2015-01-08 18:37:20 +01:00
|
|
|
/*
|
|
|
|
This file is part of TALER
|
2016-04-01 16:15:35 +02:00
|
|
|
Copyright (C) 2014, 2015, 2016 GNUnet e.V. and Inria
|
2015-01-08 18:37:20 +01:00
|
|
|
|
|
|
|
TALER is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* @file exchange/test_exchange_api.c
|
|
|
|
* @brief testcase to test exchange's HTTP API interface
|
2015-01-08 18:37:20 +01:00
|
|
|
* @author Sree Harsha Totakura <sreeharsha@totakura.in>
|
2015-06-18 11:39:53 +02:00
|
|
|
* @author Christian Grothoff
|
2015-01-08 18:37:20 +01:00
|
|
|
*/
|
|
|
|
#include "platform.h"
|
|
|
|
#include "taler_util.h"
|
2015-07-05 16:55:01 +02:00
|
|
|
#include "taler_signatures.h"
|
2016-03-01 15:35:04 +01:00
|
|
|
#include "taler_exchange_service.h"
|
2016-03-19 15:23:11 +01:00
|
|
|
#include "taler_json_lib.h"
|
2015-07-08 08:54:55 +02:00
|
|
|
#include <gnunet/gnunet_util_lib.h>
|
2015-07-04 18:45:51 +02:00
|
|
|
#include <microhttpd.h>
|
|
|
|
|
2015-09-15 17:27:02 +02:00
|
|
|
/**
|
|
|
|
* Is the configuration file is set to include wire format 'test'?
|
|
|
|
*/
|
|
|
|
#define WIRE_TEST 1
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Is the configuration file is set to include wire format 'sepa'?
|
|
|
|
*/
|
2015-09-20 14:02:10 +02:00
|
|
|
#define WIRE_SEPA 1
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-06-18 11:39:53 +02:00
|
|
|
/**
|
|
|
|
* Main execution context for the main loop.
|
|
|
|
*/
|
2016-04-17 17:45:15 +02:00
|
|
|
static struct GNUNET_CURL_Context *ctx;
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-06-18 11:39:53 +02:00
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Handle to access the exchange.
|
2015-06-18 11:39:53 +02:00
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
static struct TALER_EXCHANGE_Handle *exchange;
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-06-18 11:39:53 +02:00
|
|
|
/**
|
2016-05-02 08:24:21 +02:00
|
|
|
* Context for running the CURL event loop.
|
2015-06-18 11:39:53 +02:00
|
|
|
*/
|
2016-05-02 08:24:21 +02:00
|
|
|
static struct GNUNET_CURL_RescheduleContext *rc;
|
2015-01-08 18:37:20 +01:00
|
|
|
|
2015-06-18 11:39:53 +02:00
|
|
|
/**
|
2016-05-02 08:24:21 +02:00
|
|
|
* Task run on timeout.
|
2015-06-18 11:39:53 +02:00
|
|
|
*/
|
2016-05-02 08:24:21 +02:00
|
|
|
static struct GNUNET_SCHEDULER_Task *timeout_task;
|
2015-06-18 01:17:01 +02:00
|
|
|
|
2015-06-18 11:39:53 +02:00
|
|
|
/**
|
|
|
|
* Result of the testcases, #GNUNET_OK on success
|
|
|
|
*/
|
2015-01-08 18:37:20 +01:00
|
|
|
static int result;
|
|
|
|
|
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
/**
|
|
|
|
* Opcodes for the interpreter.
|
|
|
|
*/
|
|
|
|
enum OpCode
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Termination code, stops the interpreter loop (with success).
|
|
|
|
*/
|
|
|
|
OC_END = 0,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Add funds to a reserve by (faking) incoming wire transfer.
|
|
|
|
*/
|
|
|
|
OC_ADMIN_ADD_INCOMING,
|
|
|
|
|
2015-07-09 11:36:13 +02:00
|
|
|
/**
|
|
|
|
* Check status of a reserve.
|
|
|
|
*/
|
|
|
|
OC_WITHDRAW_STATUS,
|
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
/**
|
|
|
|
* Withdraw a coin from a reserve.
|
|
|
|
*/
|
|
|
|
OC_WITHDRAW_SIGN,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Deposit a coin (pay with it).
|
|
|
|
*/
|
2015-08-08 23:21:00 +02:00
|
|
|
OC_DEPOSIT,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Melt a (set of) coins.
|
|
|
|
*/
|
|
|
|
OC_REFRESH_MELT,
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Complete melting session by withdrawing melted coins.
|
|
|
|
*/
|
|
|
|
OC_REFRESH_REVEAL,
|
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Verify exchange's /refresh/link by linking original private key to
|
2015-08-08 23:21:00 +02:00
|
|
|
* results from #OC_REFRESH_REVEAL step.
|
|
|
|
*/
|
2015-09-15 10:00:21 +02:00
|
|
|
OC_REFRESH_LINK,
|
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Verify the exchange's /wire-method.
|
2015-09-15 10:00:21 +02:00
|
|
|
*/
|
2016-01-22 15:29:31 +01:00
|
|
|
OC_WIRE,
|
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Verify exchange's /wire/deposits method.
|
2016-01-22 15:29:31 +01:00
|
|
|
*/
|
|
|
|
OC_WIRE_DEPOSITS,
|
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Verify exchange's /deposit/wtid method.
|
2016-01-22 15:29:31 +01:00
|
|
|
*/
|
|
|
|
OC_DEPOSIT_WTID
|
2015-07-04 17:30:38 +02:00
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-08-08 23:35:51 +02:00
|
|
|
/**
|
|
|
|
* Structure specifying details about a coin to be melted.
|
|
|
|
* Used in a NULL-terminated array as part of command
|
|
|
|
* specification.
|
|
|
|
*/
|
|
|
|
struct MeltDetails
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Amount to melt (including fee).
|
|
|
|
*/
|
|
|
|
const char *amount;
|
|
|
|
|
|
|
|
/**
|
2015-09-19 22:08:49 +02:00
|
|
|
* Reference to reserve_withdraw operations for coin to
|
2015-08-08 23:35:51 +02:00
|
|
|
* be used for the /refresh/melt operation.
|
|
|
|
*/
|
|
|
|
const char *coin_ref;
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-08-09 16:21:49 +02:00
|
|
|
/**
|
|
|
|
* Information about a fresh coin generated by the refresh operation.
|
|
|
|
*/
|
|
|
|
struct FreshCoin
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* If @e amount is NULL, this specifies the denomination key to
|
|
|
|
* use. Otherwise, this will be set (by the interpreter) to the
|
|
|
|
* denomination PK matching @e amount.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey *pk;
|
2015-08-09 16:21:49 +02:00
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Set (by the interpreter) to the exchange's signature over the
|
2015-08-09 16:21:49 +02:00
|
|
|
* coin's public key.
|
|
|
|
*/
|
|
|
|
struct TALER_DenominationSignature sig;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set (by the interpreter) to the coin's private key.
|
|
|
|
*/
|
|
|
|
struct TALER_CoinSpendPrivateKeyP coin_priv;
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Details for a exchange operation to execute.
|
2015-07-04 17:30:38 +02:00
|
|
|
*/
|
|
|
|
struct Command
|
|
|
|
{
|
|
|
|
/**
|
|
|
|
* Opcode of the command.
|
|
|
|
*/
|
|
|
|
enum OpCode oc;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Label for the command, can be NULL.
|
|
|
|
*/
|
|
|
|
const char *label;
|
|
|
|
|
2015-07-09 12:22:07 +02:00
|
|
|
/**
|
|
|
|
* Which response code do we expect for this command?
|
|
|
|
*/
|
|
|
|
unsigned int expected_response_code;
|
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
/**
|
|
|
|
* Details about the command.
|
|
|
|
*/
|
|
|
|
union
|
|
|
|
{
|
|
|
|
|
2015-08-08 23:21:00 +02:00
|
|
|
/**
|
|
|
|
* Information for a #OC_ADMIN_ADD_INCOMING command.
|
|
|
|
*/
|
2015-07-04 17:30:38 +02:00
|
|
|
struct
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Label to another admin_add_incoming command if we
|
|
|
|
* should deposit into an existing reserve, NULL if
|
|
|
|
* a fresh reserve should be created.
|
|
|
|
*/
|
|
|
|
const char *reserve_reference;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* String describing the amount to add to the reserve.
|
|
|
|
*/
|
|
|
|
const char *amount;
|
|
|
|
|
2015-07-04 18:45:51 +02:00
|
|
|
/**
|
|
|
|
* Wire details (JSON).
|
|
|
|
*/
|
|
|
|
const char *wire;
|
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
/**
|
|
|
|
* Set (by the interpreter) to the reserve's private key
|
|
|
|
* we used to fill the reserve.
|
|
|
|
*/
|
|
|
|
struct TALER_ReservePrivateKeyP reserve_priv;
|
|
|
|
|
2015-07-04 18:45:51 +02:00
|
|
|
/**
|
|
|
|
* Set to the API's handle during the operation.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_AdminAddIncomingHandle *aih;
|
2015-07-04 18:45:51 +02:00
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
} admin_add_incoming;
|
|
|
|
|
2015-08-08 23:21:00 +02:00
|
|
|
/**
|
|
|
|
* Information for a #OC_WITHDRAW_STATUS command.
|
|
|
|
*/
|
2015-07-09 11:36:13 +02:00
|
|
|
struct
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Label to the #OC_ADMIN_ADD_INCOMING command which
|
|
|
|
* created the reserve.
|
|
|
|
*/
|
|
|
|
const char *reserve_reference;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set to the API's handle during the operation.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_ReserveStatusHandle *wsh;
|
2015-07-09 11:36:13 +02:00
|
|
|
|
2015-07-09 12:11:01 +02:00
|
|
|
/**
|
|
|
|
* Expected reserve balance.
|
|
|
|
*/
|
|
|
|
const char *expected_balance;
|
|
|
|
|
2015-09-19 22:08:49 +02:00
|
|
|
} reserve_status;
|
2015-07-09 11:36:13 +02:00
|
|
|
|
2015-08-08 23:21:00 +02:00
|
|
|
/**
|
|
|
|
* Information for a #OC_WITHDRAW_SIGN command.
|
|
|
|
*/
|
2015-07-04 17:30:38 +02:00
|
|
|
struct
|
|
|
|
{
|
2015-08-08 23:21:00 +02:00
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
/**
|
|
|
|
* Which reserve should we withdraw from?
|
|
|
|
*/
|
|
|
|
const char *reserve_reference;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* String describing the denomination value we should withdraw.
|
2016-03-01 15:35:04 +01:00
|
|
|
* A corresponding denomination key must exist in the exchange's
|
2015-07-04 17:30:38 +02:00
|
|
|
* offerings. Can be NULL if @e pk is set instead.
|
|
|
|
*/
|
|
|
|
const char *amount;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* If @e amount is NULL, this specifies the denomination key to
|
|
|
|
* use. Otherwise, this will be set (by the interpreter) to the
|
|
|
|
* denomination PK matching @e amount.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey *pk;
|
2015-07-04 17:30:38 +02:00
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Set (by the interpreter) to the exchange's signature over the
|
2015-07-04 17:30:38 +02:00
|
|
|
* coin's public key.
|
|
|
|
*/
|
|
|
|
struct TALER_DenominationSignature sig;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set (by the interpreter) to the coin's private key.
|
|
|
|
*/
|
|
|
|
struct TALER_CoinSpendPrivateKeyP coin_priv;
|
|
|
|
|
2015-07-04 22:35:30 +02:00
|
|
|
/**
|
|
|
|
* Blinding key used for the operation.
|
|
|
|
*/
|
|
|
|
struct TALER_DenominationBlindingKey blinding_key;
|
|
|
|
|
2015-07-04 22:00:29 +02:00
|
|
|
/**
|
|
|
|
* Withdraw handle (while operation is running).
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_ReserveWithdrawHandle *wsh;
|
2015-07-04 22:00:29 +02:00
|
|
|
|
2015-09-19 22:08:49 +02:00
|
|
|
} reserve_withdraw;
|
2015-07-04 17:30:38 +02:00
|
|
|
|
2015-08-08 23:21:00 +02:00
|
|
|
/**
|
|
|
|
* Information for a #OC_DEPOSIT command.
|
|
|
|
*/
|
2015-07-04 17:30:38 +02:00
|
|
|
struct
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Amount to deposit.
|
|
|
|
*/
|
|
|
|
const char *amount;
|
|
|
|
|
|
|
|
/**
|
2015-09-19 22:08:49 +02:00
|
|
|
* Reference to a reserve_withdraw operation for a coin to
|
2015-07-04 17:30:38 +02:00
|
|
|
* be used for the /deposit operation.
|
|
|
|
*/
|
|
|
|
const char *coin_ref;
|
|
|
|
|
2015-08-08 23:35:51 +02:00
|
|
|
/**
|
|
|
|
* If this @e coin_ref refers to an operation that generated
|
|
|
|
* an array of coins, this value determines which coin to use.
|
|
|
|
*/
|
|
|
|
unsigned int coin_idx;
|
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
/**
|
|
|
|
* JSON string describing the merchant's "wire details".
|
|
|
|
*/
|
|
|
|
const char *wire_details;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* JSON string describing the contract between the two parties.
|
|
|
|
*/
|
|
|
|
const char *contract;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Transaction ID to use.
|
|
|
|
*/
|
|
|
|
uint64_t transaction_id;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Relative time (to add to 'now') to compute the refund deadline.
|
|
|
|
* Zero for no refunds.
|
|
|
|
*/
|
|
|
|
struct GNUNET_TIME_Relative refund_deadline;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set (by the interpreter) to a fresh private key of the merchant,
|
|
|
|
* if @e refund_deadline is non-zero.
|
|
|
|
*/
|
2015-07-05 14:32:26 +02:00
|
|
|
struct TALER_MerchantPrivateKeyP merchant_priv;
|
2015-07-04 17:30:38 +02:00
|
|
|
|
2015-07-04 22:00:29 +02:00
|
|
|
/**
|
|
|
|
* Deposit handle while operation is running.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_DepositHandle *dh;
|
2015-07-04 22:00:29 +02:00
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
} deposit;
|
|
|
|
|
2015-08-08 23:21:00 +02:00
|
|
|
/**
|
|
|
|
* Information for a #OC_REFRESH_MELT command.
|
|
|
|
*/
|
|
|
|
struct
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Information about coins to be melted.
|
|
|
|
*/
|
2015-08-08 23:35:51 +02:00
|
|
|
struct MeltDetails *melted_coins;
|
2015-08-08 23:21:00 +02:00
|
|
|
|
|
|
|
/**
|
2015-08-09 14:55:38 +02:00
|
|
|
* Denominations of the fresh coins to withdraw.
|
2015-08-08 23:21:00 +02:00
|
|
|
*/
|
2015-08-09 14:55:38 +02:00
|
|
|
const char **fresh_amounts;
|
2015-08-08 23:21:00 +02:00
|
|
|
|
2015-08-09 16:21:49 +02:00
|
|
|
/**
|
|
|
|
* Array of the public keys corresponding to
|
|
|
|
* the @e fresh_amounts, set by the interpreter.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey **fresh_pks;
|
2015-08-09 16:21:49 +02:00
|
|
|
|
2015-08-08 23:21:00 +02:00
|
|
|
/**
|
|
|
|
* Melt handle while operation is running.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_RefreshMeltHandle *rmh;
|
2015-08-08 23:21:00 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Data used in the refresh operation, set by the interpreter.
|
|
|
|
*/
|
|
|
|
char *refresh_data;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Number of bytes in @e refresh_data, set by the interpreter.
|
|
|
|
*/
|
|
|
|
size_t refresh_data_length;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Set by the interpreter (upon completion) to the noreveal
|
2016-03-01 15:35:04 +01:00
|
|
|
* index selected by the exchange.
|
2015-08-08 23:21:00 +02:00
|
|
|
*/
|
|
|
|
uint16_t noreveal_index;
|
|
|
|
|
|
|
|
} refresh_melt;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Information for a #OC_REFRESH_REVEAL command.
|
|
|
|
*/
|
|
|
|
struct
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Melt operation this is the matching reveal for.
|
|
|
|
*/
|
|
|
|
const char *melt_ref;
|
|
|
|
|
2015-08-09 15:24:02 +02:00
|
|
|
/**
|
|
|
|
* Reveal handle while operation is running.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_RefreshRevealHandle *rrh;
|
2015-08-09 15:24:02 +02:00
|
|
|
|
2015-08-08 23:21:00 +02:00
|
|
|
/**
|
|
|
|
* Number of fresh coins withdrawn, set by the interpreter.
