1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
use crypto::hmac::Hmac;
use crypto::mac::{Mac, MacResult};
use crypto::sha2::Sha256;
pub use hex::FromHexError;
pub fn verify(
secret: &str,
body: &str,
timestamp: i64,
expected_hex: &str,
) -> Result<bool, hex::FromHexError> {
let sig_basestring = format!("v0:{}:{}", timestamp, body);
let mut hasher = Hmac::new(Sha256::new(), secret.as_bytes());
hasher.input(sig_basestring.as_bytes());
let expected = hex::decode(expected_hex.replacen("v0=", "", 1).as_bytes())?;
Ok(hasher.result() == MacResult::new_from_owned(expected))
}
#[cfg(test)]
mod tests {
use super::*;
#[test]
fn test_get_sig_basestring() {
let secret = "8f742231b10e8888abcd99yyyzzz85a5";
let body = "token=xyzz0WbapA4vBCDEFasx0q6G&team_id=T1DC2JH3J&team_domain=testteamnow&channel_id=G8PSS9T3V&channel_name=foobar&user_id=U2CERLKJA&user_name=roadrunner&command=%2Fwebhook-collect&text=&response_url=https%3A%2F%2Fhooks.slack.com%2Fcommands%2FT1DC2JH3J%2F397700885554%2F96rGlfmibIGlgcZRskXaIFfN&trigger_id=398738663015.47445629121.803a0bc887a14d10d2c447fce8b6703c";
let timestamp = 1531420618;
let expected = "v0=a2114d57b48eac39b9ad189dd8316235a7b4a8d21a10bd27519666489c69b503";
let output = verify(secret, body, timestamp, expected);
assert_eq!(output.unwrap(), true);
}
}