2018-01-21 15:39:48 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2022-02-08 14:02:27 +01:00
|
|
|
Copyright (C) 2018-2022 Taler Systems SA
|
2018-01-21 15:39:48 +01:00
|
|
|
|
2018-01-23 10:28:24 +01:00
|
|
|
TALER is free software; you can redistribute it and/or modify it
|
|
|
|
under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation; either version 3, or (at your
|
|
|
|
option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but
|
|
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public
|
|
|
|
License along with TALER; see the file COPYING. If not, see
|
2018-01-21 15:39:48 +01:00
|
|
|
<http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
2020-01-19 15:23:19 +01:00
|
|
|
* @file testing/testing_api_cmd_withdraw.c
|
2018-01-21 15:39:48 +01:00
|
|
|
* @brief main interpreter loop for testcases
|
|
|
|
* @author Christian Grothoff
|
|
|
|
* @author Marcello Stanisci
|
|
|
|
*/
|
|
|
|
#include "platform.h"
|
|
|
|
#include "taler_json_lib.h"
|
2018-08-10 12:39:47 +02:00
|
|
|
#include <microhttpd.h>
|
2018-01-21 15:39:48 +01:00
|
|
|
#include <gnunet/gnunet_curl_lib.h>
|
|
|
|
#include "taler_signatures.h"
|
2022-02-16 22:01:05 +01:00
|
|
|
#include "taler_extensions.h"
|
2018-01-21 16:27:58 +01:00
|
|
|
#include "taler_testing_lib.h"
|
2018-09-26 23:24:24 +02:00
|
|
|
#include "backoff.h"
|
2018-01-21 15:39:48 +01:00
|
|
|
|
|
|
|
|
2020-03-19 19:33:20 +01:00
|
|
|
/**
|
|
|
|
* How often do we retry before giving up?
|
|
|
|
*/
|
|
|
|
#define NUM_RETRIES 15
|
|
|
|
|
|
|
|
/**
|
|
|
|
* How long do we wait AT LEAST if the exchange says the reserve is unknown?
|
|
|
|
*/
|
|
|
|
#define UNKNOWN_MIN_BACKOFF GNUNET_TIME_relative_multiply ( \
|
2020-03-20 02:36:50 +01:00
|
|
|
GNUNET_TIME_UNIT_MILLISECONDS, 10)
|
|
|
|
|
|
|
|
/**
|
|
|
|
* How long do we wait AT MOST if the exchange says the reserve is unknown?
|
|
|
|
*/
|
|
|
|
#define UNKNOWN_MAX_BACKOFF GNUNET_TIME_relative_multiply ( \
|
2020-03-19 19:33:20 +01:00
|
|
|
GNUNET_TIME_UNIT_MILLISECONDS, 100)
|
|
|
|
|
2018-05-26 10:24:33 +02:00
|
|
|
/**
|
|
|
|
* State for a "withdraw" CMD.
|
|
|
|
*/
|
2018-01-21 15:39:48 +01:00
|
|
|
struct WithdrawState
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Which reserve should we withdraw from?
|
|
|
|
*/
|
|
|
|
const char *reserve_reference;
|
|
|
|
|
2020-07-10 23:09:46 +02:00
|
|
|
/**
|
|
|
|
* Reference to a withdraw or reveal operation from which we should
|
|
|
|
* re-use the private coin key, or NULL for regular withdrawal.
|
|
|
|
*/
|
|
|
|
const char *reuse_coin_key_ref;
|
|
|
|
|
2018-01-21 15:39:48 +01:00
|
|
|
/**
|
|
|
|
* String describing the denomination value we should withdraw.
|
|
|
|
* A corresponding denomination key must exist in the exchange's
|
|
|
|
* offerings. Can be NULL if @e pk is set instead.
|
|
|
|
*/
|
|
|
|
struct TALER_Amount amount;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* If @e amount is NULL, this specifies the denomination key to
|
|
|
|
* use. Otherwise, this will be set (by the interpreter) to the
|
|
|
|
* denomination PK matching @e amount.
|
|
|
|
*/
|
2020-01-17 20:50:09 +01:00
|
|
|
struct TALER_EXCHANGE_DenomPublicKey *pk;
|
2018-01-21 15:39:48 +01:00
|
|
|
|
2018-01-21 16:27:58 +01:00
|
|
|
/**
|
2018-12-18 17:35:23 +01:00
|
|
|
* Exchange base URL. Only used as offered trait.
|
2018-03-21 14:24:57 +01:00
|
|
|
*/
|
|
|
|
char *exchange_url;
|
|
|
|
|
2021-11-07 19:35:29 +01:00
|
|
|
/**
|
|
|
|
* URI if the reserve we are withdrawing from.
|
|
|
|
*/
|
|
|
|
char *reserve_payto_uri;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Private key of the reserve we are withdrawing from.
|
|
|
|
*/
|
|
|
|
struct TALER_ReservePrivateKeyP reserve_priv;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Public key of the reserve we are withdrawing from.
|
|
|
|
*/
|
|
|
|
struct TALER_ReservePublicKeyP reserve_pub;
|
|
|
|
|
2022-02-07 10:55:07 +01:00
|
|
|
/**
|
|
|
|
* Private key of the coin.
