diff options
author | Christian Grothoff <christian@grothoff.org> | 2016-03-01 15:35:04 +0100 |
---|---|---|
committer | Christian Grothoff <christian@grothoff.org> | 2016-03-01 15:35:04 +0100 |
commit | b5cba3251053c22bf1df46282f1dd0a4c46f6a38 (patch) | |
tree | b7495c3e47c40c57ff81045a4e43aa07a3b6c7b1 /src/mint/taler-mint-httpd.c | |
parent | e406833eab7ca0835f9779abebada94592a85a7e (diff) |
renaming mint->exchange
Diffstat (limited to 'src/mint/taler-mint-httpd.c')
-rw-r--r-- | src/mint/taler-mint-httpd.c | 749 |
1 files changed, 0 insertions, 749 deletions
diff --git a/src/mint/taler-mint-httpd.c b/src/mint/taler-mint-httpd.c deleted file mode 100644 index 5d6aa0589..000000000 --- a/src/mint/taler-mint-httpd.c +++ /dev/null @@ -1,749 +0,0 @@ -/* - This file is part of TALER - Copyright (C) 2014, 2015 GNUnet e.V. - - TALER is free software; you can redistribute it and/or modify it under the - terms of the GNU Affero General Public License as published by the Free Software - Foundation; either version 3, or (at your option) any later version. - - TALER is distributed in the hope that it will be useful, but WITHOUT ANY - WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR - A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details. - - You should have received a copy of the GNU Affero General Public License along with - TALER; see the file COPYING. If not, If not, see <http://www.gnu.org/licenses/> -*/ - -/** - * @file taler-mint-httpd.c - * @brief Serve the HTTP interface of the mint - * @author Florian Dold - * @author Benedikt Mueller - * @author Christian Grothoff - */ -#include "platform.h" -#include <gnunet/gnunet_util_lib.h> -#include <jansson.h> -#include <microhttpd.h> -#include <pthread.h> -#include "taler-mint-httpd_parsing.h" -#include "taler-mint-httpd_mhd.h" -#include "taler-mint-httpd_admin.h" -#include "taler-mint-httpd_deposit.h" -#include "taler-mint-httpd_reserve.h" -#include "taler-mint-httpd_wire.h" -#include "taler-mint-httpd_refresh.h" -#include "taler-mint-httpd_tracking.h" -#include "taler-mint-httpd_keystate.h" -#if HAVE_DEVELOPER -#include "taler-mint-httpd_test.h" -#endif -#include "taler_mintdb_plugin.h" -#include "taler-mint-httpd_validation.h" - -/** - * Which currency is used by this mint? - */ -char *TMH_mint_currency_string; - -/** - * Should we return "Connection: close" in each response? - */ -int TMH_mint_connection_close; - -/** - * Base directory of the mint (global) - */ -char *TMH_mint_directory; - -/** - * The mint's configuration (global) - */ -struct GNUNET_CONFIGURATION_Handle *cfg; - -/** - * Master public key (according to the - * configuration in the mint directory). - */ -struct GNUNET_CRYPTO_EddsaPublicKey TMH_master_public_key; - -/** - * Our DB plugin. - */ -struct TALER_MINTDB_Plugin *TMH_plugin; - -/** - * Are we running in test mode? - */ -int TMH_test_mode; - -/** - * Default timeout in seconds for HTTP requests. - */ -static unsigned int connection_timeout = 30; - -/** - * The HTTP Daemon. - */ -static struct MHD_Daemon *mydaemon; - -/** - * Port to run the daemon on. - */ -static uint16_t serve_port; - - -/** - * Function called whenever MHD is done with a request. If the - * request was a POST, we may have stored a `struct Buffer *` in the - * @a con_cls that might still need to be cleaned up. Call the - * respective function to free the memory. - * - * @param cls client-defined closure - * @param connection connection handle - * @param con_cls value as set by the last call to - * the #MHD_AccessHandlerCallback - * @param toe reason for request termination - * @see #MHD_OPTION_NOTIFY_COMPLETED - * @ingroup request - */ -static void -handle_mhd_completion_callback (void *cls, - struct MHD_Connection *connection, - void **con_cls, - enum MHD_RequestTerminationCode toe) -{ - if (NULL == *con_cls) - return; - TMH_PARSE_post_cleanup_callback (*con_cls); - *con_cls = NULL; -} - - -/** - * Handle a request coming from libmicrohttpd. - * - * @param cls closure for MHD