/*
  This file is part of TALER
  Copyright (C) 2022 Taler Systems SA
  TALER is free software; you can redistribute it and/or modify it under the
  terms of the GNU Affero General Public License as published by the Free Software
  Foundation; either version 3, or (at your option) any later version.
  TALER is distributed in the hope that it will be useful, but WITHOUT ANY
  WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
  A PARTICULAR PURPOSE.  See the GNU Affero General Public License for more details.
  You should have received a copy of the GNU Affero General Public License along with
  TALER; see the file COPYING.  If not, see 
*/
/**
 * @file taler-exchange-httpd_purses_create.c
 * @brief Handle /purses/$PID/create requests; parses the POST and JSON and
 *        verifies the coin signature before handing things off
 *        to the database.
 * @author Christian Grothoff
 */
#include "platform.h"
#include 
#include 
#include 
#include 
#include 
#include "taler_json_lib.h"
#include "taler_mhd_lib.h"
#include "taler-exchange-httpd_purses_create.h"
#include "taler-exchange-httpd_responses.h"
#include "taler_exchangedb_lib.h"
#include "taler-exchange-httpd_keys.h"
/**
 * Information about an individual coin being deposited.
 */
struct Coin
{
  /**
   * Public information about the coin.
   */
  struct TALER_CoinPublicInfo cpi;
  /**
   * Signature affirming spending the coin.
   */
  struct TALER_CoinSpendSignatureP coin_sig;
  /**
   * Amount to be put into the purse from this coin.
   */
  struct TALER_Amount amount;
  /**
   * Deposit fee applicable for this coin.
   */
  struct TALER_Amount deposit_fee;
  /**
   * Amount to be put into the purse from this coin.
   */
  struct TALER_Amount amount_minus_fee;
  /**
   * ID of the coin in known_coins.
   */
  uint64_t known_coin_id;
};
/**
 * Closure for #create_transaction.
 */
struct PurseCreateContext
{
  /**
   * Public key of the purse we are creating.
   */
  const struct TALER_PurseContractPublicKeyP *purse_pub;
  /**
   * Total amount to be put into the purse.
   */
  struct TALER_Amount amount;
  /**
   * Total actually deposited by all the coins.
   */
  struct TALER_Amount deposit_total;
  /**
   * When should the purse expire.
   */
  struct GNUNET_TIME_Timestamp purse_expiration;
  /**
   * Our current time.
   */
  struct GNUNET_TIME_Timestamp exchange_timestamp;
  /**
   * Merge key for the purse.
   */
  struct TALER_PurseMergePublicKeyP merge_pub;
  /**
   * Contract decryption key for the purse.
   */
  struct TALER_ContractDiffiePublicP contract_pub;
  /**
   * Signature of the client affiming this request.
   */
  struct TALER_PurseContractSignatureP purse_sig;
  /**
   * Signature of the client affiming this encrypted contract.
   */
  struct TALER_PurseContractSignatureP econtract_sig;
  /**
   * Hash of the contract terms of the purse.
   */
  struct TALER_PrivateContractHashP h_contract_terms;
  /**
   * Array of coins being deposited.
   */
  struct Coin *coins;
  /**
   * Encrypted contract, can be NULL.
   */
  void *econtract;
  /**
   * Number of bytes in @e econtract.
   */
  size_t econtract_size;
  /**
   * Length of the @e coins array.
   */
  unsigned int num_coins;
  /**
   * Minimum age for deposits into this purse.
   */
  uint32_t min_age;
};
/**
 * Send confirmation of purse creation success to client.
