#! /bin/bash if command -v podman > /dev/null; then CONTAINER_CLI=$(command -v podman) HEALTCHECK_PATH="{{.State.Healthcheck.Status}}" # Only use sudo for podman if command -v sudo > /dev/null; then PRIVILEGED_CLI="sudo" else PRIVILEGED_CLI="" fi else CONTAINER_CLI=$(command -v docker) HEALTCHECK_PATH="{{.State.Health.Status}}" PRIVILEGED_CLI="" fi mysql() { mysql_8_2 } mysql_8_0() { $CONTAINER_CLI rm -f mysql || true $CONTAINER_CLI run --name mysql -e MYSQL_USER=hibernate_orm_test -e MYSQL_PASSWORD=hibernate_orm_test -e MYSQL_ROOT_PASSWORD=hibernate_orm_test -e MYSQL_DATABASE=hibernate_orm_test -e MYSQL_ROOT_PASSWORD=hibernate_orm_test -p3306:3306 -d ${DB_IMAGE_MYSQL_8_0:-docker.io/mysql:8.0.31} --character-set-server=utf8mb4 --collation-server=utf8mb4_0900_as_cs --skip-character-set-client-handshake --log-bin-trust-function-creators=1 --lower_case_table_names=2 # Give the container some time to start OUTPUT= n=0 until [ "$n" -ge 5 ] do # Need to access STDERR. Thanks for the snippet https://stackoverflow.com/a/56577569/412446 { OUTPUT="$( { $CONTAINER_CLI logs mysql; } 2>&1 1>&3 3>&- )"; } 3>&1; if [[ $OUTPUT == *"ready for connections"* ]]; then break; fi n=$((n+1)) echo "Waiting for MySQL to start..." sleep 3 done if [ "$n" -ge 5 ]; then echo "MySQL failed to start and configure after 15 seconds" else echo "MySQL successfully started" fi } mysql_8_1() { $CONTAINER_CLI rm -f mysql || true $CONTAINER_CLI run --name mysql -e MYSQL_USER=hibernate_orm_test -e MYSQL_PASSWORD=hibernate_orm_test -e MYSQL_ROOT_PASSWORD=hibernate_orm_test -e MYSQL_DATABASE=hibernate_orm_test -e MYSQL_ROOT_PASSWORD=hibernate_orm_test -p3306:3306 -d ${DB_IMAGE_MYSQL_8_1:-docker.io/mysql:8.1.0} --character-set-server=utf8mb4 --collation-server=utf8mb4_0900_as_cs --skip-character-set-client-handshake --log-bin-trust-function-creators=1 --lower_case_table_names=2 # Give the container some time to start OUTPUT= n=0 until [ "$n" -ge 5 ] do # Need to access STDERR. Thanks for the snippet https://stackoverflow.com/a/56577569/412446 { OUTPUT="$( { $CONTAINER_CLI logs mysql; } 2>&1 1>&3 3>&- )"; } 3>&1; if [[ $OUTPUT == *"ready for connections"* ]]; then break; fi n=$((n+1)) echo "Waiting for MySQL to start..." sleep 3 done if [ "$n" -ge 5 ]; then echo "MySQL failed to start and configure after 15 seconds" else echo "MySQL successfully started" fi } mysql_8_2() { $CONTAINER_CLI rm -f mysql || true $CONTAINER_CLI run --name mysql -e MYSQL_USER=hibernate_orm_test -e MYSQL_PASSWORD=hibernate_orm_test -e MYSQL_ROOT_PASSWORD=hibernate_orm_test -e MYSQL_DATABASE=hibernate_orm_test -e MYSQL_ROOT_PASSWORD=hibernate_orm_test -p3306:3306 -d ${DB_IMAGE_MYSQL_8_2:-docker.io/mysql:8.2.0} --character-set-server=utf8mb4 --collation-server=utf8mb4_0900_as_cs --skip-character-set-client-handshake --log-bin-trust-function-creators=1 --lower_case_table_names=2 # Give the container some time to start OUTPUT= n=0 until [ "$n" -ge 5 ] do # Need to access STDERR. Thanks for the snippet https://stackoverflow.com/a/56577569/412446 { OUTPUT="$( { $CONTAINER_CLI logs mysql; } 2>&1 1>&3 3>&- )"; } 3>&1; if [[ $OUTPUT == *"ready for connections"* ]]; then break; fi n=$((n+1)) echo "Waiting for MySQL to start..." sleep 3 done if [ "$n" -ge 5 ]; then echo "MySQL failed to start and configure after 15 seconds" else echo "MySQL successfully started" fi } mariadb() { mariadb_11_4 } mariadb_wait_until_start() { n=0 until [ "$n" -ge 5 ] do if $CONTAINER_CLI exec mariadb healthcheck.sh --connect --innodb_initialized; then break; fi n=$((n+1)) echo "Waiting for MariaDB to start..." sleep 3 done if $CONTAINER_CLI exec mariadb healthcheck.sh --connect --innodb_initialized; then echo "MariaDB successfully started" else echo "MariaDB failed to start and configure after 15 seconds" fi } mariadb_10_4() { $CONTAINER_CLI rm -f mariadb || true $CONTAINER_CLI run --name mariadb -e MARIADB_USER=hibernate_orm_test -e MARIADB_PASSWORD=hibernate_orm_test -e MARIADB_DATABASE=hibernate_orm_test -e MARIADB_ROOT_PASSWORD=hibernate_orm_test -p3306:3306 -d ${DB_IMAGE_MARIADB_10_4:-docker.io/mariadb:10.4.33} --character-set-server=utf8mb4 --collation-server=utf8mb4_bin --skip-character-set-client-handshake --lower_case_table_names=2 mariadb_wait_until_start } mariadb_10_11() { $CONTAINER_CLI rm -f mariadb || true $CONTAINER_CLI run --name mariadb -e MARIADB_USER=hibernate_orm_test -e MARIADB_PASSWORD=hibernate_orm_test -e MARIADB_DATABASE=hibernate_orm_test -e MARIADB_ROOT_PASSWORD=hibernate_orm_test -p3306:3306 -d ${DB_IMAGE_MARIADB_10_11:-docker.io/mariadb:10.11.8} --character-set-server=utf8mb4 --collation-server=utf8mb4_bin --skip-character-set-client-handshake --lower_case_table_names=2 mariadb_wait_until_start } mariadb_11_1() { $CONTAINER_CLI rm -f mariadb || true $CONTAINER_CLI run --name mariadb -e MARIADB_USER=hibernate_orm_test -e MARIADB_PASSWORD=hibernate_orm_test -e MARIADB_DATABASE=hibernate_orm_test -e MARIADB_ROOT_PASSWORD=hibernate_orm_test -p3306:3306 -d ${DB_IMAGE_MARIADB_11_1:-docker.io/mariadb:11.1.2} --character-set-server=utf8mb4 --collation-server=utf8mb4_bin --skip-character-set-client-handshake --lower_case_table_names=2 mariadb_wait_until_start } mariadb_11_4() { $CONTAINER_CLI rm -f mariadb || true $CONTAINER_CLI run --name mariadb -e MARIADB_USER=hibernate_orm_test -e MARIADB_PASSWORD=hibernate_orm_test -e MARIADB_DATABASE=hibernate_orm_test -e MARIADB_ROOT_PASSWORD=hibernate_orm_test -p3306:3306 -d ${DB_IMAGE_MARIADB_11_4:-docker.io/mariadb:11.4.2} --character-set-server=utf8mb4 --collation-server=utf8mb4_bin --skip-character-set-client-handshake --lower_case_table_names=2 mariadb_wait_until_start } mariadb_verylatest() { $CONTAINER_CLI rm -f mariadb || true $CONTAINER_CLI run --name mariadb -e MARIADB_USER=hibernate_orm_test -e MARIADB_PASSWORD=hibernate_orm_test -e MARIADB_DATABASE=hibernate_orm_test -e MARIADB_ROOT_PASSWORD=hibernate_orm_test -p3306:3306 -d ${DB_IMAGE_MARIADB_VERYLATEST:-quay.io/mariadb-foundation/mariadb-devel:verylatest} --character-set-server=utf8mb4 --collation-server=utf8mb4_bin --skip-character-set-client-handshake --lower_case_table_names=2 mariadb_wait_until_start } postgresql() { postgresql_16 } postgresql_12() { $CONTAINER_CLI rm -f postgres || true $CONTAINER_CLI run --name postgres -e POSTGRES_USER=hibernate_orm_test -e POSTGRES_PASSWORD=hibernate_orm_test -e POSTGRES_DB=hibernate_orm_test -p5432:5432 -d ${DB_IMAGE_POSTGRESQL_12:-docker.io/postgis/postgis:12-3.4} $CONTAINER_CLI exec postgres bash -c '/usr/share/postgresql-common/pgdg/apt.postgresql.org.sh -y && apt install -y postgresql-12-pgvector && psql -U hibernate_orm_test -d hibernate_orm_test -c "create extension vector;"' } postgresql_13() { $CONTAINER_CLI rm -f postgres || true $CONTAINER_CLI run --name postgres -e POSTGRES_USER=hibernate_orm_test -e POSTGRES_PASSWORD=hibernate_orm_test -e POSTGRES_DB=hibernate_orm_test -p5432:5432 -d ${DB_IMAGE_POSTGRESQL_13:-docker.io/postgis/postgis:13-3.1} $CONTAINER_CLI exec postgres bash -c '/usr/share/postgresql-common/pgdg/apt.postgresql.org.sh -y && apt install -y postgresql-13-pgvector && psql -U hibernate_orm_test -d hibernate_orm_test -c "create extension vector;"' } postgresql_14() { $CONTAINER_CLI rm -f postgres || true $CONTAINER_CLI run --name postgres -e POSTGRES_USER=hibernate_orm_test -e POSTGRES_PASSWORD=hibernate_orm_test -e POSTGRES_DB=hibernate_orm_test -p5432:5432 -d ${DB_IMAGE_POSTGRESQL_14:-docker.io/postgis/postgis:14-3.3} $CONTAINER_CLI exec postgres bash -c '/usr/share/postgresql-common/pgdg/apt.postgresql.org.sh -y && apt install -y postgresql-14-pgvector && psql -U hibernate_orm_test -d hibernate_orm_test -c "create extension vector;"' } postgresql_15() { $CONTAINER_CLI rm -f postgres || true $CONTAINER_CLI run --name postgres -e POSTGRES_USER=hibernate_orm_test -e POSTGRES_PASSWORD=hibernate_orm_test -e POSTGRES_DB=hibernate_orm_test -p5432:5432 --tmpfs /pgtmpfs:size=131072k -d ${DB_IMAGE_POSTGRESQL_15:-docker.io/postgis/postgis:15-3.3} \ -c fsync=off -c synchronous_commit=off -c full_page_writes=off -c shared_buffers=256MB -c maintenance_work_mem=256MB -c max_wal_size=1GB -c checkpoint_timeout=1d $CONTAINER_CLI exec postgres bash -c '/usr/share/postgresql-common/pgdg/apt.postgresql.org.sh -y && apt install -y postgresql-15-pgvector && psql -U hibernate_orm_test -d hibernate_orm_test -c "create extension vector;"' } postgresql_16() { $CONTAINER_CLI rm -f postgres || true $CONTAINER_CLI run --name postgres -e POSTGRES_USER=hibernate_orm_test -e POSTGRES_PASSWORD=hibernate_orm_test -e POSTGRES_DB=hibernate_orm_test -p5432:5432 --tmpfs /pgtmpfs:size=131072k -d ${DB_IMAGE_POSTGRESQL_16:-docker.io/postgis/postgis:16-3.4} \ -c fsync=off -c synchronous_commit=off -c full_page_writes=off -c shared_buffers=256MB -c maintenance_work_mem=256MB -c max_wal_size=1GB -c checkpoint_timeout=1d $CONTAINER_CLI exec postgres bash -c '/usr/share/postgresql-common/pgdg/apt.postgresql.org.sh -y && apt install -y postgresql-16-pgvector && psql -U hibernate_orm_test -d