Commit Graph

5497 Commits

Author SHA1 Message Date
c1a5a93298
Added global TEH_age_restriction_enabled and TEH_age_mask
Both flags are set when the DB-event for extensions triggers and the
type is TALER_Extension_AgeRestriction.
2022-02-08 11:10:00 +01:00
a172610ce2
missing field in prepared statement added 2022-02-08 10:52:20 +01:00
fed86ca185
-remove bogus call 2022-02-08 00:10:53 +01:00
1b1a6c142a
[WIP] hash and signature verification of /keys works again
- Hashes of (normal) denominations and age-restricted denominations are
  calculated seperately
- The hash of the age-restricted ones will then be added to the other
  hash
- The total hash is signed/verified

So far: test_exchange_api runs, including withdraw_age!

However, test_auditor_api fails and another is in a endless loop!
2022-02-08 00:00:24 +01:00
632d17f642
[WIP] moving towards withdrawal with age restriction
Age_mask now taken into account when denominations are being setup.
However, tests fail, because denoms can't be found!?  Probably because
on initial generation of the denominations, the age mask is not setup,
yet, because age restriction hasn't been enabled yet!?
2022-02-07 18:39:58 +01:00
d02b5e213a
[WIP] exchangedb adjustments for denominations
- all prepared statements re: denominations now handle age_mask

- signatures parameters adjusted.

Now compiles and Tests run but fail.

- good: we find denoms[] and age_restricted_denoms[] filled correctly in
  output to /keys

- bad: fails at exchange_api_handle.c:882, signature verification of
  denom.
2022-02-07 13:56:25 +01:00
f8b1c3f8db
Debugging session of withdraw with age restriction 2022-02-07 09:06:51 +01:00
1090389d6f
Narf, letzter commit war unvollständig durch uncrustify
Towards a complete test with age restriction

    - substantial amount of fixes in various parts
    - slight refactoring of extensions
    - fixes of post handler for /management/extensions
    - fixes for offline tool extensions signing

    State:
    - compiles, runs and tests succeed when age restriction is not
      enabled
    - compiles, runs and tests fail, when age restriction is enabled
2022-02-06 20:01:24 +01:00
932dcde25c
Towards a complete test with age restriction
- substantial amount of fixes in various parts
- slight refactoring of extensions
- fixes of post handler for /management/extensions
- fixes for offline tool extensions signing

State:
- compiles, runs and tests succeed when age restriction is not enabled
- compiles, runs and tests fail, when age restriction is enabled
2022-02-06 19:57:29 +01:00
f48ba6f043
Added age parameter to testing (0 for now)
- TALER_EXCHANGE_DenomPublickey now carries age_mask
- TALER_TESTING_cmd_withdraw_amount* takes age parameter
- WithdrawState carries age_commitment and its hash
- withdraw_run derives new age commitment, if applicable
2022-02-06 12:50:57 +01:00
5e93e244bd
withdraw test prepared for age restriction
- TALER_TESTING_find_pk takes boolean age_restricted
- struct RefreshMeltState carries age commitment of melted coin
- melt_run calls TALER_age_commitment_derive, if necessary
2022-02-06 11:34:22 +01:00
e41c71f6ea
Actuall call TALER_age_commitment_derive
...from within TALER_EXCHANGE_refresh_prepare
2022-02-06 00:40:59 +01:00
d42394de9b
Added TALER_age_restriction_commitment_free_inside
cleanup function for ->pub and ->priv (and zeroing keys)
2022-02-05 23:51:09 +01:00
7b50b2d17c
TALER_age_restriction_{commit,derive} implemented 2022-02-05 23:20:58 +01:00
1b2fd76f94
add num_priv_keys 2022-02-05 16:07:46 +01:00
9a0c86d644
slowly implementing age restriction in refresh/reveal
- hash of age commitment passed around API boundaries
- code compiles and tests run
- ready to derive new age commitment
2022-02-05 15:20:15 +01:00
e6d85c824f
tests compile, don't crash but fail 2022-02-04 11:38:59 +01:00
096834aa28
Merge branch 'ar14' of ssh://git.kesim.org/taler/exchange into ar14 2022-02-02 14:58:26 +01:00
40ef0efd21
[WIP - DOESN'T COMPILE] melt/refresh/reveal cont. 2022-02-02 14:56:13 +01:00
31cc3d236a
more stops towards melt/reveal age restriction 2022-01-31 23:26:28 +01:00
53545c667b
Multiple refactoring changes
- TALER_AgeHash -> TALER_AgeCommitmentHash
- Parameter for TALER_planchet_prepare added pro forma
- Prototypes for _commit and _derive added
2022-01-31 17:55:12 +01:00
34e71cce0c
[WIP - DOESN'T COMPILE] age_commitment_hash added 2022-01-30 14:18:04 +01:00
0dfd1af8d7
rename macro 2022-01-24 09:39:19 +01:00
8fe127eb2e
age restriction progress
- age restriction extension simplified
  - its config is now global to extension
  - helper functions and macros introduced