|
|
|
|
* Length of the @e fresh_coins array.
|
|
|
|
*/
|
|
|
|
unsigned int num_fresh_coins;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Information about coins withdrawn, set by the interpreter.
|
|
|
|
*/
|
2015-08-09 16:21:49 +02:00
|
|
|
struct FreshCoin *fresh_coins;
|
2015-08-08 23:21:00 +02:00
|
|
|
|
|
|
|
} refresh_reveal;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Information for a #OC_REFRESH_LINK command.
|
|
|
|
*/
|
|
|
|
struct
|
|
|
|
{
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Reveal operation this is the matching link for.
|
|
|
|
*/
|
|
|
|
const char *reveal_ref;
|
|
|
|
|
2015-08-09 15:24:02 +02:00
|
|
|
/**
|
|
|
|
* Link handle while operation is running.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_RefreshLinkHandle *rlh;
|
2015-08-09 15:24:02 +02:00
|
|
|
|
2015-08-09 15:33:38 +02:00
|
|
|
/**
|
|
|
|
* Which of the melted coins should be used for the linkage?
|
|
|
|
*/
|
|
|
|
unsigned int coin_idx;
|
|
|
|
|
2015-08-08 23:21:00 +02:00
|
|
|
} refresh_link;
|
|
|
|
|
2015-09-15 10:00:21 +02:00
|
|
|
/**
|
|
|
|
* Information for the /wire command.
|
|
|
|
*/
|
|
|
|
struct {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Handle to the wire request.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_WireHandle *wh;
|
2015-09-15 10:00:21 +02:00
|
|
|
|
2015-09-20 14:02:10 +02:00
|
|
|
/**
|
|
|
|
* Format we expect to see, others will be *ignored*.
|
|
|
|
*/
|
|
|
|
const char *format;
|
|
|
|
|
2015-09-15 10:00:21 +02:00
|
|
|
} wire;
|
|
|
|
|
2016-01-22 15:29:31 +01:00
|
|
|
/**
|
|
|
|
* Information for the /wire/deposits's command.
|
|
|
|
*/
|
|
|
|
struct {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Handle to the wire deposits request.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_WireDepositsHandle *wdh;
|
2016-01-22 15:29:31 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Reference to a /deposit/wtid command. If set, we use the
|
|
|
|
* WTID from that command.
|
|
|
|
*/
|
|
|
|
const char *wtid_ref;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* WTID to use (used if @e wtid_ref is NULL).
|
|
|
|
*/
|
|
|
|
struct TALER_WireTransferIdentifierRawP wtid;
|
|
|
|
|
|
|
|
/* TODO: may want to add list of deposits we expected
|
|
|
|
to see aggregated here in the future. */
|
|
|
|
|
|
|
|
} wire_deposits;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Information for the /deposit/wtid command.
|
|
|
|
*/
|
|
|
|
struct {
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Handle to the deposit wtid request.
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_DepositWtidHandle *dwh;
|
2016-01-22 15:29:31 +01:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Which /deposit operation should we obtain WTID data for?
|
|
|
|
*/
|
|
|
|
const char *deposit_ref;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* What is the expected total amount? Only used if
|
|
|
|
* @e expected_response_code was #MHD_HTTP_OK.
|
|
|
|
*/
|
|
|
|
struct TALER_Amount total_amount_expected;
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Wire transfer identifier, set if #MHD_HTTP_OK was the response code.
|
|
|
|
*/
|
|
|
|
struct TALER_WireTransferIdentifierRawP wtid;
|
|
|
|
|
|
|
|
} deposit_wtid;
|
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
} details;
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* State of the interpreter loop.
|
|
|
|
*/
|
|
|
|
struct InterpreterState
|
|
|
|
{
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Keys from the exchange.
|
2015-07-04 17:30:38 +02:00
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
const struct TALER_EXCHANGE_Keys *keys;
|
2015-07-04 17:30:38 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Commands the interpreter will run.
|
|
|
|
*/
|
|
|
|
struct Command *commands;
|
|
|
|
|
2015-07-04 20:47:39 +02:00
|
|
|
/**
|
|
|
|
* Interpreter task (if one is scheduled).
|
|
|
|
*/
|
|
|
|
struct GNUNET_SCHEDULER_Task *task;
|
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
/**
|
|
|
|
* Instruction pointer. Tells #interpreter_run() which
|
|
|
|
* instruction to run next.
|
|
|
|
*/
|
|
|
|
unsigned int ip;
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* The testcase failed, return with an error code.
|
|
|
|
*
|
|
|
|
* @param is interpreter state to clean up
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
fail (struct InterpreterState *is)
|
|
|
|
{
|
|
|
|
result = GNUNET_SYSERR;
|
|
|
|
GNUNET_SCHEDULER_shutdown ();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-04 18:45:51 +02:00
|
|
|
/**
|
|
|
|
* Find a command by label.
|
|
|
|
*
|
|
|
|
* @param is interpreter state to search
|
|
|
|
* @param label label to look for
|
|
|
|
* @return NULL if command was not found
|
|
|
|
*/
|
|
|
|
static const struct Command *
|
|
|
|
find_command (const struct InterpreterState *is,
|
|
|
|
const char *label)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
const struct Command *cmd;
|
|
|
|
|
2015-07-04 20:47:39 +02:00
|
|
|
if (NULL == label)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Attempt to lookup command for empty label\n");
|
|
|
|
return NULL;
|
|
|
|
}
|
2015-07-04 18:45:51 +02:00
|
|
|
for (i=0;OC_END != (cmd = &is->commands[i])->oc;i++)
|
|
|
|
if ( (NULL != cmd->label) &&
|
|
|
|
(0 == strcmp (cmd->label,
|
|
|
|
label)) )
|
|
|
|
return cmd;
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command not found: %s\n",
|
|
|
|
label);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Run the main interpreter loop that performs exchange operations.
|
2015-07-04 18:45:51 +02:00
|
|
|
*
|
|
|
|
* @param cls contains the `struct InterpreterState`
|
|
|
|
*/
|
|
|
|
static void
|
2016-04-10 00:57:20 +02:00
|
|
|
interpreter_run (void *cls);
|
2015-07-04 18:45:51 +02:00
|
|
|
|
|
|
|
|
|
|
|
/**
|
2015-07-04 22:35:30 +02:00
|
|
|
* Function called upon completion of our /admin/add/incoming request.
|
2015-07-04 18:45:51 +02:00
|
|
|
*
|
|
|
|
* @param cls closure with the interpreter state
|
|
|
|
* @param http_status HTTP response code, #MHD_HTTP_OK (200) for successful status request
|
2016-03-01 15:35:04 +01:00
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
|
|
|
* @param full_response full response from the exchange (for logging, in case of errors)
|
2015-07-04 18:45:51 +02:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
add_incoming_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
2016-04-17 17:45:15 +02:00
|
|
|
const json_t *full_response)
|
2015-07-04 18:45:51 +02:00
|
|
|
{
|
|
|
|
struct InterpreterState *is = cls;
|
|
|
|
struct Command *cmd = &is->commands[is->ip];
|
|
|
|
|
|
|
|
cmd->details.admin_add_incoming.aih = NULL;
|
|
|
|
if (MHD_HTTP_OK != http_status)
|
|
|
|
{
|
2015-07-05 13:05:58 +02:00
|
|
|
GNUNET_break (0);
|
2015-07-04 18:45:51 +02:00
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
is->ip++;
|
2015-07-04 20:47:39 +02:00
|
|
|
is->task = GNUNET_SCHEDULER_add_now (&interpreter_run,
|
|
|
|
is);
|
2015-07-04 18:45:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-09 12:02:01 +02:00
|
|
|
/**
|
|
|
|
* Check if the given historic event @a h corresponds to the given
|
|
|
|
* command @a cmd.
|
|
|
|
*
|
|
|
|
* @param h event in history
|
|
|
|
* @param cmd an #OC_ADMIN_ADD_INCOMING command
|
|
|
|
* @return #GNUNET_OK if they match, #GNUNET_SYSERR if not
|
|
|
|
*/
|
|
|
|
static int
|
2016-03-01 15:35:04 +01:00
|
|
|
compare_admin_add_incoming_history (const struct TALER_EXCHANGE_ReserveHistory *h,
|
2015-07-09 12:02:01 +02:00
|
|
|
const struct Command *cmd)
|
|
|
|
{
|
|
|
|
struct TALER_Amount amount;
|
|
|
|
|
2016-03-01 15:35:04 +01:00
|
|
|
if (TALER_EXCHANGE_RTT_DEPOSIT != h->type)
|
2015-07-09 12:02:01 +02:00
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_string_to_amount (cmd->details.admin_add_incoming.amount,
|
|
|
|
&amount));
|
|
|
|
if (0 != TALER_amount_cmp (&amount,
|
|
|
|
&h->amount))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if the given historic event @a h corresponds to the given
|
|
|
|
* command @a cmd.
|
|
|
|
*
|
|
|
|
* @param h event in history
|
|
|
|
* @param cmd an #OC_WITHDRAW_SIGN command
|
|
|
|
* @return #GNUNET_OK if they match, #GNUNET_SYSERR if not
|
|
|
|
*/
|
|
|
|
static int
|
2016-03-01 15:35:04 +01:00
|
|
|
compare_reserve_withdraw_history (const struct TALER_EXCHANGE_ReserveHistory *h,
|
2015-09-19 22:08:49 +02:00
|
|
|
const struct Command *cmd)
|
2015-07-09 12:02:01 +02:00
|
|
|
{
|
|
|
|
struct TALER_Amount amount;
|
2015-07-09 12:11:01 +02:00
|
|
|
struct TALER_Amount amount_with_fee;
|
2015-07-09 12:02:01 +02:00
|
|
|
|
2016-03-01 15:35:04 +01:00
|
|
|
if (TALER_EXCHANGE_RTT_WITHDRAWAL != h->type)
|
2015-07-09 12:02:01 +02:00
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
|
|
|
return GNUNET_SYSERR;
|
|
|
|
}
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2015-09-19 22:08:49 +02:00
|
|
|
TALER_string_to_amount (cmd->details.reserve_withdraw.amount,
|
2015-07-09 12:02:01 +02:00
|
|
|
&amount));
|
2015-07-09 12:11:01 +02:00
|
|
|
GNUNET_assert (GNUNET_OK ==
|
|
|
|
TALER_amount_add (&amount_with_fee,
|
|
|
|
&amount,
|
2015-09-19 22:08:49 +02:00
|
|
|
&cmd->details.reserve_withdraw.pk->fee_withdraw));
|
2015-07-09 12:11:01 +02:00
|
|
|
if (0 != TALER_amount_cmp (&amount_with_fee,
|
2015-07-09 12:02:01 +02:00
|
|
|
&h->amount))
|
|
|
|
{
|
|
|
|
GNUNET_break_op (0);
|
2015-07-09 12:11:01 +02:00
|
|
|
return GNUNET_SYSERR;
|
2015-07-09 12:02:01 +02:00
|
|
|
}
|
|
|
|
return GNUNET_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-09 11:36:13 +02:00
|
|
|
/**
|
2015-09-19 22:08:49 +02:00
|
|
|
* Function called with the result of a /reserve/status request.
|
2015-07-09 11:36:13 +02:00
|
|
|
*
|
|
|
|
* @param cls closure with the interpreter state
|
|
|
|
* @param http_status HTTP response code, #MHD_HTTP_OK (200) for successful status request
|
2016-03-01 15:35:04 +01:00
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
2015-07-09 11:36:13 +02:00
|
|
|
* @param[in] json original response in JSON format (useful only for diagnostics)
|
|
|
|
* @param balance current balance in the reserve, NULL on error
|
|
|
|
* @param history_length number of entries in the transaction history, 0 on error
|
|
|
|
* @param history detailed transaction history, NULL on error
|
|
|
|
*/
|
|
|
|
static void
|
2015-09-19 22:08:49 +02:00
|
|
|
reserve_status_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
2016-04-17 17:45:15 +02:00
|
|
|
const json_t *json,
|
2015-09-19 22:08:49 +02:00
|
|
|
const struct TALER_Amount *balance,
|
|
|
|
unsigned int history_length,
|
2016-03-01 15:35:04 +01:00
|
|
|
const struct TALER_EXCHANGE_ReserveHistory *history)
|
2015-07-09 11:36:13 +02:00
|
|
|
{
|
|
|
|
struct InterpreterState *is = cls;
|
|
|
|
struct Command *cmd = &is->commands[is->ip];
|
2015-07-09 12:02:01 +02:00
|
|
|
struct Command *rel;
|
|
|
|
unsigned int i;
|
|
|
|
unsigned int j;
|
2015-07-09 12:11:01 +02:00
|
|
|
struct TALER_Amount amount;
|
2015-07-09 11:36:13 +02:00
|
|
|
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_status.wsh = NULL;
|
2015-07-09 12:22:07 +02:00
|
|
|
if (cmd->expected_response_code != http_status)
|
2015-07-09 12:02:01 +02:00
|
|
|
{
|
2015-07-09 12:47:49 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unexpected response code %u to command %s\n",
|
|
|
|
http_status,
|
|
|
|
cmd->label);
|
2015-07-09 12:02:01 +02:00
|
|
|
GNUNET_break (0);
|
2015-08-14 15:19:50 +02:00
|
|
|
json_dumpf (json, stderr, 0);
|
2015-07-09 12:02:01 +02:00
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-07-09 12:22:07 +02:00
|
|
|
switch (http_status)
|
2015-07-09 12:02:01 +02:00
|
|
|
{
|
2015-07-09 12:22:07 +02:00
|
|
|
case MHD_HTTP_OK:
|
|
|
|
/* FIXME: note that history events may come in a different
|
2015-07-09 13:02:40 +02:00
|
|
|
order than the commands. However, for now this works... */
|
2015-07-09 12:22:07 +02:00
|
|
|
j = 0;
|
|
|
|
for (i=0;i<is->ip;i++)
|
2015-07-09 12:02:01 +02:00
|
|
|
{
|
2015-07-09 12:22:07 +02:00
|
|
|
switch ((rel = &is->commands[i])->oc)
|
2015-07-09 12:02:01 +02:00
|
|
|
{
|
2015-07-09 12:22:07 +02:00
|
|
|
case OC_ADMIN_ADD_INCOMING:
|
|
|
|
if ( ( (NULL != rel->label) &&
|
2015-09-19 22:08:49 +02:00
|
|
|
(0 == strcmp (cmd->details.reserve_status.reserve_reference,
|
2015-07-09 12:22:07 +02:00
|
|
|
rel->label) ) ) ||
|
|
|
|
( (NULL != rel->details.admin_add_incoming.reserve_reference) &&
|
2015-09-19 22:08:49 +02:00
|
|
|
(0 == strcmp (cmd->details.reserve_status.reserve_reference,
|
2015-07-09 12:22:07 +02:00
|
|
|
rel->details.admin_add_incoming.reserve_reference) ) ) )
|
2015-07-09 12:02:01 +02:00
|
|
|
{
|
2015-07-09 12:22:07 +02:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
compare_admin_add_incoming_history (&history[j],
|
|
|
|
rel))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
j++;
|
2015-07-09 12:02:01 +02:00
|
|
|
}
|
2015-07-09 12:22:07 +02:00
|
|
|
break;
|
|
|
|
case OC_WITHDRAW_SIGN:
|
2015-09-19 22:08:49 +02:00
|
|
|
if (0 == strcmp (cmd->details.reserve_status.reserve_reference,
|
|
|
|
rel->details.reserve_withdraw.reserve_reference))
|
2015-07-09 12:02:01 +02:00
|
|
|
{
|
2015-07-09 12:22:07 +02:00
|
|
|
if (GNUNET_OK !=
|
2015-09-19 22:08:49 +02:00
|
|
|
compare_reserve_withdraw_history (&history[j],
|
2015-07-09 12:22:07 +02:00
|
|
|
rel))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
j++;
|
2015-07-09 12:02:01 +02:00
|
|
|
}
|
2015-07-09 12:22:07 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* unreleated, just skip */
|
|
|
|
break;
|
2015-07-09 12:02:01 +02:00
|
|
|
}
|
|
|
|
}
|
2015-07-09 12:22:07 +02:00
|
|
|
if (j != history_length)
|
2015-07-09 12:11:01 +02:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-09-19 22:08:49 +02:00
|
|
|
if (NULL != cmd->details.reserve_status.expected_balance)
|
2015-07-09 12:22:07 +02:00
|
|
|
{
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2015-09-19 22:08:49 +02:00
|
|
|
TALER_string_to_amount (cmd->details.reserve_status.expected_balance,
|
2015-07-09 12:22:07 +02:00
|
|
|
&amount));
|
|
|
|
if (0 != TALER_amount_cmp (&amount,
|
|
|
|
balance))
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2015-07-09 12:47:49 +02:00
|
|
|
break;
|
2015-07-09 12:22:07 +02:00
|
|
|
default:
|
|
|
|
/* Unsupported status code (by test harness) */
|
|
|
|
GNUNET_break (0);
|
|
|
|
break;
|
2015-07-09 12:11:01 +02:00
|
|
|
}
|
2015-07-09 11:36:13 +02:00
|
|
|
is->ip++;
|
|
|
|
is->task = GNUNET_SCHEDULER_add_now (&interpreter_run,
|
|
|
|
is);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-04 22:35:30 +02:00
|
|
|
/**
|
2015-09-19 22:08:49 +02:00
|
|
|
* Function called upon completion of our /reserve/withdraw request.
