untested draft of webhook logic for persona
This commit is contained in:
parent
cb27943f14
commit
3194ccabc1
@ -1 +1 @@
|
|||||||
Subproject commit ce901edbaf496244f50f45b221d0c2c929c47637
|
Subproject commit 2e264e2856ee1f490d894a64d36bd4eac71802eb
|
@ -237,6 +237,37 @@ TALER_KYCLOGIC_kyc_iterate_thresholds (
|
|||||||
void *it_cls);
|
void *it_cls);
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Function called with the provider details and
|
||||||
|
* associated plugin closures for matching logics.
|
||||||
|
*
|
||||||
|
* @param cls closure
|
||||||
|
* @param pd provider details of a matching logic
|
||||||
|
* @param plugin_cls closure of the plugin
|
||||||
|
* @return #GNUNET_OK to continue to iterate
|
||||||
|
*/
|
||||||
|
typedef enum GNUNET_GenericReturnValue
|
||||||
|
(*TALER_KYCLOGIC_DetailsCallback)(
|
||||||
|
void *cls,
|
||||||
|
const struct TALER_KYCLOGIC_ProviderDetails *pd,
|
||||||
|
void *plugin_cls);
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Call @a cb for all logics with name @a logic_name,
|
||||||
|
* providing the plugin closure and the @a pd configurations.
|
||||||
|
*
|
||||||
|
* @param logic_name name of the logic to match
|
||||||
|
* @param cb function to call on matching results
|
||||||
|
* @param cb_cls closure for @a cb
|
||||||
|
*/
|
||||||
|
void
|
||||||
|
TALER_KYCLOGIC_kyc_get_details (
|
||||||
|
const char *logic_name,
|
||||||
|
TALER_KYCLOGIC_DetailsCallback cb,
|
||||||
|
void *cb_cls);
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Obtain the provider logic for a given @a provider_section_name.
|
* Obtain the provider logic for a given @a provider_section_name.
|
||||||
*
|
*
|
||||||
|
@ -77,6 +77,8 @@ enum TALER_KYCLOGIC_KycStatus
|
|||||||
* The provider is still checking.
|
* The provider is still checking.
|
||||||
*/
|
*/
|
||||||
TALER_KYCLOGIC_STATUS_PROVIDER_PENDING
|
TALER_KYCLOGIC_STATUS_PROVIDER_PENDING
|
||||||
|
|
||||||
|
|
||||||
= TALER_KYCLOGIC_STATUS_PROVIDER
|
= TALER_KYCLOGIC_STATUS_PROVIDER
|
||||||
| TALER_KYCLOGIC_STATUS_PENDING,
|
| TALER_KYCLOGIC_STATUS_PENDING,
|
||||||
|
|
||||||
@ -240,6 +242,12 @@ struct TALER_KYCLOGIC_Plugin
|
|||||||
*/
|
*/
|
||||||
char *library_name;
|
char *library_name;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Name of the logic, for webhook matching. Set by the
|
||||||
|
* plugin loader.
|
||||||
|
*/
|
||||||
|
char *name;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Load the configuration of the KYC provider.
|
* Load the configuration of the KYC provider.
|
||||||
*
|
*
|
||||||
|
@ -11,7 +11,8 @@ pkgcfgdir = $(prefix)/share/taler/config.d/
|
|||||||
pkgcfg_DATA = \
|
pkgcfg_DATA = \
|
||||||
kyclogic.conf \
|
kyclogic.conf \
|
||||||
kyclogic-kycaid.conf \
|
kyclogic-kycaid.conf \
|
||||||
kyclogic-oauth2.conf
|
kyclogic-oauth2.conf \
|
||||||
|
kyclogic-persona.conf
|
||||||
|
|
||||||
EXTRA_DIST = \
|
EXTRA_DIST = \
|
||||||
kyclogic.conf \
|
kyclogic.conf \
|
||||||
@ -97,6 +98,7 @@ libtaler_plugin_kyclogic_persona_la_LIBADD = \
|
|||||||
$(LTLIBINTL)
|
$(LTLIBINTL)
|
||||||
libtaler_plugin_kyclogic_persona_la_LDFLAGS = \
|
libtaler_plugin_kyclogic_persona_la_LDFLAGS = \
|
||||||
$(TALER_PLUGIN_LDFLAGS) \
|
$(TALER_PLUGIN_LDFLAGS) \
|
||||||
|
libtalerkyclogic.la \
|
||||||
$(top_builddir)/src/json/libtalerjson.la \
|
$(top_builddir)/src/json/libtalerjson.la \
|
||||||
$(top_builddir)/src/curl/libtalercurl.la \
|
$(top_builddir)/src/curl/libtalercurl.la \
|
||||||
$(top_builddir)/src/util/libtalerutil.la \
|
$(top_builddir)/src/util/libtalerutil.la \
|
||||||
|
33
src/kyclogic/kyclogic-persona.conf
Normal file
33
src/kyclogic/kyclogic-persona.conf
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
# This file is in the public domain.
|
||||||
|
|
||||||
|
# FIXME: add to taler.conf man page!
|
||||||
|
|
||||||
|
# Example persona provider configuration.
|
||||||
|
|
||||||
|
[kyclogic-persona]
|
||||||
|
|
||||||
|
# Optional authorization token for the webhook
|
||||||
|
#WEBHOOK_AUTH_TOKEN = wbhsec_698b5a19-c790-47f6-b396-deb572ec82f9
|
||||||
|
|
||||||
|
|
||||||
|
[kyc-provider-example-persona]
