taldir

Directory service to resolve wallet mailboxes by messenger addresses
Log | Files | Refs | Submodules | README | LICENSE

commit 52d00c91bb5bcada014300ae62e0a440f95f8503
parent 66a23e1c0f3684703dbecadfa606146e0c6b535f
Author: Martin Schanzenbach <schanzen@gnunet.org>
Date:   Sun, 22 Mar 2026 15:57:03 +0100

remove now obsolete *Database function suffixes

Diffstat:
Mpkg/taldir/db.go | 67++++++++++++++++++++++++++++++++++---------------------------------
Mpkg/taldir/taldir.go | 42+++++++++++++++++++++---------------------
2 files changed, 55 insertions(+), 54 deletions(-)

diff --git a/pkg/taldir/db.go b/pkg/taldir/db.go @@ -27,6 +27,7 @@ import ( "strings" "time" + _ "github.com/lib/pq" talerutil "github.com/schanzen/taler-go/pkg/util" ) @@ -303,8 +304,8 @@ func OpenDatabase(psqlconn string) (*TaldirDatabase, error) { }, nil } -// UpdateValidationInDatabase updates a validation in database -func (db *TaldirDatabase) UpdateValidationInDatabase(v *Validation) error { +// UpdateValidation updates a validation in database +func (db *TaldirDatabase) UpdateValidation(v *Validation) error { rows, err := db.updateValidationStmt.Query(v.HAlias, v.CreatedAt, v.Duration, v.TargetURI, v.Challenge, v.ChallengeSent, v.RequiresPayment, v.SolutionAttemptCount, v.LastSolutionTimeframeStart, v.OrderID, v.ValidatorName) if err != nil { return err @@ -313,8 +314,8 @@ func (db *TaldirDatabase) UpdateValidationInDatabase(v *Validation) error { return nil } -// InsertValidationIntoDatabase inserts a new validation into database -func (db *TaldirDatabase) InsertValidationIntoDatabase(v *Validation) error { +// InsertValidation inserts a new validation into database +func (db *TaldirDatabase) InsertValidation(v *Validation) error { rows, err := db.insertValidationStmt.Query(v.CreatedAt, v.HAlias, v.Duration, v.TargetURI, v.Challenge, v.ChallengeSent, v.RequiresPayment, v.SolutionAttemptCount, v.LastSolutionTimeframeStart, v.OrderID, v.ValidatorName) if err != nil { return err @@ -323,8 +324,8 @@ func (db *TaldirDatabase) InsertValidationIntoDatabase(v *Validation) error { return nil } -// GetValidationFromDatabase gets a Validation from database -func (db *TaldirDatabase) GetValidationFromDatabase(v *Validation, hAlias string, targetURI string, duration time.Duration) error { +// GetValidation gets a Validation from database +func (db *TaldirDatabase) GetValidation(v *Validation, hAlias string, targetURI string, duration time.Duration) error { // Execute Query rows, err := db.getValidationStmt.Query(hAlias, targetURI, duration.Microseconds()) if err != nil { @@ -351,8 +352,8 @@ func (db *TaldirDatabase) GetValidationFromDatabase(v *Validation, hAlias string ) } -// GetAllValidationsByHAliasFromDatabase gets all Validations by hash-salted alias from database -func (db *TaldirDatabase) GetAllValidationsByHAliasFromDatabase(hAlias string) ([]Validation, error) { +// GetAllValidationsByHAlias gets all Validations by hash-salted alias from database +func (db *TaldirDatabase) GetAllValidationsByHAlias(hAlias string) ([]Validation, error) { // Execute Query rows, err := db.getAllValidationsByHAliasStmt.Query(hAlias) if err != nil { @@ -384,8 +385,8 @@ func (db *TaldirDatabase) GetAllValidationsByHAliasFromDatabase(hAlias string) ( return validations, nil } -// GetFirstValidationByHAliasFromDatabase gets the first Hash-salted alias from database -func (db *TaldirDatabase) GetFirstValidationByHAliasFromDatabase(v *Validation, hAlias string) error { +// GetFirstValidationByHAlias gets the first Hash-salted alias from database +func (db *TaldirDatabase) GetFirstValidationByHAlias(v *Validation, hAlias string) error { // Execute Query rows, err := db.getFirstValidationByHAliasStmt.Query(hAlias) if err != nil { @@ -411,8 +412,8 @@ func (db *TaldirDatabase) GetFirstValidationByHAliasFromDatabase(v *Validation, ) } -// GetAllEntriesFromDatabase gets all Hash-salted aliases from database -func (db *TaldirDatabase) GetAllEntriesFromDatabase() ([]Entry, error) { +// GetAllEntries gets all Hash-salted aliases from database +func (db *TaldirDatabase) GetAllEntries() ([]Entry, error) { query := `SELECT "hs_alias", "created_at", @@ -445,8 +446,8 @@ func (db *TaldirDatabase) GetAllEntriesFromDatabase() ([]Entry, error) { return entries, nil } -// GetEntryByHsAliasFromDatabase gets the Hash-salted alias from database -func (db *TaldirDatabase) GetEntryByHsAliasFromDatabase(e *Entry, hsAlias string) error { +// GetEntryByHsAlias gets the Hash-salted alias from database +func (db *TaldirDatabase) GetEntryByHsAlias(e *Entry, hsAlias string) error { // Execute Query rows, err := db.getEntryByHAliasStmt.Query(hsAlias) if err != nil { @@ -465,8 +466,8 @@ func (db *TaldirDatabase) GetEntryByHsAliasFromDatabase(e *Entry, hsAlias string ) } -// DeleteStaleValidationsFromDatabase purges stale validations -func (db *TaldirDatabase) DeleteStaleValidationsFromDatabase(validationExpiration time.Duration) (int64, error) { +// DeleteStaleValidations purges stale validations +func (db *TaldirDatabase) DeleteStaleValidations(validationExpiration time.Duration) (int64, error) { var ctx context.Context ctx, stop := context.WithCancel(context.Background()) defer stop() @@ -489,16 +490,16 @@ func (db *TaldirDatabase) DeleteStaleValidationsFromDatabase(validationExpiratio } func (db *TaldirDatabase) ClearDatabase() error { - _, err := db.DeleteAllEntriesFromDatabase() + _, err := db.DeleteAllEntries() if err != nil { return err } - _, err = db.DeleteAllValidationsFromDatabase() + _, err = db.DeleteAllValidations() return err } -// DeleteValidationsByHAliasFromDatabase purges Validations -func (db *TaldirDatabase) DeleteValidationsByHAliasFromDatabase(hAlias string) (int64, error) { +// DeleteValidationsByHAlias purges Validations +func (db *TaldirDatabase) DeleteValidationsByHAlias(hAlias string) (int64, error) { var ctx context.Context ctx, stop := context.WithCancel(context.Background()) defer stop() @@ -519,8 +520,8 @@ func (db *TaldirDatabase) DeleteValidationsByHAliasFromDatabase(hAlias string) ( return rows, nil } -// DeleteAllValidationsFromDatabase purges all Validations -func (db *TaldirDatabase) DeleteAllValidationsFromDatabase() (int64, error) { +// DeleteAllValidations purges all Validations +func (db *TaldirDatabase) DeleteAllValidations() (int64, error) { var ctx context.Context ctx, stop := context.WithCancel(context.Background()) defer stop() @@ -546,13 +547,13 @@ func (db *TaldirDatabase) DeleteAllValidationsFromDatabase() (int64, error) { return rows, nil } -// DeleteValidationFromDatabase purges a Validation -func (db *TaldirDatabase) DeleteValidationFromDatabase(v *Validation) (int64, error) { - return db.DeleteValidationsByHAliasFromDatabase(v.HAlias) +// DeleteValidation purges a Validation +func (db *TaldirDatabase) DeleteValidation(v *Validation) (int64, error) { + return db.DeleteValidationsByHAlias(v.HAlias) } -// DeleteAllEntriesFromDatabase purges Entries -func (db *TaldirDatabase) DeleteAllEntriesFromDatabase() (int64, error) { +// DeleteAllEntries purges Entries +func (db *TaldirDatabase) DeleteAllEntries() (int64, error) { var ctx context.Context ctx, stop := context.WithCancel(context.Background()) defer stop() @@ -578,8 +579,8 @@ func (db *TaldirDatabase) DeleteAllEntriesFromDatabase() (int64, error) { return rows, nil } -// DeleteEntryFromDatabase deletes an Entry -func (db *TaldirDatabase) DeleteEntryFromDatabase(e *Entry) (int64, error) { +// DeleteEntry deletes an Entry +func (db *TaldirDatabase) DeleteEntry(e *Entry) (int64, error) { var ctx context.Context ctx, stop := context.WithCancel(context.Background()) defer stop() @@ -602,8 +603,8 @@ func (db *TaldirDatabase) DeleteEntryFromDatabase(e *Entry) (int64, error) { var () -// UpdateEntryInDatabase updates the Entry in database -func (db *TaldirDatabase) UpdateEntryInDatabase(e *Entry) error { +// UpdateEntry updates the Entry in database +func (db *TaldirDatabase) UpdateEntry(e *Entry) error { rows, err := db.updateEntryStmt.Query(e.HsAlias, e.CreatedAt, e.TargetURI, e.Duration) if err != nil { return err @@ -612,8 +613,8 @@ func (db *TaldirDatabase) UpdateEntryInDatabase(e *Entry) error { return nil } -// InsertEntryIntoDatabase inserts new Entry into database -func (db *TaldirDatabase) InsertEntryIntoDatabase(e *Entry) error { +// InsertEntry inserts new Entry into database +func (db *TaldirDatabase) InsertEntry(e *Entry) error { var err error e.CreatedAt = time.Now().UnixMicro() rows, err := db.insertEntryStmt.Query(e.HsAlias, e.CreatedAt, e.TargetURI, e.Duration) diff --git a/pkg/taldir/taldir.go b/pkg/taldir/taldir.go @@ -254,7 +254,7 @@ func (t *Taldir) getSingleEntry(w http.ResponseWriter, r *http.Request) { vars := mux.Vars(r) var entry Entry hsAlias := saltHAlias(vars["h_alias"], t.Salt) - var err = t.DB.GetEntryByHsAliasFromDatabase(&entry, hsAlias) + var err = t.DB.GetEntryByHsAlias(&entry, hsAlias) if err == nil { w.Header().Set("Content-Type", "application/json") resp, _ := json.Marshal(entry) @@ -287,7 +287,7 @@ func (t *Taldir) disseminateStart(e Entry) { // Disseminate all entries func (t *Taldir) disseminateEntries() error { - entries, err := t.DB.GetAllEntriesFromDatabase() + entries, err := t.DB.GetAllEntries() if nil != err { return err } @@ -339,7 +339,7 @@ func (t *Taldir) validationRequest(w http.ResponseWriter, r *http.Request) { w.Write(resp) return } - err = t.DB.GetFirstValidationByHAliasFromDatabase(&validation, vars["h_alias"]) + err = t.DB.GetFirstValidationByHAlias(&validation, vars["h_alias"]) t.Logger.Logf(LogDebug, "Got validation %v", validation) if err != nil { w.WriteHeader(http.StatusNotFound) @@ -356,7 +356,7 @@ func (t *Taldir) validationRequest(w http.ResponseWriter, r *http.Request) { validation.LastSolutionTimeframeStart = time.Now().UnixMicro() validation.SolutionAttemptCount = 1 } - t.DB.UpdateValidationInDatabase(&validation) + t.DB.UpdateValidation(&validation) t.Logger.Logf(LogDebug, "Generating