|
2015-07-04 22:35:30 +02:00
|
|
|
*
|
|
|
|
* @param cls closure with the interpreter state
|
|
|
|
* @param http_status HTTP response code, #MHD_HTTP_OK (200) for successful status request
|
2016-03-01 15:35:04 +01:00
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
2015-07-04 22:35:30 +02:00
|
|
|
* @param sig signature over the coin, NULL on error
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param full_response full response from the exchange (for logging, in case of errors)
|
2015-07-04 22:35:30 +02:00
|
|
|
*/
|
|
|
|
static void
|
2015-09-19 22:08:49 +02:00
|
|
|
reserve_withdraw_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
|
|
|
const struct TALER_DenominationSignature *sig,
|
2016-04-17 17:45:15 +02:00
|
|
|
const json_t *full_response)
|
2015-07-04 22:35:30 +02:00
|
|
|
{
|
|
|
|
struct InterpreterState *is = cls;
|
|
|
|
struct Command *cmd = &is->commands[is->ip];
|
|
|
|
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_withdraw.wsh = NULL;
|
2015-07-09 12:22:07 +02:00
|
|
|
if (cmd->expected_response_code != http_status)
|
2015-07-04 22:35:30 +02:00
|
|
|
{
|
2015-07-09 12:47:49 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unexpected response code %u to command %s\n",
|
|
|
|
http_status,
|
|
|
|
cmd->label);
|
2015-08-14 15:19:50 +02:00
|
|
|
json_dumpf (full_response, stderr, 0);
|
2015-07-05 13:05:58 +02:00
|
|
|
GNUNET_break (0);
|
2015-07-04 22:35:30 +02:00
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-07-09 12:22:07 +02:00
|
|
|
switch (http_status)
|
|
|
|
{
|
|
|
|
case MHD_HTTP_OK:
|
|
|
|
if (NULL == sig)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_withdraw.sig.rsa_signature
|
2015-07-09 12:22:07 +02:00
|
|
|
= GNUNET_CRYPTO_rsa_signature_dup (sig->rsa_signature);
|
|
|
|
break;
|
2015-07-09 12:47:49 +02:00
|
|
|
case MHD_HTTP_PAYMENT_REQUIRED:
|
|
|
|
/* nothing to check */
|
|
|
|
break;
|
2015-07-09 12:22:07 +02:00
|
|
|
default:
|
|
|
|
/* Unsupported status code (by test harness) */
|
|
|
|
GNUNET_break (0);
|
|
|
|
break;
|
|
|
|
}
|
2015-07-04 22:35:30 +02:00
|
|
|
is->ip++;
|
|
|
|
is->task = GNUNET_SCHEDULER_add_now (&interpreter_run,
|
|
|
|
is);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-05 14:32:26 +02:00
|
|
|
/**
|
|
|
|
* Function called with the result of a /deposit operation.
|
|
|
|
*
|
|
|
|
* @param cls closure with the interpreter state
|
|
|
|
* @param http_status HTTP response code, #MHD_HTTP_OK (200) for successful deposit;
|
2016-03-01 15:35:04 +01:00
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
2015-07-05 14:32:26 +02:00
|
|
|
* @param obj the received JSON reply, should be kept as proof (and, in case of errors,
|
|
|
|
* be forwarded to the customer)
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
deposit_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
2016-04-17 17:45:15 +02:00
|
|
|
const json_t *obj)
|
2015-07-05 14:32:26 +02:00
|
|
|
{
|
|
|
|
struct InterpreterState *is = cls;
|
|
|
|
struct Command *cmd = &is->commands[is->ip];
|
|
|
|
|
|
|
|
cmd->details.deposit.dh = NULL;
|
2015-07-09 12:22:07 +02:00
|
|
|
if (cmd->expected_response_code != http_status)
|
2015-07-05 14:32:26 +02:00
|
|
|
{
|
2015-07-09 12:47:49 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unexpected response code %u to command %s\n",
|
|
|
|
http_status,
|
|
|
|
cmd->label);
|
2015-08-14 15:19:50 +02:00
|
|
|
json_dumpf (obj, stderr, 0);
|
2015-07-05 14:32:26 +02:00
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
is->ip++;
|
|
|
|
is->task = GNUNET_SCHEDULER_add_now (&interpreter_run,
|
|
|
|
is);
|
2015-08-09 14:55:38 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function called with the result of the /refresh/melt operation.
|
|
|
|
*
|
|
|
|
* @param cls closure with the interpreter state
|
|
|
|
* @param http_status HTTP response code, never #MHD_HTTP_OK (200) as for successful intermediate response this callback is skipped.
|
2016-03-01 15:35:04 +01:00
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
|
|
|
* @param noreveal_index choice by the exchange in the cut-and-choose protocol,
|
2015-08-09 14:55:38 +02:00
|
|
|
* UINT16_MAX on error
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param full_response full response from the exchange (for logging, in case of errors)
|
2015-08-09 14:55:38 +02:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
melt_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
|
|
|
uint16_t noreveal_index,
|
2016-04-17 17:45:15 +02:00
|
|
|
const json_t *full_response)
|
2015-08-09 14:55:38 +02:00
|
|
|
{
|
|
|
|
struct InterpreterState *is = cls;
|
|
|
|
struct Command *cmd = &is->commands[is->ip];
|
2015-07-05 14:32:26 +02:00
|
|
|
|
2015-08-09 14:55:38 +02:00
|
|
|
cmd->details.refresh_melt.rmh = NULL;
|
|
|
|
if (cmd->expected_response_code != http_status)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unexpected response code %u to command %s\n",
|
|
|
|
http_status,
|
|
|
|
cmd->label);
|
2015-08-14 15:19:50 +02:00
|
|
|
json_dumpf (full_response, stderr, 0);
|
2015-08-09 14:55:38 +02:00
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
cmd->details.refresh_melt.noreveal_index = noreveal_index;
|
|
|
|
is->ip++;
|
|
|
|
is->task = GNUNET_SCHEDULER_add_now (&interpreter_run,
|
|
|
|
is);
|
2015-07-05 14:32:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-08-09 15:24:02 +02:00
|
|
|
/**
|
|
|
|
* Function called with the result of the /refresh/reveal operation.
|
|
|
|
*
|
|
|
|
* @param cls closure with the interpreter state
|
|
|
|
* @param http_status HTTP response code, #MHD_HTTP_OK (200) for successful status request
|
2016-03-01 15:35:04 +01:00
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
2015-08-09 15:24:02 +02:00
|
|
|
* @param num_coins number of fresh coins created, length of the @a sigs and @a coin_privs arrays, 0 if the operation failed
|
|
|
|
* @param coin_privs array of @a num_coins private keys for the coins that were created, NULL on error
|
|
|
|
* @param sigs array of signature over @a num_coins coins, NULL on error
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param full_response full response from the exchange (for logging, in case of errors)
|
2015-08-09 15:24:02 +02:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
reveal_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
|
|
|
unsigned int num_coins,
|
|
|
|
const struct TALER_CoinSpendPrivateKeyP *coin_privs,
|
|
|
|
const struct TALER_DenominationSignature *sigs,
|
2016-04-17 17:45:15 +02:00
|
|
|
const json_t *full_response)
|
2015-08-09 15:24:02 +02:00
|
|
|
{
|
|
|
|
struct InterpreterState *is = cls;
|
|
|
|
struct Command *cmd = &is->commands[is->ip];
|
2015-08-09 16:21:49 +02:00
|
|
|
const struct Command *ref;
|
2015-08-09 15:24:02 +02:00
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
cmd->details.refresh_reveal.rrh = NULL;
|
|
|
|
if (cmd->expected_response_code != http_status)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unexpected response code %u to command %s\n",
|
|
|
|
http_status,
|
|
|
|
cmd->label);
|
2015-08-14 15:19:50 +02:00
|
|
|
json_dumpf (full_response, stderr, 0);
|
2015-08-09 15:24:02 +02:00
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-08-09 16:21:49 +02:00
|
|
|
ref = find_command (is,
|
|
|
|
cmd->details.refresh_reveal.melt_ref);
|
2016-03-19 19:14:19 +01:00
|
|
|
GNUNET_assert (NULL != ref);
|
2015-08-09 15:24:02 +02:00
|
|
|
cmd->details.refresh_reveal.num_fresh_coins = num_coins;
|
2015-08-09 15:33:38 +02:00
|
|
|
switch (http_status)
|
|
|
|
{
|
|
|
|
case MHD_HTTP_OK:
|
2015-08-09 16:21:49 +02:00
|
|
|
cmd->details.refresh_reveal.fresh_coins
|
|
|
|
= GNUNET_new_array (num_coins,
|
|
|
|
struct FreshCoin);
|
|
|
|
for (i=0;i<num_coins;i++)
|
|
|
|
{
|
|
|
|
struct FreshCoin *fc = &cmd->details.refresh_reveal.fresh_coins[i];
|
|
|
|
|
|
|
|
fc->pk = ref->details.refresh_melt.fresh_pks[i];
|
|
|
|
fc->coin_priv = coin_privs[i];
|
|
|
|
fc->sig.rsa_signature
|
|
|
|
= GNUNET_CRYPTO_rsa_signature_dup (sigs[i].rsa_signature);
|
|
|
|
}
|
2015-08-09 15:33:38 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
is->ip++;
|
|
|
|
is->task = GNUNET_SCHEDULER_add_now (&interpreter_run,
|
|
|
|
is);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function called with the result of a /refresh/link operation.
|
|
|
|
*
|
|
|
|
* @param cls closure with the interpreter state
|
|
|
|
* @param http_status HTTP response code, #MHD_HTTP_OK (200) for successful status request
|
2016-03-01 15:35:04 +01:00
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
2015-08-09 15:33:38 +02:00
|
|
|
* @param num_coins number of fresh coins created, length of the @a sigs and @a coin_privs arrays, 0 if the operation failed
|
|
|
|
* @param coin_privs array of @a num_coins private keys for the coins that were created, NULL on error
|
|
|
|
* @param sigs array of signature over @a num_coins coins, NULL on error
|
|
|
|
* @param pubs array of public keys for the @a sigs, NULL on error
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param full_response full response from the exchange (for logging, in case of errors)
|
2015-08-09 15:33:38 +02:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
link_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
|
|
|
unsigned int num_coins,
|
|
|
|
const struct TALER_CoinSpendPrivateKeyP *coin_privs,
|
|
|
|
const struct TALER_DenominationSignature *sigs,
|
|
|
|
const struct TALER_DenominationPublicKey *pubs,
|
2016-04-17 17:45:15 +02:00
|
|
|
const json_t *full_response)
|
2015-08-09 15:33:38 +02:00
|
|
|
{
|
|
|
|
struct InterpreterState *is = cls;
|
|
|
|
struct Command *cmd = &is->commands[is->ip];
|
2015-08-09 16:34:40 +02:00
|
|
|
const struct Command *ref;
|
|
|
|
unsigned int i;
|
2015-08-18 12:24:51 +02:00
|
|
|
unsigned int j;
|
|
|
|
unsigned int found;
|
2015-08-09 15:33:38 +02:00
|
|
|
|
|
|
|
cmd->details.refresh_link.rlh = NULL;
|
|
|
|
if (cmd->expected_response_code != http_status)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unexpected response code %u to command %s\n",
|
|
|
|
http_status,
|
|
|
|
cmd->label);
|
2015-08-14 15:19:50 +02:00
|
|
|
json_dumpf (full_response, stderr, 0);
|
2015-08-09 15:33:38 +02:00
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-08-09 16:34:40 +02:00
|
|
|
ref = find_command (is,
|
|
|
|
cmd->details.refresh_link.reveal_ref);
|
2016-03-19 19:14:19 +01:00
|
|
|
GNUNET_assert (NULL != ref);
|
2015-08-09 15:33:38 +02:00
|
|
|
switch (http_status)
|
|
|
|
{
|
|
|
|
case MHD_HTTP_OK:
|
2015-08-09 16:34:40 +02:00
|
|
|
/* check that number of coins returned matches */
|
|
|
|
if (num_coins != ref->details.refresh_reveal.num_fresh_coins)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
/* check that the coins match */
|
|
|
|
for (i=0;i<num_coins;i++)
|
2015-08-18 12:24:51 +02:00
|
|
|
for (j=i+1;j<num_coins;j++)
|
|
|
|
if (0 == memcmp (&coin_privs[i],
|
|
|
|
&coin_privs[j],
|
|
|
|
sizeof (struct TALER_CoinSpendPrivateKeyP)))
|
|
|
|
GNUNET_break (0);
|
|
|
|
/* Note: coins might be legitimately permutated in here... */
|
|
|
|
found = 0;
|
|
|
|
for (i=0;i<num_coins;i++)
|
|
|
|
for (j=0;j<num_coins;j++)
|
2015-08-09 16:34:40 +02:00
|
|
|
{
|
2015-08-18 12:24:51 +02:00
|
|
|
const struct FreshCoin *fc;
|
2015-09-15 10:00:21 +02:00
|
|
|
|
2015-08-18 12:24:51 +02:00
|
|
|
fc = &ref->details.refresh_reveal.fresh_coins[j];
|
|
|
|
if ( (0 == memcmp (&coin_privs[i],
|
|
|
|
&fc->coin_priv,
|
|
|
|
sizeof (struct TALER_CoinSpendPrivateKeyP))) &&
|
|
|
|
(0 == GNUNET_CRYPTO_rsa_signature_cmp (fc->sig.rsa_signature,
|
|
|
|
sigs[i].rsa_signature)) &&
|
|
|
|
(0 == GNUNET_CRYPTO_rsa_public_key_cmp (fc->pk->key.rsa_public_key,
|
|
|
|
pubs[i].rsa_public_key)) )
|
|
|
|
{
|
|
|
|
found++;
|
|
|
|
break;
|
|
|
|
}
|
2015-08-09 16:34:40 +02:00
|
|
|
}
|
2015-08-18 12:24:51 +02:00
|
|
|
if (found != num_coins)
|
|
|
|
{
|
|
|
|
fprintf (stderr,
|
|
|
|
"Only %u/%u coins match expectations\n",
|
|
|
|
found,
|
|
|
|
num_coins);
|
|
|
|
GNUNET_break (0);
|
2015-09-15 10:00:21 +02:00
|
|
|
fail (is);
|
|
|
|
return;
|
2015-08-09 16:34:40 +02:00
|
|
|
}
|
2015-08-09 15:33:38 +02:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2015-08-09 15:24:02 +02:00
|
|
|
is->ip++;
|
|
|
|
is->task = GNUNET_SCHEDULER_add_now (&interpreter_run,
|
|
|
|
is);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-04 22:35:30 +02:00
|
|
|
/**
|
|
|
|
* Find denomination key matching the given amount.
