mirror of
https://github.com/zitadel/zitadel.git
synced 2024-12-15 12:27:59 +00:00
041af26917
# Which Problems Are Solved Currently ZITADEL supports RP-initiated logout for clients. Back-channel logout ensures that user sessions are terminated across all connected applications, even if the user closes their browser or loses connectivity providing a more secure alternative for certain use cases. # How the Problems Are Solved If the feature is activated and the client used for the authentication has a back_channel_logout_uri configured, a `session_logout.back_channel` will be registered. Once a user terminates their session, a (notification) handler will send a SET (form POST) to the registered uri containing a logout_token (with the user's ID and session ID). - A new feature "back_channel_logout" is added on system and instance level - A `back_channel_logout_uri` can be managed on OIDC applications - Added a `session_logout` aggregate to register and inform about sent `back_channel` notifications - Added a `SecurityEventToken` channel and `Form`message type in the notification handlers - Added `TriggeredAtOrigin` fields to `HumanSignedOut` and `TerminateSession` events for notification handling - Exported various functions and types in the `oidc` package to be able to reuse for token signing in the back_channel notifier. - To prevent that current existing session termination events will be handled, a setup step is added to set the `current_states` for the `projections.notifications_back_channel_logout` to the current position - [x] requires https://github.com/zitadel/oidc/pull/671 # Additional Changes - Updated all OTEL dependencies to v1.29.0, since OIDC already updated some of them to that version. - Single Session Termination feature is correctly checked (fixed feature mapping) # Additional Context - closes https://github.com/zitadel/zitadel/issues/8467 - TODO: - Documentation - UI to be done: https://github.com/zitadel/zitadel/issues/8469 --------- Co-authored-by: Hidde Wieringa <hidde@hiddewieringa.nl>
287 lines
12 KiB
Go
287 lines
12 KiB
Go
// Code generated by MockGen. DO NOT EDIT.
|
|
// Source: github.com/zitadel/zitadel/internal/notification/handlers (interfaces: Queries)
|
|
//
|
|
// Generated by this command:
|
|
//
|
|
// mockgen -package mock -destination ./mock/queries.mock.go github.com/zitadel/zitadel/internal/notification/handlers Queries
|
|
//
|
|
|
|
// Package mock is a generated GoMock package.
|
|
package mock
|
|
|
|
import (
|
|
context "context"
|
|
reflect "reflect"
|
|
time "time"
|
|
|
|
jose "github.com/go-jose/go-jose/v4"
|
|
authz "github.com/zitadel/zitadel/internal/api/authz"
|
|
domain "github.com/zitadel/zitadel/internal/domain"
|
|
query "github.com/zitadel/zitadel/internal/query"
|
|
gomock "go.uber.org/mock/gomock"
|
|
language "golang.org/x/text/language"
|
|
)
|
|
|
|
// MockQueries is a mock of Queries interface.
|
|
type MockQueries struct {
|
|
ctrl *gomock.Controller
|
|
recorder *MockQueriesMockRecorder
|
|
isgomock struct{}
|
|
}
|
|
|
|
// MockQueriesMockRecorder is the mock recorder for MockQueries.
|
|
type MockQueriesMockRecorder struct {
|
|
mock *MockQueries
|
|
}
|
|
|
|
// NewMockQueries creates a new mock instance.
|
|
func NewMockQueries(ctrl *gomock.Controller) *MockQueries {
|
|
mock := &MockQueries{ctrl: ctrl}
|
|
mock.recorder = &MockQueriesMockRecorder{mock}
|
|
return mock
|
|
}
|
|
|
|
// EXPECT returns an object that allows the caller to indicate expected use.
|
|
func (m *MockQueries) EXPECT() *MockQueriesMockRecorder {
|
|
return m.recorder
|
|
}
|
|
|
|
// ActiveLabelPolicyByOrg mocks base method.
|
|
func (m *MockQueries) ActiveLabelPolicyByOrg(ctx context.Context, orgID string, withOwnerRemoved bool) (*query.LabelPolicy, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "ActiveLabelPolicyByOrg", ctx, orgID, withOwnerRemoved)
|
|
ret0, _ := ret[0].(*query.LabelPolicy)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// ActiveLabelPolicyByOrg indicates an expected call of ActiveLabelPolicyByOrg.
|
|
func (mr *MockQueriesMockRecorder) ActiveLabelPolicyByOrg(ctx, orgID, withOwnerRemoved any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ActiveLabelPolicyByOrg", reflect.TypeOf((*MockQueries)(nil).ActiveLabelPolicyByOrg), ctx, orgID, withOwnerRemoved)
|
|
}
|
|
|
|
// ActivePrivateSigningKey mocks base method.
|
|
func (m *MockQueries) ActivePrivateSigningKey(ctx context.Context, t time.Time) (*query.PrivateKeys, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "ActivePrivateSigningKey", ctx, t)
|
|
ret0, _ := ret[0].(*query.PrivateKeys)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// ActivePrivateSigningKey indicates an expected call of ActivePrivateSigningKey.
