  158. func TestDSNWithCustomTLSQueryEscape(t *testing.T) {
  159. const configKey = "&%!:"
  160. dsn := "User:password@tcp(localhost:5555)/dbname?tls=" + url.QueryEscape(configKey)
  161. name := "foohost"
  162. tlsCfg := tls.Config{ServerName: name}
  163. RegisterTLSConfig(configKey, &tlsCfg)
  164. cfg, err := ParseDSN(dsn)
  165. if err != nil {
  166. t.Error(err.Error())
  167. } else if cfg.tls.ServerName != name {
  168. t.Errorf("did not get the correct TLS ServerName (%s) parsing DSN (%s).", name, dsn)
  169. }
  170. }
  171. func TestDSNUnsafeCollation(t *testing.T) {
  172. _, err := ParseDSN("/dbname?collation=gbk_chinese_ci&interpolateParams=true")
  173. if err != errInvalidDSNUnsafeCollation {
  174. t.Errorf("expected %v, got %v", errInvalidDSNUnsafeCollation, err)
  175. }
  176. _, err = ParseDSN("/dbname?collation=gbk_chinese_ci&interpolateParams=false")
  177. if err != nil {
  178. t.Errorf("expected %v, got %v", nil, err)
  179. }
  180. _, err = ParseDSN("/dbname?collation=gbk_chinese_ci")
  181. if err != nil {
  182. t.Errorf("expected %v, got %v", nil, err)
  183. }
  184. _, err = ParseDSN("/dbname?collation=ascii_bin&interpolateParams=true")
  185. if err != nil {
  186. t.Errorf("expected %v, got %v", nil, err)
  187. }
  188. _, err = ParseDSN("/dbname?collation=latin1_german1_ci&interpolateParams=true")
  189. if err != nil {
  190. t.Errorf("expected %v, got %v", nil, err)
  191. }
  192. _, err = ParseDSN("/dbname?collation=utf8_general_ci&interpolateParams=true")
  193. if err != nil {
  194. t.Errorf("expected %v, got %v", nil, err)
  195. }
  196. _, err = ParseDSN("/dbname?collation=utf8mb4_general_ci&interpolateParams=true")
  197. if err != nil {
  198. t.Errorf("expected %v, got %v", nil, err)
  199. }
  200. }
  201. func TestParamsAreSorted(t *testing.T) {
  202. expected := "/dbname?interpolateParams=true&foobar=baz&quux=loo"
  203. dsn := &Config{
  204. DBName: "dbname",
  205. InterpolateParams: true,
  206. AllowNativePasswords: true,
  207. Params: map[string]string{
  208. "quux": "loo",
  209. "foobar": "baz",
  210. },
  211. }
  212. actual := dsn.FormatDSN()
  213. if actual != expected {
  214. t.Errorf("generic Config.Params were not sorted: want %#v, got %#v", expected, actual)
  215. }
  216. }
  217. func BenchmarkParseDSN(b *testing.B) {
  218. b.ReportAllocs()
  219. for i := 0; i < b.N; i++ {
  220. for _, tst := range testDSNs {
  221. if _, err := ParseDSN(tst.in); err != nil {
  222. b.Error(err.Error())
  223. }
  224. }
  225. }
  226. }