|
|
|
|
*
|
|
|
|
* @param keys array of keys to search
|
|
|
|
* @param amount coin value to look for
|
|
|
|
* @return NULL if no matching key was found
|
|
|
|
*/
|
2016-03-01 15:35:04 +01:00
|
|
|
static const struct TALER_EXCHANGE_DenomPublicKey *
|
|
|
|
find_pk (const struct TALER_EXCHANGE_Keys *keys,
|
2015-07-04 22:35:30 +02:00
|
|
|
const struct TALER_Amount *amount)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
struct GNUNET_TIME_Absolute now;
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_DenomPublicKey *pk;
|
2015-07-04 22:35:30 +02:00
|
|
|
char *str;
|
|
|
|
|
|
|
|
now = GNUNET_TIME_absolute_get ();
|
|
|
|
for (i=0;i<keys->num_denom_keys;i++)
|
|
|
|
{
|
|
|
|
pk = &keys->denom_keys[i];
|
|
|
|
if ( (0 == TALER_amount_cmp (amount,
|
|
|
|
&pk->value)) &&
|
|
|
|
(now.abs_value_us >= pk->valid_from.abs_value_us) &&
|
|
|
|
(now.abs_value_us < pk->withdraw_valid_until.abs_value_us) )
|
|
|
|
return pk;
|
2015-07-05 11:54:14 +02:00
|
|
|
}
|
|
|
|
/* do 2nd pass to check if expiration times are to blame for failure */
|
|
|
|
str = TALER_amount_to_string (amount);
|
|
|
|
for (i=0;i<keys->num_denom_keys;i++)
|
|
|
|
{
|
2015-07-20 14:04:23 +02:00
|
|
|
pk = &keys->denom_keys[i];
|
2015-07-04 22:41:05 +02:00
|
|
|
if ( (0 == TALER_amount_cmp (amount,
|
|
|
|
&pk->value)) &&
|
|
|
|
( (now.abs_value_us < pk->valid_from.abs_value_us) ||
|
|
|
|
(now.abs_value_us > pk->withdraw_valid_until.abs_value_us) ) )
|
2015-07-05 11:54:14 +02:00
|
|
|
{
|
2015-07-04 22:41:05 +02:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
2015-07-05 11:54:14 +02:00
|
|
|
"Have denomination key for `%s', but with wrong expiration range %llu vs [%llu,%llu)\n",
|
|
|
|
str,
|
2015-07-04 22:41:05 +02:00
|
|
|
now.abs_value_us,
|
|
|
|
pk->valid_from.abs_value_us,
|
|
|
|
pk->withdraw_valid_until.abs_value_us);
|
2015-07-05 11:54:14 +02:00
|
|
|
GNUNET_free (str);
|
|
|
|
return NULL;
|
|
|
|
}
|
2015-07-04 22:35:30 +02:00
|
|
|
}
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"No denomination key for amount %s found\n",
|
|
|
|
str);
|
|
|
|
GNUNET_free (str);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-09-15 10:00:21 +02:00
|
|
|
/**
|
|
|
|
* Callbacks called with the result(s) of a
|
2016-03-01 15:35:04 +01:00
|
|
|
* wire format inquiry request to the exchange.
|
2015-09-15 10:00:21 +02:00
|
|
|
*
|
|
|
|
* @param cls closure with the interpreter state
|
|
|
|
* @param http_status HTTP response code, #MHD_HTTP_OK (200) for successful request;
|
2016-03-01 15:35:04 +01:00
|
|
|
* 0 if the exchange's reply is bogus (fails to follow the protocol)
|
2015-09-15 10:00:21 +02:00
|
|
|
* @param obj the received JSON reply, if successful this should be the wire
|
2016-04-01 16:15:35 +02:00
|
|
|
* format details as provided by /wire.
|
2015-09-15 10:00:21 +02:00
|
|
|
*/
|
|
|
|
static void
|
|
|
|
wire_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
2016-04-17 17:45:15 +02:00
|
|
|
const json_t *obj)
|
2015-09-15 10:00:21 +02:00
|
|
|
{
|
|
|
|
struct InterpreterState *is = cls;
|
|
|
|
struct Command *cmd = &is->commands[is->ip];
|
|
|
|
|
2016-04-01 17:32:10 +02:00
|
|
|
cmd->details.wire.wh = NULL;
|
2015-09-15 10:00:21 +02:00
|
|
|
if (cmd->expected_response_code != http_status)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
2016-04-01 16:15:35 +02:00
|
|
|
"Unexpected response code %u to command %s\n",
|
2015-09-15 10:00:21 +02:00
|
|
|
http_status,
|
2016-04-01 16:15:35 +02:00
|
|
|
cmd->label);
|
2015-09-15 10:00:21 +02:00
|
|
|
json_dumpf (obj, stderr, 0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2016-04-01 16:15:35 +02:00
|
|
|
switch (http_status)
|
2015-09-15 10:00:21 +02:00
|
|
|
{
|
2016-04-01 16:15:35 +02:00
|
|
|
case MHD_HTTP_OK:
|
|
|
|
{
|
|
|
|
json_t *method;
|
|
|
|
|
|
|
|
method = json_object_get (obj,
|
|
|
|
cmd->details.wire.format);
|
|
|
|
if (NULL == method)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Expected method `%s' not included in response to command %s\n",
|
|
|
|
cmd->details.wire.format,
|
|
|
|
cmd->label);
|
|
|
|
json_dumpf (obj, stderr, 0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
2015-09-15 10:00:21 +02:00
|
|
|
}
|
2016-04-01 16:15:35 +02:00
|
|
|
is->ip++;
|
|
|
|
is->task = GNUNET_SCHEDULER_add_now (&interpreter_run,
|
|
|
|
is);
|
2015-09-15 10:00:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-01-22 15:29:31 +01:00
|
|
|
/**
|
|
|
|
* Function called with detailed wire transfer data, including all
|
|
|
|
* of the coin transactions that were combined into the wire transfer.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param http_status HTTP status code we got, 0 on exchange protocol violation
|
2016-01-22 15:29:31 +01:00
|
|
|
* @param json original json reply (may include signatures, those have then been
|
|
|
|
* validated already)
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param wtid extracted wire transfer identifier, or NULL if the exchange could
|
2016-01-22 15:29:31 +01:00
|
|
|
* not provide any (set only if @a http_status is #MHD_HTTP_OK)
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param total_amount total amount of the wire transfer, or NULL if the exchange could
|
2016-01-22 15:29:31 +01:00
|
|
|
* not provide any @a wtid (set only if @a http_status is #MHD_HTTP_OK)
|
|
|
|
* @param details_length length of the @a details array
|
|
|
|
* @param details array with details about the combined transactions
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
wire_deposits_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
2016-04-17 17:45:15 +02:00
|
|
|
const json_t *json,
|
2016-01-22 15:29:31 +01:00
|
|
|
const struct GNUNET_HashCode *h_wire,
|
|
|
|
const struct TALER_Amount *total_amount,
|
|
|
|
unsigned int details_length,
|
|
|
|
const struct TALER_WireDepositDetails *details)
|
|
|
|
{
|
|
|
|
struct InterpreterState *is = cls;
|
|
|
|
struct Command *cmd = &is->commands[is->ip];
|
|
|
|
const struct Command *ref;
|
|
|
|
|
2016-01-22 15:50:45 +01:00
|
|
|
cmd->details.wire_deposits.wdh = NULL;
|
2016-01-22 15:29:31 +01:00
|
|
|
if (cmd->expected_response_code != http_status)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unexpected response code %u to command %s\n",
|
|
|
|
http_status,
|
|
|
|
cmd->label);
|
|
|
|
json_dumpf (json, stderr, 0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
switch (http_status)
|
|
|
|
{
|
|
|
|
case MHD_HTTP_OK:
|
2016-03-19 19:14:19 +01:00
|
|
|
ref = find_command (is,
|
|
|
|
cmd->details.wire_deposits.wtid_ref);
|
|
|
|
GNUNET_assert (NULL != ref);
|
2016-01-22 15:29:31 +01:00
|
|
|
if (0 != TALER_amount_cmp (total_amount,
|
|
|
|
&ref->details.deposit_wtid.total_amount_expected))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Total amount missmatch to command %s\n",
|
|
|
|
http_status,
|
|
|
|
cmd->label);
|
|
|
|
json_dumpf (json, stderr, 0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (NULL != ref->details.deposit_wtid.deposit_ref)
|
|
|
|
{
|
|
|
|
const struct Command *dep;
|
|
|
|
struct GNUNET_HashCode hw;
|
|
|
|
|
|
|
|
dep = find_command (is,
|
|
|
|
ref->details.deposit_wtid.deposit_ref);
|
2016-03-19 19:14:19 +01:00
|
|
|
GNUNET_assert (NULL != dep);
|
2016-01-22 15:29:31 +01:00
|
|
|
GNUNET_CRYPTO_hash (dep->details.deposit.wire_details,
|
|
|
|
strlen (dep->details.deposit.wire_details),
|
|
|
|
&hw);
|
|
|
|
if (0 != memcmp (&hw,
|
|
|
|
h_wire,
|
|
|
|
sizeof (struct GNUNET_HashCode)))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Wire hash missmatch to command %s\n",
|
|
|
|
cmd->label);
|
|
|
|
json_dumpf (json, stderr, 0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* move to next command */
|
|
|
|
is->ip++;
|
|
|
|
is->task = GNUNET_SCHEDULER_add_now (&interpreter_run,
|
|
|
|
is);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Function called with detailed wire transfer data.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param http_status HTTP status code we got, 0 on exchange protocol violation
|
2016-01-22 15:29:31 +01:00
|
|
|
* @param json original json reply (may include signatures, those have then been
|
|
|
|
* validated already)
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param wtid wire transfer identifier used by the exchange, NULL if exchange did not
|
2016-01-22 15:29:31 +01:00
|
|
|
* yet execute the transaction
|
|
|
|
* @param execution_time actual or planned execution time for the wire transfer
|
|
|
|
* @param coin_contribution contribution to the @a total_amount of the deposited coin (may be NULL)
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param total_amount total amount of the wire transfer, or NULL if the exchange could
|
2016-01-22 15:29:31 +01:00
|
|
|
* not provide any @a wtid (set only if @a http_status is #MHD_HTTP_OK)
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
deposit_wtid_cb (void *cls,
|
|
|
|
unsigned int http_status,
|
2016-04-17 17:45:15 +02:00
|
|
|
const json_t *json,
|
2016-01-22 15:29:31 +01:00
|
|
|
const struct TALER_WireTransferIdentifierRawP *wtid,
|
|
|
|
struct GNUNET_TIME_Absolute execution_time,
|
2016-02-07 15:02:49 +01:00
|
|
|
const struct TALER_Amount *coin_contribution)
|
2016-01-22 15:29:31 +01:00
|
|
|
{
|
|
|
|
struct InterpreterState *is = cls;
|
|
|
|
struct Command *cmd = &is->commands[is->ip];
|
|
|
|
|
2016-01-22 15:50:45 +01:00
|
|
|
cmd->details.deposit_wtid.dwh = NULL;
|
2016-01-22 15:29:31 +01:00
|
|
|
if (cmd->expected_response_code != http_status)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unexpected response code %u to command %s\n",
|
|
|
|
http_status,
|
|
|
|
cmd->label);
|
|
|
|
json_dumpf (json, stderr, 0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
switch (http_status)
|
|
|
|
{
|
|
|
|
case MHD_HTTP_OK:
|
|
|
|
cmd->details.deposit_wtid.wtid = *wtid;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* move to next command */
|
|
|
|
is->ip++;
|
|
|
|
is->task = GNUNET_SCHEDULER_add_now (&interpreter_run,
|
|
|
|
is);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-04 17:30:38 +02:00
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Run the main interpreter loop that performs exchange operations.
|
2015-07-04 17:30:38 +02:00
|
|
|
*
|
|
|
|
* @param cls contains the `struct InterpreterState`
|
|
|
|
*/
|
|
|
|
static void
|
2016-04-10 00:57:20 +02:00
|
|
|
interpreter_run (void *cls)
|
2015-07-04 17:30:38 +02:00
|
|
|
{
|
|
|
|
struct InterpreterState *is = cls;
|
2015-07-04 18:45:51 +02:00
|
|
|
struct Command *cmd = &is->commands[is->ip];
|
|
|
|
const struct Command *ref;
|
|
|
|
struct TALER_ReservePublicKeyP reserve_pub;
|
2015-07-04 22:35:30 +02:00
|
|
|
struct TALER_CoinSpendPublicKeyP coin_pub;
|
2015-07-04 18:45:51 +02:00
|
|
|
struct TALER_Amount amount;
|
2015-07-05 16:55:01 +02:00
|
|
|
struct GNUNET_TIME_Absolute execution_date;
|
2015-07-04 18:45:51 +02:00
|
|
|
json_t *wire;
|
2016-04-10 00:57:20 +02:00
|
|
|
const struct GNUNET_SCHEDULER_TaskContext *tc;
|
2015-07-04 17:30:38 +02:00
|
|
|
|
2015-07-04 20:47:39 +02:00
|
|
|
is->task = NULL;
|
2016-04-10 00:57:20 +02:00
|
|
|
tc = GNUNET_SCHEDULER_get_task_context ();
|
2015-07-04 17:30:38 +02:00
|
|
|
if (0 != (tc->reason & GNUNET_SCHEDULER_REASON_SHUTDOWN))
|
|
|
|
{
|
|
|
|
fprintf (stderr,
|
|
|
|
"Test aborted by shutdown request\n");
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
switch (cmd->oc)
|
|
|
|
{
|
|
|
|
case OC_END:
|
|
|
|
result = GNUNET_OK;
|
|
|
|
GNUNET_SCHEDULER_shutdown ();
|
|
|
|
return;
|
|
|
|
case OC_ADMIN_ADD_INCOMING:
|
2015-07-04 20:47:39 +02:00
|
|
|
if (NULL !=
|
|
|
|
cmd->details.admin_add_incoming.reserve_reference)
|
2015-07-04 18:45:51 +02:00
|
|
|
{
|
2015-07-04 20:47:39 +02:00
|
|
|
ref = find_command (is,
|
|
|
|
cmd->details.admin_add_incoming.reserve_reference);
|
|
|
|
GNUNET_assert (NULL != ref);
|
2015-07-04 18:45:51 +02:00
|
|
|
GNUNET_assert (OC_ADMIN_ADD_INCOMING == ref->oc);
|
|
|
|
cmd->details.admin_add_incoming.reserve_priv
|
|
|
|
= ref->details.admin_add_incoming.reserve_priv;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *priv;
|
|
|
|
|
|
|
|
priv = GNUNET_CRYPTO_eddsa_key_create ();
|
|
|
|
cmd->details.admin_add_incoming.reserve_priv.eddsa_priv = *priv;
|
|
|
|
GNUNET_free (priv);
|
|
|
|
}
