perimeter_x 1.0.4.pre.alpha → 1.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (39) hide show
  1. checksums.yaml +4 -4
  2. data/.gitignore +3 -1
  3. data/Dockerfile +4 -2
  4. data/Gemfile +1 -1
  5. data/Gemfile.lock +44 -2
  6. data/LICENSE.txt +9 -12
  7. data/Rakefile +9 -2
  8. data/changelog.md +12 -0
  9. data/examples/app/controllers/home_controller.rb +9 -0
  10. data/examples/app/views/home/index.html.erb.dist +20 -0
  11. data/examples/config/initializers/perimeterx.rb.dist +8 -0
  12. data/lib/perimeter_x.rb +109 -33
  13. data/lib/perimeterx/configuration.rb +24 -17
  14. data/lib/perimeterx/internal/clients/perimeter_x_activity_client.rb +92 -0
  15. data/lib/perimeterx/internal/clients/perimeter_x_risk_client.rb +28 -0
  16. data/lib/perimeterx/internal/exceptions/px_cookie_decryption_exception.rb +5 -0
  17. data/lib/perimeterx/internal/perimeter_x_context.rb +66 -58
  18. data/lib/perimeterx/internal/perimeter_x_cookie.rb +140 -0
  19. data/lib/perimeterx/internal/perimeter_x_cookie_v1.rb +42 -0
  20. data/lib/perimeterx/internal/perimeter_x_cookie_v3.rb +37 -0
  21. data/lib/perimeterx/internal/validators/perimeter_x_captcha_validator.rb +65 -0
  22. data/lib/perimeterx/internal/validators/perimeter_x_cookie_validator.rb +70 -0
  23. data/lib/perimeterx/internal/validators/perimeter_x_s2s_validator.rb +114 -0
  24. data/lib/perimeterx/utils/px_constants.rb +44 -0
  25. data/lib/perimeterx/utils/px_http_client.rb +47 -26
  26. data/lib/perimeterx/utils/px_logger.rb +12 -6
  27. data/lib/perimeterx/utils/px_template_factory.rb +31 -0
  28. data/lib/perimeterx/utils/templates/block.mustache +146 -0
  29. data/lib/perimeterx/utils/templates/captcha.mustache +185 -0
  30. data/lib/perimeterx/version.rb +2 -2
  31. data/perimeter_x.gemspec +6 -1
  32. data/readme.md +216 -34
  33. metadata +89 -10
  34. data/bin/console +0 -14
  35. data/bin/setup +0 -8
  36. data/examples/home_controller.rb.dist +0 -23
  37. data/lib/perimeterx/internal/perimeter_x_risk_client.rb +0 -29
  38. data/lib/perimeterx/internal/perimeter_x_s2s_validator.rb +0 -68
  39. /data/examples/{routes.rb → config/routes.rb} +0 -0
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 06e2c5c971a383cbe30a9fd777519711735f2941
4
- data.tar.gz: b60d023d7d84d4c5ba8821ecc6fae8418f244c38
3
+ metadata.gz: 2e226c7753af5094d03889b452cb6208ca1c264b
4
+ data.tar.gz: d4cbd74100e85512f11ad154761ce6813ecf22a4
5
5
  SHA512:
6
- metadata.gz: 5bc27249704a2ae11d305efa9785d8d5b8d4b8185462bf50206349b584f0427f257738041014099beefb33a99ecb246532e8c118e86ad4512efe443098cb0e77
7
- data.tar.gz: 92b3a2439befe5fd8f481935d06562eaa275b6f03992abd390f41761981b984d06a0404cd9c786e59d5e7363f4ff4e48f80bc59e268ab2f82ae0228ff31508af
6
+ metadata.gz: 9fc6c5652f1a22da0b604bf72a072ba8eb4b43762217fc33f93fae0709ab0573ee19cb8aa8dcf11aa06339c9ef11097de39d9ecbfb8fdcdaaa5e61c6d1f526ba
7
+ data.tar.gz: ca7c07317ddbf5cb7a3987451b2ef6e0658fa95e6a27ae2be2243a3c1a5bfdc6ef9e6ea9c3a744bc9f854c7700a80bd1249839607613b2603e4fee6530c2ac16
data/.gitignore CHANGED
@@ -3,13 +3,15 @@ capybara-*.html
3
3
  .rspec
4
4
  /log
5
5
  /tmp
6
+ /bin
6
7
  /dev
7
8
  /db/*.sqlite3
8
9
  /db/*.sqlite3-journal
9
10
  /public/system
10
11
  /coverage/
11
12
  /spec/tmp
12
- examples/home_controller.rb
13
+ examples/config/initializers/perimeterx.rb
14
+ examples/app/views/home/index.html.erb
13
15
  **.orig
14
16
  *.gem
15
17
  rerun.txt
data/Dockerfile CHANGED
@@ -37,12 +37,14 @@ RUN /bin/bash -l -c "gem install bundler"
37
37
  RUN /bin/bash -l -c "gem install rails -v 4.2.0"
38
38
  RUN mkdir -p /tmp/ruby_sandbox
39
39
  WORKDIR /tmp/ruby_sandbox
40
+ RUN git clone https://github.com/PerimeterX/perimeterx-ruby-sdk.git
40
41
  RUN /bin/bash -l -c "rails new webapp"
41
42
  WORKDIR /tmp/ruby_sandbox/webapp
42
43
  RUN /bin/bash -l -c "rails generate controller home index"
43
44
  WORKDIR /tmp/ruby_sandbox/webapp
44
45
  EXPOSE 3000
45
- RUN sed -i "2i gem 'perimeter_x', '~> 1.0.3.pre.alpha'" /tmp/ruby_sandbox/webapp/Gemfile
46
+ # TODO: make it take the files from git
47
+ RUN sed -i '2i gem "perimeter_x", :path => "/tmp/ruby_sandbox/perimeterx-ruby-sdk"' /tmp/ruby_sandbox/webapp/Gemfile
46
48
  RUN /bin/bash -l -c "bundler update"
47
- RUN /bin/bash -l -c "gem list|grep peri"
49
+ COPY ./examples/ /tmp/ruby_sandbox/webapp
48
50
  CMD ["/bin/bash", "-l", "-c", "rails server -b 0.0.0.0;"]
data/Gemfile CHANGED
@@ -1,3 +1,3 @@
1
1
  source "https://rubygems.org"
2
2
 
