2020-01-11 15:19:56 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
|
|
|
Copyright (C) 2015--2020 Taler Systems SA
|
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, see
|
|
|
|
<http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
2020-01-11 23:06:10 +01:00
|
|
|
* @file bank-lib/bank_api_transfer.c
|
|
|
|
* @brief Implementation of the /transfer/ requests of the bank's HTTP API
|
2020-01-11 15:19:56 +01:00
|
|
|
* @author Christian Grothoff
|
|
|
|
*/
|
|
|
|
#include "platform.h"
|
|
|
|
#include "bank_api_common.h"
|
|
|
|
#include <microhttpd.h> /* just for HTTP status codes */
|
|
|
|
#include "taler_signatures.h"
|
|
|
|
#include "taler_curl_lib.h"
|
|
|
|
#include "taler_bank_service.h"
|
|
|
|
|
|
|
|
|
|
|
|
GNUNET_NETWORK_STRUCT_BEGIN
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Data structure serialized in the prepare stage.
|
|
|
|
*/
|
|
|
|
struct WirePackP
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Random unique identifier for the request.
|
|
|
|
*/
|
|
|
|
struct GNUNET_HashCode request_uid;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Amount to be transferred.
|
|
|
|
*/
|
|
|
|
struct TALER_AmountNBO amount;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Wire transfer identifier to use.
|
|
|
|
*/
|
|
|
|
struct TALER_WireTransferIdentifierRawP wtid;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Length of the payto:// URL of the target account,
|
|
|
|
* including 0-terminator, in network byte order.
|
|
|
|
*/
|
|
|
|
uint32_t account_len GNUNET_PACKED;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Length of the exchange's base URL,
|
|
|
|
* including 0-terminator, in network byte order.
|
|
|
|
*/
|
|
|
|
uint32_t exchange_url_len GNUNET_PACKED;
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
GNUNET_NETWORK_STRUCT_END
|
|
|
|
|
|
|
|
/**
|
2020-03-03 17:14:00 +01:00
|
|
|
* Prepare for execution of a wire transfer from the exchange to some
|
|
|
|
* merchant.
|
2020-01-11 15:19:56 +01:00
|
|
|
*
|
2020-01-18 04:31:55 +01:00
|
|
|
* @param destination_account_payto_uri payto:// URL identifying where to send the money
|
2020-01-11 15:19:56 +01:00
|
|
|
* @param amount amount to transfer, already rounded
|
|
|
|
* @param exchange_base_url base URL of this exchange (included in subject
|
|
|
|
* to facilitate use of tracking API by merchant backend)
|
|
|
|
* @param wtid wire transfer identifier to use
|
2020-01-17 23:50:41 +01:00
|
|
|
* @param[out] buf set to transfer data to persist, NULL on error
|
|
|
|
* @param[out] buf_size set to number of bytes in @a buf, 0 on error
|
2020-01-11 15:19:56 +01:00
|
|
|
*/
|
|
|
|
void
|
2020-03-07 00:28:07 +01:00
|
|
|
TALER_BANK_prepare_transfer (
|
|
|
|
const char *destination_account_payto_uri,
|
|
|
|
const struct TALER_Amount *amount,
|
|
|
|
const char *exchange_base_url,
|
|
|
|
const struct TALER_WireTransferIdentifierRawP *wtid,
|
|
|
|
void **buf,
|
|
|
|
size_t *buf_size)
|
2020-01-11 15:19:56 +01:00
|
|
|
{
|
|
|
|
struct WirePackP *wp;
|
2020-01-18 04:31:55 +01:00
|
|
|
