2019-12-02 00:42:40 +01:00
|
|
|
/*
|
|
|
|
This file is part of GNU Taler
|
|
|
|
(C) 2019 GNUnet e.V.
|
|
|
|
|
|
|
|
GNU Taler is free software; you can redistribute it and/or modify it under the
|
|
|
|
terms of the GNU General Public License as published by the Free Software
|
|
|
|
Foundation; either version 3, or (at your option) any later version.
|
|
|
|
|
|
|
|
GNU Taler is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License along with
|
|
|
|
GNU Taler; see the file COPYING. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
*/
|
|
|
|
|
2021-03-17 17:56:37 +01:00
|
|
|
/**
|
|
|
|
* Imports.
|
|
|
|
*/
|
2020-03-09 09:49:22 +01:00
|
|
|
import {
|
2021-03-17 17:56:37 +01:00
|
|
|
Amounts,
|
2021-06-02 13:23:51 +02:00
|
|
|
Auditor,
|
2021-06-17 15:49:05 +02:00
|
|
|
canonicalizeBaseUrl,
|
2020-03-09 09:49:22 +01:00
|
|
|
codecForExchangeKeysJson,
|
|
|
|
codecForExchangeWireJson,
|
2021-03-17 17:56:37 +01:00
|
|
|
compare,
|
|
|
|
Denomination,
|
|
|
|
Duration,
|
|
|
|
durationFromSpec,
|
2021-06-02 13:23:51 +02:00
|
|
|
ExchangeSignKeyJson,
|
|
|
|
ExchangeWireJson,
|
2021-03-17 17:56:37 +01:00
|
|
|
getTimestampNow,
|
|
|
|
isTimestampExpired,
|
2021-06-08 20:58:13 +02:00
|
|
|
Logger,
|
2021-03-17 17:56:37 +01:00
|
|
|
NotificationType,
|
|
|
|
parsePaytoUri,
|
2021-06-02 13:23:51 +02:00
|
|
|
Recoup,
|
2021-03-17 17:56:37 +01:00
|
|
|
TalerErrorCode,
|
2021-06-20 21:14:45 +02:00
|
|
|
URL,
|
2021-03-17 17:56:37 +01:00
|
|
|
TalerErrorDetails,
|
2021-06-02 13:23:51 +02:00
|
|
|
Timestamp,
|
2021-03-17 17:56:37 +01:00
|
|
|
} from "@gnu-taler/taler-util";
|
2021-06-17 15:49:05 +02:00
|
|
|
import { decodeCrock, encodeCrock, hash } from "../crypto/talerCrypto.js";
|
|
|
|
import { CryptoApi } from "../crypto/workers/cryptoApi.js";
|
2019-12-02 00:42:40 +01:00
|
|
|
import {
|
|
|
|
DenominationRecord,
|
|
|
|
DenominationStatus,
|
2021-06-17 15:49:05 +02:00
|
|
|
ExchangeDetailsRecord,
|
2021-03-17 17:56:37 +01:00
|
|
|
ExchangeRecord,
|
2021-06-17 15:49:05 +02:00
|
|
|
WalletStoresV1,
|
2019-12-02 00:42:40 +01:00
|
|
|
WireFee,
|
2021-06-02 13:23:51 +02:00
|
|
|
WireInfo,
|
2021-03-17 17:56:37 +01:00
|
|
|
} from "../db.js";
|
2021-06-15 18:52:43 +02:00
|
|
|
import {
|
|
|
|
getExpiryTimestamp,
|
|
|
|
HttpRequestLibrary,
|
|
|
|
readSuccessResponseJsonOrThrow,
|
|
|
|
readSuccessResponseTextOrThrow,
|
|
|
|
} from "../util/http.js";
|
2021-06-09 15:14:17 +02:00
|
|
|
import { DbAccess, GetReadOnlyAccess } from "../util/query.js";
|
2021-06-17 15:49:05 +02:00
|
|
|
import { initRetryInfo, updateRetryInfoTimeout } from "../util/retries.js";
|
|
|
|
import {
|
|
|
|
guardOperationException,
|
|
|
|
makeErrorDetails,
|
|
|
|
OperationFailedError,
|
|
|
|
} from "../errors.js";
|
|
|
|
import { InternalWalletState, TrustInfo } from "../common.js";
|
|
|
|
import {
|
|
|
|
WALLET_CACHE_BREAKER_CLIENT_VERSION,
|
|
|
|
WALLET_EXCHANGE_PROTOCOL_VERSION,
|
|
|
|
} from "../versions.js";
|
2020-07-23 15:54:00 +02:00
|
|
|
|
|
|
|
const logger = new Logger("exchanges.ts");
|
2019-12-02 00:42:40 +01:00
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
function denominationRecordFromKeys(
|
2019-12-02 00:42:40 +01:00
|
|
|
exchangeBaseUrl: string,
|
2021-06-11 13:26:18 +02:00
|
|
|
exchangeMasterPub: string,
|
2021-08-19 13:48:36 +02:00
