truelayer-signing 0.1.0 → 0.1.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +4 -0
- data/README.md +4 -0
- data/examples/sign-request/Gemfile.lock +2 -2
- data/examples/webhook-server/Gemfile +1 -0
- data/examples/webhook-server/Gemfile.lock +4 -2
- data/examples/webhook-server/main.rb +43 -47
- data/truelayer-signing.gemspec +4 -4
- metadata +6 -6
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: f61552b78e6c1d17312bf90a73802f4c904ca3b673aaf17ac12fe46119055f3e
|
|
4
|
+
data.tar.gz: c4d2c95f57008b3c127064861a429da56cea91b666d277b8504aea8e4fb8508b
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 9c9ea1c63adc5268afa8c784bf7deef7ee1d54c00c2467b014340c6c166e92a57ef3e8e5c534953fb2533edf519155adc4a9f005d18e34a08340a876acb39af2
|
|
7
|
+
data.tar.gz: 9b523032ac94b35fd8d38370d10662951b68204d2b3e30caebdcbe64c9134bf7773a712c992d28c8b8a2ed63d7e449ff2141f636d23cd1704c95419275b12615
|
data/CHANGELOG.md
CHANGED
|
@@ -9,6 +9,10 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
|
|
|
9
9
|
|
|
10
10
|
- ...
|
|
11
11
|
|
|
12
|
+
## [0.1.1] – 2023-05-17
|
|
13
|
+
|
|
14
|
+
- Fix webhook server example
|
|
15
|
+
|
|
12
16
|
## [0.1.0] – 2023-01-09
|
|
13
17
|
|
|
14
18
|
- Add `TrueLayerSigning.sign_with_pem` and `TrueLayerSigning.verify_with_pem(pem)`.
|
data/README.md
CHANGED
|
@@ -1,5 +1,9 @@
|
|
|
1
1
|
# truelayer-signing
|
|
2
2
|
|
|
3
|
+

|
|
4
|
+

|
|
5
|
+

|
|
6
|
+
|
|
3
7
|
Ruby gem to produce and verify TrueLayer API requests signatures.
|
|
4
8
|
|
|
5
9
|
## Installation
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
GEM
|
|
2
2
|
remote: https://rubygems.org/
|
|
3
3
|
specs:
|
|
4
|
-
addressable (2.8.
|
|
4
|
+
addressable (2.8.4)
|
|
5
5
|
public_suffix (>= 2.0.2, < 6.0)
|
|
6
6
|
domain_name (0.5.20190701)
|
|
7
7
|
unf (>= 0.0.5, < 1.0.0)
|
|
@@ -23,7 +23,7 @@ GEM
|
|
|
23
23
|
rake (~> 13.0)
|
|
24
24
|
public_suffix (5.0.1)
|
|
25
25
|
rake (13.0.6)
|
|
26
|
-
truelayer-signing (0.
|
|
26
|
+
truelayer-signing (0.2.0)
|
|
27
27
|
jwt (= 2.6)
|
|
28
28
|
unf (0.1.4)
|
|
29
29
|
unf_ext
|
|
@@ -2,14 +2,16 @@ GEM
|
|
|
2
2
|
remote: https://rubygems.org/
|
|
3
3
|
specs:
|
|
4
4
|
jwt (2.6.0)
|
|
5
|
-
truelayer-signing (0.1.
|
|
5
|
+
truelayer-signing (0.1.1)
|
|
6
6
|
jwt (= 2.6)
|
|
7
|
+
webrick (1.8.1)
|
|
7
8
|
|
|
8
9
|
PLATFORMS
|
|
9
10
|
arm64-darwin-21
|
|
10
11
|
|
|
11
12
|
DEPENDENCIES
|
|
12
13
|
truelayer-signing
|
|
14
|
+
webrick
|
|
13
15
|
|
|
14
16
|
BUNDLED WITH
|
|
15
|
-
2.4.
