trustcaptcha-ruby 1.0.2 → 1.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 85d74bf1f0b4aaac1ed7e612cdedb7fec49237b52bea370675215ef99b39cf24
|
4
|
+
data.tar.gz: 3a66c366c2060cb68160c0d3080ab2591ff5ec575bfbd56958b3c2ba486870ef
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: cfdc5945cc4e4fdbcac701cc0b547c426cc7f730112da689b934a5026361984dc018daa28db14cb4c5f89fcddad5ede818639b22445028306e6039ed6b18a60b
|
7
|
+
data.tar.gz: 855add25e32b315804a55aaa74bb8d7383a8ed33f2629eaabbdda27d377bc3af65068d43cf7250f0f3fb5df337af44a257f1d82ab5f883bf12367c97fb45f171
|
@@ -1,51 +1,49 @@
|
|
1
1
|
require 'net/http'
|
2
2
|
require 'uri'
|
3
3
|
require 'json'
|
4
|
-
require_relative 'aes_encryption'
|
5
4
|
require_relative 'model/verification_token'
|
6
5
|
require_relative 'model/verification_result'
|
7
6
|
|
8
7
|
class CaptchaManager
|
8
|
+
|
9
9
|
class SecretKeyInvalidException < StandardError; end
|
10
|
-
class TokenDecryptionFailedException < StandardError; end
|
11
10
|
class VerificationTokenInvalidException < StandardError; end
|
12
11
|
class VerificationNotFoundException < StandardError; end
|
12
|
+
class VerificationNotFinishedException < StandardError; end
|
13
13
|
|
14
|
-
def self.get_verification_result(
|
14
|
+
def self.get_verification_result(secret_key, base64_verification_token)
|
15
15
|
verification_token = get_verification_token(base64_verification_token)
|
16
|
-
secret_key
|
17
|
-
decrypted_access_token = decrypt_access_token(secret_key, verification_token)
|
18
|
-
fetch_verification_result(verification_token, decrypted_access_token)
|
16
|
+
fetch_verification_result(verification_token, secret_key)
|
19
17
|
end
|
20
18
|
|
21
19
|
private
|
22
20
|
|
23
|
-
def self.
|
24
|
-
|
25
|
-
rescue StandardError => e
|
26
|
-
raise SecretKeyInvalidException, "Invalid secret key: #{e.message}"
|
27
|
-
end
|
28
|
-
|
29
|
-
def self.get_verification_token(verification_token)
|
30
|
-
VerificationToken.from_base64(verification_token)
|
21
|
+
def self.get_verification_token(base64_verification_token)
|
22
|
+
VerificationToken.from_base64(base64_verification_token)
|
31
23
|
rescue StandardError => e
|
32
24
|
raise VerificationTokenInvalidException, "Invalid verification token: #{e.message}"
|
33
25
|
end
|
34
26
|
|
35
|
-
def self.decrypt_access_token(secret_key, verification_token)
|
36
|
-
AesEncryption.decrypt_to_string(secret_key, verification_token.encrypted_access_token)
|
37
|
-
rescue StandardError => e
|
38
|
-
raise TokenDecryptionFailedException, "Failed to decrypt access token: #{e.message}"
|
39
|
-
end
|
40
|
-
|
41
27
|
def self.fetch_verification_result(verification_token, access_token)
|
42
|
-
url = URI("#{verification_token.api_endpoint}/verifications/#{verification_token.verification_id}/assessments
|
43
|
-
|
44
|
-
|
45
|
-
|
28
|
+
url = URI("#{verification_token.api_endpoint}/verifications/#{verification_token.verification_id}/assessments")
|
29
|
+
headers = {
|
30
|
+
"tc-authorization" => access_token,
|
31
|
+
"tc-library-language" => "ruby",
|
32
|
+
