udap_security_test_kit 0.10.1 → 0.10.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/udap_security_test_kit/authorization_code_group.rb +4 -0
- data/lib/udap_security_test_kit/authorization_code_redirect_test.rb +38 -1
- data/lib/udap_security_test_kit/client_credentials_group.rb +4 -0
- data/lib/udap_security_test_kit/dynamic_client_registration_group.rb +27 -7
- data/lib/udap_security_test_kit/registration_success_test.rb +15 -1
- data/lib/udap_security_test_kit/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 99975cd9d20b91185600d35dca498008f7bd4dc7cb1ae66eb59c572298f55ab0
|
4
|
+
data.tar.gz: 0ff38d8f44564d5fa998e1801f5dd9255613e7060ea78802194cdf8560c39596
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 456628c19deb09f55ab5494e719d0045ea8a19ed93e314a4e75810d688e8f0d18acb1bf1c2261750b03bd6e1128720d662c80802686ddb4cd4a2e52e40868136
|
7
|
+
data.tar.gz: 9a60fd1649675528705afe7a52f3d9057f411001fee1d641e9fffbd0995aad6ea6395dcb5a1d1e9ba6cd215fc5569cc78779663df479f5d67e967b66262c195c
|
@@ -49,6 +49,9 @@ module UDAPSecurityTestKit
|
|
49
49
|
default: 'authorization_code',
|
50
50
|
locked: true
|
51
51
|
},
|
52
|
+
udap_client_registration_status: {
|
53
|
+
name: :udap_auth_code_flow_client_registration_status
|
54
|
+
},
|
52
55
|
udap_client_cert_pem: {
|
53
56
|
name: :udap_auth_code_flow_client_cert_pem,
|
54
57
|
title: 'Authorization Code Client Certificate(s) (PEM Format)'
|
@@ -90,6 +93,7 @@ module UDAPSecurityTestKit
|
|
90
93
|
} do
|
91
94
|
input_order :udap_registration_endpoint,
|
92
95
|
:udap_auth_code_flow_registration_grant_type,
|
96
|
+
:udap_auth_code_flow_client_registration_status,
|
93
97
|
:udap_auth_code_flow_client_cert_pem,
|
94
98
|
:udap_auth_code_flow_client_private_key,
|
95
99
|
:udap_auth_code_flow_cert_iss,
|
@@ -9,6 +9,10 @@ module UDAPSecurityTestKit
|
|
9
9
|
the provided client redirection URI using an HTTP redirection response.
|
10
10
|
)
|
11
11
|
|
12
|
+
input :udap_fhir_base_url,
|
13
|
+
title: 'FHIR Server Base URL',
|
14
|
+
description: 'Base FHIR URL of FHIR Server.'
|
15
|
+
|
12
16
|
input :udap_authorization_endpoint,
|
13
17
|
title: 'Authorization Endpoint',
|
14
18
|
description: 'The full URL from which Inferno will request an authorization code.'
|
@@ -17,7 +21,34 @@ module UDAPSecurityTestKit
|
|
17
21
|
title: 'Client ID',
|
18
22
|
description: 'Client ID as registered with the authorization server.'
|
19
23
|
|
24
|
+
input :udap_authorization_code_request_scopes,
|
25
|
+
title: 'Scope Parameter for Authorization Request',
|
26
|
+
description: %(
|
27
|
+
A list of space-separated scopes to include in the authorization request. If included, these may be equal
|
28
|
+
to or a subset of the scopes requested during registration.
|
29
|
+
If empty, scope will be omitted as a parameter to the authorization endpoint.
|
30
|
+
),
|
31
|
+
optional: true
|
32
|
+
|
33
|
+
input :udap_authorization_code_request_aud,
|
34
|
+
title: "Audience ('aud') Parameter for Authorization Request",
|
35
|
+
type: 'checkbox',
|
36
|
+
options: {
|
37
|
+
list_options: [
|
38
|
+
{
|
39
|
+
label: "Include 'aud' parameter",
|
40
|
+
value: 'include_aud'
|
41
|
+
}
|
42
|
+
]
|
43
|
+
},
|
44
|
+
description: %(
|
45
|
+
If selected, the Base FHIR URL will be used as the 'aud' parameter in the request to the authorization
|
46
|
+
endpoint.
