udap_security_test_kit 0.10.1 → 0.10.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/udap_security_test_kit/authorization_code_group.rb +4 -0
- data/lib/udap_security_test_kit/authorization_code_redirect_test.rb +38 -1
- data/lib/udap_security_test_kit/client_credentials_group.rb +4 -0
- data/lib/udap_security_test_kit/dynamic_client_registration_group.rb +27 -7
- data/lib/udap_security_test_kit/registration_success_test.rb +15 -1
- data/lib/udap_security_test_kit/version.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 99975cd9d20b91185600d35dca498008f7bd4dc7cb1ae66eb59c572298f55ab0
|
4
|
+
data.tar.gz: 0ff38d8f44564d5fa998e1801f5dd9255613e7060ea78802194cdf8560c39596
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 456628c19deb09f55ab5494e719d0045ea8a19ed93e314a4e75810d688e8f0d18acb1bf1c2261750b03bd6e1128720d662c80802686ddb4cd4a2e52e40868136
|
7
|
+
data.tar.gz: 9a60fd1649675528705afe7a52f3d9057f411001fee1d641e9fffbd0995aad6ea6395dcb5a1d1e9ba6cd215fc5569cc78779663df479f5d67e967b66262c195c
|
@@ -49,6 +49,9 @@ module UDAPSecurityTestKit
|
|
49
49
|
default: 'authorization_code',
|
50
50
|
locked: true
|
51
51
|
},
|
52
|
+
udap_client_registration_status: {
|
53
|
+
name: :udap_auth_code_flow_client_registration_status
|
54
|
+
},
|
52
55
|
udap_client_cert_pem: {
|
53
56
|
name: :udap_auth_code_flow_client_cert_pem,
|
54
57
|
title: 'Authorization Code Client Certificate(s) (PEM Format)'
|
@@ -90,6 +93,7 @@ module UDAPSecurityTestKit
|
|
90
93
|
} do
|
91
94
|
input_order :udap_registration_endpoint,
|
92
95
|
:udap_auth_code_flow_registration_grant_type,
|
96
|
+
:udap_auth_code_flow_client_registration_status,
|
93
97
|
:udap_auth_code_flow_client_cert_pem,
|
94
98
|
:udap_auth_code_flow_client_private_key,
|
95
99
|
:udap_auth_code_flow_cert_iss,
|
@@ -9,6 +9,10 @@ module UDAPSecurityTestKit
|
|
9
9
|
the provided client redirection URI using an HTTP redirection response.
|
10
10
|
)
|
11
11
|
|
12
|
+
input :udap_fhir_base_url,
|
13
|
+
title: 'FHIR Server Base URL',
|
14
|
+
description: 'Base FHIR URL of FHIR Server.'
|
15
|
+
|
12
16
|
input :udap_authorization_endpoint,
|
13
17
|
title: 'Authorization Endpoint',
|
14
18
|
description: 'The full URL from which Inferno will request an authorization code.'
|
@@ -17,7 +21,34 @@ module UDAPSecurityTestKit
|
|
17
21
|
title: 'Client ID',
|
18
22
|
description: 'Client ID as registered with the authorization server.'
|
19
23
|
|
24
|
+
input :udap_authorization_code_request_scopes,
|
25
|
+
title: 'Scope Parameter for Authorization Request',
|
26
|
+
description: %(
|
27
|
+
A list of space-separated scopes to include in the authorization request. If included, these may be equal
|
28
|
+
to or a subset of the scopes requested during registration.
|
29
|
+
If empty, scope will be omitted as a parameter to the authorization endpoint.
|
30
|
+
),
|
31
|
+
optional: true
|
32
|
+
|
33
|
+
input :udap_authorization_code_request_aud,
|
34
|
+
title: "Audience ('aud') Parameter for Authorization Request",
|
35
|
+
type: 'checkbox',
|
36
|
+
options: {
|
37
|
+
list_options: [
|
38
|
+
{
|
39
|
+
label: "Include 'aud' parameter",
|
40
|
+
value: 'include_aud'
|
41
|
+
}
|
42
|
+
]
|
43
|
+
},
|
44
|
+
description: %(
|
45
|
+
If selected, the Base FHIR URL will be used as the 'aud' parameter in the request to the authorization
|
46
|
+
endpoint.