"tc-library-version" => "1.2"
|
33
|
+
}
|
34
|
+
response = Net::HTTP.get_response(url, headers)
|
35
|
+
|
36
|
+
case response.code.to_i
|
37
|
+
when 403
|
38
|
+
raise SecretKeyInvalidException, "Secret key is invalid"
|
39
|
+
when 404
|
40
|
+
raise VerificationNotFoundException, "Verification not found"
|
41
|
+
when 423
|
42
|
+
raise VerificationNotFinishedException, "Verification not finished"
|
43
|
+
else
|
44
|
+
raise "Failed to retrieve verification result: HTTP #{response.code}" unless response.is_a?(Net::HTTPSuccess)
|
45
|
+
end
|
46
46
|
|
47
47
|
VerificationResult.from_json(response.body)
|
48
|
-
rescue StandardError => e
|
49
|
-
raise "Failed to retrieve verification result: #{e.message}"
|
50
48
|
end
|
51
49
|
end
|
@@ -1,18 +1,18 @@
|
|
1
1
|
require 'json'
|
2
2
|
require 'securerandom'
|
3
|
+
require 'base64'
|
3
4
|
|
4
5
|
class VerificationToken
|
5
|
-
attr_reader :api_endpoint, :verification_id
|
6
|
+
attr_reader :api_endpoint, :verification_id
|
6
7
|
|
7
|
-
def initialize(api_endpoint, verification_id
|
8
|
+
def initialize(api_endpoint, verification_id)
|
8
9
|
@api_endpoint = api_endpoint
|
9
10
|
@verification_id = verification_id
|
10
|
-
@encrypted_access_token = encrypted_access_token
|
11
11
|
end
|
12
12
|
|
13
13
|
def self.from_base64(base64_string)
|
14
14
|
json_string = Base64.decode64(base64_string)
|
15
15
|
data = JSON.parse(json_string)
|
16
|
-
new(data['apiEndpoint'], data['verificationId']
|
16
|
+
new(data['apiEndpoint'], data['verificationId'])
|
17
17
|
end
|
18
18
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: trustcaptcha-ruby
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.0
|
4
|
+
version: 1.2.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Trustcaptcha GmbH
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-12-20 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: json
|
@@ -46,7 +46,6 @@ executables: []
|
|
46
46
|
extensions: []
|
47
47
|
extra_rdoc_files: []
|
48
48
|
files:
|
49
|
-
- lib/trustcaptcha/aes_encryption.rb
|
50
49
|
- lib/trustcaptcha/captcha_manager.rb
|
51
50
|
- lib/trustcaptcha/model/verification_result.rb
|
52
51
|
- lib/trustcaptcha/model/verification_token.rb
|
@@ -1,26 +0,0 @@
|
|
1
|
-
require 'openssl'
|
2
|
-
require 'base64'
|
3
|
-
|
4
|
-
class AesEncryption
|
5
|
-
STANDARD_BLOCK_SIZE = 16
|
6
|
-
|
7
|
-
def self.to_aes_secret_key(key_string)
|
8
|
-
Base64.decode64(key_string)
|
9
|
-
end
|
10
|
-
|
11
|
-
def self.decrypt_to_string(key, encrypted_text)
|
12
|
-
decoded = Base64.decode64(encrypted_text)
|
13
|
-
decrypt(key, decoded)
|
14
|
-
end
|
15
|
-
|
16
|
-
def self.decrypt(key, encrypted_data)
|
17
|
-
iv = encrypted_data[0, STANDARD_BLOCK_SIZE]
|
18
|
-
cipher_text = encrypted_data[STANDARD_BLOCK_SIZE..-1]
|
19
|
-
decipher = OpenSSL::Cipher::AES256.new(:CBC)
|
20
|
-
decipher.decrypt
|
21
|
-
decipher.key = key
|
22
|
-
decipher.iv = iv
|
23
|
-
decrypted = decipher.update(cipher_text) + decipher.final
|
24
|
-
decrypted.force_encoding('UTF-8')
|
25
|
-
end
|
26
|
-
end
|