Skip to content

Commit 7d79a9b

Browse files
committed
Fix more linting errors
1 parent 12264df commit 7d79a9b

File tree

4 files changed

+89
-88
lines changed

4 files changed

+89
-88
lines changed

extension/bearertokenauthextension/bearertokenauth.go

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -64,15 +64,16 @@ func newBearerTokenAuth(cfg *Config, logger *zap.Logger) *BearerTokenAuth {
6464
filename: cfg.Filename,
6565
logger: logger,
6666
}
67-
if len(cfg.Tokens) > 0 {
67+
switch {
68+
case len(cfg.Tokens) > 0:
6869
tokens := make([]string, len(cfg.Tokens))
6970
for i, token := range cfg.Tokens {
7071
tokens[i] = string(token)
7172
}
7273
a.setAuthorizationValues(tokens) // Store tokens
73-
} else if cfg.BearerToken != "" {
74+
case cfg.BearerToken != "":
7475
a.setAuthorizationValues([]string{string(cfg.BearerToken)}) // Store token
75-
} else if cfg.Filename != "" {
76+
case cfg.Filename != "":
7677
a.refreshToken() // Load tokens from file
7778
}
7879
return a

extension/bearertokenauthextension/bearertokenauth_test.go

Lines changed: 44 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -287,56 +287,56 @@ func TestBearerServerAuthenticate(t *testing.T) {
287287
}
288288

289289
func TestBearerTokenMultipleTokens(t *testing.T) {
290-
cfg := createDefaultConfig().(*Config)
291-
cfg.Scheme = "Bearer"
292-
cfg.Tokens = []configopaque.String{"token1", "token2"}
293-
294-
bauth := newBearerTokenAuth(cfg, zaptest.NewLogger(t))
295-
assert.NotNil(t, bauth)
296-
297-
assert.NoError(t, bauth.Start(context.Background(), componenttest.NewNopHost()))
298-
credential, err := bauth.PerRPCCredentials()
299-
assert.NoError(t, err)
300-
assert.NotNil(t, credential)
301-
302-
md, err := credential.GetRequestMetadata(context.Background())
303-
expectedMd := map[string]string{
304-
"authorization": "Bearer token1",
305-
}
306-
assert.Equal(t, expectedMd, md)
307-
assert.NoError(t, err)
308-
assert.True(t, credential.RequireTransportSecurity())
309-
310-
// Test Authenticate with multiple tokens
311-
headers := map[string][]string{
312-
"authorization": {"Bearer token1"},
313-
}
314-
ctx := context.Background()
315-
newCtx, err := bauth.Authenticate(ctx, headers)
316-
assert.NoError(t, err)
317-
assert.Equal(t, ctx, newCtx)
318-
319-
headers = map[string][]string{
320-
"authorization": {"Bearer token2"},
321-
}
322-
newCtx, err = bauth.Authenticate(ctx, headers)
323-
assert.NoError(t, err)
324-
assert.Equal(t, ctx, newCtx)
325-
326-
headers = map[string][]string{
327-
"authorization": {"Bearer invalidtoken"},
328-
}
329-
_, err = bauth.Authenticate(ctx, headers)
330-
assert.Error(t, err)
331-
332-
assert.NoError(t, bauth.Shutdown(context.Background()))
290+
cfg := createDefaultConfig().(*Config)
291+
cfg.Scheme = "Bearer"
292+
cfg.Tokens = []configopaque.String{"token1", "token2"}
293+
294+
bauth := newBearerTokenAuth(cfg, zaptest.NewLogger(t))
295+
assert.NotNil(t, bauth)
296+
297+
assert.NoError(t, bauth.Start(context.Background(), componenttest.NewNopHost()))
298+
credential, err := bauth.PerRPCCredentials()
299+
assert.NoError(t, err)
300+
assert.NotNil(t, credential)
301+
302+
md, err := credential.GetRequestMetadata(context.Background())
303+
expectedMd := map[string]string{
304+
"authorization": "Bearer token1",
305+
}
306+
assert.Equal(t, expectedMd, md)
307+
assert.NoError(t, err)
308+
assert.True(t, credential.RequireTransportSecurity())
309+
310+
// Test Authenticate with multiple tokens
311+
headers := map[string][]string{
312+
"authorization": {"Bearer token1"},
313+
}
314+
ctx := context.Background()
315+
newCtx, err := bauth.Authenticate(ctx, headers)
316+
assert.NoError(t, err)
317+
assert.Equal(t, ctx, newCtx)
318+
319+
headers = map[string][]string{
320+
"authorization": {"Bearer token2"},
321+
}
322+
newCtx, err = bauth.Authenticate(ctx, headers)
323+
assert.NoError(t, err)
324+
assert.Equal(t, ctx, newCtx)
325+
326+
headers = map[string][]string{
327+
"authorization": {"Bearer invalidtoken"},
328+
}
329+
_, err = bauth.Authenticate(ctx, headers)
330+
assert.Error(t, err)
331+
332+
assert.NoError(t, bauth.Shutdown(context.Background()))
333333
}
334334