|
|
|
|
*/
|
|
|
|
struct TALER_CoinSpendPrivateKeyP coin_priv;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Blinding key used during the operation.
|
|
|
|
*/
|
|
|
|
union TALER_DenominationBlindingKeyP bks;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Values contributed from the exchange during the
|
|
|
|
* withdraw protocol.
|
|
|
|
*/
|
|
|
|
struct TALER_ExchangeWithdrawValues exchange_vals;
|
|
|
|
|
2018-01-21 16:27:58 +01:00
|
|
|
/**
|
|
|
|
* Interpreter state (during command).
|
|
|
|
*/
|
|
|
|
struct TALER_TESTING_Interpreter *is;
|
|
|
|
|
2018-01-21 15:39:48 +01:00
|
|
|
/**
|
|
|
|
* Set (by the interpreter) to the exchange's signature over the
|
|
|
|
* coin's public key.
|
|
|
|
*/
|
|
|
|
struct TALER_DenominationSignature sig;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Private key material of the coin, set by the interpreter.
|
|
|
|
*/
|
2022-02-11 09:36:01 +01:00
|
|
|
struct TALER_PlanchetMasterSecretP ps;
|
2018-01-21 15:39:48 +01:00
|
|
|
|
2022-02-16 22:01:05 +01:00
|
|
|
/**
|
|
|
|
* An age > 0 signifies age restriction is required
|
|
|
|
*/
|
|
|
|
uint8_t age;
|
|
|
|
|
|
|
|
/**
|
2022-03-01 17:02:37 +01:00
|
|
|
* If age > 0, put here the corresponding age commitment with its proof and
|
|
|
|
* its hash, respectivelly, NULL otherwise.
|
2022-02-16 22:01:05 +01:00
|
|
|
*/
|
2022-03-01 17:02:37 +01:00
|
|
|
struct TALER_AgeCommitmentProof *age_commitment_proof;
|
2022-02-16 22:01:05 +01:00
|
|
|
struct TALER_AgeCommitmentHash *h_age_commitment;
|
|
|
|
|
2020-03-28 20:45:53 +01:00
|
|
|
/**
|
|
|
|
* Reserve history entry that corresponds to this operation.
|
|
|
|
* Will be of type #TALER_EXCHANGE_RTT_WITHDRAWAL.
|
|
|
|
*/
|
2022-03-20 13:20:45 +01:00
|
|
|
struct TALER_EXCHANGE_ReserveHistoryEntry reserve_history;
|
2020-03-28 20:45:53 +01:00
|
|
|
|
2018-01-21 15:39:48 +01:00
|
|
|
/**
|
|
|
|
* Withdraw handle (while operation is running).
|
|
|
|
*/
|
2020-02-27 23:46:53 +01:00
|
|
|
struct TALER_EXCHANGE_WithdrawHandle *wsh;
|
2018-01-21 15:39:48 +01:00
|
|
|
|
2018-08-10 12:39:47 +02:00
|
|
|
/**
|
|
|
|
* Task scheduled to try later.
|
|
|
|
*/
|
|
|
|
struct GNUNET_SCHEDULER_Task *retry_task;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* How long do we wait until we retry?
|
|
|
|
*/
|
|
|
|
struct GNUNET_TIME_Relative backoff;
|
2018-08-11 02:48:15 +02:00
|
|
|
|
2020-03-20 02:36:50 +01:00
|
|
|
/**
|
|
|
|
* Total withdraw backoff applied.
|
|
|
|
*/
|
|
|
|
struct GNUNET_TIME_Relative total_backoff;
|
|
|
|
|
2021-11-07 14:12:54 +01:00
|
|
|
/**
|
|
|
|
* Set to the KYC UUID *if* the exchange replied with
|
|
|
|
* a request for KYC.
|
|
|
|
*/
|
|
|
|
uint64_t kyc_uuid;
|
|
|
|
|
2018-01-21 16:27:58 +01:00
|
|
|
/**
|
|
|
|
* Expected HTTP response code to the request.
|
|
|
|
*/
|
|
|
|
unsigned int expected_response_code;
|
|
|
|
|
2018-08-10 12:39:47 +02:00
|
|
|
/**
|
2018-08-11 02:48:15 +02:00
|
|
|
* Was this command modified via
|
|
|
|
* #TALER_TESTING_cmd_withdraw_with_retry to
|
2020-03-19 19:33:20 +01:00
|
|
|
* enable retries? How often should we still retry?
|
2018-08-10 12:39:47 +02:00
|
|
|
*/
|
2020-03-19 19:33:20 +01:00
|
|
|
unsigned int do_retry;
|
2018-01-21 15:39:48 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2018-08-10 12:39:47 +02:00
|
|
|
/**
|
|
|
|
* Run the command.
|
|
|
|
*
|
|
|
|
* @param cls closure.
|
|
|
|
* @param cmd the commaind being run.
|
|
|
|
* @param is interpreter state.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
withdraw_run (void *cls,
|
|
|
|
const struct TALER_TESTING_Command *cmd,
|
|
|
|
struct TALER_TESTING_Interpreter *is);
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Task scheduled to re-try #withdraw_run.