daemon (unused) - * @param connection the connection - * @param url the requested url - * @param method the method (POST, GET, ...) - * @param version HTTP version (ignored) - * @param upload_data request data - * @param upload_data_size size of @a upload_data in bytes - * @param con_cls closure for request (a `struct Buffer *`) - * @return MHD result code - */ -static int -handle_mhd_request (void *cls, - struct MHD_Connection *connection, - const char *url, - const char *method, - const char *version, - const char *upload_data, - size_t *upload_data_size, - void **con_cls) -{ - static struct TMH_RequestHandler handlers[] = - { - /* Landing page, tell humans to go away. */ - { "/", MHD_HTTP_METHOD_GET, "text/plain", - "Hello, I'm the Taler mint. This HTTP server is not for humans.\n", 0, - &TMH_MHD_handler_static_response, MHD_HTTP_OK }, - /* /robots.txt: disallow everything */ - { "/robots.txt", MHD_HTTP_METHOD_GET, "text/plain", - "User-agent: *\nDisallow: /\n", 0, - &TMH_MHD_handler_static_response, MHD_HTTP_OK }, - /* AGPL licensing page, redirect to source. As per the AGPL-license, - every deployment is required to offer the user a download of the - source. We make this easy by including a redirect to the source - here. */ - { "/agpl", MHD_HTTP_METHOD_GET, "text/plain", - NULL, 0, - &TMH_MHD_handler_agpl_redirect, MHD_HTTP_FOUND }, - - /* Return key material and fundamental properties for this mint */ - { "/keys", MHD_HTTP_METHOD_GET, "application/json", - NULL, 0, - &TMH_KS_handler_keys, MHD_HTTP_OK }, - { "/keys", NULL, "text/plain", - "Only GET is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - /* Requests for wiring information */ - { "/wire", MHD_HTTP_METHOD_GET, "application/json", - NULL, 0, - &TMH_WIRE_handler_wire, MHD_HTTP_OK }, - { "/wire", NULL, "text/plain", - "Only GET is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/wire/test", MHD_HTTP_METHOD_GET, "application/json", - NULL, 0, - &TMH_WIRE_handler_wire_test, MHD_HTTP_FOUND }, - { "/wire/test", NULL, "text/plain", - "Only GET is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/wire/sepa", MHD_HTTP_METHOD_GET, "application/json", - NULL, 0, - &TMH_WIRE_handler_wire_sepa, MHD_HTTP_OK }, - { "/wire/sepa", NULL, "text/plain", - "Only GET is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - /* Withdrawing coins / interaction with reserves */ - { "/reserve/status", MHD_HTTP_METHOD_GET, "application/json", - NULL, 0, - &TMH_RESERVE_handler_reserve_status, MHD_HTTP_OK }, - { "/reserve/status", NULL, "text/plain", - "Only GET is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/reserve/withdraw", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_RESERVE_handler_reserve_withdraw, MHD_HTTP_OK }, - { "/reserve/withdraw", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - /* Depositing coins */ - { "/deposit", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_DEPOSIT_handler_deposit, MHD_HTTP_OK }, - { "/deposit", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - /* Dealing with change */ - { "/refresh/melt", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_REFRESH_handler_refresh_melt, MHD_HTTP_OK }, - { "/refresh/melt", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/refresh/reveal", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_REFRESH_handler_refresh_reveal, MHD_HTTP_OK }, - { "/refresh/reveal", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/refresh/reveal", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_REFRESH_handler_refresh_reveal, MHD_HTTP_OK }, - { "/refresh/reveal", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/refresh/link", MHD_HTTP_METHOD_GET, "application/json", - NULL, 0, - &TMH_REFRESH_handler_refresh_link, MHD_HTTP_OK }, - { "/refresh/link", NULL, "text/plain", - "Only GET is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - /* FIXME: maybe conditionally compile these? */ - { "/admin/add/incoming", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_ADMIN_handler_admin_add_incoming, MHD_HTTP_OK }, - { "/admin/add/incoming", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/wire/deposits", MHD_HTTP_METHOD_GET, "application/json", - NULL, 0, - &TMH_TRACKING_handler_wire_deposits, MHD_HTTP_OK }, - { "/wire/deposits", NULL, "text/plain", - "Only GET is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - { "/deposit/wtid", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_TRACKING_handler_deposit_wtid, MHD_HTTP_OK }, - { "/deposit/wtid", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - -#if HAVE_DEVELOPER - /* Client crypto-interoperability test functions */ - { "/test", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_TEST_handler_test, MHD_HTTP_OK }, - { "/test", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/test/base32", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_TEST_handler_test_base32, MHD_HTTP_OK }, - { "/test/base32", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/test/encrypt", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_TEST_handler_test_encrypt, MHD_HTTP_OK }, - { "/test/encrypt", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/test/hkdf", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_TEST_handler_test_hkdf, MHD_HTTP_OK }, - { "/test/hkdf", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/test/ecdhe", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_TEST_handler_test_ecdhe, MHD_HTTP_OK }, - { "/test/ecdhe", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/test/eddsa", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_TEST_handler_test_eddsa, MHD_HTTP_OK }, - { "/test/eddsa", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/test/rsa/get", MHD_HTTP_METHOD_GET, "application/json", - NULL, 0, - &TMH_TEST_handler_test_rsa_get, MHD_HTTP_OK }, - { "/test/rsa/get", NULL, "text/plain", - "Only GET is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/test/rsa/sign", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_TEST_handler_test_rsa_sign, MHD_HTTP_OK }, - { "/test/rsa/sign", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, - - { "/test/transfer", MHD_HTTP_METHOD_POST, "application/json", - NULL, 0, - &TMH_TEST_handler_test_transfer, MHD_HTTP_OK }, - { "/test/transfer", NULL, "text/plain", - "Only POST is allowed", 0, - &TMH_MHD_handler_send_json_pack_error, MHD_HTTP_METHOD_NOT_ALLOWED }, -#endif - - { NULL, NULL, NULL, NULL, 0, 0 } - }; - static struct TMH_RequestHandler h404 = - { - "", NULL, "text/html", - "<html><title>404: not found</title></html>", 0, - &TMH_MHD_handler_static_response, MHD_HTTP_NOT_FOUND - }; - struct TMH_RequestHandler *rh; - unsigned int i; - - GNUNET_log (GNUNET_ERROR_TYPE_INFO, - "Handling request for URL '%s'\n", - url); - for (i=0;NULL != handlers[i].url;i++) - { - rh = &handlers[i]; - if ( (0 == strcasecmp (url, - rh->url)) && - ( (NULL == rh->method) || - (0 == strcasecmp (method, - rh->method)) ) ) - return rh->handler (rh, - connection, - con_cls, - upload_data, - upload_data_size); - } - return TMH_MHD_handler_static_response (&h404, - connection, - con_cls, - upload_data, - upload_data_size); -} - - -/** - * Load configuration parameters for the mint - * server into the corresponding global variables. - * - * @param mint_directory the mint's directory - * @return #GNUNET_OK on success - */ -static int -mint_serve_process_config (const char *mint_directory) -{ - unsigned long long port; - char *TMH_master_public_key_str; - - cfg = TALER_config_load (mint_directory); - if (NULL == cfg) - { - fprintf (stderr, - "Failed to load mint configuration\n"); - return GNUNET_SYSERR; - } - if (GNUNET_OK != - GNUNET_CONFIGURATION_get_value_string (cfg, - "mint", - "currency", - &TMH_mint_currency_string)) - { - GNUNET_log_config_missing (GNUNET_ERROR_TYPE_ERROR, - "mint", - "currency"); - return GNUNET_SYSERR; - } - if (strlen (TMH_mint_currency_string) >= TALER_CURRENCY_LEN) - { - fprintf (stderr, - "Currency `%s' longer than the allowed limit of %u characters.", - TMH_mint_currency_string, - (unsigned