|
|
17
|
+
2.4.13
|
|
@@ -1,57 +1,54 @@
|
|
|
1
|
-
require
|
|
2
|
-
require
|
|
1
|
+
require 'securerandom'
|
|
2
|
+
require 'truelayer-signing'
|
|
3
|
+
require 'webrick'
|
|
3
4
|
|
|
4
5
|
class TrueLayerSigningExamples
|
|
5
6
|
# Note: the webhook path can be whatever is configured for your application.
|
|
6
7
|
# Here a unique path is used, matching the example signature in the README.
|
|
7
8
|
WEBHOOK_PATH = "/hook/d7a2c49d-110a-4ed2-a07d-8fdb3ea6424b".freeze
|
|
8
|
-
PUBLIC_KEY_PEM =
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
9
|
+
PUBLIC_KEY_PEM = <<~TXT.freeze
|
|
10
|
+
-----BEGIN PUBLIC KEY-----
|
|
11
|
+
MIGbMBAGByqGSM49AgEGBSuBBAAjA4GGAAQBJ6ET9XeVCyMy+yOetZaNNCXPhwr5
|
|
12
|
+
BlyDDg1CLmyNM5SvqOs8RveL6dYl4lpPur4xrPQl04ggYlVd9wnHkZnp3jcBlXw8
|
|
13
|
+
Lc5phyYF1q2/QV/5wp2WHIhKDqUiXC0TvlE8d7MdTAN9yolcwrh6aWZ3kesTMZif
|
|
14
|
+
BgItyT6PXUab8mMdI8k=
|
|
15
|
+
-----END PUBLIC KEY-----
|
|
16
|
+
TXT
|
|
13
17
|
|
|
14
18
|
class << self
|
|
15
19
|
def run_webhook_server
|
|
16
|
-
|
|
20
|
+
TrueLayerSigning.certificate_id ||= SecureRandom.uuid
|
|
21
|
+
server = WEBrick::HTTPServer.new(Port: 4567)
|
|
17
22
|
|
|
18
23
|
puts "Server running at http://localhost:4567"
|
|
19
24
|
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
rescue => error
|
|
29
|
-
puts error
|
|
30
|
-
ensure
|
|
31
|
-
client.close
|
|
32
|
-
end
|
|
33
|
-
end
|
|
25
|
+
server.mount_proc('/') do |req, res|
|
|
26
|
+
request = parse_request(req)
|
|
27
|
+
status, body = handle_request.call(request)
|
|
28
|
+
headers = { "Content-Type" => "text/plain" }
|
|
29
|
+
|
|
30
|
+
send_response(res, status, headers, body)
|
|
31
|
+
rescue => error
|
|
32
|
+
puts error
|
|
34
33
|
end
|
|
35
|
-
end
|
|
36
34
|
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
url = remainder.split(" ").first
|
|
42
|
-
path, _query_strings = url.split("?", 2)
|
|
35
|
+
server.start
|
|
36
|
+
ensure
|
|
37
|
+
server.shutdown
|
|
38
|
+
end
|
|
43
39
|
|
|
40
|
+
private def parse_request(request)
|
|
44
41
|
{
|
|
45
|
-
method:
|
|
46
|
-
path: path,
|
|
47
|
-
headers: headers_to_hash(
|
|
48
|
-
body: body
|
|
42
|
+
method: request.request_method,
|
|
43
|
+
path: request.path,
|
|
44
|
+
headers: headers_to_hash(request.header),
|
|
45
|
+
body: request.body
|
|
49
46
|
}
|
|
50
47
|
end
|
|
51
48
|
|
|
52
49
|
private def handle_request
|
|
53
50
|
Proc.new do |request|
|
|
54
|
-
if request[:method] == "POST"
|
|
51
|
+
if request[:method] == "POST" && request[:path] == WEBHOOK_PATH
|
|
55
52
|
verify_webhook(request[:path], request[:headers], request[:body])
|
|
56
53
|
else
|
|
57
54
|
["403", "Forbidden"]
|
|
@@ -65,7 +62,8 @@ class TrueLayerSigningExamples
|
|
|
65
62
|
return ["400", "Bad Request – Header `Tl-Signature` missing"] unless tl_signature
|
|
66
63
|
|
|
67
64
|
begin
|
|
68
|
-
TrueLayerSigning
|
|
65
|
+
TrueLayerSigning
|
|
66
|
+
.verify_with_pem(PUBLIC_KEY_PEM)
|
|
69
67
|
.set_method(:post)
|
|
70
68
|
.set_path(path)
|
|
71
69
|
.set_headers(headers)
|
|
@@ -73,24 +71,22 @@ class TrueLayerSigningExamples
|
|
|
73
71
|
.verify(tl_signature)
|
|
74
72
|
|
|
75
73
|
["202", "Accepted"]
|
|
76
|
-
rescue TrueLayerSigning::Error
|
|
74
|
+
rescue TrueLayerSigning::Error => error
|
|
75
|
+
puts error
|
|
76
|
+
|
|
77
77
|
["401", "Unauthorized"]
|
|
78
78
|
end
|
|
79
79
|
end
|
|
80
80
|
|
|
81
|
-
private def
|
|
82
|
-
|
|
83
|
-
headers.each { |key, value| client.print("#{key}: #{value}\r\n") }
|
|
84
|
-
client.print("\r\n#{body}")
|
|
81
|
+
private def headers_to_hash(headers)
|
|
82
|
+
headers.transform_keys { |key| key.to_s.strip.downcase }.transform_values(&:first)
|
|
85
83
|
end
|
|
86
84
|
|
|
87
|
-
private def
|
|
88
|
-
|
|
89
|
-
|
|
90
|
-
|
|
91
|
-
|
|
92
|
-
|
|
93
|
-
hash
|
|
85
|
+
private def send_response(response, status, headers, body)
|
|
86
|
+
response.status = status
|
|
87
|
+
response.header.merge!(headers)
|
|
88
|
+
response.body = body
|
|
89
|
+
response
|
|
94
90
|
end
|
|
95
91
|
end
|
|
96
92
|
end
|
data/truelayer-signing.gemspec
CHANGED
|
@@ -2,19 +2,19 @@ $LOAD_PATH.unshift(::File.join(::File.dirname(__FILE__), "lib"))
|
|
|
2
2
|
|
|
3
3
|
Gem::Specification.new do |s|
|
|
4
4
|
s.name = "truelayer-signing"
|
|
5
|
-
s.version = "0.1.