|
||||||
|
|
||||||
|
COST = 42
|
||||||
|
LOGIC = persona
|
||||||
|
USER_TYPE = INDIVIDUAL
|
||||||
|
PROVIDED_CHECKS = EXAMPLE_DO_NOT_USE
|
||||||
|
|
||||||
|
# How long is the KYC check valid?
|
||||||
|
PERSONA_VALIDITY = forever
|
||||||
|
|
||||||
|
# Which subdomain is used for our API?
|
||||||
|
PERSONA_SUBDOMAIN = taler
|
||||||
|
|
||||||
|
# Authentication token to use.
|
||||||
|
PERSONA_AUTH_TOKEN = persona_sandbox_42
|
||||||
|
|
||||||
|
# Form to use.
|
||||||
|
PERSONA_TEMPLATE_ID = itempl_Uj6Xxxxx
|
||||||
|
|
||||||
|
# Where do we redirect to after KYC finished successfully.
|
||||||
|
KYC_POST_URL = https://taler.net/
|
@ -294,6 +294,7 @@ load_logic (const struct GNUNET_CONFIGURATION_Handle *cfg,
|
|||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
plugin->library_name = lib_name;
|
plugin->library_name = lib_name;
|
||||||
|
plugin->name = GNUNET_strdup (name);
|
||||||
GNUNET_array_append (kyc_logics,
|
GNUNET_array_append (kyc_logics,
|
||||||
num_kyc_logics,
|
num_kyc_logics,
|
||||||
plugin);
|
plugin);
|
||||||
@ -737,6 +738,7 @@ TALER_KYCLOGIC_kyc_done (void)
|
|||||||
struct TALER_KYCLOGIC_Plugin *lp = kyc_logics[i];
|
struct TALER_KYCLOGIC_Plugin *lp = kyc_logics[i];
|
||||||
char *lib_name = lp->library_name;
|
char *lib_name = lp->library_name;
|
||||||
|
|
||||||
|
GNUNET_free (lp->name);
|
||||||
GNUNET_assert (NULL == GNUNET_PLUGIN_unload (lib_name,
|
GNUNET_assert (NULL == GNUNET_PLUGIN_unload (lib_name,
|
||||||
lp));
|
lp));
|
||||||
GNUNET_free (lib_name);
|
GNUNET_free (lib_name);
|
||||||
@ -1092,6 +1094,29 @@ TALER_KYCLOGIC_kyc_test_required (enum TALER_KYCLOGIC_KycTriggerEvent event,
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
void
|
||||||
|
TALER_KYCLOGIC_kyc_get_details (
|
||||||
|
const char *logic_name,
|
||||||
|
TALER_KYCLOGIC_DetailsCallback cb,
|
||||||
|
void *cb_cls)
|
||||||
|
{
|
||||||
|
for (unsigned int i = 0; i<num_kyc_providers; i++)
|
||||||
|
{
|
||||||
|
struct TALER_KYCLOGIC_KycProvider *kp = kyc_providers[i];
|
||||||
|
|
||||||
|
if (0 !=
|
||||||
|
strcmp (kp->logic->name,
|
||||||
|
logic_name))
|
||||||
|
continue;
|
||||||
|
if (GNUNET_OK !=
|
||||||
|
cb (cb_cls,
|
||||||
|
kp->pd,
|
||||||
|
kp->logic->cls))
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
enum GNUNET_GenericReturnValue
|
enum GNUNET_GenericReturnValue
|
||||||
TALER_KYCLOGIC_kyc_get_logic (const char *provider_section_name,
|
TALER_KYCLOGIC_kyc_get_logic (const char *provider_section_name,
|
||||||
struct TALER_KYCLOGIC_Plugin **plugin,
|
struct TALER_KYCLOGIC_Plugin **plugin,
|
||||||
@ -1109,6 +1134,18 @@ TALER_KYCLOGIC_kyc_get_logic (const char *provider_section_name,
|
|||||||
*pd = kp->pd;
|
*pd = kp->pd;
|
||||||
return GNUNET_OK;
|
return GNUNET_OK;
|
||||||
}
|
}
|
||||||
|
for (unsigned int i = 0; i<num_kyc_logics; i++)
|
||||||
|
{
|
||||||
|
struct TALER_KYCLOGIC_Plugin *logic = kyc_logics[i];
|
||||||
|
|
||||||
|
if (0 !=
|
||||||
|
strcasecmp (logic->name,
|
||||||
|
provider_section_name))
|
||||||
|
continue;
|
||||||
|
*plugin = logic;
|
||||||
|
*pd = NULL;
|
||||||
|
return GNUNET_OK;
|
||||||
|
}
|
||||||
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
||||||
"Provider `%s' unknown\n",
|
"Provider `%s' unknown\n",
|
||||||
provider_section_name);
|
provider_section_name);
|
||||||
|
@ -1081,6 +1081,21 @@ kycaid_webhook (void *cls,
|
|||||||
wh->pd = pd;
|
wh->pd = pd;
|
||||||
wh->connection = connection;
|
wh->connection = connection;
|
||||||
|
|
||||||
|
if (NULL == pd)
|
||||||
|
{
|
||||||
|
GNUNET_break_op (0);
|
||||||
|
json_dumpf (body,
|
||||||
|
stderr,
|
||||||
|
JSON_INDENT (2));
|
||||||
|
wh->resp = TALER_MHD_make_error (
|
||||||
|
TALER_EC_EXCHANGE_KYC_GENERIC_LOGIC_UNKNOWN,
|
||||||
|
"kycaid");
|
||||||
|
wh->response_code = MHD_HTTP_NOT_FOUND;
|
||||||
|
wh->task = GNUNET_SCHEDULER_add_now (&async_webhook_reply,
|
||||||
|
wh);
|
||||||
|
return wh;
|
||||||
|
}
|
||||||
|
|
||||||
if (GNUNET_OK !=
|
if (GNUNET_OK !=
|
||||||
GNUNET_JSON_parse (body,
|
GNUNET_JSON_parse (body,
|
||||||
spec,
|
spec,
|
||||||
|
@ -23,6 +23,7 @@
|
|||||||
#include "taler_mhd_lib.h"
|
#include "taler_mhd_lib.h"
|
||||||
#include "taler_curl_lib.h"
|
#include "taler_curl_lib.h"
|
||||||
#include "taler_json_lib.h"
|
#include "taler_json_lib.h"
|
||||||
|
#include "taler_kyclogic_lib.h"
|
||||||
#include "taler_templating_lib.h"
|
#include "taler_templating_lib.h"
|
||||||
#include <regex.h>
|
#include <regex.h>
|
||||||
#include "taler_util.h"
|
#include "taler_util.h"
|
||||||
@ -60,6 +61,13 @@ struct PluginState
|
|||||||
*/
|
*/
|
||||||
struct GNUNET_CURL_RescheduleContext *curl_rc;
|
struct GNUNET_CURL_RescheduleContext *curl_rc;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Authorization token to use when receiving webhooks from the Persona service. Optional. Note that
|
||||||
|
* webhooks are *global* and not per template.
|
||||||
|
*/
|
||||||
|
char *webhook_token;
|
||||||
|
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
@ -233,7 +241,7 @@ struct TALER_KYCLOGIC_ProofHandle
|
|||||||
/**
|
/**
|
||||||
* Inquiry ID at the provider.
|
* Inquiry ID at the provider.
|
||||||
*/
|
*/
|
||||||
char *provider_legitimization_id;
|
char *inquiry_id;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
@ -293,16 +301,21 @@ struct TALER_KYCLOGIC_WebhookHandle
|
|||||||
*/
|
*/
|
||||||
struct MHD_Response *resp;
|
struct MHD_Response *resp;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* ID of the template the webhook is about,
|
||||||
|
* according to the service.
|
||||||
|
*/
|
||||||
|
const char *template_id;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Our account ID.
|
* Our account ID.
|
||||||
*/
|
*/
|
||||||
struct TALER_PaytoHashP h_payto;
|
struct TALER_PaytoHashP h_payto;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Row in legitimizations for the given
|
* UUID being checked.
|
||||||
* @e verification_id.
|
|
||||||
*/
|
*/
|
||||||
uint64_t legi_row;
|
uint64_t legitimization_uuid;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* HTTP response code to return asynchronously.
|
* HTTP response code to return asynchronously.