|
47
|
+
),
|
48
|
+
optional: true
|
49
|
+
|
20
50
|
output :udap_authorization_code_state
|
51
|
+
output :udap_authorization_redirect_url
|
21
52
|
|
22
53
|
receives_request :redirect
|
23
54
|
|
@@ -55,11 +86,15 @@ module UDAPSecurityTestKit
|
|
55
86
|
|
56
87
|
output udap_authorization_code_state: SecureRandom.uuid
|
57
88
|
|
89
|
+
aud = udap_fhir_base_url if udap_authorization_code_request_aud.include? 'include_aud'
|
90
|
+
|
58
91
|
oauth2_params = {
|
59
92
|
'response_type' => 'code',
|
60
93
|
'client_id' => udap_client_id,
|
61
94
|
'redirect_uri' => config.options[:redirect_uri],
|
62
|
-
'state' => udap_authorization_code_state
|
95
|
+
'state' => udap_authorization_code_state,
|
96
|
+
'scope' => udap_authorization_code_request_scopes,
|
97
|
+
'aud' => aud
|
63
98
|
}.compact
|
64
99
|
|
65
100
|
authorization_url = authorization_url_builder(
|
@@ -69,6 +104,8 @@ module UDAPSecurityTestKit
|
|
69
104
|
|
70
105
|
info("Inferno redirecting browser to #{authorization_url}.")
|
71
106
|
|
107
|
+
output udap_authorization_redirect_url: authorization_url
|
108
|
+
|
72
109
|
wait(
|
73
110
|
identifier: udap_authorization_code_state,
|
74
111
|
message: wait_message(authorization_url)
|
@@ -51,6 +51,9 @@ module UDAPSecurityTestKit
|
|
51
51
|
default: 'client_credentials',
|
52
52
|
locked: true
|
53
53
|
},
|
54
|
+
udap_client_registration_status: {
|
55
|
+
name: :udap_client_credentials_flow_client_registration_status
|
56
|
+
},
|
54
57
|
udap_client_cert_pem: {
|
55
58
|
name: :udap_client_credentials_flow_client_cert_pem,
|
56
59
|
title: 'Client Credentials Client Certificate(s) (PEM Format)'
|
@@ -92,6 +95,7 @@ module UDAPSecurityTestKit
|
|
92
95
|
} do
|
93
96
|
input_order :udap_registration_endpoint,
|
94
97
|
:udap_client_credentials_flow_registration_grant_type,
|
98
|
+
:udap_client_credentials_flow_client_registration_status,
|
95
99
|
:udap_client_credentials_flow_client_cert_pem,
|
96
100
|
:udap_client_credentials_flow_client_private_key,
|
97
101
|
:udap_cert_iss_client_creds_flow,
|
@@ -19,13 +19,12 @@ module UDAPSecurityTestKit
|
|
19
19
|
establish a trust chain.
|
20
20
|
|
21
21
|
Cancelling a UDAP client's registration is not a required server capability and as such the Inferno client has no
|
22
|
-
way of resetting state on the authorization server after a successful registration attempt.
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
- Provide a different client certificate and its associated URI to register a new logical client
|
22
|
+
way of resetting state on the authorization server after a successful registration attempt. If a given
|
23
|
+
certificate and issuer URI identity combination has already been registered with the authorization server, testers
|
24
|
+
whose systems support registration modifications
|
25
|
+
may select the "Update Registration" option under Client Registration Status. This option will accept either a
|
26
|
+
`200 OK` or `201 Created` return status. Registration attempts for a new client may only return `201 Created`,
|
27
|
+
per the [IG](https://hl7.org/fhir/us/udap-security/STU1/registration.html#request-body).