|
|
|
|
*
|
|
|
|
* @param cls a `struct WithdrawState`
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
do_retry (void *cls)
|
|
|
|
{
|
|
|
|
struct WithdrawState *ws = cls;
|
|
|
|
|
|
|
|
ws->retry_task = NULL;
|
2020-03-20 18:38:57 +01:00
|
|
|
ws->is->commands[ws->is->ip].last_req_time
|
|
|
|
= GNUNET_TIME_absolute_get ();
|
2018-08-10 12:39:47 +02:00
|
|
|
withdraw_run (ws,
|
2019-08-25 16:18:24 +02:00
|
|
|
NULL,
|
|
|
|
ws->is);
|
2018-08-10 12:39:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-01-21 16:27:58 +01:00
|
|
|
/**
|
2018-05-26 10:24:33 +02:00
|
|
|
* "reserve withdraw" operation callback; checks that the
|
|
|
|
* response code is expected and store the exchange signature
|
|
|
|
* in the state.
|
2018-01-21 16:27:58 +01:00
|
|
|
*
|
2018-05-26 10:24:33 +02:00
|
|
|
* @param cls closure.
|
2021-10-13 18:52:59 +02:00
|
|
|
* @param wr withdraw response details
|
2018-01-21 16:27:58 +01:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
reserve_withdraw_cb (void *cls,
|
2021-10-13 18:52:59 +02:00
|
|
|
const struct TALER_EXCHANGE_WithdrawResponse *wr)
|
2018-01-21 16:27:58 +01:00
|
|
|
{
|
|
|
|
struct WithdrawState *ws = cls;
|
|
|
|
struct TALER_TESTING_Interpreter *is = ws->is;
|
|
|
|
|
|
|
|
ws->wsh = NULL;
|
2021-10-13 18:52:59 +02:00
|
|
|
if (ws->expected_response_code != wr->hr.http_status)
|
2018-01-21 16:27:58 +01:00
|
|
|
{
|
2020-03-19 19:33:20 +01:00
|
|
|
if (0 != ws->do_retry)
|
2018-08-10 12:39:47 +02:00
|
|
|
{
|
2022-06-04 15:19:57 +02:00
|
|
|
if (TALER_EC_EXCHANGE_GENERIC_RESERVE_UNKNOWN != wr->hr.ec)
|
2020-03-19 19:33:20 +01:00
|
|
|
ws->do_retry--; /* we don't count reserve unknown as failures here */
|
2021-10-13 18:52:59 +02:00
|
|
|
if ( (0 == wr->hr.http_status) ||
|
|
|
|
(TALER_EC_GENERIC_DB_SOFT_FAILURE == wr->hr.ec) ||
|
|
|
|
(TALER_EC_EXCHANGE_WITHDRAW_INSUFFICIENT_FUNDS == wr->hr.ec) ||
|
2022-06-04 15:19:57 +02:00
|
|
|
(TALER_EC_EXCHANGE_GENERIC_RESERVE_UNKNOWN == wr->hr.ec) ||
|
2021-10-13 18:52:59 +02:00
|
|
|
(MHD_HTTP_INTERNAL_SERVER_ERROR == wr->hr.http_status) )
|
2018-08-10 12:39:47 +02:00
|
|
|
{
|
2018-08-11 11:29:02 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Retrying withdraw failed with %u/%d\n",
|
2021-10-13 18:52:59 +02:00
|
|
|
wr->hr.http_status,
|
|
|
|
(int) wr->hr.ec);
|
2019-08-25 16:18:24 +02:00
|
|
|
/* on DB conflicts, do not use backoff */
|
2021-10-13 18:52:59 +02:00
|
|
|
if (TALER_EC_GENERIC_DB_SOFT_FAILURE == wr->hr.ec)
|
2019-08-25 16:18:24 +02:00
|
|
|
ws->backoff = GNUNET_TIME_UNIT_ZERO;
|
2022-06-04 15:19:57 +02:00
|
|
|
else if (TALER_EC_EXCHANGE_GENERIC_RESERVE_UNKNOWN != wr->hr.ec)
|
2019-08-25 16:18:24 +02:00
|
|
|
ws->backoff = EXCHANGE_LIB_BACKOFF (ws->backoff);
|
2020-03-19 19:33:20 +01:00
|
|
|
else
|
|
|
|
ws->backoff = GNUNET_TIME_relative_max (UNKNOWN_MIN_BACKOFF,
|
|
|
|
ws->backoff);
|
2020-03-20 02:36:50 +01:00
|
|
|
ws->backoff = GNUNET_TIME_relative_min (ws->backoff,
|
|
|
|
UNKNOWN_MAX_BACKOFF);
|
|
|
|
ws->total_backoff = GNUNET_TIME_relative_add (ws->total_backoff,
