@@ -13,6 +13,7 @@ import javax.naming.Context
13
13
import javax.security.auth.Subject
14
14
import javax.security.auth.login.LoginContext
15
15
import kotlin.test.Ignore
16
+
16
17
// :replace-start: {
17
18
// "terms": {
18
19
// "PORT": "<port>",
@@ -36,7 +37,7 @@ internal class EnterpriseAuthTest {
36
37
37
38
fun createGSSAPICred () = runBlocking {
38
39
// :snippet-start: auth-creds-gssapi
39
- val credential = MongoCredential .createGSSAPICredential(" <username >" )
40
+ val credential = MongoCredential .createGSSAPICredential(" <Kerberos principal >" )
40
41
41
42
val settings = MongoClientSettings .builder()
42
43
.applyToClusterSettings { builder ->
@@ -51,7 +52,7 @@ internal class EnterpriseAuthTest {
51
52
52
53
fun serviceNameKey () = runBlocking {
53
54
// :snippet-start: service-name-key
54
- val credential = MongoCredential .createGSSAPICredential(" <username >" )
55
+ val credential = MongoCredential .createGSSAPICredential(" <Kerberos principal >" )
55
56
.withMechanismProperty(MongoCredential .SERVICE_NAME_KEY , " myService" )
56
57
// :snippet-end:
57
58
}
@@ -62,7 +63,7 @@ internal class EnterpriseAuthTest {
62
63
loginContext.login()
63
64
val subject: Subject = loginContext.subject
64
65
65
- val credential = MongoCredential .createGSSAPICredential(" <username >" )
66
+ val credential = MongoCredential .createGSSAPICredential(" <Kerberos principal >" )
66
67
.withMechanismProperty(MongoCredential .JAVA_SUBJECT_KEY , subject)
67
68
// :snippet-end:
68
69
}
@@ -74,7 +75,7 @@ internal class EnterpriseAuthTest {
74
75
val myLoginContext = " myContext"
75
76
/* Login context defaults to "com.sun.security.jgss.krb5.initiate"
76
77
if unspecified in KerberosSubjectProvider */
77
- val credential = MongoCredential .createGSSAPICredential(" <username >" )
78
+ val credential = MongoCredential .createGSSAPICredential(" <Kerberos principal >" )
78
79
.withMechanismProperty(
79
80
MongoCredential .JAVA_SUBJECT_PROVIDER_KEY ,
80
81
KerberosSubjectProvider (myLoginContext)
@@ -84,7 +85,7 @@ internal class EnterpriseAuthTest {
84
85
85
86
fun ldapCredential () = runBlocking {
86
87
// :snippet-start: ldap-mongo-credential
87
- val credential = MongoCredential .createPlainCredential(" <username>" , " $external " , " <password>" .toCharArray())
88
+ val credential = MongoCredential .createPlainCredential(" <LDAP username>" , " $external " , " <password>" .toCharArray())
88
89
89
90
val settings = MongoClientSettings .builder()
90
91
.applyToClusterSettings { builder ->
@@ -99,29 +100,29 @@ internal class EnterpriseAuthTest {
99
100
100
101
fun gssapiConnectionString () = runBlocking {
101
102
// :snippet-start: gssapi-connection-string
102
- val connectionString = ConnectionString (" <username >@<hostname>:<port>/?authSource=$external &authMechanism=GSSAPI" )
103
+ val connectionString = ConnectionString (" <Kerberos principal >@<hostname>:<port>/?authSource=$external &authMechanism=GSSAPI" )
103
104
val mongoClient = MongoClient .create(connectionString)
104
105
// :snippet-end:
105
106
}
106
107
107
108
fun gssapiPropertiesConnectionString () = runBlocking {
108
109
// :snippet-start: gssapi-properties-connection-string
109
- val connectionString = ConnectionString (" <username >@<hostname>:<port>/?authSource=$external &authMechanism=GSSAPI&authMechanismProperties=SERVICE_NAME:myService" )
110
+ val connectionString = ConnectionString (" <Kerberos principal >@<hostname>:<port>/?authSource=$external &authMechanism=GSSAPI&authMechanismProperties=SERVICE_NAME:myService" )
110
111
val mongoClient = MongoClient .create(connectionString)
111
112
// :snippet-end:
112
113
}
113
114
114
115
fun ldapConnectionString () = runBlocking {
115
116
// :snippet-start: ldap-connection-string
116
- val connectionString = ConnectionString (" <username>:<password>@<hostname>:<port>/?authSource=$external &authMechanism=PLAIN" )
117
+ val connectionString = ConnectionString (" <LDAP username>:<password>@<hostname>:<port>/?authSource=$external &authMechanism=PLAIN" )
117
118
val mongoClient = MongoClient .create(connectionString)
118
119
// :snippet-end:
119
120
}
120
121
121
122
fun oidcAzureConnectionString () = runBlocking {
122
123
// :snippet-start: oidc-azure-connection-string
123
124
val connectionString = ConnectionString (
124
- " mongodb://<username >@<hostname>:<port>/?" +
125
+ " mongodb://<OIDC principal >@<hostname>:<port>/?" +
125
126
" ?authMechanism=MONGODB-OIDC" +
126
127
" &authMechanismProperties=ENVIRONMENT:azure,TOKEN_RESOURCE:<percent-encoded audience>" )
127
128
val mongoClient = MongoClient .create(connectionString)
@@ -130,7 +131,7 @@ internal class EnterpriseAuthTest {
130
131
131
132
fun oidcAzureCredential () = runBlocking {
132
133
// :snippet-start: oidc-azure-credential
133
- val credential = MongoCredential .createOidcCredential(" <username >" )
134
+ val credential = MongoCredential .createOidcCredential(" <OIDC principal >" )
134
135
.withMechanismProperty(" ENVIRONMENT" , " azure" )
135
136
.withMechanismProperty(" TOKEN_RESOURCE" , " <audience>" )
136
137
@@ -147,7 +148,7 @@ internal class EnterpriseAuthTest {
147
148
fun oidcGCPConnectionString () = runBlocking {
148
149
// :snippet-start: oidc-gcp-connection-string
149
150
val connectionString = ConnectionString (
150
- " mongodb://<hostname>:<port>/?" +
151
+ " mongodb://<OIDC principal>@< hostname>:<port>/?" +
151
152
" authMechanism=MONGODB-OIDC" +
152
153
" &authMechanismProperties=ENVIRONMENT:gcp,TOKEN_RESOURCE:<percent-encoded audience>" )
153
154
val mongoClient = MongoClient .create(connectionString)
@@ -156,7 +157,7 @@ internal class EnterpriseAuthTest {
156
157
157
158
fun oidcGCPCredential () = runBlocking {
158
159
// :snippet-start: oidc-gcp-credential
159
- val credential = MongoCredential .createOidcCredential(" <username >" )
160
+ val credential = MongoCredential .createOidcCredential(" <OIDC principal >" )
160
161
.withMechanismProperty(" ENVIRONMENT" , " gcp" )
161
162
.withMechanismProperty(" TOKEN_RESOURCE" , " <audience>" )
162
163
0 commit comments