@@ -277,6 +277,8 @@ func TestGCSExtract(t *testing.T) {
277
277
type test struct {
278
278
name string
279
279
secret * corev1.Secret
280
+ tokenAuth * corev1.Secret
281
+ featureGates configv1.FeatureGates
280
282
wantError string
281
283
wantCredentialMode lokiv1.CredentialMode
282
284
}
@@ -343,6 +345,45 @@ func TestGCSExtract(t *testing.T) {
343
345
},
344
346
wantCredentialMode : lokiv1 .CredentialModeToken ,
345
347
},
348
+ {
349
+ name : "invalid for token CCO" ,
350
+ featureGates : configv1.FeatureGates {
351
+ OpenShift : configv1.OpenShiftFeatureGates {
352
+ Enabled : true ,
353
+ TokenCCOAuthEnv : true ,
354
+ },
355
+ },
356
+ secret : & corev1.Secret {
357
+ ObjectMeta : metav1.ObjectMeta {Name : "test" },
358
+ Data : map [string ][]byte {
359
+ "bucketname" : []byte ("here" ),
360
+ "key.json" : []byte ("{\" type\" : \" external_account\" , \" audience\" : \" \" , \" service_account_id\" : \" \" }" ),
361
+ },
362
+ },
363
+ wantError : "gcp credentials file contains invalid fields: key.json must not be set for CredentialModeTokenCCO" ,
364
+ },
365
+ {
366
+ name : "valid for token CCO" ,
367
+ featureGates : configv1.FeatureGates {
368
+ OpenShift : configv1.OpenShiftFeatureGates {
369
+ Enabled : true ,
370
+ TokenCCOAuthEnv : true ,
371
+ },
372
+ },
373
+ secret : & corev1.Secret {
374
+ ObjectMeta : metav1.ObjectMeta {Name : "test" },
375
+ Data : map [string ][]byte {
376
+ "bucketname" : []byte ("here" ),
377
+ },
378
+ },
379
+ tokenAuth : & corev1.Secret {
380
+ ObjectMeta : metav1.ObjectMeta {Name : "token-auth-config" },
381
+ Data : map [string ][]byte {
382
+ "service_account.json" : []byte ("{\" type\" : \" external_account\" , \" audience\" : \" test\" , \" service_account_id\" : \" \" }" ),
383
+ },
384
+ },
385
+ wantCredentialMode : lokiv1 .CredentialModeTokenCCO ,
386
+ },
346
387
}
347
388
for _ , tst := range table {
348
389
t .Run (tst .name , func (t * testing.T ) {
@@ -352,7 +393,7 @@ func TestGCSExtract(t *testing.T) {
352
393
Type : lokiv1 .ObjectStorageSecretGCS ,
353
394
}
354
395
355
- opts , err := extractSecrets (spec , tst .secret , nil , configv1. FeatureGates {} )
396
+ opts , err := extractSecrets (spec , tst .secret , tst . tokenAuth , tst . featureGates )
356
397
if tst .wantError == "" {
357
398
require .NoError (t , err )
358
399
require .Equal (t , tst .wantCredentialMode , opts .CredentialMode )
0 commit comments