|
|
|
listIssueDate: Timestamp,
|
2019-12-02 00:42:40 +01:00
|
|
|
denomIn: Denomination,
|
2021-06-02 13:23:51 +02:00
|
|
|
): DenominationRecord {
|
|
|
|
const denomPubHash = encodeCrock(hash(decodeCrock(denomIn.denom_pub)));
|
2019-12-02 00:42:40 +01:00
|
|
|
const d: DenominationRecord = {
|
|
|
|
denomPub: denomIn.denom_pub,
|
|
|
|
denomPubHash,
|
|
|
|
exchangeBaseUrl,
|
2021-06-11 13:26:18 +02:00
|
|
|
exchangeMasterPub,
|
2019-12-02 00:42:40 +01:00
|
|
|
feeDeposit: Amounts.parseOrThrow(denomIn.fee_deposit),
|
|
|
|
feeRefresh: Amounts.parseOrThrow(denomIn.fee_refresh),
|
|
|
|
feeRefund: Amounts.parseOrThrow(denomIn.fee_refund),
|
|
|
|
feeWithdraw: Amounts.parseOrThrow(denomIn.fee_withdraw),
|
|
|
|
isOffered: true,
|
2020-03-11 20:14:28 +01:00
|
|
|
isRevoked: false,
|
2019-12-02 00:42:40 +01:00
|
|
|
masterSig: denomIn.master_sig,
|
2019-12-19 20:42:49 +01:00
|
|
|
stampExpireDeposit: denomIn.stamp_expire_deposit,
|
|
|
|
stampExpireLegal: denomIn.stamp_expire_legal,
|
|
|
|
stampExpireWithdraw: denomIn.stamp_expire_withdraw,
|
|
|
|
stampStart: denomIn.stamp_start,
|
2019-12-02 00:42:40 +01:00
|
|
|
status: DenominationStatus.Unverified,
|
|
|
|
value: Amounts.parseOrThrow(denomIn.value),
|
2021-08-19 13:48:36 +02:00
|
|
|
listIssueDate,
|
2019-12-02 00:42:40 +01:00
|
|
|
};
|
|
|
|
return d;
|
|
|
|
}
|
|
|
|
|
2020-09-02 11:14:36 +02:00
|
|
|
async function handleExchangeUpdateError(
|
2019-12-02 00:42:40 +01:00
|
|
|
ws: InternalWalletState,
|
|
|
|
baseUrl: string,
|
2020-09-01 14:57:22 +02:00
|
|
|
err: TalerErrorDetails,
|
2019-12-02 00:42:40 +01:00
|
|
|
): Promise<void> {
|
2021-06-09 15:14:17 +02:00
|
|
|
await ws.db
|
|
|
|
.mktx((x) => ({ exchanges: x.exchanges }))
|
|
|
|
.runReadOnly(async (tx) => {
|
|
|
|
const exchange = await tx.exchanges.get(baseUrl);
|
|
|
|
if (!exchange) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
exchange.retryInfo.retryCounter++;
|
|
|
|
updateRetryInfoTimeout(exchange.retryInfo);
|
|
|
|
exchange.lastError = err;
|
|
|
|
});
|
2020-09-02 11:14:36 +02:00
|
|
|
if (err) {
|
|
|
|
ws.notify({ type: NotificationType.ExchangeOperationError, error: err });
|
|
|
|
}
|
2019-12-02 00:42:40 +01:00
|
|
|
}
|
|
|
|
|
2020-08-20 12:57:20 +02:00
|
|
|
function getExchangeRequestTimeout(e: ExchangeRecord): Duration {
|
|
|
|
return { d_ms: 5000 };
|
|
|
|
}
|
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
interface ExchangeTosDownloadResult {
|
|
|
|
tosText: string;
|
|
|
|
tosEtag: string;
|
|
|
|
}
|
|
|
|
|
|
|
|
async function downloadExchangeWithTermsOfService(
|
|
|
|
exchangeBaseUrl: string,
|
|
|
|
http: HttpRequestLibrary,
|
|
|
|
timeout: Duration,
|
|
|
|
): Promise<ExchangeTosDownloadResult> {
|
|
|
|
const reqUrl = new URL("terms", exchangeBaseUrl);
|
|
|
|
reqUrl.searchParams.set("cacheBreaker", WALLET_CACHE_BREAKER_CLIENT_VERSION);
|
|
|
|
const headers = {
|
|
|
|
Accept: "text/plain",
|
|
|
|
};
|
|
|
|
|
|
|
|
const resp = await http.get(reqUrl.href, {
|
|
|
|
headers,
|
|
|
|
timeout,
|
|
|
|
});
|
|
|
|
const tosText = await readSuccessResponseTextOrThrow(resp);
|
|
|
|
const tosEtag = resp.headers.get("etag") || "unknown";
|
|
|
|
|
|
|
|
return { tosText, tosEtag };
|
|
|
|
}
|
|
|
|
|
2021-08-23 22:28:36 +02:00
|
|
|
/**
|
|
|
|
* Get exchange details from the database.
