[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[taler-donau] branch master updated: cleanup
From: |
gnunet |
Subject: |
[taler-donau] branch master updated: cleanup |
Date: |
Mon, 01 Jan 2024 18:15:26 +0100 |
This is an automated email from the git hooks/post-receive script.
johannes-casaburi pushed a commit to branch master
in repository donau.
The following commit(s) were added to refs/heads/master by this push:
new 6f1d725 cleanup
6f1d725 is described below
commit 6f1d7255ec8cb0c7408ced48d0099b88ecf7feb7
Author: Casaburi Johannes <johannes.casaburi@students.bfh.ch>
AuthorDate: Mon Jan 1 18:14:54 2024 +0100
cleanup
---
src/donau/donau-httpd.c | 180 ++++++++++++------------------
src/donau/donau-httpd.h | 5 +-
src/donau/donau-httpd_keys.c | 144 +++++++-----------------
src/donaudb/test_donaudb.c | 72 ++----------
src/include/donaudb_plugin.h | 5 +-
src/lib/donau_api_batch_submit_receipts.c | 5 -
src/testing/test_donau_api.c | 1 -
7 files changed, 121 insertions(+), 291 deletions(-)
diff --git a/src/donau/donau-httpd.c b/src/donau/donau-httpd.c
index 299240a..c89ae04 100644
--- a/src/donau/donau-httpd.c
+++ b/src/donau/donau-httpd.c
@@ -32,7 +32,6 @@
#include "donau-httpd_terms.h"
#include "donaudb_lib.h"
#include "donaudb_plugin.h"
-#include "taler/taler_extensions.h"
#include <gnunet/gnunet_mhd_compat.h>
#include "donau_util.h"
@@ -50,7 +49,7 @@
* Above what request latency do we start to log?
*/
#define WARN_LATENCY GNUNET_TIME_relative_multiply ( \
- GNUNET_TIME_UNIT_MILLISECONDS, 500)
+ GNUNET_TIME_UNIT_MILLISECONDS, 500)
/**
* Are clients allowed to request /keys for times other than the
@@ -170,14 +169,6 @@ int DH_check_invariants_flag;
*/
bool DH_suicide;
-/**
- * Signature of the configuration of all enabled extensions,
- * signed by the donau's offline master key with purpose
- * TALER_SIGNATURE_MASTER_EXTENSION.
- */
-struct TALER_MasterSignatureP DH_extensions_sig;
-bool DH_extensions_signed = false;
-
/**
* Value to return from main()
*/
@@ -191,7 +182,7 @@ static uint16_t serve_port;
/**
* Counter for the number of requests this HTTP has processed so far.
*/
-//static unsigned long long req_count;
+// static unsigned long long req_count;
/**
* Counter for the number of open connections.
@@ -276,11 +267,11 @@ handle_mhd_completion_callback (void *cls,
return;
GNUNET_async_scope_enter (&rc->async_scope_id,
&old_scope);
- //check_suicide ();
- //DH_check_invariants ();
+ // check_suicide ();
+ // DH_check_invariants ();
if (NULL != rc->rh_cleaner)
rc->rh_cleaner (rc);
- //DH_check_invariants ();
+ // DH_check_invariants ();
{
#if MHD_VERSION >= 0x00097304
const union MHD_ConnectionInfo *ci;
@@ -307,7 +298,7 @@ handle_mhd_completion_callback (void *cls,
TALER_MHD_parse_post_cleanup_callback (rc->opaque_post_parsing_context);
/* Sanity-check that we didn't leave any transactions hanging */
GNUNET_break (GNUNET_OK ==
- DH_plugin->preflight (DH_plugin->cls));
+ DH_plugin->preflight (DH_plugin->cls));
{
struct GNUNET_TIME_Relative latency;
