exchange/src/testing/testing_api_cmd_oauth.c
2021-11-07 23:42:03 +01:00

245 lines
7.4 KiB
C

/*
This file is part of TALER
Copyright (C) 2021 Taler Systems SA
TALER is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as
published by the Free Software Foundation; either version 3, or
(at your option) any later version.
TALER is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public
License along with TALER; see the file COPYING. If not, see
<http://www.gnu.org/licenses/>
*/
/**
* @file testing/testing_api_cmd_oauth.c
* @brief Implement a CMD to run an OAuth service for faking the legitimation service
* @author Christian Grothoff
*/
#include "platform.h"
#include "taler_json_lib.h"
#include <gnunet/gnunet_curl_lib.h>
#include "taler_testing_lib.h"
#include "taler_mhd_lib.h"
/**
* State for the oauth CMD.
*/
struct OAuthState
{
/**
* Handle to the "oauth" service.
*/
struct MHD_Daemon *mhd;
/**
* Port to listen on.
*/
uint16_t port;
};
/**
* A client has requested the given url using the given method
* (#MHD_HTTP_METHOD_GET, #MHD_HTTP_METHOD_PUT,
* #MHD_HTTP_METHOD_DELETE, #MHD_HTTP_METHOD_POST, etc). The callback
* must call MHD callbacks to provide content to give back to the
* client and return an HTTP status code (i.e. #MHD_HTTP_OK,
* #MHD_HTTP_NOT_FOUND, etc.).
*
* @param cls argument given together with the function
* pointer when the handler was registered with MHD
* @param url the requested url
* @param method the HTTP method used (#MHD_HTTP_METHOD_GET,
* #MHD_HTTP_METHOD_PUT, etc.)
* @param version the HTTP version string (i.e.
* #MHD_HTTP_VERSION_1_1)
* @param upload_data the data being uploaded (excluding HEADERS,
* for a POST that fits into memory and that is encoded
* with a supported encoding, the POST data will NOT be
* given in upload_data and is instead available as
* part of #MHD_get_connection_values; very large POST
* data *will* be made available incrementally in
* @a upload_data)
* @param[in,out] upload_data_size set initially to the size of the
* @a upload_data provided; the method must update this
* value to the number of bytes NOT processed;
* @param[in,out] con_cls pointer that the callback can set to some
* address and that will be preserved by MHD for future
* calls for this request; since the access handler may
* be called many times (i.e., for a PUT/POST operation
* with plenty of upload data) this allows the application
* to easily associate some request-specific state.
* If necessary, this state can be cleaned up in the
* global #MHD_RequestCompletedCallback (which
* can be set with the #MHD_OPTION_NOTIFY_COMPLETED).
* Initially, `*con_cls` will be NULL.
* @return #MHD_YES if the connection was handled successfully,
* #MHD_NO if the socket must be closed due to a serious
* error while handling the request
*/
static enum MHD_Result
handler_cb (void *cls,
struct MHD_Connection *connection,
const char *url,
const char *method,
const char *version,
const char *upload_data,
size_t *upload_data_size,
void **con_cls)
{
const char *code;
const char *client_id;
const char *redirect_uri;
const char *client_secret;
unsigned int hc;
json_t *body;
code = MHD_lookup_connection_value (connection,
MHD_GET_ARGUMENT_KIND,
"code");
client_id = MHD_lookup_connection_value (connection,
MHD_GET_ARGUMENT_KIND,
"client_id");
redirect_uri = MHD_lookup_connection_value (connection,
MHD_GET_ARGUMENT_KIND,
"redirect_uri");
client_secret = MHD_lookup_connection_value (connection,
MHD_GET_ARGUMENT_KIND,
"client_secret");
if ( (NULL == code) ||
(NULL == client_id) ||
(NULL == redirect_uri) ||
(NULL == client_secret) )
{
GNUNET_break (0);
return MHD_NO;
}
if (0 != strcmp (client_id,
"taler-exchange"))
{
body = GNUNET_JSON_PACK (
GNUNET_JSON_pack_string ("error",
"unknown_client"),
GNUNET_JSON_pack_string ("error_description",
"only 'taler-exchange' is allowed"));
hc = MHD_HTTP_NOT_FOUND;
}
else if (0 != strcmp (client_secret,
"exchange-secret"))
{
body = GNUNET_JSON_PACK (
GNUNET_JSON_pack_string ("error",
"invalid_client_secret"),
GNUNET_JSON_pack_string ("error_description",
"only 'exchange-secret' is valid"));
hc = MHD_HTTP_FORBIDDEN;
}
else
{
if (0 != strcmp (code,
"pass"))
{
body = GNUNET_JSON_PACK (
GNUNET_JSON_pack_string ("error",
"invalid_grant"),
GNUNET_JSON_pack_string ("error_description",
"only 'pass' shall pass"));
hc = MHD_HTTP_FORBIDDEN;
}
else
{
body = GNUNET_JSON_PACK (
GNUNET_JSON_pack_string ("access_token",
"good"),
GNUNET_JSON_pack_string ("token_type",
"bearer"),
GNUNET_JSON_pack_uint64 ("expires_in",
3600),
GNUNET_JSON_pack_string ("refresh_token",
"better"));
hc = MHD_HTTP_OK;
}
}
return TALER_MHD_reply_json_steal (connection,
body,
hc);
}
/**
* Run the command.
*
* @param cls closure.
* @param cmd the command to execute.
* @param is the interpreter state.
*/
static void
oauth_run (void *cls,
const struct TALER_TESTING_Command *cmd,
struct TALER_TESTING_Interpreter *is)
{
struct OAuthState *oas = cls;
(void) cmd;
(void) is;
oas->mhd = MHD_start_daemon (MHD_USE_AUTO_INTERNAL_THREAD,
oas->port,
NULL, NULL,
&handler_cb, oas,
NULL);
}
/**
* Cleanup the state from a "oauth" CMD, and possibly cancel a operation
* thereof.
*
* @param cls closure.
* @param cmd the command which is being cleaned up.
*/
static void
oauth_cleanup (void *cls,
const struct TALER_TESTING_Command *cmd)
{
struct OAuthState *oas = cls;
if (NULL != oas->mhd)
{
MHD_stop_daemon (oas->mhd);
oas->mhd = NULL;
}
GNUNET_free (oas);
}
struct TALER_TESTING_Command
TALER_TESTING_cmd_oauth (const char *label,
uint16_t port)
{
struct OAuthState *oas;
oas = GNUNET_new (struct OAuthState);
oas->port = port;
{
struct TALER_TESTING_Command cmd = {
.cls = oas,
.label = label,
.run = &oauth_run,
.cleanup = &oauth_cleanup,
};
return cmd;
}
}
/* end of testing_api_cmd_kyc_proof.c */