Method: Altcha.verify_server_signature
- Defined in:
- lib/altcha.rb
.verify_server_signature(payload, hmac_key) ⇒ Array<Boolean, ServerSignatureVerificationData>
Verifies the server’s signature.
352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 |
# File 'lib/altcha.rb', line 352 def self.verify_server_signature(payload, hmac_key) # Decode and parse base64 JSON string if it's a String if payload.is_a?(String) decoded_payload = Base64.decode64(payload) payload = ServerSignaturePayload.from_json(decoded_payload) # Convert payload from hash to ServerSignaturePayload if it's a plain object elsif payload.is_a?(Hash) payload = ServerSignaturePayload.new( algorithm: payload[:algorithm], verification_data: payload[:verification_data], signature: payload[:signature], verified: payload[:verified] ) end # Ensure payload is an instance of ServerSignaturePayload return [false, nil] unless payload.is_a?(ServerSignaturePayload) required_attributes = i[algorithm verification_data signature verified] required_attributes.each do |attr| value = payload.send(attr) return false if value.nil? || value.to_s.strip.empty? end hash_data = hash(payload.algorithm, payload.verification_data) expected_signature = hmac_hex(payload.algorithm, hash_data, hmac_key) params = URI.decode_www_form(payload.verification_data).to_h verification_data = ServerSignatureVerificationData.new.tap do |v| v.classification = params['classification'] || nil v.country = params['country'] || nil v.detected_language = params['detectedLanguage'] || nil v.email = params['email'] || nil v.expire = params['expire'] ? params['expire'].to_i : nil v.fields = params['fields'] ? params['fields'].split(',') : nil v.fields_hash = params['fieldsHash'] || nil v.ip_address = params['ipAddress'] || nil v.reasons = params['reasons'] ? params['reasons'].split(',') : nil v.score = params['score'] ? params['score'].to_f : nil v.time = params['time'] ? params['time'].to_i : nil v.verified = params['verified'] == 'true' end now = Time.now.to_i is_verified = payload.verified && verification_data.verified && (verification_data.expire.nil? || verification_data.expire > now) && payload.signature == expected_signature [is_verified, verification_data] rescue ArgumentError, JSON::ParserError => e # Handle specific exceptions for invalid Base64 or JSON puts "Error decoding or parsing payload: #{e.message}" false end |