|
|
|
|
*/
|
2021-06-02 13:23:51 +02:00
|
|
|
export async function getExchangeDetails(
|
2021-06-09 15:14:17 +02:00
|
|
|
tx: GetReadOnlyAccess<{
|
|
|
|
exchanges: typeof WalletStoresV1.exchanges;
|
|
|
|
exchangeDetails: typeof WalletStoresV1.exchangeDetails;
|
|
|
|
}>,
|
2021-06-02 13:23:51 +02:00
|
|
|
exchangeBaseUrl: string,
|
|
|
|
): Promise<ExchangeDetailsRecord | undefined> {
|
2021-06-09 15:14:17 +02:00
|
|
|
const r = await tx.exchanges.get(exchangeBaseUrl);
|
2021-06-02 13:23:51 +02:00
|
|
|
if (!r) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
const dp = r.detailsPointer;
|
|
|
|
if (!dp) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
const { currency, masterPublicKey } = dp;
|
2021-06-09 15:14:17 +02:00
|
|
|
return await tx.exchangeDetails.get([r.baseUrl, currency, masterPublicKey]);
|
2021-06-02 13:23:51 +02:00
|
|
|
}
|
|
|
|
|
2021-06-09 15:14:17 +02:00
|
|
|
getExchangeDetails.makeContext = (db: DbAccess<typeof WalletStoresV1>) =>
|
|
|
|
db.mktx((x) => ({
|
|
|
|
exchanges: x.exchanges,
|
|
|
|
exchangeDetails: x.exchangeDetails,
|
|
|
|
}));
|
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
export async function acceptExchangeTermsOfService(
|
|
|
|
ws: InternalWalletState,
|
|
|
|
exchangeBaseUrl: string,
|
|
|
|
etag: string | undefined,
|
|
|
|
): Promise<void> {
|
2021-06-09 15:14:17 +02:00
|
|
|
await ws.db
|
|
|
|
.mktx((x) => ({
|
|
|
|
exchanges: x.exchanges,
|
|
|
|
exchangeDetails: x.exchangeDetails,
|
|
|
|
}))
|
|
|
|
.runReadWrite(async (tx) => {
|
2021-06-02 13:23:51 +02:00
|
|
|
const d = await getExchangeDetails(tx, exchangeBaseUrl);
|
|
|
|
if (d) {
|
|
|
|
d.termsOfServiceAcceptedEtag = etag;
|
2021-06-09 15:14:17 +02:00
|
|
|
await tx.exchangeDetails.put(d);
|
2021-06-02 13:23:51 +02:00
|
|
|
}
|
2021-06-09 15:14:17 +02:00
|
|
|
});
|
2021-06-02 13:23:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
async function validateWireInfo(
|
|
|
|
wireInfo: ExchangeWireJson,
|
|
|
|
masterPublicKey: string,
|
|
|
|
cryptoApi: CryptoApi,
|
|
|
|
): Promise<WireInfo> {
|
|
|
|
for (const a of wireInfo.accounts) {
|
|
|
|
logger.trace("validating exchange acct");
|
|
|
|
const isValid = await cryptoApi.isValidWireAccount(
|
|
|
|
a.payto_uri,
|
|
|
|
a.master_sig,
|
|
|
|
masterPublicKey,
|
|
|
|
);
|
|
|
|
if (!isValid) {
|
|
|
|
throw Error("exchange acct signature invalid");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
const feesForType: { [wireMethod: string]: WireFee[] } = {};
|
|
|
|
for (const wireMethod of Object.keys(wireInfo.fees)) {
|
|
|
|
const feeList: WireFee[] = [];
|
|
|
|
for (const x of wireInfo.fees[wireMethod]) {
|
|
|
|
const startStamp = x.start_date;
|
|
|
|
const endStamp = x.end_date;
|
|
|
|
const fee: WireFee = {
|
|
|
|
closingFee: Amounts.parseOrThrow(x.closing_fee),
|
|
|
|
endStamp,
|
|
|
|
sig: x.sig,
|
|
|
|
startStamp,
|
|
|
|
wireFee: Amounts.parseOrThrow(x.wire_fee),
|
|
|
|
};
|
|
|
|
const isValid = await cryptoApi.isValidWireFee(
|
|
|
|
wireMethod,
|
|
|
|
fee,
|
|
|
|
masterPublicKey,
|
|
|
|
);
|
|
|
|
if (!isValid) {
|
|
|
|
throw Error("exchange wire fee signature invalid");
|
|
|
|
}
|
|
|
|
feeList.push(fee);
|
|
|
|
}
|
|
|
|
feesForType[wireMethod] = feeList;
|
|
|
|
}
|
|
|
|
|
|
|
|
return {
|
|
|
|
accounts: wireInfo.accounts,
|
|
|
|
feesForType,
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2019-12-02 00:42:40 +01:00
|
|
|
/**
|
2021-06-02 13:23:51 +02:00
|
|
|
* Fetch wire information for an exchange.
|
2019-12-02 00:42:40 +01:00
|
|
|
*
|
2021-06-02 13:23:51 +02:00
|
|
|
* @param exchangeBaseUrl Exchange base URL, assumed to be already normalized.
