/* This file is part of TALER Copyright (C) 2014-2021 Taler Systems SA TALER is free software; you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation; either version 3, or (at your option) any later version. TALER is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details. You should have received a copy of the GNU Affero General Public License along with TALER; see the file COPYING. If not, see */ /** * @file taler-exchange-httpd_responses.c * @brief API for generating generic replies of the exchange; these * functions are called TEH_RESPONSE_reply_ and they generate * and queue MHD response objects for a given connection. * @author Florian Dold * @author Benedikt Mueller * @author Christian Grothoff */ #include "platform.h" #include #include "taler-exchange-httpd_responses.h" #include "taler_util.h" #include "taler_json_lib.h" #include "taler_mhd_lib.h" #include "taler-exchange-httpd_keys.h" /** * Compile the transaction history of a coin into a JSON object. * * @param coin_pub public key of the coin * @param tl transaction history to JSON-ify * @return json representation of the @a rh, NULL on error */ json_t * TEH_RESPONSE_compile_transaction_history ( const struct TALER_CoinSpendPublicKeyP *coin_pub, const struct TALER_EXCHANGEDB_TransactionList *tl) { json_t *history; history = json_array (); if (NULL == history) { GNUNET_break (0); /* out of memory!? */ return NULL; } for (const struct TALER_EXCHANGEDB_TransactionList *pos = tl; NULL != pos; pos = pos->next) { switch (pos->type) { case TALER_EXCHANGEDB_TT_DEPOSIT: { const struct TALER_EXCHANGEDB_DepositListEntry *deposit = pos->details.deposit; struct TALER_DepositRequestPS dr = { .purpose.purpose = htonl (TALER_SIGNATURE_WALLET_COIN_DEPOSIT), .purpose.size = htonl (sizeof (dr)), .h_contract_terms = deposit->h_contract_terms, .h_wire = deposit->h_wire, .h_denom_pub = deposit->h_denom_pub, .wallet_timestamp = GNUNET_TIME_absolute_hton (deposit->timestamp), .refund_deadline = GNUNET_TIME_absolute_hton ( deposit->refund_deadline), .merchant = deposit->merchant_pub, .coin_pub = *coin_pub }; TALER_amount_hton (&dr.amount_with_fee, &deposit->amount_with_fee); TALER_amount_hton (&dr.deposit_fee, &deposit->deposit_fee); #if ENABLE_SANITY_CHECKS /* internal sanity check before we hand out a bogus sig... */ if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_WALLET_COIN_DEPOSIT, &dr, &deposit->csig.eddsa_signature, &coin_pub->eddsa_pub)) { GNUNET_break (0); json_decref (history); return NULL; } #endif if (0 != json_array_append_new ( history, json_pack ( "{s:s, s:o, s:o, s:o, s:o, s:o, s:o, s:o, s:o, s:o}", "type", "DEPOSIT", "amount", TALER_JSON_from_amount (&deposit->amount_with_fee), "deposit_fee", TALER_JSON_from_amount (&deposit->deposit_fee), "timestamp", GNUNET_JSON_from_time_abs (deposit->timestamp), "refund_deadline", GNUNET_JSON_from_time_abs (deposit->refund_deadline), "merchant_pub", GNUNET_JSON_from_data_auto (&deposit->merchant_pub), "h_contract_terms", GNUNET_JSON_from_data_auto (&deposit->h_contract_terms), "h_wire", GNUNET_JSON_from_data_auto (&deposit->h_wire), "h_denom_pub", GNUNET_JSON_from_data_auto (&deposit->h_denom_pub), "coin_sig", GNUNET_JSON_from_data_auto (&deposit->csig)))) { GNUNET_break (0); json_decref (history); return NULL; } break; } case