/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.tinkerpop.gremlin.server; import org.apache.commons.lang.exception.ExceptionUtils; import org.apache.tinkerpop.gremlin.driver.Client; import org.apache.tinkerpop.gremlin.driver.Cluster; import org.apache.tinkerpop.gremlin.driver.exception.ResponseException; import org.apache.tinkerpop.gremlin.driver.ser.Serializers; import org.apache.tinkerpop.gremlin.server.auth.SimpleAuthenticator; import org.junit.Test; import java.util.HashMap; import java.util.List; import java.util.Map; import java.util.concurrent.TimeoutException; import static org.hamcrest.CoreMatchers.startsWith; import static org.hamcrest.MatcherAssert.assertThat; import static org.junit.Assert.assertEquals; import static org.junit.Assert.fail; /** * @author Stephen Mallette (http://stephen.genoprime.com) * @deprecated As of release 3.1.1-incubating, replaced by {@link GremlinServerAuthIntegrateTest} * @see <a href="https://issues.apache.org/jira/browse/TINKERPOP-981">TINKERPOP-981</a> */ @Deprecated public class GremlinServerAuthOldIntegrateTest extends AbstractGremlinServerIntegrationTest { /** * Configure specific Gremlin Server settings for specific tests. */ @Override public Settings overrideSettings(final Settings settings) { final Settings.AuthenticationSettings authSettings = new Settings.AuthenticationSettings(); authSettings.className = SimpleAuthenticator.class.getName(); // use a credentials graph with one user in it: stephen/password final Map<String,Object> authConfig = new HashMap<>(); authConfig.put(SimpleAuthenticator.CONFIG_CREDENTIALS_DB, "conf/tinkergraph-empty.properties"); authConfig.put(SimpleAuthenticator.CONFIG_CREDENTIALS_LOCATION, "data/credentials.kryo"); authSettings.config = authConfig; settings.authentication = authSettings; final String nameOfTest = name.getMethodName(); switch (nameOfTest) { case "shouldAuthenticateOverSslWithPlainText": case "shouldFailIfSslEnabledOnServerButNotClient": final Settings.SslSettings sslConfig = new Settings.SslSettings(); sslConfig.enabled = true; settings.ssl = sslConfig; break; } return settings; } @Test public void shouldFailIfSslEnabledOnServerButNotClient() throws Exception { final Cluster cluster = TestClientFactory.open(); final Client client = cluster.connect(); try { client.submit("1+1").all().get(); fail("This should not succeed as the client did not enable SSL"); } catch(Exception ex) { final Throwable root = ExceptionUtils.getRootCause(ex); assertEquals(TimeoutException.class, root.getClass()); assertThat(root.getMessage(), startsWith("Timed out while waiting for an available host")); } finally { cluster.close(); } } @Test public void shouldAuthenticateWithPlainText() throws Exception { final Cluster cluster = TestClientFactory.build().credentials("stephen", "password").create(); final Client client = cluster.connect(); try { assertEquals(2, client.submit("1+1").all().get().get(0).getInt()); assertEquals(3, client.submit("1+2").all().get().get(0).getInt()); assertEquals(4, client.submit("1+3").all().get().get(0).getInt()); } finally { cluster.close(); } } @Test public void shouldAuthenticateOverSslWithPlainText() throws Exception { final Cluster cluster = TestClientFactory.build() .enableSsl(true) .credentials("stephen", "password").create(); final Client client = cluster.connect(); try { assertEquals(2, client.submit("1+1").all().get().get(0).getInt()); assertEquals(3, client.submit("1+2").all().get().get(0).getInt()); assertEquals(4, client.submit("1+3").all().get().get(0).getInt()); } finally { cluster.close(); } } @Test public void shouldFailAuthenticateWithPlainTextNoCredentials() throws Exception { final Cluster cluster = TestClientFactory.open(); final Client client = cluster.connect(); try { client.submit("1+1").all().get(); fail("This should not succeed as the client did not provide