@@ -512,75 +503,75 @@ handle_mhd_request (void *cls,
{
static struct DH_RequestHandler handlers[] = {
/* /robots.txt: disallow everything */
-{
- .url = "robots.txt",
- .method = MHD_HTTP_METHOD_GET,
- //.handler.get = &DH_handler_static_response,
- .mime_type = "text/plain",
- .data = "User-agent: *\nDisallow: /\n",
- .response_code = MHD_HTTP_OK
-},
+ {
+ .url = "robots.txt",
+ .method = MHD_HTTP_METHOD_GET,
+ // .handler.get = &DH_handler_static_response,
+ .mime_type = "text/plain",
+ .data = "User-agent: *\nDisallow: /\n",
+ .response_code = MHD_HTTP_OK
+ },
/* Landing page, tell humans to go away. */
-{
- .url = "",
- .method = MHD_HTTP_METHOD_GET,
- //.handler.get = DH_handler_static_response,
- .mime_type = "text/plain",
- .data =
- "Hello, I'm the Taler donau. This HTTP server is not for humans.\n",
- .response_code = MHD_HTTP_OK
-},
+ {
+ .url = "",
+ .method = MHD_HTTP_METHOD_GET,
+ // .handler.get = DH_handler_static_response,
+ .mime_type = "text/plain",
+ .data =
+ "Hello, I'm the Taler donau. This HTTP server is not for humans.\n",
+ .response_code = MHD_HTTP_OK
+ },
/* AGPL licensing page, redirect to source. As per the AGPL-license, every
deployment is required to offer the user a download of the source of
the actual deployment. We make this easy by including a redirect to the
source here. */
-{
- .url = "agpl",
- .method = MHD_HTTP_METHOD_GET,
- //.handler.get = &DH_handler_agpl_redirect
-},
-{
- .url = "seed",
- .method = MHD_HTTP_METHOD_GET,
- .handler.get = &handler_seed
-},
+ {
+ .url = "agpl",
+ .method = MHD_HTTP_METHOD_GET,
+ // .handler.get = &DH_handler_agpl_redirect
+ },
+ {
+ .url = "seed",
+ .method = MHD_HTTP_METHOD_GET,
+ .handler.get = &handler_seed
+ },
/* Configuration */
-{
- .url = "config",
- .method = MHD_HTTP_METHOD_GET,
- //.handler.get = &DH_handler_config
-},
+ {
+ .url = "config",
+ .method = MHD_HTTP_METHOD_GET,
+ // .handler.get = &DH_handler_config
+ },
/* Performance metrics */
-{
- .url = "metrics",
- .method = MHD_HTTP_METHOD_GET,
- //.handler.get = &DH_handler_metrics
-},
+ {
+ .url = "metrics",
+ .method = MHD_HTTP_METHOD_GET,
+ // .handler.get = &DH_handler_metrics
+ },
/* Terms of service */
-{
- .url = "terms",
- .method = MHD_HTTP_METHOD_GET,
- //.handler.get = &DH_handler_terms
-},
+ {
+ .url = "terms",
+ .method = MHD_HTTP_METHOD_GET,
+ // .handler.get = &DH_handler_terms
+ },
/* Privacy policy */
-{
- .url = "privacy",
- .method = MHD_HTTP_METHOD_GET,
- //.handler.get = &DH_handler_privacy
-},
+ {
+ .url = "privacy",
+ .method = MHD_HTTP_METHOD_GET,
+ // .handler.get = &DH_handler_privacy
+ },
/* Return key material and fundamental properties for this donau */
-{
- .url = "keys",
- .method = MHD_HTTP_METHOD_GET,
- //.handler.get = &DH_keys_get_handler,
-},
+ {
+ .url = "keys",
+ .method = MHD_HTTP_METHOD_GET,
+ // .handler.get = &DH_keys_get_handler,
+ },
/* request R, used in clause schnorr withdraw and refresh */
-{
- .url = "csr-melt",
- .method = MHD_HTTP_METHOD_POST,
- //.handler.post = &DH_handler_csr_melt,