3
- gem 'httpclient', '2.8.2.4'
3
+ gemspec
data/Gemfile.lock CHANGED
@@ -1,13 +1,55 @@
1
+ PATH
2
+ remote: .
3
+ specs:
4
+ perimeter_x (1.0.3)
5
+ activesupport (>= 4.2.0)
6
+ httpclient (= 2.8.2.4)
7
+ mustache (~> 1.0, >= 1.0.3)
8
+
1
9
  GEM
2
10
  remote: https://rubygems.org/
3
11
  specs:
4
- httpclient (2.8.3)
12
+ activesupport (5.0.2)
13
+ concurrent-ruby (~> 1.0, >= 1.0.2)
14
+ i18n (~> 0.7)
15
+ minitest (~> 5.1)
16
+ tzinfo (~> 1.1)
17
+ concurrent-ruby (1.0.5)
18
+ diff-lcs (1.3)
19
+ httpclient (2.8.2.4)
20
+ i18n (0.8.1)
21
+ metaclass (0.0.4)
22
+ minitest (5.10.1)
23
+ mocha (1.2.1)
24
+ metaclass (~> 0.0.1)
25
+ mustache (1.0.4)
26
+ rake (10.4.2)
27
+ rspec (3.5.0)
28
+ rspec-core (~> 3.5.0)
29
+ rspec-expectations (~> 3.5.0)
30
+ rspec-mocks (~> 3.5.0)
31
+ rspec-core (3.5.4)
32
+ rspec-support (~> 3.5.0)
33
+ rspec-expectations (3.5.0)
34
+ diff-lcs (>= 1.2.0, < 2.0)
35
+ rspec-support (~> 3.5.0)
36
+ rspec-mocks (3.5.0)
37
+ diff-lcs (>= 1.2.0, < 2.0)
38
+ rspec-support (~> 3.5.0)
39
+ rspec-support (3.5.0)
40
+ thread_safe (0.3.6)
41
+ tzinfo (1.2.3)
42
+ thread_safe (~> 0.1)
5
43
 