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&cmd->details.admin_add_incoming.reserve_priv.eddsa_priv,
|
|
|
|
&reserve_pub.eddsa_pub);
|
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_string_to_amount (cmd->details.admin_add_incoming.amount,
|
|
|
|
&amount))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Failed to parse amount `%s' at %u\n",
|
|
|
|
cmd->details.admin_add_incoming.amount,
|
|
|
|
is->ip);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wire = json_loads (cmd->details.admin_add_incoming.wire,
|
|
|
|
JSON_REJECT_DUPLICATES,
|
|
|
|
NULL);
|
|
|
|
if (NULL == wire)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Failed to parse wire details `%s' at %u\n",
|
2015-07-04 20:47:39 +02:00
|
|
|
cmd->details.admin_add_incoming.wire,
|
2015-07-04 18:45:51 +02:00
|
|
|
is->ip);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-07-05 16:55:01 +02:00
|
|
|
execution_date = GNUNET_TIME_absolute_get ();
|
2016-03-19 15:23:11 +01:00
|
|
|
GNUNET_TIME_round_abs (&execution_date);
|
2015-07-04 18:45:51 +02:00
|
|
|
cmd->details.admin_add_incoming.aih
|
2016-03-01 15:35:04 +01:00
|
|
|
= TALER_EXCHANGE_admin_add_incoming (exchange,
|
2015-07-04 18:45:51 +02:00
|
|
|
&reserve_pub,
|
|
|
|
&amount,
|
2015-07-05 16:55:01 +02:00
|
|
|
execution_date,
|
2015-07-04 18:45:51 +02:00
|
|
|
wire,
|
|
|
|
&add_incoming_cb,
|
|
|
|
is);
|
2015-07-05 16:55:01 +02:00
|
|
|
if (NULL == cmd->details.admin_add_incoming.aih)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-07-04 18:45:51 +02:00
|
|
|
return;
|
2015-07-09 11:36:13 +02:00
|
|
|
case OC_WITHDRAW_STATUS:
|
|
|
|
GNUNET_assert (NULL !=
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_status.reserve_reference);
|
2015-07-09 11:36:13 +02:00
|
|
|
ref = find_command (is,
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_status.reserve_reference);
|
2015-07-09 11:36:13 +02:00
|
|
|
GNUNET_assert (NULL != ref);
|
|
|
|
GNUNET_assert (OC_ADMIN_ADD_INCOMING == ref->oc);
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&ref->details.admin_add_incoming.reserve_priv.eddsa_priv,
|
|
|
|
&reserve_pub.eddsa_pub);
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_status.wsh
|
2016-03-01 15:35:04 +01:00
|
|
|
= TALER_EXCHANGE_reserve_status (exchange,
|
2015-09-19 22:08:49 +02:00
|
|
|
&reserve_pub,
|
|
|
|
&reserve_status_cb,
|
|
|
|
is);
|
2015-07-09 11:36:13 +02:00
|
|
|
return;
|
2015-07-04 17:30:38 +02:00
|
|
|
case OC_WITHDRAW_SIGN:
|
2015-07-04 22:35:30 +02:00
|
|
|
GNUNET_assert (NULL !=
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_withdraw.reserve_reference);
|
2015-07-04 22:35:30 +02:00
|
|
|
ref = find_command (is,
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_withdraw.reserve_reference);
|
2015-07-04 22:35:30 +02:00
|
|
|
GNUNET_assert (NULL != ref);
|
|
|
|
GNUNET_assert (OC_ADMIN_ADD_INCOMING == ref->oc);
|
2015-09-19 22:08:49 +02:00
|
|
|
if (NULL != cmd->details.reserve_withdraw.amount)
|
2015-07-04 22:35:30 +02:00
|
|
|
{
|
|
|
|
if (GNUNET_OK !=
|
2015-09-19 22:08:49 +02:00
|
|
|
TALER_string_to_amount (cmd->details.reserve_withdraw.amount,
|
2015-07-04 22:35:30 +02:00
|
|
|
&amount))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Failed to parse amount `%s' at %u\n",
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_withdraw.amount,
|
2015-07-04 22:35:30 +02:00
|
|
|
is->ip);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_withdraw.pk = find_pk (is->keys,
|
|
|
|
&amount);
|
2015-07-04 22:35:30 +02:00
|
|
|
}
|
2015-09-19 22:08:49 +02:00
|
|
|
if (NULL == cmd->details.reserve_withdraw.pk)
|
2015-07-04 22:35:30 +02:00
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Failed to determine denomination key at %u\n",
|
|
|
|
is->ip);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* create coin's private key */
|
|
|
|
{
|
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *priv;
|
|
|
|
|
|
|
|
priv = GNUNET_CRYPTO_eddsa_key_create ();
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_withdraw.coin_priv.eddsa_priv = *priv;
|
2015-07-04 22:35:30 +02:00
|
|
|
GNUNET_free (priv);
|
|
|
|
}
|
2015-09-19 22:08:49 +02:00
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&cmd->details.reserve_withdraw.coin_priv.eddsa_priv,
|
2015-07-04 22:35:30 +02:00
|
|
|
&coin_pub.eddsa_pub);
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_withdraw.blinding_key.rsa_blinding_key
|
|
|
|
= GNUNET_CRYPTO_rsa_blinding_key_create (GNUNET_CRYPTO_rsa_public_key_len (cmd->details.reserve_withdraw.pk->key.rsa_public_key));
|
|
|
|
cmd->details.reserve_withdraw.wsh
|
2016-03-01 15:35:04 +01:00
|
|
|
= TALER_EXCHANGE_reserve_withdraw (exchange,
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_withdraw.pk,
|
|
|
|
&ref->details.admin_add_incoming.reserve_priv,
|
|
|
|
&cmd->details.reserve_withdraw.coin_priv,
|
|
|
|
&cmd->details.reserve_withdraw.blinding_key,
|
|
|
|
&reserve_withdraw_cb,
|
|
|
|
is);
|
|
|
|
if (NULL == cmd->details.reserve_withdraw.wsh)
|
2015-07-05 16:55:01 +02:00
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-07-04 22:35:30 +02:00
|
|
|
return;
|
2015-07-04 17:30:38 +02:00
|
|
|
case OC_DEPOSIT:
|
2015-07-05 14:32:26 +02:00
|
|
|
{
|
|
|
|
struct GNUNET_HashCode h_contract;
|
2015-08-09 16:29:32 +02:00
|
|
|
const struct TALER_CoinSpendPrivateKeyP *coin_priv;
|
2016-03-01 15:35:04 +01:00
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey *coin_pk;
|
2015-08-09 16:29:32 +02:00
|
|
|
const struct TALER_DenominationSignature *coin_pk_sig;
|
2015-07-05 14:32:26 +02:00
|
|
|
struct TALER_CoinSpendPublicKeyP coin_pub;
|
|
|
|
struct TALER_CoinSpendSignatureP coin_sig;
|
|
|
|
struct GNUNET_TIME_Absolute refund_deadline;
|
2015-10-28 21:06:23 +01:00
|
|
|
struct GNUNET_TIME_Absolute wire_deadline;
|
2015-07-05 14:32:26 +02:00
|
|
|
struct GNUNET_TIME_Absolute timestamp;
|
2016-01-22 17:21:42 +01:00
|
|
|
struct GNUNET_CRYPTO_EddsaPrivateKey *priv;
|
2015-07-05 14:32:26 +02:00
|
|
|
struct TALER_MerchantPublicKeyP merchant_pub;
|
2016-01-22 17:21:42 +01:00
|
|
|
json_t *contract;
|
2015-07-05 14:32:26 +02:00
|
|
|
json_t *wire;
|
|
|
|
|
|
|
|
GNUNET_assert (NULL !=
|
|
|
|
cmd->details.deposit.coin_ref);
|
|
|
|
ref = find_command (is,
|
|
|
|
cmd->details.deposit.coin_ref);
|
|
|
|
GNUNET_assert (NULL != ref);
|
2015-08-09 16:29:32 +02:00
|
|
|
switch (ref->oc)
|
|
|
|
{
|
|
|
|
case OC_WITHDRAW_SIGN:
|
2015-09-19 22:08:49 +02:00
|
|
|
coin_priv = &ref->details.reserve_withdraw.coin_priv;
|
|
|
|
coin_pk = ref->details.reserve_withdraw.pk;
|
|
|
|
coin_pk_sig = &ref->details.reserve_withdraw.sig;
|
2015-08-09 16:29:32 +02:00
|
|
|
break;
|
|
|
|
case OC_REFRESH_REVEAL:
|
|
|
|
{
|
|
|
|
const struct FreshCoin *fc;
|
|
|
|
unsigned int idx;
|
|
|
|
|
|
|
|
idx = cmd->details.deposit.coin_idx;
|
|
|
|
GNUNET_assert (idx < ref->details.refresh_reveal.num_fresh_coins);
|
|
|
|
fc = &ref->details.refresh_reveal.fresh_coins[idx];
|
|
|
|
|
|
|
|
coin_priv = &fc->coin_priv;
|
|
|
|
coin_pk = fc->pk;
|
|
|
|
coin_pk_sig = &fc->sig;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
GNUNET_assert (0);
|
|
|
|
}
|
2015-07-05 14:32:26 +02:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_string_to_amount (cmd->details.deposit.amount,
|
|
|
|
&amount))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Failed to parse amount `%s' at %u\n",
|
|
|
|
cmd->details.deposit.amount,
|
|
|
|
is->ip);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2016-01-22 17:21:42 +01:00
|
|
|
contract = json_loads (cmd->details.deposit.contract,
|
|
|
|
JSON_REJECT_DUPLICATES,
|
|
|
|
NULL);
|
|
|
|
if (NULL == contract)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Failed to parse contract details `%s' at %u/%s\n",
|
|
|
|
cmd->details.deposit.contract,
|
|
|
|
is->ip,
|
|
|
|
cmd->label);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2016-03-19 15:23:11 +01:00
|
|
|
TALER_JSON_hash (contract,
|
2016-01-22 17:21:42 +01:00
|
|
|
&h_contract);
|
2015-07-05 14:32:26 +02:00
|
|
|
wire = json_loads (cmd->details.deposit.wire_details,
|
|
|
|
JSON_REJECT_DUPLICATES,
|
|
|
|
NULL);
|
|
|
|
if (NULL == wire)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
2016-01-22 17:21:42 +01:00
|
|
|
"Failed to parse wire details `%s' at %u/%s\n",
|
2015-07-05 14:32:26 +02:00
|
|
|
cmd->details.deposit.wire_details,
|
2016-01-22 17:21:42 +01:00
|
|
|
is->ip,
|
|
|
|
cmd->label);
|
2015-07-05 14:32:26 +02:00
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-08-09 16:29:32 +02:00
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&coin_priv->eddsa_priv,
|
2015-07-05 14:32:26 +02:00
|
|
|
&coin_pub.eddsa_pub);
|
|
|
|
|
2016-01-22 17:21:42 +01:00
|
|
|
priv = GNUNET_CRYPTO_eddsa_key_create ();
|
|
|
|
cmd->details.deposit.merchant_priv.eddsa_priv = *priv;
|
|
|
|
GNUNET_free (priv);
|
2015-07-05 14:32:26 +02:00
|
|
|
if (0 != cmd->details.deposit.refund_deadline.rel_value_us)
|
|
|
|
{
|
|
|
|
refund_deadline = GNUNET_TIME_relative_to_absolute (cmd->details.deposit.refund_deadline);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
refund_deadline = GNUNET_TIME_UNIT_ZERO_ABS;
|
|
|
|
}
|
2016-01-22 17:21:42 +01:00
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&cmd->details.deposit.merchant_priv.eddsa_priv,
|
|
|
|
&merchant_pub.eddsa_pub);
|
|
|
|
|
2015-10-28 21:06:23 +01:00
|
|
|
wire_deadline = GNUNET_TIME_relative_to_absolute (GNUNET_TIME_UNIT_DAYS);
|
2015-07-05 14:32:26 +02:00
|
|
|
timestamp = GNUNET_TIME_absolute_get ();
|
2016-03-19 15:23:11 +01:00
|
|
|
GNUNET_TIME_round_abs (×tamp);
|
2015-07-05 16:55:01 +02:00
|
|
|
{
|
|
|
|
struct TALER_DepositRequestPS dr;
|
|
|
|
|
2015-09-15 17:27:02 +02:00
|
|
|
memset (&dr, 0, sizeof (dr));
|
2015-07-05 16:55:01 +02:00
|
|
|
dr.purpose.size = htonl (sizeof (struct TALER_DepositRequestPS));
|
|
|
|
dr.purpose.purpose = htonl (TALER_SIGNATURE_WALLET_COIN_DEPOSIT);
|
|
|
|
dr.h_contract = h_contract;
|
2016-03-19 15:23:11 +01:00
|
|
|
TALER_JSON_hash (wire,
|
2015-07-05 16:55:01 +02:00
|
|
|
&dr.h_wire);
|
|
|
|
dr.timestamp = GNUNET_TIME_absolute_hton (timestamp);
|
|
|
|
dr.refund_deadline = GNUNET_TIME_absolute_hton (refund_deadline);
|
|
|
|
dr.transaction_id = GNUNET_htonll (cmd->details.deposit.transaction_id);
|
|
|
|
TALER_amount_hton (&dr.amount_with_fee,
|
|
|
|
&amount);
|
|
|
|
TALER_amount_hton (&dr.deposit_fee,
|
2015-08-09 16:29:32 +02:00
|
|
|
&coin_pk->fee_deposit);
|
2015-07-05 16:55:01 +02:00
|
|
|
dr.merchant = merchant_pub;
|
|
|
|
dr.coin_pub = coin_pub;
|
|
|
|
GNUNET_assert (GNUNET_OK ==
|
2015-08-09 16:29:32 +02:00
|
|
|
GNUNET_CRYPTO_eddsa_sign (&coin_priv->eddsa_priv,
|
2015-07-05 16:55:01 +02:00
|
|
|
&dr.purpose,
|
|
|
|
&coin_sig.eddsa_signature));
|
|
|
|
}
|
2015-07-05 14:32:26 +02:00
|
|
|
cmd->details.deposit.dh
|
2016-03-01 15:35:04 +01:00
|
|
|
= TALER_EXCHANGE_deposit (exchange,
|
2015-07-05 14:32:26 +02:00
|
|
|
&amount,
|
2015-10-28 21:06:23 +01:00
|
|
|
wire_deadline,
|
2015-07-05 14:32:26 +02:00
|
|
|
wire,
|
|
|
|
&h_contract,
|
|
|
|
&coin_pub,
|
2015-08-09 16:29:32 +02:00
|
|
|
coin_pk_sig,
|
|
|
|
&coin_pk->key,
|
2015-07-05 14:32:26 +02:00
|
|
|
timestamp,
|
|
|
|
cmd->details.deposit.transaction_id,
|
|
|
|
&merchant_pub,
|
|
|
|
refund_deadline,
|
|
|
|
&coin_sig,
|
|
|
|
&deposit_cb,
|
|
|
|
is);
|
|
|
|
if (NULL == cmd->details.deposit.dh)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
json_decref (wire);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-12-20 13:00:06 +01:00
|
|
|
json_decref (wire);
|
2015-07-05 14:32:26 +02:00
|
|
|
return;
|
|
|
|
}
|
2015-08-08 23:21:00 +02:00
|
|
|
case OC_REFRESH_MELT:
|
2015-08-09 14:55:38 +02:00
|
|
|
{
|
|
|
|
unsigned int num_melted_coins;
|
|
|
|
unsigned int num_fresh_coins;
|
|
|
|
|
|
|
|
cmd->details.refresh_melt.noreveal_index = UINT16_MAX;
|
|
|
|
for (num_melted_coins=0;
|
2015-08-09 15:24:02 +02:00
|
|
|
NULL != cmd->details.refresh_melt.melted_coins[num_melted_coins].amount;
|
2015-08-09 14:55:38 +02:00
|
|
|
num_melted_coins++) ;
|
|
|
|
for (num_fresh_coins=0;
|
|
|
|
NULL != cmd->details.refresh_melt.fresh_amounts[num_fresh_coins];
|
|
|
|
num_fresh_coins++) ;
|
|
|
|
|
2015-08-09 16:21:49 +02:00
|
|
|
cmd->details.refresh_melt.fresh_pks
|
|
|
|
= GNUNET_new_array (num_fresh_coins,
|
2016-03-01 15:35:04 +01:00
|
|
|
const struct TALER_EXCHANGE_DenomPublicKey *);
|
2015-08-09 14:55:38 +02:00
