mirror of
https://github.com/status-im/consul.git
synced 2025-02-21 09:58:26 +00:00
Introduces a gRPC endpoint for signing Connect leaf certificates. It's also the first of the public gRPC endpoints to perform leader-forwarding, so establishes the pattern of forwarding over the multiplexed internal RPC port.
41 lines
1009 B
Go
41 lines
1009 B
Go
// Code generated by mockery v1.0.0. DO NOT EDIT.
|
|
|
|
package connectca
|
|
|
|
import (
|
|
acl "github.com/hashicorp/consul/acl"
|
|
mock "github.com/stretchr/testify/mock"
|
|
|
|
structs "github.com/hashicorp/consul/agent/structs"
|
|
|
|
x509 "crypto/x509"
|
|
)
|
|
|
|
// MockCAManager is an autogenerated mock type for the CAManager type
|
|
type MockCAManager struct {
|
|
mock.Mock
|
|
}
|
|
|
|
// AuthorizeAndSignCertificate provides a mock function with given fields: csr, authz
|
|
func (_m *MockCAManager) AuthorizeAndSignCertificate(csr *x509.CertificateRequest, authz acl.Authorizer) (*structs.IssuedCert, error) {
|
|
ret := _m.Called(csr, authz)
|
|
|
|
var r0 *structs.IssuedCert
|
|
if rf, ok := ret.Get(0).(func(*x509.CertificateRequest, acl.Authorizer) *structs.IssuedCert); ok {
|
|
r0 = rf(csr, authz)
|
|
} else {
|
|
if ret.Get(0) != nil {
|
|
r0 = ret.Get(0).(*structs.IssuedCert)
|
|
}
|
|
}
|
|
|
|
var r1 error
|
|
if rf, ok := ret.Get(1).(func(*x509.CertificateRequest, acl.Authorizer) error); ok {
|
|
r1 = rf(csr, authz)
|
|
} else {
|
|
r1 = ret.Error(1)
|
|
}
|
|
|
|
return r0, r1
|
|
}
|