335335
func TestBearerTokenMultipleTokensInFile(t *testing.T) {
336336
scheme := "Bearer"
337337
filename := filepath.Join("testdata", t.Name()+".tokens")
338338
fileContent := "token1\ntoken2"
339-
err := os.WriteFile(filename, []byte(fileContent), 0600)
339+
err := os.WriteFile(filename, []byte(fileContent), 0o600)
340340
assert.NoError(t, err)
341341
defer os.Remove(filename)
342342

extension/bearertokenauthextension/config.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ type Config struct {
2626
}
2727

2828
var (
29-
_ component.Config = (*Config)(nil)
30-
errNoTokenProvided = errors.New("no bearer token provided")
31-
errTokensAndTokenProvided = errors.New("either tokens or token should be provided, not both")
29+
_ component.Config = (*Config)(nil)
30+
errNoTokenProvided = errors.New("no bearer token provided")
31+
errTokensAndTokenProvided = errors.New("either tokens or token should be provided, not both")
3232
)
3333

3434
// Validate checks if the extension configuration is valid

extension/bearertokenauthextension/config_test.go

Lines changed: 38 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -44,44 +44,44 @@ func TestLoadConfig(t *testing.T) {
4444
},
4545
},
4646
{
47-
id: component.NewIDWithName(metadata.Type, "multipletokens"),
48-
expected: &Config{
49-
Scheme: "Bearer",
50-
Tokens: []configopaque.String{"token1", "thistokenalsoworks"},
51-
},
52-
},
53-
{
54-
id: component.NewIDWithName(metadata.Type, "withfilename"),
55-
expected: &Config{
56-
Scheme: "Bearer",
57-
Filename: "file-containing.token",
58-
},
59-
},
60-
{
61-
id: component.NewIDWithName(metadata.Type, "both"),
62-
expected: &Config{
63-
Scheme: "Bearer",
64-
BearerToken: "ignoredtoken",
65-
Filename: "file-containing.token",
66-
},
67-
},
68-
{
69-
id: component.NewIDWithName(metadata.Type, "tokensandtoken"),
70-
expected: &Config{
71-
Scheme: "Bearer",
72-
BearerToken: "sometoken",
73-
Tokens: []configopaque.String{"token1", "thistokenalsoworks"},
74-
},
75-
expectedErr: true,
76-
},
77-
{
78-
id: component.NewIDWithName(metadata.Type, "withtokensandfilename"),
79-
expected: &Config{
80-
Scheme: "Bearer",
81-
Tokens: []configopaque.String{"ignoredtoken1", "ignoredtoken2"},
82-
Filename: "file-containing.token",
83-
},
84-
},
47+
id: component.NewIDWithName(metadata.Type, "multipletokens"),
48+
expected: &Config{
49+
Scheme: "Bearer",
50+
Tokens: []configopaque.String{"token1", "thistokenalsoworks"},
51+
},
52+
},
53+
{
54+
id: component.NewIDWithName(metadata.Type, "withfilename"),
55+
expected: &Config{
56+
Scheme: "Bearer",
57+
Filename: "file-containing.token",
58+
},
59+
},
60+
{
61+
id: component.NewIDWithName(metadata.Type, "both"),
62+
expected: &Config{
63+
Scheme: "Bearer",
64+
BearerToken: "ignoredtoken",
65+
Filename: "file-containing.token",
66+
},
67+
},
68+
{
69+
id: component.NewIDWithName(metadata.Type, "tokensandtoken"),
70+
expected: &Config{
71+
Scheme: "Bearer",
72+
BearerToken: "sometoken",
73+
Tokens: []configopaque.String{"token1", "thistokenalsoworks"},
74+
},
75+
expectedErr: true,
76+
},
77+
{
78+
id: component.NewIDWithName(metadata.Type, "withtokensandfilename"),
79+
expected: &Config{
80+
Scheme: "Bearer",
81+
Tokens: []configopaque.String{"ignoredtoken1", "ignoredtoken2"},
82+
Filename: "file-containing.token",
83+
},
84+
},
8585
}
8686
for _, tt := range tests {
8787
t.Run(tt.id.String(), func(t *testing.T) {

0 commit comments

Comments
 (0)