solution from %s and %s", validation.TargetURI, validation.Challenge) expectedSolution := util.GenerateSolution(validation.TargetURI, validation.Challenge) @@ -365,7 +365,7 @@ func (t *Taldir) validationRequest(w http.ResponseWriter, r *http.Request) { w.WriteHeader(http.StatusForbidden) return } - _, err = t.DB.DeleteValidationFromDatabase(&validation) + _, err = t.DB.DeleteValidation(&validation) if err != nil { t.Logger.Logf(LogError, "Error deleting validation: %v", err) w.WriteHeader(http.StatusInternalServerError) @@ -373,10 +373,10 @@ func (t *Taldir) validationRequest(w http.ResponseWriter, r *http.Request) { } entry.HsAlias = saltHAlias(validation.HAlias, t.Salt) tmpDuration := (entry.Duration + validation.Duration) * 1000 - err = t.DB.GetEntryByHsAliasFromDatabase(&entry, entry.HsAlias) + err = t.DB.GetEntryByHsAlias(&entry, entry.HsAlias) if err == nil { if validation.TargetURI == "" { - _, err = t.DB.DeleteEntryFromDatabase(&entry) + _, err = t.DB.DeleteEntry(&entry) if err != nil { t.Logger.Logf(LogError, "Error deleting entry: %v", err) w.WriteHeader(http.StatusInternalServerError) @@ -387,7 +387,7 @@ func (t *Taldir) validationRequest(w http.ResponseWriter, r *http.Request) { } else { entry.TargetURI = validation.TargetURI entry.Duration = tmpDuration - err = t.DB.UpdateEntryInDatabase(&entry) + err = t.DB.UpdateEntry(&entry) t.Logger.Logf(LogDebug, "Updated entry in database to: %v", entry) if err != nil { t.Logger.Logf(LogError, "Error updating entry: %v", err) @@ -402,7 +402,7 @@ func (t *Taldir) validationRequest(w http.ResponseWriter, r *http.Request) { t.Logger.Logf(LogWarning, "Validated a deletion request but no entry found for `%s'\n", entry.HsAlias) } else { entry.TargetURI = validation.TargetURI - err = t.DB.InsertEntryIntoDatabase(&entry) + err = t.DB.InsertEntry(&entry) if err != nil { t.Logger.Logf(LogError, "Error inserting entry: %v", err) w.WriteHeader(http.StatusInternalServerError) @@ -415,7 +415,7 @@ func (t *Taldir) validationRequest(w http.ResponseWriter, r *http.Request) { } func (t *Taldir) isRateLimited(hAlias string) (bool, error) { - validations, err := t.DB.GetAllValidationsByHAliasFromDatabase(hAlias) + validations, err := t.DB.GetAllValidationsByHAlias(hAlias) // NOTE: Check rate limit if err == nil { // Limit re-initiation attempts to ValidationInitiationMax times @@ -480,7 +480,7 @@ func (t *Taldir) registerRequest(w http.ResponseWriter, r *http.Request) { validation.HAlias = hAlias validation.ValidatorName = validator.Name() hsAlias := saltHAlias(validation.HAlias, t.Salt) - err = t.DB.GetEntryByHsAliasFromDatabase(&entry, hsAlias) + err = t.DB.GetEntryByHsAlias(&entry, hsAlias) // Round to the nearest multiple of a month reqDuration := time.Duration(req.Duration * 1000) reqDuration = reqDuration.Round(monthDuration) @@ -514,11 +514,11 @@ func (t *Taldir) registerRequest(w http.ResponseWriter, r *http.Request) { } jsonResp, _ := json.Marshal(rlResponse) w.Write(jsonResp) - t.DB.DeleteValidationFromDatabase(&validation) + t.DB.DeleteValidation(&validation) return } t.Logger.Logf(LogDebug, "Looking for validation with %v %v %v\n", hAlias, req.TargetURI, reqDuration.Microseconds()) - err = t.DB.GetValidationFromDatabase(&validation, hAlias, req.TargetURI, reqDuration) + err = t.DB.GetValidation(&validation, hAlias, req.TargetURI, reqDuration) validationExists := (nil == err) t.Logger.Logf(LogDebug, "Validation exists %v\n", validationExists) // FIXME: Always set new challenge? @@ -529,7 +529,7 @@ func (t *Taldir) registerRequest(w http.ResponseWriter, r *http.Request) { validation.Duration = reqDuration.Microseconds() validation.CreatedAt = validation.LastSolutionTimeframeStart t.Logger.Logf(LogDebug, "Storing new validation %v\n", validation) - err = t.DB.InsertValidationIntoDatabase(&validation) + err = t.DB.InsertValidation(&validation) if nil != err { t.Logger.Logf(LogError, "Error inserting validation! %v", err) w.WriteHeader(http.StatusInternalServerError) @@ -570,7 +570,7 @@ func (t *Taldir) registerRequest(w http.ResponseWriter, r *http.Request) { return } if len(payto) != 0 { - err = t.DB.UpdateValidationInDatabase(&validation) + err = t.DB.UpdateValidation(&validation) if nil != err { t.Logger.Logf(LogError, "Error inserting validation! %v", err) w.WriteHeader(http.StatusInternalServerError) @@ -582,7 +582,7 @@ func (t *Taldir) registerRequest(w http.ResponseWriter, r *http.Request) { } // In this case, this order was paid } - err = t.DB.UpdateValidationInDatabase(&validation) + err = t.DB.UpdateValidation(&validation) if err != nil { t.Logger.Logf(LogError, "%s\n", err.Error()) w.WriteHeader(http.StatusInternalServerError) @@ -594,7 +594,7 @@ func (t *Taldir) registerRequest(w http.ResponseWriter, r *http.Request) { redirectionLink, err := validator.RegistrationStart(topic, link, message, req.Alias, validation.Challenge) if err != nil { t.Logger.Logf(LogError, "%s\n", err.Error()) - t.DB.DeleteValidationFromDatabase(&validation) + t.DB.DeleteValidation(&validation) w.WriteHeader(http.StatusInternalServerError) return } @@ -659,7 +659,7 @@ func (t *Taldir) validationPage(w http.ResponseWriter, r *http.Request) { var png []byte var validation Validation - err := t.DB.GetFirstValidationByHAliasFromDatabase(&validation, vars["h_alias"]) + err := t.DB.GetFirstValidationByHAlias(&validation, vars["h_alias"]) w.Header().Set("Content-Type", "text/html; charset=utf-8") if err != nil { // This validation does not exist. @@ -834,7 +834,7 @@ func (t *Taldir) typeLookupResultPage(w http.ResponseWriter, r *http.Request) { hAliasBin := HashAlias(val.Name(), r.URL.Query().Get("alias")) hAlias := util.Base32CrockfordEncode(hAliasBin[:]) hsAlias := saltHAlias(hAlias, t.Salt) - err := t.DB.GetEntryByHsAliasFromDatabase(&entry, hsAlias) + err := t.DB.GetEntryByHsAlias(&entry, hsAlias) if err != nil { t.Logger.Logf(LogError, "`%s` not found.\n", hAlias) } else { @@ -1041,7 +1041,7 @@ func (t *Taldir) Initialize(cfg TaldirConfig) { t.DB = cfg.Db if cfg.Ini.GetBool("directory", "purge_mappings_on_startup_dangerous", false) { t.Logger.Logf(LogWarning, "DANGER Purging mappings!") - num, err := t.DB.DeleteAllEntriesFromDatabase() + num, err := t.DB.DeleteAllEntries() if err != nil { t.Logger.Logf(LogDebug, "Error purging entries: `%v'.\n", err) } @@ -1055,7 +1055,7 @@ func (t *Taldir) Initialize(cfg TaldirConfig) { } go func() { for { - num, err := t.DB.DeleteStaleValidationsFromDatabase(validationExp) + num, err := t.DB.DeleteStaleValidations(validationExp) if err != nil { t.Logger.Logf(LogDebug, "Error purging stale validations: `%v'.\n", err) }