credentials"); } catch(Exception ex) { final Throwable root = ExceptionUtils.getRootCause(ex); assertEquals(ResponseException.class, root.getClass()); // removed this assert as the text of the message changes based on kerberos config - stupid kerberos // assertThat(root.getMessage(), startsWith("Invalid name provided")); } finally { cluster.close(); } } @Test public void shouldFailAuthenticateWithPlainTextBadPassword() throws Exception { final Cluster cluster = TestClientFactory.build().credentials("stephen", "bad").create(); final Client client = cluster.connect(); try { client.submit("1+1").all().get(); fail("This should not succeed as the client did not provide valid credentials"); } catch(Exception ex) { final Throwable root = ExceptionUtils.getRootCause(ex); assertEquals(ResponseException.class, root.getClass()); assertEquals("Username and/or password are incorrect", root.getMessage()); } finally { cluster.close(); } } @Test public void shouldFailAuthenticateWithPlainTextBadUsername() throws Exception { final Cluster cluster = TestClientFactory.build().credentials("marko", "password").create(); final Client client = cluster.connect(); try { client.submit("1+1").all().get(); } catch(Exception ex) { final Throwable root = ExceptionUtils.getRootCause(ex); assertEquals(ResponseException.class, root.getClass()); assertEquals("Username and/or password are incorrect", root.getMessage()); } finally { cluster.close(); } } @Test public void shouldAuthenticateWithPlainTextOverJSONSerialization() throws Exception { final Cluster cluster = TestClientFactory.build().serializer(Serializers.GRAPHSON) .credentials("stephen", "password").create(); final Client client = cluster.connect(); try { assertEquals(2, client.submit("1+1").all().get().get(0).getInt()); assertEquals(3, client.submit("1+2").all().get().get(0).getInt()); assertEquals(4, client.submit("1+3").all().get().get(0).getInt()); } finally { cluster.close(); } } @Test public void shouldAuthenticateWithPlainTextOverGraphSONSerialization() throws Exception { final Cluster cluster = TestClientFactory.build().serializer(Serializers.GRAPHSON_V1D0) .credentials("stephen", "password").create(); final Client client = cluster.connect(); try { assertEquals(2, client.submit("1+1").all().get().get(0).getInt()); assertEquals(3, client.submit("1+2").all().get().get(0).getInt()); assertEquals(4, client.submit("1+3").all().get().get(0).getInt()); } finally { cluster.close(); } } @Test public void shouldAuthenticateAndWorkWithVariablesOverJsonSerialization() throws Exception { final Cluster cluster = TestClientFactory.build().serializer(Serializers.GRAPHSON) .credentials("stephen", "password").create(); final Client client = cluster.connect(name.getMethodName()); try { Map vertex = (Map) client.submit("v=graph.addVertex(\"name\", \"stephen\")").all().get().get(0).getObject(); Map<String, List<Map>> properties = (Map) vertex.get("properties"); assertEquals("stephen", properties.get("name").get(0).get("value")); final Map vpName = (Map)client.submit("v.property('name')").all().get().get(0).getObject(); assertEquals("stephen", vpName.get("value")); } finally { cluster.close(); } } @Test public void shouldAuthenticateAndWorkWithVariablesOverGraphSONSerialization() throws Exception { final Cluster cluster = TestClientFactory.build().serializer(Serializers.GRAPHSON_V1D0) .credentials("stephen", "password").create(); final Client client = cluster.connect(name.getMethodName()); try { Map vertex = (Map) client.submit("v=graph.addVertex('name', 'stephen')").all().get().get(0).getObject(); Map<String, List<Map>> properties = (Map) vertex.get("properties"); assertEquals("stephen", properties.get("name").get(0).get("value")); final Map vpName = (Map)client.submit("v.property('name')").all().get().get(0).getObject(); assertEquals("stephen", vpName.get("value")); } finally { cluster.close(); } } }