 *
 * @param connection connection to the client
 * @param pcc details about the request that succeeded
 * @return MHD result code
 */
static MHD_RESULT
reply_create_success (struct MHD_Connection *connection,
                      const struct PurseCreateContext *pcc)
{
  struct TALER_ExchangePublicKeyP pub;
  struct TALER_ExchangeSignatureP sig;
  enum TALER_ErrorCode ec;
  if (TALER_EC_NONE !=
      (ec = TALER_exchange_online_purse_created_sign (
         &TEH_keys_exchange_sign_,
         pcc->exchange_timestamp,
         pcc->purse_expiration,
         &pcc->amount,
         &pcc->deposit_total,
         pcc->purse_pub,
         &pcc->merge_pub,
         &pcc->h_contract_terms,
         &pub,
         &sig)))
  {
    GNUNET_break (0);
    return TALER_MHD_reply_with_ec (connection,
                                    ec,
                                    NULL);
  }
  return TALER_MHD_REPLY_JSON_PACK (
    connection,
    MHD_HTTP_OK,
    TALER_JSON_pack_amount ("total_deposited",
                            &pcc->deposit_total),
    GNUNET_JSON_pack_timestamp ("exchange_timestamp",
                                pcc->exchange_timestamp),
    GNUNET_JSON_pack_data_auto ("exchange_sig",
                                &sig),
    GNUNET_JSON_pack_data_auto ("exchange_pub",
                                &pub));
}
/**
 * Execute database transaction for /purses/$PID/create.  Runs the transaction
 * logic; IF it returns a non-error code, the transaction logic MUST NOT queue
 * a MHD response.  IF it returns an hard error, the transaction logic MUST
 * queue a MHD response and set @a mhd_ret.  IF it returns the soft error
 * code, the function MAY be called again to retry and MUST not queue a MHD
 * response.
 *
 * @param cls a `struct PurseCreateContext`
 * @param connection MHD request context
 * @param[out] mhd_ret set to MHD status on error
 * @return transaction status
 */
static enum GNUNET_DB_QueryStatus
create_transaction (void *cls,
                    struct MHD_Connection *connection,
                    MHD_RESULT *mhd_ret)
{
  struct PurseCreateContext *pcc = cls;
  enum GNUNET_DB_QueryStatus qs;
  bool in_conflict = true;
  /* 1) create purse */
  qs = TEH_plugin->insert_purse_request (TEH_plugin->cls,
                                         pcc->purse_pub,
                                         &pcc->merge_pub,
                                         pcc->purse_expiration,
                                         &pcc->h_contract_terms,
                                         pcc->min_age,
                                         &pcc->amount,
                                         &pcc->purse_sig,
                                         &in_conflict);
  if (qs < 0)
  {
    if (GNUNET_DB_STATUS_SOFT_ERROR == qs)
      return qs;
    TALER_LOG_WARNING (
      "Failed to store create purse information in database\n");
    *mhd_ret =
      TALER_MHD_reply_with_error (connection,
                                  MHD_HTTP_INTERNAL_SERVER_ERROR,
                                  TALER_EC_GENERIC_DB_STORE_FAILED,
                                  "purse create");
    return qs;
  }
  if (in_conflict)
  {
    struct TALER_PurseMergePublicKeyP merge_pub;
    struct GNUNET_TIME_Timestamp purse_expiration;
    struct TALER_PrivateContractHashP h_contract_terms;
    struct TALER_Amount target_amount;
    struct TALER_Amount balance;
    struct TALER_PurseContractSignatureP purse_sig;
    uint32_t min_age;
    TEH_plugin->rollback (TEH_plugin->cls);
    qs = TEH_plugin->select_purse_request (TEH_plugin->cls,
                                           pcc->purse_pub,
                                           &merge_pub,
                                           &purse_expiration,