- .nargs = 0
-},
+ {
+ .url = "csr-melt",
+ .method = MHD_HTTP_METHOD_POST,
+ // .handler.post = &DH_handler_csr_melt,
+ .nargs = 0
+ },
/* mark end of list */
@@ -603,7 +594,7 @@ handle_mhd_request (void *cls,
rc = *con_cls = GNUNET_new (struct DH_RequestContext);
rc->start_time = GNUNET_TIME_absolute_get ();
GNUNET_async_scope_fresh (&rc->async_scope_id);
- //DH_check_invariants ();
+ // DH_check_invariants ();
rc->url = url;
rc->connection = connection;
/* We only read the correlation ID on the first callback for every client
*/
@@ -630,7 +621,7 @@ handle_mhd_request (void *cls,
GNUNET_async_scope_enter (&rc->async_scope_id,
&old_scope);
- //DH_check_invariants ();
+ // DH_check_invariants ();
if (NULL != correlation_id)
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
"Handling request (%s) for URL '%s', correlation_id=%s\n",
@@ -1202,11 +1193,11 @@ run_single_request (void)
}
}
+
#endif
/* end of HAVE_DEVELOPER */
-
/**
* Signature of the callback used by MHD to notify the application
* about completed connections. If we are running in test-mode with
@@ -1262,21 +1253,11 @@ do_shutdown (void *cls)
(void) cls;
mhd = TALER_MHD_daemon_stop ();
- // DH_resume_keys_requests (true);
- // DH_deposits_get_cleanup ();
- // DH_reserves_get_cleanup ();
- // DH_purses_get_cleanup ();
- // DH_kyc_check_cleanup ();
- // DH_kyc_proof_cleanup ();
- // TALER_KYCLOGIC_kyc_done ();
if (NULL != mhd)
{
MHD_stop_daemon (mhd);
mhd = NULL;
}
- // DH_wire_done ();
- // DH_extensions_done ();
- // DH_keys_finished ();
if (NULL != DH_plugin)
{
DONAUDB_plugin_unload (DH_plugin);
@@ -1344,29 +1325,8 @@ run (void *cls,
GNUNET_SCHEDULER_shutdown ();
return;
}
- // if (GNUNET_OK !=
- // DH_extensions_init ())
- // {
- // global_ret = EXIT_FAILURE;
- // GNUNET_SCHEDULER_shutdown ();
- // return;
- // }
- // if (GNUNET_OK !=
- // DH_keys_init ())
- // {
- // global_ret = EXIT_FAILURE;
- // GNUNET_SCHEDULER_shutdown ();
- // return;
- // }
- // if (GNUNET_OK !=
- // DH_wire_init ())
- // {
- // global_ret = EXIT_FAILURE;
- // GNUNET_SCHEDULER_shutdown ();
- // return;
- // }
-
- //DH_load_terms (DH_cfg);
+
+ // DH_load_terms (DH_cfg);
DH_curl_ctx
= GNUNET_CURL_init (&GNUNET_CURL_gnunet_scheduler_reschedule,
&donau_curl_rc);
@@ -1433,6 +1393,7 @@ run (void *cls,
#endif
}
+
/**
* The main function of the taler-donau-httpd server ("the donau").
*
@@ -1485,4 +1446,5 @@ main (int argc,
return global_ret;
}
+
/* end of taler-donau-httpd.c */
\ No newline at end of file
diff --git a/src/donau/donau-httpd.h b/src/donau/donau-httpd.h
index eac4efd..269c4b4 100644
--- a/src/donau/donau-httpd.h
+++ b/src/donau/donau-httpd.h
@@ -26,7 +26,6 @@
#include <microhttpd.h>
#include "taler/taler_json_lib.h"
#include <taler/taler_util.h>
-#include "taler/taler_extensions.h"
#include <gnunet/gnunet_mhd_compat.h>
@@ -56,12 +55,12 @@ extern int DH_check_invariants_flag;
* as building new /keys responses is expensive. Should only be
* enabled for testcases, development and test systems.