|
47
|
+
),
|
48
|
+
optional: true
|
49
|
+
|
20
50
|
output :udap_authorization_code_state
|
51
|
+
output :udap_authorization_redirect_url
|
21
52
|
|
22
53
|
receives_request :redirect
|
23
54
|
|
@@ -55,11 +86,15 @@ module UDAPSecurityTestKit
|
|
55
86
|
|
56
87
|
output udap_authorization_code_state: SecureRandom.uuid
|
57
88
|
|
89
|
+
aud = udap_fhir_base_url if udap_authorization_code_request_aud.include? 'include_aud'
|
90
|
+
|
58
91
|
oauth2_params = {
|
59
92
|
'response_type' => 'code',
|
60
93
|
'client_id' => udap_client_id,
|
61
94
|
'redirect_uri' => config.options[:redirect_uri],
|
62
|
-
'state' => udap_authorization_code_state
|
95
|
+
'state' => udap_authorization_code_state,
|
96
|
+
'scope' => udap_authorization_code_request_scopes,
|
97
|
+
'aud' => aud
|
63
98
|
}.compact
|
64
99
|
|
65
100
|
authorization_url = authorization_url_builder(
|
@@ -69,6 +104,8 @@ module UDAPSecurityTestKit
|
|
69
104
|
|
70
105
|
info("Inferno redirecting browser to #{authorization_url}.")
|
71
106
|
|
107
|
+
output udap_authorization_redirect_url: authorization_url
|
108
|
+
|
72
109
|
wait(
|
73
110
|
identifier: udap_authorization_code_state,
|
74
111
|
message: wait_message(authorization_url)
|
@@ -51,6 +51,9 @@ module UDAPSecurityTestKit
|
|
51
51
|
default: 'client_credentials',
|
52
52
|
locked: true
|
53
53
|
},
|
54
|
+
udap_client_registration_status: {
|
55
|
+
name: :udap_client_credentials_flow_client_registration_status
|
56
|
+
},
|
54
57
|
udap_client_cert_pem: {
|
55
58
|
name: :udap_client_credentials_flow_client_cert_pem,
|
56
59
|
title: 'Client Credentials Client Certificate(s) (PEM Format)'
|
@@ -92,6 +95,7 @@ module UDAPSecurityTestKit
|
|
92
95
|
} do
|
93
96
|
input_order :udap_registration_endpoint,
|
94
97
|
:udap_client_credentials_flow_registration_grant_type,
|
98
|
+
:udap_client_credentials_flow_client_registration_status,
|
95
99
|
:udap_client_credentials_flow_client_cert_pem,
|
96
100
|
:udap_client_credentials_flow_client_private_key,
|
97
101
|
:udap_cert_iss_client_creds_flow,
|
@@ -19,13 +19,12 @@ module UDAPSecurityTestKit
|
|
19
19
|
establish a trust chain.
|
20
20
|
|
21
21
|
Cancelling a UDAP client's registration is not a required server capability and as such the Inferno client has no
|
22
|
-
way of resetting state on the authorization server after a successful registration attempt.
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
- Provide a different client certificate and its associated URI to register a new logical client
|
22
|
+
way of resetting state on the authorization server after a successful registration attempt. If a given
|
23
|
+
certificate and issuer URI identity combination has already been registered with the authorization server, testers
|
24
|
+
whose systems support registration modifications
|
25
|
+
may select the "Update Registration" option under Client Registration Status. This option will accept either a
|
26
|
+
`200 OK` or `201 Created` return status. Registration attempts for a new client may only return `201 Created`,
|
27
|
+
per the [IG](https://hl7.org/fhir/us/udap-security/STU1/registration.html#request-body).
