gogreen/databases_test.go

1889 lines
46 KiB
Go

package godo
import (
"encoding/json"
"fmt"
"net/http"
"testing"
"time"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
)
var privateNetworkUUID = "880b7f98-f062-404d-b33c-458d545696f6"
var db = Database{
ID: "da4e0206-d019-41d7-b51f-deadbeefbb8f",
Name: "dbtest",
EngineSlug: "pg",
VersionSlug: "11",
Connection: &DatabaseConnection{
URI: "postgres://doadmin:zt91mum075ofzyww@dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
Database: "defaultdb",
Host: "dbtest-do-user-3342561-0.db.ondigitalocean.com",
Port: 25060,
User: "doadmin",
Password: "zt91mum075ofzyww",
SSL: true,
},
PrivateConnection: &DatabaseConnection{
URI: "postgres://doadmin:zt91mum075ofzyww@private-dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
Database: "defaultdb",
Host: "dbtest-do-user-3342561-0.db.ondigitalocean.com",
Port: 25060,
User: "doadmin",
Password: "zt91mum075ofzyww",
SSL: true,
},
Users: []DatabaseUser{
{
Name: "doadmin",
Role: "primary",
Password: "zt91mum075ofzyww",
},
},
DBNames: []string{
"defaultdb",
},
NumNodes: 3,
RegionSlug: "sfo2",
Status: "online",
CreatedAt: time.Date(2019, 2, 26, 6, 12, 39, 0, time.UTC),
MaintenanceWindow: &DatabaseMaintenanceWindow{
Day: "monday",
Hour: "13:51:14",
Pending: false,
Description: nil,
},
SizeSlug: "db-s-2vcpu-4gb",
PrivateNetworkUUID: "da4e0206-d019-41d7-b51f-deadbeefbb8f",
Tags: []string{"production", "staging"},
ProjectID: "6d0f9073-0a24-4f1b-9065-7dc5c8bad3e2",
}
var dbJSON = `
{
"id": "da4e0206-d019-41d7-b51f-deadbeefbb8f",
"name": "dbtest",
"engine": "pg",
"version": "11",
"connection": {
"uri": "postgres://doadmin:zt91mum075ofzyww@dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
"database": "defaultdb",
"host": "dbtest-do-user-3342561-0.db.ondigitalocean.com",
"port": 25060,
"user": "doadmin",
"password": "zt91mum075ofzyww",
"ssl": true
},
"private_connection": {
"uri": "postgres://doadmin:zt91mum075ofzyww@private-dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
"database": "defaultdb",
"host": "dbtest-do-user-3342561-0.db.ondigitalocean.com",
"port": 25060,
"user": "doadmin",
"password": "zt91mum075ofzyww",
"ssl": true
},
"users": [
{
"name": "doadmin",
"role": "primary",
"password": "zt91mum075ofzyww"
}
],
"db_names": [
"defaultdb"
],
"num_nodes": 3,
"region": "sfo2",
"status": "online",
"created_at": "2019-02-26T06:12:39Z",
"maintenance_window": {
"day": "monday",
"hour": "13:51:14",
"pending": false,
"description": null
},
"size": "db-s-2vcpu-4gb",
"private_network_uuid": "da4e0206-d019-41d7-b51f-deadbeefbb8f",
"tags": ["production", "staging"],
"project_id": "6d0f9073-0a24-4f1b-9065-7dc5c8bad3e2"
}
`
var dbsJSON = fmt.Sprintf(`
{
"databases": [
%s
]
}
`, dbJSON)
func TestDatabases_List(t *testing.T) {
setup()
defer teardown()
dbSvc := client.Databases
want := []Database{db}
mux.HandleFunc("/v2/databases", func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, dbsJSON)
})
got, _, err := dbSvc.List(ctx, nil)
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_Get(t *testing.T) {
setup()
defer teardown()
dbID := "da4e0206-d019-41d7-b51f-deadbeefbb8f"
body := fmt.Sprintf(`
{
"database": %s
}
`, dbJSON)
path := fmt.Sprintf("/v2/databases/%s", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.Get(ctx, dbID)
require.NoError(t, err)
require.Equal(t, &db, got)
}
func TestDatabases_GetCA(t *testing.T) {
setup()
defer teardown()
dbID := "da4e0206-d019-41d7-b51f-deadbeefbb8f"
body := `
{
"ca": {
"certificate": "ZmFrZQpjYQpjZXJ0"
}
}
`
path := fmt.Sprintf("/v2/databases/%s/ca", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.GetCA(ctx, dbID)
require.NoError(t, err)
require.Equal(t, &DatabaseCA{Certificate: []byte("fake\nca\ncert")}, got)
}
func TestDatabases_Create(t *testing.T) {
tests := []struct {
title string
createRequest *DatabaseCreateRequest
want *Database
body string
}{
{
title: "create",
createRequest: &DatabaseCreateRequest{
Name: "backend-test",
EngineSlug: "pg",
Version: "10",
Region: "nyc3",
SizeSlug: "db-s-2vcpu-4gb",
NumNodes: 2,
Tags: []string{"production", "staging"},
ProjectID: "05d84f74-db8c-4de5-ae72-2fd4823fb1c8",
},
want: &Database{
ID: "8d91899c-0739-4a1a-acc5-deadbeefbb8f",
Name: "backend-test",
EngineSlug: "pg",
VersionSlug: "10",
Connection: &DatabaseConnection{
URI: "postgres://doadmin:zt91mum075ofzyww@dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
Database: "defaultdb",
Host: "dbtest-do-user-3342561-0.db.ondigitalocean.com",
Port: 25060,
User: "doadmin",
Password: "zt91mum075ofzyww",
