summaryrefslogtreecommitdiff
path: root/src/auditor/taler-auditor-httpd_emergency-del.c
blob: 8735b0d4edc8d8a6ad32e159c441d6223688c5e5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
/*
   This file is part of TALER
   Copyright (C) 2024 Taler Systems SA

   TALER is free software; you can redistribute it and/or modify it under the
   terms of the GNU General Public License as published by the Free Software
   Foundation; either version 3, or (at your option) any later version.

   TALER is distributed in the hope that it will be useful, but WITHOUT ANY
   WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
   A PARTICULAR PURPOSE.  See the GNU General Public License for more details.

   You should have received a copy of the GNU General Public License along with
   TALER; see the file COPYING.  If not, see <http://www.gnu.org/licenses/>
 */


#include "taler-auditor-httpd_emergency-del.h"


MHD_RESULT
TAH_EMERGENCY_handler_delete (struct TAH_RequestHandler *rh,
                              struct MHD_Connection *
                              connection,
                              void **connection_cls,
                              const char *upload_data,
                              size_t *upload_data_size,
                              const char *const args[])
{

  MHD_RESULT res;
  enum GNUNET_DB_QueryStatus qs;

  uint64_t row_id;

  if (args[1] != NULL)
    row_id = atoi (args[1]);
  else
    return TALER_MHD_reply_with_error (connection,
                                       MHD_HTTP_BAD_REQUEST,
                                       // TODO: not the correct ec
                                       TALER_EC_AUDITOR_DEPOSIT_CONFIRMATION_SIGNATURE_INVALID,
                                       "exchange signature invalid");

  if (GNUNET_SYSERR ==
      TAH_plugin->preflight (TAH_plugin->cls))
  {
    GNUNET_break (0);
    return TALER_MHD_reply_with_error (connection,
                                       MHD_HTTP_INTERNAL_SERVER_ERROR,
                                       TALER_EC_GENERIC_DB_SETUP_FAILED,
                                       NULL);
  }


  // execute the transaction
  qs = TAH_plugin->delete_emergency (TAH_plugin->cls,
                                     row_id);

  if (0 > qs)
  {
    // goes in here if there was an error with the transaction
    GNUNET_break (GNUNET_DB_STATUS_HARD_ERROR == qs);
    TALER_LOG_WARNING (
      "Failed to handle DELETE /emergency/ %s\n",
      args[1]);
    return TALER_MHD_reply_with_error (connection,
                                       MHD_HTTP_NOT_FOUND,
                                       // TODO: not the correct ec
                                       TALER_EC_AUDITOR_DEPOSIT_CONFIRMATION_SIGNATURE_INVALID,
                                       "exchange signature invalid");

  }

  // on success?
  return TALER_MHD_REPLY_JSON_PACK (connection,
                                    MHD_HTTP_NO_CONTENT,
                                    GNUNET_JSON_pack_string ("status",
                                                             "EMERGENCY_OK"));

  return res;
}