6
44
  PLATFORMS
7
45
  ruby
8
46
 
9
47
  DEPENDENCIES
10
- httpclient (= 2.8.3)
48
+ bundler (~> 1.14)
49
+ mocha (~> 1.2, >= 1.2.1)
50
+ perimeter_x!
51
+ rake (~> 10.0)
52
+ rspec (~> 3.0)
11
53
 
12
54
  BUNDLED WITH
13
55
  1.14.6
data/LICENSE.txt CHANGED
@@ -1,6 +1,4 @@
1
- The MIT License (MIT)
2
-
3
- Copyright (c) 2017 nitzanpx
1
+ Copyright © 2016 PerimeterX, Inc.
4
2
 
5
3
  Permission is hereby granted, free of charge, to any person obtaining a copy
6
4
  of this software and associated documentation files (the "Software"), to deal
@@ -9,13 +7,12 @@ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
7
  copies of the Software, and to permit persons to whom the Software is
10
8
  furnished to do so, subject to the following conditions:
11
9
 
12
- The above copyright notice and this permission notice shall be included in
13
- all copies or substantial portions of the Software.
10
+ The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
14
11
 
15
- THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
- IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
- FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
- AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
- LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
- OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21
- THE SOFTWARE.
12
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
13
+ EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES
14
+ OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
15
+ IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
16
+ DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
17
+ ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
18
+ USE OR OTHER DEALINGS IN THE SOFTWARE.
data/Rakefile CHANGED
@@ -1,2 +1,9 @@
1
- require "bundler/gem_tasks"
2
- task :default => :spec
1
+ begin
2
+ require 'rspec/core/rake_task'
3
+
4
+ RSpec::Core::RakeTask.new(:spec)
5
+
6
+ task :test => :spec
7
+ rescue LoadError
8
+ # no rspec available
9
+ end
data/changelog.md CHANGED
@@ -0,0 +1,12 @@
1
+ # Change Log
2
+
3
+ All notable changes to this project will be documented in this file.
4
+
5
+ The format is based on [Keep a Changelog](http://keepachangelog.com/)
6
+ and this project adheres to [Semantic Versioning](http://semver.org/).
7
+
8
+ ## [1.0.4] - 2017-04-27
9
+ ### Fixed
10
+ - Constants on px_constants
11
+ - Cookie Validation flow when cookie score was over the configured threshold
12
+ - Using symbols instead of strings for requests body
@@ -0,0 +1,9 @@
1
+ class HomeController < ApplicationController
2
+ include PxModule
3
+
4
+ before_filter :px_verify_request
5
+
6
+ def index
7
+ end
8
+
9
+ end
@@ -0,0 +1,20 @@
1
+ <h1>Home#index</h1>
2
+ <p>Find me in app/views/home/index.html.erb</p>
3
+
4
+ <script type="text/javascript">
5
+ (function(){
6
+ window._pxAppId ='APP_ID';
7
+ // Custom parameters
8
+ // window._pxParam1 = "<param1>";
9
+ var p = document.getElementsByTagName('script')[0],
10
+ s = document.createElement('script');
11
+ s.async = 1;
12
+ s.src = '//client.perimeterx.net/APP_ID/main.min.js';
13
+ p.parentNode.insertBefore(s,p);
14
+ }());
15
+ </script>
16
+ <noscript>
17
+ <div style="position:fixed; top:0; left:0; display:none" width="1" height="1">
18
+ <img src="//collector-APP_ID.perimeterx.net/api/v1/collector/noScript.gif?appId=APP_ID">
19
+ </div>
20
+ </noscript>
@@ -0,0 +1,8 @@
1
+ params = {
2
+ :app_id => "APP_ID",
3
+ :cookie_key => "COOKIE_KEY",
4
+ :auth_token => "AUTH_TOKEN"
5
+ }
6
+
7
+
8
+ PxModule.configure(params)
data/lib/perimeter_x.rb CHANGED
@@ -1,69 +1,145 @@
1
1
  require 'perimeterx/configuration'
2
2
  require 'perimeterx/utils/px_logger'
3
+ require 'perimeterx/utils/px_constants'
3
4
  require 'perimeterx/utils/px_http_client'
5
+ require 'perimeterx/utils/px_template_factory'
4
6
  require 'perimeterx/internal/perimeter_x_context'
5
- require 'perimeterx/internal/perimeter_x_s2s_validator'
7
+ require 'perimeterx/internal/clients/perimeter_x_activity_client'
8
+ require 'perimeterx/internal/validators/perimeter_x_s2s_validator'
9
+ require 'perimeterx/internal/validators/perimeter_x_cookie_validator'
10
+ require 'perimeterx/internal/validators/perimeter_x_captcha_validator'
6
11
 