|
2019-12-02 00:42:40 +01:00
|
|
|
*/
|
2021-06-02 13:23:51 +02:00
|
|
|
async function downloadExchangeWithWireInfo(
|
|
|
|
exchangeBaseUrl: string,
|
|
|
|
http: HttpRequestLibrary,
|
|
|
|
timeout: Duration,
|
|
|
|
): Promise<ExchangeWireJson> {
|
|
|
|
const reqUrl = new URL("wire", exchangeBaseUrl);
|
|
|
|
reqUrl.searchParams.set("cacheBreaker", WALLET_CACHE_BREAKER_CLIENT_VERSION);
|
|
|
|
|
|
|
|
const resp = await http.get(reqUrl.href, {
|
|
|
|
timeout,
|
|
|
|
});
|
|
|
|
const wireInfo = await readSuccessResponseJsonOrThrow(
|
|
|
|
resp,
|
|
|
|
codecForExchangeWireJson(),
|
|
|
|
);
|
|
|
|
|
|
|
|
return wireInfo;
|
|
|
|
}
|
|
|
|
|
|
|
|
export async function updateExchangeFromUrl(
|
2019-12-02 00:42:40 +01:00
|
|
|
ws: InternalWalletState,
|
|
|
|
baseUrl: string,
|
2021-06-02 13:23:51 +02:00
|
|
|
forceNow = false,
|
|
|
|
): Promise<{
|
|
|
|
exchange: ExchangeRecord;
|
|
|
|
exchangeDetails: ExchangeDetailsRecord;
|
|
|
|
}> {
|
|
|
|
const onOpErr = (e: TalerErrorDetails): Promise<void> =>
|
|
|
|
handleExchangeUpdateError(ws, baseUrl, e);
|
|
|
|
return await guardOperationException(
|
|
|
|
() => updateExchangeFromUrlImpl(ws, baseUrl, forceNow),
|
|
|
|
onOpErr,
|
|
|
|
);
|
|
|
|
}
|
2019-12-02 00:42:40 +01:00
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
async function provideExchangeRecord(
|
|
|
|
ws: InternalWalletState,
|
|
|
|
baseUrl: string,
|
|
|
|
now: Timestamp,
|
|
|
|
): Promise<ExchangeRecord> {
|
2021-06-09 15:14:17 +02:00
|
|
|
return await ws.db
|
|
|
|
.mktx((x) => ({ exchanges: x.exchanges }))
|
|
|
|
.runReadWrite(async (tx) => {
|
|
|
|
let r = await tx.exchanges.get(baseUrl);
|
|
|
|
if (!r) {
|
|
|
|
r = {
|
|
|
|
permanent: true,
|
|
|
|
baseUrl: baseUrl,
|
2021-06-25 13:27:06 +02:00
|
|
|
retryInfo: initRetryInfo(),
|
2021-06-09 15:14:17 +02:00
|
|
|
detailsPointer: undefined,
|
2021-06-10 16:32:37 +02:00
|
|
|
lastUpdate: undefined,
|
|
|
|
nextUpdate: now,
|
|
|
|
nextRefreshCheck: now,
|
2021-06-09 15:14:17 +02:00
|
|
|
};
|
|
|
|
await tx.exchanges.put(r);
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
});
|
2021-06-02 13:23:51 +02:00
|
|
|
}
|
2020-07-22 10:52:03 +02:00
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
interface ExchangeKeysDownloadResult {
|
|
|
|
masterPublicKey: string;
|
|
|
|
currency: string;
|
|
|
|
auditors: Auditor[];
|
|
|
|
currentDenominations: DenominationRecord[];
|
|
|
|
protocolVersion: string;
|
|
|
|
signingKeys: ExchangeSignKeyJson[];
|
|
|
|
reserveClosingDelay: Duration;
|
|
|
|
expiry: Timestamp;
|
|
|
|
recoup: Recoup[];
|
2021-08-23 22:28:36 +02:00
|
|
|
listIssueDate: Timestamp;
|
2021-06-02 13:23:51 +02:00
|
|
|
}
|
2020-08-05 21:00:36 +02:00
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
/**
|
|
|
|
* Download and validate an exchange's /keys data.
