lib/fintecture/utils/crypto.rb in fintecture-0.1.9 vs lib/fintecture/utils/crypto.rb in fintecture-0.2.1

- old
+ new

@@ -1,76 +1,78 @@ -require 'securerandom' -require 'openssl' -require 'base64' -require 'json' -require 'fintecture/exceptions' -require 'fintecture/utils/constants' -require 'uri' - -module Fintecture - module Utils - class Crypto - class << self - - def generate_uuid - SecureRandom.uuid - end - - def generate_uuid_only_chars - generate_uuid.gsub!('-','') - end - - def sign_payload(payload) - payload = payload.to_json.to_s if payload.is_a? Hash - - digest = OpenSSL::Digest::SHA256.new - private_key = OpenSSL::PKey::RSA.new(Fintecture.private_key) - - begin - signature = private_key.sign(digest, payload) - Base64.strict_encode64(signature) - rescue - raise Fintecture::CryptoException.new('error during signature') - end - end - - def decrypt_private(digest) - digest = URI.unescape digest - encrypted_string = Base64.decode64(digest) - private_key = OpenSSL::PKey::RSA.new(Fintecture.private_key) - - begin - private_key.private_decrypt(encrypted_string, OpenSSL::PKey::RSA::PKCS1_OAEP_PADDING) - rescue OpenSSL::PKey::RSAError => e - raise Fintecture::CryptoException.new("error while decrypt, #{e.message}") - rescue - raise Fintecture::CryptoException.new('error during decryption') - end - end - - def hash_base64(plain_text) - digest = Digest::SHA256.digest plain_text - Base64.strict_encode64(digest) - end - - def create_signature_header(headers) - signing = [] - header = [] - - Fintecture::Utils::Constants::SIGNEDHEADERPARAMETERLIST.each do |param| - next unless headers[param] - - param_low = param.downcase - signing << "#{param_low}: #{headers[param]}" - header << param_low - end - - # Double quote in join needed. If not we will get two slashes \\n - signature = sign_payload signing.join("\n") - - 'keyId="' + Fintecture.app_id + '",algorithm="rsa-sha256",headers="' + header.join(' ') + '",signature="' + signature + '"' - end - - end - end - end +require 'securerandom' +require 'openssl' +require 'base64' +require 'json' +require 'fintecture/exceptions' +require 'fintecture/utils/constants' +require 'uri' + +module Fintecture + module Utils + class Crypto + class << self + + def generate_uuid + SecureRandom.uuid + end + + def generate_uuid_only_chars + generate_uuid.gsub!('-','') + end + + def sign_payload(payload) + payload = payload.to_json.to_s if payload.is_a? Hash + digest = OpenSSL::Digest::SHA256.new + private_key = OpenSSL::PKey::RSA.new(Fintecture.private_key) + + begin + signature = private_key.sign(digest, payload) + Base64.strict_encode64(signature) + rescue + raise Fintecture::CryptoException.new('error during signature') + end + end + + def decrypt_private(digest) + digest = URI.unescape digest + encrypted_string = Base64.decode64(digest) + private_key = OpenSSL::PKey::RSA.new(Fintecture.private_key) + + begin + private_key.private_decrypt(encrypted_string, OpenSSL::PKey::RSA::PKCS1_OAEP_PADDING) + rescue OpenSSL::PKey::RSAError => e + raise Fintecture::CryptoException.new("error while decrypt, #{e.message}") + rescue + raise Fintecture::CryptoException.new('error during decryption') + end + end + + def hash_base64(plain_text) + digest = Digest::SHA256.digest plain_text + Base64.strict_encode64(digest) + end + + def create_signature_header(headers) + signing = [] + header = [] + + + + Fintecture::Utils::Constants::SIGNEDHEADERPARAMETERLIST.each do |param| + next unless headers[param] + + param_low = param.downcase + signing << "#{param_low}: #{headers[param]}" + header << param_low + end + + + # Double quote in join needed. If not we will get two slashes \\n + signature = sign_payload signing.join("\n") + 'keyId="' + Fintecture.app_id + '",algorithm="rsa-sha256",headers="' + header.join(' ') + '",signature="' + signature + '"' + + end + + end + end + end end \ No newline at end of file