7
- module PerimeterX
8
- class PxModule
9
- L = PxLogger.instance
12
+ module PxModule
10
13
 
11
- @@singleton__instance__ = nil
12
- @@singleton__mutex__ = Mutex.new
14
+ # Module expose API
15
+ def px_verify_request
16
+ verified, px_ctx = PerimeterX.instance.verify(env)
17
+
18
+ # Invalidate _pxCaptcha, can be done only on the controller level
19
+ cookies[:_pxCaptcha] = { value: "", expires: -1.minutes.from_now }
20
+
21
+ if (!verified)
22
+ # In case custon block handler exists
23
+ if (PerimeterX.instance.px_config.key?(:custom_block_handler))
24
+ PerimeterX.instance.px_config[:logger].debug("PxModule[px_verify_request]: custom_block_handler triggered")
25
+ return instance_exec(px_ctx, &PerimeterX.instance.px_config[:custom_block_handler])
26
+ else
27
+ # Generate template
28
+ PerimeterX.instance.px_config[:logger].debug("PxModule[px_verify_request]: sending default block page")
29
+ html = PxTemplateFactory.get_template(px_ctx, PerimeterX.instance.px_config)
30
+ response.headers["Content-Type"] = "text/html"
31
+ response.status = 403
32
+ render :html => html
33
+ end
34
+ end
35
+
36
+ return verified
37
+ end
38
+
39
+ def self.configure(params)
40
+ @px_instance = PerimeterX.configure(params)
41
+ end
42
+
43
+
44
+ # PerimtereX Module
45
+ class PerimeterX
46
+ @@__instance = nil
47
+ @@mutex = Mutex.new
13
48
 
14
49
  attr_reader :px_config
15
50
  attr_accessor :px_http_client
51
+ attr_accessor :px_activity_client
16
52
 
17
- def self.instance(params)
18
- return @@singleton__instance__ if @@singleton__instance__
19
- @@singleton__mutex__.synchronize {
20
- return @@singleton__instance__ if @@singleton__instance__
21
- @@singleton__instance__ = new(params)
53
+ #Static methods
54
+ def self.configure(params)
55
+ return true if @@__instance
56
+ @@mutex.synchronize {
57
+ return @@__instance if @@__instance
58
+ @@__instance = new(params)
22
59
  }
23
- @@singleton__instance__
60
+ return true
24
61
  end
25
62
 
26
-
27
- private def initialize(params)
28
- L.info("PerimeterX[initialize]")
29
- @px_config = Configuration.new(params).configuration
30
- @px_http_client = PxHttpClient.new(@px_config)
63
+ def self.instance
64
+ return @@__instance if !@@__instance.nil?
65
+ raise Exception.new("Please initialize perimeter x first")
31
66
  end
32
67
 