                                           &h_contract_terms,
                                           &min_age,
                                           &target_amount,
                                           &balance,
                                           &purse_sig);
    if (qs < 0)
    {
      GNUNET_break (GNUNET_DB_STATUS_SOFT_ERROR != qs);
      TALER_LOG_WARNING ("Failed to fetch purse information from database\n");
      *mhd_ret = TALER_MHD_reply_with_error (connection,
                                             MHD_HTTP_INTERNAL_SERVER_ERROR,
                                             TALER_EC_GENERIC_DB_FETCH_FAILED,
                                             "select purse request");
      return GNUNET_DB_STATUS_HARD_ERROR;
    }
    *mhd_ret
      = TALER_MHD_REPLY_JSON_PACK (
          connection,
          MHD_HTTP_CONFLICT,
          TALER_JSON_pack_ec (
            TALER_EC_EXCHANGE_PURSE_CREATE_CONFLICTING_META_DATA),
          TALER_JSON_pack_amount ("amount",
                                  &target_amount),
          GNUNET_JSON_pack_uint64 ("min_age",
                                   min_age),
          GNUNET_JSON_pack_timestamp ("purse_expiration",
                                      purse_expiration),
          GNUNET_JSON_pack_data_auto ("purse_sig",
                                      &purse_sig),
          GNUNET_JSON_pack_data_auto ("h_contract_terms",
                                      &h_contract_terms),
          GNUNET_JSON_pack_data_auto ("merge_pub",
                                      &merge_pub));
    return GNUNET_DB_STATUS_HARD_ERROR;
  }
  /* 2) deposit all coins */
  for (unsigned int i = 0; inum_coins; i++)
  {
    struct Coin *coin = &pcc->coins[i];
    bool balance_ok = false;
    bool conflict = true;
    qs = TEH_plugin->do_purse_deposit (TEH_plugin->cls,
                                       pcc->purse_pub,
                                       &coin->cpi.coin_pub,
                                       &coin->amount,
                                       &coin->coin_sig,
                                       &coin->amount_minus_fee,
                                       &balance_ok,
                                       &conflict);
    if (qs <= 0)
    {
      if (GNUNET_DB_STATUS_SOFT_ERROR == qs)
        return qs;
      TALER_LOG_WARNING (
        "Failed to store purse deposit information in database\n");
      *mhd_ret = TALER_MHD_reply_with_error (connection,
                                             MHD_HTTP_INTERNAL_SERVER_ERROR,
                                             TALER_EC_GENERIC_DB_STORE_FAILED,
                                             "purse create deposit");
      return qs;
    }
    if (! balance_ok)
    {
      *mhd_ret
        = TEH_RESPONSE_reply_coin_insufficient_funds (
            connection,
            TALER_EC_EXCHANGE_GENERIC_INSUFFICIENT_FUNDS,
            &coin->cpi.coin_pub);
      return GNUNET_DB_STATUS_HARD_ERROR;
    }
    if (conflict)
    {
      struct TALER_Amount amount;
      struct TALER_CoinSpendPublicKeyP coin_pub;
      struct TALER_CoinSpendSignatureP coin_sig;
      char *partner_url = NULL;
      TEH_plugin->rollback (TEH_plugin->cls);
      qs = TEH_plugin->get_purse_deposit (TEH_plugin->cls,
                                          pcc->purse_pub,
                                          &coin->cpi.coin_pub,
                                          &amount,
                                          &coin_sig,
                                          &partner_url);
      if (qs < 0)
      {
        GNUNET_break (GNUNET_DB_STATUS_SOFT_ERROR != qs);
        TALER_LOG_WARNING (
          "Failed to fetch purse deposit information from database\n");
