Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[extensionauthtest] Remove extensionauthtest.MockClient #12567

Merged
merged 4 commits into from
Mar 6, 2025
Merged
Show file tree
Hide file tree
Changes from 3 commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 26 additions & 0 deletions .chloggen/mx-psi_seal-them-all.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
# Use this changelog template to create an entry for release notes.

# One of 'breaking', 'deprecation', 'new_component', 'enhancement', 'bug_fix'
change_type: breaking

# The name of the component, or a single word describing the area of concern, (e.g. otlpreceiver)
component: extensionauthtest

# A brief description of the change. Surround your text with quotes ("") if it needs to start with a backtick (`).
note: Remove the `extensionauthtest.MockClient` struct.

# One or more tracking issues or pull requests related to the change
issues: [12567]

# (Optional) One or more lines of additional information to render under the primary note.
# These lines will be padded with 2 spaces and then inserted directly into the document.
# Use pipe (|) for multiline entries.
subtext: |
Use the standard `extensionauth.NewClient` constructor to create a client with a specific mock implementation. Use `extensionauthtest.NewErrorClient` to create a client that always returns an error.

# Optional: The change log or logs in which this entry should be included.
# e.g. '[user]' or '[user, api]'
# Include 'user' if the change is relevant to end users.
# Include 'api' if there is a change to a library API.
# Default: '[user]'
change_logs: [api]
14 changes: 10 additions & 4 deletions config/configgrpc/configgrpc_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,6 @@ import (
"go.opentelemetry.io/collector/config/configopaque"
"go.opentelemetry.io/collector/config/configtls"
"go.opentelemetry.io/collector/extension/extensionauth"
"go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest"
"go.opentelemetry.io/collector/pdata/ptrace/ptraceotlp"
)

Expand All @@ -41,6 +40,13 @@ func mustNewServerAuth(t *testing.T, opts ...extensionauth.ServerOption) extensi
return srv
}

func mustNewClientAuth(t *testing.T, opts ...extensionauth.ClientOption) extensionauth.Client {
t.Helper()
client, err := extensionauth.NewClient(opts...)
require.NoError(t, err)
return client
}

func TestNewDefaultKeepaliveClientConfig(t *testing.T) {
expectedKeepaliveClientConfig := &KeepaliveClientConfig{
Time: time.Second * 10,
Expand Down Expand Up @@ -171,7 +177,7 @@ func TestAllGrpcClientSettings(t *testing.T) {
},
host: &mockHost{
ext: map[component.ID]component.Component{
testAuthID: &extensionauthtest.MockClient{},
testAuthID: mustNewClientAuth(t),
},
},
},
Expand Down Expand Up @@ -200,7 +206,7 @@ func TestAllGrpcClientSettings(t *testing.T) {
},
host: &mockHost{
ext: map[component.ID]component.Component{
testAuthID: &extensionauthtest.MockClient{},
testAuthID: mustNewClientAuth(t),
},
},
},
Expand Down Expand Up @@ -229,7 +235,7 @@ func TestAllGrpcClientSettings(t *testing.T) {
},
host: &mockHost{
ext: map[component.ID]component.Component{
testAuthID: &extensionauthtest.MockClient{},
testAuthID: mustNewClientAuth(t),
},
},
},
Expand Down
3 changes: 0 additions & 3 deletions config/configgrpc/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,6 @@ require (
go.opentelemetry.io/collector/config/configopaque v1.27.0
go.opentelemetry.io/collector/config/configtls v1.27.0
go.opentelemetry.io/collector/extension/extensionauth v0.121.0
go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest v0.121.0
go.opentelemetry.io/collector/pdata v1.27.0
go.opentelemetry.io/collector/pdata/testdata v0.121.0
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.59.0
Expand Down Expand Up @@ -80,5 +79,3 @@ replace go.opentelemetry.io/collector/component => ../../component
replace go.opentelemetry.io/collector/component/componenttest => ../../component/componenttest

replace go.opentelemetry.io/collector/consumer => ../../consumer

replace go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest => ../../extension/extensionauth/extensionauthtest
55 changes: 28 additions & 27 deletions config/confighttp/confighttp_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -34,19 +34,11 @@ import (
"go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest"
)

type customRoundTripper struct{}

var _ http.RoundTripper = (*customRoundTripper)(nil)

func (c *customRoundTripper) RoundTrip(*http.Request) (*http.Response, error) {
return nil, nil
}

func mustNewServerAuth(t *testing.T, opts ...extensionauth.ServerOption) extensionauth.Server {
func build[T any, O any](t *testing.T, builder func(...O) (T, error), opts ...O) T {
t.Helper()
srv, err := extensionauth.NewServer(opts...)
obj, err := builder(opts...)
require.NoError(t, err)
return srv
return obj
}

var (
Expand All @@ -61,7 +53,7 @@ var (
func TestAllHTTPClientSettings(t *testing.T) {
host := &mockHost{
ext: map[component.ID]component.Component{
testAuthID: &extensionauthtest.MockClient{ResultRoundTripper: &customRoundTripper{}},
testAuthID: build(t, extensionauth.NewClient),
},
}

