towards recovering from accidental double spends

This commit is contained in:
Florian Dold 2021-03-11 13:08:41 +01:00
parent 1392dc47c6
commit fb3da3a28d
No known key found for this signature in database
GPG Key ID: D2E4F00F29D02A4B
5 changed files with 220 additions and 3 deletions

View File

@ -0,0 +1,140 @@
/*
This file is part of GNU Taler
(C) 2020 Taler Systems S.A.
GNU Taler is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 3, or (at your option) any later version.
GNU Taler is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with
GNU Taler; see the file COPYING. If not, see <http://www.gnu.org/licenses/>
*/
/**
* Imports.
*/
import { PreparePayResultType } from "@gnu-taler/taler-wallet-core";
import { testPay } from "@gnu-taler/taler-wallet-core/src/operations/testing";
import {
GlobalTestState,
BankApi,
BankAccessApi,
WalletCli,
MerchantPrivateApi,
} from "./harness";
import {
createSimpleTestkudosEnvironment,
makeTestPayment,
withdrawViaBank,
} from "./helpers";
import { SyncService } from "./sync";
/**
* Run test for basic, bank-integrated withdrawal.
*/
export async function runWalletBackupDoublespendTest(t: GlobalTestState) {
// Set up test environment
const {
commonDb,
merchant,
wallet,
bank,
exchange,
} = await createSimpleTestkudosEnvironment(t);
const sync = await SyncService.create(t, {
currency: "TESTKUDOS",
annualFee: "TESTKUDOS:0.5",
database: commonDb.connStr,
fulfillmentUrl: "taler://fulfillment-success",
httpPort: 8089,
name: "sync1",
paymentBackendUrl: merchant.makeInstanceBaseUrl(),
uploadLimitMb: 10,
});
await sync.start();
await sync.pingUntilAvailable();
await wallet.addBackupProvider({
backupProviderBaseUrl: sync.baseUrl,
activate: true,
});
await withdrawViaBank(t, { wallet, bank, exchange, amount: "TESTKUDOS:10" });
await wallet.runBackupCycle();
await wallet.runUntilDone();
await wallet.runBackupCycle();
const backupRecovery = await wallet.exportBackupRecovery();
const wallet2 = new WalletCli(t, "wallet2");
await wallet2.importBackupRecovery({ recovery: backupRecovery });
await wallet2.runBackupCycle();
console.log("wallet1 balance before spend:", await wallet.getBalances());
await makeTestPayment(t, {
merchant,
wallet,
order: {
summary: "foo",
amount: "TESTKUDOS:7",
},
});
await wallet.runUntilDone();
console.log("wallet1 balance after spend:", await wallet.getBalances());
{
console.log("wallet2 balance:", await wallet2.getBalances());
}
// Now we double-spend with the second wallet
{
const instance = "default";
const orderResp = await MerchantPrivateApi.createOrder(merchant, instance, {
order: {
amount: "TESTKUDOS:8",
summary: "bla",
fulfillment_url: "taler://fulfillment-success",
},
});
let orderStatus = await MerchantPrivateApi.queryPrivateOrderStatus(
merchant,
{
orderId: orderResp.order_id,
},
);
t.assertTrue(orderStatus.order_status === "unpaid");
// Make wallet pay for the order
const preparePayResult = await wallet2.preparePay({
talerPayUri: orderStatus.taler_pay_uri,
});
t.assertTrue(
preparePayResult.status === PreparePayResultType.PaymentPossible,
);
const res = await wallet2.confirmPay({
proposalId: preparePayResult.proposalId,
});
console.log(res);
}
}

View File

@ -63,6 +63,7 @@ import { runMerchantInstancesTest } from "./test-merchant-instances";
import { runMerchantInstancesUrlsTest } from "./test-merchant-instances-urls";
import { runWalletBackupBasicTest } from "./test-wallet-backup-basic";
import { runMerchantInstancesDeleteTest } from "./test-merchant-instances-delete";
import { runWalletBackupDoublespendTest } from "./test-wallet-backup-doublespend";
/**
* Test runner.
@ -111,6 +112,7 @@ const allTests: TestMainFunction[] = [
runTimetravelWithdrawTest,
runTippingTest,
runWalletBackupBasicTest,
runWalletBackupDoublespendTest,
runWallettestingTest,
runWithdrawalAbortBankTest,
runWithdrawalBankIntegratedTest,