        *mhd_ret = TALER_MHD_reply_with_error (connection,
                                               MHD_HTTP_INTERNAL_SERVER_ERROR,
                                               TALER_EC_GENERIC_DB_FETCH_FAILED,
                                               "get purse deposit");
        return GNUNET_DB_STATUS_HARD_ERROR;
      }
      *mhd_ret
        = TALER_MHD_REPLY_JSON_PACK (
            connection,
            MHD_HTTP_CONFLICT,
            TALER_JSON_pack_ec (
              TALER_EC_EXCHANGE_PURSE_DEPOSIT_CONFLICTING_META_DATA),
            GNUNET_JSON_pack_data_auto ("coin_pub",
                                        &coin_pub),
            GNUNET_JSON_pack_data_auto ("coin_sig",
                                        &coin_sig),
            GNUNET_JSON_pack_allow_null (
              GNUNET_JSON_pack_string ("partner_url",
                                       partner_url)),
            TALER_JSON_pack_amount ("amount",
                                    &amount));
      GNUNET_free (partner_url);
      return GNUNET_DB_STATUS_HARD_ERROR;
    }
  }
  /* 3) if present, persist contract */
  in_conflict = true;
  qs = TEH_plugin->insert_contract (TEH_plugin->cls,
                                    pcc->purse_pub,
                                    &pcc->contract_pub,
                                    pcc->econtract_size,
                                    pcc->econtract,
                                    &pcc->econtract_sig,
                                    &in_conflict);
  if (qs < 0)
  {
    if (GNUNET_DB_STATUS_SOFT_ERROR == qs)
      return qs;
    TALER_LOG_WARNING ("Failed to store purse information in database\n");
    *mhd_ret = TALER_MHD_reply_with_error (connection,
                                           MHD_HTTP_INTERNAL_SERVER_ERROR,
                                           TALER_EC_GENERIC_DB_STORE_FAILED,
                                           "purse create contract");
    return qs;
  }
  if (in_conflict)
  {
    struct TALER_ContractDiffiePublicP pub_ckey;
    struct TALER_PurseContractSignatureP econtract_sig;
    size_t econtract_size;
    void *econtract;
    struct GNUNET_HashCode h_econtract;
    qs = TEH_plugin->select_contract (TEH_plugin->cls,
                                      pcc->purse_pub,
                                      &pub_ckey,
                                      &econtract_sig,
                                      &econtract_size,
                                      &econtract);
    if (qs <= 0)
    {
      if (GNUNET_DB_STATUS_SOFT_ERROR == qs)
        return qs;
      TALER_LOG_WARNING (
        "Failed to store fetch contract information from database\n");
      *mhd_ret = TALER_MHD_reply_with_error (connection,
                                             MHD_HTTP_INTERNAL_SERVER_ERROR,
                                             TALER_EC_GENERIC_DB_FETCH_FAILED,
                                             "select contract");
      return qs;
    }
    GNUNET_CRYPTO_hash (econtract,
                        econtract_size,
                        &h_econtract);
    *mhd_ret
      = TALER_MHD_REPLY_JSON_PACK (
          connection,
          MHD_HTTP_CONFLICT,
          TALER_JSON_pack_ec (
            TALER_EC_EXCHANGE_PURSE_ECONTRACT_CONFLICTING_META_DATA),
          GNUNET_JSON_pack_data_auto ("h_econtract",
                                      &h_econtract),
          GNUNET_JSON_pack_data_auto ("econtract_sig",
                                      &econtract_sig),
          GNUNET_JSON_pack_data_auto ("pub_ckey",
                                      &pub_ckey));
    return GNUNET_DB_STATUS_HARD_ERROR;
  }
  return qs;
}
/**
 * Parse a coin and check signature of the coin and the denomination
 * signature over the coin.