Expand Down Expand Up @@ -187,7 +179,7 @@ func TestAllHTTPClientSettings(t *testing.T) {
func TestPartialHTTPClientSettings(t *testing.T) {
host := &mockHost{
ext: map[component.ID]component.Component{
testAuthID: &extensionauthtest.MockClient{ResultRoundTripper: &customRoundTripper{}},
testAuthID: build(t, extensionauth.NewClient),
},
}

Expand Down Expand Up @@ -339,7 +331,20 @@ func TestHTTPClientSettingsError(t *testing.T) {
}
}

var _ http.RoundTripper = &customRoundTripper{}

type customRoundTripper struct{}

func (c *customRoundTripper) RoundTrip(*http.Request) (*http.Response, error) {
return nil, nil
}

func TestHTTPClientSettingWithAuthConfig(t *testing.T) {
customRoundTripperOpt := extensionauth.WithClientRoundTripper(
func(http.RoundTripper) (http.RoundTripper, error) {
return &customRoundTripper{}, nil
})

tests := []struct {
name string
shouldErr bool
Expand All @@ -355,9 +360,7 @@ func TestHTTPClientSettingWithAuthConfig(t *testing.T) {
shouldErr: false,
host: &mockHost{
ext: map[component.ID]component.Component{
mockID: &extensionauthtest.MockClient{
ResultRoundTripper: &customRoundTripper{},
},
mockID: build(t, extensionauth.NewClient),
},
},
},
Expand All @@ -370,7 +373,7 @@ func TestHTTPClientSettingWithAuthConfig(t *testing.T) {
shouldErr: true,
host: &mockHost{
ext: map[component.ID]component.Component{
mockID: &extensionauthtest.MockClient{ResultRoundTripper: &customRoundTripper{}},
mockID: build(t, extensionauth.NewClient),
},
},
},
Expand All @@ -392,7 +395,7 @@ func TestHTTPClientSettingWithAuthConfig(t *testing.T) {
shouldErr: false,
host: &mockHost{
ext: map[component.ID]component.Component{
mockID: &extensionauthtest.MockClient{ResultRoundTripper: &customRoundTripper{}},
mockID: build(t, extensionauth.NewClient, customRoundTripperOpt),
},
},
},
Expand All @@ -406,7 +409,7 @@ func TestHTTPClientSettingWithAuthConfig(t *testing.T) {
shouldErr: false,
host: &mockHost{
ext: map[component.ID]component.Component{
mockID: &extensionauthtest.MockClient{ResultRoundTripper: &customRoundTripper{}},
mockID: build(t, extensionauth.NewClient, customRoundTripperOpt),
},
},
},
Expand All @@ -420,7 +423,7 @@ func TestHTTPClientSettingWithAuthConfig(t *testing.T) {
shouldErr: false,
host: &mockHost{
ext: map[component.ID]component.Component{
mockID: &extensionauthtest.MockClient{ResultRoundTripper: &customRoundTripper{}},
mockID: build(t, extensionauth.NewClient, customRoundTripperOpt),
},
},
},
Expand All @@ -433,9 +436,7 @@ func TestHTTPClientSettingWithAuthConfig(t *testing.T) {
shouldErr: true,
host: &mockHost{
ext: map[component.ID]component.Component{
mockID: &extensionauthtest.MockClient{
ResultRoundTripper: &customRoundTripper{}, MustError: true,
},
mockID: build(t, extensionauthtest.NewErrorClient),
},
},
},
Expand Down Expand Up @@ -832,7 +833,7 @@ func TestHttpCorsWithSettings(t *testing.T) {

host := &mockHost{
ext: map[component.ID]component.Component{
mockID: mustNewServerAuth(t,
mockID: build(t, extensionauth.NewServer,
extensionauth.WithServerAuthenticate(func(ctx context.Context, _ map[string][]string) (context.Context, error) {
return ctx, errors.New("Settings failed")
}),
Expand Down Expand Up @@ -1144,7 +1145,7 @@ func TestServerAuth(t *testing.T) {

