X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/0ded94e10f668c961c257199d7b6d08af234b75a..09a2e88c51e5432e607f2a38466e55b4ba15e887:/services/api/app/models/blob.rb?ds=sidebyside diff --git a/services/api/app/models/blob.rb b/services/api/app/models/blob.rb index 56cdfb83a4..00c2501865 100644 --- a/services/api/app/models/blob.rb +++ b/services/api/app/models/blob.rb @@ -49,11 +49,12 @@ class Blob end timestamp_hex = timestamp.to_s(16) # => "53163cb4" + blob_signature_ttl = Rails.configuration.blob_signature_ttl.to_s(16) # Generate a signature. signature = generate_signature((opts[:key] or Rails.configuration.blob_signing_key), - blob_hash, opts[:api_token], timestamp_hex) + blob_hash, opts[:api_token], timestamp_hex, blob_signature_ttl) blob_locator + '+A' + signature + '@' + timestamp_hex end @@ -63,9 +64,9 @@ class Blob # Return value: true if the locator has a valid signature, false otherwise # Arguments: signed_blob_locator, opts # - def self.verify_signature *args + def self.verify_signature(*args) begin - self.verify_signature! *args + self.verify_signature!(*args) true rescue Blob::InvalidSignatureError false @@ -90,16 +91,17 @@ class Blob if !timestamp raise Blob::InvalidSignatureError.new 'No signature provided.' end - if !timestamp.match /^[\da-f]+$/ + unless timestamp =~ /^[\da-f]+$/ raise Blob::InvalidSignatureError.new 'Timestamp is not a base16 number.' end if timestamp.to_i(16) < (opts[:now] or db_current_time.to_i) raise Blob::InvalidSignatureError.new 'Signature expiry time has passed.' end + blob_signature_ttl = Rails.configuration.blob_signature_ttl.to_s(16) my_signature = generate_signature((opts[:key] or Rails.configuration.blob_signing_key), - blob_hash, opts[:api_token], timestamp) + blob_hash, opts[:api_token], timestamp, blob_signature_ttl) if my_signature != given_signature raise Blob::InvalidSignatureError.new 'Signature is invalid.' @@ -108,10 +110,11 @@ class Blob true end - def self.generate_signature key, blob_hash, api_token, timestamp + def self.generate_signature key, blob_hash, api_token, timestamp, blob_signature_ttl OpenSSL::HMAC.hexdigest('sha1', key, [blob_hash, api_token, - timestamp].join('@')) + timestamp, + blob_signature_ttl].join('@')) end end