@@ -21,11 +21,12 @@ import (
21
21
"github.com/stretchr/testify/assert"
22
22
"github.com/stretchr/testify/require"
23
23
"go.opentelemetry.io/collector/component/componenttest"
24
+ "go.opentelemetry.io/collector/extension"
24
25
"go.opentelemetry.io/collector/extension/extensionauth"
25
26
"go.uber.org/zap"
26
27
)
27
28
28
- func newTestExtension (t * testing.T , cfg * Config ) extensionauth. Server {
29
+ func newTestExtension (t * testing.T , cfg * Config ) extension. Extension {
29
30
t .Helper ()
30
31
return newExtension (cfg , zap .NewNop ())
31
32
}
@@ -58,15 +59,18 @@ func TestOIDCAuthenticationSucceeded(t *testing.T) {
58
59
token , err := oidcServer .token (payload )
59
60
require .NoError (t , err )
60
61
62
+ srvAuth , ok := p .(extensionauth.Server )
63
+ require .True (t , ok )
64
+
61
65
// test
62
- ctx , err := p .Authenticate (context .Background (), map [string ][]string {"authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
66
+ ctx , err := srvAuth .Authenticate (context .Background (), map [string ][]string {"authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
63
67
64
68
// verify
65
69
assert .NoError (t , err )
66
70
assert .NotNil (t , ctx )
67
71
68
72
// test, upper-case header
69
- ctx , err = p .Authenticate (context .Background (), map [string ][]string {"Authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
73
+ ctx , err = srvAuth .Authenticate (context .Background (), map [string ][]string {"Authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
70
74
71
75
// verify
72
76
assert .NoError (t , err )
@@ -206,10 +210,11 @@ func TestOIDCFailedToLoadIssuerCAFromPathInvalidContent(t *testing.T) {
206
210
207
211
func TestOIDCInvalidAuthHeader (t * testing.T ) {
208
212
// prepare
209
- p := newTestExtension (t , & Config {
213
+ p , ok := newTestExtension (t , & Config {
210
214
Audience : "some-audience" ,
211
215
IssuerURL : "http://example.com" ,
212
- })
216
+ }).(extensionauth.Server )
217
+ require .True (t , ok )
213
218
214
219
// test
215
220
ctx , err := p .Authenticate (context .Background (), map [string ][]string {"authorization" : {"some-value" }})
@@ -221,10 +226,11 @@ func TestOIDCInvalidAuthHeader(t *testing.T) {
221
226
222
227
func TestOIDCNotAuthenticated (t * testing.T ) {
223
228
// prepare
224
- p := newTestExtension (t , & Config {
229
+ p , ok := newTestExtension (t , & Config {
225
230
Audience : "some-audience" ,
226
231
IssuerURL : "http://example.com" ,
227
- })
232
+ }).(extensionauth.Server )
233
+ require .True (t , ok )
228
234
229
235
// test
230
236
ctx , err := p .Authenticate (context .Background (), make (map [string ][]string ))
@@ -266,8 +272,11 @@ func TestFailedToVerifyToken(t *testing.T) {
266
272
err = p .Start (context .Background (), componenttest .NewNopHost ())
267
273
require .NoError (t , err )
268
274
275
+ srvAuth , ok := p .(extensionauth.Server )
276
+ require .True (t , ok )
277
+
269
278
// test
270
- ctx , err := p .Authenticate (context .Background (), map [string ][]string {"authorization" : {"Bearer some-token" }})
279
+ ctx , err := srvAuth .Authenticate (context .Background (), map [string ][]string {"authorization" : {"Bearer some-token" }})
271
280
272
281
// verify
273
282
assert .Error (t , err )
@@ -329,8 +338,11 @@ func TestFailedToGetGroupsClaimFromToken(t *testing.T) {
329
338
token , err := oidcServer .token (payload )
330
339
require .NoError (t , err )
331
340
341
+ srvAuth , ok := p .(extensionauth.Server )
342
+ require .True (t , ok )
343
+
332
344
// test
333
- ctx , err := p .Authenticate (context .Background (), map [string ][]string {"authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
345
+ ctx , err := srvAuth .Authenticate (context .Background (), map [string ][]string {"authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
334
346
335
347
// verify
336
348
assert .ErrorIs (t , err , tt .expectedError )
0 commit comments