@@ -21,11 +21,12 @@ import (
2121 "github.com/stretchr/testify/assert"
2222 "github.com/stretchr/testify/require"
2323 "go.opentelemetry.io/collector/component/componenttest"
24+ "go.opentelemetry.io/collector/extension"
2425 "go.opentelemetry.io/collector/extension/extensionauth"
2526 "go.uber.org/zap"
2627)
2728
28- func newTestExtension (t * testing.T , cfg * Config ) extensionauth. Server {
29+ func newTestExtension (t * testing.T , cfg * Config ) extension. Extension {
2930 t .Helper ()
3031 return newExtension (cfg , zap .NewNop ())
3132}
@@ -58,15 +59,18 @@ func TestOIDCAuthenticationSucceeded(t *testing.T) {
5859 token , err := oidcServer .token (payload )
5960 require .NoError (t , err )
6061
62+ srvAuth , ok := p .(extensionauth.Server )
63+ require .True (t , ok )
64+
6165 // test
62- ctx , err := p .Authenticate (context .Background (), map [string ][]string {"authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
66+ ctx , err := srvAuth .Authenticate (context .Background (), map [string ][]string {"authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
6367
6468 // verify
6569 assert .NoError (t , err )
6670 assert .NotNil (t , ctx )
6771
6872 // test, upper-case header
69- ctx , err = p .Authenticate (context .Background (), map [string ][]string {"Authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
73+ ctx , err = srvAuth .Authenticate (context .Background (), map [string ][]string {"Authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
7074
7175 // verify
7276 assert .NoError (t , err )
@@ -206,10 +210,11 @@ func TestOIDCFailedToLoadIssuerCAFromPathInvalidContent(t *testing.T) {
206210
207211func TestOIDCInvalidAuthHeader (t * testing.T ) {
208212 // prepare
209- p := newTestExtension (t , & Config {
213+ p , ok := newTestExtension (t , & Config {
210214 Audience : "some-audience" ,
211215 IssuerURL : "http://example.com" ,
212- })
216+ }).(extensionauth.Server )
217+ require .True (t , ok )
213218
214219 // test
215220 ctx , err := p .Authenticate (context .Background (), map [string ][]string {"authorization" : {"some-value" }})
@@ -221,10 +226,11 @@ func TestOIDCInvalidAuthHeader(t *testing.T) {
221226
222227func TestOIDCNotAuthenticated (t * testing.T ) {
223228 // prepare
224- p := newTestExtension (t , & Config {
229+ p , ok := newTestExtension (t , & Config {
225230 Audience : "some-audience" ,
226231 IssuerURL : "http://example.com" ,
227- })
232+ }).(extensionauth.Server )
233+ require .True (t , ok )
228234
229235 // test
230236 ctx , err := p .Authenticate (context .Background (), make (map [string ][]string ))
@@ -266,8 +272,11 @@ func TestFailedToVerifyToken(t *testing.T) {
266272 err = p .Start (context .Background (), componenttest .NewNopHost ())
267273 require .NoError (t , err )
268274
275+ srvAuth , ok := p .(extensionauth.Server )
276+ require .True (t , ok )
277+
269278 // test
270- ctx , err := p .Authenticate (context .Background (), map [string ][]string {"authorization" : {"Bearer some-token" }})
279+ ctx , err := srvAuth .Authenticate (context .Background (), map [string ][]string {"authorization" : {"Bearer some-token" }})
271280
272281 // verify
273282 assert .Error (t , err )
@@ -329,8 +338,11 @@ func TestFailedToGetGroupsClaimFromToken(t *testing.T) {
329338 token , err := oidcServer .token (payload )
330339 require .NoError (t , err )
331340
341+ srvAuth , ok := p .(extensionauth.Server )
342+ require .True (t , ok )
343+
332344 // test
333- ctx , err := p .Authenticate (context .Background (), map [string ][]string {"authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
345+ ctx , err := srvAuth .Authenticate (context .Background (), map [string ][]string {"authorization" : {fmt .Sprintf ("Bearer %s" , token )}})
334346
335347 // verify
336348 assert .ErrorIs (t , err , tt .expectedError )
0 commit comments