Module: Webhookdb::Front
- Includes:
- Appydays::Configurable
- Defined in:
- lib/webhookdb/front.rb
Class Method Summary collapse
- .auth_headers(token) ⇒ Object
- .initial_verification_request_response(request) ⇒ Object
- .oauth_callback_url ⇒ Object
- .verify_signature(request) ⇒ Object
- .webhook_response(request) ⇒ Object
Class Method Details
.auth_headers(token) ⇒ Object
46 47 48 |
# File 'lib/webhookdb/front.rb', line 46 def self.auth_headers(token) return {"Authorization" => "Bearer #{token}"} end |
.initial_verification_request_response(request) ⇒ Object
35 36 37 38 39 40 41 42 43 44 |
# File 'lib/webhookdb/front.rb', line 35 def self.initial_verification_request_response(request) from_front = self.verify_signature(request) if from_front return Webhookdb::WebhookResponse.ok( json: {challenge: request.env["HTTP_X_FRONT_CHALLENGE"]}, status: 200, ) end return Webhookdb::WebhookResponse.error("invalid credentials") end |
.oauth_callback_url ⇒ Object
17 |
# File 'lib/webhookdb/front.rb', line 17 def self.oauth_callback_url = Webhookdb.api_url + "/v1/install/front/callback" |
.verify_signature(request) ⇒ Object
19 20 21 22 23 24 25 |
# File 'lib/webhookdb/front.rb', line 19 def self.verify_signature(request) request.body.rewind body = request.body.read base_string = "#{request.env['HTTP_X_FRONT_REQUEST_TIMESTAMP']}:#{body}" calculated_signature = OpenSSL::HMAC.base64digest(OpenSSL::Digest.new("sha256"), self.api_secret, base_string) return calculated_signature == request.env["HTTP_X_FRONT_SIGNATURE"] end |
.webhook_response(request) ⇒ Object
27 28 29 30 31 32 33 |
# File 'lib/webhookdb/front.rb', line 27 def self.webhook_response(request) return Webhookdb::WebhookResponse.error("missing signature") unless request.env["HTTP_X_FRONT_SIGNATURE"] from_front = Webhookdb::Front.verify_signature(request) return Webhookdb::WebhookResponse.ok(status: 200) if from_front return Webhookdb::WebhookResponse.error("invalid signature") end |