*/
-//extern int DH_allow_keys_timetravel;
+// extern int DH_allow_keys_timetravel;
/**
* Main directory with data.
*/
-//extern char *DH_revocation_directory;
+// extern char *DH_revocation_directory;
/**
* True if we should commit suicide once all active
diff --git a/src/donau/donau-httpd_keys.c b/src/donau/donau-httpd_keys.c
index 3ed384f..cdd62a4 100644
--- a/src/donau/donau-httpd_keys.c
+++ b/src/donau/donau-httpd_keys.c
@@ -23,11 +23,10 @@
#include "taler/taler_json_lib.h"
#include "taler/taler_mhd_lib.h"
#include "donau-httpd.h"
-//#include "donau-httpd_config.h"
+// #include "donau-httpd_config.h"
#include "donau-httpd_keys.h"
#include "donau-httpd_responses.h"
#include "donaudb_plugin.h"
-#include "taler/taler_extensions.h"
/**
@@ -52,13 +51,13 @@ struct HelperDenomination
/**
* When will the helper start to use this key for signing?
*/
- //struct GNUNET_TIME_Timestamp start_time;
+ // struct GNUNET_TIME_Timestamp start_time;
/**
* For how long will the helper allow signing? 0 if
* the key was revoked or purged.
*/
- //struct GNUNET_TIME_Relative validity_duration;
+ // struct GNUNET_TIME_Relative validity_duration;
/**
* Hash of the full denomination key.
@@ -138,13 +137,13 @@ struct HelperSignkey
/**
* When will the helper start to use this key for signing?
*/
- //struct GNUNET_TIME_Timestamp start_time;
+ // struct GNUNET_TIME_Timestamp start_time;
/**
* For how long will the helper allow signing? 0 if
* the key was revoked or purged.
*/
- //struct GNUNET_TIME_Relative validity_duration;
+ // struct GNUNET_TIME_Relative validity_duration;
/**
* The public key.
@@ -236,7 +235,7 @@ struct KeysResponseData
* The client's request must include this date or a higher one
* for this response to be applicable.
*/
- struct GNUNET_TIME_Timestamp cherry_pick_date;
+ struct GNUNET_TIME_Timestamp cherry_pick_date;
};
@@ -258,12 +257,6 @@ struct SigningKey
*/
struct DONAUDB_SignkeyMetaData meta;
- /**
- * The long-term offline master key's signature for this signing key.
- * Signs over @e donau_pub and @e meta.
- */
- //struct TALER_MasterSignatureP master_sig;
-
};
struct DH_KeyStateHandle
@@ -314,19 +307,19 @@ struct DH_KeyStateHandle
/**
* When did we initiate the key reloading?
*/
- //struct GNUNET_TIME_Timestamp reload_time;
+ // struct GNUNET_TIME_Timestamp reload_time;
/**
* What is the period at which we rotate keys
* (signing or denomination keys)?
*/
- //struct GNUNET_TIME_Relative rekey_frequency;
+ // struct GNUNET_TIME_Relative rekey_frequency;
/**
* When does our online signing key expire and we
* thus need to re-generate this response?