host := &mockHost{
ext: map[component.ID]component.Component{
mockID: mustNewServerAuth(t,
mockID: build(t, extensionauth.NewServer,
extensionauth.WithServerAuthenticate(func(ctx context.Context, _ map[string][]string) (context.Context, error) {
authCalled = true
return ctx, nil
Expand Down Expand Up @@ -1195,7 +1196,7 @@ func TestFailedServerAuth(t *testing.T) {
}
host := &mockHost{
ext: map[component.ID]component.Component{
mockID: mustNewServerAuth(t,
mockID: build(t, extensionauth.NewServer,
extensionauth.WithServerAuthenticate(func(ctx context.Context, _ map[string][]string) (context.Context, error) {
return ctx, errors.New("Settings failed")
}),
Expand Down Expand Up @@ -1376,7 +1377,7 @@ func TestAuthWithQueryParams(t *testing.T) {

host := &mockHost{
ext: map[component.ID]component.Component{
mockID: mustNewServerAuth(t,
mockID: build(t, extensionauth.NewServer,
extensionauth.WithServerAuthenticate(func(ctx context.Context, sources map[string][]string) (context.Context, error) {
require.Len(t, sources, 1)
assert.Equal(t, "1", sources["auth"][0])
Expand Down
2 changes: 0 additions & 2 deletions exporter/otlpexporter/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -152,8 +152,6 @@ replace go.opentelemetry.io/collector/exporter/exportertest => ../exportertest

replace go.opentelemetry.io/collector/extension/extensiontest => ../../extension/extensiontest

replace go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest => ../../extension/extensionauth/extensionauthtest

replace go.opentelemetry.io/collector/featuregate => ../../featuregate

replace go.opentelemetry.io/collector/extension/xextension => ../../extension/xextension
28 changes: 28 additions & 0 deletions extension/extensionauth/extensionauthtest/error_client.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
// Copyright The OpenTelemetry Authors
// SPDX-License-Identifier: Apache-2.0

package extensionauthtest // import "go.opentelemetry.io/collector/extension/extensionauth/extensionauthtest"

import (
"errors"
"net/http"

"google.golang.org/grpc/credentials"

"go.opentelemetry.io/collector/extension/extensionauth"
)

var errMockError = errors.New("mock Error")

// NewErrorClient returns a new extensionauth.Client that always returns an error on any of the client methods.
func NewErrorClient(opts ...extensionauth.ClientOption) (extensionauth.Client, error) {
errorOpts := []extensionauth.ClientOption{
extensionauth.WithClientRoundTripper(func(base http.RoundTripper) (http.RoundTripper, error) {
return nil, errMockError
}),
extensionauth.WithClientPerRPCCredentials(func() (credentials.PerRPCCredentials, error) {
return nil, errMockError
}),
}
return extensionauth.NewClient(append(errorOpts, opts...)...)
}
21 changes: 21 additions & 0 deletions extension/extensionauth/extensionauthtest/error_client_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
// Copyright The OpenTelemetry Authors
// SPDX-License-Identifier: Apache-2.0

package extensionauthtest

import (
"testing"

"github.com/stretchr/testify/require"
)

func TestErrorClient(t *testing.T) {
client, err := NewErrorClient()
require.NoError(t, err)

_, err = client.RoundTripper(nil)
require.Error(t, err)

_, err = client.PerRPCCredentials()
require.Error(t, err)
}
2 changes: 1 addition & 1 deletion extension/extensionauth/extensionauthtest/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@ go 1.23.0

require (
github.com/stretchr/testify v1.10.0
go.opentelemetry.io/collector/component v1.27.0
go.opentelemetry.io/collector/extension/extensionauth v0.121.0
go.uber.org/goleak v1.3.0
google.golang.org/grpc v1.71.0
Expand All @@ -14,6 +13,7 @@ require (
github.com/davecgh/go-spew v1.1.1 // indirect
github.com/gogo/protobuf v1.3.2 // indirect
github.com/pmezard/go-difflib v1.0.0 // indirect
go.opentelemetry.io/collector/component v1.27.0 // indirect
go.opentelemetry.io/collector/extension v1.27.0 // indirect
go.opentelemetry.io/collector/pdata v1.27.0 // indirect
go.opentelemetry.io/otel v1.34.0 // indirect
Expand Down
55 changes: 0 additions & 55 deletions extension/extensionauth/extensionauthtest/mock_clientauth.go

This file was deleted.

Loading
Loading