1

IMS エミュレーター ( http://ltiapps.net/test/tc.php ) で [データを保存] をクリックすると、自動入力されたデータで outh_signature が生成され、フォーム frmLaunch(name='frmLaunch) の非表示の値として挿入されます。 ') 形。同様の outh_signature をプログラムで生成する必要がありますが、同じ oauth_nounce と oauth_timestamp を使用しているにもかかわらず、エミュレーターが生成している正確な oauth_signature を生成できません。生成中に送信する必要があるリクエスト本文が何であるかわかりませんサイン..

シナリオを再作成するには、以下の手順に従います

  1. URL http://ltiapps.net/test/tc.phpにアクセスします。
  2. [データをクリア] をクリックし、ポップアップで [OK] をクリックします
  3. ロールを学習者として選択し、[データを保存] をクリックします
  4. データを保存すると、入力IDが「oauth_signature」のouth_signature隠し値が表示されます

    以下の方法で生成しようとしましたが、期待される署名を取得できませんでした。

    import java.io.*;
    import java.net.URL;
    import java.net.URLEncoder;
    import java.util.LinkedHashMap;
    import java.util.Map;
    import java.util.TreeMap;
    
    import javax.crypto.Mac;
    import javax.crypto.spec.SecretKeySpec;
    import javax.net.ssl.HttpsURLConnection;
    
    // Apache Commons Libraries used for the Nonce & Base64
    import org.apache.commons.lang3.RandomStringUtils;
    import org.apache.commons.codec.binary.Base64;
    import org.apache.commons.codec.binary.Hex;
    
    
    
    public class OAuthTest {
    
      public static void main(final String[] args) throws Exception
      {
        // Setup the variables necessary to create the OAuth 1.0 signature and   make the request
        String httpMethod  = "POST";
        String consumerKey = "jisc.ac.uk";
        String secret      = "secret";  
       String signatureMethod = "HMAC-SHA1";
        String body = ""; //mentioned in the description
        byte[] requestBody = null;
    
    URL url = new URL("http://ltiapps.net/test/tp.php");
    
    // Set the Nonce and Timestamp parameters
    String nonce = "6d95eef168e568a530d1cd419a997952";//getNonce();
    String timestamp = "1483470400";//getTimestamp();
    
    System.out.println("Nonce:" + getNonce());
    System.out.println("timestamp:" + getTimestamp());
    
    // Set the request body if making a POST or PUT request
    if ("POST".equals(httpMethod)  || "PUT".equals(httpMethod))
    {
      requestBody = body.getBytes("UTF-8");
    }
    
    // Create the OAuth parameter name/value pair
    Map<String, String> oauthParams = new LinkedHashMap<String, String>();
    oauthParams.put("oauth_consumer_key", consumerKey);
    oauthParams.put("oauth_signature_method", signatureMethod);
    oauthParams.put("oauth_timestamp", timestamp);
    oauthParams.put("oauth_nonce", nonce);
    
    
    
    // Get the OAuth 1.0 Signature
    String signature = generateSignature(httpMethod, url, oauthParams, requestBody, secret);
    System.out.println(String.format("OAuth 1.0 Signature: %s", signature));
    
    
    }
    
    private static String getNonce()
    {
        return RandomStringUtils.randomAlphanumeric(32);
    }
    
    
    private static String getTimestamp()
    {    
        return Long.toString((System.currentTimeMillis() / 1000));
     }
    
     private static String generateSignature(
    
    
    String httpMethod,
      URL url,
      Map<String, String> oauthParams,
      byte[] requestBody,
      String secret
     )   throws UnsupportedEncodingException
      {
    // Ensure the HTTP Method is upper-cased
    httpMethod = httpMethod.toUpperCase();
    
    // Construct the URL-encoded OAuth parameter portion of the signature base string
    String encodedParams = normalizeParams(httpMethod, url, oauthParams, requestBody);
    
    // URL-encode the relative URL
    String encodedUri = URLEncoder.encode(url.getPath(), "UTF-8");
    
    // Build the signature base string to be signed with the Consumer Secret
    String baseString = String.format("%s&%s&%s", httpMethod, encodedUri, encodedParams);
    
    
    
        return hmacSha1(baseString, secret);
      }
    
    
      private static String normalizeParams(
          String httpMethod,
          URL url,
          Map<String, String> oauthParams,
          byte[] requestBody
      ) throws UnsupportedEncodingException
      {
    
        // Sort the parameters in lexicographical order, 1st by Key then by Value
        Map<String, String> kvpParams = new TreeMap<String, String>(String.CASE_INSENSITIVE_ORDER);
        kvpParams.putAll(oauthParams); 
    
        // Place any query string parameters into a key value pair using equals ("=") to mark
        // the key/value relationship and join each parameter with an ampersand ("&")
        if (url.getQuery() != null)
        {
          for(String keyValue : url.getQuery().split("&"))
          {
            String[] p = keyValue.split("=");
            kvpParams.put(p[0],p[1]);
          }
    
        }
    
        // Include the body parameter if dealing with a POST or PUT request
        if ("POST".equals(httpMethod) || "PUT".equals(httpMethod))
        {
          String body = Base64.encodeBase64String(requestBody).replaceAll("\r\n", "");
          // url encode the body 2 times now before combining other params
          body = URLEncoder.encode(body, "UTF-8");
          body = URLEncoder.encode(body, "UTF-8");
          kvpParams.put("body", body);    
        }
    
        // separate the key and values with a "="
        // separate the kvp with a "&"
        StringBuilder combinedParams = new StringBuilder();
        String delimiter="";
        for(String key : kvpParams.keySet()) {
          combinedParams.append(delimiter);
          combinedParams.append(key);
          combinedParams.append("=");
          combinedParams.append(kvpParams.get(key));
          delimiter="&";
        }
    
        // url encode the entire string again before returning
        return URLEncoder.encode(combinedParams.toString(), "UTF-8");
      }
    
    
      public static String hmacSha1(String value, String key) {
            String algorithm = "HmacSHA1";
          try {
              // Get an hmac_sha1 key from the raw key bytes
              byte[] keyBytes = key.getBytes();           
              SecretKeySpec signingKey = new SecretKeySpec(keyBytes, algorithm);
    
              // Get an hmac_sha1 Mac instance and initialize with the signing key
              Mac mac = Mac.getInstance(algorithm);
              mac.init(signingKey);
    
              // Compute the hmac on input data bytes
             // byte[] rawHmac = mac.doFinal(value.getBytes());
    
    
              // Convert raw bytes to Hex
             // byte[] hexBytes = new Hex().encode(rawHmac);
              return new String(Base64.encodeBase64(mac.doFinal(value.getBytes()))).trim();
              //  Covert array of Hex bytes to a String
              //return new String(hexBytes, "UTF-8");
          } catch (Exception e) {
              throw new RuntimeException(e);
          }
      }
     }
    

    pom.xml

    <dependencies>
       <dependency>
            <groupId>commons-codec</groupId>
            <artifactId>commons-codec</artifactId>
            <version>1.10</version>
        </dependency>
    
        <dependency>
            <groupId>org.apache.commons</groupId>
            <artifactId>commons-lang3</artifactId>
            <version>3.0</version>
        </dependency>
    

    以下のようにリクエストボディを送信して上記のプログラムを試し、 0YI3mBg7gmnWaz8YyISG4IoHVQ4=として oauth 署名を取得しましたが、期待されるのはyuuvR1pVDm5xWOYhMtBcBBVTdf8=です

バージョン=LTI-1p0&リセット=&エンドポイント=http://ltiapps.net/test/tp.php®ister=http://ltiapps.net/test/tp.php&key=jisc.ac.uk&secret=secret<i_message_type=basic-lti-launch-request&message_type=&tool=<i_version=LTI- 1p0&launch_presentation_locale=&launch_presentation_document_target=&launch_presentation_width=&launch_presentation_height=&launch_presentation_css_url=&launch_presentation_return_url=&custom=&ext=&signaturemethod=HMAC-SHA1&accept_media_types=&accept_presentation_document_targets=embed,frame,iframe,window,popup,overlay,none&content_item_return_url=http://ltiapps.net/test/tc- content.php&accept_unsigned=&accept_multiple=&accept_copy_advice=&auto_create=&title=&text=&data=&tool_consumer_instance_guid=&tool_consumer_instance_name=&tool_consumer_instance_description=&tool_consumer_instance_url=&tool_consumer_instance_contact_email=&tool_consumer_info_product_family_code=&tool_consumer_info_version=&context_id=&context_type=&a_context_type=&context_title=&context_label=&lis_course_offering_sourcedid=&lis_course_section_sourcedid=&resource_link_id=429785226&resource_link_title=&resource_link_description=&user_id=&lis_person_name_given=&lis_person_name_family=&lis_person_name_full=&lis_person_contact_email_primary=&lis_person_sourcedid=&roles=Learner&a_role=&user_image=&mentors= &username=&lis_outcome_service_url=&lis_result_sourcedid=&ext_ims_lis_basic_outcome_url=&ext_ims_lis_resultvalue_sourcedids=&ext_ims_lis_memberships_url=&ext_ims_lis_memberships_id=&ext_ims_lti_tool_setting_url=&ext_ims_lti_tool_setting_id=&setting=&custom_tc_profile_url=&custom_system_setting_url=&custom_context_setting_url=&custom_link_setting_url=&custom_lineitems_url=&custom_results_url=&custom_lineitem_url=&custom_result_url=&custom_context_memberships_url=&custom_link_memberships_url=&custom_caliper_federated_session_id=&custom_caliper_eventstore_url=&custom_caliper_api_key=custom_link_memberships_url=&custom_caliper_federated_session_id=&custom_caliper_eventstore_url=&custom_caliper_api_key=custom_link_memberships_url=&custom_caliper_federated_session_id=&custom_caliper_eventstore_url=&custom_caliper_api_key=

どこが間違っているのか教えてください..

4

1 に答える 1