/*
This file is part of TALER
Copyright (C) 2024 Taler Systems SA
TALER is free software; you can redistribute it and/or modify it under the
terms of the GNU General Public License as published by the Free Software
Foundation; either version 3, or (at your option) any later version.
TALER is distributed in the hope that it will be useful, but WITHOUT ANY
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with
TALER; see the file COPYING. If not, see
*/
#include "platform.h"
#include
#include
#include
#include
#include
#include "taler_json_lib.h"
#include "taler_mhd_lib.h"
#include "taler-auditor-httpd.h"
#include "taler-auditor-httpd_exchange-signkeys-put.h"
/**
* We have parsed the JSON information about the exchange-signkeys, do some
* basic sanity checks and then execute the
* transaction.
*
* @param connection the MHD connection to handle
* @param dc information about the exchange-signkeys
* @return MHD result code
*/
static MHD_RESULT
process_inconsistency (
struct MHD_Connection *connection,
const struct TALER_AUDITORDB_ExchangeSignkeys *dc)
{
enum GNUNET_DB_QueryStatus qs;
if (GNUNET_SYSERR ==
TAH_plugin->preflight (TAH_plugin->cls))
{
GNUNET_break (0);
return TALER_MHD_reply_with_error (connection,
MHD_HTTP_INTERNAL_SERVER_ERROR,
TALER_EC_GENERIC_DB_SETUP_FAILED,
NULL);
}
/* execute transaction */
qs = TAH_plugin->insert_exchange_signkeys (TAH_plugin->cls,
dc);
if (0 > qs)
{
GNUNET_break (GNUNET_DB_STATUS_HARD_ERROR == qs);
TALER_LOG_WARNING (
"Failed to store /exchange-signkeys in database");
return TALER_MHD_reply_with_error (connection,
MHD_HTTP_INTERNAL_SERVER_ERROR,
TALER_EC_GENERIC_DB_STORE_FAILED,
"exchange-signkeys");
}
return TALER_MHD_REPLY_JSON_PACK (connection,
MHD_HTTP_OK,
GNUNET_JSON_pack_string ("status",
"EXCHANGE_SIGNKEYS_OK"));
}
MHD_RESULT
TAH_EXCHANGE_SIGNKEYS_handler_put (
struct TAH_RequestHandler *rh,
struct MHD_Connection *connection,
void **connection_cls,
const char *upload_data,
size_t *upload_data_size,
const char *const args[])
{
struct TALER_AUDITORDB_ExchangeSignkeys dc;
struct GNUNET_TIME_Timestamp evf = { 0 };
struct GNUNET_TIME_Timestamp ees = { 0 };
struct GNUNET_TIME_Timestamp eel = { 0 };
struct GNUNET_JSON_Specification spec[] = {
GNUNET_JSON_spec_fixed_auto ("exchange_pub", &dc.exchange_pub),
GNUNET_JSON_spec_fixed_auto ("master_sig", &dc.master_sig),
GNUNET_JSON_spec_timestamp ("ep_valid_from", &evf),
GNUNET_JSON_spec_timestamp ("ep_expire_sign", &ees),
GNUNET_JSON_spec_timestamp ("ep_expire_legal", &eel),
GNUNET_JSON_spec_end ()
};
json_t *json;
(void) rh;
(void) connection_cls;
(void) upload_data;
(void) upload_data_size;
{
enum GNUNET_GenericReturnValue res;
res = TALER_MHD_parse_post_json (connection,
connection_cls,
upload_data,
upload_data_size,
&json);
if (GNUNET_SYSERR == res)
return MHD_NO;
if ((GNUNET_NO == res) ||
(NULL == json))
return MHD_YES;
res = TALER_MHD_parse_json_data (connection,
json,
spec);
if (GNUNET_SYSERR == res)
{
json_decref (json);
return MHD_NO; /* hard failure */
}
if (GNUNET_NO == res)
{
json_decref (json);
return MHD_YES; /* failure */
}
}
dc.ep_expire_legal = eel.abs_time;
dc.ep_expire_sign = ees.abs_time;
dc.ep_valid_from = evf.abs_time;
MHD_RESULT res;
res = process_inconsistency (connection, &dc);
GNUNET_JSON_parse_free (spec);
json_decref (json);
return res;
}
void
TEAH_EXCHANGE_SIGNKEYS_PUT_init (void)
{
}
void
TEAH_EXCHANGE_SIGNKEYS_PUT_done (void)
{
}