2015-01-28 15:03:47 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2020-01-19 19:21:58 +01:00
|
|
|
Copyright (C) 2014-2017 Taler Systems SA
|
2015-01-28 15:03:47 +01:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
2016-07-07 17:55:25 +02:00
|
|
|
TALER; see the file COPYING. If not, see <http://www.gnu.org/licenses/>
|
2015-01-28 15:03:47 +01:00
|
|
|
*/
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* @file include/taler_exchangedb_lib.h
|
|
|
|
* @brief IO operations for the exchange's private keys
|
2015-01-28 15:03:47 +01:00
|
|
|
* @author Florian Dold
|
|
|
|
* @author Benedikt Mueller
|
|
|
|
* @author Christian Grothoff
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
#ifndef TALER_EXCHANGEDB_LIB_H
|
|
|
|
#define TALER_EXCHANGEDB_LIB_H
|
2015-01-28 15:03:47 +01:00
|
|
|
|
|
|
|
#include "taler_signatures.h"
|
2020-01-16 22:40:12 +01:00
|
|
|
#include "taler_exchangedb_plugin.h"
|
2017-03-03 20:31:29 +01:00
|
|
|
|
2015-03-15 17:39:44 +01:00
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Subdirectroy under the exchange's base directory which contains
|
|
|
|
* the exchange's signing keys.
|
2015-03-15 17:39:44 +01:00
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
#define TALER_EXCHANGEDB_DIR_SIGNING_KEYS "signkeys"
|
2015-03-15 17:39:44 +01:00
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Subdirectory under the exchange's base directory which contains
|
|
|
|
* the exchange's denomination keys.
|
2015-03-15 17:39:44 +01:00
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
#define TALER_EXCHANGEDB_DIR_DENOMINATION_KEYS "denomkeys"
|
2015-01-28 15:03:47 +01:00
|
|
|
|
2015-03-15 17:39:44 +01:00
|
|
|
|
2015-01-28 15:03:47 +01:00
|
|
|
/**
|
2015-03-28 15:53:53 +01:00
|
|
|
* @brief Iterator over signing keys.
|
2015-01-28 15:03:47 +01:00
|
|
|
*
|
|
|
|
* @param cls closure
|
2015-03-15 16:52:19 +01:00
|
|
|
* @param filename name of the file the key came from
|
2015-03-15 18:03:57 +01:00
|
|
|
* @param ski the sign key
|
2015-01-28 15:03:47 +01:00
|
|
|
* @return #GNUNET_OK to continue to iterate,
|
|
|
|
* #GNUNET_NO to stop iteration with no error,
|
|
|
|
* #GNUNET_SYSERR to abort iteration with error!
|
|
|
|
*/
|
|
|
|
typedef int
|
2016-03-01 15:35:04 +01:00
|
|
|
(*TALER_EXCHANGEDB_SigningKeyIterator)(void *cls,
|
2016-03-21 01:45:53 +01:00
|
|
|
const char *filename,
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct
|
|
|
|
TALER_EXCHANGEDB_PrivateSigningKeyInformationP
|
|
|
|
*ski);
|
2015-01-28 15:03:47 +01:00
|
|
|
|
2015-03-15 16:52:19 +01:00
|
|
|
|
2015-01-28 15:03:47 +01:00
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Call @a it for each signing key found in the @a exchange_base_dir.
|
2015-03-15 17:39:44 +01:00
|
|
|
*
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param exchange_base_dir base directory for the exchange,
|
|
|
|
* the signing keys must be in the #TALER_EXCHANGEDB_DIR_SIGNING_KEYS
|
2015-03-15 18:03:57 +01:00
|
|
|
* subdirectory
|
|
|
|
* @param it function to call on each signing key
|
2015-03-15 17:39:44 +01:00
|
|
|
* @param it_cls closure for @a it
|
2015-03-15 18:03:57 +01:00
|
|
|
* @return number of files found (may not match
|
|
|
|
* number of keys given to @a it as malformed
|
|
|
|
* files are simply skipped), -1 on error
|
2015-01-28 15:03:47 +01:00
|
|
|
*/
|
|
|
|
int
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGEDB_signing_keys_iterate (const char *exchange_base_dir,
|
2016-03-21 01:45:53 +01:00
|
|
|
TALER_EXCHANGEDB_SigningKeyIterator it,
|
|
|
|
void *it_cls);
|
2015-01-28 15:03:47 +01:00
|
|
|
|
|
|
|
|
2016-05-06 18:33:02 +02:00
|
|
|
/**
|
|
|
|
* Exports a signing key to the given file.
