Current Path : /usr/opt/mysql57/mysql-test/t/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //usr/opt/mysql57/mysql-test/t/plugin_auth_sha256.test |
--source include/not_embedded.inc --source include/have_ssl.inc --source include/have_sha256_rsa_auth.inc --source include/mysql_upgrade_preparation.inc # This test will intentionally generate errors in the server error log # when a broken password is inserted into the mysql.user table. # The below suppression is to clear those errors. --disable_query_log call mtr.add_suppression(".*Password salt for user.*"); call mtr.add_suppression("Found invalid password for user:*"); --enable_query_log CREATE USER 'kristofer' IDENTIFIED WITH 'sha256_password'; SET GLOBAL old_passwords= 2; SET SESSION old_passwords= 2; ALTER USER 'kristofer' IDENTIFIED BY 'secret'; SELECT user, plugin FROM mysql.user ORDER BY user; connect(con1,localhost,kristofer,secret,,); connection con1; SELECT USER(),CURRENT_USER(); connection default; disconnect con1; # Make sure authentication also works if client default_auth is changed and that # it possible to select a local public key fil using client options. DROP USER 'kristofer'; GRANT ALL ON *.* TO 'kristofer'@'localhost' IDENTIFIED WITH 'sha256_password' BY '123'; GRANT ALL ON *.* TO 'kristofer2'@'localhost' IDENTIFIED WITH 'sha256_password' BY '123'; ALTER USER 'kristofer'@'localhost' IDENTIFIED BY 'secret2'; ALTER USER 'kristofer2'@'localhost' IDENTIFIED BY 'secret2'; --disable_query_log --error ER_ACCESS_DENIED_ERROR connect(con2,localhost,kristofer,badpassword,,); --enable_query_log connect(con2,localhost,kristofer,secret2,,); connection con2; SELECT USER(),CURRENT_USER(); --replace_regex /AS .*$/AS '<non-deterministic-password-hash>'/ SHOW CREATE USER 'kristofer'@'localhost'; --echo Change user (should succeed) change_user kristofer2,secret2; SELECT USER(),CURRENT_USER(); connection default; disconnect con2; --echo **** Client default_auth=sha_256_password and server default auth=native --exec $MYSQL -ukristofer -psecret2 --default_auth=sha256_password -e "select user(), current_user()" --echo **** Client default_auth=native and server default auth=native --exec $MYSQL -ukristofer -psecret2 --default_auth=mysql_native_password -e "select user(), current_user()" --echo **** Client default_auth=sha_256_password + public key on file. --exec $MYSQL -ukristofer -psecret2 --default_auth=sha256_password --server_public_key_path=$MYSQL_TEST_DIR/std_data/rsa_public_key.pem -e "select user(), current_user()" DROP USER 'kristofer'@'localhost'; DROP USER 'kristofer2'@'localhost'; GRANT ALL ON *.* TO 'kristofer'@'localhost' IDENTIFIED WITH 'sha256_password' BY '123'; ALTER USER 'kristofer'@'localhost' IDENTIFIED BY ''; --disable_query_log --error ER_ACCESS_DENIED_ERROR connect(con3,localhost,kristofer,wrongpass,,); --enable_query_log connect(con3,localhost,kristofer,,,); connection con3; SELECT USER(),CURRENT_USER(); --replace_regex /AS .*$/AS '<non-deterministic-password-hash>'/ SHOW CREATE USER 'kristofer'@'localhost'; connection default; disconnect con3; DROP USER 'kristofer'@'localhost'; GRANT ALL ON *.* TO 'kristofer'@'33.33.33.33' IDENTIFIED WITH 'sha256_password' BY '123'; ALTER USER 'kristofer'@'33.33.33.33' IDENTIFIED BY ''; --echo Connection should fail for localhost --replace_result $MASTER_MYSOCK MASTER_MYSOCK --disable_query_log --error ER_ACCESS_DENIED_ERROR connect(con4,127.0.0.1,kristofer,,,); --enable_query_log DROP USER 'kristofer'@'33.33.33.33'; # # Test with non const arguments # SET GLOBAL old_passwords= 2; SET SESSION old_passwords= 2; CREATE TABLE t1 (c1 VARCHAR(10) ); INSERT INTO t1 VALUES ('secret'); --replace_regex /2435.*00/success/ SELECT HEX(PASSWORD(c1)) FROM t1; DROP TABLE t1; # # Test null argument # PASSWORD(NULL) should produce empty "" values. # SELECT PASSWORD(NULL), PASSWORD(''); CREATE TABLE t1( c1 text, c2 varchar (2)); INSERT INTO t1 VALUES (NULL,''),(NULL,''),(NULL,''); SELECT PASSWORD(c1), PASSWORD(c2) FROM t1; DROP TABLE t1; # # test bad password formats # CREATE USER 'kristofer' IDENTIFIED WITH 'sha256_password'; SET GLOBAL old_passwords= 2; SET SESSION old_passwords= 2; ALTER USER 'kristofer' IDENTIFIED BY 'secret'; SELECT user, plugin FROM mysql.user ORDER BY user; --disable_query_log connect(con1,localhost,kristofer,secret); --enable_query_log connection con1; SELECT USER(),CURRENT_USER(); connection default; disconnect con1; UPDATE mysql.user SET authentication_string= '$' WHERE user='kristofer'; FLUSH PRIVILEGES; SELECT user,authentication_string,plugin FROM mysql.user WHERE user='kristofer'; --disable_query_log --error ER_ACCESS_DENIED_ERROR connect(con1,localhost,kristofer,secret); --enable_query_log UPDATE mysql.user SET authentication_string= '$5$asd' WHERE user='kristofer'; FLUSH PRIVILEGES; SELECT user,authentication_string,plugin FROM mysql.user WHERE user='kristofer'; --disable_query_log --error ER_ACCESS_DENIED_ERROR connect(con1,localhost,kristofer,secret); --enable_query_log DROP USER kristofer; # Restore default value for old_passwords SET GLOBAL old_passwords= default;