|
29
28
|
)
|
30
29
|
end
|
31
30
|
|
@@ -57,6 +56,27 @@ module UDAPSecurityTestKit
|
|
57
56
|
]
|
58
57
|
}
|
59
58
|
|
59
|
+
input :udap_client_registration_status,
|
60
|
+
title: 'Client Registration Status',
|
61
|
+
description: %(
|
62
|
+
If the client's iss and certificate combination has already been registered with the authorization server
|
63
|
+
prior to this test run, select 'Update'.
|
64
|
+
),
|
65
|
+
type: 'radio',
|
66
|
+
options: {
|
67
|
+
list_options: [
|
68
|
+
{
|
69
|
+
label: 'New Registration (201 Response Code Expected)',
|
70
|
+
value: 'new'
|
71
|
+
},
|
72
|
+
{
|
73
|
+
label: 'Update Registration (200 or 201 Response Code Expected)',
|
74
|
+
value: 'update'
|
75
|
+
}
|
76
|
+
]
|
77
|
+
},
|
78
|
+
default: 'new'
|
79
|
+
|
60
80
|
input :udap_client_cert_pem,
|
61
81
|
title: 'X.509 Client Certificate(s) (PEM Format)',
|
62
82
|
description: %(
|
@@ -13,6 +13,14 @@ module UDAPSecurityTestKit
|
|
13
13
|
The [UDAP IG Section 3.2.3](https://hl7.org/fhir/us/udap-security/STU1/registration.html#request-body) states:
|
14
14
|
> If a new registration is successful, the Authorization Server SHALL return a registration response with a 201
|
15
15
|
> Created HTTP response code as per Section 5.1 of UDAP Dynamic Client Registration
|
16
|
+
|
17
|
+
If the tester indicated this registration attempt represents a modification of an existing registration entry,
|
18
|
+
the [UDAP IG Section 3.4](https://hl7.org/fhir/us/udap-security/STU1/registration.html#modifying-and-cancelling-registrations)
|
19
|
+
states:
|
20
|
+
> If the Authorization Server returns the same client_id in the registration response for a modification request,
|
21
|
+
> it SHOULD also return a 200 OK HTTP response code.
|
22
|
+
|
23
|
+
In this case, the test will require either a 201 or 200 response code to pass.
|
16
24
|
)
|
17
25
|
|
18
26
|
input :udap_client_cert_pem
|
@@ -20,6 +28,7 @@ module UDAPSecurityTestKit
|
|
20
28
|
input :udap_cert_iss
|
21
29
|
|
22
30
|
input :udap_registration_endpoint
|
31
|
+
input :udap_client_registration_status
|
23
32
|
input :udap_jwt_signing_alg
|
24
33
|
input :udap_registration_requested_scope
|
25
34
|
input :udap_registration_grant_type
|
@@ -60,7 +69,12 @@ module UDAPSecurityTestKit
|
|
60
69
|
|
61
70
|
post(udap_registration_endpoint, body: reg_body, headers: reg_headers)
|
62
71
|
|
63
|
-
|
72
|
+
if udap_client_registration_status == 'new'
|
73
|
+
assert_response_status(201)
|
74
|
+
elsif udap_client_registration_status == 'update'
|
75
|
+
assert_response_status([200, 201])
|
76
|
+
end
|
77
|
+
|
64
78
|
assert_valid_json(response[:body])
|
65
79
|
output udap_registration_response: response[:body]
|
66
80
|
end
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: udap_security_test_kit
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.10.
|
4
|
+
version: 0.10.2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Stephen MacVicar
|
@@ -9,7 +9,7 @@ authors:
|
|
9
9
|
autorequire:
|
10
10
|
bindir: bin
|
11
11
|
cert_chain: []
|
12
|
-
date: 2024-12-
|
12
|
+
date: 2024-12-20 00:00:00.000000000 Z
|
13
13
|
dependencies:
|
14
14
|
- !ruby/object:Gem::Dependency
|
15
15
|
name: inferno_core
|