|
||||||
@ -807,7 +820,7 @@ persona_proof_cancel (struct TALER_KYCLOGIC_ProofHandle *ph)
|
|||||||
}
|
}
|
||||||
GNUNET_free (ph->url);
|
GNUNET_free (ph->url);
|
||||||
GNUNET_free (ph->provider_user_id);
|
GNUNET_free (ph->provider_user_id);
|
||||||
GNUNET_free (ph->provider_legitimization_id);
|
GNUNET_free (ph->inquiry_id);
|
||||||
GNUNET_free (ph);
|
GNUNET_free (ph);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -835,7 +848,12 @@ proof_generic_reply (struct TALER_KYCLOGIC_ProofHandle *ph,
|
|||||||
{
|
{
|
||||||
struct MHD_Response *resp;
|
struct MHD_Response *resp;
|
||||||
enum GNUNET_GenericReturnValue ret;
|
enum GNUNET_GenericReturnValue ret;
|
||||||
|
struct GNUNET_TIME_Absolute expiration;
|
||||||
|
|
||||||
|
if (TALER_KYCLOGIC_STATUS_SUCCESS == status)
|
||||||
|
expiration = GNUNET_TIME_relative_to_absolute (ph->pd->validity);
|
||||||
|
else
|
||||||
|
expiration = GNUNET_TIME_UNIT_ZERO_ABS;
|
||||||
ret = TALER_TEMPLATING_build (ph->connection,
|
ret = TALER_TEMPLATING_build (ph->connection,
|
||||||
&http_status,
|
&http_status,
|
||||||
template,
|
template,
|
||||||
@ -852,7 +870,7 @@ proof_generic_reply (struct TALER_KYCLOGIC_ProofHandle *ph,
|
|||||||
status,
|
status,
|
||||||
account_id,
|
account_id,
|
||||||
inquiry_id,
|
inquiry_id,
|
||||||
GNUNET_TIME_UNIT_ZERO_ABS, /* expiration */
|
expiration,
|
||||||
http_status,
|
http_status,
|
||||||
resp);
|
resp);
|
||||||
}
|
}
|
||||||
@ -1033,7 +1051,7 @@ handle_proof_finished (void *cls,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (0 != strcmp (inquiry_id,
|
if (0 != strcmp (inquiry_id,
|
||||||
ph->provider_legitimization_id))
|
ph->inquiry_id))
|
||||||
{
|
{
|
||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
proof_reply_error (ph,
|
proof_reply_error (ph,
|
||||||
@ -1146,7 +1164,7 @@ handle_proof_finished (void *cls,
|
|||||||
stderr,
|
stderr,
|
||||||
JSON_INDENT (2));
|
JSON_INDENT (2));
|
||||||
proof_reply_error (ph,
|
proof_reply_error (ph,
|
||||||
ph->provider_legitimization_id,
|
ph->inquiry_id,
|
||||||
MHD_HTTP_BAD_GATEWAY,
|
MHD_HTTP_BAD_GATEWAY,
|
||||||
"persona-logic-failure",
|
"persona-logic-failure",
|
||||||
GNUNET_JSON_PACK (
|
GNUNET_JSON_PACK (
|
||||||
@ -1166,7 +1184,7 @@ handle_proof_finished (void *cls,
|
|||||||
"Refused access with HTTP status code %u\n",
|
"Refused access with HTTP status code %u\n",
|
||||||
(unsigned int) response_code);
|
(unsigned int) response_code);
|
||||||
proof_reply_error (ph,
|
proof_reply_error (ph,
|
||||||
ph->provider_legitimization_id,
|
ph->inquiry_id,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
"persona-exchange-unauthorized",
|
"persona-exchange-unauthorized",
|
||||||
GNUNET_JSON_PACK (
|
GNUNET_JSON_PACK (
|
||||||
@ -1186,7 +1204,7 @@ handle_proof_finished (void *cls,
|
|||||||
(unsigned int) response_code);
|
(unsigned int) response_code);
|
||||||
|
|
||||||
proof_reply_error (ph,
|
proof_reply_error (ph,
|
||||||
ph->provider_legitimization_id,
|
ph->inquiry_id,
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
||||||
"persona-exchange-unpaid",
|
"persona-exchange-unpaid",
|
||||||
GNUNET_JSON_PACK (
|
GNUNET_JSON_PACK (
|
||||||
@ -1208,7 +1226,7 @@ handle_proof_finished (void *cls,
|
|||||||
stderr,
|
stderr,
|
||||||
JSON_INDENT (2));
|
JSON_INDENT (2));
|
||||||
proof_reply_error (ph,
|
proof_reply_error (ph,
|
||||||
ph->provider_legitimization_id,
|
ph->inquiry_id,
|
||||||
MHD_HTTP_GATEWAY_TIMEOUT,
|
MHD_HTTP_GATEWAY_TIMEOUT,
|
||||||
"persona-network-timeout",
|
"persona-network-timeout",
|
||||||
GNUNET_JSON_PACK (
|
GNUNET_JSON_PACK (
|
||||||
@ -1230,7 +1248,7 @@ handle_proof_finished (void *cls,
|
|||||||
stderr,
|
stderr,
|
||||||
JSON_INDENT (2));
|
JSON_INDENT (2));
|
||||||
proof_reply_error (ph,
|
proof_reply_error (ph,
|
||||||
ph->provider_legitimization_id,
|
ph->inquiry_id,
|
||||||
MHD_HTTP_SERVICE_UNAVAILABLE,
|
MHD_HTTP_SERVICE_UNAVAILABLE,
|
||||||
"persona-load-failure",
|
"persona-load-failure",
|
||||||
GNUNET_JSON_PACK (
|
GNUNET_JSON_PACK (
|
||||||
@ -1252,7 +1270,7 @@ handle_proof_finished (void *cls,
|
|||||||
stderr,
|
stderr,
|
||||||
JSON_INDENT (2));
|
JSON_INDENT (2));
|
||||||
proof_reply_error (ph,
|
proof_reply_error (ph,
|
||||||
ph->provider_legitimization_id,
|
ph->inquiry_id,
|
||||||
MHD_HTTP_BAD_GATEWAY,
|
MHD_HTTP_BAD_GATEWAY,
|
||||||
"persona-provider-failure",
|
"persona-provider-failure",
|
||||||
GNUNET_JSON_PACK (
|
GNUNET_JSON_PACK (
|
||||||
@ -1274,7 +1292,7 @@ handle_proof_finished (void *cls,
|
|||||||
stderr,
|
stderr,
|
||||||
JSON_INDENT (2));
|
JSON_INDENT (2));
|
||||||
proof_reply_error (ph,
|
proof_reply_error (ph,
|
||||||
ph->provider_legitimization_id,
|
ph->inquiry_id,
|
||||||
MHD_HTTP_BAD_GATEWAY,
|
MHD_HTTP_BAD_GATEWAY,
|
||||||
"persona-invalid-response",
|
"persona-invalid-response",
|
||||||
GNUNET_JSON_PACK (
|
GNUNET_JSON_PACK (
|
||||||
@ -1304,7 +1322,7 @@ handle_proof_finished (void *cls,
|
|||||||
* @param account_id which account to trigger process for
|