size_t d_len = strlen (destination_account_payto_uri) + 1;
|
2020-01-11 15:19:56 +01:00
|
|
|
size_t u_len = strlen (exchange_base_url) + 1;
|
|
|
|
char *end;
|
|
|
|
|
2020-04-09 15:49:29 +02:00
|
|
|
if ( (d_len >= (size_t) GNUNET_MAX_MALLOC_CHECKED) ||
|
|
|
|
(u_len >= (size_t) GNUNET_MAX_MALLOC_CHECKED) ||
|
|
|
|
(d_len + u_len + sizeof (*wp) >= GNUNET_MAX_MALLOC_CHECKED) )
|
2020-03-03 17:14:00 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0); /* that's some long URL... */
|
|
|
|
*buf = NULL;
|
|
|
|
*buf_size = 0;
|
|
|
|
return;
|
|
|
|
}
|
2020-01-11 15:19:56 +01:00
|
|
|
*buf_size = sizeof (*wp) + d_len + u_len;
|
|
|
|
wp = GNUNET_malloc (*buf_size);
|
|
|
|
GNUNET_CRYPTO_hash_create_random (GNUNET_CRYPTO_QUALITY_NONCE,
|
|
|
|
&wp->request_uid);
|
|
|
|
TALER_amount_hton (&wp->amount,
|
|
|
|
amount);
|
|
|
|
wp->wtid = *wtid;
|
|
|
|
wp->account_len = htonl ((uint32_t) d_len);
|
|
|
|
wp->exchange_url_len = htonl ((uint32_t) u_len);
|
|
|
|
end = (char *) &wp[1];
|
|
|
|
memcpy (end,
|
2020-01-18 04:31:55 +01:00
|
|
|
destination_account_payto_uri,
|
2020-01-11 15:19:56 +01:00
|
|
|
d_len);
|
|
|
|
memcpy (end + d_len,
|
|
|
|
exchange_base_url,
|
|
|
|
u_len);
|
|
|
|
*buf = (char *) wp;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2020-03-03 17:14:00 +01:00
|
|
|
* @brief Handle for an active wire transfer.
|
2020-01-11 15:19:56 +01:00
|
|
|
*/
|
2020-03-03 17:14:00 +01:00
|
|
|
struct TALER_BANK_TransferHandle
|
2020-01-11 15:19:56 +01:00
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* The url for this request.
|
|
|
|
*/
|
|
|
|
char *request_url;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* POST context.
|
|
|
|
*/
|
2020-01-17 23:01:17 +01:00
|
|
|
struct TALER_CURL_PostContext post_ctx;
|
2020-01-11 15:19:56 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Handle for the request.
|
|
|
|
*/
|
|
|
|
struct GNUNET_CURL_Job *job;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function to call with the result.
|
|
|
|
*/
|
2020-03-03 17:14:00 +01:00
|
|
|
TALER_BANK_TransferCallback cb;
|
2020-01-11 15:19:56 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Closure for @a cb.
|
|
|
|
*/
|
|
|
|
void *cb_cls;
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function called when we're done processing the
|
2020-01-11 23:06:10 +01:00
|
|
|
* HTTP /transfer request.
|
2020-01-11 15:19:56 +01:00
|
|
|
*
|
2020-03-03 17:14:00 +01:00
|
|
|
* @param cls the `struct TALER_BANK_TransferHandle`
|
2020-01-11 15:19:56 +01:00
|
|
|
* @param response_code HTTP response code, 0 on error
|
|
|
|
* @param response parsed JSON result, NULL on error
|
|
|
|
*/
|
|
|
|
static void
|
2020-01-11 23:06:10 +01:00
|
|
|
handle_transfer_finished (void *cls,
|
|
|
|
long response_code,
|
|
|
|
const void *response)
|
2020-01-11 15:19:56 +01:00
|
|
|
{
|
2020-03-03 17:14:00 +01:00
|
|
|
struct TALER_BANK_TransferHandle *th = cls;
|
|
|
|
const json_t *j = response;
|
2020-01-11 15:19:56 +01:00
|
|
|
uint64_t row_id = UINT64_MAX;
|
2020-03-03 17:14:00 +01:00
|
|
|