View File

@ -84,6 +84,8 @@ import {
throwUnexpectedRequestError,
getHttpResponseErrorDetails,
readSuccessResponseJsonOrErrorCode,
HttpResponseStatus,
readTalerErrorResponse,
} from "../util/http";
import { TalerErrorCode } from "../TalerErrorCode";
import { URL } from "../util/url";
@ -1001,6 +1003,22 @@ async function storePayReplaySuccess(
});
}
/**
* Handle a 409 Conflict response from the merchant.
*
* We do this by going through the coin history provided by the exchange and
* (1) verifying the signatures from the exchange
* (2) adjusting the remaining coin value
* (3) re-do coin selection.
*/
async function handleInsufficientFunds(
ws: InternalWalletState,
proposalId: string,
err: TalerErrorDetails,
): Promise<void> {
throw Error("payment re-denomination not implemented yet");
}
/**
* Submit a payment to the merchant.
*
@ -1078,6 +1096,32 @@ async function submitPay(
};
}
if (resp.status === HttpResponseStatus.Conflict) {
const err = await readTalerErrorResponse(resp);
if (
err.code ===
TalerErrorCode.MERCHANT_POST_ORDERS_ID_PAY_INSUFFICIENT_FUNDS
) {
// Do this in the background, as it might take some time
handleInsufficientFunds(ws, proposalId, err).catch(async (e) => {
await incrementProposalRetry(ws, proposalId, {
code: TalerErrorCode.WALLET_UNEXPECTED_EXCEPTION,
message: "unexpected exception",
hint: "unexpected exception",
details: {
exception: e,
},
});
});
return {
type: ConfirmPayResultType.Pending,
// FIXME: should we return something better here?
lastError: err,
};
}
}
const merchantResp = await readSuccessResponseJsonOrThrow(
resp,
codecForMerchantPayResponse(),

View File

@ -21,7 +21,7 @@
* as the backup schema must remain very stable and should be self-contained.
*
* Future:
* 1. Ghost spends (coin unexpectedly spend by a wallet with shared data)
* 1. Ghost spends (coin unexpectedly spent by a wallet with shared data)
* 2. Ghost withdrawals (reserve unexpectedly emptied by another wallet with shared data)
* 3. Track losses through re-denomination of payments/refreshes
* 4. (Feature:) Payments to own bank account and P2P-payments need to be backed up

View File

@ -1464,14 +1464,14 @@ export interface BackupProviderRecord {
/**
* Proposal that we're currently trying to pay for.
*
*
* (Also included in paymentProposalIds.)
*/
currentPaymentProposalId?: string;
/**
* Proposals that were used to pay (or attempt to pay) the provider.
*
*
* Stored to display a history of payments to the provider, and
* to make sure that the wallet isn't overpaying.
*/
@ -1541,6 +1541,31 @@ export interface DepositGroupRecord {
retryInfo: RetryInfo;
}
/**
* Record for a deposits that the wallet observed
* as a result of double spending, but which is not
* present in the wallet's own database otherwise.
*/
export interface GhostDepositGroupRecord {
/**
* When multiple deposits for the same contract terms hash
* have a different timestamp, we choose the earliest one.
*/
timestamp: Timestamp;
contractTermsHash: string;
deposits: {
coinPub: string;
amount: AmountString;
timestamp: Timestamp;
depositFee: AmountString;
merchantPub: string;
coinSig: string;
wireHash: string;
}[];
}
class ExchangesStore extends Store<"exchanges", ExchangeRecord> {
constructor() {
super("exchanges", { keyPath: "baseUrl" });
@ -1750,6 +1775,12 @@ export const Stores = {
bankWithdrawUris: new BankWithdrawUrisStore(),
backupProviders: new BackupProvidersStore(),
depositGroups: new DepositGroupsStore(),
ghostDepositGroups: new Store<"ghostDepositGroups", GhostDepositGroupRecord>(
"ghostDepositGroups",
{
keyPath: "contractTermsHash",
},
),
};
export class MetaConfigStore extends Store<"metaConfig", ConfigRecord<any>> {