* @param account_id which account to trigger process for
|
||||||
* @param legi_row row in the table the legitimization is for
|
* @param legi_row row in the table the legitimization is for
|
||||||
* @param provider_user_id user ID (or NULL) the proof is for
|
* @param provider_user_id user ID (or NULL) the proof is for
|
||||||
* @param provider_legitimization_id legitimization ID the proof is for
|
* @param inquiry_id legitimization ID the proof is for
|
||||||
* @param cb function to call with the result
|
* @param cb function to call with the result
|
||||||
* @param cb_cls closure for @a cb
|
* @param cb_cls closure for @a cb
|
||||||
* @return handle to cancel operation early
|
* @return handle to cancel operation early
|
||||||
@ -1317,7 +1335,7 @@ persona_proof (void *cls,
|
|||||||
const struct TALER_PaytoHashP *account_id,
|
const struct TALER_PaytoHashP *account_id,
|
||||||
uint64_t legi_row,
|
uint64_t legi_row,
|
||||||
const char *provider_user_id,
|
const char *provider_user_id,
|
||||||
const char *provider_legitimization_id,
|
const char *inquiry_id,
|
||||||
TALER_KYCLOGIC_ProofCallback cb,
|
TALER_KYCLOGIC_ProofCallback cb,
|
||||||
void *cb_cls)
|
void *cb_cls)
|
||||||
{
|
{
|
||||||
@ -1339,15 +1357,14 @@ persona_proof (void *cls,
|
|||||||
ph->connection = connection;
|
ph->connection = connection;
|
||||||
ph->legitimization_uuid = legi_row;
|
ph->legitimization_uuid = legi_row;
|
||||||
ph->h_payto = *account_id;
|
ph->h_payto = *account_id;
|
||||||
/* NOTE: we do not expect this to be non-NULL */
|
/* Note: we do not expect this to be non-NULL */
|
||||||
if (NULL != provider_user_id)
|
if (NULL != provider_user_id)
|
||||||
ph->provider_user_id = GNUNET_strdup (provider_user_id);
|
ph->provider_user_id = GNUNET_strdup (provider_user_id);
|
||||||
/* This should be the inquiry ID; FIXME: rename variable? */
|
if (NULL != inquiry_id)
|
||||||
if (NULL != provider_legitimization_id)
|
ph->inquiry_id = GNUNET_strdup (inquiry_id);
|
||||||
ph->provider_legitimization_id = GNUNET_strdup (provider_legitimization_id);
|
|
||||||
GNUNET_asprintf (&ph->url,
|
GNUNET_asprintf (&ph->url,
|
||||||
"https://withpersona.com/api/v1/inquiries/%s",
|
"https://withpersona.com/api/v1/inquiries/%s",
|
||||||
provider_legitimization_id);
|
inquiry_id);
|
||||||
GNUNET_break (CURLE_OK ==
|
GNUNET_break (CURLE_OK ==
|
||||||
curl_easy_setopt (eh,
|
curl_easy_setopt (eh,
|
||||||
CURLOPT_VERBOSE,
|
CURLOPT_VERBOSE,
|
||||||
@ -1393,6 +1410,70 @@ persona_webhook_cancel (struct TALER_KYCLOGIC_WebhookHandle *wh)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Call @a wh callback with the operation result.
|
||||||
|
*
|
||||||
|
* @param wh proof handle to generate reply for
|
||||||
|
* @param status status to return
|
||||||
|
* @param account_id account to return
|
||||||
|
* @param inquiry_id inquiry ID to supply
|
||||||
|
* @param http_status HTTP status to use
|
||||||
|
* @param template template to instantiate
|
||||||
|
* @param[in] body body for the template to use (reference
|
||||||
|
* is consumed)
|
||||||
|
*/
|
||||||
|
static void
|
||||||
|
webhook_generic_reply (struct TALER_KYCLOGIC_WebhookHandle *wh,
|
||||||
|
enum TALER_KYCLOGIC_KycStatus status,
|
||||||
|
const char *account_id,
|
||||||
|
const char *inquiry_id,
|
||||||
|
unsigned int http_status)
|
||||||
|
{
|
||||||
|
struct MHD_Response *resp;
|
||||||
|
struct GNUNET_TIME_Absolute expiration;
|
||||||
|
|
||||||
|
if (TALER_KYCLOGIC_STATUS_SUCCESS == status)
|
||||||
|
expiration = GNUNET_TIME_relative_to_absolute (wh->pd->validity);
|
||||||
|
else
|
||||||
|
expiration = GNUNET_TIME_UNIT_ZERO_ABS;
|
||||||
|
resp = MHD_create_response_from_buffer (0,
|
||||||
|
"",
|
||||||
|
MHD_RESPMEM_PERSISTENT);
|
||||||
|
wh->cb (wh->cb_cls,
|
||||||
|
wh->legitimization_uuid,
|
||||||
|
&wh->h_payto,
|
||||||
|
account_id,
|
||||||
|
inquiry_id,
|
||||||
|
status,
|
||||||
|
expiration,
|
||||||
|
http_status,
|
||||||
|
resp);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Call @a wh callback with HTTP error response.
|
||||||
|
*
|
||||||
|
* @param wh proof handle to generate reply for
|
||||||
|
* @param inquiry_id inquiry ID to supply
|
||||||
|
* @param http_status HTTP status to use
|
||||||
|
* @param template template to instantiate
|
||||||
|
* @param[in] body body for the template to use (reference
|
||||||
|
* is consumed)
|
||||||
|
*/
|
||||||
|
static void
|
||||||
|
webhook_reply_error (struct TALER_KYCLOGIC_WebhookHandle *wh,
|
||||||
|
const char *inquiry_id,
|
||||||
|
unsigned int http_status)
|
||||||
|
{
|
||||||
|
webhook_generic_reply (wh,
|
||||||
|
TALER_KYCLOGIC_STATUS_PROVIDER_FAILED,
|
||||||
|
NULL, /* user id */
|
||||||
|
inquiry_id,
|
||||||
|
http_status);
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Function called when we're done processing the
|
* Function called when we're done processing the
|
||||||
* HTTP "/verifications/{verification_id}" request.
|
* HTTP "/verifications/{verification_id}" request.