|
|
|
|
*
|
|
|
|
* @param exchange_base_dir base directory for the keys
|
|
|
|
* @param start start time of the validity for the key
|
|
|
|
* @param ski the signing key
|
|
|
|
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_EXCHANGEDB_signing_key_write (const char *exchange_base_dir,
|
|
|
|
struct GNUNET_TIME_Absolute start,
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct
|
|
|
|
TALER_EXCHANGEDB_PrivateSigningKeyInformationP
|
|
|
|
*ski);
|
2016-05-06 18:33:02 +02:00
|
|
|
|
2015-09-17 14:13:41 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Iterator over denomination keys.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
* @param alias coin alias
|
2017-04-07 22:37:00 +02:00
|
|
|
* @param dki the denomination key
|
2015-09-17 14:13:41 +02:00
|
|
|
* @return #GNUNET_OK to continue to iterate,
|
|
|
|
* #GNUNET_NO to stop iteration with no error,
|
|
|
|
* #GNUNET_SYSERR to abort iteration with error!
|
|
|
|
*/
|
|
|
|
typedef int
|
2016-03-01 15:35:04 +01:00
|
|
|
(*TALER_EXCHANGEDB_DenominationKeyIterator)(void *cls,
|
2016-03-21 01:45:53 +01:00
|
|
|
const char *alias,
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct
|
|
|
|
TALER_EXCHANGEDB_DenominationKeyIssueInformation
|
|
|
|
*dki);
|
2019-02-23 14:47:44 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Iterator over revoked denomination keys.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
* @param denom_hash hash of the denomination public key
|
|
|
|
* @param revocation_master_sig signature showing @a denom_hash was revoked
|
|
|
|
* @return #GNUNET_OK to continue to iterate,
|
|
|
|
* #GNUNET_NO to stop iteration with no error,
|
|
|
|
* #GNUNET_SYSERR to abort iteration with error!
|
|
|
|
*/
|
|
|
|
typedef int
|
|
|
|
(*TALER_EXCHANGEDB_RevocationIterator)(void *cls,
|
2019-07-24 12:19:36 +02:00
|
|
|
const struct GNUNET_HashCode *denom_hash,
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct
|
|
|
|
TALER_MasterSignatureP *
|
|
|
|
revocation_master_sig);
|
2015-09-17 14:13:41 +02:00
|
|
|
|
|
|
|
|
2015-01-28 15:03:47 +01:00
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Call @a it for each denomination key found in the @a exchange_base_dir.
|
2015-03-15 17:39:44 +01:00
|
|
|
*
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param exchange_base_dir base directory for the exchange,
|
|
|
|
* the signing keys must be in the #TALER_EXCHANGEDB_DIR_DENOMINATION_KEYS
|
2015-03-15 18:03:57 +01:00
|
|
|
* subdirectory
|
|
|
|
* @param it function to call on each denomination key found
|
2015-03-15 17:39:44 +01:00
|
|
|
* @param it_cls closure for @a it
|
2015-03-15 18:03:57 +01:00
|
|
|
* @return -1 on error, 0 if no files were found, otherwise
|
|
|
|
* a positive number (however, even with a positive
|
|
|
|
* number it is possible that @a it was never called
|
|
|
|
* as maybe none of the files were well-formed)
|
2015-01-28 15:03:47 +01:00
|
|
|
*/
|
|
|
|
int
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGEDB_denomination_keys_iterate (const char *exchange_base_dir,
|
2019-08-25 16:18:24 +02:00
|
|
|
TALER_EXCHANGEDB_DenominationKeyIterator
|
|
|
|
it,
|
2016-03-21 01:45:53 +01:00
|
|
|
void *it_cls);
|
2015-01-28 15:03:47 +01:00
|
|
|
|
|
|
|
|
2019-02-23 14:47:44 +01:00
|
|
|
/**
|
|
|
|
* Call @a it for each revoked denomination key found in the @a revocation_dir.