int) TALER_CURRENCY_LEN); - return GNUNET_SYSERR; - } - if (GNUNET_OK != - TMH_VALIDATION_init (cfg)) - return GNUNET_SYSERR; - - if (GNUNET_OK != - GNUNET_CONFIGURATION_get_value_string (cfg, - "mint", - "master_public_key", - &TMH_master_public_key_str)) - { - GNUNET_log_config_missing (GNUNET_ERROR_TYPE_ERROR, - "mint", - "master_public_key"); - TMH_VALIDATION_done (); - return GNUNET_SYSERR; - } - if (GNUNET_OK != - GNUNET_CRYPTO_eddsa_public_key_from_string (TMH_master_public_key_str, - strlen (TMH_master_public_key_str), - &TMH_master_public_key)) - { - fprintf (stderr, - "Invalid master public key given in mint configuration."); - GNUNET_free (TMH_master_public_key_str); - TMH_VALIDATION_done (); - return GNUNET_SYSERR; - } - GNUNET_free (TMH_master_public_key_str); - - if (NULL == - (TMH_plugin = TALER_MINTDB_plugin_load (cfg))) - { - fprintf (stderr, - "Failed to initialize DB subsystem\n"); - TMH_VALIDATION_done (); - return GNUNET_SYSERR; - } - if (GNUNET_YES == - GNUNET_CONFIGURATION_get_value_yesno (cfg, - "mint", - "TESTRUN")) - { - GNUNET_log (GNUNET_ERROR_TYPE_INFO, - "Running in TEST mode! Database contents will not persist!\n"); - TMH_test_mode = GNUNET_YES; - TMH_plugin->create_tables (TMH_plugin->cls, - GNUNET_YES); - } - - if (GNUNET_OK != - GNUNET_CONFIGURATION_get_value_number (cfg, - "mint", - "port", - &port)) - { - GNUNET_log_config_invalid (GNUNET_ERROR_TYPE_ERROR, - "mint", - "port", - "port number required"); - TMH_VALIDATION_done (); - return GNUNET_SYSERR; - } - - if ( (0 == port) || - (port > UINT16_MAX) ) - { - fprintf (stderr, - "Invalid configuration (value out of range): %llu is not a valid port\n", - port); - TMH_VALIDATION_done (); - return GNUNET_SYSERR; - } - serve_port = (uint16_t) port; - - return GNUNET_OK; -} - - -/* Developer logic for supporting the `-f' option. */ -#if HAVE_DEVELOPER - -/** - * Option `-f' (specifies an input file to give to the HTTP server). - */ -static char *input_filename; - - -/** - * Run 'nc' or 'ncat' as a fake HTTP client using #input_filename - * as the input for the request. If launching the client worked, - * run the #TMH_KS_loop() event loop as usual. - * - * @return #GNUNET_OK - */ -static int -run_fake_client () -{ - pid_t cld; - char ports[6]; - int fd; - int ret; - int status; - - fd = open (input_filename, O_RDONLY); - if (-1 == fd) - { - fprintf (stderr, - "Failed to open `%s': %s\n", - input_filename, - strerror (errno)); - return GNUNET_SYSERR; - } - /* Fake HTTP client request with #input_filename as input. - We do this using the nc tool. */ - GNUNET_snprintf (ports, - sizeof (ports), - "%u", - serve_port); - if (0 == (cld = fork())) - { - GNUNET_break (0 == close (0)); - GNUNET_break (0 == dup2 (fd, 0)); - GNUNET_break (0 == close (fd)); - if ( (0 != execlp ("nc", - "nc", - "localhost", - ports, - "-w", "30", - NULL)) && - (0 != execlp ("ncat", - "ncat", - "localhost", - ports, - "-i", "30", - NULL)) ) - { - fprintf (stderr, - "Failed to run both `nc' and `ncat': %s\n", - strerror (errno)); - } - _exit (1); - } - /* parent process */ - GNUNET_break (0 == close (fd)); - ret = TMH_KS_loop (); - if (cld != waitpid (cld, &status, 0)) - fprintf (stderr, - "Waiting for `nc' child failed: %s\n", - strerror (errno)); - return ret; -} - - -/** - * Signature of the callback used by MHD to notify the application - * about completed connections. If we are running in test-mode with - * an #input_filename, this function is used to terminate the HTTPD - * after the first request has been processed. - * - * @param cls client-defined closure, NULL - * @param connection connection handle (ignored) - * @param socket_context socket-specific pointer (ignored) - * @param toe reason for connection notification - */ -static void -connection_done (void *cls, - struct MHD_Connection *connection, - void **socket_context, - enum MHD_ConnectionNotificationCode toe) -{ - /* We only act if the connection is closed. */ - if (MHD_CONNECTION_NOTIFY_CLOSED != toe) - return; - /* This callback is also present if the option wasn't, so - make sure the option was actually set. */ - if (NULL == input_filename) - return; - /* We signal ourselves to terminate. */ - if (0 != kill (getpid(), - SIGTERM)) - GNUNET_log_strerror (GNUNET_ERROR_TYPE_ERROR, - "kill"); -} - -/* end of HAVE_DEVELOPER */ -#endif - - -/** - * Function called for logging by MHD. - * - * @param cls closure, NULL - * @param fm format string (`printf()`-style) - * @param ap arguments to @a fm - */ -static void -handle_mhd_logs (void *cls, - const char *fm, - va_list ap) -{ - char buf[2048]; - - vsnprintf (buf, - sizeof (buf), - fm, - ap); - GNUNET_log_from (GNUNET_ERROR_TYPE_WARNING, - "libmicrohttpd", - "%s", - buf); -} - - -/** - * The main function of the taler-mint-httpd server ("the mint"). - * - * @param argc number of arguments from the command line - * @param argv command line arguments - * @return 0 ok, 1 on error - */ -int -main (int argc, - char *const *argv) -{ - static const struct GNUNET_GETOPT_CommandLineOption options[] = { - {'C', "connection-close", NULL, - "force HTTP connections to be closed after each request", 0, - &GNUNET_GETOPT_set_one, &TMH_mint_connection_close}, - {'d', "mint-dir", "DIR", - "mint directory with configuration and keys for operating the mint", 1, - &GNUNET_GETOPT_set_filename, &TMH_mint_directory}, - {'t', "timeout", "SECONDS", - "after how long do connections timeout by default (in seconds)", 1, - &GNUNET_GETOPT_set_uint, &connection_timeout}, -#if HAVE_DEVELOPER - {'f', "file-input", "FILENAME", - "run in test-mode using FILENAME as the HTTP request to process", 1, - &GNUNET_GETOPT_set_filename, &input_filename}, -#endif - TALER_GETOPT_OPTION_HELP ("HTTP server providing a RESTful API to access a Taler mint"), - GNUNET_GETOPT_OPTION_VERSION (VERSION "-" VCS_VERSION), - GNUNET_GETOPT_OPTION_END - }; - int ret; - - GNUNET_assert (GNUNET_OK == - GNUNET_log_setup ("taler-mint-httpd", - "INFO", - NULL)); - if (0 >= - GNUNET_GETOPT_run ("taler-mint-httpd", - options, - argc, argv)) - return 1; - if (NULL == TMH_mint_directory) - { - fprintf (stderr, - "Mint directory not specified\n"); - return 1; - } - - if (GNUNET_OK != - mint_serve_process_config (TMH_mint_directory)) - return 1; - - mydaemon = MHD_start_daemon (MHD_USE_SELECT_INTERNALLY | MHD_USE_DEBUG, - serve_port, - NULL, NULL, - &handle_mhd_request, NULL, - MHD_OPTION_EXTERNAL_LOGGER, &handle_mhd_logs, NULL, - MHD_OPTION_NOTIFY_COMPLETED, &handle_mhd_completion_callback, NULL, - MHD_OPTION_CONNECTION_TIMEOUT, connection_timeout, -#if HAVE_DEVELOPER - MHD_OPTION_NOTIFY_CONNECTION, &connection_done, NULL, -#endif - MHD_OPTION_END); - - if (NULL == mydaemon) - { - fprintf (stderr, - "Failed to start HTTP server.\n"); - return 1; - } -#if HAVE_DEVELOPER - if (NULL != input_filename) - { - /* run only the testfile input, then terminate */ - ret = run_fake_client (); - } - else - { - /* normal behavior */ - ret = TMH_KS_loop (); - } -#else - /* normal behavior */ - ret = TMH_KS_loop (); -#endif - - switch (ret) - { - case GNUNET_OK: - case GNUNET_SYSERR: - MHD_stop_daemon (mydaemon); - break; - case GNUNET_NO: - { - MHD_socket sock = MHD_quiesce_daemon (mydaemon); - - /* FIXME #3474: fork another MHD, passing on the listen socket! */ - while (0 != MHD_get_daemon_info (mydaemon, - MHD_DAEMON_INFO_CURRENT_CONNECTIONS)->num_connections) - sleep (1); - MHD_stop_daemon (mydaemon); - - close (sock); /* FIXME: done like this because #3474 is open */ - } - break; - default: - GNUNET_break (0); - MHD_stop_daemon (mydaemon); - break; - } - - if (GNUNET_YES == TMH_test_mode) - { - struct TALER_MINTDB_Session *session; - - session = TMH_plugin->get_session (TMH_plugin->cls, - GNUNET_YES); - if (NULL == session) - GNUNET_break (0); - else - TMH_plugin->drop_temporary (TMH_plugin->cls, - session); - } - TALER_MINTDB_plugin_unload (TMH_plugin); - TMH_VALIDATION_done (); - return (GNUNET_SYSERR == ret) ? 1 : 0; -} - -/* end of taler-mint-httpd.c */ |