From e9fa365ae81546182d32a07212c37a57879d71ae Mon Sep 17 00:00:00 2001 From: Marcin Ickiewicz <mickiewicz@syncad.com> Date: Wed, 18 Dec 2024 11:58:21 +0100 Subject: [PATCH] only registered state_providers impact database hash --- .../table_schema_verification.sql | 11 +++-- .../hive_fork_manager/CMakeLists.txt | 1 + .../state_providers/hash.sql | 16 +++++++ .../state_providers/no_hash.sql | 42 +++++++++++++++++++ .../hive_fork_manager/test_table_schema.sh | 5 +++ 5 files changed, 71 insertions(+), 4 deletions(-) create mode 100644 tests/integration/functional/hive_fork_manager/state_providers/no_hash.sql diff --git a/src/hive_fork_manager/table_schema_verification.sql b/src/hive_fork_manager/table_schema_verification.sql index 49a44c8fe..8e4fd80ba 100644 --- a/src/hive_fork_manager/table_schema_verification.sql +++ b/src/hive_fork_manager/table_schema_verification.sql @@ -117,9 +117,9 @@ $BODY$ BEGIN RETURN QUERY SELECT - sp.* as provider - , hive.calculate_state_provider_hash(sp.*) as hash - FROM unnest(enum_range(NULL::hafd.state_providers)) as sp; + DISTINCT sp.state_provider as provider + , hive.calculate_state_provider_hash(sp.state_provider) as hash + FROM hafd.state_providers_registered sp; END; $BODY$; @@ -188,7 +188,10 @@ BEGIN SELECT string_agg(provider || hash, ' | ') FROM hive.calculate_state_provider_hashes() INTO _provider_hashes; - _tmp = _tmp || _provider_hashes; + IF _provider_hashes IS NOT NULL THEN + _tmp = _tmp || _provider_hashes; + END IF; + INSERT INTO hafd.table_schema VALUES (schema_name, MD5(_tmp)::uuid); ts.schema_name := schema_name; diff --git a/tests/integration/functional/hive_fork_manager/CMakeLists.txt b/tests/integration/functional/hive_fork_manager/CMakeLists.txt index 61172366d..3a0ad82b8 100644 --- a/tests/integration/functional/hive_fork_manager/CMakeLists.txt +++ b/tests/integration/functional/hive_fork_manager/CMakeLists.txt @@ -328,6 +328,7 @@ ADD_TEST( NAME test_update_script ADD_SQL_FUNCTIONAL_TEST( state_providers/import_state_provider_negative_non_context_owner_create_table.sql ) ADD_SQL_FUNCTIONAL_TEST( state_providers/switch_state_provider_to_forkable.sql ) ADD_SQL_FUNCTIONAL_TEST( state_providers/hash.sql ) + ADD_SQL_FUNCTIONAL_TEST( state_providers/no_hash.sql ) ADD_SQL_FUNCTIONAL_TEST( authorization/alice_access_to_bob_negative.sql ) ADD_SQL_FUNCTIONAL_TEST( authorization/alice_access_events_infrustructure.sql ) diff --git a/tests/integration/functional/hive_fork_manager/state_providers/hash.sql b/tests/integration/functional/hive_fork_manager/state_providers/hash.sql index f1622a7e2..778a7017d 100644 --- a/tests/integration/functional/hive_fork_manager/state_providers/hash.sql +++ b/tests/integration/functional/hive_fork_manager/state_providers/hash.sql @@ -1,3 +1,19 @@ +CREATE OR REPLACE PROCEDURE haf_admin_test_given() + LANGUAGE 'plpgsql' +AS +$BODY$ +BEGIN + CREATE SCHEMA A; + PERFORM hive.app_create_context( _name => 'context', _schema => 'a' ); + PERFORM hive.app_create_context( _name => 'context2', _schema => 'a' ); + + PERFORM hive.app_state_provider_import( 'ACCOUNTS', 'context' ); + PERFORM hive.app_state_provider_import( 'KEYAUTH', 'context' ); + PERFORM hive.app_state_provider_import( 'METADATA', 'context' ); + PERFORM hive.app_state_provider_import( 'ACCOUNTS','context2' ); +END; +$BODY$; + CREATE OR REPLACE PROCEDURE haf_admin_test_then() diff --git a/tests/integration/functional/hive_fork_manager/state_providers/no_hash.sql b/tests/integration/functional/hive_fork_manager/state_providers/no_hash.sql new file mode 100644 index 000000000..7e7855bf9 --- /dev/null +++ b/tests/integration/functional/hive_fork_manager/state_providers/no_hash.sql @@ -0,0 +1,42 @@ +-- check if there is no registered state_provider, then hash is not computed + + +CREATE OR REPLACE PROCEDURE haf_admin_test_then() + LANGUAGE 'plpgsql' +AS +$BODY$ +DECLARE + __database_hash_before TEXT; + __database_hash_after TEXT; +BEGIN + ASSERT ( SELECT 1 FROM hive.calculate_state_provider_hashes() WHERE provider = 'ACCOUNTS' ) IS NULL + , 'ACCOUNTS hashed'; + + ASSERT ( SELECT 1 FROM hive.calculate_state_provider_hashes() WHERE provider = 'KEYAUTH' ) IS NULL + , 'KEYAUTH hashed'; + + ASSERT ( SELECT 1 FROM hive.calculate_state_provider_hashes() WHERE provider = 'METADATA' ) IS NULL + , 'METADATA hashed'; + + ASSERT ( SELECT COUNT(*) FROM hive.calculate_state_provider_hashes() ) = 0 + , 'More than 0 known providers are hashed'; + + SELECT schema_hash FROM hive.create_database_hash('hafd') INTO __database_hash_before; + + EXECUTE format( 'CREATE OR REPLACE FUNCTION hive.start_provider_keyauth( _context hafd.context_name ) + RETURNS TEXT[] + LANGUAGE plpgsql + VOLATILE + AS + $$ + BEGIN + RETURN ''''; + END; + $$ + ;'); + + SELECT schema_hash FROM hive.create_database_hash('hafd') INTO __database_hash_after; + + ASSERT __database_hash_after = __database_hash_before, 'Unused state provider has impact on database hash'; +END; +$BODY$; \ No newline at end of file diff --git a/tests/integration/functional/hive_fork_manager/test_table_schema.sh b/tests/integration/functional/hive_fork_manager/test_table_schema.sh index 25ded4a2a..9b3cec17a 100755 --- a/tests/integration/functional/hive_fork_manager/test_table_schema.sh +++ b/tests/integration/functional/hive_fork_manager/test_table_schema.sh @@ -114,6 +114,11 @@ test_extension_update_when_state_provider_changed() { echo echo "Making a change in keyauth state provider by change definition of hive.start_provider_keyauth" + sudo -Enu "$DB_ADMIN" psql -w $POSTGRES_ACCESS -d "$DB_NAME" -v ON_ERROR_STOP=on -U "$DB_ADMIN" \ + -c "CREATE SCHEMA A; + SELECT hive.app_create_context( _name => 'context', _schema => 'a' ); + SELECT hive.app_state_provider_import( 'KEYAUTH', 'context' );" + # change definition of a state provider sudo -Enu "$DB_ADMIN" psql -w $POSTGRES_ACCESS -d "$DB_NAME" -v ON_ERROR_STOP=on -U "$DB_ADMIN" \ -c "CREATE OR REPLACE FUNCTION hive.start_provider_keyauth( _context hafd.context_name ) -- GitLab