|
|
|
|
*/
|
|
|
|
async function downloadKeysInfo(
|
|
|
|
baseUrl: string,
|
|
|
|
http: HttpRequestLibrary,
|
|
|
|
timeout: Duration,
|
|
|
|
): Promise<ExchangeKeysDownloadResult> {
|
2019-12-02 00:42:40 +01:00
|
|
|
const keysUrl = new URL("keys", baseUrl);
|
|
|
|
keysUrl.searchParams.set("cacheBreaker", WALLET_CACHE_BREAKER_CLIENT_VERSION);
|
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
const resp = await http.get(keysUrl.href, {
|
|
|
|
timeout,
|
2020-08-20 12:57:20 +02:00
|
|
|
});
|
2020-07-22 10:52:03 +02:00
|
|
|
const exchangeKeysJson = await readSuccessResponseJsonOrThrow(
|
|
|
|
resp,
|
|
|
|
codecForExchangeKeysJson(),
|
|
|
|
);
|
2019-12-02 00:42:40 +01:00
|
|
|
|
2020-08-05 21:00:36 +02:00
|
|
|
logger.info("received /keys response");
|
|
|
|
|
2019-12-02 00:42:40 +01:00
|
|
|
if (exchangeKeysJson.denoms.length === 0) {
|
2020-07-22 10:52:03 +02:00
|
|
|
const opErr = makeErrorDetails(
|
|
|
|
TalerErrorCode.WALLET_EXCHANGE_DENOMINATIONS_INSUFFICIENT,
|
|
|
|
"exchange doesn't offer any denominations",
|
|
|
|
{
|
|
|
|
exchangeBaseUrl: baseUrl,
|
|
|
|
},
|
|
|
|
);
|
2021-06-02 13:23:51 +02:00
|
|
|
throw new OperationFailedError(opErr);
|
2019-12-02 00:42:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
const protocolVersion = exchangeKeysJson.version;
|
|
|
|
|
2020-03-09 09:59:13 +01:00
|
|
|
const versionRes = compare(WALLET_EXCHANGE_PROTOCOL_VERSION, protocolVersion);
|
|
|
|
if (versionRes?.compatible != true) {
|
2020-07-22 10:52:03 +02:00
|
|
|
const opErr = makeErrorDetails(
|
|
|
|
TalerErrorCode.WALLET_EXCHANGE_PROTOCOL_VERSION_INCOMPATIBLE,
|
|
|
|
"exchange protocol version not compatible with wallet",
|
|
|
|
{
|
2020-03-09 09:59:13 +01:00
|
|
|
exchangeProtocolVersion: protocolVersion,
|
|
|
|
walletProtocolVersion: WALLET_EXCHANGE_PROTOCOL_VERSION,
|
|
|
|
},
|
2020-07-22 10:52:03 +02:00
|
|
|
);
|
2021-06-02 13:23:51 +02:00
|
|
|
throw new OperationFailedError(opErr);
|
2020-03-09 09:59:13 +01:00
|
|
|
}
|
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
const currency = Amounts.parseOrThrow(
|
|
|
|
exchangeKeysJson.denoms[0].value,
|
|
|
|
).currency.toUpperCase();
|
2020-08-05 21:00:36 +02:00
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
return {
|
|
|
|
masterPublicKey: exchangeKeysJson.master_public_key,
|
|
|
|
currency,
|
|
|
|
auditors: exchangeKeysJson.auditors,
|
|
|
|
currentDenominations: exchangeKeysJson.denoms.map((d) =>
|
2021-06-11 13:26:18 +02:00
|
|
|
denominationRecordFromKeys(
|
|
|
|
baseUrl,
|
|
|
|
exchangeKeysJson.master_public_key,
|
2021-08-19 13:48:36 +02:00
|
|
|
exchangeKeysJson.list_issue_date,
|
2021-06-11 13:26:18 +02:00
|
|
|
d,
|
|
|
|
),
|
2019-12-02 00:42:40 +01:00
|
|
|
),
|
2021-06-02 13:23:51 +02:00
|
|
|
protocolVersion: exchangeKeysJson.version,
|
|
|
|
signingKeys: exchangeKeysJson.signkeys,
|
|
|
|
reserveClosingDelay: exchangeKeysJson.reserve_closing_delay,
|
|
|
|
expiry: getExpiryTimestamp(resp, {
|
|
|
|
minDuration: durationFromSpec({ hours: 1 }),
|
|
|
|
}),
|
|
|
|
recoup: exchangeKeysJson.recoup ?? [],
|
2021-08-23 22:28:36 +02:00
|
|
|
listIssueDate: exchangeKeysJson.list_issue_date,
|
2021-06-02 13:23:51 +02:00
|
|
|
};
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Update or add exchange DB entry by fetching the /keys and /wire information.
|
|
|
|
* Optionally link the reserve entry to the new or existing
|
|
|
|
* exchange entry in then DB.
|
|
|
|
*/
|
|
|
|
async function updateExchangeFromUrlImpl(
|
|
|
|
ws: InternalWalletState,
|
|
|
|
baseUrl: string,
|
|
|
|
forceNow = false,
|
|
|
|
): Promise<{
|
|
|
|
exchange: ExchangeRecord;
|
|
|
|
exchangeDetails: ExchangeDetailsRecord;
|
|
|
|
}> {
|
|
|
|
logger.trace(`updating exchange info for ${baseUrl}`);
|
|
|
|
const now = getTimestampNow();
|
|
|
|
baseUrl = canonicalizeBaseUrl(baseUrl);
|
|
|
|
|
|
|
|
const r = await provideExchangeRecord(ws, baseUrl, now);
|
|
|
|
|
2021-06-10 16:32:37 +02:00
|
|
|
