anastasis-core: fix upload fee computation, prepare for payments

This commit is contained in:
Florian Dold 2021-11-04 20:02:04 +01:00
parent 9ba0e8597d
commit 11e8060ab1
No known key found for this signature in database
GPG Key ID: D2E4F00F29D02A4B
2 changed files with 98 additions and 65 deletions

View File

@ -51,21 +51,17 @@ import {
codecForActionArgsUpdateExpiration, codecForActionArgsUpdateExpiration,
ContinentInfo, ContinentInfo,
CountryInfo, CountryInfo,
MethodSpec,
Policy,
PolicyProvider,
RecoveryInformation, RecoveryInformation,
RecoveryInternalData, RecoveryInternalData,
RecoveryStates, RecoveryStates,
ReducerState, ReducerState,
ReducerStateBackup, ReducerStateBackup,
ReducerStateBackupUserAttributesCollecting,
ReducerStateError, ReducerStateError,
ReducerStateRecovery, ReducerStateRecovery,
SuccessDetails, SuccessDetails,
UserAttributeSpec,
codecForActionArgsChangeVersion, codecForActionArgsChangeVersion,
ActionArgsChangeVersion, ActionArgsChangeVersion,
TruthMetaData,
} from "./reducer-types.js"; } from "./reducer-types.js";
import fetchPonyfill from "fetch-ponyfill"; import fetchPonyfill from "fetch-ponyfill";
import { import {
@ -302,35 +298,6 @@ async function backupEnterUserAttributes(
return newState; return newState;
} }
/**
* Truth data as stored in the reducer.
*/
interface TruthMetaData {
uuid: string;
key_share: string;
policy_index: number;
pol_method_index: number;
/**
* Nonce used for encrypting the truth.
*/
nonce: string;
/**
* Key that the truth (i.e. secret question answer, email address, mobile number, ...)
* is encrypted with when stored at the provider.
*/
truth_key: string;
/**
* Truth-specific salt.
*/
truth_salt: string;
}
async function getTruthValue( async function getTruthValue(
authMethod: AuthMethod, authMethod: AuthMethod,
truthUuid: string, truthUuid: string,
@ -512,6 +479,8 @@ async function uploadSecret(
const successDetails: SuccessDetails = {}; const successDetails: SuccessDetails = {};
const policyPayUris: string[] = [];
for (const prov of state.policy_providers!) { for (const prov of state.policy_providers!) {
const uid = uidMap[prov.provider_url]; const uid = uidMap[prov.provider_url];
const acctKeypair = accountKeypairDerive(uid); const acctKeypair = accountKeypairDerive(uid);
@ -536,12 +505,7 @@ async function uploadSecret(
body: decodeCrock(encRecoveryDoc), body: decodeCrock(encRecoveryDoc),
}, },
); );
if (resp.status !== 204) { if (resp.status === HttpStatusCode.Accepted) {
return {
code: TalerErrorCode.ANASTASIS_REDUCER_NETWORK_FAILED,
hint: `could not upload policy (http status ${resp.status})`,
};
}
let policyVersion = 0; let policyVersion = 0;
let policyExpiration: Timestamp = { t_ms: 0 }; let policyExpiration: Timestamp = { t_ms: 0 };
try { try {
@ -550,7 +514,8 @@ async function uploadSecret(
try { try {
policyExpiration = { policyExpiration = {
t_ms: t_ms:
1000 * Number(resp.headers.get("Anastasis-Policy-Expiration") ?? "0"), 1000 *
Number(resp.headers.get("Anastasis-Policy-Expiration") ?? "0"),
}; };
} catch (e) {} } catch (e) {}
successDetails[prov.provider_url] = { successDetails[prov.provider_url] = {
@ -558,6 +523,30 @@ async function uploadSecret(
policy_expiration: policyExpiration, policy_expiration: policyExpiration,
}; };
} }
if (resp.status === HttpStatusCode.PaymentRequired) {
const talerPayUri = resp.headers.get("Taler");
if (!talerPayUri) {
return {
code: TalerErrorCode.ANASTASIS_REDUCER_BACKEND_FAILURE,
hint: `payment requested, but no taler://pay URI given`,
};
}
policyPayUris.push(talerPayUri);
continue;
}
return {
code: TalerErrorCode.ANASTASIS_REDUCER_NETWORK_FAILED,
hint: `could not upload policy (http status ${resp.status})`,
};
}
if (policyPayUris.length > 0) {
return {
...state,
backup_state: BackupStates.PoliciesPaying,
payments: policyPayUris,
};
}
return { return {
...state, ...state,
@ -1048,7 +1037,6 @@ async function updateUploadFees(
} }
logger.info("updating upload fees"); logger.info("updating upload fees");
const feePerCurrency: Record<string, AmountJson> = {}; const feePerCurrency: Record<string, AmountJson> = {};
const coveredProviders = new Set<string>();
const addFee = (x: AmountLike) => { const addFee = (x: AmountLike) => {
x = Amounts.jsonifyAmount(x); x = Amounts.jsonifyAmount(x);
feePerCurrency[x.currency] = Amounts.add( feePerCurrency[x.currency] = Amounts.add(
@ -1058,24 +1046,31 @@ async function updateUploadFees(
}; };
const years = Duration.toIntegerYears(Duration.getRemaining(expiration)); const years = Duration.toIntegerYears(Duration.getRemaining(expiration));
logger.info(`computing fees for ${years} years`); logger.info(`computing fees for ${years} years`);
// For now, we compute fees for *all* available providers.
for (const provUrl in state.authentication_providers ?? {}) {
const prov = state.authentication_providers![provUrl];
if ("annual_fee" in prov) {
const annualFee = Amounts.mult(prov.annual_fee, years).amount;
logger.info(`adding annual fee ${Amounts.stringify(annualFee)}`);
addFee(annualFee);
}
}
const coveredProvTruth = new Set<string>();
for (const x of state.policies ?? []) { for (const x of state.policies ?? []) {
for (const m of x.methods) { for (const m of x.methods) {
const prov = state.authentication_providers![ const prov = state.authentication_providers![
m.provider m.provider
] as AuthenticationProviderStatusOk; ] as AuthenticationProviderStatusOk;
const authMethod = state.authentication_methods![m.authentication_method]; const authMethod = state.authentication_methods![m.authentication_method];
if (!coveredProviders.has(m.provider)) { const key = `${m.authentication_method}@${m.provider}`;
const annualFee = Amounts.mult(prov.annual_fee, years).amount; if (coveredProvTruth.has(key)) {
logger.info(`adding annual fee ${Amounts.stringify(annualFee)}`); continue;
addFee(annualFee);
coveredProviders.add(m.provider);
}
for (const pm of prov.methods) {
if (pm.type === authMethod.type) {
addFee(pm.usage_fee);
break;
}
} }
logger.info(
`adding cost for auth method ${authMethod.challenge} / "${authMethod.instructions}" at ${m.provider}`,
);
coveredProvTruth.add(key);
addFee(prov.truth_upload_fee);
} }
} }
return { return {
@ -1252,7 +1247,9 @@ const recoveryTransitions: Record<
...transition("solve_challenge", codecForAny(), solveChallenge), ...transition("solve_challenge", codecForAny(), solveChallenge),
}, },
[RecoveryStates.ChallengePaying]: {}, [RecoveryStates.ChallengePaying]: {},
[RecoveryStates.RecoveryFinished]: {}, [RecoveryStates.RecoveryFinished]: {
...transitionRecoveryJump("back", RecoveryStates.ChallengeSelecting),
},
}; };
export async function reduceAction( export async function reduceAction(