|
||||||
@ -1408,234 +1489,243 @@ handle_webhook_finished (void *cls,
|
|||||||
{
|
{
|
||||||
struct TALER_KYCLOGIC_WebhookHandle *wh = cls;
|
struct TALER_KYCLOGIC_WebhookHandle *wh = cls;
|
||||||
const json_t *j = response;
|
const json_t *j = response;
|
||||||
|
const json_t *data = json_object_get (j,
|
||||||
|
"data");
|
||||||
|
|
||||||
wh->job = NULL;
|
wh->job = NULL;
|
||||||
json_dumpf (j,
|
json_dumpf (j,
|
||||||
stderr,
|
stderr,
|
||||||
JSON_INDENT (2));
|
JSON_INDENT (2));
|
||||||
#if 0
|
|
||||||
struct MHD_Response *resp;
|
|
||||||
|
|
||||||
switch (response_code)
|
switch (response_code)
|
||||||
{
|
{
|
||||||
case MHD_HTTP_OK:
|
case MHD_HTTP_OK:
|
||||||
{
|
{
|
||||||
const char *applicant_id;
|
const char *inquiry_id;
|
||||||
const char *verification_id;
|
const char *account_id;
|
||||||
const char *status;
|
const char *type = NULL;
|
||||||
bool verified;
|
json_t *attributes;
|
||||||
json_t *verifications;
|
|
||||||
struct GNUNET_JSON_Specification spec[] = {
|
struct GNUNET_JSON_Specification spec[] = {
|
||||||
GNUNET_JSON_spec_string ("applicant_id",
|
GNUNET_JSON_spec_string ("type",
|
||||||
&applicant_id),
|
&type),
|
||||||
GNUNET_JSON_spec_string ("verification_id",
|
GNUNET_JSON_spec_string ("id",
|
||||||
&verification_id),
|
&inquiry_id),
|
||||||
GNUNET_JSON_spec_string ("status",
|
GNUNET_JSON_spec_json ("attributes",
|
||||||
&status), /* completed, pending, ... */
|
&attributes),
|
||||||
GNUNET_JSON_spec_bool ("verified",
|
|
||||||
&verified),
|
|
||||||
GNUNET_JSON_spec_json ("verifications",
|
|
||||||
&verifications),
|
|
||||||
GNUNET_JSON_spec_end ()
|
GNUNET_JSON_spec_end ()
|
||||||
};
|
};
|
||||||
struct GNUNET_TIME_Absolute expiration;
|
|
||||||
|
|
||||||
if (GNUNET_OK !=
|
if ( (NULL == data) ||
|
||||||
GNUNET_JSON_parse (j,
|
(GNUNET_OK !=
|
||||||
spec,
|
GNUNET_JSON_parse (data,
|
||||||
NULL, NULL))
|
spec,
|
||||||
|
NULL, NULL)) ||
|
||||||
|
(0 != strcmp (type,
|
||||||
|
"inquiry")) )
|
||||||
{
|
{
|
||||||
GNUNET_break_op (0);
|
GNUNET_break_op (0);
|
||||||
json_dumpf (j,
|
json_dumpf (j,
|
||||||
stderr,
|
stderr,
|
||||||
JSON_INDENT (2));
|
JSON_INDENT (2));
|
||||||
resp = TALER_MHD_MAKE_JSON_PACK (
|
webhook_reply_error (wh,
|
||||||
GNUNET_JSON_pack_uint64 ("persona_http_status",
|
inquiry_id,
|
||||||
response_code),
|
MHD_HTTP_BAD_GATEWAY);
|
||||||
GNUNET_JSON_pack_object_incref ("persona_body",
|
|
||||||
(json_t *) j));
|
|
||||||
wh->cb (wh->cb_cls,
|
|
||||||
wh->legi_row,
|
|
||||||
&wh->h_payto,
|
|
||||||
wh->applicant_id,
|
|
||||||
wh->verification_id,
|
|
||||||
TALER_KYCLOGIC_STATUS_PROVIDER_FAILED,
|
|
||||||
GNUNET_TIME_UNIT_ZERO_ABS, /* expiration */
|
|
||||||
MHD_HTTP_BAD_GATEWAY,
|
|
||||||
resp);
|
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
if (! verified)
|
|
||||||
{
|
{
|
||||||
log_failure (verifications);
|
const char *status; /* "completed", what else? */
|
||||||
}
|
const char *reference_id; /* or legitimization number */
|
||||||
resp = MHD_create_response_from_buffer (0,
|
const char *expired_at = NULL; /* often 'null' format: "2022-08-18T10:14:26.000Z" */
|
||||||
"",
|
struct GNUNET_JSON_Specification ispec[] = {
|
||||||
MHD_RESPMEM_PERSISTENT);
|
GNUNET_JSON_spec_string ("status",
|
||||||
if (verified)
|
&status),
|
||||||
{
|
GNUNET_JSON_spec_string ("reference_id",
|
||||||
expiration = GNUNET_TIME_relative_to_absolute (wh->pd->validity);
|
&reference_id),
|
||||||
wh->cb (wh->cb_cls,
|
GNUNET_JSON_spec_mark_optional (
|
||||||
wh->legi_row,
|
GNUNET_JSON_spec_string ("expired_at",
|
||||||
&wh->h_payto,
|
&expired_at),
|
||||||
wh->applicant_id,
|
NULL),
|
||||||
wh->verification_id,
|
GNUNET_JSON_spec_end ()
|
||||||
TALER_KYCLOGIC_STATUS_SUCCESS,
|
};
|
||||||
expiration,
|
|
||||||
MHD_HTTP_NO_CONTENT,
|
if (GNUNET_OK !=
|
||||||
resp);
|
GNUNET_JSON_parse (attributes,
|
||||||
}
|
ispec,
|
||||||
else
|
NULL, NULL))
|
||||||
{
|
{
|
||||||
wh->cb (wh->cb_cls,
|
GNUNET_break_op (0);
|
||||||
wh->legi_row,
|
json_dumpf (j,
|
||||||
&wh->h_payto,
|
stderr,
|
||||||
wh->applicant_id,
|
JSON_INDENT (2));
|
||||||
wh->verification_id,
|
webhook_reply_error (wh,
|
||||||
TALER_KYCLOGIC_STATUS_USER_ABORTED,
|
inquiry_id,
|
||||||
GNUNET_TIME_UNIT_ZERO_ABS,
|
MHD_HTTP_BAD_GATEWAY);
|
||||||
MHD_HTTP_NO_CONTENT,
|
GNUNET_JSON_parse_free (ispec);
|
||||||
resp);
|
GNUNET_JSON_parse_free (spec);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
{
|
||||||
|
unsigned long long idr;
|
||||||
|
char dummy;
|
||||||
|
|
||||||
|
if ( (1 != sscanf (reference_id,
|
||||||
|
"%llu%c",
|
||||||
|
&idr,
|
||||||
|
&dummy)) ||
|
||||||
|
(idr != wh->legitimization_uuid) )
|
||||||
|
{
|
||||||
|
GNUNET_break_op (0);
|
||||||
|
webhook_reply_error (wh,
|
||||||
|
inquiry_id,
|
||||||
|
MHD_HTTP_BAD_GATEWAY);
|
||||||
|
GNUNET_JSON_parse_free (ispec);
|
||||||
|
GNUNET_JSON_parse_free (spec);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (0 != strcmp (inquiry_id,
|
||||||
|
wh->inquiry_id))
|
||||||
|
{
|
||||||
|
GNUNET_break_op (0);
|
||||||
|
webhook_reply_error (wh,
|
||||||
|
inquiry_id,
|
||||||
|
MHD_HTTP_BAD_GATEWAY);
|
||||||
|
GNUNET_JSON_parse_free (ispec);
|
||||||
|
GNUNET_JSON_parse_free (spec);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
account_id = json_string_value (
|
||||||
|
json_object_get (
|
||||||
|