if (!forceNow && r && !isTimestampExpired(r.nextUpdate)) {
|
2021-06-11 13:26:18 +02:00
|
|
|
const res = await ws.db
|
|
|
|
.mktx((x) => ({
|
|
|
|
exchanges: x.exchanges,
|
|
|
|
exchangeDetails: x.exchangeDetails,
|
|
|
|
}))
|
|
|
|
.runReadOnly(async (tx) => {
|
|
|
|
const exchange = await tx.exchanges.get(baseUrl);
|
|
|
|
if (!exchange) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
const exchangeDetails = await getExchangeDetails(tx, baseUrl);
|
|
|
|
if (!exchangeDetails) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
return { exchange, exchangeDetails };
|
|
|
|
});
|
2021-06-10 16:32:37 +02:00
|
|
|
if (res) {
|
|
|
|
logger.info("using existing exchange info");
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
logger.info("updating exchange /keys info");
|
|
|
|
|
|
|
|
const timeout = getExchangeRequestTimeout(r);
|
|
|
|
|
|
|
|
const keysInfo = await downloadKeysInfo(baseUrl, ws.http, timeout);
|
|
|
|
|
2021-08-06 16:27:18 +02:00
|
|
|
logger.info("updating exchange /wire info");
|
2021-06-02 13:23:51 +02:00
|
|
|
const wireInfoDownload = await downloadExchangeWithWireInfo(
|
|
|
|
baseUrl,
|
|
|
|
ws.http,
|
|
|
|
timeout,
|
2019-12-02 00:42:40 +01:00
|
|
|
);
|
|
|
|
|
2021-08-06 16:27:18 +02:00
|
|
|
logger.info("validating exchange /wire info");
|
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
const wireInfo = await validateWireInfo(
|
|
|
|
wireInfoDownload,
|
|
|
|
keysInfo.masterPublicKey,
|
|
|
|
ws.cryptoApi,
|
|
|
|
);
|
2020-08-05 21:00:36 +02:00
|
|
|
|
2021-08-06 16:27:18 +02:00
|
|
|
logger.info("finished validating exchange /wire info");
|
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
const tosDownload = await downloadExchangeWithTermsOfService(
|
|
|
|
baseUrl,
|
|
|
|
ws.http,
|
|
|
|
timeout,
|
|
|
|
);
|
2020-07-22 10:52:03 +02:00
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
let recoupGroupId: string | undefined = undefined;
|
2020-03-11 20:14:28 +01:00
|
|
|
|
2021-08-06 16:27:18 +02:00
|
|
|
logger.trace("updating exchange info in database");
|
|
|
|
|
2021-06-09 15:14:17 +02:00
|
|
|
const updated = await ws.db
|
|
|
|
.mktx((x) => ({
|
|
|
|
exchanges: x.exchanges,
|
|
|
|
exchangeDetails: x.exchangeDetails,
|
|
|
|
denominations: x.denominations,
|
|
|
|
coins: x.coins,
|
|
|
|
refreshGroups: x.refreshGroups,
|
|
|
|
recoupGroups: x.recoupGroups,
|
|
|
|
}))
|
|
|
|
.runReadWrite(async (tx) => {
|
|
|
|
const r = await tx.exchanges.get(baseUrl);
|
2019-12-02 00:42:40 +01:00
|
|
|
if (!r) {
|
2020-08-14 12:23:50 +02:00
|
|
|
logger.warn(`exchange ${baseUrl} no longer present`);
|
2019-12-02 00:42:40 +01:00
|
|
|
return;
|
|
|
|
}
|
2021-06-02 13:23:51 +02:00
|
|
|
let details = await getExchangeDetails(tx, r.baseUrl);
|
|
|
|
if (details) {
|
2019-12-02 00:42:40 +01:00
|
|
|
// FIXME: We need to do some consistency checks!
|
|
|
|
}
|
2020-03-13 14:34:16 +01:00
|
|
|
// FIXME: validate signing keys and merge with old set
|
2021-06-02 13:23:51 +02:00
|
|
|
details = {
|
|
|
|
auditors: keysInfo.auditors,
|
|
|
|
currency: keysInfo.currency,
|
|
|
|
masterPublicKey: keysInfo.masterPublicKey,
|
|
|
|
protocolVersion: keysInfo.protocolVersion,
|
|
|
|
signingKeys: keysInfo.signingKeys,
|
|
|
|
reserveClosingDelay: keysInfo.reserveClosingDelay,
|
|
|
|
exchangeBaseUrl: r.baseUrl,
|
|
|
|
wireInfo,
|
|
|
|
termsOfServiceText: tosDownload.tosText,
|
|
|
|
termsOfServiceAcceptedEtag: undefined,
|
|
|
|
termsOfServiceLastEtag: tosDownload.tosEtag,
|
2021-06-14 11:45:05 +02:00
|
|
|
termsOfServiceAcceptedTimestamp: getTimestampNow(),
|
2019-12-02 00:42:40 +01:00
|
|
|
};
|
2021-06-02 13:23:51 +02:00
|
|
|
// FIXME: only update if pointer got updated
|
2019-12-02 00:42:40 +01:00
|
|
|
r.lastError = undefined;
|
2021-06-25 13:27:06 +02:00
|
|
|
r.retryInfo = initRetryInfo();
|
2021-06-10 16:32:37 +02:00
|
|
|
r.lastUpdate = getTimestampNow();
|
2021-08-23 22:28:36 +02:00
|
|
|
r.nextUpdate = keysInfo.expiry;
|
|
|
|
// New denominations might be available.