View File

@ -67,6 +67,13 @@ export interface ReducerStateBackup {
secret_name?: string; secret_name?: string;
policies?: Policy[]; policies?: Policy[];
/**
* Map from truth key (`${methodIndex}/${providerUrl}`) to
* the truth metadata.
*/
truth_metadata?: Record<string, TruthMetaData>;
recovery_document?: RecoveryDocument;
/** /**
* Policy providers are providers that we checked to be functional * Policy providers are providers that we checked to be functional
* and that are actually used in policies. * and that are actually used in policies.
@ -198,6 +205,35 @@ export interface ReducerStateRecovery {
authentication_providers?: { [url: string]: AuthenticationProviderStatus }; authentication_providers?: { [url: string]: AuthenticationProviderStatus };
} }
/**
* Truth data as stored in the reducer.
*/
export interface TruthMetaData {
uuid: string;
key_share: string;
policy_index: number;
pol_method_index: number;
/**
* Nonce used for encrypting the truth.
*/
nonce: string;
/**
* Key that the truth (i.e. secret question answer, email address, mobile number, ...)
* is encrypted with when stored at the provider.
*/
truth_key: string;
/**
* Truth-specific salt.
*/
truth_salt: string;
}
export interface ReducerStateError { export interface ReducerStateError {
backup_state?: undefined; backup_state?: undefined;
recovery_state?: undefined; recovery_state?: undefined;