hibernate_orm_test -c "create extension vector;"' } edb() { edb_16 } edb_12() { $CONTAINER_CLI rm -f edb || true # We need to build a derived image because the existing image is mainly made for use by a kubernetes operator (cd edb; $CONTAINER_CLI build -t edb-test:12 -f edb12.Dockerfile .) $CONTAINER_CLI run --name edb -e POSTGRES_USER=hibernate_orm_test -e POSTGRES_PASSWORD=hibernate_orm_test -e POSTGRES_DB=hibernate_orm_test -p 5444:5444 -d edb-test:12 } edb_14() { $CONTAINER_CLI rm -f edb || true # We need to build a derived image because the existing image is mainly made for use by a kubernetes operator (cd edb; $CONTAINER_CLI build -t edb-test:14 -f edb14.Dockerfile .) $CONTAINER_CLI run --name edb -e POSTGRES_USER=hibernate_orm_test -e POSTGRES_PASSWORD=hibernate_orm_test -e POSTGRES_DB=hibernate_orm_test -p 5444:5444 -d edb-test:14 } edb_15() { $CONTAINER_CLI rm -f edb || true # We need to build a derived image because the existing image is mainly made for use by a kubernetes operator (cd edb; $CONTAINER_CLI build -t edb-test:15 -f edb15.Dockerfile .) $CONTAINER_CLI run --name edb -e POSTGRES_USER=hibernate_orm_test -e POSTGRES_PASSWORD=hibernate_orm_test -e POSTGRES_DB=hibernate_orm_test -p 5444:5444 -d edb-test:15 } edb_16() { $CONTAINER_CLI rm -f edb || true # We need to build a derived image because the existing image is mainly made for use by a kubernetes operator (cd edb; $CONTAINER_CLI build -t edb-test:16 -f edb16.Dockerfile .) $CONTAINER_CLI run --name edb -e POSTGRES_USER=hibernate_orm_test -e POSTGRES_PASSWORD=hibernate_orm_test -e POSTGRES_DB=hibernate_orm_test -p 5444:5444 -d edb-test:16 } db2() { db2_11_5 } db2_11_5() { $PRIVILEGED_CLI $CONTAINER_CLI rm -f db2 || true $PRIVILEGED_CLI $CONTAINER_CLI run --name db2 --privileged -e DB2INSTANCE=orm_test -e DB2INST1_PASSWORD=orm_test -e DBNAME=orm_test -e LICENSE=accept -e AUTOCONFIG=false -e ARCHIVE_LOGS=false -e TO_CREATE_SAMPLEDB=false -e REPODB=false -p 50000:50000 -d ${DB_IMAGE_DB2_11_5:-icr.io/db2_community/db2:11.5.9.0} # Give the container some time to start OUTPUT= while [[ $OUTPUT != *"INSTANCE"* ]]; do echo "Waiting for DB2 to start..." sleep 10 OUTPUT=$($PRIVILEGED_CLI $CONTAINER_CLI logs db2 2>&1) done $PRIVILEGED_CLI $CONTAINER_CLI exec -t db2 su - orm_test bash -c ". /database/config/orm_test/sqllib/db2profile; /database/config/orm_test/sqllib/bin/db2 'connect to orm_test'; /database/config/orm_test/sqllib/bin/db2 'CREATE USER TEMPORARY TABLESPACE usr_tbsp MANAGED BY AUTOMATIC STORAGE'" } db2_10_5() { $PRIVILEGED_CLI $CONTAINER_CLI rm -f db2 || true # The sha represents the tag 10.5.0.5-3.10.0 $PRIVILEGED_CLI $CONTAINER_CLI run --name db2 --privileged -e DB2INST1_PASSWORD=db2inst1-pwd -e LICENSE=accept -p 50000:50000 -d ${DB_IMAGE_DB2_10_5:-quay.io/hibernate/db2express-c@sha256:a499afd9709a1f69fb41703e88def9869955234c3525547e2efc3418d1f4ca2b} db2start # Give the container some time to start OUTPUT= while [[ $OUTPUT != *"DB2START"* ]]; do echo "Waiting for DB2 to start..." sleep 10 OUTPUT=$($PRIVILEGED_CLI $CONTAINER_CLI logs db2 2>&1) done $PRIVILEGED_CLI $CONTAINER_CLI exec -t db2 su - db2inst1 bash -c "/home/db2inst1/sqllib/bin/db2 create database orm_test && /home/db2inst1/sqllib/bin/db2 'connect to orm_test' && /home/db2inst1/sqllib/bin/db2 'CREATE BUFFERPOOL BP8K pagesize 8K' && /home/db2inst1/sqllib/bin/db2 'CREATE SYSTEM TEMPORARY TABLESPACE STB_8 PAGESIZE 8K BUFFERPOOL BP8K' && /home/db2inst1/sqllib/bin/db2 'CREATE BUFFERPOOL BP16K pagesize 16K' && /home/db2inst1/sqllib/bin/db2 'CREATE SYSTEM TEMPORARY TABLESPACE STB_16 PAGESIZE 16K BUFFERPOOL BP16K' && /home/db2inst1/sqllib/bin/db2 'CREATE BUFFERPOOL BP32K pagesize 32K' && /home/db2inst1/sqllib/bin/db2 'CREATE SYSTEM TEMPORARY TABLESPACE STB_32 PAGESIZE 32K BUFFERPOOL BP32K' && /home/db2inst1/sqllib/bin/db2 'CREATE USER TEMPORARY TABLESPACE usr_tbsp MANAGED BY AUTOMATIC STORAGE'" } db2_spatial() { $PRIVILEGED_CLI $CONTAINER_CLI rm -f db2spatial || true temp_dir=$(mktemp -d) cat <${temp_dir}/ewkt.sql create or replace function db2gse.asewkt(geometry db2gse.st_geometry) returns clob(2G) specific db2gse.asewkt1 language sql deterministic no external action reads sql data return 'srid=' || varchar(db2gse.st_srsid(geometry)) || ';' || db2gse.st_astext(geometry) ; -- Create SQL function to create a geometry from EWKT format create or replace function db2gse.geomfromewkt(instring varchar(32000)) returns db2gse.st_geometry specific db2gse.fromewkt1 language sql deterministic no external action reads