@houlak/plexo-sdk 0.1.11 → 0.1.13
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -255,7 +255,6 @@ var getPlexoKey = function (fingerprint) { return __awaiter(void 0, void 0, void
|
|
|
255
255
|
case 0: return [4 /*yield*/, client.get("/Key/".concat(fingerprint))];
|
|
256
256
|
case 1:
|
|
257
257
|
plexoResponse = _a.sent();
|
|
258
|
-
logger_lib_1.default.debug("GET PLEXO KEY RESPONSE --> ".concat(JSON.stringify(plexoResponse)));
|
|
259
258
|
if (plexoResponse.status !== 200) {
|
|
260
259
|
throw new Error("Invalid or outdated Fingerprint, server returns: ".concat(plexoResponse.data.Object.Object.ErrorMessage));
|
|
261
260
|
}
|
|
@@ -273,6 +272,7 @@ var getPlexoSignature = function (fingerprint, response) { return __awaiter(void
|
|
|
273
272
|
return [4 /*yield*/, getPlexoKey(fingerprint)];
|
|
274
273
|
case 1:
|
|
275
274
|
plexoResponse = _a.sent();
|
|
275
|
+
logger_lib_1.default.info("FINGERPRINT RESPONSE");
|
|
276
276
|
return [3 /*break*/, 3];
|
|
277
277
|
case 2:
|
|
278
278
|
err_1 = _a.sent();
|
|
@@ -285,10 +285,12 @@ var getPlexoSignature = function (fingerprint, response) { return __awaiter(void
|
|
|
285
285
|
return [2 /*return*/, serverResponse];
|
|
286
286
|
case 3:
|
|
287
287
|
key = "-----BEGIN CERTIFICATE-----\n".concat(plexoResponse.Object.Object.Response.Key, "\n-----END CERTIFICATE-----");
|
|
288
|
+
logger_lib_1.default.info("KEY -----> ".concat(key));
|
|
288
289
|
objectBuffer = new util_1.TextEncoder().encode((0, stringifyWithFloats_1.stringifyAmountsWithFloats)(response.Object));
|
|
289
290
|
verifySignature = (0, crypto_1.createVerify)('SHA512')
|
|
290
291
|
.update(objectBuffer)
|
|
291
292
|
.verify(key, response.Signature, 'base64');
|
|
293
|
+
logger_lib_1.default.info("VERIFY BUFFER -----> ".concat(verifySignature));
|
|
292
294
|
serverResponse = {
|
|
293
295
|
response: response.Object.object,
|
|
294
296
|
resultCode: verifySignature ? __1.ResultCodes.Ok : __1.ResultCodes.InvalidSignature,
|