Skip to content

Add provider user scanning to ZAP #1467

@jlkravitz

Description

@jlkravitz

Follow-up from #1466.

The License API has 10 endpoints using a separate Cognito user pool (ProviderUsersPoolAuthorizer) for provider/licensee users. The ZAP scan currently uses a staff user credential, so all provider endpoints return 401.

Endpoints not being scanned:

  • POST /v1/purchases/privileges
  • GET /v1/provider-users/me
  • GET /v1/compacts/{compact}/attestations/{attestationId}
  • GET /v1/purchases/privileges/options
  • GET /v1/provider-users/me/jurisdiction/{jurisdiction}/licenseType/{licenseType}/history
  • PUT /v1/provider-users/me/home-jurisdiction
  • POST /v1/provider-users/me/military-affiliation
  • PATCH /v1/provider-users/me/military-affiliation
  • PATCH /v1/provider-users/me/email
  • POST /v1/provider-users/me/email/verify

What's needed:

  • Provision a test provider user in the test environment's provider Cognito pool
  • Add provider-specific secrets to the GitHub repo (TEST_COGNITO_PROVIDER_POOL_ID, etc.)
  • Update the workflow to obtain a second token and either run a second scan or configure a second ZAP context

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type
No fields configured for issues without a type.

Projects

Status

No status

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions