33"""
44
55import logging
6+ from collections .abc import Mapping
67
78from mock_vws ._database_matchers import get_database_matching_client_keys
89from mock_vws ._query_validators .exceptions import (
1516_LOGGER = logging .getLogger (name = __name__ )
1617
1718
18- def validate_auth_header_exists (* , request_headers : dict [str , str ]) -> None :
19+ def validate_auth_header_exists (* , request_headers : Mapping [str , str ]) -> None :
1920 """
2021 Validate that there is an authorization header given to the query endpoint.
2122
@@ -34,7 +35,7 @@ def validate_auth_header_exists(*, request_headers: dict[str, str]) -> None:
3435
3536def validate_auth_header_number_of_parts (
3637 * ,
37- request_headers : dict [str , str ],
38+ request_headers : Mapping [str , str ],
3839) -> None :
3940 """
4041 Validate the authorization header includes text either side of a space.
@@ -58,7 +59,7 @@ def validate_auth_header_number_of_parts(
5859
5960def validate_client_key_exists (
6061 * ,
61- request_headers : dict [str , str ],
62+ request_headers : Mapping [str , str ],
6263 databases : set [VuforiaDatabase ],
6364) -> None :
6465 """
@@ -83,7 +84,7 @@ def validate_client_key_exists(
8384
8485
8586def validate_auth_header_has_signature (
86- request_headers : dict [str , str ],
87+ request_headers : Mapping [str , str ],
8788) -> None :
8889 """
8990 Validate the authorization header includes a signature.
@@ -105,7 +106,7 @@ def validate_auth_header_has_signature(
105106def validate_authorization (
106107 * ,
107108 request_path : str ,
108- request_headers : dict [str , str ],
109+ request_headers : Mapping [str , str ],
109110 request_body : bytes ,
110111 request_method : str ,
111112 databases : set [VuforiaDatabase ],
0 commit comments