|
|
|
{
|
|
|
|
struct TALER_CoinSpendPrivateKeyP melt_privs[num_melted_coins];
|
|
|
|
struct TALER_Amount melt_amounts[num_melted_coins];
|
|
|
|
struct TALER_DenominationSignature melt_sigs[num_melted_coins];
|
2016-03-01 15:35:04 +01:00
|
|
|
struct TALER_EXCHANGE_DenomPublicKey melt_pks[num_melted_coins];
|
|
|
|
struct TALER_EXCHANGE_DenomPublicKey fresh_pks[num_fresh_coins];
|
2015-08-09 14:55:38 +02:00
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
for (i=0;i<num_melted_coins;i++)
|
|
|
|
{
|
|
|
|
const struct MeltDetails *md = &cmd->details.refresh_melt.melted_coins[i];
|
|
|
|
ref = find_command (is,
|
|
|
|
md->coin_ref);
|
|
|
|
GNUNET_assert (NULL != ref);
|
2015-08-09 15:24:02 +02:00
|
|
|
GNUNET_assert (OC_WITHDRAW_SIGN == ref->oc);
|
2015-08-09 14:55:38 +02:00
|
|
|
|
2015-09-19 22:08:49 +02:00
|
|
|
melt_privs[i] = ref->details.reserve_withdraw.coin_priv;
|
2015-08-09 14:55:38 +02:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_string_to_amount (md->amount,
|
|
|
|
&melt_amounts[i]))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Failed to parse amount `%s' at %u\n",
|
|
|
|
md->amount,
|
|
|
|
is->ip);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-09-19 22:08:49 +02:00
|
|
|
melt_sigs[i] = ref->details.reserve_withdraw.sig;
|
|
|
|
melt_pks[i] = *ref->details.reserve_withdraw.pk;
|
2015-08-09 14:55:38 +02:00
|
|
|
}
|
|
|
|
for (i=0;i<num_fresh_coins;i++)
|
|
|
|
{
|
2015-08-09 15:24:02 +02:00
|
|
|
if (GNUNET_OK !=
|
|
|
|
TALER_string_to_amount (cmd->details.refresh_melt.fresh_amounts[i],
|
|
|
|
&amount))
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Failed to parse amount `%s' at %u\n",
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_withdraw.amount,
|
2015-08-09 15:24:02 +02:00
|
|
|
is->ip);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
2015-08-09 16:21:49 +02:00
|
|
|
cmd->details.refresh_melt.fresh_pks[i]
|
|
|
|
= find_pk (is->keys,
|
|
|
|
&amount);
|
|
|
|
fresh_pks[i] = *cmd->details.refresh_melt.fresh_pks[i];
|
2015-08-09 14:55:38 +02:00
|
|
|
}
|
|
|
|
cmd->details.refresh_melt.refresh_data
|
2016-03-01 15:35:04 +01:00
|
|
|
= TALER_EXCHANGE_refresh_prepare (num_melted_coins,
|
2015-08-09 14:55:38 +02:00
|
|
|
melt_privs,
|
|
|
|
melt_amounts,
|
|
|
|
melt_sigs,
|
|
|
|
melt_pks,
|
|
|
|
GNUNET_YES,
|
|
|
|
num_fresh_coins,
|
|
|
|
fresh_pks,
|
|
|
|
&cmd->details.refresh_melt.refresh_data_length);
|
|
|
|
if (NULL == cmd->details.refresh_melt.refresh_data)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
cmd->details.refresh_melt.rmh
|
2016-03-01 15:35:04 +01:00
|
|
|
= TALER_EXCHANGE_refresh_melt (exchange,
|
2015-08-09 15:24:02 +02:00
|
|
|
cmd->details.refresh_melt.refresh_data_length,
|
|
|
|
cmd->details.refresh_melt.refresh_data,
|
|
|
|
&melt_cb,
|
|
|
|
is);
|
2015-08-09 14:55:38 +02:00
|
|
|
if (NULL == cmd->details.refresh_melt.rmh)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-08-09 15:33:38 +02:00
|
|
|
return;
|
2015-08-08 23:21:00 +02:00
|
|
|
case OC_REFRESH_REVEAL:
|
2015-08-09 15:24:02 +02:00
|
|
|
ref = find_command (is,
|
|
|
|
cmd->details.refresh_reveal.melt_ref);
|
2016-03-19 19:14:19 +01:00
|
|
|
GNUNET_assert (NULL != ref);
|
2015-08-09 15:24:02 +02:00
|
|
|
cmd->details.refresh_reveal.rrh
|
2016-03-01 15:35:04 +01:00
|
|
|
= TALER_EXCHANGE_refresh_reveal (exchange,
|
2016-03-19 19:14:19 +01:00
|
|
|
ref->details.refresh_melt.refresh_data_length,
|
|
|
|
ref->details.refresh_melt.refresh_data,
|
|
|
|
ref->details.refresh_melt.noreveal_index,
|
|
|
|
&reveal_cb,
|
|
|
|
is);
|
2015-08-09 15:24:02 +02:00
|
|
|
if (NULL == cmd->details.refresh_reveal.rrh)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
return;
|
2015-08-08 23:21:00 +02:00
|
|
|
case OC_REFRESH_LINK:
|
2015-08-09 15:33:38 +02:00
|
|
|
/* find reveal command */
|
|
|
|
ref = find_command (is,
|
|
|
|
cmd->details.refresh_link.reveal_ref);
|
2016-03-19 19:14:19 +01:00
|
|
|
GNUNET_assert (NULL != ref);
|
2015-08-09 15:33:38 +02:00
|
|
|
/* find melt command */
|
|
|
|
ref = find_command (is,
|
|
|
|
ref->details.refresh_reveal.melt_ref);
|
2016-03-19 19:14:19 +01:00
|
|
|
GNUNET_assert (NULL != ref);
|
2015-09-19 22:08:49 +02:00
|
|
|
/* find reserve_withdraw command */
|
2015-08-09 15:33:38 +02:00
|
|
|
{
|
|
|
|
unsigned int idx;
|
|
|
|
const struct MeltDetails *md;
|
|
|
|
unsigned int num_melted_coins;
|
|
|
|
|
|
|
|
for (num_melted_coins=0;
|
|
|
|
NULL != ref->details.refresh_melt.melted_coins[num_melted_coins].amount;
|
|
|
|
num_melted_coins++) ;
|
|
|
|
idx = cmd->details.refresh_link.coin_idx;
|
|
|
|
GNUNET_assert (idx < num_melted_coins);
|
|
|
|
md = &ref->details.refresh_melt.melted_coins[idx];
|
|
|
|
ref = find_command (is,
|
|
|
|
md->coin_ref);
|
2016-03-19 19:14:19 +01:00
|
|
|
GNUNET_assert (NULL != ref);
|
2015-08-09 15:33:38 +02:00
|
|
|
}
|
2015-08-14 23:09:34 +02:00
|
|
|
GNUNET_assert (OC_WITHDRAW_SIGN == ref->oc);
|
2015-08-09 15:33:38 +02:00
|
|
|
/* finally, use private key from withdraw sign command */
|
|
|
|
cmd->details.refresh_link.rlh
|
2016-03-01 15:35:04 +01:00
|
|
|
= TALER_EXCHANGE_refresh_link (exchange,
|
2016-04-01 16:15:35 +02:00
|
|
|
&ref->details.reserve_withdraw.coin_priv,
|
|
|
|
&link_cb,
|
|
|
|
is);
|
2015-08-09 15:33:38 +02:00
|
|
|
if (NULL == cmd->details.refresh_link.rlh)
|
|
|
|
{
|
|
|
|
GNUNET_break (0);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
return;
|
2015-09-15 10:00:21 +02:00
|
|
|
case OC_WIRE:
|
2016-03-01 15:35:04 +01:00
|
|
|
cmd->details.wire.wh = TALER_EXCHANGE_wire (exchange,
|
2016-04-01 16:15:35 +02:00
|
|
|
&wire_cb,
|
|
|
|
is);
|
2015-09-15 10:00:21 +02:00
|
|
|
return;
|
2016-01-22 15:29:31 +01:00
|
|
|
case OC_WIRE_DEPOSITS:
|
|
|
|
if (NULL != cmd->details.wire_deposits.wtid_ref)
|
|
|
|
{
|
|
|
|
ref = find_command (is,
|
|
|
|
cmd->details.wire_deposits.wtid_ref);
|
|
|
|
GNUNET_assert (NULL != ref);
|
|
|
|
cmd->details.wire_deposits.wtid = ref->details.deposit_wtid.wtid;
|
|
|
|
}
|
|
|
|
cmd->details.wire_deposits.wdh
|
2016-03-01 15:35:04 +01:00
|
|
|
= TALER_EXCHANGE_wire_deposits (exchange,
|
2016-04-01 16:15:35 +02:00
|
|
|
&cmd->details.wire_deposits.wtid,
|
|
|
|
&wire_deposits_cb,
|
|
|
|
is);
|
2016-01-22 15:29:31 +01:00
|
|
|
return;
|
|
|
|
case OC_DEPOSIT_WTID:
|
|
|
|
{
|
|
|
|
struct GNUNET_HashCode h_wire;
|
|
|
|
struct GNUNET_HashCode h_contract;
|
|
|
|
json_t *wire;
|
|
|
|
json_t *contract;
|
|
|
|
const struct Command *coin;
|
|
|
|
struct TALER_CoinSpendPublicKeyP coin_pub;
|
|
|
|
|
|
|
|
ref = find_command (is,
|
|
|
|
cmd->details.deposit_wtid.deposit_ref);
|
|
|
|
GNUNET_assert (NULL != ref);
|
|
|
|
coin = find_command (is,
|
|
|
|
ref->details.deposit.coin_ref);
|
|
|
|
GNUNET_assert (NULL != coin);
|
|
|
|
switch (coin->oc)
|
|
|
|
{
|
|
|
|
case OC_WITHDRAW_SIGN:
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&coin->details.reserve_withdraw.coin_priv.eddsa_priv,
|
|
|
|
&coin_pub.eddsa_pub);
|
|
|
|
break;
|
|
|
|
case OC_REFRESH_REVEAL:
|
|
|
|
{
|
|
|
|
const struct FreshCoin *fc;
|
|
|
|
unsigned int idx;
|
|
|
|
|
|
|
|
idx = ref->details.deposit.coin_idx;
|
|
|
|
GNUNET_assert (idx < coin->details.refresh_reveal.num_fresh_coins);
|
|
|
|
fc = &coin->details.refresh_reveal.fresh_coins[idx];
|
|
|
|
|
|
|
|
GNUNET_CRYPTO_eddsa_key_get_public (&fc->coin_priv.eddsa_priv,
|
|
|
|
&coin_pub.eddsa_pub);
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
GNUNET_assert (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
wire = json_loads (ref->details.deposit.wire_details,
|
|
|
|
JSON_REJECT_DUPLICATES,
|
|
|
|
NULL);
|
|
|
|
GNUNET_assert (NULL != wire);
|
2016-03-19 15:23:11 +01:00
|
|
|
TALER_JSON_hash (wire,
|
2016-01-22 15:29:31 +01:00
|
|
|
&h_wire);
|
|
|
|
json_decref (wire);
|
|
|
|
contract = json_loads (ref->details.deposit.contract,
|
|
|
|
JSON_REJECT_DUPLICATES,
|
|
|
|
NULL);
|
|
|
|
GNUNET_assert (NULL != contract);
|
2016-03-19 15:23:11 +01:00
|
|
|
TALER_JSON_hash (contract,
|
2016-01-22 15:29:31 +01:00
|
|
|
&h_contract);
|
|
|
|
json_decref (contract);
|
|
|
|
cmd->details.deposit_wtid.dwh
|
2016-03-01 15:35:04 +01:00
|
|
|
= TALER_EXCHANGE_deposit_wtid (exchange,
|
2016-01-22 15:29:31 +01:00
|
|
|
&ref->details.deposit.merchant_priv,
|
|
|
|
&h_wire,
|
|
|
|
&h_contract,
|
|
|
|
&coin_pub,
|
|
|
|
ref->details.deposit.transaction_id,
|
|
|
|
&deposit_wtid_cb,
|
|
|
|
is);
|
|
|
|
}
|
|
|
|
return;
|
2015-07-04 17:30:38 +02:00
|
|
|
default:
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unknown instruction %d at %u (%s)\n",
|
|
|
|
cmd->oc,
|
2015-07-04 20:47:39 +02:00
|
|
|
is->ip,
|
2015-07-04 17:30:38 +02:00
|
|
|
cmd->label);
|
|
|
|
fail (is);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-05-02 02:33:14 +02:00
|
|
|
/**
|
|
|
|
* Function run when the test terminates (good or bad) with timeout.
|
|
|
|
*
|
|
|
|
* @param cls NULL
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
do_timeout (void *cls)
|
|
|
|
{
|
|
|
|
timeout_task = NULL;
|
|
|
|
GNUNET_SCHEDULER_shutdown ();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-18 11:39:53 +02:00
|
|
|
/**
|
|
|
|
* Function run when the test terminates (good or bad).
|
|
|
|
* Cleans up our state.
|
|
|
|
*
|
2015-07-04 20:47:39 +02:00
|
|
|
* @param cls the interpreter state.
|
2015-06-18 11:39:53 +02:00
|
|
|
*/
|
2015-01-08 18:37:20 +01:00
|
|
|
static void
|
2016-04-10 00:57:20 +02:00
|
|
|
do_shutdown (void *cls)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-07-04 20:47:39 +02:00
|
|
|
struct InterpreterState *is = cls;
|
|
|
|
struct Command *cmd;
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
for (i=0;OC_END != (cmd = &is->commands[i])->oc;i++)
|
|
|
|
{
|
|
|
|
switch (cmd->oc)
|
|
|
|
{
|
|
|
|
case OC_END:
|
|
|
|
GNUNET_assert (0);
|
|
|
|
break;
|
|
|
|
case OC_ADMIN_ADD_INCOMING:
|
|
|
|
if (NULL != cmd->details.admin_add_incoming.aih)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command %u (%s) did not complete\n",
|
|
|
|
i,
|
|
|
|
cmd->label);
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGE_admin_add_incoming_cancel (cmd->details.admin_add_incoming.aih);
|
2015-07-04 20:47:39 +02:00
|
|
|
cmd->details.admin_add_incoming.aih = NULL;
|
|
|
|
}
|
|
|
|
break;
|
2015-07-09 11:36:13 +02:00
|
|
|
case OC_WITHDRAW_STATUS:
|
2015-09-19 22:08:49 +02:00
|
|
|
if (NULL != cmd->details.reserve_status.wsh)
|
2015-07-09 11:36:13 +02:00
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command %u (%s) did not complete\n",
|
|
|
|
i,
|
|
|
|
cmd->label);
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGE_reserve_status_cancel (cmd->details.reserve_status.wsh);
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_status.wsh = NULL;
|
2015-07-09 11:36:13 +02:00
|
|
|
}
|
|
|
|
break;
|
2015-07-04 20:47:39 +02:00
|
|
|
case OC_WITHDRAW_SIGN:
|
2015-09-19 22:08:49 +02:00
|
|
|
if (NULL != cmd->details.reserve_withdraw.wsh)
|
2015-07-04 22:00:29 +02:00
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command %u (%s) did not complete\n",
|
|
|
|
i,
|
|
|
|
cmd->label);
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGE_reserve_withdraw_cancel (cmd->details.reserve_withdraw.wsh);
|
2015-09-19 22:08:49 +02:00
|
|
|
cmd->details.reserve_withdraw.wsh = NULL;
|
2015-07-04 22:00:29 +02:00
|
|
|
}
|
2015-09-19 22:08:49 +02:00
|
|
|
if (NULL != cmd->details.reserve_withdraw.sig.rsa_signature)
|
2015-07-04 22:35:30 +02:00
|
|
|
{
|
2015-09-19 22:08:49 +02:00
|
|
|
GNUNET_CRYPTO_rsa_signature_free (cmd->details.reserve_withdraw.sig.rsa_signature);
|
|
|
|
cmd->details.reserve_withdraw.sig.rsa_signature = NULL;
|
2015-07-04 22:35:30 +02:00
|
|
|
}
|
2015-09-19 22:08:49 +02:00
|
|
|
if (NULL != cmd->details.reserve_withdraw.blinding_key.rsa_blinding_key)
|
2015-07-04 22:35:30 +02:00
|
|
|
{
|
2015-09-19 22:08:49 +02:00
|
|
|
GNUNET_CRYPTO_rsa_blinding_key_free (cmd->details.reserve_withdraw.blinding_key.rsa_blinding_key);
|
|
|
|
cmd->details.reserve_withdraw.blinding_key.rsa_blinding_key = NULL;
|
2015-07-04 22:35:30 +02:00
|
|
|
}
|
2015-07-04 20:47:39 +02:00
|
|
|
break;
|
|
|
|
case OC_DEPOSIT:
|
2015-07-04 22:00:29 +02:00
|
|
|
if (NULL != cmd->details.deposit.dh)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command %u (%s) did not complete\n",
|
|
|
|
i,
|
|
|
|
cmd->label);
