mirror of
https://github.com/pomerium/pomerium.git
synced 2025-04-30 02:46:30 +02:00
authenticate: unmarshal and verify state from jwt, instead of middleware authorize: embed opa policy using statik authorize: have IsAuthorized handle authorization for all routes authorize: if no signing key is provided, one is generated authorize: remove IsAdmin grpc endpoint authorize/client: return authorize decision struct cmd/pomerium: main logger no longer contains email and group cryptutil: add ECDSA signing methods dashboard: have impersonate form show up for all users, but have api gated by authz docs: fix typo in signed jwt header encoding/jws: remove unused es256 signer frontend: namespace static web assets internal/sessions: remove leeway to match authz policy proxy: move signing functionality to authz proxy: remove jwt attestation from proxy (authZ does now) proxy: remove non-signed headers from headers proxy: remove special handling of x-forwarded-host sessions: do not verify state in middleware sessions: remove leeway from state to match authz sessions/{all}: store jwt directly instead of state Signed-off-by: Bobby DeSimone <bobbydesimone@gmail.com>
64 lines
2.1 KiB
Go
64 lines
2.1 KiB
Go
// Code generated by MockGen. DO NOT EDIT.
|
|
// Source: github.com/pomerium/pomerium/authorize/evaluator (interfaces: Evaluator)
|
|
|
|
// Package mock_evaluator is a generated GoMock package.
|
|
package mock_evaluator
|
|
|
|
import (
|
|
context "context"
|
|
gomock "github.com/golang/mock/gomock"
|
|
authorize "github.com/pomerium/pomerium/internal/grpc/authorize"
|
|
reflect "reflect"
|
|
)
|
|
|
|
// MockEvaluator is a mock of Evaluator interface
|
|
type MockEvaluator struct {
|
|
ctrl *gomock.Controller
|
|
recorder *MockEvaluatorMockRecorder
|
|
}
|
|
|
|
// MockEvaluatorMockRecorder is the mock recorder for MockEvaluator
|
|
type MockEvaluatorMockRecorder struct {
|
|
mock *MockEvaluator
|
|
}
|
|
|
|
// NewMockEvaluator creates a new mock instance
|
|
func NewMockEvaluator(ctrl *gomock.Controller) *MockEvaluator {
|
|
mock := &MockEvaluator{ctrl: ctrl}
|
|
mock.recorder = &MockEvaluatorMockRecorder{mock}
|
|
return mock
|
|
}
|
|
|
|
// EXPECT returns an object that allows the caller to indicate expected use
|
|
func (m *MockEvaluator) EXPECT() *MockEvaluatorMockRecorder {
|
|
return m.recorder
|
|
}
|
|
|
|
// IsAuthorized mocks base method
|
|
func (m *MockEvaluator) IsAuthorized(arg0 context.Context, arg1 interface{}) (*authorize.IsAuthorizedReply, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "IsAuthorized", arg0, arg1)
|
|
ret0, _ := ret[0].(*authorize.IsAuthorizedReply)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// IsAuthorized indicates an expected call of IsAuthorized
|
|
func (mr *MockEvaluatorMockRecorder) IsAuthorized(arg0, arg1 interface{}) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "IsAuthorized", reflect.TypeOf((*MockEvaluator)(nil).IsAuthorized), arg0, arg1)
|
|
}
|
|
|
|
// PutData mocks base method
|
|
func (m *MockEvaluator) PutData(arg0 context.Context, arg1 map[string]interface{}) error {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "PutData", arg0, arg1)
|
|
ret0, _ := ret[0].(error)
|
|
return ret0
|
|
}
|
|
|
|
// PutData indicates an expected call of PutData
|
|
func (mr *MockEvaluatorMockRecorder) PutData(arg0, arg1 interface{}) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "PutData", reflect.TypeOf((*MockEvaluator)(nil).PutData), arg0, arg1)
|
|
}
|