forked from ibrhmkoz/pgtest
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathpgtest.go
201 lines (165 loc) · 4.9 KB
/
pgtest.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
package pgtest
import (
"ariga.io/atlas-go-sdk/atlasexec"
"context"
"fmt"
"github.com/docker/docker/pkg/ioutils"
"github.com/ibrhmkoz/pgtest/git"
"github.com/jackc/pgx/v5"
"github.com/jackc/pgx/v5/pgxpool"
"github.com/testcontainers/testcontainers-go"
"github.com/testcontainers/testcontainers-go/modules/postgres"
"github.com/testcontainers/testcontainers-go/wait"
"log"
"testing"
"time"
)
type SUT func(*testing.T, context.Context, *pgxpool.Pool)
type Option func(*DBOptions)
// DBOptions holds the configuration options for the database.
type DBOptions struct {
referentialIntegrityDisabled bool
version Version
url DesiredStateURL
}
// WithReferentialIntegrityDisabled is an option that disables referential integrity checks in the test database.
// Although referential integrity is a powerful feature provided by relational database management systems (RDBMS),
// it can sometimes unnecessarily complicate the setup of tests. In a relational database, the referential integrity
// chain between entities can be quite long, requiring a significant amount of setup data to satisfy all the foreign
// key constraints. This extensive setup may not be directly relevant to the specific functionality being tested.
// By disabling referential integrity checks, you can simplify the test setup and focus on testing the desired
// behavior without being burdened by the overhead of setting up the entire referential integrity chain.
func WithReferentialIntegrityDisabled() Option {
return func(opts *DBOptions) {
opts.referentialIntegrityDisabled = true
}
}
type Version = string
func WithVersion(v Version) Option {
return func(opts *DBOptions) {
opts.version = v
}
}
type DesiredStateURL = string
func WithDesiredState(url DesiredStateURL) Option {
return func(opts *DBOptions) {
opts.url = url
}
}
func Run(t *testing.T, sut SUT, opts ...Option) {
// Since integration tests are run in distinct containers, they can be run in parallel.
t.Parallel()
o := &DBOptions{
version: "latest",
}
for _, opt := range opts {
opt(o)
}
ctx := context.Background()
pc, err := spinContainer(ctx, o.version)
if err != nil {
t.Fatal(err)
}
t.Cleanup(func() {
if err := pc.Terminate(ctx); err != nil {
t.Fatalf("failed to terminate container: %s", err)
}
})
cs, err := pc.ConnectionString(ctx, "sslmode=disable")
if err != nil {
t.Fatal(err)
}
if o.url != "" {
err = reconcileDB(cs, o.url)
if err != nil {
t.Fatal(err)
}
}
config, err := pgxpool.ParseConfig(cs)
if err != nil {
t.Fatal(err)
}
pool, err := pgxpool.NewWithConfig(ctx, config)
if err != nil {
t.Fatal(err)
}
if o.referentialIntegrityDisabled {
if err := disableReferentialIntegrity(ctx, pool); err != nil {
t.Fatalf("failed to disable referential integrity: %v", err)
}
}
sut(t, ctx, pool)
}
func spinContainer(ctx context.Context, version string) (*postgres.PostgresContainer, error) {
n := "postgres"
u := "postgres"
p := "postgres"
testcontainers.Logger = log.New(&ioutils.NopWriter{}, "", 0)
pc, err := postgres.RunContainer(ctx,
testcontainers.WithImage(fmt.Sprintf("docker.io/postgres:%s", version)),
postgres.WithDatabase(n),
postgres.WithUsername(u),
postgres.WithPassword(p),
testcontainers.WithWaitStrategy(
wait.ForLog("database system is ready to accept connections").
WithOccurrence(2).
WithStartupTimeout(5*time.Second)),
)
return pc, err
}
type ConnectionString = string
func reconcileDB(cs ConnectionString, dsu DesiredStateURL) (err error) {
r, err := git.Root()
if err != nil {
return err
}
client, err := atlasexec.NewClient(r, "atlas")
if err != nil {
return fmt.Errorf("failed to initialize client: %v", err)
}
_, err = client.SchemaApply(context.Background(), &atlasexec.SchemaApplyParams{
URL: cs,
DevURL: "docker://postgres",
To: dsu,
})
return err
}
type DropConstraintQuery = string
func disableReferentialIntegrity(ctx context.Context, pool *pgxpool.Pool) (err error) {
tx, err := pool.Begin(ctx)
if err != nil {
return err
}
defer func(tx pgx.Tx, ctx context.Context) {
if err != nil {
err = tx.Rollback(ctx)
}
}(tx, ctx)
// Generate and execute commands to drop all foreign key constraints
rows, err := tx.Query(ctx, `
SELECT 'ALTER TABLE ' || nspname || '."' || relname || '" DROP CONSTRAINT "' || conname || '";'
FROM pg_constraint
INNER JOIN pg_class ON conrelid = pg_class.oid
INNER JOIN pg_namespace ON pg_namespace.oid = pg_class.relnamespace
WHERE contype = 'f';
`)
if err != nil {
return err
}
defer rows.Close()
var d []DropConstraintQuery
for rows.Next() {
var cmd string
if err := rows.Scan(&cmd); err != nil {
return err
}
d = append(d, cmd)
}
// Execute all drop constraint queries within the same transaction
for _, q := range d {
if _, err := tx.Exec(ctx, q); err != nil {
return err
}
}
return tx.Commit(ctx)
}