-
Notifications
You must be signed in to change notification settings - Fork 3.5k
Expand file tree
/
Copy pathconfig_test.go
More file actions
119 lines (112 loc) · 3 KB
/
config_test.go
File metadata and controls
119 lines (112 loc) · 3 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
// Copyright The OpenTelemetry Authors
// SPDX-License-Identifier: Apache-2.0
package bearertokenauthextension
import (
"path/filepath"
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"go.opentelemetry.io/collector/component"
"go.opentelemetry.io/collector/config/configopaque"
"go.opentelemetry.io/collector/confmap/confmaptest"
"go.opentelemetry.io/collector/confmap/xconfmap"
"github.com/open-telemetry/opentelemetry-collector-contrib/extension/bearertokenauthextension/internal/metadata"
)
func TestLoadConfig(t *testing.T) {
t.Parallel()
tests := []struct {
id component.ID
expected component.Config
expectedErr bool
}{
{
id: component.NewID(metadata.Type),
expectedErr: true,
},
{
id: component.NewIDWithName(metadata.Type, "sometoken"),
expected: &Config{
Header: defaultHeader,
Scheme: defaultScheme,
BearerToken: "sometoken",
},
},
{
id: component.NewIDWithName(metadata.Type, "withscheme"),
expected: &Config{
Header: defaultHeader,
Scheme: "MyScheme",
BearerToken: "my-token",
},
},
{
id: component.NewIDWithName(metadata.Type, "multipletokens"),
expected: &Config{
Header: defaultHeader,
Scheme: "Bearer",
Tokens: []configopaque.String{"token1", "thistokenalsoworks"},
},
},
{
id: component.NewIDWithName(metadata.Type, "withfilename"),
expected: &Config{
Header: defaultHeader,
Scheme: "Bearer",
Filename: "file-containing.token",
},
},
{
id: component.NewIDWithName(metadata.Type, "both"),
expected: &Config{
Header: defaultHeader,
Scheme: "Bearer",
BearerToken: "ignoredtoken",
Filename: "file-containing.token",
},
},
{
id: component.NewIDWithName(metadata.Type, "tokensandtoken"),
expected: &Config{
Header: defaultHeader,
Scheme: "Bearer",
BearerToken: "sometoken",
Tokens: []configopaque.String{"token1", "thistokenalsoworks"},
},
expectedErr: true,
},
{
id: component.NewIDWithName(metadata.Type, "withtokensandfilename"),
expected: &Config{
Header: defaultHeader,
Scheme: "Bearer",
Tokens: []configopaque.String{"ignoredtoken1", "ignoredtoken2"},
Filename: "file-containing.token",
},
},
{
id: component.NewIDWithName(metadata.Type, "withheader"),
expected: &Config{
Header: "X-Custom-Authorization",
Scheme: "",
BearerToken: "my-token",
},
},
}
for _, tt := range tests {
t.Run(tt.id.String(), func(t *testing.T) {
cm, err := confmaptest.LoadConf(filepath.Join("testdata", "config.yaml"))
require.NoError(t, err)
factory := NewFactory()
cfg := factory.CreateDefaultConfig()
sub, err := cm.Sub(tt.id.String())
require.NoError(t, err)
require.NoError(t, sub.Unmarshal(cfg))
if tt.expectedErr {
assert.Error(t, xconfmap.Validate(cfg))
return
}
assert.NoError(t, xconfmap.Validate(cfg))
assert.Equal(t, tt.expected, cfg)
})
}
}