|
|
|
|
ws->backoff);
|
2020-03-20 18:38:57 +01:00
|
|
|
ws->is->commands[ws->is->ip].num_tries++;
|
2019-08-25 16:18:24 +02:00
|
|
|
ws->retry_task = GNUNET_SCHEDULER_add_delayed (ws->backoff,
|
|
|
|
&do_retry,
|
|
|
|
ws);
|
|
|
|
return;
|
2018-08-10 12:39:47 +02:00
|
|
|
}
|
|
|
|
}
|
2018-01-21 16:27:58 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
2018-08-09 21:12:12 +02:00
|
|
|
"Unexpected response code %u/%d to command %s in %s:%u\n",
|
2021-10-13 18:52:59 +02:00
|
|
|
wr->hr.http_status,
|
|
|
|
(int) wr->hr.ec,
|
2018-08-09 21:10:56 +02:00
|
|
|
TALER_TESTING_interpreter_get_current_label (is),
|
|
|
|
__FILE__,
|
|
|
|
__LINE__);
|
2021-10-13 18:52:59 +02:00
|
|
|
json_dumpf (wr->hr.reply,
|
2018-01-21 16:27:58 +01:00
|
|
|
stderr,
|
|
|
|
0);
|
|
|
|
GNUNET_break (0);
|
|
|
|
TALER_TESTING_interpreter_fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2021-10-13 18:52:59 +02:00
|
|
|
switch (wr->hr.http_status)
|
2018-01-21 16:27:58 +01:00
|
|
|
{
|
|
|
|
case MHD_HTTP_OK:
|
2021-10-27 22:28:52 +02:00
|
|
|
TALER_denom_sig_deep_copy (&ws->sig,
|
|
|
|
&wr->details.success.sig);
|
2022-02-07 10:55:07 +01:00
|
|
|
ws->coin_priv = wr->details.success.coin_priv;
|
|
|
|
ws->bks = wr->details.success.bks;
|
|
|
|
ws->exchange_vals = wr->details.success.exchange_vals;
|
2020-03-20 02:36:50 +01:00
|
|
|
if (0 != ws->total_backoff.rel_value_us)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
|
|
|
|
"Total withdraw backoff for %s was %s\n",
|
|
|
|
is->commands[is->ip].label,
|
|
|
|
GNUNET_STRINGS_relative_time_to_string (ws->total_backoff,
|
|
|
|
GNUNET_YES));
|
|
|
|
}
|
2018-01-21 16:27:58 +01:00
|
|
|
break;
|
2021-10-13 18:52:59 +02:00
|
|
|
case MHD_HTTP_ACCEPTED:
|
|
|
|
/* nothing to check */
|
2021-11-07 14:12:54 +01:00
|
|
|
ws->kyc_uuid = wr->details.accepted.payment_target_uuid;
|
2021-10-13 18:52:59 +02:00
|
|
|
break;
|
2018-01-21 16:27:58 +01:00
|
|
|
case MHD_HTTP_FORBIDDEN:
|
|
|
|
/* nothing to check */
|
|
|
|
break;
|
2021-10-13 18:52:59 +02:00
|
|
|
case MHD_HTTP_NOT_FOUND:
|
|
|
|
/* nothing to check */
|
|
|
|
break;
|
2019-12-24 23:09:06 +01:00
|
|
|
case MHD_HTTP_CONFLICT:
|
|
|
|
/* nothing to check */
|
|
|
|
break;
|
2020-12-20 20:03:59 +01:00
|
|
|
case MHD_HTTP_GONE:
|
|
|
|
/* theoretically could check that the key was actually */
|
|
|
|
break;
|
2022-08-11 23:35:33 +02:00
|
|
|
case MHD_HTTP_UNAVAILABLE_FOR_LEGAL_REASONS:
|
|
|
|
/* KYC required */
|
|
|
|
break;
|
2018-01-21 16:27:58 +01:00
|
|
|
default:
|
|
|
|
/* Unsupported status code (by test harness) */
|
2019-12-24 23:09:06 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Withdraw test command does not support status code %u\n",
|
2021-10-13 18:52:59 +02:00
|
|
|
wr->hr.http_status);
|
2018-01-21 16:27:58 +01:00
|
|
|
GNUNET_break (0);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
TALER_TESTING_interpreter_next (is);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2018-05-26 10:24:33 +02:00
|
|
|
* Run the command.
