/* This file is part of TALER Copyright (C) 2024 Taler Systems SA TALER is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 3, or (at your option) any later version. TALER is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with TALER; see the file COPYING. If not, see */ #include "platform.h" #include #include #include #include #include #include "taler_json_lib.h" #include "taler_mhd_lib.h" #include "taler-auditor-httpd.h" #include "taler-auditor-httpd_exchange-signkeys-put.h" /** * We have parsed the JSON information about the exchange-signkeys, do some * basic sanity checks and then execute the * transaction. * * @param connection the MHD connection to handle * @param dc information about the exchange-signkeys * @return MHD result code */ static MHD_RESULT process_inconsistency ( struct MHD_Connection *connection, const struct TALER_AUDITORDB_ExchangeSignkeys *dc) { enum GNUNET_DB_QueryStatus qs; if (GNUNET_SYSERR == TAH_plugin->preflight (TAH_plugin->cls)) { GNUNET_break (0); return TALER_MHD_reply_with_error (connection, MHD_HTTP_INTERNAL_SERVER_ERROR, TALER_EC_GENERIC_DB_SETUP_FAILED, NULL); } /* execute transaction */ qs = TAH_plugin->insert_exchange_signkeys (TAH_plugin->cls, dc); if (0 > qs) { GNUNET_break (GNUNET_DB_STATUS_HARD_ERROR == qs); TALER_LOG_WARNING ( "Failed to store /exchange-signkeys in database"); return TALER_MHD_reply_with_error (connection, MHD_HTTP_INTERNAL_SERVER_ERROR, TALER_EC_GENERIC_DB_STORE_FAILED, "exchange-signkeys"); } return TALER_MHD_REPLY_JSON_PACK (connection, MHD_HTTP_OK, GNUNET_JSON_pack_string ("status", "EXCHANGE_SIGNKEYS_OK")); } MHD_RESULT TAH_EXCHANGE_SIGNKEYS_handler_put ( struct TAH_RequestHandler *rh, struct MHD_Connection *connection, void **connection_cls, const char *upload_data, size_t *upload_data_size, const char *const args[]) { struct TALER_AUDITORDB_ExchangeSignkeys dc; struct GNUNET_TIME_Timestamp evf = { 0 }; struct GNUNET_TIME_Timestamp ees = { 0 }; struct GNUNET_TIME_Timestamp eel = { 0 }; struct GNUNET_JSON_Specification spec[] = { GNUNET_JSON_spec_fixed_auto ("exchange_pub", &dc.exchange_pub), GNUNET_JSON_spec_fixed_auto ("master_sig", &dc.master_sig), GNUNET_JSON_spec_timestamp ("ep_valid_from", &evf), GNUNET_JSON_spec_timestamp ("ep_expire_sign", &ees), GNUNET_JSON_spec_timestamp ("ep_expire_legal", &eel), GNUNET_JSON_spec_end () }; json_t *json; (void) rh; (void) connection_cls; (void) upload_data; (void) upload_data_size; { enum GNUNET_GenericReturnValue res; res = TALER_MHD_parse_post_json (connection, connection_cls, upload_data, upload_data_size, &json); if (GNUNET_SYSERR == res) return MHD_NO; if ((GNUNET_NO == res) || (NULL == json)) return MHD_YES; res = TALER_MHD_parse_json_data (connection, json, spec); if (GNUNET_SYSERR == res) { json_decref (json); return MHD_NO; /* hard failure */ } if (GNUNET_NO == res) { json_decref (json); return MHD_YES; /* failure */ } } dc.ep_expire_legal = eel.abs_time; dc.ep_expire_sign = ees.abs_time; dc.ep_valid_from = evf.abs_time; MHD_RESULT res; res = process_inconsistency (connection, &dc); GNUNET_JSON_parse_free (spec); json_decref (json); return res; } void TEAH_EXCHANGE_SIGNKEYS_PUT_init (void) { } void TEAH_EXCHANGE_SIGNKEYS_PUT_done (void) { }