SSL: true,
},
PrivateConnection: &DatabaseConnection{
URI: "postgres://doadmin:zt91mum075ofzyww@private-dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
Database: "defaultdb",
Host: "dbtest-do-user-3342561-0.db.ondigitalocean.com",
Port: 25060,
User: "doadmin",
Password: "zt91mum075ofzyww",
SSL: true,
},
Users: nil,
DBNames: nil,
NumNodes: 2,
RegionSlug: "nyc3",
Status: "creating",
CreatedAt: time.Date(2019, 2, 26, 6, 12, 39, 0, time.UTC),
MaintenanceWindow: nil,
SizeSlug: "db-s-2vcpu-4gb",
Tags: []string{"production", "staging"},
ProjectID: "05d84f74-db8c-4de5-ae72-2fd4823fb1c8",
},
body: `
{
"database": {
"id": "8d91899c-0739-4a1a-acc5-deadbeefbb8f",
"name": "backend-test",
"engine": "pg",
"version": "10",
"connection": {
"uri": "postgres://doadmin:zt91mum075ofzyww@dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
"database": "defaultdb",
"host": "dbtest-do-user-3342561-0.db.ondigitalocean.com",
"port": 25060,
"user": "doadmin",
"password": "zt91mum075ofzyww",
"ssl": true
},
"private_connection": {
"uri": "postgres://doadmin:zt91mum075ofzyww@private-dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
"database": "defaultdb",
"host": "dbtest-do-user-3342561-0.db.ondigitalocean.com",
"port": 25060,
"user": "doadmin",
"password": "zt91mum075ofzyww",
"ssl": true
},
"users": null,
"db_names": null,
"num_nodes": 2,
"region": "nyc3",
"status": "creating",
"created_at": "2019-02-26T06:12:39Z",
"maintenance_window": null,
"size": "db-s-2vcpu-4gb",
"tags": ["production", "staging"],
"project_id": "05d84f74-db8c-4de5-ae72-2fd4823fb1c8"
}
}`,
},
{
title: "create from backup",
createRequest: &DatabaseCreateRequest{
Name: "backend-restored",
EngineSlug: "pg",
Version: "10",
Region: "nyc3",
SizeSlug: "db-s-2vcpu-4gb",
NumNodes: 2,
Tags: []string{"production", "staging"},
BackupRestore: &DatabaseBackupRestore{
DatabaseName: "backend-orig",
BackupCreatedAt: "2019-01-31T19:25:22Z",
},
},
want: &Database{
ID: "8d91899c-0739-4a1a-acc5-deadbeefbb8f",
Name: "backend-test",
EngineSlug: "pg",
VersionSlug: "10",
Connection: &DatabaseConnection{
URI: "postgres://doadmin:zt91mum075ofzyww@dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
Database: "defaultdb",
Host: "dbtest-do-user-3342561-0.db.ondigitalocean.com",
Port: 25060,
User: "doadmin",
Password: "zt91mum075ofzyww",
SSL: true,
},
PrivateConnection: &DatabaseConnection{
URI: "postgres://doadmin:zt91mum075ofzyww@private-dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
Database: "defaultdb",
Host: "dbtest-do-user-3342561-0.db.ondigitalocean.com",
Port: 25060,
User: "doadmin",
Password: "zt91mum075ofzyww",
SSL: true,
},
Users: nil,
DBNames: nil,
NumNodes: 2,
RegionSlug: "nyc3",
Status: "creating",
CreatedAt: time.Date(2019, 2, 26, 6, 12, 39, 0, time.UTC),
MaintenanceWindow: nil,
SizeSlug: "db-s-2vcpu-4gb",
Tags: []string{"production", "staging"},
},
body: `
{
"database": {
"id": "8d91899c-0739-4a1a-acc5-deadbeefbb8f",
"name": "backend-test",
"engine": "pg",
"version": "10",
"connection": {
"uri": "postgres://doadmin:zt91mum075ofzyww@dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
"database": "defaultdb",
"host": "dbtest-do-user-3342561-0.db.ondigitalocean.com",
"port": 25060,
"user": "doadmin",
"password": "zt91mum075ofzyww",
"ssl": true
},
"private_connection": {
"uri": "postgres://doadmin:zt91mum075ofzyww@private-dbtest-do-user-3342561-0.db.ondigitalocean.com:25060/defaultdb?sslmode=require",
"database": "defaultdb",
"host": "dbtest-do-user-3342561-0.db.ondigitalocean.com",
"port": 25060,
"user": "doadmin",
"password": "zt91mum075ofzyww",
"ssl": true
},
"users": null,
"db_names": null,
"num_nodes": 2,
"region": "nyc3",
"status": "creating",
"created_at": "2019-02-26T06:12:39Z",
"maintenance_window": null,
"size": "db-s-2vcpu-4gb",
"tags": ["production", "staging"]
}
}`,
},
}
for _, tt := range tests {
t.Run(tt.title, func(t *testing.T) {
setup()
defer teardown()
mux.HandleFunc("/v2/databases", func(w http.ResponseWriter, r *http.Request) {
v := new(DatabaseCreateRequest)
err := json.NewDecoder(r.Body).Decode(v)
if err != nil {
t.Fatal(err)
}
testMethod(t, r, http.MethodPost)
require.Equal(t, v, tt.createRequest)
fmt.Fprint(w, tt.body)
})
got, _, err := client.Databases.Create(ctx, tt.createRequest)
require.NoError(t, err)
require.Equal(t, tt.want, got)
})
}
}
func TestDatabases_Delete(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodDelete)
})
_, err := client.Databases.Delete(ctx, "deadbeef-dead-4aa5-beef-deadbeef347d")
require.NoError(t, err)
}