|
|
|
|
*
|
|
|
|
* @param revocation_dir base directory where revocations are stored
|
|
|
|
* @param master_pub master public key (used to check revocations)
|
|
|
|
* @param it function to call on each revoked denomination key found
|
|
|
|
* @param it_cls closure for @a it
|
|
|
|
* @return -1 on error, 0 if no files were found, otherwise
|
|
|
|
* a positive number (however, even with a positive
|
|
|
|
* number it is possible that @a it was never called
|
|
|
|
* as maybe none of the files were well-formed)
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_EXCHANGEDB_revocations_iterate (const char *revocation_dir,
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct
|
|
|
|
TALER_MasterPublicKeyP *master_pub,
|
|
|
|
TALER_EXCHANGEDB_RevocationIterator it,
|
|
|
|
void *it_cls);
|
2019-02-23 14:47:44 +01:00
|
|
|
|
|
|
|
|
2017-04-07 22:37:00 +02:00
|
|
|
/**
|
|
|
|
* Mark the given denomination key as revoked and request the wallets
|
2020-01-18 23:49:37 +01:00
|
|
|
* to initiate /recoup.
|
2017-04-07 22:37:00 +02:00
|
|
|
*
|
2019-02-23 14:47:44 +01:00
|
|
|
* @param revocation_dir where to write the revocation certificate
|
|
|
|
* @param denom_hash hash of the denomination key to revoke
|
|
|
|
* @param mpriv master private key to sign with
|
2017-04-07 22:37:00 +02:00
|
|
|
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
|
|
|
|
*/
|
|
|
|
int
|
2019-02-23 14:47:44 +01:00
|
|
|
TALER_EXCHANGEDB_denomination_key_revoke (const char *revocation_dir,
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct
|
|
|
|
GNUNET_HashCode *denom_hash,
|
|
|
|
const struct
|
|
|
|
TALER_MasterPrivateKeyP *mpriv);
|
2017-04-07 22:37:00 +02:00
|
|
|
|
|
|
|
|
2015-01-28 15:03:47 +01:00
|
|
|
/**
|
2015-03-15 18:03:57 +01:00
|
|
|
* Exports a denomination key to the given file.
|
2015-01-28 15:03:47 +01:00
|
|
|
*
|
|
|
|
* @param filename the file where to write the denomination key
|
|
|
|
* @param dki the denomination key
|
|
|
|
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
|
|
|
|
*/
|
|
|
|
int
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGEDB_denomination_key_write (const char *filename,
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct
|
|
|
|
TALER_EXCHANGEDB_DenominationKeyIssueInformation
|
|
|
|
*dki);
|
2015-01-28 15:03:47 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-03-15 18:03:57 +01:00
|
|
|
* Import a denomination key from the given file.
|
2015-01-28 15:03:47 +01:00
|
|
|
*
|
|
|
|
* @param filename the file to import the key from
|
2015-03-28 15:42:07 +01:00
|
|
|
* @param[out] dki set to the imported denomination key
|
2015-01-28 15:03:47 +01:00
|
|
|
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure
|
|
|
|
*/
|
|
|
|
int
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGEDB_denomination_key_read (const char *filename,
|
2019-08-25 16:18:24 +02:00
|
|
|
struct
|
|
|
|
TALER_EXCHANGEDB_DenominationKeyIssueInformation
|
|
|
|
*dki);
|
2015-01-28 15:03:47 +01:00
|
|
|
|
|
|
|
|
2015-09-17 14:13:41 +02:00
|
|
|
/**
|
|
|
|
* @brief Iterator over auditor information.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
* @param apub the auditor's public key
|
2016-03-21 01:45:53 +01:00
|
|
|
* @param auditor_url URL of the auditor
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param mpub the exchange's public key (as expected by the auditor)
|
2015-09-19 16:34:27 +02:00
|
|
|
* @param dki_len length of @a asig and @a dki arrays
|
|
|
|
* @param asigs array of the auditor's signatures over the @a dks, of length @a dki_len
|
|
|
|
* @param dki array of denomination coin data signed by the auditor, of length @a dki_len
|
2015-09-17 14:13:41 +02:00
|
|
|
* @return #GNUNET_OK to continue to iterate,
|
|
|
|
* #GNUNET_NO to stop iteration with no error,
|
|
|
|
* #GNUNET_SYSERR to abort iteration with error!