 *
 * @param[in,out] our HTTP connection
 * @param[in,out] request context
 * @param[out] coin coin to initialize
 * @param jcoin coin to parse
 * @return #GNUNET_OK on success, #GNUNET_NO if an error was returned,
 *         #GNUNET_SYSERR on failure and no error could be returned
 */
static enum GNUNET_GenericReturnValue
parse_coin (struct MHD_Connection *connection,
            struct PurseCreateContext *pcc,
            struct Coin *coin,
            const json_t *jcoin)
{
  struct GNUNET_JSON_Specification spec[] = {
    TALER_JSON_spec_amount ("amount",
                            TEH_currency,
                            &coin->amount),
    GNUNET_JSON_spec_fixed_auto ("denom_pub_hash",
                                 &coin->cpi.denom_pub_hash),
    TALER_JSON_spec_denom_sig ("ub_sig",
                               &coin->cpi.denom_sig),
    GNUNET_JSON_spec_mark_optional (
      GNUNET_JSON_spec_fixed_auto ("h_age_commitment",
                                   &coin->cpi.h_age_commitment),
      &coin->cpi.no_age_commitment),
    GNUNET_JSON_spec_fixed_auto ("coin_sig",
                                 &coin->coin_sig),
    GNUNET_JSON_spec_fixed_auto ("coin_pub",
                                 &coin->cpi.coin_pub),
    GNUNET_JSON_spec_end ()
  };
  {
    enum GNUNET_GenericReturnValue res;
    res = TALER_MHD_parse_json_data (connection,
                                     jcoin,
                                     spec);
    if (GNUNET_OK != res)
      return res;
  }
  if (GNUNET_OK !=
      TALER_wallet_purse_deposit_verify (TEH_base_url,
                                         pcc->purse_pub,
                                         &pcc->amount,
                                         &coin->cpi.coin_pub,
                                         &coin->coin_sig))
  {
    TALER_LOG_WARNING ("Invalid signature on /purses/$PID/create request\n");
    GNUNET_JSON_parse_free (spec);
    return (MHD_YES ==
            TALER_MHD_reply_with_error (connection,
                                        MHD_HTTP_UNAUTHORIZED,
                                        TALER_EC_EXCHANGE_PURSE_CREATE_COIN_SIGNATURE_INVALID,
                                        TEH_base_url))
           ? GNUNET_NO : GNUNET_SYSERR;
  }
  /* check denomination exists and is valid */
  {
    struct TEH_DenominationKey *dk;
    MHD_RESULT mret;
    dk = TEH_keys_denomination_by_hash (&coin->cpi.denom_pub_hash,
                                        connection,
                                        &mret);
    if (NULL == dk)
    {
      GNUNET_JSON_parse_free (spec);
      return (MHD_YES == mret) ? GNUNET_NO : GNUNET_SYSERR;
    }
    if (0 > TALER_amount_cmp (&dk->meta.value,
                              &coin->amount))
    {
      GNUNET_break_op (0);
      GNUNET_JSON_parse_free (spec);
      return (MHD_YES ==
              TALER_MHD_reply_with_error (connection,
                                          MHD_HTTP_BAD_REQUEST,
                                          TALER_EC_EXCHANGE_GENERIC_AMOUNT_EXCEEDS_DENOMINATION_VALUE,
                                          NULL))
             ? GNUNET_NO : GNUNET_SYSERR;
    }
    if (GNUNET_TIME_absolute_is_past (dk->meta.expire_deposit.abs_time))
    {
      /* This denomination is past the expiration time for deposits */
      GNUNET_JSON_parse_free (spec);
      return (MHD_YES ==
              TEH_RESPONSE_reply_expired_denom_pub_hash (
                connection,
                &coin->cpi.denom_pub_hash,
                TALER_EC_EXCHANGE_GENERIC_DENOMINATION_EXPIRED,
                "PURSE CREATE"))
             ? GNUNET_NO : GNUNET_SYSERR;
    }
    if (GNUNET_TIME_absolute_is_future (dk->meta.start.abs_time))
    {
      /* This denomination is not yet valid */
      GNUNET_JSON_parse_free (spec);
      return (MHD_YES ==
              TEH_RESPONSE_reply_expired_denom_pub_hash (
                connection,
                &coin->cpi.denom_pub_hash,