json_object_get (
|
||||||
|
json_object_get (
|
||||||
|
json_object_get (
|
||||||
|
data,
|
||||||
|
"relationships"),
|
||||||
|
"account"),
|
||||||
|
"data"),
|
||||||
|
"id"));
|
||||||
|
|
||||||
|
if (0 != strcmp (status,
|
||||||
|
"completed"))
|
||||||
|
{
|
||||||
|
webhook_generic_reply (wh,
|
||||||
|
TALER_KYCLOGIC_STATUS_FAILED,
|
||||||
|
account_id,
|
||||||
|
inquiry_id,
|
||||||
|
MHD_HTTP_OK);
|
||||||
|
GNUNET_JSON_parse_free (ispec);
|
||||||
|
GNUNET_JSON_parse_free (spec);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (NULL == account_id)
|
||||||
|
{
|
||||||
|
GNUNET_break_op (0);
|
||||||
|
json_dumpf (data,
|
||||||
|
stderr,
|
||||||
|
JSON_INDENT (2));
|
||||||
|
webhook_reply_error (wh,
|
||||||
|
inquiry_id,
|
||||||
|
MHD_HTTP_BAD_GATEWAY);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
webhook_generic_reply (wh,
|
||||||
|
TALER_KYCLOGIC_STATUS_SUCCESS,
|
||||||
|
account_id,
|
||||||
|
inquiry_id,
|
||||||
|
MHD_HTTP_OK);
|
||||||
|
GNUNET_JSON_parse_free (ispec);
|
||||||
}
|
}
|
||||||
GNUNET_JSON_parse_free (spec);
|
GNUNET_JSON_parse_free (spec);
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
break;
|
|
||||||
case MHD_HTTP_BAD_REQUEST:
|
case MHD_HTTP_BAD_REQUEST:
|
||||||
case MHD_HTTP_NOT_FOUND:
|
case MHD_HTTP_NOT_FOUND:
|
||||||
case MHD_HTTP_CONFLICT:
|
case MHD_HTTP_CONFLICT:
|
||||||
|
case MHD_HTTP_UNPROCESSABLE_ENTITY:
|
||||||
|
/* These are errors with this code */
|
||||||
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
||||||
"PERSONA failed with response %u:\n",
|
"PERSONA failed with response %u:\n",
|
||||||
(unsigned int) response_code);
|
(unsigned int) response_code);
|
||||||
json_dumpf (j,
|
json_dumpf (j,
|
||||||
stderr,
|
stderr,
|
||||||
JSON_INDENT (2));
|
JSON_INDENT (2));
|
||||||
resp = TALER_MHD_MAKE_JSON_PACK (
|
webhook_reply_error (wh,
|
||||||
GNUNET_JSON_pack_uint64 ("persona_http_status",
|
wh->inquiry_id,
|
||||||
response_code));
|
MHD_HTTP_BAD_GATEWAY);
|
||||||
wh->cb (wh->cb_cls,
|
|
||||||
wh->legi_row,
|
|
||||||
&wh->h_payto,
|
|
||||||
wh->applicant_id,
|
|
||||||
wh->verification_id,
|
|
||||||
TALER_KYCLOGIC_STATUS_PROVIDER_FAILED,
|
|
||||||
GNUNET_TIME_UNIT_ZERO_ABS, /* expiration */
|
|
||||||
MHD_HTTP_INTERNAL_SERVER_ERROR,
|
|
||||||
resp);
|
|
||||||
break;
|
break;
|
||||||
case MHD_HTTP_UNAUTHORIZED:
|
case MHD_HTTP_UNAUTHORIZED:
|
||||||
case MHD_HTTP_PAYMENT_REQUIRED:
|
/* These are failures of the exchange operator */
|
||||||
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
||||||
"Refused access with HTTP status code %u\n",
|
"Refused access with HTTP status code %u\n",
|
||||||
(unsigned int) response_code);
|
(unsigned int) response_code);
|
||||||
resp = TALER_MHD_MAKE_JSON_PACK (
|
webhook_reply_error (wh,
|
||||||
GNUNET_JSON_pack_uint64 ("persona_http_status",
|
wh->inquiry_id,
|
||||||
response_code),
|
MHD_HTTP_INTERNAL_SERVER_ERROR);
|
||||||
GNUNET_JSON_pack_object_incref ("persona_body",
|
break;
|
||||||
(json_t *) j));
|
case MHD_HTTP_PAYMENT_REQUIRED:
|
||||||
wh->cb (wh->cb_cls,
|
/* These are failures of the exchange operator */
|
||||||
wh->legi_row,
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
||||||
&wh->h_payto,
|
"Refused access with HTTP status code %u\n",
|
||||||
wh->applicant_id,
|
(unsigned int) response_code);
|
||||||
wh->verification_id,
|
|
||||||
TALER_KYCLOGIC_STATUS_PROVIDER_FAILED,
|
webhook_reply_error (wh,
|
||||||
GNUNET_TIME_UNIT_ZERO_ABS, /* expiration */
|
wh->inquiry_id,
|
||||||
MHD_HTTP_NETWORK_AUTHENTICATION_REQUIRED,
|
MHD_HTTP_INTERNAL_SERVER_ERROR);
|
||||||
resp);
|
|
||||||
break;
|
break;
|
||||||
case MHD_HTTP_REQUEST_TIMEOUT:
|
case MHD_HTTP_REQUEST_TIMEOUT:
|
||||||
resp = TALER_MHD_MAKE_JSON_PACK (
|
/* These are networking issues */
|
||||||
GNUNET_JSON_pack_uint64 ("persona_http_status",
|
|
||||||
response_code),
|
|
||||||
GNUNET_JSON_pack_object_incref ("persona_body",
|
|
||||||
(json_t *) j));
|
|
||||||
wh->cb (wh->cb_cls,
|
|
||||||
wh->legi_row,
|
|
||||||
&wh->h_payto,
|
|
||||||
wh->applicant_id,
|
|
||||||
wh->verification_id,
|
|
||||||
TALER_KYCLOGIC_STATUS_PROVIDER_FAILED,
|
|
||||||
GNUNET_TIME_UNIT_ZERO_ABS, /* expiration */
|
|
||||||
MHD_HTTP_GATEWAY_TIMEOUT,
|
|
||||||
resp);
|
|
||||||
break;
|
|
||||||
case MHD_HTTP_UNPROCESSABLE_ENTITY: /* validation */
|
|
||||||
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
||||||
"PERSONA failed with response %u:\n",
|
"PERSONA failed with response %u:\n",
|
||||||
(unsigned int) response_code);
|
(unsigned int) response_code);
|
||||||
json_dumpf (j,
|
json_dumpf (j,
|
||||||
stderr,
|
stderr,
|
||||||
JSON_INDENT (2));
|
JSON_INDENT (2));
|
||||||
resp = TALER_MHD_MAKE_JSON_PACK (
|
webhook_reply_error (wh,
|
||||||
GNUNET_JSON_pack_uint64 ("persona_http_status",
|
wh->inquiry_id,
|
||||||
response_code),
|
MHD_HTTP_GATEWAY_TIMEOUT);
|
||||||
GNUNET_JSON_pack_object_incref ("persona_body",
|
|
||||||
(json_t *) j));
|
|
||||||
wh->cb (wh->cb_cls,
|
|
||||||
wh->legi_row,
|
|
||||||
&wh->h_payto,
|
|
||||||
wh->applicant_id,
|
|
||||||
wh->verification_id,
|
|
||||||
TALER_KYCLOGIC_STATUS_PROVIDER_FAILED,
|
|
||||||
GNUNET_TIME_UNIT_ZERO_ABS, /* expiration */
|
|
||||||
MHD_HTTP_BAD_GATEWAY,
|
|
||||||
resp);
|
|
||||||
break;
|
break;
|
||||||
case MHD_HTTP_TOO_MANY_REQUESTS:
|
case MHD_HTTP_TOO_MANY_REQUESTS:
|