|
2018-01-21 16:27:58 +01:00
|
|
|
*/
|
2018-01-21 15:39:48 +01:00
|
|
|
static void
|
|
|
|
withdraw_run (void *cls,
|
2018-01-21 16:27:58 +01:00
|
|
|
const struct TALER_TESTING_Command *cmd,
|
|
|
|
struct TALER_TESTING_Interpreter *is)
|
2018-01-21 15:39:48 +01:00
|
|
|
{
|
|
|
|
struct WithdrawState *ws = cls;
|
2018-11-17 17:19:02 +01:00
|
|
|
const struct TALER_ReservePrivateKeyP *rp;
|
2018-01-21 16:27:58 +01:00
|
|
|
const struct TALER_TESTING_Command *create_reserve;
|
2020-01-17 20:50:09 +01:00
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey *dpk;
|
2018-01-21 15:39:48 +01:00
|
|
|
|
2018-08-10 12:39:47 +02:00
|
|
|
(void) cmd;
|
2021-11-08 08:54:12 +01:00
|
|
|
ws->is = is;
|
2020-03-28 20:45:53 +01:00
|
|
|
create_reserve
|
|
|
|
= TALER_TESTING_interpreter_lookup_command (
|
|
|
|
is,
|
|
|
|
ws->reserve_reference);
|
2022-02-16 22:01:05 +01:00
|
|
|
|
2018-01-21 15:39:48 +01:00
|
|
|
if (NULL == create_reserve)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2018-01-21 16:27:58 +01:00
|
|
|
TALER_TESTING_interpreter_fail (is);
|
2018-01-21 15:39:48 +01:00
|
|
|
return;
|
|
|
|
}
|
2022-02-16 22:01:05 +01:00
|
|
|
|
2018-01-21 15:39:48 +01:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_TESTING_get_trait_reserve_priv (create_reserve,
|
|
|
|
&rp))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2018-01-21 16:27:58 +01:00
|
|
|
TALER_TESTING_interpreter_fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2022-02-16 22:01:05 +01:00
|
|
|
|
2021-11-07 19:35:29 +01:00
|
|
|
if (NULL == ws->exchange_url)
|
|
|
|
ws->exchange_url
|
2021-11-08 08:54:12 +01:00
|
|
|
= GNUNET_strdup (TALER_EXCHANGE_get_base_url (is->exchange));
|
2021-11-07 19:35:29 +01:00
|
|
|
ws->reserve_priv = *rp;
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&ws->reserve_priv.eddsa_priv,
|
|
|
|
&ws->reserve_pub.eddsa_pub);
|
|
|
|
ws->reserve_payto_uri
|
2022-08-11 23:35:33 +02:00
|
|
|
= TALER_reserve_make_payto (ws->exchange_url,
|
2021-11-07 19:35:29 +01:00
|
|
|
&ws->reserve_pub);
|
2022-02-16 22:01:05 +01:00
|
|
|
|
2020-07-10 23:09:46 +02:00
|
|
|
if (NULL == ws->reuse_coin_key_ref)
|
|
|
|
{
|
2022-02-11 09:36:01 +01:00
|
|
|
TALER_planchet_master_setup_random (&ws->ps);
|
2020-07-10 23:09:46 +02:00
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
2022-02-11 09:36:01 +01:00
|
|
|
const struct TALER_PlanchetMasterSecretP *ps;
|
2020-07-10 23:09:46 +02:00
|
|
|
const struct TALER_TESTING_Command *cref;
|
|
|
|
char *cstr;
|
|
|
|
unsigned int index;
|
|
|
|
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2022-04-06 13:54:08 +02:00
|
|
|
TALER_TESTING_parse_coin_reference (
|
|
|
|
ws->reuse_coin_key_ref,
|
|
|
|
&cstr,
|
|
|
|
&index));
|
2020-07-10 23:09:46 +02:00
|
|
|
cref = TALER_TESTING_interpreter_lookup_command (is,
|
|
|
|
cstr);
|
|
|
|
GNUNET_assert (NULL != cref);
|
|
|
|
GNUNET_free (cstr);
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2022-02-07 10:55:07 +01:00
|
|
|
TALER_TESTING_get_trait_planchet_secret (cref,
|
|
|
|
&ps));
|
|
|
|
ws->ps = *ps;
|
2020-07-10 23:09:46 +02:00
|
|
|
}
|
2022-02-16 22:01:05 +01:00
|
|
|
|
2020-01-19 22:23:57 +01:00
|
|
|
if (NULL == ws->pk)
|
2020-01-17 20:50:09 +01:00
|
|
|
{
|
2020-01-19 22:23:57 +01:00
|
|
|
dpk = TALER_TESTING_find_pk (TALER_EXCHANGE_get_keys (is->exchange),
|
2022-02-16 22:01:05 +01:00
|
|
|
&ws->amount,
|
|
|
|
ws->age > 0);
|
2020-01-19 22:23:57 +01:00
|
|
|
if (NULL == dpk)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Failed to determine denomination key at %s\n",
|
|
|
|
(NULL != cmd) ? cmd->label : "<retried command>");
|
|
|
|
GNUNET_break (0);
|
|
|
|
TALER_TESTING_interpreter_fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2020-01-17 20:50:09 +01:00
|
|
|
/* We copy the denomination key, as re-querying /keys
|
|
|
|
* would free the old one. */
|
|
|
|
ws->pk = TALER_EXCHANGE_copy_denomination_key (dpk);
|
|
|
|
}
|
2020-03-28 20:45:53 +01:00
|
|
|
else
|
|
|
|
{
|
|
|
|
ws->amount = ws->pk->value;
|
|
|
|
}
|
2022-02-16 22:01:05 +01:00
|
|
|
|
2020-03-28 20:45:53 +01:00
|
|
|
ws->reserve_history.type = TALER_EXCHANGE_RTT_WITHDRAWAL;
|
2020-04-08 23:52:01 +02:00
|
|
|
GNUNET_assert (0 <=
|
2020-03-28 20:45:53 +01:00
|
|
|
TALER_amount_add (&ws->reserve_history.amount,
|
|
|
|
&ws->amount,
|
2022-02-17 15:10:14 +01:00
|
|
|
&ws->pk->fees.withdraw));
|
|
|
|
ws->reserve_history.details.withdraw.fee = ws->pk->fees.withdraw;
|
2022-05-23 21:12:31 +02:00
|
|
|
{
|
|
|
|
struct TALER_EXCHANGE_WithdrawCoinInput wci = {
|
|
|
|
.pk = ws->pk,
|
|
|
|
.ps = &ws->ps,
|
|
|
|
.ach = ws->h_age_commitment
|
|
|
|
};
|
|
|
|
ws->wsh = TALER_EXCHANGE_withdraw (is->exchange,
|
|
|
|
rp,
|
|
|
|
&wci,
|
|
|
|
&reserve_withdraw_cb,
|
|
|
|
ws);
|
|
|
|
}
|
2018-01-21 16:27:58 +01:00
|
|
|
if (NULL == ws->wsh)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
TALER_TESTING_interpreter_fail (is);
|
2018-01-21 15:39:48 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2018-05-26 10:24:33 +02:00
|
|
|
* Free the state of a "withdraw" CMD, and possibly cancel
|
|
|
|
* a pending operation thereof.