|
|
|
|
*/
|
|
|
|
typedef int
|
2016-03-01 15:35:04 +01:00
|
|
|
(*TALER_EXCHANGEDB_AuditorIterator)(void *cls,
|
2016-03-21 01:45:53 +01:00
|
|
|
const struct TALER_AuditorPublicKeyP *apub,
|
|
|
|
const char *auditor_url,
|
|
|
|
const struct TALER_MasterPublicKeyP *mpub,
|
|
|
|
unsigned int dki_len,
|
|
|
|
const struct TALER_AuditorSignatureP *asigs,
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct
|
|
|
|
TALER_DenominationKeyValidityPS *dki);
|
2015-09-17 14:13:41 +02:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
2016-05-06 19:39:31 +02:00
|
|
|
* Call @a it with information for each auditor found in the
|
|
|
|
* directory with auditor information as specified in @a cfg.
|
2015-09-17 14:13:41 +02:00
|
|
|
*
|
2016-04-10 17:10:20 +02:00
|
|
|
* @param cfg configuration to use
|
2015-09-17 14:13:41 +02:00
|
|
|
* @param it function to call with auditor information
|
|
|
|
* @param it_cls closure for @a it
|
|
|
|
* @return -1 on error, 0 if no files were found, otherwise
|
|
|
|
* a positive number (however, even with a positive
|
|
|
|
* number it is possible that @a it was never called
|
|
|
|
* as maybe none of the files were well-formed)
|
|
|
|
*/
|
|
|
|
int
|
2016-04-10 17:10:20 +02:00
|
|
|
TALER_EXCHANGEDB_auditor_iterate (const struct GNUNET_CONFIGURATION_Handle *cfg,
|
2016-03-21 01:45:53 +01:00
|
|
|
TALER_EXCHANGEDB_AuditorIterator it,
|
|
|
|
void *it_cls);
|
2015-09-17 14:13:41 +02:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Write auditor information to the given file.
|
|
|
|
*
|
|
|
|
* @param filename the file where to write the auditor information to
|
|
|
|
* @param apub the auditor's public key
|
2016-03-21 01:45:53 +01:00
|
|
|
* @param auditor_url the URL of the auditor
|
2015-09-19 16:34:27 +02:00
|
|
|
* @param asigs the auditor's signatures, array of length @a dki_len
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param mpub the exchange's public key (as expected by the auditor)
|
2015-09-19 16:34:27 +02:00
|
|
|
* @param dki_len length of @a dki and @a asigs arrays
|
2015-09-17 14:13:41 +02:00
|
|
|
* @param dki array of denomination coin data signed by the auditor
|
|
|
|
* @return #GNUNET_OK upon success; #GNUNET_SYSERR upon failure.
|
|
|
|
*/
|
|
|
|
int
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGEDB_auditor_write (const char *filename,
|
2016-03-21 01:45:53 +01:00
|
|
|
const struct TALER_AuditorPublicKeyP *apub,
|
|
|
|
const char *auditor_url,
|
|
|
|
const struct TALER_AuditorSignatureP *asigs,
|
|
|
|
const struct TALER_MasterPublicKeyP *mpub,
|
|
|
|
unsigned int dki_len,
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct
|
|
|
|
TALER_DenominationKeyValidityPS *dki);
|
2015-09-17 14:13:41 +02:00
|
|
|
|
|
|
|
|
2015-03-28 11:06:00 +01:00
|
|
|
/**
|
|
|
|
* Initialize the plugin.