33
- def px_verify(env)
68
+
69
+ #Instance Methods
70
+ def verify(env)
34
71
  begin
35
- L.info("PerimeterX[pxVerify]")
72
+ @logger.debug("PerimeterX[pxVerify]")
36
73
  req = ActionDispatch::Request.new(env)
37
-
38
- if (!@px_config['module_enabled'])
39
- L.warn("Module is disabled")
74
+ if (!@px_config[:module_enabled])
75
+ @logger.warn("Module is disabled")
40
76
  return true
41
77
  end
42
-
43
78
  px_ctx = PerimeterXContext.new(@px_config, req)
44
- px_ctx.context[:s2s_call_reason] = "no_cookie"
45
79
 
46
- s2sValidator = PerimeterxS2SValidator.new(px_ctx, @px_config, @px_http_client)
47
- px_ctx = s2sValidator.verify()
80
+ # Captcha phase
81
+ captcha_verified, px_ctx = @px_captcha_validator.verify(px_ctx)
82
+ if (captcha_verified)
83
+ return handle_verification(px_ctx)
84
+ end
85
+
86
+ # Cookie phase
87
+ cookie_verified, px_ctx = @px_cookie_validator.verify(px_ctx)
88
+ if (!cookie_verified)
89
+ @px_s2s_validator.verify(px_ctx)
90
+ end
48
91
 
49
- if (px_config.key?('custom_verification_handler'))
50
- return px_config['custom_verification_handler'].call(px_ctx.context)
92
+ if (@px_config.key?(:custom_verification_handler))
93
+ return @px_config[:custom_verification_handler].call(px_ctx.context)
51
94
  else
52
95
  return handle_verification(px_ctx)
53
96
  end
54
97
  rescue Exception => e
55
- puts("#{e.backtrace.first}: #{e.message} (#{e.class})", e.backtrace.drop(1).map { |s| "\t#{s}" })
98
+ @logger.error("#{e.backtrace.first}: #{e.message} (#{e.class})")
99
+ e.backtrace.drop(1).map { |s| @logger.error("\t#{s}") }
56
100
  return true
57
101
  end
58
102
  end
59
103
 
60
- # private methods
104
+ private def initialize(params)
105
+ @px_config = Configuration.new(params).configuration
106
+ @logger = @px_config[:logger]
107
+ @px_http_client = PxHttpClient.new(@px_config)
108
+
109
+ @px_activity_client = PerimeterxActivitiesClient.new(@px_config, @px_http_client)
110
+
111
+ @px_cookie_validator = PerimeterxCookieValidator.new(@px_config)
112
+ @px_s2s_validator = PerimeterxS2SValidator.new(@px_config, @px_http_client)
113
+ @px_captcha_validator = PerimeterxCaptchaValidator.new(@px_config, @px_http_client)
114
+ @logger.debug("PerimeterX[initialize]")
115
+ end
116
+
61
117
  private def handle_verification(px_ctx)
62
- L.info("perimeterx processing ended - score:#{px_ctx.context[:score]}, uuid:#{px_ctx.context[:uuid]}")
63
- return true
118
+ @logger.debug("PerimeterX[handle_verification]")
119
+ @logger.debug("PerimeterX[handle_verification]: processing ended - score:#{px_ctx.context[:score]}, uuid:#{px_ctx.context[:uuid]}")
120
+
121
+ score = px_ctx.context[:score]
122
+ # Case PASS request
123
+ if (score < @px_config[:blocking_score])
124
+ @logger.debug("PerimeterX[handle_verification]: score:#{score} < blocking score, passing request")
125
+ @px_activity_client.send_page_requested_activity(px_ctx)
126
+ return true
127
+ end
128
+
129
+ # Case blocking activity
130
+ @px_activity_client.send_block_activity(px_ctx)
131
+
132
+ # In case were in monitor mode, end here
133
+ if(@px_config[:module_mode] == PxModule::MONITOR_MODE)
134
+ @logger.debug("PerimeterX[handle_verification]: monitor mode is on, passing request")
135
+ return true
136
+ end
137
+
138
+ @logger.debug("PerimeterX[handle_verification]: verification ended, the request should be blocked")
139
+
140
+ return false, px_ctx
64
141
  end
65
142
 