|
29
28
|
)
|
30
29
|
end
|
31
30
|
|
@@ -57,6 +56,27 @@ module UDAPSecurityTestKit
|
|
57
56
|
]
|
58
57
|
}
|
59
58
|
|
59
|
+
input :udap_client_registration_status,
|
60
|
+
title: 'Client Registration Status',
|
61
|
+
description: %(
|
62
|
+
If the client's iss and certificate combination has already been registered with the authorization server
|
63
|
+
prior to this test run, select 'Update'.
|
64
|
+
),
|
65
|
+
type: 'radio',
|
66
|
+
options: {
|
67
|
+
list_options: [
|
68
|
+
{
|
69
|
+
label: 'New Registration (201 Response Code Expected)',
|
70
|
+
value: 'new'
|
71
|
+
},
|
72
|
+
{
|
73
|
+
label: 'Update Registration (200 or 201 Response Code Expected)',
|
74
|
+
value: 'update'
|
75
|
+
}
|
76
|
+
]
|
77
|
+
},
|
78
|
+
default: 'new'
|
79
|
+
|
60
80
|
input :udap_client_cert_pem,
|
61
81
|
title: 'X.509 Client Certificate(s) (PEM Format)',
|
62
82
|
description: %(
|
@@ -13,6 +13,14 @@ module UDAPSecurityTestKit
|
|
13
13
|
The [UDAP IG Section 3.2.3](https://hl7.org/fhir/us/udap-security/STU1/registration.html#request-body) states:
|
14
14
|
> If a new registration is successful, the Authorization Server SHALL return a registration response with a 201
|
15
15
|
> Created HTTP response code as per Section 5.1 of UDAP Dynamic Client Registration
|
16
|
+
|
17
|
+
If the tester indicated this registration attempt represents a modification of an existing registration entry,
|
18
|
+
the [UDAP IG Section 3.4](https://hl7.org/fhir/us/udap-security/STU1/registration.html#modifying-and-cancelling-registrations)
|
19
|
+
states:
|
20
|
+
> If the Authorization Server returns the same client_id in the registration response for a modification request,
|
21
|
+
> it SHOULD also return a 200 OK HTTP response code.
|
22
|
+
|
23
|
+
In this case, the test will require either a 201 or 200 response code to pass.
|
16
24
|
)
|
17
25
|
|
18
26
|
input :udap_client_cert_pem
|
@@ -20,6 +28,7 @@ module UDAPSecurityTestKit
|
|
20
28
|
input :udap_cert_iss
|
21
29
|
|
22
30
|
input :udap_registration_endpoint
|
31
|
+
input :udap_client_registration_status
|
23
32
|
input :udap_jwt_signing_alg
|
24
33
|
input :udap_registration_requested_scope
|
25
34
|
input :udap_registration_grant_type
|
@@ -60,7 +69,12 @@ module UDAPSecurityTestKit
|
|
60
69
|
|
61
70
|
post(udap_registration_endpoint, body: reg_body, headers: reg_headers)
|
62
71
|
|
63
|
-
|
72
|
+
if udap_client_registration_status == 'new'
|
73
|
+
assert_response_status(201)
|
74
|
+
elsif udap_client_registration_status == 'update'
|
75
|
+
assert_response_status([200, 201])
|
76
|
+
end
|
77
|
+
|
64
78
|
assert_valid_json(response[:body])
|
65
79
|
output udap_registration_response: response[:body]
|
66
80
|
end
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: udap_security_test_kit
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.10.
|
4
|
+
version: 0.10.2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Stephen MacVicar
|
@@ -9,7 +9,7 @@ authors:
|
|
9
9
|
autorequire:
|
10
10
|
bindir: bin
|
11
11
|
cert_chain: []
|
12
|
-
date: 2024-12-
|
12
|
+
date: 2024-12-20 00:00:00.000000000 Z
|
13
13
|
dependencies:
|
14
14
|
- !ruby/object:Gem::Dependency
|
15
15
|
name: inferno_core
|