/* This file is part of TALER Copyright (C) 2022 Taler Systems SA TALER is free software; you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation; either version 3, or (at your option) any later version. TALER is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details. You should have received a copy of the GNU Affero General Public License along with TALER; see the file COPYING. If not, see */ /** * @file taler-exchange-httpd_reserves_get_attest.c * @brief Handle GET /reserves/$RESERVE_PUB/attest requests * @author Christian Grothoff */ #include "platform.h" #include #include #include "taler_kyclogic_lib.h" #include "taler_mhd_lib.h" #include "taler_json_lib.h" #include "taler_dbevents.h" #include "taler-exchange-httpd_keys.h" #include "taler-exchange-httpd_reserves_get_attest.h" #include "taler-exchange-httpd_responses.h" /** * Closure for #reserve_attest_transaction. */ struct ReserveAttestContext { /** * Public key of the reserve the inquiry is about. */ struct TALER_ReservePublicKeyP reserve_pub; /** * Hash of the payto URI of this reserve. */ struct TALER_PaytoHashP h_payto; /** * Available attributes. */ json_t *attributes; /** * Error code encountered in interaction with KYC provider. */ enum TALER_ErrorCode ec; /** * Set to true if we did not find the reserve. */ bool not_found; }; /** * Function called with information about all applicable * legitimization processes for the given user. * * @param cls our `struct ReserveAttestContext *` * @param provider_section KYC provider configuration section * @param provider_user_id UID at a provider (can be NULL) * @param legi_id legitimization process ID (can be NULL) */ static void kyc_process_cb (void *cls, const char *provider_section, const char *provider_user_id, const char *legi_id) { struct ReserveAttestContext *rsc = cls; struct GNUNET_TIME_Timestamp etime; json_t *attrs; rsc->ec = TALER_KYCLOGIC_user_to_attributes (provider_section, provider_user_id, legi_id, &etime, &attrs); if (TALER_EC_NONE != rsc->ec) return; { json_t *val; const char *name; json_object_foreach (attrs, name, val) { bool duplicate = false; size_t idx; json_t *str; json_array_foreach (rsc->attributes, idx, str) { if (0 == strcmp (json_string_value (str), name)) { duplicate = true; break; } } if (duplicate) continue; GNUNET_assert (0 == json_array_append (rsc->attributes, json_string (name))); } } } /** * Function implementing GET /reserves/$RID/attest transaction. * Execute a /reserves/ get attest. Given the public key of a reserve, * return the associated transaction attest. Runs the * transaction logic; IF it returns a non-error code, the transaction * logic MUST NOT queue a MHD response. IF it returns an hard error, * the transaction logic MUST queue a MHD response and set @a mhd_ret. * IF it returns the soft error code, the function MAY be called again * to retry and MUST not queue a MHD response. * * @param cls a `struct ReserveAttestContext *` * @param connection MHD request which triggered the transaction * @param[out] mhd_ret set to MHD response status for @a connection, * if transaction failed (!) * @return transaction status */ static enum GNUNET_DB_QueryStatus reserve_attest_transaction (void *cls, struct MHD_Connection *connection, MHD_RESULT *mhd_ret) { struct ReserveAttestContext *rsc = cls; enum GNUNET_DB_QueryStatus qs; rsc->attributes = json_array (); GNUNET_assert (NULL != rsc->attributes); qs = TEH_plugin->iterate_kyc_reference (TEH_plugin->cls, &rsc->h_payto, &kyc_process_cb, rsc); switch (qs) { case GNUNET_DB_STATUS_HARD_ERROR: GNUNET_break (0); *mhd_ret = TALER_MHD_reply_with_error (connection, MHD_HTTP_INTERNAL_SERVER_ERROR, TALER_EC_GENERIC_DB_FETCH_FAILED, "iterate_kyc_reference"); return qs; case GNUNET_DB_STATUS_SOFT_ERROR: GNUNET_break (0); return qs; case GNUNET_DB_STATUS_SUCCESS_NO_RESULTS: rsc->not_found = true; return qs; case GNUNET_DB_STATUS_SUCCESS_ONE_RESULT: rsc->not_found = false; break; } return qs; } MHD_RESULT TEH_handler_reserves_get_attest (struct TEH_RequestContext *rc, const char *const args[1]) { struct ReserveAttestContext rsc = { .attributes = NULL }; if (GNUNET_OK != GNUNET_STRINGS_string_to_data (args[0], strlen (args[0]), &rsc.reserve_pub, sizeof (rsc.reserve_pub))) { GNUNET_break_op (0); return TALER_MHD_reply_with_error (rc->connection, MHD_HTTP_BAD_REQUEST, TALER_EC_GENERIC_RESERVE_PUB_MALFORMED, args[0]); } { char *payto_uri; payto_uri = TALER_reserve_make_payto (TEH_base_url, &rsc.reserve_pub); TALER_payto_hash (payto_uri, &rsc.h_payto); GNUNET_free (payto_uri); } { MHD_RESULT mhd_ret; if (GNUNET_OK != TEH_DB_run_transaction (rc->connection, "get-attestable", TEH_MT_REQUEST_OTHER, &mhd_ret, &reserve_attest_transaction, &rsc)) { json_decref (rsc.attributes); return mhd_ret; } } /* generate proper response */ if (rsc.not_found) { json_decref (rsc.attributes); return TALER_MHD_reply_with_error (rc->connection, MHD_HTTP_NOT_FOUND, TALER_EC_EXCHANGE_GENERIC_RESERVE_UNKNOWN, args[0]); } if (TALER_EC_NONE != rsc.ec) { json_decref (rsc.attributes); return TALER_MHD_reply_with_ec (rc->connection, rsc.ec, NULL); } return TALER_MHD_REPLY_JSON_PACK ( rc->connection, MHD_HTTP_OK, GNUNET_JSON_pack_object_steal ("attributes", rsc.attributes)); } /* end of taler-exchange-httpd_reserves_get_attest.c */