struct GNUNET_TIME_Absolute timestamp = GNUNET_TIME_UNIT_FOREVER_ABS;
|
2020-01-11 15:19:56 +01:00
|
|
|
enum TALER_ErrorCode ec;
|
|
|
|
|
2020-03-03 17:14:00 +01:00
|
|
|
th->job = NULL;
|
2020-01-11 15:19:56 +01:00
|
|
|
switch (response_code)
|
|
|
|
{
|
|
|
|
case 0:
|
|
|
|
ec = TALER_EC_INVALID_RESPONSE;
|
|
|
|
break;
|
|
|
|
case MHD_HTTP_OK:
|
|
|
|
{
|
|
|
|
struct GNUNET_JSON_Specification spec[] = {
|
|
|
|
GNUNET_JSON_spec_uint64 ("row_id",
|
|
|
|
&row_id),
|
|
|
|
GNUNET_JSON_spec_absolute_time ("timestamp",
|
|
|
|
×tamp),
|
|
|
|
GNUNET_JSON_spec_end ()
|
|
|
|
};
|
|
|
|
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
GNUNET_JSON_parse (j,
|
|
|
|
spec,
|
|
|
|
NULL, NULL))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
response_code = 0;
|
|
|
|
ec = TALER_EC_INVALID_RESPONSE;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
ec = TALER_EC_NONE;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case MHD_HTTP_BAD_REQUEST:
|
|
|
|
/* This should never happen, either us or the bank is buggy
|
|
|
|
(or API version conflict); just pass JSON reply to the application */
|
2020-03-03 19:06:11 +01:00
|
|
|
GNUNET_break_op (0);
|
2020-01-16 21:02:10 +01:00
|
|
|
ec = TALER_JSON_get_error_code (j);
|
2020-01-11 15:19:56 +01:00
|
|
|
break;
|
|
|
|
case MHD_HTTP_UNAUTHORIZED:
|
2020-03-03 17:14:00 +01:00
|
|
|
/* Nothing really to verify, bank says our credentials are
|
|
|
|
invalid. We should pass the JSON reply to the application. */
|
2020-01-16 21:02:10 +01:00
|
|
|
ec = TALER_JSON_get_error_code (j);
|
2020-01-11 15:19:56 +01:00
|
|
|
break;
|
|
|
|
case MHD_HTTP_NOT_FOUND:
|
2020-03-03 17:14:00 +01:00
|
|
|
/* Nothing really to verify, endpoint wrong -- could be user unknown */
|
|
|
|
ec = TALER_JSON_get_error_code (j);
|
|
|
|
break;
|
|
|
|
case MHD_HTTP_CONFLICT:
|
|
|
|
/* Nothing really to verify. Server says we used the same transfer request
|
|
|
|
UID before, but with different details. Should not happen if the user
|
|
|
|
properly used #TALER_BANK_prepare_transfer() and our PRNG is not
|
|
|
|
broken... */
|
2020-01-16 21:02:10 +01:00
|
|
|
ec = TALER_JSON_get_error_code (j);
|
2020-01-11 15:19:56 +01:00
|
|
|
break;
|
|
|
|
case MHD_HTTP_INTERNAL_SERVER_ERROR:
|
|
|
|
/* Server had an internal issue; we should retry, but this API
|
|
|
|
leaves this to the application */
|
2020-01-16 21:02:10 +01:00
|
|
|
ec = TALER_JSON_get_error_code (j);
|
2020-01-11 15:19:56 +01:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* unexpected response code */
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unexpected response code %u\n",
|
|
|
|
(unsigned int) response_code);
|
|
|
|
GNUNET_break (0);
|
2020-01-16 21:02:10 +01:00
|
|
|
ec = TALER_JSON_get_error_code (j);
|
2020-01-11 15:19:56 +01:00
|
|
|
break;
|
|
|
|
}
|
2020-03-03 17:14:00 +01:00
|
|
|
th->cb (th->cb_cls,
|
|
|
|
response_code,
|
|
|
|
ec,
|
|
|
|
row_id,
|
|
|
|
timestamp);
|
|
|
|
TALER_BANK_transfer_cancel (th);
|
2020-01-11 15:19:56 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Execute a wire transfer.