func TestDatabases_Resize(t *testing.T) {
setup()
defer teardown()
resizeRequest := &DatabaseResizeRequest{
SizeSlug: "db-s-16vcpu-64gb",
NumNodes: 3,
}
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/resize", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPut)
})
_, err := client.Databases.Resize(ctx, "deadbeef-dead-4aa5-beef-deadbeef347d", resizeRequest)
require.NoError(t, err)
}
func TestDatabases_Migrate(t *testing.T) {
setup()
defer teardown()
migrateRequest := &DatabaseMigrateRequest{
Region: "lon1",
}
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/migrate", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPut)
})
_, err := client.Databases.Migrate(ctx, "deadbeef-dead-4aa5-beef-deadbeef347d", migrateRequest)
require.NoError(t, err)
}
func TestDatabases_Migrate_WithPrivateNet(t *testing.T) {
setup()
defer teardown()
migrateRequest := &DatabaseMigrateRequest{
Region: "lon1",
PrivateNetworkUUID: privateNetworkUUID,
}
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/migrate", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPut)
})
_, err := client.Databases.Migrate(ctx, "deadbeef-dead-4aa5-beef-deadbeef347d", migrateRequest)
require.NoError(t, err)
}
func TestDatabases_UpdateMaintenance(t *testing.T) {
setup()
defer teardown()
maintenanceRequest := &DatabaseUpdateMaintenanceRequest{
Day: "thursday",
Hour: "16:00",
}
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/maintenance", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPut)
})
_, err := client.Databases.UpdateMaintenance(ctx, "deadbeef-dead-4aa5-beef-deadbeef347d", maintenanceRequest)
require.NoError(t, err)
}
func TestDatabases_ListBackups(t *testing.T) {
setup()
defer teardown()
want := []DatabaseBackup{
{
CreatedAt: time.Date(2019, 1, 11, 18, 42, 27, 0, time.UTC),
SizeGigabytes: 0.03357696,
},
{
CreatedAt: time.Date(2019, 1, 12, 18, 42, 29, 0, time.UTC),
SizeGigabytes: 0.03364864,
},
}
body := `
{
"backups": [
{
"created_at": "2019-01-11T18:42:27Z",
"size_gigabytes": 0.03357696
},
{
"created_at": "2019-01-12T18:42:29Z",
"size_gigabytes": 0.03364864
}
]
}
`
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/backups", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.ListBackups(ctx, "deadbeef-dead-4aa5-beef-deadbeef347d", nil)
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_GetUser(t *testing.T) {
setup()
defer teardown()
want := &DatabaseUser{
Name: "name",
Role: "foo",
Password: "pass",
}
body := `
{
"user": {
"name": "name",
"role": "foo",
"password": "pass"
}
}
`
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/users/name", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.GetUser(ctx, dbID, "name")
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_ListUsers(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
want := []DatabaseUser{
{
Name: "name",
Role: "foo",
Password: "pass",
},
{
Name: "bar",
Role: "foo",
Password: "pass",
},
}
body := `
{
"users": [{
"name": "name",
"role": "foo",
"password": "pass"
},
{
"name": "bar",
"role": "foo",
"password": "pass"
}]
}
`
path := fmt.Sprintf("/v2/databases/%s/users", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.ListUsers(ctx, dbID, nil)
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_CreateUser(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
want := &DatabaseUser{
Name: "name",
Role: "foo",
Password: "pass",
}
body := `
{
"user": {
"name": "name",
"role": "foo",
"password": "pass"
}
}
`
path := fmt.Sprintf("/v2/databases/%s/users", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPost)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.CreateUser(ctx, dbID, &DatabaseCreateUserRequest{Name: "user"})
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_DeleteUser(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/users/user", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodDelete)
})
_, err := client.Databases.DeleteUser(ctx, dbID, "user")
require.NoError(t, err)
}
func TestDatabases_ResetUserAuth(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/users/user/reset_auth", dbID)
body := `
{
"user": {
"name": "name",
"role": "foo",
"password": "pass",
"mysql_settings": {
"auth_plugin": "caching_sha2_password"
}
}
}
`
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPost)
fmt.Fprint(w, body)
})
want := &DatabaseUser{
Name: "name",
Role: "foo",
Password: "pass",
MySQLSettings: &DatabaseMySQLUserSettings{AuthPlugin: SQLAuthPluginCachingSHA2},
}
got, _, err := client.Databases.ResetUserAuth(ctx, dbID, "user", &DatabaseResetUserAuthRequest{
