Flight authorisation validation

scenarios.uspace.flight_auth.Validation

Resources

KML visualization

Case Step Event uss2
1 📓 Planner: uss2
Attempt invalid flights Inject invalid flight intents 2 🌐
  • PUT scdsc.uss2.localutm 200
    :
    • request
      :
      • method
        :
        PUT
      • url
        :
        http://scdsc.uss2.localutm/scdsc/v1/flights/1145ec5f-37a8-4a5c-9f56-fc3ab6edca87
      • initiated_at
        :
        2026-01-07T09:27:43.912473Z
      • headers
        :
        • User-Agent
          :
          python-requests/2.32.4
        • Accept-Encoding
          :
          gzip, deflate, br
        • Accept
          :
          */*
        • Connection
          :
          keep-alive
        • Content-Length
          :
          1123
        • Content-Type
          :
          application/json
        • Authorization
          :
          Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJzY2RzYy51c3MyLmxvY2FsdXRtIiwiZXhwIjoxNzY3NzgxNTg4LCJpc3MiOiJkdW1teSIsInNjb3BlIjoidXRtLmluamVjdF90ZXN0X2RhdGEiLCJzdWIiOiJ1c3NfcXVhbGlmaWVyIn0.REDACTED
      • json
        :
        • operational_intent
          :
          • state
            :
            Accepted
          • priority
            :
            0
          • volumes
            :
            • item_1
              :
              • volume
                :
                • outline_polygon
                  :
                  • vertices
                    :
                    • item_1
                      :
                      • lng
                        :
                        7.477504823470508
                      • lat
                        :
                        46.97472299984816
                    • item_2
                      :
                      • lng
                        :
                        7.477504820370851
                      • lat
                        :
                        46.97556599981216
                    • item_3
                      :
                      • lng
                        :
                        7.477505769789705
                      • lat
                        :
                        46.97557922815897
                • altitude_lower
                  :
                  • value
                    :
                    605.0
                  • reference
                    :
                    W84
                  • units
                    :
                    M
                • altitude_upper
                  :
                  • value
                    :
                    635.0
                  • reference
                    :
                    W84
                  • units
                    :
                    M
              • time_start
                :
                • value
                  :
                  2026-01-07T09:27:42.909061Z
                • format
                  :
                  RFC3339
              • time_end
                :
                • value
                  :
                  2026-01-07T09:32:42.909061Z
                • format
                  :
                  RFC3339
          • off_nominal_volumes
            :
        • flight_authorisation
          :
          • uas_serial_number
            :
            My serial number
          • operation_category
            :
            Open
          • operation_mode
            :
            Vlos
          • uas_class
            :
            C0
          • identification_technologies
            :
            • item_1
              :
              ASTMNetRID
          • connectivity_methods
            :
            • item_1
              :
              cellular
          • endurance_minutes
            :
            30
          • emergency_procedure_url
            :
            https://testdummy.interuss.org/interuss/monitoring/uss_qualifier/test_data/che/flight_intents/invalid_flight_auths/invalid_flight_auth/emergency
          • operator_id
            :
            CHEo5kut30e0mt01-qwe
        • request_id
          :
          e9751d60-cdd7-466d-9fff-f54eec470ec4
      • body
        :
        None
    • response
      :
      • code
        :
        200
      • headers
        :
        • Server
          :
          gunicorn
        • Date
          :
          Wed, 07 Jan 2026 09:27:43 GMT
        • Connection
          :
          keep-alive
        • Content-Type
          :
          application/json
        • Content-Length
          :
          903
      • elapsed_s
        :
        0.031475
      • reported
        :
        2026-01-07T09:27:43.944389Z
      • json
        :
        • notes
          :
          Invalid serial number
        • result
          :
          Rejected
        • log_messages
          :
          • item_1
            :
            [2026-01-07 09:27:43.918 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:117] [inject_flight/40:1145ec5f-37a8-4a5c-9f56-fc3ab6edca87] Starting handler
          • item_2
            :
            [2026-01-07 09:27:43.919 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:117] [inject_flight/40:1145ec5f-37a8-4a5c-9f56-fc3ab6edca87] Acquiring lock for flight 1145ec5f-37a8-4a5c-9f56-fc3ab6edca87
          • item_3
            :
            [2026-01-07 09:27:43.930 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:117] [inject_flight/40:1145ec5f-37a8-4a5c-9f56-fc3ab6edca87] Request is for a new flight (lock established)
          • item_4
            :
            [2026-01-07 09:27:43.942 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:117] [inject_flight/40:1145ec5f-37a8-4a5c-9f56-fc3ab6edca87] Releasing placeholder for existing flight_id 1145ec5f-37a8-4a5c-9f56-fc3ab6edca87
      • body
        :
        None
    • query_type
      :
      interuss.deprecated_scd_injection.v1.injectFlight
    • participant_id
      :
      uss2
🌐
3 Failure
4 Incorrectly planned
Plan valid flight Plan valid flight intent 5 🌐
  • PUT scdsc.uss2.localutm 200
    :
    • request
      :
      • method
        :
        PUT
      • url
        :
        http://scdsc.uss2.localutm/scdsc/v1/flights/77ffffc5-e460-46b8-9f43-b549f6d76b62
      • initiated_at
        :
        2026-01-07T09:27:43.947704Z
      • headers
        :
        • User-Agent
          :
          python-requests/2.32.4
        • Accept-Encoding
          :
          gzip, deflate, br
        • Accept
          :
          */*
