@@ -310,50 +310,6 @@ async def test_auth_interceptor_variants(test_case, store):
310310 ] == test_case .expected_header_value_func (test_case .credential )
311311
312312
313- @pytest .mark .asyncio
314- async def test_auth_interceptor_falls_back_on_unsupported_scheme (store ):
315- """
316- Tests that AuthInterceptor skips applying headers when the scheme type is unsupported.
317- This ensures the final return statement is hit.
318- """
319- scheme_name = 'unknown'
320- session_id = 'session-id'
321- credential = 'ignored-token'
322- request_payload = {'foo' : 'bar' }
323- http_kwargs = {'fizz' : 'buzz' }
324- await store .set_credentials (session_id , scheme_name , credential )
325- auth_interceptor = AuthInterceptor (credential_service = store )
326- agent_card = AgentCard (
327- url = 'http://agent.com/rpc' ,
328- name = 'unknownbot' ,
329- description = 'A bot that uses unsupported scheme' ,
330- version = '1.0' ,
331- defaultInputModes = [],
332- defaultOutputModes = [],
333- skills = [],
334- capabilities = AgentCapabilities (),
335- security = [{scheme_name : []}],
336- securitySchemes = {
337- 'digest' : SecurityScheme (
338- root = HTTPAuthSecurityScheme (
339- scheme = 'digest' ,
340- type = 'http' ,
341- ),
342- ),
343- },
344- )
345-
346- new_payload , new_kwargs = await auth_interceptor .intercept (
347- method_name = 'message/send' ,
348- request_payload = request_payload ,
349- http_kwargs = http_kwargs ,
350- agent_card = agent_card ,
351- context = ClientCallContext (state = {'sessionId' : session_id }),
352- )
353- assert new_payload == request_payload
354- assert new_kwargs == http_kwargs
355-
356-
357313@pytest .mark .asyncio
358314async def test_auth_interceptor_skips_when_scheme_not_in_security_schemes (
359315 store ,
0 commit comments