使用 psycopg2 连接高斯数据库报错 failed: none of the server‘s SASL authentication mechanisms are supported解决方法

  1. 使用 命令安装 安装 psycopg2

pip3 install psycopg2

  1. 编写python文件 test2.py,连接数据库。

import psycopg2

#创建连接对象

conn=psycopg2.connect(dbname="db_tpcc",user="tpcc_user",password="password",host="10.201.65.207",port=30100)

cur=conn.cursor() #创建指针对象

#创建连接对象(SSl连接)

#conn = psycopg2.connect(dbname="db_tpcc", user="tpcc_user", password="password", host="10.201.65.207", port=30100,sslmode="verify-ca", sslcert="client.crt",sslkey="client.key.unsecure",sslrootcert="ca.pem")

cur=conn.cursor() #创建指针对象

# 创建表

cur.execute("CREATE TABLE student(id integer,name varchar,sex varchar);")

#插入数据

cur.execute("INSERT INTO student(id,name,sex) VALUES(%s,%s,%s)",(1,'Aspirin','M'))

cur.execute("INSERT INTO student(id,name,sex) VALUES(%s,%s,%s)",(2,'Taxol','F'))

cur.execute("INSERT INTO student(id,name,sex) VALUES(%s,%s,%s)",(3,'Dixheral','M'))

# 获取结果

cur.execute('SELECT * FROM student')

results=cur.fetchall()

print (results)

# 关闭连接

conn.commit()

cur.close()

conn.close()

  1. 运行test2.py 报错

conn = _connect(dsn, connection_factory=connection_factory, **kwasync)

psycopg2.OperationalError: connection to server at "10.201.65.207", port 30100 failed: none of the server's SASL authentication mechanisms are supported

  1. 大部分程序猿采用如下方法解决

A.执行命令修改加密参数 gs_guc reload -N all -I all -c "password_encryption_type=1";

B.修改数据库每台机器的pg_hba.conf文件

切换到你们那边的gaussdb用户,在所有DN节点都要修改如下内容

cd /data/cluster/data/dn/dn_6001(目录改成你那边的)

vi pg_hba.conf ,将下图标注的sha256改为md5

使用 psycopg2 连接高斯数据库报错 failed: none of the server‘s SASL authentication mechanisms are supported解决方法_第1张图片

C.改完重启数据库

停止:gs_om -t stop

启动:gs_om -t start

D.修改了加密方式,以前创建的用户都不能登录,使用超级用户RsAdmin免密登录,使用下面的命令修改用户密码

执行 alter user test_user3 identified by 'password'

MD5这种加密方式,是不安全的加密方式,华为官方也不推荐.我们下面讨论,不修改高斯数据库加密方式的前提下处理问题

  1. 华为官网https://opengauss.org/zh/download/下载对应版本的Python-psycopg2_3.1.1,目前只支持LINUX系统,还不支持WINDOWS

使用 psycopg2 连接高斯数据库报错 failed: none of the server‘s SASL authentication mechanisms are supported解决方法_第2张图片

下载后文件名如下openGauss-3.1.1-openEuler-aarch64-Python.tar.gz

  1. 将包上传到 LINUX 的任意目录下,这里为 /setup/openGauss,并解压

tar -zxvf openGauss-3.1.1-openEuler-aarch64-Python.tar.gz

解压后目录结构如下

  1. 将依赖的lib 文件复制到/usr/lib64

cp lib/* /usr/lib64

这里提示是否覆盖,全部选否

  1. 将psycopg2文件夹 copy 到 /usr/lib/python3.7/site-packages 并授权

如果不知道 site-packages的路径,使用下面的命令查找

find /usr -name *site-p*

使用 psycopg2 连接高斯数据库报错 failed: none of the server‘s SASL authentication mechanisms are supported解决方法_第3张图片

cp -r /setup/openGauss/psycopg2 /usr/lib/python3.7/site-packages/

chmod -R 755 /usr/lib/python3.7/site-packages/psycopg2

  1. 拿step2编写的test2文件运行,运行成功

python3 test2.py

使用 psycopg2 连接高斯数据库报错 failed: none of the server‘s SASL authentication mechanisms are supported解决方法_第4张图片

这里我们的连接方式使用的是明文方式,绕过了 pip install psycopg2 的MD5 加密方式

conn=psycopg2.connect(dbname="db_tpcc",user="tpcc_user",password="password",host="10.201.65.207",port=30100)

  1. 为了更安全的网络连接,我们应该使用证书的链接方式

注释掉明文链接,使用下面的连接方式

conn = psycopg.connect(dbname="db_tpcc", user="tpcc_user", password="password", host="10.201.65.207", port=30100,sslmode="verify-ca", sslcert="client.crt",sslkey="client.key",sslrootcert="ca.pem")

  1. 登录高斯数据库服务器端,并编写 client 端生成脚本genCertificate_client.sh

vim /setup/genCertificate_client.sh

脚本内容如下:

curDir=/setup

logFile=genCertificate.log

user_pwd=password #这里配置为客户端运行python程序的用户密码

function genCertificate()