|
2018-01-21 15:39:48 +01:00
|
|
|
*
|
2018-05-26 10:24:33 +02:00
|
|
|
* @param cls closure.
|
|
|
|
* @param cmd the command being freed.
|
2018-01-21 15:39:48 +01:00
|
|
|
*/
|
|
|
|
static void
|
2018-01-21 16:27:58 +01:00
|
|
|
withdraw_cleanup (void *cls,
|
|
|
|
const struct TALER_TESTING_Command *cmd)
|
2018-01-21 15:39:48 +01:00
|
|
|
{
|
|
|
|
struct WithdrawState *ws = cls;
|
|
|
|
|
2018-01-21 16:27:58 +01:00
|
|
|
if (NULL != ws->wsh)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command %s did not complete\n",
|
|
|
|
cmd->label);
|
2020-02-27 23:46:53 +01:00
|
|
|
TALER_EXCHANGE_withdraw_cancel (ws->wsh);
|
2018-01-21 16:27:58 +01:00
|
|
|
ws->wsh = NULL;
|
|
|
|
}
|
2018-08-10 12:39:47 +02:00
|
|
|
if (NULL != ws->retry_task)
|
|
|
|
{
|
|
|
|
GNUNET_SCHEDULER_cancel (ws->retry_task);
|
|
|
|
ws->retry_task = NULL;
|
|
|
|
}
|
2021-10-27 22:28:52 +02:00
|
|
|
TALER_denom_sig_free (&ws->sig);
|
2020-01-17 20:50:09 +01:00
|
|
|
if (NULL != ws->pk)
|
|
|
|
{
|
|
|
|
TALER_EXCHANGE_destroy_denomination_key (ws->pk);
|
|
|
|
ws->pk = NULL;
|
|
|
|
}
|
2022-03-01 17:02:37 +01:00
|
|
|
if (NULL != ws->age_commitment_proof)
|
2022-02-16 22:01:05 +01:00
|
|
|
{
|
2022-03-01 17:02:37 +01:00
|
|
|
TALER_age_commitment_proof_free (ws->age_commitment_proof);
|
|
|
|
ws->age_commitment_proof = NULL;
|
2022-02-16 22:01:05 +01:00
|
|
|
}
|
|
|
|
if (NULL != ws->h_age_commitment)
|
|
|
|
{
|
|
|
|
GNUNET_free (ws->h_age_commitment);
|
|
|
|
ws->h_age_commitment = NULL;
|
|
|
|
}
|
2020-07-05 16:56:41 +02:00
|
|
|
GNUNET_free (ws->exchange_url);
|
2021-11-07 19:35:29 +01:00
|
|
|
GNUNET_free (ws->reserve_payto_uri);
|
2018-01-21 16:27:58 +01:00
|
|
|
GNUNET_free (ws);
|
2018-01-21 15:39:48 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2018-05-26 10:24:33 +02:00
|
|
|
* Offer internal data to a "withdraw" CMD state to other
|
2018-01-21 15:39:48 +01:00
|
|
|
* commands.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
2020-01-18 13:57:47 +01:00
|
|
|
* @param[out] ret result (could be anything)
|
2018-01-21 15:39:48 +01:00
|
|
|
* @param trait name of the trait
|
2018-05-29 12:43:34 +02:00
|
|
|
* @param index index number of the object to offer.