sql data return db2gse.st_geometry( substr(instring,posstr(instring,';')+1, length(instring) - posstr(instring,';')), integer(substr(instring,posstr(instring,'=')+1,posstr(instring,';')-(posstr(instring,'=')+1))) ) ; -- Create a DB2 transform group to return and accept EWKT CREATE TRANSFORM FOR db2gse.ST_Geometry EWKT ( FROM SQL WITH FUNCTION db2gse.asewkt(db2gse.ST_Geometry), TO SQL WITH FUNCTION db2gse.geomfromewkt(varchar(32000)) ) ; -- Redefine the default DB2_PROGRAM to return and accept EWKT instead of WKT DROP TRANSFORM DB2_PROGRAM FOR db2gse.ST_Geometry; CREATE TRANSFORM FOR db2gse.ST_Geometry DB2_PROGRAM ( FROM SQL WITH FUNCTION db2gse.asewkt(db2gse.ST_Geometry), TO SQL WITH FUNCTION db2gse.geomfromewkt(varchar(32000)) ) ; EOF $PRIVILEGED_CLI $CONTAINER_CLI run --name db2spatial --privileged -e DB2INSTANCE=orm_test -e DB2INST1_PASSWORD=orm_test -e DBNAME=orm_test -e LICENSE=accept -e AUTOCONFIG=false -e ARCHIVE_LOGS=false -e TO_CREATE_SAMPLEDB=false -e REPODB=false \ -v ${temp_dir}:/conf \ -p 50000:50000 -d ${DB_IMAGE_DB2_SPATIAL:-docker.io/ibmcom/db2:11.5.5.0} # Give the container some time to start OUTPUT= while [[ $OUTPUT != *"Setup has completed."* ]]; do echo "Waiting for DB2 to start..." sleep 10 OUTPUT=$($PRIVILEGED_CLI $CONTAINER_CLI logs db2spatial 2>&1) done sleep 10 echo "Enabling spatial extender" $PRIVILEGED_CLI $CONTAINER_CLI exec -t db2spatial su - orm_test bash -c "/database/config/orm_test/sqllib/db2profile && /database/config/orm_test/sqllib/bin/db2se enable_db orm_test" echo "Installing required transform group" $PRIVILEGED_CLI $CONTAINER_CLI exec -t db2spatial su - orm_test bash -c "/database/config/orm_test/sqllib/db2profile && /database/config/orm_test/sqllib/bin/db2 'connect to orm_test' && /database/config/orm_test/sqllib/bin/db2 -tvf /conf/ewkt.sql" } mssql() { mssql_2022 } mssql_2017() { $CONTAINER_CLI rm -f mssql || true #This sha256 matches a specific tag of mcr.microsoft.com/mssql/server:2017-latest : $CONTAINER_CLI run --name mssql -d -p 1433:1433 -e "SA_PASSWORD=Hibernate_orm_test" -e ACCEPT_EULA=Y ${DB_IMAGE_MSSQL_2017:-mcr.microsoft.com/mssql/server@sha256:7d194c54e34cb63bca083542369485c8f4141596805611e84d8c8bab2339eede} sleep 5 n=0 until [ "$n" -ge 5 ] do # We need a database that uses a non-lock based MVCC approach # https://github.com/microsoft/homebrew-mssql-release/issues/2#issuecomment-682285561 $CONTAINER_CLI exec mssql bash -c 'echo "create database hibernate_orm_test collate SQL_Latin1_General_CP1_CS_AS; alter database hibernate_orm_test set READ_COMMITTED_SNAPSHOT ON" | /opt/mssql-tools/bin/sqlcmd -S localhost -U sa -P Hibernate_orm_test -i /dev/stdin' && break echo "Waiting for SQL Server to start..." n=$((n+1)) sleep 5 done if [ "$n" -ge 5 ]; then echo "SQL Server failed to start and configure after 25 seconds" else echo "SQL Server successfully started" fi } mssql_2022() { $CONTAINER_CLI rm -f mssql || true #This sha256 matches a specific tag of 2022-CU12-ubuntu-22.04 (https://mcr.microsoft.com/en-us/product/mssql/server/tags): $CONTAINER_CLI run --name mssql -d -p 1433:1433 -e "SA_PASSWORD=Hibernate_orm_test" -e ACCEPT_EULA=Y ${DB_IMAGE_MSSQL_2022:-mcr.microsoft.com/mssql/server@sha256:b94071acd4612bfe60a73e265097c2b6388d14d9d493db8f37cf4479a4337480} sleep 5 n=0 until [ "$n" -ge 5 ] do # We need a database that uses a non-lock based MVCC approach # https://github.com/microsoft/homebrew-mssql-release/issues/2#issuecomment-682285561 $CONTAINER_CLI exec mssql bash -c 'echo "create database hibernate_orm_test collate SQL_Latin1_General_CP1_CS_AS; alter database hibernate_orm_test set READ_COMMITTED_SNAPSHOT ON" | /opt/mssql-tools/bin/sqlcmd -S localhost -U sa -P Hibernate_orm_test -i /dev/stdin' && break echo "Waiting for SQL Server to start..." n=$((n+1)) sleep 5 done if [ "$n" -ge 5 ]; then echo "SQL Server failed to start and configure after 25 seconds" else echo "SQL Server successfully started" fi } sybase() { $CONTAINER_CLI rm -f sybase || true # Yup, that sucks, but on ubuntu we need to use -T11889 as per: https://github.com/DataGrip/docker-env/issues/12 $CONTAINER_CLI run -d -p 9000:5000 -p 9001:5001 --name sybase --entrypoint /bin/bash ${DB_IMAGE_SYBASE:-docker.io/nguoianphu/docker-sybase} -c "source /opt/sybase/SYBASE.sh /opt/sybase/ASE-16_0/bin/dataserver \ -d/opt/sybase/data/master.dat \ -e/opt/sybase/ASE-16_0/install/MYSYBASE.log \ -c/opt/sybase/ASE-16_0/MYSYBASE.cfg \ -M/opt/sybase/ASE-16_0 \ -N/opt/sybase/ASE-16_0/sysam/MYSYBASE.properties \ -i/opt/sybase \ -sMYSYBASE \ -T11889 RET=\$? exit 0 " sybase_check() { $CONTAINER_CLI exec sybase bash -c "source /opt/sybase/SYBASE.sh; /opt/sybase/OCS-16_0/bin/isql -Usa -P myPassword -S MYSYBASE < 0 go quit EOF " } START_STATUS=0 j=1 while (( $j < 30 )); do echo "Waiting for Sybase to start..." sleep 1 j=$((j+1)) START_STATUS=$(sybase_check | grep '(0 rows affected)' | wc -c) if (( $START_STATUS > 0 )); then break fi done if (( $j == 30 )); then echo "Failed starting Sybase" $CONTAINER_CLI ps -a $CONTAINER_CLI logs sybase sybase_check exit 1 fi export SYBASE_DB=hibernate_orm_test export SYBASE_USER=hibernate_orm_test export SYBASE_PASSWORD=hibernate_orm_test $CONTAINER_CLI exec sybase bash -c "source /opt/sybase/SYBASE.sh; cat <<-EOSQL > init1.sql use master go disk resize name='master', size='256m' go create database $SYBASE_DB on master = '96m' go sp_dboption $SYBASE_DB, \"single user\", true go alter database $SYBASE_DB log on master = '50m' go use $SYBASE_DB go exec sp_extendsegment logsegment, $SYBASE_DB, master go use master go sp_dboption $SYBASE_DB, \"single user\", false go use $SYBASE_DB go checkpoint go use master go create login $SYBASE_USER with password $SYBASE_PASSWORD go exec sp_dboption $SYBASE_DB, 'abort tran on log full', true go exec sp_dboption $SYBASE_DB, 'allow nulls by default', true go exec sp_dboption $SYBASE_DB, 'ddl in tran', true go exec sp_dboption $SYBASE_DB, 'trunc log on chkpt', true go exec sp_dboption $SYBASE_DB, 'full logging for select into', true go exec sp_dboption $SYBASE_DB, 'full logging for alter table', true go sp_dboption $SYBASE_DB, \"select into\", true go sp_dboption tempdb, 'ddl in tran', true go EOSQL /opt/sybase/OCS-16_0/bin/isql -Usa -P myPassword -S MYSYBASE -i ./init1.sql echo =============== CREATING DB ========================== cat <<-EOSQL > init2.sql use $SYBASE_DB go sp_adduser '$SYBASE_USER', '$SYBASE_USER', null go grant create default to $SYBASE_USER go grant create table to $SYBASE_USER go grant create view to $SYBASE_USER go grant create rule to $SYBASE_USER go grant create function to $SYBASE_USER go grant create procedure to $SYBASE_USER go commit go EOSQL /opt/sybase/OCS-16_0/bin/isql -Usa -P myPassword -S MYSYBASE -i ./init2.sql" echo "Sybase successfully started" } oracle_setup() { HEALTHSTATUS= until [ "$HEALTHSTATUS" == "healthy" ]; do echo "Waiting for Oracle to start..." sleep 5; # On WSL, health-checks intervals don't work for Podman, so run them manually if command -v podman > /dev/null; then $PRIVILEGED_CLI $CONTAINER_CLI healthcheck run oracle > /dev/null fi HEALTHSTATUS="`$PRIVILEGED_CLI $CONTAINER_CLI inspect -f $HEALTCHECK_PATH oracle`" HEALTHSTATUS=${HEALTHSTATUS##+( )} #Remove longest matching series of spaces from the front HEALTHSTATUS=${HEALTHSTATUS%%+( )} #Remove longest matching series of spaces from the back done sleep 2; echo "Oracle successfully started" # We increase file sizes to avoid online resizes as that requires lots of CPU which is restricted in XE $PRIVILEGED_CLI $CONTAINER_CLI exec oracle bash -c "source /home/oracle/.bashrc; bash -c \" cat < /opt/oracle/oradata/dbconfig/XE/sqlnet.ora !lsnrctl reload -- Increasing redo logs alter database add logfile group 4 '\$ORACLE_BASE/oradata/XE/redo04.log' size 500M reuse; alter database add logfile group 5 '\$ORACLE_BASE/oradata/XE/redo05.log' size 500M reuse; alter database add logfile group 6 '\$ORACLE_BASE/oradata/XE/redo06.log' size 500M reuse; alter system switch logfile; alter system switch logfile; alter system switch logfile; alter system checkpoint; alter database drop logfile group 1; alter database drop logfile group 2; alter database drop logfile group 3; !rm \$ORACLE_BASE/oradata/XE/redo01.log !rm \$ORACLE_BASE/oradata/XE/redo02.log !rm \$ORACLE_BASE/oradata/XE/redo03.log -- Increasing SYSAUX data file alter database datafile '\$ORACLE_BASE/oradata/XE/sysaux01.dbf' resize 600M; -- Modifying database init parameters alter system set open_cursors=1000 sid='*' scope=both; alter system set session_cached_cursors=500 sid='*' scope=spfile; alter system set db_securefile=ALWAYS sid='*' scope=spfile; alter system set dispatchers='(PROTOCOL=TCP)(SERVICE=XEXDB)(DISPATCHERS=0)' sid='*' scope=spfile; alter system set recyclebin=OFF sid='*' SCOPE=SPFILE; -- Comment the 2 next lines to be able to use Diagnostics Pack features alter system set sga_target=0m sid='*' scope=both; -- alter system set statistics_level=BASIC sid='*' scope=spfile; -- Restart the database SHUTDOWN IMMEDIATE; STARTUP MOUNT; ALTER DATABASE OPEN; -- Switch to the XEPDB1 pluggable database alter session set container=xepdb1; -- Modify XEPDB1 datafiles and tablespaces alter database datafile '\$ORACLE_BASE/oradata/XE/XEPDB1/system01.dbf' resize 320M; alter database datafile '\$ORACLE_BASE/oradata/XE/XEPDB1/sysaux01.dbf' resize 360M; alter database datafile '\$ORACLE_BASE/oradata/XE/XEPDB1/undotbs01.dbf' resize 400M; alter database datafile '\$ORACLE_BASE/oradata/XE/XEPDB1/undotbs01.dbf' autoextend on next 16M; alter database tempfile '\$ORACLE_BASE/oradata/XE/XEPDB1/temp01.dbf' resize 400M; alter database tempfile '\$ORACLE_BASE/oradata/XE/XEPDB1/temp01.dbf' autoextend on next 16M; alter database datafile '\$ORACLE_BASE/oradata/XE/XEPDB1/users01.dbf' resize 100M; alter database datafile '\$ORACLE_BASE/oradata/XE/XEPDB1/users01.dbf' autoextend on next 16M; alter tablespace USERS nologging; alter tablespace SYSTEM nologging; alter tablespace SYSAUX nologging; create user hibernate_orm_test identified by hibernate_orm_test quota unlimited on users; grant all privileges to hibernate_orm_test; EOF\"" } oracle_free_setup() { HEALTHSTATUS= until [ "$HEALTHSTATUS" == "healthy" ]; do echo "Waiting for Oracle Free to start..." sleep 5; # On WSL, health-checks intervals don't work for Podman, so run them manually if command -v podman > /dev/null; then $PRIVILEGED_CLI $CONTAINER_CLI healthcheck run oracle > /dev/null fi HEALTHSTATUS="`$PRIVILEGED_CLI $CONTAINER_CLI inspect -f $HEALTCHECK_PATH oracle`" HEALTHSTATUS=${HEALTHSTATUS##+( )} #Remove longest matching series of spaces from the front HEALTHSTATUS=${HEALTHSTATUS%%+( )} #Remove longest matching series of spaces from the back done sleep 2; echo "Oracle successfully started" # We increase file sizes to avoid online resizes as that requires lots of CPU which is restricted in XE $PRIVILEGED_CLI $CONTAINER_CLI exec oracle bash -c "source /home/oracle/.bashrc; bash -c \" cat < /opt/oracle/oradata/dbconfig/FREE/sqlnet.ora !lsnrctl reload -- Increasing redo logs alter database add logfile group 4 '\$ORACLE_BASE/oradata/FREE/redo04.log' size 500M reuse; alter database add logfile group 5 '\$ORACLE_BASE/oradata/FREE/redo05.log' size 500M reuse; alter database add logfile group 6 '\$ORACLE_BASE/oradata/FREE/redo06.log' size 500M reuse; alter system switch logfile; alter system switch logfile; alter system switch logfile; alter system checkpoint; alter database drop logfile group 1; alter database drop logfile group 2; alter database drop logfile group 3; !rm \$ORACLE_BASE/oradata/FREE/redo01.log !rm \$ORACLE_BASE/oradata/FREE/redo02.log !rm \$ORACLE_BASE/oradata/FREE/redo03.log -- Increasing SYSAUX data file alter database datafile '\$ORACLE_BASE/oradata/FREE/sysaux01.dbf' resize 600M; -- Modifying database init parameters alter system set open_cursors=1000 sid='*' scope=both; alter system set session_cached_cursors=500 sid='*' scope=spfile; alter system set db_securefile=ALWAYS sid='*' scope=spfile; alter system set dispatchers='(PROTOCOL=TCP)(SERVICE=FREEXDB)(DISPATCHERS=0)' sid='*' scope=spfile; alter system set recyclebin=OFF sid='*' SCOPE=SPFILE; -- Comment the 2 next lines to be able to use Diagnostics Pack features alter system set sga_target=0m sid='*' scope=both; -- alter system set statistics_level=BASIC sid='*' scope=spfile; -- Restart the database SHUTDOWN IMMEDIATE; STARTUP MOUNT; ALTER DATABASE OPEN; -- Switch to the FREEPDB1 pluggable database alter session set container=freepdb1; -- Modify FREEPDB1 datafiles and tablespaces alter database datafile '\$ORACLE_BASE/oradata/FREE/FREEPDB1/system01.dbf' resize 320M; alter database datafile '\$ORACLE_BASE/oradata/FREE/FREEPDB1/sysaux01.dbf' resize 360M; alter database datafile '\$ORACLE_BASE/oradata/FREE/FREEPDB1/undotbs01.dbf' resize 400M; alter database datafile '\$ORACLE_BASE/oradata/FREE/FREEPDB1/undotbs01.dbf' autoextend on next 16M; alter database tempfile '\$ORACLE_BASE/oradata/FREE/FREEPDB1/temp01.dbf' resize 400M; alter database tempfile '\$ORACLE_BASE/oradata/FREE/FREEPDB1/temp01.dbf' autoextend on next 16M; alter database datafile '\$ORACLE_BASE/oradata/FREE/FREEPDB1/users01.dbf' resize 100M; alter database datafile '\$ORACLE_BASE/oradata/FREE/FREEPDB1/users01.dbf' autoextend on next 16M; alter tablespace USERS nologging; alter tablespace SYSTEM nologging; alter tablespace SYSAUX nologging; create user hibernate_orm_test identified by hibernate_orm_test quota unlimited on users; grant all privileges to hibernate_orm_test; EOF\"" } disable_userland_proxy() { if [[ "$HEALTCHECK_PATH" == "{{.State.Health.Status}}" ]]; then if [[ ! -f /etc/docker/daemon.json ]]; then echo "Didn't find /etc/docker/daemon.json but need to disable userland-proxy..." echo "Stopping docker..." sudo service docker stop echo "Creating /etc/docker/daemon.json..." sudo bash -c "echo '{\"userland-proxy\": false}' > /etc/docker/daemon.json" echo "Starting docker..." sudo service docker start echo "Docker successfully started with userland proxies disabled" elif ! grep -q userland-proxy /etc/docker/daemon.json; then echo "Userland proxy is still enabled in /etc/docker/daemon.json, but need to disable it..." export docker_daemon_json=$( /etc/docker/daemon.json' echo "Starting docker..." sudo service docker start echo "Docker successfully started with userland proxies disabled" fi fi } oracle_atps() { echo "Managing Oracle Autonomous Database..." export INFO=$(curl -s -k -L -X GET "https://api.atlas-controller.oraclecloud.com/ords/atlas/admin/database?type=autonomous2&hostname=`hostname`" -H 'accept: application/json') export HOST=$(echo $INFO | jq -r '.database' | jq -r '.host') export SERVICE=$(echo $INFO | jq -r '.database' | jq -r '.service') export PASSWORD=$(echo $INFO | jq -r '.database' | jq -r '.password') curl -k -s -X POST "https://${HOST}.oraclevcn.com:8443/ords/admin/_/sql" -H 'content-type: application/sql' -H 'accept: application/json' -basic -u admin:${PASSWORD} --data-ascii "create user hibernate_orm_test_$RUNID identified by \"Oracle_19_Password\" DEFAULT TABLESPACE DATA TEMPORARY TABLESPACE TEMP;alter user hibernate_orm_test_$RUNID quota unlimited on data;grant CREATE SESSION, RESOURCE, CREATE VIEW, CREATE SYNONYM, CREATE ANY INDEX, EXECUTE ANY TYPE to hibernate_orm_test_$RUNID;" } oracle_atps_tls() { echo "Managing Oracle Autonomous Database..." export INFO=$(curl -s -k -L -X GET "https://api.atlas-controller.oraclecloud.com/ords/atlas/admin/database?type=autonomous&hostname=`hostname`" -H 'accept: application/json') export HOST=$(echo $INFO | jq -r '.database' | jq -r '.host') export SERVICE=$(echo $INFO | jq -r '.database' | jq -r '.service') export PASSWORD=$(echo $INFO | jq -r '.database' | jq -r '.password') curl -s -X POST "https://${HOST}.oraclecloudapps.com/ords/admin/_/sql" -H 'content-type: application/sql' -H 'accept: application/json' -basic -u admin:${PASSWORD} --data-ascii "create user hibernate_orm_test_$RUNID identified by \"Oracle_19_Password\" DEFAULT TABLESPACE DATA TEMPORARY TABLESPACE TEMP;alter user hibernate_orm_test_$RUNID quota unlimited on data;grant CREATE SESSION, RESOURCE, CREATE VIEW, CREATE SYNONYM, CREATE ANY INDEX, EXECUTE ANY TYPE to hibernate_orm_test_$RUNID;" } oracle_db19c() { echo "Managing Oracle Database 19c..." export INFO=$(curl -s -k -L -X GET "https://api.atlas-controller.oraclecloud.com/ords/atlas/admin/database?type=db19c&hostname=`hostname`" -H 'accept: application/json') export HOST=$(echo $INFO | jq -r '.database' | jq -r '.host') export SERVICE=$(echo $INFO | jq -r '.database' | jq -r '.service') export PASSWORD=$(echo $INFO | jq -r '.database' | jq -r '.password') /home/opc/sqlcl/bin/sql -s system/$PASSWORD@$HOST:1521/$SERVICE <$temp_dir/password.json chmod 777 -R $temp_dir $PRIVILEGED_CLI $CONTAINER_CLI rm -f hana || true $PRIVILEGED_CLI $CONTAINER_CLI run -d --name hana -p 39013:39013 -p 39017:39017 -p 39041-39045:39041-39045 -p 1128-1129:1128-1129 -p 59013-59014:59013-59014 \ --memory=8g \ --ulimit nofile=1048576:1048576 \ --sysctl kernel.shmmax=1073741824 \ --sysctl net.ipv4.ip_local_port_range='40000 60999' \ --sysctl kernel.shmmni=4096 \ --sysctl kernel.shmall=8388608 \ -v $temp_dir:/config:Z \ ${DB_IMAGE_HANA:-docker.io/saplabs/hanaexpress:2.00.072.00.20231123.1} \ --passwords-url file:///config/password.json \ --agree-to-sap-license # Give the container some time to start OUTPUT= while [[ $OUTPUT != *"Startup finished"* ]]; do echo "Waiting for HANA to start..." sleep 10 OUTPUT=$($PRIVILEGED_CLI $CONTAINER_CLI logs hana 2>&1) done echo "HANA successfully started" } cockroachdb() { cockroachdb_23_1 } cockroachdb_23_1() { $CONTAINER_CLI rm -f cockroach || true LOG_CONFIG=" sinks: stderr: channels: all filter: ERROR redact: false exit-on-error: true " $CONTAINER_CLI run -d --name=cockroach -m 6g -p 26257:26257 -p 8080:8080 ${DB_IMAGE_COCKROACHDB_23_1:-docker.io/cockroachdb/cockroach:v23.1.12} start-single-node \ --insecure --store=type=mem,size=0.25 --advertise-addr=localhost --log="$LOG_CONFIG" OUTPUT= while [[ $OUTPUT != *"CockroachDB