Skip to content

Add provider user scanning to ZAP #1467

@jlkravitz

Description

@jlkravitz

Follow-up from #1466.

The License API has 10 endpoints using a separate Cognito user pool (ProviderUsersPoolAuthorizer) for provider/licensee users. The ZAP scan currently uses a staff user credential, so all provider endpoints return 401.

Endpoints not being scanned:

  • POST /v1/purchases/privileges
  • GET /v1/provider-users/me
  • GET /v1/compacts/{compact}/attestations/{attestationId}
  • GET /v1/purchases/privileges/options
  • GET /v1/provider-users/me/jurisdiction/{jurisdiction}/licenseType/{licenseType}/history
  • PUT /v1/provider-users/me/home-jurisdiction
  • POST /v1/provider-users/me/military-affiliation
  • PATCH /v1/provider-users/me/military-affiliation
  • PATCH /v1/provider-users/me/email
  • POST /v1/provider-users/me/email/verify

What's needed:

  • Provision a test provider user in the test environment's provider Cognito pool
  • Add provider-specific secrets to the GitHub repo (TEST_COGNITO_PROVIDER_POOL_ID, etc.)
  • Update the workflow to obtain a second token and either run a second scan or configure a second ZAP context

Metadata

Metadata

Assignees

Labels

No labels
No labels

Type

No type

Projects

Status

No status

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions