module SMARTAppLaunch::RegistrationVerification
def normalize_urls(url_list, type_for_error)
def normalize_urls(url_list, type_for_error) url_list.split(',').map(&:strip).each_with_object([]) do |url, normalized_urls| next if url.blank? parsed_uri = begin URI.parse(url) rescue URI::InvalidURIError add_message('error', "Registered #{type_for_error} '#{url}' is not a valid URI.") nil end next unless parsed_uri.present? unless parsed_uri.scheme == 'https' || parsed_uri.scheme == 'http' add_message('error', "Registered #{type_for_error} '#{url}' is not a valid http address.") next end normalized_urls << url unless parsed_uri.scheme == 'https' add_message('error', "Registered #{type_for_error} '#{url}' is not a valid https URI.") end end end
def verify_registered_jwks(jwks_input)
def verify_registered_jwks(jwks_input) jwks_warnings = [] parsed_smart_jwk_set = MockSMARTServer.jwk_set(smart_jwk_set, jwks_warnings) jwks_warnings.each { |warning| add_message('warning', warning) } # TODO: add key-specific verification per end of https://build.fhir.org/ig/HL7/smart-app-launch/client-confidential-asymmetric.html#registering-a-client-communicating-public-keys unless parsed_smart_jwk_set.length.positive? add_message( 'error', 'JWKS content for Confidential Asymmetric authentication does not include any valid keys.' ) end end
def verify_registered_launch_urls(launch_urls)
def verify_registered_launch_urls(launch_urls) return unless launch_urls.present? normalized_launch_urls = normalize_urls(launch_urls, 'launch URL') output smart_launch_urls: normalized_launch_urls.join(',').strip end
def verify_registered_redirect_uris(redirect_uris)
def verify_registered_redirect_uris(redirect_uris) return unless redirect_uris.present? normalized_redirect_uris = normalize_urls(redirect_uris, 'redirect URI') output smart_redirect_uris: normalized_redirect_uris.join(',').strip end