| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| |
| import assert from 'assert'; |
| import { AssertionError } from 'assert'; |
| import anon from '../../lib/process/anonymous-traversal.js'; |
| import Bytecode from '../../lib/process/bytecode.js'; |
| import { getSecureConnectionWithPlainTextSaslAuthenticator, getDriverRemoteConnection } from '../helper.js'; |
| import PlainTextSaslAuthenticator from '../../lib/driver/auth/plain-text-sasl-authenticator.js'; |
| |
| let connection; |
| let badServerAuthUrl; |
| if (process.env.DOCKER_ENVIRONMENT === 'true') { |
| badServerAuthUrl = 'ws://gremlin-server-test-js:45941/gremlin'; |
| } else { |
| badServerAuthUrl = 'ws://localhost:45941/gremlin'; |
| } |
| |
| describe('DriverRemoteConnection', function () { |
| context('with PlainTextSaslAuthenticator', function () { |
| this.timeout(20000); |
| |
| afterEach(function () { |
| return connection.close(); |
| }); |
| |
| describe('#submit()', function () { |
| it('should send the request with valid credentials and parse the response', function () { |
| connection = getSecureConnectionWithPlainTextSaslAuthenticator(null, 'stephen', 'password'); |
| |
| return connection.submit(new Bytecode().addStep('V', []).addStep('tail', [])) |
| .then(function (response) { |
| assert.ok(response); |
| assert.ok(response.traversers); |
| }); |
| }); |
| |
| it('should send the request with invalid credentials and parse the response error', function () { |
| connection = getSecureConnectionWithPlainTextSaslAuthenticator(null, 'Bob', 'password'); |
| |
| return connection.submit(new Bytecode().addStep('V', []).addStep('tail', [])) |
| .then(function() { |
| assert.fail("invalid credentials should throw"); |
| }) |
| .catch(function (err) { |
| assert.ok(err); |
| assert.ok(err.message.indexOf('401') > 0); |
| }); |
| }); |
| |
| it('should return error when using ws:// for a TLS configured server', function () { |
| const authenticator = new PlainTextSaslAuthenticator('stephen', 'password'); |
| connection = getDriverRemoteConnection(badServerAuthUrl, { |
| authenticator: authenticator, |
| rejectUnauthorized: false |
| }); |
| |
| return connection.submit(new Bytecode().addStep('V', []).addStep('tail', [])) |
| .then(function() { |
| assert.fail("server is running TLS and trying to connect with ws:// so this should result in error thrown"); |
| }) |
| .catch(function (err) { |
| if (err instanceof AssertionError) throw err; |
| assert.ok(err); |
| assert.ok(err.message === 'socket hang up'); |
| }); |
| }); |
| |
| it('should return error when using ws:// for a TLS configured server', function () { |
| const authenticator = new PlainTextSaslAuthenticator('stephen', 'password'); |
| connection = getDriverRemoteConnection(badServerAuthUrl, { |
| authenticator: authenticator, |
| rejectUnauthorized: false |
| }); |
| |
| const g = anon.traversal().with_(connection); |
| return g.V().toList().then(function() { |
| assert.fail("server is running TLS and trying to connect with ws:// so this should result in error thrown"); |
| }).catch(function(err) { |
| if (err instanceof AssertionError) throw err; |
| assert.ok(err); |
| assert.ok(err.message === 'socket hang up'); |
| }); |
| }); |
| }); |
| }); |
| }); |