|
|
func (mr *MockQueriesMockRecorder) ActivePrivateSigningKey(ctx, t any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ActivePrivateSigningKey", reflect.TypeOf((*MockQueries)(nil).ActivePrivateSigningKey), ctx, t)
|
|
}
|
|
|
|
// CustomTextListByTemplate mocks base method.
|
|
func (m *MockQueries) CustomTextListByTemplate(ctx context.Context, aggregateID, template string, withOwnerRemoved bool) (*query.CustomTexts, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "CustomTextListByTemplate", ctx, aggregateID, template, withOwnerRemoved)
|
|
ret0, _ := ret[0].(*query.CustomTexts)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// CustomTextListByTemplate indicates an expected call of CustomTextListByTemplate.
|
|
func (mr *MockQueriesMockRecorder) CustomTextListByTemplate(ctx, aggregateID, template, withOwnerRemoved any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "CustomTextListByTemplate", reflect.TypeOf((*MockQueries)(nil).CustomTextListByTemplate), ctx, aggregateID, template, withOwnerRemoved)
|
|
}
|
|
|
|
// GetActiveSigningWebKey mocks base method.
|
|
func (m *MockQueries) GetActiveSigningWebKey(ctx context.Context) (*jose.JSONWebKey, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "GetActiveSigningWebKey", ctx)
|
|
ret0, _ := ret[0].(*jose.JSONWebKey)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// GetActiveSigningWebKey indicates an expected call of GetActiveSigningWebKey.
|
|
func (mr *MockQueriesMockRecorder) GetActiveSigningWebKey(ctx any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetActiveSigningWebKey", reflect.TypeOf((*MockQueries)(nil).GetActiveSigningWebKey), ctx)
|
|
}
|
|
|
|
// GetDefaultLanguage mocks base method.
|
|
func (m *MockQueries) GetDefaultLanguage(ctx context.Context) language.Tag {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "GetDefaultLanguage", ctx)
|
|
ret0, _ := ret[0].(language.Tag)
|
|
return ret0
|
|
}
|
|
|
|
// GetDefaultLanguage indicates an expected call of GetDefaultLanguage.
|
|
func (mr *MockQueriesMockRecorder) GetDefaultLanguage(ctx any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetDefaultLanguage", reflect.TypeOf((*MockQueries)(nil).GetDefaultLanguage), ctx)
|
|
}
|
|
|
|
// GetInstanceRestrictions mocks base method.
|
|
func (m *MockQueries) GetInstanceRestrictions(ctx context.Context) (query.Restrictions, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "GetInstanceRestrictions", ctx)
|
|
ret0, _ := ret[0].(query.Restrictions)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// GetInstanceRestrictions indicates an expected call of GetInstanceRestrictions.
|
|
func (mr *MockQueriesMockRecorder) GetInstanceRestrictions(ctx any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetInstanceRestrictions", reflect.TypeOf((*MockQueries)(nil).GetInstanceRestrictions), ctx)
|
|
}
|
|
|
|
// GetNotifyUserByID mocks base method.
|
|
func (m *MockQueries) GetNotifyUserByID(ctx context.Context, shouldTriggered bool, userID string) (*query.NotifyUser, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "GetNotifyUserByID", ctx, shouldTriggered, userID)
|
|
ret0, _ := ret[0].(*query.NotifyUser)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// GetNotifyUserByID indicates an expected call of GetNotifyUserByID.
|
|
func (mr *MockQueriesMockRecorder) GetNotifyUserByID(ctx, shouldTriggered, userID any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "GetNotifyUserByID", reflect.TypeOf((*MockQueries)(nil).GetNotifyUserByID), ctx, shouldTriggered, userID)
|
|
}
|
|
|
|
// InstanceByID mocks base method.
|
|
func (m *MockQueries) InstanceByID(ctx context.Context, id string) (authz.Instance, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "InstanceByID", ctx, id)
|
|
ret0, _ := ret[0].(authz.Instance)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// InstanceByID indicates an expected call of InstanceByID.
|
|
func (mr *MockQueriesMockRecorder) InstanceByID(ctx, id any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "InstanceByID", reflect.TypeOf((*MockQueries)(nil).InstanceByID), ctx, id)
|
|
}
|
|
|
|
// MailTemplateByOrg mocks base method.
|
|
func (m *MockQueries) MailTemplateByOrg(ctx context.Context, orgID string, withOwnerRemoved bool) (*query.MailTemplate, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "MailTemplateByOrg", ctx, orgID, withOwnerRemoved)
|
|
ret0, _ := ret[0].(*query.MailTemplate)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// MailTemplateByOrg indicates an expected call of MailTemplateByOrg.
|
|
func (mr *MockQueriesMockRecorder) MailTemplateByOrg(ctx, orgID, withOwnerRemoved any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "MailTemplateByOrg", reflect.TypeOf((*MockQueries)(nil).MailTemplateByOrg), ctx, orgID, withOwnerRemoved)
|
|
}
|
|
|
|
// NotificationPolicyByOrg mocks base method.