|
|
5
|
+
s.version = "0.1.1"
|
|
6
6
|
s.summary = "Ruby gem to produce and verify TrueLayer API requests signatures"
|
|
7
7
|
s.description = "TrueLayer provides instant access to open banking to " \
|
|
8
8
|
"easily integrate next-generation payments and financial data into any app." \
|
|
9
9
|
"This helps easily sign TrueLayer API requests using a JSON web signature."
|
|
10
10
|
s.author = "Kevin Plattret"
|
|
11
11
|
s.email = "kevin@truelayer.com"
|
|
12
|
-
s.homepage = "https://github.com/
|
|
12
|
+
s.homepage = "https://github.com/TrueLayer/truelayer-signing/tree/main/ruby"
|
|
13
13
|
s.licenses = ["Apache-2.0", "MIT"]
|
|
14
14
|
|
|
15
15
|
s.metadata = {
|
|
16
|
-
"bug_tracker_uri" => "https://github.com/
|
|
17
|
-
"changelog_uri" => "https://github.com/
|
|
16
|
+
"bug_tracker_uri" => "https://github.com/TrueLayer/truelayer-signing/issues",
|
|
17
|
+
"changelog_uri" => "https://github.com/TrueLayer/truelayer-signing/blob/main/ruby/CHANGELOG.md",
|
|
18
18
|
}
|
|
19
19
|
|
|
20
20
|
s.files = Dir["./**/*"]
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: truelayer-signing
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.1.
|
|
4
|
+
version: 0.1.1
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Kevin Plattret
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2023-
|
|
11
|
+
date: 2023-05-17 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: jwt
|
|
@@ -122,13 +122,13 @@ files:
|
|
|
122
122
|
- "./lib/truelayer-signing/verifier.rb"
|
|
123
123
|
- "./test/test-truelayer-signing.rb"
|
|
124
124
|
- "./truelayer-signing.gemspec"
|
|
125
|
-
homepage: https://github.com/
|
|
125
|
+
homepage: https://github.com/TrueLayer/truelayer-signing/tree/main/ruby
|
|
126
126
|
licenses:
|
|
127
127
|
- Apache-2.0
|
|
128
128
|
- MIT
|
|
129
129
|
metadata:
|
|
130
|
-
bug_tracker_uri: https://github.com/
|
|
131
|
-
changelog_uri: https://github.com/
|
|
130
|
+
bug_tracker_uri: https://github.com/TrueLayer/truelayer-signing/issues
|
|
131
|
+
changelog_uri: https://github.com/TrueLayer/truelayer-signing/blob/main/ruby/CHANGELOG.md
|
|
132
132
|
post_install_message:
|
|
133
133
|
rdoc_options: []
|
|
134
134
|
require_paths:
|
|
@@ -144,7 +144,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
|
144
144
|
- !ruby/object:Gem::Version
|
|
145
145
|
version: '0'
|
|
146
146
|
requirements: []
|
|
147
|
-
rubygems_version: 3.4.
|
|
147
|
+
rubygems_version: 3.4.13
|
|
148
148
|
signing_key:
|
|
149
149
|
specification_version: 4
|
|
150
150
|
summary: Ruby gem to produce and verify TrueLayer API requests signatures
|