3
3
"""
4
4
5
5
import logging
6
+ from collections .abc import Mapping
6
7
7
8
from mock_vws ._database_matchers import get_database_matching_client_keys
8
9
from mock_vws ._query_validators .exceptions import (
15
16
_LOGGER = logging .getLogger (name = __name__ )
16
17
17
18
18
- def validate_auth_header_exists (* , request_headers : dict [str , str ]) -> None :
19
+ def validate_auth_header_exists (* , request_headers : Mapping [str , str ]) -> None :
19
20
"""
20
21
Validate that there is an authorization header given to the query endpoint.
21
22
@@ -34,7 +35,7 @@ def validate_auth_header_exists(*, request_headers: dict[str, str]) -> None:
34
35
35
36
def validate_auth_header_number_of_parts (
36
37
* ,
37
- request_headers : dict [str , str ],
38
+ request_headers : Mapping [str , str ],
38
39
) -> None :
39
40
"""
40
41
Validate the authorization header includes text either side of a space.
@@ -58,7 +59,7 @@ def validate_auth_header_number_of_parts(
58
59
59
60
def validate_client_key_exists (
60
61
* ,
61
- request_headers : dict [str , str ],
62
+ request_headers : Mapping [str , str ],
62
63
databases : set [VuforiaDatabase ],
63
64
) -> None :
64
65
"""
@@ -83,7 +84,7 @@ def validate_client_key_exists(
83
84
84
85
85
86
def validate_auth_header_has_signature (
86
- request_headers : dict [str , str ],
87
+ request_headers : Mapping [str , str ],
87
88
) -> None :
88
89
"""
89
90
Validate the authorization header includes a signature.
@@ -105,7 +106,7 @@ def validate_auth_header_has_signature(
105
106
def validate_authorization (
106
107
* ,
107
108
request_path : str ,
108
- request_headers : dict [str , str ],
109
+ request_headers : Mapping [str , str ],
109
110
request_body : bytes ,
110
111
request_method : str ,
111
112
databases : set [VuforiaDatabase ],
0 commit comments