||||||
resp = TALER_MHD_MAKE_JSON_PACK (
|
/* This is a load issue */
|
||||||
GNUNET_JSON_pack_uint64 ("persona_http_status",
|
|
||||||
response_code),
|
|
||||||
GNUNET_JSON_pack_object_incref ("persona_body",
|
|
||||||
(json_t *) j));
|
|
||||||
wh->cb (wh->cb_cls,
|
|
||||||
wh->legi_row,
|
|
||||||
&wh->h_payto,
|
|
||||||
wh->applicant_id,
|
|
||||||
wh->verification_id,
|
|
||||||
TALER_KYCLOGIC_STATUS_PROVIDER_FAILED,
|
|
||||||
GNUNET_TIME_UNIT_ZERO_ABS, /* expiration */
|
|
||||||
MHD_HTTP_SERVICE_UNAVAILABLE,
|
|
||||||
resp);
|
|
||||||
break;
|
|
||||||
case MHD_HTTP_INTERNAL_SERVER_ERROR:
|
|
||||||
resp = TALER_MHD_MAKE_JSON_PACK (
|
|
||||||
GNUNET_JSON_pack_uint64 ("persona_http_status",
|
|
||||||
response_code),
|
|
||||||
GNUNET_JSON_pack_object_incref ("persona_body",
|
|
||||||
(json_t *) j));
|
|
||||||
wh->cb (wh->cb_cls,
|
|
||||||
wh->legi_row,
|
|
||||||
&wh->h_payto,
|
|
||||||
wh->applicant_id,
|
|
||||||
wh->verification_id,
|
|
||||||
TALER_KYCLOGIC_STATUS_PROVIDER_FAILED,
|
|
||||||
GNUNET_TIME_UNIT_ZERO_ABS, /* expiration */
|
|
||||||
MHD_HTTP_BAD_GATEWAY,
|
|
||||||
resp);
|
|
||||||
break;
|
|
||||||
default:
|
|
||||||
resp = TALER_MHD_MAKE_JSON_PACK (
|
|
||||||
GNUNET_JSON_pack_uint64 ("persona_http_status",
|
|
||||||
response_code),
|
|
||||||
GNUNET_JSON_pack_object_incref ("persona_body",
|
|
||||||
(json_t *) j));
|
|
||||||
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
||||||
"Unexpected PERSONA response %u:\n",
|
"PERSONA failed with response %u:\n",
|
||||||
(unsigned int) response_code);
|
(unsigned int) response_code);
|
||||||
json_dumpf (j,
|
json_dumpf (j,
|
||||||
stderr,
|
stderr,
|
||||||
JSON_INDENT (2));
|
JSON_INDENT (2));
|
||||||
wh->cb (wh->cb_cls,
|
webhook_reply_error (wh,
|
||||||
wh->legi_row,
|
wh->inquiry_id,
|
||||||
&wh->h_payto,
|
MHD_HTTP_SERVICE_UNAVAILABLE);
|
||||||
wh->applicant_id,
|
break;
|
||||||
wh->verification_id,
|
case MHD_HTTP_INTERNAL_SERVER_ERROR:
|
||||||
TALER_KYCLOGIC_STATUS_PROVIDER_FAILED,
|
/* This is an issue with Persona */
|
||||||
GNUNET_TIME_UNIT_ZERO_ABS, /* expiration */
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
||||||
MHD_HTTP_BAD_GATEWAY,
|
"PERSONA failed with response %u:\n",
|
||||||
resp);
|
(unsigned int) response_code);
|
||||||
|
json_dumpf (j,
|
||||||
|
stderr,
|
||||||
|
JSON_INDENT (2));
|
||||||
|
webhook_reply_error (wh,
|
||||||
|
wh->inquiry_id,
|
||||||
|
MHD_HTTP_BAD_GATEWAY);
|
||||||
|
break;
|
||||||
|
default:
|
||||||
|
/* This is an issue with Persona */
|
||||||
|
GNUNET_log (GNUNET_ERROR_TYPE_ERROR,
|
||||||
|
"PERSONA failed with response %u:\n",
|
||||||
|
(unsigned int) response_code);
|
||||||
|
json_dumpf (j,
|
||||||
|
stderr,
|
||||||
|
JSON_INDENT (2));
|
||||||
|
webhook_reply_error (wh,
|
||||||
|
wh->inquiry_id,
|
||||||
|
MHD_HTTP_BAD_GATEWAY);
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
#endif
|
|
||||||
persona_webhook_cancel (wh);
|
persona_webhook_cancel (wh);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1651,8 +1741,8 @@ async_webhook_reply (void *cls)
|
|||||||
struct TALER_KYCLOGIC_WebhookHandle *wh = cls;
|
struct TALER_KYCLOGIC_WebhookHandle *wh = cls;
|
||||||
|
|
||||||
wh->cb (wh->cb_cls,
|
wh->cb (wh->cb_cls,
|
||||||
wh->legi_row,
|
wh->legitimization_uuid,
|
||||||
(0 == wh->legi_row)
|
(0 == wh->legitimization_uuid)
|
||||||
? NULL
|
? NULL
|
||||||
: &wh->h_payto,
|
: &wh->h_payto,
|
||||||
NULL, /* FIXME: never known here, but maybe prevent clearing it in the DB as it should already be there? */
|
NULL, /* FIXME: never known here, but maybe prevent clearing it in the DB as it should already be there? */
|
||||||
@ -1665,6 +1755,35 @@ async_webhook_reply (void *cls)
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Function called with the provider details and
|
||||||
|
* associated plugin closures for matching logics.
|
||||||
|
*
|
||||||
|
* @param cls closure
|
||||||
|
* @param pd provider details of a matching logic
|
||||||
|
* @param plugin_cls closure of the plugin
|
||||||
|
* @return #GNUNET_OK to continue to iterate
|
||||||
|
*/
|
||||||
|
static enum GNUNET_GenericReturnValue
|
||||||
|
locate_details_cb (
|
||||||
|
void *cls,
|
||||||
|
const struct TALER_KYCLOGIC_ProviderDetails *pd,
|
||||||
|
void *plugin_cls)
|
||||||
|
{
|
||||||
|
struct TALER_KYCLOGIC_WebhookHandle *wh = cls;
|
||||||
|
|
||||||
|
/* This type-checks 'pd' */
|
||||||
|
GNUNET_assert (plugin_cls == wh->ps);
|
||||||
|
if (0 == strcmp (pd->template_id,
|
||||||
|
wh->template_id))
|
||||||
|
{
|
||||||
|
wh->pd = pd;
|
||||||
|
return GNUNET_NO;
|
||||||
|
}
|
||||||
|
return GNUNET_OK;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Check KYC status and return result for Webhook. We do NOT implement the
|
* Check KYC status and return result for Webhook. We do NOT implement the
|
||||||
* authentication check proposed by the PERSONA documentation, as it would
|
* authentication check proposed by the PERSONA documentation, as it would
|
||||||
@ -1701,14 +1820,79 @@ persona_webhook (void *cls,
|
|||||||
CURL *eh;
|
CURL *eh;
|
||||||
enum GNUNET_DB_QueryStatus qs;
|
enum GNUNET_DB_QueryStatus qs;
|
||||||
const char *persona_inquiry_id;
|
const char *persona_inquiry_id;
|
||||||
|
const char *auth_header;
|
||||||
|
|
||||||
// FIXME: check webhook 'Authorization' header first!
