/* This file is part of TALER (C) 2014--2023 Taler Systems SA TALER is free software; you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation; either version 3, or (at your option) any later version. TALER is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with TALER; see the file COPYING. If not, see */ /** * @file taler-merchant-httpd_helper.c * @brief shared logic for various handlers * @author Christian Grothoff */ #include "platform.h" #include #include #include #include #include "taler-merchant-httpd_helper.h" #include #include enum GNUNET_GenericReturnValue TMH_cmp_wire_account ( const json_t *account, const struct TMH_WireMethod *wm) { const char *credit_facade_url = NULL; const json_t *credit_facade_credentials = NULL; struct TALER_FullPayto uri; struct GNUNET_JSON_Specification ispec[] = { TALER_JSON_spec_full_payto_uri ("payto_uri", &uri), GNUNET_JSON_spec_mark_optional ( TALER_JSON_spec_web_url ("credit_facade_url", &credit_facade_url), NULL), GNUNET_JSON_spec_mark_optional ( GNUNET_JSON_spec_object_const ("credit_facade_credentials", &credit_facade_credentials), NULL), GNUNET_JSON_spec_end () }; enum GNUNET_GenericReturnValue res; const char *ename; unsigned int eline; res = GNUNET_JSON_parse (account, ispec, &ename, &eline); if (GNUNET_OK != res) { GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Failed to parse account spec: %s (%u)\n", ename, eline); return GNUNET_SYSERR; } if (0 != TALER_full_payto_cmp (wm->payto_uri, uri)) { return GNUNET_SYSERR; } if ( (NULL == credit_facade_url) != (NULL == wm->credit_facade_url) || (NULL == credit_facade_credentials) != (NULL == wm->credit_facade_credentials) ) { return GNUNET_NO; } if ( (NULL != credit_facade_url) && (0 != strcmp (credit_facade_url, wm->credit_facade_url)) ) { return GNUNET_NO; } if ( (NULL != credit_facade_credentials) && (0 != json_equal (credit_facade_credentials, wm->credit_facade_credentials)) ) { return GNUNET_NO; } return GNUNET_YES; } bool TMH_accounts_array_valid (const json_t *accounts) { size_t len; if (! json_is_array (accounts)) { GNUNET_break_op (0); return false; } len = json_array_size (accounts); for (size_t i = 0; icredit_facade_url = GNUNET_strdup (credit_facade_url); if (NULL != credit_facade_credentials) wm->credit_facade_credentials = json_incref ((json_t*) credit_facade_credentials); GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_NONCE, &wm->wire_salt, sizeof (wm->wire_salt)); wm->payto_uri.full_payto = GNUNET_strdup (payto_uri.full_payto); TALER_merchant_wire_signature_hash (payto_uri, &wm->wire_salt, &wm->h_wire); wm->wire_method = TALER_payto_get_method (payto_uri.full_payto); wm->active = true; return wm; } enum GNUNET_GenericReturnValue TMH_check_auth_config (struct MHD_Connection *connection, const json_t *jauth, const char **auth_token) { bool auth_wellformed = false; const char *auth_method = json_string_value (json_object_get (jauth, "method")); *auth_token = NULL; if (NULL == auth_method) { GNUNET_break_op (0); } else if (0 == strcmp (auth_method, "external")) { auth_wellformed = true; } else if (0 == strcmp (auth_method, "token")) { *auth_token = json_string_value (json_object_get (jauth, "token")); if (NULL == *auth_token) { GNUNET_break_op (0); } else { if (0 != strncasecmp (RFC_8959_PREFIX, *auth_token, strlen (RFC_8959_PREFIX))) GNUNET_break_op (0); else auth_wellformed = true; } } if (! auth_wellformed) { GNUNET_break_op (0); return (MHD_YES == TALER_MHD_reply_with_error (connection, MHD_HTTP_BAD_REQUEST, TALER_EC_MERCHANT_PRIVATE_POST_INSTANCES_BAD_AUTH, "bad authentication config")) ? GNUNET_NO : GNUNET_SYSERR; } return GNUNET_OK; } void TMH_uuid_from_string (const char *uuids, struct GNUNET_Uuid *uuid) { struct GNUNET_HashCode hc; GNUNET_CRYPTO_hash (uuids, strlen (uuids), &hc); GNUNET_static_assert (sizeof (hc) > sizeof (*uuid)); GNUNET_memcpy (uuid, &hc, sizeof (*uuid)); } /** * Closure for #trigger_webhook_cb. * * @param instance which is the instance we work with * @param root JSON data to fill into the template * @param rv, query of the TALER_TEMPLATEING_fill */ struct Trigger { const char *instance; const json_t *root; enum GNUNET_DB_QueryStatus rv; }; /** * Typically called by `TMH_trigger_webhook`. * * @param[in,out] cls a `struct Trigger` with information about the webhook * @param webhook_serial reference to the configured webhook template. * @param event_type is the event/action of the webhook * @param url to make request to * @param http_method use for the webhook * @param header_template of the webhook * @param body_template of the webhook */ static void trigger_webhook_cb (void *cls, uint64_t webhook_serial, const