                TALER_EC_EXCHANGE_GENERIC_DENOMINATION_VALIDITY_IN_FUTURE,
                "PURSE CREATE"))
             ? GNUNET_NO : GNUNET_SYSERR;
    }
    if (dk->recoup_possible)
    {
      /* This denomination has been revoked */
      GNUNET_JSON_parse_free (spec);
      return (MHD_YES ==
              TEH_RESPONSE_reply_expired_denom_pub_hash (
                connection,
                &coin->cpi.denom_pub_hash,
                TALER_EC_EXCHANGE_GENERIC_DENOMINATION_REVOKED,
                "PURSE CREATE"))
             ? GNUNET_NO : GNUNET_SYSERR;
    }
    if (dk->denom_pub.cipher != coin->cpi.denom_sig.cipher)
    {
      /* denomination cipher and denomination signature cipher not the same */
      GNUNET_JSON_parse_free (spec);
      return (MHD_YES ==
              TALER_MHD_reply_with_error (connection,
                                          MHD_HTTP_BAD_REQUEST,
                                          TALER_EC_EXCHANGE_GENERIC_CIPHER_MISMATCH,
                                          NULL))
             ? GNUNET_NO : GNUNET_SYSERR;
    }
    coin->deposit_fee = dk->meta.fees.deposit;
    if (0 < TALER_amount_cmp (&coin->deposit_fee,
                              &coin->amount))
    {
      GNUNET_break_op (0);
      GNUNET_JSON_parse_free (spec);
      return TALER_MHD_reply_with_error (connection,
                                         MHD_HTTP_BAD_REQUEST,
                                         TALER_EC_EXCHANGE_DEPOSIT_NEGATIVE_VALUE_AFTER_FEE,
                                         NULL);
    }
    GNUNET_assert (0 <=
                   TALER_amount_subtract (&coin->amount_minus_fee,
                                          &coin->amount,
                                          &coin->deposit_fee));
    /* check coin signature */
    switch (dk->denom_pub.cipher)
    {
    case TALER_DENOMINATION_RSA:
      TEH_METRICS_num_verifications[TEH_MT_SIGNATURE_RSA]++;
      break;
    case TALER_DENOMINATION_CS:
      TEH_METRICS_num_verifications[TEH_MT_SIGNATURE_CS]++;
      break;
    default:
      break;
    }
    if (GNUNET_YES !=
        TALER_test_coin_valid (&coin->cpi,
                               &dk->denom_pub))
    {
      TALER_LOG_WARNING ("Invalid coin passed for /deposit\n");
      GNUNET_JSON_parse_free (spec);
      return (MHD_YES ==
              TALER_MHD_reply_with_error (connection,
                                          MHD_HTTP_UNAUTHORIZED,
                                          TALER_EC_EXCHANGE_DENOMINATION_SIGNATURE_INVALID,
                                          NULL))
             ? GNUNET_NO : GNUNET_SYSERR;
    }
    if (0 >
        TALER_amount_add (&pcc->deposit_total,
                          &pcc->deposit_total,
                          &coin->amount_minus_fee))
    {
      GNUNET_break (0);
      return TALER_MHD_reply_with_error (connection,
                                         MHD_HTTP_INTERNAL_SERVER_ERROR,
                                         TALER_EC_GENERIC_FAILED_COMPUTE_AMOUNT,
                                         "total deposit contribution");
    }
  }
  {
    MHD_RESULT mhd_ret = MHD_NO;
    enum GNUNET_DB_QueryStatus qs;
    /* make sure coin is 'known' in database */
    for (unsigned int tries = 0; triescpi,
                                connection,
                                &coin->known_coin_id,
                                &mhd_ret);
      /* no transaction => no serialization failures should be possible */
      if (GNUNET_DB_STATUS_SOFT_ERROR != qs)
        break;
    }
    if (GNUNET_DB_STATUS_SOFT_ERROR == qs)
    {
      GNUNET_break (0);
      return (MHD_YES ==
              TALER_MHD_reply_with_error (connection,
                                          MHD_HTTP_INTERNAL_SERVER_ERROR,
                                          TALER_EC_GENERIC_DB_COMMIT_FAILED,
                                          "make_coin_known"))
             ? GNUNET_NO : GNUNET_SYSERR;