        • Connection
          :
          keep-alive
        • Content-Length
          :
          1119
        • Content-Type
          :
          application/json
        • Authorization
          :
          Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJzY2RzYy51c3MyLmxvY2FsdXRtIiwiZXhwIjoxNzY3NzgxNTg4LCJpc3MiOiJkdW1teSIsInNjb3BlIjoidXRtLmluamVjdF90ZXN0X2RhdGEiLCJzdWIiOiJ1c3NfcXVhbGlmaWVyIn0.REDACTED
      • json
        :
        • operational_intent
          :
          • state
            :
            Accepted
          • priority
            :
            0
          • volumes
            :
            • item_1
              :
              • volume
                :
                • outline_polygon
                  :
                  • vertices
                    :
                    • item_1
                      :
                      • lng
                        :
                        7.477504823470508
                      • lat
                        :
                        46.97472299984816
                    • item_2
                      :
                      • lng
                        :
                        7.477504820370851
                      • lat
                        :
                        46.97556599981216
                    • item_3
                      :
                      • lng
                        :
                        7.477505769789705
                      • lat
                        :
                        46.97557922815897
                • altitude_lower
                  :
                  • value
                    :
                    605.0
                  • reference
                    :
                    W84
                  • units
                    :
                    M
                • altitude_upper
                  :
                  • value
                    :
                    635.0
                  • reference
                    :
                    W84
                  • units
                    :
                    M
              • time_start
                :
                • value
                  :
                  2026-01-07T09:27:42.909061Z
                • format
                  :
                  RFC3339
              • time_end
                :
                • value
                  :
                  2026-01-07T09:32:42.909061Z
                • format
                  :
                  RFC3339
          • off_nominal_volumes
            :
        • flight_authorisation
          :
          • uas_serial_number
            :
            1AF49UL5CC5J6K
          • operation_category
            :
            Open
          • operation_mode
            :
            Vlos
          • uas_class
            :
            C0
          • identification_technologies
            :
            • item_1
              :
              ASTMNetRID
          • connectivity_methods
            :
            • item_1
              :
              cellular
          • endurance_minutes
            :
            30
          • emergency_procedure_url
            :
            https://testdummy.interuss.org/interuss/monitoring/uss_qualifier/test_data/che/flight_intents/invalid_flight_auths/valid_flight_auth/emergency
          • operator_id
            :
            CHEo5kut30e0mt01-qwe
        • request_id
          :
          14f15b80-650d-45fd-b678-51e838c67077
      • body
        :
        None
    • response
      :
      • code
        :
        200
      • headers
        :
        • Server
          :
          gunicorn
        • Date
          :
          Wed, 07 Jan 2026 09:27:44 GMT
        • Connection
          :
          keep-alive
        • Content-Type
          :
          application/json
        • Content-Length
          :
          2400
      • elapsed_s
        :
        0.104055
      • reported
        :
        2026-01-07T09:27:44.052258Z
      • json
        :
        • result
          :
          Planned
        • log_messages
          :
          • item_1
            :
            [2026-01-07 09:27:43.952 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:117] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Starting handler
          • item_2
            :
            [2026-01-07 09:27:43.954 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:117] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Acquiring lock for flight 77ffffc5-e460-46b8-9f43-b549f6d76b62
          • item_3
            :
            [2026-01-07 09:27:43.964 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:117] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Request is for a new flight (lock established)
          • item_4
            :
            [2026-01-07 09:27:43.967 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:155] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Obtaining latest operational intent information
          • item_5
            :
            [2026-01-07 09:27:43.993 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:155] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Checking for intersections with
          • item_6
            :
            [2026-01-07 09:27:43.994 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:155] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Sharing operational intent with DSS
          • item_7
            :
            [2026-01-07 09:27:43.994 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:155] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Creating new operational intent 258941cc-fdac-4668-a75a-461ffe722877 in DSS
          • item_8
            :
            [2026-01-07 09:27:44.006 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:155] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Notifying http://scdsc.uss2.localutm/mock/scd
          • item_9
            :
            [2026-01-07 09:27:44.026 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:155] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] No notifications failed
          • item_10
            :
            [2026-01-07 09:27:44.026 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:155] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Storing flight in database
          • item_11
            :
            [2026-01-07 09:27:44.038 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:155] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Complete.
