Class: MLEUtility
- Inherits:
-
Object
- Object
- MLEUtility
- Defined in:
- lib/AuthenticationSDK/util/MLEUtility.rb
Class Method Summary collapse
- .check_is_mle_for_API(merchant_config, is_mle_supported_by_cybs_for_api, operation_ids) ⇒ Object
- .create_request_payload(compact_jwe) ⇒ Object
- .encrypt_request_payload(merchant_config, request_payload) ⇒ Object
- .extract_serial_number_from_certificate(certificate) ⇒ Object
- .validate_certificate(certificate, mle_key_alias, log_obj) ⇒ Object
Class Method Details
.check_is_mle_for_API(merchant_config, is_mle_supported_by_cybs_for_api, operation_ids) ⇒ Object
9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 |
# File 'lib/AuthenticationSDK/util/MLEUtility.rb', line 9 def self.check_is_mle_for_API(merchant_config, is_mle_supported_by_cybs_for_api, operation_ids) is_mle_for_api = false if is_mle_supported_by_cybs_for_api && merchant_config.useMLEGlobally is_mle_for_api = true end if merchant_config.mapToControlMLEonAPI && operation_ids operation_ids.each do |operation_id| if merchant_config.mapToControlMLEonAPI.key?(operation_id) is_mle_for_api = merchant_config.mapToControlMLEonAPI[operation_id] break end end end is_mle_for_api end |
.create_request_payload(compact_jwe) ⇒ Object
95 96 97 |
# File 'lib/AuthenticationSDK/util/MLEUtility.rb', line 95 def self.create_request_payload(compact_jwe) "{ \"encryptedRequest\": \"#{compact_jwe}\" }" end |
.encrypt_request_payload(merchant_config, request_payload) ⇒ Object
25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 |
# File 'lib/AuthenticationSDK/util/MLEUtility.rb', line 25 def self.encrypt_request_payload(merchant_config, request_payload) return nil if request_payload.nil? return request_payload if request_payload == '{}' @log_obj ||= Log.new(merchant_config.log_config, 'MLEUtility') @log_obj.logger.info('Encrypting request payload') @log_obj.logger.debug('LOG_REQUEST_BEFORE_MLE: ' + request_payload) begin file_path = merchant_config.keysDirectory + '/' + merchant_config.keyFilename + '.p12' p12_file = File.binread(file_path) cache_obj = ActiveSupport::Cache::MemoryStore.new cert_der = Cache.new.fetchCachedCertificate(merchant_config.keysDirectory, p12_file, merchant_config.keyPass, merchant_config.mleKeyAlias, cache_obj) if cert_der.nil? @log_obj.logger.error('Failed to get certificate for MLE') raise StandardError.new('Failed to get certificate for MLE') end certificate = OpenSSL::X509::Certificate.new(Base64.decode64(cert_der)) validate_certificate(certificate, merchant_config.mleKeyAlias, @log_obj) serial_number = extract_serial_number_from_certificate(certificate) if serial_number.nil? @log_obj.logger.error('Serial number not found in certificate for MLE') raise StandardError.new('Serial number not found in MLE certificate') end jwk = JOSE::JWK.from_key(certificate.public_key) if jwk.nil? @log_obj.logger.error('Failed to create JWK object from public key') raise StandardError.new('Failed to create JWK object from public key') end headers = { 'alg' => 'RSA-OAEP-256', 'enc' => 'A256GCM', 'typ' => 'JWT', 'kid' => serial_number, 'iat' => Time.now.to_i } jwe = JOSE::JWE.block_encrypt(jwk, request_payload, headers) compact_jwe = jwe.compact mle_request_body = create_request_payload(compact_jwe) @log_obj.logger.debug('LOG_REQUEST_AFTER_MLE: ' + mle_request_body) return mle_request_body rescue StandardError => e @log_obj.logger.error("An error occurred during encryption: #{e.}") raise e end end |
.extract_serial_number_from_certificate(certificate) ⇒ Object
87 88 89 90 91 92 93 |
# File 'lib/AuthenticationSDK/util/MLEUtility.rb', line 87 def self.extract_serial_number_from_certificate(certificate) return nil if certificate.subject.to_s.empty? && certificate.issuer.to_s.empty? certificate.subject.to_a.each do |attribute| return attribute[1] if attribute[0].include?('serialNumber') end certificate.serial.nil? ? nil : certificate.serial.to_s end |
.validate_certificate(certificate, mle_key_alias, log_obj) ⇒ Object
73 74 75 76 77 78 79 80 81 82 83 84 85 |
# File 'lib/AuthenticationSDK/util/MLEUtility.rb', line 73 def self.validate_certificate(certificate, mle_key_alias, log_obj) if certificate.not_after.nil? log_obj.logger.warn("Certificate for MLE don't have expiry date.") elsif certificate.not_after < Time.now log_obj.logger.warn('Certificate with MLE alias ' + mle_key_alias + ' is expired as of ' + certificate.not_after.to_s + ". Please update p12 file.") # raise StandardError.new('Certificate required for MLE has been expired on : ' + certificate.not_after.to_s) else time_to_expire = certificate.not_after - Time.now if time_to_expire < Constants::CERTIFICATE_EXPIRY_DATE_WARNING_DAYS * 24 * 60 * 60 log_obj.logger.warn('Certificate with MLE alias ' + mle_key_alias + ' is going to expired on ' + certificate.not_after.to_s + ". Please update p12 file before that.") end end end |