-
Notifications
You must be signed in to change notification settings - Fork 20
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
6 changed files
with
708 additions
and
573 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
99 changes: 99 additions & 0 deletions
99
monitoring/uss_qualifier/scenarios/astm/utm/dss/authentication/generic.py
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,99 @@ | ||
from uas_standards.astm.f3548.v21.constants import Scope | ||
|
||
from monitoring.monitorlib import fetch | ||
from monitoring.monitorlib.auth import InvalidTokenSignatureAuth | ||
from monitoring.monitorlib.infrastructure import UTMClientSession | ||
from monitoring.uss_qualifier.resources.astm.f3548.v21.dss import DSSInstance | ||
from monitoring.uss_qualifier.scenarios.scenario import TestScenario | ||
|
||
|
||
class GenericAuthValidator: | ||
""" | ||
Utility class for common DSS authentication validation requirements. | ||
""" | ||
|
||
def __init__( | ||
self, | ||
scenario: TestScenario, | ||
dss: DSSInstance, | ||
): | ||
self._scenario = scenario | ||
self._authenticated_session = dss.client | ||
self._invalid_token_session = UTMClientSession( | ||
dss.base_url, auth_adapter=InvalidTokenSignatureAuth() | ||
) | ||
self._no_auth_session = UTMClientSession(dss.base_url, auth_adapter=None) | ||
|
||
def query_no_auth(self, **query_kwargs) -> fetch.Query: | ||
"""Issue a query to the DSS without any credentials being passed""" | ||
q = fetch.query_and_describe(client=self._no_auth_session, **query_kwargs) | ||
self._scenario.record_query(q) | ||
return q | ||
|
||
def query_invalid_token(self, **query_kwargs) -> fetch.Query: | ||
""" | ||
Issue a query to the DSS with an invalid token signature, but a valid token. | ||
An appropriate scope is provided. | ||
""" | ||
q = fetch.query_and_describe( | ||
client=self._invalid_token_session, | ||
scope=Scope.StrategicCoordination, | ||
**query_kwargs, | ||
) | ||
self._scenario.record_query(q) | ||
return q | ||
|
||
def query_missing_scope(self, **query_kwargs) -> fetch.Query: | ||
""" | ||
Issue a query to the DSS with a valid token, but omits specifying a scope. | ||
""" | ||
q = fetch.query_and_describe(client=self._authenticated_session, **query_kwargs) | ||
self._scenario.record_query(q) | ||
return q | ||
|
||
def query_wrong_scope(self, **query_kwargs) -> fetch.Query: | ||
""" | ||
Issue a query to the DSS with a valid token, but with a scope that is not allowed | ||
to perform the operation. | ||
""" | ||
q = fetch.query_and_describe( | ||
client=self._authenticated_session, | ||
scope=Scope.AvailabilityArbitration, # TODO make these configurable via the constructor? | ||
**query_kwargs, | ||
) | ||
self._scenario.record_query(q) | ||
return q | ||
|
||
def query_valid_auth(self, **query_kwargs) -> fetch.Query: | ||
""" | ||
Issue a query to the DSS with valid credentials. | ||
""" | ||
q = fetch.query_and_describe( | ||
client=self._authenticated_session, | ||
scope=Scope.StrategicCoordination, | ||
# TODO make these configurable via the constructor? 'valid' may be different for certain endpoints | ||
**query_kwargs, | ||
) | ||
self._scenario.record_query(q) | ||
return q | ||
|
||
def verify_4xx_response(self, q: fetch.Query): | ||
"""Verifies that the passed query response's body is a valid ErrorResponse: | ||
it is either empty or contains a single 'message' field, as per the OpenAPI spec. | ||
Note that 409 responses to Operational Intent Reference mutations will contain more fields, | ||
these are not handled here. | ||
""" | ||
with self._scenario.check( | ||
"Unauthorized requests return the proper error message body" | ||
) as check: | ||
if len(q.response.json) == 0: | ||
return | ||
elif len(q.response.json) == 1 and "message" in q.response.json: | ||
return | ||
else: | ||
check.record_failed( | ||
summary="Unexpected error response body", | ||
details=f"Response body for {q.request.method} query to {q.request.url} should be empty or contain a single 'message' field. Was: {q.response.json}", | ||
query_timestamps=[q.request.timestamp], | ||
) |
Oops, something went wrong.