MySQLSettings: &DatabaseMySQLUserSettings{
AuthPlugin: SQLAuthPluginCachingSHA2,
}})
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_ListDBs(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
want := []DatabaseDB{
{Name: "foo"},
{Name: "bar"},
}
body := `
{
"dbs": [{
"name": "foo"
},
{
"name": "bar"
}]
}
`
path := fmt.Sprintf("/v2/databases/%s/dbs", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.ListDBs(ctx, dbID, nil)
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_CreateDB(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
want := &DatabaseDB{
Name: "foo",
}
body := `
{
"db": {
"name": "foo"
}
}
`
path := fmt.Sprintf("/v2/databases/%s/dbs", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPost)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.CreateDB(ctx, dbID, &DatabaseCreateDBRequest{Name: "foo"})
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_GetDB(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
want := &DatabaseDB{
Name: "foo",
}
body := `
{
"db": {
"name": "foo"
}
}
`
path := fmt.Sprintf("/v2/databases/%s/dbs/foo", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.GetDB(ctx, dbID, "foo")
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_DeleteDB(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
body := `
{
"db": {
"name": "foo"
}
}
`
path := fmt.Sprintf("/v2/databases/%s/dbs/foo", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodDelete)
fmt.Fprint(w, body)
})
_, err := client.Databases.DeleteDB(ctx, dbID, "foo")
require.NoError(t, err)
}
func TestDatabases_ListPools(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
want := []DatabasePool{
{
Name: "pool",
User: "user",
Size: 10,
Mode: "transaction",
Database: "db",
Connection: &DatabaseConnection{
URI: "postgresql://user:pass@host.com/db",
Host: "host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
PrivateConnection: &DatabaseConnection{
URI: "postgresql://user:pass@private-host.com/db",
Host: "private-host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
},
}
body := `
{
"pools": [{
"name": "pool",
"user": "user",
"size": 10,
"mode": "transaction",
"db": "db",
"connection": {
"uri": "postgresql://user:pass@host.com/db",
"host": "host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
},
"private_connection": {
"uri": "postgresql://user:pass@private-host.com/db",
"host": "private-host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
}
}]
}
`
path := fmt.Sprintf("/v2/databases/%s/pools", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.ListPools(ctx, dbID, nil)
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_CreatePool(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
want := &DatabasePool{
Name: "pool",
User: "user",
Size: 10,
Mode: "transaction",
Database: "db",
Connection: &DatabaseConnection{
URI: "postgresql://user:pass@host.com/db",
Host: "host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
PrivateConnection: &DatabaseConnection{
URI: "postgresql://user:pass@private-host.com/db",
Host: "private-host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
}
body := `
{
"pool": {
"name": "pool",
"user": "user",
"size": 10,
"mode": "transaction",
"db": "db",
"connection": {
"uri": "postgresql://user:pass@host.com/db",
"host": "host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
},
"private_connection": {
"uri": "postgresql://user:pass@private-host.com/db",
"host": "private-host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
}
}
}
`
path := fmt.Sprintf("/v2/databases/%s/pools", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPost)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.CreatePool(ctx, dbID, &DatabaseCreatePoolRequest{
Name: "pool",
Database: "db",
Size: 10,
User: "foo",
Mode: "transaction",
})
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_GetPool(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
want := &DatabasePool{
Name: "pool",
User: "user",
Size: 10,
Mode: "transaction",
Database: "db",
Connection: &DatabaseConnection{
URI: "postgresql://user:pass@host.com/db",
Host: "host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
PrivateConnection: &DatabaseConnection{
URI: "postgresql://user:pass@private-host.com/db",
Host: "private-host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
}
body := `
{
"pool": {
"name": "pool",
"user": "user",
"size": 10,
"mode": "transaction",
"db": "db",
"connection": {
"uri": "postgresql://user:pass@host.com/db",
"host": "host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