66
143
  private_class_method :new
67
144
  end
68
-
69
145
  end
@@ -1,30 +1,37 @@
1
- module PerimeterX
1
+ require 'perimeterx/utils/px_logger'
2
+ require 'perimeterx/utils/px_constants'
3
+
4
+ module PxModule
2
5
  class Configuration
3
6
 
4
7
  attr_accessor :configuration
5
8
  attr_accessor :PX_DEFAULT
6
- attr_accessor :MONITOR_MODE
7
- attr_accessor :ACTIVE_MODE
8
-
9
- MONITOR_MODE = 1
10
- ACTIVE_MODE = 2
11
9
 
12
10
  PX_DEFAULT = {
13
- "app_id" => nil,
14
- "auth_token" => nil,
15
- "module_enabled" => true,
16
- "blocking_score" => 70,
17
- "sensitive_headers" => ["cookie", "cookies"],
18
- "api_connect_timeout" => 1,
19
- "api_timeout" => 1,
20
- "sdk_name" => "RUBY SLIM SDK v1.0.0",
21
- "debug_mode" => false,
22
- "module_mode" => MONITOR_MODE,
11
+ :app_id => nil,
12
+ :cookie_key => nil,
13
+ :auth_token => nil,
14
+ :module_enabled => true,
15
+ :captcha_enabled => true,
16
+ :challenge_enabled => true,
17
+ :encryption_enabled => true,
18
+ :blocking_score => 70,
19
+ :sensitive_headers => ["http-cookie", "http-cookies"],
20
+ :api_connect_timeout => 0,
21
+ :api_timeout => 0,
22
+ :max_buffer_len => 30,
23
+ :send_page_activities => false,
24
+ :send_block_activities => true,
25
+ :sdk_name => PxModule::SDK_NAME,
26
+ :debug => false,
27
+ :module_mode => PxModule::ACTIVE_MODE,
28
+ :local_proxy => false
23
29
  }
24
30
 
