From ae2f1ced8ba313dfa5058b0568d1de419bc83d9c Mon Sep 17 00:00:00 2001 From: Christian Grothoff Date: Fri, 22 Apr 2022 23:22:06 +0200 Subject: [PATCH] skeleton for GET /purses/ client --- src/lib/exchange_api_purses_get.c | 244 ++++++++++++++++++++++++++++++ 1 file changed, 244 insertions(+) create mode 100644 src/lib/exchange_api_purses_get.c diff --git a/src/lib/exchange_api_purses_get.c b/src/lib/exchange_api_purses_get.c new file mode 100644 index 000000000..c32bc950b --- /dev/null +++ b/src/lib/exchange_api_purses_get.c @@ -0,0 +1,244 @@ +/* + This file is part of TALER + Copyright (C) 2022 Taler Systems SA + + TALER is free software; you can redistribute it and/or modify it under the + terms of the GNU General Public License as published by the Free Software + Foundation; either version 3, or (at your option) any later version. + + TALER is distributed in the hope that it will be useful, but WITHOUT ANY + WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR + A PARTICULAR PURPOSE. See the GNU General Public License for more details. + + You should have received a copy of the GNU General Public License along with + TALER; see the file COPYING. If not, see + +*/ +/** + * @file lib/exchange_api_purses_get.c + * @brief Implementation of the /purses/ GET request + * @author Christian Grothoff + */ +#include "platform.h" +#include +#include /* just for HTTP status codes */ +#include +#include +#include +#include "taler_json_lib.h" +#include "taler_exchange_service.h" +#include "exchange_api_handle.h" +#include "taler_signatures.h" +#include "exchange_api_curl_defaults.h" + + +/** + * @brief A Contract Get Handle + */ +struct TALER_EXCHANGE_PursesGetHandle +{ + + /** + * The connection to exchange this request handle will use + */ + struct TALER_EXCHANGE_Handle *exchange; + + /** + * The url for this request. + */ + char *url; + + /** + * Handle for the request. + */ + struct GNUNET_CURL_Job *job; + + /** + * Function to call with the result. + */ + TALER_EXCHANGE_PurseGetCallback cb; + + /** + * Closure for @a cb. + */ + void *cb_cls; + +}; + + +/** + * Function called when we're done processing the + * HTTP /purses/$PID GET request. + * + * @param cls the `struct TALER_EXCHANGE_PursesGetHandle` + * @param response_code HTTP response code, 0 on error + * @param response parsed JSON result, NULL on error + */ +static void +handle_purse_get_finished (void *cls, + long response_code, + const void *response) +{ + struct TALER_EXCHANGE_PursesGetHandle *cgh = cls; + const json_t *j = response; + struct TALER_EXCHANGE_PurseGetResponse dr = { + .hr.reply = j, + .hr.http_status = (unsigned int) response_code + }; + + cgh->job = NULL; + switch (response_code) + { + case 0: + dr.hr.ec = TALER_EC_GENERIC_INVALID_RESPONSE; + break; + case MHD_HTTP_OK: + { + struct GNUNET_JSON_Specification spec[] = { + GNUNET_JSON_spec_timestamp ("merge_timestamp", + &dr.details.success.merge_timestamp), + GNUNET_JSON_spec_timestamp ("deposit_timestamp", + &dr.details.success.deposit_timestamp), + GNUNET_JSON_spec_end () + }; + + if (GNUNET_OK != + GNUNET_JSON_parse (j, + spec, + NULL, NULL)) + { + GNUNET_break_op (0); + dr.hr.http_status = 0; + dr.hr.ec = TALER_EC_GENERIC_REPLY_MALFORMED; + break; + } + cgh->cb (cgh->cb_cls, + &dr); + TALER_EXCHANGE_purse_get_cancel (cgh); + return; + } + case MHD_HTTP_BAD_REQUEST: + dr.hr.ec = TALER_JSON_get_error_code (j); + dr.hr.hint = TALER_JSON_get_error_hint (j); + /* This should never happen, either us or the exchange is buggy + (or API version conflict); just pass JSON reply to the application */ + break; + case MHD_HTTP_FORBIDDEN: + dr.hr.ec = TALER_JSON_get_error_code (j); + dr.hr.hint = TALER_JSON_get_error_hint (j); + /* Nothing really to verify, exchange says one of the signatures is + invalid; as we checked them, this should never happen, we + should pass the JSON reply to the application */ + break; + case MHD_HTTP_NOT_FOUND: + dr.hr.ec = TALER_JSON_get_error_code (j); + dr.hr.hint = TALER_JSON_get_error_hint (j); + /* Exchange does not know about transaction; + we should pass the reply to the application */ + break; + case MHD_HTTP_INTERNAL_SERVER_ERROR: + dr.hr.ec = TALER_JSON_get_error_code (j); + dr.hr.hint = TALER_JSON_get_error_hint (j); + /* Server had an internal issue; we should retry, but this API + leaves this to the application */ + break; + default: + /* unexpected response code */ + dr.hr.ec = TALER_JSON_get_error_code (j); + dr.hr.hint = TALER_JSON_get_error_hint (j); + GNUNET_log (GNUNET_ERROR_TYPE_ERROR, + "Unexpected response code %u/%d for exchange GET purses\n", + (unsigned int) response_code, + (int) dr.hr.ec); + GNUNET_break_op (0); + break; + } + cgh->cb (cgh->cb_cls, + &dr); + TALER_EXCHANGE_purse_get_cancel (cgh); +} + + +struct TALER_EXCHANGE_PursesGetHandle * +TALER_EXCHANGE_purse_get ( + struct TALER_EXCHANGE_Handle *exchange, + const struct TALER_PurseContractPrivateKeyP *purse_priv, + struct GNUNET_TIME_Relative merge_timeout, + struct GNUNET_TIME_Relative deposit_timeout, + TALER_EXCHANGE_PurseGetCallback cb, + void *cb_cls) +{ + struct TALER_EXCHANGE_PursesGetHandle *cgh; + CURL *eh; + struct TALER_PurseContractPublicKeyP purse_pub; + char arg_str[sizeof (purse_pub) * 2 + 48]; + + if (GNUNET_YES != + TEAH_handle_is_ready (exchange)) + { + GNUNET_break (0); + return NULL; + } + cgh = GNUNET_new (struct TALER_EXCHANGE_PursesGetHandle); + cgh->exchange = exchange; + cgh->cb = cb; + cgh->cb_cls = cb_cls; + GNUNET_CRYPTO_ecdhe_key_get_public (&purse_priv->ecdhe_priv, + &purse_pub.ecdhe_pub); + { + char cpub_str[sizeof (purse_pub) * 2]; + char *end; + + end = GNUNET_STRINGS_data_to_string (&purse_pub, + sizeof (purse_pub), + cpub_str, + sizeof (cpub_str)); + *end = '\0'; + GNUNET_snprintf (arg_str, + sizeof (arg_str), + "/purses/%s", + cpub_str); + } + + cgh->url = TEAH_path_to_url (exchange, + arg_str); + if (NULL == cgh->url) + { + GNUNET_free (cgh); + return NULL; + } + eh = TALER_EXCHANGE_curl_easy_get_ (cgh->url); + if (NULL == eh) + { + GNUNET_break (0); + GNUNET_free (cgh->url); + GNUNET_free (cgh); + return NULL; + } + /* FIXME: add signature with purse_priv + to authorize the GET request!? Or + decide it is non-critical and only + pass purse_pub? */ + cgh->job = GNUNET_CURL_job_add (TEAH_handle_to_context (exchange), + eh, + &handle_purse_get_finished, + cgh); + return cgh; +} + + +void +TALER_EXCHANGE_purse_get_cancel ( + struct TALER_EXCHANGE_PursesGetHandle *cgh) +{ + if (NULL != cgh->job) + { + GNUNET_CURL_job_cancel (cgh->job); + cgh->job = NULL; + } + GNUNET_free (cgh->url); + GNUNET_free (cgh); +} + + +/* end of exchange_api_purses_get.c */