|
|
func (m *MockQueries) NotificationPolicyByOrg(ctx context.Context, shouldTriggerBulk bool, orgID string, withOwnerRemoved bool) (*query.NotificationPolicy, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "NotificationPolicyByOrg", ctx, shouldTriggerBulk, orgID, withOwnerRemoved)
|
|
ret0, _ := ret[0].(*query.NotificationPolicy)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// NotificationPolicyByOrg indicates an expected call of NotificationPolicyByOrg.
|
|
func (mr *MockQueriesMockRecorder) NotificationPolicyByOrg(ctx, shouldTriggerBulk, orgID, withOwnerRemoved any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "NotificationPolicyByOrg", reflect.TypeOf((*MockQueries)(nil).NotificationPolicyByOrg), ctx, shouldTriggerBulk, orgID, withOwnerRemoved)
|
|
}
|
|
|
|
// NotificationProviderByIDAndType mocks base method.
|
|
func (m *MockQueries) NotificationProviderByIDAndType(ctx context.Context, aggID string, providerType domain.NotificationProviderType) (*query.DebugNotificationProvider, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "NotificationProviderByIDAndType", ctx, aggID, providerType)
|
|
ret0, _ := ret[0].(*query.DebugNotificationProvider)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// NotificationProviderByIDAndType indicates an expected call of NotificationProviderByIDAndType.
|
|
func (mr *MockQueriesMockRecorder) NotificationProviderByIDAndType(ctx, aggID, providerType any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "NotificationProviderByIDAndType", reflect.TypeOf((*MockQueries)(nil).NotificationProviderByIDAndType), ctx, aggID, providerType)
|
|
}
|
|
|
|
// SMSProviderConfigActive mocks base method.
|
|
func (m *MockQueries) SMSProviderConfigActive(ctx context.Context, resourceOwner string) (*query.SMSConfig, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "SMSProviderConfigActive", ctx, resourceOwner)
|
|
ret0, _ := ret[0].(*query.SMSConfig)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// SMSProviderConfigActive indicates an expected call of SMSProviderConfigActive.
|
|
func (mr *MockQueriesMockRecorder) SMSProviderConfigActive(ctx, resourceOwner any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SMSProviderConfigActive", reflect.TypeOf((*MockQueries)(nil).SMSProviderConfigActive), ctx, resourceOwner)
|
|
}
|
|
|
|
// SMTPConfigActive mocks base method.
|
|
func (m *MockQueries) SMTPConfigActive(ctx context.Context, resourceOwner string) (*query.SMTPConfig, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "SMTPConfigActive", ctx, resourceOwner)
|
|
ret0, _ := ret[0].(*query.SMTPConfig)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// SMTPConfigActive indicates an expected call of SMTPConfigActive.
|
|
func (mr *MockQueriesMockRecorder) SMTPConfigActive(ctx, resourceOwner any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SMTPConfigActive", reflect.TypeOf((*MockQueries)(nil).SMTPConfigActive), ctx, resourceOwner)
|
|
}
|
|
|
|
// SearchInstanceDomains mocks base method.
|
|
func (m *MockQueries) SearchInstanceDomains(ctx context.Context, queries *query.InstanceDomainSearchQueries) (*query.InstanceDomains, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "SearchInstanceDomains", ctx, queries)
|
|
ret0, _ := ret[0].(*query.InstanceDomains)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// SearchInstanceDomains indicates an expected call of SearchInstanceDomains.
|
|
func (mr *MockQueriesMockRecorder) SearchInstanceDomains(ctx, queries any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchInstanceDomains", reflect.TypeOf((*MockQueries)(nil).SearchInstanceDomains), ctx, queries)
|
|
}
|
|
|
|
// SearchMilestones mocks base method.
|
|
func (m *MockQueries) SearchMilestones(ctx context.Context, instanceIDs []string, queries *query.MilestonesSearchQueries) (*query.Milestones, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "SearchMilestones", ctx, instanceIDs, queries)
|
|
ret0, _ := ret[0].(*query.Milestones)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// SearchMilestones indicates an expected call of SearchMilestones.
|
|
func (mr *MockQueriesMockRecorder) SearchMilestones(ctx, instanceIDs, queries any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SearchMilestones", reflect.TypeOf((*MockQueries)(nil).SearchMilestones), ctx, instanceIDs, queries)
|
|
}
|
|
|
|
// SessionByID mocks base method.
|
|
func (m *MockQueries) SessionByID(ctx context.Context, shouldTriggerBulk bool, id, sessionToken string) (*query.Session, error) {
|
|
m.ctrl.T.Helper()
|
|
ret := m.ctrl.Call(m, "SessionByID", ctx, shouldTriggerBulk, id, sessionToken)
|
|
ret0, _ := ret[0].(*query.Session)
|
|
ret1, _ := ret[1].(error)
|
|
return ret0, ret1
|
|
}
|
|
|
|
// SessionByID indicates an expected call of SessionByID.
|
|
func (mr *MockQueriesMockRecorder) SessionByID(ctx, shouldTriggerBulk, id, sessionToken any) *gomock.Call {
|
|
mr.mock.ctrl.T.Helper()
|
|
return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "SessionByID", reflect.TypeOf((*MockQueries)(nil).SessionByID), ctx, shouldTriggerBulk, id, sessionToken)
|
|
}
|