|
2018-01-21 15:39:48 +01:00
|
|
|
* @return #GNUNET_OK on success
|
|
|
|
*/
|
2021-10-27 22:28:52 +02:00
|
|
|
static enum GNUNET_GenericReturnValue
|
2018-01-21 15:39:48 +01:00
|
|
|
withdraw_traits (void *cls,
|
2018-11-17 17:19:02 +01:00
|
|
|
const void **ret,
|
2018-01-21 15:39:48 +01:00
|
|
|
const char *trait,
|
2018-01-23 10:28:24 +01:00
|
|
|
unsigned int index)
|
2018-01-21 15:39:48 +01:00
|
|
|
{
|
|
|
|
struct WithdrawState *ws = cls;
|
2021-11-07 19:35:29 +01:00
|
|
|
struct TALER_TESTING_Trait traits[] = {
|
|
|
|
/* history entry MUST be first due to response code logic below! */
|
2022-05-30 16:31:24 +02:00
|
|
|
TALER_TESTING_make_trait_reserve_history (0,
|
|
|
|
&ws->reserve_history),
|
2021-11-07 19:35:29 +01:00
|
|
|
TALER_TESTING_make_trait_coin_priv (0 /* only one coin */,
|
2022-02-07 10:55:07 +01:00
|
|
|
&ws->coin_priv),
|
|
|
|
TALER_TESTING_make_trait_planchet_secret (&ws->ps),
|
2021-11-07 19:35:29 +01:00
|
|
|
TALER_TESTING_make_trait_blinding_key (0 /* only one coin */,
|
2022-02-07 10:55:07 +01:00
|
|
|
&ws->bks),
|
|
|
|
TALER_TESTING_make_trait_exchange_wd_value (0 /* only one coin */,
|
|
|
|
&ws->exchange_vals),
|
2021-11-07 19:35:29 +01:00
|
|
|
TALER_TESTING_make_trait_denom_pub (0 /* only one coin */,
|
|
|
|
ws->pk),
|
2022-02-22 14:27:15 +01:00
|
|
|
TALER_TESTING_make_trait_denom_sig (0 /* only one coin */,
|
2021-11-07 19:35:29 +01:00
|
|
|
&ws->sig),
|
|
|
|
TALER_TESTING_make_trait_reserve_priv (&ws->reserve_priv),
|
|
|
|
TALER_TESTING_make_trait_reserve_pub (&ws->reserve_pub),
|
|
|
|
TALER_TESTING_make_trait_amount (&ws->amount),
|
|
|
|
TALER_TESTING_make_trait_payment_target_uuid (&ws->kyc_uuid),
|
|
|
|
TALER_TESTING_make_trait_payto_uri (
|
|
|
|
(const char **) &ws->reserve_payto_uri),
|
|
|
|
TALER_TESTING_make_trait_exchange_url (
|
|
|
|
(const char **) &ws->exchange_url),
|
2022-03-01 17:02:37 +01:00
|
|
|
TALER_TESTING_make_trait_age_commitment_proof (0, ws->age_commitment_proof),
|
2022-02-22 14:27:15 +01:00
|
|
|
TALER_TESTING_make_trait_h_age_commitment (0, ws->h_age_commitment),
|
2021-11-07 19:35:29 +01:00
|
|
|
TALER_TESTING_trait_end ()
|
|
|
|
};
|
|
|
|
|
|
|
|
return TALER_TESTING_get_trait ((ws->expected_response_code == MHD_HTTP_OK)
|
2021-11-22 15:19:59 +01:00
|
|
|
? &traits[0] /* we have reserve history */
|
|
|
|
: &traits[1], /* skip reserve history */
|
2021-11-07 19:35:29 +01:00
|
|
|
ret,
|
|
|
|
trait,
|
|
|
|
index);
|
2018-01-21 15:39:48 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
struct TALER_TESTING_Command
|
2020-01-18 16:41:24 +01:00
|
|
|
TALER_TESTING_cmd_withdraw_amount (const char *label,
|
|
|
|
const char *reserve_reference,
|
|
|
|
const char *amount,
|
2022-02-16 22:01:05 +01:00
|
|
|
const uint8_t age,
|
2020-01-18 16:41:24 +01:00
|
|
|
unsigned int expected_response_code)
|
2022-01-06 15:55:50 +01:00
|
|
|
{
|
|
|
|
struct WithdrawState *ws;
|
|
|
|
|
|
|
|
ws = GNUNET_new (struct WithdrawState);
|
2022-02-16 22:01:05 +01:00
|
|
|
|
|
|
|
ws->age = age;
|
|
|
|
if (0 < age)
|
|
|
|
{
|
2022-03-01 17:02:37 +01:00
|
|
|
struct TALER_AgeCommitmentProof *acp;
|
2022-02-16 22:01:05 +01:00
|
|
|
struct TALER_AgeCommitmentHash *hac;
|
2022-04-21 14:27:29 +02:00
|
|
|
struct GNUNET_HashCode seed;
|
2022-02-16 22:01:05 +01:00
|
|
|
struct TALER_AgeMask mask;
|
|
|
|
|
2022-03-01 17:02:37 +01:00
|
|
|
acp = GNUNET_new (struct TALER_AgeCommitmentProof);
|
2022-02-16 22:01:05 +01:00
|
|
|
hac = GNUNET_new (struct TALER_AgeCommitmentHash);
|
|
|
|
mask = TALER_extensions_age_restriction_ageMask ();
|
2022-04-21 14:27:29 +02:00
|
|
|
GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
|
|
|
|
&seed,
|
|
|
|
sizeof(seed));
|
2022-02-16 22:01:05 +01:00
|
|
|
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_age_restriction_commit (
|
|
|
|
&mask,
|
|
|
|
age,
|
2022-04-21 14:27:29 +02:00
|
|
|
&seed,
|
2022-03-01 17:02:37 +01:00
|
|
|
acp))
|
2022-02-16 22:01:05 +01:00
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Failed to generate age commitment for age %d at %s\n",
|
|
|
|
age,
|
|
|
|
label);
|
|
|
|
GNUNET_assert (0);
|
|
|
|
}
|
|
|
|
|
2022-03-01 17:02:37 +01:00
|
|
|
TALER_age_commitment_hash (&acp->commitment,hac);
|
|
|
|
ws->age_commitment_proof = acp;
|
2022-02-16 22:01:05 +01:00
|
|
|
ws->h_age_commitment = hac;
|
|
|
|
}
|
|
|
|
|
2022-01-06 15:55:50 +01:00
|
|
|
ws->reserve_reference = reserve_reference;
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_string_to_amount (amount,
|
|
|
|
&ws->amount))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Failed to parse amount `%s' at %s\n",
|
|
|
|
amount,
|
|
|
|
label);
|
|
|
|
GNUNET_assert (0);
|
|
|
|
}
|
|
|
|
ws->expected_response_code = expected_response_code;
|
2020-01-18 16:41:24 +01:00
|
|
|
{
|
|
|
|
struct TALER_TESTING_Command cmd = {
|
|
|
|
.cls = ws,
|
|
|
|
.label = label,
|
|
|
|
.run = &withdraw_run,
|
|
|
|
.cleanup = &withdraw_cleanup,
|
|
|
|
.traits = &withdraw_traits
|
|
|
|
};
|
2018-03-21 15:48:12 +01:00
|
|
|
|
2020-01-18 16:41:24 +01:00
|
|
|
return cmd;
|
|
|
|
}
|
2018-01-21 16:27:58 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-07-10 23:09:46 +02:00
|
|
|
struct TALER_TESTING_Command
|
|
|
|
TALER_TESTING_cmd_withdraw_amount_reuse_key (
|
|
|
|
const char *label,
|
|
|
|
const char *reserve_reference,
|
|
|
|
const char *amount,
|
2022-02-16 22:01:05 +01:00
|
|
|
uint8_t age,
|
2020-07-10 23:09:46 +02:00
|
|
|
const char *coin_ref,
|
|
|
|
unsigned int expected_response_code)
|
|
|
|
{
|
|
|
|
struct TALER_TESTING_Command cmd;
|
|
|
|
|
|
|
|
cmd = TALER_TESTING_cmd_withdraw_amount (label,
|
|
|
|
reserve_reference,
|
|
|
|
amount,
|
2022-02-16 22:01:05 +01:00
|
|
|
age,
|
2020-07-10 23:09:46 +02:00
|
|
|
expected_response_code);
|
|
|
|
{
|
|
|
|
struct WithdrawState *ws = cmd.cls;
|
|
|
|
|
|
|
|
ws->reuse_coin_key_ref = coin_ref;
|
|
|
|
}
|
|
|
|
return cmd;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-01-21 16:27:58 +01:00
|
|
|
struct TALER_TESTING_Command
|
2020-03-27 17:28:33 +01:00
|
|
|
TALER_TESTING_cmd_withdraw_denomination (
|
|
|
|
const char *label,
|
|
|
|
const char *reserve_reference,
|
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey *dk,
|
|
|
|
unsigned int expected_response_code)
|
2018-01-21 16:27:58 +01:00
|
|
|
{
|
|
|
|
struct WithdrawState *ws;
|
|
|
|
|
|
|
|
if (NULL == dk)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Denomination key not specified at %s\n",
|
|
|
|
label);
|
|
|
|
GNUNET_assert (0);
|
|
|
|
}
|
|
|
|
ws = GNUNET_new (struct WithdrawState);
|
|
|
|
ws->reserve_reference = reserve_reference;
|
2020-01-17 20:50:09 +01:00
|
|
|
ws->pk = TALER_EXCHANGE_copy_denomination_key (dk);
|
2018-01-21 16:27:58 +01:00
|
|
|
ws->expected_response_code = expected_response_code;
|
2020-01-15 11:14:11 +01:00
|
|
|
{
|
|
|
|
struct TALER_TESTING_Command cmd = {
|
|
|
|
.cls = ws,
|
|
|
|
.label = label,
|
|
|
|
.run = &withdraw_run,
|
|
|
|
.cleanup = &withdraw_cleanup,
|
|
|
|
.traits = &withdraw_traits
|
|
|
|
};
|
|
|
|
|
|
|
|
return cmd;
|
|
|
|
}
|
2018-01-21 15:39:48 +01:00
|
|
|
}
|
|
|
|
|
2018-08-10 12:39:47 +02:00
|
|
|
|
|
|
|
struct TALER_TESTING_Command
|
|
|
|
TALER_TESTING_cmd_withdraw_with_retry (struct TALER_TESTING_Command cmd)
|
|
|
|
{
|
|
|
|
struct WithdrawState *ws;
|
2018-08-11 02:48:15 +02:00
|
|
|
|
2018-08-10 12:39:47 +02:00
|
|
|
GNUNET_assert (&withdraw_run == cmd.run);
|
|
|
|
ws = cmd.cls;
|
2020-03-19 19:33:20 +01:00
|
|
|
ws->do_retry = NUM_RETRIES;
|
2018-08-10 12:39:47 +02:00
|
|
|
return cmd;
|
|
|
|
}
|
2018-08-11 02:48:15 +02:00
|
|
|
|
2018-08-10 12:39:47 +02:00
|
|
|
|
2018-01-21 15:39:48 +01:00
|
|
|
/* end of testing_api_cmd_withdraw.c */
|