{

echo "Start to genCertificate" >> ${logFile}

openssl=$(openssl version)

ca_dir=$(awk '/Where everything is kept/{print $3}' /etc/pki/tls/openssl.cnf)

if [ -z "${openssl}" -o -z "${ca_dir}" ]; then

echo "genCertificate failed: openssl is not installed" >> ${logFile}

exit 1

fi

mkdir -p ${curDir}/certificate

cd ${curDir}/certificate

if [ "${string:0:1}" == "." ]; then

ca_dir=${curDir}/certificate/${ca_dir}

fi

mkdir -p ${ca_dir}/newcerts

touch ${ca_dir}/index.txt

sed -i "s/^unique_subject =.*/unique_subject = no/" ${ca_dir}/index.txt.attr

echo '01' >> ${ca_dir}/serial

# openssl genrsa -out ca.key 2048

# expect <<-EOF

# spawn openssl req -new -key ca.key -out ca.csr

# expect "Country Name" {send "CN\r"}

# expect "State or Province Name" {send "GD\r"}

# expect "Locality Name" {send "SZ\r"}

# expect "Organization Name" {send "HW\r"}

# expect "Organizational Unit Name" {send "OM\r"}

# expect "Common Name" {send "GAUSS\r"}

# expect "Email Address" {send "\r"}

# expect "A challenge password" {send "\r"}

# expect "An optional company name" {send "\r"}

# expect "]#" {send "\r"}

#EOF

# openssl x509 -req -days 3650 -in ca.csr -signkey ca.key -out ca.crt

expect <<-EOF

spawn clear

spawn openssl genrsa -des3 -out client.key 2048

expect "Enter pass phrase for client.key:"

send "${user_pwd}\r"

expect "Verifying - Enter pass phrase for client.key:"

send "${user_pwd}\r"

send "\r"

expect "]#" {send "\r"}

EOF

expect <<-EOF

spawn openssl req -new -key client.key -out client.csr

expect "Enter pass phrase for client.key" {send "${user_pwd}\r"}

expect "Country Name" {send "CN\r"}

expect "State or Province Name" {send "GD\r"}

expect "Locality Name" {send "SZ\r"}

expect "Organization Name" {send "HW\r"}

expect "Organizational Unit Name" {send "OM\r"}

expect "Common Name" {send "GAUSS\r"}

expect "Email Address" {send "\r"}

expect "A challenge password" {send "\r"}

expect "An optional company name" {send "\r"}

expect "]#" {send "\r"}

EOF

expect <<-EOF

spawn openssl ca -in client.csr -out client.crt -cert ca.crt -keyfile ca.key

expect "Sign the certificate" {send "y\r"}

expect "certificate requests certified" {send "y\r"}

expect "]#" {send "\r"}

EOF

openssl x509 -in ca.crt -out ca.pem

if [ ! -s ${curDir}/certificate/ca.pem -o ! -s ${curDir}/certificate/client.crt -o ! -s ${curDir}/certificate/client.key ]; then

echo "genCertificate failed, please execute \"sh ${curDir}/install_cluster.sh genCertificate\" cmd for details" >> ${logFile}

exit 1

fi

echo "genCertificate finished, begin to deliver it to all nodes" >> ${logFile}

cat client.crt > client.pem

shift

while [ $# != 0 ]; do

echo "Start to deliver cert to $1" >> ${logFile}

scpCmd="scp -q ${curDir}/certificate/ca.pem ${curDir}/certificate/client.key ${curDir}/certificate/client.pem root@$1:/home/${user}/sslcrt"

executeRemoteCmd "${scpCmd}" ${root_pwd}

sshCmd="ssh -t root@$1 \"chown -R ${user}:${user_group} /home/${user}/sslcrt\""

executeRemoteCmd "${sshCmd}" ${root_pwd}

shift

done

echo "End to genCertificate" >> ${logFile}

}

genCertificate

  1. 赋予脚本执行权限,并copy 高斯安装目录下的certificate目录到setup目录下

chmod +x /setup/genCertificate_client.sh

cp -r /data/GaussDBInstaller/certificate /setup/

  1. 运行脚本genCertificate_client.sh

./genCertificate_client.sh

  1. 从python程序的客户端运行 scp 命令,copy 文件到 test2.py的目录下

scp 10.201.65.207:/setup/certificate/ca.pem /setup/

scp 10.201.65.207:/setup/certificate/client.key /setup/

scp 10.201.65.207:/setup/certificate/client.crt /setup/

  1. 运行 test2.py

提示输入Enter PEM pass phrase,这里为我们 step11 中配置的客户端用户密码 。

输入密码后 test2.py运行成功

  1. 在真实应用中我们不可能每次输入密码,修改 client key 为不需要每次输入密码

openssl rsa -in client.key -out client.key.unsecure

  1. 修改程序连接,并运行test2.py,不需要输入密码,python程序运行成功

修改连接为

conn = psycopg2.connect(dbname="db_tpcc", user="tpcc_user", password="password", host="10.201.65.207", port=30100,sslmode="verify-ca", sslcert="client.crt",sslkey="client.key.unsecure",sslrootcert="ca.pem")

python3 test2.py

你可能感兴趣的:(数据库,python,服务器)