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGE_deposit_cancel (cmd->details.deposit.dh);
|
2015-07-04 22:00:29 +02:00
|
|
|
cmd->details.deposit.dh = NULL;
|
|
|
|
}
|
2015-07-04 20:47:39 +02:00
|
|
|
break;
|
2015-08-09 14:55:38 +02:00
|
|
|
case OC_REFRESH_MELT:
|
|
|
|
if (NULL != cmd->details.refresh_melt.rmh)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command %u (%s) did not complete\n",
|
|
|
|
i,
|
|
|
|
cmd->label);
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGE_refresh_melt_cancel (cmd->details.refresh_melt.rmh);
|
2015-08-09 14:55:38 +02:00
|
|
|
cmd->details.refresh_melt.rmh = NULL;
|
|
|
|
}
|
2015-08-09 16:21:49 +02:00
|
|
|
GNUNET_free_non_null (cmd->details.refresh_melt.fresh_pks);
|
|
|
|
cmd->details.refresh_melt.fresh_pks = NULL;
|
2015-08-09 14:55:38 +02:00
|
|
|
GNUNET_free_non_null (cmd->details.refresh_melt.refresh_data);
|
|
|
|
cmd->details.refresh_melt.refresh_data = NULL;
|
|
|
|
cmd->details.refresh_melt.refresh_data_length = 0;
|
|
|
|
break;
|
|
|
|
case OC_REFRESH_REVEAL:
|
|
|
|
if (NULL != cmd->details.refresh_reveal.rrh)
|
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command %u (%s) did not complete\n",
|
|
|
|
i,
|
|
|
|
cmd->label);
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGE_refresh_reveal_cancel (cmd->details.refresh_reveal.rrh);
|
2015-08-09 14:55:38 +02:00
|
|
|
cmd->details.refresh_reveal.rrh = NULL;
|
|
|
|
}
|
2015-08-09 16:21:49 +02:00
|
|
|
{
|
|
|
|
unsigned int j;
|
|
|
|
struct FreshCoin *fresh_coins;
|
|
|
|
|
|
|
|
fresh_coins = cmd->details.refresh_reveal.fresh_coins;
|
|
|
|
for (j=0;j<cmd->details.refresh_reveal.num_fresh_coins;j++)
|
|
|
|
GNUNET_CRYPTO_rsa_signature_free (fresh_coins[j].sig.rsa_signature);
|
|
|
|
}
|
|
|
|
GNUNET_free_non_null (cmd->details.refresh_reveal.fresh_coins);
|
|
|
|
cmd->details.refresh_reveal.fresh_coins = NULL;
|
|
|
|
cmd->details.refresh_reveal.num_fresh_coins = 0;
|
2015-08-09 14:55:38 +02:00
|
|
|
break;
|
|
|
|
case OC_REFRESH_LINK:
|
2015-08-09 15:24:02 +02:00
|
|
|
if (NULL != cmd->details.refresh_link.rlh)
|
2015-08-09 14:55:38 +02:00
|
|
|
{
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command %u (%s) did not complete\n",
|
|
|
|
i,
|
|
|
|
cmd->label);
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGE_refresh_link_cancel (cmd->details.refresh_link.rlh);
|
2015-08-09 14:55:38 +02:00
|
|
|
cmd->details.refresh_link.rlh = NULL;
|
|
|
|
}
|
|
|
|
break;
|
2015-09-15 10:00:21 +02:00
|
|
|
case OC_WIRE:
|
|
|
|
if (NULL != cmd->details.wire.wh)
|
|
|
|
{
|
2016-01-22 17:21:42 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command %u (%s) did not complete\n",
|
|
|
|
i,
|
|
|
|
cmd->label);
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGE_wire_cancel (cmd->details.wire.wh);
|
2015-09-15 10:00:21 +02:00
|
|
|
cmd->details.wire.wh = NULL;
|
|
|
|
}
|
|
|
|
break;
|
2016-01-22 15:29:31 +01:00
|
|
|
case OC_WIRE_DEPOSITS:
|
|
|
|
if (NULL != cmd->details.wire_deposits.wdh)
|
|
|
|
{
|
2016-01-22 17:21:42 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command %u (%s) did not complete\n",
|
|
|
|
i,
|
|
|
|
cmd->label);
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGE_wire_deposits_cancel (cmd->details.wire_deposits.wdh);
|
2016-01-22 15:29:31 +01:00
|
|
|
cmd->details.wire_deposits.wdh = NULL;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case OC_DEPOSIT_WTID:
|
|
|
|
if (NULL != cmd->details.deposit_wtid.dwh)
|
|
|
|
{
|
2016-01-22 17:21:42 +01:00
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
|
|
|
"Command %u (%s) did not complete\n",
|
|
|
|
i,
|
|
|
|
cmd->label);
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGE_deposit_wtid_cancel (cmd->details.deposit_wtid.dwh);
|
2016-01-22 15:29:31 +01:00
|
|
|
cmd->details.deposit_wtid.dwh = NULL;
|
|
|
|
}
|
|
|
|
break;
|
2015-07-04 20:47:39 +02:00
|
|
|
default:
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
|
|
|
"Unknown instruction %d at %u (%s)\n",
|
|
|
|
cmd->oc,
|
|
|
|
i,
|
|
|
|
cmd->label);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (NULL != is->task)
|
|
|
|
{
|
|
|
|
GNUNET_SCHEDULER_cancel (is->task);
|
|
|
|
is->task = NULL;
|
|
|
|
}
|
|
|
|
GNUNET_free (is);
|
2016-03-01 15:35:04 +01:00
|
|
|
if (NULL != exchange)
|
2015-06-18 01:17:01 +02:00
|
|
|
{
|
2016-03-01 15:35:04 +01:00
|
|
|
TALER_EXCHANGE_disconnect (exchange);
|
|
|
|
exchange = NULL;
|
2015-06-18 01:17:01 +02:00
|
|
|
}
|
|
|
|
if (NULL != ctx)
|
|
|
|
{
|
2016-04-17 17:45:15 +02:00
|
|
|
GNUNET_CURL_fini (ctx);
|
2015-06-18 01:17:01 +02:00
|
|
|
ctx = NULL;
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
2016-05-02 08:24:21 +02:00
|
|
|
if (NULL != rc)
|
2016-05-02 02:33:14 +02:00
|
|
|
{
|
2016-05-02 08:24:21 +02:00
|
|
|
GNUNET_CURL_gnunet_rc_destroy (rc);
|
|
|
|
rc = NULL;
|
2016-05-02 02:33:14 +02:00
|
|
|
}
|
|
|
|
if (NULL != timeout_task)
|
|
|
|
{
|
|
|
|
GNUNET_SCHEDULER_cancel (timeout_task);
|
|
|
|
timeout_task = NULL;
|
|
|
|
}
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
2015-06-18 01:17:01 +02:00
|
|
|
|
|
|
|
|
2015-01-08 18:37:20 +01:00
|
|
|
/**
|
2015-06-18 01:17:01 +02:00
|
|
|
* Functions of this type are called to provide the retrieved signing and
|
2016-03-01 15:35:04 +01:00
|
|
|
* denomination keys of the exchange. No TALER_EXCHANGE_*() functions should be called
|
2015-06-18 01:17:01 +02:00
|
|
|
* in this callback.
|
2015-01-08 18:37:20 +01:00
|
|
|
*
|
|
|
|
* @param cls closure
|
2016-03-01 15:35:04 +01:00
|
|
|
* @param keys information about keys of the exchange
|
2015-01-08 18:37:20 +01:00
|
|
|
*/
|
|
|
|
static void
|
2015-06-18 01:17:01 +02:00
|
|
|
cert_cb (void *cls,
|
2016-03-01 15:35:04 +01:00
|
|
|
const struct TALER_EXCHANGE_Keys *keys)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-07-04 20:47:39 +02:00
|
|
|
struct InterpreterState *is = cls;
|
2015-07-04 17:30:38 +02:00
|
|
|
|
2015-07-05 13:21:53 +02:00
|
|
|
/* check that keys is OK */
|
2015-06-18 01:17:01 +02:00
|
|
|
#define ERR(cond) do { if(!(cond)) break; GNUNET_break (0); GNUNET_SCHEDULER_shutdown(); return; } while (0)
|
|
|
|
ERR (NULL == keys);
|
|
|
|
ERR (0 == keys->num_sign_keys);
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
|
|
|
|
"Read %u signing keys\n",
|
|
|
|
keys->num_sign_keys);
|
|
|
|
ERR (0 == keys->num_denom_keys);
|
|
|
|
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
|
|
|
|
"Read %u denomination keys\n",
|
|
|
|
keys->num_denom_keys);
|
|
|
|
#undef ERR
|
2015-07-04 17:30:38 +02:00
|
|
|
|
2015-07-05 13:21:53 +02:00
|
|
|
/* run actual tests via interpreter-loop */
|
2015-07-04 17:30:38 +02:00
|
|
|
is->keys = keys;
|
2015-07-04 20:47:39 +02:00
|
|
|
is->task = GNUNET_SCHEDULER_add_now (&interpreter_run,
|
|
|
|
is);
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Main function that will be run by the scheduler.
|
|
|
|
*
|
|
|
|
* @param cls closure
|
|
|
|
*/
|
|
|
|
static void
|
2016-04-10 00:57:20 +02:00
|
|
|
run (void *cls)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-07-04 20:47:39 +02:00
|
|
|
struct InterpreterState *is;
|
2015-08-08 23:35:51 +02:00
|
|
|
static struct MeltDetails melt_coins_1[] = {
|
2015-08-09 17:18:09 +02:00
|
|
|
{ .amount = "EUR:4",
|
|
|
|
.coin_ref = "refresh-withdraw-coin-1" },
|
2015-08-08 23:35:51 +02:00
|
|
|
{ NULL, NULL }
|
|
|
|
};
|
2015-08-09 14:55:38 +02:00
|
|
|
static const char *melt_fresh_amounts_1[] = {
|
2015-08-09 17:18:09 +02:00
|
|
|
"EUR:1",
|
|
|
|
"EUR:1",
|
|
|
|
"EUR:1",
|
|
|
|
"EUR:0.1",
|
|
|
|
"EUR:0.1",
|
|
|
|
"EUR:0.1",
|
|
|
|
"EUR:0.1",
|
|
|
|
"EUR:0.1",
|
|
|
|
"EUR:0.1",
|
|
|
|
"EUR:0.1",
|
2015-08-09 21:38:04 +02:00
|
|
|
"EUR:0.1",
|
|
|
|
"EUR:0.01",
|
|
|
|
"EUR:0.01",
|
|
|
|
"EUR:0.01",
|
|
|
|
"EUR:0.01",
|
|
|
|
"EUR:0.01",
|
|
|
|
"EUR:0.01",
|
|
|
|
/* with 0.01 withdraw fees (except for 1ct coins),
|
|
|
|
this totals up to exactly EUR:3.97, and with
|
|
|
|
the 0.03 refresh fee, to EUR:4.0*/
|
2015-08-08 23:35:51 +02:00
|
|
|
NULL
|
|
|
|
};
|
2015-07-04 20:47:39 +02:00
|
|
|
static struct Command commands[] =
|
|
|
|
{
|
2015-09-15 17:27:02 +02:00
|
|
|
/* *************** start of /wire testing ************** */
|
|
|
|
|
|
|
|
#if WIRE_TEST
|
|
|
|
{ .oc = OC_WIRE,
|
2015-09-20 13:48:15 +02:00
|
|
|
.label = "wire-test",
|
2016-04-01 16:15:35 +02:00
|
|
|
/* expecting 'test' method in response */
|
2016-03-04 11:57:57 +01:00
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
2015-09-20 14:02:10 +02:00
|
|
|
.details.wire.format = "test" },
|
2015-09-15 17:27:02 +02:00
|
|
|
#endif
|
|
|
|
#if WIRE_SEPA
|
2015-09-20 14:02:10 +02:00
|
|
|
{ .oc = OC_WIRE,
|
2015-09-20 13:48:15 +02:00
|
|
|
.label = "wire-sepa",
|
2016-04-01 16:15:35 +02:00
|
|
|
/* expecting 'sepa' method in response */
|
2015-09-20 14:02:10 +02:00
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
|
|
|
.details.wire.format = "sepa" },
|
2015-09-15 17:27:02 +02:00
|
|
|
#endif
|
|
|
|
/* *************** end of /wire testing ************** */
|
|
|
|
|
|
|
|
#if WIRE_TEST
|
|
|
|
/* None of this works if 'test' is not allowed as we do
|
|
|
|
/admin/add/incoming with format 'test' */
|
|
|
|
|
2015-07-05 13:21:53 +02:00
|
|
|
/* Fill reserve with EUR:5.01, as withdraw fee is 1 ct per config */
|
2015-07-04 20:47:39 +02:00
|
|
|
{ .oc = OC_ADMIN_ADD_INCOMING,
|
|
|
|
.label = "create-reserve-1",
|
2015-07-09 12:22:07 +02:00
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
2016-04-11 02:37:56 +02:00
|
|
|
.details.admin_add_incoming.wire = "{ \"type\":\"test\", \"bank_uri\":\"http://localhost:8082/\", \"account_number\":42 }",
|
2015-07-05 13:18:49 +02:00
|
|
|
.details.admin_add_incoming.amount = "EUR:5.01" },
|
2015-07-09 12:47:49 +02:00
|
|
|
/* Withdraw a 5 EUR coin, at fee of 1 ct */
|
2015-07-04 20:47:39 +02:00
|
|
|
{ .oc = OC_WITHDRAW_SIGN,
|
|
|
|
.label = "withdraw-coin-1",
|
2015-07-09 12:22:07 +02:00
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
2015-09-19 22:08:49 +02:00
|
|
|
.details.reserve_withdraw.reserve_reference = "create-reserve-1",
|
|
|
|
.details.reserve_withdraw.amount = "EUR:5" },
|
2015-07-09 12:47:49 +02:00
|
|
|
/* Check that deposit and withdraw operation are in history, and
|
|
|
|
that the balance is now at zero */
|
2015-07-09 11:36:13 +02:00
|
|
|
{ .oc = OC_WITHDRAW_STATUS,
|
|
|
|
.label = "withdraw-status-1",
|
2015-07-09 12:22:07 +02:00
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
2015-09-19 22:08:49 +02:00
|
|
|
.details.reserve_status.reserve_reference = "create-reserve-1",
|
|
|
|
.details.reserve_status.expected_balance = "EUR:0" },
|
2015-07-09 12:47:49 +02:00
|
|
|
/* Try to deposit the 5 EUR coin (in full) */
|
2015-07-04 20:47:39 +02:00
|
|
|
{ .oc = OC_DEPOSIT,
|
|
|
|
.label = "deposit-simple",
|
2015-07-09 12:22:07 +02:00
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
2015-07-04 20:47:39 +02:00
|
|
|
.details.deposit.amount = "EUR:5",
|
|
|
|
.details.deposit.coin_ref = "withdraw-coin-1",
|
2016-04-11 02:37:56 +02:00
|
|
|
.details.deposit.wire_details = "{ \"type\":\"test\", \"bank_uri\":\"http://localhost:8082/\", \"account_number\":42 }",
|
2016-01-22 17:21:42 +01:00
|
|
|
.details.deposit.contract = "{ \"items\": [ { \"name\":\"ice cream\", \"value\":1 } ] }",
|
2015-07-04 20:47:39 +02:00
|
|
|
.details.deposit.transaction_id = 1 },
|
2015-07-09 12:47:49 +02:00
|
|
|
|
|
|
|
/* Try to overdraw funds ... */
|
|
|
|
{ .oc = OC_WITHDRAW_SIGN,
|
|
|
|
.label = "withdraw-coin-2",
|
|
|
|
.expected_response_code = MHD_HTTP_PAYMENT_REQUIRED,
|
2015-09-19 22:08:49 +02:00
|
|
|
.details.reserve_withdraw.reserve_reference = "create-reserve-1",
|
|
|
|
.details.reserve_withdraw.amount = "EUR:5" },
|
2015-08-09 18:11:30 +02:00
|
|
|
|
2015-07-09 12:47:49 +02:00
|
|
|
/* Try to double-spend the 5 EUR coin with different wire details */
|
|
|
|
{ .oc = OC_DEPOSIT,
|
|
|
|
.label = "deposit-double-1",
|
|
|
|
.expected_response_code = MHD_HTTP_FORBIDDEN,
|
|
|
|
.details.deposit.amount = "EUR:5",
|
|
|
|
.details.deposit.coin_ref = "withdraw-coin-1",
|
2016-04-11 02:37:56 +02:00
|
|
|
.details.deposit.wire_details = "{ \"type\":\"test\", \"bank_uri\":\"http://localhost:8082/\", \"account_number\":43 }",
|
2016-01-22 17:21:42 +01:00
|
|
|
.details.deposit.contract = "{ \"items\": [ { \"name\":\"ice cream\", \"value\":1 } ] }",
|
2015-07-09 12:47:49 +02:00