},
"private_connection": {
"uri": "postgresql://user:pass@private-host.com/db",
"host": "private-host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
}
}
}
`
path := fmt.Sprintf("/v2/databases/%s/pools/pool", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.GetPool(ctx, dbID, "pool")
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_DeletePool(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/pools/pool", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodDelete)
})
_, err := client.Databases.DeletePool(ctx, dbID, "pool")
require.NoError(t, err)
}
func TestDatabases_GetReplica(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
createdAt := time.Date(2019, 01, 01, 0, 0, 0, 0, time.UTC)
want := &DatabaseReplica{
Name: "pool",
Region: "nyc1",
Status: "online",
CreatedAt: createdAt,
Connection: &DatabaseConnection{
URI: "postgresql://user:pass@host.com/db",
Host: "host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
PrivateConnection: &DatabaseConnection{
URI: "postgresql://user:pass@private-host.com/db",
Host: "private-host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
PrivateNetworkUUID: "deadbeef-dead-4aa5-beef-deadbeef347d",
Tags: []string{"production", "staging"},
}
body := `
{
"replica": {
"name": "pool",
"region": "nyc1",
"status": "online",
"created_at": "` + createdAt.Format(time.RFC3339) + `",
"connection": {
"uri": "postgresql://user:pass@host.com/db",
"host": "host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
},
"private_connection": {
"uri": "postgresql://user:pass@private-host.com/db",
"host": "private-host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
},
"private_network_uuid": "deadbeef-dead-4aa5-beef-deadbeef347d",
"tags": ["production", "staging"]
}
}
`
path := fmt.Sprintf("/v2/databases/%s/replicas/replica", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.GetReplica(ctx, dbID, "replica")
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_ListReplicas(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
createdAt := time.Date(2019, 01, 01, 0, 0, 0, 0, time.UTC)
want := []DatabaseReplica{
{
Name: "pool",
Region: "nyc1",
Status: "online",
CreatedAt: createdAt,
Connection: &DatabaseConnection{
URI: "postgresql://user:pass@host.com/db",
Host: "host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
PrivateConnection: &DatabaseConnection{
URI: "postgresql://user:pass@private-host.com/db",
Host: "private-host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
PrivateNetworkUUID: "deadbeef-dead-4aa5-beef-deadbeef347d",
Tags: []string{"production", "staging"},
},
}
body := `
{
"replicas": [{
"name": "pool",
"region": "nyc1",
"status": "online",
"created_at": "` + createdAt.Format(time.RFC3339) + `",
"connection": {
"uri": "postgresql://user:pass@host.com/db",
"host": "host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
},
"private_connection": {
"uri": "postgresql://user:pass@private-host.com/db",
"host": "private-host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
},
"private_network_uuid": "deadbeef-dead-4aa5-beef-deadbeef347d",
"tags": ["production", "staging"]
}]
}
`
path := fmt.Sprintf("/v2/databases/%s/replicas", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.ListReplicas(ctx, dbID, nil)
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_CreateReplica(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
createdAt := time.Date(2019, 01, 01, 0, 0, 0, 0, time.UTC)
want := &DatabaseReplica{
Name: "pool",
Region: "nyc1",
Status: "online",
CreatedAt: createdAt,
Connection: &DatabaseConnection{
URI: "postgresql://user:pass@host.com/db",
Host: "host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
PrivateConnection: &DatabaseConnection{
URI: "postgresql://user:pass@private-host.com/db",
Host: "private-host.com",
Port: 1234,
User: "user",
Password: "pass",
SSL: true,
Database: "db",
},
PrivateNetworkUUID: "deadbeef-dead-4aa5-beef-deadbeef347d",
Tags: []string{"production", "staging"},
}
body := `
{
"replica": {
"name": "pool",
"region": "nyc1",
"status": "online",
"created_at": "` + createdAt.Format(time.RFC3339) + `",
"connection": {
"uri": "postgresql://user:pass@host.com/db",
"host": "host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
},
"private_connection": {
"uri": "postgresql://user:pass@private-host.com/db",
"host": "private-host.com",
"port": 1234,
"user": "user",
"password": "pass",
"database": "db",
"ssl": true
},
"private_network_uuid": "deadbeef-dead-4aa5-beef-deadbeef347d",
"tags": ["production", "staging"]
}