    }
    if (qs < 0)
      return (MHD_YES == mhd_ret) ? GNUNET_NO : GNUNET_SYSERR;
  }
  return GNUNET_OK;
}
MHD_RESULT
TEH_handler_purses_create (
  struct MHD_Connection *connection,
  const struct TALER_PurseContractPublicKeyP *purse_pub,
  const json_t *root)
{
  struct PurseCreateContext pcc = {
    .purse_pub = purse_pub,
    .exchange_timestamp = GNUNET_TIME_timestamp_get ()
  };
  json_t *deposits;
  json_t *deposit;
  unsigned int idx;
  struct GNUNET_JSON_Specification spec[] = {
    TALER_JSON_spec_amount ("amount",
                            TEH_currency,
                            &pcc.amount),
    GNUNET_JSON_spec_uint32 ("min_age",
                             &pcc.min_age),
    GNUNET_JSON_spec_mark_optional (
      GNUNET_JSON_spec_varsize ("econtract",
                                &pcc.econtract,
                                &pcc.econtract_size),
      NULL),
    GNUNET_JSON_spec_mark_optional (
      GNUNET_JSON_spec_fixed_auto ("econtract_sig",
                                   &pcc.econtract_sig),
      NULL),
    GNUNET_JSON_spec_mark_optional (
      GNUNET_JSON_spec_fixed_auto ("contract_pub",
                                   &pcc.contract_pub),
      NULL),
    GNUNET_JSON_spec_fixed_auto ("merge_pub",
                                 &pcc.merge_pub),
    GNUNET_JSON_spec_fixed_auto ("purse_sig",
                                 &pcc.purse_sig),
    GNUNET_JSON_spec_fixed_auto ("h_contract_terms",
                                 &pcc.h_contract_terms),
    GNUNET_JSON_spec_json ("deposits",
                           &deposits),
    GNUNET_JSON_spec_timestamp ("purse_expiration",
                                &pcc.purse_expiration),
    GNUNET_JSON_spec_end ()
  };
  const struct TEH_GlobalFee *gf;
  {
    enum GNUNET_GenericReturnValue res;
    res = TALER_MHD_parse_json_data (connection,
                                     root,
                                     spec);
    if (GNUNET_SYSERR == res)
    {
      GNUNET_break (0);
      return MHD_NO; /* hard failure */
    }
    if (GNUNET_NO == res)
    {
      GNUNET_break_op (0);
      return MHD_YES; /* failure */
    }
  }
  GNUNET_assert (GNUNET_OK ==
                 TALER_amount_set_zero (TEH_currency,
                                        &pcc.deposit_total));
  if (GNUNET_TIME_timestamp_cmp (pcc.purse_expiration,
                                 <,
                                 pcc.exchange_timestamp))
  {
    GNUNET_break_op (0);
    GNUNET_JSON_parse_free (spec);
    return TALER_MHD_reply_with_error (connection,
                                       MHD_HTTP_BAD_REQUEST,
                                       TALER_EC_EXCHANGE_PURSE_CREATE_EXPIRATION_BEFORE_NOW,
                                       NULL);
  }
  if (GNUNET_TIME_absolute_is_never (pcc.purse_expiration.abs_time))
  {
    GNUNET_break_op (0);
    GNUNET_JSON_parse_free (spec);
    return TALER_MHD_reply_with_error (connection,
                                       MHD_HTTP_BAD_REQUEST,
                                       TALER_EC_EXCHANGE_PURSE_CREATE_EXPIRATION_IS_NEVER,
                                       NULL);
  }
  pcc.num_coins = json_array_size (deposits);
  if ( (0 == pcc.num_coins) ||
       (pcc.num_coins > TALER_MAX_FRESH_COINS) )
  {
    GNUNET_break_op (0);
    GNUNET_JSON_parse_free (spec);
    return TALER_MHD_reply_with_error (connection,
                                       MHD_HTTP_BAD_REQUEST,
                                       TALER_EC_GENERIC_PARAMETER_MALFORMED,
                                       "deposits");
  }
  gf = TEH_keys_global_fee_by_time (TEH_keys_get_state (),
                                    pcc.exchange_timestamp);
  if (NULL == gf)
  {
    GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
                "Cannot create purse: global fees not configured!\n");
    return TALER_MHD_reply_with_error (connection,
                                       MHD_HTTP_INTERNAL_SERVER_ERROR,
