aboutsummaryrefslogtreecommitdiff
path: root/src/auditor/taler-auditor-httpd_bad-sig-losses-get.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/auditor/taler-auditor-httpd_bad-sig-losses-get.c')
-rw-r--r--src/auditor/taler-auditor-httpd_bad-sig-losses-get.c208
1 files changed, 208 insertions, 0 deletions
diff --git a/src/auditor/taler-auditor-httpd_bad-sig-losses-get.c b/src/auditor/taler-auditor-httpd_bad-sig-losses-get.c
new file mode 100644
index 000000000..4117bec37
--- /dev/null
+++ b/src/auditor/taler-auditor-httpd_bad-sig-losses-get.c
@@ -0,0 +1,208 @@
+/*
+ This file is part of TALER
+ Copyright (C) 2024 Taler Systems SA
+
+ TALER is free software; you can redistribute it and/or modify it under the
+ terms of the GNU General Public License as published by the Free Software
+ Foundation; either version 3, or (at your option) any later version.
+
+ TALER is distributed in the hope that it will be useful, but WITHOUT ANY
+ WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
+ A PARTICULAR PURPOSE. See the GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License along with
+ TALER; see the file COPYING. If not, see <http://www.gnu.org/licenses/>
+ */
+
+
+#include "platform.h"
+#include <gnunet/gnunet_util_lib.h>
+#include <gnunet/gnunet_json_lib.h>
+#include <jansson.h>
+#include <microhttpd.h>
+#include <pthread.h>
+#include "taler_json_lib.h"
+#include "taler_mhd_lib.h"
+#include "taler-auditor-httpd.h"
+#include "taler-auditor-httpd_bad-sig-losses-get.h"
+
+/**
+* Add bad-sig-losses to the list.
+*
+* @param[in,out] cls a `json_t *` array to extend
+* @param serial_id location of the @a dc in the database
+* @param dc struct of inconsistencies
+* @return #GNUNET_OK to continue to iterate, #GNUNET_SYSERR to stop iterating
+*/
+static enum GNUNET_GenericReturnValue
+add_bad_sig_losses (void *cls,
+ uint64_t serial_id,
+ const struct
+ TALER_AUDITORDB_BadSigLosses
+ *dc)
+{
+ json_t *list = cls;
+ json_t *obj;
+
+ obj = GNUNET_JSON_PACK (
+
+ GNUNET_JSON_pack_uint64 ("row_id", serial_id),
+ GNUNET_JSON_pack_string ("operation", dc->operation),
+ TALER_JSON_pack_amount ("loss", &dc->loss),
+ GNUNET_JSON_pack_data_auto ("operation_specific_pub",
+ &dc->operation_specific_pub)
+ );
+ GNUNET_break (0 ==
+ json_array_append_new (list,
+ obj));
+
+
+ return GNUNET_OK;
+}
+
+
+/**
+*
+* @param rh context of the handler
+* @param connection the MHD connection to handle
+* @param[in,out] connection_cls the connection's closure (can be updated)
+* @param upload_data upload data
+* @param[in,out] upload_data_size number of bytes (left) in @a upload_data
+* @return MHD result code
+*/
+MHD_RESULT
+TAH_BAD_SIG_LOSSES_handler_get (struct TAH_RequestHandler *rh,
+ struct MHD_Connection *
+ connection,
+ void **connection_cls,
+ const char *upload_data,
+ size_t *upload_data_size,
+ const char *const args[])
+{
+ json_t *ja;
+ enum GNUNET_DB_QueryStatus qs;
+
+ (void) rh;
+ (void) connection_cls;
+ (void) upload_data;
+ (void) upload_data_size;
+ if (GNUNET_SYSERR ==
+ TAH_plugin->preflight (TAH_plugin->cls))
+ {
+ GNUNET_break (0);
+ return TALER_MHD_reply_with_error (connection,
+ MHD_HTTP_INTERNAL_SERVER_ERROR,
+ TALER_EC_GENERIC_DB_SETUP_FAILED,
+ NULL);
+ }
+ ja = json_array ();
+ GNUNET_break (NULL != ja);
+
+ int64_t limit = -20;
+ uint64_t offset;
+
+ TALER_MHD_parse_request_snumber (connection,
+ "limit",
+ &limit);
+
+ if (limit < 0)
+ offset = INT64_MAX;
+ else
+ offset = 0;
+
+ TALER_MHD_parse_request_number (connection,
+ "offset",
+ &offset);
+
+ bool return_suppressed = false;
+ const char *ret_s = MHD_lookup_connection_value (connection,
+ MHD_GET_ARGUMENT_KIND,
+ "return_suppressed");
+ if (ret_s != NULL && strcmp (ret_s, "true") == 0)
+ {
+ return_suppressed = true;
+ }
+
+ const char *op = MHD_lookup_connection_value (connection,
+ MHD_GET_ARGUMENT_KIND,
+ "op");
+
+
+ struct GNUNET_CRYPTO_EddsaPublicKey op_spec_pub;
+ memset (&op_spec_pub,0, sizeof(op_spec_pub));
+
+ bool filter_spec_pub = false;
+ const char *ret_osp = MHD_lookup_connection_value (connection,
+ MHD_GET_ARGUMENT_KIND,
+ "use_op_spec_pub");
+ if (ret_osp != NULL && strcmp (ret_osp, "true") == 0)
+ {
+ filter_spec_pub = true;
+
+
+ struct GNUNET_JSON_Specification spec[] = {
+ GNUNET_JSON_spec_fixed_auto ("operation_specific_pub", &op_spec_pub),
+ GNUNET_JSON_spec_end ()
+ };
+
+
+ json_t *json;
+ {
+ enum GNUNET_GenericReturnValue res;
+
+ res = TALER_MHD_parse_post_json (connection,
+ connection_cls,
+ upload_data,
+ upload_data_size,
+ &json);
+ if (GNUNET_SYSERR == res)
+ return MHD_NO;
+ if ((GNUNET_NO == res) ||
+ (NULL == json))
+ return MHD_YES;
+ res = TALER_MHD_parse_json_data (connection,
+ json,
+ spec);
+ if (GNUNET_SYSERR == res)
+ {
+ json_decref (json);
+ return MHD_NO; /* hard failure */
+ }
+ if (GNUNET_NO == res)
+ {
+ json_decref (json);
+ return MHD_YES; /* failure */
+ }
+ }
+
+ }
+
+
+ qs = TAH_plugin->get_bad_sig_losses (
+ TAH_plugin->cls,
+ limit,
+ offset,
+ return_suppressed,
+ filter_spec_pub,
+ op_spec_pub,
+ op,
+ &add_bad_sig_losses,
+ ja);
+
+ if (0 > qs)
+ {
+ GNUNET_break (GNUNET_DB_STATUS_HARD_ERROR == qs);
+ json_decref (ja);
+ TALER_LOG_WARNING (
+ "Failed to handle GET /bad-sig-losses\n");
+ return TALER_MHD_reply_with_error (connection,
+ MHD_HTTP_INTERNAL_SERVER_ERROR,
+ TALER_EC_GENERIC_DB_FETCH_FAILED,
+ "bad-sig-losses");
+ }
+ return TALER_MHD_REPLY_JSON_PACK (
+ connection,
+ MHD_HTTP_OK,
+ GNUNET_JSON_pack_array_steal ("bad_sig_losses",
+ ja));
+}