|
|
|
|
*
|
|
|
|
* @param cfg configuration to use
|
|
|
|
* @return NULL on failure
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGEDB_Plugin *
|
|
|
|
TALER_EXCHANGEDB_plugin_load (const struct GNUNET_CONFIGURATION_Handle *cfg);
|
2015-03-28 11:06:00 +01:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Shutdown the plugin.
|
|
|
|
*
|
|
|
|
* @param plugin plugin to unload
|
|
|
|
*/
|
|
|
|
void
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGEDB_plugin_unload (struct TALER_EXCHANGEDB_Plugin *plugin);
|
2015-03-28 11:06:00 +01:00
|
|
|
|
|
|
|
|
2017-03-03 20:31:29 +01:00
|
|
|
/**
|
|
|
|
* Sorted list of fees to be paid for aggregate wire transfers.
|
|
|
|
*/
|
|
|
|
struct TALER_EXCHANGEDB_AggregateFees
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* This is a linked list.
|
|
|
|
*/
|
|
|
|
struct TALER_EXCHANGEDB_AggregateFees *next;
|
|
|
|
|
|
|
|
/**
|
2017-04-17 14:01:55 +02:00
|
|
|
* Fee to be paid for wire transfers to a merchant.
|
2017-03-03 20:31:29 +01:00
|
|
|
*/
|
|
|
|
struct TALER_Amount wire_fee;
|
|
|
|
|
2017-04-17 14:01:55 +02:00
|
|
|
/**
|
|
|
|
* Fee to be paid when we close a reserve and send funds back.
|
|
|
|
*/
|
|
|
|
struct TALER_Amount closing_fee;
|
|
|
|
|
2017-03-03 20:31:29 +01:00
|
|
|
/**
|
|
|
|
* Time when this fee goes into effect (inclusive)
|
|
|
|
*/
|
|
|
|
struct GNUNET_TIME_Absolute start_date;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Time when this fee stops being in effect (exclusive).
|
|
|
|
*/
|
|
|
|
struct GNUNET_TIME_Absolute end_date;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Signature affirming the above fee structure.
|
|
|
|
*/
|
|
|
|
struct TALER_MasterSignatureP master_sig;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Read the current fee structure from disk.
|
|
|
|
*
|
|
|
|
* @param cfg configuration to use
|
|
|
|
* @param wireplugin name of the wire plugin to read fees for
|
|
|
|
* @return sorted list of aggregation fees, NULL on error
|
|
|
|
*/
|
|
|
|
struct TALER_EXCHANGEDB_AggregateFees *
|
|
|
|
TALER_EXCHANGEDB_fees_read (const struct GNUNET_CONFIGURATION_Handle *cfg,
|
|
|
|
const char *wireplugin);
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Convert @a af to @a wf.
|
|
|
|
*
|
2020-01-11 15:19:56 +01:00
|
|
|
* @param wiremethod name of the wire method the fees are for
|
2017-03-03 20:31:29 +01:00
|
|
|
* @param[in,out] af aggregate fees, host format (updated to round time)
|
|
|
|
* @param[out] wf aggregate fees, disk / signature format
|
|
|
|
*/
|
|
|
|
void
|
2020-01-11 15:19:56 +01:00
|
|
|
TALER_EXCHANGEDB_fees_2_wf (const char *wiremethod,
|
2017-03-04 18:09:39 +01:00
|
|
|
struct TALER_EXCHANGEDB_AggregateFees *af,
|
2017-03-03 20:31:29 +01:00
|
|
|
struct TALER_MasterWireFeePS *wf);
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Write given fee structure to disk.