}
`
path := fmt.Sprintf("/v2/databases/%s/replicas", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPost)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.CreateReplica(ctx, dbID, &DatabaseCreateReplicaRequest{
Name: "replica",
Region: "nyc1",
Size: "db-s-2vcpu-4gb",
PrivateNetworkUUID: privateNetworkUUID,
Tags: []string{"production", "staging"},
})
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_DeleteReplica(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/replicas/replica", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodDelete)
})
_, err := client.Databases.DeleteReplica(ctx, dbID, "replica")
require.NoError(t, err)
}
func TestDatabases_SetEvictionPolicy(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/eviction_policy", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPut)
})
_, err := client.Databases.SetEvictionPolicy(ctx, dbID, "allkeys_lru")
require.NoError(t, err)
}
func TestDatabases_GetEvictionPolicy(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
want := "allkeys_lru"
body := `{ "eviction_policy": "allkeys_lru" }`
path := fmt.Sprintf("/v2/databases/%s/eviction_policy", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.GetEvictionPolicy(ctx, dbID)
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_SetSQLMode(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/sql_mode", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPut)
w.Write([]byte(`{ "sql_mode": "ONLY_FULL_GROUP_BY" }`))
})
_, err := client.Databases.SetSQLMode(ctx, dbID, "ONLY_FULL_GROUP_BY")
require.NoError(t, err)
}
func TestDatabases_SetSQLMode_Multiple(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/sql_mode", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPut)
w.Write([]byte(`{ "sql_mode": "ANSI, ANSI_QUOTES" }`))
})
_, err := client.Databases.SetSQLMode(ctx, dbID, SQLModeANSI, SQLModeANSIQuotes)
require.NoError(t, err)
}
func TestDatabases_GetSQLMode(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
want := "ONLY_FULL_GROUP_BY"
body := `{ "sql_mode": "ONLY_FULL_GROUP_BY" }`
path := fmt.Sprintf("/v2/databases/%s/sql_mode", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.GetSQLMode(ctx, dbID)
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_GetFirewallRules(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/firewall", dbID)
want := []DatabaseFirewallRule{
{
Type: "ip_addr",
Value: "192.168.1.1",
UUID: "deadbeef-dead-4aa5-beef-deadbeef347d",
ClusterUUID: "deadbeef-dead-4aa5-beef-deadbeef347d",
},
}
body := ` {"rules": [{
"type": "ip_addr",
"value": "192.168.1.1",
"uuid": "deadbeef-dead-4aa5-beef-deadbeef347d",
"cluster_uuid": "deadbeef-dead-4aa5-beef-deadbeef347d"
}]} `
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, body)
})
got, _, err := client.Databases.GetFirewallRules(ctx, dbID)
require.NoError(t, err)
require.Equal(t, want, got)
}
func TestDatabases_UpdateFirewallRules(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/firewall", dbID)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPut)
})
_, err := client.Databases.UpdateFirewallRules(ctx, dbID, &DatabaseUpdateFirewallRulesRequest{
Rules: []*DatabaseFirewallRule{
{
Type: "ip_addr",
Value: "192.168.1.1",
UUID: "deadbeef-dead-4aa5-beef-deadbeef347d",
},
},
})
require.NoError(t, err)
}
func TestDatabases_CreateDatabaseUserWithMySQLSettings(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/users", dbID)
responseJSON := []byte(fmt.Sprintf(`{
"user": {
"name": "foo",
"mysql_settings": {
"auth_plugin": "%s"
}
}
}`, SQLAuthPluginNative))
expectedUser := &DatabaseUser{
Name: "foo",
MySQLSettings: &DatabaseMySQLUserSettings{
AuthPlugin: SQLAuthPluginNative,
},
}
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPost)
w.WriteHeader(http.StatusOK)
w.Write(responseJSON)
})
user, _, err := client.Databases.CreateUser(ctx, dbID, &DatabaseCreateUserRequest{
Name: expectedUser.Name,
MySQLSettings: expectedUser.MySQLSettings,
})
require.NoError(t, err)
require.Equal(t, expectedUser, user)
}
func TestDatabases_ListDatabaseUsersWithMySQLSettings(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
path := fmt.Sprintf("/v2/databases/%s/users", dbID)
responseJSON := []byte(fmt.Sprintf(`{
"users": [
{
"name": "foo",
"mysql_settings": {
"auth_plugin": "%s"
}
}
]
}`, SQLAuthPluginNative))
expectedUsers := []DatabaseUser{
{
Name: "foo",
MySQLSettings: &DatabaseMySQLUserSettings{
AuthPlugin: SQLAuthPluginNative,
},
},
}
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
w.WriteHeader(http.StatusOK)
w.Write(responseJSON)