          • item_12
            :
            [2026-01-07 09:27:44.050 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:117] [inject_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Releasing lock on existing flight_id 77ffffc5-e460-46b8-9f43-b549f6d76b62
      • body
        :
        None
    • query_type
      :
      interuss.deprecated_scd_injection.v1.injectFlight
    • participant_id
      :
      uss2
🌐
6 Failure
7 Successful planning
Cleanup 8 🌐
  • DELETE scdsc.uss2.localutm 200
    :
    • request
      :
      • method
        :
        DELETE
      • url
        :
        http://scdsc.uss2.localutm/scdsc/v1/flights/77ffffc5-e460-46b8-9f43-b549f6d76b62
      • initiated_at
        :
        2026-01-07T09:27:44.052658Z
      • headers
        :
        • User-Agent
          :
          python-requests/2.32.4
        • Accept-Encoding
          :
          gzip, deflate, br
        • Accept
          :
          */*
        • Connection
          :
          keep-alive
        • Content-Length
          :
          0
        • Authorization
          :
          Bearer eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdWQiOiJzY2RzYy51c3MyLmxvY2FsdXRtIiwiZXhwIjoxNzY3NzgxNTg4LCJpc3MiOiJkdW1teSIsInNjb3BlIjoidXRtLmluamVjdF90ZXN0X2RhdGEiLCJzdWIiOiJ1c3NfcXVhbGlmaWVyIn0.REDACTED
      • body
        :
        None
      • json
        :
        None
    • response
      :
      • code
        :
        200
      • headers
        :
        • Server
          :
          gunicorn
        • Date
          :
          Wed, 07 Jan 2026 09:27:44 GMT
        • Connection
          :
          keep-alive
        • Content-Type
          :
          application/json
        • Content-Length
          :
          1051
      • elapsed_s
        :
        0.03691
      • reported
        :
        2026-01-07T09:27:44.090021Z
      • json
        :
        • result
          :
          Closed
        • log_messages
          :
          • item_1
            :
            [2026-01-07 09:27:44.057 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:288] [delete_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Acquiring and deleting flight
          • item_2
            :
            [2026-01-07 09:27:44.070 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:288] [delete_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] deleting operational intent 258941cc-fdac-4668-a75a-461ffe722877 with OVN jwo1.LYYrRc4a9Ylf28B57fC4NjnKnuftZ1-TV3N94w_ from DSS
          • item_3
            :
            [2026-01-07 09:27:44.082 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:288] [delete_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Notifying http://scdsc.uss2.localutm/mock/scd
          • item_4
            :
            [2026-01-07 09:27:44.089 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:288] [delete_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] No notifications failed
          • item_5
            :
            [2026-01-07 09:27:44.089 DEBUG monitoring.mock_uss.scd_injection.routes_injection:log:288] [delete_flight/40:77ffffc5-e460-46b8-9f43-b549f6d76b62] Complete.
      • body
        :
        None
    • query_type
      :
      interuss.deprecated_scd_injection.v1.deleteFlight
    • participant_id
      :
      uss2
🌐
9 Successful flight deletion