|
|
|
|
*
|
|
|
|
* @param filename where to write the fees
|
2017-03-04 18:09:39 +01:00
|
|
|
* @param wireplugin name of the plugin for which we write the fees
|
2017-03-03 20:31:29 +01:00
|
|
|
* @param af fee structure to write
|
|
|
|
* @return #GNUNET_OK on success, #GNUNET_SYSERR on error
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_EXCHANGEDB_fees_write (const char *filename,
|
2017-03-04 18:09:39 +01:00
|
|
|
const char *wireplugin,
|
2017-03-03 20:31:29 +01:00
|
|
|
struct TALER_EXCHANGEDB_AggregateFees *af);
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Free @a af data structure
|
|
|
|
*
|
|
|
|
* @param af list to free
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
TALER_EXCHANGEDB_fees_free (struct TALER_EXCHANGEDB_AggregateFees *af);
|
|
|
|
|
2018-04-02 14:24:45 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Information about an account from the configuration.
|
|
|
|
*/
|
|
|
|
struct TALER_EXCHANGEDB_AccountInfo
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Section in the configuration file that specifies the
|
2020-01-19 18:48:14 +01:00
|
|
|
* account. Must start with "exchange-account-".
|
2018-04-02 14:24:45 +02:00
|
|
|
*/
|
|
|
|
const char *section_name;
|
|
|
|
|
|
|
|
/**
|
2020-01-11 15:19:56 +01:00
|
|
|
* Name of the wire method used by this account.
|
2018-04-02 14:24:45 +02:00
|
|
|
*/
|
2020-01-11 15:19:56 +01:00
|
|
|
const char *method;
|
2018-04-02 14:24:45 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* payto://-URL of the account.
|
|
|
|
*/
|
2020-01-19 17:03:19 +01:00
|
|
|
const char *payto_uri;
|
2018-04-02 14:24:45 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Filename containing the signed /wire response, or NULL
|
|
|
|
* if not given.
|
|
|
|
*/
|
|
|
|
const char *wire_response_filename;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* #GNUNET_YES if this account is enabed to be debited
|
|
|
|
* by the taler-exchange-aggregator.
|
|
|
|
*/
|
|
|
|
int debit_enabled;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* #GNUNET_YES if this account is enabed to be credited by wallets
|
|
|
|
* and needs to be watched by the taler-exchange-wirewatch.
|
|
|
|
* Also, the account will only be included in /wire if credit
|
|
|
|
* is enabled.
|
|
|
|
*/
|
|
|
|
int credit_enabled;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function called with information about a wire account.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
* @param ai account information
|
|
|
|
*/
|
|
|
|
typedef void
|
|
|
|
(*TALER_EXCHANGEDB_AccountCallback)(void *cls,
|
2019-08-25 16:18:24 +02:00
|
|
|
const struct
|
|
|
|
TALER_EXCHANGEDB_AccountInfo *ai);
|
2018-04-02 14:24:45 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Parse the configuration to find account information.
|
|
|
|
*
|
|
|
|
* @param cfg configuration to use
|
|
|
|
* @param cb callback to invoke
|
|
|
|
* @param cb_cls closure for @a cb
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
TALER_EXCHANGEDB_find_accounts (const struct GNUNET_CONFIGURATION_Handle *cfg,
|
|
|
|
TALER_EXCHANGEDB_AccountCallback cb,
|
|
|
|
void *cb_cls);
|
|
|
|
|
|
|
|
|
2020-01-16 22:40:12 +01:00
|
|
|
/**
|
|
|
|
* Calculate the total value of all transactions performed.
|
|
|
|
* Stores @a off plus the cost of all transactions in @a tl
|
|
|
|
* in @a ret.
|
|
|
|
*
|
|
|
|
* @param tl transaction list to process
|
|
|
|
* @param off offset to use as the starting value
|
|
|
|
* @param[out] ret where the resulting total is to be stored
|
|
|
|
* @return #GNUNET_OK on success, #GNUNET_SYSERR on errors
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
TALER_EXCHANGEDB_calculate_transaction_list_totals (struct
|
|
|
|
TALER_EXCHANGEDB_TransactionList
|
|
|
|
*tl,
|
|
|
|
const struct
|
|
|
|
TALER_Amount *off,
|
|
|
|
struct TALER_Amount *ret);
|
|
|
|
|
|
|
|
|
2015-01-28 15:03:47 +01:00
|
|
|
#endif
|