|
|
|
|
r.nextRefreshCheck = getTimestampNow();
|
2021-06-02 13:23:51 +02:00
|
|
|
r.detailsPointer = {
|
|
|
|
currency: details.currency,
|
|
|
|
masterPublicKey: details.masterPublicKey,
|
|
|
|
// FIXME: only change if pointer really changed
|
|
|
|
updateClock: getTimestampNow(),
|
|
|
|
};
|
2021-06-09 15:14:17 +02:00
|
|
|
await tx.exchanges.put(r);
|
|
|
|
await tx.exchangeDetails.put(details);
|
2019-12-02 00:42:40 +01:00
|
|
|
|
2021-08-06 16:27:18 +02:00
|
|
|
logger.trace("updating denominations in database");
|
2021-08-23 22:28:36 +02:00
|
|
|
const currentDenomSet = new Set<string>(
|
|
|
|
keysInfo.currentDenominations.map((x) => x.denomPubHash),
|
|
|
|
);
|
2021-06-02 13:23:51 +02:00
|
|
|
for (const currentDenom of keysInfo.currentDenominations) {
|
2021-06-09 15:14:17 +02:00
|
|
|
const oldDenom = await tx.denominations.get([
|
2019-12-02 00:42:40 +01:00
|
|
|
baseUrl,
|
2021-06-02 13:23:51 +02:00
|
|
|
currentDenom.denomPubHash,
|
2019-12-02 00:42:40 +01:00
|
|
|
]);
|
|
|
|
if (oldDenom) {
|
2021-08-23 22:28:36 +02:00
|
|
|
// FIXME: Do consistency check, report to auditor if necessary.
|
2019-12-02 00:42:40 +01:00
|
|
|
} else {
|
2021-06-09 15:14:17 +02:00
|
|
|
await tx.denominations.put(currentDenom);
|
2019-12-02 00:42:40 +01:00
|
|
|
}
|
|
|
|
}
|
2021-08-23 22:28:36 +02:00
|
|
|
|
|
|
|
// Update list issue date for all denominations,
|
|
|
|
// and mark non-offered denominations as such.
|
|
|
|
await tx.denominations.indexes.byExchangeBaseUrl
|
|
|
|
.iter(r.baseUrl)
|
|
|
|
.forEachAsync(async (x) => {
|
|
|
|
if (!currentDenomSet.has(x.denomPubHash)) {
|
|
|
|
// FIXME: Here, an auditor report should be created, unless
|
|
|
|
// the denomination is really legally expired.
|
|
|
|
if (x.isOffered) {
|
|
|
|
x.isOffered = false;
|
|
|
|
logger.info(
|
|
|
|
`setting denomination ${x.denomPubHash} to offered=false`,
|
|
|
|
);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
x.listIssueDate = keysInfo.listIssueDate;
|
|
|
|
if (!x.isOffered) {
|
|
|
|
x.isOffered = true;
|
|
|
|
logger.info(
|
|
|
|
`setting denomination ${x.denomPubHash} to offered=true`,
|
|
|
|
);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
await tx.denominations.put(x);
|
|
|
|
});
|
|
|
|
|
2021-08-06 16:27:18 +02:00
|
|
|
logger.trace("done updating denominations in database");
|
2020-03-11 20:14:28 +01:00
|
|
|
|
|
|
|
// Handle recoup
|
2021-06-02 13:23:51 +02:00
|
|
|
const recoupDenomList = keysInfo.recoup;
|
2020-03-11 20:14:28 +01:00
|
|
|
const newlyRevokedCoinPubs: string[] = [];
|
2020-07-23 15:54:00 +02:00
|
|
|
logger.trace("recoup list from exchange", recoupDenomList);
|
2020-03-12 14:55:38 +01:00
|
|
|
for (const recoupInfo of recoupDenomList) {
|
2021-06-09 15:14:17 +02:00
|
|
|
const oldDenom = await tx.denominations.get([
|
2020-09-08 17:33:10 +02:00
|
|
|
r.baseUrl,
|
2020-03-12 14:55:38 +01:00
|
|
|
recoupInfo.h_denom_pub,
|
2020-09-08 17:33:10 +02:00
|
|
|
]);
|
2020-03-11 20:14:28 +01:00
|
|
|
if (!oldDenom) {
|
|
|
|
// We never even knew about the revoked denomination, all good.
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (oldDenom.isRevoked) {
|
|
|
|
// We already marked the denomination as revoked,
|
|
|
|
// this implies we revoked all coins
|
2020-08-14 12:23:50 +02:00
|
|
|
logger.trace("denom already revoked");
|
2020-03-11 20:14:28 +01:00
|
|
|
continue;
|
|
|
|
}
|
2020-08-14 12:23:50 +02:00
|
|
|
logger.trace("revoking denom", recoupInfo.h_denom_pub);
|
2020-03-11 20:14:28 +01:00
|
|
|
oldDenom.isRevoked = true;
|
2021-06-09 15:14:17 +02:00
|
|
|
await tx.denominations.put(oldDenom);
|
|
|
|
const affectedCoins = await tx.coins.indexes.byDenomPubHash
|
|
|
|
.iter(recoupInfo.h_denom_pub)
|
2020-03-11 20:14:28 +01:00
|
|
|
.toArray();
|
|
|
|
for (const ac of affectedCoins) {
|
|
|
|
newlyRevokedCoinPubs.push(ac.coinPub);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (newlyRevokedCoinPubs.length != 0) {
|
2020-08-14 12:23:50 +02:00
|
|
|
logger.trace("recouping coins", newlyRevokedCoinPubs);
|
2021-06-22 12:18:12 +02:00
|
|
|
recoupGroupId = await ws.recoupOps.createRecoupGroup(
|
|
|
|
ws,
|
|
|
|
tx,
|
|
|
|
newlyRevokedCoinPubs,
|
|
|
|
);
|
2020-03-11 20:14:28 +01:00
|
|
|
}
|
2021-06-02 13:23:51 +02:00
|
|
|
return {
|
|
|
|
exchange: r,
|
|
|
|
exchangeDetails: details,
|
|
|
|
};
|
2021-06-09 15:14:17 +02:00
|
|
|
});
|
2020-03-11 20:14:28 +01:00
|
|
|
|
|
|
|
if (recoupGroupId) {
|
|
|
|
// Asynchronously start recoup. This doesn't need to finish
|
|
|
|
// for the exchange update to be considered finished.