TALER_EXCHANGEDB_TT_MELT: { const struct TALER_EXCHANGEDB_MeltListEntry *melt = pos->details.melt; struct TALER_RefreshMeltCoinAffirmationPS ms = { .purpose.purpose = htonl (TALER_SIGNATURE_WALLET_COIN_MELT), .purpose.size = htonl (sizeof (ms)), .rc = melt->rc, .h_denom_pub = melt->h_denom_pub, .coin_pub = *coin_pub }; TALER_amount_hton (&ms.amount_with_fee, &melt->amount_with_fee); TALER_amount_hton (&ms.melt_fee, &melt->melt_fee); #if ENABLE_SANITY_CHECKS /* internal sanity check before we hand out a bogus sig... */ if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_WALLET_COIN_MELT, &ms, &melt->coin_sig.eddsa_signature, &coin_pub->eddsa_pub)) { GNUNET_break (0); json_decref (history); return NULL; } #endif if (0 != json_array_append_new ( history, json_pack ("{s:s, s:o, s:o, s:o, s:o, s:o}", "type", "MELT", "amount", TALER_JSON_from_amount (&melt->amount_with_fee), "melt_fee", TALER_JSON_from_amount (&melt->melt_fee), "rc", GNUNET_JSON_from_data_auto (&melt->rc), "h_denom_pub", GNUNET_JSON_from_data_auto (&melt->h_denom_pub), "coin_sig", GNUNET_JSON_from_data_auto (&melt->coin_sig)))) { GNUNET_break (0); json_decref (history); return NULL; } } break; case TALER_EXCHANGEDB_TT_REFUND: { const struct TALER_EXCHANGEDB_RefundListEntry *refund = pos->details.refund; struct TALER_Amount value; struct TALER_RefundRequestPS rr = { .purpose.purpose = htonl (TALER_SIGNATURE_MERCHANT_REFUND), .purpose.size = htonl (sizeof (rr)), .h_contract_terms = refund->h_contract_terms, .coin_pub = *coin_pub, .merchant = refund->merchant_pub, .rtransaction_id = GNUNET_htonll (refund->rtransaction_id) }; TALER_amount_hton (&rr.refund_amount, &refund->refund_amount); #if ENABLE_SANITY_CHECKS /* internal sanity check before we hand out a bogus sig... */ if (GNUNET_OK != GNUNET_CRYPTO_eddsa_verify (TALER_SIGNATURE_MERCHANT_REFUND, &rr, &refund->merchant_sig.eddsa_sig, &refund->merchant_pub.eddsa_pub)) { GNUNET_break (0); json_decref (history); return NULL; } #endif if (0 > TALER_amount_subtract (&value, &refund->refund_amount, &refund->refund_fee)) { GNUNET_break (0); json_decref (history); return NULL; } if (0 != json_array_append_new ( history, json_pack ( "{s:s, s:o, s:o, s:o, s:o, s:I, s:o}", "type", "REFUND", "amount", TALER_JSON_from_amount (&value), "refund_fee", TALER_JSON_from_amount (&refund->refund_fee), "h_contract_terms", GNUNET_JSON_from_data_auto (&refund->h_contract_terms), "merchant_pub", GNUNET_JSON_from_data_auto (&refund->merchant_pub), "rtransaction_id", (json_int_t) refund->rtransaction_id, "merchant_sig", GNUNET_JSON_from_data_auto (&refund->merchant_sig)))) { GNUNET_break (0); json_decref (history); return NULL; } } break; case TALER_EXCHANGEDB_TT_OLD_COIN_RECOUP: { struct TALER_EXCHANGEDB_RecoupRefreshListEntry *pr = pos->details.old_coin_recoup; struct TALER_ExchangePublicKeyP epub; struct TALER_ExchangeSignatureP esig; struct TALER_RecoupRefreshConfirmationPS pc = { .purpose.purpose = htonl ( TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP_REFRESH), .purpose.size = htonl (sizeof (pc)), .timestamp = GNUNET_TIME_absolute_hton (pr->timestamp), .coin_pub = pr->coin.coin_pub, .old_coin_pub = pr->old_coin_pub }; TALER_amount_hton (&pc.recoup_amount, &pr->value); if (TALER_EC_NONE != TEH_keys_exchange_sign (&pc, &epub, &esig)) { GNUNET_break (0); json_decref (history); return NULL; } /* NOTE: we could also provide coin_pub's coin_sig, denomination key hash and the denomination key's RSA signature over coin_pub, but as the wallet should really already have this information (and cannot check or do anything with it anyway if it doesn't), it seems strictly unnecessary. */// if (0 != json_array_append_new ( history, json_pack ("{s:s, s:o, s:o, s:o, s:o, s:o}", "type", "OLD-COIN-RECOUP", "amount", TALER_JSON_from_amount (&pr->value), "exchange_sig", GNUNET_JSON_from_data_auto (&esig), "exchange_pub", GNUNET_JSON_from_data_auto (&epub), "coin_pub", GNUNET_JSON_from_data_auto (&pr->coin.coin_pub), "timestamp", GNUNET_JSON_from_time_abs (pr->timestamp)))) { GNUNET_break (0); json_decref (history); return NULL; } break; } case TALER_EXCHANGEDB_TT_RECOUP: { const struct TALER_EXCHANGEDB_RecoupListEntry *recoup = pos->details.recoup; struct TALER_ExchangePublicKeyP epub; struct TALER_ExchangeSignatureP esig; struct TALER_RecoupConfirmationPS pc = { .purpose.purpose = htonl (TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP), .purpose.size = htonl (sizeof (pc)), .timestamp = GNUNET_TIME_absolute_hton (recoup->timestamp), .coin_pub = *coin_pub, .reserve_pub = recoup->reserve_pub }; TALER_amount_hton (&pc.recoup_amount, &recoup->value); if (TALER_EC_NONE != TEH_keys_exchange_sign (&pc, &epub, &esig)) { GNUNET_break (0); json_decref (history); return NULL; } if (0 != json_array_append_new ( history, json_pack ("{s:s, s:o, s:o, s:o, s:o, s:o, s:o, s:o, s:o, s:o}", "type", "RECOUP", "amount", TALER_JSON_from_amount (&recoup->value), "exchange_sig", GNUNET_JSON_from_data_auto (&esig), "exchange_pub", GNUNET_JSON_from_data_auto (&epub), "reserve_pub", GNUNET_JSON_from_data_auto (&recoup->reserve_pub), "h_denom_pub", GNUNET_JSON_from_data_auto (&recoup->h_denom_pub), "coin_sig", GNUNET_JSON_from_data_auto (&recoup->coin_sig), "coin_blind", GNUNET_JSON_from_data_auto (&recoup->coin_blind), "reserve_pub", GNUNET_JSON_from_data_auto (&recoup->reserve_pub), "timestamp", GNUNET_JSON_from_time_abs (recoup->timestamp)))) { GNUNET_break (0); json_decref (history); return NULL; } } break; case TALER_EXCHANGEDB_TT_RECOUP_REFRESH: { struct TALER_EXCHANGEDB_RecoupRefreshListEntry *pr = pos->details.recoup_refresh; struct TALER_ExchangePublicKeyP epub; struct TALER_ExchangeSignatureP esig; struct TALER_RecoupRefreshConfirmationPS pc = { .purpose.purpose = htonl ( TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP_REFRESH), .purpose.size = htonl (sizeof (pc)), .timestamp = GNUNET_TIME_absolute_hton (pr->timestamp), .coin_pub = *coin_pub, .old_coin_pub = pr->old_coin_pub }; TALER_amount_hton (&pc.recoup_amount, &pr->value); if (TALER_EC_NONE != TEH_keys_exchange_sign (&pc, &epub, &esig)) { GNUNET_break (0); json_decref (history); return NULL; } /* NOTE: we could also provide coin_pub's coin_sig, denomination key hash and the denomination key's RSA signature over coin_pub, but as the wallet should really already have this information (and cannot check or do anything with it anyway if it doesn't), it seems strictly unnecessary. */// if (0 != json_array_append_new ( history, json_pack ("{s:s, s:o, s:o, s:o, s:o, s:o, s:o, s:o, s:o}", "type", "RECOUP-REFRESH", "amount", TALER_JSON_from_amount (&pr->value), "exchange_sig", GNUNET_JSON_from_data_auto (&esig), "exchange_pub", GNUNET_JSON_from_data_auto (&epub), "old_coin_pub", GNUNET_JSON_from_data_auto (&pr->old_coin_pub), "h_denom_pub", GNUNET_JSON_from_data_auto (&pr->coin.denom_pub_hash), "coin_sig", GNUNET_JSON_from_data_auto (&pr->coin_sig), "coin_blind", GNUNET_JSON_from_data_auto (&pr->coin_blind), "timestamp", GNUNET_JSON_from_time_abs (pr->timestamp)))) { GNUNET_break (0); json_decref (history); return NULL; } break; } default: GNUNET_assert (0); } } return history; } MHD_RESULT TEH_RESPONSE_reply_unknown_denom_pub_hash ( struct MHD_Connection *connection, const struct GNUNET_HashCode *dph) { struct TALER_ExchangePublicKeyP epub; struct TALER_ExchangeSignatureP esig; struct GNUNET_TIME_Absolute now; enum TALER_ErrorCode ec; now = GNUNET_TIME_absolute_get (); GNUNET_TIME_round_abs (&now); { struct TALER_DenominationUnknownAffirmationPS dua = { .purpose.size = htonl (sizeof (dua)), .purpose.purpose = htonl (TALER_SIGNATURE_EXCHANGE_AFFIRM_DENOM_UNKNOWN), .timestamp = GNUNET_TIME_absolute_hton (now), .h_denom_pub = *dph, }; ec = TEH_keys_exchange_sign (&dua, &epub, &esig); } if (TALER_EC_NONE != ec) { GNUNET_break (0); return TALER_MHD_reply_with_error (connection, MHD_HTTP_INTERNAL_SERVER_ERROR, ec, NULL); } return TALER_MHD_reply_json_pack ( connection, MHD_HTTP_NOT_FOUND, "{s:I,s:o,s:o,s:o,s:o}", "code", TALER_EC_EXCHANGE_GENERIC_DENOMINATION_KEY_UNKNOWN, "timestamp", GNUNET_JSON_from_time_abs (now), "exchange_pub", GNUNET_JSON_from_data_auto (&epub), "exchange_sig", GNUNET_JSON_from_data_auto (&esig), "h_denom_pub", GNUNET_JSON_from_data_auto (dph)); } MHD_RESULT TEH_RESPONSE_reply_expired_denom_pub_hash ( struct MHD_Connection *connection, const struct GNUNET_HashCode *dph, struct GNUNET_TIME_Absolute now, enum TALER_ErrorCode ec, const char *oper) { struct TALER_ExchangePublicKeyP epub; struct TALER_ExchangeSignatureP esig; enum TALER_ErrorCode ecr; struct TALER_DenominationExpiredAffirmationPS dua = { .purpose.size = htonl (sizeof (dua)), .purpose.purpose = htonl ( TALER_SIGNATURE_EXCHANGE_AFFIRM_DENOM_EXPIRED), .timestamp = GNUNET_TIME_absolute_hton (now), .h_denom_pub = *dph, }; strncpy (dua.operation, oper, sizeof (dua.operation)); ecr = TEH_keys_exchange_sign (&dua, &epub, &esig); if (TALER_EC_NONE != ecr) { GNUNET_break (0); return TALER_MHD_reply_with_error (connection, MHD_HTTP_INTERNAL_SERVER_ERROR, ec, NULL); } return TALER_MHD_reply_json_pack ( connection, MHD_HTTP_GONE, "{s:I,s:s,s:o,s:o,s:o,s:o}", "code", ec, "oper", oper, "timestamp", GNUNET_JSON_from_time_abs (now), "exchange_pub", GNUNET_JSON_from_data_auto (&epub), "exchange_sig", GNUNET_JSON_from_data_auto (&esig), "h_denom_pub", GNUNET_JSON_from_data_auto (dph)); } /** * Send proof that a request is invalid to client because of * insufficient funds. This function will create a message with all * of the operations affecting the coin that demonstrate that the coin * has insufficient value. * * @param connection connection to the client * @param ec error code to return * @param coin_pub public key of the coin * @param tl transaction list to use to build reply * @return MHD result code */ MHD_RESULT TEH_RESPONSE_reply_coin_insufficient_funds ( struct MHD_Connection *connection, enum TALER_ErrorCode ec, const struct TALER_CoinSpendPublicKeyP *coin_pub, const struct TALER_EXCHANGEDB_TransactionList *tl) { json_t *history; history = TEH_RESPONSE_compile_transaction_history (coin_pub, tl); if (NULL == history) { GNUNET_break (0); return TALER_MHD_reply_with_error (connection, MHD_HTTP_INTERNAL_SERVER_ERROR, TALER_EC_GENERIC_JSON_ALLOCATION_FAILURE, "Failed to generated proof of insufficient funds"); } return TALER_MHD_reply_json_pack (connection, MHD_HTTP_CONFLICT, "{s:s, s:I, s:o}", "hint", TALER_ErrorCode_get_hint (ec), "code", (json_int_t) ec, "history", history); } /** * Compile the history of a reserve into a JSON object * and calculate the total balance. * * @param rh reserve history to JSON-ify * @param[out] balance set to current reserve balance * @return json representation of the @a rh, NULL on error */ json_t * TEH_RESPONSE_compile_reserve_history ( const struct TALER_EXCHANGEDB_ReserveHistory *rh, struct TALER_Amount *balance) { struct TALER_Amount credit_total; struct TALER_Amount withdraw_total; json_t *json_history; enum InitAmounts { /** Nothing initialized */ IA_NONE = 0, /** credit_total initialized */ IA_CREDIT = 1, /** withdraw_total initialized */ IA_WITHDRAW = 2 } init = IA_NONE; json_history = json_array (); for (const struct TALER_EXCHANGEDB_ReserveHistory *pos = rh; NULL != pos; pos = pos->next) { switch (pos->type) { case TALER_EXCHANGEDB_RO_BANK_TO_EXCHANGE: { const struct TALER_EXCHANGEDB_BankTransfer *bank = pos->details.bank; if (0 == (IA_CREDIT & init)) { credit_total = bank->amount; init |= IA_CREDIT; } else if (0 > TALER_amount_add (&credit_total, &credit_total, &bank->amount)) { GNUNET_break (0); json_decref (json_history); return NULL; } if (0 != json_array_append_new ( json_history, json_pack ("{s:s, s:o, s:s, s:I, s:o}", "type", "CREDIT", "timestamp", GNUNET_JSON_from_time_abs (bank->execution_date), "sender_account_url", bank->sender_account_details, "wire_reference", (json_int_t) bank->wire_reference, "amount", TALER_JSON_from_amount (&bank->amount)))) { GNUNET_break (0); json_decref (json_history); return NULL; } break; } case TALER_EXCHANGEDB_RO_WITHDRAW_COIN: { const struct TALER_EXCHANGEDB_CollectableBlindcoin *withdraw = pos->details.withdraw; struct TALER_Amount value; value = withdraw->amount_with_fee; if (0 == (IA_WITHDRAW & init)) { withdraw_total = value; init |= IA_WITHDRAW; } else { if (0 > TALER_amount_add (&withdraw_total, &withdraw_total, &value)) { GNUNET_break (0); json_decref (json_history); return NULL; } } if (0 != json_array_append_new ( json_history, json_pack ("{s:s, s:o, s:o, s:o, s:o, s:o}", "type", "WITHDRAW", "reserve_sig", GNUNET_JSON_from_data_auto (&withdraw->reserve_sig), "h_coin_envelope", GNUNET_JSON_from_data_auto ( &withdraw->h_coin_envelope), "h_denom_pub", GNUNET_JSON_from_data_auto (&withdraw->denom_pub_hash), "withdraw_fee", TALER_JSON_from_amount (&withdraw->withdraw_fee), "amount", TALER_JSON_from_amount (&value)))) { GNUNET_break (0); json_decref (json_history); return NULL; } } break; case TALER_EXCHANGEDB_RO_RECOUP_COIN: { const struct TALER_EXCHANGEDB_Recoup *recoup = pos->details.recoup; struct TALER_ExchangePublicKeyP pub; struct TALER_ExchangeSignatureP sig; if (0 == (IA_CREDIT & init)) { credit_total = recoup->value; init |= IA_CREDIT; } else if (0 > TALER_amount_add (&credit_total, &credit_total, &recoup->value)) { GNUNET_break (0); json_decref (json_history); return NULL; } { struct TALER_RecoupConfirmationPS pc = { .purpose.purpose = htonl (TALER_SIGNATURE_EXCHANGE_CONFIRM_RECOUP), .purpose.size = htonl (sizeof (pc)), .timestamp = GNUNET_TIME_absolute_hton (recoup->timestamp), .coin_pub = recoup->coin.coin_pub, .reserve_pub = recoup->reserve_pub }; TALER_amount_hton (&pc.recoup_amount, &recoup->value); if (TALER_EC_NONE != TEH_keys_exchange_sign (&pc, &pub, &sig)) { GNUNET_break (0); json_decref (json_history); return NULL; } } if (0 != json_array_append_new (json_history, json_pack ("{s:s, s:o, s:o, s:o, s:o, s:o}", "type", "RECOUP", "exchange_pub", GNUNET_JSON_from_data_auto (&pub), "exchange_sig", GNUNET_JSON_from_data_auto (&sig), "timestamp", GNUNET_JSON_from_time_abs ( recoup->timestamp), "amount", TALER_JSON_from_amount ( &recoup->value), "coin_pub", GNUNET_JSON_from_data_auto ( &recoup->coin.coin_pub)))) { GNUNET_break (0); json_decref (json_history); return NULL; } } break; case TALER_EXCHANGEDB_RO_EXCHANGE_TO_BANK: { const struct TALER_EXCHANGEDB_ClosingTransfer *closing = pos->details.closing; struct TALER_ExchangePublicKeyP pub; struct TALER_ExchangeSignatureP sig; struct TALER_Amount value; value = closing->amount; if (0 == (IA_WITHDRAW & init)) { withdraw_total = value; init |= IA_WITHDRAW; } else { if (0 > TALER_amount_add (&withdraw_total, &withdraw_total, &value)) { GNUNET_break (0); json_decref (json_history); return NULL; } } { struct TALER_ReserveCloseConfirmationPS rcc = { .purpose.purpose = htonl (TALER_SIGNATURE_EXCHANGE_RESERVE_CLOSED), .purpose.size = htonl (sizeof (rcc)), .timestamp = GNUNET_TIME_absolute_hton (closing->execution_date), .reserve_pub = pos->details.closing->reserve_pub, .wtid = closing->wtid }; TALER_amount_hton (&rcc.closing_amount, &value); TALER_amount_hton (&rcc.closing_fee, &closing->closing_fee); GNUNET_CRYPTO_hash (closing->receiver_account_details, strlen (closing->receiver_account_details) + 1, &rcc.h_wire); if (TALER_EC_NONE != TEH_keys_exchange_sign (&rcc, &pub, &sig)) { GNUNET_break (0); json_decref (json_history); return NULL; } } if (0 != json_array_append_new ( json_history, json_pack ( "{s:s, s:s, s:o, s:o, s:o, s:o, s:o, s:o}", "type", "CLOSING", "receiver_account_details", closing->receiver_account_details, "wtid", GNUNET_JSON_from_data_auto (&closing->wtid), "exchange_pub", GNUNET_JSON_from_data_auto (&pub), "exchange_sig", GNUNET_JSON_from_data_auto (&sig), "timestamp", GNUNET_JSON_from_time_abs (closing->execution_date), "amount", TALER_JSON_from_amount (&value), "closing_fee", TALER_JSON_from_amount (&closing->closing_fee)))) { GNUNET_break (0); json_decref (json_history); return NULL; } } break; } } if (0 == (IA_CREDIT & init)) { /* We should not have gotten here, without credits no reserve should exist! */ GNUNET_break (0); json_decref (json_history); return NULL; } if (0 == (IA_WITHDRAW & init)) { /* did not encounter any withdraw operations, set withdraw_total to zero */ GNUNET_assert (GNUNET_OK == TALER_amount_get_zero (credit_total.currency, &withdraw_total)); } if (0 > TALER_amount_subtract (balance, &credit_total, &withdraw_total)) { GNUNET_break (0); json_decref (json_history); return NULL; } return json_history; } /* end of taler-exchange-httpd_responses.c */