|
|
|
.details.deposit.transaction_id = 1 },
|
|
|
|
/* Try to double-spend the 5 EUR coin at the same merchant (but different
|
|
|
|
transaction ID) */
|
|
|
|
{ .oc = OC_DEPOSIT,
|
|
|
|
.label = "deposit-double-2",
|
|
|
|
.expected_response_code = MHD_HTTP_FORBIDDEN,
|
|
|
|
.details.deposit.amount = "EUR:5",
|
|
|
|
.details.deposit.coin_ref = "withdraw-coin-1",
|
2016-04-11 02:37:56 +02:00
|
|
|
.details.deposit.wire_details = "{ \"type\":\"test\", \"bank_uri\":\"http://localhost:8082/\", \"account_number\":42 }",
|
2016-01-22 17:21:42 +01:00
|
|
|
.details.deposit.contract = "{ \"items\": [ { \"name\":\"ice cream\", \"value\":1 } ] }",
|
2015-07-09 12:47:49 +02:00
|
|
|
.details.deposit.transaction_id = 2 },
|
|
|
|
/* Try to double-spend the 5 EUR coin at the same merchant (but different
|
|
|
|
contract) */
|
|
|
|
{ .oc = OC_DEPOSIT,
|
|
|
|
.label = "deposit-double-3",
|
|
|
|
.expected_response_code = MHD_HTTP_FORBIDDEN,
|
|
|
|
.details.deposit.amount = "EUR:5",
|
|
|
|
.details.deposit.coin_ref = "withdraw-coin-1",
|
2016-04-11 02:37:56 +02:00
|
|
|
.details.deposit.wire_details = "{ \"type\":\"test\", \"bank_uri\":\"http://localhost:8082/\", \"account_number\":42 }",
|
2016-01-22 15:50:45 +01:00
|
|
|
.details.deposit.contract = "{ \"items\":[{ \"name\":\"ice cream\", \"value\":2 } ] }",
|
2015-07-09 12:47:49 +02:00
|
|
|
.details.deposit.transaction_id = 1 },
|
|
|
|
|
2015-08-09 17:18:09 +02:00
|
|
|
/* ***************** /refresh testing ******************** */
|
|
|
|
|
|
|
|
/* Fill reserve with EUR:5.01, as withdraw fee is 1 ct */
|
|
|
|
{ .oc = OC_ADMIN_ADD_INCOMING,
|
|
|
|
.label = "refresh-create-reserve-1",
|
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
2016-04-11 02:37:56 +02:00
|
|
|
.details.admin_add_incoming.wire = "{ \"type\":\"test\", \"bank_uri\":\"http://localhost:8082/\", \"account_number\":424 }",
|
2015-08-09 17:18:09 +02:00
|
|
|
.details.admin_add_incoming.amount = "EUR:5.01" },
|
|
|
|
/* Withdraw a 5 EUR coin, at fee of 1 ct */
|
|
|
|
{ .oc = OC_WITHDRAW_SIGN,
|
|
|
|
.label = "refresh-withdraw-coin-1",
|
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
2015-09-19 22:08:49 +02:00
|
|
|
.details.reserve_withdraw.reserve_reference = "refresh-create-reserve-1",
|
|
|
|
.details.reserve_withdraw.amount = "EUR:5" },
|
2015-08-09 17:18:09 +02:00
|
|
|
/* Try to partially spend (deposit) 1 EUR of the 5 EUR coin (in full)
|
|
|
|
(merchant would receive EUR:0.99 due to 1 ct deposit fee) */
|
|
|
|
{ .oc = OC_DEPOSIT,
|
|
|
|
.label = "refresh-deposit-partial",
|
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
|
|
|
.details.deposit.amount = "EUR:1",
|
|
|
|
.details.deposit.coin_ref = "refresh-withdraw-coin-1",
|
2016-04-11 02:37:56 +02:00
|
|
|
.details.deposit.wire_details = "{ \"type\":\"test\", \"bank_uri\":\"http://localhost:8082/\", \"account_number\":42 }",
|
2016-01-22 17:21:42 +01:00
|
|
|
.details.deposit.contract = "{ \"items\" : [ { \"name\":\"ice cream\", \"value\":\"EUR:1\" } ] }",
|
2015-08-09 17:18:09 +02:00
|
|
|
.details.deposit.transaction_id = 42421 },
|
|
|
|
|
|
|
|
/* Melt the rest of the coin's value (EUR:4.00 = 3x EUR:1.03 + 7x EUR:0.13) */
|
2015-08-09 19:00:48 +02:00
|
|
|
|
2015-08-08 23:35:51 +02:00
|
|
|
{ .oc = OC_REFRESH_MELT,
|
2015-08-09 17:18:09 +02:00
|
|
|
.label = "refresh-melt-1",
|
2015-08-08 23:35:51 +02:00
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
|
|
|
.details.refresh_melt.melted_coins = melt_coins_1,
|
2015-08-09 14:55:38 +02:00
|
|
|
.details.refresh_melt.fresh_amounts = melt_fresh_amounts_1 },
|
2015-08-08 23:35:51 +02:00
|
|
|
|
2015-08-09 21:25:02 +02:00
|
|
|
|
2015-08-08 23:35:51 +02:00
|
|
|
/* Complete (successful) melt operation, and withdraw the coins */
|
|
|
|
{ .oc = OC_REFRESH_REVEAL,
|
2015-08-09 17:18:09 +02:00
|
|
|
.label = "refresh-reveal-1",
|
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
|
|
|
.details.refresh_reveal.melt_ref = "refresh-melt-1" },
|
2015-08-08 23:35:51 +02:00
|
|
|
|
|
|
|
/* Test that /refresh/link works */
|
|
|
|
{ .oc = OC_REFRESH_LINK,
|
2015-08-09 17:18:09 +02:00
|
|
|
.label = "refresh-link-1",
|
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
|
|
|
.details.refresh_link.reveal_ref = "refresh-reveal-1" },
|
2015-08-08 23:35:51 +02:00
|
|
|
|
2015-08-14 23:09:34 +02:00
|
|
|
|
2015-08-09 17:18:09 +02:00
|
|
|
/* Test successfully spending coins from the refresh operation:
|
|
|
|
first EUR:1 */
|
2015-08-08 23:35:51 +02:00
|
|
|
{ .oc = OC_DEPOSIT,
|
2015-08-17 03:56:49 +02:00
|
|
|
.label = "refresh-deposit-refreshed-1a",
|
2015-08-08 23:35:51 +02:00
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
2015-08-09 17:18:09 +02:00
|
|
|
.details.deposit.amount = "EUR:1",
|
2015-08-17 03:56:49 +02:00
|
|
|
.details.deposit.coin_ref = "refresh-reveal-1",
|
2015-08-08 23:35:51 +02:00
|
|
|
.details.deposit.coin_idx = 0,
|
2016-04-11 02:37:56 +02:00
|
|
|
.details.deposit.wire_details = "{ \"type\":\"test\", \"bank_uri\":\"http://localhost:8082/\", \"account_number\":42 }",
|
2016-01-22 15:50:45 +01:00
|
|
|
.details.deposit.contract = "{ \"items\": [ { \"name\":\"ice cream\", \"value\":3 } ] }",
|
2015-08-08 23:35:51 +02:00
|
|
|
.details.deposit.transaction_id = 2 },
|
2015-08-17 03:56:49 +02:00
|
|
|
|
2015-08-09 17:18:09 +02:00
|
|
|
/* Test successfully spending coins from the refresh operation:
|
|
|
|
finally EUR:0.1 */
|
|
|
|
{ .oc = OC_DEPOSIT,
|
|
|
|
.label = "refresh-deposit-refreshed-1b",
|
|
|
|
.expected_response_code = MHD_HTTP_OK,
|
|
|
|
.details.deposit.amount = "EUR:0.1",
|
2015-08-17 03:56:49 +02:00
|
|
|
.details.deposit.coin_ref = "refresh-reveal-1",
|
2015-08-09 17:18:09 +02:00
|
|
|
.details.deposit.coin_idx = 4,
|
2016-04-11 02:37:56 +02:00
|
|
|
.details.deposit.wire_details = "{ \"type\":\"test\", \"bank_uri\":\"http://localhost:8082/\", \"account_number\":42 }",
|
2016-01-22 15:50:45 +01:00
|
|
|
.details.deposit.contract = "{ \"items\": [ { \"name\":\"ice cream\", \"value\":3 } ] }",
|
2015-08-09 17:18:09 +02:00
|
|
|
.details.deposit.transaction_id = 2 },
|
2015-08-08 23:35:51 +02:00
|
|
|
|
2015-08-09 17:18:09 +02:00
|
|
|
/* Test running a failing melt operation (same operation again must fail) */
|
2015-08-08 23:35:51 +02:00
|
|
|
{ .oc = OC_REFRESH_MELT,
|
2015-08-09 17:18:09 +02:00
|
|
|
.label = "refresh-melt-failing",
|
2015-08-08 23:35:51 +02:00
|
|
|
.expected_response_code = MHD_HTTP_FORBIDDEN,
|
|
|
|
.details.refresh_melt.melted_coins = melt_coins_1,
|
2015-08-09 17:18:09 +02:00
|
|
|
.details.refresh_melt.fresh_amounts = melt_fresh_amounts_1 },
|
2015-08-08 23:35:51 +02:00
|
|
|
|
2015-09-15 10:00:21 +02:00
|
|
|
// FIXME: also test with coin that was already melted
|
2015-08-17 03:57:50 +02:00
|
|
|
// (signature differs from coin that was deposited...)
|
2015-08-09 17:18:09 +02:00
|
|
|
/* *************** end of /refresh testing ************** */
|
2016-01-22 15:50:45 +01:00
|
|
|
|
|
|
|
/* ************** Test tracking API ******************** */
|
|
|
|
/* Try resolving a deposit's WTID, as we never triggered
|
|
|
|
execution of transactions, the answer should be that
|
2016-03-01 15:35:04 +01:00
|
|
|
the exchange knows about the deposit, but has no WTID yet. */
|
2016-01-22 15:50:45 +01:00
|
|
|
{ .oc = OC_DEPOSIT_WTID,
|
|
|
|
.label = "deposit-wtid-found",
|
2016-01-22 17:32:46 +01:00
|
|
|
.expected_response_code = MHD_HTTP_ACCEPTED,
|
2016-01-22 15:50:45 +01:00
|
|
|
.details.deposit_wtid.deposit_ref = "deposit-simple" },
|
|
|
|
/* Try resolving a deposit's WTID for a failed deposit.
|
|
|
|
As the deposit failed, the answer should be that
|
2016-03-01 15:35:04 +01:00
|
|
|
the exchange does NOT know about the deposit. */
|
2016-01-22 15:50:45 +01:00
|
|
|
{ .oc = OC_DEPOSIT_WTID,
|
|
|
|
.label = "deposit-wtid-failing",
|
|
|
|
.expected_response_code = MHD_HTTP_NOT_FOUND,
|
|
|
|
.details.deposit_wtid.deposit_ref = "deposit-double-2" },
|
|
|
|
/* Try resolving an undefined (all zeros) WTID; this
|
2016-03-01 15:35:04 +01:00
|
|
|
should fail as obviously the exchange didn't use that
|
2016-01-22 15:50:45 +01:00
|
|
|
WTID value for any transaction. */
|
|
|
|
{ .oc = OC_WIRE_DEPOSITS,
|
|
|
|
.label = "wire-deposit-failing",
|
|
|
|
.expected_response_code = MHD_HTTP_NOT_FOUND },
|
|
|
|
|
|
|
|
/* TODO: trigger aggregation logic and then check the
|
|
|
|
cases where tracking succeeds! */
|
|
|
|
|
|
|
|
/* ************** End of tracking API testing************* */
|
|
|
|
|
|
|
|
|
2015-09-15 17:27:02 +02:00
|
|
|
#endif
|
2015-08-08 23:35:51 +02:00
|
|
|
|
2015-07-04 20:47:39 +02:00
|
|
|
{ .oc = OC_END }
|
|
|
|
};
|
|
|
|
|
|
|
|
is = GNUNET_new (struct InterpreterState);
|
|
|
|
is->commands = commands;
|
|
|
|
|
2016-05-02 08:24:21 +02:00
|
|
|
ctx = GNUNET_CURL_init (&GNUNET_CURL_gnunet_scheduler_reschedule,
|
|
|
|
&rc);
|
|
|
|
rc = GNUNET_CURL_gnunet_rc_create (ctx);
|
2015-06-18 01:17:01 +02:00
|
|
|
GNUNET_assert (NULL != ctx);
|
2016-03-01 15:35:04 +01:00
|
|
|
exchange = TALER_EXCHANGE_connect (ctx,
|
2016-03-30 22:56:17 +02:00
|
|
|
"http://localhost:8081",
|
|
|
|
&cert_cb, is,
|
|
|
|
TALER_EXCHANGE_OPTION_END);
|
2016-03-01 15:35:04 +01:00
|
|
|
GNUNET_assert (NULL != exchange);
|
2016-05-02 02:33:14 +02:00
|
|
|
timeout_task
|
2015-07-04 20:47:39 +02:00
|
|
|
= GNUNET_SCHEDULER_add_delayed (GNUNET_TIME_relative_multiply
|
2015-08-17 23:38:00 +02:00
|
|
|
(GNUNET_TIME_UNIT_SECONDS, 150),
|
2016-05-02 02:33:14 +02:00
|
|
|
&do_timeout, NULL);
|
|
|
|
GNUNET_SCHEDULER_add_shutdown (&do_shutdown, is);
|
2015-01-08 18:37:20 +01:00
|
|
|
}
|
|
|
|
|
2015-06-18 01:17:01 +02:00
|
|
|
|
|
|
|
/**
|
2016-03-01 15:35:04 +01:00
|
|
|
* Main function for the testcase for the exchange API.
|
2015-06-18 01:17:01 +02:00
|
|
|
*
|
|
|
|
* @param argc expected to be 1
|
|
|
|
* @param argv expected to only contain the program name
|
|
|
|
*/
|
2015-01-08 18:37:20 +01:00
|
|
|
int
|
2015-06-18 01:17:01 +02:00
|
|
|
main (int argc,
|
|
|
|
char * const *argv)
|
2015-01-08 18:37:20 +01:00
|
|
|
{
|
2015-06-18 14:25:09 +02:00
|
|
|
struct GNUNET_OS_Process *proc;
|
2016-03-01 15:35:04 +01:00
|
|
|
struct GNUNET_OS_Process *exchanged;
|
2015-06-18 13:44:58 +02:00
|
|
|
|
2016-03-01 15:35:04 +01:00
|
|
|
GNUNET_log_setup ("test-exchange-api",
|
2015-06-18 13:44:58 +02:00
|
|
|
"WARNING",
|
|
|
|
NULL);
|
2016-04-10 17:10:20 +02:00
|
|
|
/* These might get in the way... */
|
|
|
|
unsetenv ("XDG_DATA_HOME");
|
|
|
|
unsetenv ("XDG_CONFIG_HOME");
|
2015-06-18 14:25:09 +02:00
|
|
|
proc = GNUNET_OS_start_process (GNUNET_NO,
|
|
|
|
GNUNET_OS_INHERIT_STD_ALL,
|
|
|
|
NULL, NULL, NULL,
|
2016-03-01 15:35:04 +01:00
|
|
|
"taler-exchange-keyup",
|
|
|
|
"taler-exchange-keyup",
|
2016-04-10 17:10:20 +02:00
|
|
|
"-c", "test_exchange_api.conf",
|
2015-06-18 14:25:09 +02:00
|
|
|
NULL);
|
|
|
|
GNUNET_OS_process_wait (proc);
|
|
|
|
GNUNET_OS_process_destroy (proc);
|
2016-03-01 15:35:04 +01:00
|
|
|
exchanged = GNUNET_OS_start_process (GNUNET_NO,
|
2016-03-30 22:56:17 +02:00
|
|
|
GNUNET_OS_INHERIT_STD_ALL,
|
|
|
|
NULL, NULL, NULL,
|
|
|
|
"taler-exchange-httpd",
|
|
|
|
"taler-exchange-httpd",
|
2016-04-10 17:10:20 +02:00
|
|
|
"-c", "test_exchange_api.conf",
|
2016-03-30 22:56:17 +02:00
|
|
|
NULL);
|
2015-06-18 13:47:35 +02:00
|
|
|
/* give child time to start and bind against the socket */
|
2016-03-01 15:35:04 +01:00
|
|
|
fprintf (stderr, "Waiting for taler-exchange-httpd to be ready");
|
2015-08-09 18:11:30 +02:00
|
|
|
do
|
|
|
|
{
|
|
|
|
fprintf (stderr, ".");
|
|
|
|
sleep (1);
|
|
|
|
}
|
2015-08-18 12:24:51 +02:00
|
|
|
while (0 != system ("wget -q -t 1 -T 1 http://127.0.0.1:8081/keys -o /dev/null -O /dev/null"));
|
2015-08-09 18:11:30 +02:00
|
|
|
fprintf (stderr, "\n");
|
2015-01-08 18:37:20 +01:00
|
|
|
result = GNUNET_SYSERR;
|
2015-06-18 13:44:58 +02:00
|
|
|
GNUNET_SCHEDULER_run (&run, NULL);
|
2016-03-01 15:35:04 +01:00
|
|
|
GNUNET_OS_process_kill (exchanged,
|
2015-06-18 13:44:58 +02:00
|
|
|
SIGTERM);
|
2016-03-01 15:35:04 +01:00
|
|
|
GNUNET_OS_process_wait (exchanged);
|
|
|
|
GNUNET_OS_process_destroy (exchanged);
|
2015-01-08 18:37:20 +01:00
|
|
|
return (GNUNET_OK == result) ? 0 : 1;
|
|
|
|
}
|
2015-06-18 11:39:53 +02:00
|
|
|
|
2016-03-01 15:35:04 +01:00
|
|
|
/* end of test_exchange_api.c */
|