|
| 1 | +import boto3 |
1 | 2 | import psycopg2 |
2 | 3 | from localstack.utils.strings import short_uid |
3 | 4 |
|
@@ -104,3 +105,76 @@ def test_paradedb_quickstart(): |
104 | 105 | conn.commit() |
105 | 106 | cursor.close() |
106 | 107 | conn.close() |
| 108 | + |
| 109 | + |
| 110 | +def test_mixed_tcp_and_http_traffic(): |
| 111 | + """ |
| 112 | + Test that mixed TCP (ParadeDB) and HTTP (AWS) traffic works correctly. |
| 113 | +
|
| 114 | + This verifies that the ParadeDB extension only intercepts PostgreSQL wire |
| 115 | + protocol connections and doesn't interfere with regular HTTP-based AWS |
| 116 | + API requests to LocalStack. |
| 117 | + """ |
| 118 | + # First, verify ParadeDB TCP connection works |
| 119 | + conn = get_connection() |
| 120 | + cursor = conn.cursor() |
| 121 | + cursor.execute("SELECT 1 as test_value;") |
| 122 | + result = cursor.fetchone() |
| 123 | + assert result[0] == 1, "ParadeDB TCP connection should work" |
| 124 | + cursor.close() |
| 125 | + conn.close() |
| 126 | + |
| 127 | + # Now verify AWS HTTP requests still work (S3 and STS) |
| 128 | + # These should NOT be intercepted by the ParadeDB extension |
| 129 | + endpoint_url = f"http://localhost:{PORT}" |
| 130 | + |
| 131 | + # Test S3 HTTP requests |
| 132 | + s3_client = boto3.client( |
| 133 | + "s3", |
| 134 | + endpoint_url=endpoint_url, |
| 135 | + aws_access_key_id="test", |
| 136 | + aws_secret_access_key="test", |
| 137 | + region_name="us-east-1", |
| 138 | + ) |
| 139 | + |
| 140 | + bucket_name = f"test-bucket-{short_uid()}" |
| 141 | + s3_client.create_bucket(Bucket=bucket_name) |
| 142 | + |
| 143 | + # List buckets to verify HTTP API is working |
| 144 | + buckets = s3_client.list_buckets() |
| 145 | + bucket_names = [b["Name"] for b in buckets["Buckets"]] |
| 146 | + assert bucket_name in bucket_names, "S3 HTTP API should work alongside ParadeDB TCP" |
| 147 | + |
| 148 | + # Put and get an object |
| 149 | + test_key = "test-object.txt" |
| 150 | + test_content = b"Hello from mixed TCP/HTTP test!" |
| 151 | + s3_client.put_object(Bucket=bucket_name, Key=test_key, Body=test_content) |
| 152 | + response = s3_client.get_object(Bucket=bucket_name, Key=test_key) |
| 153 | + retrieved_content = response["Body"].read() |
| 154 | + assert retrieved_content == test_content, "S3 object operations should work" |
| 155 | + |
| 156 | + # Clean up S3 |
| 157 | + s3_client.delete_object(Bucket=bucket_name, Key=test_key) |
| 158 | + s3_client.delete_bucket(Bucket=bucket_name) |
| 159 | + |
| 160 | + # Test STS HTTP requests |
| 161 | + sts_client = boto3.client( |
| 162 | + "sts", |
| 163 | + endpoint_url=endpoint_url, |
| 164 | + aws_access_key_id="test", |
| 165 | + aws_secret_access_key="test", |
| 166 | + region_name="us-east-1", |
| 167 | + ) |
| 168 | + |
| 169 | + caller_identity = sts_client.get_caller_identity() |
| 170 | + assert "Account" in caller_identity, "STS HTTP API should work alongside ParadeDB TCP" |
| 171 | + assert "Arn" in caller_identity, "STS should return valid caller identity" |
| 172 | + |
| 173 | + # Finally, verify ParadeDB still works after HTTP requests |
| 174 | + conn = get_connection() |
| 175 | + cursor = conn.cursor() |
| 176 | + cursor.execute("SELECT 'tcp_works_after_http' as verification;") |
| 177 | + result = cursor.fetchone() |
| 178 | + assert result[0] == "tcp_works_after_http", "ParadeDB should still work after HTTP requests" |
| 179 | + cursor.close() |
| 180 | + conn.close() |
0 commit comments