})
users, _, err := client.Databases.ListUsers(ctx, dbID, &ListOptions{})
require.NoError(t, err)
require.Equal(t, expectedUsers, users)
}
func TestDatabases_GetDatabaseUserWithMySQLSettings(t *testing.T) {
setup()
defer teardown()
dbID := "deadbeef-dead-4aa5-beef-deadbeef347d"
userID := "d290a0a0-27da-42bd-a4b2-bcecf43b8832"
path := fmt.Sprintf("/v2/databases/%s/users/%s", dbID, userID)
responseJSON := []byte(fmt.Sprintf(`{
"user": {
"name": "foo",
"mysql_settings": {
"auth_plugin": "%s"
}
}
}`, SQLAuthPluginNative))
expectedUser := &DatabaseUser{
Name: "foo",
MySQLSettings: &DatabaseMySQLUserSettings{
AuthPlugin: SQLAuthPluginNative,
},
}
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
w.WriteHeader(http.StatusOK)
w.Write(responseJSON)
})
user, _, err := client.Databases.GetUser(ctx, dbID, userID)
require.NoError(t, err)
require.Equal(t, expectedUser, user)
}
func TestDatabases_GetConfigPostgres(t *testing.T) {
setup()
defer teardown()
var (
dbSvc = client.Databases
dbID = "da4e0206-d019-41d7-b51f-deadbeefbb8f"
path = fmt.Sprintf("/v2/databases/%s/config", dbID)
postgresConfigJSON = `{
"config": {
"autovacuum_naptime": 60,
"autovacuum_vacuum_threshold": 50,
"autovacuum_analyze_threshold": 50,
"autovacuum_vacuum_scale_factor": 0.2,
"autovacuum_analyze_scale_factor": 0.2,
"autovacuum_vacuum_cost_delay": 20,
"autovacuum_vacuum_cost_limit": -1,
"bgwriter_flush_after": 512,
"bgwriter_lru_maxpages": 100,
"bgwriter_lru_multiplier": 2,
"idle_in_transaction_session_timeout": 0,
"jit": true,
"log_autovacuum_min_duration": -1,
"log_min_duration_statement": -1,
"max_prepared_transactions": 0,
"max_parallel_workers": 8,
"max_parallel_workers_per_gather": 2,
"temp_file_limit": -1,
"wal_sender_timeout": 60000,
"backup_hour": 18,
"backup_minute": 26
}
}`
postgresConfig = PostgreSQLConfig{
AutovacuumNaptime: intPtr(60),
AutovacuumVacuumThreshold: intPtr(50),
AutovacuumAnalyzeThreshold: intPtr(50),
AutovacuumVacuumScaleFactor: float32Ptr(0.2),
AutovacuumAnalyzeScaleFactor: float32Ptr(0.2),
AutovacuumVacuumCostDelay: intPtr(20),
AutovacuumVacuumCostLimit: intPtr(-1),
BGWriterFlushAfter: intPtr(512),
BGWriterLRUMaxpages: intPtr(100),
BGWriterLRUMultiplier: float32Ptr(2),
IdleInTransactionSessionTimeout: intPtr(0),
JIT: boolPtr(true),
LogAutovacuumMinDuration: intPtr(-1),
LogMinDurationStatement: intPtr(-1),
MaxPreparedTransactions: intPtr(0),
MaxParallelWorkers: intPtr(8),
MaxParallelWorkersPerGather: intPtr(2),
TempFileLimit: intPtr(-1),
WalSenderTimeout: intPtr(60000),
BackupHour: intPtr(18),
BackupMinute: intPtr(26),
}
)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, postgresConfigJSON)
})
got, _, err := dbSvc.GetPostgreSQLConfig(ctx, dbID)
require.NoError(t, err)
require.Equal(t, &postgresConfig, got)
}
func TestDatabases_UpdateConfigPostgres(t *testing.T) {
setup()
defer teardown()
var (
dbID = "deadbeef-dead-4aa5-beef-deadbeef347d"
path = fmt.Sprintf("/v2/databases/%s/config", dbID)
postgresConfig = &PostgreSQLConfig{
AutovacuumNaptime: intPtr(75),
AutovacuumVacuumThreshold: intPtr(45),
AutovacuumAnalyzeThreshold: intPtr(45),
MaxPreparedTransactions: intPtr(0),
}
)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPatch)
var b databasePostgreSQLConfigRoot
decoder := json.NewDecoder(r.Body)
err := decoder.Decode(&b)
require.NoError(t, err)
assert.Equal(t, b.Config, postgresConfig)
assert.Equal(t, 0, *b.Config.MaxPreparedTransactions, "pointers to zero value should be sent")
assert.Nil(t, b.Config.MaxParallelWorkers, "excluded value should not be sent")
w.WriteHeader(http.StatusNoContent)
})
_, err := client.Databases.UpdatePostgreSQLConfig(ctx, dbID, postgresConfig)
require.NoError(t, err)
}
func TestDatabases_GetConfigRedis(t *testing.T) {
setup()
defer teardown()
var (
dbSvc = client.Databases
dbID = "da4e0206-d019-41d7-b51f-deadbeefbb8f"
path = fmt.Sprintf("/v2/databases/%s/config", dbID)
redisConfigJSON = `{
"config": {
"redis_maxmemory_policy": "allkeys-lru",
"redis_lfu_log_factor": 10,
"redis_lfu_decay_time": 1,
"redis_ssl": true,
"redis_timeout": 300,
"redis_notify_keyspace_events": "",
"redis_persistence": "off",
"redis_acl_channels_default": "allchannels"
}
}`
redisConfig = RedisConfig{
RedisMaxmemoryPolicy: strPtr("allkeys-lru"),
RedisLFULogFactor: intPtr(10),
RedisLFUDecayTime: intPtr(1),
RedisSSL: boolPtr(true),
RedisTimeout: intPtr(300),
RedisNotifyKeyspaceEvents: strPtr(""),
RedisPersistence: strPtr("off"),
RedisACLChannelsDefault: strPtr("allchannels"),
}
)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, redisConfigJSON)