|
2021-06-22 12:18:12 +02:00
|
|
|
ws.recoupOps.processRecoupGroup(ws, recoupGroupId).catch((e) => {
|
2020-08-14 12:23:50 +02:00
|
|
|
logger.error("error while recouping coins:", e);
|
2020-03-11 20:14:28 +01:00
|
|
|
});
|
|
|
|
}
|
2020-08-05 21:00:36 +02:00
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
if (!updated) {
|
|
|
|
throw Error("something went wrong with updating the exchange");
|
2019-12-16 12:53:22 +01:00
|
|
|
}
|
|
|
|
|
2021-08-06 16:27:18 +02:00
|
|
|
logger.trace("done updating exchange info in database");
|
|
|
|
|
2021-06-02 13:23:51 +02:00
|
|
|
return {
|
|
|
|
exchange: updated.exchange,
|
|
|
|
exchangeDetails: updated.exchangeDetails,
|
2019-12-09 19:59:08 +01:00
|
|
|
};
|
2019-12-02 00:42:40 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
export async function getExchangePaytoUri(
|
|
|
|
ws: InternalWalletState,
|
|
|
|
exchangeBaseUrl: string,
|
|
|
|
supportedTargetTypes: string[],
|
|
|
|
): Promise<string> {
|
|
|
|
// We do the update here, since the exchange might not even exist
|
|
|
|
// yet in our database.
|
2021-06-09 15:14:17 +02:00
|
|
|
const details = await getExchangeDetails
|
|
|
|
.makeContext(ws.db)
|
|
|
|
.runReadOnly(async (tx) => {
|
2021-06-02 13:23:51 +02:00
|
|
|
return getExchangeDetails(tx, exchangeBaseUrl);
|
2021-06-09 15:14:17 +02:00
|
|
|
});
|
2021-06-02 13:23:51 +02:00
|
|
|
const accounts = details?.wireInfo.accounts ?? [];
|
|
|
|
for (const account of accounts) {
|
2020-01-19 19:02:47 +01:00
|
|
|
const res = parsePaytoUri(account.payto_uri);
|
2019-12-02 00:42:40 +01:00
|
|
|
if (!res) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (supportedTargetTypes.includes(res.targetType)) {
|
2020-01-19 19:02:47 +01:00
|
|
|
return account.payto_uri;
|
2019-12-02 00:42:40 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
throw Error("no matching exchange account found");
|
|
|
|
}
|
2021-06-17 15:49:05 +02:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Check if and how an exchange is trusted and/or audited.
|
|
|
|
*/
|
|
|
|
export async function getExchangeTrust(
|
|
|
|
ws: InternalWalletState,
|
|
|
|
exchangeInfo: ExchangeRecord,
|
|
|
|
): Promise<TrustInfo> {
|
|
|
|
let isTrusted = false;
|
|
|
|
let isAudited = false;
|
|
|
|
|
|
|
|
return await ws.db
|
|
|
|
.mktx((x) => ({
|
|
|
|
exchanges: x.exchanges,
|
|
|
|
exchangeDetails: x.exchangeDetails,
|
|
|
|
exchangesTrustStore: x.exchangeTrust,
|
|
|
|
auditorTrust: x.auditorTrust,
|
|
|
|
}))
|
|
|
|
.runReadOnly(async (tx) => {
|
|
|
|
const exchangeDetails = await getExchangeDetails(
|
|
|
|
tx,
|
|
|
|
exchangeInfo.baseUrl,
|
|
|
|
);
|
|
|
|
|
|
|
|
if (!exchangeDetails) {
|
|
|
|
throw Error(`exchange ${exchangeInfo.baseUrl} details not available`);
|
|
|
|
}
|
|
|
|
const exchangeTrustRecord = await tx.exchangesTrustStore.indexes.byExchangeMasterPub.get(
|
|
|
|
exchangeDetails.masterPublicKey,
|
|
|
|
);
|
|
|
|
if (
|
|
|
|
exchangeTrustRecord &&
|
|
|
|
exchangeTrustRecord.uids.length > 0 &&
|
|
|
|
exchangeTrustRecord.currency === exchangeDetails.currency
|
|
|
|
) {
|
|
|
|
isTrusted = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (const auditor of exchangeDetails.auditors) {
|
|
|
|
const auditorTrustRecord = await tx.auditorTrust.indexes.byAuditorPub.get(
|
|
|
|
auditor.auditor_pub,
|
|
|
|
);
|
|
|
|
if (auditorTrustRecord && auditorTrustRecord.uids.length > 0) {
|
|
|
|
isAudited = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return { isTrusted, isAudited };
|
|
|
|
});
|
|
|
|
}
|