|
|
|
|
*
|
2020-01-18 13:07:29 +01:00
|
|
|
* @param ctx curl context for our event loop
|
|
|
|
* @param auth authentication data to authenticate with the bank
|
2020-01-11 15:19:56 +01:00
|
|
|
* @param buf buffer with the prepared execution details
|
|
|
|
* @param buf_size number of bytes in @a buf
|
|
|
|
* @param cc function to call upon success
|
|
|
|
* @param cc_cls closure for @a cc
|
|
|
|
* @return NULL on error
|
|
|
|
*/
|
2020-03-03 17:14:00 +01:00
|
|
|
struct TALER_BANK_TransferHandle *
|
2020-03-07 00:28:07 +01:00
|
|
|
TALER_BANK_transfer (
|
|
|
|
struct GNUNET_CURL_Context *ctx,
|
|
|
|
const struct TALER_BANK_AuthenticationData *auth,
|
|
|
|
const void *buf,
|
|
|
|
size_t buf_size,
|
|
|
|
TALER_BANK_TransferCallback cc,
|
|
|
|
void *cc_cls)
|
2020-01-11 15:19:56 +01:00
|
|
|
{
|
2020-03-03 17:14:00 +01:00
|
|
|
struct TALER_BANK_TransferHandle *th;
|
2020-01-11 23:06:10 +01:00
|
|
|
json_t *transfer_obj;
|
2020-01-11 15:19:56 +01:00
|
|
|
CURL *eh;
|
|
|
|
const struct WirePackP *wp = buf;
|
|
|
|
uint32_t d_len;
|
|
|
|
uint32_t u_len;
|
2020-01-18 04:31:55 +01:00
|
|
|
const char *destination_account_uri;
|
2020-01-11 15:19:56 +01:00
|
|
|
const char *exchange_base_url;
|
|
|
|
struct TALER_Amount amount;
|
|
|
|
|
|
|
|
if (sizeof (*wp) > buf_size)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
d_len = ntohl (wp->account_len);
|
|
|
|
u_len = ntohl (wp->exchange_url_len);
|
2020-03-27 13:32:16 +01:00
|
|
|
if ( (sizeof (*wp) + d_len + u_len != buf_size) ||
|
|
|
|
(d_len > buf_size) ||
|
|
|
|
(u_len > buf_size) ||
|
|
|
|
(d_len + u_len > buf_size) )
|
2020-01-11 15:19:56 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return NULL;
|
|
|
|
}
|
2020-01-18 04:31:55 +01:00
|
|
|
destination_account_uri = (const char *) &wp[1];
|
|
|
|
exchange_base_url = destination_account_uri + d_len;
|
2020-03-03 17:14:00 +01:00
|
|
|
if ( ('\0' != destination_account_uri[d_len - 1]) ||
|
|
|
|
('\0' != exchange_base_url[u_len - 1]) )
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return NULL;
|
|
|
|
}
|
2020-01-18 04:31:55 +01:00
|
|
|
if (NULL == auth->wire_gateway_url)
|
2020-01-11 15:19:56 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
TALER_amount_ntoh (&amount,
|
|
|
|
&wp->amount);
|
2020-03-03 17:14:00 +01:00
|
|
|
th = GNUNET_new (struct TALER_BANK_TransferHandle);
|
|
|
|
th->cb = cc;
|
|
|
|
th->cb_cls = cc_cls;
|
|
|
|
th->request_url = TALER_url_join (auth->wire_gateway_url,
|
|
|
|
"transfer",
|
|
|
|
NULL);
|
|
|
|
if (NULL == th->request_url)
|
2020-01-16 21:57:40 +01:00
|
|
|
{
|
2020-03-03 17:14:00 +01:00
|
|
|
GNUNET_free (th);
|
2020-01-16 21:57:40 +01:00
|
|
|
GNUNET_break (0);
|
|
|
|
return NULL;
|
|
|
|
}
|
2020-01-13 22:15:43 +01:00
|
|
|
transfer_obj = json_pack ("{s:o, s:o, s:s, s:o, s:s}",
|
2020-01-11 23:06:10 +01:00
|
|
|
"request_uid", GNUNET_JSON_from_data_auto (
|
|
|
|
&wp->request_uid),
|
|
|
|
"amount", TALER_JSON_from_amount (&amount),
|
2020-01-13 22:15:43 +01:00
|
|
|
"exchange_base_url", exchange_base_url,