                                       TALER_EC_EXCHANGE_GENERIC_GLOBAL_FEES_MISSING,
                                       NULL);
  }
  /* parse deposits */
  pcc.coins = GNUNET_new_array (pcc.num_coins,
                                struct Coin);
  json_array_foreach (deposits, idx, deposit)
  {
    enum GNUNET_GenericReturnValue res;
    struct Coin *coin = &pcc.coins[idx];
    res = parse_coin (connection,
                      &pcc,
                      coin,
                      deposit);
    if (GNUNET_OK != res)
    {
      GNUNET_JSON_parse_free (spec);
      GNUNET_free (pcc.coins);
      return (GNUNET_NO == res) ? MHD_YES : MHD_NO;
    }
  }
  if (0 < TALER_amount_cmp (&gf->fees.purse,
                            &pcc.deposit_total))
  {
    GNUNET_break_op (0);
    GNUNET_JSON_parse_free (spec);
    GNUNET_free (pcc.coins);
    return TALER_MHD_reply_with_error (connection,
                                       MHD_HTTP_BAD_REQUEST,
                                       TALER_EC_EXCHANGE_CREATE_PURSE_NEGATIVE_VALUE_AFTER_FEE,
                                       NULL);
  }
  TEH_METRICS_num_verifications[TEH_MT_SIGNATURE_EDDSA]++;
  if (GNUNET_OK !=
      TALER_wallet_purse_create_verify (pcc.purse_expiration,
                                        &pcc.h_contract_terms,
                                        &pcc.merge_pub,
                                        pcc.min_age,
                                        &pcc.amount,
                                        pcc.purse_pub,
                                        &pcc.purse_sig))
  {
    TALER_LOG_WARNING ("Invalid signature on /purses/$PID/create request\n");
    GNUNET_JSON_parse_free (spec);
    GNUNET_free (pcc.coins);
    return TALER_MHD_reply_with_error (connection,
                                       MHD_HTTP_UNAUTHORIZED,
                                       TALER_EC_EXCHANGE_PURSE_CREATE_SIGNATURE_INVALID,
                                       NULL);
  }
  if ( (NULL != pcc.econtract) &&
       (GNUNET_OK !=
        TALER_wallet_econtract_upload_verify (pcc.econtract,
                                              pcc.econtract_size,
                                              &pcc.contract_pub,
                                              purse_pub,
                                              &pcc.econtract_sig)) )
  {
    TALER_LOG_WARNING ("Invalid signature on /purses/$PID/create request\n");
    GNUNET_JSON_parse_free (spec);
    GNUNET_free (pcc.coins);
    return TALER_MHD_reply_with_error (connection,
                                       MHD_HTTP_UNAUTHORIZED,
                                       TALER_EC_EXCHANGE_PURSE_ECONTRACT_SIGNATURE_INVALID,
                                       NULL);
  }
  if (GNUNET_SYSERR ==
      TEH_plugin->preflight (TEH_plugin->cls))
  {
    GNUNET_break (0);
    GNUNET_JSON_parse_free (spec);
    GNUNET_free (pcc.coins);
    return TALER_MHD_reply_with_error (connection,
                                       MHD_HTTP_INTERNAL_SERVER_ERROR,
                                       TALER_EC_GENERIC_DB_START_FAILED,
                                       "preflight failure");
  }
  /* execute transaction */
  {
    MHD_RESULT mhd_ret;
    if (GNUNET_OK !=
        TEH_DB_run_transaction (connection,
                                "execute purse create",
                                TEH_MT_REQUEST_PURSE_CREATE,
                                &mhd_ret,
                                &create_transaction,
                                &pcc))
    {
      GNUNET_JSON_parse_free (spec);
      GNUNET_free (pcc.coins);
      return mhd_ret;
    }
  }
  /* generate regular response */
  {
    MHD_RESULT res;
    res = reply_create_success (connection,
                                &pcc);
    GNUNET_free (pcc.coins);
    GNUNET_JSON_parse_free (spec);
    return res;
  }
}
/* end of taler-exchange-httpd_purses_create.c */