char *event_type, const char *url, const char *http_method, const char *header_template, const char *body_template) { struct Trigger *t = cls; void *header = NULL; void *body = NULL; size_t header_size; size_t body_size; if (NULL != header_template) { int ret; ret = TALER_TEMPLATING_fill (header_template, t->root, &header, &header_size); if (0 != ret) { GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Failed to expand webhook header template for webhook %llu (%d)\n", (unsigned long long) webhook_serial, ret); t->rv = GNUNET_DB_STATUS_HARD_ERROR; return; } /* Note: header is actually header_size+1 bytes long here, see mustach.c::memfile_close() */ GNUNET_assert ('\0' == ((const char *) header)[header_size]); } if (NULL != body_template) { int ret; ret = TALER_TEMPLATING_fill (body_template, t->root, &body, &body_size); if (0 != ret) { GNUNET_log (GNUNET_ERROR_TYPE_WARNING, "Failed to expand webhook body template for webhook %llu (%d)\n", (unsigned long long) webhook_serial, ret); t->rv = GNUNET_DB_STATUS_HARD_ERROR; return; } /* Note: body is actually body_size+1 bytes long here, see mustach.c::memfile_close() */ GNUNET_assert ('\0' == ((const char *) body)[body_size]); } t->rv = TMH_db->insert_pending_webhook (TMH_db->cls, t->instance, webhook_serial, url, http_method, header, body); if (t->rv > 0) { struct GNUNET_DB_EventHeaderP es = { .size = htons (sizeof(es)), .type = htons (TALER_DBEVENT_MERCHANT_WEBHOOK_PENDING) }; const void *extra = NULL; size_t extra_size = 0; TMH_db->event_notify (TMH_db->cls, &es, &extra, extra_size); } free (header); free (body); } /** * TMH_trigger_webhook is a function that need to be use when someone * pay. Merchant need to have a notification. * * @param instance that we need to send the webhook as a notification * @param event of the webhook * @param args argument of the function */ enum GNUNET_DB_QueryStatus TMH_trigger_webhook (const char *instance, const char *event, const json_t *args) { struct Trigger t = { .instance = instance, .root = args }; enum GNUNET_DB_QueryStatus qs; qs = TMH_db->lookup_webhook_by_event (TMH_db->cls, instance, event, &trigger_webhook_cb, &t); if (qs < 0) return qs; return t.rv; } enum GNUNET_GenericReturnValue TMH_base_url_by_connection (struct MHD_Connection *connection, const char *instance, struct GNUNET_Buffer *buf) { const char *host; const char *forwarded_host; const char *forwarded_port; const char *uri_path; memset (buf, 0, sizeof (*buf)); if (NULL != TMH_base_url) { GNUNET_buffer_write_str (buf, TMH_base_url); } else { if (GNUNET_YES == TALER_mhd_is_https (connection)) GNUNET_buffer_write_str (buf, "https://"); else GNUNET_buffer_write_str (buf, "http://"); host = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, MHD_HTTP_HEADER_HOST); forwarded_host = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, "X-Forwarded-Host"); if (NULL != forwarded_host) { GNUNET_buffer_write_str (buf, forwarded_host); } else { if (NULL == host) { GNUNET_buffer_clear (buf); GNUNET_break (0); return GNUNET_SYSERR; } GNUNET_buffer_write_str (buf, host); } forwarded_port = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, "X-Forwarded-Port"); if (NULL != forwarded_port) { GNUNET_buffer_write_str (buf, ":"); GNUNET_buffer_write_str (buf, forwarded_port); } uri_path = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, "X-Forwarded-Prefix"); if (NULL != uri_path) GNUNET_buffer_write_path (buf, uri_path); } if (0 != strcmp (instance, "default")) { GNUNET_buffer_write_path (buf, "/instances/"); GNUNET_buffer_write_str (buf, instance); } return GNUNET_OK; } enum GNUNET_GenericReturnValue TMH_taler_uri_by_connection (struct MHD_Connection *connection, const char *method, const char *instance, struct GNUNET_Buffer *buf) { const char *host; const char *forwarded_host; const char *forwarded_port; const char *uri_path; memset (buf, 0, sizeof (*buf)); host = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, "Host"); forwarded_host = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, "X-Forwarded-Host"); forwarded_port = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, "X-Forwarded-Port"); uri_path = MHD_lookup_connection_value (connection, MHD_HEADER_KIND, "X-Forwarded-Prefix"); if (NULL != forwarded_host) host = forwarded_host; if (NULL == host) { GNUNET_break (0); return GNUNET_SYSERR; } GNUNET_buffer_write_str (buf, "taler"); if (GNUNET_NO == TALER_mhd_is_https (connection)) GNUNET_buffer_write_str (buf, "+http"); GNUNET_buffer_write_str (buf, "://"); GNUNET_buffer_write_str (buf, method); GNUNET_buffer_write_str (buf, "/"); GNUNET_buffer_write_str (buf, host); if (NULL != forwarded_port) { GNUNET_buffer_write_str (buf, ":"); GNUNET_buffer_write_str (buf, forwarded_port); } if (NULL != uri_path) GNUNET_buffer_write_path (buf, uri_path); if (0 != strcmp ("default", instance)) { GNUNET_buffer_write_path (buf, "instances"); GNUNET_buffer_write_path (buf, instance); } return GNUNET_OK; } /** * Closure for #add_matching_account(). */ struct ExchangeMatchContext { /** * Wire method to match, NULL for all. */ const char *wire_method; /** * Array of accounts to return. */ json_t *accounts; }; /** * If the given account is feasible, add it to the array * of accounts we return. * * @param cls a `struct PostReserveContext` * @param payto_uri URI of the account * @param conversion_url URL of a conversion service * @param debit_restrictions restrictions for debits from account * @param credit_restrictions restrictions for credits to account * @param master_sig signature affirming the account */ static void add_matching_account ( void *cls, struct TALER_FullPayto payto_uri, const char *conversion_url, const json_t *debit_restrictions, const json_t *credit_restrictions, const struct TALER_MasterSignatureP *master_sig) { struct ExchangeMatchContext *rc = cls; char *method; method = TALER_payto_get_method (payto_uri.full_payto); if ( (NULL == rc->wire_method) || (0 == strcmp (method, rc->wire_method)) ) { json_t *acc; acc = GNUNET_JSON_PACK ( TALER_JSON_pack_full_payto ("payto_uri", payto_uri), GNUNET_JSON_pack_data_auto ("master_sig", master_sig), GNUNET_JSON_pack_allow_null ( GNUNET_JSON_pack_string ("conversion_url", conversion_url)), GNUNET_JSON_pack_array_incref ("credit_restrictions", (json_t *) credit_restrictions), GNUNET_JSON_pack_array_incref ("debit_restrictions", (json_t *) debit_restrictions) ); GNUNET_assert (0 == json_array_append_new (rc->accounts, acc)); } GNUNET_free (method); } /** * Return JSON array with all of the exchange accounts * that support the given @a wire_method. * * @param master_pub master public key to match exchange by * @param wire_method NULL for any * @return JSON array with information about all matching accounts */ json_t * TMH_exchange_accounts_by_method ( const struct TALER_MasterPublicKeyP *master_pub, const char *wire_method) { struct ExchangeMatchContext emc = { .wire_method = wire_method, .accounts = json_array () }; enum GNUNET_DB_QueryStatus qs; GNUNET_assert (NULL != emc.accounts); qs = TMH_db->select_accounts_by_exchange (TMH_db->cls, master_pub, &add_matching_account, &emc); if (qs < 0) { json_decref (emc.accounts); return NULL; } return emc.accounts; } char * TMH_make_order_status_url (struct MHD_Connection *con, const char *order_id, const char *session_id, const char *instance_id, struct TALER_ClaimTokenP *claim_token, struct TALER_PrivateContractHashP *h_contract) { struct GNUNET_Buffer buf; /* Number of query parameters written so far */ unsigned int num_qp = 0; GNUNET_assert (NULL != instance_id); GNUNET_assert (NULL != order_id); if (GNUNET_OK != TMH_base_url_by_connection (con, instance_id, &buf)) { GNUNET_break (0); return NULL; } GNUNET_buffer_write_path (&buf, "/orders"); GNUNET_buffer_write_path (&buf, order_id); if ( (NULL != claim_token) && (! GNUNET_is_zero (claim_token)) ) { /* 'token=' for human readability */ GNUNET_buffer_write_str (&buf, "?token="); GNUNET_buffer_write_data_encoded (&buf, (char *) claim_token, sizeof (*claim_token)); num_qp++; } if (NULL != session_id) { if (num_qp > 0) GNUNET_buffer_write_str (&buf, "&session_id="); else GNUNET_buffer_write_str (&buf, "?session_id="); GNUNET_buffer_write_str (&buf, session_id); num_qp++; } if (NULL != h_contract) { if (num_qp > 0) GNUNET_buffer_write_str (&buf, "&h_contract="); else GNUNET_buffer_write_str (&buf, "?h_contract="); GNUNET_buffer_write_data_encoded (&buf, (char *) h_contract, sizeof (*h_contract)); } return GNUNET_buffer_reap_str (&buf); } char * TMH_make_taler_pay_uri (struct MHD_Connection *con, const char *order_id, const char *session_id, const char *instance_id, struct TALER_ClaimTokenP *claim_token) { struct GNUNET_Buffer buf; GNUNET_assert (NULL != instance_id); GNUNET_assert (NULL != order_id); if (GNUNET_OK != TMH_taler_uri_by_connection (con, "pay", instance_id, &buf)) { GNUNET_break (0); return NULL; } GNUNET_buffer_write_path (&buf, order_id); GNUNET_buffer_write_path (&buf, (NULL == session_id) ? "" : session_id); if ( (NULL != claim_token) && (! GNUNET_is_zero (claim_token))) { /* Just 'c=' because this goes into QR codes, so this is more compact. */ GNUNET_buffer_write_str (&buf, "?c="); GNUNET_buffer_write_data_encoded (&buf, (char *) claim_token, sizeof (struct TALER_ClaimTokenP)); } return GNUNET_buffer_reap_str (&buf); }