|
2020-01-11 23:06:10 +01:00
|
|
|
"wtid", GNUNET_JSON_from_data_auto (&wp->wtid),
|
2020-01-18 04:31:55 +01:00
|
|
|
"credit_account", destination_account_uri);
|
2020-01-11 23:06:10 +01:00
|
|
|
if (NULL == transfer_obj)
|
2020-01-11 15:19:56 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
eh = curl_easy_init ();
|
2020-03-03 17:14:00 +01:00
|
|
|
if ( (NULL == eh) ||
|
|
|
|
(GNUNET_OK !=
|
2020-01-11 15:19:56 +01:00
|
|
|
TALER_BANK_setup_auth_ (eh,
|
|
|
|
auth)) ||
|
|
|
|
(CURLE_OK !=
|
|
|
|
curl_easy_setopt (eh,
|
|
|
|
CURLOPT_URL,
|
2020-03-03 17:14:00 +01:00
|
|
|
th->request_url)) ||
|
2020-01-11 15:19:56 +01:00
|
|
|
(GNUNET_OK !=
|
2020-03-03 17:14:00 +01:00
|
|
|
TALER_curl_easy_post (&th->post_ctx,
|
2020-01-11 15:19:56 +01:00
|
|
|
eh,
|
2020-01-11 23:06:10 +01:00
|
|
|
transfer_obj)) )
|
2020-01-11 15:19:56 +01:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
2020-03-03 17:14:00 +01:00
|
|
|
TALER_BANK_transfer_cancel (th);
|
|
|
|
if (NULL != eh)
|
|
|
|
curl_easy_cleanup (eh);
|
2020-01-11 23:06:10 +01:00
|
|
|
json_decref (transfer_obj);
|
2020-01-11 15:19:56 +01:00
|
|
|
return NULL;
|
|
|
|
}
|
2020-01-11 23:06:10 +01:00
|
|
|
json_decref (transfer_obj);
|
2020-01-11 15:19:56 +01:00
|
|
|
|
2020-03-03 17:14:00 +01:00
|
|
|
th->job = GNUNET_CURL_job_add2 (ctx,
|
|
|
|
eh,
|
|
|
|
th->post_ctx.headers,
|
|
|
|
&handle_transfer_finished,
|
|
|
|
th);
|
|
|
|
return th;
|
2020-01-11 15:19:56 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2020-03-03 17:14:00 +01:00
|
|
|
* Abort execution of a wire transfer. For example, because we are shutting
|
|
|
|
* down. Note that if an execution is aborted, it may or may not still
|
|
|
|
* succeed.
|
|
|
|
*
|
|
|
|
* The caller MUST run #TALER_BANK_transfer() again for the same request as
|
2020-03-31 20:57:11 +02:00
|
|
|
* soon as possible, to ensure that the request either ultimately succeeds or
|
2020-03-03 17:14:00 +01:00
|
|
|
* ultimately fails. Until this has been done, the transaction is in limbo
|
|
|
|
* (i.e. may or may not have been committed).
|
|
|
|
*
|
|
|
|
* This function cannot be used on a request handle if a response is already
|
|
|
|
* served for it.
|
2020-01-11 15:19:56 +01:00
|
|
|
*
|
2020-03-03 17:14:00 +01:00
|
|
|
* @param th the wire transfer request handle
|
2020-01-11 15:19:56 +01:00
|
|
|
*/
|
|
|
|
void
|
2020-03-07 00:28:07 +01:00
|
|
|
TALER_BANK_transfer_cancel (struct TALER_BANK_TransferHandle *th)
|
2020-01-11 15:19:56 +01:00
|
|
|
{
|
2020-03-03 17:14:00 +01:00
|
|
|
if (NULL != th->job)
|
2020-01-11 15:19:56 +01:00
|
|
|
{
|
2020-03-03 17:14:00 +01:00
|
|
|
GNUNET_CURL_job_cancel (th->job);
|
|
|
|
th->job = NULL;
|
2020-01-11 15:19:56 +01:00
|
|
|
}
|
2020-03-03 17:14:00 +01:00
|
|
|
TALER_curl_easy_post_finished (&th->post_ctx);
|
|
|
|
GNUNET_free (th->request_url);
|
|
|
|
GNUNET_free (th);
|
2020-01-11 15:19:56 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-01-11 23:06:10 +01:00
|
|
|
/* end of bank_api_transfer.c */
|