|
/* Persona webhooks are expected by logic, not by template */
|
||||||
|
GNUNET_break_op (NULL == pd);
|
||||||
wh = GNUNET_new (struct TALER_KYCLOGIC_WebhookHandle);
|
wh = GNUNET_new (struct TALER_KYCLOGIC_WebhookHandle);
|
||||||
wh->cb = cb;
|
wh->cb = cb;
|
||||||
wh->cb_cls = cb_cls;
|
wh->cb_cls = cb_cls;
|
||||||
wh->ps = ps;
|
wh->ps = ps;
|
||||||
wh->pd = pd;
|
|
||||||
wh->connection = connection;
|
wh->connection = connection;
|
||||||
|
wh->pd = pd;
|
||||||
|
|
||||||
|
auth_header = MHD_lookup_connection_value (connection,
|
||||||
|
MHD_HEADER_KIND,
|
||||||
|
MHD_HTTP_HEADER_AUTHORIZATION);
|
||||||
|
if ( (NULL != ps->webhook_token) &&
|
||||||
|
(0 != strcmp (ps->webhook_token,
|
||||||
|
auth_header)) )
|
||||||
|
{
|
||||||
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
||||||
|
"Invalid authorization header `%s' received for Persona webhook\n",
|
||||||
|
auth_header);
|
||||||
|
wh->resp = TALER_MHD_MAKE_JSON_PACK (
|
||||||
|
TALER_JSON_pack_ec (
|
||||||
|
TALER_EC_EXCHANGE_KYC_WEBHOOK_UNAUTHORIZED),
|
||||||
|
GNUNET_JSON_pack_string ("detail",
|
||||||
|
"unexpected 'Authorization' header"));
|
||||||
|
wh->response_code = MHD_HTTP_UNAUTHORIZED;
|
||||||
|
wh->task = GNUNET_SCHEDULER_add_now (&async_webhook_reply,
|
||||||
|
wh);
|
||||||
|
return wh;
|
||||||
|
}
|
||||||
|
|
||||||
|
wh->template_id
|
||||||
|
= json_string_value (
|
||||||
|
json_object_get (
|
||||||
|
json_object_get (
|
||||||
|
json_object_get (
|
||||||
|
json_object_get (
|
||||||
|
json_object_get (
|
||||||
|
json_object_get (
|
||||||
|
json_object_get (
|
||||||
|
json_object_get (
|
||||||
|
body,
|
||||||
|
"data"),
|
||||||
|
"attributes"),
|
||||||
|
"payload"),
|
||||||
|
"data"),
|
||||||
|
"relationships"),
|
||||||
|
"template"),
|
||||||
|
"data"),
|
||||||
|
"id"));
|
||||||
|
TALER_KYCLOGIC_kyc_get_details ("persona",
|
||||||
|
&locate_details_cb,
|
||||||
|
wh);
|
||||||
|
if (NULL == wh->pd)
|
||||||
|
{
|
||||||
|
GNUNET_break_op (0);
|
||||||
|
json_dumpf (body,
|
||||||
|
stderr,
|
||||||
|
JSON_INDENT (2));
|
||||||
|
wh->resp = TALER_MHD_MAKE_JSON_PACK (
|
||||||
|
TALER_JSON_pack_ec (
|
||||||
|
TALER_EC_EXCHANGE_KYC_GENERIC_LOGIC_UNKNOWN),
|
||||||
|
GNUNET_JSON_pack_string ("detail",
|
||||||
|
wh->template_id),
|
||||||
|
GNUNET_JSON_pack_object_incref ("webhook_body",
|
||||||
|
(json_t *) body));
|
||||||
|
wh->response_code = MHD_HTTP_BAD_REQUEST;
|
||||||
|
wh->task = GNUNET_SCHEDULER_add_now (&async_webhook_reply,
|
||||||
|
wh);
|
||||||
|
return wh;
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
persona_inquiry_id
|
persona_inquiry_id
|
||||||
= json_string_value (
|
= json_string_value (
|
||||||
@ -1730,6 +1914,10 @@ persona_webhook (void *cls,
|
|||||||
stderr,
|
stderr,
|
||||||
JSON_INDENT (2));
|
JSON_INDENT (2));
|
||||||
wh->resp = TALER_MHD_MAKE_JSON_PACK (
|
wh->resp = TALER_MHD_MAKE_JSON_PACK (
|
||||||
|
TALER_JSON_pack_ec (
|
||||||
|
TALER_EC_EXCHANGE_KYC_GENERIC_PROVIDER_UNEXPECTED_REPLY),
|
||||||
|
GNUNET_JSON_pack_string ("detail",
|
||||||
|
"data-attributes-payload-data-id"),
|
||||||
GNUNET_JSON_pack_object_incref ("webhook_body",
|
GNUNET_JSON_pack_object_incref ("webhook_body",
|
||||||
(json_t *) body));
|
(json_t *) body));
|
||||||
wh->response_code = MHD_HTTP_BAD_REQUEST;
|
wh->response_code = MHD_HTTP_BAD_REQUEST;
|
||||||
@ -1741,7 +1929,7 @@ persona_webhook (void *cls,
|
|||||||
pd->section,
|
pd->section,
|
||||||
persona_inquiry_id,
|
persona_inquiry_id,
|
||||||
&wh->h_payto,
|
&wh->h_payto,
|
||||||
&wh->legi_row);
|
&wh->legitimization_uuid);
|
||||||
if (qs < 0)
|
if (qs < 0)
|
||||||
{
|
{
|
||||||
wh->resp = TALER_MHD_make_error (TALER_EC_GENERIC_DB_FETCH_FAILED,
|
wh->resp = TALER_MHD_make_error (TALER_EC_GENERIC_DB_FETCH_FAILED,
|
||||||
@ -1754,7 +1942,7 @@ persona_webhook (void *cls,
|
|||||||
if (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS == qs)
|
if (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS == qs)
|
||||||
{
|
{
|
||||||
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
GNUNET_log (GNUNET_ERROR_TYPE_WARNING,
|
||||||
"Received webhook for unknown verification ID `%s'\n",
|
"Received Persona kyc-webhook for unknown verification ID `%s'\n",
|
||||||
persona_inquiry_id);
|
persona_inquiry_id);
|
||||||
wh->resp = TALER_MHD_make_error (
|
wh->resp = TALER_MHD_make_error (
|
||||||
TALER_EC_EXCHANGE_KYC_PROOF_REQUEST_UNKNOWN,
|
TALER_EC_EXCHANGE_KYC_PROOF_REQUEST_UNKNOWN,
|
||||||
@ -1830,6 +2018,15 @@ libtaler_plugin_kyclogic_persona_init (void *cls)
|
|||||||
GNUNET_free (ps);
|
GNUNET_free (ps);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
if (GNUNET_OK !=
|
||||||
|
GNUNET_CONFIGURATION_get_value_string (ps->cfg,
|
||||||
|
"kyclogic-persona",
|
||||||
|
"WEBHOOK_AUTH_TOKEN",
|
||||||
|
&ps->webhook_token))
|
||||||
|
{
|
||||||
|
/* optional */
|
||||||
|
ps->webhook_token = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
ps->curl_ctx
|
ps->curl_ctx
|
||||||
= GNUNET_CURL_init (&GNUNET_CURL_gnunet_scheduler_reschedule,
|
= GNUNET_CURL_init (&GNUNET_CURL_gnunet_scheduler_reschedule,
|
||||||
@ -1888,6 +2085,7 @@ libtaler_plugin_kyclogic_persona_done (void *cls)
|
|||||||
ps->curl_rc = NULL;
|
ps->curl_rc = NULL;
|
||||||
}
|
}
|
||||||
GNUNET_free (ps->exchange_base_url);
|
GNUNET_free (ps->exchange_base_url);
|
||||||
|
GNUNET_free (ps->webhook_token);
|
||||||
GNUNET_free (ps);
|
GNUNET_free (ps);
|
||||||
GNUNET_free (plugin);
|
GNUNET_free (plugin);
|
||||||
return NULL;
|
return NULL;
|
||||||
|
Loading…
Reference in New Issue
Block a user