*/
- //struct GNUNET_TIME_Timestamp signature_expires;
+ // struct GNUNET_TIME_Timestamp signature_expires;
/**
* True if #finish_keys_response() was not yet run and this key state
@@ -1238,10 +1231,10 @@ DH_keys_init ()
asset_type = GNUNET_strdup ("fiat");
}
keys_eh = DH_plugin->event_listen (DH_plugin->cls,
- GNUNET_TIME_UNIT_FOREVER_REL,
- &es,
- &keys_update_event_cb,
- NULL);
+ GNUNET_TIME_UNIT_FOREVER_REL,
+ &es,
+ &keys_update_event_cb,
+ NULL);
if (NULL == keys_eh)
{
GNUNET_break (0);
@@ -1268,7 +1261,7 @@ DH_keys_finished ()
if (NULL != keys_eh)
{
DH_plugin->event_listen_cancel (DH_plugin->cls,
- keys_eh);
+ keys_eh);
keys_eh = NULL;
}
}
@@ -1895,69 +1888,6 @@ create_krd (struct DH_KeyStateHandle *ksh,
&grouped_donau_sig));
GNUNET_assert (NULL != keys);
- /* Signal support for the configured, enabled extensions. */
- {
- json_t *extensions = json_object ();
- bool has_extensions = false;
-
- GNUNET_assert (NULL != extensions);
- /* Fill in the configurations of the enabled extensions */
- for (const struct TALER_Extensions *iter = TALER_extensions_get_head ();
- NULL != iter && NULL != iter->extension;
- iter = iter->next)
- {
- const struct TALER_Extension *extension = iter->extension;
- json_t *manifest;
- int r;
-
- /* skip if not enabled */
- if (! extension->enabled)
- continue;
-
- /* flag our findings so far */
- has_extensions = true;
-
-
- manifest = extension->manifest (extension);
- GNUNET_assert (manifest);
-
- r = json_object_set_new (
- extensions,
- extension->name,
- manifest);
- GNUNET_assert (0 == r);
- }
-
- /* Update the keys object with the extensions and its signature */
- if (has_extensions)
- {
- json_t *sig;
- int r;
-
- r = json_object_set_new (
- keys,
- "extensions",
- extensions);
- GNUNET_assert (0 == r);
-
- /* Add the signature of the extensions, if it is not zero */
- if (DH_extensions_signed)
- {
- sig = GNUNET_JSON_PACK (
- GNUNET_JSON_pack_data_auto ("extensions_sig",
- &DH_extensions_sig));
-
- r = json_object_update (keys, sig);
- GNUNET_assert (0 == r);
- }
- }
- else
- {
- json_decref (extensions);
- }
- }
-
-
{
char *keys_json;
void *keys_jsonz;
@@ -2123,7 +2053,8 @@ finish_keys_response (struct DH_KeyStateHandle *ksh)
denominations_by_group =
GNUNET_CONTAINER_multihashmap_create (1024,
- GNUNET_NO /* NO, because keys are
only on the stack */);
+ GNUNET_NO /* NO, because keys are
only on the stack */
+ );
/* heap = min heap, sorted by start time */
@@ -2453,7 +2384,8 @@ build_key_state (struct HelperState *hs,
ksh->denomkey_map = GNUNET_CONTAINER_multihashmap_create (1024,
true);
ksh->signkey_map = GNUNET_CONTAINER_multipeermap_create (32,
- false /* MUST be
false! */);
+ false /* MUST be
false! */
+ );
/* NOTE: fetches master-signed signkeys, but ALSO those that were revoked! */
GNUNET_break (GNUNET_OK ==
DH_plugin->preflight (DH_plugin->cls));
@@ -2466,8 +2398,8 @@ build_key_state (struct HelperState *hs,
return NULL;