- age restriction support for
  - melt is done
  - reveal continued
  - link started
2022-01-23 22:25:41 +01:00
ffe4cc06aa
gana update 2022-01-23 22:11:06 +01:00
2b85559c06
first steps towards age restriction support for coin refresh 2022-01-23 18:27:31 +01:00
8684a9bfea
[age_restriction] progress 13/n
- major refactoring of extensions
  - extensions live now in a separate library, libtalerextensions
  - refactored all components using age_restriction accordingly
  - plumbing for plugin support for extensions roughly layed down
2022-01-23 01:36:21 +01:00
1962ed6b0b
improvements in extension handling
- extensions_sig is needed globally
- keep original json with config of extension
- fixed various bugs re: extension handling
2022-01-22 00:26:43 +01:00
0b56de6c99
[age restriction] progress 12/n
- taler-offline-tool now handles extensions
  - command "extensions" added with subcommands "show" and "sign"
  - parses extensions from taler config
  - shows and signs of extensions and their configurations
  - creates signed set of configurations for upload
  - added test for retrieval of extension config

- simplified signature verification for extensions
  - remove per-extension signatures, also from DB schema
  - adjust prepared statements accordingly
  - adjust DB event handler for extensions
  - allow NULL for config for extension in DB schema
  - handler for /management/extensions adjusted to new datastructures

- changed test for TALER_denom_blind/TALER_denom_sign_blinded with and
  without TALER_AgeHash

- minor updates and various fixes
2022-01-21 15:41:02 +01:00
Thien-Thi Nguyen
0b6ebc6160
fix FTBFS (Linux) for 2022-01-18, "use 'pipe' instead of 'eventfd' on non-Linux systems"
add back #include <sys/eventfd.h>, but conditionalize on #ifdef __linux__

(This fix follows the spirit of the other changes (i.e.,
adding #ifdef __linux__) but might not be the best solution.)
2022-01-18 19:34:41 -05:00
Jonathan Buchanan
c10b783521
use 'pipe' instead of 'eventfd' on non-Linux systems 2022-01-18 09:15:54 -05:00
Christian Grothoff
766a291151
fix #7143 2022-01-11 17:56:32 +01:00
Christian Grothoff
e7aeec04f4
The current recoup API is broken. I guess this is another example where "trivial" API changes turn out to have (multiple!) unexpected consequences.
The current "/recoup" API does not have clear idempotency semantics, as we've discussed on the phone.  This is already bad by itself, as it makes it hard to write down what the API does other than "whatever the implementation does".

However, it actually breaks correctness in this (admittedly kinda contrived, but not impossible) case:

Say that we have a coin A obtained via withdrawal and a coin B obtained via refreshing coin A. Now the denominations of A gets revoked..

The wallet does a recoup of A for EUR:1.

Now the denomination of B also gets revoked.  The wallet recoups B (incidentally also for EUR:1) and now A can be recouped again for EUR:1.  But now the exchange is in a state where it will refuse a legitimate recoup request for A because the detection for an idempotent request kicks in.

This is IMHO bad API design, and the exchange should simply always recoup the maximum amount.

Furthermore, we usually follow the principle of "API calls that take up DB space are paid".  With the current recoup API, I can do many tiny recoup requests which the exchange then has to store, right?

I guess it would not be a big change to remove the "amount" value from the recoup/recoup-refresh request bodies, right?

- Florian
2022-01-11 12:47:35 +01:00
Christian Grothoff
aaaaa9a103
fix amount denormalization issue 2022-01-10 09:04:09 +01:00
14efa23a2b
improve error response for withdrawal 2022-01-10 01:23:46 +01:00
e30989c930
[age restriction] progress 11/n
Parse age restriction information from "/keys"
- parse "age_restriction" extension, extract mask for age groups
- parse denominations from "age_restricted_denoms", too, if available
2022-01-10 00:04:23 +01:00
d91750ca0f
drop extensions table 2022-01-08 19:45:19 +01:00
d6bf20028d
Fixed prepared statement for extensions 2022-01-08 19:45:00 +01:00
cc7d7707ab
[age restriction] progress 10/n
More work towards support for extensions:
- Prepared statements and DB-plugin-functions for setting and retrieving
  configurations from the database added.
- primitive "registry" of extensions for age restrictions and peer2peer
  (stub)
- TALER_Extensions now with FP for parsing, setting and converting a
  configuration.
- /management/extensions handler now verifies signature of the (opaque)
  json object for all extensions.
- /management/extensions handler calls the FP in the corrensponding
  TALER_Extension for parsing and setting the configuration of a
  particular extension

More work towards age restriction:
- TALER_Extensions interfaces for config-parser, -setter and converter
  implemented for age restriction
- DB event handler now retrieves config from database, parses it and
  sets it (the age mask) in the global extension.
- load_age_mask now loads age mask from the global extension (and not
  from the config file)
- add age_restricted_denoms to /keys response
2022-01-08 14:40:20 +01:00
Christian Grothoff
b49fac3d58
-introduce new convenience macro 2021-12-31 11:23:42 +01:00
Christian Grothoff
5cd2bc5de3
-cleanup 2021-12-28 15:36:26 +01:00
ef4238874f
[age restriction] progress 9/n
More worke towards support for extensions and age restriction:

- taler-exchange-httpd_management_extensions.c almost completed
  - handling of request implemented
  - stub "set_extensions" for database transaction added

- utility functions added
  - TALER_exchange_offline_extension_agemask_{sign,verify}
  - TALER_agemask_parse_json
2021-12-27 23:24:48 +01:00
Christian Grothoff
070f442a11
resolve #7124: ensure -s also deletes work_shards 2021-12-26 13:05:39 +01:00
Christian Grothoff
e7d4183d1c
-fix FTBFS 2021-12-25 17:22:54 +01:00
Christian Grothoff
74e4c6429a
clean up refresh-reveal logic, reducing local copying 2021-12-25 16:13:06 +01:00
Christian Grothoff
f6ecb6c895
-eliminate redundant hash operation on link signatures 2021-12-25 15:39:01 +01:00
Christian Grothoff
84c9adf5a6
v12: also do not sign over merchant_pub in REFUND signature, centralize logic 2021-12-25 14:58:04 +01:00
Christian Grothoff
1c34489905
-add missing #include 2021-12-25 14:08:47 +01:00
Christian Grothoff
87376e02eb
protocol v12 changes (/recoup split, signature changes) plus database sharding plus O(n^2)=>O(n) worst-case complexity reduction on coin balance checks 2021-12-25 13:56:40 +01:00
Christian Grothoff
2c14d33870
deduplicate melt signing logic, remove coin_pub from data being signed over 2021-12-25 13:56:40 +01:00