25
31
  def initialize(params)
26
- PX_DEFAULT["perimeterx_server_host"] = "https://sapi-#{params['app_id'].downcase}.perimeterx.net"
32
+ PX_DEFAULT[:perimeterx_server_host] = "https://sapi-#{params[:app_id].downcase}.perimeterx.net"
27
33
  @configuration = PX_DEFAULT.merge(params);
34
+ @configuration[:logger] = PxLogger.new(@configuration[:debug])
28
35
  end
29
36
  end
30
37
  end
@@ -0,0 +1,92 @@
1
+ require 'perimeterx/internal/clients/perimeter_x_risk_client'
2
+
3
+ module PxModule
4
+ class PerimeterxActivitiesClient < PerimeterxRiskClient
5
+
6
+ attr_accessor :activities
7
+
8
+ def initialize(px_config, http_client)
9
+ super(px_config, http_client)
10
+ @logger.debug("PerimeterxActivitiesClients[initialize]")
11
+ @activities = [];
12
+ end
13
+
14
+ def send_to_perimeterx(activity_type, px_ctx, details = [])
15
+ @logger.debug("PerimeterxActivitiesClients[send_to_perimeterx]")
16
+ @logger.debug("PerimeterxActivitiesClients[send_to_perimeterx]: new activity #{activity_type} logged")
17
+
18
+ if (@px_config.key?(:additional_activity_handler))
19
+ @px_config[:additional_activity_handler].call(activity_type, px_ctx, details)
20
+ end
21
+
22
+ details[:module_version] = @px_config[:sdk_name]
23
+ px_data = {
24
+ :type => activity_type,
25
+ :headers => format_headers(px_ctx),
26
+ :timestamp => (Time.now.to_f*1000).floor,
27
+ :socket_ip => px_ctx.context[:ip],
28
+ :px_app_id => @px_config[:app_id],
29
+ :url => px_ctx.context[:full_url],
30
+ :details => details,
31
+ }
32
+
33
+ if (px_ctx.context.key?(:vid))
34
+ @logger.debug("PerimeterxActivitiesClients[send_to_perimeterx]: found vid in ctx")
35
+ px_data[:vid] = px_ctx.context[:vid]
36
+ end
37
+
38
+ # Prepare request
39
+ headers = {
40
+ "Authorization" => "Bearer #{@px_config[:auth_token]}" ,
41
+ "Content-Type" => "application/json"
42
+ };
43
+
44
+ @activities.push(px_data)
45
+ if (@activities.size == @px_config[:max_buffer_len])
46
+ @logger.debug("PerimeterxActivitiesClients[send_to_perimeterx]: max buffer length reached, sending activities")
47
+ @http_client.async_post(PxModule::API_V1_S2S, @activities, headers)
48
+
49
+ @activities.clear
50
+ end
51
+ end
52
+
53
+ def send_block_activity(px_ctx)
54
+ @logger.debug("PerimeterxActivitiesClients[send_block_activity]")
55
+ if (!@px_config[:send_page_acitivites])
56
+ @logger.debug("PerimeterxActivitiesClients[send_block_activity]: sending activites is disabled")
57
+ return
58
+ end
59
+
60
+ details = {
61
+ :block_uuid => px_ctx.context[:uuid],
62
+ :block_score => px_ctx.context[:score],
63
+ :block_reason => px_ctx.context[:block_reason]
64
+ }
65
+
66
+ send_to_perimeterx(PxModule::BLOCK_ACTIVITY, px_ctx, details)
67
+
68
+ end
69
+
70
+ def send_page_requested_activity(px_ctx)
71
+ @logger.debug("PerimeterxActivitiesClients[send_page_requested_activity]")
72
+ if (!@px_config[:send_page_acitivites])
73
+ return
74
+ end
75
+
76
+ details = {
77
+ :http_version => px_ctx.context[:http_version],
78
+ :http_method => px_ctx.context[:http_method]
79
+ }
80
+
81
+ if (px_ctx.context.key?(:decoded_cookie))
82
+ details[:px_cookie] = px_ctx.context[:decoded_cookie]
83
+ end
84
+
85
+ if (px_ctx.context.key?(:cookie_hmac))
86
+ details[:px_cookie_hmac] = px_ctx.context[:cookie_hmac]
87
+ end
88
+
89
+ send_to_perimeterx(PxModule::PAGE_REQUESTED_ACTIVITY, px_ctx, details)
90
+ end
91
+ end
92
+ end
@@ -0,0 +1,28 @@
1
+ require 'perimeterx/utils/px_logger'
2
+
3
+ module PxModule
4
+ class PerimeterxRiskClient
5
+ attr_accessor :px_config
6
+ attr_accessor :http_client
7
+
8
+ def initialize(px_config, http_client)
9
+ @px_config = px_config
10
+ @http_client = http_client;
11
+ @logger = px_config[:logger]
12
+ end
13
+
14
+ def format_headers(px_ctx)
15
+ @logger.debug("PerimeterxRiskClient[format_headers]")
16
+ formated_headers = []
17
+ px_ctx.context[:headers].each do |k,v|
18
+ if (!@px_config[:sensitive_headers].include? k.to_s)
19
+ formated_headers.push({
20
+ :name => k.to_s,
21
+ :value => v
22
+ })
23
+ end #end if
24
+ end #end forech
25
+ return formated_headers
26
+ end #end method
27
+ end #end class
28
+ end
@@ -0,0 +1,5 @@
1
+ class PxCookieDecryptionException < StandardError
2
+ def initialize(msg)
3
+ super(msg)
4
+ end
5
+ end