}
qs = DH_plugin->iterate_denominations (DH_plugin->cls,
- &denomination_info_cb,
- ksh);
+ &denomination_info_cb,
+ ksh);
if (qs < 0)
{
GNUNET_break (GNUNET_DB_STATUS_SOFT_ERROR != qs);
@@ -2478,8 +2410,8 @@ build_key_state (struct HelperState *hs,
}
/* NOTE: ONLY fetches non-revoked AND master-signed signkeys! */
qs = DH_plugin->iterate_active_signkeys (DH_plugin->cls,
- &signkey_info_cb,
- ksh);
+ &signkey_info_cb,
+ ksh);
if (qs < 0)
{
GNUNET_break (0);
@@ -2488,8 +2420,8 @@ build_key_state (struct HelperState *hs,
return NULL;
}
qs = DH_plugin->iterate_auditor_denominations (DH_plugin->cls,
- &auditor_denom_cb,
- ksh);
+ &auditor_denom_cb,
+ ksh);
if (qs < 0)
{
GNUNET_break (0);
@@ -2498,8 +2430,8 @@ build_key_state (struct HelperState *hs,
return NULL;
}
qs = DH_plugin->iterate_active_auditors (DH_plugin->cls,
- &auditor_info_cb,
- ksh);
+ &auditor_info_cb,
+ ksh);
if (qs < 0)
{
GNUNET_break (0);
@@ -2537,9 +2469,9 @@ DH_keys_update_states ()
};
DH_plugin->event_notify (DH_plugin->cls,
- &es,
- NULL,
- 0);
+ &es,
+ NULL,
+ 0);
key_generation++;
DH_resume_keys_requests (false);
}
@@ -2627,9 +2559,9 @@ DH_keys_denomination_by_hash (
}
return DH_keys_denomination_by_hash_from_state (ksh,
- h_denom_pub,
- conn,
- mret);
+ h_denom_pub,
+ conn,
+ mret);
}
@@ -2649,7 +2581,7 @@ DH_keys_denomination_by_hash_from_state (
if (NULL == conn)
return NULL;
*mret = DH_RESPONSE_reply_unknown_denom_pub_hash (conn,
- h_denom_pub);
+ h_denom_pub);
return NULL;
}
return dk;
@@ -2972,9 +2904,9 @@ DH_keys_donau_sign_ (
return TALER_EC_DONAU_GENERIC_KEYS_MISSING;
}
return DH_keys_donau_sign2_ (ksh,
- purpose,
- pub,
- sig);
+ purpose,
+ pub,
+ sig);
}
@@ -3068,7 +3000,7 @@ krd_search_comparator (const void *key,
MHD_RESULT
DH_keys_get_handler (struct DH_RequestContext *rc,
- const char *const args[])
+ const char *const args[])
{
struct GNUNET_TIME_Timestamp last_issue_date;
const char *etag;
@@ -3328,7 +3260,7 @@ add_future_signkey_cb (void *cls,
MHD_RESULT
DH_keys_management_get_keys_handler (const struct DH_RequestHandler *rh,
- struct MHD_Connection *connection)
+ struct MHD_Connection *connection)
{
struct DH_KeyStateHandle *ksh;
json_t *reply;
diff --git a/src/donaudb/test_donaudb.c b/src/donaudb/test_donaudb.c
index f86c22a..92d3500 100644
--- a/src/donaudb/test_donaudb.c
+++ b/src/donaudb/test_donaudb.c
@@ -34,24 +34,25 @@ static int result;
* Report line of error if @a cond is true, and jump to label "drop".
*/
#define FAILIF(cond) \
- do { \
- if (! (cond)) { break;} \
- GNUNET_break (0); \
- goto drop; \
- } while (0)
+ do { \
+ if (! (cond)) { break;} \
+ GNUNET_break (0); \
+ goto drop; \
+ } while (0)
/**
* Initializes @a ptr with random data.
*/
#define RND_BLK(ptr) \
- GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, ptr, sizeof (*ptr))
+ GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, ptr, sizeof (*
\
+
ptr))
/**
* Initializes @a ptr with zeros.
