blob: 3b5c9eed07278119aa1826f37a930c0a78e51a96 [file]
#region License
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
#endregion
using System;
using System.Net.Http;
using System.Threading.Tasks;
using Gremlin.Net.Driver;
using Gremlin.Net.Driver.Remote;
using Gremlin.Net.Process.Traversal;
using Xunit;
namespace Gremlin.Net.IntegrationTest.Driver
{
/// <summary>
/// Integration tests for authentication interceptors against the secure Gremlin Server
/// (port 45941, SSL + SimpleAuthenticator).
/// </summary>
public class AuthIntegrationTests
{
private static readonly string TestHost = ConfigProvider.Configuration["TestServerIpAddress"]!;
private static readonly int TestSecurePort = Convert.ToInt32(ConfigProvider.Configuration["TestSecureServerPort"]);
private GremlinClient CreateSecureClient(Func<HttpRequestContext, Task>[]? interceptors = null)
{
var gremlinServer = new GremlinServer(TestHost, TestSecurePort, enableSsl: true);
return new GremlinClient(gremlinServer,
connectionSettings: new ConnectionSettings { SkipCertificateValidation = true },
interceptors: interceptors);
}
[Fact]
public async Task ShouldAuthenticateWithBasicAuth()
{
// The secure server uses SimpleAuthenticator with credentials: stephen/password
using var gremlinClient = CreateSecureClient(
new[] { Auth.BasicAuth("stephen", "password") });
var response = await gremlinClient.SubmitAsync<long>("g.inject(1).count()");
Assert.Single(response);
}
[Fact]
public async Task ShouldAuthenticateWithBasicAuthViaDriverRemoteConnection()
{
// Test through DriverRemoteConnection + traversal
using var client = CreateSecureClient(
new[] { Auth.BasicAuth("stephen", "password") });
using var remote = new DriverRemoteConnection(client, "gmodern");
var g = AnonymousTraversalSource.Traversal().With(remote);
var count = await g.V().Count().Promise(t => t.Next());
Assert.True(count > 0);
}
[Fact]
public async Task ShouldFailWithWrongCredentials()
{
using var gremlinClient = CreateSecureClient(
new[] { Auth.BasicAuth("stephen", "wrongpassword") });
// The server returns auth errors as JSON (not GraphBinary), so Connection
// extracts the message and throws HttpRequestException.
var ex = await Assert.ThrowsAsync<HttpRequestException>(
() => gremlinClient.SubmitAsync<long>("g.inject(1).count()"));
Assert.Contains("incorrect", ex.Message, StringComparison.OrdinalIgnoreCase);
}
[Fact]
public async Task ShouldFailWithNoCredentials()
{
using var gremlinClient = CreateSecureClient();
var ex = await Assert.ThrowsAsync<HttpRequestException>(
() => gremlinClient.SubmitAsync<long>("g.inject(1).count()"));
Assert.Contains("credentials", ex.Message, StringComparison.OrdinalIgnoreCase);
}
}
}