node starting"* ]]; do echo "Waiting for CockroachDB to start..." sleep 10 # Note we need to redirect stderr to stdout to capture the logs OUTPUT=$($CONTAINER_CLI logs cockroach 2>&1) done echo "Enabling experimental box2d operators and some optimized settings for running the tests" #settings documented in https://www.cockroachlabs.com/docs/v22.1/local-testing.html#use-a-local-single-node-cluster-with-in-memory-storage $CONTAINER_CLI exec cockroach bash -c "cat <&1) done echo "Enabling experimental box2d operators and some optimized settings for running the tests" #settings documented in https://www.cockroachlabs.com/docs/v22.1/local-testing.html#use-a-local-single-node-cluster-with-in-memory-storage $CONTAINER_CLI exec cockroach bash -c "cat <&1) if [[ $OUTPUT == *"server is running"* ]]; then break; fi n=$((n+1)) echo "Waiting for TiDB to start..." sleep 3 done $CONTAINER_CLI run -it --rm --network tidb_network docker.io/mysql:8.2.0 mysql -htidb -P4000 -uroot -e "create database hibernate_orm_test; create user 'hibernate_orm_test' identified by 'hibernate_orm_test'; grant all on hibernate_orm_test.* to 'hibernate_orm_test';" if [ "$n" -ge 5 ]; then echo "TiDB failed to start and configure after 15 seconds" else echo "TiDB successfully started" fi } informix() { informix_14_10 } informix_14_10() { $PRIVILEGED_CLI $CONTAINER_CLI rm -f informix || true $PRIVILEGED_CLI $CONTAINER_CLI run --name informix --privileged -p 9088:9088 -e LICENSE=accept -e GL_USEGLU=1 -d ${DB_IMAGE_INFORMIX_14_10:-icr.io/informix/informix-developer-database:14.10.FC9W1DE} echo "Starting Informix. This can take a few minutes" # Give the container some time to start OUTPUT= n=0 until [ "$n" -ge 5 ] do OUTPUT=$($PRIVILEGED_CLI $CONTAINER_CLI logs informix 2>&1) if [[ $OUTPUT == *"Server Started"* ]]; then sleep 15 $PRIVILEGED_CLI $CONTAINER_CLI exec informix bash -l -c "export DB_LOCALE=en_US.utf8;export CLIENT_LOCALE=en_US.utf8;echo \"execute function task('create dbspace from storagepool', 'datadbs', '100 MB', '4');execute function task('create sbspace from storagepool', 'sbspace', '20 M', '0');create database dev in datadbs with log;\" > post_init.sql;dbaccess sysadmin post_init.sql" break; fi n=$((n+1)) echo "Waiting for Informix to start..." sleep 30 done if [ "$n" -ge 5 ]; then echo "Informix failed to start and configure after 5 minutes" else echo "Informix successfully started" fi } informix_12_10() { $PRIVILEGED_CLI $CONTAINER_CLI rm -f informix || true $PRIVILEGED_CLI $CONTAINER_CLI run --name informix --privileged -p 9088:9088 -e LICENSE=accept -e GL_USEGLU=1 -d ${DB_IMAGE_INFORMIX_12_10:-ibmcom/informix-developer-database:12.10.FC12W1DE} echo "Starting Informix. This can take a few minutes" # Give the container some time to start OUTPUT= n=0 until [ "$n" -ge 5 ] do OUTPUT=$($PRIVILEGED_CLI $CONTAINER_CLI logs informix 2>&1) if [[ $OUTPUT == *"login Information"* ]]; then sleep 15 $PRIVILEGED_CLI $CONTAINER_CLI exec informix bash -l -c "export DB_LOCALE=en_US.utf8;export CLIENT_LOCALE=en_US.utf8;echo \"execute function task('create dbspace from storagepool', 'datadbs', '100 MB', '4');execute function task('create sbspace from storagepool', 'sbspace', '20 M', '0');create database dev in datadbs with log;\" > post_init.sql;dbaccess sysadmin post_init.sql" break; fi n=$((n+1)) echo "Waiting for Informix to start..." sleep 30 done if [ "$n" -ge 5 ]; then echo "Informix failed to start and configure after 5 minutes" else echo "Informix successfully started" fi } if [ -z ${1} ]; then echo "No db name provided" echo "Provide one of:" echo -e "\tcockroachdb" echo -e "\tcockroachdb_23_1" echo -e "\tcockroachdb_22_2" echo -e "\tdb2" echo -e "\tdb2_11_5" echo -e "\tdb2_10_5" echo -e "\tdb2_spatial" echo -e "\tedb" echo -e "\tedb_16" echo -e "\tedb_15" echo -e "\tedb_14" echo -e "\tedb_12" echo -e "\thana" echo -e "\tmariadb" echo -e "\tmariadb_verylatest" echo -e "\tmariadb_11_4" echo -e "\tmariadb_11_1" echo -e "\tmariadb_10_11" echo -e "\tmariadb_10_4" echo -e "\tmssql" echo -e "\tmssql_2022" echo -e "\tmssql_2017" echo -e "\tmysql" echo -e "\tmysql_8_2" echo -e "\tmysql_8_1" echo -e "\tmysql_8_0" echo -e "\toracle" echo -e "\toracle_23" echo -e "\toracle_21" echo -e "\tpostgresql" echo -e "\tpostgresql_16" echo -e "\tpostgresql_15" echo -e "\tpostgresql_14" echo -e "\tpostgresql_13" echo -e "\tpostgresql_12" echo -e "\tsybase" echo -e "\ttidb" echo -e "\ttidb_5_4" echo -e "\informix" echo -e "\informix_14_10" echo -e "\informix_12_10" else ${1} fi