*/
#define ZR_BLK(ptr) \
- memset (ptr, 0, sizeof (*ptr))
+ memset (ptr, 0, sizeof (*ptr))
/**
@@ -108,63 +109,6 @@ mark_prepare_cb (void *cls,
}
-/**
- * Simple check that config retrieval and setting for extensions work
- */
-static enum GNUNET_GenericReturnValue
-test_extension_manifest (void)
-{
- char *manifest;
-
- FAILIF (GNUNET_DB_STATUS_SUCCESS_NO_RESULTS !=
- plugin->get_extension_manifest (plugin->cls,
- "fnord",
- &manifest));
-
- FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
- plugin->set_extension_manifest (plugin->cls,
- "fnord",
- "bar"));
- FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
- plugin->get_extension_manifest (plugin->cls,
- "fnord",
- &manifest));
-
- FAILIF (0 != strcmp ("bar", manifest));
- GNUNET_free (manifest);
-
- /* let's do this again! */
- FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
- plugin->set_extension_manifest (plugin->cls,
- "fnord",
- "buzz"));
-
- FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
- plugin->get_extension_manifest (plugin->cls,
- "fnord",
- &manifest));
-
- FAILIF (0 != strcmp ("buzz", manifest));
- GNUNET_free (manifest);
-
- /* let's do this again, with NULL */
- FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
- plugin->set_extension_manifest (plugin->cls,
- "fnord",
- NULL));
-
- FAILIF (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT !=
- plugin->get_extension_manifest (plugin->cls,
- "fnord",
- &manifest));
-
- FAILIF (NULL != manifest);
-
- return GNUNET_OK;
-drop:
- return GNUNET_SYSERR;
-}
-
int
main (int argc,
char *const argv[])
diff --git a/src/include/donaudb_plugin.h b/src/include/donaudb_plugin.h
index 08ae7a1..9c470d6 100644
--- a/src/include/donaudb_plugin.h
+++ b/src/include/donaudb_plugin.h
@@ -20,12 +20,11 @@
*/
#ifndef DONAUDB_PLUGIN_H
#define DONAUDB_PLUGIN_H
-//#include <jansson.h>
+// #include <jansson.h>
#include <gnunet/gnunet_db_lib.h>
#include "taler/taler_json_lib.h"
#include "donau_signatures.h"
#include "donau_util.h"
-//#include "taler/taler_extensions_policy.h"
/**
* Meta data about a donation unit key.
@@ -45,7 +44,7 @@ struct DONAUDB_DonationUnitKeyMetaData
/**
* Hash code of the donation unit public key.
*/
- struct DONAU_DonationUnitHashP donation_unit_hash; //already in
GNUNET_CRYPTO_BlindSignPublicKey -> part of every public donation unit
+ struct DONAU_DonationUnitHashP donation_unit_hash; // already in
GNUNET_CRYPTO_BlindSignPublicKey -> part of every public donation unit
};
diff --git a/src/lib/donau_api_batch_submit_receipts.c
b/src/lib/donau_api_batch_submit_receipts.c
index 49a6be3..08bea01 100644
--- a/src/lib/donau_api_batch_submit_receipts.c
+++ b/src/lib/donau_api_batch_submit_receipts.c
@@ -134,11 +134,6 @@ struct DONAU_BatchDepositHandle
*/
struct TALER_CharityWireHashP h_wire;
- /**
- * Hash over the extensions, or all zero.
- */
- struct TALER_ExtensionPolicyHashP h_policy;
-
/**
* Time when this confirmation was generated / when the donau received
* the deposit request.
diff --git a/src/testing/test_donau_api.c b/src/testing/test_donau_api.c
index 2ef0788..88298e8 100644
--- a/src/testing/test_donau_api.c
+++ b/src/testing/test_donau_api.c
@@ -34,7 +34,6 @@
#include "taler_bank_service.h"
#include "taler_fakebank_lib.h"
#include "taler_testing_lib.h"
-#include "taler/taler_extensions.h"
/**
* Configuration file we use. One (big) configuration is used
--
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.
- [taler-donau] branch master updated: cleanup,
gnunet <=
- [taler-donau] branch master updated: cleanup, gnunet, 2024/01/02
- [taler-donau] branch master updated: cleanup, gnunet, 2024/01/02
- [taler-donau] branch master updated: cleanup, gnunet, 2024/01/02
- [taler-donau] branch master updated: cleanup, gnunet, 2024/01/02
- [taler-donau] branch master updated: cleanup, gnunet, 2024/01/02
- [taler-donau] branch master updated: cleanup, gnunet, 2024/01/02
- [taler-donau] branch master updated: cleanup, gnunet, 2024/01/02
- [taler-donau] branch master updated: cleanup, gnunet, 2024/01/05