})
got, _, err := dbSvc.GetRedisConfig(ctx, dbID)
require.NoError(t, err)
require.Equal(t, &redisConfig, got)
}
func TestDatabases_UpdateConfigRedis(t *testing.T) {
setup()
defer teardown()
var (
dbID = "deadbeef-dead-4aa5-beef-deadbeef347d"
path = fmt.Sprintf("/v2/databases/%s/config", dbID)
redisConfig = &RedisConfig{
RedisMaxmemoryPolicy: strPtr("allkeys-lru"),
RedisLFULogFactor: intPtr(10),
RedisNotifyKeyspaceEvents: strPtr(""),
}
)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPatch)
var b databaseRedisConfigRoot
decoder := json.NewDecoder(r.Body)
err := decoder.Decode(&b)
require.NoError(t, err)
assert.Equal(t, b.Config, redisConfig)
assert.Equal(t, "", *b.Config.RedisNotifyKeyspaceEvents, "pointers to zero value should be sent")
assert.Nil(t, b.Config.RedisPersistence, "excluded value should not be sent")
w.WriteHeader(http.StatusNoContent)
})
_, err := client.Databases.UpdateRedisConfig(ctx, dbID, redisConfig)
require.NoError(t, err)
}
func TestDatabases_UpdateConfigRedisNormalizeEvictionPolicy(t *testing.T) {
type test struct {
input string
want string
}
tests := []test{
{input: EvictionPolicyAllKeysLRU, want: "allkeys-lru"},
{input: EvictionPolicyAllKeysRandom, want: "allkeys-random"},
{input: EvictionPolicyVolatileLRU, want: "volatile-lru"},
{input: EvictionPolicyVolatileRandom, want: "volatile-random"},
{input: EvictionPolicyVolatileTTL, want: "volatile-ttl"},
{input: "allkeys-lru", want: "allkeys-lru"},
{input: "allkeys-random", want: "allkeys-random"},
{input: "volatile-lru", want: "volatile-lru"},
{input: "volatile-random", want: "volatile-random"},
{input: "volatile-ttl", want: "volatile-ttl"},
{input: "some_unknown_value", want: "some_unknown_value"},
}
for _, tt := range tests {
setup()
defer teardown()
var (
dbID = "deadbeef-dead-4aa5-beef-deadbeef347d"
path = fmt.Sprintf("/v2/databases/%s/config", dbID)
redisConfig = &RedisConfig{
RedisMaxmemoryPolicy: strPtr(tt.input),
}
)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPatch)
var b databaseRedisConfigRoot
decoder := json.NewDecoder(r.Body)
err := decoder.Decode(&b)
require.NoError(t, err)
assert.Equal(t, tt.want, *b.Config.RedisMaxmemoryPolicy)
w.WriteHeader(http.StatusNoContent)
})
_, err := client.Databases.UpdateRedisConfig(ctx, dbID, redisConfig)
require.NoError(t, err)
}
}
func TestDatabases_GetConfigMySQL(t *testing.T) {
setup()
defer teardown()
var (
dbSvc = client.Databases
dbID = "da4e0206-d019-41d7-b51f-deadbeefbb8f"
path = fmt.Sprintf("/v2/databases/%s/config", dbID)
mySQLConfigJSON = `{
"config": {
"sql_mode": "ANSI,ERROR_FOR_DIVISION_BY_ZERO,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,STRICT_ALL_TABLES",
"sql_require_primary_key": true,
"innodb_ft_min_token_size": 3,
"innodb_ft_server_stopword_table": "",
"innodb_print_all_deadlocks": false,
"innodb_rollback_on_timeout": false,
"slow_query_log": false,
"long_query_time": 10,
"backup_hour": 21,
"backup_minute": 59
}
}`
mySQLConfig = MySQLConfig{
SQLMode: strPtr("ANSI,ERROR_FOR_DIVISION_BY_ZERO,NO_ENGINE_SUBSTITUTION,NO_ZERO_DATE,NO_ZERO_IN_DATE,STRICT_ALL_TABLES"),
SQLRequirePrimaryKey: boolPtr(true),
InnodbFtMinTokenSize: intPtr(3),
InnodbFtServerStopwordTable: strPtr(""),
InnodbPrintAllDeadlocks: boolPtr(false),
InnodbRollbackOnTimeout: boolPtr(false),
SlowQueryLog: boolPtr(false),
LongQueryTime: float32Ptr(10),
BackupHour: intPtr(21),
BackupMinute: intPtr(59),
}
)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodGet)
fmt.Fprint(w, mySQLConfigJSON)
})
got, _, err := dbSvc.GetMySQLConfig(ctx, dbID)
require.NoError(t, err)
require.Equal(t, &mySQLConfig, got)
}
func TestDatabases_UpdateConfigMySQL(t *testing.T) {
setup()
defer teardown()
var (
dbID = "deadbeef-dead-4aa5-beef-deadbeef347d"
path = fmt.Sprintf("/v2/databases/%s/config", dbID)
mySQLConfig = &MySQLConfig{
SQLRequirePrimaryKey: boolPtr(true),
InnodbFtMinTokenSize: intPtr(3),
InnodbFtServerStopwordTable: strPtr(""),
}
)
mux.HandleFunc(path, func(w http.ResponseWriter, r *http.Request) {
testMethod(t, r, http.MethodPatch)
var b databaseMySQLConfigRoot
decoder := json.NewDecoder(r.Body)
err := decoder.Decode(&b)
require.NoError(t, err)
assert.Equal(t, b.Config, mySQLConfig)
assert.Equal(t, "", *b.Config.InnodbFtServerStopwordTable, "pointers to zero value should be sent")
assert.Nil(t, b.Config.InnodbPrintAllDeadlocks, "excluded value should not be sent")
w.WriteHeader(http.StatusNoContent)
})
_, err := client.Databases.UpdateMySQLConfig(ctx, dbID, mySQLConfig)
require.NoError(t, err)
}