taler-auditor-httpd_get-monitoring-emergency.c (4507B)
1 /* 2 This file is part of TALER 3 Copyright (C) 2024 Taler Systems SA 4 5 TALER is free software; you can redistribute it and/or modify it under the 6 terms of the GNU General Public License as published by the Free Software 7 Foundation; either version 3, or (at your option) any later version. 8 9 TALER is distributed in the hope that it will be useful, but WITHOUT ANY 10 WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR 11 A PARTICULAR PURPOSE. See the GNU General Public License for more details. 12 13 You should have received a copy of the GNU General Public License along with 14 TALER; see the file COPYING. If not, see <http://www.gnu.org/licenses/> 15 */ 16 #include <gnunet/gnunet_util_lib.h> 17 #include <gnunet/gnunet_json_lib.h> 18 #include <jansson.h> 19 #include <microhttpd.h> 20 #include <pthread.h> 21 #include "taler/taler_json_lib.h" 22 #include "taler/taler_mhd_lib.h" 23 #include "taler-auditor-httpd.h" 24 #include "taler-auditor-httpd_get-monitoring-emergency.h" 25 #include "auditor-database/get_emergency.h" 26 #include "auditor-database/preflight.h" 27 28 29 /** 30 * Add emergency to the list. 31 * 32 * @param[in,out] cls a `json_t *` array to extend 33 * @param dc struct of inconsistencies 34 * @return #GNUNET_OK to continue to iterate, #GNUNET_SYSERR to stop iterating 35 */ 36 static enum GNUNET_GenericReturnValue 37 process_emergency ( 38 void *cls, 39 const struct TALER_AUDITORDB_Emergency *dc) 40 { 41 json_t *list = cls; 42 json_t *obj; 43 44 obj = GNUNET_JSON_PACK ( 45 GNUNET_JSON_pack_uint64 ("row_id", 46 dc->row_id), 47 GNUNET_JSON_pack_data_auto ("denompub_h", 48 &dc->denompub_h), 49 TALER_JSON_pack_amount ("denom_risk", 50 &dc->denom_risk), 51 TALER_JSON_pack_amount ("denom_loss", 52 &dc->denom_loss), 53 TALER_JSON_pack_time_abs_human ("deposit_start", 54 dc->deposit_start), 55 TALER_JSON_pack_time_abs_human ("deposit_end", 56 dc->deposit_end), 57 TALER_JSON_pack_amount ("value", 58 &dc->value), 59 GNUNET_JSON_pack_bool ("suppressed", 60 dc->suppressed) 61 ); 62 GNUNET_break (0 == 63 json_array_append_new (list, 64 obj)); 65 return GNUNET_OK; 66 } 67 68 69 MHD_RESULT 70 TAH_get_monitoring_emergency ( 71 struct TAH_RequestHandler *rh, 72 struct MHD_Connection *connection, 73 void **connection_cls, 74 const char *upload_data, 75 size_t *upload_data_size, 76 const char *const args[]) 77 { 78 json_t *ja; 79 enum GNUNET_DB_QueryStatus qs; 80 int64_t limit = -20; 81 uint64_t offset; 82 bool return_suppressed = false; 83 84 (void) rh; 85 (void) connection_cls; 86 (void) upload_data; 87 (void) upload_data_size; 88 if (GNUNET_SYSERR == 89 TALER_AUDITORDB_preflight (TAH_apg)) 90 { 91 GNUNET_break (0); 92 return TALER_MHD_reply_with_error (connection, 93 MHD_HTTP_INTERNAL_SERVER_ERROR, 94 TALER_EC_GENERIC_DB_SETUP_FAILED, 95 NULL); 96 } 97 TALER_MHD_parse_request_snumber (connection, 98 "limit", 99 &limit); 100 if (limit < 0) 101 offset = INT64_MAX; 102 else 103 offset = 0; 104 TALER_MHD_parse_request_number (connection, 105 "offset", 106 &offset); 107 { 108 const char *ret_s 109 = MHD_lookup_connection_value (connection, 110 MHD_GET_ARGUMENT_KIND, 111 "return_suppressed"); 112 if (ret_s != NULL && strcmp (ret_s, "true") == 0) 113 { 114 return_suppressed = true; 115 } 116 } 117 118 ja = json_array (); 119 GNUNET_break (NULL != ja); 120 qs = TALER_AUDITORDB_get_emergency ( 121 TAH_apg, 122 limit, 123 offset, 124 return_suppressed, 125 &process_emergency, 126 ja); 127 if (0 > qs) 128 { 129 GNUNET_break (GNUNET_DB_STATUS_HARD_ERROR == qs); 130 json_decref (ja); 131 TALER_LOG_WARNING ( 132 "Failed to handle GET /emergency\n"); 133 return TALER_MHD_reply_with_error (connection, 134 MHD_HTTP_INTERNAL_SERVER_ERROR, 135 TALER_EC_GENERIC_DB_FETCH_FAILED, 136 "emergency error"); 137 } 138 return TALER_MHD_REPLY_JSON_PACK ( 139 connection, 140 MHD_HTTP_OK, 141 GNUNET_JSON_pack_array_steal ("emergency", 142 ja)); 143 }